From b8707cbc7283275b22b3cb71566de7eb9c4c5133 Mon Sep 17 00:00:00 2001 From: thedoubl3j Date: Thu, 29 Aug 2024 16:16:41 -0400 Subject: [PATCH] add doc strings and adjust entry point in pyproject toml --- pyproject.toml | 2 +- tests/credential_plugins_test.py | 6 ++++++ 2 files changed, 7 insertions(+), 1 deletion(-) diff --git a/pyproject.toml b/pyproject.toml index deb318b1b9..1986c16574 100644 --- a/pyproject.toml +++ b/pyproject.toml @@ -71,7 +71,7 @@ x = "awx_plugins.credentials.x.api:XPlugin" [project.entry-points."awx.credential_plugins"] # pre-existing entry points group name x = "awx_plugins.credentials.x.api:XPlugin" # conjur = awx.main.credential_plugins.conjur:conjur_plugin -aws_assumerole = awx_plugins.credentials.aws_assumerole:aws_assumerole_plugin +"aws_assumerole = awx_plugins.credentials.aws_assumerole:aws_assumerole_plugin" [project.license] file = "LICENSE" diff --git a/tests/credential_plugins_test.py b/tests/credential_plugins_test.py index f406ffecee..99a8b091ea 100644 --- a/tests/credential_plugins_test.py +++ b/tests/credential_plugins_test.py @@ -133,6 +133,9 @@ def test_hashivault_handle_auth_not_enough_args(): def test_aws_assumerole_with_accesssecret(): + ''' + Test that the aws_assumerole_backend function call returns a token given the access_key and secret_key. + ''' kwargs = { 'access_key': 'my_access_key', 'secret_key': 'my_secret_key', @@ -166,6 +169,9 @@ def test_aws_assumerole_with_accesssecret(): def test_aws_assumerole_with_arnonly(): + ''' + Test backend function with only the role ARN provided. + ''' kwargs = { 'role_arn': 'the_arn', 'identifier': 'access_token',