Skip to content

Commit ce8eb61

Browse files
committed
test(credential-provider-node): add credential source assertions
1 parent be37764 commit ce8eb61

File tree

2 files changed

+76
-1
lines changed

2 files changed

+76
-1
lines changed

packages/core/src/submodules/httpAuthSchemes/aws_sdk/resolveAwsSdkSigV4Config.ts

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
import { setCredentialFeature } from "@aws-sdk/core";
1+
import { setCredentialFeature } from "@aws-sdk/core/client";
22
import { AttributedAwsCredentialIdentity } from "@aws-sdk/types";
33
import {
44
doesIdentityRequireRefresh,

packages/credential-provider-node/src/credential-provider-node.integ.spec.ts

Lines changed: 75 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -295,6 +295,9 @@ describe("credential-provider-node integration test", () => {
295295
expect(credentials).toEqual({
296296
accessKeyId: "ENV_ACCESS_KEY",
297297
secretAccessKey: "ENV_SECRET_KEY",
298+
$source: {
299+
CREDENTIALS_ENV_VARS: "g",
300+
},
298301
});
299302
});
300303

@@ -312,6 +315,9 @@ describe("credential-provider-node integration test", () => {
312315
expiration: new Date("2000-01-01T00:00:00.000Z"),
313316
sessionToken: "ENV_SESSION_TOKEN",
314317
credentialScope: "us-env-1",
318+
$source: {
319+
CREDENTIALS_ENV_VARS: "g",
320+
},
315321
});
316322
});
317323

@@ -331,6 +337,9 @@ describe("credential-provider-node integration test", () => {
331337
expect(credentials).toEqual({
332338
accessKeyId: "INI_STATIC_ACCESS_KEY",
333339
secretAccessKey: "INI_STATIC_SECRET_KEY",
340+
$source: {
341+
CREDENTIALS_PROFILE: "n",
342+
},
334343
});
335344
});
336345
});
@@ -356,6 +365,10 @@ describe("credential-provider-node integration test", () => {
356365
sessionToken: "SSO_SESSION_TOKEN",
357366
expiration: new Date("3000-01-01T00:00:00.000Z"),
358367
credentialScope: "us-sso-1-us-sso-region-1",
368+
$source: {
369+
CREDENTIALS_CODE: "e",
370+
CREDENTIALS_SSO_LEGACY: "u",
371+
},
359372
});
360373
});
361374
});
@@ -371,6 +384,9 @@ describe("credential-provider-node integration test", () => {
371384
expect(credentials).toEqual({
372385
accessKeyId: "INI_STATIC_ACCESS_KEY",
373386
secretAccessKey: "INI_STATIC_SECRET_KEY",
387+
$source: {
388+
CREDENTIALS_PROFILE: "n",
389+
},
374390
});
375391
});
376392

@@ -395,6 +411,10 @@ describe("credential-provider-node integration test", () => {
395411
sessionToken: "STS_AR_SESSION_TOKEN",
396412
expiration: new Date("3000-01-01T00:00:00.000Z"),
397413
credentialScope: "us-stsar-1__us-west-2",
414+
$source: {
415+
CREDENTIALS_PROFILE_SOURCE_PROFILE: "o",
416+
CREDENTIALS_STS_ASSUME_ROLE: "i",
417+
},
398418
});
399419
});
400420

@@ -423,6 +443,10 @@ describe("credential-provider-node integration test", () => {
423443
sessionToken: "STS_AR_SESSION_TOKEN",
424444
expiration: new Date("3000-01-01T00:00:00.000Z"),
425445
credentialScope: "us-stsar-1__eu-west-1",
446+
$source: {
447+
CREDENTIALS_PROFILE_SOURCE_PROFILE: "o",
448+
CREDENTIALS_STS_ASSUME_ROLE: "i",
449+
},
426450
});
427451
});
428452

@@ -451,6 +475,10 @@ describe("credential-provider-node integration test", () => {
451475
sessionToken: "STS_AR_SESSION_TOKEN",
452476
expiration: new Date("3000-01-01T00:00:00.000Z"),
453477
credentialScope: "us-stsar-1__us-gov-stsar-1",
478+
$source: {
479+
CREDENTIALS_PROFILE_SOURCE_PROFILE: "o",
480+
CREDENTIALS_STS_ASSUME_ROLE: "i",
481+
},
454482
});
455483
});
456484

@@ -471,6 +499,10 @@ describe("credential-provider-node integration test", () => {
471499
sessionToken: "STS_ARWI_SESSION_TOKEN",
472500
expiration: new Date("3000-01-01T00:00:00.000Z"),
473501
credentialScope: "us-stsarwi-1__us-west-2",
502+
$source: {
503+
CREDENTIALS_PROFILE_STS_WEB_ID_TOKEN: "q",
504+
CREDENTIALS_STS_ASSUME_ROLE_WEB_ID: "k",
505+
},
474506
});
475507
});
476508

@@ -492,6 +524,10 @@ describe("credential-provider-node integration test", () => {
492524
sessionToken: "STS_ARWI_SESSION_TOKEN",
493525
expiration: new Date("3000-01-01T00:00:00.000Z"),
494526
credentialScope: "us-stsarwi-1__us-gov-sts-1",
527+
$source: {
528+
CREDENTIALS_PROFILE_STS_WEB_ID_TOKEN: "q",
529+
CREDENTIALS_STS_ASSUME_ROLE_WEB_ID: "k",
530+
},
495531
});
496532
});
497533

@@ -506,6 +542,10 @@ describe("credential-provider-node integration test", () => {
506542
secretAccessKey: "PROCESS_SECRET_ACCESS_KEY",
507543
sessionToken: "PROCESS_SESSION_TOKEN",
508544
credentialScope: "us-process-1",
545+
$source: {
546+
CREDENTIALS_PROCESS: "w",
547+
CREDENTIALS_PROFILE_PROCESS: "v",
548+
},
509549
});
510550
});
511551

@@ -529,6 +569,10 @@ describe("credential-provider-node integration test", () => {
529569
sessionToken: "SSO_SESSION_TOKEN",
530570
expiration: new Date("3000-01-01T00:00:00.000Z"),
531571
credentialScope: "us-sso-1-us-sso-region-1",
572+
$source: {
573+
CREDENTIALS_PROFILE_SSO: "r",
574+
CREDENTIALS_SSO: "s",
575+
},
532576
});
533577
});
534578

@@ -561,6 +605,11 @@ describe("credential-provider-node integration test", () => {
561605
sessionToken: "STS_AR_SESSION_TOKEN",
562606
expiration: new Date("3000-01-01T00:00:00.000Z"),
563607
credentialScope: "us-stsar-1__us-west-2",
608+
$source: {
609+
CREDENTIALS_CODE: "e",
610+
CREDENTIALS_PROFILE_SOURCE_PROFILE: "o",
611+
CREDENTIALS_STS_ASSUME_ROLE: "i",
612+
},
564613
});
565614
expect(spy).toHaveBeenCalledWith(
566615
expect.objectContaining({
@@ -601,6 +650,11 @@ describe("credential-provider-node integration test", () => {
601650
sessionToken: "STS_AR_SESSION_TOKEN",
602651
expiration: new Date("3000-01-01T00:00:00.000Z"),
603652
credentialScope: "us-stsar-1__us-west-2",
653+
$source: {
654+
CREDENTIALS_CODE: "e",
655+
CREDENTIALS_PROFILE_SOURCE_PROFILE: "o",
656+
CREDENTIALS_STS_ASSUME_ROLE: "i",
657+
},
604658
});
605659
expect(assumeRoleArns).toEqual(["ROLE_ARN_1", "ROLE_ARN_2"]);
606660
});
@@ -643,6 +697,11 @@ describe("credential-provider-node integration test", () => {
643697
sessionToken: "STS_AR_SESSION_TOKEN",
644698
expiration: new Date("3000-01-01T00:00:00.000Z"),
645699
credentialScope: "us-stsar-1__us-west-2",
700+
$source: {
701+
CREDENTIALS_CODE: "e",
702+
CREDENTIALS_PROFILE_SOURCE_PROFILE: "o",
703+
CREDENTIALS_STS_ASSUME_ROLE: "i",
704+
},
646705
});
647706
expect(spy).toHaveBeenCalledWith(
648707
expect.objectContaining({
@@ -692,6 +751,11 @@ describe("credential-provider-node integration test", () => {
692751
sessionToken: "STS_AR_SESSION_TOKEN",
693752
expiration: new Date("3000-01-01T00:00:00.000Z"),
694753
credentialScope: "us-stsar-1__us-west-2",
754+
$source: {
755+
CREDENTIALS_CODE: "e",
756+
CREDENTIALS_PROFILE_SOURCE_PROFILE: "o",
757+
CREDENTIALS_STS_ASSUME_ROLE: "i",
758+
},
695759
});
696760
expect(spy).toHaveBeenCalledWith(
697761
expect.objectContaining({
@@ -720,6 +784,10 @@ describe("credential-provider-node integration test", () => {
720784
secretAccessKey: "PROCESS_SECRET_ACCESS_KEY",
721785
sessionToken: "PROCESS_SESSION_TOKEN",
722786
credentialScope: "us-process-1",
787+
$source: {
788+
CREDENTIALS_PROCESS: "w",
789+
CREDENTIALS_PROFILE_PROCESS: "v",
790+
},
723791
});
724792
});
725793
});
@@ -736,6 +804,10 @@ describe("credential-provider-node integration test", () => {
736804
sessionToken: "STS_ARWI_SESSION_TOKEN",
737805
expiration: new Date("3000-01-01T00:00:00.000Z"),
738806
credentialScope: "us-stsarwi-1__us-west-2",
807+
$source: {
808+
CREDENTIALS_ENV_VARS_STS_WEB_ID_TOKEN: "h",
809+
CREDENTIALS_STS_ASSUME_ROLE_WEB_ID: "k",
810+
},
739811
});
740812
});
741813
});
@@ -751,6 +823,9 @@ describe("credential-provider-node integration test", () => {
751823
secretAccessKey: "CONTAINER_SECRET_ACCESS_KEY",
752824
sessionToken: "CONTAINER_TOKEN",
753825
expiration: new Date("3000-01-01T00:00:00.000Z"),
826+
$source: {
827+
CREDENTIALS_HTTP: "z",
828+
},
754829
});
755830
});
756831

0 commit comments

Comments
 (0)