Skip to main content
Glama

Azure MCP Server

Official
MIT License
1,161
  • Linux
  • Apple
KeyCreateCommandTests.cs5.66 kB
// Copyright (c) Microsoft Corporation. // Licensed under the MIT License. using System.CommandLine.Parsing; using System.Text.Json; using System.Text.Json.Serialization; using Azure.Security.KeyVault.Keys; using AzureMcp.Core.Models.Command; using AzureMcp.Core.Options; using AzureMcp.KeyVault.Commands.Key; using AzureMcp.KeyVault.Services; using Microsoft.Extensions.DependencyInjection; using Microsoft.Extensions.Logging; using NSubstitute; using NSubstitute.ExceptionExtensions; using Xunit; namespace AzureMcp.KeyVault.UnitTests.Key; public class KeyCreateCommandTests { private readonly IServiceProvider _serviceProvider; private readonly IKeyVaultService _keyVaultService; private readonly ILogger<KeyCreateCommand> _logger; private readonly KeyCreateCommand _command; private readonly CommandContext _context; private readonly Parser _parser; private const string _knownSubscriptionId = "knownSubscription"; private const string _knownVaultName = "knownVaultName"; private const string _knownKeyName = "knownKeyName"; private readonly KeyType _knownKeyType = KeyType.Rsa; private readonly KeyVaultKey _knownKeyVaultKey; public KeyCreateCommandTests() { _keyVaultService = Substitute.For<IKeyVaultService>(); _logger = Substitute.For<ILogger<KeyCreateCommand>>(); var collection = new ServiceCollection(); collection.AddSingleton(_keyVaultService); _serviceProvider = collection.BuildServiceProvider(); _command = new(_logger); _context = new(_serviceProvider); _parser = new(_command.GetCommand()); _knownKeyVaultKey = new KeyVaultKey(_knownKeyName); var jsonWebKey = new JsonWebKey([KeyOperation.Encrypt]) { KeyType = _knownKeyType }; // Use reflection to set the internal Key property, which holds KeyType and is required in KeyVaultKey var keyProperty = typeof(KeyVaultKey).GetProperty("Key", System.Reflection.BindingFlags.Instance | System.Reflection.BindingFlags.Public | System.Reflection.BindingFlags.NonPublic); keyProperty?.SetValue(_knownKeyVaultKey, jsonWebKey); } [Fact] public async Task ExecuteAsync_CreatesKey_WithValidInput() { // Arrange _keyVaultService.CreateKey( Arg.Is(_knownVaultName), Arg.Is(_knownKeyName), Arg.Is(_knownKeyType.ToString()), Arg.Is(_knownSubscriptionId), Arg.Any<string>(), Arg.Any<RetryPolicyOptions>()) .Returns(_knownKeyVaultKey); var args = _parser.Parse([ "--vault", _knownVaultName, "--key", _knownKeyName, "--key-type", _knownKeyType.ToString(), "--subscription", _knownSubscriptionId ]); // Act var response = await _command.ExecuteAsync(_context, args); // Assert Assert.NotNull(response); Assert.NotNull(response.Results); var json = JsonSerializer.Serialize(response.Results); var retrievedKey = JsonSerializer.Deserialize<KeyCreateResult>(json); Assert.NotNull(retrievedKey); Assert.Equal(_knownKeyName, retrievedKey.Name); Assert.Equal(_knownKeyType.ToString(), retrievedKey.KeyType); } [Fact] public async Task ExecuteAsync_ReturnsInvalidObject_IfKeyNameIsEmpty() { // Arrange - No need to mock service since validation should fail before service is called var args = _parser.Parse([ "--vault", _knownVaultName, "--key", "", "--key-type", _knownKeyType.ToString(), "--subscription", _knownSubscriptionId ]); // Act var response = await _command.ExecuteAsync(_context, args); // Assert - Should return validation error response Assert.NotNull(response); Assert.Equal(400, response.Status); Assert.Contains("required", response.Message.ToLower()); } [Fact] public async Task ExecuteAsync_HandlesException() { // Arrange var expectedError = "Test error"; _keyVaultService.CreateKey( Arg.Is(_knownVaultName), Arg.Is(_knownKeyName), Arg.Is(_knownKeyType.ToString()), Arg.Is(_knownSubscriptionId), Arg.Any<string>(), Arg.Any<RetryPolicyOptions>()) .ThrowsAsync(new Exception(expectedError)); var args = _parser.Parse([ "--vault", _knownVaultName, "--key", _knownKeyName, "--key-type", _knownKeyType.ToString(), "--subscription", _knownSubscriptionId ]); // Act var response = await _command.ExecuteAsync(_context, args); // Assert Assert.NotNull(response); Assert.Equal(500, response.Status); Assert.StartsWith(expectedError, response.Message); } private class KeyCreateResult { [JsonPropertyName("name")] public string Name { get; set; } = null!; [JsonPropertyName("keyType")] public string KeyType { get; set; } = null!; [JsonPropertyName("enabled")] public bool? Enabled { get; set; } [JsonPropertyName("notBefore")] public DateTimeOffset? NotBefore { get; set; } [JsonPropertyName("expiresOn")] public DateTimeOffset? ExpiresOn { get; set; } [JsonPropertyName("createdOn")] public DateTimeOffset? CreatedOn { get; set; } [JsonPropertyName("updatedOn")] public DateTimeOffset? UpdatedOn { get; set; } } }

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/Azure/azure-mcp'

If you have feedback or need assistance with the MCP directory API, please join our Discord server