by spulec

spulec / moto

A library that allows you to easily mock out tests based on AWS infrastructure.

4.0K Stars 1.2K Forks Last release: Not found Apache License 2.0 5.5K Commits 110 Releases

Available items

No Items, yet!

The developer of this repository has not created any items for sale yet. Need a bug fixed? Help with integration? A different license? Create a request here:

Moto - Mock AWS Services

Join the chat at

Build Status Coverage Status Docs PyPI PyPI - Python Version PyPI - Downloads Code style: black


To install moto for a specific service:

$ pip install moto[ec2,s3]
This will install Moto, and the dependencies required for that specific service.
If you don't care about the number of dependencies, or if you want to mock many AWS services:
$ pip install moto[all]
Not all services might be covered, in which case you might see a warning:
moto 1.3.16 does not provide the extra 'service'
You can ignore the warning, or simply install moto as is:
$ pip install moto

In a nutshell

Moto is a library that allows your tests to easily mock out AWS Services.

Imagine you have the following python code that you want to test:

import boto3

class MyModel(object): def init(self, name, value): = name self.value = value

def save(self):
    s3 = boto3.client('s3', region_name='us-east-1')
    s3.put_object(Bucket='mybucket',, Body=self.value)

Take a minute to think how you would have tested that in the past.

Now see how you could test it with Moto:

import boto3
from moto import mock_s3
from mymodule import MyModel

@mock_s3 def test_my_model_save(): conn = boto3.resource('s3', region_name='us-east-1') # We need to create the bucket since this is all in Moto's 'virtual' AWS account conn.create_bucket(Bucket='mybucket')

model_instance = MyModel('steve', 'is awesome')

body = conn.Object('mybucket', 'steve').get()['Body'].read().decode("utf-8")

assert body == 'is awesome'

With the decorator wrapping the test, all the calls to s3 are automatically mocked out. The mock keeps the state of the buckets and keys.

It gets even better! Moto isn't just for Python code and it isn't just for S3. Look at the standalone server mode for more information about running Moto with other languages. Here's the status of the other AWS services implemented:

| Service Name | Decorator | Development Status | Comment | |---------------------------|-----------------------|---------------------------------|-----------------------------| | ACM | @mockacm | all endpoints done | | | API Gateway | @mockapigateway | core endpoints done | | | Application Autoscaling | @mockapplicationautoscaling | basic endpoints done | | | Autoscaling | @mockautoscaling | core endpoints done | | | Cloudformation | @mockcloudformation | core endpoints done | | | Cloudwatch | @mockcloudwatch | basic endpoints done | | | CloudwatchEvents | @mockevents | all endpoints done | | | Cognito Identity | @mockcognitoidentity | basic endpoints done | | | Cognito Identity Provider | @mockcognitoidp | basic endpoints done | | | Config | @mockconfig | basic + core endpoints done | | | Data Pipeline | @mockdatapipeline | basic endpoints done | | | DynamoDB | @mockdynamodb | core endpoints done | API 20111205. Deprecated. | | DynamoDB2 | @mockdynamodb2 | all endpoints + partial indexes | API 20120810 (Latest) | | EC2 | @mockec2 | core endpoints done | | | - AMI | | core endpoints done | | | - EBS | | core endpoints done | | | - Instances | | all endpoints done | | | - Security Groups | | core endpoints done | | | - Tags | | all endpoints done | | | ECR | @mockecr | basic endpoints done | | | ECS | @mockecs | basic endpoints done | | | ELB | @mockelb | core endpoints done | | | ELBv2 | @mockelbv2 | all endpoints done | | | EMR | @mockemr | core endpoints done | | | Glacier | @mockglacier | core endpoints done | | | IAM | @mockiam | core endpoints done | | | IoT | @mockiot | core endpoints done | | | IoT data | @mockiotdata | core endpoints done | | | Kinesis | @mockkinesis | core endpoints done | | | KMS | @mockkms | basic endpoints done | | | Lambda | @mocklambda | basic endpoints done, requires docker | | | Logs | @mocklogs | basic endpoints done | | | Organizations | @mockorganizations | some core endpoints done | | | Polly | @mockpolly | all endpoints done | | | RDS | @mockrds | core endpoints done | | | RDS2 | @mockrds2 | core endpoints done | | | Redshift | @mockredshift | core endpoints done | | | Route53 | @mockroute53 | core endpoints done | | | S3 | @mocks3 | core endpoints done | | | SecretsManager | @mocksecretsmanager | basic endpoints done | | | SES | @mockses | all endpoints done | | | SNS | @mocksns | all endpoints done | | | SQS | @mocksqs | core endpoints done | | | SSM | @mockssm | core endpoints done | | | STS | @mocksts | core endpoints done | | | SWF | @mockswf | basic endpoints done | | | X-Ray | @mockxray | all endpoints done | |

For a full list of endpoint implementation coverage

Another Example

Imagine you have a function that you use to launch new ec2 instances:

import boto3

def add_servers(ami_id, count): client = boto3.client('ec2', region_name='us-west-1') client.run_instances(ImageId=ami_id, MinCount=count, MaxCount=count)

To test it:

from . import add_servers
from moto import mock_ec2

@mock_ec2 def test_add_servers(): add_servers('ami-1234abcd', 2)

client = boto3.client('ec2', region_name='us-west-1')
instances = client.describe_instances()['Reservations'][0]['Instances']
assert len(instances) == 2
instance1 = instances[0]
assert instance1['ImageId'] == 'ami-1234abcd'

Using moto 1.0.X with boto2

moto 1.0.X mock decorators are defined for boto3 and do not work with boto2. Use the @mockAWSSVCdeprecated to work with boto2.

Using moto with boto2 ```python from moto import mockec2deprecated import boto

@mockec2deprecated def testsomethingwithec2(): ec2conn = boto.ec2.connecttoregion('us-east-1') ec2conn.getonlyinstances(instanceids='i-123456')

When using both boto2 and boto3, one can do this to avoid confusion:
from moto import mock_ec2_deprecated as mock_ec2_b2
from moto import mock_ec2


All of the services can be used as a decorator, context manager, or in a raw form.


def test_my_model_save():
    # Create Bucket so that test can run
    conn = boto3.resource('s3', region_name='us-east-1')
    model_instance = MyModel('steve', 'is awesome')
    body = conn.Object('mybucket', 'steve').get()['Body'].read().decode()

assert body == 'is awesome'

Context Manager

def test_my_model_save():
    with mock_s3():
        conn = boto3.resource('s3', region_name='us-east-1')
        model_instance = MyModel('steve', 'is awesome')
        body = conn.Object('mybucket', 'steve').get()['Body'].read().decode()

    assert body == 'is awesome'

Raw use

def test_my_model_save():
    mock = mock_s3()

conn = boto3.resource('s3', region_name='us-east-1')

model_instance = MyModel('steve', 'is awesome')

assert conn.Object('mybucket', 'steve').get()['Body'].read().decode() == 'is awesome'


IAM-like Access Control

Moto also has the ability to authenticate and authorize actions, just like it's done by IAM in AWS. This functionality can be enabled by either setting the

environment variable or using the
decorator. Note that the current implementation is very basic, see this file for more information.


If this environment variable is set, moto will skip performing any authentication as many times as the variable's value, and only starts authenticating requests afterwards. If it is not set, it defaults to infinity, thus moto will never perform any authentication at all.


This is a decorator that works similarly to the environment variable, but the settings are only valid in the function's scope. When the function returns, everything is restored.

def test_describe_instances_allowed():
    policy_document = {
        "Version": "2012-10-17",
        "Statement": [
                "Effect": "Allow",
                "Action": "ec2:Describe*",
                "Resource": "*"
    access_key = ...
    # create access key for an IAM user/assumed role that has the policy above.
    # this part should call __exactly__ 4 AWS actions, so that authentication and authorization starts exactly after this

client = boto3.client('ec2', region_name='us-east-1',

# if the IAM principal whose access key is used, does not have the permission to describe instances, this will fail
instances = client.describe_instances()['Reservations'][0]['Instances']
assert len(instances) == 0

See the related test suite for more examples.

Experimental: AWS Config Querying

For details about the experimental AWS Config support please see the AWS Config readme here.

Very Important -- Recommended Usage

There are some important caveats to be aware of when using moto:

Failure to follow these guidelines could result in your tests mutating your REAL infrastructure!

How do I avoid tests from mutating my real infrastructure?

You need to ensure that the mocks are actually in place. Changes made to recent versions of

have altered some of the mock behavior. In short, you need to ensure that you always do the following:
  1. Ensure that your tests have dummy environment variables set up:

    export AWS_ACCESS_KEY_ID='testing'
    export AWS_SECRET_ACCESS_KEY='testing'
    export AWS_SECURITY_TOKEN='testing'
    export AWS_SESSION_TOKEN='testing'
  2. VERY IMPORTANT: ensure that you have your mocks set up BEFORE your

    client is established. This can typically happen if you import a module that has a
    client instantiated outside of a function. See the pesky imports section below on how to work around this.

Example on usage?

If you are a user of pytest, you can leverage pytest fixtures to help set up your mocks and other AWS resources that you would need.

Here is an example: ```python @pytest.fixture(scope='function') def awscredentials(): """Mocked AWS Credentials for moto.""" os.environ['AWSACCESSKEYID'] = 'testing' os.environ['AWSSECRETACCESSKEY'] = 'testing' os.environ['AWSSECURITYTOKEN'] = 'testing' os.environ['AWSSESSION_TOKEN'] = 'testing'

@pytest.fixture(scope='function') def s3(awscredentials): with mocks3(): yield boto3.client('s3', region_name='us-east-1')

@pytest.fixture(scope='function') def sts(awscredentials): with mocksts(): yield boto3.client('sts', region_name='us-east-1')

@pytest.fixture(scope='function') def cloudwatch(awscredentials): with mockcloudwatch(): yield boto3.client('cloudwatch', region_name='us-east-1')

... etc. ```

In the code sample above, all of the AWS/mocked fixtures take in a parameter of

, which sets the proper fake environment variables. The fake environment variables are used so that
doesn't try to locate real credentials on your system.

Next, once you need to do anything with the mocked AWS environment, do something like: ```python def testcreatebucket(s3): # s3 is a fixture defined above that yields a boto3 s3 client. # Feel free to instantiate another boto3 S3 client -- Keep note of the region though. s3.create_bucket(Bucket="somebucket")

result = s3.list_buckets()
assert len(result['Buckets']) == 1
assert result['Buckets'][0]['Name'] == 'somebucket'
### What about those pesky imports?
Recall earlier, it was mentioned that mocks should be established __BEFORE__ the clients are set up. One way
to avoid import issues is to make use of local Python imports -- i.e. import the module inside of the unit
test you want to run vs. importing at the top of the file.


```python def test_something(s3): from some.package.that.does.something.with.s3 import some_func #

Other caveats

For Tox, Travis CI, and other build systems, you might need to also perform a

touch ~/.aws/credentials
command before running the tests. As long as that file is present (empty preferably) and the environment variables above are set, you should be good to go.

Stand-alone Server Mode

Moto also has a stand-alone server mode. This allows you to utilize the backend structure of Moto even if you don't use Python.

It uses flask, which isn't a default dependency. You can install the server 'extra' package with:

pip install "moto[server]"

You can then start it running a service:

$ moto_server ec2
 * Running on

You can also pass the port:

$ moto_server ec2 -p3000
 * Running on

If you want to be able to use the server externally you can pass an IP address to bind to as a hostname or allow any of your external interfaces with

$ moto_server ec2 -H
 * Running on

Please be aware this might allow other network users to access your server.

Then go to localhost to see a list of running instances (it will be empty since you haven't added any yet).

If you want to use boto with this (using the simpler decorators above instead is strongly encouraged), the easiest way is to create a boto config file (

) with the following values:
is_secure = False
https_validate_certificates = False
proxy_port = 5000
proxy =

If you want to use boto3 with this, you can pass an

to the resource


The standalone server has some caveats with some services. The following services require that you update your hosts file for your code to work properly:

  1. s3-control

For the above services, this is required because the hostname is in the form of

. As a result, you need to add that entry to your host file for your tests to function properly.


Releases are done from travisci. Fairly closely following this:

  • Commits to
    branch do a dev deploy to pypi.
  • Commits to a tag do a real deploy to pypi.

We use cookies. If you continue to browse the site, you agree to the use of cookies. For more information on our use of cookies please see our Privacy Policy.