788 lines
		
	
	
		
			35 KiB
		
	
	
	
		
			Python
		
	
	
	
	
	
			
		
		
	
	
			788 lines
		
	
	
		
			35 KiB
		
	
	
	
		
			Python
		
	
	
	
	
	
from base64 import b64encode
 | 
						|
import json
 | 
						|
 | 
						|
import boto3
 | 
						|
from botocore.client import ClientError
 | 
						|
from datetime import datetime
 | 
						|
from freezegun import freeze_time
 | 
						|
import pytest
 | 
						|
import sure  # noqa # pylint: disable=unused-import
 | 
						|
 | 
						|
from moto import mock_sts, mock_iam, settings
 | 
						|
from moto.core import DEFAULT_ACCOUNT_ID as ACCOUNT_ID
 | 
						|
from moto.sts.responses import MAX_FEDERATION_TOKEN_POLICY_LENGTH
 | 
						|
 | 
						|
 | 
						|
@freeze_time("2012-01-01 12:00:00")
 | 
						|
@mock_sts
 | 
						|
def test_get_session_token_boto3():
 | 
						|
    client = boto3.client("sts", region_name="us-east-1")
 | 
						|
    creds = client.get_session_token(DurationSeconds=903)["Credentials"]
 | 
						|
 | 
						|
    creds["Expiration"].should.be.a(datetime)
 | 
						|
 | 
						|
    if not settings.TEST_SERVER_MODE:
 | 
						|
        fdate = creds["Expiration"].strftime("%Y-%m-%dT%H:%M:%S.000Z")
 | 
						|
        fdate.should.equal("2012-01-01T12:15:03.000Z")
 | 
						|
    creds["SessionToken"].should.equal(
 | 
						|
        "AQoEXAMPLEH4aoAH0gNCAPyJxz4BlCFFxWNE1OPTgk5TthT+FvwqnKwRcOIfrRh3c/LTo6UDdyJwOOvEVPvLXCrrrUtdnniCEXAMPLE/IvU1dYUg2RVAJBanLiHb4IgRmpRV3zrkuWJOgQs8IZZaIv2BXIa2R4OlgkBN9bkUDNCJiBeb/AXlzBBko7b15fjrBs2+cTQtpZ3CYWFXG8C5zqx37wnOE49mRl/+OtkIKGO7fAE"
 | 
						|
    )
 | 
						|
    creds["AccessKeyId"].should.equal("AKIAIOSFODNN7EXAMPLE")
 | 
						|
    creds["SecretAccessKey"].should.equal("wJalrXUtnFEMI/K7MDENG/bPxRfiCYzEXAMPLEKEY")
 | 
						|
 | 
						|
 | 
						|
@freeze_time("2012-01-01 12:00:00")
 | 
						|
@mock_sts
 | 
						|
def test_get_federation_token_boto3():
 | 
						|
    client = boto3.client("sts", region_name="us-east-1")
 | 
						|
    token_name = "Bob"
 | 
						|
    fed_token = client.get_federation_token(DurationSeconds=903, Name=token_name)
 | 
						|
    creds = fed_token["Credentials"]
 | 
						|
    fed_user = fed_token["FederatedUser"]
 | 
						|
 | 
						|
    creds["Expiration"].should.be.a(datetime)
 | 
						|
 | 
						|
    if not settings.TEST_SERVER_MODE:
 | 
						|
        fdate = creds["Expiration"].strftime("%Y-%m-%dT%H:%M:%S.000Z")
 | 
						|
        fdate.should.equal("2012-01-01T12:15:03.000Z")
 | 
						|
    creds["SessionToken"].should.equal(
 | 
						|
        "AQoDYXdzEPT//////////wEXAMPLEtc764bNrC9SAPBSM22wDOk4x4HIZ8j4FZTwdQWLWsKWHGBuFqwAeMicRXmxfpSPfIeoIYRqTflfKD8YUuwthAx7mSEI/qkPpKPi/kMcGdQrmGdeehM4IC1NtBmUpp2wUE8phUZampKsburEDy0KPkyQDYwT7WZ0wq5VSXDvp75YU9HFvlRd8Tx6q6fE8YQcHNVXAkiY9q6d+xo0rKwT38xVqr7ZD0u0iPPkUL64lIZbqBAz+scqKmlzm8FDrypNC9Yjc8fPOLn9FX9KSYvKTr4rvx3iSIlTJabIQwj2ICCR/oLxBA=="
 | 
						|
    )
 | 
						|
    creds["AccessKeyId"].should.equal("AKIAIOSFODNN7EXAMPLE")
 | 
						|
    creds["SecretAccessKey"].should.equal("wJalrXUtnFEMI/K7MDENG/bPxRfiCYzEXAMPLEKEY")
 | 
						|
 | 
						|
    fed_user["Arn"].should.equal(
 | 
						|
        "arn:aws:sts::{account_id}:federated-user/{token_name}".format(
 | 
						|
            account_id=ACCOUNT_ID, token_name=token_name
 | 
						|
        )
 | 
						|
    )
 | 
						|
    fed_user["FederatedUserId"].should.equal("{}:{}".format(ACCOUNT_ID, token_name))
 | 
						|
 | 
						|
 | 
						|
@freeze_time("2012-01-01 12:00:00")
 | 
						|
@mock_sts
 | 
						|
@mock_iam
 | 
						|
def test_assume_role():
 | 
						|
    client = boto3.client("sts", region_name="us-east-1")
 | 
						|
    iam_client = boto3.client("iam", region_name="us-east-1")
 | 
						|
 | 
						|
    session_name = "session-name"
 | 
						|
    policy = json.dumps(
 | 
						|
        {
 | 
						|
            "Statement": [
 | 
						|
                {
 | 
						|
                    "Sid": "Stmt13690092345534",
 | 
						|
                    "Action": ["S3:ListBucket"],
 | 
						|
                    "Effect": "Allow",
 | 
						|
                    "Resource": ["arn:aws:s3:::foobar-tester"],
 | 
						|
                }
 | 
						|
            ]
 | 
						|
        }
 | 
						|
    )
 | 
						|
    trust_policy_document = {
 | 
						|
        "Version": "2012-10-17",
 | 
						|
        "Statement": {
 | 
						|
            "Effect": "Allow",
 | 
						|
            "Principal": {
 | 
						|
                "AWS": "arn:aws:iam::{account_id}:root".format(account_id=ACCOUNT_ID)
 | 
						|
            },
 | 
						|
            "Action": "sts:AssumeRole",
 | 
						|
        },
 | 
						|
    }
 | 
						|
    role_name = "test-role"
 | 
						|
    role = iam_client.create_role(
 | 
						|
        RoleName="test-role", AssumeRolePolicyDocument=json.dumps(trust_policy_document)
 | 
						|
    )["Role"]
 | 
						|
    role_id = role["RoleId"]
 | 
						|
    role_arn = role["Arn"]
 | 
						|
    assume_role_response = client.assume_role(
 | 
						|
        RoleArn=role_arn,
 | 
						|
        RoleSessionName=session_name,
 | 
						|
        Policy=policy,
 | 
						|
        DurationSeconds=900,
 | 
						|
    )
 | 
						|
 | 
						|
    credentials = assume_role_response["Credentials"]
 | 
						|
    if not settings.TEST_SERVER_MODE:
 | 
						|
        credentials["Expiration"].isoformat().should.equal("2012-01-01T12:15:00+00:00")
 | 
						|
    credentials["SessionToken"].should.have.length_of(356)
 | 
						|
    assert credentials["SessionToken"].startswith("FQoGZXIvYXdzE")
 | 
						|
    credentials["AccessKeyId"].should.have.length_of(20)
 | 
						|
    assert credentials["AccessKeyId"].startswith("ASIA")
 | 
						|
    credentials["SecretAccessKey"].should.have.length_of(40)
 | 
						|
 | 
						|
    assume_role_response["AssumedRoleUser"]["Arn"].should.equal(
 | 
						|
        "arn:aws:sts::{account_id}:assumed-role/{role_name}/{session_name}".format(
 | 
						|
            account_id=ACCOUNT_ID, role_name=role_name, session_name=session_name
 | 
						|
        )
 | 
						|
    )
 | 
						|
    assert assume_role_response["AssumedRoleUser"]["AssumedRoleId"].startswith("AROA")
 | 
						|
    assert (
 | 
						|
        assume_role_response["AssumedRoleUser"]["AssumedRoleId"].rpartition(":")[0]
 | 
						|
        == role_id
 | 
						|
    )
 | 
						|
    assert assume_role_response["AssumedRoleUser"]["AssumedRoleId"].endswith(
 | 
						|
        ":" + session_name
 | 
						|
    )
 | 
						|
    assume_role_response["AssumedRoleUser"]["AssumedRoleId"].should.have.length_of(
 | 
						|
        21 + 1 + len(session_name)
 | 
						|
    )
 | 
						|
 | 
						|
 | 
						|
@freeze_time("2012-01-01 12:00:00")
 | 
						|
@mock_sts
 | 
						|
def test_assume_role_with_saml():
 | 
						|
    client = boto3.client("sts", region_name="us-east-1")
 | 
						|
    role_name = "test-role"
 | 
						|
    provider_name = "TestProvFed"
 | 
						|
    fed_identifier = "7ca82df9-1bad-4dd3-9b2b-adb68b554282"
 | 
						|
    fed_name = "testuser"
 | 
						|
    role_input = "arn:aws:iam::{account_id}:role/{role_name}".format(
 | 
						|
        account_id=ACCOUNT_ID, role_name=role_name
 | 
						|
    )
 | 
						|
    principal_role = "arn:aws:iam:{account_id}:saml-provider/{provider_name}".format(
 | 
						|
        account_id=ACCOUNT_ID, provider_name=provider_name
 | 
						|
    )
 | 
						|
    saml_assertion = """
 | 
						|
<?xml version="1.0"?>
 | 
						|
<samlp:Response xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol" ID="_00000000-0000-0000-0000-000000000000" Version="2.0" IssueInstant="2012-01-01T12:00:00.000Z" Destination="https://signin.aws.amazon.com/saml" Consent="urn:oasis:names:tc:SAML:2.0:consent:unspecified">
 | 
						|
  <Issuer xmlns="urn:oasis:names:tc:SAML:2.0:assertion">http://localhost/</Issuer>
 | 
						|
  <samlp:Status>
 | 
						|
    <samlp:StatusCode Value="urn:oasis:names:tc:SAML:2.0:status:Success"/>
 | 
						|
  </samlp:Status>
 | 
						|
  <Assertion xmlns="urn:oasis:names:tc:SAML:2.0:assertion" ID="_00000000-0000-0000-0000-000000000000" IssueInstant="2012-12-01T12:00:00.000Z" Version="2.0">
 | 
						|
    <Issuer>http://localhost:3000/</Issuer>
 | 
						|
    <ds:Signature xmlns:ds="http://www.w3.org/2000/09/xmldsig#">
 | 
						|
      <ds:SignedInfo>
 | 
						|
        <ds:CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/>
 | 
						|
        <ds:SignatureMethod Algorithm="http://www.w3.org/2001/04/xmldsig-more#rsa-sha256"/>
 | 
						|
        <ds:Reference URI="#_00000000-0000-0000-0000-000000000000">
 | 
						|
          <ds:Transforms>
 | 
						|
            <ds:Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/>
 | 
						|
            <ds:Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/>
 | 
						|
          </ds:Transforms>
 | 
						|
          <ds:DigestMethod Algorithm="http://www.w3.org/2001/04/xmlenc#sha256"/>
 | 
						|
          <ds:DigestValue>NTIyMzk0ZGI4MjI0ZjI5ZGNhYjkyOGQyZGQ1NTZjODViZjk5YTY4ODFjOWRjNjkyYzZmODY2ZDQ4NjlkZjY3YSAgLQo=</ds:DigestValue>
 | 
						|
        </ds:Reference>
 | 
						|
      </ds:SignedInfo>
 | 
						|
      <ds:SignatureValue>NTIyMzk0ZGI4MjI0ZjI5ZGNhYjkyOGQyZGQ1NTZjODViZjk5YTY4ODFjOWRjNjkyYzZmODY2ZDQ4NjlkZjY3YSAgLQo=</ds:SignatureValue>
 | 
						|
      <KeyInfo xmlns="http://www.w3.org/2000/09/xmldsig#">
 | 
						|
        <ds:X509Data>
 | 
						|
          <ds:X509Certificate>NTIyMzk0ZGI4MjI0ZjI5ZGNhYjkyOGQyZGQ1NTZjODViZjk5YTY4ODFjOWRjNjkyYzZmODY2ZDQ4NjlkZjY3YSAgLQo=</ds:X509Certificate>
 | 
						|
        </ds:X509Data>
 | 
						|
      </KeyInfo>
 | 
						|
    </ds:Signature>
 | 
						|
    <Subject>
 | 
						|
      <NameID Format="urn:oasis:names:tc:SAML:2.0:nameid-format:persistent">{fed_identifier}</NameID>
 | 
						|
      <SubjectConfirmation Method="urn:oasis:names:tc:SAML:2.0:cm:bearer">
 | 
						|
        <SubjectConfirmationData NotOnOrAfter="2012-01-01T13:00:00.000Z" Recipient="https://signin.aws.amazon.com/saml"/>
 | 
						|
      </SubjectConfirmation>
 | 
						|
    </Subject>
 | 
						|
    <Conditions NotBefore="2012-01-01T12:00:00.000Z" NotOnOrAfter="2012-01-01T13:00:00.000Z">
 | 
						|
      <AudienceRestriction>
 | 
						|
        <Audience>urn:amazon:webservices</Audience>
 | 
						|
      </AudienceRestriction>
 | 
						|
    </Conditions>
 | 
						|
    <AttributeStatement>
 | 
						|
      <Attribute Name="https://aws.amazon.com/SAML/Attributes/RoleSessionName">
 | 
						|
        <AttributeValue>{fed_name}</AttributeValue>
 | 
						|
      </Attribute>
 | 
						|
      <Attribute Name="https://aws.amazon.com/SAML/Attributes/Role">
 | 
						|
        <AttributeValue>arn:aws:iam::{account_id}:saml-provider/{provider_name},arn:aws:iam::{account_id}:role/{role_name}</AttributeValue>
 | 
						|
      </Attribute>
 | 
						|
      <Attribute Name="https://aws.amazon.com/SAML/Attributes/SessionDuration">
 | 
						|
        <AttributeValue>900</AttributeValue>
 | 
						|
      </Attribute>
 | 
						|
    </AttributeStatement>
 | 
						|
    <AuthnStatement AuthnInstant="2012-01-01T12:00:00.000Z" SessionIndex="_00000000-0000-0000-0000-000000000000">
 | 
						|
      <AuthnContext>
 | 
						|
        <AuthnContextClassRef>urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport</AuthnContextClassRef>
 | 
						|
      </AuthnContext>
 | 
						|
    </AuthnStatement>
 | 
						|
  </Assertion>
 | 
						|
</samlp:Response>""".format(
 | 
						|
        account_id=ACCOUNT_ID,
 | 
						|
        role_name=role_name,
 | 
						|
        provider_name=provider_name,
 | 
						|
        fed_identifier=fed_identifier,
 | 
						|
        fed_name=fed_name,
 | 
						|
    ).replace(
 | 
						|
        "\n", ""
 | 
						|
    )
 | 
						|
 | 
						|
    assume_role_response = client.assume_role_with_saml(
 | 
						|
        RoleArn=role_input,
 | 
						|
        PrincipalArn=principal_role,
 | 
						|
        SAMLAssertion=b64encode(saml_assertion.encode("utf-8")).decode("utf-8"),
 | 
						|
    )
 | 
						|
 | 
						|
    credentials = assume_role_response["Credentials"]
 | 
						|
    if not settings.TEST_SERVER_MODE:
 | 
						|
        credentials["Expiration"].isoformat().should.equal("2012-01-01T12:15:00+00:00")
 | 
						|
    credentials["SessionToken"].should.have.length_of(356)
 | 
						|
    assert credentials["SessionToken"].startswith("FQoGZXIvYXdzE")
 | 
						|
    credentials["AccessKeyId"].should.have.length_of(20)
 | 
						|
    assert credentials["AccessKeyId"].startswith("ASIA")
 | 
						|
    credentials["SecretAccessKey"].should.have.length_of(40)
 | 
						|
 | 
						|
    assume_role_response["AssumedRoleUser"]["Arn"].should.equal(
 | 
						|
        "arn:aws:sts::{account_id}:assumed-role/{role_name}/{fed_name}".format(
 | 
						|
            account_id=ACCOUNT_ID, role_name=role_name, fed_name=fed_name
 | 
						|
        )
 | 
						|
    )
 | 
						|
    assert assume_role_response["AssumedRoleUser"]["AssumedRoleId"].startswith("AROA")
 | 
						|
    assert assume_role_response["AssumedRoleUser"]["AssumedRoleId"].endswith(
 | 
						|
        ":{fed_name}".format(fed_name=fed_name)
 | 
						|
    )
 | 
						|
    assume_role_response["AssumedRoleUser"]["AssumedRoleId"].should.have.length_of(
 | 
						|
        21 + 1 + len("{fed_name}".format(fed_name=fed_name))
 | 
						|
    )
 | 
						|
 | 
						|
 | 
						|
@freeze_time("2012-01-01 12:00:00")
 | 
						|
@mock_sts
 | 
						|
def test_assume_role_with_saml_should_not_rely_on_attribute_order():
 | 
						|
    client = boto3.client("sts", region_name="us-east-1")
 | 
						|
    role_name = "test-role"
 | 
						|
    provider_name = "TestProvFed"
 | 
						|
    fed_identifier = "7ca82df9-1bad-4dd3-9b2b-adb68b554282"
 | 
						|
    fed_name = "testuser"
 | 
						|
    role_input = "arn:aws:iam::{account_id}:role/{role_name}".format(
 | 
						|
        account_id=ACCOUNT_ID, role_name=role_name
 | 
						|
    )
 | 
						|
    principal_role = "arn:aws:iam:{account_id}:saml-provider/{provider_name}".format(
 | 
						|
        account_id=ACCOUNT_ID, provider_name=provider_name
 | 
						|
    )
 | 
						|
    saml_assertion = """
 | 
						|
<?xml version="1.0"?>
 | 
						|
<samlp:Response xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol" ID="_00000000-0000-0000-0000-000000000000" Version="2.0" IssueInstant="2012-01-01T12:00:00.000Z" Destination="https://signin.aws.amazon.com/saml" Consent="urn:oasis:names:tc:SAML:2.0:consent:unspecified">
 | 
						|
  <Issuer xmlns="urn:oasis:names:tc:SAML:2.0:assertion">http://localhost/</Issuer>
 | 
						|
  <samlp:Status>
 | 
						|
    <samlp:StatusCode Value="urn:oasis:names:tc:SAML:2.0:status:Success"/>
 | 
						|
  </samlp:Status>
 | 
						|
  <Assertion xmlns="urn:oasis:names:tc:SAML:2.0:assertion" ID="_00000000-0000-0000-0000-000000000000" IssueInstant="2012-12-01T12:00:00.000Z" Version="2.0">
 | 
						|
    <Issuer>http://localhost:3000/</Issuer>
 | 
						|
    <ds:Signature xmlns:ds="http://www.w3.org/2000/09/xmldsig#">
 | 
						|
      <ds:SignedInfo>
 | 
						|
        <ds:CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/>
 | 
						|
        <ds:SignatureMethod Algorithm="http://www.w3.org/2001/04/xmldsig-more#rsa-sha256"/>
 | 
						|
        <ds:Reference URI="#_00000000-0000-0000-0000-000000000000">
 | 
						|
          <ds:Transforms>
 | 
						|
            <ds:Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/>
 | 
						|
            <ds:Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/>
 | 
						|
          </ds:Transforms>
 | 
						|
          <ds:DigestMethod Algorithm="http://www.w3.org/2001/04/xmlenc#sha256"/>
 | 
						|
          <ds:DigestValue>NTIyMzk0ZGI4MjI0ZjI5ZGNhYjkyOGQyZGQ1NTZjODViZjk5YTY4ODFjOWRjNjkyYzZmODY2ZDQ4NjlkZjY3YSAgLQo=</ds:DigestValue>
 | 
						|
        </ds:Reference>
 | 
						|
      </ds:SignedInfo>
 | 
						|
      <ds:SignatureValue>NTIyMzk0ZGI4MjI0ZjI5ZGNhYjkyOGQyZGQ1NTZjODViZjk5YTY4ODFjOWRjNjkyYzZmODY2ZDQ4NjlkZjY3YSAgLQo=</ds:SignatureValue>
 | 
						|
      <KeyInfo xmlns="http://www.w3.org/2000/09/xmldsig#">
 | 
						|
        <ds:X509Data>
 | 
						|
          <ds:X509Certificate>NTIyMzk0ZGI4MjI0ZjI5ZGNhYjkyOGQyZGQ1NTZjODViZjk5YTY4ODFjOWRjNjkyYzZmODY2ZDQ4NjlkZjY3YSAgLQo=</ds:X509Certificate>
 | 
						|
        </ds:X509Data>
 | 
						|
      </KeyInfo>
 | 
						|
    </ds:Signature>
 | 
						|
    <Subject>
 | 
						|
      <NameID Format="urn:oasis:names:tc:SAML:2.0:nameid-format:persistent">{fed_identifier}</NameID>
 | 
						|
      <SubjectConfirmation Method="urn:oasis:names:tc:SAML:2.0:cm:bearer">
 | 
						|
        <SubjectConfirmationData NotOnOrAfter="2012-01-01T13:00:00.000Z" Recipient="https://signin.aws.amazon.com/saml"/>
 | 
						|
      </SubjectConfirmation>
 | 
						|
    </Subject>
 | 
						|
    <Conditions NotBefore="2012-01-01T12:00:00.000Z" NotOnOrAfter="2012-01-01T13:00:00.000Z">
 | 
						|
      <AudienceRestriction>
 | 
						|
        <Audience>urn:amazon:webservices</Audience>
 | 
						|
      </AudienceRestriction>
 | 
						|
    </Conditions>
 | 
						|
    <AttributeStatement>
 | 
						|
      <Attribute Name="https://aws.amazon.com/SAML/Attributes/Role">
 | 
						|
        <AttributeValue>arn:aws:iam::{account_id}:saml-provider/{provider_name},arn:aws:iam::{account_id}:role/{role_name}</AttributeValue>
 | 
						|
      </Attribute>
 | 
						|
      <Attribute Name="https://aws.amazon.com/SAML/Attributes/SessionDuration">
 | 
						|
        <AttributeValue>900</AttributeValue>
 | 
						|
      </Attribute>
 | 
						|
      <Attribute Name="https://aws.amazon.com/SAML/Attributes/RoleSessionName">
 | 
						|
        <AttributeValue>{fed_name}</AttributeValue>
 | 
						|
      </Attribute>
 | 
						|
    </AttributeStatement>
 | 
						|
    <AuthnStatement AuthnInstant="2012-01-01T12:00:00.000Z" SessionIndex="_00000000-0000-0000-0000-000000000000">
 | 
						|
      <AuthnContext>
 | 
						|
        <AuthnContextClassRef>urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport</AuthnContextClassRef>
 | 
						|
      </AuthnContext>
 | 
						|
    </AuthnStatement>
 | 
						|
  </Assertion>
 | 
						|
</samlp:Response>""".format(
 | 
						|
        account_id=ACCOUNT_ID,
 | 
						|
        role_name=role_name,
 | 
						|
        provider_name=provider_name,
 | 
						|
        fed_identifier=fed_identifier,
 | 
						|
        fed_name=fed_name,
 | 
						|
    ).replace(
 | 
						|
        "\n", ""
 | 
						|
    )
 | 
						|
 | 
						|
    assume_role_response = client.assume_role_with_saml(
 | 
						|
        RoleArn=role_input,
 | 
						|
        PrincipalArn=principal_role,
 | 
						|
        SAMLAssertion=b64encode(saml_assertion.encode("utf-8")).decode("utf-8"),
 | 
						|
    )
 | 
						|
 | 
						|
    credentials = assume_role_response["Credentials"]
 | 
						|
    if not settings.TEST_SERVER_MODE:
 | 
						|
        credentials["Expiration"].isoformat().should.equal("2012-01-01T12:15:00+00:00")
 | 
						|
 | 
						|
    assume_role_response["AssumedRoleUser"]["Arn"].should.equal(
 | 
						|
        "arn:aws:sts::{account_id}:assumed-role/{role_name}/{fed_name}".format(
 | 
						|
            account_id=ACCOUNT_ID, role_name=role_name, fed_name=fed_name
 | 
						|
        )
 | 
						|
    )
 | 
						|
 | 
						|
 | 
						|
@freeze_time("2012-01-01 12:00:00")
 | 
						|
@mock_sts
 | 
						|
def test_assume_role_with_saml_should_respect_xml_namespaces():
 | 
						|
    client = boto3.client("sts", region_name="us-east-1")
 | 
						|
    role_name = "test-role"
 | 
						|
    provider_name = "TestProvFed"
 | 
						|
    fed_identifier = "7ca82df9-1bad-4dd3-9b2b-adb68b554282"
 | 
						|
    fed_name = "testuser"
 | 
						|
    role_input = "arn:aws:iam::{account_id}:role/{role_name}".format(
 | 
						|
        account_id=ACCOUNT_ID, role_name=role_name
 | 
						|
    )
 | 
						|
    principal_role = "arn:aws:iam:{account_id}:saml-provider/{provider_name}".format(
 | 
						|
        account_id=ACCOUNT_ID, provider_name=provider_name
 | 
						|
    )
 | 
						|
    saml_assertion = """
 | 
						|
<?xml version="1.0"?>
 | 
						|
<samlp:Response xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol" xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion" ID="_00000000-0000-0000-0000-000000000000" Version="2.0" IssueInstant="2012-01-01T12:00:00.000Z" Destination="https://signin.aws.amazon.com/saml" Consent="urn:oasis:names:tc:SAML:2.0:consent:unspecified">
 | 
						|
  <saml:Issuer xmlns="urn:oasis:names:tc:SAML:2.0:assertion">http://localhost/</saml:Issuer>
 | 
						|
  <samlp:Status>
 | 
						|
    <samlp:StatusCode Value="urn:oasis:names:tc:SAML:2.0:status:Success"/>
 | 
						|
  </samlp:Status>
 | 
						|
  <saml:Assertion xmlns="urn:oasis:names:tc:SAML:2.0:assertion" ID="_00000000-0000-0000-0000-000000000000" IssueInstant="2012-12-01T12:00:00.000Z" Version="2.0">
 | 
						|
    <saml:Issuer>http://localhost:3000/</saml:Issuer>
 | 
						|
    <ds:Signature xmlns:ds="http://www.w3.org/2000/09/xmldsig#">
 | 
						|
      <ds:SignedInfo>
 | 
						|
        <ds:CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/>
 | 
						|
        <ds:SignatureMethod Algorithm="http://www.w3.org/2001/04/xmldsig-more#rsa-sha256"/>
 | 
						|
        <ds:Reference URI="#_00000000-0000-0000-0000-000000000000">
 | 
						|
          <ds:Transforms>
 | 
						|
            <ds:Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/>
 | 
						|
            <ds:Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/>
 | 
						|
          </ds:Transforms>
 | 
						|
          <ds:DigestMethod Algorithm="http://www.w3.org/2001/04/xmlenc#sha256"/>
 | 
						|
          <ds:DigestValue>NTIyMzk0ZGI4MjI0ZjI5ZGNhYjkyOGQyZGQ1NTZjODViZjk5YTY4ODFjOWRjNjkyYzZmODY2ZDQ4NjlkZjY3YSAgLQo=</ds:DigestValue>
 | 
						|
        </ds:Reference>
 | 
						|
      </ds:SignedInfo>
 | 
						|
      <ds:SignatureValue>NTIyMzk0ZGI4MjI0ZjI5ZGNhYjkyOGQyZGQ1NTZjODViZjk5YTY4ODFjOWRjNjkyYzZmODY2ZDQ4NjlkZjY3YSAgLQo=</ds:SignatureValue>
 | 
						|
      <ds:KeyInfo>
 | 
						|
        <ds:X509Data>
 | 
						|
          <ds:X509Certificate>NTIyMzk0ZGI4MjI0ZjI5ZGNhYjkyOGQyZGQ1NTZjODViZjk5YTY4ODFjOWRjNjkyYzZmODY2ZDQ4NjlkZjY3YSAgLQo=</ds:X509Certificate>
 | 
						|
        </ds:X509Data>
 | 
						|
      </ds:KeyInfo>
 | 
						|
    </ds:Signature>
 | 
						|
    <saml:Subject>
 | 
						|
      <saml:NameID Format="urn:oasis:names:tc:SAML:2.0:nameid-format:persistent">{fed_identifier}</saml:NameID>
 | 
						|
      <saml:SubjectConfirmation Method="urn:oasis:names:tc:SAML:2.0:cm:bearer">
 | 
						|
        <saml:SubjectConfirmationData NotOnOrAfter="2012-01-01T13:00:00.000Z" Recipient="https://signin.aws.amazon.com/saml"/>
 | 
						|
      </saml:SubjectConfirmation>
 | 
						|
    </saml:Subject>
 | 
						|
    <saml:Conditions NotBefore="2012-01-01T12:00:00.000Z" NotOnOrAfter="2012-01-01T13:00:00.000Z">
 | 
						|
      <saml:AudienceRestriction>
 | 
						|
        <Audience>urn:amazon:webservices</Audience>
 | 
						|
      </saml:AudienceRestriction>
 | 
						|
    </saml:Conditions>
 | 
						|
    <saml:AttributeStatement>
 | 
						|
      <saml:Attribute Name="https://aws.amazon.com/SAML/Attributes/RoleSessionName">
 | 
						|
        <saml:AttributeValue>{fed_name}</saml:AttributeValue>
 | 
						|
      </saml:Attribute>
 | 
						|
      <saml:Attribute Name="https://aws.amazon.com/SAML/Attributes/Role">
 | 
						|
        <saml:AttributeValue>arn:aws:iam::{account_id}:saml-provider/{provider_name},arn:aws:iam::{account_id}:role/{role_name}</saml:AttributeValue>
 | 
						|
      </saml:Attribute>
 | 
						|
      <saml:Attribute Name="https://aws.amazon.com/SAML/Attributes/SessionDuration">
 | 
						|
        <saml:AttributeValue>900</saml:AttributeValue>
 | 
						|
      </saml:Attribute>
 | 
						|
    </saml:AttributeStatement>
 | 
						|
    <saml:AuthnStatement AuthnInstant="2012-01-01T12:00:00.000Z" SessionIndex="_00000000-0000-0000-0000-000000000000">
 | 
						|
      <saml:AuthnContext>
 | 
						|
        <saml:AuthnContextClassRef>urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport</saml:AuthnContextClassRef>
 | 
						|
      </saml:AuthnContext>
 | 
						|
    </saml:AuthnStatement>
 | 
						|
  </saml:Assertion>
 | 
						|
</samlp:Response>""".format(
 | 
						|
        account_id=ACCOUNT_ID,
 | 
						|
        role_name=role_name,
 | 
						|
        provider_name=provider_name,
 | 
						|
        fed_identifier=fed_identifier,
 | 
						|
        fed_name=fed_name,
 | 
						|
    ).replace(
 | 
						|
        "\n", ""
 | 
						|
    )
 | 
						|
 | 
						|
    assume_role_response = client.assume_role_with_saml(
 | 
						|
        RoleArn=role_input,
 | 
						|
        PrincipalArn=principal_role,
 | 
						|
        SAMLAssertion=b64encode(saml_assertion.encode("utf-8")).decode("utf-8"),
 | 
						|
    )
 | 
						|
 | 
						|
    credentials = assume_role_response["Credentials"]
 | 
						|
    if not settings.TEST_SERVER_MODE:
 | 
						|
        credentials["Expiration"].isoformat().should.equal("2012-01-01T12:15:00+00:00")
 | 
						|
 | 
						|
    assume_role_response["AssumedRoleUser"]["Arn"].should.equal(
 | 
						|
        "arn:aws:sts::{account_id}:assumed-role/{role_name}/{fed_name}".format(
 | 
						|
            account_id=ACCOUNT_ID, role_name=role_name, fed_name=fed_name
 | 
						|
        )
 | 
						|
    )
 | 
						|
 | 
						|
 | 
						|
@freeze_time("2012-01-01 12:00:00")
 | 
						|
@mock_sts
 | 
						|
def test_assume_role_with_saml_should_retrieve_attribute_value_from_text_when_xml_tag_contains_xmlns_attributes():
 | 
						|
    client = boto3.client("sts", region_name="us-east-1")
 | 
						|
    role_name = "test-role"
 | 
						|
    provider_name = "TestProvFed"
 | 
						|
    fed_identifier = "7ca82df9-1bad-4dd3-9b2b-adb68b554282"
 | 
						|
    fed_name = "testuser"
 | 
						|
    role_input = "arn:aws:iam::{account_id}:role/{role_name}".format(
 | 
						|
        account_id=ACCOUNT_ID, role_name=role_name
 | 
						|
    )
 | 
						|
    principal_role = "arn:aws:iam:{account_id}:saml-provider/{provider_name}".format(
 | 
						|
        account_id=ACCOUNT_ID, provider_name=provider_name
 | 
						|
    )
 | 
						|
    saml_assertion = """
 | 
						|
<?xml version="1.0"?>
 | 
						|
<samlp:Response xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol" xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion" ID="_00000000-0000-0000-0000-000000000000" Version="2.0" IssueInstant="2012-01-01T12:00:00.000Z" Destination="https://signin.aws.amazon.com/saml" Consent="urn:oasis:names:tc:SAML:2.0:consent:unspecified">
 | 
						|
  <saml:Issuer xmlns="urn:oasis:names:tc:SAML:2.0:assertion">http://localhost/</saml:Issuer>
 | 
						|
  <samlp:Status>
 | 
						|
    <samlp:StatusCode Value="urn:oasis:names:tc:SAML:2.0:status:Success"/>
 | 
						|
  </samlp:Status>
 | 
						|
  <saml:Assertion xmlns="urn:oasis:names:tc:SAML:2.0:assertion" ID="_00000000-0000-0000-0000-000000000000" IssueInstant="2012-12-01T12:00:00.000Z" Version="2.0">
 | 
						|
    <saml:Issuer>http://localhost:3000/</saml:Issuer>
 | 
						|
    <ds:Signature xmlns:ds="http://www.w3.org/2000/09/xmldsig#">
 | 
						|
      <ds:SignedInfo>
 | 
						|
        <ds:CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/>
 | 
						|
        <ds:SignatureMethod Algorithm="http://www.w3.org/2001/04/xmldsig-more#rsa-sha256"/>
 | 
						|
        <ds:Reference URI="#_00000000-0000-0000-0000-000000000000">
 | 
						|
          <ds:Transforms>
 | 
						|
            <ds:Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/>
 | 
						|
            <ds:Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/>
 | 
						|
          </ds:Transforms>
 | 
						|
          <ds:DigestMethod Algorithm="http://www.w3.org/2001/04/xmlenc#sha256"/>
 | 
						|
          <ds:DigestValue>NTIyMzk0ZGI4MjI0ZjI5ZGNhYjkyOGQyZGQ1NTZjODViZjk5YTY4ODFjOWRjNjkyYzZmODY2ZDQ4NjlkZjY3YSAgLQo=</ds:DigestValue>
 | 
						|
        </ds:Reference>
 | 
						|
      </ds:SignedInfo>
 | 
						|
      <ds:SignatureValue>NTIyMzk0ZGI4MjI0ZjI5ZGNhYjkyOGQyZGQ1NTZjODViZjk5YTY4ODFjOWRjNjkyYzZmODY2ZDQ4NjlkZjY3YSAgLQo=</ds:SignatureValue>
 | 
						|
      <ds:KeyInfo>
 | 
						|
        <ds:X509Data>
 | 
						|
          <ds:X509Certificate>NTIyMzk0ZGI4MjI0ZjI5ZGNhYjkyOGQyZGQ1NTZjODViZjk5YTY4ODFjOWRjNjkyYzZmODY2ZDQ4NjlkZjY3YSAgLQo=</ds:X509Certificate>
 | 
						|
        </ds:X509Data>
 | 
						|
      </ds:KeyInfo>
 | 
						|
    </ds:Signature>
 | 
						|
    <saml:Subject>
 | 
						|
      <saml:NameID Format="urn:oasis:names:tc:SAML:2.0:nameid-format:persistent">{fed_identifier}</saml:NameID>
 | 
						|
      <saml:SubjectConfirmation Method="urn:oasis:names:tc:SAML:2.0:cm:bearer">
 | 
						|
        <saml:SubjectConfirmationData NotOnOrAfter="2012-01-01T13:00:00.000Z" Recipient="https://signin.aws.amazon.com/saml"/>
 | 
						|
      </saml:SubjectConfirmation>
 | 
						|
    </saml:Subject>
 | 
						|
    <saml:Conditions NotBefore="2012-01-01T12:00:00.000Z" NotOnOrAfter="2012-01-01T13:00:00.000Z">
 | 
						|
      <saml:AudienceRestriction>
 | 
						|
        <Audience>urn:amazon:webservices</Audience>
 | 
						|
      </saml:AudienceRestriction>
 | 
						|
    </saml:Conditions>
 | 
						|
    <saml:AttributeStatement>
 | 
						|
      <saml:Attribute Name="https://aws.amazon.com/SAML/Attributes/RoleSessionName">
 | 
						|
        <saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema"
 | 
						|
                             xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
 | 
						|
                             xsi:type="xs:string">{fed_name}</saml:AttributeValue>
 | 
						|
      </saml:Attribute>
 | 
						|
      <saml:Attribute Name="https://aws.amazon.com/SAML/Attributes/Role">
 | 
						|
        <saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema"
 | 
						|
                             xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
 | 
						|
                             xsi:type="xs:string">arn:aws:iam::{account_id}:saml-provider/{provider_name},arn:aws:iam::{account_id}:role/{role_name}</saml:AttributeValue>
 | 
						|
      </saml:Attribute>
 | 
						|
      <saml:Attribute Name="https://aws.amazon.com/SAML/Attributes/SessionDuration">
 | 
						|
        <saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema"
 | 
						|
                             xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
 | 
						|
                             xsi:type="xs:string">900</saml:AttributeValue>
 | 
						|
      </saml:Attribute>
 | 
						|
    </saml:AttributeStatement>
 | 
						|
    <saml:AuthnStatement AuthnInstant="2012-01-01T12:00:00.000Z" SessionIndex="_00000000-0000-0000-0000-000000000000">
 | 
						|
      <saml:AuthnContext>
 | 
						|
        <saml:AuthnContextClassRef>urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport</saml:AuthnContextClassRef>
 | 
						|
      </saml:AuthnContext>
 | 
						|
    </saml:AuthnStatement>
 | 
						|
  </saml:Assertion>
 | 
						|
</samlp:Response>""".format(
 | 
						|
        account_id=ACCOUNT_ID,
 | 
						|
        role_name=role_name,
 | 
						|
        provider_name=provider_name,
 | 
						|
        fed_identifier=fed_identifier,
 | 
						|
        fed_name=fed_name,
 | 
						|
    ).replace(
 | 
						|
        "\n", ""
 | 
						|
    )
 | 
						|
 | 
						|
    assume_role_response = client.assume_role_with_saml(
 | 
						|
        RoleArn=role_input,
 | 
						|
        PrincipalArn=principal_role,
 | 
						|
        SAMLAssertion=b64encode(saml_assertion.encode("utf-8")).decode("utf-8"),
 | 
						|
    )
 | 
						|
 | 
						|
    credentials = assume_role_response["Credentials"]
 | 
						|
    if not settings.TEST_SERVER_MODE:
 | 
						|
        credentials["Expiration"].isoformat().should.equal("2012-01-01T12:15:00+00:00")
 | 
						|
 | 
						|
    assume_role_response["AssumedRoleUser"]["Arn"].should.equal(
 | 
						|
        "arn:aws:sts::{account_id}:assumed-role/{role_name}/{fed_name}".format(
 | 
						|
            account_id=ACCOUNT_ID, role_name=role_name, fed_name=fed_name
 | 
						|
        )
 | 
						|
    )
 | 
						|
 | 
						|
 | 
						|
@freeze_time("2012-01-01 12:00:00")
 | 
						|
@mock_sts
 | 
						|
def test_assume_role_with_saml_should_default_session_duration_to_3600_seconds_when_saml_attribute_not_provided():
 | 
						|
    client = boto3.client("sts", region_name="us-east-1")
 | 
						|
    role_name = "test-role"
 | 
						|
    provider_name = "TestProvFed"
 | 
						|
    fed_identifier = "7ca82df9-1bad-4dd3-9b2b-adb68b554282"
 | 
						|
    fed_name = "testuser"
 | 
						|
    role_input = "arn:aws:iam::{account_id}:role/{role_name}".format(
 | 
						|
        account_id=ACCOUNT_ID, role_name=role_name
 | 
						|
    )
 | 
						|
    principal_role = "arn:aws:iam:{account_id}:saml-provider/{provider_name}".format(
 | 
						|
        account_id=ACCOUNT_ID, provider_name=provider_name
 | 
						|
    )
 | 
						|
    saml_assertion = """
 | 
						|
<?xml version="1.0"?>
 | 
						|
<samlp:Response xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol" ID="_00000000-0000-0000-0000-000000000000" Version="2.0" IssueInstant="2012-01-01T12:00:00.000Z" Destination="https://signin.aws.amazon.com/saml" Consent="urn:oasis:names:tc:SAML:2.0:consent:unspecified">
 | 
						|
  <Issuer xmlns="urn:oasis:names:tc:SAML:2.0:assertion">http://localhost/</Issuer>
 | 
						|
  <samlp:Status>
 | 
						|
    <samlp:StatusCode Value="urn:oasis:names:tc:SAML:2.0:status:Success"/>
 | 
						|
  </samlp:Status>
 | 
						|
  <Assertion xmlns="urn:oasis:names:tc:SAML:2.0:assertion" ID="_00000000-0000-0000-0000-000000000000" IssueInstant="2012-12-01T12:00:00.000Z" Version="2.0">
 | 
						|
    <Issuer>http://localhost:3000/</Issuer>
 | 
						|
    <ds:Signature xmlns:ds="http://www.w3.org/2000/09/xmldsig#">
 | 
						|
      <ds:SignedInfo>
 | 
						|
        <ds:CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/>
 | 
						|
        <ds:SignatureMethod Algorithm="http://www.w3.org/2001/04/xmldsig-more#rsa-sha256"/>
 | 
						|
        <ds:Reference URI="#_00000000-0000-0000-0000-000000000000">
 | 
						|
          <ds:Transforms>
 | 
						|
            <ds:Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/>
 | 
						|
            <ds:Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/>
 | 
						|
          </ds:Transforms>
 | 
						|
          <ds:DigestMethod Algorithm="http://www.w3.org/2001/04/xmlenc#sha256"/>
 | 
						|
          <ds:DigestValue>NTIyMzk0ZGI4MjI0ZjI5ZGNhYjkyOGQyZGQ1NTZjODViZjk5YTY4ODFjOWRjNjkyYzZmODY2ZDQ4NjlkZjY3YSAgLQo=</ds:DigestValue>
 | 
						|
        </ds:Reference>
 | 
						|
      </ds:SignedInfo>
 | 
						|
      <ds:SignatureValue>NTIyMzk0ZGI4MjI0ZjI5ZGNhYjkyOGQyZGQ1NTZjODViZjk5YTY4ODFjOWRjNjkyYzZmODY2ZDQ4NjlkZjY3YSAgLQo=</ds:SignatureValue>
 | 
						|
      <KeyInfo xmlns="http://www.w3.org/2000/09/xmldsig#">
 | 
						|
        <ds:X509Data>
 | 
						|
          <ds:X509Certificate>NTIyMzk0ZGI4MjI0ZjI5ZGNhYjkyOGQyZGQ1NTZjODViZjk5YTY4ODFjOWRjNjkyYzZmODY2ZDQ4NjlkZjY3YSAgLQo=</ds:X509Certificate>
 | 
						|
        </ds:X509Data>
 | 
						|
      </KeyInfo>
 | 
						|
    </ds:Signature>
 | 
						|
    <Subject>
 | 
						|
      <NameID Format="urn:oasis:names:tc:SAML:2.0:nameid-format:persistent">{fed_identifier}</NameID>
 | 
						|
      <SubjectConfirmation Method="urn:oasis:names:tc:SAML:2.0:cm:bearer">
 | 
						|
        <SubjectConfirmationData NotOnOrAfter="2012-01-01T13:00:00.000Z" Recipient="https://signin.aws.amazon.com/saml"/>
 | 
						|
      </SubjectConfirmation>
 | 
						|
    </Subject>
 | 
						|
    <Conditions NotBefore="2012-01-01T12:00:00.000Z" NotOnOrAfter="2012-01-01T13:00:00.000Z">
 | 
						|
      <AudienceRestriction>
 | 
						|
        <Audience>urn:amazon:webservices</Audience>
 | 
						|
      </AudienceRestriction>
 | 
						|
    </Conditions>
 | 
						|
    <AttributeStatement>
 | 
						|
      <Attribute Name="https://aws.amazon.com/SAML/Attributes/Role">
 | 
						|
        <AttributeValue>arn:aws:iam::{account_id}:saml-provider/{provider_name},arn:aws:iam::{account_id}:role/{role_name}</AttributeValue>
 | 
						|
      </Attribute>
 | 
						|
      <Attribute Name="https://aws.amazon.com/SAML/Attributes/RoleSessionName">
 | 
						|
        <AttributeValue>{fed_name}</AttributeValue>
 | 
						|
      </Attribute>
 | 
						|
    </AttributeStatement>
 | 
						|
    <AuthnStatement AuthnInstant="2012-01-01T12:00:00.000Z" SessionIndex="_00000000-0000-0000-0000-000000000000">
 | 
						|
      <AuthnContext>
 | 
						|
        <AuthnContextClassRef>urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport</AuthnContextClassRef>
 | 
						|
      </AuthnContext>
 | 
						|
    </AuthnStatement>
 | 
						|
  </Assertion>
 | 
						|
</samlp:Response>""".format(
 | 
						|
        account_id=ACCOUNT_ID,
 | 
						|
        role_name=role_name,
 | 
						|
        provider_name=provider_name,
 | 
						|
        fed_identifier=fed_identifier,
 | 
						|
        fed_name=fed_name,
 | 
						|
    ).replace(
 | 
						|
        "\n", ""
 | 
						|
    )
 | 
						|
 | 
						|
    assume_role_response = client.assume_role_with_saml(
 | 
						|
        RoleArn=role_input,
 | 
						|
        PrincipalArn=principal_role,
 | 
						|
        SAMLAssertion=b64encode(saml_assertion.encode("utf-8")).decode("utf-8"),
 | 
						|
    )
 | 
						|
 | 
						|
    credentials = assume_role_response["Credentials"]
 | 
						|
    credentials.should.have.key("Expiration")
 | 
						|
    if not settings.TEST_SERVER_MODE:
 | 
						|
        credentials["Expiration"].isoformat().should.equal("2012-01-01T13:00:00+00:00")
 | 
						|
 | 
						|
 | 
						|
@freeze_time("2012-01-01 12:00:00")
 | 
						|
@mock_sts
 | 
						|
def test_assume_role_with_web_identity_boto3():
 | 
						|
    client = boto3.client("sts", region_name="us-east-1")
 | 
						|
 | 
						|
    policy = json.dumps(
 | 
						|
        {
 | 
						|
            "Statement": [
 | 
						|
                {
 | 
						|
                    "Sid": "Stmt13690092345534",
 | 
						|
                    "Action": ["S3:ListBucket"],
 | 
						|
                    "Effect": "Allow",
 | 
						|
                    "Resource": ["arn:aws:s3:::foobar-tester"],
 | 
						|
                }
 | 
						|
            ]
 | 
						|
        }
 | 
						|
    )
 | 
						|
    role_name = "test-role"
 | 
						|
    s3_role = "arn:aws:iam::{account_id}:role/{role_name}".format(
 | 
						|
        account_id=ACCOUNT_ID, role_name=role_name
 | 
						|
    )
 | 
						|
    session_name = "session-name"
 | 
						|
    role = client.assume_role_with_web_identity(
 | 
						|
        RoleArn=s3_role,
 | 
						|
        RoleSessionName=session_name,
 | 
						|
        WebIdentityToken="????",
 | 
						|
        Policy=policy,
 | 
						|
        DurationSeconds=903,
 | 
						|
    )
 | 
						|
 | 
						|
    creds = role["Credentials"]
 | 
						|
    user = role["AssumedRoleUser"]
 | 
						|
 | 
						|
    creds["Expiration"].should.be.a(datetime)
 | 
						|
 | 
						|
    if not settings.TEST_SERVER_MODE:
 | 
						|
        fdate = creds["Expiration"].strftime("%Y-%m-%dT%H:%M:%S.000Z")
 | 
						|
        fdate.should.equal("2012-01-01T12:15:03.000Z")
 | 
						|
 | 
						|
    creds["SessionToken"].should.have.length_of(356)
 | 
						|
    creds["SessionToken"].should.match("^FQoGZXIvYXdzE")
 | 
						|
    creds["AccessKeyId"].should.have.length_of(20)
 | 
						|
    creds["AccessKeyId"].should.match("^ASIA")
 | 
						|
    creds["SecretAccessKey"].should.have.length_of(40)
 | 
						|
 | 
						|
    user["Arn"].should.equal(
 | 
						|
        "arn:aws:sts::{account_id}:assumed-role/{role_name}/{session_name}".format(
 | 
						|
            account_id=ACCOUNT_ID, role_name=role_name, session_name=session_name
 | 
						|
        )
 | 
						|
    )
 | 
						|
    user["AssumedRoleId"].should.contain("session-name")
 | 
						|
 | 
						|
 | 
						|
@mock_sts
 | 
						|
def test_get_caller_identity_with_default_credentials():
 | 
						|
    identity = boto3.client("sts", region_name="us-east-1").get_caller_identity()
 | 
						|
 | 
						|
    identity["Arn"].should.equal(
 | 
						|
        "arn:aws:sts::{account_id}:user/moto".format(account_id=ACCOUNT_ID)
 | 
						|
    )
 | 
						|
    identity["UserId"].should.equal("AKIAIOSFODNN7EXAMPLE")
 | 
						|
    identity["Account"].should.equal(str(ACCOUNT_ID))
 | 
						|
 | 
						|
 | 
						|
@mock_sts
 | 
						|
@mock_iam
 | 
						|
def test_get_caller_identity_with_iam_user_credentials():
 | 
						|
    iam_client = boto3.client("iam", region_name="us-east-1")
 | 
						|
    iam_user_name = "new-user"
 | 
						|
    iam_user = iam_client.create_user(UserName=iam_user_name)["User"]
 | 
						|
    access_key = iam_client.create_access_key(UserName=iam_user_name)["AccessKey"]
 | 
						|
 | 
						|
    identity = boto3.client(
 | 
						|
        "sts",
 | 
						|
        region_name="us-east-1",
 | 
						|
        aws_access_key_id=access_key["AccessKeyId"],
 | 
						|
        aws_secret_access_key=access_key["SecretAccessKey"],
 | 
						|
    ).get_caller_identity()
 | 
						|
 | 
						|
    identity["Arn"].should.equal(iam_user["Arn"])
 | 
						|
    identity["UserId"].should.equal(iam_user["UserId"])
 | 
						|
    identity["Account"].should.equal(str(ACCOUNT_ID))
 | 
						|
 | 
						|
 | 
						|
@mock_sts
 | 
						|
@mock_iam
 | 
						|
def test_get_caller_identity_with_assumed_role_credentials():
 | 
						|
    iam_client = boto3.client("iam", region_name="us-east-1")
 | 
						|
    sts_client = boto3.client("sts", region_name="us-east-1")
 | 
						|
    iam_role_name = "new-user"
 | 
						|
    trust_policy_document = {
 | 
						|
        "Version": "2012-10-17",
 | 
						|
        "Statement": {
 | 
						|
            "Effect": "Allow",
 | 
						|
            "Principal": {
 | 
						|
                "AWS": "arn:aws:iam::{account_id}:root".format(account_id=ACCOUNT_ID)
 | 
						|
            },
 | 
						|
            "Action": "sts:AssumeRole",
 | 
						|
        },
 | 
						|
    }
 | 
						|
    iam_role_arn = iam_client.role_arn = iam_client.create_role(
 | 
						|
        RoleName=iam_role_name,
 | 
						|
        AssumeRolePolicyDocument=json.dumps(trust_policy_document),
 | 
						|
    )["Role"]["Arn"]
 | 
						|
    session_name = "new-session"
 | 
						|
    assumed_role = sts_client.assume_role(
 | 
						|
        RoleArn=iam_role_arn, RoleSessionName=session_name
 | 
						|
    )
 | 
						|
    access_key = assumed_role["Credentials"]
 | 
						|
 | 
						|
    identity = boto3.client(
 | 
						|
        "sts",
 | 
						|
        region_name="us-east-1",
 | 
						|
        aws_access_key_id=access_key["AccessKeyId"],
 | 
						|
        aws_secret_access_key=access_key["SecretAccessKey"],
 | 
						|
    ).get_caller_identity()
 | 
						|
 | 
						|
    identity["Arn"].should.equal(assumed_role["AssumedRoleUser"]["Arn"])
 | 
						|
    identity["UserId"].should.equal(assumed_role["AssumedRoleUser"]["AssumedRoleId"])
 | 
						|
    identity["Account"].should.equal(str(ACCOUNT_ID))
 | 
						|
 | 
						|
 | 
						|
@mock_sts
 | 
						|
def test_federation_token_with_too_long_policy():
 | 
						|
    "Trying to get a federation token with a policy longer than 2048 character should fail"
 | 
						|
    cli = boto3.client("sts", region_name="us-east-1")
 | 
						|
    resource_tmpl = (
 | 
						|
        "arn:aws:s3:::yyyy-xxxxx-cloud-default/my_default_folder/folder-name-%s/*"
 | 
						|
    )
 | 
						|
    statements = []
 | 
						|
    for num in range(30):
 | 
						|
        statements.append(
 | 
						|
            {
 | 
						|
                "Effect": "Allow",
 | 
						|
                "Action": ["s3:*"],
 | 
						|
                "Resource": resource_tmpl % str(num),
 | 
						|
            }
 | 
						|
        )
 | 
						|
    policy = {"Version": "2012-10-17", "Statement": statements}
 | 
						|
    json_policy = json.dumps(policy)
 | 
						|
    assert len(json_policy) > MAX_FEDERATION_TOKEN_POLICY_LENGTH
 | 
						|
 | 
						|
    with pytest.raises(ClientError) as ex:
 | 
						|
        cli.get_federation_token(Name="foo", DurationSeconds=3600, Policy=json_policy)
 | 
						|
    ex.value.response["Error"]["Code"].should.equal("ValidationError")
 | 
						|
    ex.value.response["Error"]["Message"].should.contain(
 | 
						|
        str(MAX_FEDERATION_TOKEN_POLICY_LENGTH)
 | 
						|
    )
 | 
						|
 | 
						|
 | 
						|
@pytest.mark.parametrize("region", ["us-west-2", "cn-northwest-1"])
 | 
						|
@mock_sts
 | 
						|
def test_sts_regions(region):
 | 
						|
    client = boto3.client("sts", region_name=region)
 | 
						|
    resp = client.get_caller_identity()
 | 
						|
    resp["ResponseMetadata"]["HTTPStatusCode"].should.equal(200)
 |