@@ -136,6 +136,7 @@ def maas_user_credentials_both() -> dict[str, str]:
136136def maas_rbac_idp_env (
137137 admin_client : DynamicClient ,
138138 maas_user_credentials_both : dict [str , str ],
139+ is_byoidc : bool ,
139140) -> Generator [dict [str , str ], None , None ]:
140141 """
141142 - Creates a single htpasswd Secret with FREE + PREMIUM users.
@@ -144,6 +145,9 @@ def maas_rbac_idp_env(
144145 - On teardown, ResourceEditor restores the original OAuth spec and we wait again.
145146 - Deletes the temporary htpasswd Secret.
146147 """
148+ if is_byoidc :
149+ pytest .skip ("Working on OIDC support for tests that use htpasswd IDP for MaaS" )
150+
147151 free_username = maas_user_credentials_both ["free_user" ]
148152 free_password = maas_user_credentials_both ["free_pass" ]
149153 premium_username = maas_user_credentials_both ["premium_user" ]
@@ -155,12 +159,10 @@ def maas_rbac_idp_env(
155159 username = free_username ,
156160 password = free_password ,
157161 )
158- # gitleaks:allow - test-only htpasswd user, no real secret
159- premium_htpasswd_file_path , premium_htpasswd_b64 = (
160- create_htpasswd_file ( # gitleaks:allow - test-only htpasswd users created at runtime (no real secrets)
161- username = premium_username ,
162- password = premium_password ,
163- )
162+
163+ premium_htpasswd_file_path , premium_htpasswd_b64 = create_htpasswd_file (
164+ username = premium_username ,
165+ password = premium_password ,
164166 )
165167
166168 try :
0 commit comments