1
|
|
|
package providers |
2
|
|
|
|
3
|
|
|
import ( |
4
|
|
|
"os" |
5
|
|
|
"testing" |
6
|
|
|
|
7
|
|
|
"github.com/aliyun/credentials-go/credentials/internal/utils" |
8
|
|
|
"github.com/stretchr/testify/assert" |
9
|
|
|
) |
10
|
|
|
|
11
|
|
|
func TestDefaultCredentialsProvider(t *testing.T) { |
12
|
|
|
provider := NewDefaultCredentialsProvider() |
13
|
|
|
assert.NotNil(t, provider) |
14
|
|
|
assert.Len(t, provider.providerChain, 3) |
15
|
|
|
_, ok := provider.providerChain[0].(*EnvironmentVariableCredentialsProvider) |
16
|
|
|
assert.True(t, ok) |
17
|
|
|
|
18
|
|
|
_, ok = provider.providerChain[1].(*CLIProfileCredentialsProvider) |
19
|
|
|
assert.True(t, ok) |
20
|
|
|
|
21
|
|
|
_, ok = provider.providerChain[2].(*ProfileCredentialsProvider) |
22
|
|
|
assert.True(t, ok) |
23
|
|
|
|
24
|
|
|
// Add oidc provider |
25
|
|
|
rollback := utils.Memory("ALIBABA_CLOUD_OIDC_TOKEN_FILE", |
26
|
|
|
"ALIBABA_CLOUD_OIDC_PROVIDER_ARN", |
27
|
|
|
"ALIBABA_CLOUD_ROLE_ARN", |
28
|
|
|
"ALIBABA_CLOUD_ECS_METADATA") |
29
|
|
|
|
30
|
|
|
defer rollback() |
31
|
|
|
os.Setenv("ALIBABA_CLOUD_OIDC_TOKEN_FILE", "/path/to/oidc.token") |
32
|
|
|
os.Setenv("ALIBABA_CLOUD_OIDC_PROVIDER_ARN", "oidcproviderarn") |
33
|
|
|
os.Setenv("ALIBABA_CLOUD_ROLE_ARN", "rolearn") |
34
|
|
|
|
35
|
|
|
provider = NewDefaultCredentialsProvider() |
36
|
|
|
assert.NotNil(t, provider) |
37
|
|
|
assert.Len(t, provider.providerChain, 4) |
38
|
|
|
_, ok = provider.providerChain[0].(*EnvironmentVariableCredentialsProvider) |
39
|
|
|
assert.True(t, ok) |
40
|
|
|
|
41
|
|
|
_, ok = provider.providerChain[1].(*OIDCCredentialsProvider) |
42
|
|
|
assert.True(t, ok) |
43
|
|
|
|
44
|
|
|
_, ok = provider.providerChain[2].(*CLIProfileCredentialsProvider) |
45
|
|
|
assert.True(t, ok) |
46
|
|
|
|
47
|
|
|
_, ok = provider.providerChain[3].(*ProfileCredentialsProvider) |
48
|
|
|
assert.True(t, ok) |
49
|
|
|
|
50
|
|
|
// Add ecs ram role |
51
|
|
|
os.Setenv("ALIBABA_CLOUD_ECS_METADATA", "rolename") |
52
|
|
|
provider = NewDefaultCredentialsProvider() |
53
|
|
|
assert.NotNil(t, provider) |
54
|
|
|
assert.Len(t, provider.providerChain, 5) |
55
|
|
|
_, ok = provider.providerChain[0].(*EnvironmentVariableCredentialsProvider) |
56
|
|
|
assert.True(t, ok) |
57
|
|
|
|
58
|
|
|
_, ok = provider.providerChain[1].(*OIDCCredentialsProvider) |
59
|
|
|
assert.True(t, ok) |
60
|
|
|
|
61
|
|
|
_, ok = provider.providerChain[2].(*CLIProfileCredentialsProvider) |
62
|
|
|
assert.True(t, ok) |
63
|
|
|
|
64
|
|
|
_, ok = provider.providerChain[3].(*ProfileCredentialsProvider) |
65
|
|
|
assert.True(t, ok) |
66
|
|
|
|
67
|
|
|
_, ok = provider.providerChain[4].(*ECSRAMRoleCredentialsProvider) |
68
|
|
|
assert.True(t, ok) |
69
|
|
|
} |
70
|
|
|
|
71
|
|
|
func TestDefaultCredentialsProvider_GetCredentials(t *testing.T) { |
72
|
|
|
rollback := utils.Memory("ALIBABA_CLOUD_ACCESS_KEY_ID", |
73
|
|
|
"ALIBABA_CLOUD_ACCESS_KEY_SECRET", |
74
|
|
|
"ALIBABA_CLOUD_SECURITY_TOKEN") |
75
|
|
|
|
76
|
|
|
defer func() { |
77
|
|
|
getHomePath = utils.GetHomePath |
78
|
|
|
rollback() |
79
|
|
|
}() |
80
|
|
|
|
81
|
|
|
// testcase: empty home |
82
|
|
|
getHomePath = func() string { |
83
|
|
|
return "" |
84
|
|
|
} |
85
|
|
|
|
86
|
|
|
provider := NewDefaultCredentialsProvider() |
87
|
|
|
assert.Len(t, provider.providerChain, 3) |
88
|
|
|
_, err := provider.GetCredentials() |
89
|
|
|
assert.EqualError(t, err, "unable to get credentials from any of the providers in the chain: unable to get credentials from enviroment variables, Access key ID must be specified via environment variable (ALIBABA_CLOUD_ACCESS_KEY_ID), cannot found home dir, cannot found home dir") |
90
|
|
|
|
91
|
|
|
os.Setenv("ALIBABA_CLOUD_ACCESS_KEY_ID", "akid") |
92
|
|
|
os.Setenv("ALIBABA_CLOUD_ACCESS_KEY_SECRET", "aksecret") |
93
|
|
|
provider = NewDefaultCredentialsProvider() |
94
|
|
|
assert.Len(t, provider.providerChain, 3) |
95
|
|
|
cc, err := provider.GetCredentials() |
96
|
|
|
assert.Nil(t, err) |
97
|
|
|
assert.Equal(t, &Credentials{AccessKeyId: "akid", AccessKeySecret: "aksecret", SecurityToken: "", ProviderName: "default/env"}, cc) |
98
|
|
|
// get again |
99
|
|
|
cc, err = provider.GetCredentials() |
100
|
|
|
assert.Nil(t, err) |
101
|
|
|
assert.Equal(t, &Credentials{AccessKeyId: "akid", AccessKeySecret: "aksecret", SecurityToken: "", ProviderName: "default/env"}, cc) |
102
|
|
|
} |
103
|
|
|
|