# -*- coding: utf-8 -*- import json import boto3 import pytest import moto.server as server from moto import mock_secretsmanager, mock_lambda, mock_iam, mock_logs, settings from tests.markers import requires_docker from tests.test_awslambda.test_lambda import get_test_zip_file1 DEFAULT_SECRET_NAME = "test-secret" @mock_secretsmanager def test_get_secret_value(): backend = server.create_backend_app("secretsmanager") test_client = backend.test_client() test_client.post( "/", data={"Name": DEFAULT_SECRET_NAME, "SecretString": "foo-secret"}, headers={"X-Amz-Target": "secretsmanager.CreateSecret"}, ) get_secret = test_client.post( "/", data={"SecretId": DEFAULT_SECRET_NAME, "VersionStage": "AWSCURRENT"}, headers={"X-Amz-Target": "secretsmanager.GetSecretValue"}, ) json_data = json.loads(get_secret.data.decode("utf-8")) assert json_data["SecretString"] == "foo-secret" @mock_secretsmanager def test_get_secret_that_does_not_exist(): backend = server.create_backend_app("secretsmanager") test_client = backend.test_client() get_secret = test_client.post( "/", data={"SecretId": "i-dont-exist", "VersionStage": "AWSCURRENT"}, headers={"X-Amz-Target": "secretsmanager.GetSecretValue"}, ) json_data = json.loads(get_secret.data.decode("utf-8")) assert json_data["message"] == "Secrets Manager can't find the specified secret." assert json_data["__type"] == "ResourceNotFoundException" @mock_secretsmanager def test_get_secret_that_does_not_match(): backend = server.create_backend_app("secretsmanager") test_client = backend.test_client() test_client.post( "/", data={"Name": DEFAULT_SECRET_NAME, "SecretString": "foo-secret"}, headers={"X-Amz-Target": "secretsmanager.CreateSecret"}, ) get_secret = test_client.post( "/", data={"SecretId": "i-dont-match", "VersionStage": "AWSCURRENT"}, headers={"X-Amz-Target": "secretsmanager.GetSecretValue"}, ) json_data = json.loads(get_secret.data.decode("utf-8")) assert json_data["message"] == "Secrets Manager can't find the specified secret." assert json_data["__type"] == "ResourceNotFoundException" @mock_secretsmanager def test_get_secret_that_has_no_value(): backend = server.create_backend_app("secretsmanager") test_client = backend.test_client() test_client.post( "/", data={"Name": DEFAULT_SECRET_NAME}, headers={"X-Amz-Target": "secretsmanager.CreateSecret"}, ) get_secret = test_client.post( "/", data={"SecretId": DEFAULT_SECRET_NAME}, headers={"X-Amz-Target": "secretsmanager.GetSecretValue"}, ) json_data = json.loads(get_secret.data.decode("utf-8")) assert ( json_data["message"] == "Secrets Manager can't find the specified secret value for staging label: AWSCURRENT" ) assert json_data["__type"] == "ResourceNotFoundException" @mock_secretsmanager def test_create_secret(): backend = server.create_backend_app("secretsmanager") test_client = backend.test_client() res = test_client.post( "/", data={"Name": "test-secret", "SecretString": "foo-secret"}, headers={"X-Amz-Target": "secretsmanager.CreateSecret"}, ) res_2 = test_client.post( "/", data={"Name": "test-secret-2", "SecretString": "bar-secret"}, headers={"X-Amz-Target": "secretsmanager.CreateSecret"}, ) json_data = json.loads(res.data.decode("utf-8")) assert json_data["ARN"] != "" assert json_data["Name"] == "test-secret" json_data_2 = json.loads(res_2.data.decode("utf-8")) assert json_data_2["ARN"] != "" assert json_data_2["Name"] == "test-secret-2" @mock_secretsmanager def test_describe_secret(): backend = server.create_backend_app("secretsmanager") test_client = backend.test_client() test_client.post( "/", data={"Name": "test-secret", "SecretString": "foosecret"}, headers={"X-Amz-Target": "secretsmanager.CreateSecret"}, ) describe_secret = test_client.post( "/", data={"SecretId": "test-secret"}, headers={"X-Amz-Target": "secretsmanager.DescribeSecret"}, ) test_client.post( "/", data={"Name": "test-secret-2", "SecretString": "barsecret"}, headers={"X-Amz-Target": "secretsmanager.CreateSecret"}, ) describe_secret_2 = test_client.post( "/", data={"SecretId": "test-secret-2"}, headers={"X-Amz-Target": "secretsmanager.DescribeSecret"}, ) json_data = json.loads(describe_secret.data.decode("utf-8")) assert json_data # Returned dict is not empty assert json_data["ARN"] != "" assert json_data["Name"] == "test-secret" json_data_2 = json.loads(describe_secret_2.data.decode("utf-8")) assert json_data_2 # Returned dict is not empty assert json_data_2["ARN"] != "" assert json_data_2["Name"] == "test-secret-2" @mock_secretsmanager def test_describe_secret_that_does_not_exist(): backend = server.create_backend_app("secretsmanager") test_client = backend.test_client() describe_secret = test_client.post( "/", data={"SecretId": "i-dont-exist"}, headers={"X-Amz-Target": "secretsmanager.DescribeSecret"}, ) json_data = json.loads(describe_secret.data.decode("utf-8")) assert json_data["message"] == "Secrets Manager can't find the specified secret." assert json_data["__type"] == "ResourceNotFoundException" @mock_secretsmanager def test_describe_secret_that_does_not_match(): backend = server.create_backend_app("secretsmanager") test_client = backend.test_client() test_client.post( "/", data={"Name": DEFAULT_SECRET_NAME, "SecretString": "foosecret"}, headers={"X-Amz-Target": "secretsmanager.CreateSecret"}, ) describe_secret = test_client.post( "/", data={"SecretId": "i-dont-match"}, headers={"X-Amz-Target": "secretsmanager.DescribeSecret"}, ) json_data = json.loads(describe_secret.data.decode("utf-8")) assert json_data["message"] == "Secrets Manager can't find the specified secret." assert json_data["__type"] == "ResourceNotFoundException" @mock_secretsmanager def test_rotate_secret(): backend = server.create_backend_app("secretsmanager") test_client = backend.test_client() test_client.post( "/", data={"Name": DEFAULT_SECRET_NAME, "SecretString": "foosecret"}, headers={"X-Amz-Target": "secretsmanager.CreateSecret"}, ) client_request_token = "EXAMPLE2-90ab-cdef-fedc-ba987SECRET2" rotate_secret = test_client.post( "/", data={ "SecretId": DEFAULT_SECRET_NAME, "ClientRequestToken": client_request_token, }, headers={"X-Amz-Target": "secretsmanager.RotateSecret"}, ) json_data = json.loads(rotate_secret.data.decode("utf-8")) assert json_data # Returned dict is not empty assert json_data["ARN"] != "" assert json_data["Name"] == DEFAULT_SECRET_NAME assert json_data["VersionId"] == client_request_token # @mock_secretsmanager # def test_rotate_secret_enable_rotation(): # backend = server.create_backend_app('secretsmanager') # test_client = backend.test_client() # create_secret = test_client.post( # '/', # data={ # "Name": "test-secret", # "SecretString": "foosecret" # }, # headers={ # "X-Amz-Target": "secretsmanager.CreateSecret" # }, # ) # initial_description = test_client.post( # '/', # data={ # "SecretId": "test-secret" # }, # headers={ # "X-Amz-Target": "secretsmanager.DescribeSecret" # }, # ) # json_data = json.loads(initial_description.data.decode("utf-8")) # assert json_data # Returned dict is not empty # assert json_data['RotationEnabled'] is False # assert json_data['RotationRules']['AutomaticallyAfterDays'] == 0 # rotate_secret = test_client.post( # '/', # data={ # "SecretId": "test-secret", # "RotationRules": {"AutomaticallyAfterDays": 42} # }, # headers={ # "X-Amz-Target": "secretsmanager.RotateSecret" # }, # ) # rotated_description = test_client.post( # '/', # data={ # "SecretId": "test-secret" # }, # headers={ # "X-Amz-Target": "secretsmanager.DescribeSecret" # }, # ) # json_data = json.loads(rotated_description.data.decode("utf-8")) # assert json_data # Returned dict is not empty # assert json_data['RotationEnabled'] is True # assert json_data['RotationRules']['AutomaticallyAfterDays'] == 42 @mock_secretsmanager def test_rotate_secret_that_does_not_exist(): backend = server.create_backend_app("secretsmanager") test_client = backend.test_client() rotate_secret = test_client.post( "/", data={"SecretId": "i-dont-exist"}, headers={"X-Amz-Target": "secretsmanager.RotateSecret"}, ) json_data = json.loads(rotate_secret.data.decode("utf-8")) assert json_data["message"] == "Secrets Manager can't find the specified secret." assert json_data["__type"] == "ResourceNotFoundException" @mock_secretsmanager def test_rotate_secret_that_does_not_match(): backend = server.create_backend_app("secretsmanager") test_client = backend.test_client() test_client.post( "/", data={"Name": DEFAULT_SECRET_NAME, "SecretString": "foosecret"}, headers={"X-Amz-Target": "secretsmanager.CreateSecret"}, ) rotate_secret = test_client.post( "/", data={"SecretId": "i-dont-match"}, headers={"X-Amz-Target": "secretsmanager.RotateSecret"}, ) json_data = json.loads(rotate_secret.data.decode("utf-8")) assert json_data["message"] == "Secrets Manager can't find the specified secret." assert json_data["__type"] == "ResourceNotFoundException" @mock_secretsmanager def test_rotate_secret_that_is_still_rotating(): backend = server.create_backend_app("secretsmanager") test_client = backend.test_client() create_secret = test_client.post( "/", data={ "Name": DEFAULT_SECRET_NAME, "SecretString": "foosecret", # "VersionStages": ["AWSPENDING"], }, headers={"X-Amz-Target": "secretsmanager.CreateSecret"}, ) create_secret = json.loads(create_secret.data.decode("utf-8")) # Get the secret into a broken state. version_id = create_secret["VersionId"] test_client.post( "/", data={ "SecretId": "test-secret", "VersionStage": "AWSPENDING", "MoveToVersionId": version_id, }, headers={"X-Amz-Target": "secretsmanager.UpdateSecretVersionStage"}, ) describe_secret = test_client.post( "/", data={"SecretId": DEFAULT_SECRET_NAME}, headers={"X-Amz-Target": "secretsmanager.DescribeSecret"}, ) metadata = json.loads(describe_secret.data.decode("utf-8")) assert metadata["SecretVersionsToStages"][version_id] == [ "AWSCURRENT", "AWSPENDING", ] # Then attempt to rotate it rotate_secret = test_client.post( "/", data={"SecretId": DEFAULT_SECRET_NAME}, headers={"X-Amz-Target": "secretsmanager.RotateSecret"}, ) assert rotate_secret.status_code == 400 @mock_secretsmanager def test_rotate_secret_client_request_token_too_short(): backend = server.create_backend_app("secretsmanager") test_client = backend.test_client() test_client.post( "/", data={"Name": DEFAULT_SECRET_NAME, "SecretString": "foosecret"}, headers={"X-Amz-Target": "secretsmanager.CreateSecret"}, ) client_request_token = "ED9F8B6C-85B7-B7E4-38F2A3BEB13C" rotate_secret = test_client.post( "/", data={ "SecretId": DEFAULT_SECRET_NAME, "ClientRequestToken": client_request_token, }, headers={"X-Amz-Target": "secretsmanager.RotateSecret"}, ) json_data = json.loads(rotate_secret.data.decode("utf-8")) assert json_data["message"] == "ClientRequestToken must be 32-64 characters long." assert json_data["__type"] == "InvalidParameterException" @mock_secretsmanager def test_rotate_secret_client_request_token_too_long(): backend = server.create_backend_app("secretsmanager") test_client = backend.test_client() test_client.post( "/", data={"Name": DEFAULT_SECRET_NAME, "SecretString": "foosecret"}, headers={"X-Amz-Target": "secretsmanager.CreateSecret"}, ) client_request_token = ( "ED9F8B6C-85B7-446A-B7E4-38F2A3BEB13C-ED9F8B6C-85B7-446A-B7E4-38F2A3BEB13C" ) rotate_secret = test_client.post( "/", data={ "SecretId": DEFAULT_SECRET_NAME, "ClientRequestToken": client_request_token, }, headers={"X-Amz-Target": "secretsmanager.RotateSecret"}, ) json_data = json.loads(rotate_secret.data.decode("utf-8")) assert json_data["message"] == "ClientRequestToken must be 32-64 characters long." assert json_data["__type"] == "InvalidParameterException" @mock_secretsmanager def test_rotate_secret_rotation_lambda_arn_too_long(): backend = server.create_backend_app("secretsmanager") test_client = backend.test_client() test_client.post( "/", data={"Name": DEFAULT_SECRET_NAME, "SecretString": "foosecret"}, headers={"X-Amz-Target": "secretsmanager.CreateSecret"}, ) rotation_lambda_arn = "85B7-446A-B7E4" * 147 # == 2058 characters rotate_secret = test_client.post( "/", data={ "SecretId": DEFAULT_SECRET_NAME, "RotationLambdaARN": rotation_lambda_arn, }, headers={"X-Amz-Target": "secretsmanager.RotateSecret"}, ) json_data = json.loads(rotate_secret.data.decode("utf-8")) assert json_data["message"] == "RotationLambdaARN must <= 2048 characters long." assert json_data["__type"] == "InvalidParameterException" if not settings.TEST_SERVER_MODE: @mock_iam @mock_lambda @mock_logs @mock_secretsmanager @requires_docker def test_rotate_secret_lambda_invocations(): conn = boto3.client("iam", region_name="us-east-1") logs_conn = boto3.client("logs", region_name="us-east-1") role = conn.create_role( RoleName="role", AssumeRolePolicyDocument="some policy", Path="/my-path/" ) conn = boto3.client("lambda", region_name="us-east-1") func = conn.create_function( FunctionName="testFunction", Code={"ZipFile": get_test_zip_file1()}, Handler="lambda_function.lambda_handler", Runtime="python3.11", Role=role["Role"]["Arn"], ) secretsmanager_backend = server.create_backend_app("secretsmanager") secretsmanager_client = secretsmanager_backend.test_client() secretsmanager_client.post( "/", data={"Name": DEFAULT_SECRET_NAME, "SecretString": "foosecret"}, headers={"X-Amz-Target": "secretsmanager.CreateSecret"}, ) with pytest.raises(logs_conn.exceptions.ResourceNotFoundException): # The log group doesn't exist yet logs_conn.describe_log_streams(logGroupName="/aws/lambda/testFunction") secretsmanager_client.post( "/", data={ "SecretId": DEFAULT_SECRET_NAME, "RotationLambdaARN": func["FunctionArn"], }, headers={"X-Amz-Target": "secretsmanager.RotateSecret"}, ) # The log group now exists and has been logged to 4 times (for each invocation) logs = logs_conn.describe_log_streams(logGroupName="/aws/lambda/testFunction") assert len(logs["logStreams"]) == 4 @mock_iam @mock_lambda @mock_logs @mock_secretsmanager def test_rotate_secret_with_incorrect_lambda_arn(): secretsmanager_backend = server.create_backend_app("secretsmanager") secretsmanager_client = secretsmanager_backend.test_client() secretsmanager_client.post( "/", data={"Name": DEFAULT_SECRET_NAME, "SecretString": "foosecret"}, headers={"X-Amz-Target": "secretsmanager.CreateSecret"}, ) resp = secretsmanager_client.post( "/", data={"SecretId": DEFAULT_SECRET_NAME, "RotationLambdaARN": "notarealarn"}, headers={"X-Amz-Target": "secretsmanager.RotateSecret"}, ) json_data = json.loads(resp.data.decode("utf-8")) assert json_data["message"] == "Resource not found for ARN 'notarealarn'." assert json_data["__type"] == "ResourceNotFoundException" assert resp.status_code == 404 @mock_secretsmanager def test_put_secret_value_puts_new_secret(): backend = server.create_backend_app("secretsmanager") test_client = backend.test_client() test_client.post( "/", data={"Name": DEFAULT_SECRET_NAME, "SecretString": "foosecret"}, headers={"X-Amz-Target": "secretsmanager.CreateSecret"}, ) test_client.post( "/", data={ "SecretId": DEFAULT_SECRET_NAME, "SecretString": "foosecret", "VersionStages": ["AWSCURRENT"], }, headers={"X-Amz-Target": "secretsmanager.PutSecretValue"}, ) put_second_secret_value_json = test_client.post( "/", data={ "SecretId": DEFAULT_SECRET_NAME, "SecretString": "foosecret", "VersionStages": ["AWSCURRENT"], }, headers={"X-Amz-Target": "secretsmanager.PutSecretValue"}, ) second_secret_json_data = json.loads( put_second_secret_value_json.data.decode("utf-8") ) version_id = second_secret_json_data["VersionId"] secret_value_json = test_client.post( "/", data={ "SecretId": DEFAULT_SECRET_NAME, "VersionId": version_id, "VersionStage": "AWSCURRENT", }, headers={"X-Amz-Target": "secretsmanager.GetSecretValue"}, ) second_secret_json_data = json.loads(secret_value_json.data.decode("utf-8")) assert second_secret_json_data assert second_secret_json_data["SecretString"] == "foosecret" @mock_secretsmanager def test_put_secret_value_can_get_first_version_if_put_twice(): backend = server.create_backend_app("secretsmanager") test_client = backend.test_client() first_secret_string = "first_secret" second_secret_string = "second_secret" test_client.post( "/", data={"Name": DEFAULT_SECRET_NAME, "SecretString": "foosecret"}, headers={"X-Amz-Target": "secretsmanager.CreateSecret"}, ) put_first_secret_value_json = test_client.post( "/", data={ "SecretId": DEFAULT_SECRET_NAME, "SecretString": first_secret_string, "VersionStages": ["AWSCURRENT"], }, headers={"X-Amz-Target": "secretsmanager.PutSecretValue"}, ) first_secret_json_data = json.loads( put_first_secret_value_json.data.decode("utf-8") ) first_secret_version_id = first_secret_json_data["VersionId"] test_client.post( "/", data={ "SecretId": DEFAULT_SECRET_NAME, "SecretString": second_secret_string, "VersionStages": ["AWSCURRENT"], }, headers={"X-Amz-Target": "secretsmanager.PutSecretValue"}, ) get_first_secret_value_json = test_client.post( "/", data={ "SecretId": DEFAULT_SECRET_NAME, "VersionId": first_secret_version_id, "VersionStage": "AWSPREVIOUS", }, headers={"X-Amz-Target": "secretsmanager.GetSecretValue"}, ) get_first_secret_json_data = json.loads( get_first_secret_value_json.data.decode("utf-8") ) assert get_first_secret_json_data assert get_first_secret_json_data["SecretString"] == first_secret_string @mock_secretsmanager def test_put_secret_value_versions_differ_if_same_secret_put_twice(): backend = server.create_backend_app("secretsmanager") test_client = backend.test_client() test_client.post( "/", data={"Name": DEFAULT_SECRET_NAME, "SecretString": "foosecret"}, headers={"X-Amz-Target": "secretsmanager.CreateSecret"}, ) put_first_secret_value_json = test_client.post( "/", data={ "SecretId": DEFAULT_SECRET_NAME, "SecretString": "secret", "VersionStages": ["AWSCURRENT"], }, headers={"X-Amz-Target": "secretsmanager.PutSecretValue"}, ) first_secret_json_data = json.loads( put_first_secret_value_json.data.decode("utf-8") ) first_secret_version_id = first_secret_json_data["VersionId"] put_second_secret_value_json = test_client.post( "/", data={ "SecretId": DEFAULT_SECRET_NAME, "SecretString": "secret", "VersionStages": ["AWSCURRENT"], }, headers={"X-Amz-Target": "secretsmanager.PutSecretValue"}, ) second_secret_json_data = json.loads( put_second_secret_value_json.data.decode("utf-8") ) second_secret_version_id = second_secret_json_data["VersionId"] assert first_secret_version_id != second_secret_version_id @mock_secretsmanager def test_can_list_secret_version_ids(): backend = server.create_backend_app("secretsmanager") test_client = backend.test_client() test_client.post( "/", data={"Name": DEFAULT_SECRET_NAME, "SecretString": "foosecret"}, headers={"X-Amz-Target": "secretsmanager.CreateSecret"}, ) put_first_secret_value_json = test_client.post( "/", data={ "SecretId": DEFAULT_SECRET_NAME, "SecretString": "secret", "VersionStages": ["AWSCURRENT"], }, headers={"X-Amz-Target": "secretsmanager.PutSecretValue"}, ) first_secret_json_data = json.loads( put_first_secret_value_json.data.decode("utf-8") ) first_secret_version_id = first_secret_json_data["VersionId"] put_second_secret_value_json = test_client.post( "/", data={ "SecretId": DEFAULT_SECRET_NAME, "SecretString": "secret", "VersionStages": ["AWSCURRENT"], }, headers={"X-Amz-Target": "secretsmanager.PutSecretValue"}, ) second_secret_json_data = json.loads( put_second_secret_value_json.data.decode("utf-8") ) second_secret_version_id = second_secret_json_data["VersionId"] list_secret_versions_json = test_client.post( "/", data={"SecretId": DEFAULT_SECRET_NAME}, headers={"X-Amz-Target": "secretsmanager.ListSecretVersionIds"}, ) versions_list = json.loads(list_secret_versions_json.data.decode("utf-8")) returned_version_ids = [v["VersionId"] for v in versions_list["Versions"]] assert [ first_secret_version_id, second_secret_version_id, ].sort() == returned_version_ids.sort() @mock_secretsmanager def test_get_resource_policy_secret(): backend = server.create_backend_app("secretsmanager") test_client = backend.test_client() test_client.post( "/", data={"Name": "test-secret", "SecretString": "foosecret"}, headers={"X-Amz-Target": "secretsmanager.CreateSecret"}, ) describe_secret = test_client.post( "/", data={"SecretId": "test-secret"}, headers={"X-Amz-Target": "secretsmanager.GetResourcePolicy"}, ) json_data = json.loads(describe_secret.data.decode("utf-8")) assert json_data # Returned dict is not empty assert json_data["ARN"] != "" assert json_data["Name"] == "test-secret" @mock_secretsmanager @pytest.mark.parametrize("pass_arn", [True, False]) def test_update_secret_version_stage(pass_arn): custom_stage = "CUSTOM_STAGE" backend = server.create_backend_app("secretsmanager") test_client = backend.test_client() create_secret = test_client.post( "/", data={"Name": "test-secret", "SecretString": "secret"}, headers={"X-Amz-Target": "secretsmanager.CreateSecret"}, ) create_secret = json.loads(create_secret.data.decode("utf-8")) secret_id = create_secret["ARN"] if pass_arn else DEFAULT_SECRET_NAME initial_version = create_secret["VersionId"] # Create a new version put_secret = test_client.post( "/", data={ "SecretId": secret_id, "SecretString": "secret", "VersionStages": [custom_stage], }, headers={"X-Amz-Target": "secretsmanager.PutSecretValue"}, ) put_secret = json.loads(put_secret.data.decode("utf-8")) assert put_secret["VersionStages"] == [custom_stage] new_version = put_secret["VersionId"] describe_secret = test_client.post( "/", data={"SecretId": secret_id}, headers={"X-Amz-Target": "secretsmanager.DescribeSecret"}, ) json_data = json.loads(describe_secret.data.decode("utf-8")) stages = json_data["SecretVersionsToStages"] assert len(stages) == 2 assert stages[initial_version] == ["AWSCURRENT"] assert stages[new_version] == [custom_stage] resp = test_client.post( "/", data={ "SecretId": secret_id, "VersionStage": custom_stage, "RemoveFromVersionId": new_version, "MoveToVersionId": initial_version, }, headers={"X-Amz-Target": "secretsmanager.UpdateSecretVersionStage"}, ) resp = json.loads(resp.data.decode("utf-8")) assert resp.get("ARN") == create_secret["ARN"] assert resp.get("Name") == DEFAULT_SECRET_NAME describe_secret = test_client.post( "/", data={"SecretId": secret_id}, headers={"X-Amz-Target": "secretsmanager.DescribeSecret"}, ) json_data = json.loads(describe_secret.data.decode("utf-8")) stages = json_data["SecretVersionsToStages"] assert len(stages) == 2 assert stages[initial_version] == ["AWSCURRENT", custom_stage] assert stages[new_version] == [] @mock_secretsmanager def test_update_secret_version_stage_currentversion_handling(): backend = server.create_backend_app("secretsmanager") test_client = backend.test_client() create_secret = test_client.post( "/", data={"Name": "test-secret", "SecretString": "secret"}, headers={"X-Amz-Target": "secretsmanager.CreateSecret"}, ) create_secret = json.loads(create_secret.data.decode("utf-8")) initial_version = create_secret["VersionId"] # Create a new version put_secret = test_client.post( "/", data={"SecretId": DEFAULT_SECRET_NAME, "SecretString": "secret"}, headers={"X-Amz-Target": "secretsmanager.PutSecretValue"}, ) put_secret = json.loads(put_secret.data.decode("utf-8")) new_version = put_secret["VersionId"] describe_secret = test_client.post( "/", data={"SecretId": "test-secret"}, headers={"X-Amz-Target": "secretsmanager.DescribeSecret"}, ) json_data = json.loads(describe_secret.data.decode("utf-8")) stages = json_data["SecretVersionsToStages"] assert len(stages) == 2 assert stages[initial_version] == ["AWSPREVIOUS"] assert stages[new_version] == ["AWSCURRENT"] test_client.post( "/", data={ "SecretId": "test-secret", "VersionStage": "AWSCURRENT", "RemoveFromVersionId": new_version, "MoveToVersionId": initial_version, }, headers={"X-Amz-Target": "secretsmanager.UpdateSecretVersionStage"}, ) describe_secret = test_client.post( "/", data={"SecretId": "test-secret"}, headers={"X-Amz-Target": "secretsmanager.DescribeSecret"}, ) json_data = json.loads(describe_secret.data.decode("utf-8")) stages = json_data["SecretVersionsToStages"] assert len(stages) == 2 assert stages[initial_version] == ["AWSCURRENT"] assert stages[new_version] == ["AWSPREVIOUS"] @mock_secretsmanager def test_update_secret_version_stage_validation(): backend = server.create_backend_app("secretsmanager") test_client = backend.test_client() # Secret ID that doesn't exist resp = test_client.post( "/", data={"SecretId": "nonexistent"}, headers={"X-Amz-Target": "secretsmanager.UpdateSecretVersionStage"}, ) assert resp.status_code == 404 # Add a secret so we can run further checks secret = test_client.post( "/", data={"Name": DEFAULT_SECRET_NAME, "SecretString": "secret"}, headers={"X-Amz-Target": "secretsmanager.CreateSecret"}, ) secret = json.loads(secret.data.decode("utf-8")) # "Remove from" version ID that doesn't exist resp = test_client.post( "/", data={"SecretId": DEFAULT_SECRET_NAME, "RemoveFromVersionId": "nonexistent"}, headers={"X-Amz-Target": "secretsmanager.UpdateSecretVersionStage"}, ) assert resp.status_code == 400 # "Remove from" stage name which isn't attached to the given version resp = test_client.post( "/", data={ "SecretId": DEFAULT_SECRET_NAME, "RemoveFromVersionId": secret["VersionId"], "VersionStage": "nonexistent", }, headers={"X-Amz-Target": "secretsmanager.UpdateSecretVersionStage"}, ) assert resp.status_code == 400 # "Move to" version ID that doesn't exist resp = test_client.post( "/", data={"SecretId": DEFAULT_SECRET_NAME, "MoveToVersionId": "nonexistent"}, headers={"X-Amz-Target": "secretsmanager.UpdateSecretVersionStage"}, ) assert resp.status_code == 400 # # The following tests should work, but fail on the embedded dict in # RotationRules. The error message suggests a problem deeper in the code, which # needs further investigation. # # @mock_secretsmanager # def test_rotate_secret_rotation_period_zero(): # backend = server.create_backend_app('secretsmanager') # test_client = backend.test_client() # create_secret = test_client.post('/', # data={"Name": "test-secret", # "SecretString": "foosecret"}, # headers={ # "X-Amz-Target": "secretsmanager.CreateSecret" # }, # ) # rotate_secret = test_client.post('/', # data={"SecretId": "test-secret", # "RotationRules": {"AutomaticallyAfterDays": 0}}, # headers={ # "X-Amz-Target": "secretsmanager.RotateSecret" # }, # ) # json_data = json.loads(rotate_secret.data.decode("utf-8")) # assert json_data['message'] == "RotationRules.AutomaticallyAfterDays must be within 1-1000." # assert json_data['__type'] == 'InvalidParameterException' # @mock_secretsmanager # def test_rotate_secret_rotation_period_too_long(): # backend = server.create_backend_app('secretsmanager') # test_client = backend.test_client() # create_secret = test_client.post('/', # data={"Name": "test-secret", # "SecretString": "foosecret"}, # headers={ # "X-Amz-Target": "secretsmanager.CreateSecret" # }, # ) # rotate_secret = test_client.post('/', # data={"SecretId": "test-secret", # "RotationRules": {"AutomaticallyAfterDays": 1001}}, # headers={ # "X-Amz-Target": "secretsmanager.RotateSecret" # }, # ) # json_data = json.loads(rotate_secret.data.decode("utf-8")) # assert json_data['message'] == "RotationRules.AutomaticallyAfterDays must be within 1-1000." # assert json_data['__type'] == 'InvalidParameterException'