Commit Graph

85 Commits

Author SHA1 Message Date
Bendegúz Ács
ab8a189bbf Fixed policy version's Document type for AWS managed policies (#2234)
* Added checking Document's type in AWS managed policy version response.

* Fixed policy version's Document type for AWS managed policies.
2019-06-10 20:00:37 +01:00
Bendegúz Ács
97ab7fd307 Fixes for get_policy and get_policy_version with AWS managed policies (#2231)
* Created test for get_policy with AWS managed policy.

* Created failing test for get_policy_version with AWS managed policy.

* Updated AWS managed policies.

* Fixed failing tests.

* Fixed trying to compare datetime with string in test case.

* Fixed CreateDate of AWS managed policies overwritten by their version's CreateDate.

* Fixed and improved tests for managed AWS policies.

* Added test for AWS managed policy with v4 default version.

* Fixed not correctly returning dates for AWS managed policies.
2019-06-06 13:36:39 +01:00
Travis Truman
b8ba7980a0 Adding support for specifying a PermissionsBoundary ARN in calls to i… (#2182)
* Adding support for specifying a PermissionsBoundary ARN in calls to iam.create_role

Closes #2181

* Correcting whitespace error

* Adding support for Role PermissionsBoundary to be returned from
calls to list_roles

* Raise ClientError when a bad permissions boundary ARN is supplied
2019-05-21 17:44:05 +01:00
Chris Opland
dd898add4d Add test verifying create_role path defaults to / 2019-04-21 18:29:36 -05:00
Mike Grima
5d955985b9
Merge pull request #2106 from andytumelty/iam-update-user
Add support for iam update_user
2019-04-17 11:13:14 -07:00
Santosh Ananthakrishnan
4f1a1a9d1e [iam] create_policy_version: Fix version id calculation
When creating a new IAM policy version with create_policy_version,
we cannot use the length of the versions list to calculate VersionId.
Keep track of the next version id to use as a non-decreasing counter.

Fixes #2157
2019-04-16 20:15:57 +00:00
Andy Tumelty
d53626ad9a Add support for iam update_user
This covers both the NewPath and NewUserName parameters for update_user, but
without regex validation for these values.
2019-03-12 17:23:32 +00:00
William Rubel
e9d8021c86 Fixing list entities for policy 2019-02-18 21:20:29 -06:00
William Rubel
ce7b5ebf54 Fix policy date 2019-02-17 21:37:33 -06:00
William Rubel
37a765db8d Fix policy date 2019-02-17 17:12:27 -06:00
William Rubel
0e73cddf2f Add test for roles 2019-02-17 16:25:49 -06:00
William Rubel
6e7bd088b3 Add test for roles 2019-02-17 16:04:28 -06:00
William Rubel
31258e9e9e Add test for roles 2019-02-17 15:23:59 -06:00
William Rubel
37cb5ab4e6 Add test for roles 2019-02-17 14:36:53 -06:00
Mike Grima
94672799cf Fixed a bug in get_account_authorization_details for attached managed policies.
Fixed a bug in the XML template for `get_account_authorization_details` where attached managed policies
were empty strings.
2019-02-07 17:32:31 -08:00
Mike Grima
dfceab9bf0 Some fixes to get_account_authorization_details 2019-02-04 13:44:01 -08:00
Mike Grima
1a36c0c377 IAM Role Tagging support 2019-01-31 17:37:26 -08:00
Steve Pulec
1f9ade61c0 Fix iam SAML tests. 2018-12-29 06:47:16 -05:00
Steve Pulec
25595815e5
Merge pull request #1972 from surfaslt/implement-get-access-key-last-used
Implement get_access_key_last_used
2018-12-28 21:08:13 -05:00
Steve Pulec
46bf7f0176
Merge branch 'master' into master 2018-12-28 20:57:47 -05:00
Steve Pulec
c8a35f0b02
Merge pull request #1920 from pall-valmundsson/iam_credential_report_boto3
Support IAM Credential Report in boto3
2018-12-28 20:04:59 -05:00
martynaspaulikas
9418a6916d Fix tests and functionality of get_access_key_last_used() 2018-11-27 16:12:41 +00:00
martynaspaulikas
7189d019df Implemented get_access_key_last_used
Written test that still does not work due to:
    ParamValidationError: Parameter validation failed:
    Unknown parameter in input: "UserName", must be one of: AccessKeyId
Refactored update_access_key and delete_access_key functions
2018-11-27 11:28:09 +00:00
Joe Engel
57fa11136b Add functionalities for SAML Providers 2018-11-19 15:53:02 -08:00
Mike Grima
94b5438d76 Added IAM User signing certificate support 2018-11-05 13:15:44 -08:00
Mike Grima
b4b0ae5077 Some IAM fixes.
- Fixed InstanceProfiles having `Path` set to `None`.
- Added in some dynamic `CreateDate`s.
- Fixed missing Instance Profile ID's being sent over
2018-11-05 09:24:28 -08:00
Pall Valmundsson
e9f8bec91a Fix boto3 IAM test function names 2018-11-01 19:58:09 +00:00
Pall Valmundsson
67cb2e25bb Support IAM Credential Report in boto3
Lowercase XML element names in API responses seem to cause issues for boto3.
2018-11-01 19:51:17 +00:00
Mike Grima
8ae1a2b357 Fixes for IAM Groups 2018-10-16 17:14:23 -07:00
Karl Gutwin
5ae5ae0efa Correct deviation in behavior of policy versions from standard API 2018-08-07 17:24:15 -04:00
Karl Gutwin
9e667d6b25 Add get_policy IAM action 2018-08-07 16:59:15 -04:00
Will Bengtson
a420064621 IAM get account authorization details (#1736)
* start of get_account_authorization_details for iam

* add get_account_authorization_details dynamic template

* remove old commented out template

* Fix flake8 problems and add unit test
2018-08-07 10:31:36 -07:00
Nathan Mische
ff80ecb56d Adding account id to ManagedPolicy ARN 2018-07-17 13:31:18 -04:00
Brian Pandola
350cf9257e Add update_access_key endpoint (#1423) 2018-01-10 18:29:08 -05:00
David Bartle
52ce8d378f IAM delete_server_certificate (#1380)
* IAM delete_server_certificate

* flake8 fixes
2017-12-08 10:43:09 +00:00
Jack Danger
353f8387a2 implementing detach_group_policy 2017-10-01 15:05:33 -07:00
Jack Danger
cdb1ebf666 pep8 fixes 2017-10-01 15:02:06 -07:00
Jack Danger
9f02a84d8d test attaching group policies 2017-10-01 15:02:00 -07:00
Jack Danger
8f2f7fa20d Adding a script to import all of AWS' managed policies
fixes #1118
2017-09-19 14:01:08 -07:00
Toshiya Kawasaki
ee4ca0c39a Support IAM account alias (#1088) 2017-09-07 11:21:44 -07:00
Brian Pandola
bca5047202 Implement additional IAM endpoints
- attach_user_policy
- detach_user_policy
- list_attached_user_policies
2017-08-14 13:55:53 -07:00
David Cuthbert
672604d3e7 Add support for iam:DetachRolePolicy and iam:DeleteRolePolicy. (#1052)
* Add support for iam:DetachRolePolicy and iam:DeleteRolePolicy.

* Raise proper exceptions for iam:DetachRolePolicy and iam:DeleteRolePolicy when the policy doesn't exist.
2017-08-13 21:58:11 -07:00
Jack Danger
e445c81e83 Implement IAM {update,get}_login_profile 2017-07-27 14:22:25 -07:00
Jack Danger Canty
15d3397a60 implementing IAM delete_role
Fixes #957
2017-05-19 16:23:42 -07:00
Jack Danger
6ff8d500e5 Merge pull request #946 from heddle317/add_policy_version
Add policy version
2017-05-15 15:10:49 -07:00
Kate Heddleston
992b475093 testing create, get, list, delete policy versions 2017-05-15 14:56:30 -07:00
graham-hargreaves
835fe2d742 Update list IAM AccessKeys
Add the creation date, including timezone info, to the data returned
when requesting all AccessKeys for an IAM user.

This fixes #75
2017-05-07 16:31:26 +01:00
Sean Marlow
9a2f2fcd4b
Add list user policies endpoint to iam backend.
- Add response and endpoint methods.
- Add test covering put, get, delete and list user policy.
2017-04-13 15:09:23 -06:00
Sean Marlow
8b9d685f1c
Add mfa device endpoints to iam backend.
- Add mfa device class
- Add mfa devices dictionary to user class
- Add responses, endpoints and tests
2017-03-27 13:13:40 -06:00
Steve Pulec
2d05f8a79a Add functionality for iam get-user with current user. Closes #480. 2017-03-19 11:09:30 -04:00