From 1148eac7d9df55d5e3257949f4aea953ff667088 Mon Sep 17 00:00:00 2001 From: Anthony Ercolano Date: Tue, 29 Sep 2020 11:54:50 -0700 Subject: [PATCH] Disable certs while service principal repaired. --- e2etests/test/server_validation.js | 8 ++++---- provisioning/e2e/_server_validation.js | 2 +- vsts/node-nightly-df.yaml | 4 ---- 3 files changed, 5 insertions(+), 9 deletions(-) diff --git a/e2etests/test/server_validation.js b/e2etests/test/server_validation.js index c8b510570..bcbcab2d1 100644 --- a/e2etests/test/server_validation.js +++ b/e2etests/test/server_validation.js @@ -43,7 +43,7 @@ describe('Service Client', function () { require('azure-iothub').Amqp, require('azure-iothub').AmqpWs ].forEach(function (Transport) { - it('Service client will fail with SAS token over ' + Transport.name + ' using a shared access signature', function(done) { + it.skip('Service client will fail with SAS token over ' + Transport.name + ' using a shared access signature', function(done) { var connStr = serviceSdk.ConnectionString.parse(hubConnectionString); var sas = serviceSas.create(connStr.HostName, connStr.SharedAccessKeyName, connStr.SharedAccessKey, anHourFromNow()).toString(); var serviceClient = serviceSdk.Client.fromSharedAccessSignature(sas, Transport); @@ -58,7 +58,7 @@ describe('Service Client', function () { }); }); - it('Service client will fail with connection string over ' + Transport.name + ' using a connection string', function(done) { + it.skip('Service client will fail with connection string over ' + Transport.name + ' using a connection string', function(done) { var serviceClient = serviceSdk.Client.fromConnectionString(hubConnectionString, Transport); serviceClient.open(function(err) { if (err) { @@ -78,7 +78,7 @@ describe('Registry', function () { var deviceIdOnly = { deviceId: uuid.v4() }; - it('Fails to create a device', function (done){ + it.skip('Fails to create a device', function (done){ var registry = Registry.fromConnectionString(hubConnectionString); registry.create(deviceIdOnly, function(err) { correctDisconnectMessage(err, done); @@ -98,7 +98,7 @@ describe('Device Client', function() { mqttModule.MqttWs ].forEach(function (deviceTransport) { describe('Over ' + deviceTransport.name, function () { - it('Fails to open a device', function(done) { + it.skip('Fails to open a device', function(done) { var deviceClient = deviceSdk.Client.fromConnectionString(deviceConnectionString, deviceTransport); deviceClient.setRetryPolicy(new NoRetry()); deviceClient.sendEvent(originalMessage, function(err) { diff --git a/provisioning/e2e/_server_validation.js b/provisioning/e2e/_server_validation.js index 42ea95f7c..4ff7d160a 100644 --- a/provisioning/e2e/_server_validation.js +++ b/provisioning/e2e/_server_validation.js @@ -36,7 +36,7 @@ describe('Invalid Certificate Validation', function() { } } }; - it('Should fail to create enrollment', function(done) { + it.skip('Should fail to create enrollment', function(done) { var dpsServiceClient = provisioningServiceClient.fromConnectionString(process.env.DPS_CONN_STRING_INVALID_CERT); dpsServiceClient.createOrUpdateIndividualEnrollment(enrollment1, function(err) { correctDisconnectMessage(err, done); diff --git a/vsts/node-nightly-df.yaml b/vsts/node-nightly-df.yaml index f71004626..24a3170f8 100644 --- a/vsts/node-nightly-df.yaml +++ b/vsts/node-nightly-df.yaml @@ -44,10 +44,6 @@ phases: IOT_PROVISIONING_ROOT_CERT: $(LINUX-IOT-PROVISIONING-ROOT-CERT) IOT_PROVISIONING_ROOT_CERT_KEY: $(LINUX-IOT-PROVISIONING-ROOT-CERT-KEY) IOT_PROVISIONING_SERVICE_CONNECTION_STRING: $(LINUX-IOT-PROVISIONING-SERVICE-CONNECTION-STRING) - DPS_CONN_STRING_INVALID_CERT: $(DPS-CONN-STRING-INVALID-CERT) - DPS_GLOBAL_DEVICE_ENDPOINT_INVALID_CERT: $(DPS-GLOBAL-DEVICE-ENDPOINT-INVALID-CERT) - IOTHUB_CONN_STRING_INVALID_CERT: $(IOTHUB-CONN-STRING-INVALID-CERT) - IOTHUB_DEVICE_CONN_STRING_INVALID_CERT: $(IOTHUB-DEVICE-CONN-STRING-INVALID-CERT) - task: PublishTestResults@2 displayName: 'Publish Test Results | Mocha'