From acb3bb85c9be885bc9edf007ae180dc86f718f20 Mon Sep 17 00:00:00 2001 From: Stephen Caldwell Date: Tue, 22 Nov 2016 09:35:27 -0800 Subject: [PATCH] sandbox environment variables correctly in test --- lib/plugins/aws/provider/awsProvider.test.js | 14 +++++++++++--- 1 file changed, 11 insertions(+), 3 deletions(-) diff --git a/lib/plugins/aws/provider/awsProvider.test.js b/lib/plugins/aws/provider/awsProvider.test.js index 4bde90a0f..11c167456 100644 --- a/lib/plugins/aws/provider/awsProvider.test.js +++ b/lib/plugins/aws/provider/awsProvider.test.js @@ -354,6 +354,13 @@ describe('AwsProvider', () => { }); it('should pay attention to AWS_SHARED_CREDENTIALS_FILE', () => { + const prevFileVal = process.env.AWS_SHARED_CREDENTIALS_FILE; + const prevProfile = process.env.AWS_PROFILE; + const prevStageProfile = process.env.AWS_TESTSTAGE_PROFILE; + delete process.env.AWS_SHARED_CREDENTIALS_FILE; + delete process.env.AWS_PROFILE; + delete process.env.AWS_TESTSTAGE_PROFILE; + // make up some fake credentials const tmpAccessKeyId = 'AABBCCDDEEFF'; const tmpSecretAccessKey = '0123456789876543'; @@ -368,7 +375,6 @@ describe('AwsProvider', () => { ); // set envar - const prevVal = process.env.AWS_SHARED_CREDENTIALS_FILE; process.env.AWS_SHARED_CREDENTIALS_FILE = tmpFilePath; // use profile defined in credentials file @@ -382,8 +388,10 @@ describe('AwsProvider', () => { secretAccessKey: tmpSecretAccessKey, }); - // Reset envar - process.env.AWS_SHARED_CREDENTIALS_FILE = prevVal; + // Reset envars + process.env.AWS_SHARED_CREDENTIALS_FILE = prevFileVal; + process.env.AWS_PROFILE = prevProfile; + process.env.AWS_TESTSTAGE_PROFILE = prevStageProfile; }); });