Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(50)

Unified Diff: tools/telemetry/third_party/gsutil/third_party/boto/tests/integration/cloudtrail/test_cloudtrail.py

Issue 1260493004: Revert "Add gsutil 4.13 to telemetry/third_party" (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Created 5 years, 5 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: tools/telemetry/third_party/gsutil/third_party/boto/tests/integration/cloudtrail/test_cloudtrail.py
diff --git a/tools/telemetry/third_party/gsutil/third_party/boto/tests/integration/cloudtrail/test_cloudtrail.py b/tools/telemetry/third_party/gsutil/third_party/boto/tests/integration/cloudtrail/test_cloudtrail.py
deleted file mode 100644
index 3e90fbeb2a9dca5707eac0c57d5640e39c4f2757..0000000000000000000000000000000000000000
--- a/tools/telemetry/third_party/gsutil/third_party/boto/tests/integration/cloudtrail/test_cloudtrail.py
+++ /dev/null
@@ -1,91 +0,0 @@
-import boto
-
-from time import time
-from tests.compat import unittest
-
-DEFAULT_S3_POLICY = """{
- "Version": "2012-10-17",
- "Statement": [
- {
- "Sid": "AWSCloudTrailAclCheck20131101",
- "Effect": "Allow",
- "Principal": {
- "AWS": [
- "arn:aws:iam::086441151436:root",
- "arn:aws:iam::113285607260:root"
- ]
- },
- "Action": "s3:GetBucketAcl",
- "Resource": "arn:aws:s3:::<BucketName>"
- },
- {
- "Sid": "AWSCloudTrailWrite20131101",
- "Effect": "Allow",
- "Principal": {
- "AWS": [
- "arn:aws:iam::086441151436:root",
- "arn:aws:iam::113285607260:root"
- ]
- },
- "Action": "s3:PutObject",
- "Resource": "arn:aws:s3:::<BucketName>/<Prefix>/AWSLogs/<CustomerAccountID>/*",
- "Condition": {
- "StringEquals": {
- "s3:x-amz-acl": "bucket-owner-full-control"
- }
- }
- }
- ]
-}"""
-
-class TestCloudTrail(unittest.TestCase):
- def test_cloudtrail(self):
- cloudtrail = boto.connect_cloudtrail()
-
- # Don't delete existing customer data!
- res = cloudtrail.describe_trails()
- if len(res['trailList']):
- self.fail('A trail already exists on this account!')
-
- # Who am I?
- iam = boto.connect_iam()
- response = iam.get_user()
- account_id = response['get_user_response']['get_user_result'] \
- ['user']['user_id']
-
- # Setup a new bucket
- s3 = boto.connect_s3()
- bucket_name = 'cloudtrail-integ-{0}'.format(time())
- policy = DEFAULT_S3_POLICY.replace('<BucketName>', bucket_name)\
- .replace('<CustomerAccountID>', account_id)\
- .replace('<Prefix>/', '')
- b = s3.create_bucket(bucket_name)
- b.set_policy(policy)
-
- # Setup CloudTrail
- cloudtrail.create_trail(trail={'Name': 'test', 'S3BucketName': bucket_name})
-
- cloudtrail.update_trail(trail={'Name': 'test', 'IncludeGlobalServiceEvents': False})
-
- trails = cloudtrail.describe_trails()
-
- self.assertEqual('test', trails['trailList'][0]['Name'])
- self.assertFalse(trails['trailList'][0]['IncludeGlobalServiceEvents'])
-
- cloudtrail.start_logging(name='test')
-
- status = cloudtrail.get_trail_status(name='test')
- self.assertTrue(status['IsLogging'])
-
- cloudtrail.stop_logging(name='test')
-
- status = cloudtrail.get_trail_status(name='test')
- self.assertFalse(status['IsLogging'])
-
- # Clean up
- cloudtrail.delete_trail(name='test')
-
- for key in b.list():
- key.delete()
-
- s3.delete_bucket(bucket_name)

Powered by Google App Engine
This is Rietveld 408576698