183 Commits

Author SHA1 Message Date
Fabio Dias
743dd46399 black linting 2019-12-16 21:25:20 -05:00
Fabio Dias
fd9ac4b9a5 ACCOUNT_ID moved to moto.core, MOTO_ACCOUNT_ID env var override 2019-12-16 21:05:29 -05:00
Mike Grima
84ccdbd1cd Implemented S3 Public Access Block 2019-12-12 17:45:31 -08:00
Bert Blommers
5f6e8fd6fe Merge branch 'master' into feature/2546 2019-11-22 06:22:54 +00:00
Steve Pulec
4983f6af91 Fix for updated botocore IoT requestUris. 2019-11-21 13:35:02 -05:00
Bert Blommers
1d85288244 Ensure Flask sends through custom error messages 2019-11-20 08:57:38 +00:00
Mike Grima
bd777cad44 Fix for moto not unmocking.
- Fixes #2575
- Also upgraded Travis CI to make use of Bionic instead of Xenial
- This may also address concerns raised in #1793
2019-11-18 15:28:31 -08:00
Asher Foa
96e5b1993d Run black on moto & test directories. 2019-10-31 10:36:05 -07:00
Steve Pulec
54c8a7dea1
Merge pull request #2519 from yan12125/python38
Python 3.8 support
2019-10-30 22:52:40 -05:00
Patrick Mende
5cccb03c91
Remove newlines from XML responses
This is a second attempt at resolving the issues with producing an XML consistent with what is produced from AWS (i.e., no spaces/new lines between tags). Another attempt (https://github.com/spulec/moto/pull/2205) is currently failing in tests.

This attempt uses precompiled regex patterns as class attributes of the `_TemplateEnvironmentMixin` to remove trailing spaces and newlines after a `">"`, and preceding newlines/spaces before a `"<"`. This *explicitly* wasn't done with a single regex to ensure that even things like `"...<ID>\n      12345\n    </ID>"` are properly collapsed.
2019-10-30 14:08:24 -07:00
Chih-Hsuan Yen
18173a5951
Replace # flake8: noqa with # noqa
The former syntax is actually a mis-use and rejected since Flake8 3.6
[1].

[1] https://gitlab.com/pycqa/flake8/merge_requests/219
2019-10-27 20:41:22 +08:00
gruebel
c3cb411c07 Refactor sqs.get_queue_attributes & add AttributeNames handling 2019-10-27 12:13:33 +01:00
Mike Grima
2a2c3e80f0 Adding support for querying the AWS Config resource for S3.
- Need to add support still for batch requests and batch aggregation requests in a future PR
2019-10-13 10:14:15 -07:00
Mike Grima
c4b310d7a5 Adding support for querying AWS Config for supported configurations.
At this time, only adding support for S3.
2019-10-03 11:43:56 -07:00
Jack Danger
4497f18c1a
fixing ErrorResponse top-level tag (#2434)
In the golang SDK the previous format throws an unmarshaling error:

    /usr/local/Cellar/go/1.12.6/libexec/src/encoding/xml/read.go:209 &errors.errorString{s:"unknown error response tag, {{ Response} []}"}
    err: <*>SerializationError: failed to unmarshal error message
2019-09-27 11:14:53 -07:00
Steve Pulec
efe676dbd5 Add comment. 2019-09-11 22:07:24 -05:00
Steve Pulec
aa896a0c2e
Merge pull request #2294 from spulec/fix-responses-mocking
Cleanup responses mocking. Closes #1567
2019-09-11 22:06:36 -05:00
acsbendi
cf2dae0ce8 Calling sts:GetCallerIdentity is always allowed. 2019-08-22 18:09:52 +02:00
acsbendi
27fdbb7736 Derive ARN of AssumedRoles from its role ARN and session name. 2019-08-21 12:57:56 +02:00
Steve Pulec
69d86cbd54
Merge pull request #2300 from acsbendi/master
Basic IAM authentication, authorization
2019-07-28 17:22:52 -05:00
acsbendi
9edab5b423 Simplified the reset-auth API. 2019-07-28 22:23:33 +02:00
acsbendi
1969338a8a Fixed set_initial_no_auth_action_count not working in server mode. 2019-07-27 00:12:28 +02:00
acsbendi
de70d1787c Collected TODOs in the header of the access_control file. 2019-07-26 21:23:15 +02:00
acsbendi
f3f47d44ac Fixed error in python 2 and did some refactoring. 2019-07-26 21:05:04 +02:00
acsbendi
140f4110ac set_initial_no_auth_action_count should restore request_count. 2019-07-26 20:41:40 +02:00
acsbendi
3e1e273380 Fixed collecting policies from groups. 2019-07-24 21:41:33 +02:00
acsbendi
d428acdb7c Separate SignatureDoesNotMatchError for S3. 2019-07-24 21:01:11 +02:00
acsbendi
d471eb69c0 For EC2 requests, AuthFailure should be raised instead of SignatureDoesNotMatch. 2019-07-24 19:47:39 +02:00
acsbendi
e22e8b5a67 set_initial_no_auth_action_count should also set request_count to 0. 2019-07-24 18:58:50 +02:00
acsbendi
15c872cffc Created decorator for setting INITIAL_NO_AUTH_ACTION_COUNT. 2019-07-24 18:15:31 +02:00
acsbendi
bbf003d335 Set correct HTTP codes for some auth-related errors. 2019-07-24 17:21:33 +02:00
acsbendi
3dd2e3a1b8 Moved INITIAL_NO_AUTH_ACTION_COUNT to settings. 2019-07-24 16:30:48 +02:00
Steve Pulec
077c667454
Merge pull request #2285 from spulec/move-env-mocking
Move env variable mocking and undo when stopping. CC #2058, #2172.
2019-07-19 23:56:40 -04:00
acsbendi
7db2d0f38c Use abc in a python2-compatible way. 2019-07-13 15:12:21 +02:00
acsbendi
7b096d690f Replaced print with log.debug. 2019-07-13 15:04:41 +02:00
acsbendi
de01adec57 Fixed linting errors. 2019-07-13 14:58:42 +02:00
acsbendi
9d992c9335 Fixed error on single (non-list) Statements. 2019-07-11 14:22:42 +02:00
acsbendi
59f091bdea Default INITIAL_NO_AUTH_ACTION_COUNT should be infinity. 2019-07-11 13:58:57 +02:00
Steve Pulec
c7147b06b1 Cleanup responses mocking. Closes #1567
This unblocks requests to other websites with requests while Moto
is activated. It also adds a wildcard for AWS services to still
ensure no accidental requests are made for unmocked services
2019-07-10 21:59:25 -05:00
Steve Pulec
b19c201975 Cleanup model ref resetting. 2019-07-10 21:16:11 -05:00
acsbendi
bec0c5a273 Fixed S3 actions not handled properly. 2019-07-10 20:42:23 +02:00
Steve Pulec
308712841c Have context manager return mock. 2019-07-09 20:31:43 -05:00
acsbendi
947e26ce1b Removed unused exception. 2019-07-09 19:46:04 +02:00
acsbendi
1df4e8da2f Fixed bugs in processing policies belonging to assumed roles. 2019-07-09 19:44:23 +02:00
acsbendi
23957fe940 Implemented finding credentials from already created IAM users and roles. 2019-07-08 19:57:14 +02:00
Steve Pulec
79cd1e609c Move env variable mocking and undo when stopping. CC #2058, #2172. 2019-07-07 22:32:46 -05:00
Bendegúz Ács
9684e1b638
Abstract methods raise NotImplementedError 2019-07-04 17:18:12 +02:00
acsbendi
8de3bdcf29 Fixed printing IAM request class' name. 2019-07-04 16:48:44 +02:00
acsbendi
5dbec8aee5 Implemented checking if S3 action is permitted. 2019-07-04 16:38:53 +02:00
acsbendi
7ec8f85438 Implemented recognizing asterisks in Actions in policy statements. 2019-07-02 19:24:45 +02:00