f4f8527955
* fix OPTIONS requests on non-existing API GW integrations * add cloudformation models for API Gateway deployments * bump version * add backdoor to return CloudWatch metrics * Updating implementation coverage * Updating implementation coverage * add cloudformation models for API Gateway deployments * Updating implementation coverage * Updating implementation coverage * Implemented get-caller-identity returning real data depending on the access key used. * bump version * minor fixes * fix Number data_type for SQS message attribute * fix handling of encoding errors * bump version * make CF stack queryable before starting to initialize its resources * bump version * fix integration_method for API GW method integrations * fix undefined status in CF FakeStack * Fix apigateway issues with terraform v0.12.21 * resource_methods -> add handle for "DELETE" method * integrations -> fix issue that "httpMethod" wasn't included in body request (this value was set as the value from refer method resource) * bump version * Fix setting http method for API gateway integrations (#6) * bump version * remove duplicate methods * add storage class to S3 Key when completing multipart upload (#7) * fix SQS performance issues; bump version * add pagination to SecretsManager list-secrets (#9) * fix default parameter groups in RDS * fix adding S3 metadata headers with names containing dots (#13) * Updating implementation coverage * Updating implementation coverage * add cloudformation models for API Gateway deployments * Updating implementation coverage * Updating implementation coverage * Implemented get-caller-identity returning real data depending on the access key used. * make CF stack queryable before starting to initialize its resources * bump version * remove duplicate methods * fix adding S3 metadata headers with names containing dots (#13) * Update amis.json to support EKS AMI mocks (#15) * fix PascalCase for boolean value in ListMultipartUploads response (#17); fix _get_multi_param to parse nested list/dict query params * determine non-zero container exit code in Batch API * support filtering by dimensions in CW get_metric_statistics * fix storing attributes for ELBv2 Route entities; API GW refactorings for TF tests * add missing fields for API GW resources * fix error messages for Route53 (TF-compat) * various fixes for IAM resources (tf-compat) * minor fixes for API GW models (tf-compat) * minor fixes for API GW responses (tf-compat) * add s3 exception for bucket notification filter rule validation * change the way RESTErrors generate the response body and content-type header * fix lint errors and disable "black" syntax enforcement * remove return type hint in RESTError.get_body * add RESTError XML template for IAM exceptions * add support for API GW minimumCompressionSize * fix casing getting PrivateDnsEnabled API GW attribute * minor fixes for error responses * fix escaping special chars for IAM role descriptions (tf-compat) * minor fixes and tagging support for API GW and ELB v2 (tf-compat) * Merge branch 'master' into localstack * add "AlarmRule" attribute to enable support for composite CloudWatch metrics * fix recursive parsing of complex/nested query params * bump version * add API to delete S3 website configurations (#18) * use dict copy to allow parallelism and avoid concurrent modification exceptions in S3 * fix precondition check for etags in S3 (#19) * minor fix for user filtering in Cognito * fix API Gateway error response; avoid returning empty response templates (tf-compat) * support tags and tracingEnabled attribute for API GW stages * fix boolean value in S3 encryption response (#20) * fix connection arn structure * fix api destination arn structure * black format * release 2.0.3.37 * fix s3 exception tests see botocore/parsers.py:1002 where RequestId is removed from parsed * remove python 2 from build action * add test failure annotations in build action * fix events test arn comparisons * fix s3 encryption response test * return default value "0" if EC2 availableIpAddressCount is empty * fix extracting SecurityGroupIds for EC2 VPC endpoints * support deleting/updating API Gateway DomainNames * fix(events): Return empty string instead of null when no pattern is specified in EventPattern (tf-compat) (#22) * fix logic and revert CF changes to get tests running again (#21) * add support for EC2 customer gateway API (#25) * add support for EC2 Transit Gateway APIs (#24) * feat(logs): add `kmsKeyId` into `LogGroup` entity (#23) * minor change in ELBv2 logic to fix tests * feat(events): add APIs to describe and delete CloudWatch Events connections (#26) * add support for EC2 transit gateway route tables (#27) * pass transit gateway route table ID in Describe API, minor refactoring (#29) * add support for EC2 Transit Gateway Routes (#28) * fix region on ACM certificate import (#31) * add support for EC2 transit gateway attachments (#30) * add support for EC2 Transit Gateway VPN attachments (#32) * fix account ID for logs API * add support for DeleteOrganization API * feat(events): store raw filter representation for CloudWatch events patterns (tf-compat) (#36) * feat(events): add support to describe/update/delete CloudWatch API destinations (#35) * add Cognito UpdateIdentityPool, CW Logs PutResourcePolicy * feat(events): add support for tags in EventBus API (#38) * fix parameter validation for Batch compute environments (tf-compat) * revert merge conflicts in IMPLEMENTATION_COVERAGE.md * format code using black * restore original README; re-enable and fix CloudFormation tests * restore tests and old logic for CF stack parameters from SSM * parameterize RequestId/RequestID in response messages and revert related test changes * undo LocalStack-specific adaptations * minor fix * Update CodeCov config to reflect removal of Py2 * undo change related to CW metric filtering; add additional test for CW metric statistics with dimensions * Terraform - Extend whitelist of running tests Co-authored-by: acsbendi <acsbendi28@gmail.com> Co-authored-by: Phan Duong <duongpv@outlook.com> Co-authored-by: Thomas Rausch <thomas@thrau.at> Co-authored-by: Macwan Nevil <macnev2013@gmail.com> Co-authored-by: Dominik Schubert <dominik.schubert91@gmail.com> Co-authored-by: Gonzalo Saad <saad.gonzalo.ale@gmail.com> Co-authored-by: Mohit Alonja <monty16597@users.noreply.github.com> Co-authored-by: Miguel Gagliardo <migag9@gmail.com> Co-authored-by: Bert Blommers <info@bertblommers.nl>
563 lines
20 KiB
Python
563 lines
20 KiB
Python
from __future__ import unicode_literals
|
|
|
|
import pytest
|
|
|
|
import boto3
|
|
from botocore.exceptions import ClientError
|
|
import boto
|
|
import boto.ec2
|
|
from boto.exception import EC2ResponseError
|
|
import sure # noqa
|
|
|
|
from moto import mock_ec2, mock_ec2_deprecated
|
|
from tests.helpers import requires_boto_gte
|
|
|
|
|
|
@mock_ec2_deprecated
|
|
def test_elastic_network_interfaces():
|
|
conn = boto.connect_vpc("the_key", "the_secret")
|
|
vpc = conn.create_vpc("10.0.0.0/16")
|
|
subnet = conn.create_subnet(vpc.id, "10.0.0.0/18")
|
|
|
|
with pytest.raises(EC2ResponseError) as ex:
|
|
eni = conn.create_network_interface(subnet.id, dry_run=True)
|
|
ex.value.error_code.should.equal("DryRunOperation")
|
|
ex.value.status.should.equal(400)
|
|
ex.value.message.should.equal(
|
|
"An error occurred (DryRunOperation) when calling the CreateNetworkInterface operation: Request would have succeeded, but DryRun flag is set"
|
|
)
|
|
|
|
conn.create_network_interface(subnet.id)
|
|
|
|
all_enis = conn.get_all_network_interfaces()
|
|
all_enis.should.have.length_of(1)
|
|
eni = all_enis[0]
|
|
eni.groups.should.have.length_of(0)
|
|
eni.private_ip_addresses.should.have.length_of(1)
|
|
eni.private_ip_addresses[0].private_ip_address.startswith("10.").should.be.true
|
|
|
|
with pytest.raises(EC2ResponseError) as ex:
|
|
conn.delete_network_interface(eni.id, dry_run=True)
|
|
ex.value.error_code.should.equal("DryRunOperation")
|
|
ex.value.status.should.equal(400)
|
|
ex.value.message.should.equal(
|
|
"An error occurred (DryRunOperation) when calling the DeleteNetworkInterface operation: Request would have succeeded, but DryRun flag is set"
|
|
)
|
|
|
|
conn.delete_network_interface(eni.id)
|
|
|
|
all_enis = conn.get_all_network_interfaces()
|
|
all_enis.should.have.length_of(0)
|
|
|
|
with pytest.raises(EC2ResponseError) as cm:
|
|
conn.delete_network_interface(eni.id)
|
|
cm.value.error_code.should.equal("InvalidNetworkInterfaceID.NotFound")
|
|
cm.value.status.should.equal(400)
|
|
cm.value.request_id.should_not.be.none
|
|
|
|
|
|
@mock_ec2_deprecated
|
|
def test_elastic_network_interfaces_subnet_validation():
|
|
conn = boto.connect_vpc("the_key", "the_secret")
|
|
|
|
with pytest.raises(EC2ResponseError) as cm:
|
|
conn.create_network_interface("subnet-abcd1234")
|
|
cm.value.error_code.should.equal("InvalidSubnetID.NotFound")
|
|
cm.value.status.should.equal(400)
|
|
cm.value.request_id.should_not.be.none
|
|
|
|
|
|
@mock_ec2_deprecated
|
|
def test_elastic_network_interfaces_with_private_ip():
|
|
conn = boto.connect_vpc("the_key", "the_secret")
|
|
vpc = conn.create_vpc("10.0.0.0/16")
|
|
subnet = conn.create_subnet(vpc.id, "10.0.0.0/18")
|
|
private_ip = "54.0.0.1"
|
|
eni = conn.create_network_interface(subnet.id, private_ip)
|
|
|
|
all_enis = conn.get_all_network_interfaces()
|
|
all_enis.should.have.length_of(1)
|
|
|
|
eni = all_enis[0]
|
|
eni.groups.should.have.length_of(0)
|
|
|
|
eni.private_ip_addresses.should.have.length_of(1)
|
|
eni.private_ip_addresses[0].private_ip_address.should.equal(private_ip)
|
|
|
|
|
|
@mock_ec2_deprecated
|
|
def test_elastic_network_interfaces_with_groups():
|
|
conn = boto.connect_vpc("the_key", "the_secret")
|
|
vpc = conn.create_vpc("10.0.0.0/16")
|
|
subnet = conn.create_subnet(vpc.id, "10.0.0.0/18")
|
|
security_group1 = conn.create_security_group(
|
|
"test security group #1", "this is a test security group"
|
|
)
|
|
security_group2 = conn.create_security_group(
|
|
"test security group #2", "this is a test security group"
|
|
)
|
|
conn.create_network_interface(
|
|
subnet.id, groups=[security_group1.id, security_group2.id]
|
|
)
|
|
|
|
all_enis = conn.get_all_network_interfaces()
|
|
all_enis.should.have.length_of(1)
|
|
|
|
eni = all_enis[0]
|
|
eni.groups.should.have.length_of(2)
|
|
set([group.id for group in eni.groups]).should.equal(
|
|
set([security_group1.id, security_group2.id])
|
|
)
|
|
|
|
|
|
@requires_boto_gte("2.12.0")
|
|
@mock_ec2_deprecated
|
|
def test_elastic_network_interfaces_modify_attribute():
|
|
conn = boto.connect_vpc("the_key", "the_secret")
|
|
vpc = conn.create_vpc("10.0.0.0/16")
|
|
subnet = conn.create_subnet(vpc.id, "10.0.0.0/18")
|
|
security_group1 = conn.create_security_group(
|
|
"test security group #1", "this is a test security group"
|
|
)
|
|
security_group2 = conn.create_security_group(
|
|
"test security group #2", "this is a test security group"
|
|
)
|
|
conn.create_network_interface(subnet.id, groups=[security_group1.id])
|
|
|
|
all_enis = conn.get_all_network_interfaces()
|
|
all_enis.should.have.length_of(1)
|
|
|
|
eni = all_enis[0]
|
|
eni.groups.should.have.length_of(1)
|
|
eni.groups[0].id.should.equal(security_group1.id)
|
|
|
|
with pytest.raises(EC2ResponseError) as ex:
|
|
conn.modify_network_interface_attribute(
|
|
eni.id, "groupset", [security_group1.id, security_group2.id], dry_run=True
|
|
)
|
|
ex.value.error_code.should.equal("DryRunOperation")
|
|
ex.value.status.should.equal(400)
|
|
ex.value.message.should.equal(
|
|
"An error occurred (DryRunOperation) when calling the ModifyNetworkInterface operation: Request would have succeeded, but DryRun flag is set"
|
|
)
|
|
|
|
conn.modify_network_interface_attribute(
|
|
eni.id, "groupset", [security_group1.id, security_group2.id]
|
|
)
|
|
|
|
all_enis = conn.get_all_network_interfaces()
|
|
all_enis.should.have.length_of(1)
|
|
|
|
eni = all_enis[0]
|
|
eni.groups.should.have.length_of(2)
|
|
eni.groups[0].id.should.equal(security_group1.id)
|
|
eni.groups[1].id.should.equal(security_group2.id)
|
|
|
|
|
|
@mock_ec2_deprecated
|
|
def test_elastic_network_interfaces_filtering():
|
|
conn = boto.connect_vpc("the_key", "the_secret")
|
|
vpc = conn.create_vpc("10.0.0.0/16")
|
|
subnet = conn.create_subnet(vpc.id, "10.0.0.0/18")
|
|
|
|
security_group1 = conn.create_security_group(
|
|
"test security group #1", "this is a test security group"
|
|
)
|
|
security_group2 = conn.create_security_group(
|
|
"test security group #2", "this is a test security group"
|
|
)
|
|
|
|
eni1 = conn.create_network_interface(
|
|
subnet.id, groups=[security_group1.id, security_group2.id]
|
|
)
|
|
eni2 = conn.create_network_interface(subnet.id, groups=[security_group1.id])
|
|
eni3 = conn.create_network_interface(subnet.id, description="test description")
|
|
|
|
all_enis = conn.get_all_network_interfaces()
|
|
all_enis.should.have.length_of(3)
|
|
|
|
# Filter by NetworkInterfaceId
|
|
enis_by_id = conn.get_all_network_interfaces([eni1.id])
|
|
enis_by_id.should.have.length_of(1)
|
|
set([eni.id for eni in enis_by_id]).should.equal(set([eni1.id]))
|
|
|
|
# Filter by ENI ID
|
|
enis_by_id = conn.get_all_network_interfaces(
|
|
filters={"network-interface-id": eni1.id}
|
|
)
|
|
enis_by_id.should.have.length_of(1)
|
|
set([eni.id for eni in enis_by_id]).should.equal(set([eni1.id]))
|
|
|
|
# Filter by Security Group
|
|
enis_by_group = conn.get_all_network_interfaces(
|
|
filters={"group-id": security_group1.id}
|
|
)
|
|
enis_by_group.should.have.length_of(2)
|
|
set([eni.id for eni in enis_by_group]).should.equal(set([eni1.id, eni2.id]))
|
|
|
|
# Filter by ENI ID and Security Group
|
|
enis_by_group = conn.get_all_network_interfaces(
|
|
filters={"network-interface-id": eni1.id, "group-id": security_group1.id}
|
|
)
|
|
enis_by_group.should.have.length_of(1)
|
|
set([eni.id for eni in enis_by_group]).should.equal(set([eni1.id]))
|
|
|
|
# Filter by Description
|
|
enis_by_description = conn.get_all_network_interfaces(
|
|
filters={"description": eni3.description}
|
|
)
|
|
enis_by_description.should.have.length_of(1)
|
|
enis_by_description[0].description.should.equal(eni3.description)
|
|
|
|
# Unsupported filter
|
|
conn.get_all_network_interfaces.when.called_with(
|
|
filters={"not-implemented-filter": "foobar"}
|
|
).should.throw(NotImplementedError)
|
|
|
|
|
|
@mock_ec2
|
|
def test_elastic_network_interfaces_get_by_tag_name():
|
|
ec2 = boto3.resource("ec2", region_name="us-west-2")
|
|
ec2_client = boto3.client("ec2", region_name="us-west-2")
|
|
|
|
vpc = ec2.create_vpc(CidrBlock="10.0.0.0/16")
|
|
subnet = ec2.create_subnet(
|
|
VpcId=vpc.id, CidrBlock="10.0.0.0/24", AvailabilityZone="us-west-2a"
|
|
)
|
|
|
|
eni1 = ec2.create_network_interface(
|
|
SubnetId=subnet.id, PrivateIpAddress="10.0.10.5"
|
|
)
|
|
|
|
with pytest.raises(ClientError) as ex:
|
|
eni1.create_tags(Tags=[{"Key": "Name", "Value": "eni1"}], DryRun=True)
|
|
ex.value.response["Error"]["Code"].should.equal("DryRunOperation")
|
|
ex.value.response["ResponseMetadata"]["HTTPStatusCode"].should.equal(400)
|
|
ex.value.response["Error"]["Message"].should.equal(
|
|
"An error occurred (DryRunOperation) when calling the CreateTags operation: Request would have succeeded, but DryRun flag is set"
|
|
)
|
|
|
|
eni1.create_tags(Tags=[{"Key": "Name", "Value": "eni1"}])
|
|
|
|
# The status of the new interface should be 'available'
|
|
waiter = ec2_client.get_waiter("network_interface_available")
|
|
waiter.wait(NetworkInterfaceIds=[eni1.id])
|
|
|
|
filters = [{"Name": "tag:Name", "Values": ["eni1"]}]
|
|
enis = list(ec2.network_interfaces.filter(Filters=filters))
|
|
enis.should.have.length_of(1)
|
|
|
|
filters = [{"Name": "tag:Name", "Values": ["wrong-name"]}]
|
|
enis = list(ec2.network_interfaces.filter(Filters=filters))
|
|
enis.should.have.length_of(0)
|
|
|
|
|
|
@mock_ec2
|
|
def test_elastic_network_interfaces_get_by_availability_zone():
|
|
ec2 = boto3.resource("ec2", region_name="us-west-2")
|
|
ec2_client = boto3.client("ec2", region_name="us-west-2")
|
|
|
|
vpc = ec2.create_vpc(CidrBlock="10.0.0.0/16")
|
|
subnet1 = ec2.create_subnet(
|
|
VpcId=vpc.id, CidrBlock="10.0.0.0/24", AvailabilityZone="us-west-2a"
|
|
)
|
|
|
|
subnet2 = ec2.create_subnet(
|
|
VpcId=vpc.id, CidrBlock="10.0.1.0/24", AvailabilityZone="us-west-2b"
|
|
)
|
|
|
|
eni1 = ec2.create_network_interface(
|
|
SubnetId=subnet1.id, PrivateIpAddress="10.0.0.15"
|
|
)
|
|
|
|
eni2 = ec2.create_network_interface(
|
|
SubnetId=subnet2.id, PrivateIpAddress="10.0.1.15"
|
|
)
|
|
|
|
# The status of the new interface should be 'available'
|
|
waiter = ec2_client.get_waiter("network_interface_available")
|
|
waiter.wait(NetworkInterfaceIds=[eni1.id, eni2.id])
|
|
|
|
filters = [{"Name": "availability-zone", "Values": ["us-west-2a"]}]
|
|
enis = list(ec2.network_interfaces.filter(Filters=filters))
|
|
enis.should.have.length_of(1)
|
|
|
|
filters = [{"Name": "availability-zone", "Values": ["us-west-2c"]}]
|
|
enis = list(ec2.network_interfaces.filter(Filters=filters))
|
|
enis.should.have.length_of(0)
|
|
|
|
|
|
@mock_ec2
|
|
def test_elastic_network_interfaces_get_by_private_ip():
|
|
ec2 = boto3.resource("ec2", region_name="us-west-2")
|
|
ec2_client = boto3.client("ec2", region_name="us-west-2")
|
|
|
|
vpc = ec2.create_vpc(CidrBlock="10.0.0.0/16")
|
|
subnet = ec2.create_subnet(
|
|
VpcId=vpc.id, CidrBlock="10.0.0.0/24", AvailabilityZone="us-west-2a"
|
|
)
|
|
|
|
eni1 = ec2.create_network_interface(
|
|
SubnetId=subnet.id, PrivateIpAddress="10.0.10.5"
|
|
)
|
|
|
|
# The status of the new interface should be 'available'
|
|
waiter = ec2_client.get_waiter("network_interface_available")
|
|
waiter.wait(NetworkInterfaceIds=[eni1.id])
|
|
|
|
filters = [{"Name": "private-ip-address", "Values": ["10.0.10.5"]}]
|
|
enis = list(ec2.network_interfaces.filter(Filters=filters))
|
|
enis.should.have.length_of(1)
|
|
|
|
filters = [{"Name": "private-ip-address", "Values": ["10.0.10.10"]}]
|
|
enis = list(ec2.network_interfaces.filter(Filters=filters))
|
|
enis.should.have.length_of(0)
|
|
|
|
filters = [{"Name": "addresses.private-ip-address", "Values": ["10.0.10.5"]}]
|
|
enis = list(ec2.network_interfaces.filter(Filters=filters))
|
|
enis.should.have.length_of(1)
|
|
|
|
filters = [{"Name": "addresses.private-ip-address", "Values": ["10.0.10.10"]}]
|
|
enis = list(ec2.network_interfaces.filter(Filters=filters))
|
|
enis.should.have.length_of(0)
|
|
|
|
|
|
@mock_ec2
|
|
def test_elastic_network_interfaces_get_by_vpc_id():
|
|
ec2 = boto3.resource("ec2", region_name="us-west-2")
|
|
ec2_client = boto3.client("ec2", region_name="us-west-2")
|
|
|
|
vpc = ec2.create_vpc(CidrBlock="10.0.0.0/16")
|
|
subnet = ec2.create_subnet(
|
|
VpcId=vpc.id, CidrBlock="10.0.0.0/24", AvailabilityZone="us-west-2a"
|
|
)
|
|
|
|
eni1 = ec2.create_network_interface(
|
|
SubnetId=subnet.id, PrivateIpAddress="10.0.10.5"
|
|
)
|
|
|
|
# The status of the new interface should be 'available'
|
|
waiter = ec2_client.get_waiter("network_interface_available")
|
|
waiter.wait(NetworkInterfaceIds=[eni1.id])
|
|
|
|
filters = [{"Name": "vpc-id", "Values": [subnet.vpc_id]}]
|
|
enis = list(ec2.network_interfaces.filter(Filters=filters))
|
|
enis.should.have.length_of(1)
|
|
|
|
filters = [{"Name": "vpc-id", "Values": ["vpc-aaaa1111"]}]
|
|
enis = list(ec2.network_interfaces.filter(Filters=filters))
|
|
enis.should.have.length_of(0)
|
|
|
|
|
|
@mock_ec2
|
|
def test_elastic_network_interfaces_get_by_subnet_id():
|
|
ec2 = boto3.resource("ec2", region_name="us-west-2")
|
|
ec2_client = boto3.client("ec2", region_name="us-west-2")
|
|
|
|
vpc = ec2.create_vpc(CidrBlock="10.0.0.0/16")
|
|
subnet = ec2.create_subnet(
|
|
VpcId=vpc.id, CidrBlock="10.0.0.0/24", AvailabilityZone="us-west-2a"
|
|
)
|
|
|
|
eni1 = ec2.create_network_interface(
|
|
SubnetId=subnet.id, PrivateIpAddress="10.0.10.5"
|
|
)
|
|
|
|
# The status of the new interface should be 'available'
|
|
waiter = ec2_client.get_waiter("network_interface_available")
|
|
waiter.wait(NetworkInterfaceIds=[eni1.id])
|
|
|
|
filters = [{"Name": "subnet-id", "Values": [subnet.id]}]
|
|
enis = list(ec2.network_interfaces.filter(Filters=filters))
|
|
enis.should.have.length_of(1)
|
|
|
|
filters = [{"Name": "subnet-id", "Values": ["subnet-aaaa1111"]}]
|
|
enis = list(ec2.network_interfaces.filter(Filters=filters))
|
|
enis.should.have.length_of(0)
|
|
|
|
|
|
@mock_ec2
|
|
def test_elastic_network_interfaces_get_by_description():
|
|
ec2 = boto3.resource("ec2", region_name="us-west-2")
|
|
ec2_client = boto3.client("ec2", region_name="us-west-2")
|
|
|
|
vpc = ec2.create_vpc(CidrBlock="10.0.0.0/16")
|
|
subnet = ec2.create_subnet(
|
|
VpcId=vpc.id, CidrBlock="10.0.0.0/24", AvailabilityZone="us-west-2a"
|
|
)
|
|
|
|
eni1 = ec2.create_network_interface(
|
|
SubnetId=subnet.id, PrivateIpAddress="10.0.10.5", Description="test interface"
|
|
)
|
|
|
|
# The status of the new interface should be 'available'
|
|
waiter = ec2_client.get_waiter("network_interface_available")
|
|
waiter.wait(NetworkInterfaceIds=[eni1.id])
|
|
|
|
filters = [{"Name": "description", "Values": [eni1.description]}]
|
|
enis = list(ec2.network_interfaces.filter(Filters=filters))
|
|
enis.should.have.length_of(1)
|
|
|
|
filters = [{"Name": "description", "Values": ["bad description"]}]
|
|
enis = list(ec2.network_interfaces.filter(Filters=filters))
|
|
enis.should.have.length_of(0)
|
|
|
|
|
|
@mock_ec2
|
|
def test_elastic_network_interfaces_describe_network_interfaces_with_filter():
|
|
ec2 = boto3.resource("ec2", region_name="us-west-2")
|
|
ec2_client = boto3.client("ec2", region_name="us-west-2")
|
|
|
|
vpc = ec2.create_vpc(CidrBlock="10.0.0.0/16")
|
|
subnet = ec2.create_subnet(
|
|
VpcId=vpc.id, CidrBlock="10.0.0.0/24", AvailabilityZone="us-west-2a"
|
|
)
|
|
|
|
eni1 = ec2.create_network_interface(
|
|
SubnetId=subnet.id, PrivateIpAddress="10.0.10.5", Description="test interface"
|
|
)
|
|
|
|
# The status of the new interface should be 'available'
|
|
waiter = ec2_client.get_waiter("network_interface_available")
|
|
waiter.wait(NetworkInterfaceIds=[eni1.id])
|
|
|
|
# Filter by network-interface-id
|
|
response = ec2_client.describe_network_interfaces(
|
|
Filters=[{"Name": "network-interface-id", "Values": [eni1.id]}]
|
|
)
|
|
response["NetworkInterfaces"].should.have.length_of(1)
|
|
response["NetworkInterfaces"][0]["NetworkInterfaceId"].should.equal(eni1.id)
|
|
response["NetworkInterfaces"][0]["PrivateIpAddress"].should.equal(
|
|
eni1.private_ip_address
|
|
)
|
|
response["NetworkInterfaces"][0]["Description"].should.equal(eni1.description)
|
|
|
|
response = ec2_client.describe_network_interfaces(
|
|
Filters=[{"Name": "network-interface-id", "Values": ["bad-id"]}]
|
|
)
|
|
response["NetworkInterfaces"].should.have.length_of(0)
|
|
|
|
# Filter by private-ip-address
|
|
response = ec2_client.describe_network_interfaces(
|
|
Filters=[{"Name": "private-ip-address", "Values": [eni1.private_ip_address]}]
|
|
)
|
|
response["NetworkInterfaces"].should.have.length_of(1)
|
|
response["NetworkInterfaces"][0]["NetworkInterfaceId"].should.equal(eni1.id)
|
|
response["NetworkInterfaces"][0]["PrivateIpAddress"].should.equal(
|
|
eni1.private_ip_address
|
|
)
|
|
response["NetworkInterfaces"][0]["Description"].should.equal(eni1.description)
|
|
|
|
response = ec2_client.describe_network_interfaces(
|
|
Filters=[{"Name": "private-ip-address", "Values": ["11.11.11.11"]}]
|
|
)
|
|
response["NetworkInterfaces"].should.have.length_of(0)
|
|
|
|
# Filter by sunet-id
|
|
response = ec2_client.describe_network_interfaces(
|
|
Filters=[{"Name": "subnet-id", "Values": [eni1.subnet.id]}]
|
|
)
|
|
response["NetworkInterfaces"].should.have.length_of(1)
|
|
response["NetworkInterfaces"][0]["NetworkInterfaceId"].should.equal(eni1.id)
|
|
response["NetworkInterfaces"][0]["PrivateIpAddress"].should.equal(
|
|
eni1.private_ip_address
|
|
)
|
|
response["NetworkInterfaces"][0]["Description"].should.equal(eni1.description)
|
|
|
|
response = ec2_client.describe_network_interfaces(
|
|
Filters=[{"Name": "subnet-id", "Values": ["sn-bad-id"]}]
|
|
)
|
|
response["NetworkInterfaces"].should.have.length_of(0)
|
|
|
|
# Filter by description
|
|
response = ec2_client.describe_network_interfaces(
|
|
Filters=[{"Name": "description", "Values": [eni1.description]}]
|
|
)
|
|
response["NetworkInterfaces"].should.have.length_of(1)
|
|
response["NetworkInterfaces"][0]["NetworkInterfaceId"].should.equal(eni1.id)
|
|
response["NetworkInterfaces"][0]["PrivateIpAddress"].should.equal(
|
|
eni1.private_ip_address
|
|
)
|
|
response["NetworkInterfaces"][0]["Description"].should.equal(eni1.description)
|
|
|
|
response = ec2_client.describe_network_interfaces(
|
|
Filters=[{"Name": "description", "Values": ["bad description"]}]
|
|
)
|
|
response["NetworkInterfaces"].should.have.length_of(0)
|
|
|
|
# Filter by multiple filters
|
|
response = ec2_client.describe_network_interfaces(
|
|
Filters=[
|
|
{"Name": "private-ip-address", "Values": [eni1.private_ip_address]},
|
|
{"Name": "network-interface-id", "Values": [eni1.id]},
|
|
{"Name": "subnet-id", "Values": [eni1.subnet.id]},
|
|
]
|
|
)
|
|
response["NetworkInterfaces"].should.have.length_of(1)
|
|
response["NetworkInterfaces"][0]["NetworkInterfaceId"].should.equal(eni1.id)
|
|
response["NetworkInterfaces"][0]["PrivateIpAddress"].should.equal(
|
|
eni1.private_ip_address
|
|
)
|
|
response["NetworkInterfaces"][0]["Description"].should.equal(eni1.description)
|
|
|
|
|
|
@mock_ec2
|
|
def test_elastic_network_interfaces_filter_by_tag():
|
|
ec2 = boto3.resource("ec2", region_name="us-west-2")
|
|
ec2_client = boto3.client("ec2", region_name="us-west-2")
|
|
|
|
vpc = ec2.create_vpc(CidrBlock="10.0.0.0/16")
|
|
subnet = ec2.create_subnet(
|
|
VpcId=vpc.id, CidrBlock="10.0.0.0/24", AvailabilityZone="us-west-2a"
|
|
)
|
|
|
|
eni_dev = ec2.create_network_interface(
|
|
SubnetId=subnet.id,
|
|
PrivateIpAddress="10.0.10.5",
|
|
Description="dev interface",
|
|
TagSpecifications=[
|
|
{
|
|
"ResourceType": "network-interface",
|
|
"Tags": [{"Key": "environment", "Value": "dev"}],
|
|
},
|
|
],
|
|
)
|
|
|
|
eni_prod = ec2.create_network_interface(
|
|
SubnetId=subnet.id,
|
|
PrivateIpAddress="10.0.10.6",
|
|
Description="prod interface",
|
|
TagSpecifications=[
|
|
{
|
|
"ResourceType": "network-interface",
|
|
"Tags": [{"Key": "environment", "Value": "prod"}],
|
|
},
|
|
],
|
|
)
|
|
|
|
for eni in [eni_dev, eni_prod]:
|
|
waiter = ec2_client.get_waiter("network_interface_available")
|
|
waiter.wait(NetworkInterfaceIds=[eni.id])
|
|
|
|
resp = ec2_client.describe_network_interfaces(
|
|
Filters=[{"Name": "tag:environment", "Values": ["staging"]}]
|
|
)
|
|
resp["NetworkInterfaces"].should.have.length_of(0)
|
|
|
|
resp = ec2_client.describe_network_interfaces(
|
|
Filters=[{"Name": "tag:environment", "Values": ["dev"]}]
|
|
)
|
|
resp["NetworkInterfaces"].should.have.length_of(1)
|
|
resp["NetworkInterfaces"][0]["Description"].should.equal("dev interface")
|
|
|
|
resp = ec2_client.describe_network_interfaces(
|
|
Filters=[{"Name": "tag:environment", "Values": ["prod"]}]
|
|
)
|
|
resp["NetworkInterfaces"].should.have.length_of(1)
|
|
resp["NetworkInterfaces"][0]["Description"].should.equal("prod interface")
|
|
|
|
resp = ec2_client.describe_network_interfaces(
|
|
Filters=[{"Name": "tag:environment", "Values": ["dev", "prod"]}]
|
|
)
|
|
resp["NetworkInterfaces"].should.have.length_of(2)
|