321 Commits

Author SHA1 Message Date
Jack Danger
4497f18c1a
fixing ErrorResponse top-level tag (#2434)
In the golang SDK the previous format throws an unmarshaling error:

    /usr/local/Cellar/go/1.12.6/libexec/src/encoding/xml/read.go:209 &errors.errorString{s:"unknown error response tag, {{ Response} []}"}
    err: <*>SerializationError: failed to unmarshal error message
2019-09-27 11:14:53 -07:00
Steve Pulec
efe676dbd5 Add comment. 2019-09-11 22:07:24 -05:00
Steve Pulec
aa896a0c2e
Merge pull request #2294 from spulec/fix-responses-mocking
Cleanup responses mocking. Closes #1567
2019-09-11 22:06:36 -05:00
Niels Laukens
9bfbd8e008
Make tags_from_query_string() more flexible 2019-09-04 16:55:34 +02:00
Niels Laukens
91fb408102
Move tags_from_query_string to core.utils 2019-09-04 16:25:43 +02:00
acsbendi
cf2dae0ce8 Calling sts:GetCallerIdentity is always allowed. 2019-08-22 18:09:52 +02:00
acsbendi
27fdbb7736 Derive ARN of AssumedRoles from its role ARN and session name. 2019-08-21 12:57:56 +02:00
Steve Pulec
69d86cbd54
Merge pull request #2300 from acsbendi/master
Basic IAM authentication, authorization
2019-07-28 17:22:52 -05:00
acsbendi
9edab5b423 Simplified the reset-auth API. 2019-07-28 22:23:33 +02:00
acsbendi
1969338a8a Fixed set_initial_no_auth_action_count not working in server mode. 2019-07-27 00:12:28 +02:00
acsbendi
de70d1787c Collected TODOs in the header of the access_control file. 2019-07-26 21:23:15 +02:00
acsbendi
f3f47d44ac Fixed error in python 2 and did some refactoring. 2019-07-26 21:05:04 +02:00
acsbendi
140f4110ac set_initial_no_auth_action_count should restore request_count. 2019-07-26 20:41:40 +02:00
acsbendi
3e1e273380 Fixed collecting policies from groups. 2019-07-24 21:41:33 +02:00
acsbendi
d428acdb7c Separate SignatureDoesNotMatchError for S3. 2019-07-24 21:01:11 +02:00
acsbendi
d471eb69c0 For EC2 requests, AuthFailure should be raised instead of SignatureDoesNotMatch. 2019-07-24 19:47:39 +02:00
acsbendi
e22e8b5a67 set_initial_no_auth_action_count should also set request_count to 0. 2019-07-24 18:58:50 +02:00
acsbendi
15c872cffc Created decorator for setting INITIAL_NO_AUTH_ACTION_COUNT. 2019-07-24 18:15:31 +02:00
acsbendi
bbf003d335 Set correct HTTP codes for some auth-related errors. 2019-07-24 17:21:33 +02:00
acsbendi
3dd2e3a1b8 Moved INITIAL_NO_AUTH_ACTION_COUNT to settings. 2019-07-24 16:30:48 +02:00
Steve Pulec
077c667454
Merge pull request #2285 from spulec/move-env-mocking
Move env variable mocking and undo when stopping. CC #2058, #2172.
2019-07-19 23:56:40 -04:00
acsbendi
7db2d0f38c Use abc in a python2-compatible way. 2019-07-13 15:12:21 +02:00
acsbendi
7b096d690f Replaced print with log.debug. 2019-07-13 15:04:41 +02:00
acsbendi
de01adec57 Fixed linting errors. 2019-07-13 14:58:42 +02:00
acsbendi
9d992c9335 Fixed error on single (non-list) Statements. 2019-07-11 14:22:42 +02:00
acsbendi
59f091bdea Default INITIAL_NO_AUTH_ACTION_COUNT should be infinity. 2019-07-11 13:58:57 +02:00
Steve Pulec
c7147b06b1 Cleanup responses mocking. Closes #1567
This unblocks requests to other websites with requests while Moto
is activated. It also adds a wildcard for AWS services to still
ensure no accidental requests are made for unmocked services
2019-07-10 21:59:25 -05:00
Steve Pulec
b19c201975 Cleanup model ref resetting. 2019-07-10 21:16:11 -05:00
acsbendi
bec0c5a273 Fixed S3 actions not handled properly. 2019-07-10 20:42:23 +02:00
Steve Pulec
308712841c Have context manager return mock. 2019-07-09 20:31:43 -05:00
acsbendi
947e26ce1b Removed unused exception. 2019-07-09 19:46:04 +02:00
acsbendi
1df4e8da2f Fixed bugs in processing policies belonging to assumed roles. 2019-07-09 19:44:23 +02:00
acsbendi
23957fe940 Implemented finding credentials from already created IAM users and roles. 2019-07-08 19:57:14 +02:00
Steve Pulec
79cd1e609c Move env variable mocking and undo when stopping. CC #2058, #2172. 2019-07-07 22:32:46 -05:00
Bendegúz Ács
9684e1b638
Abstract methods raise NotImplementedError 2019-07-04 17:18:12 +02:00
acsbendi
8de3bdcf29 Fixed printing IAM request class' name. 2019-07-04 16:48:44 +02:00
acsbendi
5dbec8aee5 Implemented checking if S3 action is permitted. 2019-07-04 16:38:53 +02:00
acsbendi
7ec8f85438 Implemented recognizing asterisks in Actions in policy statements. 2019-07-02 19:24:45 +02:00
acsbendi
6061d5d521 Introduced environment variable to delay the start of authorization. 2019-07-02 18:03:00 +02:00
acsbendi
fbd0749854 Implemented authentication for services except for S3. 2019-07-02 17:40:08 +02:00
Garrett
c739c5331e Handle UnicodeEncodeError when parsing querystring (#2170) 2019-05-25 18:34:47 +01:00
Robert Lewis
19a0179608 Use regex to populate requestId XML tag 2019-01-20 22:54:01 -08:00
Steve Pulec
6523a14611
Merge pull request #1965 from andrewmccall/master
Added double to to_str/from_str, returned by emr create_cluster
2018-12-28 21:05:07 -05:00
Andrew McCall
4092657472 Added double toto_str/from_str, returned by emr create_cluster 2018-11-22 17:10:33 +00:00
Lorenz Hufnagel
cf5bd7665c Mock AWS credentials
https://github.com/spulec/moto/issues/1924
2018-11-16 12:23:39 +01:00
Lorenz Hufnagel
b20e190995 Try to get tests running 2018-10-29 09:12:22 +01:00
Jordan Guymon
fd4e524855 Use env credentials for all tests 2018-10-29 09:12:22 +01:00
Jordan Guymon
8e909f580a MockAWS implementation using botocore event hooks 2018-10-29 09:12:22 +01:00
Ollie Ford
0ac989cfd4
Fix #1809: skip patching staticmethods 2018-09-05 12:01:34 +01:00
Fujimoto Seiji
b25e80188a AWSServiceSpec: Fix TypeError exceptions within json.load()
The load() method provided by the built-in JSON module does not accept a
byte-type value in Python 3.5 (or versions before), and will raise an
exception if one is passed.

For details, please see: https://bugs.python.org/issue17909

Thus, for better compatibility, we'd better decode the content of the
JSON file before passing it to the parser, instead of letting the module
to guess the encoding.
2018-04-24 16:33:39 +09:00