@@ -56,6 +56,14 @@ func Test_Mock_KMSKey_List(t *testing.T) {
56
56
},
57
57
)
58
58
59
+ mockKMS .EXPECT ().ListAliases (& kms.ListAliasesInput {
60
+ KeyId : aws .String ("test-key-id" ),
61
+ }).Return (& kms.ListAliasesOutput {
62
+ Aliases : []* kms.AliasListEntry {
63
+ {AliasName : aws .String ("alias/test-key-id" )},
64
+ },
65
+ }, nil )
66
+
59
67
lister := KMSKeyLister {
60
68
mockSvc : mockKMS ,
61
69
}
@@ -123,6 +131,14 @@ func Test_Mock_KMSKey_List_WithAccessDenied(t *testing.T) {
123
131
},
124
132
)
125
133
134
+ mockKMS .EXPECT ().ListAliases (& kms.ListAliasesInput {
135
+ KeyId : aws .String ("test-key-id-1" ),
136
+ }).Return (& kms.ListAliasesOutput {
137
+ Aliases : []* kms.AliasListEntry {
138
+ {AliasName : aws .String ("alias/test-key-id-1" )},
139
+ },
140
+ }, nil )
141
+
126
142
lister := KMSKeyLister {
127
143
mockSvc : mockKMS ,
128
144
}
@@ -180,6 +196,7 @@ func Test_Mock_KMSKey_Properties(t *testing.T) {
180
196
ID : ptr .String ("test-key-id" ),
181
197
State : ptr .String (kms .KeyStateEnabled ),
182
198
Manager : ptr .String (kms .KeyManagerTypeCustomer ),
199
+ Alias : ptr .String ("alias/test-key-id" ),
183
200
Tags : []* kms.Tag {
184
201
{TagKey : aws .String ("Environment" ), TagValue : aws .String ("Test" )},
185
202
},
@@ -189,6 +206,7 @@ func Test_Mock_KMSKey_Properties(t *testing.T) {
189
206
assert .Equal (t , kms .KeyStateEnabled , kmsKey .Properties ().Get ("State" ))
190
207
assert .Equal (t , kms .KeyManagerTypeCustomer , kmsKey .Properties ().Get ("Manager" ))
191
208
assert .Equal (t , "Test" , kmsKey .Properties ().Get ("tag:Environment" ))
209
+ assert .Equal (t , "alias/test-key-id" , kmsKey .Properties ().Get ("Alias" ))
192
210
}
193
211
194
212
func Test_Mock_KMSKey_Remove (t * testing.T ) {
0 commit comments