forked from ekristen/aws-nuke
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathiam-user_mock_test.go
109 lines (89 loc) · 2.88 KB
/
iam-user_mock_test.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
package resources
import (
"context"
"testing"
"time"
"github.com/golang/mock/gomock"
"github.com/gotidy/ptr"
"github.com/stretchr/testify/assert"
"github.com/aws/aws-sdk-go/service/iam"
"github.com/ekristen/aws-nuke/v3/mocks/mock_iamiface"
)
func Test_Mock_IAMUser_List(t *testing.T) {
a := assert.New(t)
ctrl := gomock.NewController(t)
defer ctrl.Finish()
mockIAM := mock_iamiface.NewMockIAMAPI(ctrl)
mockIAM.EXPECT().GetUser(&iam.GetUserInput{
UserName: ptr.String("foo"),
}).Return(&iam.GetUserOutput{
User: &iam.User{
UserName: ptr.String("foo"),
},
}, nil)
mockIAM.EXPECT().ListUsersPages(gomock.Any(), gomock.Any()).
Do(func(_ *iam.ListUsersInput, fn func(page *iam.ListUsersOutput, lastPage bool) bool) {
fn(&iam.ListUsersOutput{
Users: []*iam.User{
{
UserName: ptr.String("foo"),
},
},
}, true)
}).Return(nil)
lister := IAMUserLister{
mockSvc: mockIAM,
}
resources, err := lister.List(context.TODO(), testListerOpts)
a.NoError(err)
a.Len(resources, 1)
}
func Test_Mock_IAMUser_Remove(t *testing.T) {
a := assert.New(t)
ctrl := gomock.NewController(t)
defer ctrl.Finish()
mockIAM := mock_iamiface.NewMockIAMAPI(ctrl)
mockIAM.EXPECT().DeleteUserPermissionsBoundary(&iam.DeleteUserPermissionsBoundaryInput{
UserName: ptr.String("foobar"),
}).Return(&iam.DeleteUserPermissionsBoundaryOutput{}, nil)
mockIAM.EXPECT().DeleteUser(gomock.Eq(&iam.DeleteUserInput{
UserName: ptr.String("foobar"),
})).Return(&iam.DeleteUserOutput{}, nil)
iamUser := IAMUser{
svc: mockIAM,
Name: ptr.String("foobar"),
HasPermissionBoundary: true,
}
err := iamUser.Remove(context.TODO())
a.Nil(err)
}
func Test_Mock_IAMUser_Properties(t *testing.T) {
a := assert.New(t)
now := time.Now().UTC()
iamUser := IAMUser{
Name: ptr.String("foo"),
Path: ptr.String("/foo"),
UserID: ptr.String("foobar"),
CreateDate: ptr.Time(now),
PasswordLastUsed: ptr.Time(now),
Tags: []*iam.Tag{
{
Key: ptr.String("foo"),
Value: ptr.String("bar"),
},
},
HasPermissionBoundary: true,
PermissionBoundaryARN: ptr.String("arn:aws:iam::123456789012:policy/foo"),
PermissionBoundaryType: ptr.String("PermissionsBoundary"),
}
a.Equal("foo", iamUser.String())
a.Equal("foobar", iamUser.Properties().Get("UserID"))
a.Equal("foo", iamUser.Properties().Get("Name"))
a.Equal("true", iamUser.Properties().Get("HasPermissionBoundary"))
a.Equal(now.Format(time.RFC3339), iamUser.Properties().Get("CreateDate"))
a.Equal(now.Format(time.RFC3339), iamUser.Properties().Get("PasswordLastUsed"))
a.Equal("arn:aws:iam::123456789012:policy/foo", iamUser.Properties().Get("PermissionBoundaryARN"))
a.Equal("PermissionsBoundary", iamUser.Properties().Get("PermissionBoundaryType"))
a.Equal("bar", iamUser.Properties().Get("tag:foo"))
a.Equal("/foo", iamUser.Properties().Get("Path"))
}