Commit Graph

2788 Commits

Author SHA1 Message Date
Don Kuntz
c8d8aa4dd0
Add glue.batch_get_partition endpoint 2019-07-17 14:11:34 -05:00
acsbendi
c8abd43c88 Implemented creating autoscaling group from instance. 2019-07-17 20:58:23 +02:00
Jongseok Choi
5d91ce20fc Fix 'MaxRecords' type issues by _get_param()
It alternates _get_param() with _get_int_param() on parsing the
parameter 'MaxRecords'.
2019-07-18 03:09:53 +09:00
Carlos Aguado
19fef76a5f Fix moto_server handling of unsigned requests
Certain AWS requests are unsigned. Moto in standalone server mode
implements an heuristic to deduce the endpoint and region based on the
X-Amz-Target HTTP header. This commit extends this concept to add
additional endpoints that used unsigned requests at times.
2019-07-17 09:25:14 +10:00
acsbendi
95799b99bc Fixed incorrect authentication error handling in S3. 2019-07-16 16:27:50 +02:00
Berislav Kovacki
1b3157ced0 Handle change of ASG desired capacity on min and max size update
A change in UpdateAutoScalingGroup:
* if a value for MinSize is specified without specifying a value for
DesiredCapacity, and the new MinSize is larger than the current size of
the group, set the group's DesiredCapacity to the new MinSize value
* if a value for MaxSize is specified without specifying a value for
DesiredCapacity, and the new MaxSize is smaller than the current size of
the group, set the group's DesiredCapacity to the new MaxSize value
2019-07-16 09:12:03 +02:00
Steve Pulec
6bc07360a1
Merge pull request #2313 from caguado/fix/2312
Implement assume_role_with_web_identity
2019-07-15 23:08:23 -05:00
Steve Pulec
d1e057ecab
Merge pull request #2309 from caguado/fix/2308
Implement update_user_pool_domain
2019-07-15 22:46:26 -05:00
Carlos Aguado
e54f74776b Implement assume_role_with_web_identity
The AssumeRoleWithWebIdentity is a similar endpoint to STS's AssumeRole
where the authentication element is a JWT id_token from a configured OP.
This commit implements the functionality and relies on the same result
generated for the regular AssumeRole.
2019-07-16 13:27:47 +10:00
Carlos Aguado
7c17fcd21d Implement get_open_id_token
Introduce the CognitoIdentity's GetOpenIDToken endpoint to retrieve a
JWT tuple from Cognito's Identity Pool for a given IdentityId.
2019-07-16 13:20:31 +10:00
Steve Pulec
9acdc59aa4
Merge pull request #2291 from spulec/context-manager-return-mock
Have context manager return mock.
2019-07-15 22:09:19 -05:00
Carlos Aguado
81980850d4 Implement update_user_pool_domain
Introduce the CognitoIDP's UpdateUserPoolDomain to update configuration
options of the associated domain to a Cognito IDP (e.g. ACM certificate).
2019-07-16 13:09:13 +10:00
Steve Pulec
25ab3afc31
Merge pull request #2295 from garrettheel/condition-expr-or-evaluation
dynamodb2: Defer evaluation of the OR RHS in condition expr
2019-07-15 20:46:11 -05:00
Steve Pulec
ef4f7e1ecc
Merge pull request #2307 from efiop/master
moto: s3: support partNumber for head_object
2019-07-15 20:33:21 -05:00
Steve Pulec
67b3d07e5d
Merge pull request #2306 from bkovacki/extend-describe-network-interface-filter
Extend EC2 DescribeNetworkInterface filter support
2019-07-15 20:30:22 -05:00
Steve Pulec
3ad72a9871
Merge pull request #2299 from bkovacki/rds-vpc-security-groups-set-update
Add support for VpcSecurityGroups set/update in RDS
2019-07-15 20:19:36 -05:00
Steve Pulec
3a92d0f016
Merge pull request #2305 from jakzo/fix-id-generation
Fix ID generation
2019-07-15 20:04:22 -05:00
Ruslan Kuprieiev
2c2dff22bc moto: s3: support partNumber for head_object
To support it, we need to keep multipart info in the key itself when
completing multipart upload.

Fixes #2154

Signed-off-by: Ruslan Kuprieiev <ruslan@iterative.ai>
2019-07-15 20:47:29 +03:00
Steve Pulec
86e650ff01 Set version to 1.3.14.dev. 2019-07-14 22:30:09 -05:00
Steve Pulec
cf95313b39 Disable non-prereleases; prep for 1.3.13. 2019-07-14 21:14:20 -05:00
Steve Pulec
57136a5f1b Prep for release 1.3.12 2019-07-14 20:39:57 -05:00
Berislav Kovacki
e67e2deee4 Extend EC2 DescribeNetworkInterface filter support
* add description property to EC2 NetworkInterface
* extend DescribeNetworkInterfaces filter support with description,
subnet-id, private-ip-address attributes
2019-07-15 00:01:37 +02:00
jakzo
9633917aec Fix ID generation 2019-07-14 16:37:54 +00:00
acsbendi
1b8179992e GetUser returns the IAM user who owns the access key in the request. 2019-07-13 15:58:34 +02:00
acsbendi
7db2d0f38c Use abc in a python2-compatible way. 2019-07-13 15:12:21 +02:00
acsbendi
7b096d690f Replaced print with log.debug. 2019-07-13 15:04:41 +02:00
acsbendi
de01adec57 Fixed linting errors. 2019-07-13 14:58:42 +02:00
acsbendi
419fcf2ee9 Merge branch 'master' of https://github.com/spulec/moto into spulec-master 2019-07-13 13:43:19 +02:00
Berislav Kovacki
4ed189c454 Add support for VpcSecurityGroups set/update in RDS 2019-07-13 08:19:23 +02:00
Berislav Kovacki
4fd0b5c710 Add support for OptionGroupName in create_db_instance 2019-07-11 22:43:42 +02:00
Garrett Heel
0093a7992f dynamodb2: Defer evaluation of the OR RHS in condition expr 2019-07-11 08:29:07 -04:00
acsbendi
9d992c9335 Fixed error on single (non-list) Statements. 2019-07-11 14:22:42 +02:00
acsbendi
59f091bdea Default INITIAL_NO_AUTH_ACTION_COUNT should be infinity. 2019-07-11 13:58:57 +02:00
Mariusz Strzelecki
f32db6e64a Raising MalformedXML exception when using boto3 client and s3.delete_objects() 2019-07-11 09:53:23 +02:00
Steve Pulec
108dc6b049 Prep for 1.3.11 2019-07-10 22:18:24 -05:00
Steve Pulec
ab67c1b26e 1.3.10 2019-07-10 22:04:31 -05:00
Steve Pulec
b19c201975 Cleanup model ref resetting. 2019-07-10 21:16:11 -05:00
acsbendi
bec0c5a273 Fixed S3 actions not handled properly. 2019-07-10 20:42:23 +02:00
Steve Pulec
308712841c Have context manager return mock. 2019-07-09 20:31:43 -05:00
Steve Pulec
12aa5dddf7
Merge pull request #2289 from spulec/fix-2275
Fix for UpdateExpression with newline. Closes #2275.
2019-07-09 19:58:32 -05:00
Steve Pulec
6a13d54616
Merge pull request #2266 from garrettheel/feat/dynamodb-expressions
Improve DynamoDB condition expression support
2019-07-09 18:22:55 -05:00
Steve Pulec
53f8997d62 Fix for UpdateExpression with newline. Closes #2275. 2019-07-09 18:21:00 -05:00
acsbendi
947e26ce1b Removed unused exception. 2019-07-09 19:46:04 +02:00
acsbendi
1df4e8da2f Fixed bugs in processing policies belonging to assumed roles. 2019-07-09 19:44:23 +02:00
Garrett Heel
ba95c945f9 remove dead code 2019-07-09 09:20:35 -04:00
Steve Pulec
d758952d84
Merge pull request #2287 from bkovacki/add-instance-create-time-to-db-instance
Add InstanceCreateTime to DBInstance
2019-07-08 19:43:07 -05:00
Berislav Kovacki
c51ce76ee9 Add InstanceCreateTime to DBInstance 2019-07-09 02:10:33 +02:00
Steve Pulec
7bb2b9dc8c
Merge pull request #2016 from adriangalera/ses->sns
Enable SES feedback via SNS
2019-07-08 19:00:58 -05:00
Steve Pulec
a9ec1c7ee7
Merge pull request #2082 from markchalloner/mark-alias-target
Fix route53 alias response.
2019-07-08 18:27:22 -05:00
Steve Pulec
841eaf3886
Merge pull request #2286 from acsbendi/assume-role-fix
AssumeRole returns randomly generated credentials.
2019-07-08 18:23:15 -05:00
Steve Pulec
8c61bce1a2
Merge pull request #2276 from aakhan-sep/master
Implement If-Modified-Since in GET Object for S3 Bucket
2019-07-08 18:22:44 -05:00
acsbendi
23957fe940 Implemented finding credentials from already created IAM users and roles. 2019-07-08 19:57:14 +02:00
Steve Pulec
8b2ddb7579
Merge pull request #2156 from william-richard/set-lambda-function-physical-resource-id
Set lambda function physical resource id
2019-07-08 10:32:55 -05:00
Bendegúz Ács
4ccf48e46b
Merge pull request #8 from acsbendi/assume-role-fix
AssumeRole returns randomly generated credentials.
2019-07-08 17:06:08 +02:00
acsbendi
ab0d23a0ba AssumeRole returns randomly generated credentials. 2019-07-08 16:32:25 +02:00
acsbendi
e64d1c1790 Merged upstream master 2019-07-08 13:40:19 +02:00
Steve Pulec
414ff930ed
Merge branch 'master' into mark-alias-target 2019-07-07 23:11:53 -05:00
Steve Pulec
ac33845367
Merge pull request #2070 from bkovacki/add-attributes-parameter-for-sns-create_topic-api
Add attributes parameter support for sns create_topic API
2019-07-07 23:04:40 -05:00
Steve Pulec
d7af2870f8
Merge pull request #2243 from hjarrell/master
Add CreateDate to iam list_groups_for_user.
2019-07-07 23:02:29 -05:00
Steve Pulec
8d06e6e93d
Merge branch 'master' into set-lambda-function-physical-resource-id 2019-07-07 23:00:26 -05:00
Steve Pulec
79cd1e609c Move env variable mocking and undo when stopping. CC #2058, #2172. 2019-07-07 22:32:46 -05:00
Steve Pulec
6efd5582d7
Merge pull request #2284 from wndhydrnt/fix-iam-get-role-policy-not-found
Raise exception if a role policy is not found
2019-07-07 21:23:44 -05:00
Steve Pulec
4e6eb25512
Merge pull request #2274 from corydolphin/failing-test
Adds failing test for socket.socketpair()
2019-07-07 21:18:46 -05:00
wndhydrnt
67326ace4f Raise exception if a role policy is not found 2019-07-07 21:46:26 +02:00
Steve Pulec
af0205b6a3 Fix wrong tag for cloudwatch metrics response. Closes #2267. 2019-07-06 17:40:36 -05:00
Steve Pulec
574055da2c
Merge pull request #2245 from vrtdev/bugfix/r53-delete-type
Route53 Delete: respect the given Type
2019-07-06 17:29:19 -05:00
Steve Pulec
3bafc89b40
Merge pull request #2268 from acsbendi/policy-version-fixes
IAM policy version fixes
2019-07-06 15:52:10 -05:00
Steve Pulec
04f8446a93
Merge pull request #2280 from acsbendi/create-access-key-fix
Create access key fix
2019-07-06 15:40:12 -05:00
Bendegúz Ács
a516d46790
Merge pull request #5 from acsbendi/describe-instance-attribute-fix
Describe instance attribute fix
2019-07-05 17:12:41 +02:00
Bendegúz Ács
5594195e28
Merge branch 'master' into create-access-key-fix 2019-07-05 17:11:55 +02:00
Bendegúz Ács
b0aab6fb15
Fixed a linting error. 2019-07-05 15:32:22 +02:00
acsbendi
7de0ef0f8b Fixed value is present in response even if it's None. 2019-07-05 15:24:16 +02:00
acsbendi
0b88dd1efb Fixed security group IDs not returned correctly. 2019-07-05 15:12:38 +02:00
acsbendi
9e6152588a Fixed attributes missing from Instance. 2019-07-05 14:31:46 +02:00
acsbendi
9623e8a10c Implemented raising error if the attribute is invalid. 2019-07-05 14:09:58 +02:00
acsbendi
48f0c6f194 Fixed format of access key ID and secret access key. 2019-07-04 20:20:08 +02:00
acsbendi
9382c40c37 Return CreateDate in CreateAccessKey response. 2019-07-04 20:13:38 +02:00
Bendegúz Ács
9684e1b638
Abstract methods raise NotImplementedError 2019-07-04 17:18:12 +02:00
acsbendi
8de3bdcf29 Fixed printing IAM request class' name. 2019-07-04 16:48:44 +02:00
acsbendi
86758182a7 Removed print. 2019-07-04 16:42:11 +02:00
acsbendi
5dbec8aee5 Implemented checking if S3 action is permitted. 2019-07-04 16:38:53 +02:00
Jack Danger
f6dd3ab959
not requiring the provisioned throughput key (#2278) 2019-07-04 03:13:25 -07:00
Cory Dolphin
f11a5dcf6b Fix socket.fakesock compatibility 2019-07-03 11:26:33 -07:00
Aden Khan
b2adbf1f48 Adding the functionality and test so that the If-Modified-Since header is honored in GET Object
Signed-off-by: Aden Khan <aakhan@sep.com>
2019-07-03 14:25:08 -04:00
acsbendi
7ec8f85438 Implemented recognizing asterisks in Actions in policy statements. 2019-07-02 19:24:45 +02:00
acsbendi
6061d5d521 Introduced environment variable to delay the start of authorization. 2019-07-02 18:03:00 +02:00
acsbendi
fbd0749854 Implemented authentication for services except for S3. 2019-07-02 17:40:08 +02:00
Steve Pulec
75d9707e8e
Merge pull request #2099 from ssoulier/master
fix bug in Stream init (wrong number of shards)
2019-07-01 22:27:33 -05:00
Steve Pulec
d46324e7fd
Merge pull request #2241 from vrtdev/bugfix/route53-list-start
route53.list_resource_record_sets() with StartRecordName= behaves different from real service
2019-07-01 21:58:16 -05:00
Steve Pulec
c8b94b6e9f
Merge pull request #2265 from IVIURRAY/bugfix/scan-projection
ProjectionExpression works with table.scan()
2019-07-01 21:21:53 -05:00
Steve Pulec
3920ff0c9a
Merge pull request #2236 from dkuntz2/glue-endpoints
Add glue.delete_partition and glue.batch_delete_partition
2019-07-01 21:16:36 -05:00
Steve Pulec
176799637c
Merge pull request #2247 from queue-tip/ecr-batch-delete-image-fix
Delete ECR image when it has no tags
2019-07-01 21:09:52 -05:00
Steve Pulec
8a5ccf7dee
Merge pull request #2251 from acsbendi/random_suffix_fix
Fixed random_suffix()
2019-07-01 21:03:36 -05:00
Steve Pulec
29c3bc30d6
Merge pull request #2262 from abruehl/cf_limit_implicit_nlb_names_to_32_char
ELBv2 LBs names must be 32 char or shorter
2019-07-01 21:01:57 -05:00
Steve Pulec
172e089854
Merge branch 'master' into policy-version-fixes 2019-07-01 20:58:38 -05:00
Steve Pulec
7f21074991
Merge pull request #2269 from acsbendi/policy-validation
IAM policy document validation
2019-07-01 20:56:52 -05:00
acsbendi
e9dfa890f4 Fixed linting errors. 2019-07-01 19:07:22 +02:00
Bendegúz Ács
ca9c1a366e
Merge branch 'master' into policy-validation 2019-07-01 19:02:49 +02:00
acsbendi
37bdc12f4d Fixed linting errors. 2019-07-01 18:58:31 +02:00
acsbendi
ed2682582f Policy validation precedes finding policy for create_policy_version. 2019-07-01 18:54:32 +02:00
acsbendi
c46857e3d3 Fixed errors for valid policy documents. 2019-07-01 18:22:31 +02:00
acsbendi
fef22879c5 Implemented legacy validation (parsing). 2019-07-01 17:31:12 +02:00
Steve Pulec
c4da5632ab Bump version number for next release. 2019-06-30 23:18:14 -05:00
acsbendi
81098e3453 Implemented every validation point except for legacy parsing. 2019-06-30 20:34:01 +02:00
acsbendi
e133344846 Implemented validating action prefixes. 2019-06-30 18:48:27 +02:00
acsbendi
50745fc5c0 Fixed resource exist validation and implemented actions exist validation. 2019-06-30 18:00:16 +02:00
acsbendi
4748c6b073 Enabled validating policies for all operations similar to CreatePolicy. 2019-06-30 17:35:26 +02:00
acsbendi
ef20b47f97 Implemented checking policy documents for syntax errors. 2019-06-30 17:09:55 +02:00
acsbendi
c799b1a122 Fixed being able to create more than 5 policy versions. 2019-06-29 19:01:43 +02:00
acsbendi
6f5948af33 Fixed is_default is not reset on old default version. 2019-06-29 18:55:19 +02:00
acsbendi
ed01ceddc8 Fixed IsDefaultVersion value returned with an uppercase first letter. 2019-06-29 18:29:18 +02:00
IVIURRAY
cd666758f6 one liner 2019-06-27 20:13:36 +01:00
IVIURRAY
4ce0e6bbcb add extra test for ProjectionExpression using scan with ExpressionAttributes 2019-06-27 19:37:46 +01:00
Garrett Heel
467f669c1e add test for attr doesn't exist 2019-06-27 11:49:08 -04:00
Matthew Stevens
6303d07bac Fixing tests 2019-06-26 23:20:55 +01:00
Matthew Stevens
9450328527 Deleting unnecessary dynamodb2 file 2019-06-26 23:20:55 +01:00
Matthew Stevens
57b668c832 Using Ops for dynamodb condition expressions 2019-06-26 23:20:55 +01:00
Matthew Stevens
2712654518 Using Ops for dynamodb expected dicts 2019-06-26 23:20:55 +01:00
Matthew Stevens
1a2fc66f84 Adding dynamodb2 expression parser and fixing test cases 2019-06-26 23:20:16 +01:00
IVIURRAY
e50ce7287d ProjectionExpression works with table.scan() 2019-06-26 21:54:48 +01:00
Adam Bruehl
7cc1afa25f ELBv2 LBs names must be 32 char or shorter 2019-06-26 11:56:17 -04:00
Bendegúz Ács
e0078a781a
Fixed random_suffix() 2019-06-18 15:27:07 +02:00
Niels Laukens
5f46aa8c50
Reduced readability to please flake8 2019-06-18 11:04:19 +02:00
Niels Laukens
a5d1b22534
Fix CloudFormation usage 2019-06-18 11:04:03 +02:00
Juan Martinez
9a26c92e72 Delete ECR image when it has no tags
This is a bug fix to my initial work when implementing
batch_delete_image. Deleting the last tag for a given image should
delete the image from the backend.

I also cleaned up the tests previously-added in the initial
implementation.
2019-06-17 13:41:35 -04:00
Niels Laukens
6e97881896
Route53 Delete: respect the given Type 2019-06-17 15:53:32 +02:00
Hunter Jarrell
bb44af2ccf Add CreateDate to iam list_groups_for_user.
Add the CreateDate field to the list_groups_for_user to match the
correct AWS response. Fixes #2242
2019-06-14 15:50:37 -04:00
Niels Laukens
9ef69a617a
Route53 get_record_sets: sort names lexicographically 2019-06-14 17:07:59 +02:00
Niels Laukens
a9319fad04
Route53 get_record_sets: filter type after name
According to the documentation [1], name should be filtered first,
followed by type.

> If you specify both Name and Type
> The results begin with the first resource record set in the list
> whose name is greater than or equal to Name, and whose type is
> greater than or equal to Type.

[1]: https://docs.aws.amazon.com/Route53/latest/APIReference/API_ListResourceRecordSets.html
2019-06-14 16:15:14 +02:00
Don Kuntz
df2d2ac6b4 Add endpoints to glue for deleting partitions
Specifically add glue.delete_partition and glue.batch_delete_partition.
2019-06-11 14:32:50 -05:00
Don Kuntz
df493ea18d Add glue.batch_delete_table, and fix glue.batch_create_partition to respond correctly (#2233)
* Fix glue.batch_create_partition to only respond with Errors if Errors occurred

* Add glue.batch_delete_table endpoint

* Remove unused variable
2019-06-10 20:14:30 +01:00
Bendegúz Ács
ab8a189bbf Fixed policy version's Document type for AWS managed policies (#2234)
* Added checking Document's type in AWS managed policy version response.

* Fixed policy version's Document type for AWS managed policies.
2019-06-10 20:00:37 +01:00
Don Kuntz
3833449b36 Add batch_create_partition endpoint to Glue client (#2232)
* Add batch_create_partition endpoint to Glue client

* Remove exception as e from glue batch_create_partition, because it's unused
2019-06-07 09:28:10 +01:00
Bendegúz Ács
97ab7fd307 Fixes for get_policy and get_policy_version with AWS managed policies (#2231)
* Created test for get_policy with AWS managed policy.

* Created failing test for get_policy_version with AWS managed policy.

* Updated AWS managed policies.

* Fixed failing tests.

* Fixed trying to compare datetime with string in test case.

* Fixed CreateDate of AWS managed policies overwritten by their version's CreateDate.

* Fixed and improved tests for managed AWS policies.

* Added test for AWS managed policy with v4 default version.

* Fixed not correctly returning dates for AWS managed policies.
2019-06-06 13:36:39 +01:00
Juan Martinez
ed93821621 Set ECR imagePushedAt to current date and time (#2229) 2019-06-06 13:34:10 +01:00
Pall Valmundsson
d25a7ff936 Uniform IAM datetime ISO 8601 handling (#2169)
`str(datetime.utcnow())` returns a timestamp that's not of the same
format as the AWS SDK uses, in short it's missing the `T` between the
date and the time.

This causes issues for e.g. Terraform and probably other AWS Go SDK
users. There seems to be some differences between endpoints whether they
return milliseconds or not, the AWS API docs were reviewed and the
decision whether to return timestamps with milliseconds or not based on
the example response documented.

As the timstamps are generated for uniqueness rather than being
hardcoded and then directly cast to a UTC (Z) formed timestamp pytz was
removed as timezone correctness is probably not important.
2019-06-02 19:18:50 +01:00
Elliott Butler
9bd15b5a09
Fix route53 alias response.
This commit
* includes the work by @elliotmb in #1694,
* removes the AliasTarget.DNSName copy into a RecordSet.Value,
* fixes and adds tests.
2019-05-31 10:54:18 +01:00
Juan Martinez
664b27d8e7 Implement ECR batch_delete_image (#2225)
This implements the endpoint in spulec #2224
2019-05-30 18:16:19 +01:00
Bendegúz Ács
8f53b16b9a Updates to create_subnet and describe_subnets responses (#2053)
* Removed Tags field from create_subnet response.

* Added DefaultForAz to create_subnet response.

* Added MapPublicIpOnLaunch to create_subnet response.

* Added OwnerId to create_subnet response.

* Added AssignIpv6AddressOnCreation field for create_subnet and describe_subnet and implemented setting it in modify_subnet_attribute.

* Added SubnetArn to create_subnet response.

* Added AvailabilityZoneId to create_subnet and describe_subnet responses, and error for invalid availability zone.

* Added Ipv6CidrBlockAssociationSet to create_subnet response.

* Added missing fields to describe_subnets response.

* Added myself to list of contributors and marked describe_subnet as implemented.

* Fixed linting errors.

* Fixed blank line containing a tab.

* Fixed accidentally deleted ).

* Fixed broken tests.
2019-05-28 16:33:25 +01:00
A
2386d47fe3 SecretsManager secret value binary support (#2222) 2019-05-28 16:32:43 +01:00
Bendegúz Ács
21917c4b93 Bug fix for default network ACL entries (#2056)
* Fixed a bug where default network ACL entries could not be deleted.

* Implemented throwing error when a network entry with the same rule number and egress value already exists.

* Fixed syntax errors.

* Added socket.timeout to possibly raised exceptions in wait_for for Python 3.
2019-05-26 02:02:14 +01:00
Alexander Mohr
7271fb9391 Fix S3 backend operations with VersionId (#2055)
* fix s3 issues

* fix merge conflict

* fix and add test cases
2019-05-25 20:19:33 +01:00
Bendegúz Ács
f408709ef9 VPC IPv4 validation (#2026)
* Implemented throwing invalid subnet range error and fixed breaking tests.

* Implemented throwing invalid CIDR block parameter error for vpcs and subnets.

* Implemented throwing invalid destination CIDR block error.

* IPv6 addresses not accepted, strict checking disabled.

* Implemented throwing invalid subnet conflict error and fixed breaking tests.

* Implemented throwing invalid VPC range error and fixed breaking tests.

* Fixed accidentally removed ).

* Fixed test case trying to create two subnets with the same CIDR range.
2019-05-25 18:35:07 +01:00
Garrett
c739c5331e Handle UnicodeEncodeError when parsing querystring (#2170) 2019-05-25 18:34:47 +01:00
Adam Hodges
71f83d7e4f Add support for IoT register_certificate (#1827) 2019-05-25 18:30:23 +01:00
Jordan Sanders
4cce4defac Support CustomAmiId in EMR (#2037) 2019-05-25 11:19:26 +01:00
Gregory Bataille
d952410965 1987 support transfer acceleration (#2018)
* chore(): remove executable flag on moto/s3/response.py

* chore(): ignore .eggs temp file

* feat(#1987): get bucket acceleration support

* feat(#1987): put bucket acceleration support

* feat(#1987): suspend undefined bucket is a no-op

* feat(#1987): validate accelerate_configuration status

* feat(#1987): bucket containing dots do not support acceleration

* doc(#1987): update implementation coverage
2019-05-25 11:19:00 +01:00
William Richard
1b91534165 Add support for redirect actions on ELBv2 listeners (#2029) 2019-05-25 11:18:39 +01:00
David
868d0107bf Autoscaling instance azs (#2030)
* Add instance AZ support in autoscaling

* Resolve py36-py27 format string error in test_autoscaling
2019-05-25 11:18:16 +01:00
Daniel Miranda
fb2a76fd66 ec2: add support for creation and importing of real SSH keys (#2108)
* ec2: add support for creation and importing of real SSH keys

* setup: lock PyYAML version to avoid incompatibilities
2019-05-25 11:17:52 +01:00