func (s *AmazonServer) SetUp(c *gocheck.C) { auth, err := aws.EnvAuth() if err != nil { c.Fatal(err) } s.auth = auth }
func TestGetItemRange(t *testing.T) { if !*amazon { return } if !*amazon { t.Log("Amazon tests not enabled") return } auth, err := aws.EnvAuth() if err != nil { t.Log(err) t.FailNow() } server := dynamodb.Server{auth, aws.USEast} primary := dynamodb.NewStringAttribute("uuid_type", "") rangeK := dynamodb.NewNumericAttribute("time", "") key := dynamodb.PrimaryKey{primary, rangeK} table := server.NewTable("production_storyarc-accelerator-analytics", key) item, err := table.GetItem(&dynamodb.Key{HashKey: "aee5df14-6961-4baa-bad1-a1150576594f_MISSES", RangeKey: "1348187524"}) if err != nil { t.Log(err) t.FailNow() } fmt.Printf("Item : %s\n", item) }
func ExampleV4Signer() { // Get auth from env vars auth, err := aws.EnvAuth() if err != nil { fmt.Println(err) } // Create a signer with the auth, name of the service, and aws region signer := aws.NewV4Signer(auth, "dynamodb", aws.USEast) // Create a request req, err := http.NewRequest("POST", aws.USEast.DynamoDBEndpoint, strings.NewReader("sample_request")) if err != nil { fmt.Println(err) } // Date or x-amz-date header is required to sign a request req.Header.Add("Date", time.Now().UTC().Format(http.TimeFormat)) // Sign the request signer.Sign(req) // Issue signed request http.DefaultClient.Do(req) }
func TestGetItem(t *testing.T) { if !*amazon { t.Log("Amazon tests not enabled") return } auth, err := aws.EnvAuth() if err != nil { t.Log(err) t.FailNow() } server := dynamodb.Server{auth, aws.USEast} primary := dynamodb.NewStringAttribute("domain", "") key := dynamodb.PrimaryKey{primary, nil} table := server.NewTable("production_storyarc-accelerator-sites", key) item, err := table.GetItem(&dynamodb.Key{HashKey: "ac-news.speedup.storytellerhq.com"}) if err != nil { t.Log(err) t.FailNow() } fmt.Printf("Item : %s\n", item) }
func TestListTables(t *testing.T) { if !*amazon { t.Log("Amazon tests not enabled") return } auth, err := aws.EnvAuth() if err != nil { t.Log(err) t.FailNow() } server := dynamodb.Server{auth, aws.USEast} tables, err := server.ListTables() if err != nil { t.Error(err.Error()) } if len(tables) == 0 { t.Log("Expected table to be returned") t.FailNow() } fmt.Printf("tables %s\n", tables) }
func (s *S) TestEnvAuthAlt(c *gocheck.C) { os.Clearenv() os.Setenv("AWS_SECRET_KEY", "secret") os.Setenv("AWS_ACCESS_KEY", "access") auth, err := aws.EnvAuth() c.Assert(err, gocheck.IsNil) c.Assert(auth, gocheck.Equals, aws.Auth{SecretKey: "secret", AccessKey: "access"}) }
func (s *LiveSuite) SetUpSuite(c *gocheck.C) { if !Amazon { c.Skip("amazon tests not enabled (-amazon flag)") } auth, err := aws.EnvAuth() if err != nil { c.Fatal(err.Error()) } s.auth = auth }
func (s *SuiteI) SetUpSuite(c *gocheck.C) { if !*integration { c.Skip("Integration tests not enabled (-i flag)") } auth, err := aws.EnvAuth() if err != nil { c.Fatal(err.Error()) } s.auth = auth }
func (s *S) TestEnvAuthNoAccess(c *gocheck.C) { os.Clearenv() os.Setenv("AWS_SECRET_ACCESS_KEY", "foo") _, err := aws.EnvAuth() c.Assert(err, gocheck.ErrorMatches, "AWS_ACCESS_KEY_ID or AWS_ACCESS_KEY not found in environment") }
func (s *S) TestEnvAuthNoSecret(c *gocheck.C) { os.Clearenv() _, err := aws.EnvAuth() c.Assert(err, gocheck.ErrorMatches, "AWS_SECRET_ACCESS_KEY or AWS_SECRET_KEY not found in environment") }