src/test/scala/org/embulk/input/dynamodb/AwsCredentialsTest.scala in embulk-input-dynamodb-0.3.0 vs src/test/scala/org/embulk/input/dynamodb/AwsCredentialsTest.scala in embulk-input-dynamodb-0.3.1

- old
+ new

@@ -4,11 +4,11 @@ import org.embulk.config.{ConfigException, ConfigSource} import org.embulk.input.dynamodb.aws.AwsCredentials import org.embulk.input.dynamodb.testutil.EmbulkTestBase import org.hamcrest.CoreMatchers._ import org.hamcrest.MatcherAssert.assertThat -import org.junit.{Assume, Test} +import org.junit.{Assert, Test} class AwsCredentialsTest extends EmbulkTestBase { private val runAwsCredentialsTest: Boolean = Option( System.getenv("RUN_AWS_CREDENTIALS_TEST") @@ -42,147 +42,150 @@ assertThat(cred.getAWSAccessKeyId, notNullValue()) assertThat(cred.getAWSSecretKey, notNullValue()) } def defaultInConfig: ConfigSource = { - embulk.configLoader().fromYamlString(s""" - |type: dynamodb - |region: us-east-1 - |table: hoge - |operation: scan - |columns: - | - {name: key1, type: string} - | - {name: key2, type: long} - | - {name: value1, type: string} - |""".stripMargin) + loadConfigSourceFromYamlString(s""" + |type: dynamodb + |region: us-east-1 + |table: hoge + |operation: scan + |columns: + | - {name: key1, type: string} + | - {name: key2, type: long} + | - {name: value1, type: string} + |""".stripMargin) } @deprecated(since = "0.3.0") @Test - def notSetAuthMethod_SetCredentials_deprecated(): Unit = { - Assume.assumeTrue(runAwsCredentialsTest) - val inConfig: ConfigSource = defaultInConfig - .set("access_key", EMBULK_DYNAMODB_TEST_ACCESS_KEY) - .set("secret_key", EMBULK_DYNAMODB_TEST_SECRET_KEY) + def notSetAuthMethod_SetCredentials_deprecated(): Unit = + if (runAwsCredentialsTest) { + val inConfig: ConfigSource = defaultInConfig + .set("access_key", EMBULK_DYNAMODB_TEST_ACCESS_KEY) + .set("secret_key", EMBULK_DYNAMODB_TEST_SECRET_KEY) - doTest(inConfig) - } + doTest(inConfig) + } @Test - def notSetAuthMethod_SetCredentials(): Unit = { - Assume.assumeTrue(runAwsCredentialsTest) + def notSetAuthMethod_SetCredentials(): Unit = if (runAwsCredentialsTest) { val inConfig: ConfigSource = defaultInConfig .set("access_key_id", EMBULK_DYNAMODB_TEST_ACCESS_KEY) .set("secret_access_key", EMBULK_DYNAMODB_TEST_SECRET_KEY) doTest(inConfig) } @deprecated(since = "0.3.0") @Test - def setAuthMethod_Basic_deprecated(): Unit = { - Assume.assumeTrue(runAwsCredentialsTest) + def setAuthMethod_Basic_deprecated(): Unit = if (runAwsCredentialsTest) { val inConfig: ConfigSource = defaultInConfig .set("auth_method", "basic") .set("access_key", EMBULK_DYNAMODB_TEST_ACCESS_KEY) .set("secret_key", EMBULK_DYNAMODB_TEST_SECRET_KEY) doTest(inConfig) } @Test - def setAuthMethod_Basic(): Unit = { - Assume.assumeTrue(runAwsCredentialsTest) + def setAuthMethod_Basic(): Unit = if (runAwsCredentialsTest) { val inConfig: ConfigSource = defaultInConfig .set("auth_method", "basic") .set("access_key_id", EMBULK_DYNAMODB_TEST_ACCESS_KEY) .set("secret_access_key", EMBULK_DYNAMODB_TEST_SECRET_KEY) doTest(inConfig) } @deprecated(since = "0.3.0") - @Test(expected = classOf[ConfigException]) - def throwIfSetAccessKeyAndAccessKeyId(): Unit = { - Assume.assumeTrue(runAwsCredentialsTest) + @Test + def throwIfSetAccessKeyAndAccessKeyId(): Unit = if (runAwsCredentialsTest) { val inConfig: ConfigSource = defaultInConfig .set("auth_method", "basic") .set("access_key", EMBULK_DYNAMODB_TEST_ACCESS_KEY) .set("access_key_id", EMBULK_DYNAMODB_TEST_ACCESS_KEY) .set("secret_key", EMBULK_DYNAMODB_TEST_SECRET_KEY) - doTest(inConfig) + Assert.assertThrows(classOf[ConfigException], () => { + doTest(inConfig) + }) } @deprecated(since = "0.3.0") - @Test(expected = classOf[ConfigException]) - def throwIfSetSecretKeyAndSecretAccessKeyId(): Unit = { - Assume.assumeTrue(runAwsCredentialsTest) - val inConfig: ConfigSource = defaultInConfig - .set("auth_method", "basic") - .set("access_key", EMBULK_DYNAMODB_TEST_ACCESS_KEY) - .set("secret_key", EMBULK_DYNAMODB_TEST_SECRET_KEY) - .set("secret_access_key", EMBULK_DYNAMODB_TEST_SECRET_KEY) + @Test + def throwIfSetSecretKeyAndSecretAccessKeyId(): Unit = + if (runAwsCredentialsTest) { + val inConfig: ConfigSource = defaultInConfig + .set("auth_method", "basic") + .set("access_key", EMBULK_DYNAMODB_TEST_ACCESS_KEY) + .set("secret_key", EMBULK_DYNAMODB_TEST_SECRET_KEY) + .set("secret_access_key", EMBULK_DYNAMODB_TEST_SECRET_KEY) - doTest(inConfig) - } + Assert.assertThrows(classOf[ConfigException], () => { + doTest(inConfig) + }) + } - @Test(expected = classOf[ConfigException]) + @Test def setAuthMethod_Basic_NotSet(): Unit = { val inConfig: ConfigSource = defaultInConfig .set("auth_method", "basic") - doTest(inConfig) + Assert.assertThrows(classOf[ConfigException], () => { + doTest(inConfig) + }) } @Test - def setAuthMethod_Env(): Unit = { - Assume.assumeTrue(runAwsCredentialsTest) + def setAuthMethod_Env(): Unit = if (runAwsCredentialsTest) { // NOTE: Requires to set the env vars like 'AWS_ACCESS_KEY_ID' and so on when testing. val inConfig: ConfigSource = defaultInConfig .set("auth_method", "env") doTest(inConfig) } @Test - def setAuthMethod_Profile(): Unit = { - Assume.assumeTrue(runAwsCredentialsTest) + def setAuthMethod_Profile(): Unit = if (runAwsCredentialsTest) { // NOTE: Requires to set credentials to '~/.aws' when testing. val inConfig: ConfigSource = defaultInConfig .set("auth_method", "profile") .set("profile_name", EMBULK_DYNAMODB_TEST_PROFILE_NAME) doTest(inConfig) } - @Test(expected = classOf[IllegalArgumentException]) + @Test def setAuthMethod_Profile_NotExistProfileName(): Unit = { val inConfig: ConfigSource = defaultInConfig .set("auth_method", "profile") .set("profile_name", "DO_NOT_EXIST") - doTest(inConfig) + Assert.assertThrows(classOf[IllegalArgumentException], () => { + doTest(inConfig) + }) } @Test - def setAuthMethod_assume_role(): Unit = { - Assume.assumeTrue(runAwsCredentialsTest) + def setAuthMethod_assume_role(): Unit = if (runAwsCredentialsTest) { val inConfig: ConfigSource = defaultInConfig .set("auth_method", "assume_role") .set("role_arn", EMBULK_DYNAMODB_TEST_ASSUME_ROLE_ROLE_ARN) .set("role_session_name", "dummy") doTest(inConfig) } - @Test(expected = classOf[AWSSecurityTokenServiceException]) - def setAuthMethod_assume_role_NotExistRoleArn(): Unit = { - Assume.assumeTrue(runAwsCredentialsTest) - val inConfig: ConfigSource = defaultInConfig - .set("auth_method", "assume_role") - .set("role_arn", "DO_NOT_EXIST") - .set("role_session_name", "dummy") + @Test + def setAuthMethod_assume_role_NotExistRoleArn(): Unit = + if (runAwsCredentialsTest) { + val inConfig: ConfigSource = defaultInConfig + .set("auth_method", "assume_role") + .set("role_arn", "DO_NOT_EXIST") + .set("role_session_name", "dummy") - doTest(inConfig) - } + Assert.assertThrows(classOf[AWSSecurityTokenServiceException], () => { + doTest(inConfig) + }) + } }