Commit Graph

48 Commits

Author SHA1 Message Date
Bert Blommers
3d913f8f15
MultiAccount support (#5192) 2022-08-13 09:49:43 +00:00
Bert Blommers
a2c2c06243
Techdebt - Align models-responses integration for all services (#5207) 2022-06-09 17:40:22 +00:00
Bert Blommers
79a2a9d423
Preparation for MultiAccount support (#5157) 2022-06-04 11:30:16 +00:00
Bert Blommers
e49e67aba5
Refactor - Extract CommonModels into separate file (#5121) 2022-05-11 20:18:35 +00:00
Thomas Rausch
e911341e6a
add indirection to access account id (#5098) 2022-05-08 22:25:40 +00:00
Bert Blommers
eed32a5f72
Pylint - Enable more rules on source and tests-directory (#4929) 2022-03-11 20:28:45 -01:00
Bert Blommers
29d01c35bc
Update Black + formatting (#4926) 2022-03-10 13:39:59 -01:00
Bert Blommers
cc2f8c2012
Admin - change XML2Dict namespace separator (#4905) 2022-03-03 10:51:00 -01:00
Bert Blommers
aa70ee254d
Remove deprecated decorators + boto dependency (#4378) 2022-01-18 14:18:57 -01:00
Bert Blommers
d118d592ca
Pylint remaining source code (#4760) 2022-01-14 18:51:49 -01:00
Chris Evett
a2c6e00e22
fix: STS xml was malformed (#4637) 2021-11-25 09:03:57 -01:00
Bert Blommers
14a69c7524
Techdebt: Enable pylint rules (#4432) 2021-10-18 19:44:29 +00:00
Bert Blommers
24ed6c8d34
Add support for AWS China endpoints (#3661) 2021-10-18 16:13:08 +00:00
kbalk
3a203d35c9
Implement EC2 describe_vpc_endpoint_services() (#4322) 2021-09-24 16:01:09 +00:00
Bert Blommers
07bb843214
Fix regex URLs so that a dot is actually interpreted as a dot (#4110) 2021-08-28 13:42:45 +01:00
Bert Blommers
7693d77333
Remove Py2 support (#3915) 2021-07-26 07:40:39 +01:00
Bert Blommers
b9b793f421
#3599 - Update Implementation Coverage script (#3621) 2021-01-27 18:54:21 +00:00
Brian Pandola
d712a98ce1
Enable AWSLambda and STS mocking for AWS China regions/endpoints (#3574)
Fixes #3570
2021-01-08 14:22:12 +00:00
Benjamin Brabant
7c7a1222d2
Fix saml-assertion parsing in assume-role-with-saml (#3523)
* Retrieve SAML Attribute by Name instead of relying on order which is too fragile

* Handle case when SAML Attribute SessionDuration is not provided, as it is not a required attribute from SAML response

When session duration not provided, AWS consider by default a duration of one hour as cited in the following documentation:
"If this attribute is not present, then the credential last for one hour (the default value of the DurationSeconds parameter of the AssumeRoleWithSAML API)."
https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_create_saml_assertions.html#saml_role-session-duration

Traceback was:
[...]
  File "/Users/benjamin.brabant/Projects/PERSO/moto/moto/sts/responses.py", line 79, in assume_role_with_saml
    role = sts_backend.assume_role_with_saml(
  File "/Users/benjamin.brabant/Projects/PERSO/moto/moto/sts/models.py", line 99, in assume_role_with_saml
    role = AssumedRole(**kwargs)
TypeError: __init__() missing 1 required positional argument: 'duration'

* Process saml xml namespaces properly instead of relying on textual prefix that can vary between identity providers

* Handle when SAML response AttributeValue xml tag contains attributes that force xmltodict to build a dictionary as for complex types instead of directly returning string value

Leverage force_cdata option of xmltodict parser that always return a complex dictionary even if xml tag contains only text and no attributes.

* Improve existing test_assume_role_with_saml to be coherent with other assume_role_with_saml tests and remove dead code at the same time
2020-12-08 09:08:40 +00:00
Erik Hovland
b10718eea7 Add AssumeRoleWithSAML response to responses.py.
Add the AssumeRoleWithSAML response to the available STS responses.
2020-04-16 11:47:30 -07:00
Erik Hovland
b7f4ae21d1 Add assume_role_with_saml to STSBackend.
Add the assume_role_with_saml method to the STSBackend class.
2020-04-16 11:47:30 -07:00
Fabio Dias
fd9ac4b9a5 ACCOUNT_ID moved to moto.core, MOTO_ACCOUNT_ID env var override 2019-12-16 21:05:29 -05:00
Asher Foa
96e5b1993d Run black on moto & test directories. 2019-10-31 10:36:05 -07:00
Yoshiharu Hirose
570d3a9ee7 trim invalid newline 2019-10-03 17:04:49 +09:00
acsbendi
3012740699 Fixed AssumedRole ARN. 2019-08-21 19:47:12 +02:00
acsbendi
27fdbb7736 Derive ARN of AssumedRoles from its role ARN and session name. 2019-08-21 12:57:56 +02:00
Bendegúz Ács
24dcdb7453
Merge branch 'master' into get-caller-identity 2019-08-21 12:36:40 +02:00
acsbendi
d931204266 Implemented get-caller-identity returning real data depending on the access key used. 2019-08-21 12:20:35 +02:00
acsbendi
d9cb1f2d35 Implemented returning random assumed role ID. 2019-08-21 10:45:36 +02:00
Steve Pulec
69d86cbd54
Merge pull request #2300 from acsbendi/master
Basic IAM authentication, authorization
2019-07-28 17:22:52 -05:00
Grégory Bataille
67c8ea0352 fixes #2075 - STS should raise on too long policy for federation token 2019-07-20 08:41:52 +02:00
Carlos Aguado
e54f74776b Implement assume_role_with_web_identity
The AssumeRoleWithWebIdentity is a similar endpoint to STS's AssumeRole
where the authentication element is a JWT id_token from a configured OP.
This commit implements the functionality and relies on the same result
generated for the regular AssumeRole.
2019-07-16 13:27:47 +10:00
acsbendi
23957fe940 Implemented finding credentials from already created IAM users and roles. 2019-07-08 19:57:14 +02:00
acsbendi
ab0d23a0ba AssumeRole returns randomly generated credentials. 2019-07-08 16:32:25 +02:00
Steve Pulec
6d422d1f37 Add BaseModel to all models. 2017-03-11 23:41:12 -05:00
Steve Pulec
f37bad0e00 Lints. 2017-02-23 21:37:43 -05:00
Steve Pulec
81836b6981 Get standalone server mode working for all tests. 2017-02-23 19:43:48 -05:00
Steve Pulec
fde721bed7 Testing new version of decorator. 2017-02-15 22:35:45 -05:00
Jesse Szwedko
f68b2963db sts: Implement get_caller_identity (#806)
Return a canned response

Signed-off-by: Andrew Harris <andrew.harris@getbraintree.com>
2017-01-18 22:59:04 -05:00
Collin RM Stocks
1b65c45b56 ALWAYS use utcnow(), never now() 2016-09-07 14:40:52 -04:00
Jeffrey Gelens
c2f2c16892 Fixed non threadsafe code 2015-03-16 13:13:40 +01:00
dreadpirateshawn
9affa7753d Performance: Leverage jinja2's Environment to cache compiled Templates. 2014-12-12 12:46:07 -08:00
Steve Pulec
1a015d0e39 Cleanup some incorrect date formats. 2014-11-29 23:34:40 -05:00
David Baumgold
4201e6b430 from __future__ import unicode_literals 2014-08-27 11:33:55 -04:00
Konstantinos Koukopoulos
b3608cac66 remove whitespace in sample responses in STS get_federation_token response 2014-03-21 13:08:31 +02:00
Konstantinos Koukopoulos
bcc2aa3394 fix querystring handling in get_federation_token 2014-03-21 13:08:08 +02:00
Konstantinos Koukopoulos
fb558bb1ca add support for sts get_federation_token 2014-03-20 18:29:39 +02:00
Steve Pulec
212d9c7abe core sts endpoints completed 2013-05-24 17:22:34 -04:00