Jack Danger
4497f18c1a
fixing ErrorResponse top-level tag ( #2434 )
...
In the golang SDK the previous format throws an unmarshaling error:
/usr/local/Cellar/go/1.12.6/libexec/src/encoding/xml/read.go:209 &errors.errorString{s:"unknown error response tag, {{ Response} []}"}
err: <*>SerializationError: failed to unmarshal error message
2019-09-27 11:14:53 -07:00
Steve Pulec
efe676dbd5
Add comment.
2019-09-11 22:07:24 -05:00
Steve Pulec
aa896a0c2e
Merge pull request #2294 from spulec/fix-responses-mocking
...
Cleanup responses mocking. Closes #1567
2019-09-11 22:06:36 -05:00
Niels Laukens
9bfbd8e008
Make tags_from_query_string() more flexible
2019-09-04 16:55:34 +02:00
Niels Laukens
91fb408102
Move tags_from_query_string to core.utils
2019-09-04 16:25:43 +02:00
acsbendi
cf2dae0ce8
Calling sts:GetCallerIdentity is always allowed.
2019-08-22 18:09:52 +02:00
acsbendi
27fdbb7736
Derive ARN of AssumedRoles from its role ARN and session name.
2019-08-21 12:57:56 +02:00
Steve Pulec
69d86cbd54
Merge pull request #2300 from acsbendi/master
...
Basic IAM authentication, authorization
2019-07-28 17:22:52 -05:00
acsbendi
9edab5b423
Simplified the reset-auth API.
2019-07-28 22:23:33 +02:00
acsbendi
1969338a8a
Fixed set_initial_no_auth_action_count not working in server mode.
2019-07-27 00:12:28 +02:00
acsbendi
de70d1787c
Collected TODOs in the header of the access_control file.
2019-07-26 21:23:15 +02:00
acsbendi
f3f47d44ac
Fixed error in python 2 and did some refactoring.
2019-07-26 21:05:04 +02:00
acsbendi
140f4110ac
set_initial_no_auth_action_count should restore request_count.
2019-07-26 20:41:40 +02:00
acsbendi
3e1e273380
Fixed collecting policies from groups.
2019-07-24 21:41:33 +02:00
acsbendi
d428acdb7c
Separate SignatureDoesNotMatchError for S3.
2019-07-24 21:01:11 +02:00
acsbendi
d471eb69c0
For EC2 requests, AuthFailure should be raised instead of SignatureDoesNotMatch.
2019-07-24 19:47:39 +02:00
acsbendi
e22e8b5a67
set_initial_no_auth_action_count should also set request_count to 0.
2019-07-24 18:58:50 +02:00
acsbendi
15c872cffc
Created decorator for setting INITIAL_NO_AUTH_ACTION_COUNT.
2019-07-24 18:15:31 +02:00
acsbendi
bbf003d335
Set correct HTTP codes for some auth-related errors.
2019-07-24 17:21:33 +02:00
acsbendi
3dd2e3a1b8
Moved INITIAL_NO_AUTH_ACTION_COUNT to settings.
2019-07-24 16:30:48 +02:00
Steve Pulec
077c667454
Merge pull request #2285 from spulec/move-env-mocking
...
Move env variable mocking and undo when stopping. CC #2058 , #2172 .
2019-07-19 23:56:40 -04:00
acsbendi
7db2d0f38c
Use abc in a python2-compatible way.
2019-07-13 15:12:21 +02:00
acsbendi
7b096d690f
Replaced print with log.debug.
2019-07-13 15:04:41 +02:00
acsbendi
de01adec57
Fixed linting errors.
2019-07-13 14:58:42 +02:00
acsbendi
9d992c9335
Fixed error on single (non-list) Statements.
2019-07-11 14:22:42 +02:00
acsbendi
59f091bdea
Default INITIAL_NO_AUTH_ACTION_COUNT should be infinity.
2019-07-11 13:58:57 +02:00
Steve Pulec
c7147b06b1
Cleanup responses mocking. Closes #1567
...
This unblocks requests to other websites with requests while Moto
is activated. It also adds a wildcard for AWS services to still
ensure no accidental requests are made for unmocked services
2019-07-10 21:59:25 -05:00
Steve Pulec
b19c201975
Cleanup model ref resetting.
2019-07-10 21:16:11 -05:00
acsbendi
bec0c5a273
Fixed S3 actions not handled properly.
2019-07-10 20:42:23 +02:00
Steve Pulec
308712841c
Have context manager return mock.
2019-07-09 20:31:43 -05:00
acsbendi
947e26ce1b
Removed unused exception.
2019-07-09 19:46:04 +02:00
acsbendi
1df4e8da2f
Fixed bugs in processing policies belonging to assumed roles.
2019-07-09 19:44:23 +02:00
acsbendi
23957fe940
Implemented finding credentials from already created IAM users and roles.
2019-07-08 19:57:14 +02:00
Steve Pulec
79cd1e609c
Move env variable mocking and undo when stopping. CC #2058 , #2172 .
2019-07-07 22:32:46 -05:00
Bendegúz Ács
9684e1b638
Abstract methods raise NotImplementedError
2019-07-04 17:18:12 +02:00
acsbendi
8de3bdcf29
Fixed printing IAM request class' name.
2019-07-04 16:48:44 +02:00
acsbendi
5dbec8aee5
Implemented checking if S3 action is permitted.
2019-07-04 16:38:53 +02:00
acsbendi
7ec8f85438
Implemented recognizing asterisks in Actions in policy statements.
2019-07-02 19:24:45 +02:00
acsbendi
6061d5d521
Introduced environment variable to delay the start of authorization.
2019-07-02 18:03:00 +02:00
acsbendi
fbd0749854
Implemented authentication for services except for S3.
2019-07-02 17:40:08 +02:00
Garrett
c739c5331e
Handle UnicodeEncodeError when parsing querystring ( #2170 )
2019-05-25 18:34:47 +01:00
Robert Lewis
19a0179608
Use regex to populate requestId XML tag
2019-01-20 22:54:01 -08:00
Steve Pulec
6523a14611
Merge pull request #1965 from andrewmccall/master
...
Added double to to_str/from_str, returned by emr create_cluster
2018-12-28 21:05:07 -05:00
Andrew McCall
4092657472
Added double toto_str/from_str, returned by emr create_cluster
2018-11-22 17:10:33 +00:00
Lorenz Hufnagel
cf5bd7665c
Mock AWS credentials
...
https://github.com/spulec/moto/issues/1924
2018-11-16 12:23:39 +01:00
Lorenz Hufnagel
b20e190995
Try to get tests running
2018-10-29 09:12:22 +01:00
Jordan Guymon
fd4e524855
Use env credentials for all tests
2018-10-29 09:12:22 +01:00
Jordan Guymon
8e909f580a
MockAWS implementation using botocore event hooks
2018-10-29 09:12:22 +01:00
Ollie Ford
0ac989cfd4
Fix #1809 : skip patching staticmethods
2018-09-05 12:01:34 +01:00
Fujimoto Seiji
b25e80188a
AWSServiceSpec: Fix TypeError
exceptions within json.load()
...
The load() method provided by the built-in JSON module does not accept a
byte-type value in Python 3.5 (or versions before), and will raise an
exception if one is passed.
For details, please see: https://bugs.python.org/issue17909
Thus, for better compatibility, we'd better decode the content of the
JSON file before passing it to the parser, instead of letting the module
to guess the encoding.
2018-04-24 16:33:39 +09:00