Skip to content

Commit 856d43b

Browse files
committed
Update tests and dependency versions
1 parent 74523a0 commit 856d43b

File tree

2 files changed

+12
-11
lines changed

2 files changed

+12
-11
lines changed

aws-google.gemspec

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,8 +26,8 @@ Gem::Specification.new do |spec|
2626
spec.add_dependency 'launchy', '~> 2'
2727

2828
spec.add_development_dependency 'activesupport', '~> 5'
29-
spec.add_development_dependency 'bundler', '~> 1'
30-
spec.add_development_dependency 'minitest', '~> 5.10'
29+
spec.add_development_dependency 'bundler'
30+
spec.add_development_dependency 'minitest', '~> 5.14.2'
3131
spec.add_development_dependency 'mocha', '~> 1.5'
3232
spec.add_development_dependency 'rake', '~> 12'
3333
spec.add_development_dependency 'timecop', '~> 0.8'

test/aws/google_test.rb

Lines changed: 10 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,7 @@
1717
)
1818
# Disable instance metadata credentials.
1919
stub_request(:get, '169.254.169.254/latest/meta-data/iam/security-credentials/')
20+
stub_request(:put, '169.254.169.254/latest/api/token')
2021
# Disable environment credentials.
2122
ENV.stubs(:[]).returns(nil)
2223
end
@@ -79,9 +80,9 @@
7980
system.times(5)
8081

8182
c = Aws::STS::Client.new.config.credentials
82-
c.credentials.access_key_id.must_equal credentials[:access_key_id]
83-
c.credentials.secret_access_key.must_equal credentials[:secret_access_key]
84-
c.credentials.session_token.must_equal credentials[:session_token]
83+
_(c.credentials.access_key_id).must_equal credentials[:access_key_id]
84+
_(c.credentials.secret_access_key).must_equal credentials[:secret_access_key]
85+
_(c.credentials.session_token).must_equal credentials[:session_token]
8586
end
8687

8788
it 'refreshes expired Google auth token credentials' do
@@ -95,9 +96,9 @@
9596
system.times(5)
9697

9798
c = Aws::STS::Client.new.config.credentials
98-
c.credentials.access_key_id.must_equal credentials[:access_key_id]
99-
c.credentials.secret_access_key.must_equal credentials[:secret_access_key]
100-
c.credentials.session_token.must_equal credentials[:session_token]
99+
_(c.credentials.access_key_id).must_equal credentials[:access_key_id]
100+
_(c.credentials.secret_access_key).must_equal credentials[:secret_access_key]
101+
_(c.credentials.session_token).must_equal credentials[:session_token]
101102
end
102103

103104
it 'refreshes expired credentials' do
@@ -110,9 +111,9 @@
110111
)
111112
service = Aws::STS::Client.new
112113
expiration = service.config.credentials.expiration
113-
expiration.must_equal(service.config.credentials.expiration)
114+
_(expiration).must_equal(service.config.credentials.expiration)
114115
Timecop.travel(1.5.hours.from_now) do
115-
expiration.wont_equal(service.config.credentials.expiration)
116+
_(expiration).wont_equal(service.config.credentials.expiration)
116117
end
117118
end
118119

@@ -153,7 +154,7 @@
153154
err = assert_raises(Aws::STS::Errors::AccessDenied) do
154155
Aws::STS::Client.new.config.credentials
155156
end
156-
err.message.must_match /Your Google ID does not have access to the requested AWS Role./
157+
_(err.message).must_match 'Your Google ID does not have access to the requested AWS Role.'
157158
end
158159
end
159160

0 commit comments

Comments
 (0)