|
1 | 1 | import pytest |
| 2 | +from mock import patch |
2 | 3 |
|
| 4 | +from pre_commit_hooks.detect_aws_credentials import get_aws_credential_files_from_env |
| 5 | +from pre_commit_hooks.detect_aws_credentials import get_aws_secrets_from_env |
| 6 | +from pre_commit_hooks.detect_aws_credentials import get_aws_secrets_from_file |
3 | 7 | from pre_commit_hooks.detect_aws_credentials import main |
4 | 8 | from testing.util import get_resource_path |
5 | 9 |
|
6 | 10 |
|
7 | | -# Input filename, expected return value |
8 | | -TESTS = ( |
9 | | - ('with_no_secrets.txt', 0), |
10 | | - ('with_secrets.txt', 1), |
11 | | - ('nonsense.txt', 0), |
12 | | - ('ok_json.json', 0), |
| 11 | +@pytest.mark.parametrize( |
| 12 | + ('env_vars', 'values'), |
| 13 | + ( |
| 14 | + ({}, set()), |
| 15 | + ({'AWS_DUMMY_KEY': '/foo'}, set()), |
| 16 | + ({'AWS_CONFIG_FILE': '/foo'}, {'/foo'}), |
| 17 | + ({'AWS_CREDENTIAL_FILE': '/foo'}, {'/foo'}), |
| 18 | + ({'AWS_SHARED_CREDENTIALS_FILE': '/foo'}, {'/foo'}), |
| 19 | + ({'BOTO_CONFIG': '/foo'}, {'/foo'}), |
| 20 | + ({'AWS_DUMMY_KEY': '/foo', 'AWS_CONFIG_FILE': '/bar'}, {'/bar'}), |
| 21 | + ( |
| 22 | + { |
| 23 | + 'AWS_DUMMY_KEY': '/foo', 'AWS_CONFIG_FILE': '/bar', |
| 24 | + 'AWS_CREDENTIAL_FILE': '/baz' |
| 25 | + }, |
| 26 | + {'/bar', '/baz'} |
| 27 | + ), |
| 28 | + ( |
| 29 | + { |
| 30 | + 'AWS_CONFIG_FILE': '/foo', 'AWS_CREDENTIAL_FILE': '/bar', |
| 31 | + 'AWS_SHARED_CREDENTIALS_FILE': '/baz' |
| 32 | + }, |
| 33 | + {'/foo', '/bar', '/baz'} |
| 34 | + ), |
| 35 | + ), |
13 | 36 | ) |
| 37 | +def test_get_aws_credentials_file_from_env(env_vars, values): |
| 38 | + """Test that reading credential files names from environment variables works.""" |
| 39 | + with patch.dict('os.environ', env_vars, clear=True): |
| 40 | + assert get_aws_credential_files_from_env() == values |
14 | 41 |
|
15 | 42 |
|
16 | | -@pytest.mark.parametrize(('filename', 'expected_retval'), TESTS) |
| 43 | +@pytest.mark.parametrize( |
| 44 | + ('env_vars', 'values'), |
| 45 | + ( |
| 46 | + ({}, set()), |
| 47 | + ({'AWS_DUMMY_KEY': 'foo'}, set()), |
| 48 | + ({'AWS_SECRET_ACCESS_KEY': 'foo'}, {'foo'}), |
| 49 | + ({'AWS_SECURITY_TOKEN': 'foo'}, {'foo'}), |
| 50 | + ({'AWS_SESSION_TOKEN': 'foo'}, {'foo'}), |
| 51 | + ({'AWS_DUMMY_KEY': 'foo', 'AWS_SECRET_ACCESS_KEY': 'bar'}, {'bar'}), |
| 52 | + ( |
| 53 | + {'AWS_SECRET_ACCESS_KEY': 'foo', 'AWS_SECURITY_TOKEN': 'bar'}, |
| 54 | + {'foo', 'bar'} |
| 55 | + ), |
| 56 | + ), |
| 57 | +) |
| 58 | +def test_get_aws_secrets_from_env(env_vars, values): |
| 59 | + """Test that reading secrets from environment variables works.""" |
| 60 | + with patch.dict('os.environ', env_vars, clear=True): |
| 61 | + assert get_aws_secrets_from_env() == values |
| 62 | + |
| 63 | + |
| 64 | +@pytest.mark.parametrize( |
| 65 | + ('filename', 'expected_keys'), |
| 66 | + ( |
| 67 | + ( |
| 68 | + 'aws_config_with_secret.ini', |
| 69 | + {'z2rpgs5uit782eapz5l1z0y2lurtsyyk6hcfozlb'} |
| 70 | + ), |
| 71 | + ('aws_config_with_session_token.ini', {'foo'}), |
| 72 | + ('aws_config_with_secret_and_session_token.ini', |
| 73 | + {'z2rpgs5uit782eapz5l1z0y2lurtsyyk6hcfozlb', 'foo'}), |
| 74 | + ( |
| 75 | + 'aws_config_with_multiple_sections.ini', |
| 76 | + { |
| 77 | + '7xebzorgm5143ouge9gvepxb2z70bsb2rtrh099e', |
| 78 | + 'z2rpgs5uit782eapz5l1z0y2lurtsyyk6hcfozlb', |
| 79 | + 'ixswosj8gz3wuik405jl9k3vdajsnxfhnpui38ez', |
| 80 | + 'foo' |
| 81 | + } |
| 82 | + ), |
| 83 | + ('aws_config_without_secrets.ini', set()), |
| 84 | + ('nonsense.txt', set()), |
| 85 | + ('ok_json.json', set()), |
| 86 | + ), |
| 87 | +) |
| 88 | +def test_get_aws_secrets_from_file(filename, expected_keys): |
| 89 | + """Test that reading secrets from files works.""" |
| 90 | + keys = get_aws_secrets_from_file(get_resource_path(filename)) |
| 91 | + assert keys == expected_keys |
| 92 | + |
| 93 | + |
| 94 | +@pytest.mark.parametrize( |
| 95 | + ('filename', 'expected_retval'), |
| 96 | + ( |
| 97 | + ('aws_config_with_secret.ini', 1), |
| 98 | + ('aws_config_with_session_token.ini', 1), |
| 99 | + ('aws_config_with_multiple_sections.ini', 1), |
| 100 | + ('aws_config_without_secrets.ini', 0), |
| 101 | + ('nonsense.txt', 0), |
| 102 | + ('ok_json.json', 0), |
| 103 | + ), |
| 104 | +) |
17 | 105 | def test_detect_aws_credentials(filename, expected_retval): |
| 106 | + """Test if getting configured AWS secrets from files to be checked in works.""" |
| 107 | + |
18 | 108 | # with a valid credentials file |
19 | 109 | ret = main(( |
20 | 110 | get_resource_path(filename), |
21 | | - "--credentials-file=testing/resources/sample_aws_credentials", |
| 111 | + "--credentials-file=testing/resources/aws_config_with_multiple_sections.ini", |
22 | 112 | )) |
23 | 113 | assert ret == expected_retval |
24 | 114 |
|
25 | 115 |
|
26 | | -def test_non_existent_credentials(capsys): |
27 | | - # with a non-existent credentials file |
| 116 | +@patch('pre_commit_hooks.detect_aws_credentials.get_aws_secrets_from_file') |
| 117 | +@patch('pre_commit_hooks.detect_aws_credentials.get_aws_secrets_from_env') |
| 118 | +def test_non_existent_credentials(mock_secrets_env, mock_secrets_file, capsys): |
| 119 | + """Test behavior with no configured AWS secrets.""" |
| 120 | + mock_secrets_env.return_value = set() |
| 121 | + mock_secrets_file.return_value = set() |
28 | 122 | ret = main(( |
29 | | - get_resource_path('with_secrets.txt'), |
| 123 | + get_resource_path('aws_config_without_secrets.ini'), |
30 | 124 | "--credentials-file=testing/resources/credentailsfilethatdoesntexist" |
31 | 125 | )) |
32 | 126 | assert ret == 2 |
33 | 127 | out, _ = capsys.readouterr() |
34 | 128 | assert out == ( |
35 | | - 'No aws keys were configured at ' |
36 | | - 'testing/resources/credentailsfilethatdoesntexist\n' |
37 | | - 'Configure them with --credentials-file\n' |
| 129 | + 'No AWS keys were found in the configured credential files ' |
| 130 | + 'and environment variables.\nPlease ensure you have the ' |
| 131 | + 'correct setting for --credentials-file\n' |
38 | 132 | ) |
0 commit comments