123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192 |
- # -*- coding: utf-8 -*-
- # Import Python libs
- from __future__ import absolute_import, print_function, unicode_literals
- import os
- import tempfile
- import salt.utils.files
- # Import Salt Libs
- from salt.cloud.clouds import ec2
- from salt.exceptions import SaltCloudSystemExit
- from tests.support.mixins import LoaderModuleMockMixin
- from tests.support.mock import PropertyMock, patch
- # Import Salt Testing Libs
- from tests.support.runtests import RUNTIME_VARS
- from tests.support.unit import TestCase, skipIf
- from tests.unit.test_crypt import PRIVKEY_DATA
- PASS_DATA = (
- b"qOjCKDlBdcNEbJ/J8eRl7sH+bYIIm4cvHHY86gh2NEUnufFlFo0gGVTZR05Fj0cw3n/w7gR"
- b"urNXz5JoeSIHVuNI3YTwzL9yEAaC0kuy8EbOlO2yx8yPGdfml9BRwOV7A6b8UFo9co4H7fz"
- b"DdScMKU2yzvRYvp6N6Q2cJGBmPsemnXWWusb+1vZVWxcRAQmG3ogF6Z5rZSYAYH0N4rqJgH"
- b"mQfzuyb+jrBvV/IOoV1EdO9jGSH9338aS47NjrmNEN/SpnS6eCWZUwwyHbPASuOvWiY4QH/"
- b"0YZC6EGccwiUmt0ZOxIynk+tEyVPTkiS0V8RcZK6YKqMWHpKmPtLBzfuoA=="
- )
- class EC2TestCase(TestCase, LoaderModuleMockMixin):
- """
- Unit TestCase for salt.cloud.clouds.ec2 module.
- """
- def setUp(self):
- super(EC2TestCase, self).setUp()
- with tempfile.NamedTemporaryFile(
- dir=RUNTIME_VARS.TMP, suffix=".pem", delete=True
- ) as fp:
- self.key_file = fp.name
- def tearDown(self):
- super(EC2TestCase, self).tearDown()
- if os.path.exists(self.key_file):
- os.remove(self.key_file)
- def setup_loader_modules(self):
- return {ec2: {"__opts__": {}}}
- def test__validate_key_path_and_mode(self):
- # Key file exists
- with patch("os.path.exists", return_value=True):
- with patch("os.stat") as patched_stat:
- type(patched_stat.return_value).st_mode = PropertyMock(
- return_value=0o644
- )
- self.assertRaises(
- SaltCloudSystemExit, ec2._validate_key_path_and_mode, "key_file"
- )
- type(patched_stat.return_value).st_mode = PropertyMock(
- return_value=0o600
- )
- self.assertTrue(ec2._validate_key_path_and_mode("key_file"))
- type(patched_stat.return_value).st_mode = PropertyMock(
- return_value=0o400
- )
- self.assertTrue(ec2._validate_key_path_and_mode("key_file"))
- # Key file does not exist
- with patch("os.path.exists", return_value=False):
- self.assertRaises(
- SaltCloudSystemExit, ec2._validate_key_path_and_mode, "key_file"
- )
- @skipIf(not ec2.HAS_M2 and not ec2.HAS_PYCRYPTO, "Needs crypto library")
- @patch("salt.cloud.clouds.ec2._get_node")
- @patch("salt.cloud.clouds.ec2.get_location")
- @patch("salt.cloud.clouds.ec2.get_provider")
- @patch("salt.utils.aws.query")
- def test_get_password_data(self, query, get_provider, get_location, _get_node):
- query.return_value = [{"passwordData": PASS_DATA}]
- _get_node.return_value = {"instanceId": "i-abcdef"}
- get_location.return_value = "us-west2"
- get_provider.return_value = "ec2"
- with salt.utils.files.fopen(self.key_file, "w") as fp:
- fp.write(PRIVKEY_DATA)
- ret = ec2.get_password_data(
- name="i-abcddef", kwargs={"key_file": self.key_file}, call="action"
- )
- assert ret["passwordData"] == PASS_DATA
- assert ret["password"] == "testp4ss!"
- @patch("salt.cloud.clouds.ec2.config.get_cloud_config_value")
- @patch("salt.cloud.clouds.ec2.get_location")
- @patch("salt.cloud.clouds.ec2.get_provider")
- @patch("salt.cloud.clouds.ec2.aws.query")
- def test_get_imageid(self, aws_query, get_provider, get_location, config):
- """
- test querying imageid function
- """
- vm = {}
- ami = "ami-1234"
- config.return_value = "test/*"
- get_location.return_value = "us-west2"
- get_provider.return_value = "ec2"
- aws_query.return_value = [{"imageId": ami}]
- # test image filter
- self.assertEqual(ec2.get_imageid(vm), ami)
- # test ami-image
- config.return_value = ami
- self.assertEqual(ec2.get_imageid(vm), ami)
- # we should have only ran aws.query once when testing the aws filter
- aws_query.assert_called_once()
- @patch("salt.cloud.clouds.ec2.config.get_cloud_config_value")
- @patch("salt.cloud.clouds.ec2.get_location")
- @patch("salt.cloud.clouds.ec2.get_availability_zone")
- @patch("salt.cloud.clouds.ec2.get_provider")
- @patch("salt.cloud.clouds.ec2.get_spot_config")
- @patch("salt.cloud.clouds.ec2._param_from_config")
- @patch("salt.cloud.clouds.ec2.securitygroupid")
- def test_termination_protection(
- self,
- securitygroupid,
- _param_from_config,
- get_spot_config,
- get_provider,
- get_availability_zone,
- get_location,
- config,
- ):
- """
- Verify that `set_termination_protection` updates the right parameters
- """
- vm = {"name": "taco"}
- set_del_root_vol_on_destroy = "yes"
- termination_protection = True
- config.side_effect = (
- [None] * 2
- + ["test/*"]
- + [None] * 13
- + [set_del_root_vol_on_destroy, termination_protection]
- )
- get_location.return_value = "us-west2"
- get_availability_zone.return_value = None
- get_provider.return_value = "ec2"
- get_spot_config.return_value = None
- securitygroupid.return_value = None
- self.assertRaises(
- salt.exceptions.SaltCloudConfigError, ec2.request_instance, vm
- )
- _param_from_config.assert_called_once_with("DisableApiTermination", True)
- @patch("salt.cloud.clouds.ec2.config.get_cloud_config_value")
- @patch("salt.cloud.clouds.ec2.get_location")
- @patch("salt.cloud.clouds.ec2.get_availability_zone")
- @patch("salt.cloud.clouds.ec2.get_provider")
- @patch("salt.cloud.clouds.ec2.get_spot_config")
- @patch("salt.cloud.clouds.ec2.securitygroupid")
- def test_termination_protection_exception(
- self,
- securitygroupid,
- get_spot_config,
- get_provider,
- get_availability_zone,
- get_location,
- config,
- ):
- """
- Verify improper `set_termination_protection` parameters raises an exception
- """
- vm = {"name": "taco"}
- termination_protection = "not a bool"
- config.side_effect = (
- [None] * 2 + ["test/*"] + [None] * 14 + [termination_protection]
- )
- get_location.return_value = "us-west2"
- get_availability_zone.return_value = None
- get_provider.return_value = "ec2"
- get_spot_config.return_value = None
- securitygroupid.return_value = None
- self.assertRaises(
- salt.exceptions.SaltCloudConfigError, ec2.request_instance, vm
- )
|