auth_test.go 18 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package auth
  13. import (
  14. "context"
  15. "strings"
  16. "testing"
  17. "time"
  18. "github.com/aws/aws-sdk-go-v2/aws"
  19. "github.com/aws/aws-sdk-go-v2/service/sts"
  20. ststypes "github.com/aws/aws-sdk-go-v2/service/sts/types"
  21. "github.com/stretchr/testify/assert"
  22. authv1 "k8s.io/api/authentication/v1"
  23. v1 "k8s.io/api/core/v1"
  24. metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
  25. clientfake "sigs.k8s.io/controller-runtime/pkg/client/fake"
  26. esv1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1"
  27. esmeta "github.com/external-secrets/external-secrets/apis/meta/v1"
  28. fakesess "github.com/external-secrets/external-secrets/pkg/provider/aws/auth/fake"
  29. )
  30. const (
  31. esNamespaceKey = "es-namespace"
  32. platformTeamNsKey = "platform-team-ns"
  33. myServiceAccountKey = "my-service-account"
  34. otherNsName = "other-ns"
  35. )
  36. func TestSTSResolver(t *testing.T) {
  37. endpointEnvKey := STSEndpointEnv
  38. endpointURL := "http://sts.foo"
  39. t.Setenv(endpointEnvKey, endpointURL)
  40. f, err := customEndpointResolver{}.ResolveEndpoint(context.Background(), sts.EndpointParameters{})
  41. assert.Nil(t, err)
  42. assert.Equal(t, endpointURL, f.URI.String())
  43. }
  44. func TestNewSession(t *testing.T) {
  45. rows := []TestSessionRow{
  46. {
  47. name: "nil store",
  48. expectErr: "found nil store",
  49. store: nil,
  50. },
  51. {
  52. name: "not store spec",
  53. expectErr: "storeSpec is missing provider",
  54. store: &esv1.SecretStore{},
  55. },
  56. {
  57. name: "store spec has no provider",
  58. expectErr: "storeSpec is missing provider",
  59. store: &esv1.SecretStore{
  60. Spec: esv1.SecretStoreSpec{},
  61. },
  62. },
  63. {
  64. name: "spec has no awssm field",
  65. expectErr: "Missing AWS field",
  66. store: &esv1.SecretStore{
  67. Spec: esv1.SecretStoreSpec{
  68. Provider: &esv1.SecretStoreProvider{},
  69. },
  70. },
  71. },
  72. {
  73. name: "configure aws using environment variables",
  74. store: &esv1.SecretStore{
  75. Spec: esv1.SecretStoreSpec{
  76. Provider: &esv1.SecretStoreProvider{
  77. AWS: &esv1.AWSProvider{},
  78. },
  79. },
  80. },
  81. env: map[string]string{
  82. "AWS_ACCESS_KEY_ID": "1111",
  83. "AWS_SECRET_ACCESS_KEY": "2222",
  84. },
  85. expectProvider: true,
  86. expectedKeyID: "1111",
  87. expectedSecretKey: "2222",
  88. },
  89. {
  90. name: "configure aws using environment variables + assume role",
  91. stsProvider: func(cfg aws.Config) STSprovider {
  92. return &fakesess.AssumeRoler{
  93. AssumeRoleFunc: func(input *sts.AssumeRoleInput) (*sts.AssumeRoleOutput, error) {
  94. assert.Equal(t, *input.RoleArn, "foo-bar-baz")
  95. return &sts.AssumeRoleOutput{
  96. AssumedRoleUser: &ststypes.AssumedRoleUser{
  97. Arn: aws.String("1123132"),
  98. AssumedRoleId: aws.String("xxxxx"),
  99. },
  100. Credentials: &ststypes.Credentials{
  101. AccessKeyId: aws.String("3333"),
  102. SecretAccessKey: aws.String("4444"),
  103. Expiration: aws.Time(time.Now().Add(time.Hour)),
  104. SessionToken: aws.String("6666"),
  105. },
  106. }, nil
  107. },
  108. }
  109. },
  110. store: &esv1.SecretStore{
  111. Spec: esv1.SecretStoreSpec{
  112. Provider: &esv1.SecretStoreProvider{
  113. AWS: &esv1.AWSProvider{
  114. Role: "foo-bar-baz",
  115. },
  116. },
  117. },
  118. },
  119. env: map[string]string{
  120. "AWS_ACCESS_KEY_ID": "1111",
  121. "AWS_SECRET_ACCESS_KEY": "2222",
  122. },
  123. expectProvider: true,
  124. expectedKeyID: "3333",
  125. expectedSecretKey: "4444",
  126. },
  127. {
  128. name: "error out when secret with credentials does not exist",
  129. namespace: "foo",
  130. store: &esv1.SecretStore{
  131. Spec: esv1.SecretStoreSpec{
  132. Provider: &esv1.SecretStoreProvider{
  133. AWS: &esv1.AWSProvider{
  134. Auth: esv1.AWSAuth{
  135. SecretRef: &esv1.AWSAuthSecretRef{
  136. AccessKeyID: esmeta.SecretKeySelector{
  137. Name: "othersecret",
  138. Key: "one",
  139. },
  140. SecretAccessKey: esmeta.SecretKeySelector{
  141. Name: "othersecret",
  142. Key: "two",
  143. },
  144. },
  145. },
  146. },
  147. },
  148. },
  149. },
  150. expectErr: `secrets "othersecret" not found`,
  151. },
  152. {
  153. name: "use credentials from secret to configure aws",
  154. namespace: "foo",
  155. store: &esv1.SecretStore{
  156. Spec: esv1.SecretStoreSpec{
  157. Provider: &esv1.SecretStoreProvider{
  158. AWS: &esv1.AWSProvider{
  159. Auth: esv1.AWSAuth{
  160. SecretRef: &esv1.AWSAuthSecretRef{
  161. AccessKeyID: esmeta.SecretKeySelector{
  162. Name: "onesecret",
  163. // Namespace is not set
  164. Key: "one",
  165. },
  166. SecretAccessKey: esmeta.SecretKeySelector{
  167. Name: "onesecret",
  168. // Namespace is not set
  169. Key: "two",
  170. },
  171. },
  172. },
  173. },
  174. },
  175. },
  176. },
  177. secrets: []v1.Secret{
  178. {
  179. ObjectMeta: metav1.ObjectMeta{
  180. Name: "onesecret",
  181. Namespace: "foo",
  182. },
  183. Data: map[string][]byte{
  184. "one": []byte("1111"),
  185. "two": []byte("2222"),
  186. },
  187. },
  188. },
  189. expectProvider: true,
  190. expectedKeyID: "1111",
  191. expectedSecretKey: "2222",
  192. },
  193. {
  194. name: "error out when secret key does not exist",
  195. namespace: "foo",
  196. store: &esv1.SecretStore{
  197. Spec: esv1.SecretStoreSpec{
  198. Provider: &esv1.SecretStoreProvider{
  199. AWS: &esv1.AWSProvider{
  200. Auth: esv1.AWSAuth{
  201. SecretRef: &esv1.AWSAuthSecretRef{
  202. AccessKeyID: esmeta.SecretKeySelector{
  203. Name: "brokensecret",
  204. Key: "one",
  205. },
  206. SecretAccessKey: esmeta.SecretKeySelector{
  207. Name: "brokensecret",
  208. Key: "two",
  209. },
  210. },
  211. },
  212. },
  213. },
  214. },
  215. },
  216. secrets: []v1.Secret{
  217. {
  218. ObjectMeta: metav1.ObjectMeta{
  219. Name: "brokensecret",
  220. Namespace: "foo",
  221. },
  222. Data: map[string][]byte{},
  223. },
  224. },
  225. expectErr: "could not fetch SecretAccessKey secret: cannot find secret data for key: \"two\"",
  226. },
  227. {
  228. name: "should not be able to access secrets from different namespace",
  229. namespace: "foo",
  230. store: &esv1.SecretStore{
  231. Spec: esv1.SecretStoreSpec{
  232. Provider: &esv1.SecretStoreProvider{
  233. AWS: &esv1.AWSProvider{
  234. Auth: esv1.AWSAuth{
  235. SecretRef: &esv1.AWSAuthSecretRef{
  236. AccessKeyID: esmeta.SecretKeySelector{
  237. Name: "onesecret",
  238. Namespace: aws.String("evil"), // this should not be possible!
  239. Key: "one",
  240. },
  241. SecretAccessKey: esmeta.SecretKeySelector{
  242. Name: "onesecret",
  243. Namespace: aws.String("evil"),
  244. Key: "two",
  245. },
  246. },
  247. },
  248. },
  249. },
  250. },
  251. },
  252. secrets: []v1.Secret{
  253. {
  254. ObjectMeta: metav1.ObjectMeta{
  255. Name: "onesecret",
  256. Namespace: "evil",
  257. },
  258. Data: map[string][]byte{
  259. "one": []byte("1111"),
  260. "two": []byte("2222"),
  261. },
  262. },
  263. },
  264. expectErr: `secrets "onesecret" not found`,
  265. },
  266. {
  267. name: "ClusterStore should use credentials from a specific namespace",
  268. namespace: esNamespaceKey,
  269. store: &esv1.ClusterSecretStore{
  270. TypeMeta: metav1.TypeMeta{
  271. APIVersion: esv1.ClusterSecretStoreKindAPIVersion,
  272. Kind: esv1.ClusterSecretStoreKind,
  273. },
  274. Spec: esv1.SecretStoreSpec{
  275. Provider: &esv1.SecretStoreProvider{
  276. AWS: &esv1.AWSProvider{
  277. Auth: esv1.AWSAuth{
  278. SecretRef: &esv1.AWSAuthSecretRef{
  279. AccessKeyID: esmeta.SecretKeySelector{
  280. Name: "onesecret",
  281. Namespace: aws.String(platformTeamNsKey),
  282. Key: "one",
  283. },
  284. SecretAccessKey: esmeta.SecretKeySelector{
  285. Name: "onesecret",
  286. Namespace: aws.String(platformTeamNsKey),
  287. Key: "two",
  288. },
  289. },
  290. },
  291. },
  292. },
  293. },
  294. },
  295. secrets: []v1.Secret{
  296. {
  297. ObjectMeta: metav1.ObjectMeta{
  298. Name: "onesecret",
  299. Namespace: platformTeamNsKey,
  300. },
  301. Data: map[string][]byte{
  302. "one": []byte("1111"),
  303. "two": []byte("2222"),
  304. },
  305. },
  306. },
  307. expectProvider: true,
  308. expectedKeyID: "1111",
  309. expectedSecretKey: "2222",
  310. },
  311. {
  312. name: "ClusterStore should use credentials from a ExternalSecret namespace (referentAuth)",
  313. namespace: esNamespaceKey,
  314. store: &esv1.ClusterSecretStore{
  315. TypeMeta: metav1.TypeMeta{
  316. APIVersion: esv1.ClusterSecretStoreKindAPIVersion,
  317. Kind: esv1.ClusterSecretStoreKind,
  318. },
  319. Spec: esv1.SecretStoreSpec{
  320. Provider: &esv1.SecretStoreProvider{
  321. AWS: &esv1.AWSProvider{
  322. Auth: esv1.AWSAuth{
  323. SecretRef: &esv1.AWSAuthSecretRef{
  324. AccessKeyID: esmeta.SecretKeySelector{
  325. Name: "onesecret",
  326. Key: "one",
  327. },
  328. SecretAccessKey: esmeta.SecretKeySelector{
  329. Name: "onesecret",
  330. Key: "two",
  331. },
  332. },
  333. },
  334. },
  335. },
  336. },
  337. },
  338. secrets: []v1.Secret{
  339. {
  340. ObjectMeta: metav1.ObjectMeta{
  341. Name: "onesecret",
  342. Namespace: esNamespaceKey,
  343. },
  344. Data: map[string][]byte{
  345. "one": []byte("7777"),
  346. "two": []byte("4444"),
  347. },
  348. },
  349. },
  350. expectProvider: true,
  351. expectedKeyID: "7777",
  352. expectedSecretKey: "4444",
  353. },
  354. {
  355. name: "jwt auth via cluster secret store",
  356. namespace: esNamespaceKey,
  357. sa: &v1.ServiceAccount{
  358. ObjectMeta: metav1.ObjectMeta{
  359. Name: myServiceAccountKey,
  360. Namespace: otherNsName,
  361. Annotations: map[string]string{
  362. roleARNAnnotation: "my-sa-role",
  363. },
  364. },
  365. },
  366. jwtProvider: func(name, namespace, roleArn string, aud []string, region string) (aws.CredentialsProvider, error) {
  367. assert.Equal(t, myServiceAccountKey, name)
  368. assert.Equal(t, otherNsName, namespace)
  369. assert.Equal(t, "my-sa-role", roleArn)
  370. return fakesess.CredentialsProvider{
  371. RetrieveFunc: func() (aws.Credentials, error) {
  372. return aws.Credentials{
  373. AccessKeyID: "3333",
  374. SecretAccessKey: "4444",
  375. SessionToken: "1234",
  376. Source: "fake",
  377. }, nil
  378. },
  379. }, nil
  380. },
  381. store: &esv1.ClusterSecretStore{
  382. TypeMeta: metav1.TypeMeta{
  383. APIVersion: esv1.ClusterSecretStoreKindAPIVersion,
  384. Kind: esv1.ClusterSecretStoreKind,
  385. },
  386. Spec: esv1.SecretStoreSpec{
  387. Provider: &esv1.SecretStoreProvider{
  388. AWS: &esv1.AWSProvider{
  389. Auth: esv1.AWSAuth{
  390. JWTAuth: &esv1.AWSJWTAuth{
  391. ServiceAccountRef: &esmeta.ServiceAccountSelector{
  392. Name: myServiceAccountKey,
  393. Namespace: aws.String(otherNsName),
  394. },
  395. },
  396. },
  397. },
  398. },
  399. },
  400. },
  401. expectProvider: true,
  402. expectedKeyID: "3333",
  403. expectedSecretKey: "4444",
  404. },
  405. {
  406. name: "configure aws using environment variables + assume role + check external id",
  407. stsProvider: func(cfg aws.Config) STSprovider {
  408. return &fakesess.AssumeRoler{
  409. AssumeRoleFunc: func(input *sts.AssumeRoleInput) (*sts.AssumeRoleOutput, error) {
  410. assert.Equal(t, *input.ExternalId, "12345678")
  411. return &sts.AssumeRoleOutput{
  412. AssumedRoleUser: &ststypes.AssumedRoleUser{
  413. Arn: aws.String("1123132"),
  414. AssumedRoleId: aws.String("xxxxx"),
  415. },
  416. Credentials: &ststypes.Credentials{
  417. AccessKeyId: aws.String("3333"),
  418. SecretAccessKey: aws.String("4444"),
  419. Expiration: aws.Time(time.Now().Add(time.Hour)),
  420. SessionToken: aws.String("6666"),
  421. },
  422. }, nil
  423. },
  424. }
  425. },
  426. store: &esv1.SecretStore{
  427. Spec: esv1.SecretStoreSpec{
  428. Provider: &esv1.SecretStoreProvider{
  429. AWS: &esv1.AWSProvider{
  430. Role: "foo-bar-baz",
  431. ExternalID: "12345678",
  432. },
  433. },
  434. },
  435. },
  436. env: map[string]string{
  437. "AWS_ACCESS_KEY_ID": "1111",
  438. "AWS_SECRET_ACCESS_KEY": "2222",
  439. },
  440. expectProvider: true,
  441. expectedKeyID: "3333",
  442. expectedSecretKey: "4444",
  443. },
  444. }
  445. for i := range rows {
  446. row := rows[i]
  447. t.Run(row.name, func(t *testing.T) {
  448. testRow(t, row)
  449. })
  450. }
  451. }
  452. type TestSessionRow struct {
  453. name string
  454. store esv1.GenericStore
  455. secrets []v1.Secret
  456. sa *v1.ServiceAccount
  457. jwtProvider jwtProviderFactory
  458. namespace string
  459. stsProvider STSProvider
  460. expectProvider bool
  461. expectErr string
  462. expectedKeyID string
  463. expectedSecretKey string
  464. env map[string]string
  465. }
  466. func testRow(t *testing.T, row TestSessionRow) {
  467. kc := clientfake.NewClientBuilder().Build()
  468. for i := range row.secrets {
  469. err := kc.Create(context.Background(), &row.secrets[i])
  470. assert.Nil(t, err)
  471. }
  472. for k, v := range row.env {
  473. t.Setenv(k, v)
  474. }
  475. if row.sa != nil {
  476. err := kc.Create(context.Background(), row.sa)
  477. assert.Nil(t, err)
  478. }
  479. err := kc.Create(context.Background(), &authv1.TokenRequest{
  480. ObjectMeta: metav1.ObjectMeta{
  481. Name: myServiceAccountKey,
  482. Namespace: otherNsName,
  483. },
  484. })
  485. assert.Nil(t, err)
  486. s, err := New(context.Background(), Opts{
  487. Store: row.store,
  488. Kube: kc,
  489. Namespace: row.namespace,
  490. AssumeRoler: row.stsProvider,
  491. JWTProvider: row.jwtProvider,
  492. })
  493. if !ErrorContains(err, row.expectErr) {
  494. t.Errorf("expected error %s but found %s", row.expectErr, err.Error())
  495. }
  496. // pass test on expected error
  497. if err != nil {
  498. return
  499. }
  500. if row.expectProvider && s == nil {
  501. t.Errorf("expected provider object, found nil")
  502. return
  503. }
  504. creds, _ := s.Credentials.Retrieve(context.Background())
  505. assert.Equal(t, row.expectedKeyID, creds.AccessKeyID)
  506. assert.Equal(t, row.expectedSecretKey, creds.SecretAccessKey)
  507. }
  508. func TestSMEnvCredentials(t *testing.T) {
  509. k8sClient := clientfake.NewClientBuilder().Build()
  510. t.Setenv("AWS_SECRET_ACCESS_KEY", "1111")
  511. t.Setenv("AWS_ACCESS_KEY_ID", "2222")
  512. s, err := New(context.Background(), Opts{
  513. Kube: k8sClient,
  514. Namespace: "example-ns",
  515. AssumeRoler: DefaultSTSProvider,
  516. Store: &esv1.SecretStore{
  517. Spec: esv1.SecretStoreSpec{
  518. Provider: &esv1.SecretStoreProvider{
  519. // defaults
  520. AWS: &esv1.AWSProvider{},
  521. },
  522. },
  523. },
  524. })
  525. assert.Nil(t, err)
  526. assert.NotNil(t, s)
  527. creds, err := s.Credentials.Retrieve(context.Background())
  528. assert.Nil(t, err)
  529. assert.Equal(t, creds.AccessKeyID, "2222")
  530. assert.Equal(t, creds.SecretAccessKey, "1111")
  531. }
  532. func TestSMAssumeRole(t *testing.T) {
  533. k8sClient := clientfake.NewClientBuilder().Build()
  534. sts := &fakesess.AssumeRoler{
  535. AssumeRoleFunc: func(input *sts.AssumeRoleInput) (*sts.AssumeRoleOutput, error) {
  536. if *input.RoleArn == "chained-role-1" {
  537. return &sts.AssumeRoleOutput{
  538. AssumedRoleUser: &ststypes.AssumedRoleUser{
  539. Arn: aws.String("1111111"),
  540. AssumedRoleId: aws.String("yyyyy1"),
  541. },
  542. Credentials: &ststypes.Credentials{
  543. AccessKeyId: aws.String("77771"),
  544. SecretAccessKey: aws.String("88881"),
  545. Expiration: aws.Time(time.Now().Add(time.Hour)),
  546. SessionToken: aws.String("99991"),
  547. },
  548. }, nil
  549. } else if *input.RoleArn == "chained-role-2" {
  550. return &sts.AssumeRoleOutput{
  551. AssumedRoleUser: &ststypes.AssumedRoleUser{
  552. Arn: aws.String("2222222"),
  553. AssumedRoleId: aws.String("yyyyy2"),
  554. },
  555. Credentials: &ststypes.Credentials{
  556. AccessKeyId: aws.String("77772"),
  557. SecretAccessKey: aws.String("88882"),
  558. Expiration: aws.Time(time.Now().Add(time.Hour)),
  559. SessionToken: aws.String("99992"),
  560. },
  561. }, nil
  562. } else {
  563. // make sure the correct role is passed in
  564. assert.Equal(t, *input.RoleArn, "my-awesome-role")
  565. return &sts.AssumeRoleOutput{
  566. AssumedRoleUser: &ststypes.AssumedRoleUser{
  567. Arn: aws.String("1123132"),
  568. AssumedRoleId: aws.String("xxxxx"),
  569. },
  570. Credentials: &ststypes.Credentials{
  571. AccessKeyId: aws.String("3333"),
  572. SecretAccessKey: aws.String("4444"),
  573. Expiration: aws.Time(time.Now().Add(time.Hour)),
  574. SessionToken: aws.String("6666"),
  575. },
  576. }, nil
  577. }
  578. },
  579. }
  580. t.Setenv("AWS_SECRET_ACCESS_KEY", "1111")
  581. t.Setenv("AWS_ACCESS_KEY_ID", "2222")
  582. s, err := New(context.Background(), Opts{
  583. Kube: k8sClient,
  584. Namespace: "example-ns",
  585. Store: &esv1.SecretStore{
  586. Spec: esv1.SecretStoreSpec{
  587. Provider: &esv1.SecretStoreProvider{
  588. // do assume role!
  589. AWS: &esv1.AWSProvider{
  590. Role: "my-awesome-role",
  591. AdditionalRoles: []string{"chained-role-1", "chained-role-2"},
  592. },
  593. },
  594. },
  595. },
  596. AssumeRoler: func(cfg aws.Config) STSprovider {
  597. // check if the correct temporary credentials were used
  598. creds, err := cfg.Credentials.Retrieve(context.Background())
  599. assert.Nil(t, err)
  600. if creds.SessionToken == "" {
  601. // called with credentials from envvars
  602. assert.Equal(t, creds.AccessKeyID, "2222")
  603. assert.Equal(t, creds.SecretAccessKey, "1111")
  604. } else if creds.SessionToken == "99991" {
  605. // called with chained role 1's credentials
  606. assert.Equal(t, creds.AccessKeyID, "77771")
  607. assert.Equal(t, creds.SecretAccessKey, "88881")
  608. } else {
  609. // called with chained role 2's credentials
  610. assert.Equal(t, creds.AccessKeyID, "77772")
  611. assert.Equal(t, creds.SecretAccessKey, "88882")
  612. }
  613. return sts
  614. },
  615. })
  616. assert.Nil(t, err)
  617. assert.NotNil(t, s)
  618. creds, err := s.Credentials.Retrieve(context.Background())
  619. assert.Nil(t, err)
  620. assert.Equal(t, creds.AccessKeyID, "3333")
  621. assert.Equal(t, creds.SecretAccessKey, "4444")
  622. }
  623. func ErrorContains(out error, want string) bool {
  624. if out == nil {
  625. return want == ""
  626. }
  627. if want == "" {
  628. return false
  629. }
  630. return strings.Contains(out.Error(), want)
  631. }