Tomoya Kabe
849f16ff2d
Correct group inline policy rendering ( #3069 )
...
* Correct group inline policy rendering in iam:GetAccountAuthorizationDetails response
* Include user inline policy if exists
* Add tests for IAM inline policies
* Remove unnecessary print stmts
2020-06-14 09:23:52 +01:00
jweite
4303123312
Implemented IAM delete_instance_profile ( #3020 )
...
* Implemented IAM delete_instance_profile
* PR adjustment: positively verifying instance profile deletion in test case.
Co-authored-by: Joseph Weitekamp <jweite@amazon.com>
2020-05-27 18:22:06 +01:00
jweite
b7a1b666a8
Corrected bug in IAM delete_role() due to overloading of name 'role' … ( #3019 )
...
* Corrected bug in IAM delete_role() due to overloading of name 'role' in function
* PR-requested fixes: added region to tests boto client create, reformatted with black
Co-authored-by: Joseph Weitekamp <jweite@amazon.com>
2020-05-27 17:00:28 +01:00
zscholl
1f1404352e
use conditional TEST_SERVER_MODE for backend tests
2020-04-30 09:42:22 -05:00
zscholl
0423be259a
remove backend logic & py27 incompatible timezone
2020-04-30 09:10:42 -05:00
zscholl
51e7002cbb
add tests
2020-04-30 09:10:42 -05:00
Owen Farrell
142e237b0b
Made UserName parameter optional for IAM access key functions
2020-01-27 12:12:21 -05:00
Asher Foa
c2e444a210
Update tests.
2019-12-20 10:54:33 -08:00
Asher Foa
1415a93596
Implement List user tags
2019-12-19 19:45:56 -08:00
Fabio Dias
743dd46399
black linting
2019-12-16 21:25:20 -05:00
Fabio Dias
fd9ac4b9a5
ACCOUNT_ID moved to moto.core, MOTO_ACCOUNT_ID env var override
2019-12-16 21:05:29 -05:00
Fabio Dias
b83a750630
Added references to moto.iam.models.ACCOUNT_ID instead of hardcoded id
2019-12-16 19:56:11 -05:00
Barry Allwood
7c1cc01eb9
chore: add MaxSessionDuration to IAM Role
...
fix: Description field is optional on return of IAM Role
2019-11-24 18:19:09 +00:00
Steve Pulec
72da9e96c2
Lint.
2019-11-21 17:53:58 -05:00
Matt Conway
d9c8bdb2a0
Add the ssh_public_key methods that were missing from the IAM implementation
2019-11-18 09:02:32 -05:00
Mike Grima
dab7f9fdad
Merge pull request #2574 from gruebel/add-iam-get-account-summary
...
Add iam.get_account_summary
2019-11-17 15:53:34 -08:00
gruebel
e9c3cba4d6
Fix tests
2019-11-17 14:34:00 +01:00
gruebel
d05ebadce8
Add iam.get_account_summary
2019-11-17 13:47:19 +01:00
Bert Blommers
85570f0abe
IAM - Add Validation on duplicate policy names
2019-11-16 17:36:50 +00:00
Bert Blommers
422bca8e90
IAM - Add Validation on duplicate role names
2019-11-16 17:33:59 +00:00
Mike Grima
3afb93d9db
Merge pull request #2548 from bblommers/feature/implement-iam-delete-group-endpoint
...
Feature/implement iam delete group endpoint
2019-11-15 10:52:21 -08:00
Mike Grima
7ca35514ca
Merge pull request #2542 from ianyon/create_policy_already_exist
...
Added Exception for create_policy when policy exists
2019-11-15 10:38:35 -08:00
Steven Reiling
cd0769af7e
Fix IAM instance profile tracking to reflect AWS's requirement for account-unique names
2019-11-14 17:23:44 -08:00
Bert Blommers
cd5b64b0c5
#2163 - Delete IAM group; Add test case and align error message with AWS
2019-11-08 01:19:45 -08:00
Robin Taylor
876ff476f1
Implementing delete-group endpoint and appropriate test case
2019-11-08 01:12:20 -08:00
Ian Yon
f235fa145e
Added Exception for create_policy when policy exists
2019-11-05 15:57:38 -03:00
gruebel
78e2714496
black format
2019-11-01 07:14:03 +01:00
gruebel
89c43820c9
Add iam.delete_account_password_policy
2019-11-01 07:07:33 +01:00
gruebel
65fa8f1a1b
Add iam.get_account_password_policy
2019-11-01 07:07:32 +01:00
gruebel
06581391bd
Add iam.update_account_password_policy
2019-11-01 07:03:27 +01:00
Asher Foa
96e5b1993d
Run black on moto & test directories.
2019-10-31 10:36:05 -07:00
Jack Danger
00045ae480
Merge branch 'master' into add-iam-virtual-mfa-device
2019-10-22 14:54:10 -07:00
Chris Murton
f0b22fcd2f
Fix absent role deletion, Add more delete_user tests, add no conflict deletion testing
2019-10-22 15:28:59 +01:00
Chris Murton
ccdcb7ca60
Add conflict detection on IAM delete_role and delete_user
2019-10-22 14:27:49 +01:00
gruebel
802fb3baad
Connect user with virtual mfa device
2019-10-21 22:51:00 +02:00
gruebel
1d9382b5e5
Add iam.list_virtual_mfa_devices
2019-10-21 21:48:50 +02:00
gruebel
c80135a6db
Add iam.delete_virtual_mfa_device
2019-10-20 23:03:20 +02:00
gruebel
9671730f16
Add iam.create_virtual_mfa_device
2019-10-20 22:39:57 +02:00
gruebel
3f3feb5bdb
Fix tests
2019-10-19 14:23:35 +02:00
gruebel
cd8027ce9d
Add iam.list_open_id_connect_providers
2019-10-18 21:15:48 +02:00
gruebel
f4af9a1d54
Add iam.delete_open_id_connect_provider
2019-10-18 21:15:48 +02:00
gruebel
c492c5c228
Add iam.get_open_id_connect_provider
2019-10-18 21:15:05 +02:00
gruebel
bd627b65f7
Add iam.create_open_id_connect_provider
2019-10-18 21:15:05 +02:00
Bert Blommers
deffefbfb8
PR changes
2019-10-18 09:18:12 +01:00
Bert Blommers
856a06a778
IAM - Delete Policy implementation
2019-10-17 09:28:19 +01:00
Bruno Oliveira
21933052d3
Fix multiple IAM Policy Statement creation with empty sid
2019-09-10 23:43:50 -03:00
Mike Grima
38866bfcef
Fixed some IAM APIs for tagging and role descriptions
2019-08-21 13:08:33 -07:00
wndhydrnt
67326ace4f
Raise exception if a role policy is not found
2019-07-07 21:46:26 +02:00
Steve Pulec
3bafc89b40
Merge pull request #2268 from acsbendi/policy-version-fixes
...
IAM policy version fixes
2019-07-06 15:52:10 -05:00
acsbendi
48f0c6f194
Fixed format of access key ID and secret access key.
2019-07-04 20:20:08 +02:00
acsbendi
0bd2c5adb4
Fixed minor errors in test.
2019-07-04 20:12:53 +02:00
acsbendi
ef97e0f28f
Extended create_access_key test.
2019-07-04 20:04:27 +02:00
acsbendi
6ac315b903
Fixed broken tests due to policy validation.
2019-07-02 12:24:19 +02:00
Steve Pulec
172e089854
Merge branch 'master' into policy-version-fixes
2019-07-01 20:58:38 -05:00
acsbendi
1bda3f2213
Added tests for valid policy documents.
2019-07-01 18:21:54 +02:00
acsbendi
85efec29b1
Added more tests.
2019-07-01 17:30:59 +02:00
acsbendi
d2b0812edc
Added more tests.
2019-06-30 20:33:17 +02:00
acsbendi
e133344846
Implemented validating action prefixes.
2019-06-30 18:48:27 +02:00
acsbendi
55f9040296
Fixed old unit tests in test_iam that didn't use valid IAM policies.
2019-06-30 17:57:50 +02:00
acsbendi
99336cbe6a
Reorganized tests using a generator method and fixed error messages.
2019-06-30 17:04:02 +02:00
acsbendi
896f7b6eb2
Added more tests.
2019-06-30 16:36:49 +02:00
acsbendi
a4b850aab9
Added test cases for mutually exclusive elements.
2019-06-30 14:03:18 +02:00
acsbendi
f0e9ea4e72
Created tests for policy documents.
2019-06-30 13:47:17 +02:00
acsbendi
3cd373f1f9
Created failing tests.
2019-06-29 18:15:01 +02:00
Bendegúz Ács
ab8a189bbf
Fixed policy version's Document type for AWS managed policies ( #2234 )
...
* Added checking Document's type in AWS managed policy version response.
* Fixed policy version's Document type for AWS managed policies.
2019-06-10 20:00:37 +01:00
Bendegúz Ács
97ab7fd307
Fixes for get_policy and get_policy_version with AWS managed policies ( #2231 )
...
* Created test for get_policy with AWS managed policy.
* Created failing test for get_policy_version with AWS managed policy.
* Updated AWS managed policies.
* Fixed failing tests.
* Fixed trying to compare datetime with string in test case.
* Fixed CreateDate of AWS managed policies overwritten by their version's CreateDate.
* Fixed and improved tests for managed AWS policies.
* Added test for AWS managed policy with v4 default version.
* Fixed not correctly returning dates for AWS managed policies.
2019-06-06 13:36:39 +01:00
Travis Truman
b8ba7980a0
Adding support for specifying a PermissionsBoundary ARN in calls to i… ( #2182 )
...
* Adding support for specifying a PermissionsBoundary ARN in calls to iam.create_role
Closes #2181
* Correcting whitespace error
* Adding support for Role PermissionsBoundary to be returned from
calls to list_roles
* Raise ClientError when a bad permissions boundary ARN is supplied
2019-05-21 17:44:05 +01:00
Chris Opland
dd898add4d
Add test verifying create_role path defaults to /
2019-04-21 18:29:36 -05:00
Mike Grima
5d955985b9
Merge pull request #2106 from andytumelty/iam-update-user
...
Add support for iam update_user
2019-04-17 11:13:14 -07:00
Santosh Ananthakrishnan
4f1a1a9d1e
[iam] create_policy_version: Fix version id calculation
...
When creating a new IAM policy version with create_policy_version,
we cannot use the length of the versions list to calculate VersionId.
Keep track of the next version id to use as a non-decreasing counter.
Fixes #2157
2019-04-16 20:15:57 +00:00
Andy Tumelty
d53626ad9a
Add support for iam update_user
...
This covers both the NewPath and NewUserName parameters for update_user, but
without regex validation for these values.
2019-03-12 17:23:32 +00:00
William Rubel
e9d8021c86
Fixing list entities for policy
2019-02-18 21:20:29 -06:00
William Rubel
ce7b5ebf54
Fix policy date
2019-02-17 21:37:33 -06:00
William Rubel
37a765db8d
Fix policy date
2019-02-17 17:12:27 -06:00
William Rubel
0e73cddf2f
Add test for roles
2019-02-17 16:25:49 -06:00
William Rubel
6e7bd088b3
Add test for roles
2019-02-17 16:04:28 -06:00
William Rubel
31258e9e9e
Add test for roles
2019-02-17 15:23:59 -06:00
William Rubel
37cb5ab4e6
Add test for roles
2019-02-17 14:36:53 -06:00
Mike Grima
94672799cf
Fixed a bug in get_account_authorization_details for attached managed policies.
...
Fixed a bug in the XML template for `get_account_authorization_details` where attached managed policies
were empty strings.
2019-02-07 17:32:31 -08:00
Mike Grima
dfceab9bf0
Some fixes to get_account_authorization_details
2019-02-04 13:44:01 -08:00
Mike Grima
1a36c0c377
IAM Role Tagging support
2019-01-31 17:37:26 -08:00
Steve Pulec
1f9ade61c0
Fix iam SAML tests.
2018-12-29 06:47:16 -05:00
Steve Pulec
25595815e5
Merge pull request #1972 from surfaslt/implement-get-access-key-last-used
...
Implement get_access_key_last_used
2018-12-28 21:08:13 -05:00
Steve Pulec
46bf7f0176
Merge branch 'master' into master
2018-12-28 20:57:47 -05:00
Steve Pulec
c8a35f0b02
Merge pull request #1920 from pall-valmundsson/iam_credential_report_boto3
...
Support IAM Credential Report in boto3
2018-12-28 20:04:59 -05:00
martynaspaulikas
9418a6916d
Fix tests and functionality of get_access_key_last_used()
2018-11-27 16:12:41 +00:00
martynaspaulikas
7189d019df
Implemented get_access_key_last_used
...
Written test that still does not work due to:
ParamValidationError: Parameter validation failed:
Unknown parameter in input: "UserName", must be one of: AccessKeyId
Refactored update_access_key and delete_access_key functions
2018-11-27 11:28:09 +00:00
Joe Engel
57fa11136b
Add functionalities for SAML Providers
2018-11-19 15:53:02 -08:00
Mike Grima
94b5438d76
Added IAM User signing certificate support
2018-11-05 13:15:44 -08:00
Mike Grima
b4b0ae5077
Some IAM fixes.
...
- Fixed InstanceProfiles having `Path` set to `None`.
- Added in some dynamic `CreateDate`s.
- Fixed missing Instance Profile ID's being sent over
2018-11-05 09:24:28 -08:00
Pall Valmundsson
e9f8bec91a
Fix boto3 IAM test function names
2018-11-01 19:58:09 +00:00
Pall Valmundsson
67cb2e25bb
Support IAM Credential Report in boto3
...
Lowercase XML element names in API responses seem to cause issues for boto3.
2018-11-01 19:51:17 +00:00
Mike Grima
8ae1a2b357
Fixes for IAM Groups
2018-10-16 17:14:23 -07:00
Karl Gutwin
5ae5ae0efa
Correct deviation in behavior of policy versions from standard API
2018-08-07 17:24:15 -04:00
Karl Gutwin
9e667d6b25
Add get_policy IAM action
2018-08-07 16:59:15 -04:00
Will Bengtson
a420064621
IAM get account authorization details ( #1736 )
...
* start of get_account_authorization_details for iam
* add get_account_authorization_details dynamic template
* remove old commented out template
* Fix flake8 problems and add unit test
2018-08-07 10:31:36 -07:00
Nathan Mische
ff80ecb56d
Adding account id to ManagedPolicy ARN
2018-07-17 13:31:18 -04:00
Brian Pandola
350cf9257e
Add update_access_key endpoint ( #1423 )
2018-01-10 18:29:08 -05:00
David Bartle
52ce8d378f
IAM delete_server_certificate ( #1380 )
...
* IAM delete_server_certificate
* flake8 fixes
2017-12-08 10:43:09 +00:00
Jack Danger
353f8387a2
implementing detach_group_policy
2017-10-01 15:05:33 -07:00