Fix:Add functionality authorize-cluster-security-group-ingress (#3742)
* Fix:Add functionality authorize-cluster-security-group-ingress * Added tests * Added more test cases
This commit is contained in:
parent
5aefbb1e51
commit
433e4c0733
@ -157,3 +157,11 @@ class UnknownSnapshotCopyRegionFaultError(RedshiftClientError):
|
||||
super(UnknownSnapshotCopyRegionFaultError, self).__init__(
|
||||
"UnknownSnapshotCopyRegionFault", message
|
||||
)
|
||||
|
||||
|
||||
class ClusterSecurityGroupNotFoundFaultError(RedshiftClientError):
|
||||
def __init__(self):
|
||||
super(ClusterSecurityGroupNotFoundFaultError, self).__init__(
|
||||
"ClusterSecurityGroupNotFoundFault",
|
||||
"The cluster security group name does not refer to an existing cluster security group.",
|
||||
)
|
||||
|
@ -28,6 +28,7 @@ from .exceptions import (
|
||||
SnapshotCopyGrantAlreadyExistsFaultError,
|
||||
SnapshotCopyGrantNotFoundFaultError,
|
||||
UnknownSnapshotCopyRegionFaultError,
|
||||
ClusterSecurityGroupNotFoundFaultError,
|
||||
)
|
||||
|
||||
|
||||
@ -423,6 +424,7 @@ class SecurityGroup(TaggableResourceMixin, BaseModel):
|
||||
super(SecurityGroup, self).__init__(region_name, tags)
|
||||
self.cluster_security_group_name = cluster_security_group_name
|
||||
self.description = description
|
||||
self.ingress_rules = []
|
||||
|
||||
@property
|
||||
def resource_id(self):
|
||||
@ -749,6 +751,16 @@ class RedshiftBackend(BaseBackend):
|
||||
return self.security_groups.pop(security_group_identifier)
|
||||
raise ClusterSecurityGroupNotFoundError(security_group_identifier)
|
||||
|
||||
def authorize_cluster_security_group_ingress(self, security_group_name, cidr_ip):
|
||||
security_group = self.security_groups.get(security_group_name)
|
||||
if not security_group:
|
||||
raise ClusterSecurityGroupNotFoundFaultError()
|
||||
|
||||
# just adding the cidr_ip as ingress rule for now as there is no security rule
|
||||
security_group.ingress_rules.append(cidr_ip)
|
||||
|
||||
return security_group
|
||||
|
||||
def create_cluster_parameter_group(
|
||||
self,
|
||||
cluster_parameter_group_name,
|
||||
|
@ -412,6 +412,34 @@ class RedshiftResponse(BaseResponse):
|
||||
}
|
||||
)
|
||||
|
||||
def authorize_cluster_security_group_ingress(self):
|
||||
cluster_security_group_name = self._get_param("ClusterSecurityGroupName")
|
||||
cidr_ip = self._get_param("CIDRIP")
|
||||
|
||||
security_group = self.redshift_backend.authorize_cluster_security_group_ingress(
|
||||
cluster_security_group_name, cidr_ip
|
||||
)
|
||||
|
||||
return self.get_response(
|
||||
{
|
||||
"AuthorizeClusterSecurityGroupIngressResponse": {
|
||||
"AuthorizeClusterSecurityGroupIngressResult": {
|
||||
"ClusterSecurityGroup": {
|
||||
"ClusterSecurityGroupName": cluster_security_group_name,
|
||||
"Description": security_group.description,
|
||||
"IPRanges": [
|
||||
{
|
||||
"Status": "authorized",
|
||||
"CIDRIP": cidr_ip,
|
||||
"Tags": security_group.tags,
|
||||
},
|
||||
],
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
)
|
||||
|
||||
def create_cluster_parameter_group(self):
|
||||
cluster_parameter_group_name = self._get_param("ParameterGroupName")
|
||||
group_family = self._get_param("ParameterGroupFamily")
|
||||
|
@ -616,6 +616,58 @@ def test_create_cluster_subnet_group():
|
||||
set(subnet_ids).should.equal(set([subnet1.id, subnet2.id]))
|
||||
|
||||
|
||||
@mock_redshift
|
||||
def test_authorize_security_group_ingress():
|
||||
iam_roles_arn = ["arn:aws:iam:::role/my-iam-role"]
|
||||
client = boto3.client("redshift", region_name="us-east-1")
|
||||
cluster_identifier = "my_cluster"
|
||||
|
||||
client.create_cluster(
|
||||
ClusterIdentifier=cluster_identifier,
|
||||
NodeType="single-node",
|
||||
MasterUsername="username",
|
||||
MasterUserPassword="password",
|
||||
IamRoles=iam_roles_arn,
|
||||
)
|
||||
|
||||
client.create_cluster_security_group(
|
||||
ClusterSecurityGroupName="security_group",
|
||||
Description="security_group_description",
|
||||
)
|
||||
|
||||
response = client.authorize_cluster_security_group_ingress(
|
||||
ClusterSecurityGroupName="security_group", CIDRIP="192.168.10.0/28"
|
||||
)
|
||||
|
||||
assert (
|
||||
response.get("ClusterSecurityGroup").get("ClusterSecurityGroupName")
|
||||
== "security_group"
|
||||
)
|
||||
assert (
|
||||
response.get("ClusterSecurityGroup").get("Description")
|
||||
== "security_group_description"
|
||||
)
|
||||
assert (
|
||||
response.get("ClusterSecurityGroup").get("IPRanges")[0].get("Status")
|
||||
== "authorized"
|
||||
)
|
||||
assert (
|
||||
response.get("ClusterSecurityGroup").get("IPRanges")[0].get("CIDRIP")
|
||||
== "192.168.10.0/28"
|
||||
)
|
||||
|
||||
with pytest.raises(ClientError) as ex:
|
||||
client.authorize_cluster_security_group_ingress(
|
||||
ClusterSecurityGroupName="invalid_security_group", CIDRIP="192.168.10.0/28"
|
||||
)
|
||||
assert ex.value.response["Error"]["Code"] == "ClusterSecurityGroupNotFoundFault"
|
||||
|
||||
assert (
|
||||
ex.value.response["Error"]["Message"]
|
||||
== "The cluster security group name does not refer to an existing cluster security group."
|
||||
)
|
||||
|
||||
|
||||
@mock_redshift_deprecated
|
||||
@mock_ec2_deprecated
|
||||
def test_create_invalid_cluster_subnet_group():
|
||||
|
Loading…
Reference in New Issue
Block a user