Commit Graph

123 Commits

Author SHA1 Message Date
gruebel
78e2714496 black format 2019-11-01 07:14:03 +01:00
gruebel
89c43820c9 Add iam.delete_account_password_policy 2019-11-01 07:07:33 +01:00
gruebel
65fa8f1a1b Add iam.get_account_password_policy 2019-11-01 07:07:32 +01:00
gruebel
06581391bd Add iam.update_account_password_policy 2019-11-01 07:03:27 +01:00
Asher Foa
96e5b1993d Run black on moto & test directories. 2019-10-31 10:36:05 -07:00
Jack Danger
00045ae480
Merge branch 'master' into add-iam-virtual-mfa-device 2019-10-22 14:54:10 -07:00
Chris Murton
f0b22fcd2f Fix absent role deletion, Add more delete_user tests, add no conflict deletion testing 2019-10-22 15:28:59 +01:00
Chris Murton
ccdcb7ca60 Add conflict detection on IAM delete_role and delete_user 2019-10-22 14:27:49 +01:00
gruebel
802fb3baad Connect user with virtual mfa device 2019-10-21 22:51:00 +02:00
gruebel
1d9382b5e5 Add iam.list_virtual_mfa_devices 2019-10-21 21:48:50 +02:00
gruebel
c80135a6db Add iam.delete_virtual_mfa_device 2019-10-20 23:03:20 +02:00
gruebel
9671730f16 Add iam.create_virtual_mfa_device 2019-10-20 22:39:57 +02:00
gruebel
3f3feb5bdb Fix tests 2019-10-19 14:23:35 +02:00
gruebel
cd8027ce9d Add iam.list_open_id_connect_providers 2019-10-18 21:15:48 +02:00
gruebel
f4af9a1d54 Add iam.delete_open_id_connect_provider 2019-10-18 21:15:48 +02:00
gruebel
c492c5c228 Add iam.get_open_id_connect_provider 2019-10-18 21:15:05 +02:00
gruebel
bd627b65f7 Add iam.create_open_id_connect_provider 2019-10-18 21:15:05 +02:00
Bert Blommers
deffefbfb8
PR changes 2019-10-18 09:18:12 +01:00
Bert Blommers
856a06a778 IAM - Delete Policy implementation 2019-10-17 09:28:19 +01:00
Bruno Oliveira
21933052d3 Fix multiple IAM Policy Statement creation with empty sid 2019-09-10 23:43:50 -03:00
Mike Grima
38866bfcef Fixed some IAM APIs for tagging and role descriptions 2019-08-21 13:08:33 -07:00
wndhydrnt
67326ace4f Raise exception if a role policy is not found 2019-07-07 21:46:26 +02:00
Steve Pulec
3bafc89b40
Merge pull request #2268 from acsbendi/policy-version-fixes
IAM policy version fixes
2019-07-06 15:52:10 -05:00
acsbendi
48f0c6f194 Fixed format of access key ID and secret access key. 2019-07-04 20:20:08 +02:00
acsbendi
0bd2c5adb4 Fixed minor errors in test. 2019-07-04 20:12:53 +02:00
acsbendi
ef97e0f28f Extended create_access_key test. 2019-07-04 20:04:27 +02:00
acsbendi
6ac315b903 Fixed broken tests due to policy validation. 2019-07-02 12:24:19 +02:00
Steve Pulec
172e089854
Merge branch 'master' into policy-version-fixes 2019-07-01 20:58:38 -05:00
acsbendi
1bda3f2213 Added tests for valid policy documents. 2019-07-01 18:21:54 +02:00
acsbendi
85efec29b1 Added more tests. 2019-07-01 17:30:59 +02:00
acsbendi
d2b0812edc Added more tests. 2019-06-30 20:33:17 +02:00
acsbendi
e133344846 Implemented validating action prefixes. 2019-06-30 18:48:27 +02:00
acsbendi
55f9040296 Fixed old unit tests in test_iam that didn't use valid IAM policies. 2019-06-30 17:57:50 +02:00
acsbendi
99336cbe6a Reorganized tests using a generator method and fixed error messages. 2019-06-30 17:04:02 +02:00
acsbendi
896f7b6eb2 Added more tests. 2019-06-30 16:36:49 +02:00
acsbendi
a4b850aab9 Added test cases for mutually exclusive elements. 2019-06-30 14:03:18 +02:00
acsbendi
f0e9ea4e72 Created tests for policy documents. 2019-06-30 13:47:17 +02:00
acsbendi
3cd373f1f9 Created failing tests. 2019-06-29 18:15:01 +02:00
Bendegúz Ács
ab8a189bbf Fixed policy version's Document type for AWS managed policies (#2234)
* Added checking Document's type in AWS managed policy version response.

* Fixed policy version's Document type for AWS managed policies.
2019-06-10 20:00:37 +01:00
Bendegúz Ács
97ab7fd307 Fixes for get_policy and get_policy_version with AWS managed policies (#2231)
* Created test for get_policy with AWS managed policy.

* Created failing test for get_policy_version with AWS managed policy.

* Updated AWS managed policies.

* Fixed failing tests.

* Fixed trying to compare datetime with string in test case.

* Fixed CreateDate of AWS managed policies overwritten by their version's CreateDate.

* Fixed and improved tests for managed AWS policies.

* Added test for AWS managed policy with v4 default version.

* Fixed not correctly returning dates for AWS managed policies.
2019-06-06 13:36:39 +01:00
Travis Truman
b8ba7980a0 Adding support for specifying a PermissionsBoundary ARN in calls to i… (#2182)
* Adding support for specifying a PermissionsBoundary ARN in calls to iam.create_role

Closes #2181

* Correcting whitespace error

* Adding support for Role PermissionsBoundary to be returned from
calls to list_roles

* Raise ClientError when a bad permissions boundary ARN is supplied
2019-05-21 17:44:05 +01:00
Chris Opland
dd898add4d Add test verifying create_role path defaults to / 2019-04-21 18:29:36 -05:00
Mike Grima
5d955985b9
Merge pull request #2106 from andytumelty/iam-update-user
Add support for iam update_user
2019-04-17 11:13:14 -07:00
Santosh Ananthakrishnan
4f1a1a9d1e [iam] create_policy_version: Fix version id calculation
When creating a new IAM policy version with create_policy_version,
we cannot use the length of the versions list to calculate VersionId.
Keep track of the next version id to use as a non-decreasing counter.

Fixes #2157
2019-04-16 20:15:57 +00:00
Andy Tumelty
d53626ad9a Add support for iam update_user
This covers both the NewPath and NewUserName parameters for update_user, but
without regex validation for these values.
2019-03-12 17:23:32 +00:00
William Rubel
e9d8021c86 Fixing list entities for policy 2019-02-18 21:20:29 -06:00
William Rubel
ce7b5ebf54 Fix policy date 2019-02-17 21:37:33 -06:00
William Rubel
37a765db8d Fix policy date 2019-02-17 17:12:27 -06:00
William Rubel
0e73cddf2f Add test for roles 2019-02-17 16:25:49 -06:00
William Rubel
6e7bd088b3 Add test for roles 2019-02-17 16:04:28 -06:00