Browse Source

Improve the unit test

wenzuochao 7 years ago
parent
commit
3875aa91ba

+ 6 - 0
sdk/auth/credentials/access_key_credential_test.go

@@ -10,4 +10,10 @@ func TestAccessKeyCredential(t *testing.T) {
 	c := NewAccessKeyCredential("accesskeyid", "accesskeysecret")
 	c := NewAccessKeyCredential("accesskeyid", "accesskeysecret")
 	assert.Equal(t, "accesskeyid", c.AccessKeyId)
 	assert.Equal(t, "accesskeyid", c.AccessKeyId)
 	assert.Equal(t, "accesskeysecret", c.AccessKeySecret)
 	assert.Equal(t, "accesskeysecret", c.AccessKeySecret)
+	b:= NewBaseCredential("accesskeyid", "accesskeysecret")
+	assert.Equal(t, "accesskeyid", b.AccessKeyId)
+	assert.Equal(t, "accesskeysecret", b.AccessKeySecret)
+	a := b.ToAccessKeyCredential()
+	assert.Equal(t, "accesskeyid", a.AccessKeyId)
+	assert.Equal(t, "accesskeysecret", a.AccessKeySecret)
 }
 }

+ 4 - 0
sdk/auth/credentials/ecs_ram_role_test.go

@@ -9,4 +9,8 @@ import (
 func TestECSRamRole(t *testing.T) {
 func TestECSRamRole(t *testing.T) {
 	c := NewEcsRamRoleCredential("rolename")
 	c := NewEcsRamRoleCredential("rolename")
 	assert.Equal(t, "rolename", c.RoleName)
 	assert.Equal(t, "rolename", c.RoleName)
+	s := NewStsRoleNameOnEcsCredential("rolename")
+	assert.Equal(t, "rolename", s.RoleName)
+	r := s.ToEcsRamRoleCredential()
+	assert.Equal(t, "rolename", r.RoleName)
 }
 }

+ 12 - 0
sdk/auth/credentials/sts_role_arn_credential_test.go

@@ -13,4 +13,16 @@ func TestRoleArnCredential(t *testing.T) {
 	assert.Equal(t, "roleArn", c.RoleArn)
 	assert.Equal(t, "roleArn", c.RoleArn)
 	assert.Equal(t, "roleSessionName", c.RoleSessionName)
 	assert.Equal(t, "roleSessionName", c.RoleSessionName)
 	assert.Equal(t, 3600, c.RoleSessionExpiration)
 	assert.Equal(t, 3600, c.RoleSessionExpiration)
+	s := NewStsRoleArnCredential("accessKeyId", "accessKeySecret", "roleArn", "roleSessionName", 3600)
+	assert.Equal(t, "accessKeyId", s.AccessKeyId)
+	assert.Equal(t, "accessKeySecret", s.AccessKeySecret)
+	assert.Equal(t, "roleArn", s.RoleArn)
+	assert.Equal(t, "roleSessionName", s.RoleSessionName)
+	assert.Equal(t, 3600, s.RoleSessionExpiration)
+	r := s.ToRamRoleArnCredential()
+	assert.Equal(t, "accessKeyId", r.AccessKeyId)
+	assert.Equal(t, "accessKeySecret", r.AccessKeySecret)
+	assert.Equal(t, "roleArn", r.RoleArn)
+	assert.Equal(t, "roleSessionName", r.RoleSessionName)
+	assert.Equal(t, 3600, r.RoleSessionExpiration)
 }
 }

+ 15 - 0
sdk/auth/roa_signature_composer_test.go

@@ -69,3 +69,18 @@ func TestRoaSignatureComposer2(t *testing.T) {
 	assert.Equal(t, "application/xml", request.GetHeaders()["Accept"])
 	assert.Equal(t, "application/xml", request.GetHeaders()["Accept"])
 	assert.Equal(t, "acs accessKeyId:U9uA3ftRZKixHPB08Z7Z4GOlpTY=", request.GetHeaders()["Authorization"])
 	assert.Equal(t, "acs accessKeyId:U9uA3ftRZKixHPB08Z7Z4GOlpTY=", request.GetHeaders()["Authorization"])
 }
 }
+
+func TestRoaSignatureComposer3(t *testing.T) {
+	request := requests.NewCommonRequest()
+	request.PathPattern = "/users/:user"
+	request.AcceptFormat = "RAW"
+	request.TransToAcsRequest()
+	c := credentials.NewAccessKeyCredential("accessKeyId", "accessKeySecret")
+	signer := signers.NewAccessKeySigner(c)
+
+	origTestHookGetDate := hookGetDate
+	defer func() { hookGetDate = origTestHookGetDate }()
+	hookGetDate = mockDate
+	signRoaRequest(request, signer, "regionId")
+	assert.Equal(t, "mock date", request.GetHeaders()["Date"])
+}

+ 4 - 0
sdk/auth/rpc_signature_composer_test.go

@@ -50,6 +50,10 @@ func TestRpcSignatureComposer(t *testing.T) {
 	assert.Equal(t, "mock date", request.GetQueryParams()["Timestamp"])
 	assert.Equal(t, "mock date", request.GetQueryParams()["Timestamp"])
 	assert.Equal(t, "MOCK_UUID", request.GetQueryParams()["SignatureNonce"])
 	assert.Equal(t, "MOCK_UUID", request.GetQueryParams()["SignatureNonce"])
 	assert.Equal(t, "7loPmFjvDnzOVnQeQNj85S6nFGY=", request.GetQueryParams()["Signature"])
 	assert.Equal(t, "7loPmFjvDnzOVnQeQNj85S6nFGY=", request.GetQueryParams()["Signature"])
+	signRpcRequest(request, signer, "regionId")
+	assert.Equal(t, "mock date", request.GetQueryParams()["Timestamp"])
+	assert.Equal(t, "MOCK_UUID", request.GetQueryParams()["SignatureNonce"])
+	assert.Equal(t, "7loPmFjvDnzOVnQeQNj85S6nFGY=", request.GetQueryParams()["Signature"])
 }
 }
 
 
 // func TestRpcSignatureComposer2(t *testing.T) {
 // func TestRpcSignatureComposer2(t *testing.T) {

+ 7 - 4
sdk/requests/acs_request_test.go

@@ -97,10 +97,11 @@ func Test_AcsRequest(t *testing.T) {
 type AcsRequestTest struct {
 type AcsRequestTest struct {
 	*baseRequest
 	*baseRequest
 	Ontology AcsRequest
 	Ontology AcsRequest
-	Query    string `position:"Query" name:"Query"`
-	Header   string `position:"Header" name:"Header"`
-	Path     string `position:"Path" name:"Path"`
-	Body     string `position:"Body" name:"Body"`
+	Query    string      `position:"Query" name:"Query"`
+	Header   string      `position:"Header" name:"Header"`
+	Path     string      `position:"Path" name:"Path"`
+	Body     string      `position:"Body" name:"Body"`
+	TypeAcs  *[]string   `position:"type" name:"type" type:"Repeated"`
 }
 }
 
 
 func (r AcsRequestTest) BuildQueries() string {
 func (r AcsRequestTest) BuildQueries() string {
@@ -131,6 +132,8 @@ func Test_AcsRequest_InitParams(t *testing.T) {
 		Path:        "path value",
 		Path:        "path value",
 		Body:        "body value",
 		Body:        "body value",
 	}
 	}
+	tmp := []string{r.Query, r.Header}
+	r.TypeAcs = &tmp
 	r.addQueryParam("qkey", "qvalue")
 	r.addQueryParam("qkey", "qvalue")
 	InitParams(r)
 	InitParams(r)