15
15
16
16
17
17
#include < aws/external/gtest.h>
18
- #include < aws/testing/MemoryTesting.h>
19
18
20
19
#include < aws/testing/mocks/aws/auth/MockEC2MetadataClient.h>
21
20
#include < aws/testing/platform/PlatformTesting.h>
@@ -39,7 +38,7 @@ using namespace Aws::Utils;
39
38
40
39
TEST (ProfileConfigFileAWSCredentialsProviderTest, TestDefaultConfig)
41
40
{
42
- AWS_BEGIN_MEMORY_TEST ( 16 , 10 )
41
+
43
42
auto profileDirectory = ProfileConfigFileAWSCredentialsProvider::GetProfileDirectory ();
44
43
45
44
Aws::FileSystem::CreateDirectoryIfNotExists (profileDirectory.c_str ());
@@ -81,7 +80,6 @@ TEST(ProfileConfigFileAWSCredentialsProviderTest, TestDefaultConfig)
81
80
82
81
Aws::FileSystem::RelocateFileOrDirectory (tempFileName.c_str (), configFileName.c_str ());
83
82
84
- AWS_END_MEMORY_TEST
85
83
}
86
84
87
85
class EnvironmentModifyingTest : public ::testing::Test
@@ -130,8 +128,6 @@ class EnvironmentModifyingTest : public ::testing::Test
130
128
131
129
TEST_F (EnvironmentModifyingTest, ProfileConfigTestWithEnvVars)
132
130
{
133
- AWS_BEGIN_MEMORY_TEST (16 , 10 )
134
-
135
131
Aws::String configFileName = ProfileConfigFileAWSCredentialsProvider::GetCredentialsProfileFilename () + " _blah" ;
136
132
137
133
Aws::String oldValue = Aws::Environment::GetEnv (" AWS_SHARED_CREDENTIALS_FILE" );
@@ -155,14 +151,10 @@ TEST_F(EnvironmentModifyingTest, ProfileConfigTestWithEnvVars)
155
151
EXPECT_STREQ (" SomeProfileSecretKey" , provider.GetAWSCredentials ().GetAWSSecretKey ().c_str ());
156
152
157
153
Aws::FileSystem::RemoveFileIfExists (configFileName.c_str ());
158
-
159
- AWS_END_MEMORY_TEST
160
154
}
161
155
162
156
TEST_F (EnvironmentModifyingTest, ProfileConfigTestWithEnvVarsButSpecifiedProfile)
163
157
{
164
- AWS_BEGIN_MEMORY_TEST (16 , 10 )
165
-
166
158
Aws::String configFileName = ProfileConfigFileAWSCredentialsProvider::GetCredentialsProfileFilename () + " _blah" ;
167
159
168
160
Aws::Environment::SetEnv (" AWS_SHARED_CREDENTIALS_FILE" , configFileName.c_str (), 1 );
@@ -189,15 +181,11 @@ TEST_F(EnvironmentModifyingTest, ProfileConfigTestWithEnvVarsButSpecifiedProfile
189
181
EXPECT_STREQ (" customProfileSecretKey" , provider.GetAWSCredentials ().GetAWSSecretKey ().c_str ());
190
182
191
183
Aws::FileSystem::RemoveFileIfExists (configFileName.c_str ());
192
-
193
- AWS_END_MEMORY_TEST
194
184
}
195
185
196
186
197
187
TEST_F (EnvironmentModifyingTest, ProfileConfigTestNotSetup)
198
188
{
199
- AWS_BEGIN_MEMORY_TEST (16 , 10 )
200
-
201
189
Aws::String configFileName = ProfileConfigFileAWSCredentialsProvider::GetCredentialsProfileFilename ();
202
190
Aws::String tempFileName = configFileName + " _tempNotSetup" ;
203
191
@@ -212,64 +200,48 @@ TEST_F(EnvironmentModifyingTest, ProfileConfigTestNotSetup)
212
200
EXPECT_STREQ (" " , provider.GetAWSCredentials ().GetAWSSecretKey ().c_str ());
213
201
214
202
Aws::FileSystem::RelocateFileOrDirectory (tempFileName.c_str (), configFileName.c_str ());
215
-
216
- AWS_END_MEMORY_TEST
217
203
}
218
204
219
205
TEST_F (EnvironmentModifyingTest, TestEnvironmentVariablesExist)
220
206
{
221
- AWS_BEGIN_MEMORY_TEST (16 , 10 )
222
-
223
207
Aws::Environment::SetEnv (" AWS_ACCESS_KEY_ID" , " Access Key" , 1 );
224
208
Aws::Environment::SetEnv (" AWS_SECRET_ACCESS_KEY" , " Secret Key" , 1 );
225
209
Aws::Environment::SetEnv (" AWS_SESSION_TOKEN" , " Session Token" , 1 );
226
210
227
211
EnvironmentAWSCredentialsProvider provider;
228
212
ASSERT_EQ (" Access Key" , provider.GetAWSCredentials ().GetAWSAccessKeyId ());
229
213
ASSERT_EQ (" Secret Key" , provider.GetAWSCredentials ().GetAWSSecretKey ());
230
- ASSERT_EQ (" Session Token" , provider.GetAWSCredentials ().GetSessionToken ());
231
-
232
- AWS_END_MEMORY_TEST
214
+ ASSERT_EQ (" Session Token" , provider.GetAWSCredentials ().GetSessionToken ());
233
215
}
234
216
235
217
236
218
TEST_F (EnvironmentModifyingTest, TestEnvironmentVariablesDoNotExist)
237
219
{
238
- AWS_BEGIN_MEMORY_TEST (16 , 10 )
239
-
240
220
Aws::Environment::UnSetEnv (" AWS_ACCESS_KEY_ID" );
241
221
Aws::Environment::UnSetEnv (" AWS_SECRET_ACCESS_KEY" );
242
222
243
223
EnvironmentAWSCredentialsProvider provider;
244
224
ASSERT_EQ (" " , provider.GetAWSCredentials ().GetAWSAccessKeyId ());
245
225
ASSERT_EQ (" " , provider.GetAWSCredentials ().GetAWSSecretKey ());
246
-
247
- AWS_END_MEMORY_TEST
248
226
}
249
227
250
228
251
229
252
230
TEST (InstanceProfileCredentialsProviderTest, TestEC2MetadataClientReturnsGoodData)
253
231
{
254
- AWS_BEGIN_MEMORY_TEST (16 , 10 )
255
-
256
232
auto mockClient = Aws::MakeShared<MockEC2MetadataClient>(AllocationTag);
257
233
258
234
const char * validCredentials = " { \" AccessKeyId\" : \" goodAccessKey\" , \" SecretAccessKey\" : \" goodSecretKey\" , \" Token\" : \" goodToken\" }" ;
259
235
mockClient->SetMockedCredentialsValue (validCredentials);
260
236
261
237
InstanceProfileCredentialsProvider provider (Aws::MakeShared<Aws::Config::EC2InstanceProfileConfigLoader>(AllocationTag, mockClient), 1000 * 60 * 15 );
262
238
ASSERT_EQ (" goodAccessKey" , provider.GetAWSCredentials ().GetAWSAccessKeyId ());
263
- ASSERT_EQ (" goodSecretKey" , provider.GetAWSCredentials ().GetAWSSecretKey ());
264
-
265
- AWS_END_MEMORY_TEST
239
+ ASSERT_EQ (" goodSecretKey" , provider.GetAWSCredentials ().GetAWSSecretKey ());
266
240
}
267
241
268
242
269
243
TEST (InstanceProfileCredentialsProviderTest, TestThatProviderRefreshes)
270
244
{
271
- AWS_BEGIN_MEMORY_TEST (16 , 10 )
272
-
273
245
auto mockClient = Aws::MakeShared<MockEC2MetadataClient>(AllocationTag);
274
246
275
247
const char * validCredentials = " { \" AccessKeyId\" : \" goodAccessKey\" , \" SecretAccessKey\" : \" goodSecretKey\" , \" Token\" : \" goodToken\" }" ;
@@ -284,15 +256,11 @@ TEST(InstanceProfileCredentialsProviderTest, TestThatProviderRefreshes)
284
256
285
257
std::this_thread::sleep_for (std::chrono::milliseconds (100 ));
286
258
ASSERT_EQ (" betterAccessKey" , provider.GetAWSCredentials ().GetAWSAccessKeyId ());
287
- ASSERT_EQ (" betterSecretKey" , provider.GetAWSCredentials ().GetAWSSecretKey ());
288
-
289
- AWS_END_MEMORY_TEST
259
+ ASSERT_EQ (" betterSecretKey" , provider.GetAWSCredentials ().GetAWSSecretKey ());
290
260
}
291
261
292
262
TEST (InstanceProfileCredentialsProviderTest, TestEC2MetadataClientCouldntFindCredentials)
293
263
{
294
- AWS_BEGIN_MEMORY_TEST (16 , 10 )
295
-
296
264
auto mockClient = Aws::MakeShared<MockEC2MetadataClient>(AllocationTag);
297
265
const char * emptyCredentials = " " ;
298
266
mockClient->SetMockedCredentialsValue (emptyCredentials);
@@ -304,24 +272,18 @@ TEST(InstanceProfileCredentialsProviderTest, TestEC2MetadataClientCouldntFindCre
304
272
const char * missingInfo = " { }" ;
305
273
mockClient->SetMockedCredentialsValue (missingInfo);
306
274
ASSERT_EQ (" " , provider.GetAWSCredentials ().GetAWSAccessKeyId ());
307
- ASSERT_EQ (" " , provider.GetAWSCredentials ().GetAWSSecretKey ());
308
-
309
- AWS_END_MEMORY_TEST
275
+ ASSERT_EQ (" " , provider.GetAWSCredentials ().GetAWSSecretKey ());
310
276
}
311
277
312
278
TEST (InstanceProfileCredentialsProviderTest, TestEC2MetadataClientReturnsBadData)
313
279
{
314
- AWS_BEGIN_MEMORY_TEST (16 , 10 )
315
-
316
280
auto mockClient = Aws::MakeShared<MockEC2MetadataClient>(AllocationTag);
317
281
const char * badData = " blah blah blah, I'm bad" ;
318
282
mockClient->SetMockedCredentialsValue (badData);
319
283
320
284
InstanceProfileCredentialsProvider provider (Aws::MakeShared<Aws::Config::EC2InstanceProfileConfigLoader>(AllocationTag, mockClient), 1000 * 60 * 15 );
321
285
ASSERT_EQ (" " , provider.GetAWSCredentials ().GetAWSAccessKeyId ());
322
286
ASSERT_EQ (" " , provider.GetAWSCredentials ().GetAWSSecretKey ());
323
-
324
- AWS_END_MEMORY_TEST
325
287
}
326
288
327
289
0 commit comments