File tree Expand file tree Collapse file tree 3 files changed +39
-0
lines changed
Expand file tree Collapse file tree 3 files changed +39
-0
lines changed Original file line number Diff line number Diff line change @@ -208,6 +208,25 @@ func TestGetAwsConfig(t *testing.T) {
208208 servicemocks .MockStsGetCallerIdentityValidEndpoint ,
209209 },
210210 },
211+ {
212+ Config : & Config {
213+ AccessKey : servicemocks .MockStaticAccessKey ,
214+ AssumeRole : & AssumeRole {
215+ RoleARN : servicemocks .MockStsAssumeRoleArn ,
216+ SessionName : servicemocks .MockStsAssumeRoleSessionName ,
217+ SourceIdentity : servicemocks .MockStsAssumeRoleSourceIdentity ,
218+ },
219+ Region : "us-east-1" ,
220+ SecretKey : servicemocks .MockStaticSecretKey ,
221+ },
222+ Description : "config AssumeRoleSourceIdentity" ,
223+ ExpectedCredentialsValue : mockdata .MockStsAssumeRoleCredentials ,
224+ ExpectedRegion : "us-east-1" ,
225+ MockStsEndpoints : []* servicemocks.MockEndpoint {
226+ servicemocks .MockStsAssumeRoleValidEndpointWithOptions (map [string ]string {"SourceIdentity" : servicemocks .MockStsAssumeRoleSourceIdentity }),
227+ servicemocks .MockStsGetCallerIdentityValidEndpoint ,
228+ },
229+ },
211230 {
212231 Config : & Config {
213232 Profile : "SharedCredentialsProfile" ,
Original file line number Diff line number Diff line change @@ -51,6 +51,7 @@ const (
5151 MockStsAssumeRoleSecretKey = `AssumeRoleSecretKey`
5252 MockStsAssumeRoleSessionName = `AssumeRoleSessionName`
5353 MockStsAssumeRoleSessionToken = `AssumeRoleSessionToken`
54+ MockStsAssumeRoleSourceIdentity = `AssumeRoleSourceIdentity`
5455 MockStsAssumeRoleTagKey = `AssumeRoleTagKey`
5556 MockStsAssumeRoleTagValue = `AssumeRoleTagValue`
5657 MockStsAssumeRoleTransitiveTagKey = `AssumeRoleTagKey`
Original file line number Diff line number Diff line change @@ -253,6 +253,25 @@ func TestGetSession(t *testing.T) {
253253 servicemocks .MockStsGetCallerIdentityValidEndpoint ,
254254 },
255255 },
256+ {
257+ Config : & awsbase.Config {
258+ AccessKey : servicemocks .MockStaticAccessKey ,
259+ AssumeRole : & awsbase.AssumeRole {
260+ RoleARN : servicemocks .MockStsAssumeRoleArn ,
261+ SessionName : servicemocks .MockStsAssumeRoleSessionName ,
262+ SourceIdentity : servicemocks .MockStsAssumeRoleSourceIdentity ,
263+ },
264+ Region : "us-east-1" ,
265+ SecretKey : servicemocks .MockStaticSecretKey ,
266+ },
267+ Description : "config AssumeRoleSourceIdentity" ,
268+ ExpectedCredentialsValue : mockdata .MockStsAssumeRoleCredentials ,
269+ ExpectedRegion : "us-east-1" ,
270+ MockStsEndpoints : []* servicemocks.MockEndpoint {
271+ servicemocks .MockStsAssumeRoleValidEndpointWithOptions (map [string ]string {"SourceIdentity" : servicemocks .MockStsAssumeRoleSourceIdentity }),
272+ servicemocks .MockStsGetCallerIdentityValidEndpoint ,
273+ },
274+ },
256275 {
257276 Config : & awsbase.Config {
258277 Profile : "SharedCredentialsProfile" ,
You can’t perform that action at this time.
0 commit comments