fog-aws 3.12.0 → 3.15.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/CHANGELOG.md +70 -4
- data/README.md +57 -0
- data/fog-aws.gemspec +3 -4
- data/lib/fog/aws/credential_fetcher.rb +8 -1
- data/lib/fog/aws/iam/default_policies.json +1574 -0
- data/lib/fog/aws/iam/default_policy_versions.json +3373 -0
- data/lib/fog/aws/models/compute/flavors.rb +160 -0
- data/lib/fog/aws/models/storage/directories.rb +1 -0
- data/lib/fog/aws/models/storage/file.rb +8 -7
- data/lib/fog/aws/parsers/iam/get_group_policy.rb +1 -1
- data/lib/fog/aws/parsers/iam/get_role_policy.rb +1 -1
- data/lib/fog/aws/parsers/iam/get_user_policy.rb +1 -1
- data/lib/fog/aws/parsers/iam/policy_version.rb +1 -1
- data/lib/fog/aws/requests/compute/create_network_interface.rb +7 -4
- data/lib/fog/aws/requests/compute/create_subnet.rb +3 -3
- data/lib/fog/aws/requests/rds/add_tags_to_resource.rb +12 -10
- data/lib/fog/aws/requests/rds/list_tags_for_resource.rb +10 -7
- data/lib/fog/aws/requests/rds/remove_tags_from_resource.rb +9 -8
- data/lib/fog/aws/requests/storage/sync_clock.rb +1 -1
- data/lib/fog/aws/storage.rb +5 -1
- data/lib/fog/aws/version.rb +1 -1
- metadata +5 -280
- data/tests/credentials_tests.rb +0 -190
- data/tests/helper.rb +0 -29
- data/tests/helpers/collection_helper.rb +0 -90
- data/tests/helpers/compute/flavors_helper.rb +0 -28
- data/tests/helpers/compute/server_helper.rb +0 -23
- data/tests/helpers/compute/servers_helper.rb +0 -8
- data/tests/helpers/dns_helper.rb +0 -56
- data/tests/helpers/formats_helper.rb +0 -100
- data/tests/helpers/formats_helper_tests.rb +0 -107
- data/tests/helpers/mock_helper.rb +0 -109
- data/tests/helpers/model_helper.rb +0 -30
- data/tests/helpers/responds_to_helper.rb +0 -11
- data/tests/helpers/schema_validator_tests.rb +0 -104
- data/tests/helpers/succeeds_helper.rb +0 -9
- data/tests/lorem.txt +0 -1
- data/tests/models/auto_scaling/activities_tests.rb +0 -6
- data/tests/models/auto_scaling/configuration_test.rb +0 -13
- data/tests/models/auto_scaling/configurations_tests.rb +0 -11
- data/tests/models/auto_scaling/groups_test.rb +0 -27
- data/tests/models/auto_scaling/helper.rb +0 -0
- data/tests/models/auto_scaling/instance_tests.rb +0 -15
- data/tests/models/auto_scaling/instances_tests.rb +0 -6
- data/tests/models/beanstalk/application_tests.rb +0 -69
- data/tests/models/beanstalk/applications_tests.rb +0 -7
- data/tests/models/beanstalk/environment_tests.rb +0 -131
- data/tests/models/beanstalk/environments_tests.rb +0 -34
- data/tests/models/beanstalk/template_tests.rb +0 -47
- data/tests/models/beanstalk/templates_tests.rb +0 -62
- data/tests/models/beanstalk/version_tests.rb +0 -66
- data/tests/models/beanstalk/versions_tests.rb +0 -60
- data/tests/models/cdn/distribution_tests.rb +0 -15
- data/tests/models/cdn/distributions_tests.rb +0 -15
- data/tests/models/cdn/invalidation_tests.rb +0 -31
- data/tests/models/cdn/invalidations_tests.rb +0 -14
- data/tests/models/cdn/streaming_distribution_tests.rb +0 -15
- data/tests/models/cdn/streaming_distributions_tests.rb +0 -15
- data/tests/models/cloud_watch/alarm_data_tests.rb +0 -42
- data/tests/models/cloud_watch/alarm_history_tests.rb +0 -22
- data/tests/models/cloud_watch/metric_statistics_tests.rb +0 -51
- data/tests/models/cloud_watch/metrics_tests.rb +0 -32
- data/tests/models/compute/address_tests.rb +0 -43
- data/tests/models/compute/addresses_tests.rb +0 -5
- data/tests/models/compute/dhcp_option_tests.rb +0 -3
- data/tests/models/compute/dhcp_options_tests.rb +0 -3
- data/tests/models/compute/internet_gateway_tests.rb +0 -3
- data/tests/models/compute/internet_gateways_tests.rb +0 -3
- data/tests/models/compute/key_pair_tests.rb +0 -26
- data/tests/models/compute/key_pairs_tests.rb +0 -5
- data/tests/models/compute/network_acl_tests.rb +0 -109
- data/tests/models/compute/network_acls_tests.rb +0 -20
- data/tests/models/compute/network_interfaces_test.rb +0 -12
- data/tests/models/compute/security_group_tests.rb +0 -98
- data/tests/models/compute/security_groups_tests.rb +0 -5
- data/tests/models/compute/server_tests.rb +0 -94
- data/tests/models/compute/snapshot_tests.rb +0 -10
- data/tests/models/compute/snapshots_tests.rb +0 -10
- data/tests/models/compute/subnet_tests.rb +0 -13
- data/tests/models/compute/subnets_tests.rb +0 -5
- data/tests/models/compute/volume_tests.rb +0 -65
- data/tests/models/compute/volumes_tests.rb +0 -5
- data/tests/models/compute/vpc_tests.rb +0 -26
- data/tests/models/compute/vpcs_tests.rb +0 -19
- data/tests/models/data_pipeline/pipeline_tests.rb +0 -8
- data/tests/models/data_pipeline/pipelines_tests.rb +0 -8
- data/tests/models/dns/record_tests.rb +0 -33
- data/tests/models/dns/records_tests.rb +0 -41
- data/tests/models/dns/zone_tests.rb +0 -4
- data/tests/models/dns/zones_tests.rb +0 -4
- data/tests/models/efs/file_system_tests.rb +0 -12
- data/tests/models/efs/mount_target_tests.rb +0 -45
- data/tests/models/efs/mount_targets_tests.rb +0 -30
- data/tests/models/elasticache/cluster_tests.rb +0 -30
- data/tests/models/elasticache/parameter_groups_tests.rb +0 -15
- data/tests/models/elasticache/security_groups_tests.rb +0 -52
- data/tests/models/elasticache/subnet_groups_tests.rb +0 -43
- data/tests/models/elb/model_tests.rb +0 -360
- data/tests/models/elb/tagging_tests.rb +0 -15
- data/tests/models/glacier/model_tests.rb +0 -47
- data/tests/models/iam/access_keys_tests.rb +0 -53
- data/tests/models/iam/groups_tests.rb +0 -59
- data/tests/models/iam/instance_profile_tests.rb +0 -18
- data/tests/models/iam/managed_policies_tests.rb +0 -89
- data/tests/models/iam/policies_tests.rb +0 -57
- data/tests/models/iam/roles_tests.rb +0 -71
- data/tests/models/iam/users_tests.rb +0 -119
- data/tests/models/rds/cluster_tests.rb +0 -54
- data/tests/models/rds/clusters_tests.rb +0 -5
- data/tests/models/rds/event_subscription_tests.rb +0 -9
- data/tests/models/rds/event_subscriptions_tests.rb +0 -6
- data/tests/models/rds/helper.rb +0 -25
- data/tests/models/rds/instance_option_tests.rb +0 -14
- data/tests/models/rds/parameter_group_tests.rb +0 -24
- data/tests/models/rds/parameter_groups_tests.rb +0 -8
- data/tests/models/rds/security_group_tests.rb +0 -77
- data/tests/models/rds/security_groups_tests.rb +0 -5
- data/tests/models/rds/server_tests.rb +0 -131
- data/tests/models/rds/servers_tests.rb +0 -24
- data/tests/models/rds/snapshot_tests.rb +0 -12
- data/tests/models/rds/snapshots_tests.rb +0 -12
- data/tests/models/rds/tagging_tests.rb +0 -20
- data/tests/models/sns/topic_tests.rb +0 -15
- data/tests/models/sns/topics_tests.rb +0 -6
- data/tests/models/storage/directory_tests.rb +0 -202
- data/tests/models/storage/file_tests.rb +0 -129
- data/tests/models/storage/files_tests.rb +0 -90
- data/tests/models/storage/url_tests.rb +0 -25
- data/tests/models/storage/version_tests.rb +0 -52
- data/tests/models/storage/versions_tests.rb +0 -51
- data/tests/models/support/trusted_advisor_tests.rb +0 -25
- data/tests/parsers/compute/describe_images_tests.rb +0 -33
- data/tests/parsers/elb/describe_load_balancers.rb +0 -65
- data/tests/parsers/elbv2/create_load_balancer_tests.rb +0 -48
- data/tests/parsers/elbv2/describe_listeners_tests.rb +0 -76
- data/tests/parsers/elbv2/describe_load_balancers_tests.rb +0 -54
- data/tests/parsers/elbv2/describe_tags_tests.rb +0 -35
- data/tests/requests/auto_scaling/auto_scaling_tests.rb +0 -111
- data/tests/requests/auto_scaling/describe_types_tests.rb +0 -102
- data/tests/requests/auto_scaling/helper.rb +0 -229
- data/tests/requests/auto_scaling/model_tests.rb +0 -235
- data/tests/requests/auto_scaling/notification_configuration_tests.rb +0 -124
- data/tests/requests/auto_scaling/tag_tests.rb +0 -63
- data/tests/requests/beanstalk/application_tests.rb +0 -140
- data/tests/requests/beanstalk/solution_stack_tests.rb +0 -22
- data/tests/requests/cdn/cdn_tests.rb +0 -252
- data/tests/requests/cloud_formation/stack_tests.rb +0 -167
- data/tests/requests/cloud_watch/get_metric_statistics_tests.rb +0 -28
- data/tests/requests/cloud_watch/list_metrics_test.rb +0 -64
- data/tests/requests/cloud_watch/put_metric_data_tests.rb +0 -36
- data/tests/requests/compute/address_tests.rb +0 -144
- data/tests/requests/compute/assign_private_ip_tests.rb +0 -55
- data/tests/requests/compute/availability_zone_tests.rb +0 -25
- data/tests/requests/compute/client_tests.rb +0 -25
- data/tests/requests/compute/dhcp_options_tests.rb +0 -39
- data/tests/requests/compute/helper.rb +0 -27
- data/tests/requests/compute/image_tests.rb +0 -169
- data/tests/requests/compute/instance_attrib_tests.rb +0 -168
- data/tests/requests/compute/instance_tests.rb +0 -338
- data/tests/requests/compute/internet_gateway_tests.rb +0 -49
- data/tests/requests/compute/key_pair_tests.rb +0 -67
- data/tests/requests/compute/network_acl_tests.rb +0 -112
- data/tests/requests/compute/network_interface_tests.rb +0 -239
- data/tests/requests/compute/placement_group_tests.rb +0 -48
- data/tests/requests/compute/region_tests.rb +0 -52
- data/tests/requests/compute/route_tests.rb +0 -341
- data/tests/requests/compute/security_group_tests.rb +0 -457
- data/tests/requests/compute/snapshot_tests.rb +0 -77
- data/tests/requests/compute/spot_datafeed_subscription_tests.rb +0 -47
- data/tests/requests/compute/spot_instance_tests.rb +0 -55
- data/tests/requests/compute/spot_price_history_tests.rb +0 -23
- data/tests/requests/compute/subnet_tests.rb +0 -87
- data/tests/requests/compute/tag_tests.rb +0 -101
- data/tests/requests/compute/volume_tests.rb +0 -263
- data/tests/requests/compute/vpc_tests.rb +0 -222
- data/tests/requests/data_pipeline/helper.rb +0 -78
- data/tests/requests/data_pipeline/pipeline_tests.rb +0 -80
- data/tests/requests/dns/change_resource_record_sets_tests.rb +0 -34
- data/tests/requests/dns/dns_tests.rb +0 -240
- data/tests/requests/dns/health_check_tests.rb +0 -159
- data/tests/requests/dns/helper.rb +0 -21
- data/tests/requests/dynamodb/item_tests.rb +0 -137
- data/tests/requests/dynamodb/table_tests.rb +0 -99
- data/tests/requests/ecs/cluster_tests.rb +0 -112
- data/tests/requests/ecs/container_instance_tests.rb +0 -119
- data/tests/requests/ecs/helper.rb +0 -276
- data/tests/requests/ecs/sample_task_definition1.json +0 -56
- data/tests/requests/ecs/service_tests.rb +0 -132
- data/tests/requests/ecs/task_definitions_tests.rb +0 -97
- data/tests/requests/ecs/task_tests.rb +0 -145
- data/tests/requests/efs/file_system_tests.rb +0 -152
- data/tests/requests/efs/helper.rb +0 -44
- data/tests/requests/elasticache/cache_cluster_tests.rb +0 -137
- data/tests/requests/elasticache/describe_events.rb +0 -17
- data/tests/requests/elasticache/describe_reserved_cache_nodes.rb +0 -17
- data/tests/requests/elasticache/helper.rb +0 -103
- data/tests/requests/elasticache/parameter_group_tests.rb +0 -105
- data/tests/requests/elasticache/security_group_tests.rb +0 -108
- data/tests/requests/elasticache/subnet_group_tests.rb +0 -52
- data/tests/requests/elb/helper.rb +0 -91
- data/tests/requests/elb/listener_tests.rb +0 -68
- data/tests/requests/elb/load_balancer_tests.rb +0 -89
- data/tests/requests/elb/policy_tests.rb +0 -132
- data/tests/requests/elbv2/helper.rb +0 -66
- data/tests/requests/elbv2/load_balancer_tests.rb +0 -50
- data/tests/requests/emr/helper.rb +0 -167
- data/tests/requests/emr/instance_group_tests.rb +0 -106
- data/tests/requests/emr/job_flow_tests.rb +0 -88
- data/tests/requests/federation/get_signin_token_tests.rb +0 -11
- data/tests/requests/glacier/archive_tests.rb +0 -13
- data/tests/requests/glacier/multipart_upload_tests.rb +0 -29
- data/tests/requests/glacier/tree_hash_tests.rb +0 -91
- data/tests/requests/glacier/vault_tests.rb +0 -35
- data/tests/requests/iam/access_key_tests.rb +0 -53
- data/tests/requests/iam/account_policy_tests.rb +0 -20
- data/tests/requests/iam/account_tests.rb +0 -34
- data/tests/requests/iam/group_policy_tests.rb +0 -48
- data/tests/requests/iam/group_tests.rb +0 -44
- data/tests/requests/iam/helper.rb +0 -154
- data/tests/requests/iam/instance_profile_tests.rb +0 -44
- data/tests/requests/iam/login_profile_tests.rb +0 -62
- data/tests/requests/iam/managed_policy_tests.rb +0 -110
- data/tests/requests/iam/mfa_tests.rb +0 -23
- data/tests/requests/iam/role_tests.rb +0 -156
- data/tests/requests/iam/server_certificate_tests.rb +0 -130
- data/tests/requests/iam/user_policy_tests.rb +0 -45
- data/tests/requests/iam/user_tests.rb +0 -78
- data/tests/requests/iam/versioned_managed_policy_tests.rb +0 -105
- data/tests/requests/kinesis/helper.rb +0 -111
- data/tests/requests/kinesis/stream_tests.rb +0 -169
- data/tests/requests/kms/helper.rb +0 -27
- data/tests/requests/kms/key_tests.rb +0 -23
- data/tests/requests/lambda/function_sample_1.js +0 -9
- data/tests/requests/lambda/function_sample_2.js +0 -9
- data/tests/requests/lambda/function_tests.rb +0 -460
- data/tests/requests/lambda/helper.rb +0 -81
- data/tests/requests/rds/cluster_snapshot_tests.rb +0 -43
- data/tests/requests/rds/cluster_tests.rb +0 -37
- data/tests/requests/rds/db_engine_versions.rb +0 -7
- data/tests/requests/rds/db_snapshot_tests.rb +0 -62
- data/tests/requests/rds/describe_events.rb +0 -16
- data/tests/requests/rds/event_subscription_tests.rb +0 -30
- data/tests/requests/rds/helper.rb +0 -406
- data/tests/requests/rds/instance_option_tests.rb +0 -27
- data/tests/requests/rds/instance_tests.rb +0 -149
- data/tests/requests/rds/log_file_tests.rb +0 -19
- data/tests/requests/rds/parameter_group_tests.rb +0 -62
- data/tests/requests/rds/parameter_request_tests.rb +0 -32
- data/tests/requests/rds/security_group_tests.rb +0 -101
- data/tests/requests/rds/subnet_groups_tests.rb +0 -52
- data/tests/requests/rds/tagging_tests.rb +0 -78
- data/tests/requests/redshift/cluster_parameter_group_tests.rb +0 -76
- data/tests/requests/redshift/cluster_security_group_tests.rb +0 -42
- data/tests/requests/redshift/cluster_snapshot_tests.rb +0 -73
- data/tests/requests/redshift/cluster_tests.rb +0 -80
- data/tests/requests/ses/helper.rb +0 -9
- data/tests/requests/ses/verified_domain_identity_tests.rb +0 -16
- data/tests/requests/ses/verified_email_address_tests.rb +0 -27
- data/tests/requests/simpledb/attributes_tests.rb +0 -86
- data/tests/requests/simpledb/domain_tests.rb +0 -51
- data/tests/requests/simpledb/helper.rb +0 -10
- data/tests/requests/sns/helper.rb +0 -9
- data/tests/requests/sns/subscription_tests.rb +0 -86
- data/tests/requests/sns/topic_tests.rb +0 -53
- data/tests/requests/sqs/helper.rb +0 -9
- data/tests/requests/sqs/message_tests.rb +0 -51
- data/tests/requests/sqs/queue_tests.rb +0 -50
- data/tests/requests/storage/acl_utils_tests.rb +0 -209
- data/tests/requests/storage/bucket_tests.rb +0 -416
- data/tests/requests/storage/cors_utils_tests.rb +0 -108
- data/tests/requests/storage/delete_multiple_objects_tests.rb +0 -12
- data/tests/requests/storage/multipart_copy_tests.rb +0 -93
- data/tests/requests/storage/multipart_upload_tests.rb +0 -121
- data/tests/requests/storage/object_tests.rb +0 -269
- data/tests/requests/storage/versioning_tests.rb +0 -300
- data/tests/requests/sts/assume_role_tests.rb +0 -19
- data/tests/requests/sts/assume_role_with_saml_tests.rb +0 -18
- data/tests/requests/sts/assume_role_with_web_identity_tests.rb +0 -28
- data/tests/requests/sts/get_federation_token_tests.rb +0 -20
- data/tests/requests/sts/session_token_tests.rb +0 -16
- data/tests/requests/support/helper.rb +0 -43
- data/tests/requests/support/trusted_advisor_check_tests.rb +0 -16
- data/tests/signaturev4_tests.rb +0 -106
- data/tests/signed_params_tests.rb +0 -17
- data/tests/storage_tests.rb +0 -7
@@ -1,457 +0,0 @@
|
|
1
|
-
Shindo.tests('Fog::Compute[:aws] | security group requests', ['aws']) do
|
2
|
-
# See https://github.com/fog/fog/issues/2932hj0
|
3
|
-
pending
|
4
|
-
|
5
|
-
@create_security_group_format = {
|
6
|
-
'requestId' => String,
|
7
|
-
'groupId' => String,
|
8
|
-
'return' => Fog::Boolean
|
9
|
-
}
|
10
|
-
|
11
|
-
@security_groups_format = {
|
12
|
-
'requestId' => String,
|
13
|
-
'securityGroupInfo' => [{
|
14
|
-
'groupDescription' => String,
|
15
|
-
'groupId' => Fog::Nullable::String,
|
16
|
-
'groupName' => String,
|
17
|
-
'ipPermissions' => [{
|
18
|
-
'fromPort' => Fog::Nullable::Integer,
|
19
|
-
'groups' => [{ 'groupName' => Fog::Nullable::String, 'userId' => String, 'groupId' => String }],
|
20
|
-
'ipProtocol' => String,
|
21
|
-
'ipRanges' => [Fog::Nullable::Hash],
|
22
|
-
'ipv6Ranges' => [Fog::Nullable::Hash],
|
23
|
-
'toPort' => Fog::Nullable::Integer,
|
24
|
-
}],
|
25
|
-
'ipPermissionsEgress' => [],
|
26
|
-
'ownerId' => String,
|
27
|
-
'vpcId' => Fog::Nullable::String
|
28
|
-
}]
|
29
|
-
}
|
30
|
-
|
31
|
-
@owner_id = Fog::Compute[:aws].describe_security_groups('group-name' => 'default').body['securityGroupInfo'].first['ownerId']
|
32
|
-
@group_id_default = Fog::Compute[:aws].describe_security_groups('group-name' => 'default').body['securityGroupInfo'].first['groupId']
|
33
|
-
|
34
|
-
tests('success') do
|
35
|
-
|
36
|
-
tests("#create_security_group('fog_security_group', 'tests group')").formats(@create_security_group_format) do
|
37
|
-
Fog::Compute[:aws].create_security_group('fog_security_group', 'tests group').body
|
38
|
-
end
|
39
|
-
tests("#create_security_group('fog_security_group_two', 'tests group')").formats(@create_security_group_format) do
|
40
|
-
Fog::Compute[:aws].create_security_group('fog_security_group_two', 'tests group').body
|
41
|
-
end
|
42
|
-
@group_id_two = Fog::Compute[:aws].describe_security_groups('group-name' => 'fog_security_group_two').body['securityGroupInfo'].first['groupId']
|
43
|
-
group_id = Fog::Compute[:aws].describe_security_groups('group-name' => 'fog_security_group').body['securityGroupInfo'].first['groupId']
|
44
|
-
to_be_revoked = []
|
45
|
-
expected_permissions = []
|
46
|
-
|
47
|
-
permission = { 'SourceSecurityGroupName' => 'default' }
|
48
|
-
tests("#authorize_security_group_ingress('fog_security_group', #{permission.inspect})").formats(AWS::Compute::Formats::BASIC) do
|
49
|
-
Fog::Compute[:aws].authorize_security_group_ingress('fog_security_group', permission).body
|
50
|
-
end
|
51
|
-
|
52
|
-
to_be_revoked.push([permission, expected_permissions.dup])
|
53
|
-
|
54
|
-
expected_permissions = [
|
55
|
-
{"groups"=>[{"groupName"=>"default", "userId"=>@owner_id, "groupId"=>@group_id_default}],
|
56
|
-
"fromPort"=>1,
|
57
|
-
"ipRanges"=>[],
|
58
|
-
"ipv6Ranges"=>[],
|
59
|
-
"ipProtocol"=>"tcp",
|
60
|
-
"toPort"=>65535},
|
61
|
-
{"groups"=>[{"groupName"=>"default", "userId"=>@owner_id, "groupId"=>@group_id_default}],
|
62
|
-
"fromPort"=>1,
|
63
|
-
"ipRanges"=>[],
|
64
|
-
"ipv6Ranges"=>[],
|
65
|
-
"ipProtocol"=>"udp",
|
66
|
-
"toPort"=>65535},
|
67
|
-
{"groups"=>[{"groupName"=>"default", "userId"=>@owner_id, "groupId"=>@group_id_default}],
|
68
|
-
"fromPort"=>-1,
|
69
|
-
"ipRanges"=>[],
|
70
|
-
"ipv6Ranges"=>[],
|
71
|
-
"ipProtocol"=>"icmp",
|
72
|
-
"toPort"=>-1}
|
73
|
-
]
|
74
|
-
|
75
|
-
tests("#describe_security_groups('group-name' => 'fog_security_group')").returns([]) do
|
76
|
-
array_differences(expected_permissions, Fog::Compute[:aws].describe_security_groups('group-name' => 'fog_security_group').body['securityGroupInfo'].first['ipPermissions'])
|
77
|
-
end
|
78
|
-
|
79
|
-
tests("#describe_security_groups('group-id' => '#{group_id}')").returns([]) do
|
80
|
-
array_differences(expected_permissions, Fog::Compute[:aws].describe_security_groups('group-id' => group_id).body['securityGroupInfo'].first['ipPermissions'])
|
81
|
-
end
|
82
|
-
|
83
|
-
permission = { 'SourceSecurityGroupName' => 'fog_security_group_two', 'SourceSecurityGroupOwnerId' => @owner_id }
|
84
|
-
tests("#authorize_security_group_ingress('fog_security_group', #{permission.inspect})").formats(AWS::Compute::Formats::BASIC) do
|
85
|
-
Fog::Compute[:aws].authorize_security_group_ingress('fog_security_group', permission).body
|
86
|
-
end
|
87
|
-
|
88
|
-
to_be_revoked.push([permission, expected_permissions.dup])
|
89
|
-
|
90
|
-
expected_permissions = [
|
91
|
-
{"groups"=>
|
92
|
-
[{"userId"=>@owner_id, "groupName"=>"default", "groupId"=>@group_id_default},
|
93
|
-
{"userId"=>@owner_id, "groupName"=>"fog_security_group_two", "groupId"=>@group_id_two}],
|
94
|
-
"ipRanges"=>[],
|
95
|
-
"ipv6Ranges"=>[],
|
96
|
-
"ipProtocol"=>"tcp",
|
97
|
-
"fromPort"=>1,
|
98
|
-
"toPort"=>65535},
|
99
|
-
{"groups"=>
|
100
|
-
[{"userId"=>@owner_id, "groupName"=>"default", "groupId"=>@group_id_default},
|
101
|
-
{"userId"=>@owner_id, "groupName"=>"fog_security_group_two", "groupId"=>@group_id_two}],
|
102
|
-
"ipRanges"=>[],
|
103
|
-
"ipv6Ranges"=>[],
|
104
|
-
"ipProtocol"=>"udp",
|
105
|
-
"fromPort"=>1,
|
106
|
-
"toPort"=>65535},
|
107
|
-
{"groups"=>
|
108
|
-
[{"userId"=>@owner_id, "groupName"=>"default", "groupId"=>@group_id_default},
|
109
|
-
{"userId"=>@owner_id, "groupName"=>"fog_security_group_two", "groupId"=>@group_id_two}],
|
110
|
-
"ipRanges"=>[],
|
111
|
-
"ipv6Ranges"=>[],
|
112
|
-
"ipProtocol"=>"icmp",
|
113
|
-
"fromPort"=>-1,
|
114
|
-
"toPort"=>-1}
|
115
|
-
]
|
116
|
-
|
117
|
-
tests("#describe_security_groups('group-name' => 'fog_security_group')").returns([]) do
|
118
|
-
array_differences(expected_permissions, Fog::Compute[:aws].describe_security_groups('group-name' => 'fog_security_group').body['securityGroupInfo'].first['ipPermissions'])
|
119
|
-
end
|
120
|
-
|
121
|
-
permission = { 'IpProtocol' => 'tcp', 'FromPort' => '22', 'ToPort' => '22' }
|
122
|
-
tests("#authorize_security_group_ingress('fog_security_group', #{permission.inspect})").formats(AWS::Compute::Formats::BASIC) do
|
123
|
-
Fog::Compute[:aws].authorize_security_group_ingress('fog_security_group', permission).body
|
124
|
-
end
|
125
|
-
|
126
|
-
to_be_revoked.push([permission, expected_permissions.dup])
|
127
|
-
|
128
|
-
# previous did nothing
|
129
|
-
tests("#describe_security_groups('group-name' => 'fog_security_group')").returns([]) do
|
130
|
-
array_differences(expected_permissions, Fog::Compute[:aws].describe_security_groups('group-name' => 'fog_security_group').body['securityGroupInfo'].first['ipPermissions'])
|
131
|
-
end
|
132
|
-
|
133
|
-
permission = { 'IpProtocol' => 'tcp', 'FromPort' => '22', 'ToPort' => '22', 'CidrIp' => '10.0.0.0/8' }
|
134
|
-
tests("#authorize_security_group_ingress('fog_security_group', #{permission.inspect})").formats(AWS::Compute::Formats::BASIC) do
|
135
|
-
Fog::Compute[:aws].authorize_security_group_ingress('fog_security_group', permission).body
|
136
|
-
end
|
137
|
-
|
138
|
-
to_be_revoked.push([permission, expected_permissions.dup])
|
139
|
-
|
140
|
-
expected_permissions += [
|
141
|
-
{"groups"=>[],
|
142
|
-
"ipRanges"=>[{"cidrIp"=>"10.0.0.0/8"}],
|
143
|
-
"ipv6Ranges"=>[],
|
144
|
-
"ipProtocol"=>"tcp",
|
145
|
-
"fromPort"=>22,
|
146
|
-
"toPort"=>22}
|
147
|
-
]
|
148
|
-
|
149
|
-
tests("#describe_security_groups('group-name' => 'fog_security_group')").returns([]) do
|
150
|
-
array_differences(expected_permissions, Fog::Compute[:aws].describe_security_groups('group-name' => 'fog_security_group').body['securityGroupInfo'].first['ipPermissions'])
|
151
|
-
end
|
152
|
-
|
153
|
-
# authorize with nested IpProtocol without IpRanges or Groups does nothing
|
154
|
-
permissions = {
|
155
|
-
'IpPermissions' => [
|
156
|
-
{ 'IpProtocol' => 'tcp', 'FromPort' => '22', 'ToPort' => '22' }
|
157
|
-
]
|
158
|
-
}
|
159
|
-
tests("#authorize_security_group_ingress('fog_security_group', #{permissions.inspect})").formats(AWS::Compute::Formats::BASIC) do
|
160
|
-
Fog::Compute[:aws].authorize_security_group_ingress('fog_security_group', permissions).body
|
161
|
-
end
|
162
|
-
|
163
|
-
to_be_revoked.push([permissions, expected_permissions.dup])
|
164
|
-
|
165
|
-
# previous did nothing
|
166
|
-
tests("#describe_security_groups('group-name' => 'fog_security_group')").returns([]) do
|
167
|
-
array_differences(expected_permissions, Fog::Compute[:aws].describe_security_groups('group-name' => 'fog_security_group').body['securityGroupInfo'].first['ipPermissions'])
|
168
|
-
end
|
169
|
-
|
170
|
-
# authorize with nested IpProtocol with IpRanges
|
171
|
-
permissions = {
|
172
|
-
'IpPermissions' => [
|
173
|
-
{
|
174
|
-
'IpProtocol' => 'tcp', 'FromPort' => '80', 'ToPort' => '80',
|
175
|
-
'IpRanges' => [{ 'CidrIp' => '192.168.0.0/24' }],
|
176
|
-
'Ipv6Ranges' => []
|
177
|
-
}
|
178
|
-
]
|
179
|
-
}
|
180
|
-
tests("#authorize_security_group_ingress('fog_security_group', #{permissions.inspect})").formats(AWS::Compute::Formats::BASIC) do
|
181
|
-
Fog::Compute[:aws].authorize_security_group_ingress('fog_security_group', permissions).body
|
182
|
-
end
|
183
|
-
|
184
|
-
to_be_revoked.push([permissions, expected_permissions.dup])
|
185
|
-
|
186
|
-
expected_permissions += [
|
187
|
-
{"groups"=>[],
|
188
|
-
"ipRanges"=>[{"cidrIp"=>"192.168.0.0/24"}],
|
189
|
-
"ipv6Ranges"=>[],
|
190
|
-
"ipProtocol"=>"tcp",
|
191
|
-
"fromPort"=>80,
|
192
|
-
"toPort"=>80}
|
193
|
-
]
|
194
|
-
|
195
|
-
tests("#describe_security_groups('group-name' => 'fog_security_group')").returns([]) do
|
196
|
-
array_differences(expected_permissions, Fog::Compute[:aws].describe_security_groups('group-name' => 'fog_security_group').body['securityGroupInfo'].first['ipPermissions'])
|
197
|
-
end
|
198
|
-
|
199
|
-
# authorize with nested IpProtocol with Groups
|
200
|
-
permissions = {
|
201
|
-
'IpPermissions' => [
|
202
|
-
{
|
203
|
-
'IpProtocol' => 'tcp', 'FromPort' => '8000', 'ToPort' => '8000',
|
204
|
-
'Groups' => [{ 'GroupName' => 'fog_security_group_two' }]
|
205
|
-
}
|
206
|
-
]
|
207
|
-
}
|
208
|
-
tests("#authorize_security_group_ingress('fog_security_group', #{permissions.inspect})").formats(AWS::Compute::Formats::BASIC) do
|
209
|
-
Fog::Compute[:aws].authorize_security_group_ingress('fog_security_group', permissions).body
|
210
|
-
end
|
211
|
-
|
212
|
-
to_be_revoked.push([permissions, expected_permissions.dup])
|
213
|
-
|
214
|
-
expected_permissions += [
|
215
|
-
{"groups"=>[{"userId"=>@owner_id, "groupName"=>"fog_security_group_two", "groupId"=>@group_id_two}],
|
216
|
-
"ipRanges"=>[],
|
217
|
-
"ipv6Ranges"=>[],
|
218
|
-
"ipProtocol"=>"tcp",
|
219
|
-
"fromPort"=>8000,
|
220
|
-
"toPort"=>8000}
|
221
|
-
]
|
222
|
-
tests("#describe_security_groups('group-name' => 'fog_security_group')").returns([]) do
|
223
|
-
array_differences(expected_permissions, Fog::Compute[:aws].describe_security_groups('group-name' => 'fog_security_group').body['securityGroupInfo'].first['ipPermissions'])
|
224
|
-
end
|
225
|
-
|
226
|
-
# authorize with nested IpProtocol with IpRanges and Groups
|
227
|
-
# try integers on this one instead of strings
|
228
|
-
permissions = {
|
229
|
-
'IpPermissions' => [
|
230
|
-
{
|
231
|
-
'IpProtocol' => 'tcp', 'FromPort' => 9000, 'ToPort' => 9000,
|
232
|
-
'IpRanges' => [{ 'CidrIp' => '172.16.0.0/24' }],
|
233
|
-
'Groups' => [{ 'GroupName' => 'fog_security_group_two' }]
|
234
|
-
}
|
235
|
-
]
|
236
|
-
}
|
237
|
-
tests("#authorize_security_group_ingress('fog_security_group', #{permissions.inspect})").formats(AWS::Compute::Formats::BASIC) do
|
238
|
-
Fog::Compute[:aws].authorize_security_group_ingress('fog_security_group', permissions).body
|
239
|
-
end
|
240
|
-
|
241
|
-
to_be_revoked.push([permissions, expected_permissions.dup])
|
242
|
-
|
243
|
-
expected_permissions += [
|
244
|
-
{"groups"=>
|
245
|
-
[{"userId"=>@owner_id, "groupName"=>"fog_security_group_two", "groupId"=>@group_id_two}],
|
246
|
-
"ipRanges"=>[{"cidrIp"=>"172.16.0.0/24"}],
|
247
|
-
"ipProtocol"=>"tcp",
|
248
|
-
"fromPort"=>9000,
|
249
|
-
"toPort"=>9000}
|
250
|
-
]
|
251
|
-
|
252
|
-
tests("#describe_security_groups('group-name' => 'fog_security_group')").returns([]) do
|
253
|
-
array_differences(expected_permissions, Fog::Compute[:aws].describe_security_groups('group-name' => 'fog_security_group').body['securityGroupInfo'].first['ipPermissions'])
|
254
|
-
end
|
255
|
-
|
256
|
-
tests("#describe_security_groups").formats(@security_groups_format) do
|
257
|
-
Fog::Compute[:aws].describe_security_groups.body
|
258
|
-
end
|
259
|
-
|
260
|
-
tests("#describe_security_groups('group-name' => 'fog_security_group')").formats(@security_groups_format) do
|
261
|
-
Fog::Compute[:aws].describe_security_groups('group-name' => 'fog_security_group').body
|
262
|
-
end
|
263
|
-
|
264
|
-
to_be_revoked.reverse.each do |permission, expected_permissions_after|
|
265
|
-
tests("#revoke_security_group_ingress('fog_security_group', #{permission.inspect})").formats(AWS::Compute::Formats::BASIC) do
|
266
|
-
Fog::Compute[:aws].revoke_security_group_ingress('fog_security_group', permission).body
|
267
|
-
end
|
268
|
-
|
269
|
-
tests("#describe_security_groups('group-name' => 'fog_security_group')").returns([]) do
|
270
|
-
array_differences(expected_permissions_after, Fog::Compute[:aws].describe_security_groups('group-name' => 'fog_security_group').body['securityGroupInfo'].first['ipPermissions'])
|
271
|
-
end
|
272
|
-
end
|
273
|
-
|
274
|
-
tests("#delete_security_group('fog_security_group')").formats(AWS::Compute::Formats::BASIC) do
|
275
|
-
Fog::Compute[:aws].delete_security_group('fog_security_group').body
|
276
|
-
end
|
277
|
-
|
278
|
-
tests("#delete_security_group('fog_security_group_two')").formats(AWS::Compute::Formats::BASIC) do
|
279
|
-
Fog::Compute[:aws].delete_security_group('fog_security_group_two').body
|
280
|
-
end
|
281
|
-
|
282
|
-
vpc_id = Fog::Compute[:aws].create_vpc('10.255.254.64/28').body['vpcSet'].first['vpcId']
|
283
|
-
|
284
|
-
# Create security group in VPC
|
285
|
-
tests("#create_security_group('vpc_security_group', 'tests group')").formats(@create_security_group_format) do
|
286
|
-
Fog::Compute[:aws].create_security_group('vpc_security_group', 'tests group', vpc_id).body
|
287
|
-
end
|
288
|
-
|
289
|
-
group_id = Fog::Compute[:aws].describe_security_groups('group-name' => 'vpc_security_group').body['securityGroupInfo'].first['groupId']
|
290
|
-
|
291
|
-
permissions = {
|
292
|
-
'IpPermissions' => [
|
293
|
-
{
|
294
|
-
'IpProtocol' => '42',
|
295
|
-
'IpRanges' => [{ 'CidrIp' => '10.0.0.0/8' }],
|
296
|
-
}
|
297
|
-
]
|
298
|
-
}
|
299
|
-
|
300
|
-
expected_permissions = [
|
301
|
-
{"groups"=>[],
|
302
|
-
"ipRanges"=>[{"cidrIp"=>"10.0.0.0/8"}],
|
303
|
-
"ipProtocol"=>"42"}
|
304
|
-
]
|
305
|
-
|
306
|
-
options = permissions.clone
|
307
|
-
options['GroupId'] = group_id
|
308
|
-
tests("#authorize_security_group_ingress(#{options.inspect})").formats(AWS::Compute::Formats::BASIC) do
|
309
|
-
Fog::Compute[:aws].authorize_security_group_ingress(options).body
|
310
|
-
end
|
311
|
-
|
312
|
-
tests("#describe_security_groups('group-name' => 'vpc_security_group')").returns([]) do
|
313
|
-
array_differences(expected_permissions, Fog::Compute[:aws].describe_security_groups('group-name' => 'vpc_security_group').body['securityGroupInfo'].first['ipPermissions'])
|
314
|
-
end
|
315
|
-
|
316
|
-
tests("#revoke_security_group_ingress(#{options.inspect})").formats(AWS::Compute::Formats::BASIC) do
|
317
|
-
Fog::Compute[:aws].revoke_security_group_ingress(options).body
|
318
|
-
end
|
319
|
-
|
320
|
-
vpc_group=Fog::Compute[:aws].security_groups.get_by_id(group_id)
|
321
|
-
vpc_group.destroy
|
322
|
-
|
323
|
-
Fog::Compute[:aws].delete_vpc(vpc_id)
|
324
|
-
|
325
|
-
end
|
326
|
-
## Rate limiting seems to want us to take a break otherwise it will throw errors
|
327
|
-
tests('failure') do
|
328
|
-
|
329
|
-
@security_group = Fog::Compute[:aws].security_groups.create(:description => 'tests group', :name => 'fog_security_group')
|
330
|
-
@other_security_group = Fog::Compute[:aws].security_groups.create(:description => 'tests group', :name => 'fog_other_security_group')
|
331
|
-
|
332
|
-
tests("duplicate #create_security_group(#{@security_group.name}, #{@security_group.description})").raises(Fog::AWS::Compute::Error) do
|
333
|
-
Fog::Compute[:aws].create_security_group(@security_group.name, @security_group.description)
|
334
|
-
end
|
335
|
-
|
336
|
-
tests("#authorize_security_group_ingress('not_a_group_name', {'FromPort' => 80, 'IpProtocol' => 'tcp', 'toPort' => 80})").raises(Fog::AWS::Compute::NotFound) do
|
337
|
-
Fog::Compute[:aws].authorize_security_group_ingress(
|
338
|
-
'not_a_group_name',
|
339
|
-
{
|
340
|
-
'FromPort' => 80,
|
341
|
-
'IpProtocol' => 'tcp',
|
342
|
-
'ToPort' => 80,
|
343
|
-
}
|
344
|
-
)
|
345
|
-
end
|
346
|
-
|
347
|
-
tests("#authorize_security_group_ingress('not_a_group_name', {'SourceSecurityGroupName' => 'not_a_group_name', 'SourceSecurityGroupOwnerId' => '#{@owner_id}'})").raises(Fog::AWS::Compute::NotFound) do
|
348
|
-
Fog::Compute[:aws].authorize_security_group_ingress(
|
349
|
-
'not_a_group_name',
|
350
|
-
{
|
351
|
-
'SourceSecurityGroupName' => 'not_a_group_name',
|
352
|
-
'SourceSecurityGroupOwnerId' => @owner_id
|
353
|
-
}
|
354
|
-
)
|
355
|
-
end
|
356
|
-
|
357
|
-
tests("#authorize_security_group_ingress('fog_security_group', {'IpPermissions' => [{'IpProtocol' => 'tcp', 'FromPort' => 80, 'ToPort' => 80, 'IpRanges' => [{'CidrIp' => '10.0.0.0/8'}]}]})").formats(AWS::Compute::Formats::BASIC) do
|
358
|
-
Fog::Compute[:aws].authorize_security_group_ingress('fog_security_group', {'IpPermissions' => [{'IpProtocol' => 'tcp', 'FromPort' => 80, 'ToPort' => 80, 'IpRanges' => [{'CidrIp' => '10.0.0.0/8'}]}]}).body
|
359
|
-
end
|
360
|
-
|
361
|
-
tests("#authorize_security_group_ingress('fog_security_group', {'IpPermissions' => [{'IpProtocol' => 'tcp', 'FromPort' => 80, 'ToPort' => 80, 'IpRanges' => [{'CidrIp' => '10.0.0.0/8'}]}]})").raises(Fog::AWS::Compute::Error) do
|
362
|
-
Fog::Compute[:aws].authorize_security_group_ingress('fog_security_group', {'IpPermissions' => [{'IpProtocol' => 'tcp', 'FromPort' => 80, 'ToPort' => 80, 'IpRanges' => [{'CidrIp' => '10.0.0.0/8'}]}]})
|
363
|
-
end
|
364
|
-
|
365
|
-
tests("#authorize_security_group_ingress('fog_security_group', {'IpPermissions' => [{'Groups' => [{'GroupName' => '#{@other_security_group.name}'}], 'FromPort' => 80, 'ToPort' => 80, 'IpProtocol' => 'tcp'}]})").formats(AWS::Compute::Formats::BASIC) do
|
366
|
-
Fog::Compute[:aws].authorize_security_group_ingress('fog_security_group', {'IpPermissions' => [{'Groups' => [{'GroupName' => @other_security_group.name}], 'FromPort' => 80, 'ToPort' => 80, 'IpProtocol' => 'tcp'}]}).body
|
367
|
-
end
|
368
|
-
|
369
|
-
tests("#delete_security_group('#{@other_security_group.name}')").raises(Fog::AWS::Compute::Error) do
|
370
|
-
Fog::Compute[:aws].delete_security_group(@other_security_group.name)
|
371
|
-
end
|
372
|
-
|
373
|
-
broken_params = [
|
374
|
-
{},
|
375
|
-
{ "IpProtocol" => "what" },
|
376
|
-
{ "IpProtocol" => "tcp" },
|
377
|
-
{ "IpProtocol" => "what", "FromPort" => 1, "ToPort" => 1 },
|
378
|
-
]
|
379
|
-
broken_params += broken_params.map do |broken_params_item|
|
380
|
-
{ "IpPermissions" => [broken_params_item] }
|
381
|
-
end
|
382
|
-
broken_params += [
|
383
|
-
{ "IpPermissions" => [] },
|
384
|
-
{ "IpPermissions" => nil }
|
385
|
-
]
|
386
|
-
|
387
|
-
broken_params.each do |broken_params_item|
|
388
|
-
tests("#authorize_security_group_ingress('fog_security_group', #{broken_params_item.inspect})").raises(Fog::AWS::Compute::Error) do
|
389
|
-
Fog::Compute[:aws].authorize_security_group_ingress('fog_security_group', broken_params_item)
|
390
|
-
end
|
391
|
-
|
392
|
-
tests("#revoke_security_group_ingress('fog_security_group', #{broken_params_item.inspect})").raises(Fog::AWS::Compute::Error) do
|
393
|
-
Fog::Compute[:aws].revoke_security_group_ingress('fog_security_group', broken_params_item)
|
394
|
-
end
|
395
|
-
end
|
396
|
-
|
397
|
-
tests("#revoke_security_group_ingress('not_a_group_name', {'FromPort' => 80, 'IpProtocol' => 'tcp', 'toPort' => 80})").raises(Fog::AWS::Compute::NotFound) do
|
398
|
-
Fog::Compute[:aws].revoke_security_group_ingress(
|
399
|
-
'not_a_group_name',
|
400
|
-
{
|
401
|
-
'FromPort' => 80,
|
402
|
-
'IpProtocol' => 'tcp',
|
403
|
-
'ToPort' => 80,
|
404
|
-
}
|
405
|
-
)
|
406
|
-
end
|
407
|
-
|
408
|
-
tests("#revoke_security_group_ingress('not_a_group_name', {'SourceSecurityGroupName' => 'not_a_group_name', 'SourceSecurityGroupOwnerId' => '#{@owner_id}'})").raises(Fog::AWS::Compute::NotFound) do
|
409
|
-
Fog::Compute[:aws].revoke_security_group_ingress(
|
410
|
-
'not_a_group_name',
|
411
|
-
{
|
412
|
-
'SourceSecurityGroupName' => 'not_a_group_name',
|
413
|
-
'SourceSecurityGroupOwnerId' => @owner_id
|
414
|
-
}
|
415
|
-
)
|
416
|
-
end
|
417
|
-
|
418
|
-
tests("#delete_security_group('not_a_group_name')").raises(Fog::AWS::Compute::NotFound) do
|
419
|
-
Fog::Compute[:aws].delete_security_group('not_a_group_name')
|
420
|
-
end
|
421
|
-
|
422
|
-
@rds_security_group = Fog::AWS[:rds].security_groups.create(:id => "rdsgroup", :description => 'fog rds test')
|
423
|
-
|
424
|
-
tests("#delete_security_group('when authorized to an rds firewall')").raises(Fog::AWS::Compute::Error) do
|
425
|
-
@rds_security_group.authorize_ec2_security_group(@security_group.name)
|
426
|
-
Fog::Compute[:aws].delete_security_group(@security_group.name)
|
427
|
-
end
|
428
|
-
|
429
|
-
@rds_security_group.destroy
|
430
|
-
|
431
|
-
@security_group.destroy
|
432
|
-
@other_security_group.destroy
|
433
|
-
|
434
|
-
tests("#delete_security_group('default')").raises(Fog::AWS::Compute::Error) do
|
435
|
-
Fog::Compute[:aws].delete_security_group('default')
|
436
|
-
end
|
437
|
-
|
438
|
-
broken_params = [
|
439
|
-
['fog_security_group', { 'GroupName' => 'fog_security_group' }],
|
440
|
-
[nil, nil],
|
441
|
-
[nil, { 'GroupId' => nil }],
|
442
|
-
[nil, { 'GroupName' => nil, 'GroupId' => nil }]
|
443
|
-
]
|
444
|
-
|
445
|
-
broken_params.each do |list_elem|
|
446
|
-
tests("#authorize_security_group_ingress(#{list_elem[0].inspect}, #{list_elem[1].inspect})").raises(Fog::AWS::Compute::Error) do
|
447
|
-
Fog::Compute[:aws].authorize_security_group_ingress(list_elem[0], list_elem[1])
|
448
|
-
end
|
449
|
-
|
450
|
-
tests("#revoke_security_group_ingress(#{list_elem[0].inspect}, #{list_elem[1].inspect})").raises(Fog::AWS::Compute::Error) do
|
451
|
-
Fog::Compute[:aws].revoke_security_group_ingress(list_elem[0], list_elem[1])
|
452
|
-
end
|
453
|
-
end
|
454
|
-
|
455
|
-
end
|
456
|
-
|
457
|
-
end
|
@@ -1,77 +0,0 @@
|
|
1
|
-
Shindo.tests('Fog::Compute[:aws] | snapshot requests', ['aws']) do
|
2
|
-
|
3
|
-
@snapshot_format = {
|
4
|
-
'description' => Fog::Nullable::String,
|
5
|
-
'encrypted' => Fog::Boolean,
|
6
|
-
'ownerId' => String,
|
7
|
-
'progress' => String,
|
8
|
-
'snapshotId' => String,
|
9
|
-
'startTime' => Time,
|
10
|
-
'status' => String,
|
11
|
-
'volumeId' => String,
|
12
|
-
'volumeSize' => Integer
|
13
|
-
}
|
14
|
-
|
15
|
-
@snapshots_format = {
|
16
|
-
'requestId' => String,
|
17
|
-
'snapshotSet' => [@snapshot_format.merge('tagSet' => {})]
|
18
|
-
}
|
19
|
-
|
20
|
-
@snapshot_copy_result = {
|
21
|
-
'requestId' => String,
|
22
|
-
'snapshotId' => String
|
23
|
-
}
|
24
|
-
|
25
|
-
@volume = Fog::Compute[:aws].volumes.create(:availability_zone => 'us-east-1a', :size => 1)
|
26
|
-
|
27
|
-
tests('success') do
|
28
|
-
|
29
|
-
@snapshot_id = nil
|
30
|
-
|
31
|
-
tests("#create_snapshot(#{@volume.identity})").formats(@snapshot_format.merge('progress' => NilClass, 'requestId' => String)) do
|
32
|
-
data = Fog::Compute[:aws].create_snapshot(@volume.identity).body
|
33
|
-
@snapshot_id = data['snapshotId']
|
34
|
-
data
|
35
|
-
end
|
36
|
-
|
37
|
-
Fog.wait_for { Fog::Compute[:aws].snapshots.get(@snapshot_id) }
|
38
|
-
Fog::Compute[:aws].snapshots.get(@snapshot_id).wait_for { ready? }
|
39
|
-
|
40
|
-
tests("#describe_snapshots").formats(@snapshots_format) do
|
41
|
-
Fog::Compute[:aws].describe_snapshots.body
|
42
|
-
end
|
43
|
-
|
44
|
-
tests("#describe_snapshots('snapshot-id' => '#{@snapshot_id}')").formats(@snapshots_format) do
|
45
|
-
Fog::Compute[:aws].describe_snapshots('snapshot-id' => @snapshot_id).body
|
46
|
-
end
|
47
|
-
|
48
|
-
tests("#copy_snapshot (#{@snapshot_id}, 'us-east-1')").formats(@snapshot_copy_result) do
|
49
|
-
data = Fog::Compute.new(:provider => :aws, :region => "us-west-1").copy_snapshot(@snapshot_id, "us-east-1").body
|
50
|
-
@west_snapshot_id = data['snapshotId']
|
51
|
-
data
|
52
|
-
end
|
53
|
-
|
54
|
-
tests("#delete_snapshots(#{@snapshot_id})").formats(AWS::Compute::Formats::BASIC) do
|
55
|
-
Fog::Compute[:aws].delete_snapshot(@snapshot_id).body
|
56
|
-
end
|
57
|
-
|
58
|
-
#NOTE: waiting for the copy to complete can sometimes take up to 5 minutes (but sometimes it's nearly instant)
|
59
|
-
#for faster tests: comment out the rest of this block
|
60
|
-
Fog.wait_for { Fog::Compute.new(:provider => :aws, :region => "us-west-1").snapshots.get(@west_snapshot_id) }
|
61
|
-
|
62
|
-
tests("#delete_snapshots(#{@west_snapshot_id})").formats(AWS::Compute::Formats::BASIC) do
|
63
|
-
Fog::Compute.new(:provider => :aws, :region => "us-west-1").delete_snapshot(@west_snapshot_id).body
|
64
|
-
end
|
65
|
-
|
66
|
-
end
|
67
|
-
tests('failure') do
|
68
|
-
|
69
|
-
tests("#delete_snapshot('snap-00000000')").raises(Fog::AWS::Compute::NotFound) do
|
70
|
-
Fog::Compute[:aws].delete_snapshot('snap-00000000')
|
71
|
-
end
|
72
|
-
|
73
|
-
end
|
74
|
-
|
75
|
-
@volume.destroy
|
76
|
-
|
77
|
-
end
|
@@ -1,47 +0,0 @@
|
|
1
|
-
Shindo.tests('Fog::Compute[:aws] | spot datafeed subscription requests', ['aws']) do
|
2
|
-
@spot_datafeed_subscription_format = {
|
3
|
-
'spotDatafeedSubscription' => {
|
4
|
-
'bucket' => String,
|
5
|
-
'ownerId' => String,
|
6
|
-
'prefix' => String,
|
7
|
-
'state' => String
|
8
|
-
},
|
9
|
-
'requestId' => String
|
10
|
-
}
|
11
|
-
|
12
|
-
@directory = Fog::Storage[:aws].directories.create(:key => 'fogspotdatafeedsubscriptiontests')
|
13
|
-
|
14
|
-
tests('success') do
|
15
|
-
pending if Fog.mocking?
|
16
|
-
|
17
|
-
tests("#create_spot_datafeed_subscription('fogspotdatafeedsubscriptiontests', 'fogspotdatafeedsubscription/')").formats(@spot_datafeed_subscription_format) do
|
18
|
-
Fog::Compute[:aws].create_spot_datafeed_subscription('fogspotdatafeedsubscriptiontests', 'fogspotdatafeedsubscription/').body
|
19
|
-
end
|
20
|
-
|
21
|
-
tests("duplicate #create_spot_datafeed_subscription('fogspotdatafeedsubscriptiontests', 'fogspotdatafeedsubscription/')").succeeds do
|
22
|
-
Fog::Compute[:aws].create_spot_datafeed_subscription('fogspotdatafeedsubscriptiontests', 'fogspotdatafeedsubscription/')
|
23
|
-
end
|
24
|
-
|
25
|
-
tests("#describe_spot_datafeed_subscription").formats(@spot_datafeed_subscription_format) do
|
26
|
-
Fog::Compute[:aws].describe_spot_datafeed_subscription.body
|
27
|
-
end
|
28
|
-
|
29
|
-
tests("#delete_spot_datafeed_subscription").formats(AWS::Compute::Formats::BASIC) do
|
30
|
-
Fog::Compute[:aws].delete_spot_datafeed_subscription.body
|
31
|
-
end
|
32
|
-
|
33
|
-
tests("duplicate #delete_spot_datafeed_subscription").succeeds do
|
34
|
-
Fog::Compute[:aws].delete_spot_datafeed_subscription
|
35
|
-
end
|
36
|
-
end
|
37
|
-
|
38
|
-
tests('failure') do
|
39
|
-
pending if Fog.mocking?
|
40
|
-
|
41
|
-
tests("#describe_spot_datafeed_subscription").raises(Fog::AWS::Compute::NotFound) do
|
42
|
-
Fog::Compute[:aws].describe_spot_datafeed_subscription
|
43
|
-
end
|
44
|
-
end
|
45
|
-
|
46
|
-
@directory.destroy
|
47
|
-
end
|
@@ -1,55 +0,0 @@
|
|
1
|
-
Shindo.tests('Fog::Compute[:aws] | spot instance requests', ['aws']) do
|
2
|
-
|
3
|
-
@spot_instance_requests_format = {
|
4
|
-
'spotInstanceRequestSet' => [{
|
5
|
-
'createTime' => Time,
|
6
|
-
'instanceId' => Fog::Nullable::String,
|
7
|
-
'launchedAvailabilityZone' => Fog::Nullable::String,
|
8
|
-
'launchSpecification' => {
|
9
|
-
'blockDeviceMapping' => [],
|
10
|
-
'groupSet' => [String],
|
11
|
-
'keyName' => Fog::Nullable::String,
|
12
|
-
'imageId' => String,
|
13
|
-
'instanceType' => String,
|
14
|
-
'monitoring' => Fog::Boolean,
|
15
|
-
'ebsOptimized' => Fog::Boolean,
|
16
|
-
'subnetId' => Fog::Nullable::String,
|
17
|
-
'iamInstanceProfile' => Fog::Nullable::Hash,
|
18
|
-
},
|
19
|
-
'productDescription' => String,
|
20
|
-
'spotInstanceRequestId' => String,
|
21
|
-
'spotPrice' => Float,
|
22
|
-
'state' => String,
|
23
|
-
'type' => String,
|
24
|
-
'fault' => Fog::Nullable::Hash,
|
25
|
-
}],
|
26
|
-
'requestId' => String
|
27
|
-
}
|
28
|
-
|
29
|
-
@cancel_spot_instance_request_format = {
|
30
|
-
'spotInstanceRequestSet' => [{
|
31
|
-
'spotInstanceRequestId' => String,
|
32
|
-
'state' => String
|
33
|
-
}],
|
34
|
-
'requestId' => String
|
35
|
-
}
|
36
|
-
|
37
|
-
tests('success') do
|
38
|
-
|
39
|
-
tests("#request_spot_instances('ami-3202f25b', 't1.micro', '0.001')").formats(@spot_instance_requests_format) do
|
40
|
-
data = Fog::Compute[:aws].request_spot_instances('ami-3202f25b', 't1.micro', '0.001',{'LaunchSpecification.EbsOptimized' => false}).body
|
41
|
-
@spot_instance_request_id = data['spotInstanceRequestSet'].first['spotInstanceRequestId']
|
42
|
-
data
|
43
|
-
end
|
44
|
-
|
45
|
-
tests("#describe_spot_instance_requests").formats(@spot_instance_requests_format) do
|
46
|
-
data = Fog::Compute[:aws].describe_spot_instance_requests('spot-instance-request-id' => [@spot_instance_request_id]).body
|
47
|
-
end
|
48
|
-
|
49
|
-
tests("#cancel_spot_instance_requests('#{@spot_instance_request_id}')").formats(@cancel_spot_instance_request_format) do
|
50
|
-
Fog::Compute[:aws].cancel_spot_instance_requests(@spot_instance_request_id).body
|
51
|
-
end
|
52
|
-
|
53
|
-
end
|
54
|
-
|
55
|
-
end
|
@@ -1,23 +0,0 @@
|
|
1
|
-
Shindo.tests('Fog::Compute[:aws] | spot price history requests', ['aws']) do
|
2
|
-
|
3
|
-
@spot_price_history_format = {
|
4
|
-
'spotPriceHistorySet' => [{
|
5
|
-
'availabilityZone' => String,
|
6
|
-
'instanceType' => String,
|
7
|
-
'spotPrice' => Float,
|
8
|
-
'productDescription' => String,
|
9
|
-
'timestamp' => Time
|
10
|
-
}],
|
11
|
-
'requestId' => String,
|
12
|
-
'nextToken' => Fog::Nullable::String
|
13
|
-
}
|
14
|
-
|
15
|
-
tests('success') do
|
16
|
-
|
17
|
-
tests("#describe_spot_price_history").formats(@spot_price_history_format) do
|
18
|
-
Fog::Compute[:aws].describe_spot_price_history.body
|
19
|
-
end
|
20
|
-
|
21
|
-
end
|
22
|
-
|
23
|
-
end
|