Best Python code snippet using localstack_python
test_secretsmanager.py
Source:test_secretsmanager.py  
...338        sm_client.delete_secret(SecretId=secret_name, ForceDeleteWithoutRecovery=True)339    @pytest.mark.parametrize(340        "secret_name", ["Inv Name", " Inv Name", " Inv*Name? ", " Inv *?!]Name\\-"]341    )342    def test_invalid_secret_name(self, sm_client, secret_name: str):343        def check_validation_exception(exc_info: ExceptionInfo):344            error = exc_info.value.response["Error"]345            error_code = error["Code"]346            error_msg = error["Message"]347            assert error_code == "ValidationException"348            assert (349                error_msg350                == "Invalid name. Must be a valid name containing alphanumeric characters, or any of the following: -/_+=.@!"351            )352        # The secret name can contain ASCII letters, numbers, and the following characters: /_+=.@-353        with pytest.raises(Exception) as validation_exception:354            sm_client.create_secret(Name=secret_name, SecretString="MySecretString")355        check_validation_exception(validation_exception)356        with pytest.raises(Exception) as validation_exception:...test.py
Source:test.py  
...31        """Tests the happy path"""32        bouncer = Bouncer(self.good_secret_id)33        self.assertTrue(bouncer.is_authorized('whitelisted@example.com'))34        self.assertTrue(bouncer.is_authorized('alsogood@example.com'))35    def test_invalid_secret_name(self):36        """We use a uuid to ensure this secret doesn't already exist"""37        bouncer = Bouncer('not/a/real/secret/{}'.format(str(uuid.uuid4()).replace('-', '')))38        self.assertRaises(SecretManagerException, bouncer.is_authorized, 'whitelisted@example.com', )39    def test_unauthorized_email(self):40        """Make sure an email that isn't on the whitelist won't be approved"""41        bouncer = Bouncer('commons/dev/whitelist')42        self.assertFalse(bouncer.is_authorized('notwhitelisted@example.com'))43    def test_invalid_secret_key(self):44        """45        This secret has the key `emailZZZ` instead of `email` so we want be sure that an error46        is raised as expected.47        """48        bouncer = Bouncer(self.bad_secret_id)49        self.assertRaises(SecretManagerException, bouncer.is_authorized, 'whitelisted@example.com', )test_secrets_manager_token_config.py
Source:test_secrets_manager_token_config.py  
...9    10def test_invalid_audience():11    with pytest.raises(KeyError):12        SecretsManagerTokenConfig(TEST_AUDIENCE, TEST_SECRET_NAME)13def test_invalid_secret_name():14    with pytest.raises(KeyError):15        environ[TEST_AUDIENCE] = TEST_AUDIENCE16        SecretsManagerTokenConfig(TEST_AUDIENCE, TEST_SECRET_NAME)17@pytest.fixture18def secretsManagerTokenConfig():19    environ[TEST_AUDIENCE] = TEST_AUDIENCE20    environ[TEST_SECRET_NAME] = TEST_SECRET_NAME21    with mock.patch('src.auth.secrets_manager_token_config.SecretsManagerClient.get_secrets') as mock_getSecrets:22        mock_getSecrets.return_value = {'client_id': TEST_CLIENT_ID, 'client_secret': TEST_CLIENT_SECRET}23        yield SecretsManagerTokenConfig(TEST_AUDIENCE, TEST_SECRET_NAME)24def test_properties(secretsManagerTokenConfig):25    assert secretsManagerTokenConfig.audience == TEST_AUDIENCE26    assert secretsManagerTokenConfig.secret_name == TEST_SECRET_NAME27    assert secretsManagerTokenConfig.client_id == TEST_CLIENT_ID...Learn to execute automation testing from scratch with LambdaTest Learning Hub. Right from setting up the prerequisites to run your first automation test, to following best practices and diving deeper into advanced test scenarios. LambdaTest Learning Hubs compile a list of step-by-step guides to help you be proficient with different test automation frameworks i.e. Selenium, Cypress, TestNG etc.
You could also refer to video tutorials over LambdaTest YouTube channel to get step by step demonstration from industry experts.
Get 100 minutes of automation test minutes FREE!!
