147 Commits

Author SHA1 Message Date
acsbendi
48f0c6f194 Fixed format of access key ID and secret access key. 2019-07-04 20:20:08 +02:00
Steve Pulec
172e089854
Merge branch 'master' into policy-version-fixes 2019-07-01 20:58:38 -05:00
acsbendi
ed2682582f Policy validation precedes finding policy for create_policy_version. 2019-07-01 18:54:32 +02:00
acsbendi
4748c6b073 Enabled validating policies for all operations similar to CreatePolicy. 2019-06-30 17:35:26 +02:00
acsbendi
ef20b47f97 Implemented checking policy documents for syntax errors. 2019-06-30 17:09:55 +02:00
acsbendi
c799b1a122 Fixed being able to create more than 5 policy versions. 2019-06-29 19:01:43 +02:00
acsbendi
6f5948af33 Fixed is_default is not reset on old default version. 2019-06-29 18:55:19 +02:00
Bendegúz Ács
ab8a189bbf Fixed policy version's Document type for AWS managed policies (#2234)
* Added checking Document's type in AWS managed policy version response.

* Fixed policy version's Document type for AWS managed policies.
2019-06-10 20:00:37 +01:00
Bendegúz Ács
97ab7fd307 Fixes for get_policy and get_policy_version with AWS managed policies (#2231)
* Created test for get_policy with AWS managed policy.

* Created failing test for get_policy_version with AWS managed policy.

* Updated AWS managed policies.

* Fixed failing tests.

* Fixed trying to compare datetime with string in test case.

* Fixed CreateDate of AWS managed policies overwritten by their version's CreateDate.

* Fixed and improved tests for managed AWS policies.

* Added test for AWS managed policy with v4 default version.

* Fixed not correctly returning dates for AWS managed policies.
2019-06-06 13:36:39 +01:00
Pall Valmundsson
d25a7ff936 Uniform IAM datetime ISO 8601 handling (#2169)
`str(datetime.utcnow())` returns a timestamp that's not of the same
format as the AWS SDK uses, in short it's missing the `T` between the
date and the time.

This causes issues for e.g. Terraform and probably other AWS Go SDK
users. There seems to be some differences between endpoints whether they
return milliseconds or not, the AWS API docs were reviewed and the
decision whether to return timestamps with milliseconds or not based on
the example response documented.

As the timstamps are generated for uniqueness rather than being
hardcoded and then directly cast to a UTC (Z) formed timestamp pytz was
removed as timezone correctness is probably not important.
2019-06-02 19:18:50 +01:00
Travis Truman
b8ba7980a0 Adding support for specifying a PermissionsBoundary ARN in calls to i… (#2182)
* Adding support for specifying a PermissionsBoundary ARN in calls to iam.create_role

Closes #2181

* Correcting whitespace error

* Adding support for Role PermissionsBoundary to be returned from
calls to list_roles

* Raise ClientError when a bad permissions boundary ARN is supplied
2019-05-21 17:44:05 +01:00
Mike Grima
5d955985b9
Merge pull request #2106 from andytumelty/iam-update-user
Add support for iam update_user
2019-04-17 11:13:14 -07:00
Santosh Ananthakrishnan
4f1a1a9d1e [iam] create_policy_version: Fix version id calculation
When creating a new IAM policy version with create_policy_version,
we cannot use the length of the versions list to calculate VersionId.
Keep track of the next version id to use as a non-decreasing counter.

Fixes #2157
2019-04-16 20:15:57 +00:00
Jessie Nadler
497965fadc Return InstanceProfile arn instead of NotImplementedError for get_cfn_attribute 2019-03-26 14:36:31 -04:00
Andy Tumelty
d53626ad9a Add support for iam update_user
This covers both the NewPath and NewUserName parameters for update_user, but
without regex validation for these values.
2019-03-12 17:23:32 +00:00
William Rubel
e9d8021c86 Fixing list entities for policy 2019-02-18 21:20:29 -06:00
William Rubel
ce7b5ebf54 Fix policy date 2019-02-17 21:37:33 -06:00
William Rubel
9e9e37eb62 Add test for roles 2019-02-17 15:35:49 -06:00
William Rubel
31258e9e9e Add test for roles 2019-02-17 15:23:59 -06:00
William Rubel
921a993330 cleaning up files 2019-02-17 14:30:43 -06:00
Mike Grima
1a36c0c377 IAM Role Tagging support 2019-01-31 17:37:26 -08:00
Steve Pulec
25595815e5
Merge pull request #1972 from surfaslt/implement-get-access-key-last-used
Implement get_access_key_last_used
2018-12-28 21:08:13 -05:00
Steve Pulec
46bf7f0176
Merge branch 'master' into master 2018-12-28 20:57:47 -05:00
Steve Pulec
48b19e8655
Merge pull request #1951 from jmillxyz/add-default-path-iam
Add default path to Role & InstanceProfile
2018-12-28 20:42:55 -05:00
martynaspaulikas
9418a6916d Fix tests and functionality of get_access_key_last_used() 2018-11-27 16:12:41 +00:00
martynaspaulikas
7189d019df Implemented get_access_key_last_used
Written test that still does not work due to:
    ParamValidationError: Parameter validation failed:
    Unknown parameter in input: "UserName", must be one of: AccessKeyId
Refactored update_access_key and delete_access_key functions
2018-11-27 11:28:09 +00:00
Joe Engel
57fa11136b Add functionalities for SAML Providers 2018-11-19 15:53:02 -08:00
Jon Miller
b5eb724773 Add default path to Role & InstanceProfile 2018-11-15 15:24:45 -08:00
Mike Grima
94b5438d76 Added IAM User signing certificate support 2018-11-05 13:15:44 -08:00
Mike Grima
b4b0ae5077 Some IAM fixes.
- Fixed InstanceProfiles having `Path` set to `None`.
- Added in some dynamic `CreateDate`s.
- Fixed missing Instance Profile ID's being sent over
2018-11-05 09:24:28 -08:00
Mike Grima
8ae1a2b357 Fixes for IAM Groups 2018-10-16 17:14:23 -07:00
Karl Gutwin
de4d5d9d62 Correct flake8 failures 2018-08-08 11:13:25 -04:00
Karl Gutwin
5ae5ae0efa Correct deviation in behavior of policy versions from standard API 2018-08-07 17:24:15 -04:00
Karl Gutwin
9e667d6b25 Add get_policy IAM action 2018-08-07 16:59:15 -04:00
Will Bengtson
a420064621 IAM get account authorization details (#1736)
* start of get_account_authorization_details for iam

* add get_account_authorization_details dynamic template

* remove old commented out template

* Fix flake8 problems and add unit test
2018-08-07 10:31:36 -07:00
Nathan Mische
ff80ecb56d Adding account id to ManagedPolicy ARN 2018-07-17 13:31:18 -04:00
Brian Pandola
350cf9257e Add update_access_key endpoint (#1423) 2018-01-10 18:29:08 -05:00
William Richard
df7a7958c1 Path is an optional property of instance profile cloudformation resource (#1382)
* Path is an optional property of instance profile cloudformation resource

http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-iam-instanceprofile.html

* Path is also optional for iam role clouformation resources

Based on http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-iam-role.html

* Use `properities.get` with a default instead of doing default handling myself
2017-12-14 12:06:04 +00:00
David Bartle
52ce8d378f IAM delete_server_certificate (#1380)
* IAM delete_server_certificate

* flake8 fixes
2017-12-08 10:43:09 +00:00
Terry Cain
a027f86cc8
Merge branch 'master' into batch 2017-10-03 19:37:53 +01:00
Jack Danger
353f8387a2 implementing detach_group_policy 2017-10-01 15:05:33 -07:00
Jack Danger
37ae61871c add model methods for iam attached group policies 2017-10-01 15:01:33 -07:00
Terry Cain
56e4300ad4
Added preliminary CreateComputeEnvironment 2017-09-26 22:22:59 +01:00
Jack Danger
b840cb7455 fixing whitespace on AWS managed policies 2017-09-19 14:19:29 -07:00
Jack Danger
8f2f7fa20d Adding a script to import all of AWS' managed policies
fixes #1118
2017-09-19 14:01:08 -07:00
Toshiya Kawasaki
ee4ca0c39a Support IAM account alias (#1088) 2017-09-07 11:21:44 -07:00
Brian Pandola
bca5047202 Implement additional IAM endpoints
- attach_user_policy
- detach_user_policy
- list_attached_user_policies
2017-08-14 13:55:53 -07:00
David Cuthbert
672604d3e7 Add support for iam:DetachRolePolicy and iam:DeleteRolePolicy. (#1052)
* Add support for iam:DetachRolePolicy and iam:DeleteRolePolicy.

* Raise proper exceptions for iam:DetachRolePolicy and iam:DeleteRolePolicy when the policy doesn't exist.
2017-08-13 21:58:11 -07:00
Jack Danger
e445c81e83 Implement IAM {update,get}_login_profile 2017-07-27 14:22:25 -07:00
Jack Danger Canty
15d3397a60 implementing IAM delete_role
Fixes #957
2017-05-19 16:23:42 -07:00