@@ -21,15 +21,21 @@ SecretAccessKey=wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY
21
21
Token=AQoDYXdzEJr...<remainder of security token>
22
22
```
23
23
24
- If the driver supports user provided custom AWS credential providers, then the driver MUST also test the above scenarios
25
- 2-6 with a user provided ` AWS_CREDENTIAL_PROVIDER ` auth mechanism property. This value MUST be the default credential
26
- provider from the AWS SDK. If the default provider does not cover all scenarios above, those not covered MAY be skipped.
27
- In these tests the driver MUST also assert that the user provided credential provider was called at least once in each
28
- test.
29
-
30
- If the driver supports a custom AWS credential provider, it MUST verify the custom provider was used when testing. This
31
- may be via a custom function or object that wraps the calls to the custom provider and asserts that it was called at
32
- least once.
24
+ ## Testing custom credential providers
25
+
26
+ If the driver supports custom AWS credential providers, the driver MUST test the following:
27
+
28
+ Scenario 1 from the previous section where the ` ACCESS_KEY_ID ` and ` SECRET_ACCESS_KEY ` pair are provided as client
29
+ options, but are incorrect, and a custom ` AWS_CREDENTIAL_PROVIDER ` that returns the correct values for these two
30
+ properties.
31
+
32
+ Scenarios 2-6 from the previous section with a user provided ` AWS_CREDENTIAL_PROVIDER ` auth mechanism property. This
33
+ value MUST be the default credential provider from the AWS SDK. If the default provider does not cover all scenarios
34
+ above, those not covered MAY be skipped. In these tests the driver MUST also assert that the user provided credential
35
+ provider was called at least once in each test.
36
+
37
+ The driver MUST verify the custom provider was used when testing. This may be via a custom function or object that wraps
38
+ the calls to the custom provider and asserts that it was called at least once.
33
39
34
40
## Regular credentials
35
41
0 commit comments