def test_kumo_utils_ensure_ebs_tags(cleanup_stack_ec2, awsclient): are_credentials_still_valid(awsclient) cloudformation_ec2, _ = load_cloudformation_template( here('resources/sample_ec2_cloudformation_stack/cloudformation.py') ) exit_code = deploy_stack(awsclient, {}, config_ec2, cloudformation_ec2, override_stack_policy=False) assert exit_code == 0 stack_name = _get_stack_name(config_ec2) stack_output = get_outputs_for_stack(awsclient, stack_name) instance_id = stack_output.get('InstanceId', None) assert instance_id is not None tags = [{'Key': 'kumo-test', 'Value': 'Success'}] ensure_ebs_volume_tags_ec2_instance(awsclient, instance_id, tags) client_ec2 = awsclient.get_client('ec2') volumes = client_ec2.describe_volumes(Filters=[ { 'Name': 'attachment.instance-id', 'Values': [instance_id] } ]) for vol in volumes['Volumes']: for tag in tags: assert check_volume_tagged(vol, tag)
def test_ec2_instance_stop_start(awsclient, simple_cloudformation_stack_with_ec2): def _get_instance_status(ec2_instance): # helper to check the status client_ec2 = awsclient.get_client('ec2') instances_status = all_pages( client_ec2.describe_instance_status, { 'InstanceIds': [ec2_instance], 'IncludeAllInstances': True }, lambda r: [i['InstanceState']['Name'] for i in r.get('InstanceStatuses', [])], )[0] return instances_status stack_name = _get_stack_name(config_ec2_stack) client_cfn = awsclient.get_client('cloudformation') resources = all_pages( client_cfn.list_stack_resources, { 'StackName': stack_name }, lambda r: r['StackResourceSummaries'] ) instances = [ r['PhysicalResourceId'] for r in resources if r['ResourceType'] == 'AWS::EC2::Instance' ] assert _get_instance_status(instances[0]) == 'running' _stop_ec2_instances(awsclient, instances, wait=True) assert _get_instance_status(instances[0]) == 'stopped' _start_ec2_instances(awsclient, instances, wait=True) assert _get_instance_status(instances[0]) == 'running'
def test_kumo_utils_ensure_autoscaling_ebs_tags(cleanup_stack_autoscaling, awsclient): are_credentials_still_valid(awsclient) cloudformation_autoscaling, _ = load_cloudformation_template( here('resources/sample_autoscaling_cloudformation_stack/cloudformation.py') ) exit_code = deploy_stack(awsclient, {}, config_autoscaling, cloudformation_autoscaling, override_stack_policy=False) assert exit_code == 0 stack_name = _get_stack_name(config_autoscaling) stack_output = get_outputs_for_stack(awsclient, stack_name) as_group_name = stack_output.get('AutoScalingGroupName', None) assert as_group_name is not None tags_v1 = [{'Key': 'kumo-test', 'Value': 'version1'}] ensure_ebs_volume_tags_autoscaling_group(awsclient, as_group_name, tags_v1) autoscale_filter = { 'Name': 'tag:aws:autoscaling:groupName', 'Values': [as_group_name] } client_ec2 = awsclient.get_client('ec2') response = client_ec2.describe_instances(Filters=[autoscale_filter]) for r in response['Reservations']: for i in r['Instances']: volumes = client_ec2.describe_volumes(Filters=[ { 'Name': 'attachment.instance-id', 'Values': [i['InstanceId']] } ]) for vol in volumes['Volumes']: for tag in tags_v1: assert check_volume_tagged(vol, tag) tags_v2 = [{'Key': 'kumo-test', 'Value': 'version2'}] ensure_ebs_volume_tags_autoscaling_group(awsclient, as_group_name, tags_v2) for r in response['Reservations']: for i in r['Instances']: volumes = client_ec2.describe_volumes(Filters=[ { 'Name': 'attachment.instance-id', 'Values': [i['InstanceId']] } ]) for vol in volumes['Volumes']: for tag in tags_v2: assert check_volume_tagged(vol, tag) for tag in tags_v1: assert not check_volume_tagged(vol, tag)
def test_describe_change_set_on_new_stack(awsclient): # create a stack we use for the test lifecycle cloudformation_simple_stack, _ = load_cloudformation_template( here('resources/simple_cloudformation_stack/cloudformation.py') ) change_set_name, stackname, change_set_type = \ create_change_set(awsclient, {}, config_simple_stack, cloudformation_simple_stack) assert stackname == _get_stack_name(config_simple_stack) assert change_set_name != '' assert change_set_type == 'CREATE' describe_change_set(awsclient, change_set_name, stackname) # clean up # even if we delete the change_Set we need to delete our stack which # is in state "REVIEW_IN_PROGRESS" awsclient.get_client('cloudformation').delete_stack( StackName=stackname, )
def test_kumo_stack_lifecycle(awsclient, simple_cloudformation_stack): cloudformation_simple_stack, _ = load_cloudformation_template( here('resources/simple_cloudformation_stack/cloudformation.py') ) # preview (with identical stack) # TODO: add more asserts! change_set_name, stackname, change_set_type = \ create_change_set(awsclient, {}, config_simple_stack, cloudformation_simple_stack) assert stackname == _get_stack_name(config_simple_stack) assert change_set_name != '' assert change_set_type == 'UPDATE' describe_change_set(awsclient, change_set_name, stackname) # update the stack changed = get_parameter_diff(awsclient, config_simple_stack) assert not changed exit_code = deploy_stack(awsclient, {}, config_simple_stack, cloudformation_simple_stack, override_stack_policy=False) assert exit_code == 0
def test_simple_cloudformation_stack(): # read the template template_path = here( 'resources/simple_cloudformation_stack/cloudformation.py') cloudformation, success = load_cloudformation_template(template_path) assert success config = { 'stack': { 'StackName': "infra-dev-kumo-sample-stack" }, 'parameters': { 'InstanceType': "t2.micro" } } expected_templ_file_name = '%s-generated-cf-template.json' % \ _get_stack_name(config) actual = write_template_to_file( config, generate_template({}, config, cloudformation)) assert actual == expected_templ_file_name
def test_update_stack_rolearn(awsclient, simple_cloudformation_stack, temp_cloudformation_policy, cleanup_roles): # create a stack we use for the test lifecycle cloudformation_simple_stack, _ = load_cloudformation_template( here('resources/simple_cloudformation_stack/cloudformation.py') ) # create role to use for cloudformation update role = create_role_helper( awsclient, 'unittest_%s_kumo' % utils.random_string(), policies=[ temp_cloudformation_policy, 'arn:aws:iam::aws:policy/AmazonS3FullAccess' ], principal_service=['cloudformation.amazonaws.com'] ) cleanup_roles.append(role['RoleName']) config_rolearn = deepcopy(config_simple_stack) config_rolearn['stack']['RoleARN'] = role['Arn'] change_set_name, stackname, change_set_type = \ create_change_set(awsclient, {}, config_rolearn, cloudformation_simple_stack) assert stackname == _get_stack_name(config_rolearn) assert change_set_name != '' assert change_set_type == 'UPDATE' describe_change_set(awsclient, change_set_name, stackname) # update the stack changed = get_parameter_diff(awsclient, config_rolearn) assert not changed exit_code = deploy_stack(awsclient, {}, config_rolearn, cloudformation_simple_stack, override_stack_policy=False) assert exit_code == 0
def test_s3_upload(cleanup_buckets, awsclient): #upload_conf = ConfigFactory.parse_file( # here('resources/simple_cloudformation_stack/settings_upload_dev.conf') #) upload_conf = { 'stack': { 'StackName': "infra-dev-kumo-sample-stack", 'artifactBucket': "unittest-kumo-artifact-bucket" }, 'parameters': { 'InstanceType': "t2.micro" } } region = awsclient.get_client('s3').meta.region_name account = os.getenv('ACCOUNT', None) # add account prefix to artifact bucket config if account: upload_conf['stack']['artifactBucket'] = \ '%s-unittest-kumo-artifact-bucket' % account artifact_bucket = _get_artifact_bucket(upload_conf) prepare_artifacts_bucket(awsclient, artifact_bucket) cleanup_buckets.append(artifact_bucket) dest_key = 'kumo/%s/%s-cloudformation.json' % (region, _get_stack_name(upload_conf)) expected_s3url = 'https://s3-%s.amazonaws.com/%s/%s' % (region, artifact_bucket, dest_key) cloudformation_simple_stack, _ = load_cloudformation_template( here('resources/simple_cloudformation_stack/cloudformation.py') ) actual_s3url = _s3_upload(awsclient, upload_conf, generate_template({}, upload_conf, cloudformation_simple_stack)) assert expected_s3url == actual_s3url
def test_create_update_stack_artifactbucket(awsclient, temp_cloudformation_policy, cleanup_roles, cleanup_buckets): # create a stack we use for the test lifecycle cloudformation_simple_stack, _ = load_cloudformation_template( here('resources/simple_cloudformation_stack/cloudformation.py') ) upload_conf = { 'stack': { 'StackName': "infra-dev-kumo-sample-stack", 'artifactBucket': "unittest-kumo-artifact-bucket" }, 'parameters': { 'InstanceType': "t2.micro", } } region = awsclient.get_client('s3').meta.region_name account = os.getenv('ACCOUNT', None) # add account prefix to artifact bucket config if account: upload_conf['stack']['artifactBucket'] = \ '%s-unittest-kumo-artifact-bucket' % account artifact_bucket = _get_artifact_bucket(upload_conf) prepare_artifacts_bucket(awsclient, artifact_bucket) cleanup_buckets.append(artifact_bucket) dest_key = 'kumo/%s/%s-cloudformation.json' % (region, _get_stack_name(upload_conf)) expected_s3url = 'https://s3-%s.amazonaws.com/%s/%s' % (region, artifact_bucket, dest_key) actual_s3url = _s3_upload(awsclient, upload_conf, generate_template({}, upload_conf, cloudformation_simple_stack)) assert expected_s3url == actual_s3url # create role to use for cloudformation update role = create_role_helper( awsclient, 'unittest_%s_kumo' % utils.random_string(), policies=[ temp_cloudformation_policy, 'arn:aws:iam::aws:policy/AWSCodeDeployReadOnlyAccess', 'arn:aws:iam::aws:policy/AmazonS3FullAccess' ], principal_service=['cloudformation.amazonaws.com'] ) cleanup_roles.append(role['RoleName']) # create exit_code = deploy_stack(awsclient, {}, upload_conf, cloudformation_simple_stack, override_stack_policy=False) assert exit_code == 0 stack_id = get_stack_id(awsclient, upload_conf['stack']['StackName']) wait_for_stack_create_complete(awsclient, stack_id) # update (as a change we add the RoleARN) upload_conf['stack']['RoleARN'] = role['Arn'] # update the stack changed = get_parameter_diff(awsclient, upload_conf) assert not changed exit_code = deploy_stack(awsclient, {}, upload_conf, cloudformation_simple_stack, override_stack_policy=False) assert exit_code == 0 wait_for_stack_update_complete(awsclient, stack_id) # cleanup exit_code = delete_stack(awsclient, upload_conf) assert exit_code == 0 wait_for_stack_delete_complete(awsclient, stack_id)