1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247
|
from contextlib import nullcontext
from functools import wraps
from time import sleep
from uuid import uuid4
import boto3
import pytest
from botocore.exceptions import ClientError
from moto import mock_aws
from tests import allow_aws_request
pytest.register_assert_rewrite("tests.test_ec2.helpers")
def ec2_aws_verified(
create_vpc: bool = False,
create_sg: bool = False,
create_subnet: bool = False,
create_transit_gateway: bool = False,
create_customer_gateway: bool = False,
):
"""
Function that is verified to work against AWS.
Can be run against AWS at any time by setting:
MOTO_TEST_ALLOW_AWS_REQUEST=true
If this environment variable is not set, the function runs in a `mock_aws` context.
"""
def inner(func):
@wraps(func)
def pagination_wrapper(**kwargs):
context = nullcontext() if allow_aws_request() else mock_aws()
with context:
return _invoke_func(
create_vpc,
create_sg=create_sg,
create_subnet=create_subnet,
create_transit_gateway=create_transit_gateway,
create_customer_gateway=create_customer_gateway,
func=func,
kwargs=kwargs,
)
return pagination_wrapper
return inner
def _invoke_func(
create_vpc: bool,
create_sg: bool,
create_subnet: bool,
create_transit_gateway: bool,
create_customer_gateway: bool,
func,
kwargs,
):
ec2_client = boto3.client("ec2", "us-east-1")
kwargs["ec2_client"] = ec2_client
vpc_id = sg_id = subnet_id = tg_id = cg_id = None
if create_vpc:
vpc = ec2_client.create_vpc(
CidrBlock="10.0.0.0/16",
TagSpecifications=[
{"ResourceType": "vpc", "Tags": [{"Key": "project", "Value": "test"}]}
],
)
vpc_id = vpc["Vpc"]["VpcId"]
kwargs["vpc_id"] = vpc_id
if create_subnet:
subnet = ec2_client.create_subnet(
VpcId=vpc_id, CidrBlock="10.0.0.0/24", AvailabilityZone="us-east-1a"
)
subnet_id = subnet["Subnet"]["SubnetId"]
kwargs["subnet_id"] = subnet_id
if create_sg:
sg_name = f"test_{str(uuid4())[0:6]}"
sg = ec2_client.create_security_group(
Description="test", GroupName=sg_name, VpcId=vpc_id
)
sg_id = sg["GroupId"]
kwargs["sg_id"] = sg_id
if create_transit_gateway:
gateway = ec2_client.create_transit_gateway(Description="test")
tg_id = gateway["TransitGateway"]["TransitGatewayId"]
wait_for_transit_gateway(ec2_client, tg_id=tg_id)
kwargs["tg_id"] = tg_id
if create_customer_gateway:
customer_gateway = ec2_client.create_customer_gateway(
Type="ipsec.1", PublicIp="205.251.242.54", BgpAsn=65534
)
cg_id = customer_gateway["CustomerGateway"]["CustomerGatewayId"]
kwargs["cg_id"] = cg_id
try:
func(**kwargs)
finally:
if cg_id:
ec2_client.delete_customer_gateway(CustomerGatewayId=cg_id)
if tg_id:
delete_transit_gateway_dependencies(ec2_client, tg_id=tg_id)
ec2_client.delete_transit_gateway(TransitGatewayId=tg_id)
if subnet_id:
ec2_client.delete_subnet(SubnetId=subnet_id)
if sg_id:
ec2_client.delete_security_group(GroupId=sg_id)
if vpc_id:
ec2_client.delete_vpc(VpcId=vpc_id)
def wait_for_transit_gateway(ec2_client, tg_id):
for idx in range(10):
gateway = ec2_client.describe_transit_gateways(TransitGatewayIds=[tg_id])[
"TransitGateways"
][0]
if gateway["State"] == "available":
return
sleep(10 * idx)
def wait_for_transit_gateway_route_table(ec2_client, tg_rt_id):
for idx in range(10):
route_table = ec2_client.describe_transit_gateway_route_tables(
TransitGatewayRouteTableIds=[tg_rt_id]
)["TransitGatewayRouteTables"][0]
if route_table["State"] == "available":
return
sleep(5 * idx)
def wait_for_transit_gateway_attachments(ec2_client, tg_attachment_id):
for idx in range(10):
attachment = ec2_client.describe_transit_gateway_vpc_attachments(
TransitGatewayAttachmentIds=[tg_attachment_id]
)["TransitGatewayVpcAttachments"][0]
if attachment["State"] == "available":
return
sleep(5 * idx)
def wait_for_transit_gateway_association(
ec2_client, tg_rt_id, tg_attachment_id, expected_state
):
for idx in range(10):
associations = ec2_client.get_transit_gateway_route_table_associations(
TransitGatewayRouteTableId=tg_rt_id,
Filters=[
{"Name": "transit-gateway-attachment-id", "Values": [tg_attachment_id]}
],
)["Associations"]
if not associations or associations[0]["State"] == expected_state:
# If we're disassociating, AWS will never return anything after it has finished
# Initial calls will return State=disassociating - after it has successfully disassociated, it is no longer returned
return
sleep(5 * idx)
def wait_for_vpn_connections(ec2_client, vpn_connection_id):
for idx in range(10):
connections = ec2_client.describe_vpn_connections(
VpnConnectionIds=[vpn_connection_id]
)["VpnConnections"]
if not connections or connections[0]["State"] == "available":
return
sleep(5 * idx)
def wait_for_ipv6_cidr_block_associations(ec2_client, vpc_id):
for idx in range(10):
vpcs = ec2_client.describe_vpcs(VpcIds=[vpc_id])["Vpcs"]
if (
vpcs[0]["Ipv6CidrBlockAssociationSet"][0]["Ipv6CidrBlockState"]["State"]
== "associated"
):
return vpcs[0]["Ipv6CidrBlockAssociationSet"][0]
sleep(5 * idx)
def delete_transit_gateway_dependencies(ec2_client, tg_id):
delete_tg_attachments(ec2_client, tg_id)
for idx in range(10):
route_tables = ec2_client.describe_transit_gateway_route_tables(
Filters=[
{"Name": "transit-gateway-id", "Values": [tg_id]},
{"Name": "default-association-route-table", "Values": ["false"]},
]
)["TransitGatewayRouteTables"]
if not route_tables:
return
for table in route_tables:
if table["State"] == "available":
ec2_client.delete_transit_gateway_route_table(
TransitGatewayRouteTableId=table["TransitGatewayRouteTableId"]
)
if {rt["State"] for rt in route_tables} == {"deleted"}:
return
sleep(5 * idx)
def delete_tg_attachments(ec2_client, tg_id):
for idx in range(10):
attachments = ec2_client.describe_transit_gateway_attachments(
Filters=[{"Name": "transit-gateway-id", "Values": [tg_id]}]
)["TransitGatewayAttachments"]
if not attachments:
return
for attachment in attachments:
if attachment["State"] == "available":
try:
ec2_client.delete_transit_gateway_vpc_attachment(
TransitGatewayAttachmentId=attachment[
"TransitGatewayAttachmentId"
]
)
except ClientError as exc:
# If we run tests in parallel, the attachment may have already been deleted
err = exc.response["Error"]
assert err["Code"] == "InvalidTransitGatewayAttachmentID.NotFound"
if {a["State"] for a in attachments} == {"deleted"}:
return
sleep(5 * idx)
|