File size: 4,319 Bytes
065fee7
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
import datetime
import typing
from unittest.mock import MagicMock

import pytest  # type: ignore

from redshift_connector.credentials_holder import (
    ABCAWSCredentialsHolder,
    ABCCredentialsHolder,
    AWSDirectCredentialsHolder,
    AWSProfileCredentialsHolder,
    CredentialsHolder,
)


@pytest.mark.parametrize("cred_holder", (AWSDirectCredentialsHolder, AWSProfileCredentialsHolder))
def test_aws_credentials_holder_inherit_from_abc(cred_holder) -> None:
    assert issubclass(cred_holder, ABCAWSCredentialsHolder)


def test_credentials_holder_inherits_from_abc() -> None:
    assert issubclass(CredentialsHolder, ABCCredentialsHolder)


def test_aws_direct_credentials_holder_should_have_session() -> None:
    mocked_session: MagicMock = MagicMock()
    obj: AWSDirectCredentialsHolder = AWSDirectCredentialsHolder(
        access_key_id="something",
        secret_access_key="secret",
        session_token="fornow",
        session=mocked_session,
    )

    assert isinstance(obj, ABCAWSCredentialsHolder)
    assert hasattr(obj, "get_boto_session")
    assert obj.has_associated_session == True
    assert obj.get_boto_session() == mocked_session


valid_aws_direct_credential_params: typing.List[typing.Dict[str, typing.Optional[str]]] = [
    {
        "access_key_id": "something",
        "secret_access_key": "secret",
        "session_token": "fornow",
    },
    {
        "access_key_id": "something",
        "secret_access_key": "secret",
        "session_token": None,
    },
]


@pytest.mark.parametrize("input", valid_aws_direct_credential_params)
def test_aws_direct_credentials_holder_get_session_credentials(input) -> None:
    input["session"] = MagicMock()
    obj: AWSDirectCredentialsHolder = AWSDirectCredentialsHolder(**input)

    ret_value: typing.Dict[str, str] = obj.get_session_credentials()

    assert len(ret_value) == 3 if input["session_token"] is not None else 2

    assert ret_value["aws_access_key_id"] == input["access_key_id"]
    assert ret_value["aws_secret_access_key"] == input["secret_access_key"]

    if input["session_token"] is not None:
        assert ret_value["aws_session_token"] == input["session_token"]


def test_aws_profile_credentials_holder_should_have_session() -> None:
    mocked_session: MagicMock = MagicMock()
    obj: AWSProfileCredentialsHolder = AWSProfileCredentialsHolder(profile="myprofile", session=mocked_session)

    assert isinstance(obj, ABCAWSCredentialsHolder)
    assert hasattr(obj, "get_boto_session")
    assert obj.has_associated_session == True
    assert obj.get_boto_session() == mocked_session


def test_aws_profile_credentials_holder_get_session_credentials() -> None:
    profile_val: str = "myprofile"
    obj: AWSProfileCredentialsHolder = AWSProfileCredentialsHolder(profile=profile_val, session=MagicMock())

    ret_value = obj.get_session_credentials()
    assert len(ret_value) == 1

    assert ret_value["profile"] == profile_val


@pytest.mark.parametrize(
    "expiration_delta",
    [
        datetime.timedelta(hours=3),  # expired 3 hrs ago
        datetime.timedelta(days=1),  # expired 1 day ago
        datetime.timedelta(weeks=1),  # expired 1 week ago
    ],
)
def test_is_expired_true(expiration_delta) -> None:
    credentials: typing.Dict[str, typing.Any] = {
        "AccessKeyId": "something",
        "SecretAccessKey": "secret",
        "SessionToken": "fornow",
        "Expiration": datetime.datetime.now(datetime.timezone.utc) - expiration_delta,
    }

    obj: CredentialsHolder = CredentialsHolder(credentials=credentials)

    assert obj.is_expired() == True


@pytest.mark.parametrize(
    "expiration_delta",
    [
        datetime.timedelta(minutes=2),  # expired 1 minute ago
        datetime.timedelta(hours=3),  # expired 3 hrs ago
        datetime.timedelta(days=1),  # expired 1 day ago
        datetime.timedelta(weeks=1),  # expired 1 week ago
    ],
)
def test_is_expired_false(expiration_delta) -> None:
    credentials: typing.Dict[str, typing.Any] = {
        "AccessKeyId": "something",
        "SecretAccessKey": "secret",
        "SessionToken": "fornow",
        "Expiration": datetime.datetime.now(datetime.timezone.utc) + expiration_delta,
    }

    obj: CredentialsHolder = CredentialsHolder(credentials=credentials)

    assert obj.is_expired() == False