コード例 #1
0
    def test_find_usage_subnet_groups(self):
        data = result_fixtures.RDS.test_find_usage_subnet_groups

        mock_conn = Mock()
        mock_paginator = Mock()
        mock_paginator.paginate.return_value = data
        mock_conn.get_paginator.return_value = mock_paginator

        cls = _RDSService(21, 43)
        cls.conn = mock_conn

        cls._find_usage_subnet_groups()

        assert mock_conn.mock_calls == [
            call.get_paginator('describe_db_subnet_groups'),
            call.get_paginator().paginate()
        ]
        assert mock_paginator.mock_calls == [
            call.paginate()
        ]

        usage = sorted(
            cls.limits['Subnets per Subnet Group'].get_current_usage()
        )
        assert len(usage) == 3
        assert usage[0].get_value() == 1
        assert usage[0].aws_type == 'AWS::RDS::DBSubnetGroup'
        assert usage[0].resource_id == "SubnetGroup2"
        assert usage[1].get_value() == 2
        assert usage[1].aws_type == 'AWS::RDS::DBSubnetGroup'
        assert usage[1].resource_id == "SubnetGroup1"
        assert usage[2].get_value() == 3
        assert usage[2].aws_type == 'AWS::RDS::DBSubnetGroup'
        assert usage[2].resource_id == "default"
コード例 #2
0
    def test_find_usage_reserved_instances(self):
        # @TODO update this with realistic test data
        data = {
            'DescribeReservedDBInstancesResponse': {
                'DescribeReservedDBInstancesResult': {
                    'Marker': None,
                    'ReservedDBInstances': [1, 2]
                },
                'ResponseMetadata': {
                    'RequestId': '75366d86-25a9-11e5-b6fa-c9da955772c6'
                }
            }
        }

        mock_conn = Mock(spec_set=RDSConnection)
        mock_conn.describe_reserved_db_instances.return_value = data
        cls = _RDSService(21, 43)
        cls.conn = mock_conn

        cls._find_usage_reserved_instances()

        assert mock_conn.mock_calls == [
            call.describe_reserved_db_instances()
        ]

        usage = sorted(cls.limits['Reserved Instances'].get_current_usage())
        assert len(usage) == 1
        assert usage[0].get_value() == 2
        assert usage[0].aws_type == 'AWS::RDS::DBInstance'
コード例 #3
0
ファイル: test_rds.py プロジェクト: tkim443/awslimitchecker
 def test_get_limits_again(self):
     """test that existing limits dict is returned on subsequent calls"""
     mock_limits = Mock()
     cls = _RDSService(21, 43, {}, None)
     cls.limits = mock_limits
     res = cls.get_limits()
     assert res == mock_limits
コード例 #4
0
    def test_find_usage_instances(self):
        instances = result_fixtures.RDS.test_find_usage_instances

        mock_conn = Mock()
        mock_paginator = Mock()
        mock_paginator.paginate.return_value = instances
        mock_conn.get_paginator.return_value = mock_paginator

        cls = _RDSService(21, 43)
        cls.conn = mock_conn

        cls._find_usage_instances()

        assert mock_conn.mock_calls == [
            call.get_paginator('describe_db_instances'),
            call.get_paginator().paginate()
        ]
        assert mock_paginator.mock_calls == [
            call.paginate()
        ]

        usage = sorted(
            cls.limits['Read replicas per master'].get_current_usage()
        )
        assert len(usage) == 2
        assert usage[0].get_value() == 0
        assert usage[0].resource_id == 'foo'
        assert usage[1].get_value() == 2
        assert usage[1].resource_id == 'baz'
コード例 #5
0
    def test_find_usage_event_subscriptions(self):
        # @TODO update this with realistic test data
        data = {
            "DescribeEventSubscriptionsResponse": {
                "DescribeEventSubscriptionsResult": {
                    "EventSubscriptionsList": ['a'],
                    "Marker": None
                },
                "ResponseMetadata": {
                    "RequestId": "91c0b568-2499-11e5-8440-1fb643a72e45"
                }
            }
        }

        mock_conn = Mock(spec_set=RDSConnection)
        mock_conn.describe_event_subscriptions.return_value = data
        cls = _RDSService(21, 43)
        cls.conn = mock_conn

        cls._find_usage_event_subscriptions()

        assert mock_conn.mock_calls == [
            call.describe_event_subscriptions()
        ]

        usage = sorted(cls.limits['Event Subscriptions'].get_current_usage())
        assert len(usage) == 1
        assert usage[0].get_value() == 1
        assert usage[0].aws_type == 'AWS::RDS::EventSubscription'
コード例 #6
0
ファイル: test_rds.py プロジェクト: tkim443/awslimitchecker
    def test_find_usage_subnet_groups(self):
        data = result_fixtures.RDS.test_find_usage_subnet_groups

        mock_conn = Mock()
        mock_paginator = Mock()
        mock_paginator.paginate.return_value = data
        mock_conn.get_paginator.return_value = mock_paginator

        cls = _RDSService(21, 43, {}, None)
        cls.conn = mock_conn

        cls._find_usage_subnet_groups()

        assert mock_conn.mock_calls == [
            call.get_paginator('describe_db_subnet_groups'),
            call.get_paginator().paginate()
        ]
        assert mock_paginator.mock_calls == [call.paginate()]

        usage = sorted(
            cls.limits['Subnets per Subnet Group'].get_current_usage())
        assert len(usage) == 3
        assert usage[0].get_value() == 1
        assert usage[0].aws_type == 'AWS::RDS::DBSubnetGroup'
        assert usage[0].resource_id == "SubnetGroup2"
        assert usage[1].get_value() == 2
        assert usage[1].aws_type == 'AWS::RDS::DBSubnetGroup'
        assert usage[1].resource_id == "SubnetGroup1"
        assert usage[2].get_value() == 3
        assert usage[2].aws_type == 'AWS::RDS::DBSubnetGroup'
        assert usage[2].resource_id == "default"
コード例 #7
0
ファイル: test_rds.py プロジェクト: tkim443/awslimitchecker
    def test_find_usage_instances(self):
        instances = result_fixtures.RDS.test_find_usage_instances

        mock_conn = Mock()
        mock_paginator = Mock()
        mock_paginator.paginate.return_value = instances
        mock_conn.get_paginator.return_value = mock_paginator

        cls = _RDSService(21, 43, {}, None)
        cls.conn = mock_conn

        cls._find_usage_instances()

        assert mock_conn.mock_calls == [
            call.get_paginator('describe_db_instances'),
            call.get_paginator().paginate()
        ]
        assert mock_paginator.mock_calls == [call.paginate()]

        usage = sorted(
            cls.limits['Read replicas per master'].get_current_usage())
        assert len(usage) == 2
        assert usage[0].get_value() == 0
        assert usage[0].resource_id == 'foo'
        assert usage[1].get_value() == 2
        assert usage[1].resource_id == 'baz'
コード例 #8
0
ファイル: test_rds.py プロジェクト: tkim443/awslimitchecker
 def test_init(self):
     """test __init__()"""
     cls = _RDSService(21, 43, {}, None)
     assert cls.service_name == 'RDS'
     assert cls.conn is None
     assert cls.warning_threshold == 21
     assert cls.critical_threshold == 43
コード例 #9
0
    def test_find_usage_reserved_instances(self):
        data = result_fixtures.RDS.test_find_usage_reserved_instances

        mock_conn = Mock()
        mock_paginator = Mock()
        mock_paginator.paginate.return_value = data
        mock_conn.get_paginator.return_value = mock_paginator

        cls = _RDSService(21, 43)
        cls.conn = mock_conn

        cls._find_usage_reserved_instances()

        assert mock_conn.mock_calls == [
            call.get_paginator('describe_reserved_db_instances'),
            call.get_paginator().paginate()
        ]
        assert mock_paginator.mock_calls == [
            call.paginate()
        ]

        usage = sorted(cls.limits['Reserved Instances'].get_current_usage())
        assert len(usage) == 1
        assert usage[0].get_value() == 2
        assert usage[0].aws_type == 'AWS::RDS::DBInstance'
コード例 #10
0
ファイル: test_rds.py プロジェクト: pdecat/awslimitchecker
 def test_get_limits(self):
     cls = _RDSService(21, 43)
     cls.limits = {}
     res = cls.get_limits()
     assert sorted(res.keys()) == sorted([
         # TA  # non-TA / service doc name
         'DB instances',  # 'Instances'
         'Max auths per security group',
         'Storage quota (GB)',  # 'Total storage for all DB instances'
         'DB snapshots per user',  # 'Manual Snapshots'
         'DB security groups',  # 'Security Groups'
         # non-TA
         'Reserved Instances',
         'DB parameter groups',
         'VPC Security Groups',
         'Subnet Groups',
         'Subnets per Subnet Group',
         'Option Groups',
         'Event Subscriptions',
         'Read replicas per master',
     ])
     for name, limit in res.items():
         assert limit.service == cls
         assert limit.def_warning_threshold == 21
         assert limit.def_critical_threshold == 43
コード例 #11
0
ファイル: test_rds.py プロジェクト: tkim443/awslimitchecker
 def test_get_limits(self):
     cls = _RDSService(21, 43, {}, None)
     cls.limits = {}
     res = cls.get_limits()
     assert sorted(res.keys()) == sorted([
         # TA  # non-TA / service doc name
         'DB instances',  # 'Instances'
         'Max auths per security group',
         'Storage quota (GB)',  # 'Total storage for all DB instances'
         'DB snapshots per user',  # 'Manual Snapshots'
         'DB security groups',  # 'Security Groups'
         # non-TA
         'Reserved Instances',
         'DB parameter groups',
         'VPC Security Groups',
         'Subnet Groups',
         'Subnets per Subnet Group',
         'Option Groups',
         'Event Subscriptions',
         'Read replicas per master',
         'DB Clusters',
         'DB Cluster Parameter Groups'
     ])
     for name, limit in res.items():
         assert limit.service == cls
         assert limit.def_warning_threshold == 21
         assert limit.def_critical_threshold == 43
コード例 #12
0
    def test_find_usage(self):
        mock_conn = Mock(spec_set=RDSConnection)

        with patch('%s.connect' % self.pb) as mock_connect:
            with patch.multiple(
                    self.pb,
                    _find_usage_instances=DEFAULT,
                    _find_usage_snapshots=DEFAULT,
                    _find_usage_param_groups=DEFAULT,
                    _find_usage_subnet_groups=DEFAULT,
                    _find_usage_option_groups=DEFAULT,
                    _find_usage_event_subscriptions=DEFAULT,
                    _find_usage_security_groups=DEFAULT,
                    _find_usage_reserved_instances=DEFAULT,
            ) as mocks:
                cls = _RDSService(21, 43)
                cls.conn = mock_conn
                assert cls._have_usage is False
                cls.find_usage()
        assert mock_connect.mock_calls == [call()]
        assert cls._have_usage is True
        for x in [
                '_find_usage_instances',
                '_find_usage_snapshots',
        ]:
            assert mocks[x].mock_calls == [call()]
コード例 #13
0
ファイル: test_rds.py プロジェクト: pdecat/awslimitchecker
 def test_get_limits_again(self):
     """test that existing limits dict is returned on subsequent calls"""
     mock_limits = Mock()
     cls = _RDSService(21, 43)
     cls.limits = mock_limits
     res = cls.get_limits()
     assert res == mock_limits
コード例 #14
0
ファイル: test_rds.py プロジェクト: pdecat/awslimitchecker
    def test_find_usage(self):
        mock_conn = Mock(spec_set=RDSConnection)

        with patch('%s.connect' % self.pb) as mock_connect:
            with patch.multiple(
                    self.pb,
                    _find_usage_instances=DEFAULT,
                    _find_usage_snapshots=DEFAULT,
                    _find_usage_param_groups=DEFAULT,
                    _find_usage_subnet_groups=DEFAULT,
                    _find_usage_option_groups=DEFAULT,
                    _find_usage_event_subscriptions=DEFAULT,
                    _find_usage_security_groups=DEFAULT,
                    _find_usage_reserved_instances=DEFAULT,
            ) as mocks:
                cls = _RDSService(21, 43)
                cls.conn = mock_conn
                assert cls._have_usage is False
                cls.find_usage()
        assert mock_connect.mock_calls == [call()]
        assert cls._have_usage is True
        for x in [
                '_find_usage_instances',
                '_find_usage_snapshots',
        ]:
            assert mocks[x].mock_calls == [call()]
コード例 #15
0
ファイル: test_rds.py プロジェクト: pdecat/awslimitchecker
 def test_init(self):
     """test __init__()"""
     cls = _RDSService(21, 43)
     assert cls.service_name == 'RDS'
     assert cls.conn is None
     assert cls.warning_threshold == 21
     assert cls.critical_threshold == 43
コード例 #16
0
    def test_find_usage_snapshots(self):
        response = result_fixtures.RDS.test_find_usage_snapshots

        mock_conn = Mock()
        mock_paginator = Mock()
        mock_paginator.paginate.return_value = response
        mock_conn.get_paginator.return_value = mock_paginator

        cls = _RDSService(21, 43)
        cls.conn = mock_conn

        cls._find_usage_snapshots()

        assert mock_conn.mock_calls == [
            call.get_paginator('describe_db_snapshots'),
            call.get_paginator().paginate()
        ]
        assert mock_paginator.mock_calls == [
            call.paginate()
        ]

        usage = sorted(cls.limits['DB snapshots per user'].get_current_usage())
        assert len(usage) == 1
        assert usage[0].get_value() == 1
        assert usage[0].aws_type == 'AWS::RDS::DBSnapshot'
コード例 #17
0
ファイル: test_rds.py プロジェクト: pdecat/awslimitchecker
    def test_find_usage_param_groups(self):
        data = {
            "DescribeDBParameterGroupsResponse": {
                "DescribeDBParameterGroupsResult": {
                    "DBParameterGroups": [
                        {
                            "DBParameterGroupFamily": "mysql5.6",
                            "DBParameterGroupName": "default.mysql5.6",
                            "Description":
                                "Default parameter group for mysql5.6"
                        },
                        {
                            "DBParameterGroupFamily": "postgres9.3",
                            "DBParameterGroupName": "default.postgres9.3",
                            "Description":
                                "Default parameter group for postgres9.3"
                        }
                    ],
                    "Marker": None
                },
                "ResponseMetadata": {
                    "RequestId": "xxxxxxxxxxxxxxx"
                }
            }
        }

        mock_conn = Mock(spec_set=RDSConnection)
        cls = _RDSService(21, 43)
        cls.conn = mock_conn

        with patch('%s.boto_query_wrapper' % self.pbm) as mock_wrapper:
            mock_wrapper.return_value = data
            cls._find_usage_param_groups()

        assert mock_conn.mock_calls == []
        assert mock_wrapper.mock_calls == [
            call(
                mock_conn.describe_db_parameter_groups,
                alc_marker_path=[
                    "DescribeDBParameterGroupsResponse",
                    "DescribeDBParameterGroupsResult",
                    'Marker'
                ],
                alc_data_path=[
                    "DescribeDBParameterGroupsResponse",
                    "DescribeDBParameterGroupsResult",
                    "DBParameterGroups"
                ],
                alc_marker_param='marker'
            )
        ]

        usage = sorted(cls.limits['DB parameter groups'].get_current_usage())
        assert len(usage) == 1
        assert usage[0].get_value() == 2
        assert usage[0].aws_type == 'AWS::RDS::DBParameterGroup'
コード例 #18
0
 def test_connect(self):
     """test connect()"""
     mock_conn = Mock()
     cls = _RDSService(21, 43)
     with patch('awslimitchecker.services.rds.boto.connect_rds2'
                '') as mock_rds:
         mock_rds.return_value = mock_conn
         cls.connect()
     assert mock_rds.mock_calls == [call()]
     assert mock_conn.mock_calls == []
コード例 #19
0
 def test_connect_again(self):
     """make sure we re-use the connection"""
     mock_conn = Mock()
     cls = _RDSService(21, 43)
     cls.conn = mock_conn
     with patch('awslimitchecker.services.rds.boto.connect_rds2'
                '') as mock_rds:
         mock_rds.return_value = mock_conn
         cls.connect()
     assert mock_rds.mock_calls == []
     assert mock_conn.mock_calls == []
コード例 #20
0
    def test_find_usage_param_groups(self):
        data = {
            "DescribeDBParameterGroupsResponse": {
                "DescribeDBParameterGroupsResult": {
                    "DBParameterGroups": [{
                        "DBParameterGroupFamily":
                        "mysql5.6",
                        "DBParameterGroupName":
                        "default.mysql5.6",
                        "Description":
                        "Default parameter group for mysql5.6"
                    }, {
                        "DBParameterGroupFamily":
                        "postgres9.3",
                        "DBParameterGroupName":
                        "default.postgres9.3",
                        "Description":
                        "Default parameter group for postgres9.3"
                    }],
                    "Marker":
                    None
                },
                "ResponseMetadata": {
                    "RequestId": "xxxxxxxxxxxxxxx"
                }
            }
        }

        mock_conn = Mock(spec_set=RDSConnection)
        cls = _RDSService(21, 43)
        cls.conn = mock_conn

        with patch('%s.boto_query_wrapper' % self.pbm) as mock_wrapper:
            mock_wrapper.return_value = data
            cls._find_usage_param_groups()

        assert mock_conn.mock_calls == []
        assert mock_wrapper.mock_calls == [
            call(mock_conn.describe_db_parameter_groups,
                 alc_marker_path=[
                     "DescribeDBParameterGroupsResponse",
                     "DescribeDBParameterGroupsResult", 'Marker'
                 ],
                 alc_data_path=[
                     "DescribeDBParameterGroupsResponse",
                     "DescribeDBParameterGroupsResult", "DBParameterGroups"
                 ],
                 alc_marker_param='marker')
        ]

        usage = sorted(cls.limits['DB parameter groups'].get_current_usage())
        assert len(usage) == 1
        assert usage[0].get_value() == 2
        assert usage[0].aws_type == 'AWS::RDS::DBParameterGroup'
コード例 #21
0
 def test_required_iam_permissions(self):
     cls = _RDSService(21, 43)
     assert cls.required_iam_permissions() == [
         "rds:DescribeDBInstances",
         "rds:DescribeDBParameterGroups",
         "rds:DescribeDBSecurityGroups",
         "rds:DescribeDBSnapshots",
         "rds:DescribeDBSubnetGroups",
         "rds:DescribeEventSubscriptions",
         "rds:DescribeOptionGroups",
         "rds:DescribeReservedDBInstances",
     ]
コード例 #22
0
ファイル: test_rds.py プロジェクト: pdecat/awslimitchecker
 def test_required_iam_permissions(self):
     cls = _RDSService(21, 43)
     assert cls.required_iam_permissions() == [
         "rds:DescribeDBInstances",
         "rds:DescribeDBParameterGroups",
         "rds:DescribeDBSecurityGroups",
         "rds:DescribeDBSnapshots",
         "rds:DescribeDBSubnetGroups",
         "rds:DescribeEventSubscriptions",
         "rds:DescribeOptionGroups",
         "rds:DescribeReservedDBInstances",
     ]
コード例 #23
0
 def test_connect_again(self):
     """make sure we re-use the connection"""
     mock_conn = Mock()
     cls = _RDSService(21, 43)
     cls.conn = mock_conn
     with patch('awslimitchecker.services.rds.boto.connect_rds2'
                '') as mock_rds:
         with patch('%s.connect_via' % self.pb) as mock_connect_via:
             mock_rds.return_value = mock_conn
             cls.connect()
     assert mock_rds.mock_calls == []
     assert mock_conn.mock_calls == []
     assert mock_connect_via.mock_calls == []
コード例 #24
0
 def test_connect_region(self):
     """test connect()"""
     mock_conn = Mock()
     mock_conn_via = Mock()
     cls = _RDSService(21, 43, region='foo')
     with patch('%s.boto.connect_rds2' % self.pbm) as mock_rds:
         with patch('%s.connect_via' % self.pb) as mock_connect_via:
             mock_rds.return_value = mock_conn
             mock_connect_via.return_value = mock_conn_via
             cls.connect()
     assert mock_rds.mock_calls == []
     assert mock_conn.mock_calls == []
     assert mock_connect_via.mock_calls == [call(connect_to_region)]
     assert cls.conn == mock_conn_via
コード例 #25
0
ファイル: test_rds.py プロジェクト: pdecat/awslimitchecker
 def test_connect(self):
     """test connect()"""
     mock_conn = Mock()
     mock_conn_via = Mock()
     cls = _RDSService(21, 43)
     with patch('%s.boto.connect_rds2' % self.pbm) as mock_rds:
         with patch('%s.connect_via' % self.pb) as mock_connect_via:
             mock_rds.return_value = mock_conn
             mock_connect_via.return_value = mock_conn_via
             cls.connect()
     assert mock_rds.mock_calls == [call()]
     assert mock_conn.mock_calls == []
     assert mock_connect_via.mock_calls == []
     assert cls.conn == mock_conn
コード例 #26
0
    def test_find_usage_option_groups(self):
        data = {
            "DescribeOptionGroupsResponse": {
                "DescribeOptionGroupsResult": {
                    "Marker": None,
                    "OptionGroupsList": [
                        {
                            "AllowsVpcAndNonVpcInstanceMemberships": True,
                            "EngineName": "mysql",
                            "MajorEngineVersion": "5.6",
                            "OptionGroupDescription":
                                "Default option group for mysql 5.6",
                            "OptionGroupName": "default:mysql-5-6",
                            "Options": [],
                            "VpcId": None
                        },
                        {
                            "AllowsVpcAndNonVpcInstanceMemberships": True,
                            "EngineName": "postgres",
                            "MajorEngineVersion": "9.3",
                            "OptionGroupDescription":
                                "Default option group for postgres 9.3",
                            "OptionGroupName": "default:postgres-9-3",
                            "Options": [],
                            "VpcId": None
                        }
                    ]
                },
                "ResponseMetadata": {
                    "RequestId": "8725ddc9-2499-11e5-9ed1-d5a3270e57f9"
                }
            }
        }

        mock_conn = Mock(spec_set=RDSConnection)
        mock_conn.describe_option_groups.return_value = data
        cls = _RDSService(21, 43)
        cls.conn = mock_conn

        cls._find_usage_option_groups()

        assert mock_conn.mock_calls == [
            call.describe_option_groups()
        ]

        usage = sorted(cls.limits['Option Groups'].get_current_usage())
        assert len(usage) == 1
        assert usage[0].get_value() == 2
        assert usage[0].aws_type == 'AWS::RDS::DBOptionGroup'
コード例 #27
0
    def test_find_usage_security_groups(self):
        data = result_fixtures.RDS.test_find_usage_security_groups

        mock_conn = Mock()
        mock_paginator = Mock()
        mock_paginator.paginate.return_value = data
        mock_conn.get_paginator.return_value = mock_paginator

        cls = _RDSService(21, 43)
        cls.conn = mock_conn

        cls._find_usage_security_groups()

        assert mock_conn.mock_calls == [
            call.get_paginator('describe_db_security_groups'),
            call.get_paginator().paginate()
        ]
        assert mock_paginator.mock_calls == [
            call.paginate()
        ]

        usage = sorted(cls.limits['DB security groups'].get_current_usage())
        assert len(usage) == 1
        assert usage[0].get_value() == 2
        assert usage[0].aws_type == 'AWS::RDS::DBSecurityGroup'

        usage = sorted(cls.limits['VPC Security Groups'].get_current_usage())
        assert len(usage) == 1
        assert usage[0].get_value() == 2
        assert usage[0].aws_type == 'AWS::RDS::DBSecurityGroup'

        usage = sorted(cls.limits[
                           'Max auths per security group'].get_current_usage())
        assert len(usage) == 4
        assert usage[0].get_value() == 0
        assert usage[0].resource_id == 'default:vpc-a926c2cc'
        assert usage[0].aws_type == 'AWS::RDS::DBSecurityGroup'
        assert usage[1].get_value() == 1
        assert usage[1].resource_id == 'SecurityGroup1'
        assert usage[1].aws_type == 'AWS::RDS::DBSecurityGroup'
        assert usage[2].get_value() == 2
        assert usage[2].resource_id == 'alctest'
        assert usage[2].aws_type == 'AWS::RDS::DBSecurityGroup'
        assert usage[3].get_value() == 3
        assert usage[3].resource_id == 'SecurityGroup2'
        assert usage[3].aws_type == 'AWS::RDS::DBSecurityGroup'
コード例 #28
0
ファイル: test_rds.py プロジェクト: pdecat/awslimitchecker
    def test_find_usage_event_subscriptions(self):
        # @TODO update this with realistic test data
        data = {
            "DescribeEventSubscriptionsResponse": {
                "DescribeEventSubscriptionsResult": {
                    "EventSubscriptionsList": ['a'],
                    "Marker": None
                },
                "ResponseMetadata": {
                    "RequestId": "91c0b568-2499-11e5-8440-1fb643a72e45"
                }
            }
        }

        mock_conn = Mock(spec_set=RDSConnection)
        cls = _RDSService(21, 43)
        cls.conn = mock_conn

        with patch('%s.boto_query_wrapper' % self.pbm) as mock_wrapper:
            mock_wrapper.return_value = data
            cls._find_usage_event_subscriptions()

        assert mock_conn.mock_calls == []
        assert mock_wrapper.mock_calls == [
            call(
                mock_conn.describe_event_subscriptions,
                alc_marker_path=[
                    "DescribeEventSubscriptionsResponse",
                    "DescribeEventSubscriptionsResult",
                    "Marker"
                ],
                alc_data_path=[
                    "DescribeEventSubscriptionsResponse",
                    "DescribeEventSubscriptionsResult",
                    "EventSubscriptionsList"
                ],
                alc_marker_param='marker'
            )
        ]

        usage = sorted(cls.limits['Event Subscriptions'].get_current_usage())
        assert len(usage) == 1
        assert usage[0].get_value() == 1
        assert usage[0].aws_type == 'AWS::RDS::EventSubscription'
コード例 #29
0
ファイル: test_rds.py プロジェクト: pdecat/awslimitchecker
    def test_find_usage_reserved_instances(self):
        # @TODO update this with realistic test data
        data = {
            'DescribeReservedDBInstancesResponse': {
                'DescribeReservedDBInstancesResult': {
                    'Marker': None,
                    'ReservedDBInstances': [1, 2]
                },
                'ResponseMetadata': {
                    'RequestId': '75366d86-25a9-11e5-b6fa-c9da955772c6'
                }
            }
        }

        mock_conn = Mock(spec_set=RDSConnection)
        cls = _RDSService(21, 43)
        cls.conn = mock_conn

        with patch('%s.boto_query_wrapper' % self.pbm) as mock_wrapper:
            mock_wrapper.return_value = data
            cls._find_usage_reserved_instances()

        assert mock_conn.mock_calls == []
        assert mock_wrapper.mock_calls == [
            call(
                mock_conn.describe_reserved_db_instances,
                alc_marker_path=[
                    'DescribeReservedDBInstancesResponse',
                    'DescribeReservedDBInstancesResult',
                    "Marker"
                ],
                alc_data_path=[
                    'DescribeReservedDBInstancesResponse',
                    'DescribeReservedDBInstancesResult',
                    'ReservedDBInstances'
                ],
                alc_marker_param='marker'
            )
        ]

        usage = sorted(cls.limits['Reserved Instances'].get_current_usage())
        assert len(usage) == 1
        assert usage[0].get_value() == 2
        assert usage[0].aws_type == 'AWS::RDS::DBInstance'
コード例 #30
0
    def test_find_usage_security_groups(self):
        data = result_fixtures.RDS.test_find_usage_security_groups

        mock_conn = Mock()
        mock_paginator = Mock()
        mock_paginator.paginate.return_value = data
        mock_conn.get_paginator.return_value = mock_paginator

        cls = _RDSService(21, 43)
        cls.conn = mock_conn

        cls._find_usage_security_groups()

        assert mock_conn.mock_calls == [
            call.get_paginator('describe_db_security_groups'),
            call.get_paginator().paginate()
        ]
        assert mock_paginator.mock_calls == [call.paginate()]

        usage = sorted(cls.limits['DB security groups'].get_current_usage())
        assert len(usage) == 1
        assert usage[0].get_value() == 2
        assert usage[0].aws_type == 'AWS::RDS::DBSecurityGroup'

        usage = sorted(cls.limits['VPC Security Groups'].get_current_usage())
        assert len(usage) == 1
        assert usage[0].get_value() == 2
        assert usage[0].aws_type == 'AWS::RDS::DBSecurityGroup'

        usage = sorted(
            cls.limits['Max auths per security group'].get_current_usage())
        assert len(usage) == 4
        assert usage[0].get_value() == 0
        assert usage[0].resource_id == 'default:vpc-a926c2cc'
        assert usage[0].aws_type == 'AWS::RDS::DBSecurityGroup'
        assert usage[1].get_value() == 1
        assert usage[1].resource_id == 'SecurityGroup1'
        assert usage[1].aws_type == 'AWS::RDS::DBSecurityGroup'
        assert usage[2].get_value() == 2
        assert usage[2].resource_id == 'alctest'
        assert usage[2].aws_type == 'AWS::RDS::DBSecurityGroup'
        assert usage[3].get_value() == 3
        assert usage[3].resource_id == 'SecurityGroup2'
        assert usage[3].aws_type == 'AWS::RDS::DBSecurityGroup'
コード例 #31
0
    def test_find_usage_param_groups(self):
        data = {
            "DescribeDBParameterGroupsResponse": {
                "DescribeDBParameterGroupsResult": {
                    "DBParameterGroups": [
                        {
                            "DBParameterGroupFamily": "mysql5.6",
                            "DBParameterGroupName": "default.mysql5.6",
                            "Description":
                                "Default parameter group for mysql5.6"
                        },
                        {
                            "DBParameterGroupFamily": "postgres9.3",
                            "DBParameterGroupName": "default.postgres9.3",
                            "Description":
                                "Default parameter group for postgres9.3"
                        }
                    ],
                    "Marker": None
                },
                "ResponseMetadata": {
                    "RequestId": "xxxxxxxxxxxxxxx"
                }
            }
        }

        mock_conn = Mock(spec_set=RDSConnection)
        mock_conn.describe_db_parameter_groups.return_value = data
        cls = _RDSService(21, 43)
        cls.conn = mock_conn

        cls._find_usage_param_groups()

        assert mock_conn.mock_calls == [
            call.describe_db_parameter_groups()
        ]

        usage = sorted(cls.limits['Parameter Groups'].get_current_usage())
        assert len(usage) == 1
        assert usage[0].get_value() == 2
        assert usage[0].aws_type == 'AWS::RDS::DBParameterGroup'
コード例 #32
0
    def test_find_usage_event_subscriptions(self):
        # @TODO update this with realistic test data
        data = {
            "DescribeEventSubscriptionsResponse": {
                "DescribeEventSubscriptionsResult": {
                    "EventSubscriptionsList": ['a'],
                    "Marker": None
                },
                "ResponseMetadata": {
                    "RequestId": "91c0b568-2499-11e5-8440-1fb643a72e45"
                }
            }
        }

        mock_conn = Mock(spec_set=RDSConnection)
        cls = _RDSService(21, 43)
        cls.conn = mock_conn

        with patch('%s.boto_query_wrapper' % self.pbm) as mock_wrapper:
            mock_wrapper.return_value = data
            cls._find_usage_event_subscriptions()

        assert mock_conn.mock_calls == []
        assert mock_wrapper.mock_calls == [
            call(mock_conn.describe_event_subscriptions,
                 alc_marker_path=[
                     "DescribeEventSubscriptionsResponse",
                     "DescribeEventSubscriptionsResult", "Marker"
                 ],
                 alc_data_path=[
                     "DescribeEventSubscriptionsResponse",
                     "DescribeEventSubscriptionsResult",
                     "EventSubscriptionsList"
                 ],
                 alc_marker_param='marker')
        ]

        usage = sorted(cls.limits['Event Subscriptions'].get_current_usage())
        assert len(usage) == 1
        assert usage[0].get_value() == 1
        assert usage[0].aws_type == 'AWS::RDS::EventSubscription'
コード例 #33
0
    def test_find_usage_reserved_instances(self):
        # @TODO update this with realistic test data
        data = {
            'DescribeReservedDBInstancesResponse': {
                'DescribeReservedDBInstancesResult': {
                    'Marker': None,
                    'ReservedDBInstances': [1, 2]
                },
                'ResponseMetadata': {
                    'RequestId': '75366d86-25a9-11e5-b6fa-c9da955772c6'
                }
            }
        }

        mock_conn = Mock(spec_set=RDSConnection)
        cls = _RDSService(21, 43)
        cls.conn = mock_conn

        with patch('%s.boto_query_wrapper' % self.pbm) as mock_wrapper:
            mock_wrapper.return_value = data
            cls._find_usage_reserved_instances()

        assert mock_conn.mock_calls == []
        assert mock_wrapper.mock_calls == [
            call(mock_conn.describe_reserved_db_instances,
                 alc_marker_path=[
                     'DescribeReservedDBInstancesResponse',
                     'DescribeReservedDBInstancesResult', "Marker"
                 ],
                 alc_data_path=[
                     'DescribeReservedDBInstancesResponse',
                     'DescribeReservedDBInstancesResult', 'ReservedDBInstances'
                 ],
                 alc_marker_param='marker')
        ]

        usage = sorted(cls.limits['Reserved Instances'].get_current_usage())
        assert len(usage) == 1
        assert usage[0].get_value() == 2
        assert usage[0].aws_type == 'AWS::RDS::DBInstance'
コード例 #34
0
    def test_find_usage_reserved_instances(self):
        data = result_fixtures.RDS.test_find_usage_reserved_instances

        mock_conn = Mock()
        mock_paginator = Mock()
        mock_paginator.paginate.return_value = data
        mock_conn.get_paginator.return_value = mock_paginator

        cls = _RDSService(21, 43)
        cls.conn = mock_conn

        cls._find_usage_reserved_instances()

        assert mock_conn.mock_calls == [
            call.get_paginator('describe_reserved_db_instances'),
            call.get_paginator().paginate()
        ]
        assert mock_paginator.mock_calls == [call.paginate()]

        usage = sorted(cls.limits['Reserved Instances'].get_current_usage())
        assert len(usage) == 1
        assert usage[0].get_value() == 2
        assert usage[0].aws_type == 'AWS::RDS::DBInstance'
コード例 #35
0
    def test_find_usage_snapshots(self):
        response = result_fixtures.RDS.test_find_usage_snapshots

        mock_conn = Mock()
        mock_paginator = Mock()
        mock_paginator.paginate.return_value = response
        mock_conn.get_paginator.return_value = mock_paginator

        cls = _RDSService(21, 43)
        cls.conn = mock_conn

        cls._find_usage_snapshots()

        assert mock_conn.mock_calls == [
            call.get_paginator('describe_db_snapshots'),
            call.get_paginator().paginate()
        ]
        assert mock_paginator.mock_calls == [call.paginate()]

        usage = sorted(cls.limits['DB snapshots per user'].get_current_usage())
        assert len(usage) == 1
        assert usage[0].get_value() == 1
        assert usage[0].aws_type == 'AWS::RDS::DBSnapshot'
コード例 #36
0
    def test_find_usage(self):
        mock_conn = Mock()

        with patch('%s.connect' % self.pb) as mock_connect:
            with patch.multiple(
                    self.pb,
                    _find_usage_instances=DEFAULT,
                    _find_usage_subnet_groups=DEFAULT,
                    _find_usage_security_groups=DEFAULT,
                    _update_limits_from_api=DEFAULT,
            ) as mocks:
                cls = _RDSService(21, 43)
                cls.conn = mock_conn
                assert cls._have_usage is False
                cls.find_usage()
        assert mock_connect.mock_calls == [call()]
        assert cls._have_usage is True
        for x in [
                '_find_usage_instances',
                '_find_usage_subnet_groups',
                '_find_usage_security_groups',
                '_update_limits_from_api',
        ]:
            assert mocks[x].mock_calls == [call()]
コード例 #37
0
ファイル: test_rds.py プロジェクト: tkim443/awslimitchecker
    def test_find_usage(self):
        mock_conn = Mock()

        with patch('%s.connect' % self.pb) as mock_connect:
            with patch.multiple(
                    self.pb,
                    _find_usage_instances=DEFAULT,
                    _find_usage_subnet_groups=DEFAULT,
                    _find_usage_security_groups=DEFAULT,
                    _update_limits_from_api=DEFAULT,
            ) as mocks:
                cls = _RDSService(21, 43, {}, None)
                cls.conn = mock_conn
                assert cls._have_usage is False
                cls.find_usage()
        assert mock_connect.mock_calls == [call()]
        assert cls._have_usage is True
        for x in [
                '_find_usage_instances',
                '_find_usage_subnet_groups',
                '_find_usage_security_groups',
                '_update_limits_from_api',
        ]:
            assert mocks[x].mock_calls == [call()]
コード例 #38
0
    def test_update_limits_from_api(self):
        response = result_fixtures.RDS.test_update_limits_from_api

        mock_conn = Mock()
        mock_conn.describe_account_attributes.return_value = response
        with patch('%s.logger' % self.pbm) as mock_logger:
            with patch('%s.connect' % self.pb) as mock_connect:
                cls = _RDSService(21, 43)
                cls.conn = mock_conn
                # limits that we still calculate usage for
                cls.limits['Max auths per security group']._add_current_usage(1)
                cls.limits['Subnets per Subnet Group']._add_current_usage(1)
                cls.limits['Read replicas per master']._add_current_usage(1)
                usage_auths = cls.limits[
                    'Max auths per security group'].get_current_usage()
                usage_subnets = cls.limits[
                    'Subnets per Subnet Group'].get_current_usage()
                usage_replicas = cls.limits[
                    'Read replicas per master'].get_current_usage()
                cls._update_limits_from_api()
        assert mock_connect.mock_calls == [call()]
        assert mock_conn.mock_calls == [
            call.describe_account_attributes()
        ]
        assert mock_logger.mock_calls == [
            call.info('Querying RDS DescribeAccountAttributes for limits'),
            call.info(
                'RDS DescribeAccountAttributes returned unknown'
                'limit: %s (max: %s; used: %s)',
                'Foo', 98, 99
            ),
            call.debug('Done setting limits from API.')
        ]

        lim = cls.limits['DB instances']
        assert lim.api_limit == 200
        assert lim.get_current_usage()[0].get_value() == 124

        lim = cls.limits['Reserved Instances']
        assert lim.api_limit == 201
        assert lim.get_current_usage()[0].get_value() == 96

        lim = cls.limits['Storage quota (GB)']
        assert lim.api_limit == 100000
        assert lim.get_current_usage()[0].get_value() == 8320

        lim = cls.limits['DB security groups']
        assert lim.api_limit == 25
        assert lim.get_current_usage()[0].get_value() == 15

        lim = cls.limits['Max auths per security group']
        assert lim.api_limit == 20
        assert lim.get_current_usage() == usage_auths

        lim = cls.limits['DB parameter groups']
        assert lim.api_limit == 50
        assert lim.get_current_usage()[0].get_value() == 39

        lim = cls.limits['DB snapshots per user']
        assert lim.api_limit == 150
        assert lim.get_current_usage()[0].get_value() == 76

        lim = cls.limits['Event Subscriptions']
        assert lim.api_limit == 21
        assert lim.get_current_usage()[0].get_value() == 1

        lim = cls.limits['Subnet Groups']
        assert lim.api_limit == 202
        assert lim.get_current_usage()[0].get_value() == 89

        lim = cls.limits['Option Groups']
        assert lim.api_limit == 22
        assert lim.get_current_usage()[0].get_value() == 2

        lim = cls.limits['Subnets per Subnet Group']
        assert lim.api_limit == 23
        assert lim.get_current_usage() == usage_subnets

        lim = cls.limits['Read replicas per master']
        assert lim.api_limit == 5
        assert lim.get_current_usage() == usage_replicas

        lim = cls.limits['DB Clusters']
        assert lim.api_limit == 40
        assert lim.get_current_usage()[0].get_value() == 3

        lim = cls.limits['DB Cluster Parameter Groups']
        assert lim.api_limit == 51
        assert lim.get_current_usage()[0].get_value() == 6
コード例 #39
0
    def test_find_usage_instances(self):
        mock_conn = Mock(spec_set=RDSConnection)
        cls = _RDSService(21, 43)
        cls.conn = mock_conn
        instances = [{
            'PubliclyAccessible':
            False,
            'MasterUsername':
            '******',
            'LicenseModel':
            'general-public-license',
            'VpcSecurityGroups': [{
                'Status': 'active',
                'VpcSecurityGroupId': 'sg-aaaaaaaa'
            }],
            'InstanceCreateTime':
            1429910904.366,
            'OptionGroupMemberships': [{
                'Status': 'in-sync',
                'OptionGroupName': 'default:mysql-5-6'
            }],
            'PendingModifiedValues': {
                'MultiAZ': None,
                'MasterUserPassword': None,
                'Port': None,
                'Iops': None,
                'AllocatedStorage': None,
                'EngineVersion': None,
                'BackupRetentionPeriod': None,
                'DBInstanceClass': None,
                'DBInstanceIdentifier': None
            },
            'Engine':
            'mysql',
            'MultiAZ':
            True,
            'LatestRestorableTime':
            1435966800.0,
            'DBSecurityGroups': [{
                'Status':
                'active',
                'DBSecurityGroupName':
                'mydb-dbsecuritygroup-aaaa'
            }],
            'DBParameterGroups': [{
                'DBParameterGroupName': 'default.mysql5.6',
                'ParameterApplyStatus': 'in-sync'
            }],
            'ReadReplicaSourceDBInstanceIdentifier':
            None,
            'AutoMinorVersionUpgrade':
            True,
            'PreferredBackupWindow':
            '07:00-08:00',
            'DBSubnetGroup': {
                'VpcId':
                'vpc-abcdef01',
                'Subnets': [{
                    'SubnetStatus': 'Active',
                    'SubnetIdentifier': 'subnet-aaaaaaaa',
                    'SubnetAvailabilityZone': {
                        'Name': 'us-east-1d',
                        'ProvisionedIopsCapable': False
                    }
                }, {
                    'SubnetStatus': 'Active',
                    'SubnetIdentifier': 'subnet-22222222',
                    'SubnetAvailabilityZone': {
                        'Name': 'us-east-1a',
                        'ProvisionedIopsCapable': False
                    }
                }],
                'DBSubnetGroupName':
                'mydb-dbsubnetgroup-abcd',
                'SubnetGroupStatus':
                'Complete',
                'DBSubnetGroupDescription':
                'Subnet group for RDS instance'
            },
            'SecondaryAvailabilityZone':
            'us-east-1a',
            'ReadReplicaDBInstanceIdentifiers': [],
            'AllocatedStorage':
            200,
            'BackupRetentionPeriod':
            7,
            'DBName':
            'wordpress',
            'PreferredMaintenanceWindow':
            'tue:08:00-tue:09:00',
            'Endpoint': {
                'Port': 3306,
                'Address': 'foo.bar.us-east-1.rds.amazonaws.com'
            },
            'DBInstanceStatus':
            'available',
            'StatusInfos':
            None,
            'EngineVersion':
            '5.6.22',
            'CharacterSetName':
            None,
            'AvailabilityZone':
            'us-east-1d',
            'Iops':
            None,
            'DBInstanceClass':
            'db.t2.small',
            'DBInstanceIdentifier':
            'foo'
        }, {
            'PubliclyAccessible':
            False,
            'MasterUsername':
            '******',
            'LicenseModel':
            'postgresql-license',
            'VpcSecurityGroups': [{
                'Status': 'active',
                'VpcSecurityGroupId': 'sg-12345678'
            }],
            'InstanceCreateTime':
            1432238504.239,
            'OptionGroupMemberships': [{
                'Status':
                'in-sync',
                'OptionGroupName':
                'default:postgres-9-3'
            }],
            'PendingModifiedValues': {
                'MultiAZ': None,
                'MasterUserPassword': None,
                'Port': None,
                'Iops': None,
                'AllocatedStorage': None,
                'EngineVersion': None,
                'BackupRetentionPeriod': None,
                'DBInstanceClass': None,
                'DBInstanceIdentifier': None
            },
            'Engine':
            'postgres',
            'MultiAZ':
            False,
            'LatestRestorableTime':
            1435966550.0,
            'DBSecurityGroups': [{
                'Status':
                'active',
                'DBSecurityGroupName':
                'sg1234-dbsecuritygroup-abcd'
            }],
            'DBParameterGroups': [{
                'DBParameterGroupName': 'default.postgres9.3',
                'ParameterApplyStatus': 'in-sync'
            }],
            'ReadReplicaSourceDBInstanceIdentifier':
            None,
            'AutoMinorVersionUpgrade':
            True,
            'PreferredBackupWindow':
            '03:09-03:39',
            'DBSubnetGroup': {
                'VpcId':
                'vpc-87654321',
                'Subnets': [{
                    'SubnetStatus': 'Active',
                    'SubnetIdentifier': 'subnet-a1234567',
                    'SubnetAvailabilityZone': {
                        'Name': 'us-east-1e',
                        'ProvisionedIopsCapable': False
                    }
                }, {
                    'SubnetStatus': 'Active',
                    'SubnetIdentifier': 'subnet-b1234567',
                    'SubnetAvailabilityZone': {
                        'Name': 'us-east-1a',
                        'ProvisionedIopsCapable': False
                    }
                }, {
                    'SubnetStatus': 'Active',
                    'SubnetIdentifier': 'subnet-c1234567',
                    'SubnetAvailabilityZone': {
                        'Name': 'us-east-1d',
                        'ProvisionedIopsCapable': False
                    }
                }],
                'DBSubnetGroupName':
                'mydb-dbsubnetgroup-abcdef',
                'SubnetGroupStatus':
                'Complete',
                'DBSubnetGroupDescription':
                'Subnet group for RDS instance'
            },
            'SecondaryAvailabilityZone':
            None,
            'ReadReplicaDBInstanceIdentifiers': ['db-123', 'db-456'],
            'AllocatedStorage':
            50,
            'BackupRetentionPeriod':
            1,
            'DBName':
            'mydbname',
            'PreferredMaintenanceWindow':
            'mon:05:11-mon:05:41',
            'Endpoint': {
                'Port': 5432,
                'Address': 'baz.blam.us-east-1.rds.amazonaws.com'
            },
            'DBInstanceStatus':
            'available',
            'StatusInfos':
            None,
            'EngineVersion':
            '9.3.6',
            'CharacterSetName':
            None,
            'AvailabilityZone':
            'us-east-1a',
            'Iops':
            None,
            'DBInstanceClass':
            'db.t2.small',
            'DBInstanceIdentifier':
            'baz'
        }]
        return_value = {
            'DescribeDBInstancesResponse': {
                'DescribeDBInstancesResult': {
                    'DBInstances': instances
                }
            }
        }

        with patch('%s.boto_query_wrapper' % self.pbm) as mock_wrapper:
            mock_wrapper.return_value = return_value
            cls._find_usage_instances()

        assert mock_conn.mock_calls == []
        assert mock_wrapper.mock_calls == [
            call(mock_conn.describe_db_instances,
                 alc_marker_path=[
                     'DescribeDBInstancesResponse',
                     'DescribeDBInstancesResult', 'Marker'
                 ],
                 alc_data_path=[
                     'DescribeDBInstancesResponse',
                     'DescribeDBInstancesResult', 'DBInstances'
                 ],
                 alc_marker_param='marker')
        ]

        usage = sorted(cls.limits['DB instances'].get_current_usage())
        assert len(usage) == 1
        assert usage[0].get_value() == 2
        assert usage[0].aws_type == 'AWS::RDS::DBInstance'

        usage = sorted(cls.limits['Storage quota (GB)'].get_current_usage())
        assert len(usage) == 1
        assert usage[0].get_value() == 250
        assert usage[0].aws_type == 'AWS::RDS::DBInstance'

        usage = sorted(
            cls.limits['Read replicas per master'].get_current_usage())
        assert len(usage) == 2
        assert usage[0].get_value() == 0
        assert usage[0].resource_id == 'foo'
        assert usage[1].get_value() == 2
        assert usage[1].resource_id == 'baz'
コード例 #40
0
    def test_find_usage_snapshots(self):
        data = {
            "DescribeDBSnapshotsResponse": {
                "DescribeDBSnapshotsResult": {
                    "DBSnapshots": [
                        {
                            "AllocatedStorage": 100,
                            "AvailabilityZone": "us-east-1a",
                            "DBInstanceIdentifier": "foo-db",
                            "DBSnapshotIdentifier": "foo-db-final-snapshot",
                            "Engine": "postgres",
                            "EngineVersion": "9.3.3",
                            "InstanceCreateTime": 1408035263.101,
                            "Iops": 1000,
                            "LicenseModel": "postgresql-license",
                            "MasterUsername": "******",
                            "OptionGroupName": "default:postgres-9-3",
                            "PercentProgress": 100,
                            "Port": 5432,
                            "SnapshotCreateTime": 1408454469.536,
                            "SnapshotType": "manual",
                            "SourceRegion": None,
                            "Status": "available",
                            "VpcId": None
                        },
                        {
                            "AllocatedStorage": 50,
                            "AvailabilityZone": "us-east-1d",
                            "DBInstanceIdentifier": "bd1t3lf90p3lqdx",
                            "DBSnapshotIdentifier":
                            "rds:bd1t3lf90p3lqdx-2015-06-29-07-02",
                            "Engine": "mysql",
                            "EngineVersion": "5.6.22",
                            "InstanceCreateTime": 1429910904.366,
                            "Iops": None,
                            "LicenseModel": "general-public-license",
                            "MasterUsername": "******",
                            "OptionGroupName": "default:mysql-5-6",
                            "PercentProgress": 100,
                            "Port": 3306,
                            "SnapshotCreateTime": 1435561349.441,
                            "SnapshotType": "automated",
                            "SourceRegion": None,
                            "Status": "available",
                            "VpcId": "vpc-1ee8937b"
                        },
                        {
                            "AllocatedStorage": 25,
                            "AvailabilityZone": "us-east-1d",
                            "DBInstanceIdentifier": "md1e8qwtegkjdgy",
                            "DBSnapshotIdentifier":
                            "rds:md1e8qwtegkjdgy-2015-06-29-07-06",
                            "Engine": "postgres",
                            "EngineVersion": "9.3.6",
                            "InstanceCreateTime": 1433883813.314,
                            "Iops": None,
                            "LicenseModel": "postgresql-license",
                            "MasterUsername": "******",
                            "OptionGroupName": "default:postgres-9-3",
                            "PercentProgress": 100,
                            "Port": 5432,
                            "SnapshotCreateTime": 1435561593.669,
                            "SnapshotType": "automated",
                            "SourceRegion": None,
                            "Status": "available",
                            "VpcId": "vpc-1ee8937b"
                        },
                    ],
                    "Marker":
                    "YXJuOmF3czpyZHM6dXMtZWFzdC0xOjkzNDQ0NjIwOTU0MTpzbm"
                    "Fwc2hvdDpyZHM6bWQxZThxd3RlZ2tqZGd5LTIwMTUtMDctMDEt"
                    "MDctMDc="
                },
                "ResponseMetadata": {
                    "RequestId": "5fe976b3-2499-11e5-ad5a-1fed04d9fd3d"
                }
            }
        }

        mock_conn = Mock(spec_set=RDSConnection)
        cls = _RDSService(21, 43)
        cls.conn = mock_conn

        with patch('%s.boto_query_wrapper' % self.pbm) as mock_wrapper:
            mock_wrapper.return_value = data
            cls._find_usage_snapshots()

        assert mock_conn.mock_calls == []
        assert mock_wrapper.mock_calls == [
            call(mock_conn.describe_db_snapshots,
                 alc_marker_path=[
                     "DescribeDBSnapshotsResponse",
                     "DescribeDBSnapshotsResult", 'Marker'
                 ],
                 alc_data_path=[
                     "DescribeDBSnapshotsResponse",
                     "DescribeDBSnapshotsResult", "DBSnapshots"
                 ],
                 alc_marker_param='marker')
        ]

        usage = sorted(cls.limits['DB snapshots per user'].get_current_usage())
        assert len(usage) == 1
        assert usage[0].get_value() == 1
        assert usage[0].aws_type == 'AWS::RDS::DBSnapshot'
コード例 #41
0
ファイル: test_rds.py プロジェクト: tkim443/awslimitchecker
    def test_update_limits_from_api(self):
        response = result_fixtures.RDS.test_update_limits_from_api

        mock_conn = Mock()
        mock_conn.describe_account_attributes.return_value = response
        with patch('%s.logger' % self.pbm) as mock_logger:
            with patch('%s.connect' % self.pb) as mock_connect:
                cls = _RDSService(21, 43, {}, None)
                cls.conn = mock_conn
                # limits that we still calculate usage for
                cls.limits['Max auths per security group']._add_current_usage(
                    1)
                cls.limits['Subnets per Subnet Group']._add_current_usage(1)
                cls.limits['Read replicas per master']._add_current_usage(1)
                usage_auths = cls.limits[
                    'Max auths per security group'].get_current_usage()
                usage_subnets = cls.limits[
                    'Subnets per Subnet Group'].get_current_usage()
                usage_replicas = cls.limits[
                    'Read replicas per master'].get_current_usage()
                cls._update_limits_from_api()
        assert mock_connect.mock_calls == [call()]
        assert mock_conn.mock_calls == [call.describe_account_attributes()]
        assert mock_logger.mock_calls == [
            call.info('Querying RDS DescribeAccountAttributes for limits'),
            call.info(
                'RDS DescribeAccountAttributes returned unknown'
                'limit: %s (max: %s; used: %s)', 'Foo', 98, 99),
            call.debug('Done setting limits from API.')
        ]

        lim = cls.limits['DB instances']
        assert lim.api_limit == 200
        assert lim.get_current_usage()[0].get_value() == 124

        lim = cls.limits['Reserved Instances']
        assert lim.api_limit == 201
        assert lim.get_current_usage()[0].get_value() == 96

        lim = cls.limits['Storage quota (GB)']
        assert lim.api_limit == 100000
        assert lim.get_current_usage()[0].get_value() == 8320

        lim = cls.limits['DB security groups']
        assert lim.api_limit == 25
        assert lim.get_current_usage()[0].get_value() == 15

        lim = cls.limits['Max auths per security group']
        assert lim.api_limit == 20
        assert lim.get_current_usage() == usage_auths

        lim = cls.limits['DB parameter groups']
        assert lim.api_limit == 50
        assert lim.get_current_usage()[0].get_value() == 39

        lim = cls.limits['DB snapshots per user']
        assert lim.api_limit == 150
        assert lim.get_current_usage()[0].get_value() == 76

        lim = cls.limits['Event Subscriptions']
        assert lim.api_limit == 21
        assert lim.get_current_usage()[0].get_value() == 1

        lim = cls.limits['Subnet Groups']
        assert lim.api_limit == 202
        assert lim.get_current_usage()[0].get_value() == 89

        lim = cls.limits['Option Groups']
        assert lim.api_limit == 22
        assert lim.get_current_usage()[0].get_value() == 2

        lim = cls.limits['Subnets per Subnet Group']
        assert lim.api_limit == 23
        assert lim.get_current_usage() == usage_subnets

        lim = cls.limits['Read replicas per master']
        assert lim.api_limit == 5
        assert lim.get_current_usage() == usage_replicas

        lim = cls.limits['DB Clusters']
        assert lim.api_limit == 40
        assert lim.get_current_usage()[0].get_value() == 3

        lim = cls.limits['DB Cluster Parameter Groups']
        assert lim.api_limit == 51
        assert lim.get_current_usage()[0].get_value() == 6
コード例 #42
0
    def test_find_usage_subnet_groups(self):
        data = {
            "DescribeDBSubnetGroupsResponse": {
                "DescribeDBSubnetGroupsResult": {
                    "DBSubnetGroups": [
                        {
                            "DBSubnetGroupDescription":
                            "Subnet group for CloudFormation RDS instance",
                            "DBSubnetGroupName":
                            "SubnetGroup1",
                            "SubnetGroupStatus":
                            "Complete",
                            "Subnets": [{
                                "SubnetAvailabilityZone": {
                                    "Name": "us-east-1d",
                                    "ProvisionedIopsCapable": False
                                },
                                "SubnetIdentifier": "subnet-38e87861",
                                "SubnetStatus": "Active"
                            }, {
                                "SubnetAvailabilityZone": {
                                    "Name": "us-east-1a",
                                    "ProvisionedIopsCapable": False
                                },
                                "SubnetIdentifier": "subnet-4f027f38",
                                "SubnetStatus": "Active"
                            }],
                            "VpcId":
                            "vpc-1ee8937b"
                        },
                        {
                            "DBSubnetGroupDescription":
                            "Created from the RDS Management Console",
                            "DBSubnetGroupName":
                            "default",
                            "SubnetGroupStatus":
                            "Complete",
                            "Subnets": [{
                                "SubnetAvailabilityZone": {
                                    "Name": "us-east-1e",
                                    "ProvisionedIopsCapable": False
                                },
                                "SubnetIdentifier": "subnet-49071f61",
                                "SubnetStatus": "Active"
                            }, {
                                "SubnetAvailabilityZone": {
                                    "Name": "us-east-1a",
                                    "ProvisionedIopsCapable": False
                                },
                                "SubnetIdentifier": "subnet-6fe23c18",
                                "SubnetStatus": "Active"
                            }, {
                                "SubnetAvailabilityZone": {
                                    "Name": "us-east-1d",
                                    "ProvisionedIopsCapable": False
                                },
                                "SubnetIdentifier": "subnet-a9b54df0",
                                "SubnetStatus": "Active"
                            }],
                            "VpcId":
                            "vpc-c300b9a6"
                        },
                        {
                            "DBSubnetGroupDescription":
                            "Subnet group for CloudFormation RDS instance",
                            "DBSubnetGroupName":
                            "SubnetGroup2",
                            "SubnetGroupStatus":
                            "Complete",
                            "Subnets": [{
                                "SubnetAvailabilityZone": {
                                    "Name": "us-east-1a",
                                    "ProvisionedIopsCapable": False
                                },
                                "SubnetIdentifier": "subnet-0b037e7c",
                                "SubnetStatus": "Active"
                            }],
                            "VpcId":
                            "vpc-73ec9716"
                        },
                    ],
                    "Marker":
                    None
                },
                "ResponseMetadata": {
                    "RequestId": "7cd7ed68-2499-11e5-ad44-cdf98c606d42"
                }
            }
        }

        mock_conn = Mock(spec_set=RDSConnection)
        cls = _RDSService(21, 43)
        cls.conn = mock_conn

        with patch('%s.boto_query_wrapper' % self.pbm) as mock_wrapper:
            mock_wrapper.return_value = data
            cls._find_usage_subnet_groups()

        assert mock_conn.mock_calls == []
        assert mock_wrapper.mock_calls == [
            call(mock_conn.describe_db_subnet_groups,
                 alc_marker_path=[
                     "DescribeDBSubnetGroupsResponse",
                     "DescribeDBSubnetGroupsResult", "Marker"
                 ],
                 alc_data_path=[
                     "DescribeDBSubnetGroupsResponse",
                     "DescribeDBSubnetGroupsResult", "DBSubnetGroups"
                 ],
                 alc_marker_param='marker')
        ]

        usage = sorted(cls.limits['Subnet Groups'].get_current_usage())
        assert len(usage) == 1
        assert usage[0].get_value() == 3
        assert usage[0].aws_type == 'AWS::RDS::DBSubnetGroup'
        usage = sorted(
            cls.limits['Subnets per Subnet Group'].get_current_usage())
        assert len(usage) == 3
        assert usage[0].get_value() == 1
        assert usage[0].aws_type == 'AWS::RDS::DBSubnetGroup'
        assert usage[0].resource_id == "SubnetGroup2"
        assert usage[1].get_value() == 2
        assert usage[1].aws_type == 'AWS::RDS::DBSubnetGroup'
        assert usage[1].resource_id == "SubnetGroup1"
        assert usage[2].get_value() == 3
        assert usage[2].aws_type == 'AWS::RDS::DBSubnetGroup'
        assert usage[2].resource_id == "default"
コード例 #43
0
    def test_find_usage_option_groups(self):
        data = {
            "DescribeOptionGroupsResponse": {
                "DescribeOptionGroupsResult": {
                    "Marker":
                    None,
                    "OptionGroupsList": [{
                        "AllowsVpcAndNonVpcInstanceMemberships":
                        True,
                        "EngineName":
                        "mysql",
                        "MajorEngineVersion":
                        "5.6",
                        "OptionGroupDescription":
                        "Default option group for mysql 5.6",
                        "OptionGroupName":
                        "default:mysql-5-6",
                        "Options": [],
                        "VpcId":
                        None
                    }, {
                        "AllowsVpcAndNonVpcInstanceMemberships":
                        True,
                        "EngineName":
                        "postgres",
                        "MajorEngineVersion":
                        "9.3",
                        "OptionGroupDescription":
                        "Default option group for postgres 9.3",
                        "OptionGroupName":
                        "default:postgres-9-3",
                        "Options": [],
                        "VpcId":
                        None
                    }]
                },
                "ResponseMetadata": {
                    "RequestId": "8725ddc9-2499-11e5-9ed1-d5a3270e57f9"
                }
            }
        }

        mock_conn = Mock(spec_set=RDSConnection)
        cls = _RDSService(21, 43)
        cls.conn = mock_conn

        with patch('%s.boto_query_wrapper' % self.pbm) as mock_wrapper:
            mock_wrapper.return_value = data
            cls._find_usage_option_groups()

        assert mock_conn.mock_calls == []
        assert mock_wrapper.mock_calls == [
            call(mock_conn.describe_option_groups,
                 alc_marker_path=[
                     "DescribeOptionGroupsResponse",
                     "DescribeOptionGroupsResult", "Marker"
                 ],
                 alc_data_path=[
                     "DescribeOptionGroupsResponse",
                     "DescribeOptionGroupsResult", "OptionGroupsList"
                 ],
                 alc_marker_param='marker')
        ]

        usage = sorted(cls.limits['Option Groups'].get_current_usage())
        assert len(usage) == 1
        assert usage[0].get_value() == 2
        assert usage[0].aws_type == 'AWS::RDS::DBOptionGroup'
コード例 #44
0
    def test_find_usage_security_groups(self):
        data = {
            "DescribeDBSecurityGroupsResponse": {
                "DescribeDBSecurityGroupsResult": {
                    "DBSecurityGroups": [{
                        "DBSecurityGroupDescription":
                        "Frontend Access",
                        "DBSecurityGroupName":
                        "SecurityGroup1",
                        "EC2SecurityGroups": [{
                            "EC2SecurityGroupId": "sg-c6dd95a2",
                            "EC2SecurityGroupName": "EC2SG1",
                            "EC2SecurityGroupOwnerId": None,
                            "Status": "authorized"
                        }],
                        "IPRanges": [],
                        "OwnerId":
                        "123456789012",
                        "VpcId":
                        None
                    }, {
                        "DBSecurityGroupDescription": "default:vpc-a926c2cc",
                        "DBSecurityGroupName": "default:vpc-a926c2cc",
                        "EC2SecurityGroups": [],
                        "IPRanges": [],
                        "OwnerId": "123456789012",
                        "VpcId": "vpc-a926c2cc"
                    }, {
                        "DBSecurityGroupDescription":
                        "Frontend Access",
                        "DBSecurityGroupName":
                        "SecurityGroup2",
                        "EC2SecurityGroups": [
                            {
                                "EC2SecurityGroupId": "sg-aaaaaaaa",
                                "EC2SecurityGroupName": "SGName-aaaaaaaa",
                                "EC2SecurityGroupOwnerId": None,
                                "Status": "authorized"
                            },
                            {
                                "EC2SecurityGroupId": "sg-bbbbbbbb",
                                "EC2SecurityGroupName": "SGName-bbbbbbbb",
                                "EC2SecurityGroupOwnerId": None,
                                "Status": "authorized"
                            },
                            {
                                "EC2SecurityGroupId": "sg-cccccccc",
                                "EC2SecurityGroupName": "SGName-cccccccc",
                                "EC2SecurityGroupOwnerId": None,
                                "Status": "authorized"
                            },
                        ],
                        "IPRanges": [],
                        "OwnerId":
                        "123456789012",
                        "VpcId":
                        "vpc-73ec9716"
                    }, {
                        'VpcId':
                        None,
                        'DBSecurityGroupDescription':
                        'awslimitchecker test',
                        'IPRanges': [{
                            'Status': 'authorized',
                            'CIDRIP': '76.122.124.15/32'
                        }, {
                            'Status': 'authorized',
                            'CIDRIP': '66.6.152.59/32'
                        }],
                        'OwnerId':
                        '123456789012',
                        'EC2SecurityGroups': [],
                        'DBSecurityGroupName':
                        'alctest'
                    }],
                    "Marker":
                    None
                },
                "ResponseMetadata": {
                    "RequestId": "9c78d95d-2499-11e5-9456-735a7f5001de"
                }
            }
        }

        mock_conn = Mock(spec_set=RDSConnection)
        cls = _RDSService(21, 43)
        cls.conn = mock_conn

        with patch('%s.boto_query_wrapper' % self.pbm) as mock_wrapper:
            mock_wrapper.return_value = data
            cls._find_usage_security_groups()

        assert mock_conn.mock_calls == []
        assert mock_wrapper.mock_calls == [
            call(mock_conn.describe_db_security_groups,
                 alc_marker_path=[
                     "DescribeDBSecurityGroupsResponse",
                     "DescribeDBSecurityGroupsResult", "Marker"
                 ],
                 alc_data_path=[
                     "DescribeDBSecurityGroupsResponse",
                     "DescribeDBSecurityGroupsResult", "DBSecurityGroups"
                 ],
                 alc_marker_param='marker')
        ]

        usage = sorted(cls.limits['DB security groups'].get_current_usage())
        assert len(usage) == 1
        assert usage[0].get_value() == 2
        assert usage[0].aws_type == 'AWS::RDS::DBSecurityGroup'

        usage = sorted(cls.limits['VPC Security Groups'].get_current_usage())
        assert len(usage) == 1
        assert usage[0].get_value() == 2
        assert usage[0].aws_type == 'AWS::RDS::DBSecurityGroup'

        usage = sorted(
            cls.limits['Max auths per security group'].get_current_usage())
        assert len(usage) == 4
        assert usage[0].get_value() == 0
        assert usage[0].resource_id == 'default:vpc-a926c2cc'
        assert usage[0].aws_type == 'AWS::RDS::DBSecurityGroup'
        assert usage[1].get_value() == 1
        assert usage[1].resource_id == 'SecurityGroup1'
        assert usage[1].aws_type == 'AWS::RDS::DBSecurityGroup'
        assert usage[2].get_value() == 2
        assert usage[2].resource_id == 'alctest'
        assert usage[2].aws_type == 'AWS::RDS::DBSecurityGroup'
        assert usage[3].get_value() == 3
        assert usage[3].resource_id == 'SecurityGroup2'
        assert usage[3].aws_type == 'AWS::RDS::DBSecurityGroup'
コード例 #45
0
ファイル: test_rds.py プロジェクト: pdecat/awslimitchecker
    def test_find_usage_security_groups(self):
        data = {
            "DescribeDBSecurityGroupsResponse": {
                "DescribeDBSecurityGroupsResult": {
                    "DBSecurityGroups": [
                        {
                            "DBSecurityGroupDescription": "Frontend Access",
                            "DBSecurityGroupName":
                                "SecurityGroup1",
                            "EC2SecurityGroups": [
                                {
                                    "EC2SecurityGroupId": "sg-c6dd95a2",
                                    "EC2SecurityGroupName":
                                        "EC2SG1",
                                    "EC2SecurityGroupOwnerId": None,
                                    "Status": "authorized"
                                }
                            ],
                            "IPRanges": [],
                            "OwnerId": "123456789012",
                            "VpcId": None
                        },
                        {
                            "DBSecurityGroupDescription":
                                "default:vpc-a926c2cc",
                            "DBSecurityGroupName": "default:vpc-a926c2cc",
                            "EC2SecurityGroups": [],
                            "IPRanges": [],
                            "OwnerId": "123456789012",
                            "VpcId": "vpc-a926c2cc"
                        },
                        {
                            "DBSecurityGroupDescription": "Frontend Access",
                            "DBSecurityGroupName": "SecurityGroup2",
                            "EC2SecurityGroups": [
                                {
                                    "EC2SecurityGroupId": "sg-aaaaaaaa",
                                    "EC2SecurityGroupName": "SGName-aaaaaaaa",
                                    "EC2SecurityGroupOwnerId": None,
                                    "Status": "authorized"
                                },
                                {
                                    "EC2SecurityGroupId": "sg-bbbbbbbb",
                                    "EC2SecurityGroupName": "SGName-bbbbbbbb",
                                    "EC2SecurityGroupOwnerId": None,
                                    "Status": "authorized"
                                },
                                {
                                    "EC2SecurityGroupId": "sg-cccccccc",
                                    "EC2SecurityGroupName": "SGName-cccccccc",
                                    "EC2SecurityGroupOwnerId": None,
                                    "Status": "authorized"
                                },
                            ],
                            "IPRanges": [],
                            "OwnerId": "123456789012",
                            "VpcId": "vpc-73ec9716"
                        },
                        {
                            'VpcId': None,
                            'DBSecurityGroupDescription':
                                'awslimitchecker test',
                            'IPRanges': [
                                {
                                    'Status': 'authorized',
                                    'CIDRIP': '76.122.124.15/32'
                                },
                                {
                                    'Status': 'authorized',
                                    'CIDRIP': '66.6.152.59/32'
                                }
                            ],
                            'OwnerId': '123456789012',
                            'EC2SecurityGroups': [],
                            'DBSecurityGroupName': 'alctest'
                        }
                    ],
                    "Marker": None
                },
                "ResponseMetadata": {
                    "RequestId": "9c78d95d-2499-11e5-9456-735a7f5001de"
                }
            }
        }

        mock_conn = Mock(spec_set=RDSConnection)
        cls = _RDSService(21, 43)
        cls.conn = mock_conn

        with patch('%s.boto_query_wrapper' % self.pbm) as mock_wrapper:
            mock_wrapper.return_value = data
            cls._find_usage_security_groups()

        assert mock_conn.mock_calls == []
        assert mock_wrapper.mock_calls == [
            call(
                mock_conn.describe_db_security_groups,
                alc_marker_path=[
                    "DescribeDBSecurityGroupsResponse",
                    "DescribeDBSecurityGroupsResult",
                    "Marker"
                ],
                alc_data_path=[
                    "DescribeDBSecurityGroupsResponse",
                    "DescribeDBSecurityGroupsResult",
                    "DBSecurityGroups"
                ],
                alc_marker_param='marker'
            )
        ]

        usage = sorted(cls.limits['DB security groups'].get_current_usage())
        assert len(usage) == 1
        assert usage[0].get_value() == 2
        assert usage[0].aws_type == 'AWS::RDS::DBSecurityGroup'

        usage = sorted(cls.limits['VPC Security Groups'].get_current_usage())
        assert len(usage) == 1
        assert usage[0].get_value() == 2
        assert usage[0].aws_type == 'AWS::RDS::DBSecurityGroup'

        usage = sorted(cls.limits[
                           'Max auths per security group'].get_current_usage())
        assert len(usage) == 4
        assert usage[0].get_value() == 0
        assert usage[0].resource_id == 'default:vpc-a926c2cc'
        assert usage[0].aws_type == 'AWS::RDS::DBSecurityGroup'
        assert usage[1].get_value() == 1
        assert usage[1].resource_id == 'SecurityGroup1'
        assert usage[1].aws_type == 'AWS::RDS::DBSecurityGroup'
        assert usage[2].get_value() == 2
        assert usage[2].resource_id == 'alctest'
        assert usage[2].aws_type == 'AWS::RDS::DBSecurityGroup'
        assert usage[3].get_value() == 3
        assert usage[3].resource_id == 'SecurityGroup2'
        assert usage[3].aws_type == 'AWS::RDS::DBSecurityGroup'
コード例 #46
0
ファイル: test_rds.py プロジェクト: pdecat/awslimitchecker
    def test_find_usage_instances(self):
        mock_conn = Mock(spec_set=RDSConnection)
        cls = _RDSService(21, 43)
        cls.conn = mock_conn
        instances = [
            {
                'PubliclyAccessible': False,
                'MasterUsername': '******',
                'LicenseModel': 'general-public-license',
                'VpcSecurityGroups': [
                    {
                        'Status': 'active',
                        'VpcSecurityGroupId': 'sg-aaaaaaaa'
                    }
                ],
                'InstanceCreateTime': 1429910904.366,
                'OptionGroupMemberships': [
                    {
                        'Status': 'in-sync',
                        'OptionGroupName': 'default:mysql-5-6'
                    }
                ],
                'PendingModifiedValues': {
                    'MultiAZ': None,
                    'MasterUserPassword': None,
                    'Port': None,
                    'Iops': None,
                    'AllocatedStorage': None,
                    'EngineVersion': None,
                    'BackupRetentionPeriod': None,
                    'DBInstanceClass': None,
                    'DBInstanceIdentifier': None
                },
                'Engine': 'mysql',
                'MultiAZ': True,
                'LatestRestorableTime': 1435966800.0,
                'DBSecurityGroups': [
                    {
                        'Status': 'active',
                        'DBSecurityGroupName': 'mydb-dbsecuritygroup-aaaa'
                    }
                ],
                'DBParameterGroups': [
                    {
                        'DBParameterGroupName': 'default.mysql5.6',
                        'ParameterApplyStatus': 'in-sync'
                    }
                ],
                'ReadReplicaSourceDBInstanceIdentifier': None,
                'AutoMinorVersionUpgrade': True,
                'PreferredBackupWindow': '07:00-08:00',
                'DBSubnetGroup': {
                    'VpcId': 'vpc-abcdef01',
                    'Subnets': [
                        {
                            'SubnetStatus': 'Active',
                            'SubnetIdentifier': 'subnet-aaaaaaaa',
                            'SubnetAvailabilityZone': {
                                'Name': 'us-east-1d',
                                'ProvisionedIopsCapable': False
                            }
                        },
                        {
                            'SubnetStatus': 'Active',
                            'SubnetIdentifier': 'subnet-22222222',
                            'SubnetAvailabilityZone': {
                                'Name': 'us-east-1a',
                                'ProvisionedIopsCapable': False
                            }
                        }
                    ],
                    'DBSubnetGroupName': 'mydb-dbsubnetgroup-abcd',
                    'SubnetGroupStatus': 'Complete',
                    'DBSubnetGroupDescription': 'Subnet group for RDS instance'
                },
                'SecondaryAvailabilityZone': 'us-east-1a',
                'ReadReplicaDBInstanceIdentifiers': [],
                'AllocatedStorage': 200,
                'BackupRetentionPeriod': 7,
                'DBName': 'wordpress',
                'PreferredMaintenanceWindow': 'tue:08:00-tue:09:00',
                'Endpoint': {
                    'Port': 3306,
                    'Address': 'foo.bar.us-east-1.rds.amazonaws.com'
                },
                'DBInstanceStatus': 'available',
                'StatusInfos': None,
                'EngineVersion': '5.6.22',
                'CharacterSetName': None,
                'AvailabilityZone': 'us-east-1d',
                'Iops': None,
                'DBInstanceClass': 'db.t2.small',
                'DBInstanceIdentifier': 'foo'
            },
            {
                'PubliclyAccessible': False,
                'MasterUsername': '******',
                'LicenseModel': 'postgresql-license',
                'VpcSecurityGroups': [
                    {
                        'Status': 'active',
                        'VpcSecurityGroupId': 'sg-12345678'
                    }
                ],
                'InstanceCreateTime': 1432238504.239,
                'OptionGroupMemberships': [
                    {
                        'Status': 'in-sync',
                        'OptionGroupName': 'default:postgres-9-3'
                    }
                ],
                'PendingModifiedValues': {
                    'MultiAZ': None,
                    'MasterUserPassword': None,
                    'Port': None,
                    'Iops': None,
                    'AllocatedStorage': None,
                    'EngineVersion': None,
                    'BackupRetentionPeriod': None,
                    'DBInstanceClass': None,
                    'DBInstanceIdentifier': None
                },
                'Engine': 'postgres',
                'MultiAZ': False,
                'LatestRestorableTime': 1435966550.0,
                'DBSecurityGroups': [
                    {
                        'Status': 'active',
                        'DBSecurityGroupName': 'sg1234-dbsecuritygroup-abcd'
                    }
                ],
                'DBParameterGroups': [
                    {
                        'DBParameterGroupName': 'default.postgres9.3',
                        'ParameterApplyStatus': 'in-sync'
                    }
                ],
                'ReadReplicaSourceDBInstanceIdentifier': None,
                'AutoMinorVersionUpgrade': True,
                'PreferredBackupWindow': '03:09-03:39',
                'DBSubnetGroup': {
                    'VpcId': 'vpc-87654321',
                    'Subnets': [
                        {
                            'SubnetStatus': 'Active',
                            'SubnetIdentifier': 'subnet-a1234567',
                            'SubnetAvailabilityZone': {
                                'Name': 'us-east-1e',
                                'ProvisionedIopsCapable': False
                            }
                        },
                        {
                            'SubnetStatus': 'Active',
                            'SubnetIdentifier': 'subnet-b1234567',
                            'SubnetAvailabilityZone': {
                                'Name': 'us-east-1a',
                                'ProvisionedIopsCapable': False
                            }
                        },
                        {
                            'SubnetStatus': 'Active',
                            'SubnetIdentifier': 'subnet-c1234567',
                            'SubnetAvailabilityZone': {
                                'Name': 'us-east-1d',
                                'ProvisionedIopsCapable': False
                            }
                        }
                    ],
                    'DBSubnetGroupName': 'mydb-dbsubnetgroup-abcdef',
                    'SubnetGroupStatus': 'Complete',
                    'DBSubnetGroupDescription': 'Subnet group for RDS instance'
                },
                'SecondaryAvailabilityZone': None,
                'ReadReplicaDBInstanceIdentifiers': ['db-123', 'db-456'],
                'AllocatedStorage': 50,
                'BackupRetentionPeriod': 1,
                'DBName': 'mydbname',
                'PreferredMaintenanceWindow': 'mon:05:11-mon:05:41',
                'Endpoint': {
                    'Port': 5432,
                    'Address': 'baz.blam.us-east-1.rds.amazonaws.com'
                },
                'DBInstanceStatus': 'available',
                'StatusInfos': None,
                'EngineVersion': '9.3.6',
                'CharacterSetName': None,
                'AvailabilityZone': 'us-east-1a',
                'Iops': None,
                'DBInstanceClass': 'db.t2.small',
                'DBInstanceIdentifier': 'baz'
            }
        ]
        return_value = {
            'DescribeDBInstancesResponse': {
                'DescribeDBInstancesResult': {
                    'DBInstances': instances
                }
            }
        }

        with patch('%s.boto_query_wrapper' % self.pbm) as mock_wrapper:
            mock_wrapper.return_value = return_value
            cls._find_usage_instances()

        assert mock_conn.mock_calls == []
        assert mock_wrapper.mock_calls == [
            call(
                mock_conn.describe_db_instances,
                alc_marker_path=[
                    'DescribeDBInstancesResponse',
                    'DescribeDBInstancesResult',
                    'Marker'
                ],
                alc_data_path=[
                    'DescribeDBInstancesResponse',
                    'DescribeDBInstancesResult',
                    'DBInstances'
                ],
                alc_marker_param='marker'
            )
        ]

        usage = sorted(cls.limits['DB instances'].get_current_usage())
        assert len(usage) == 1
        assert usage[0].get_value() == 2
        assert usage[0].aws_type == 'AWS::RDS::DBInstance'

        usage = sorted(cls.limits['Storage quota (GB)'].get_current_usage())
        assert len(usage) == 1
        assert usage[0].get_value() == 250
        assert usage[0].aws_type == 'AWS::RDS::DBInstance'

        usage = sorted(
            cls.limits['Read replicas per master'].get_current_usage()
        )
        assert len(usage) == 2
        assert usage[0].get_value() == 0
        assert usage[0].resource_id == 'foo'
        assert usage[1].get_value() == 2
        assert usage[1].resource_id == 'baz'
コード例 #47
0
ファイル: test_rds.py プロジェクト: pdecat/awslimitchecker
    def test_find_usage_snapshots(self):
        data = {
            "DescribeDBSnapshotsResponse": {
                "DescribeDBSnapshotsResult": {
                    "DBSnapshots": [
                        {
                            "AllocatedStorage": 100,
                            "AvailabilityZone": "us-east-1a",
                            "DBInstanceIdentifier": "foo-db",
                            "DBSnapshotIdentifier": "foo-db-final-snapshot",
                            "Engine": "postgres",
                            "EngineVersion": "9.3.3",
                            "InstanceCreateTime": 1408035263.101,
                            "Iops": 1000,
                            "LicenseModel": "postgresql-license",
                            "MasterUsername": "******",
                            "OptionGroupName": "default:postgres-9-3",
                            "PercentProgress": 100,
                            "Port": 5432,
                            "SnapshotCreateTime": 1408454469.536,
                            "SnapshotType": "manual",
                            "SourceRegion": None,
                            "Status": "available",
                            "VpcId": None
                        },
                        {
                            "AllocatedStorage": 50,
                            "AvailabilityZone": "us-east-1d",
                            "DBInstanceIdentifier": "bd1t3lf90p3lqdx",
                            "DBSnapshotIdentifier":
                                "rds:bd1t3lf90p3lqdx-2015-06-29-07-02",
                            "Engine": "mysql",
                            "EngineVersion": "5.6.22",
                            "InstanceCreateTime": 1429910904.366,
                            "Iops": None,
                            "LicenseModel": "general-public-license",
                            "MasterUsername": "******",
                            "OptionGroupName": "default:mysql-5-6",
                            "PercentProgress": 100,
                            "Port": 3306,
                            "SnapshotCreateTime": 1435561349.441,
                            "SnapshotType": "automated",
                            "SourceRegion": None,
                            "Status": "available",
                            "VpcId": "vpc-1ee8937b"
                        },
                        {
                            "AllocatedStorage": 25,
                            "AvailabilityZone": "us-east-1d",
                            "DBInstanceIdentifier": "md1e8qwtegkjdgy",
                            "DBSnapshotIdentifier":
                                "rds:md1e8qwtegkjdgy-2015-06-29-07-06",
                            "Engine": "postgres",
                            "EngineVersion": "9.3.6",
                            "InstanceCreateTime": 1433883813.314,
                            "Iops": None,
                            "LicenseModel": "postgresql-license",
                            "MasterUsername": "******",
                            "OptionGroupName": "default:postgres-9-3",
                            "PercentProgress": 100,
                            "Port": 5432,
                            "SnapshotCreateTime": 1435561593.669,
                            "SnapshotType": "automated",
                            "SourceRegion": None,
                            "Status": "available",
                            "VpcId": "vpc-1ee8937b"
                        },
                    ],
                    "Marker":
                        "YXJuOmF3czpyZHM6dXMtZWFzdC0xOjkzNDQ0NjIwOTU0MTpzbm"
                        "Fwc2hvdDpyZHM6bWQxZThxd3RlZ2tqZGd5LTIwMTUtMDctMDEt"
                        "MDctMDc="
                },
                "ResponseMetadata": {
                    "RequestId": "5fe976b3-2499-11e5-ad5a-1fed04d9fd3d"
                }
            }
        }

        mock_conn = Mock(spec_set=RDSConnection)
        cls = _RDSService(21, 43)
        cls.conn = mock_conn

        with patch('%s.boto_query_wrapper' % self.pbm) as mock_wrapper:
            mock_wrapper.return_value = data
            cls._find_usage_snapshots()

        assert mock_conn.mock_calls == []
        assert mock_wrapper.mock_calls == [
            call(
                mock_conn.describe_db_snapshots,
                alc_marker_path=[
                    "DescribeDBSnapshotsResponse",
                    "DescribeDBSnapshotsResult",
                    'Marker'
                ],
                alc_data_path=[
                    "DescribeDBSnapshotsResponse",
                    "DescribeDBSnapshotsResult",
                    "DBSnapshots"
                ],
                alc_marker_param='marker'
            )
        ]

        usage = sorted(cls.limits['DB snapshots per user'].get_current_usage())
        assert len(usage) == 1
        assert usage[0].get_value() == 1
        assert usage[0].aws_type == 'AWS::RDS::DBSnapshot'
コード例 #48
0
ファイル: test_rds.py プロジェクト: pdecat/awslimitchecker
    def test_find_usage_subnet_groups(self):
        data = {
            "DescribeDBSubnetGroupsResponse": {
                "DescribeDBSubnetGroupsResult": {
                    "DBSubnetGroups": [
                        {
                            "DBSubnetGroupDescription":
                                "Subnet group for CloudFormation RDS instance",
                            "DBSubnetGroupName":
                                "SubnetGroup1",
                            "SubnetGroupStatus": "Complete",
                            "Subnets": [
                                {
                                    "SubnetAvailabilityZone": {
                                        "Name": "us-east-1d",
                                        "ProvisionedIopsCapable": False
                                    },
                                    "SubnetIdentifier": "subnet-38e87861",
                                    "SubnetStatus": "Active"
                                },
                                {
                                    "SubnetAvailabilityZone": {
                                        "Name": "us-east-1a",
                                        "ProvisionedIopsCapable": False
                                    },
                                    "SubnetIdentifier": "subnet-4f027f38",
                                    "SubnetStatus": "Active"
                                }
                            ],
                            "VpcId": "vpc-1ee8937b"
                        },
                        {
                            "DBSubnetGroupDescription":
                                "Created from the RDS Management Console",
                            "DBSubnetGroupName": "default",
                            "SubnetGroupStatus": "Complete",
                            "Subnets": [
                                {
                                    "SubnetAvailabilityZone": {
                                        "Name": "us-east-1e",
                                        "ProvisionedIopsCapable": False
                                    },
                                    "SubnetIdentifier": "subnet-49071f61",
                                    "SubnetStatus": "Active"
                                },
                                {
                                    "SubnetAvailabilityZone": {
                                        "Name": "us-east-1a",
                                        "ProvisionedIopsCapable": False
                                    },
                                    "SubnetIdentifier": "subnet-6fe23c18",
                                    "SubnetStatus": "Active"
                                },
                                {
                                    "SubnetAvailabilityZone": {
                                        "Name": "us-east-1d",
                                        "ProvisionedIopsCapable": False
                                    },
                                    "SubnetIdentifier": "subnet-a9b54df0",
                                    "SubnetStatus": "Active"
                                }
                            ],
                            "VpcId": "vpc-c300b9a6"
                        },
                        {
                            "DBSubnetGroupDescription":
                                "Subnet group for CloudFormation RDS instance",
                            "DBSubnetGroupName":
                                "SubnetGroup2",
                            "SubnetGroupStatus": "Complete",
                            "Subnets": [
                                {
                                    "SubnetAvailabilityZone": {
                                        "Name": "us-east-1a",
                                        "ProvisionedIopsCapable": False
                                    },
                                    "SubnetIdentifier": "subnet-0b037e7c",
                                    "SubnetStatus": "Active"
                                }
                            ],
                            "VpcId": "vpc-73ec9716"
                        },
                    ],
                    "Marker": None
                },
                "ResponseMetadata": {
                    "RequestId": "7cd7ed68-2499-11e5-ad44-cdf98c606d42"
                }
            }
        }

        mock_conn = Mock(spec_set=RDSConnection)
        cls = _RDSService(21, 43)
        cls.conn = mock_conn

        with patch('%s.boto_query_wrapper' % self.pbm) as mock_wrapper:
            mock_wrapper.return_value = data
            cls._find_usage_subnet_groups()

        assert mock_conn.mock_calls == []
        assert mock_wrapper.mock_calls == [
            call(
                mock_conn.describe_db_subnet_groups,
                alc_marker_path=[
                    "DescribeDBSubnetGroupsResponse",
                    "DescribeDBSubnetGroupsResult",
                    "Marker"
                ],
                alc_data_path=[
                    "DescribeDBSubnetGroupsResponse",
                    "DescribeDBSubnetGroupsResult",
                    "DBSubnetGroups"
                ],
                alc_marker_param='marker'
            )
        ]

        usage = sorted(cls.limits['Subnet Groups'].get_current_usage())
        assert len(usage) == 1
        assert usage[0].get_value() == 3
        assert usage[0].aws_type == 'AWS::RDS::DBSubnetGroup'
        usage = sorted(
            cls.limits['Subnets per Subnet Group'].get_current_usage()
        )
        assert len(usage) == 3
        assert usage[0].get_value() == 1
        assert usage[0].aws_type == 'AWS::RDS::DBSubnetGroup'
        assert usage[0].resource_id == "SubnetGroup2"
        assert usage[1].get_value() == 2
        assert usage[1].aws_type == 'AWS::RDS::DBSubnetGroup'
        assert usage[1].resource_id == "SubnetGroup1"
        assert usage[2].get_value() == 3
        assert usage[2].aws_type == 'AWS::RDS::DBSubnetGroup'
        assert usage[2].resource_id == "default"