2020-10-06 05:54:49 +00:00
|
|
|
import pytest
|
2018-03-21 16:10:38 +00:00
|
|
|
from botocore.exceptions import ClientError
|
2014-08-25 22:09:38 +00:00
|
|
|
|
2016-05-12 20:36:09 +00:00
|
|
|
import boto3
|
2023-03-07 00:21:02 +00:00
|
|
|
import json
|
2021-10-18 19:44:29 +00:00
|
|
|
import sure # noqa # pylint: disable=unused-import
|
2021-10-05 17:11:07 +00:00
|
|
|
import random
|
2013-02-22 04:13:01 +00:00
|
|
|
|
2022-06-10 12:05:10 +00:00
|
|
|
from moto import mock_ec2, settings
|
|
|
|
from unittest import SkipTest
|
2021-10-05 17:11:07 +00:00
|
|
|
from uuid import uuid4
|
|
|
|
from .test_tags import retrieve_all_tagged
|
2013-02-22 04:13:01 +00:00
|
|
|
|
2014-09-30 14:29:50 +00:00
|
|
|
SAMPLE_DOMAIN_NAME = "example.com"
|
|
|
|
SAMPLE_NAME_SERVERS = ["10.0.0.6", "10.0.0.7"]
|
|
|
|
|
2013-02-22 04:13:01 +00:00
|
|
|
|
2022-06-10 12:05:10 +00:00
|
|
|
@mock_ec2
|
|
|
|
def test_creating_a_vpc_in_empty_region_does_not_make_this_vpc_the_default():
|
|
|
|
if settings.TEST_SERVER_MODE:
|
|
|
|
raise SkipTest("Lets not start deleting VPC's while other tests are using it")
|
|
|
|
# Delete VPC that's created by default
|
|
|
|
client = boto3.client("ec2", region_name="eu-north-1")
|
|
|
|
all_vpcs = retrieve_all_vpcs(client)
|
|
|
|
for vpc in all_vpcs:
|
|
|
|
client.delete_vpc(VpcId=vpc["VpcId"])
|
|
|
|
# create vpc
|
|
|
|
client.create_vpc(CidrBlock="10.0.0.0/16")
|
|
|
|
# verify this is not the default
|
|
|
|
all_vpcs = retrieve_all_vpcs(client)
|
|
|
|
all_vpcs.should.have.length_of(1)
|
|
|
|
all_vpcs[0].should.have.key("IsDefault").equals(False)
|
|
|
|
|
|
|
|
|
|
|
|
@mock_ec2
|
|
|
|
def test_create_default_vpc():
|
|
|
|
if settings.TEST_SERVER_MODE:
|
|
|
|
raise SkipTest("Lets not start deleting VPC's while other tests are using it")
|
|
|
|
# Delete VPC that's created by default
|
|
|
|
client = boto3.client("ec2", region_name="eu-north-1")
|
|
|
|
all_vpcs = retrieve_all_vpcs(client)
|
|
|
|
for vpc in all_vpcs:
|
|
|
|
client.delete_vpc(VpcId=vpc["VpcId"])
|
|
|
|
# create default vpc
|
|
|
|
client.create_default_vpc()
|
|
|
|
# verify this is the default
|
|
|
|
all_vpcs = retrieve_all_vpcs(client)
|
|
|
|
all_vpcs.should.have.length_of(1)
|
|
|
|
all_vpcs[0].should.have.key("IsDefault").equals(True)
|
|
|
|
|
|
|
|
|
|
|
|
@mock_ec2
|
|
|
|
def test_create_multiple_default_vpcs():
|
|
|
|
client = boto3.client("ec2", region_name="eu-north-1")
|
|
|
|
with pytest.raises(ClientError) as exc:
|
|
|
|
client.create_default_vpc()
|
|
|
|
err = exc.value.response["Error"]
|
|
|
|
err["Code"].should.equal("DefaultVpcAlreadyExists")
|
|
|
|
err["Message"].should.equal(
|
|
|
|
"A Default VPC already exists for this account in this region."
|
|
|
|
)
|
|
|
|
|
|
|
|
|
2021-09-25 11:13:07 +00:00
|
|
|
@mock_ec2
|
|
|
|
def test_create_and_delete_vpc():
|
|
|
|
ec2 = boto3.resource("ec2", region_name="eu-north-1")
|
|
|
|
client = boto3.client("ec2", region_name="eu-north-1")
|
|
|
|
vpc = ec2.create_vpc(CidrBlock="10.0.0.0/16")
|
|
|
|
vpc.cidr_block.should.equal("10.0.0.0/16")
|
|
|
|
|
2021-10-05 17:11:07 +00:00
|
|
|
all_vpcs = retrieve_all_vpcs(client)
|
|
|
|
[v["VpcId"] for v in all_vpcs].should.contain(vpc.id)
|
2021-09-25 11:13:07 +00:00
|
|
|
|
|
|
|
vpc.delete()
|
|
|
|
|
2021-10-05 17:11:07 +00:00
|
|
|
all_vpcs = retrieve_all_vpcs(client)
|
|
|
|
[v["VpcId"] for v in all_vpcs].shouldnt.contain(vpc.id)
|
2021-09-25 11:13:07 +00:00
|
|
|
|
|
|
|
with pytest.raises(ClientError) as ex:
|
|
|
|
client.delete_vpc(VpcId="vpc-1234abcd")
|
|
|
|
ex.value.response["ResponseMetadata"]["HTTPStatusCode"].should.equal(400)
|
|
|
|
ex.value.response["ResponseMetadata"].should.have.key("RequestId")
|
|
|
|
ex.value.response["Error"]["Code"].should.equal("InvalidVpcID.NotFound")
|
|
|
|
|
|
|
|
|
|
|
|
@mock_ec2
|
2022-04-18 20:44:56 +00:00
|
|
|
def test_vpc_defaults():
|
2021-09-25 11:13:07 +00:00
|
|
|
ec2 = boto3.resource("ec2", region_name="eu-north-1")
|
|
|
|
client = boto3.client("ec2", region_name="eu-north-1")
|
|
|
|
vpc = ec2.create_vpc(CidrBlock="10.0.0.0/16")
|
|
|
|
|
2021-10-05 17:11:07 +00:00
|
|
|
filters = [{"Name": "vpc-id", "Values": [vpc.id]}]
|
|
|
|
|
|
|
|
client.describe_route_tables(Filters=filters)["RouteTables"].should.have.length_of(
|
|
|
|
1
|
|
|
|
)
|
|
|
|
client.describe_security_groups(Filters=filters)[
|
2021-09-25 11:13:07 +00:00
|
|
|
"SecurityGroups"
|
|
|
|
].should.have.length_of(1)
|
|
|
|
|
|
|
|
vpc.delete()
|
|
|
|
|
2021-10-05 17:11:07 +00:00
|
|
|
client.describe_route_tables(Filters=filters)["RouteTables"].should.have.length_of(
|
|
|
|
0
|
|
|
|
)
|
|
|
|
client.describe_security_groups(Filters=filters)[
|
2021-09-25 11:13:07 +00:00
|
|
|
"SecurityGroups"
|
|
|
|
].should.have.length_of(0)
|
|
|
|
|
|
|
|
|
|
|
|
@mock_ec2
|
2022-04-18 20:44:56 +00:00
|
|
|
def test_vpc_isdefault_filter():
|
2021-09-25 11:13:07 +00:00
|
|
|
ec2 = boto3.resource("ec2", region_name="eu-west-1")
|
|
|
|
client = boto3.client("ec2", region_name="eu-west-1")
|
|
|
|
vpc = ec2.create_vpc(CidrBlock="10.0.0.0/16")
|
|
|
|
client.describe_vpcs(Filters=[{"Name": "isDefault", "Values": ["true"]}])[
|
|
|
|
"Vpcs"
|
|
|
|
].should.have.length_of(1)
|
|
|
|
|
|
|
|
vpc.delete()
|
|
|
|
|
|
|
|
client.describe_vpcs(Filters=[{"Name": "isDefault", "Values": ["true"]}])[
|
|
|
|
"Vpcs"
|
|
|
|
].should.have.length_of(1)
|
|
|
|
|
|
|
|
|
|
|
|
@mock_ec2
|
2022-04-18 20:44:56 +00:00
|
|
|
def test_multiple_vpcs_default_filter():
|
2021-09-25 11:13:07 +00:00
|
|
|
ec2 = boto3.resource("ec2", region_name="eu-west-1")
|
|
|
|
client = boto3.client("ec2", region_name="eu-west-1")
|
|
|
|
ec2.create_vpc(CidrBlock="10.8.0.0/16")
|
|
|
|
ec2.create_vpc(CidrBlock="10.0.0.0/16")
|
|
|
|
ec2.create_vpc(CidrBlock="192.168.0.0/16")
|
2021-10-05 17:11:07 +00:00
|
|
|
default_vpcs = retrieve_all_vpcs(
|
|
|
|
client, [{"Name": "isDefault", "Values": ["true"]}]
|
|
|
|
)
|
|
|
|
[v["CidrBlock"] for v in default_vpcs].should.contain("172.31.0.0/16")
|
2021-09-25 11:13:07 +00:00
|
|
|
|
|
|
|
|
|
|
|
@mock_ec2
|
2022-04-18 20:44:56 +00:00
|
|
|
def test_vpc_state_available_filter():
|
2021-09-25 11:13:07 +00:00
|
|
|
ec2 = boto3.resource("ec2", region_name="eu-west-1")
|
|
|
|
client = boto3.client("ec2", region_name="eu-west-1")
|
2021-10-05 17:11:07 +00:00
|
|
|
vpc1 = ec2.create_vpc(CidrBlock="10.0.0.0/16")
|
|
|
|
vpc2 = ec2.create_vpc(CidrBlock="10.1.0.0/16")
|
|
|
|
|
|
|
|
available = retrieve_all_vpcs(client, [{"Name": "state", "Values": ["available"]}])
|
|
|
|
[v["VpcId"] for v in available].should.contain(vpc1.id)
|
|
|
|
[v["VpcId"] for v in available].should.contain(vpc2.id)
|
|
|
|
|
|
|
|
vpc1.delete()
|
|
|
|
|
|
|
|
available = retrieve_all_vpcs(client, [{"Name": "state", "Values": ["available"]}])
|
|
|
|
[v["VpcId"] for v in available].shouldnt.contain(vpc1.id)
|
|
|
|
[v["VpcId"] for v in available].should.contain(vpc2.id)
|
|
|
|
|
|
|
|
|
2021-10-18 19:44:29 +00:00
|
|
|
def retrieve_all_vpcs(client, filters=[]): # pylint: disable=W0102
|
2021-10-05 17:11:07 +00:00
|
|
|
resp = client.describe_vpcs(Filters=filters)
|
|
|
|
all_vpcs = resp["Vpcs"]
|
|
|
|
token = resp.get("NextToken")
|
|
|
|
while token:
|
|
|
|
resp = client.describe_vpcs(Filters=filters, NextToken=token)
|
|
|
|
all_vpcs.extend(resp["Vpcs"])
|
|
|
|
token = resp.get("NextToken")
|
|
|
|
return all_vpcs
|
2021-09-25 11:13:07 +00:00
|
|
|
|
|
|
|
|
|
|
|
@mock_ec2
|
2022-04-18 20:44:56 +00:00
|
|
|
def test_vpc_tagging():
|
2021-09-25 11:13:07 +00:00
|
|
|
ec2 = boto3.resource("ec2", region_name="eu-west-1")
|
|
|
|
client = boto3.client("ec2", region_name="eu-west-1")
|
|
|
|
vpc = ec2.create_vpc(CidrBlock="10.0.0.0/16")
|
|
|
|
|
|
|
|
vpc.create_tags(Tags=[{"Key": "a key", "Value": "some value"}])
|
2021-10-05 17:11:07 +00:00
|
|
|
|
|
|
|
all_tags = retrieve_all_tagged(client)
|
|
|
|
ours = [t for t in all_tags if t["ResourceId"] == vpc.id][0]
|
|
|
|
ours.should.have.key("Key").equal("a key")
|
|
|
|
ours.should.have.key("Value").equal("some value")
|
2021-09-25 11:13:07 +00:00
|
|
|
|
|
|
|
# Refresh the vpc
|
|
|
|
vpc = client.describe_vpcs(VpcIds=[vpc.id])["Vpcs"][0]
|
|
|
|
vpc["Tags"].should.equal([{"Key": "a key", "Value": "some value"}])
|
|
|
|
|
|
|
|
|
|
|
|
@mock_ec2
|
2022-04-18 20:44:56 +00:00
|
|
|
def test_vpc_get_by_id():
|
2021-09-25 11:13:07 +00:00
|
|
|
ec2 = boto3.resource("ec2", region_name="eu-west-1")
|
|
|
|
client = boto3.client("ec2", region_name="eu-west-1")
|
|
|
|
vpc1 = ec2.create_vpc(CidrBlock="10.0.0.0/16")
|
|
|
|
vpc2 = ec2.create_vpc(CidrBlock="10.0.0.0/16")
|
|
|
|
ec2.create_vpc(CidrBlock="10.0.0.0/16")
|
|
|
|
|
|
|
|
vpcs = client.describe_vpcs(VpcIds=[vpc1.id, vpc2.id])["Vpcs"]
|
|
|
|
vpcs.should.have.length_of(2)
|
|
|
|
vpc_ids = tuple(map(lambda v: v["VpcId"], vpcs))
|
|
|
|
vpc1.id.should.be.within(vpc_ids)
|
|
|
|
vpc2.id.should.be.within(vpc_ids)
|
|
|
|
|
|
|
|
with pytest.raises(ClientError) as ex:
|
|
|
|
client.describe_vpcs(VpcIds=["vpc-does_not_exist"])
|
|
|
|
ex.value.response["ResponseMetadata"]["HTTPStatusCode"].should.equal(400)
|
|
|
|
ex.value.response["ResponseMetadata"].should.have.key("RequestId")
|
|
|
|
ex.value.response["Error"]["Code"].should.equal("InvalidVpcID.NotFound")
|
|
|
|
|
|
|
|
|
|
|
|
@mock_ec2
|
2022-04-18 20:44:56 +00:00
|
|
|
def test_vpc_get_by_cidr_block():
|
2021-09-25 11:13:07 +00:00
|
|
|
ec2 = boto3.resource("ec2", region_name="eu-west-1")
|
|
|
|
client = boto3.client("ec2", region_name="eu-west-1")
|
2021-10-05 17:11:07 +00:00
|
|
|
random_ip = ".".join(map(str, (random.randint(0, 99) for _ in range(4))))
|
|
|
|
random_cidr = f"{random_ip}/16"
|
|
|
|
vpc1 = ec2.create_vpc(CidrBlock=random_cidr)
|
|
|
|
vpc2 = ec2.create_vpc(CidrBlock=random_cidr)
|
2021-09-25 11:13:07 +00:00
|
|
|
ec2.create_vpc(CidrBlock="10.0.0.0/24")
|
|
|
|
|
2021-10-05 17:11:07 +00:00
|
|
|
vpcs = client.describe_vpcs(Filters=[{"Name": "cidr", "Values": [random_cidr]}])[
|
2021-09-25 11:13:07 +00:00
|
|
|
"Vpcs"
|
|
|
|
]
|
2021-10-05 17:11:07 +00:00
|
|
|
set([vpc["VpcId"] for vpc in vpcs]).should.equal(set([vpc1.id, vpc2.id]))
|
2021-09-25 11:13:07 +00:00
|
|
|
|
|
|
|
|
|
|
|
@mock_ec2
|
2022-04-18 20:44:56 +00:00
|
|
|
def test_vpc_get_by_dhcp_options_id():
|
2021-09-25 11:13:07 +00:00
|
|
|
ec2 = boto3.resource("ec2", region_name="us-east-1")
|
|
|
|
client = boto3.client("ec2", region_name="us-east-1")
|
|
|
|
dhcp_options = ec2.create_dhcp_options(
|
|
|
|
DhcpConfigurations=[
|
|
|
|
{"Key": "domain-name", "Values": [SAMPLE_DOMAIN_NAME]},
|
|
|
|
{"Key": "domain-name-servers", "Values": SAMPLE_NAME_SERVERS},
|
|
|
|
]
|
|
|
|
)
|
|
|
|
vpc1 = ec2.create_vpc(CidrBlock="10.0.0.0/16")
|
|
|
|
vpc2 = ec2.create_vpc(CidrBlock="10.0.0.0/16")
|
|
|
|
ec2.create_vpc(CidrBlock="10.0.0.0/24")
|
|
|
|
|
|
|
|
client.associate_dhcp_options(DhcpOptionsId=dhcp_options.id, VpcId=vpc1.id)
|
|
|
|
client.associate_dhcp_options(DhcpOptionsId=dhcp_options.id, VpcId=vpc2.id)
|
|
|
|
|
|
|
|
vpcs = client.describe_vpcs(
|
|
|
|
Filters=[{"Name": "dhcp-options-id", "Values": [dhcp_options.id]}]
|
|
|
|
)["Vpcs"]
|
|
|
|
vpcs.should.have.length_of(2)
|
|
|
|
vpc_ids = tuple(map(lambda v: v["VpcId"], vpcs))
|
|
|
|
vpc1.id.should.be.within(vpc_ids)
|
|
|
|
vpc2.id.should.be.within(vpc_ids)
|
|
|
|
|
|
|
|
|
|
|
|
@mock_ec2
|
2022-04-18 20:44:56 +00:00
|
|
|
def test_vpc_get_by_tag():
|
2021-09-25 11:13:07 +00:00
|
|
|
ec2 = boto3.resource("ec2", region_name="us-east-1")
|
|
|
|
client = boto3.client("ec2", region_name="us-east-1")
|
|
|
|
vpc1 = ec2.create_vpc(CidrBlock="10.0.0.0/16")
|
|
|
|
vpc2 = ec2.create_vpc(CidrBlock="10.0.0.0/16")
|
|
|
|
vpc3 = ec2.create_vpc(CidrBlock="10.0.0.0/24")
|
|
|
|
|
2021-10-05 17:11:07 +00:00
|
|
|
value1 = str(uuid4())
|
|
|
|
vpc1.create_tags(Tags=[{"Key": "Name", "Value": value1}])
|
|
|
|
vpc2.create_tags(Tags=[{"Key": "Name", "Value": value1}])
|
2021-09-25 11:13:07 +00:00
|
|
|
vpc3.create_tags(Tags=[{"Key": "Name", "Value": "TestVPC2"}])
|
|
|
|
|
2021-10-05 17:11:07 +00:00
|
|
|
vpcs = client.describe_vpcs(Filters=[{"Name": "tag:Name", "Values": [value1]}])[
|
2021-09-25 11:13:07 +00:00
|
|
|
"Vpcs"
|
|
|
|
]
|
|
|
|
vpcs.should.have.length_of(2)
|
2021-10-05 17:11:07 +00:00
|
|
|
set([vpc["VpcId"] for vpc in vpcs]).should.equal(set([vpc1.id, vpc2.id]))
|
2021-09-25 11:13:07 +00:00
|
|
|
|
|
|
|
|
|
|
|
@mock_ec2
|
2022-04-18 20:44:56 +00:00
|
|
|
def test_vpc_get_by_tag_key_superset():
|
2021-09-25 11:13:07 +00:00
|
|
|
ec2 = boto3.resource("ec2", region_name="us-east-1")
|
|
|
|
client = boto3.client("ec2", region_name="us-east-1")
|
|
|
|
vpc1 = ec2.create_vpc(CidrBlock="10.0.0.0/16")
|
|
|
|
vpc2 = ec2.create_vpc(CidrBlock="10.0.0.0/16")
|
|
|
|
vpc3 = ec2.create_vpc(CidrBlock="10.0.0.0/24")
|
|
|
|
|
2021-10-05 17:11:07 +00:00
|
|
|
tag_key = str(uuid4())[0:6]
|
|
|
|
vpc1.create_tags(Tags=[{"Key": tag_key, "Value": "TestVPC"}])
|
2021-09-25 11:13:07 +00:00
|
|
|
vpc1.create_tags(Tags=[{"Key": "Key", "Value": "TestVPC2"}])
|
2021-10-05 17:11:07 +00:00
|
|
|
vpc2.create_tags(Tags=[{"Key": tag_key, "Value": "TestVPC"}])
|
2021-09-25 11:13:07 +00:00
|
|
|
vpc2.create_tags(Tags=[{"Key": "Key", "Value": "TestVPC2"}])
|
|
|
|
vpc3.create_tags(Tags=[{"Key": "Key", "Value": "TestVPC2"}])
|
|
|
|
|
2021-10-05 17:11:07 +00:00
|
|
|
vpcs = client.describe_vpcs(Filters=[{"Name": "tag-key", "Values": [tag_key]}])[
|
2021-09-25 11:13:07 +00:00
|
|
|
"Vpcs"
|
|
|
|
]
|
|
|
|
vpcs.should.have.length_of(2)
|
2021-10-05 17:11:07 +00:00
|
|
|
set([vpc["VpcId"] for vpc in vpcs]).should.equal(set([vpc1.id, vpc2.id]))
|
2021-09-25 11:13:07 +00:00
|
|
|
|
|
|
|
|
|
|
|
@mock_ec2
|
2022-04-18 20:44:56 +00:00
|
|
|
def test_vpc_get_by_tag_key_subset():
|
2021-09-25 11:13:07 +00:00
|
|
|
ec2 = boto3.resource("ec2", region_name="us-east-1")
|
|
|
|
client = boto3.client("ec2", region_name="us-east-1")
|
|
|
|
vpc1 = ec2.create_vpc(CidrBlock="10.0.0.0/16")
|
|
|
|
vpc2 = ec2.create_vpc(CidrBlock="10.0.0.0/16")
|
|
|
|
vpc3 = ec2.create_vpc(CidrBlock="10.0.0.0/24")
|
|
|
|
|
2021-10-05 17:11:07 +00:00
|
|
|
tag_key1 = str(uuid4())[0:6]
|
|
|
|
tag_key2 = str(uuid4())[0:6]
|
|
|
|
vpc1.create_tags(Tags=[{"Key": tag_key1, "Value": "TestVPC"}])
|
|
|
|
vpc1.create_tags(Tags=[{"Key": tag_key2, "Value": "TestVPC2"}])
|
|
|
|
vpc2.create_tags(Tags=[{"Key": tag_key1, "Value": "TestVPC"}])
|
|
|
|
vpc2.create_tags(Tags=[{"Key": tag_key2, "Value": "TestVPC2"}])
|
2021-09-25 11:13:07 +00:00
|
|
|
vpc3.create_tags(Tags=[{"Key": "Test", "Value": "TestVPC2"}])
|
|
|
|
|
|
|
|
vpcs = client.describe_vpcs(
|
2021-10-05 17:11:07 +00:00
|
|
|
Filters=[{"Name": "tag-key", "Values": [tag_key1, tag_key2]}]
|
2021-09-25 11:13:07 +00:00
|
|
|
)["Vpcs"]
|
|
|
|
vpcs.should.have.length_of(2)
|
2021-10-05 17:11:07 +00:00
|
|
|
set([vpc["VpcId"] for vpc in vpcs]).should.equal(set([vpc1.id, vpc2.id]))
|
2021-09-25 11:13:07 +00:00
|
|
|
|
|
|
|
|
|
|
|
@mock_ec2
|
2022-04-18 20:44:56 +00:00
|
|
|
def test_vpc_get_by_tag_value_superset():
|
2021-09-25 11:13:07 +00:00
|
|
|
ec2 = boto3.resource("ec2", region_name="us-east-1")
|
|
|
|
client = boto3.client("ec2", region_name="us-east-1")
|
|
|
|
vpc1 = ec2.create_vpc(CidrBlock="10.0.0.0/16")
|
|
|
|
vpc2 = ec2.create_vpc(CidrBlock="10.0.0.0/16")
|
|
|
|
vpc3 = ec2.create_vpc(CidrBlock="10.0.0.0/24")
|
|
|
|
|
2021-10-05 17:11:07 +00:00
|
|
|
tag_value = str(uuid4())
|
|
|
|
vpc1.create_tags(Tags=[{"Key": "Name", "Value": tag_value}])
|
2021-09-25 11:13:07 +00:00
|
|
|
vpc1.create_tags(Tags=[{"Key": "Key", "Value": "TestVPC2"}])
|
2021-10-05 17:11:07 +00:00
|
|
|
vpc2.create_tags(Tags=[{"Key": "Name", "Value": tag_value}])
|
2021-09-25 11:13:07 +00:00
|
|
|
vpc2.create_tags(Tags=[{"Key": "Key", "Value": "TestVPC2"}])
|
|
|
|
vpc3.create_tags(Tags=[{"Key": "Key", "Value": "TestVPC2"}])
|
|
|
|
|
2021-10-05 17:11:07 +00:00
|
|
|
vpcs = client.describe_vpcs(Filters=[{"Name": "tag-value", "Values": [tag_value]}])[
|
2021-09-25 11:13:07 +00:00
|
|
|
"Vpcs"
|
|
|
|
]
|
|
|
|
vpcs.should.have.length_of(2)
|
2021-10-05 17:11:07 +00:00
|
|
|
set([vpc["VpcId"] for vpc in vpcs]).should.equal(set([vpc1.id, vpc2.id]))
|
2021-09-25 11:13:07 +00:00
|
|
|
|
|
|
|
|
|
|
|
@mock_ec2
|
2022-04-18 20:44:56 +00:00
|
|
|
def test_vpc_get_by_tag_value_subset():
|
2021-09-25 11:13:07 +00:00
|
|
|
ec2 = boto3.resource("ec2", region_name="us-east-1")
|
|
|
|
client = boto3.client("ec2", region_name="us-east-1")
|
|
|
|
vpc1 = ec2.create_vpc(CidrBlock="10.0.0.0/16")
|
|
|
|
vpc2 = ec2.create_vpc(CidrBlock="10.0.0.0/16")
|
|
|
|
ec2.create_vpc(CidrBlock="10.0.0.0/24")
|
|
|
|
|
2021-10-05 17:11:07 +00:00
|
|
|
value1 = str(uuid4())[0:6]
|
|
|
|
value2 = str(uuid4())[0:6]
|
|
|
|
vpc1.create_tags(Tags=[{"Key": "Name", "Value": value1}])
|
|
|
|
vpc1.create_tags(Tags=[{"Key": "Key", "Value": value2}])
|
|
|
|
vpc2.create_tags(Tags=[{"Key": "Name", "Value": value1}])
|
|
|
|
vpc2.create_tags(Tags=[{"Key": "Key", "Value": value2}])
|
2021-09-25 11:13:07 +00:00
|
|
|
|
|
|
|
vpcs = client.describe_vpcs(
|
2021-10-05 17:11:07 +00:00
|
|
|
Filters=[{"Name": "tag-value", "Values": [value1, value2]}]
|
2021-09-25 11:13:07 +00:00
|
|
|
)["Vpcs"]
|
|
|
|
vpcs.should.have.length_of(2)
|
|
|
|
vpc_ids = tuple(map(lambda v: v["VpcId"], vpcs))
|
|
|
|
vpc1.id.should.be.within(vpc_ids)
|
|
|
|
vpc2.id.should.be.within(vpc_ids)
|
|
|
|
|
|
|
|
|
2016-05-12 20:36:09 +00:00
|
|
|
@mock_ec2
|
|
|
|
def test_default_vpc():
|
|
|
|
ec2 = boto3.resource("ec2", region_name="us-west-1")
|
|
|
|
|
|
|
|
# Create the default VPC
|
2017-01-12 01:37:57 +00:00
|
|
|
default_vpc = list(ec2.vpcs.all())[0]
|
|
|
|
default_vpc.cidr_block.should.equal("172.31.0.0/16")
|
2017-02-09 02:23:49 +00:00
|
|
|
default_vpc.instance_tenancy.should.equal("default")
|
2016-05-12 20:36:09 +00:00
|
|
|
default_vpc.reload()
|
2022-04-18 20:44:56 +00:00
|
|
|
default_vpc.is_default.should.equal(True)
|
2016-05-12 20:36:09 +00:00
|
|
|
|
|
|
|
# Test default values for VPC attributes
|
|
|
|
response = default_vpc.describe_attribute(Attribute="enableDnsSupport")
|
|
|
|
attr = response.get("EnableDnsSupport")
|
2022-04-18 20:44:56 +00:00
|
|
|
attr.get("Value").should.equal(True)
|
2016-05-12 20:36:09 +00:00
|
|
|
|
|
|
|
response = default_vpc.describe_attribute(Attribute="enableDnsHostnames")
|
|
|
|
attr = response.get("EnableDnsHostnames")
|
2022-04-18 20:44:56 +00:00
|
|
|
attr.get("Value").should.equal(True)
|
2016-05-12 20:36:09 +00:00
|
|
|
|
2022-10-31 22:52:28 +00:00
|
|
|
response = default_vpc.describe_attribute(
|
|
|
|
Attribute="enableNetworkAddressUsageMetrics"
|
|
|
|
)
|
|
|
|
attr = response.get("EnableNetworkAddressUsageMetrics")
|
|
|
|
attr.get("Value").should.equal(False)
|
|
|
|
|
2016-05-12 20:36:09 +00:00
|
|
|
|
|
|
|
@mock_ec2
|
|
|
|
def test_non_default_vpc():
|
|
|
|
ec2 = boto3.resource("ec2", region_name="us-west-1")
|
|
|
|
|
2018-03-21 16:10:38 +00:00
|
|
|
# Create the default VPC - this already exists when backend instantiated!
|
|
|
|
# ec2.create_vpc(CidrBlock='172.31.0.0/16')
|
2016-05-12 20:36:09 +00:00
|
|
|
|
|
|
|
# Create the non default VPC
|
|
|
|
vpc = ec2.create_vpc(CidrBlock="10.0.0.0/16")
|
|
|
|
vpc.reload()
|
2022-04-18 20:44:56 +00:00
|
|
|
vpc.is_default.should.equal(False)
|
2016-05-12 20:36:09 +00:00
|
|
|
|
2017-02-09 02:23:49 +00:00
|
|
|
# Test default instance_tenancy
|
|
|
|
vpc.instance_tenancy.should.equal("default")
|
|
|
|
|
2016-05-12 20:36:09 +00:00
|
|
|
# Test default values for VPC attributes
|
|
|
|
response = vpc.describe_attribute(Attribute="enableDnsSupport")
|
|
|
|
attr = response.get("EnableDnsSupport")
|
2022-04-18 20:44:56 +00:00
|
|
|
attr.get("Value").should.equal(True)
|
2016-05-12 20:36:09 +00:00
|
|
|
|
|
|
|
response = vpc.describe_attribute(Attribute="enableDnsHostnames")
|
|
|
|
attr = response.get("EnableDnsHostnames")
|
2022-04-18 20:44:56 +00:00
|
|
|
attr.get("Value").should.equal(False)
|
2016-05-12 20:36:09 +00:00
|
|
|
|
2022-10-31 22:52:28 +00:00
|
|
|
response = vpc.describe_attribute(Attribute="enableNetworkAddressUsageMetrics")
|
|
|
|
attr = response.get("EnableNetworkAddressUsageMetrics")
|
|
|
|
attr.get("Value").should.equal(False)
|
|
|
|
|
2018-03-21 16:10:38 +00:00
|
|
|
# Check Primary CIDR Block Associations
|
|
|
|
cidr_block_association_set = next(iter(vpc.cidr_block_association_set), None)
|
|
|
|
cidr_block_association_set["CidrBlockState"]["State"].should.equal("associated")
|
|
|
|
cidr_block_association_set["CidrBlock"].should.equal(vpc.cidr_block)
|
|
|
|
cidr_block_association_set["AssociationId"].should.contain("vpc-cidr-assoc")
|
|
|
|
|
2017-02-24 02:37:43 +00:00
|
|
|
|
2017-02-09 02:23:49 +00:00
|
|
|
@mock_ec2
|
|
|
|
def test_vpc_dedicated_tenancy():
|
|
|
|
ec2 = boto3.resource("ec2", region_name="us-west-1")
|
|
|
|
|
|
|
|
# Create the default VPC
|
|
|
|
ec2.create_vpc(CidrBlock="172.31.0.0/16")
|
|
|
|
|
|
|
|
# Create the non default VPC
|
|
|
|
vpc = ec2.create_vpc(CidrBlock="10.0.0.0/16", InstanceTenancy="dedicated")
|
|
|
|
vpc.reload()
|
2022-04-18 20:44:56 +00:00
|
|
|
vpc.is_default.should.equal(False)
|
2017-02-09 02:23:49 +00:00
|
|
|
|
|
|
|
vpc.instance_tenancy.should.equal("dedicated")
|
2016-05-12 20:36:09 +00:00
|
|
|
|
2017-02-24 02:37:43 +00:00
|
|
|
|
2021-08-11 17:50:15 +00:00
|
|
|
@mock_ec2
|
|
|
|
def test_vpc_modify_tenancy_unknown():
|
|
|
|
ec2 = boto3.resource("ec2", region_name="us-west-1")
|
|
|
|
ec2_client = boto3.client("ec2", region_name="us-west-1")
|
|
|
|
|
|
|
|
# Create the default VPC
|
|
|
|
ec2.create_vpc(CidrBlock="172.31.0.0/16")
|
|
|
|
|
|
|
|
# Create the non default VPC
|
|
|
|
vpc = ec2.create_vpc(CidrBlock="10.0.0.0/16", InstanceTenancy="dedicated")
|
|
|
|
vpc.instance_tenancy.should.equal("dedicated")
|
|
|
|
|
|
|
|
with pytest.raises(ClientError) as ex:
|
|
|
|
ec2_client.modify_vpc_tenancy(VpcId=vpc.id, InstanceTenancy="unknown")
|
|
|
|
err = ex.value.response["Error"]
|
|
|
|
err["Message"].should.equal("The tenancy value unknown is not supported.")
|
|
|
|
err["Code"].should.equal("UnsupportedTenancy")
|
|
|
|
|
|
|
|
ec2_client.modify_vpc_tenancy(VpcId=vpc.id, InstanceTenancy="default")
|
|
|
|
|
|
|
|
vpc.reload()
|
|
|
|
|
|
|
|
vpc.instance_tenancy.should.equal("default")
|
|
|
|
|
|
|
|
|
2016-05-12 20:36:09 +00:00
|
|
|
@mock_ec2
|
|
|
|
def test_vpc_modify_enable_dns_support():
|
|
|
|
ec2 = boto3.resource("ec2", region_name="us-west-1")
|
|
|
|
|
|
|
|
# Create the default VPC
|
|
|
|
ec2.create_vpc(CidrBlock="172.31.0.0/16")
|
|
|
|
|
|
|
|
vpc = ec2.create_vpc(CidrBlock="10.0.0.0/16")
|
|
|
|
|
|
|
|
# Test default values for VPC attributes
|
|
|
|
response = vpc.describe_attribute(Attribute="enableDnsSupport")
|
|
|
|
attr = response.get("EnableDnsSupport")
|
|
|
|
attr.get("Value").should.be.ok
|
|
|
|
|
|
|
|
vpc.modify_attribute(EnableDnsSupport={"Value": False})
|
|
|
|
|
|
|
|
response = vpc.describe_attribute(Attribute="enableDnsSupport")
|
|
|
|
attr = response.get("EnableDnsSupport")
|
|
|
|
attr.get("Value").shouldnt.be.ok
|
|
|
|
|
|
|
|
|
|
|
|
@mock_ec2
|
|
|
|
def test_vpc_modify_enable_dns_hostnames():
|
|
|
|
ec2 = boto3.resource("ec2", region_name="us-west-1")
|
|
|
|
|
|
|
|
# Create the default VPC
|
|
|
|
ec2.create_vpc(CidrBlock="172.31.0.0/16")
|
|
|
|
|
|
|
|
vpc = ec2.create_vpc(CidrBlock="10.0.0.0/16")
|
|
|
|
# Test default values for VPC attributes
|
|
|
|
response = vpc.describe_attribute(Attribute="enableDnsHostnames")
|
|
|
|
attr = response.get("EnableDnsHostnames")
|
|
|
|
attr.get("Value").shouldnt.be.ok
|
|
|
|
|
|
|
|
vpc.modify_attribute(EnableDnsHostnames={"Value": True})
|
|
|
|
|
|
|
|
response = vpc.describe_attribute(Attribute="enableDnsHostnames")
|
|
|
|
attr = response.get("EnableDnsHostnames")
|
|
|
|
attr.get("Value").should.be.ok
|
2016-10-08 09:34:55 +00:00
|
|
|
|
2017-02-24 02:37:43 +00:00
|
|
|
|
2022-10-31 22:52:28 +00:00
|
|
|
@mock_ec2
|
|
|
|
def test_vpc_modify_enable_network_address_usage_metrics():
|
|
|
|
ec2 = boto3.resource("ec2", region_name="us-west-1")
|
|
|
|
|
|
|
|
# Create the default VPC
|
|
|
|
ec2.create_vpc(CidrBlock="172.31.0.0/16")
|
|
|
|
|
|
|
|
vpc = ec2.create_vpc(CidrBlock="10.0.0.0/16")
|
|
|
|
# Test default values for VPC attributes
|
|
|
|
response = vpc.describe_attribute(Attribute="enableNetworkAddressUsageMetrics")
|
|
|
|
attr = response.get("EnableNetworkAddressUsageMetrics")
|
|
|
|
attr.get("Value").shouldnt.be.ok
|
|
|
|
|
|
|
|
vpc.modify_attribute(EnableNetworkAddressUsageMetrics={"Value": True})
|
|
|
|
|
|
|
|
response = vpc.describe_attribute(Attribute="enableNetworkAddressUsageMetrics")
|
|
|
|
attr = response.get("EnableNetworkAddressUsageMetrics")
|
|
|
|
attr.get("Value").should.equal(True)
|
|
|
|
|
|
|
|
|
2021-09-25 11:13:07 +00:00
|
|
|
@mock_ec2
|
2022-04-18 20:44:56 +00:00
|
|
|
def test_vpc_associate_dhcp_options():
|
2021-09-25 11:13:07 +00:00
|
|
|
ec2 = boto3.resource("ec2", region_name="us-west-1")
|
|
|
|
client = boto3.client("ec2", region_name="us-west-1")
|
|
|
|
dhcp_options = ec2.create_dhcp_options(
|
|
|
|
DhcpConfigurations=[
|
|
|
|
{"Key": "domain-name", "Values": [SAMPLE_DOMAIN_NAME]},
|
|
|
|
{"Key": "domain-name-servers", "Values": SAMPLE_NAME_SERVERS},
|
|
|
|
]
|
|
|
|
)
|
|
|
|
vpc = ec2.create_vpc(CidrBlock="10.0.0.0/16")
|
|
|
|
|
|
|
|
client.associate_dhcp_options(DhcpOptionsId=dhcp_options.id, VpcId=vpc.id)
|
|
|
|
|
|
|
|
vpc.reload()
|
|
|
|
dhcp_options.id.should.equal(vpc.dhcp_options_id)
|
|
|
|
|
|
|
|
|
2018-03-21 16:10:38 +00:00
|
|
|
@mock_ec2
|
|
|
|
def test_associate_vpc_ipv4_cidr_block():
|
|
|
|
ec2 = boto3.resource("ec2", region_name="us-west-1")
|
|
|
|
|
|
|
|
vpc = ec2.create_vpc(CidrBlock="10.10.42.0/24")
|
|
|
|
|
|
|
|
# Associate/Extend vpc CIDR range up to 5 ciders
|
|
|
|
for i in range(43, 47):
|
|
|
|
response = ec2.meta.client.associate_vpc_cidr_block(
|
2022-11-17 22:41:08 +00:00
|
|
|
VpcId=vpc.id, CidrBlock=f"10.10.{i}.0/24"
|
2018-03-21 16:10:38 +00:00
|
|
|
)
|
|
|
|
response["CidrBlockAssociation"]["CidrBlockState"]["State"].should.equal(
|
|
|
|
"associating"
|
|
|
|
)
|
2022-11-17 22:41:08 +00:00
|
|
|
response["CidrBlockAssociation"]["CidrBlock"].should.equal(f"10.10.{i}.0/24")
|
2018-03-21 16:10:38 +00:00
|
|
|
response["CidrBlockAssociation"]["AssociationId"].should.contain(
|
|
|
|
"vpc-cidr-assoc"
|
2019-10-31 15:44:26 +00:00
|
|
|
)
|
2018-03-21 16:10:38 +00:00
|
|
|
|
|
|
|
# Check all associations exist
|
|
|
|
vpc = ec2.Vpc(vpc.id)
|
|
|
|
vpc.cidr_block_association_set.should.have.length_of(5)
|
|
|
|
vpc.cidr_block_association_set[2]["CidrBlockState"]["State"].should.equal(
|
|
|
|
"associated"
|
|
|
|
)
|
|
|
|
vpc.cidr_block_association_set[4]["CidrBlockState"]["State"].should.equal(
|
|
|
|
"associated"
|
|
|
|
)
|
|
|
|
|
|
|
|
# Check error on adding 6th association.
|
2020-10-06 05:54:49 +00:00
|
|
|
with pytest.raises(ClientError) as ex:
|
2018-03-21 16:10:38 +00:00
|
|
|
response = ec2.meta.client.associate_vpc_cidr_block(
|
|
|
|
VpcId=vpc.id, CidrBlock="10.10.50.0/22"
|
|
|
|
)
|
2020-10-06 06:04:09 +00:00
|
|
|
str(ex.value).should.equal(
|
2018-03-21 16:10:38 +00:00
|
|
|
"An error occurred (CidrLimitExceeded) when calling the AssociateVpcCidrBlock "
|
2022-11-17 22:41:08 +00:00
|
|
|
f"operation: This network '{vpc.id}' has met its maximum number of allowed CIDRs: 5"
|
2019-10-31 15:44:26 +00:00
|
|
|
)
|
|
|
|
|
2018-03-21 16:10:38 +00:00
|
|
|
|
|
|
|
@mock_ec2
|
|
|
|
def test_disassociate_vpc_ipv4_cidr_block():
|
|
|
|
ec2 = boto3.resource("ec2", region_name="us-west-1")
|
|
|
|
|
|
|
|
vpc = ec2.create_vpc(CidrBlock="10.10.42.0/24")
|
|
|
|
ec2.meta.client.associate_vpc_cidr_block(VpcId=vpc.id, CidrBlock="10.10.43.0/24")
|
|
|
|
|
|
|
|
# Remove an extended cidr block
|
|
|
|
vpc = ec2.Vpc(vpc.id)
|
|
|
|
non_default_assoc_cidr_block = next(
|
|
|
|
iter(
|
2019-10-31 15:44:26 +00:00
|
|
|
[
|
2018-03-21 16:10:38 +00:00
|
|
|
x
|
|
|
|
for x in vpc.cidr_block_association_set
|
|
|
|
if vpc.cidr_block != x["CidrBlock"]
|
2019-10-31 15:44:26 +00:00
|
|
|
]
|
2018-03-21 16:10:38 +00:00
|
|
|
),
|
|
|
|
None,
|
|
|
|
)
|
|
|
|
response = ec2.meta.client.disassociate_vpc_cidr_block(
|
|
|
|
AssociationId=non_default_assoc_cidr_block["AssociationId"]
|
|
|
|
)
|
|
|
|
response["CidrBlockAssociation"]["CidrBlockState"]["State"].should.equal(
|
|
|
|
"disassociating"
|
|
|
|
)
|
|
|
|
response["CidrBlockAssociation"]["CidrBlock"].should.equal(
|
|
|
|
non_default_assoc_cidr_block["CidrBlock"]
|
|
|
|
)
|
|
|
|
response["CidrBlockAssociation"]["AssociationId"].should.equal(
|
|
|
|
non_default_assoc_cidr_block["AssociationId"]
|
2019-10-31 15:44:26 +00:00
|
|
|
)
|
2018-03-21 16:10:38 +00:00
|
|
|
|
|
|
|
# Error attempting to delete a non-existent CIDR_BLOCK association
|
2020-10-06 05:54:49 +00:00
|
|
|
with pytest.raises(ClientError) as ex:
|
2018-03-21 16:10:38 +00:00
|
|
|
response = ec2.meta.client.disassociate_vpc_cidr_block(
|
|
|
|
AssociationId="vpc-cidr-assoc-BORING123"
|
|
|
|
)
|
2020-10-06 06:04:09 +00:00
|
|
|
str(ex.value).should.equal(
|
2018-03-21 16:10:38 +00:00
|
|
|
"An error occurred (InvalidVpcCidrBlockAssociationIdError.NotFound) when calling the "
|
|
|
|
"DisassociateVpcCidrBlock operation: The vpc CIDR block association ID "
|
|
|
|
"'vpc-cidr-assoc-BORING123' does not exist"
|
|
|
|
)
|
|
|
|
|
|
|
|
# Error attempting to delete Primary CIDR BLOCK association
|
|
|
|
vpc_base_cidr_assoc_id = next(
|
|
|
|
iter(
|
2019-10-31 15:44:26 +00:00
|
|
|
[
|
2018-03-21 16:10:38 +00:00
|
|
|
x
|
|
|
|
for x in vpc.cidr_block_association_set
|
|
|
|
if vpc.cidr_block == x["CidrBlock"]
|
2019-10-31 15:44:26 +00:00
|
|
|
]
|
2018-03-21 16:10:38 +00:00
|
|
|
),
|
|
|
|
{},
|
|
|
|
)["AssociationId"]
|
|
|
|
|
2020-10-06 05:54:49 +00:00
|
|
|
with pytest.raises(ClientError) as ex:
|
2018-03-21 16:10:38 +00:00
|
|
|
response = ec2.meta.client.disassociate_vpc_cidr_block(
|
|
|
|
AssociationId=vpc_base_cidr_assoc_id
|
|
|
|
)
|
2020-10-06 06:04:09 +00:00
|
|
|
str(ex.value).should.equal(
|
2018-03-21 16:10:38 +00:00
|
|
|
"An error occurred (OperationNotPermitted) when calling the DisassociateVpcCidrBlock operation: "
|
2022-11-17 22:41:08 +00:00
|
|
|
f"The vpc CIDR block with association ID {vpc_base_cidr_assoc_id} may not be disassociated. It is the primary "
|
|
|
|
"IPv4 CIDR block of the VPC"
|
2019-10-31 15:44:26 +00:00
|
|
|
)
|
|
|
|
|
2018-03-21 16:10:38 +00:00
|
|
|
|
|
|
|
@mock_ec2
|
|
|
|
def test_cidr_block_association_filters():
|
|
|
|
ec2 = boto3.resource("ec2", region_name="us-west-1")
|
|
|
|
vpc1 = ec2.create_vpc(CidrBlock="10.90.0.0/16")
|
|
|
|
vpc2 = ec2.create_vpc(CidrBlock="10.91.0.0/16")
|
|
|
|
ec2.meta.client.associate_vpc_cidr_block(VpcId=vpc2.id, CidrBlock="10.10.0.0/19")
|
|
|
|
vpc3 = ec2.create_vpc(CidrBlock="10.92.0.0/24")
|
|
|
|
ec2.meta.client.associate_vpc_cidr_block(VpcId=vpc3.id, CidrBlock="10.92.1.0/24")
|
|
|
|
ec2.meta.client.associate_vpc_cidr_block(VpcId=vpc3.id, CidrBlock="10.92.2.0/24")
|
|
|
|
vpc3_assoc_response = ec2.meta.client.associate_vpc_cidr_block(
|
|
|
|
VpcId=vpc3.id, CidrBlock="10.92.3.0/24"
|
|
|
|
)
|
|
|
|
|
|
|
|
# Test filters for a cidr-block in all VPCs cidr-block-associations
|
|
|
|
filtered_vpcs = list(
|
|
|
|
ec2.vpcs.filter(
|
|
|
|
Filters=[
|
2019-10-31 15:44:26 +00:00
|
|
|
{
|
2018-03-21 16:10:38 +00:00
|
|
|
"Name": "cidr-block-association.cidr-block",
|
|
|
|
"Values": ["10.10.0.0/19"],
|
2019-10-31 15:44:26 +00:00
|
|
|
}
|
|
|
|
]
|
2018-03-21 16:10:38 +00:00
|
|
|
)
|
2019-10-31 15:44:26 +00:00
|
|
|
)
|
2021-10-05 17:11:07 +00:00
|
|
|
[vpc.id for vpc in filtered_vpcs].shouldnt.contain(vpc1.id)
|
|
|
|
[vpc.id for vpc in filtered_vpcs].should.contain(vpc2.id)
|
|
|
|
[vpc.id for vpc in filtered_vpcs].shouldnt.contain(vpc3.id)
|
2018-03-21 16:10:38 +00:00
|
|
|
|
|
|
|
# Test filter for association id in VPCs
|
|
|
|
association_id = vpc3_assoc_response["CidrBlockAssociation"]["AssociationId"]
|
|
|
|
filtered_vpcs = list(
|
|
|
|
ec2.vpcs.filter(
|
|
|
|
Filters=[
|
2019-10-31 15:44:26 +00:00
|
|
|
{
|
2018-03-21 16:10:38 +00:00
|
|
|
"Name": "cidr-block-association.association-id",
|
|
|
|
"Values": [association_id],
|
2019-10-31 15:44:26 +00:00
|
|
|
}
|
|
|
|
]
|
2018-03-21 16:10:38 +00:00
|
|
|
)
|
2019-10-31 15:44:26 +00:00
|
|
|
)
|
2018-03-21 16:10:38 +00:00
|
|
|
filtered_vpcs.should.be.length_of(1)
|
|
|
|
filtered_vpcs[0].id.should.equal(vpc3.id)
|
|
|
|
|
|
|
|
# Test filter for association state in VPC - this will never show anything in this test
|
|
|
|
filtered_vpcs = list(
|
|
|
|
ec2.vpcs.filter(
|
|
|
|
Filters=[
|
|
|
|
{"Name": "cidr-block-association.association-id", "Values": ["failing"]}
|
2019-10-31 15:44:26 +00:00
|
|
|
]
|
2018-03-21 16:10:38 +00:00
|
|
|
)
|
2019-10-31 15:44:26 +00:00
|
|
|
)
|
2018-03-21 16:10:38 +00:00
|
|
|
filtered_vpcs.should.be.length_of(0)
|
|
|
|
|
2019-10-31 15:44:26 +00:00
|
|
|
|
2018-03-21 16:10:38 +00:00
|
|
|
@mock_ec2
|
|
|
|
def test_vpc_associate_ipv6_cidr_block():
|
|
|
|
ec2 = boto3.resource("ec2", region_name="us-west-1")
|
|
|
|
|
|
|
|
# Test create VPC with IPV6 cidr range
|
|
|
|
vpc = ec2.create_vpc(CidrBlock="10.10.42.0/24", AmazonProvidedIpv6CidrBlock=True)
|
|
|
|
ipv6_cidr_block_association_set = next(
|
|
|
|
iter(vpc.ipv6_cidr_block_association_set), None
|
|
|
|
)
|
|
|
|
ipv6_cidr_block_association_set["Ipv6CidrBlockState"]["State"].should.equal(
|
|
|
|
"associated"
|
|
|
|
)
|
|
|
|
ipv6_cidr_block_association_set["Ipv6CidrBlock"].should.contain("::/56")
|
|
|
|
ipv6_cidr_block_association_set["AssociationId"].should.contain("vpc-cidr-assoc")
|
|
|
|
|
|
|
|
# Test Fail on adding 2nd IPV6 association - AWS only allows 1 at this time!
|
2020-10-06 05:54:49 +00:00
|
|
|
with pytest.raises(ClientError) as ex:
|
2018-03-21 16:10:38 +00:00
|
|
|
response = ec2.meta.client.associate_vpc_cidr_block(
|
|
|
|
VpcId=vpc.id, AmazonProvidedIpv6CidrBlock=True
|
|
|
|
)
|
2020-10-06 06:04:09 +00:00
|
|
|
str(ex.value).should.equal(
|
2018-03-21 16:10:38 +00:00
|
|
|
"An error occurred (CidrLimitExceeded) when calling the AssociateVpcCidrBlock "
|
2022-11-17 22:41:08 +00:00
|
|
|
f"operation: This network '{vpc.id}' has met its maximum number of allowed CIDRs: 1"
|
2019-10-31 15:44:26 +00:00
|
|
|
)
|
2018-03-21 16:10:38 +00:00
|
|
|
|
|
|
|
# Test associate ipv6 cidr block after vpc created
|
|
|
|
vpc = ec2.create_vpc(CidrBlock="10.10.50.0/24")
|
|
|
|
response = ec2.meta.client.associate_vpc_cidr_block(
|
|
|
|
VpcId=vpc.id, AmazonProvidedIpv6CidrBlock=True
|
|
|
|
)
|
|
|
|
response["Ipv6CidrBlockAssociation"]["Ipv6CidrBlockState"]["State"].should.equal(
|
|
|
|
"associating"
|
|
|
|
)
|
|
|
|
response["Ipv6CidrBlockAssociation"]["Ipv6CidrBlock"].should.contain("::/56")
|
|
|
|
response["Ipv6CidrBlockAssociation"]["AssociationId"].should.contain(
|
|
|
|
"vpc-cidr-assoc-"
|
|
|
|
)
|
|
|
|
|
|
|
|
# Check on describe vpc that has ipv6 cidr block association
|
|
|
|
vpc = ec2.Vpc(vpc.id)
|
|
|
|
vpc.ipv6_cidr_block_association_set.should.be.length_of(1)
|
|
|
|
|
|
|
|
|
|
|
|
@mock_ec2
|
|
|
|
def test_vpc_disassociate_ipv6_cidr_block():
|
|
|
|
ec2 = boto3.resource("ec2", region_name="us-west-1")
|
|
|
|
|
|
|
|
# Test create VPC with IPV6 cidr range
|
|
|
|
vpc = ec2.create_vpc(CidrBlock="10.10.42.0/24", AmazonProvidedIpv6CidrBlock=True)
|
|
|
|
# Test disassociating the only IPV6
|
|
|
|
assoc_id = vpc.ipv6_cidr_block_association_set[0]["AssociationId"]
|
|
|
|
response = ec2.meta.client.disassociate_vpc_cidr_block(AssociationId=assoc_id)
|
|
|
|
response["Ipv6CidrBlockAssociation"]["Ipv6CidrBlockState"]["State"].should.equal(
|
|
|
|
"disassociating"
|
|
|
|
)
|
|
|
|
response["Ipv6CidrBlockAssociation"]["Ipv6CidrBlock"].should.contain("::/56")
|
|
|
|
response["Ipv6CidrBlockAssociation"]["AssociationId"].should.equal(assoc_id)
|
|
|
|
|
|
|
|
|
|
|
|
@mock_ec2
|
|
|
|
def test_ipv6_cidr_block_association_filters():
|
|
|
|
ec2 = boto3.resource("ec2", region_name="us-west-1")
|
|
|
|
vpc1 = ec2.create_vpc(CidrBlock="10.90.0.0/16")
|
|
|
|
|
|
|
|
vpc2 = ec2.create_vpc(CidrBlock="10.91.0.0/16", AmazonProvidedIpv6CidrBlock=True)
|
|
|
|
vpc2_assoc_ipv6_assoc_id = vpc2.ipv6_cidr_block_association_set[0]["AssociationId"]
|
|
|
|
ec2.meta.client.associate_vpc_cidr_block(VpcId=vpc2.id, CidrBlock="10.10.0.0/19")
|
|
|
|
|
|
|
|
vpc3 = ec2.create_vpc(CidrBlock="10.92.0.0/24")
|
|
|
|
ec2.meta.client.associate_vpc_cidr_block(VpcId=vpc3.id, CidrBlock="10.92.1.0/24")
|
|
|
|
ec2.meta.client.associate_vpc_cidr_block(VpcId=vpc3.id, CidrBlock="10.92.2.0/24")
|
|
|
|
response = ec2.meta.client.associate_vpc_cidr_block(
|
|
|
|
VpcId=vpc3.id, AmazonProvidedIpv6CidrBlock=True
|
|
|
|
)
|
|
|
|
vpc3_ipv6_cidr_block = response["Ipv6CidrBlockAssociation"]["Ipv6CidrBlock"]
|
|
|
|
|
|
|
|
vpc4 = ec2.create_vpc(CidrBlock="10.95.0.0/16") # Here for its looks
|
|
|
|
|
|
|
|
# Test filters for an ipv6 cidr-block in all VPCs cidr-block-associations
|
|
|
|
filtered_vpcs = list(
|
|
|
|
ec2.vpcs.filter(
|
|
|
|
Filters=[
|
2019-10-31 15:44:26 +00:00
|
|
|
{
|
2018-03-21 16:10:38 +00:00
|
|
|
"Name": "ipv6-cidr-block-association.ipv6-cidr-block",
|
|
|
|
"Values": [vpc3_ipv6_cidr_block],
|
2019-10-31 15:44:26 +00:00
|
|
|
}
|
|
|
|
]
|
2018-03-21 16:10:38 +00:00
|
|
|
)
|
2019-10-31 15:44:26 +00:00
|
|
|
)
|
2018-03-21 16:10:38 +00:00
|
|
|
filtered_vpcs.should.be.length_of(1)
|
|
|
|
filtered_vpcs[0].id.should.equal(vpc3.id)
|
|
|
|
|
|
|
|
# Test filter for association id in VPCs
|
|
|
|
filtered_vpcs = list(
|
|
|
|
ec2.vpcs.filter(
|
|
|
|
Filters=[
|
2019-10-31 15:44:26 +00:00
|
|
|
{
|
2018-03-21 16:10:38 +00:00
|
|
|
"Name": "ipv6-cidr-block-association.association-id",
|
|
|
|
"Values": [vpc2_assoc_ipv6_assoc_id],
|
2019-10-31 15:44:26 +00:00
|
|
|
}
|
|
|
|
]
|
2018-03-21 16:10:38 +00:00
|
|
|
)
|
2019-10-31 15:44:26 +00:00
|
|
|
)
|
2018-03-21 16:10:38 +00:00
|
|
|
filtered_vpcs.should.be.length_of(1)
|
|
|
|
filtered_vpcs[0].id.should.equal(vpc2.id)
|
|
|
|
|
|
|
|
# Test filter for association state in VPC - this will never show anything in this test
|
2021-10-05 17:11:07 +00:00
|
|
|
assoc_vpcs = [
|
|
|
|
vpc.id
|
|
|
|
for vpc in ec2.vpcs.filter(
|
2018-03-21 16:10:38 +00:00
|
|
|
Filters=[
|
|
|
|
{"Name": "ipv6-cidr-block-association.state", "Values": ["associated"]}
|
2019-10-31 15:44:26 +00:00
|
|
|
]
|
2018-03-21 16:10:38 +00:00
|
|
|
)
|
2021-10-05 17:11:07 +00:00
|
|
|
]
|
|
|
|
assoc_vpcs.shouldnt.contain(vpc1.id)
|
|
|
|
assoc_vpcs.should.contain(vpc2.id)
|
|
|
|
assoc_vpcs.should.contain(vpc3.id)
|
|
|
|
assoc_vpcs.shouldnt.contain(vpc4.id)
|
2019-05-25 17:35:07 +00:00
|
|
|
|
|
|
|
|
|
|
|
@mock_ec2
|
|
|
|
def test_create_vpc_with_invalid_cidr_block_parameter():
|
|
|
|
ec2 = boto3.resource("ec2", region_name="us-west-1")
|
|
|
|
|
|
|
|
vpc_cidr_block = "1000.1.0.0/20"
|
2020-10-06 05:54:49 +00:00
|
|
|
with pytest.raises(ClientError) as ex:
|
2021-10-18 19:44:29 +00:00
|
|
|
ec2.create_vpc(CidrBlock=vpc_cidr_block)
|
2020-10-06 06:04:09 +00:00
|
|
|
str(ex.value).should.equal(
|
2019-05-25 17:35:07 +00:00
|
|
|
"An error occurred (InvalidParameterValue) when calling the CreateVpc "
|
2022-11-17 22:41:08 +00:00
|
|
|
f"operation: Value ({vpc_cidr_block}) for parameter cidrBlock is invalid. This is not a valid CIDR block."
|
2019-10-31 15:44:26 +00:00
|
|
|
)
|
2019-05-25 17:35:07 +00:00
|
|
|
|
|
|
|
|
|
|
|
@mock_ec2
|
|
|
|
def test_create_vpc_with_invalid_cidr_range():
|
|
|
|
ec2 = boto3.resource("ec2", region_name="us-west-1")
|
|
|
|
|
|
|
|
vpc_cidr_block = "10.1.0.0/29"
|
2020-10-06 05:54:49 +00:00
|
|
|
with pytest.raises(ClientError) as ex:
|
2021-10-18 19:44:29 +00:00
|
|
|
ec2.create_vpc(CidrBlock=vpc_cidr_block)
|
2020-10-06 06:04:09 +00:00
|
|
|
str(ex.value).should.equal(
|
2019-05-25 17:35:07 +00:00
|
|
|
"An error occurred (InvalidVpc.Range) when calling the CreateVpc "
|
2022-11-17 22:41:08 +00:00
|
|
|
f"operation: The CIDR '{vpc_cidr_block}' is invalid."
|
2019-11-11 20:09:52 +00:00
|
|
|
)
|
|
|
|
|
2019-09-02 10:35:16 +00:00
|
|
|
|
2020-09-27 08:24:17 +00:00
|
|
|
@mock_ec2
|
|
|
|
def test_create_vpc_with_tags():
|
|
|
|
ec2 = boto3.resource("ec2", region_name="us-west-1")
|
|
|
|
# Create VPC
|
|
|
|
vpc = ec2.create_vpc(
|
|
|
|
CidrBlock="10.0.0.0/16",
|
|
|
|
TagSpecifications=[
|
|
|
|
{"ResourceType": "vpc", "Tags": [{"Key": "name", "Value": "some-vpc"}]}
|
|
|
|
],
|
|
|
|
)
|
|
|
|
assert vpc.tags == [{"Key": "name", "Value": "some-vpc"}]
|
|
|
|
|
|
|
|
|
2019-09-02 10:35:16 +00:00
|
|
|
@mock_ec2
|
|
|
|
def test_enable_vpc_classic_link():
|
2019-11-11 20:09:52 +00:00
|
|
|
ec2 = boto3.resource("ec2", region_name="us-west-1")
|
2019-09-02 10:35:16 +00:00
|
|
|
|
|
|
|
# Create VPC
|
2019-11-11 20:09:52 +00:00
|
|
|
vpc = ec2.create_vpc(CidrBlock="10.1.0.0/16")
|
2019-09-02 10:35:16 +00:00
|
|
|
|
|
|
|
response = ec2.meta.client.enable_vpc_classic_link(VpcId=vpc.id)
|
2022-04-18 20:44:56 +00:00
|
|
|
assert response.get("Return").should.equal(True)
|
2019-09-02 10:35:16 +00:00
|
|
|
|
2019-11-12 18:32:27 +00:00
|
|
|
|
2019-09-02 10:35:16 +00:00
|
|
|
@mock_ec2
|
|
|
|
def test_enable_vpc_classic_link_failure():
|
2019-11-11 20:09:52 +00:00
|
|
|
ec2 = boto3.resource("ec2", region_name="us-west-1")
|
2019-09-02 10:35:16 +00:00
|
|
|
|
|
|
|
# Create VPC
|
2019-11-11 20:09:52 +00:00
|
|
|
vpc = ec2.create_vpc(CidrBlock="10.90.0.0/16")
|
2019-09-02 10:35:16 +00:00
|
|
|
|
|
|
|
response = ec2.meta.client.enable_vpc_classic_link(VpcId=vpc.id)
|
2019-11-11 20:09:52 +00:00
|
|
|
assert response.get("Return").should.be.false
|
2019-09-02 10:35:16 +00:00
|
|
|
|
|
|
|
|
|
|
|
@mock_ec2
|
|
|
|
def test_disable_vpc_classic_link():
|
2019-11-11 20:09:52 +00:00
|
|
|
ec2 = boto3.resource("ec2", region_name="us-west-1")
|
2019-09-02 10:35:16 +00:00
|
|
|
|
|
|
|
# Create VPC
|
2019-11-11 20:09:52 +00:00
|
|
|
vpc = ec2.create_vpc(CidrBlock="10.0.0.0/16")
|
2019-09-02 10:35:16 +00:00
|
|
|
|
|
|
|
ec2.meta.client.enable_vpc_classic_link(VpcId=vpc.id)
|
|
|
|
response = ec2.meta.client.disable_vpc_classic_link(VpcId=vpc.id)
|
2019-11-11 20:09:52 +00:00
|
|
|
assert response.get("Return").should.be.false
|
2019-09-02 10:35:16 +00:00
|
|
|
|
|
|
|
|
|
|
|
@mock_ec2
|
|
|
|
def test_describe_classic_link_enabled():
|
2019-11-11 20:09:52 +00:00
|
|
|
ec2 = boto3.resource("ec2", region_name="us-west-1")
|
2019-09-02 10:35:16 +00:00
|
|
|
|
|
|
|
# Create VPC
|
2019-11-11 20:09:52 +00:00
|
|
|
vpc = ec2.create_vpc(CidrBlock="10.0.0.0/16")
|
2019-09-02 10:35:16 +00:00
|
|
|
|
|
|
|
ec2.meta.client.enable_vpc_classic_link(VpcId=vpc.id)
|
|
|
|
response = ec2.meta.client.describe_vpc_classic_link(VpcIds=[vpc.id])
|
2022-04-18 20:44:56 +00:00
|
|
|
assert response.get("Vpcs")[0].get("ClassicLinkEnabled").should.equal(True)
|
2019-09-02 10:35:16 +00:00
|
|
|
|
|
|
|
|
|
|
|
@mock_ec2
|
|
|
|
def test_describe_classic_link_disabled():
|
2019-11-11 20:09:52 +00:00
|
|
|
ec2 = boto3.resource("ec2", region_name="us-west-1")
|
2019-09-02 10:35:16 +00:00
|
|
|
|
|
|
|
# Create VPC
|
2019-11-11 20:09:52 +00:00
|
|
|
vpc = ec2.create_vpc(CidrBlock="10.90.0.0/16")
|
2019-09-02 10:35:16 +00:00
|
|
|
|
|
|
|
response = ec2.meta.client.describe_vpc_classic_link(VpcIds=[vpc.id])
|
2019-11-11 20:09:52 +00:00
|
|
|
assert response.get("Vpcs")[0].get("ClassicLinkEnabled").should.be.false
|
2019-09-02 10:35:16 +00:00
|
|
|
|
|
|
|
|
|
|
|
@mock_ec2
|
|
|
|
def test_describe_classic_link_multiple():
|
2019-11-11 20:09:52 +00:00
|
|
|
ec2 = boto3.resource("ec2", region_name="us-west-1")
|
2019-09-02 10:35:16 +00:00
|
|
|
|
|
|
|
# Create VPC
|
2019-11-11 20:09:52 +00:00
|
|
|
vpc1 = ec2.create_vpc(CidrBlock="10.90.0.0/16")
|
|
|
|
vpc2 = ec2.create_vpc(CidrBlock="10.0.0.0/16")
|
2019-09-02 10:35:16 +00:00
|
|
|
|
|
|
|
ec2.meta.client.enable_vpc_classic_link(VpcId=vpc2.id)
|
|
|
|
response = ec2.meta.client.describe_vpc_classic_link(VpcIds=[vpc1.id, vpc2.id])
|
2019-11-12 22:51:31 +00:00
|
|
|
expected = [
|
|
|
|
{"VpcId": vpc1.id, "ClassicLinkDnsSupported": False},
|
|
|
|
{"VpcId": vpc2.id, "ClassicLinkDnsSupported": True},
|
|
|
|
]
|
2019-11-12 18:32:27 +00:00
|
|
|
|
|
|
|
# Ensure response is sorted, because they can come in random order
|
2019-11-12 22:51:31 +00:00
|
|
|
assert response.get("Vpcs").sort(key=lambda x: x["VpcId"]) == expected.sort(
|
|
|
|
key=lambda x: x["VpcId"]
|
|
|
|
)
|
2019-09-02 11:16:52 +00:00
|
|
|
|
|
|
|
|
|
|
|
@mock_ec2
|
|
|
|
def test_enable_vpc_classic_link_dns_support():
|
2019-11-11 20:09:52 +00:00
|
|
|
ec2 = boto3.resource("ec2", region_name="us-west-1")
|
2019-09-02 11:16:52 +00:00
|
|
|
|
|
|
|
# Create VPC
|
2019-11-11 20:09:52 +00:00
|
|
|
vpc = ec2.create_vpc(CidrBlock="10.1.0.0/16")
|
2019-09-02 11:16:52 +00:00
|
|
|
|
|
|
|
response = ec2.meta.client.enable_vpc_classic_link_dns_support(VpcId=vpc.id)
|
2022-04-18 20:44:56 +00:00
|
|
|
assert response.get("Return").should.equal(True)
|
2019-09-02 11:16:52 +00:00
|
|
|
|
|
|
|
|
|
|
|
@mock_ec2
|
|
|
|
def test_disable_vpc_classic_link_dns_support():
|
2019-11-11 20:09:52 +00:00
|
|
|
ec2 = boto3.resource("ec2", region_name="us-west-1")
|
2019-09-02 11:16:52 +00:00
|
|
|
|
|
|
|
# Create VPC
|
2019-11-11 20:09:52 +00:00
|
|
|
vpc = ec2.create_vpc(CidrBlock="10.0.0.0/16")
|
2019-09-02 11:16:52 +00:00
|
|
|
|
|
|
|
ec2.meta.client.enable_vpc_classic_link_dns_support(VpcId=vpc.id)
|
|
|
|
response = ec2.meta.client.disable_vpc_classic_link_dns_support(VpcId=vpc.id)
|
2019-11-11 20:09:52 +00:00
|
|
|
assert response.get("Return").should.be.false
|
2019-09-02 11:16:52 +00:00
|
|
|
|
|
|
|
|
|
|
|
@mock_ec2
|
|
|
|
def test_describe_classic_link_dns_support_enabled():
|
2019-11-11 20:09:52 +00:00
|
|
|
ec2 = boto3.resource("ec2", region_name="us-west-1")
|
2019-09-02 11:16:52 +00:00
|
|
|
|
|
|
|
# Create VPC
|
2019-11-11 20:09:52 +00:00
|
|
|
vpc = ec2.create_vpc(CidrBlock="10.0.0.0/16")
|
2019-09-02 11:16:52 +00:00
|
|
|
|
|
|
|
ec2.meta.client.enable_vpc_classic_link_dns_support(VpcId=vpc.id)
|
|
|
|
response = ec2.meta.client.describe_vpc_classic_link_dns_support(VpcIds=[vpc.id])
|
2022-04-18 20:44:56 +00:00
|
|
|
assert response.get("Vpcs")[0].get("ClassicLinkDnsSupported").should.equal(True)
|
2019-09-02 11:16:52 +00:00
|
|
|
|
|
|
|
|
|
|
|
@mock_ec2
|
|
|
|
def test_describe_classic_link_dns_support_disabled():
|
2019-11-11 20:09:52 +00:00
|
|
|
ec2 = boto3.resource("ec2", region_name="us-west-1")
|
2019-09-02 11:16:52 +00:00
|
|
|
|
|
|
|
# Create VPC
|
2019-11-11 20:09:52 +00:00
|
|
|
vpc = ec2.create_vpc(CidrBlock="10.90.0.0/16")
|
2019-09-02 11:16:52 +00:00
|
|
|
|
|
|
|
response = ec2.meta.client.describe_vpc_classic_link_dns_support(VpcIds=[vpc.id])
|
2019-11-11 20:09:52 +00:00
|
|
|
assert response.get("Vpcs")[0].get("ClassicLinkDnsSupported").should.be.false
|
2019-09-02 11:16:52 +00:00
|
|
|
|
|
|
|
|
|
|
|
@mock_ec2
|
|
|
|
def test_describe_classic_link_dns_support_multiple():
|
2019-11-11 20:09:52 +00:00
|
|
|
ec2 = boto3.resource("ec2", region_name="us-west-1")
|
2019-09-02 11:16:52 +00:00
|
|
|
|
|
|
|
# Create VPC
|
2019-11-11 20:09:52 +00:00
|
|
|
vpc1 = ec2.create_vpc(CidrBlock="10.90.0.0/16")
|
|
|
|
vpc2 = ec2.create_vpc(CidrBlock="10.0.0.0/16")
|
2019-09-02 11:16:52 +00:00
|
|
|
|
|
|
|
ec2.meta.client.enable_vpc_classic_link_dns_support(VpcId=vpc2.id)
|
2019-11-12 22:51:31 +00:00
|
|
|
response = ec2.meta.client.describe_vpc_classic_link_dns_support(
|
|
|
|
VpcIds=[vpc1.id, vpc2.id]
|
|
|
|
)
|
|
|
|
expected = [
|
|
|
|
{"VpcId": vpc1.id, "ClassicLinkDnsSupported": False},
|
|
|
|
{"VpcId": vpc2.id, "ClassicLinkDnsSupported": True},
|
|
|
|
]
|
2019-11-12 18:32:27 +00:00
|
|
|
|
|
|
|
# Ensure response is sorted, because they can come in random order
|
2019-11-12 22:51:31 +00:00
|
|
|
assert response.get("Vpcs").sort(key=lambda x: x["VpcId"]) == expected.sort(
|
|
|
|
key=lambda x: x["VpcId"]
|
|
|
|
)
|
2020-08-06 05:26:44 +00:00
|
|
|
|
|
|
|
|
2023-03-07 00:21:02 +00:00
|
|
|
@mock_ec2
|
|
|
|
def test_create_vpc_endpoint__policy():
|
|
|
|
ec2 = boto3.client("ec2", region_name="us-west-1")
|
|
|
|
vpc_id = ec2.create_vpc(CidrBlock="10.0.0.0/16")["Vpc"]["VpcId"]
|
|
|
|
# create without policy --> verify the default policy is created
|
|
|
|
default_policy = {
|
|
|
|
"Version": "2008-10-17",
|
|
|
|
"Statement ": [
|
|
|
|
{"Effect": "Allow", "Principal": "*", "Action": "*", "Resource": "*"}
|
|
|
|
],
|
|
|
|
}
|
|
|
|
vpc_end_point = ec2.create_vpc_endpoint(
|
|
|
|
VpcId=vpc_id,
|
|
|
|
ServiceName="com.amazonaws.us-east-1.s3",
|
|
|
|
VpcEndpointType="Gateway",
|
|
|
|
)["VpcEndpoint"]
|
|
|
|
|
|
|
|
vpc_end_point.should.have.key("PolicyDocument")
|
|
|
|
json.loads(vpc_end_point["PolicyDocument"]).should.equal(default_policy)
|
|
|
|
|
|
|
|
# create with policy --> verify the passed policy is returned
|
|
|
|
vpc_end_point = ec2.create_vpc_endpoint(
|
|
|
|
VpcId=vpc_id,
|
|
|
|
ServiceName="com.amazonaws.us-east-1.s3",
|
|
|
|
PolicyDocument="my policy document",
|
|
|
|
VpcEndpointType="Gateway",
|
|
|
|
)["VpcEndpoint"]
|
|
|
|
vpc_end_point.should.have.key("PolicyDocument").equals("my policy document")
|
|
|
|
|
|
|
|
|
2020-12-07 21:39:57 +00:00
|
|
|
@mock_ec2
|
2021-11-23 09:55:47 +00:00
|
|
|
def test_describe_vpc_gateway_end_points():
|
2020-12-07 21:39:57 +00:00
|
|
|
ec2 = boto3.client("ec2", region_name="us-west-1")
|
2021-10-05 17:11:07 +00:00
|
|
|
vpc = ec2.create_vpc(CidrBlock="10.0.0.0/16")["Vpc"]
|
2020-12-07 21:39:57 +00:00
|
|
|
|
2021-10-05 17:11:07 +00:00
|
|
|
route_table = ec2.create_route_table(VpcId=vpc["VpcId"])["RouteTable"]
|
2020-12-07 21:39:57 +00:00
|
|
|
vpc_end_point = ec2.create_vpc_endpoint(
|
2021-10-05 17:11:07 +00:00
|
|
|
VpcId=vpc["VpcId"],
|
2020-12-07 21:39:57 +00:00
|
|
|
ServiceName="com.amazonaws.us-east-1.s3",
|
2021-10-05 17:11:07 +00:00
|
|
|
RouteTableIds=[route_table["RouteTableId"]],
|
2022-05-09 13:06:01 +00:00
|
|
|
VpcEndpointType="Gateway",
|
2021-10-05 17:11:07 +00:00
|
|
|
)["VpcEndpoint"]
|
|
|
|
our_id = vpc_end_point["VpcEndpointId"]
|
|
|
|
|
|
|
|
all_endpoints = retrieve_all_endpoints(ec2)
|
|
|
|
[e["VpcEndpointId"] for e in all_endpoints].should.contain(our_id)
|
|
|
|
our_endpoint = [e for e in all_endpoints if e["VpcEndpointId"] == our_id][0]
|
2022-04-18 20:44:56 +00:00
|
|
|
vpc_end_point["PrivateDnsEnabled"].should.equal(True)
|
|
|
|
our_endpoint["PrivateDnsEnabled"].should.equal(True)
|
2021-10-05 17:11:07 +00:00
|
|
|
|
|
|
|
our_endpoint["VpcId"].should.equal(vpc["VpcId"])
|
|
|
|
our_endpoint["RouteTableIds"].should.equal([route_table["RouteTableId"]])
|
|
|
|
|
2022-05-09 13:06:01 +00:00
|
|
|
our_endpoint.should.have.key("VpcEndpointType").equal("Gateway")
|
2021-10-05 17:11:07 +00:00
|
|
|
our_endpoint.should.have.key("ServiceName").equal("com.amazonaws.us-east-1.s3")
|
|
|
|
our_endpoint.should.have.key("State").equal("available")
|
|
|
|
|
|
|
|
endpoint_by_id = ec2.describe_vpc_endpoints(VpcEndpointIds=[our_id])[
|
|
|
|
"VpcEndpoints"
|
|
|
|
][0]
|
|
|
|
endpoint_by_id["VpcEndpointId"].should.equal(our_id)
|
|
|
|
endpoint_by_id["VpcId"].should.equal(vpc["VpcId"])
|
|
|
|
endpoint_by_id["RouteTableIds"].should.equal([route_table["RouteTableId"]])
|
2022-05-09 13:06:01 +00:00
|
|
|
endpoint_by_id["VpcEndpointType"].should.equal("Gateway")
|
2021-10-05 17:11:07 +00:00
|
|
|
endpoint_by_id["ServiceName"].should.equal("com.amazonaws.us-east-1.s3")
|
|
|
|
endpoint_by_id["State"].should.equal("available")
|
2020-12-07 21:39:57 +00:00
|
|
|
|
2022-05-09 13:06:01 +00:00
|
|
|
gateway_endpoints = ec2.describe_vpc_endpoints(
|
|
|
|
Filters=[{"Name": "vpc-endpoint-type", "Values": ["Gateway"]}]
|
|
|
|
)["VpcEndpoints"]
|
|
|
|
[e["VpcEndpointId"] for e in gateway_endpoints].should.contain(our_id)
|
|
|
|
|
2021-10-05 17:11:07 +00:00
|
|
|
with pytest.raises(ClientError) as ex:
|
|
|
|
ec2.describe_vpc_endpoints(VpcEndpointIds=[route_table["RouteTableId"]])
|
|
|
|
err = ex.value.response["Error"]
|
|
|
|
err["Code"].should.equal("InvalidVpcEndpointId.NotFound")
|
2020-12-07 21:39:57 +00:00
|
|
|
|
|
|
|
|
2021-11-23 09:55:47 +00:00
|
|
|
@mock_ec2
|
|
|
|
def test_describe_vpc_interface_end_points():
|
|
|
|
ec2 = boto3.client("ec2", region_name="us-west-1")
|
|
|
|
vpc = ec2.create_vpc(CidrBlock="10.0.0.0/16")["Vpc"]
|
|
|
|
subnet = ec2.create_subnet(VpcId=vpc["VpcId"], CidrBlock="10.0.1.0/24")["Subnet"]
|
|
|
|
|
|
|
|
route_table = ec2.create_route_table(VpcId=vpc["VpcId"])["RouteTable"]
|
|
|
|
vpc_end_point = ec2.create_vpc_endpoint(
|
|
|
|
VpcId=vpc["VpcId"],
|
|
|
|
ServiceName="com.tester.my-test-endpoint",
|
|
|
|
VpcEndpointType="interface",
|
|
|
|
SubnetIds=[subnet["SubnetId"]],
|
|
|
|
)["VpcEndpoint"]
|
|
|
|
our_id = vpc_end_point["VpcEndpointId"]
|
|
|
|
|
|
|
|
vpc_end_point["DnsEntries"].should.have.length_of(1)
|
|
|
|
vpc_end_point["DnsEntries"][0].should.have.key("DnsName").should.match(
|
|
|
|
r".*com\.tester\.my-test-endpoint$"
|
|
|
|
)
|
|
|
|
vpc_end_point["DnsEntries"][0].should.have.key("HostedZoneId")
|
|
|
|
|
|
|
|
all_endpoints = retrieve_all_endpoints(ec2)
|
|
|
|
[e["VpcEndpointId"] for e in all_endpoints].should.contain(our_id)
|
|
|
|
our_endpoint = [e for e in all_endpoints if e["VpcEndpointId"] == our_id][0]
|
2022-04-18 20:44:56 +00:00
|
|
|
vpc_end_point["PrivateDnsEnabled"].should.equal(True)
|
|
|
|
our_endpoint["PrivateDnsEnabled"].should.equal(True)
|
2021-11-23 09:55:47 +00:00
|
|
|
|
|
|
|
our_endpoint["VpcId"].should.equal(vpc["VpcId"])
|
|
|
|
our_endpoint.should_not.have.key("RouteTableIds")
|
|
|
|
|
|
|
|
our_endpoint["DnsEntries"].should.equal(vpc_end_point["DnsEntries"])
|
|
|
|
|
|
|
|
our_endpoint.should.have.key("VpcEndpointType").equal("interface")
|
|
|
|
our_endpoint.should.have.key("ServiceName").equal("com.tester.my-test-endpoint")
|
|
|
|
our_endpoint.should.have.key("State").equal("available")
|
|
|
|
|
|
|
|
endpoint_by_id = ec2.describe_vpc_endpoints(VpcEndpointIds=[our_id])[
|
|
|
|
"VpcEndpoints"
|
|
|
|
][0]
|
|
|
|
endpoint_by_id["VpcEndpointId"].should.equal(our_id)
|
|
|
|
endpoint_by_id["VpcId"].should.equal(vpc["VpcId"])
|
|
|
|
endpoint_by_id.should_not.have.key("RouteTableIds")
|
|
|
|
endpoint_by_id["VpcEndpointType"].should.equal("interface")
|
|
|
|
endpoint_by_id["ServiceName"].should.equal("com.tester.my-test-endpoint")
|
|
|
|
endpoint_by_id["State"].should.equal("available")
|
|
|
|
endpoint_by_id["DnsEntries"].should.equal(vpc_end_point["DnsEntries"])
|
|
|
|
|
|
|
|
with pytest.raises(ClientError) as ex:
|
|
|
|
ec2.describe_vpc_endpoints(VpcEndpointIds=[route_table["RouteTableId"]])
|
|
|
|
err = ex.value.response["Error"]
|
|
|
|
err["Code"].should.equal("InvalidVpcEndpointId.NotFound")
|
|
|
|
|
|
|
|
|
2021-10-05 17:11:07 +00:00
|
|
|
def retrieve_all_endpoints(ec2):
|
|
|
|
resp = ec2.describe_vpc_endpoints()
|
|
|
|
all_endpoints = resp["VpcEndpoints"]
|
|
|
|
next_token = resp.get("NextToken")
|
|
|
|
while next_token:
|
|
|
|
resp = ec2.describe_vpc_endpoints(NextToken=next_token)
|
|
|
|
all_endpoints.extend(resp["VpcEndpoints"])
|
|
|
|
next_token = resp.get("NextToken")
|
|
|
|
return all_endpoints
|
2021-08-16 14:13:50 +00:00
|
|
|
|
|
|
|
|
2022-10-04 20:26:17 +00:00
|
|
|
@mock_ec2
|
|
|
|
def test_modify_vpc_endpoint():
|
|
|
|
ec2 = boto3.client("ec2", region_name="us-west-1")
|
|
|
|
vpc_id = ec2.create_vpc(CidrBlock="10.0.0.0/16")["Vpc"]["VpcId"]
|
|
|
|
subnet_id1 = ec2.create_subnet(VpcId=vpc_id, CidrBlock="10.0.1.0/24")["Subnet"][
|
|
|
|
"SubnetId"
|
|
|
|
]
|
|
|
|
subnet_id2 = ec2.create_subnet(VpcId=vpc_id, CidrBlock="10.0.2.0/24")["Subnet"][
|
|
|
|
"SubnetId"
|
|
|
|
]
|
|
|
|
|
|
|
|
rt_id = ec2.create_route_table(VpcId=vpc_id)["RouteTable"]["RouteTableId"]
|
|
|
|
endpoint = ec2.create_vpc_endpoint(
|
|
|
|
VpcId=vpc_id,
|
|
|
|
ServiceName="com.tester.my-test-endpoint",
|
|
|
|
VpcEndpointType="interface",
|
|
|
|
SubnetIds=[subnet_id1],
|
|
|
|
)["VpcEndpoint"]
|
|
|
|
vpc_id = endpoint["VpcEndpointId"]
|
|
|
|
|
|
|
|
ec2.modify_vpc_endpoint(
|
|
|
|
VpcEndpointId=vpc_id,
|
|
|
|
AddSubnetIds=[subnet_id2],
|
|
|
|
)
|
|
|
|
|
|
|
|
endpoint = ec2.describe_vpc_endpoints(VpcEndpointIds=[vpc_id])["VpcEndpoints"][0]
|
|
|
|
endpoint["SubnetIds"].should.equal([subnet_id1, subnet_id2])
|
|
|
|
|
|
|
|
ec2.modify_vpc_endpoint(VpcEndpointId=vpc_id, AddRouteTableIds=[rt_id])
|
|
|
|
endpoint = ec2.describe_vpc_endpoints(VpcEndpointIds=[vpc_id])["VpcEndpoints"][0]
|
|
|
|
endpoint.should.have.key("RouteTableIds").equals([rt_id])
|
|
|
|
|
|
|
|
ec2.modify_vpc_endpoint(VpcEndpointId=vpc_id, RemoveRouteTableIds=[rt_id])
|
|
|
|
endpoint = ec2.describe_vpc_endpoints(VpcEndpointIds=[vpc_id])["VpcEndpoints"][0]
|
|
|
|
endpoint.shouldnt.have.key("RouteTableIds")
|
|
|
|
|
|
|
|
ec2.modify_vpc_endpoint(
|
|
|
|
VpcEndpointId=vpc_id,
|
|
|
|
PolicyDocument="doc",
|
|
|
|
)
|
|
|
|
endpoint = ec2.describe_vpc_endpoints(VpcEndpointIds=[vpc_id])["VpcEndpoints"][0]
|
|
|
|
endpoint.should.have.key("PolicyDocument").equals("doc")
|
|
|
|
|
|
|
|
|
2021-08-16 14:13:50 +00:00
|
|
|
@mock_ec2
|
|
|
|
def test_delete_vpc_end_points():
|
|
|
|
ec2 = boto3.client("ec2", region_name="us-west-1")
|
2021-10-05 17:11:07 +00:00
|
|
|
vpc = ec2.create_vpc(CidrBlock="10.0.0.0/16")["Vpc"]
|
2021-08-16 14:13:50 +00:00
|
|
|
|
2021-10-05 17:11:07 +00:00
|
|
|
route_table = ec2.create_route_table(VpcId=vpc["VpcId"])["RouteTable"]
|
2021-08-16 14:13:50 +00:00
|
|
|
vpc_end_point1 = ec2.create_vpc_endpoint(
|
2021-10-05 17:11:07 +00:00
|
|
|
VpcId=vpc["VpcId"],
|
2021-09-16 21:49:49 +00:00
|
|
|
ServiceName="com.amazonaws.us-west-1.s3",
|
2021-10-05 17:11:07 +00:00
|
|
|
RouteTableIds=[route_table["RouteTableId"]],
|
2021-08-16 14:13:50 +00:00
|
|
|
VpcEndpointType="gateway",
|
|
|
|
)["VpcEndpoint"]
|
|
|
|
vpc_end_point2 = ec2.create_vpc_endpoint(
|
2021-10-05 17:11:07 +00:00
|
|
|
VpcId=vpc["VpcId"],
|
2021-09-16 21:49:49 +00:00
|
|
|
ServiceName="com.amazonaws.us-west-1.s3",
|
2021-10-05 17:11:07 +00:00
|
|
|
RouteTableIds=[route_table["RouteTableId"]],
|
2021-08-16 14:13:50 +00:00
|
|
|
VpcEndpointType="gateway",
|
2021-10-05 17:11:07 +00:00
|
|
|
)["VpcEndpoint"]
|
2021-08-16 14:13:50 +00:00
|
|
|
|
2021-10-05 17:11:07 +00:00
|
|
|
vpc_endpoints = retrieve_all_endpoints(ec2)
|
|
|
|
all_ids = [e["VpcEndpointId"] for e in vpc_endpoints]
|
|
|
|
all_ids.should.contain(vpc_end_point1["VpcEndpointId"])
|
|
|
|
all_ids.should.contain(vpc_end_point2["VpcEndpointId"])
|
2021-08-16 14:13:50 +00:00
|
|
|
|
|
|
|
ec2.delete_vpc_endpoints(VpcEndpointIds=[vpc_end_point1["VpcEndpointId"]])
|
|
|
|
|
2021-10-05 17:11:07 +00:00
|
|
|
vpc_endpoints = retrieve_all_endpoints(ec2)
|
|
|
|
all_ids = [e["VpcEndpointId"] for e in vpc_endpoints]
|
|
|
|
all_ids.should.contain(vpc_end_point1["VpcEndpointId"])
|
|
|
|
all_ids.should.contain(vpc_end_point2["VpcEndpointId"])
|
|
|
|
|
|
|
|
ep1 = ec2.describe_vpc_endpoints(VpcEndpointIds=[vpc_end_point1["VpcEndpointId"]])[
|
|
|
|
"VpcEndpoints"
|
|
|
|
][0]
|
|
|
|
ep1["State"].should.equal("deleted")
|
2021-08-16 14:13:50 +00:00
|
|
|
|
2021-10-05 17:11:07 +00:00
|
|
|
ep2 = ec2.describe_vpc_endpoints(VpcEndpointIds=[vpc_end_point2["VpcEndpointId"]])[
|
|
|
|
"VpcEndpoints"
|
|
|
|
][0]
|
|
|
|
ep2["State"].should.equal("available")
|
2021-10-15 22:43:00 +00:00
|
|
|
|
|
|
|
|
|
|
|
@mock_ec2
|
|
|
|
def test_describe_vpcs_dryrun():
|
|
|
|
client = boto3.client("ec2", region_name="us-east-1")
|
|
|
|
|
|
|
|
with pytest.raises(ClientError) as ex:
|
|
|
|
client.describe_vpcs(DryRun=True)
|
|
|
|
ex.value.response["ResponseMetadata"]["HTTPStatusCode"].should.equal(412)
|
|
|
|
ex.value.response["Error"]["Code"].should.equal("DryRunOperation")
|
|
|
|
ex.value.response["Error"]["Message"].should.equal(
|
|
|
|
"An error occurred (DryRunOperation) when calling the DescribeVpcs operation: Request would have succeeded, but DryRun flag is set"
|
|
|
|
)
|
2022-02-07 19:07:15 +00:00
|
|
|
|
|
|
|
|
|
|
|
@mock_ec2
|
|
|
|
def test_describe_prefix_lists():
|
|
|
|
client = boto3.client("ec2", region_name="us-east-1")
|
|
|
|
result_unfiltered = client.describe_prefix_lists()
|
|
|
|
assert len(result_unfiltered["PrefixLists"]) > 1
|
|
|
|
result_filtered = client.describe_prefix_lists(
|
|
|
|
Filters=[
|
|
|
|
{"Name": "prefix-list-name", "Values": ["com.amazonaws.us-east-1.s3"]},
|
|
|
|
]
|
|
|
|
)
|
|
|
|
assert len(result_filtered["PrefixLists"]) == 1
|