|
33 | 33 | LocalAttribute, |
34 | 34 | ) |
35 | 35 | from localstack.testing.aws.cloudformation_utils import load_template_file, render_template |
36 | | -from localstack.testing.aws.util import get_lambda_logs, is_aws_cloud |
| 36 | +from localstack.testing.aws.util import get_lambda_logs, is_aws_cloud, wait_for_user |
37 | 37 | from localstack.testing.config import ( |
38 | 38 | SECONDARY_TEST_AWS_ACCOUNT_ID, |
39 | 39 | SECONDARY_TEST_AWS_REGION_NAME, |
@@ -2396,13 +2396,15 @@ def _create_role_with_policy( |
2396 | 2396 |
|
2397 | 2397 |
|
2398 | 2398 | @pytest.fixture |
2399 | | -def create_user_with_policy(create_policy_generated_document, create_user, aws_client): |
2400 | | - def _create_user_with_policy(effect, actions, resource=None): |
| 2399 | +def create_user_with_policy(create_policy_generated_document, create_user, aws_client, region_name): |
| 2400 | + def _create_user_with_policy(effect, actions, resource=None, user_name=None): |
2401 | 2401 | policy_arn = create_policy_generated_document(effect, actions, resource=resource) |
2402 | | - username = f"user-{short_uid()}" |
| 2402 | + username = user_name or f"user-{short_uid()}" |
2403 | 2403 | create_user(UserName=username) |
2404 | 2404 | aws_client.iam.attach_user_policy(UserName=username, PolicyArn=policy_arn) |
2405 | 2405 | keys = aws_client.iam.create_access_key(UserName=username)["AccessKey"] |
| 2406 | + |
| 2407 | + wait_for_user(keys=keys, region_name=region_name) |
2406 | 2408 | return username, keys |
2407 | 2409 |
|
2408 | 2410 | return _create_user_with_policy |
|
0 commit comments