|
17 | 17 | )
|
18 | 18 | # Disable instance metadata credentials.
|
19 | 19 | stub_request(:get, '169.254.169.254/latest/meta-data/iam/security-credentials/')
|
| 20 | + stub_request(:put, '169.254.169.254/latest/api/token') |
20 | 21 | # Disable environment credentials.
|
21 | 22 | ENV.stubs(:[]).returns(nil)
|
22 | 23 | end
|
|
79 | 80 | system.times(5)
|
80 | 81 |
|
81 | 82 | c = Aws::STS::Client.new.config.credentials
|
82 |
| - c.credentials.access_key_id.must_equal credentials[:access_key_id] |
83 |
| - c.credentials.secret_access_key.must_equal credentials[:secret_access_key] |
84 |
| - c.credentials.session_token.must_equal credentials[:session_token] |
| 83 | + _(c.credentials.access_key_id).must_equal credentials[:access_key_id] |
| 84 | + _(c.credentials.secret_access_key).must_equal credentials[:secret_access_key] |
| 85 | + _(c.credentials.session_token).must_equal credentials[:session_token] |
85 | 86 | end
|
86 | 87 |
|
87 | 88 | it 'refreshes expired Google auth token credentials' do
|
|
95 | 96 | system.times(5)
|
96 | 97 |
|
97 | 98 | c = Aws::STS::Client.new.config.credentials
|
98 |
| - c.credentials.access_key_id.must_equal credentials[:access_key_id] |
99 |
| - c.credentials.secret_access_key.must_equal credentials[:secret_access_key] |
100 |
| - c.credentials.session_token.must_equal credentials[:session_token] |
| 99 | + _(c.credentials.access_key_id).must_equal credentials[:access_key_id] |
| 100 | + _(c.credentials.secret_access_key).must_equal credentials[:secret_access_key] |
| 101 | + _(c.credentials.session_token).must_equal credentials[:session_token] |
101 | 102 | end
|
102 | 103 |
|
103 | 104 | it 'refreshes expired credentials' do
|
|
110 | 111 | )
|
111 | 112 | service = Aws::STS::Client.new
|
112 | 113 | expiration = service.config.credentials.expiration
|
113 |
| - expiration.must_equal(service.config.credentials.expiration) |
| 114 | + _(expiration).must_equal(service.config.credentials.expiration) |
114 | 115 | Timecop.travel(1.5.hours.from_now) do
|
115 |
| - expiration.wont_equal(service.config.credentials.expiration) |
| 116 | + _(expiration).wont_equal(service.config.credentials.expiration) |
116 | 117 | end
|
117 | 118 | end
|
118 | 119 |
|
|
153 | 154 | err = assert_raises(Aws::STS::Errors::AccessDenied) do
|
154 | 155 | Aws::STS::Client.new.config.credentials
|
155 | 156 | end
|
156 |
| - err.message.must_match /Your Google ID does not have access to the requested AWS Role./ |
| 157 | + _(err.message).must_match 'Your Google ID does not have access to the requested AWS Role.' |
157 | 158 | end
|
158 | 159 | end
|
159 | 160 |
|
|
0 commit comments