-
Notifications
You must be signed in to change notification settings - Fork 81
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge branch 'main' into fix/smoke-test-codegen
- Loading branch information
Showing
1 changed file
with
130 additions
and
0 deletions.
There are no files selected for viewing
130 changes: 130 additions & 0 deletions
130
...sts/Services/AWSSTSIntegrationTests/STSAssumeRoleAWSCredentialIdentityResolverTests.swift
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,130 @@ | ||
// | ||
// Copyright Amazon.com Inc. or its affiliates. | ||
// All Rights Reserved. | ||
// | ||
// SPDX-License-Identifier: Apache-2.0 | ||
// | ||
|
||
import Foundation | ||
import XCTest | ||
import AWSSTS | ||
import AWSIAM | ||
import AWSSDKIdentity | ||
import ClientRuntime | ||
|
||
class STSAssumeRoleAWSCredentialIdentityResolverTests: XCTestCase { | ||
private let region = "us-east-1" | ||
|
||
// MARK: - Clients, policies, and variables | ||
|
||
// STS client with only the STSAssumeRoleAWSCredentialIdentityResolver configured. | ||
private var assumeRoleStsClient: STSClient! | ||
private var assumeRoleStsConfig: STSClient.STSClientConfiguration! | ||
|
||
// Used to create temporary role assumed by STS assume role credentials provider. | ||
private var iamClient: IAMClient! | ||
private let roleName = "aws-sts-integration-test-\(UUID().uuidString.split(separator: "-").first!.lowercased())" | ||
private let roleSessionName = "aws-sts-integration-test-\(UUID().uuidString.split(separator: "-").first!.lowercased())" | ||
private var roleArn: String! | ||
|
||
// JSON assume role policy | ||
private func assumeRolePolicy(acctID: String) -> String { | ||
return """ | ||
{ | ||
"Version": "2012-10-17", | ||
"Statement": [ | ||
{ | ||
"Effect": "Allow", | ||
"Principal": { | ||
"AWS": "arn:aws:iam::\(acctID):root" | ||
}, | ||
"Action": "sts:AssumeRole" | ||
} | ||
] | ||
} | ||
""" | ||
} | ||
|
||
private let identityPolicyName = "temp-allow-STS-getCallerIdentity" | ||
// JSON identity policy | ||
private let roleIdentityPolicy = """ | ||
{"Version": "2012-10-17","Statement": [{"Sid": "","Effect": "Allow", | ||
"Action": "sts:GetCallerIdentity","Resource": "*"}]} | ||
""" | ||
|
||
// MARK: - Test case | ||
|
||
// Confirm STS assume role credentials provider works by validating response. | ||
func testGetCallerIdentity() async throws { | ||
let response = try await assumeRoleStsClient.getCallerIdentity( | ||
input: GetCallerIdentityInput() | ||
) | ||
|
||
// Ensure returned caller info aren't nil | ||
let account = try XCTUnwrap(response.account) | ||
let userId = try XCTUnwrap(response.userId) | ||
let arn = try XCTUnwrap(response.arn) | ||
|
||
// Ensure returned caller info aren't empty strings | ||
XCTAssertNotEqual(account, "") | ||
XCTAssertNotEqual(userId, "") | ||
XCTAssertNotEqual(arn, "") | ||
} | ||
|
||
// MARK: - Setup & teardown | ||
|
||
override func setUp() async throws { | ||
guard let acctID = try await STSClient(region: region).getCallerIdentity(input: GetCallerIdentityInput()).account else { | ||
throw AssumeRoleTestError.failedToGetAccountID("Failed to retrieve account ID for the test.") | ||
} | ||
|
||
// Create role with trust policy (assume role policy). | ||
iamClient = try IAMClient(region: region) | ||
roleArn = try await iamClient.createRole(input: CreateRoleInput( | ||
assumeRolePolicyDocument: assumeRolePolicy(acctID: acctID), | ||
roleName: roleName | ||
)).role?.arn | ||
// This wait is necessary for role creation to propagate everywhere | ||
let seconds = 10 | ||
let NSEC_PER_SEC = 1_000_000_000 | ||
try await Task.sleep(nanoseconds: UInt64(seconds * NSEC_PER_SEC)) | ||
|
||
// Attach identity policy to role. | ||
_ = try await iamClient.putRolePolicy(input: PutRolePolicyInput( | ||
policyDocument: roleIdentityPolicy, | ||
policyName: identityPolicyName, | ||
roleName: roleName | ||
)) | ||
|
||
// Construct STS client wih assume-role credentials provider. | ||
let underlyingResolver = try DefaultAWSCredentialIdentityResolverChain() | ||
let assumeRoleAWSCredentialIdentityResolver = try STSAssumeRoleAWSCredentialIdentityResolver( | ||
awsCredentialIdentityResolver: underlyingResolver, | ||
roleArn: roleArn, | ||
sessionName: roleSessionName | ||
) | ||
assumeRoleStsConfig = try await STSClient.STSClientConfiguration( | ||
awsCredentialIdentityResolver: assumeRoleAWSCredentialIdentityResolver, | ||
region: region | ||
) | ||
assumeRoleStsClient = STSClient(config: assumeRoleStsConfig) | ||
} | ||
|
||
override func tearDown() async throws { | ||
// Delete identity policy attached to role (inline policy). | ||
let policyName = try await iamClient.listRolePolicies(input: ListRolePoliciesInput(roleName: roleName)).policyNames | ||
_ = try await iamClient.deleteRolePolicy(input: DeleteRolePolicyInput( | ||
policyName: policyName?[0], roleName: roleName | ||
)) | ||
|
||
// Delete role | ||
_ = try? await iamClient.deleteRole(input: DeleteRoleInput(roleName: roleName)) | ||
} | ||
|
||
// MARK: - ERROR USED IN SETUP | ||
enum AssumeRoleTestError: Error { | ||
case failedToGetAccountID(String) | ||
} | ||
} | ||
|
||
|