fix access key storage for different accounts (#6210)
This commit is contained in:
		
							parent
							
								
									7a74df0426
								
							
						
					
					
						commit
						ad20320d41
					
				@ -99,7 +99,8 @@ class STSBackend(BaseBackend):
 | 
				
			|||||||
            duration,
 | 
					            duration,
 | 
				
			||||||
            external_id,
 | 
					            external_id,
 | 
				
			||||||
        )
 | 
					        )
 | 
				
			||||||
        self.assumed_roles.append(role)
 | 
					        account_backend = sts_backends[account_id]["global"]
 | 
				
			||||||
 | 
					        account_backend.assumed_roles.append(role)
 | 
				
			||||||
        return role
 | 
					        return role
 | 
				
			||||||
 | 
					
 | 
				
			||||||
    def get_assumed_role_from_access_key(self, access_key_id):
 | 
					    def get_assumed_role_from_access_key(self, access_key_id):
 | 
				
			||||||
 | 
				
			|||||||
@ -24,6 +24,17 @@ class TestStsAssumeRole(unittest.TestCase):
 | 
				
			|||||||
        )
 | 
					        )
 | 
				
			||||||
 | 
					
 | 
				
			||||||
        # Assume the new role
 | 
					        # Assume the new role
 | 
				
			||||||
 | 
					        sts_account_b = boto3.client(
 | 
				
			||||||
 | 
					            "sts",
 | 
				
			||||||
 | 
					            aws_access_key_id=response["Credentials"]["AccessKeyId"],
 | 
				
			||||||
 | 
					            aws_secret_access_key=response["Credentials"]["SecretAccessKey"],
 | 
				
			||||||
 | 
					            aws_session_token=response["Credentials"]["SessionToken"],
 | 
				
			||||||
 | 
					            region_name="us-east-1",
 | 
				
			||||||
 | 
					        )
 | 
				
			||||||
 | 
					        assumed_arn = sts_account_b.get_caller_identity()["Arn"]
 | 
				
			||||||
 | 
					        assumed_arn.should.equal(
 | 
				
			||||||
 | 
					            f"arn:aws:sts::{self.account_b}:assumed-role/my-role/test-session-name"
 | 
				
			||||||
 | 
					        )
 | 
				
			||||||
        iam_account_b = boto3.client(
 | 
					        iam_account_b = boto3.client(
 | 
				
			||||||
            "iam",
 | 
					            "iam",
 | 
				
			||||||
            aws_access_key_id=response["Credentials"]["AccessKeyId"],
 | 
					            aws_access_key_id=response["Credentials"]["AccessKeyId"],
 | 
				
			||||||
 | 
				
			|||||||
		Loading…
	
	
			
			x
			
			
		
	
		Reference in New Issue
	
	Block a user