Commit Graph

199 Commits

Author SHA1 Message Date
Tomoya Kabe
849f16ff2d
Correct group inline policy rendering (#3069)
* Correct group inline policy rendering in iam:GetAccountAuthorizationDetails response

* Include user inline policy if exists

* Add tests for IAM inline policies

* Remove unnecessary print stmts
2020-06-14 09:23:52 +01:00
jweite
4303123312
Implemented IAM delete_instance_profile (#3020)
* Implemented IAM delete_instance_profile

* PR adjustment: positively verifying instance profile deletion in test case.

Co-authored-by: Joseph Weitekamp <jweite@amazon.com>
2020-05-27 18:22:06 +01:00
jweite
b7a1b666a8
Corrected bug in IAM delete_role() due to overloading of name 'role' … (#3019)
* Corrected bug in IAM delete_role() due to overloading of name 'role' in function

* PR-requested fixes: added region to tests boto client create, reformatted with black

Co-authored-by: Joseph Weitekamp <jweite@amazon.com>
2020-05-27 17:00:28 +01:00
zscholl
1f1404352e use conditional TEST_SERVER_MODE for backend tests 2020-04-30 09:42:22 -05:00
zscholl
0423be259a remove backend logic & py27 incompatible timezone 2020-04-30 09:10:42 -05:00
zscholl
51e7002cbb add tests 2020-04-30 09:10:42 -05:00
Owen Farrell
142e237b0b Made UserName parameter optional for IAM access key functions 2020-01-27 12:12:21 -05:00
Asher Foa
c2e444a210 Update tests. 2019-12-20 10:54:33 -08:00
Asher Foa
1415a93596 Implement List user tags 2019-12-19 19:45:56 -08:00
Fabio Dias
743dd46399 black linting 2019-12-16 21:25:20 -05:00
Fabio Dias
fd9ac4b9a5 ACCOUNT_ID moved to moto.core, MOTO_ACCOUNT_ID env var override 2019-12-16 21:05:29 -05:00
Fabio Dias
b83a750630 Added references to moto.iam.models.ACCOUNT_ID instead of hardcoded id 2019-12-16 19:56:11 -05:00
Barry Allwood
7c1cc01eb9 chore: add MaxSessionDuration to IAM Role
fix: Description field is optional on return of IAM Role
2019-11-24 18:19:09 +00:00
Steve Pulec
72da9e96c2 Lint. 2019-11-21 17:53:58 -05:00
Matt Conway
d9c8bdb2a0 Add the ssh_public_key methods that were missing from the IAM implementation 2019-11-18 09:02:32 -05:00
Mike Grima
dab7f9fdad
Merge pull request #2574 from gruebel/add-iam-get-account-summary
Add iam.get_account_summary
2019-11-17 15:53:34 -08:00
gruebel
e9c3cba4d6 Fix tests 2019-11-17 14:34:00 +01:00
gruebel
d05ebadce8 Add iam.get_account_summary 2019-11-17 13:47:19 +01:00
Bert Blommers
85570f0abe IAM - Add Validation on duplicate policy names 2019-11-16 17:36:50 +00:00
Bert Blommers
422bca8e90 IAM - Add Validation on duplicate role names 2019-11-16 17:33:59 +00:00
Mike Grima
3afb93d9db
Merge pull request #2548 from bblommers/feature/implement-iam-delete-group-endpoint
Feature/implement iam delete group endpoint
2019-11-15 10:52:21 -08:00
Mike Grima
7ca35514ca
Merge pull request #2542 from ianyon/create_policy_already_exist
Added Exception for create_policy when policy exists
2019-11-15 10:38:35 -08:00
Steven Reiling
cd0769af7e Fix IAM instance profile tracking to reflect AWS's requirement for account-unique names 2019-11-14 17:23:44 -08:00
Bert Blommers
cd5b64b0c5 #2163 - Delete IAM group; Add test case and align error message with AWS 2019-11-08 01:19:45 -08:00
Robin Taylor
876ff476f1 Implementing delete-group endpoint and appropriate test case 2019-11-08 01:12:20 -08:00
Ian Yon
f235fa145e Added Exception for create_policy when policy exists 2019-11-05 15:57:38 -03:00
gruebel
78e2714496 black format 2019-11-01 07:14:03 +01:00
gruebel
89c43820c9 Add iam.delete_account_password_policy 2019-11-01 07:07:33 +01:00
gruebel
65fa8f1a1b Add iam.get_account_password_policy 2019-11-01 07:07:32 +01:00
gruebel
06581391bd Add iam.update_account_password_policy 2019-11-01 07:03:27 +01:00
Asher Foa
96e5b1993d Run black on moto & test directories. 2019-10-31 10:36:05 -07:00
Jack Danger
00045ae480
Merge branch 'master' into add-iam-virtual-mfa-device 2019-10-22 14:54:10 -07:00
Chris Murton
f0b22fcd2f Fix absent role deletion, Add more delete_user tests, add no conflict deletion testing 2019-10-22 15:28:59 +01:00
Chris Murton
ccdcb7ca60 Add conflict detection on IAM delete_role and delete_user 2019-10-22 14:27:49 +01:00
gruebel
802fb3baad Connect user with virtual mfa device 2019-10-21 22:51:00 +02:00
gruebel
1d9382b5e5 Add iam.list_virtual_mfa_devices 2019-10-21 21:48:50 +02:00
gruebel
c80135a6db Add iam.delete_virtual_mfa_device 2019-10-20 23:03:20 +02:00
gruebel
9671730f16 Add iam.create_virtual_mfa_device 2019-10-20 22:39:57 +02:00
gruebel
3f3feb5bdb Fix tests 2019-10-19 14:23:35 +02:00
gruebel
cd8027ce9d Add iam.list_open_id_connect_providers 2019-10-18 21:15:48 +02:00
gruebel
f4af9a1d54 Add iam.delete_open_id_connect_provider 2019-10-18 21:15:48 +02:00
gruebel
c492c5c228 Add iam.get_open_id_connect_provider 2019-10-18 21:15:05 +02:00
gruebel
bd627b65f7 Add iam.create_open_id_connect_provider 2019-10-18 21:15:05 +02:00
Bert Blommers
deffefbfb8
PR changes 2019-10-18 09:18:12 +01:00
Bert Blommers
856a06a778 IAM - Delete Policy implementation 2019-10-17 09:28:19 +01:00
Bruno Oliveira
21933052d3 Fix multiple IAM Policy Statement creation with empty sid 2019-09-10 23:43:50 -03:00
Mike Grima
38866bfcef Fixed some IAM APIs for tagging and role descriptions 2019-08-21 13:08:33 -07:00
wndhydrnt
67326ace4f Raise exception if a role policy is not found 2019-07-07 21:46:26 +02:00
Steve Pulec
3bafc89b40
Merge pull request #2268 from acsbendi/policy-version-fixes
IAM policy version fixes
2019-07-06 15:52:10 -05:00
acsbendi
48f0c6f194 Fixed format of access key ID and secret access key. 2019-07-04 20:20:08 +02:00
acsbendi
0bd2c5adb4 Fixed minor errors in test. 2019-07-04 20:12:53 +02:00
acsbendi
ef97e0f28f Extended create_access_key test. 2019-07-04 20:04:27 +02:00
acsbendi
6ac315b903 Fixed broken tests due to policy validation. 2019-07-02 12:24:19 +02:00
Steve Pulec
172e089854
Merge branch 'master' into policy-version-fixes 2019-07-01 20:58:38 -05:00
acsbendi
1bda3f2213 Added tests for valid policy documents. 2019-07-01 18:21:54 +02:00
acsbendi
85efec29b1 Added more tests. 2019-07-01 17:30:59 +02:00
acsbendi
d2b0812edc Added more tests. 2019-06-30 20:33:17 +02:00
acsbendi
e133344846 Implemented validating action prefixes. 2019-06-30 18:48:27 +02:00
acsbendi
55f9040296 Fixed old unit tests in test_iam that didn't use valid IAM policies. 2019-06-30 17:57:50 +02:00
acsbendi
99336cbe6a Reorganized tests using a generator method and fixed error messages. 2019-06-30 17:04:02 +02:00
acsbendi
896f7b6eb2 Added more tests. 2019-06-30 16:36:49 +02:00
acsbendi
a4b850aab9 Added test cases for mutually exclusive elements. 2019-06-30 14:03:18 +02:00
acsbendi
f0e9ea4e72 Created tests for policy documents. 2019-06-30 13:47:17 +02:00
acsbendi
3cd373f1f9 Created failing tests. 2019-06-29 18:15:01 +02:00
Bendegúz Ács
ab8a189bbf Fixed policy version's Document type for AWS managed policies (#2234)
* Added checking Document's type in AWS managed policy version response.

* Fixed policy version's Document type for AWS managed policies.
2019-06-10 20:00:37 +01:00
Bendegúz Ács
97ab7fd307 Fixes for get_policy and get_policy_version with AWS managed policies (#2231)
* Created test for get_policy with AWS managed policy.

* Created failing test for get_policy_version with AWS managed policy.

* Updated AWS managed policies.

* Fixed failing tests.

* Fixed trying to compare datetime with string in test case.

* Fixed CreateDate of AWS managed policies overwritten by their version's CreateDate.

* Fixed and improved tests for managed AWS policies.

* Added test for AWS managed policy with v4 default version.

* Fixed not correctly returning dates for AWS managed policies.
2019-06-06 13:36:39 +01:00
Travis Truman
b8ba7980a0 Adding support for specifying a PermissionsBoundary ARN in calls to i… (#2182)
* Adding support for specifying a PermissionsBoundary ARN in calls to iam.create_role

Closes #2181

* Correcting whitespace error

* Adding support for Role PermissionsBoundary to be returned from
calls to list_roles

* Raise ClientError when a bad permissions boundary ARN is supplied
2019-05-21 17:44:05 +01:00
Chris Opland
dd898add4d Add test verifying create_role path defaults to / 2019-04-21 18:29:36 -05:00
Mike Grima
5d955985b9
Merge pull request #2106 from andytumelty/iam-update-user
Add support for iam update_user
2019-04-17 11:13:14 -07:00
Santosh Ananthakrishnan
4f1a1a9d1e [iam] create_policy_version: Fix version id calculation
When creating a new IAM policy version with create_policy_version,
we cannot use the length of the versions list to calculate VersionId.
Keep track of the next version id to use as a non-decreasing counter.

Fixes #2157
2019-04-16 20:15:57 +00:00
Andy Tumelty
d53626ad9a Add support for iam update_user
This covers both the NewPath and NewUserName parameters for update_user, but
without regex validation for these values.
2019-03-12 17:23:32 +00:00
William Rubel
e9d8021c86 Fixing list entities for policy 2019-02-18 21:20:29 -06:00
William Rubel
ce7b5ebf54 Fix policy date 2019-02-17 21:37:33 -06:00
William Rubel
37a765db8d Fix policy date 2019-02-17 17:12:27 -06:00
William Rubel
0e73cddf2f Add test for roles 2019-02-17 16:25:49 -06:00
William Rubel
6e7bd088b3 Add test for roles 2019-02-17 16:04:28 -06:00
William Rubel
31258e9e9e Add test for roles 2019-02-17 15:23:59 -06:00
William Rubel
37cb5ab4e6 Add test for roles 2019-02-17 14:36:53 -06:00
Mike Grima
94672799cf Fixed a bug in get_account_authorization_details for attached managed policies.
Fixed a bug in the XML template for `get_account_authorization_details` where attached managed policies
were empty strings.
2019-02-07 17:32:31 -08:00
Mike Grima
dfceab9bf0 Some fixes to get_account_authorization_details 2019-02-04 13:44:01 -08:00
Mike Grima
1a36c0c377 IAM Role Tagging support 2019-01-31 17:37:26 -08:00
Steve Pulec
1f9ade61c0 Fix iam SAML tests. 2018-12-29 06:47:16 -05:00
Steve Pulec
25595815e5
Merge pull request #1972 from surfaslt/implement-get-access-key-last-used
Implement get_access_key_last_used
2018-12-28 21:08:13 -05:00
Steve Pulec
46bf7f0176
Merge branch 'master' into master 2018-12-28 20:57:47 -05:00
Steve Pulec
c8a35f0b02
Merge pull request #1920 from pall-valmundsson/iam_credential_report_boto3
Support IAM Credential Report in boto3
2018-12-28 20:04:59 -05:00
martynaspaulikas
9418a6916d Fix tests and functionality of get_access_key_last_used() 2018-11-27 16:12:41 +00:00
martynaspaulikas
7189d019df Implemented get_access_key_last_used
Written test that still does not work due to:
    ParamValidationError: Parameter validation failed:
    Unknown parameter in input: "UserName", must be one of: AccessKeyId
Refactored update_access_key and delete_access_key functions
2018-11-27 11:28:09 +00:00
Joe Engel
57fa11136b Add functionalities for SAML Providers 2018-11-19 15:53:02 -08:00
Mike Grima
94b5438d76 Added IAM User signing certificate support 2018-11-05 13:15:44 -08:00
Mike Grima
b4b0ae5077 Some IAM fixes.
- Fixed InstanceProfiles having `Path` set to `None`.
- Added in some dynamic `CreateDate`s.
- Fixed missing Instance Profile ID's being sent over
2018-11-05 09:24:28 -08:00
Pall Valmundsson
e9f8bec91a Fix boto3 IAM test function names 2018-11-01 19:58:09 +00:00
Pall Valmundsson
67cb2e25bb Support IAM Credential Report in boto3
Lowercase XML element names in API responses seem to cause issues for boto3.
2018-11-01 19:51:17 +00:00
Mike Grima
8ae1a2b357 Fixes for IAM Groups 2018-10-16 17:14:23 -07:00
Karl Gutwin
5ae5ae0efa Correct deviation in behavior of policy versions from standard API 2018-08-07 17:24:15 -04:00
Karl Gutwin
9e667d6b25 Add get_policy IAM action 2018-08-07 16:59:15 -04:00
Will Bengtson
a420064621 IAM get account authorization details (#1736)
* start of get_account_authorization_details for iam

* add get_account_authorization_details dynamic template

* remove old commented out template

* Fix flake8 problems and add unit test
2018-08-07 10:31:36 -07:00
Nathan Mische
ff80ecb56d Adding account id to ManagedPolicy ARN 2018-07-17 13:31:18 -04:00
Brian Pandola
350cf9257e Add update_access_key endpoint (#1423) 2018-01-10 18:29:08 -05:00
David Bartle
52ce8d378f IAM delete_server_certificate (#1380)
* IAM delete_server_certificate

* flake8 fixes
2017-12-08 10:43:09 +00:00
Jack Danger
353f8387a2 implementing detach_group_policy 2017-10-01 15:05:33 -07:00