aws_transit_gateway_routes Resource
Use the aws_transit_gateway_routes
InSpec audit resource to test the properties of all Route for a AWS transit gateway route table.
To audit a single gateway route, use the aws_transit_gateway_route
(singular) resource.
Installation
This resource is available in the Chef InSpec AWS resource pack.
See the Chef InSpec documentation on cloud platforms for information on configuring your AWS environment for InSpec and creating an InSpec profile that uses the InSpec AWS resource pack.
Syntax
An aws_transit_gateway_routes
resource block collects a group of transit gateway routes' descriptions and tests that group.
describe aws_transit_gateway_route(transit_gateway_route_table_id: 'tgw-rtb-08acd74550c99e589')
it { should exist }
end
Parameters
To set the parameters of the AWS transit gateway route table, ID is required.
The following additional parameters are optional:
exact_match
longest_prefix_match
subnet_of_match
supernet_of_match
transit_gateway_route_table_id
(required)-
The ID of the AWS transit gateway route table:
-
- must contain alphanumeric characters between 1 to 50, or hyphens
- should start with
tgw-rtb-
- cannot end with a hyphen or contain two consecutive hyphens
-
The ID of the AWS transit gateway route table should be passed as a
transit_gateway_route_table_id: 'value'
key-value entry in a hash. exact_match
-
The exact match of the CIDR block is used for destination matches. It could be passed as a
exact_match: 'value'
key-value entry in a hash. longest_prefix_match
-
The longest prefix that matches the route. It could be passed as a
longest_prefix_match: 'value'
key-value entry in a hash. subnet_of_match
-
The routes with a subnet that match the specified CIDR filter. It could be passed as a
subnet_of_match: 'value'
key-value entry in a hash. supernet_of_match
-
The routes with a CIDR that encompass the CIDR filter. For example, if you have 10.0.1.0/29 and 10.0.1.0/31 routes in your route table and you specify supernet-of-match as 10.0.1.0/30, then the result returns 10.0.1.0/29. It could be passed as a
supernet_of_match: 'value'
key-value entry in a hash.
Properties
cidr_blocks
- All the CIDR blocks used for destination matches.
-
Field:
cidr_block
prefix_list_ids
- The IDs of the prefix list used for destination matches.
-
Field:
prefix_list_id
types
- The type of all routes. Valid values:
propagated
orstatic
. -
Field:
type
states
- The state of the routes. Valid values:
active
orblackhole
. -
Field:
state
static
- Boolean flag to determine whether the route type is static.
-
Field:
static
propagated
- Boolean flag to determine whether the route type is propagated.
-
Field:
propagated
active
- Boolean flag to determine whether the route state is active.
-
Field:
active
blackhole
- Boolean flag to determine whether the route state is blackhole.
-
Field:
blackhole
attachment_ids
- The id of the transit gateway attachment.
-
Field:
attachment_id
attachment_resource_ids
- The resource IDs of all the transit gateway attachments. Identifiers of relevant resource types.
-
Field:
attachment_resource_id
attachment_resource_types
- The attachment resource type. Valid values are
vpc
,vpn
,direct-connect-gateway
,peering
connect
. -
Field:
attachment_resource_type
attached_vpc_ids
- The VPC IDs of all the transit gateway attachments.
-
Field:
attached_vpc_id
Examples
Ensure that exactly three transit gateway routes exist.
describe aws_transit_gateway_route(transit_gateway_route_table_id: 'tgw-rtb-08acd74550c99e589') do
its('count') { should eq 3 }
end
Filter all transit gateway routes whose CIDR block matches 0.0.0.0/16
.
describe aws_transit_gateway_routes(transit_gateway_route_table_id: 'tgw-rtb-08acd74550c99e589', exact_match: '0.0.0.0/16') do
it { should exist }
end
describe aws_transit_gateway_routes(transit_gateway_route_table_id: 'tgw-rtb-08acd74550c99e589').where(cidr_block: '0.0.0.0/16') do
it { should exist }
end
Filter all static transit gateway routes.
describe aws_transit_gateway_routes(transit_gateway_route_table_id: 'tgw-rtb-08acd74550c99e589').where(static: true) do
it { should exist }
end
Filter all static transit gateway blackhole routes.
describe aws_transit_gateway_routes(transit_gateway_route_table_id: 'tgw-rtb-08acd74550c99e589').where(static: true, blackhole: true) do
it { should exist }
end
Filter all transit gateway routes with destination CIDR blocks matching 10.3.0.0/18
.
describe aws_transit_gateway_routes(transit_gateway_route_table_id: 'tgw-rtb-08acd74550c99e589', supernet_of_match: 10.3.0.0/19) do
it { should exist }
its('cidr_blocks') { should include '10.3.0.0/18' }
end
Request the CIDR blocks of all transit gateway routes, then test in-depth using aws_transit_gateway_route
.
aws_transit_gateway_routes(transit_gateway_route_table_id: 'tgw-rtb-08acd74550c99e589').cidr_blocks.each do |cidr_block|
describe aws_transit_gateway_route(transit_gateway_route_table_id: 'tgw-rtb-08acd74550c99e589', cidr_block: cidr_block) do
it { should exist }
end
end
Matchers
For a complete list of available matchers, visit Universal Matchers page.
exist
The control will pass if the ‘describe’ method returns at least one result.
describe aws_transit_gateway_routes(transit_gateway_route_table_id: <value>).where( <property>: <value>) do
it { should exist }
end
Use should_not
to test an entity that should not exist.
describe aws_transit_gateway_routes(transit_gateway_route_table_id: <value>).where( <property>: <value>) do
it { should_not exist }
end
AWS Permissions
Your Principal will need the EC2:Client:DescribeTransitGatewayRouteTablesResult
action with Effect
set to Allow
.
Get the detailed document at Actions, Resources, and Condition Keys for transit gateway route, and Actions, Resources, and Condition Keys for Identity And Access Management.
Was this page helpful?