Commit Graph

147 Commits

Author SHA1 Message Date
Bert Blommers
9163f04292 Linting 2020-03-11 13:19:40 +00:00
Luis Pollo
20364b177a Fix IAM role name when parsed from CloudFormation JSON. 2020-03-11 13:17:35 +00:00
Asher Foa
1415a93596 Implement List user tags 2019-12-19 19:45:56 -08:00
Fabio Dias
fd9ac4b9a5 ACCOUNT_ID moved to moto.core, MOTO_ACCOUNT_ID env var override 2019-12-16 21:05:29 -05:00
Fabio Dias
fb9ebe5a47 linting fixes 2019-12-16 19:56:11 -05:00
Fabio Dias
b83a750630 Added references to moto.iam.models.ACCOUNT_ID instead of hardcoded id 2019-12-16 19:56:11 -05:00
Mike Grima
8e2e3cec5a
Merge pull request #2597 from ballwood/master
Add MaxSessionDuration field to IAM Role, Remove Description field from response if empty
2019-12-14 13:47:28 -08:00
Barry Allwood
d0def85eb6 fix: lint 2019-11-24 19:07:53 +00:00
Barry Allwood
549bf7a2e2 fix: creating of IAM roles in cf templates 2019-11-24 18:42:36 +00:00
Barry Allwood
7c1cc01eb9 chore: add MaxSessionDuration to IAM Role
fix: Description field is optional on return of IAM Role
2019-11-24 18:19:09 +00:00
Steve Pulec
a9fe5d462c More linting. 2019-11-22 09:39:07 -05:00
Bert Blommers
aa56715d83 Linting 2019-11-22 06:31:13 +00:00
Bert Blommers
5f6e8fd6fe Merge branch 'master' into feature/2546 2019-11-22 06:22:54 +00:00
Steve Pulec
72da9e96c2 Lint. 2019-11-21 17:53:58 -05:00
Bert Blommers
0ea98f22ee Merge branch 'master' into feature/2546 2019-11-19 08:00:59 +00:00
Matt Conway
4d47d6b7f6 remove unnecessary CF method 2019-11-18 09:02:32 -05:00
Matt Conway
d9c8bdb2a0 Add the ssh_public_key methods that were missing from the IAM implementation 2019-11-18 09:02:32 -05:00
Mike Grima
dab7f9fdad
Merge pull request #2574 from gruebel/add-iam-get-account-summary
Add iam.get_account_summary
2019-11-17 15:53:34 -08:00
gruebel
d05ebadce8 Add iam.get_account_summary 2019-11-17 13:47:19 +01:00
Bert Blommers
85570f0abe IAM - Add Validation on duplicate policy names 2019-11-16 17:36:50 +00:00
Bert Blommers
422bca8e90 IAM - Add Validation on duplicate role names 2019-11-16 17:33:59 +00:00
Mike Grima
3afb93d9db
Merge pull request #2548 from bblommers/feature/implement-iam-delete-group-endpoint
Feature/implement iam delete group endpoint
2019-11-15 10:52:21 -08:00
Mike Grima
7ca35514ca
Merge pull request #2542 from ianyon/create_policy_already_exist
Added Exception for create_policy when policy exists
2019-11-15 10:38:35 -08:00
Steven Reiling
cd0769af7e Fix IAM instance profile tracking to reflect AWS's requirement for account-unique names 2019-11-14 17:23:44 -08:00
Bert Blommers
cd5b64b0c5 #2163 - Delete IAM group; Add test case and align error message with AWS 2019-11-08 01:19:45 -08:00
Robin Taylor
876ff476f1 Implementing delete-group endpoint and appropriate test case 2019-11-08 01:12:20 -08:00
Bert Blommers
ad23b65784 Implement CloudFormations IAMRole::GetArn 2019-11-07 11:35:07 -08:00
Ian Yon
42e459668c Support for python 2.7 2019-11-05 19:29:28 -03:00
Ian Yon
f235fa145e Added Exception for create_policy when policy exists 2019-11-05 15:57:38 -03:00
gruebel
78e2714496 black format 2019-11-01 07:14:03 +01:00
gruebel
89c43820c9 Add iam.delete_account_password_policy 2019-11-01 07:07:33 +01:00
gruebel
65fa8f1a1b Add iam.get_account_password_policy 2019-11-01 07:07:32 +01:00
gruebel
06581391bd Add iam.update_account_password_policy 2019-11-01 07:03:27 +01:00
Asher Foa
96e5b1993d Run black on moto & test directories. 2019-10-31 10:36:05 -07:00
Jack Danger
00045ae480
Merge branch 'master' into add-iam-virtual-mfa-device 2019-10-22 14:54:10 -07:00
Chris Murton
ccdcb7ca60 Add conflict detection on IAM delete_role and delete_user 2019-10-22 14:27:49 +01:00
gruebel
802fb3baad Connect user with virtual mfa device 2019-10-21 22:51:00 +02:00
gruebel
1d9382b5e5 Add iam.list_virtual_mfa_devices 2019-10-21 21:48:50 +02:00
gruebel
c80135a6db Add iam.delete_virtual_mfa_device 2019-10-20 23:03:20 +02:00
gruebel
9671730f16 Add iam.create_virtual_mfa_device 2019-10-20 22:39:57 +02:00
gruebel
cd8027ce9d Add iam.list_open_id_connect_providers 2019-10-18 21:15:48 +02:00
gruebel
f4af9a1d54 Add iam.delete_open_id_connect_provider 2019-10-18 21:15:48 +02:00
gruebel
c492c5c228 Add iam.get_open_id_connect_provider 2019-10-18 21:15:05 +02:00
gruebel
bd627b65f7 Add iam.create_open_id_connect_provider 2019-10-18 21:15:05 +02:00
Bert Blommers
856a06a778 IAM - Delete Policy implementation 2019-10-17 09:28:19 +01:00
Mike Grima
38866bfcef Fixed some IAM APIs for tagging and role descriptions 2019-08-21 13:08:33 -07:00
Mike Grima
188969a048 AWS Config Aggregator support
- Added support for the following APIs:
	- put_configuration_aggregator
	- describe_configuration_aggregators
	- delete_configuration_aggregator
	- put_aggregation_authorization
	- describe_aggregation_authorizations
	- delete_aggregation_authorization
2019-08-19 15:50:19 -07:00
acsbendi
1b8179992e GetUser returns the IAM user who owns the access key in the request. 2019-07-13 15:58:34 +02:00
wndhydrnt
67326ace4f Raise exception if a role policy is not found 2019-07-07 21:46:26 +02:00
Steve Pulec
3bafc89b40
Merge pull request #2268 from acsbendi/policy-version-fixes
IAM policy version fixes
2019-07-06 15:52:10 -05:00