From 676b1f9183363e8de31f85212e07dde1b4ced10d Mon Sep 17 00:00:00 2001 From: Sean O'Brien Date: Mon, 5 Aug 2024 16:56:03 -0400 Subject: [PATCH] update test values --- tests/Sts/StsClientTest.php | 20 ++++++++++---------- 1 file changed, 10 insertions(+), 10 deletions(-) diff --git a/tests/Sts/StsClientTest.php b/tests/Sts/StsClientTest.php index dfccb321d1..6e7fc00a76 100644 --- a/tests/Sts/StsClientTest.php +++ b/tests/Sts/StsClientTest.php @@ -133,7 +133,7 @@ public function testCanCreateCredentialsObjectFromStsResultWithFederatedUser() { $result = new Result([ 'FederatedUser' => [ - 'Arn' => 'arn:aws:iam::123456789000:user/test-user-1' + 'Arn' => 'arn:aws:iam::foobar:user/test-user-1' ], 'Credentials' => [ 'AccessKeyId' => 'foo', @@ -152,7 +152,7 @@ public function testCanCreateCredentialsObjectFromStsResultWithFederatedUser() $this->assertSame('foo', $credentials->getAccessKeyId()); $this->assertSame('bar', $credentials->getSecretKey()); $this->assertSame('baz', $credentials->getSecurityToken()); - $this->assertSame('123456789000', $credentials->getAccountId()); + $this->assertSame('foobar', $credentials->getAccountId()); $this->assertIsInt($credentials->getExpiration()); $this->assertFalse($credentials->isExpired()); } @@ -187,7 +187,7 @@ public function stsAssumeRoleOperationsDataProvider(): array 'response' => [ "AssumedRoleUser" => [ "AssumedRoleId" => "roleId", - "Arn" => "arn:aws:sts::123456789012:assumed-role/assume-role-integration-test-role/Name" + "Arn" => "arn:aws:sts::foobar:assumed-role/assume-role-integration-test-role/Name" ], "Credentials" => [ "AccessKeyId" => "foo", @@ -196,7 +196,7 @@ public function stsAssumeRoleOperationsDataProvider(): array ] ], 'expected' => [ - "accountId" => "123456789012", + "accountId" => "foobar", "accessKeyId" => "foo", "secretAccessKey" => "bar", "sessionToken" => "baz" @@ -245,7 +245,7 @@ public function stsAssumeRoleWithSAMLOperationsDataProvider(): array 'response' => [ "AssumedRoleUser" => [ "AssumedRoleId" => "roleId", - "Arn" => "arn:aws:sts::123456789012:assumed-role/assume-role-integration-test-role/Name" + "Arn" => "arn:aws:sts::foobar:assumed-role/assume-role-integration-test-role/Name" ], "Credentials" => [ "AccessKeyId" => "foo", @@ -254,7 +254,7 @@ public function stsAssumeRoleWithSAMLOperationsDataProvider(): array ] ], 'expected' => [ - "accountId" => "123456789012", + "accountId" => "foobar", "accessKeyId" => "foo", "secretAccessKey" => "bar", "sessionToken" => "baz" @@ -296,7 +296,7 @@ public function stsAssumeRoleWithWebIdentityOperationsDataProvider(): array 'response' => [ "AssumedRoleUser" => [ "AssumedRoleId" => "roleId", - "Arn" => "arn:aws:sts::123456789012:assumed-role/assume-role-integration-test-role/Name" + "Arn" => "arn:aws:sts::foobar:assumed-role/assume-role-integration-test-role/Name" ], "Credentials" => [ "AccessKeyId" => "foo", @@ -305,7 +305,7 @@ public function stsAssumeRoleWithWebIdentityOperationsDataProvider(): array ] ], 'expected' => [ - "accountId" => "123456789012", + "accountId" => "foobar", "accessKeyId" => "foo", "secretAccessKey" => "bar", "sessionToken" => "baz" @@ -352,7 +352,7 @@ public function stsGetFederationTokenOperationsDataProvider(): array 'response' => [ "FederatedUser" => [ "FederatedUserId" => "roleId", - "Arn" => "arn:aws:sts::123456789012:assumed-role/assume-role-integration-test-role/Name" + "Arn" => "arn:aws:sts::foobar:assumed-role/assume-role-integration-test-role/Name" ], "Credentials" => [ "AccessKeyId" => "foo", @@ -361,7 +361,7 @@ public function stsGetFederationTokenOperationsDataProvider(): array ] ], 'expected' => [ - "accountId" => "123456789012", + "accountId" => "foobar", "accessKeyId" => "foo", "secretAccessKey" => "bar", "sessionToken" => "baz"