summaryrefslogtreecommitdiffstats
path: root/vendor/github.com/goamz/goamz/aws/aws_test.go
diff options
context:
space:
mode:
Diffstat (limited to 'vendor/github.com/goamz/goamz/aws/aws_test.go')
-rw-r--r--vendor/github.com/goamz/goamz/aws/aws_test.go211
1 files changed, 0 insertions, 211 deletions
diff --git a/vendor/github.com/goamz/goamz/aws/aws_test.go b/vendor/github.com/goamz/goamz/aws/aws_test.go
deleted file mode 100644
index 0c74a7905..000000000
--- a/vendor/github.com/goamz/goamz/aws/aws_test.go
+++ /dev/null
@@ -1,211 +0,0 @@
-package aws_test
-
-import (
- "io/ioutil"
- "os"
- "strings"
- "testing"
- "time"
-
- "github.com/goamz/goamz/aws"
- . "gopkg.in/check.v1"
-)
-
-func Test(t *testing.T) {
- TestingT(t)
-}
-
-var _ = Suite(&S{})
-
-type S struct {
- environ []string
-}
-
-func (s *S) SetUpSuite(c *C) {
- s.environ = os.Environ()
-}
-
-func (s *S) TearDownTest(c *C) {
- os.Clearenv()
- for _, kv := range s.environ {
- l := strings.SplitN(kv, "=", 2)
- os.Setenv(l[0], l[1])
- }
-}
-
-func (s *S) TestSharedAuthNoHome(c *C) {
- os.Clearenv()
- os.Setenv("AWS_PROFILE", "foo")
- _, err := aws.SharedAuth()
- c.Assert(err, ErrorMatches, "Could not get HOME")
-}
-
-func (s *S) TestSharedAuthNoCredentialsFile(c *C) {
- os.Clearenv()
- os.Setenv("AWS_PROFILE", "foo")
- os.Setenv("HOME", "/tmp")
- _, err := aws.SharedAuth()
- c.Assert(err, ErrorMatches, "Couldn't parse AWS credentials file")
-}
-
-func (s *S) TestSharedAuthNoProfileInFile(c *C) {
- os.Clearenv()
- os.Setenv("AWS_PROFILE", "foo")
-
- d, err := ioutil.TempDir("", "")
- if err != nil {
- panic(err)
- }
- defer os.RemoveAll(d)
-
- err = os.Mkdir(d+"/.aws", 0755)
- if err != nil {
- panic(err)
- }
-
- ioutil.WriteFile(d+"/.aws/credentials", []byte("[bar]\n"), 0644)
- os.Setenv("HOME", d)
-
- _, err = aws.SharedAuth()
- c.Assert(err, ErrorMatches, "Couldn't find profile in AWS credentials file")
-}
-
-func (s *S) TestSharedAuthNoKeysInProfile(c *C) {
- os.Clearenv()
- os.Setenv("AWS_PROFILE", "bar")
-
- d, err := ioutil.TempDir("", "")
- if err != nil {
- panic(err)
- }
- defer os.RemoveAll(d)
-
- err = os.Mkdir(d+"/.aws", 0755)
- if err != nil {
- panic(err)
- }
-
- ioutil.WriteFile(d+"/.aws/credentials", []byte("[bar]\nawsaccesskeyid = AK.."), 0644)
- os.Setenv("HOME", d)
-
- _, err = aws.SharedAuth()
- c.Assert(err, ErrorMatches, "AWS_SECRET_ACCESS_KEY not found in credentials file")
-}
-
-func (s *S) TestSharedAuthDefaultCredentials(c *C) {
- os.Clearenv()
-
- d, err := ioutil.TempDir("", "")
- if err != nil {
- panic(err)
- }
- defer os.RemoveAll(d)
-
- err = os.Mkdir(d+"/.aws", 0755)
- if err != nil {
- panic(err)
- }
-
- ioutil.WriteFile(d+"/.aws/credentials", []byte("[default]\naws_access_key_id = access\naws_secret_access_key = secret\n"), 0644)
- os.Setenv("HOME", d)
-
- auth, err := aws.SharedAuth()
- c.Assert(err, IsNil)
- c.Assert(auth, Equals, aws.Auth{SecretKey: "secret", AccessKey: "access"})
-}
-
-func (s *S) TestSharedAuth(c *C) {
- os.Clearenv()
- os.Setenv("AWS_PROFILE", "bar")
-
- d, err := ioutil.TempDir("", "")
- if err != nil {
- panic(err)
- }
- defer os.RemoveAll(d)
-
- err = os.Mkdir(d+"/.aws", 0755)
- if err != nil {
- panic(err)
- }
-
- ioutil.WriteFile(d+"/.aws/credentials", []byte("[bar]\naws_access_key_id = access\naws_secret_access_key = secret\n"), 0644)
- os.Setenv("HOME", d)
-
- auth, err := aws.SharedAuth()
- c.Assert(err, IsNil)
- c.Assert(auth, Equals, aws.Auth{SecretKey: "secret", AccessKey: "access"})
-}
-
-func (s *S) TestEnvAuthNoSecret(c *C) {
- os.Clearenv()
- _, err := aws.EnvAuth()
- c.Assert(err, ErrorMatches, "AWS_SECRET_ACCESS_KEY or AWS_SECRET_KEY not found in environment")
-}
-
-func (s *S) TestEnvAuthNoAccess(c *C) {
- os.Clearenv()
- os.Setenv("AWS_SECRET_ACCESS_KEY", "foo")
- _, err := aws.EnvAuth()
- c.Assert(err, ErrorMatches, "AWS_ACCESS_KEY_ID or AWS_ACCESS_KEY not found in environment")
-}
-
-func (s *S) TestEnvAuth(c *C) {
- os.Clearenv()
- os.Setenv("AWS_SECRET_ACCESS_KEY", "secret")
- os.Setenv("AWS_ACCESS_KEY_ID", "access")
- auth, err := aws.EnvAuth()
- c.Assert(err, IsNil)
- c.Assert(auth, Equals, aws.Auth{SecretKey: "secret", AccessKey: "access"})
-}
-
-func (s *S) TestEnvAuthAlt(c *C) {
- os.Clearenv()
- os.Setenv("AWS_SECRET_KEY", "secret")
- os.Setenv("AWS_ACCESS_KEY", "access")
- auth, err := aws.EnvAuth()
- c.Assert(err, IsNil)
- c.Assert(auth, Equals, aws.Auth{SecretKey: "secret", AccessKey: "access"})
-}
-
-func (s *S) TestEnvAuthToken(c *C) {
- os.Clearenv()
- os.Setenv("AWS_SECRET_KEY", "secret")
- os.Setenv("AWS_ACCESS_KEY", "access")
- os.Setenv("AWS_SESSION_TOKEN", "token")
- auth, err := aws.EnvAuth()
- c.Assert(err, IsNil)
- c.Assert(auth.SecretKey, Equals, "secret")
- c.Assert(auth.AccessKey, Equals, "access")
- c.Assert(auth.Token(), Equals, "token")
-}
-
-func (s *S) TestGetAuthStatic(c *C) {
- exptdate := time.Now().Add(time.Hour)
- auth, err := aws.GetAuth("access", "secret", "token", exptdate)
- c.Assert(err, IsNil)
- c.Assert(auth.AccessKey, Equals, "access")
- c.Assert(auth.SecretKey, Equals, "secret")
- c.Assert(auth.Token(), Equals, "token")
- c.Assert(auth.Expiration(), Equals, exptdate)
-}
-
-func (s *S) TestGetAuthEnv(c *C) {
- os.Clearenv()
- os.Setenv("AWS_SECRET_ACCESS_KEY", "secret")
- os.Setenv("AWS_ACCESS_KEY_ID", "access")
- auth, err := aws.GetAuth("", "", "", time.Time{})
- c.Assert(err, IsNil)
- c.Assert(auth, Equals, aws.Auth{SecretKey: "secret", AccessKey: "access"})
-}
-
-func (s *S) TestEncode(c *C) {
- c.Assert(aws.Encode("foo"), Equals, "foo")
- c.Assert(aws.Encode("/"), Equals, "%2F")
-}
-
-func (s *S) TestRegionsAreNamed(c *C) {
- for n, r := range aws.Regions {
- c.Assert(n, Equals, r.Name)
- }
-}