diff options
author | vitalyisaev <vitalyisaev@ydb.tech> | 2023-12-12 21:55:07 +0300 |
---|---|---|
committer | vitalyisaev <vitalyisaev@ydb.tech> | 2023-12-12 22:25:10 +0300 |
commit | 4967f99474a4040ba150eb04995de06342252718 (patch) | |
tree | c9c118836513a8fab6e9fcfb25be5d404338bca7 /vendor/github.com/aws/aws-sdk-go-v2/credentials/static_provider_test.go | |
parent | 2ce9cccb9b0bdd4cd7a3491dc5cbf8687cda51de (diff) | |
download | ydb-4967f99474a4040ba150eb04995de06342252718.tar.gz |
YQ Connector: prepare code base for S3 integration
1. Кодовая база Коннектора переписана с помощью Go дженериков так, чтобы добавление нового источника данных (в частности S3 + csv) максимально переиспользовало имеющийся код (чтобы сохранялась логика нарезания на блоки данных, учёт трафика и пр.)
2. API Connector расширено для работы с S3, но ещё пока не протестировано.
Diffstat (limited to 'vendor/github.com/aws/aws-sdk-go-v2/credentials/static_provider_test.go')
-rw-r--r-- | vendor/github.com/aws/aws-sdk-go-v2/credentials/static_provider_test.go | 51 |
1 files changed, 51 insertions, 0 deletions
diff --git a/vendor/github.com/aws/aws-sdk-go-v2/credentials/static_provider_test.go b/vendor/github.com/aws/aws-sdk-go-v2/credentials/static_provider_test.go new file mode 100644 index 0000000000..431e7e0543 --- /dev/null +++ b/vendor/github.com/aws/aws-sdk-go-v2/credentials/static_provider_test.go @@ -0,0 +1,51 @@ +package credentials + +import ( + "context" + "testing" + + "github.com/aws/aws-sdk-go-v2/aws" +) + +func TestStaticCredentialsProvider(t *testing.T) { + s := StaticCredentialsProvider{ + Value: aws.Credentials{ + AccessKeyID: "AKID", + SecretAccessKey: "SECRET", + SessionToken: "", + }, + } + + creds, err := s.Retrieve(context.Background()) + if err != nil { + t.Errorf("expect no error, got %v", err) + } + if e, a := "AKID", creds.AccessKeyID; e != a { + t.Errorf("expect %v, got %v", e, a) + } + if e, a := "SECRET", creds.SecretAccessKey; e != a { + t.Errorf("expect %v, got %v", e, a) + } + if l := creds.SessionToken; len(l) != 0 { + t.Errorf("expect no token, got %v", l) + } +} + +func TestStaticCredentialsProviderIsExpired(t *testing.T) { + s := StaticCredentialsProvider{ + Value: aws.Credentials{ + AccessKeyID: "AKID", + SecretAccessKey: "SECRET", + SessionToken: "", + }, + } + + creds, err := s.Retrieve(context.Background()) + if err != nil { + t.Fatalf("expect no error, got %v", err) + } + + if creds.Expired() { + t.Errorf("expect static credentials to never expire") + } +} |