Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(7)

Unified Diff: third_party/gsutil/third_party/boto/tests/unit/sts/test_connection.py

Issue 1377933002: [catapult] - Copy Telemetry's gsutilz over to third_party. (Closed) Base URL: https://github.com/catapult-project/catapult.git@master
Patch Set: Rename to gsutil. Created 5 years, 3 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: third_party/gsutil/third_party/boto/tests/unit/sts/test_connection.py
diff --git a/third_party/gsutil/third_party/boto/tests/unit/sts/test_connection.py b/third_party/gsutil/third_party/boto/tests/unit/sts/test_connection.py
new file mode 100755
index 0000000000000000000000000000000000000000..dd97c770d8bc280b5de74a0428d55184853cebc9
--- /dev/null
+++ b/third_party/gsutil/third_party/boto/tests/unit/sts/test_connection.py
@@ -0,0 +1,244 @@
+#!/usr/bin/env python
+# Copyright (c) 2012 Amazon.com, Inc. or its affiliates. All Rights Reserved
+#
+# Permission is hereby granted, free of charge, to any person obtaining a
+# copy of this software and associated documentation files (the
+# "Software"), to deal in the Software without restriction, including
+# without limitation the rights to use, copy, modify, merge, publish, dis-
+# tribute, sublicense, and/or sell copies of the Software, and to permit
+# persons to whom the Software is furnished to do so, subject to the fol-
+# lowing conditions:
+#
+# The above copyright notice and this permission notice shall be included
+# in all copies or substantial portions of the Software.
+#
+# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
+# OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABIL-
+# ITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT
+# SHALL THE AUTHOR BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY,
+# WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
+# OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
+# IN THE SOFTWARE.
+#
+
+from tests.unit import unittest
+from boto.sts.connection import STSConnection
+from tests.unit import AWSMockServiceTestCase
+
+
+class TestSecurityToken(AWSMockServiceTestCase):
+ connection_class = STSConnection
+
+ def create_service_connection(self, **kwargs):
+ kwargs['security_token'] = 'token'
+
+ return super(TestSecurityToken, self).create_service_connection(**kwargs)
+
+ def test_security_token(self):
+ self.assertEqual('token',
+ self.service_connection.provider.security_token)
+
+class TestSTSConnection(AWSMockServiceTestCase):
+ connection_class = STSConnection
+
+ def setUp(self):
+ super(TestSTSConnection, self).setUp()
+
+ def default_body(self):
+ return b"""
+ <AssumeRoleResponse xmlns="https://sts.amazonaws.com/doc/2011-06-15/">
+ <AssumeRoleResult>
+ <AssumedRoleUser>
+ <Arn>arn:role</Arn>
+ <AssumedRoleId>roleid:myrolesession</AssumedRoleId>
+ </AssumedRoleUser>
+ <Credentials>
+ <SessionToken>session_token</SessionToken>
+ <SecretAccessKey>secretkey</SecretAccessKey>
+ <Expiration>2012-10-18T10:18:14.789Z</Expiration>
+ <AccessKeyId>accesskey</AccessKeyId>
+ </Credentials>
+ </AssumeRoleResult>
+ <ResponseMetadata>
+ <RequestId>8b7418cb-18a8-11e2-a706-4bd22ca68ab7</RequestId>
+ </ResponseMetadata>
+ </AssumeRoleResponse>
+ """
+
+ def test_assume_role(self):
+ self.set_http_response(status_code=200)
+ response = self.service_connection.assume_role('arn:role', 'mysession')
+ self.assert_request_parameters(
+ {'Action': 'AssumeRole',
+ 'RoleArn': 'arn:role',
+ 'RoleSessionName': 'mysession'},
+ ignore_params_values=['Version'])
+ self.assertEqual(response.credentials.access_key, 'accesskey')
+ self.assertEqual(response.credentials.secret_key, 'secretkey')
+ self.assertEqual(response.credentials.session_token, 'session_token')
+ self.assertEqual(response.user.arn, 'arn:role')
+ self.assertEqual(response.user.assume_role_id, 'roleid:myrolesession')
+
+ def test_assume_role_with_mfa(self):
+ self.set_http_response(status_code=200)
+ response = self.service_connection.assume_role(
+ 'arn:role',
+ 'mysession',
+ mfa_serial_number='GAHT12345678',
+ mfa_token='abc123'
+ )
+ self.assert_request_parameters(
+ {'Action': 'AssumeRole',
+ 'RoleArn': 'arn:role',
+ 'RoleSessionName': 'mysession',
+ 'SerialNumber': 'GAHT12345678',
+ 'TokenCode': 'abc123'},
+ ignore_params_values=['Version'])
+ self.assertEqual(response.credentials.access_key, 'accesskey')
+ self.assertEqual(response.credentials.secret_key, 'secretkey')
+ self.assertEqual(response.credentials.session_token, 'session_token')
+ self.assertEqual(response.user.arn, 'arn:role')
+ self.assertEqual(response.user.assume_role_id, 'roleid:myrolesession')
+
+
+class TestSTSWebIdentityConnection(AWSMockServiceTestCase):
+ connection_class = STSConnection
+
+ def setUp(self):
+ super(TestSTSWebIdentityConnection, self).setUp()
+
+ def default_body(self):
+ return b"""
+<AssumeRoleWithWebIdentityResponse xmlns="https://sts.amazonaws.com/doc/2011-06-15/">
+ <AssumeRoleWithWebIdentityResult>
+ <SubjectFromWebIdentityToken>
+ amzn1.account.AF6RHO7KZU5XRVQJGXK6HB56KR2A
+ </SubjectFromWebIdentityToken>
+ <AssumedRoleUser>
+ <Arn>
+ arn:aws:sts::000240903217:assumed-role/FederatedWebIdentityRole/app1
+ </Arn>
+ <AssumedRoleId>
+ AROACLKWSDQRAOFQC3IDI:app1
+ </AssumedRoleId>
+ </AssumedRoleUser>
+ <Credentials>
+ <SessionToken>
+ AQoDYXdzEE0a8ANXXXXXXXXNO1ewxE5TijQyp+IPfnyowF
+ </SessionToken>
+ <SecretAccessKey>
+ secretkey
+ </SecretAccessKey>
+ <Expiration>
+ 2013-05-14T23:00:23Z
+ </Expiration>
+ <AccessKeyId>
+ accesskey
+ </AccessKeyId>
+ </Credentials>
+ </AssumeRoleWithWebIdentityResult>
+ <ResponseMetadata>
+ <RequestId>ad4156e9-bce1-11e2-82e6-6b6ef249e618</RequestId>
+ </ResponseMetadata>
+</AssumeRoleWithWebIdentityResponse>
+ """
+
+ def test_assume_role_with_web_identity(self):
+ arn = 'arn:aws:iam::000240903217:role/FederatedWebIdentityRole'
+ wit = 'b94d27b9934d3e08a52e52d7da7dabfac484efe37a5380ee9088f7ace2efcde9'
+
+ self.set_http_response(status_code=200)
+ response = self.service_connection.assume_role_with_web_identity(
+ role_arn=arn,
+ role_session_name='guestuser',
+ web_identity_token=wit,
+ provider_id='www.amazon.com',
+ )
+ self.assert_request_parameters({
+ 'RoleSessionName': 'guestuser',
+ 'RoleArn': arn,
+ 'WebIdentityToken': wit,
+ 'ProviderId': 'www.amazon.com',
+ 'Action': 'AssumeRoleWithWebIdentity'
+ }, ignore_params_values=[
+ 'Version'
+ ])
+ self.assertEqual(
+ response.credentials.access_key.strip(),
+ 'accesskey'
+ )
+ self.assertEqual(
+ response.credentials.secret_key.strip(),
+ 'secretkey'
+ )
+ self.assertEqual(
+ response.credentials.session_token.strip(),
+ 'AQoDYXdzEE0a8ANXXXXXXXXNO1ewxE5TijQyp+IPfnyowF'
+ )
+ self.assertEqual(
+ response.user.arn.strip(),
+ 'arn:aws:sts::000240903217:assumed-role/FederatedWebIdentityRole/app1'
+ )
+ self.assertEqual(
+ response.user.assume_role_id.strip(),
+ 'AROACLKWSDQRAOFQC3IDI:app1'
+ )
+
+
+class TestSTSSAMLConnection(AWSMockServiceTestCase):
+ connection_class = STSConnection
+
+ def setUp(self):
+ super(TestSTSSAMLConnection, self).setUp()
+
+ def default_body(self):
+ return b"""
+<AssumeRoleWithSAMLResponse xmlns="https://sts.amazonaws.com/doc/
+2011-06-15/">
+ <AssumeRoleWithSAMLResult>
+ <Credentials>
+ <SessionToken>session_token</SessionToken>
+ <SecretAccessKey>secretkey</SecretAccessKey>
+ <Expiration>2011-07-15T23:28:33.359Z</Expiration>
+ <AccessKeyId>accesskey</AccessKeyId>
+ </Credentials>
+ <AssumedRoleUser>
+ <Arn>arn:role</Arn>
+ <AssumedRoleId>roleid:myrolesession</AssumedRoleId>
+ </AssumedRoleUser>
+ <PackedPolicySize>6</PackedPolicySize>
+ </AssumeRoleWithSAMLResult>
+ <ResponseMetadata>
+ <RequestId>c6104cbe-af31-11e0-8154-cbc7ccf896c7</RequestId>
+ </ResponseMetadata>
+</AssumeRoleWithSAMLResponse>
+"""
+
+ def test_assume_role_with_saml(self):
+ arn = 'arn:aws:iam::000240903217:role/Test'
+ principal = 'arn:aws:iam::000240903217:role/Principal'
+ assertion = 'test'
+
+ self.set_http_response(status_code=200)
+ response = self.service_connection.assume_role_with_saml(
+ role_arn=arn,
+ principal_arn=principal,
+ saml_assertion=assertion
+ )
+ self.assert_request_parameters({
+ 'RoleArn': arn,
+ 'PrincipalArn': principal,
+ 'SAMLAssertion': assertion,
+ 'Action': 'AssumeRoleWithSAML'
+ }, ignore_params_values=[
+ 'Version'
+ ])
+ self.assertEqual(response.credentials.access_key, 'accesskey')
+ self.assertEqual(response.credentials.secret_key, 'secretkey')
+ self.assertEqual(response.credentials.session_token, 'session_token')
+ self.assertEqual(response.user.arn, 'arn:role')
+ self.assertEqual(response.user.assume_role_id, 'roleid:myrolesession')
+
+
+if __name__ == '__main__':
+ unittest.main()

Powered by Google App Engine
This is Rietveld 408576698