configuration_test.go 5.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167
  1. package providers
  2. import (
  3. "testing"
  4. "github.com/aliyun/alibaba-cloud-sdk-go/sdk/auth/credentials"
  5. )
  6. func TestConfigurationProvider_Retrieve_NewRamRoleArnCredential(t *testing.T) {
  7. expectedAccesKeyId := "access-key-id"
  8. expectedAccessKeySecret := "access-key-secret"
  9. expectedRoleArn := "role-arn"
  10. expectedRoleSessionName := "role-session-name"
  11. expectedRoleSessionExpiration := 1
  12. configuration := &Configuration{
  13. AccessKeyID: expectedAccesKeyId,
  14. AccessKeySecret: expectedAccessKeySecret,
  15. RoleArn: expectedRoleArn,
  16. RoleSessionName: expectedRoleSessionName,
  17. RoleSessionExpiration: &expectedRoleSessionExpiration,
  18. }
  19. credential, err := NewConfigurationCredentialProvider(configuration).Retrieve()
  20. if err != nil {
  21. t.Fatal(err)
  22. }
  23. ramRoleArnCredential, ok := credential.(*credentials.RamRoleArnCredential)
  24. if !ok {
  25. t.Fatal("expected AccessKeyCredential")
  26. }
  27. if ramRoleArnCredential.AccessKeyId != expectedAccesKeyId {
  28. t.Fatalf("expected AccessKeyId %s but received %s", expectedAccesKeyId, ramRoleArnCredential.AccessKeyId)
  29. }
  30. if ramRoleArnCredential.AccessKeySecret != expectedAccessKeySecret {
  31. t.Fatalf("expected AccessKeySecret %s but received %s", expectedAccessKeySecret, ramRoleArnCredential.AccessKeySecret)
  32. }
  33. if ramRoleArnCredential.RoleArn != expectedRoleArn {
  34. t.Fatalf("expected RoleArn %s but received %s", expectedRoleArn, ramRoleArnCredential.RoleArn)
  35. }
  36. if ramRoleArnCredential.RoleSessionName != expectedRoleSessionName {
  37. t.Fatalf("expected RoleSessionName %s but received %s", expectedRoleSessionName, ramRoleArnCredential.RoleSessionName)
  38. }
  39. if ramRoleArnCredential.RoleSessionExpiration != expectedRoleSessionExpiration {
  40. t.Fatalf("expected expectedRoleSessionExpiration %d but received %d", expectedRoleSessionExpiration, ramRoleArnCredential.RoleSessionExpiration)
  41. }
  42. }
  43. func TestConfigurationProvider_Retrieve_NewStsTokenCredential(t *testing.T) {
  44. expectedAccesKeyId := "access-key-id"
  45. expectedAccessKeySecret := "access-key-secret"
  46. expectedAccessKeyStsToken := "access-key-sts-token"
  47. configuration := &Configuration{
  48. AccessKeyID: expectedAccesKeyId,
  49. AccessKeySecret: expectedAccessKeySecret,
  50. AccessKeyStsToken: expectedAccessKeyStsToken,
  51. }
  52. credential, err := NewConfigurationCredentialProvider(configuration).Retrieve()
  53. if err != nil {
  54. t.Fatal(err)
  55. }
  56. stsTokenCredential, ok := credential.(*credentials.StsTokenCredential)
  57. if !ok {
  58. t.Fatal("expected AccessKeyCredential")
  59. }
  60. if stsTokenCredential.AccessKeyId != expectedAccesKeyId {
  61. t.Fatalf("expected AccessKeyId %s but received %s", expectedAccesKeyId, stsTokenCredential.AccessKeyId)
  62. }
  63. if stsTokenCredential.AccessKeySecret != expectedAccessKeySecret {
  64. t.Fatalf("expected AccessKeySecret %s but received %s", expectedAccessKeySecret, stsTokenCredential.AccessKeySecret)
  65. }
  66. if stsTokenCredential.AccessKeyStsToken != expectedAccessKeyStsToken {
  67. t.Fatalf("expected AccessKeyStsToken %s but received %s", expectedAccessKeyStsToken, stsTokenCredential.AccessKeyStsToken)
  68. }
  69. }
  70. func TestConfigurationProvider_Retrieve_NewAccessKeyCredential(t *testing.T) {
  71. expectedAccesKeyId := "access-key-id"
  72. expectedAccessKeySecret := "access-key-secret"
  73. configuration := &Configuration{
  74. AccessKeyID: expectedAccesKeyId,
  75. AccessKeySecret: expectedAccessKeySecret,
  76. }
  77. credential, err := NewConfigurationCredentialProvider(configuration).Retrieve()
  78. if err != nil {
  79. t.Fatal(err)
  80. }
  81. accessKeyCredential, ok := credential.(*credentials.AccessKeyCredential)
  82. if !ok {
  83. t.Fatal("expected AccessKeyCredential")
  84. }
  85. if accessKeyCredential.AccessKeyId != expectedAccesKeyId {
  86. t.Fatalf("expected AccessKeyId %s but received %s", expectedAccesKeyId, accessKeyCredential.AccessKeyId)
  87. }
  88. if accessKeyCredential.AccessKeySecret != expectedAccessKeySecret {
  89. t.Fatalf("expected AccessKeySecret %s but received %s", expectedAccessKeySecret, accessKeyCredential.AccessKeySecret)
  90. }
  91. }
  92. func TestConfigurationProvider_Retrieve_NewEcsRamRoleCredential(t *testing.T) {
  93. expectedRoleName := "role-name"
  94. configuration := &Configuration{
  95. RoleName: expectedRoleName,
  96. }
  97. credential, err := NewConfigurationCredentialProvider(configuration).Retrieve()
  98. if err != nil {
  99. t.Fatal(err)
  100. }
  101. ecsRamRoleCredential, ok := credential.(*credentials.EcsRamRoleCredential)
  102. if !ok {
  103. t.Fatal("expected AccessKeyCredential")
  104. }
  105. if ecsRamRoleCredential.RoleName != expectedRoleName {
  106. t.Fatalf("expected RoleName %s but received %s", expectedRoleName, ecsRamRoleCredential.RoleName)
  107. }
  108. }
  109. func TestConfigurationProvider_Retrieve_NewRsaKeyPairCredential(t *testing.T) {
  110. expectedPrivateKey := "private-key"
  111. expectedPublicKeyId := "public-key-id"
  112. expectedSessionExpiration := 1
  113. configuration := &Configuration{
  114. PrivateKey: expectedPrivateKey,
  115. PublicKeyID: expectedPublicKeyId,
  116. SessionExpiration: &expectedSessionExpiration,
  117. }
  118. credential, err := NewConfigurationCredentialProvider(configuration).Retrieve()
  119. if err != nil {
  120. t.Fatal(err)
  121. }
  122. rsaKeyPairCredential, ok := credential.(*credentials.RsaKeyPairCredential)
  123. if !ok {
  124. t.Fatal("expected AccessKeyCredential")
  125. }
  126. if rsaKeyPairCredential.PrivateKey != expectedPrivateKey {
  127. t.Fatalf("expected PrivateKey %s but received %s", expectedPrivateKey, rsaKeyPairCredential.PrivateKey)
  128. }
  129. if rsaKeyPairCredential.PublicKeyId != expectedPublicKeyId {
  130. t.Fatalf("expected PublicKeyId %s but received %s", expectedPublicKeyId, rsaKeyPairCredential.PublicKeyId)
  131. }
  132. if rsaKeyPairCredential.SessionExpiration != expectedSessionExpiration {
  133. t.Fatalf("expected SessionExpiration %d but received %d", expectedSessionExpiration, rsaKeyPairCredential.SessionExpiration)
  134. }
  135. }
  136. func TestConfigurationProvider_Retrieve_ErrNoValidCredentialsFound(t *testing.T) {
  137. _, err := NewConfigurationCredentialProvider(&Configuration{}).Retrieve()
  138. if err == nil {
  139. t.Fatal("expected ErrNoValidCredentialsFound for empty configuration")
  140. }
  141. if err != ErrNoValidCredentialsFound {
  142. t.Fatal("expected ErrNoValidCredentialsFound for empty configuration")
  143. }
  144. }