import boto3 import json import pytest from botocore.exceptions import ClientError from moto import mock_iot, mock_cognitoidentity @pytest.fixture(name="region_name") def fixture_region_name(): return "ap-northeast-1" @pytest.fixture(name="iot_client") def fixture_iot_client(region_name): with mock_iot(): yield boto3.client("iot", region_name=region_name) @pytest.fixture(name="policy") def fixture_policy(iot_client): return iot_client.create_policy(policyName="my-policy", policyDocument="{}") def test_attach_policy(iot_client, policy): policy_name = policy["policyName"] cert = iot_client.create_keys_and_certificate(setAsActive=True) cert_arn = cert["certificateArn"] iot_client.attach_policy(policyName=policy_name, target=cert_arn) res = iot_client.list_attached_policies(target=cert_arn) res.should.have.key("policies").which.should.have.length_of(1) res["policies"][0]["policyName"].should.equal("my-policy") res = iot_client.list_attached_policies(target=cert_arn) res.should.have.key("policies").which.should.have.length_of(1) res["policies"][0]["policyName"].should.equal("my-policy") @mock_cognitoidentity def test_attach_policy_to_identity(region_name, iot_client, policy): cognito_identity_client = boto3.client("cognito-identity", region_name=region_name) identity_pool_name = "test_identity_pool" identity_pool = cognito_identity_client.create_identity_pool( IdentityPoolName=identity_pool_name, AllowUnauthenticatedIdentities=True ) identity = cognito_identity_client.get_id( AccountId="test", IdentityPoolId=identity_pool["IdentityPoolId"] ) client = iot_client policy_name = policy["policyName"] client.attach_policy(policyName=policy_name, target=identity["IdentityId"]) res = client.list_attached_policies(target=identity["IdentityId"]) res.should.have.key("policies").which.should.have.length_of(1) res["policies"][0]["policyName"].should.equal(policy_name) def test_detach_policy(iot_client, policy): cert = iot_client.create_keys_and_certificate(setAsActive=True) cert_arn = cert["certificateArn"] policy_name = policy["policyName"] iot_client.attach_policy(policyName=policy_name, target=cert_arn) res = iot_client.list_attached_policies(target=cert_arn) res.should.have.key("policies").which.should.have.length_of(1) res["policies"][0]["policyName"].should.equal(policy_name) iot_client.detach_policy(policyName=policy_name, target=cert_arn) res = iot_client.list_attached_policies(target=cert_arn) res.should.have.key("policies").which.should.be.empty def test_list_attached_policies(iot_client): cert = iot_client.create_keys_and_certificate(setAsActive=True) policies = iot_client.list_attached_policies(target=cert["certificateArn"]) policies["policies"].should.equal([]) def test_policy_versions(iot_client): policy_name = "my-policy" doc = "{}" policy = iot_client.create_policy(policyName=policy_name, policyDocument=doc) policy.should.have.key("policyName").which.should.equal(policy_name) policy.should.have.key("policyArn").which.should_not.be.none policy.should.have.key("policyDocument").which.should.equal(json.dumps({})) policy.should.have.key("policyVersionId").which.should.equal("1") policy = iot_client.get_policy(policyName=policy_name) policy.should.have.key("policyName").which.should.equal(policy_name) policy.should.have.key("policyArn").which.should_not.be.none policy.should.have.key("policyDocument").which.should.equal(json.dumps({})) policy.should.have.key("defaultVersionId").which.should.equal( policy["defaultVersionId"] ) policy1 = iot_client.create_policy_version( policyName=policy_name, policyDocument=json.dumps({"version": "version_1"}), setAsDefault=True, ) policy1.should.have.key("policyArn").which.should_not.be.none policy1.should.have.key("policyDocument").which.should.equal( json.dumps({"version": "version_1"}) ) policy1.should.have.key("policyVersionId").which.should.equal("2") policy1.should.have.key("isDefaultVersion").which.should.equal(True) policy2 = iot_client.create_policy_version( policyName=policy_name, policyDocument=json.dumps({"version": "version_2"}), setAsDefault=False, ) policy2.should.have.key("policyArn").which.should_not.be.none policy2.should.have.key("policyDocument").which.should.equal( json.dumps({"version": "version_2"}) ) policy2.should.have.key("policyVersionId").which.should.equal("3") policy2.should.have.key("isDefaultVersion").which.should.equal(False) policy = iot_client.get_policy(policyName=policy_name) policy.should.have.key("policyName").which.should.equal(policy_name) policy.should.have.key("policyArn").which.should_not.be.none policy.should.have.key("policyDocument").which.should.equal( json.dumps({"version": "version_1"}) ) policy.should.have.key("defaultVersionId").which.should.equal( policy1["policyVersionId"] ) policy3 = iot_client.create_policy_version( policyName=policy_name, policyDocument=json.dumps({"version": "version_3"}), setAsDefault=False, ) policy3.should.have.key("policyArn").which.should_not.be.none policy3.should.have.key("policyDocument").which.should.equal( json.dumps({"version": "version_3"}) ) policy3.should.have.key("policyVersionId").which.should.equal("4") policy3.should.have.key("isDefaultVersion").which.should.equal(False) policy4 = iot_client.create_policy_version( policyName=policy_name, policyDocument=json.dumps({"version": "version_4"}), setAsDefault=False, ) policy4.should.have.key("policyArn").which.should_not.be.none policy4.should.have.key("policyDocument").which.should.equal( json.dumps({"version": "version_4"}) ) policy4.should.have.key("policyVersionId").which.should.equal("5") policy4.should.have.key("isDefaultVersion").which.should.equal(False) policy_versions = iot_client.list_policy_versions(policyName=policy_name) policy_versions.should.have.key("policyVersions").which.should.have.length_of(5) list( map(lambda item: item["isDefaultVersion"], policy_versions["policyVersions"]) ).count(True).should.equal(1) default_policy = list( filter(lambda item: item["isDefaultVersion"], policy_versions["policyVersions"]) ) default_policy[0].should.have.key("versionId").should.equal( policy1["policyVersionId"] ) policy = iot_client.get_policy(policyName=policy_name) policy.should.have.key("policyName").which.should.equal(policy_name) policy.should.have.key("policyArn").which.should_not.be.none policy.should.have.key("policyDocument").which.should.equal( json.dumps({"version": "version_1"}) ) policy.should.have.key("defaultVersionId").which.should.equal( policy1["policyVersionId"] ) iot_client.set_default_policy_version( policyName=policy_name, policyVersionId=policy4["policyVersionId"] ) policy_versions = iot_client.list_policy_versions(policyName=policy_name) policy_versions.should.have.key("policyVersions").which.should.have.length_of(5) list( map(lambda item: item["isDefaultVersion"], policy_versions["policyVersions"]) ).count(True).should.equal(1) default_policy = list( filter(lambda item: item["isDefaultVersion"], policy_versions["policyVersions"]) ) default_policy[0].should.have.key("versionId").should.equal( policy4["policyVersionId"] ) policy = iot_client.get_policy(policyName=policy_name) policy.should.have.key("policyName").which.should.equal(policy_name) policy.should.have.key("policyArn").which.should_not.be.none policy.should.have.key("policyDocument").which.should.equal( json.dumps({"version": "version_4"}) ) policy.should.have.key("defaultVersionId").which.should.equal( policy4["policyVersionId"] ) with pytest.raises(ClientError) as exc: iot_client.create_policy_version( policyName=policy_name, policyDocument=json.dumps({"version": "version_5"}), setAsDefault=False, ) err = exc.value.response["Error"] err["Message"].should.equal( f"The policy {policy_name} already has the maximum number of versions (5)" ) iot_client.delete_policy_version(policyName=policy_name, policyVersionId="1") policy_versions = iot_client.list_policy_versions(policyName=policy_name) policy_versions.should.have.key("policyVersions").which.should.have.length_of(4) iot_client.delete_policy_version( policyName=policy_name, policyVersionId=policy1["policyVersionId"] ) policy_versions = iot_client.list_policy_versions(policyName=policy_name) policy_versions.should.have.key("policyVersions").which.should.have.length_of(3) iot_client.delete_policy_version( policyName=policy_name, policyVersionId=policy2["policyVersionId"] ) policy_versions = iot_client.list_policy_versions(policyName=policy_name) policy_versions.should.have.key("policyVersions").which.should.have.length_of(2) iot_client.delete_policy_version( policyName=policy_name, policyVersionId=policy3["policyVersionId"] ) policy_versions = iot_client.list_policy_versions(policyName=policy_name) policy_versions.should.have.key("policyVersions").which.should.have.length_of(1) # should fail as it"s the default policy. Should use delete_policy instead with pytest.raises(ClientError) as exc: iot_client.delete_policy_version( policyName=policy_name, policyVersionId=policy4["policyVersionId"] ) err = exc.value.response["Error"] err["Message"].should.equal("Cannot delete the default version of a policy") def test_policy_versions_increment_beyond_5(iot_client, policy): """ Version ids increment by one each time. Previously there was a bug where the version id was not incremented beyond 5. This prevents a regression. """ policy_name = policy["policyName"] for v in range(2, 11): new_version = iot_client.create_policy_version( policyName=policy_name, policyDocument=json.dumps({"version": f"version_{v}"}), setAsDefault=True, ) new_version.should.have.key("policyVersionId").which.should.equal(str(v)) iot_client.delete_policy_version( policyName=policy_name, policyVersionId=str(v - 1) ) def test_policy_versions_increment_even_after_version_delete(iot_client, policy): """Version ids increment even if the max version was deleted.""" policy_name = policy["policyName"] new_version = iot_client.create_policy_version( policyName=policy_name, policyDocument=json.dumps({"version": "version_2"}), ) new_version.should.have.key("policyVersionId").which.should.equal("2") iot_client.delete_policy_version(policyName=policy_name, policyVersionId="2") third_version = iot_client.create_policy_version( policyName=policy_name, policyDocument=json.dumps({"version": "version_3"}), ) third_version.should.have.key("policyVersionId").which.should.equal("3") def test_delete_policy_validation(iot_client): doc = """{ "Version": "2012-10-17", "Statement":[ { "Effect":"Allow", "Action":[ "iot: *" ], "Resource":"*" } ] } """ cert = iot_client.create_keys_and_certificate(setAsActive=True) cert_arn = cert["certificateArn"] policy_name = "my-policy" iot_client.create_policy(policyName=policy_name, policyDocument=doc) iot_client.attach_principal_policy(policyName=policy_name, principal=cert_arn) with pytest.raises(ClientError) as e: iot_client.delete_policy(policyName=policy_name) e.value.response["Error"]["Message"].should.contain( "The policy cannot be deleted as the policy is attached to one or more principals (name=%s)" % policy_name ) res = iot_client.list_policies() res.should.have.key("policies").which.should.have.length_of(1) iot_client.detach_principal_policy(policyName=policy_name, principal=cert_arn) iot_client.delete_policy(policyName=policy_name) res = iot_client.list_policies() res.should.have.key("policies").which.should.have.length_of(0) def test_policy(iot_client): name = "my-policy" doc = "{}" policy = iot_client.create_policy(policyName=name, policyDocument=doc) policy.should.have.key("policyName").which.should.equal(name) policy.should.have.key("policyArn").which.should_not.be.none policy.should.have.key("policyDocument").which.should.equal(doc) policy.should.have.key("policyVersionId").which.should.equal("1") policy = iot_client.get_policy(policyName=name) policy.should.have.key("policyName").which.should.equal(name) policy.should.have.key("policyArn").which.should_not.be.none policy.should.have.key("policyDocument").which.should.equal(doc) policy.should.have.key("defaultVersionId").which.should.equal("1") res = iot_client.list_policies() res.should.have.key("policies").which.should.have.length_of(1) for policy in res["policies"]: policy.should.have.key("policyName").which.should_not.be.none policy.should.have.key("policyArn").which.should_not.be.none iot_client.delete_policy(policyName=name) res = iot_client.list_policies() res.should.have.key("policies").which.should.have.length_of(0) def test_attach_policy_to_thing_group(iot_client, policy): thing_group = iot_client.create_thing_group(thingGroupName="my-thing-group") thing_group_arn = thing_group["thingGroupArn"] policy_name = policy["policyName"] iot_client.attach_policy(policyName=policy_name, target=thing_group_arn) res = iot_client.list_attached_policies(target=thing_group_arn) res.should.have.key("policies").which.should.have.length_of(1) res["policies"][0]["policyName"].should.equal(policy_name) def test_attach_policy_to_non_existant_thing_group_raises_ResourceNotFoundException( iot_client, policy ): thing_group_arn = ( "arn:aws:iot:ap-northeast-1:123456789012:thinggroup/my-thing-group" ) policy_name = policy["policyName"] with pytest.raises(ClientError, match=thing_group_arn): iot_client.attach_policy(policyName=policy_name, target=thing_group_arn) def test_policy_delete_fails_when_versions_exist(iot_client, policy): policy_name = policy["policyName"] iot_client.create_policy_version( policyName=policy_name, policyDocument=policy["policyDocument"], setAsDefault=True, ) with pytest.raises(ClientError) as e: iot_client.delete_policy(policyName=policy_name) e.value.response["Error"]["Message"].should.contain( "Cannot delete the policy because it has one or more policy versions attached to it" ) def test_list_targets_for_policy_empty(iot_client, policy): res = iot_client.list_targets_for_policy(policyName=policy["policyName"]) res.should.have.key("targets").which.should.have.length_of(0) def test_list_targets_for_policy_one_attached_thing_group(iot_client, policy): thing_group = iot_client.create_thing_group(thingGroupName="my-thing-group") thing_group_arn = thing_group["thingGroupArn"] policy_name = policy["policyName"] iot_client.attach_policy(policyName=policy_name, target=thing_group_arn) res = iot_client.list_targets_for_policy(policyName=policy["policyName"]) res.should.have.key("targets").which.should.have.length_of(1) res["targets"][0].should.equal(thing_group_arn) def test_list_targets_for_policy_one_attached_certificate(iot_client, policy): cert = iot_client.create_keys_and_certificate(setAsActive=True) cert_arn = cert["certificateArn"] policy_name = policy["policyName"] iot_client.attach_policy(policyName=policy_name, target=cert_arn) res = iot_client.list_targets_for_policy(policyName=policy["policyName"]) res.should.have.key("targets").which.should.have.length_of(1) res["targets"][0].should.equal(cert_arn) def test_list_targets_for_policy_resource_not_found(iot_client): with pytest.raises(ClientError) as e: iot_client.list_targets_for_policy(policyName="NON_EXISTENT_POLICY_NAME") e.value.response["Error"]["Code"].should.equal("ResourceNotFoundException") e.value.response["Error"]["Message"].should.contain("Policy not found") def test_create_policy_fails_when_name_taken(iot_client, policy): policy_name = policy["policyName"] with pytest.raises(ClientError) as e: iot_client.create_policy( policyName=policy_name, policyDocument='{"Version": "2012-10-17", "Statement": [{"Effect": "Allow", "Action": "*", "Resource": "*"}]}', ) current_policy = iot_client.get_policy(policyName=policy_name) e.value.response["Error"]["Code"].should.equal("ResourceAlreadyExistsException") e.value.response["Error"]["Message"].should.equal( f"Policy cannot be created - name already exists (name={policy_name})" ) # the policy should not have been overwritten current_policy.should.have.key("policyDocument").which.should.equal( policy["policyDocument"] )