* fix OPTIONS requests on non-existing API GW integrations * add cloudformation models for API Gateway deployments * bump version * add backdoor to return CloudWatch metrics * Updating implementation coverage * Updating implementation coverage * add cloudformation models for API Gateway deployments * Updating implementation coverage * Updating implementation coverage * Implemented get-caller-identity returning real data depending on the access key used. * bump version * minor fixes * fix Number data_type for SQS message attribute * fix handling of encoding errors * bump version * make CF stack queryable before starting to initialize its resources * bump version * fix integration_method for API GW method integrations * fix undefined status in CF FakeStack * Fix apigateway issues with terraform v0.12.21 * resource_methods -> add handle for "DELETE" method * integrations -> fix issue that "httpMethod" wasn't included in body request (this value was set as the value from refer method resource) * bump version * Fix setting http method for API gateway integrations (#6) * bump version * remove duplicate methods * add storage class to S3 Key when completing multipart upload (#7) * fix SQS performance issues; bump version * add pagination to SecretsManager list-secrets (#9) * fix default parameter groups in RDS * fix adding S3 metadata headers with names containing dots (#13) * Updating implementation coverage * Updating implementation coverage * add cloudformation models for API Gateway deployments * Updating implementation coverage * Updating implementation coverage * Implemented get-caller-identity returning real data depending on the access key used. * make CF stack queryable before starting to initialize its resources * bump version * remove duplicate methods * fix adding S3 metadata headers with names containing dots (#13) * Update amis.json to support EKS AMI mocks (#15) * fix PascalCase for boolean value in ListMultipartUploads response (#17); fix _get_multi_param to parse nested list/dict query params * determine non-zero container exit code in Batch API * support filtering by dimensions in CW get_metric_statistics * fix storing attributes for ELBv2 Route entities; API GW refactorings for TF tests * add missing fields for API GW resources * fix error messages for Route53 (TF-compat) * various fixes for IAM resources (tf-compat) * minor fixes for API GW models (tf-compat) * minor fixes for API GW responses (tf-compat) * add s3 exception for bucket notification filter rule validation * change the way RESTErrors generate the response body and content-type header * fix lint errors and disable "black" syntax enforcement * remove return type hint in RESTError.get_body * add RESTError XML template for IAM exceptions * add support for API GW minimumCompressionSize * fix casing getting PrivateDnsEnabled API GW attribute * minor fixes for error responses * fix escaping special chars for IAM role descriptions (tf-compat) * minor fixes and tagging support for API GW and ELB v2 (tf-compat) * Merge branch 'master' into localstack * add "AlarmRule" attribute to enable support for composite CloudWatch metrics * fix recursive parsing of complex/nested query params * bump version * add API to delete S3 website configurations (#18) * use dict copy to allow parallelism and avoid concurrent modification exceptions in S3 * fix precondition check for etags in S3 (#19) * minor fix for user filtering in Cognito * fix API Gateway error response; avoid returning empty response templates (tf-compat) * support tags and tracingEnabled attribute for API GW stages * fix boolean value in S3 encryption response (#20) * fix connection arn structure * fix api destination arn structure * black format * release 2.0.3.37 * fix s3 exception tests see botocore/parsers.py:1002 where RequestId is removed from parsed * remove python 2 from build action * add test failure annotations in build action * fix events test arn comparisons * fix s3 encryption response test * return default value "0" if EC2 availableIpAddressCount is empty * fix extracting SecurityGroupIds for EC2 VPC endpoints * support deleting/updating API Gateway DomainNames * fix(events): Return empty string instead of null when no pattern is specified in EventPattern (tf-compat) (#22) * fix logic and revert CF changes to get tests running again (#21) * add support for EC2 customer gateway API (#25) * add support for EC2 Transit Gateway APIs (#24) * feat(logs): add `kmsKeyId` into `LogGroup` entity (#23) * minor change in ELBv2 logic to fix tests * feat(events): add APIs to describe and delete CloudWatch Events connections (#26) * add support for EC2 transit gateway route tables (#27) * pass transit gateway route table ID in Describe API, minor refactoring (#29) * add support for EC2 Transit Gateway Routes (#28) * fix region on ACM certificate import (#31) * add support for EC2 transit gateway attachments (#30) * add support for EC2 Transit Gateway VPN attachments (#32) * fix account ID for logs API * add support for DeleteOrganization API * feat(events): store raw filter representation for CloudWatch events patterns (tf-compat) (#36) * feat(events): add support to describe/update/delete CloudWatch API destinations (#35) * add Cognito UpdateIdentityPool, CW Logs PutResourcePolicy * feat(events): add support for tags in EventBus API (#38) * fix parameter validation for Batch compute environments (tf-compat) * revert merge conflicts in IMPLEMENTATION_COVERAGE.md * format code using black * restore original README; re-enable and fix CloudFormation tests * restore tests and old logic for CF stack parameters from SSM * parameterize RequestId/RequestID in response messages and revert related test changes * undo LocalStack-specific adaptations * minor fix * Update CodeCov config to reflect removal of Py2 * undo change related to CW metric filtering; add additional test for CW metric statistics with dimensions * Terraform - Extend whitelist of running tests Co-authored-by: acsbendi <acsbendi28@gmail.com> Co-authored-by: Phan Duong <duongpv@outlook.com> Co-authored-by: Thomas Rausch <thomas@thrau.at> Co-authored-by: Macwan Nevil <macnev2013@gmail.com> Co-authored-by: Dominik Schubert <dominik.schubert91@gmail.com> Co-authored-by: Gonzalo Saad <saad.gonzalo.ale@gmail.com> Co-authored-by: Mohit Alonja <monty16597@users.noreply.github.com> Co-authored-by: Miguel Gagliardo <migag9@gmail.com> Co-authored-by: Bert Blommers <info@bertblommers.nl>
		
			
				
	
	
		
			100 lines
		
	
	
		
			3.8 KiB
		
	
	
	
		
			Python
		
	
	
	
	
	
			
		
		
	
	
			100 lines
		
	
	
		
			3.8 KiB
		
	
	
	
		
			Python
		
	
	
	
	
	
import json
 | 
						|
 | 
						|
import pytest
 | 
						|
 | 
						|
from moto.events.models import EventPattern
 | 
						|
 | 
						|
 | 
						|
def test_event_pattern_with_allowed_values_event_filter():
 | 
						|
    pattern = EventPattern(json.dumps({"source": ["foo", "bar"]}))
 | 
						|
    assert pattern.matches_event({"source": "foo"})
 | 
						|
    assert pattern.matches_event({"source": "bar"})
 | 
						|
    assert not pattern.matches_event({"source": "baz"})
 | 
						|
 | 
						|
 | 
						|
def test_event_pattern_with_nested_event_filter():
 | 
						|
    pattern = EventPattern(json.dumps({"detail": {"foo": ["bar"]}}))
 | 
						|
    assert pattern.matches_event({"detail": {"foo": "bar"}})
 | 
						|
    assert not pattern.matches_event({"detail": {"foo": "baz"}})
 | 
						|
 | 
						|
 | 
						|
def test_event_pattern_with_exists_event_filter():
 | 
						|
    foo_exists = EventPattern(json.dumps({"detail": {"foo": [{"exists": True}]}}))
 | 
						|
    assert foo_exists.matches_event({"detail": {"foo": "bar"}})
 | 
						|
    assert not foo_exists.matches_event({"detail": {}})
 | 
						|
    # exists filters only match leaf nodes of an event
 | 
						|
    assert not foo_exists.matches_event({"detail": {"foo": {"bar": "baz"}}})
 | 
						|
 | 
						|
    foo_not_exists = EventPattern(json.dumps({"detail": {"foo": [{"exists": False}]}}))
 | 
						|
    assert not foo_not_exists.matches_event({"detail": {"foo": "bar"}})
 | 
						|
    assert foo_not_exists.matches_event({"detail": {}})
 | 
						|
    assert foo_not_exists.matches_event({"detail": {"foo": {"bar": "baz"}}})
 | 
						|
 | 
						|
    bar_exists = EventPattern(json.dumps({"detail": {"bar": [{"exists": True}]}}))
 | 
						|
    assert not bar_exists.matches_event({"detail": {"foo": "bar"}})
 | 
						|
    assert not bar_exists.matches_event({"detail": {}})
 | 
						|
 | 
						|
    bar_not_exists = EventPattern(json.dumps({"detail": {"bar": [{"exists": False}]}}))
 | 
						|
    assert bar_not_exists.matches_event({"detail": {"foo": "bar"}})
 | 
						|
    assert bar_not_exists.matches_event({"detail": {}})
 | 
						|
 | 
						|
 | 
						|
def test_event_pattern_with_prefix_event_filter():
 | 
						|
    pattern = EventPattern(json.dumps({"detail": {"foo": [{"prefix": "bar"}]}}))
 | 
						|
    assert pattern.matches_event({"detail": {"foo": "bar"}})
 | 
						|
    assert pattern.matches_event({"detail": {"foo": "bar!"}})
 | 
						|
    assert not pattern.matches_event({"detail": {"foo": "ba"}})
 | 
						|
 | 
						|
 | 
						|
@pytest.mark.parametrize(
 | 
						|
    "operator, compare_to, should_match, should_not_match",
 | 
						|
    [
 | 
						|
        ("<", 1, [0], [1, 2]),
 | 
						|
        ("<=", 1, [0, 1], [2]),
 | 
						|
        ("=", 1, [1], [0, 2]),
 | 
						|
        (">", 1, [2], [0, 1]),
 | 
						|
        (">=", 1, [1, 2], [0]),
 | 
						|
    ],
 | 
						|
)
 | 
						|
def test_event_pattern_with_single_numeric_event_filter(
 | 
						|
    operator, compare_to, should_match, should_not_match
 | 
						|
):
 | 
						|
    pattern = EventPattern(
 | 
						|
        json.dumps({"detail": {"foo": [{"numeric": [operator, compare_to]}]}})
 | 
						|
    )
 | 
						|
    for number in should_match:
 | 
						|
        assert pattern.matches_event({"detail": {"foo": number}})
 | 
						|
    for number in should_not_match:
 | 
						|
        assert not pattern.matches_event({"detail": {"foo": number}})
 | 
						|
 | 
						|
 | 
						|
def test_event_pattern_with_multi_numeric_event_filter():
 | 
						|
    events = [{"detail": {"foo": number}} for number in range(5)]
 | 
						|
 | 
						|
    one_or_two = EventPattern(
 | 
						|
        json.dumps({"detail": {"foo": [{"numeric": [">=", 1, "<", 3]}]}})
 | 
						|
    )
 | 
						|
    assert not one_or_two.matches_event(events[0])
 | 
						|
    assert one_or_two.matches_event(events[1])
 | 
						|
    assert one_or_two.matches_event(events[2])
 | 
						|
    assert not one_or_two.matches_event(events[3])
 | 
						|
    assert not one_or_two.matches_event(events[4])
 | 
						|
 | 
						|
    two_or_three = EventPattern(
 | 
						|
        json.dumps({"detail": {"foo": [{"numeric": [">", 1, "<=", 3]}]}})
 | 
						|
    )
 | 
						|
    assert not two_or_three.matches_event(events[0])
 | 
						|
    assert not two_or_three.matches_event(events[1])
 | 
						|
    assert two_or_three.matches_event(events[2])
 | 
						|
    assert two_or_three.matches_event(events[3])
 | 
						|
    assert not two_or_three.matches_event(events[4])
 | 
						|
 | 
						|
 | 
						|
@pytest.mark.parametrize(
 | 
						|
    "pattern, expected_str",
 | 
						|
    [('{"source": ["foo", "bar"]}', '{"source": ["foo", "bar"]}'), (None, ""),],
 | 
						|
)
 | 
						|
def test_event_pattern_str(pattern, expected_str):
 | 
						|
    event_pattern = EventPattern(pattern)
 | 
						|
    assert str(event_pattern) == expected_str
 |