@@ -1339,7 +1339,7 @@ def test_backup_encryption(self, resource_group, resource_group_location, vault1
13391339 self .kwargs ['key_vault_id' ] = "subscriptions/{}/resourceGroups/{}/providers/Microsoft.KeyVault/vaults/{}" .format (
13401340 subscription , resource_group , key_vault )
13411341 # Uncomment during live runs
1342- self .cmd ('role assignment create --role "{user_rbac_permissions}" --scope "{key_vault_id}" --assignee "{user_principal_id}"' )
1342+ # self.cmd('role assignment create --role "{user_rbac_permissions}" --scope "{key_vault_id}" --assignee "{user_principal_id}"')
13431343
13441344 self .kwargs ['identity1_id' ] = self .cmd ('identity create -n "{identity1}" -g "{rg}" --query id' ).get_output_in_json ()
13451345 self .kwargs ['identity1_principalid' ] = self .cmd ('identity show -n "{identity1}" -g "{rg}" --query principalId' ).get_output_in_json ()
@@ -1394,17 +1394,17 @@ def test_backup_encryption(self, resource_group, resource_group_location, vault1
13941394
13951395 # Uncomment during live runs
13961396 role_id = '/subscriptions/{}/providers/Microsoft.Authorization/roleDefinitions/e147488a-f6f5-4113-8e2d-b22465e65bf6' .format (subscription )
1397- rbac1_json = self .cmd ('role assignment create --scope "{key_vault_id}" --assignee "{identity1_principalid}" --role "{identity_rbac_permissions}"' ).get_output_in_json ()
1398- self .assertEqual (rbac1_json ['roleDefinitionId' ], role_id )
1397+ # rbac1_json = self.cmd('role assignment create --scope "{key_vault_id}" --assignee "{identity1_principalid}" --role "{identity_rbac_permissions}"').get_output_in_json()
1398+ # self.assertEqual(rbac1_json['roleDefinitionId'], role_id)
13991399
1400- rbac2_json = self .cmd ('role assignment create --scope "{key_vault_id}" --assignee "{identity2_principalid}" --role "{identity_rbac_permissions}"' ).get_output_in_json ()
1401- self .assertEqual (rbac2_json ['roleDefinitionId' ], role_id )
1400+ # rbac2_json = self.cmd('role assignment create --scope "{key_vault_id}" --assignee "{identity2_principalid}" --role "{identity_rbac_permissions}"').get_output_in_json()
1401+ # self.assertEqual(rbac2_json['roleDefinitionId'], role_id)
14021402
1403- rbac3_json = self .cmd ('role assignment create --scope "{key_vault_id}" --assignee "{system1_principalid}" --role "{identity_rbac_permissions}"' ).get_output_in_json ()
1404- self .assertEqual (rbac3_json ['roleDefinitionId' ], role_id )
1403+ # rbac3_json = self.cmd('role assignment create --scope "{key_vault_id}" --assignee "{system1_principalid}" --role "{identity_rbac_permissions}"').get_output_in_json()
1404+ # self.assertEqual(rbac3_json['roleDefinitionId'], role_id)
14051405
1406- rbac4_json = self .cmd ('role assignment create --scope "{key_vault_id}" --assignee "{system2_principalid}" --role "{identity_rbac_permissions}"' ).get_output_in_json ()
1407- self .assertEqual (rbac4_json ['roleDefinitionId' ], role_id )
1406+ # rbac4_json = self.cmd('role assignment create --scope "{key_vault_id}" --assignee "{system2_principalid}" --role "{identity_rbac_permissions}"').get_output_in_json()
1407+ # self.assertEqual(rbac4_json['roleDefinitionId'], role_id)
14081408
14091409 self .cmd ('backup vault encryption update --encryption-key-id "{key1_id}" --mi-user-assigned "{identity1_id}" -g "{rg}" -n "{vault1}"' )
14101410
0 commit comments