aboutsummaryrefslogtreecommitdiffstats
path: root/vendor/github.com/aws/aws-sdk-go-v2/credentials/static_provider_test.go
diff options
context:
space:
mode:
authorvitalyisaev <vitalyisaev@ydb.tech>2023-12-12 21:55:07 +0300
committervitalyisaev <vitalyisaev@ydb.tech>2023-12-12 22:25:10 +0300
commit4967f99474a4040ba150eb04995de06342252718 (patch)
treec9c118836513a8fab6e9fcfb25be5d404338bca7 /vendor/github.com/aws/aws-sdk-go-v2/credentials/static_provider_test.go
parent2ce9cccb9b0bdd4cd7a3491dc5cbf8687cda51de (diff)
downloadydb-4967f99474a4040ba150eb04995de06342252718.tar.gz
YQ Connector: prepare code base for S3 integration
1. Кодовая база Коннектора переписана с помощью Go дженериков так, чтобы добавление нового источника данных (в частности S3 + csv) максимально переиспользовало имеющийся код (чтобы сохранялась логика нарезания на блоки данных, учёт трафика и пр.) 2. API Connector расширено для работы с S3, но ещё пока не протестировано.
Diffstat (limited to 'vendor/github.com/aws/aws-sdk-go-v2/credentials/static_provider_test.go')
-rw-r--r--vendor/github.com/aws/aws-sdk-go-v2/credentials/static_provider_test.go51
1 files changed, 51 insertions, 0 deletions
diff --git a/vendor/github.com/aws/aws-sdk-go-v2/credentials/static_provider_test.go b/vendor/github.com/aws/aws-sdk-go-v2/credentials/static_provider_test.go
new file mode 100644
index 0000000000..431e7e0543
--- /dev/null
+++ b/vendor/github.com/aws/aws-sdk-go-v2/credentials/static_provider_test.go
@@ -0,0 +1,51 @@
+package credentials
+
+import (
+ "context"
+ "testing"
+
+ "github.com/aws/aws-sdk-go-v2/aws"
+)
+
+func TestStaticCredentialsProvider(t *testing.T) {
+ s := StaticCredentialsProvider{
+ Value: aws.Credentials{
+ AccessKeyID: "AKID",
+ SecretAccessKey: "SECRET",
+ SessionToken: "",
+ },
+ }
+
+ creds, err := s.Retrieve(context.Background())
+ if err != nil {
+ t.Errorf("expect no error, got %v", err)
+ }
+ if e, a := "AKID", creds.AccessKeyID; e != a {
+ t.Errorf("expect %v, got %v", e, a)
+ }
+ if e, a := "SECRET", creds.SecretAccessKey; e != a {
+ t.Errorf("expect %v, got %v", e, a)
+ }
+ if l := creds.SessionToken; len(l) != 0 {
+ t.Errorf("expect no token, got %v", l)
+ }
+}
+
+func TestStaticCredentialsProviderIsExpired(t *testing.T) {
+ s := StaticCredentialsProvider{
+ Value: aws.Credentials{
+ AccessKeyID: "AKID",
+ SecretAccessKey: "SECRET",
+ SessionToken: "",
+ },
+ }
+
+ creds, err := s.Retrieve(context.Background())
+ if err != nil {
+ t.Fatalf("expect no error, got %v", err)
+ }
+
+ if creds.Expired() {
+ t.Errorf("expect static credentials to never expire")
+ }
+}