@@ -585,10 +585,6 @@ func getExpectedSubjectToken(url, region, accessKeyID, secretAccessKey, security
585
585
func TestAWSCredential_BasicRequest (t * testing.T ) {
586
586
server := createDefaultAwsTestServer ()
587
587
ts := httptest .NewServer (server )
588
- _ , err := neturl .Parse (ts .URL )
589
- if err != nil {
590
- t .Fatalf ("couldn't parse httptest servername" )
591
- }
592
588
593
589
tfc := testFileConfig
594
590
tfc .CredentialSource = server .getCredentialSource (ts .URL )
@@ -628,10 +624,6 @@ func TestAWSCredential_BasicRequest(t *testing.T) {
628
624
func TestAWSCredential_IMDSv2 (t * testing.T ) {
629
625
server := createDefaultAwsTestServerWithImdsv2 (t )
630
626
ts := httptest .NewServer (server )
631
- _ , err := neturl .Parse (ts .URL )
632
- if err != nil {
633
- t .Fatalf ("couldn't parse httptest servername" )
634
- }
635
627
636
628
tfc := testFileConfig
637
629
tfc .CredentialSource = server .getCredentialSource (ts .URL )
@@ -671,10 +663,6 @@ func TestAWSCredential_IMDSv2(t *testing.T) {
671
663
func TestAWSCredential_BasicRequestWithoutSecurityToken (t * testing.T ) {
672
664
server := createDefaultAwsTestServer ()
673
665
ts := httptest .NewServer (server )
674
- _ , err := neturl .Parse (ts .URL )
675
- if err != nil {
676
- t .Fatalf ("couldn't parse httptest servername" )
677
- }
678
666
delete (server .Credentials , "Token" )
679
667
680
668
tfc := testFileConfig
@@ -715,10 +703,6 @@ func TestAWSCredential_BasicRequestWithoutSecurityToken(t *testing.T) {
715
703
func TestAWSCredential_BasicRequestWithEnv (t * testing.T ) {
716
704
server := createDefaultAwsTestServer ()
717
705
ts := httptest .NewServer (server )
718
- _ , err := neturl .Parse (ts .URL )
719
- if err != nil {
720
- t .Fatalf ("couldn't parse httptest servername" )
721
- }
722
706
723
707
tfc := testFileConfig
724
708
tfc .CredentialSource = server .getCredentialSource (ts .URL )
@@ -762,10 +746,6 @@ func TestAWSCredential_BasicRequestWithEnv(t *testing.T) {
762
746
func TestAWSCredential_BasicRequestWithDefaultEnv (t * testing.T ) {
763
747
server := createDefaultAwsTestServer ()
764
748
ts := httptest .NewServer (server )
765
- _ , err := neturl .Parse (ts .URL )
766
- if err != nil {
767
- t .Fatalf ("couldn't parse httptest servername" )
768
- }
769
749
770
750
tfc := testFileConfig
771
751
tfc .CredentialSource = server .getCredentialSource (ts .URL )
@@ -808,10 +788,6 @@ func TestAWSCredential_BasicRequestWithDefaultEnv(t *testing.T) {
808
788
func TestAWSCredential_BasicRequestWithTwoRegions (t * testing.T ) {
809
789
server := createDefaultAwsTestServer ()
810
790
ts := httptest .NewServer (server )
811
- _ , err := neturl .Parse (ts .URL )
812
- if err != nil {
813
- t .Fatalf ("couldn't parse httptest servername" )
814
- }
815
791
816
792
tfc := testFileConfig
817
793
tfc .CredentialSource = server .getCredentialSource (ts .URL )
@@ -855,10 +831,6 @@ func TestAWSCredential_BasicRequestWithTwoRegions(t *testing.T) {
855
831
func TestAWSCredential_RequestWithBadVersion (t * testing.T ) {
856
832
server := createDefaultAwsTestServer ()
857
833
ts := httptest .NewServer (server )
858
- _ , err := neturl .Parse (ts .URL )
859
- if err != nil {
860
- t .Fatalf ("couldn't parse httptest servername" )
861
- }
862
834
863
835
tfc := testFileConfig
864
836
tfc .CredentialSource = server .getCredentialSource (ts .URL )
@@ -870,7 +842,7 @@ func TestAWSCredential_RequestWithBadVersion(t *testing.T) {
870
842
}()
871
843
getenv = setEnvironment (map [string ]string {})
872
844
873
- _ , err = tfc .parse (context .Background ())
845
+ _ , err : = tfc .parse (context .Background ())
874
846
if err == nil {
875
847
t .Fatalf ("parse() should have failed" )
876
848
}
@@ -882,10 +854,6 @@ func TestAWSCredential_RequestWithBadVersion(t *testing.T) {
882
854
func TestAWSCredential_RequestWithNoRegionURL (t * testing.T ) {
883
855
server := createDefaultAwsTestServer ()
884
856
ts := httptest .NewServer (server )
885
- _ , err := neturl .Parse (ts .URL )
886
- if err != nil {
887
- t .Fatalf ("couldn't parse httptest servername" )
888
- }
889
857
890
858
tfc := testFileConfig
891
859
tfc .CredentialSource = server .getCredentialSource (ts .URL )
@@ -915,10 +883,7 @@ func TestAWSCredential_RequestWithNoRegionURL(t *testing.T) {
915
883
func TestAWSCredential_RequestWithBadRegionURL (t * testing.T ) {
916
884
server := createDefaultAwsTestServer ()
917
885
ts := httptest .NewServer (server )
918
- _ , err := neturl .Parse (ts .URL )
919
- if err != nil {
920
- t .Fatalf ("couldn't parse httptest servername" )
921
- }
886
+
922
887
server .WriteRegion = notFound
923
888
924
889
tfc := testFileConfig
@@ -948,10 +913,7 @@ func TestAWSCredential_RequestWithBadRegionURL(t *testing.T) {
948
913
func TestAWSCredential_RequestWithMissingCredential (t * testing.T ) {
949
914
server := createDefaultAwsTestServer ()
950
915
ts := httptest .NewServer (server )
951
- _ , err := neturl .Parse (ts .URL )
952
- if err != nil {
953
- t .Fatalf ("couldn't parse httptest servername" )
954
- }
916
+
955
917
server .WriteSecurityCredentials = func (w http.ResponseWriter , r * http.Request ) {
956
918
w .Write ([]byte ("{}" ))
957
919
}
@@ -983,10 +945,7 @@ func TestAWSCredential_RequestWithMissingCredential(t *testing.T) {
983
945
func TestAWSCredential_RequestWithIncompleteCredential (t * testing.T ) {
984
946
server := createDefaultAwsTestServer ()
985
947
ts := httptest .NewServer (server )
986
- _ , err := neturl .Parse (ts .URL )
987
- if err != nil {
988
- t .Fatalf ("couldn't parse httptest servername" )
989
- }
948
+
990
949
server .WriteSecurityCredentials = func (w http.ResponseWriter , r * http.Request ) {
991
950
w .Write ([]byte (`{"AccessKeyId":"FOOBARBAS"}` ))
992
951
}
@@ -1018,10 +977,6 @@ func TestAWSCredential_RequestWithIncompleteCredential(t *testing.T) {
1018
977
func TestAWSCredential_RequestWithNoCredentialURL (t * testing.T ) {
1019
978
server := createDefaultAwsTestServer ()
1020
979
ts := httptest .NewServer (server )
1021
- _ , err := neturl .Parse (ts .URL )
1022
- if err != nil {
1023
- t .Fatalf ("couldn't parse httptest servername" )
1024
- }
1025
980
1026
981
tfc := testFileConfig
1027
982
tfc .CredentialSource = server .getCredentialSource (ts .URL )
@@ -1051,10 +1006,6 @@ func TestAWSCredential_RequestWithNoCredentialURL(t *testing.T) {
1051
1006
func TestAWSCredential_RequestWithBadCredentialURL (t * testing.T ) {
1052
1007
server := createDefaultAwsTestServer ()
1053
1008
ts := httptest .NewServer (server )
1054
- _ , err := neturl .Parse (ts .URL )
1055
- if err != nil {
1056
- t .Fatalf ("couldn't parse httptest servername" )
1057
- }
1058
1009
server .WriteRolename = notFound
1059
1010
1060
1011
tfc := testFileConfig
@@ -1084,10 +1035,6 @@ func TestAWSCredential_RequestWithBadCredentialURL(t *testing.T) {
1084
1035
func TestAWSCredential_RequestWithBadFinalCredentialURL (t * testing.T ) {
1085
1036
server := createDefaultAwsTestServer ()
1086
1037
ts := httptest .NewServer (server )
1087
- _ , err := neturl .Parse (ts .URL )
1088
- if err != nil {
1089
- t .Fatalf ("couldn't parse httptest servername" )
1090
- }
1091
1038
server .WriteSecurityCredentials = notFound
1092
1039
1093
1040
tfc := testFileConfig
@@ -1117,10 +1064,6 @@ func TestAWSCredential_RequestWithBadFinalCredentialURL(t *testing.T) {
1117
1064
func TestAWSCredential_ShouldNotCallMetadataEndpointWhenCredsAreInEnv (t * testing.T ) {
1118
1065
server := createDefaultAwsTestServer ()
1119
1066
ts := httptest .NewServer (server )
1120
- _ , err := neturl .Parse (ts .URL )
1121
- if err != nil {
1122
- t .Fatalf ("couldn't parse httptest servername" )
1123
- }
1124
1067
1125
1068
metadataTs := httptest .NewServer (http .HandlerFunc (func (w http.ResponseWriter , r * http.Request ) {
1126
1069
t .Error ("Metadata server should not have been called." )
@@ -1169,10 +1112,6 @@ func TestAWSCredential_ShouldNotCallMetadataEndpointWhenCredsAreInEnv(t *testing
1169
1112
func TestAWSCredential_ShouldCallMetadataEndpointWhenNoRegion (t * testing.T ) {
1170
1113
server := createDefaultAwsTestServerWithImdsv2 (t )
1171
1114
ts := httptest .NewServer (server )
1172
- _ , err := neturl .Parse (ts .URL )
1173
- if err != nil {
1174
- t .Fatalf ("couldn't parse httptest servername" )
1175
- }
1176
1115
1177
1116
tfc := testFileConfig
1178
1117
tfc .CredentialSource = server .getCredentialSource (ts .URL )
@@ -1215,10 +1154,6 @@ func TestAWSCredential_ShouldCallMetadataEndpointWhenNoRegion(t *testing.T) {
1215
1154
func TestAWSCredential_ShouldCallMetadataEndpointWhenNoAccessKey (t * testing.T ) {
1216
1155
server := createDefaultAwsTestServerWithImdsv2 (t )
1217
1156
ts := httptest .NewServer (server )
1218
- _ , err := neturl .Parse (ts .URL )
1219
- if err != nil {
1220
- t .Fatalf ("couldn't parse httptest servername" )
1221
- }
1222
1157
1223
1158
tfc := testFileConfig
1224
1159
tfc .CredentialSource = server .getCredentialSource (ts .URL )
@@ -1261,10 +1196,6 @@ func TestAWSCredential_ShouldCallMetadataEndpointWhenNoAccessKey(t *testing.T) {
1261
1196
func TestAWSCredential_ShouldCallMetadataEndpointWhenNoSecretAccessKey (t * testing.T ) {
1262
1197
server := createDefaultAwsTestServerWithImdsv2 (t )
1263
1198
ts := httptest .NewServer (server )
1264
- _ , err := neturl .Parse (ts .URL )
1265
- if err != nil {
1266
- t .Fatalf ("couldn't parse httptest servername" )
1267
- }
1268
1199
1269
1200
tfc := testFileConfig
1270
1201
tfc .CredentialSource = server .getCredentialSource (ts .URL )
@@ -1303,61 +1234,3 @@ func TestAWSCredential_ShouldCallMetadataEndpointWhenNoSecretAccessKey(t *testin
1303
1234
t .Errorf ("subjectToken = \n %q\n want \n %q" , got , want )
1304
1235
}
1305
1236
}
1306
-
1307
- func TestAWSCredential_Validations (t * testing.T ) {
1308
- var metadataServerValidityTests = []struct {
1309
- name string
1310
- credSource CredentialSource
1311
- errText string
1312
- }{
1313
- {
1314
- name : "No Metadata Server URLs" ,
1315
- credSource : CredentialSource {
1316
- EnvironmentID : "aws1" ,
1317
- RegionURL : "" ,
1318
- URL : "" ,
1319
- IMDSv2SessionTokenURL : "" ,
1320
- },
1321
- }, {
1322
- name : "IPv4 Metadata Server URLs" ,
1323
- credSource : CredentialSource {
1324
- EnvironmentID : "aws1" ,
1325
- RegionURL : "http://169.254.169.254/latest/meta-data/placement/availability-zone" ,
1326
- URL : "http://169.254.169.254/latest/meta-data/iam/security-credentials" ,
1327
- IMDSv2SessionTokenURL : "http://169.254.169.254/latest/api/token" ,
1328
- },
1329
- }, {
1330
- name : "IPv6 Metadata Server URLs" ,
1331
- credSource : CredentialSource {
1332
- EnvironmentID : "aws1" ,
1333
- RegionURL : "http://[fd00:ec2::254]/latest/meta-data/placement/availability-zone" ,
1334
- URL : "http://[fd00:ec2::254]/latest/meta-data/iam/security-credentials" ,
1335
- IMDSv2SessionTokenURL : "http://[fd00:ec2::254]/latest/api/token" ,
1336
- },
1337
- },
1338
- }
1339
-
1340
- for _ , tt := range metadataServerValidityTests {
1341
- t .Run (tt .name , func (t * testing.T ) {
1342
- tfc := testFileConfig
1343
- tfc .CredentialSource = tt .credSource
1344
-
1345
- oldGetenv := getenv
1346
- defer func () { getenv = oldGetenv }()
1347
- getenv = setEnvironment (map [string ]string {})
1348
-
1349
- _ , err := tfc .parse (context .Background ())
1350
- if err != nil {
1351
- if tt .errText == "" {
1352
- t .Errorf ("Didn't expect an error, but got %v" , err )
1353
- } else if tt .errText != err .Error () {
1354
- t .Errorf ("Expected %v, but got %v" , tt .errText , err )
1355
- }
1356
- } else {
1357
- if tt .errText != "" {
1358
- t .Errorf ("Expected error %v, but got none" , tt .errText )
1359
- }
1360
- }
1361
- })
1362
- }
1363
- }
0 commit comments