Skip to main content
Glama

Azure MCP Server

Official
MIT License
1,161
  • Linux
  • Apple
SecretCreateCommandTests.cs5.23 kB
// Copyright (c) Microsoft Corporation. // Licensed under the MIT License. using System.CommandLine.Parsing; using System.Text.Json; using System.Text.Json.Serialization; using Azure.Security.KeyVault.Secrets; using AzureMcp.Core.Models.Command; using AzureMcp.Core.Options; using AzureMcp.KeyVault.Commands.Secret; using AzureMcp.KeyVault.Services; using Microsoft.Extensions.DependencyInjection; using Microsoft.Extensions.Logging; using NSubstitute; using NSubstitute.ExceptionExtensions; using Xunit; namespace AzureMcp.KeyVault.UnitTests.Secret; public class SecretCreateCommandTests { private readonly IServiceProvider _serviceProvider; private readonly IKeyVaultService _keyVaultService; private readonly ILogger<SecretCreateCommand> _logger; private readonly SecretCreateCommand _command; private readonly CommandContext _context; private readonly Parser _parser; private const string _knownSubscriptionId = "knownSubscription"; private const string _knownVaultName = "knownVaultName"; private const string _knownSecretName = "knownSecretName"; private const string _knownSecretValue = "knownSecretValue"; private readonly KeyVaultSecret _knownKeyVaultSecret; public SecretCreateCommandTests() { _keyVaultService = Substitute.For<IKeyVaultService>(); _logger = Substitute.For<ILogger<SecretCreateCommand>>(); var collection = new ServiceCollection(); collection.AddSingleton(_keyVaultService); _serviceProvider = collection.BuildServiceProvider(); _command = new(_logger); _context = new(_serviceProvider); _parser = new(_command.GetCommand()); _knownKeyVaultSecret = new KeyVaultSecret(_knownSecretName, _knownSecretValue); } [Fact] public async Task ExecuteAsync_CreatesSecret_WhenValidInput() { // Arrange _keyVaultService.CreateSecret( Arg.Is(_knownVaultName), Arg.Is(_knownSecretName), Arg.Is(_knownSecretValue), Arg.Is(_knownSubscriptionId), Arg.Any<string>(), Arg.Any<RetryPolicyOptions>()) .Returns(_knownKeyVaultSecret); var args = _parser.Parse([ "--vault", _knownVaultName, "--secret", _knownSecretName, "--value", _knownSecretValue, "--subscription", _knownSubscriptionId ]); // Act var response = await _command.ExecuteAsync(_context, args); // Assert Assert.NotNull(response); Assert.Equal(200, response.Status); Assert.NotNull(response.Results); var json = JsonSerializer.Serialize(response.Results); var retrievedSecret = JsonSerializer.Deserialize<SecretCreateResult>(json); Assert.NotNull(retrievedSecret); Assert.Equal(_knownSecretName, retrievedSecret.Name); Assert.Equal(_knownSecretValue, retrievedSecret.Value); } [Fact] public async Task ExecuteAsync_ReturnsInvalidObject_IfSecretNameIsEmpty() { // Arrange - No need to mock service since validation should fail before service is called var args = _parser.Parse([ "--vault", _knownVaultName, "--secret", "", "--subscription", _knownSubscriptionId ]); // Act var response = await _command.ExecuteAsync(_context, args); // Assert - Should return validation error response Assert.NotNull(response); Assert.Equal(400, response.Status); Assert.Contains("required", response.Message.ToLower()); } [Fact] public async Task ExecuteAsync_HandlesException() { // Arrange var expectedError = "Test error"; _keyVaultService.CreateSecret( Arg.Is(_knownVaultName), Arg.Is(_knownSecretName), Arg.Is(_knownSecretValue), Arg.Is(_knownSubscriptionId), Arg.Any<string>(), Arg.Any<RetryPolicyOptions>()) .ThrowsAsync(new Exception(expectedError)); var args = _parser.Parse([ "--vault", _knownVaultName, "--secret", _knownSecretName, "--value", _knownSecretValue, "--subscription", _knownSubscriptionId ]); // Act var response = await _command.ExecuteAsync(_context, args); // Assert Assert.NotNull(response); Assert.Equal(500, response.Status); Assert.StartsWith(expectedError, response.Message); } private class SecretCreateResult { [JsonPropertyName("name")] public string Name { get; set; } = null!; [JsonPropertyName("value")] public string Value { get; set; } = null!; [JsonPropertyName("enabled")] public bool? Enabled { get; set; } [JsonPropertyName("notBefore")] public DateTimeOffset? NotBefore { get; set; } [JsonPropertyName("expiresOn")] public DateTimeOffset? ExpiresOn { get; set; } [JsonPropertyName("createdOn")] public DateTimeOffset? CreatedOn { get; set; } [JsonPropertyName("updatedOn")] public DateTimeOffset? UpdatedOn { get; set; } } }

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/Azure/azure-mcp'

If you have feedback or need assistance with the MCP directory API, please join our Discord server