mirror of
https://github.com/fog/fog-aws.git
synced 2022-11-09 13:50:52 -05:00
Add List Attached Role Policies
Add list policy versions Add more IAM policy tests
This commit is contained in:
parent
ae856e304f
commit
9afc985ba5
6 changed files with 339 additions and 1 deletions
|
@ -61,6 +61,7 @@ module Fog
|
||||||
request :list_access_keys
|
request :list_access_keys
|
||||||
request :list_account_aliases
|
request :list_account_aliases
|
||||||
request :list_attached_group_policies
|
request :list_attached_group_policies
|
||||||
|
request :list_attached_role_policies
|
||||||
request :list_attached_user_policies
|
request :list_attached_user_policies
|
||||||
request :list_group_policies
|
request :list_group_policies
|
||||||
request :list_groups
|
request :list_groups
|
||||||
|
@ -69,6 +70,7 @@ module Fog
|
||||||
request :list_instance_profiles_for_role
|
request :list_instance_profiles_for_role
|
||||||
request :list_mfa_devices
|
request :list_mfa_devices
|
||||||
request :list_policies
|
request :list_policies
|
||||||
|
request :list_policy_versions
|
||||||
request :list_role_policies
|
request :list_role_policies
|
||||||
request :list_roles
|
request :list_roles
|
||||||
request :list_server_certificates
|
request :list_server_certificates
|
||||||
|
|
28
lib/fog/aws/parsers/iam/list_policy_versions.rb
Normal file
28
lib/fog/aws/parsers/iam/list_policy_versions.rb
Normal file
|
@ -0,0 +1,28 @@
|
||||||
|
module Fog
|
||||||
|
module Parsers
|
||||||
|
module AWS
|
||||||
|
module IAM
|
||||||
|
class ListPolicyVersions < Fog::Parsers::Base
|
||||||
|
def reset
|
||||||
|
super
|
||||||
|
@version = {}
|
||||||
|
@response = { 'Versions' => [] }
|
||||||
|
end
|
||||||
|
|
||||||
|
def end_element(name)
|
||||||
|
case name
|
||||||
|
when 'member'
|
||||||
|
@response['Versions'] << @version
|
||||||
|
@version = {}
|
||||||
|
when 'IsTruncated'
|
||||||
|
response[name] = (value == 'true')
|
||||||
|
when 'Marker', 'RequestId'
|
||||||
|
@response[name] = value
|
||||||
|
end
|
||||||
|
super
|
||||||
|
end
|
||||||
|
end
|
||||||
|
end
|
||||||
|
end
|
||||||
|
end
|
||||||
|
end
|
89
lib/fog/aws/requests/iam/list_attached_role_policies.rb
Normal file
89
lib/fog/aws/requests/iam/list_attached_role_policies.rb
Normal file
|
@ -0,0 +1,89 @@
|
||||||
|
module Fog
|
||||||
|
module AWS
|
||||||
|
class IAM
|
||||||
|
class Real
|
||||||
|
require 'fog/aws/parsers/iam/list_managed_policies'
|
||||||
|
|
||||||
|
# Lists managed role policies
|
||||||
|
#
|
||||||
|
# ==== Parameters
|
||||||
|
# * role_name<~String>: name of the role
|
||||||
|
#
|
||||||
|
# ==== Returns
|
||||||
|
# * response<~Excon::Response>:
|
||||||
|
# * body<~Hash>:
|
||||||
|
# * 'RequestId'<~String> - Id of the request
|
||||||
|
# * AttachedPolicies
|
||||||
|
# * 'PolicyArn'<~String> - The Amazon Resource Name (ARN). ARNs are unique identifiers for AWS resources.
|
||||||
|
# * 'PolicName'<~String> - The friendly name of the attached policy.
|
||||||
|
#
|
||||||
|
# ==== See Also
|
||||||
|
# https://docs.aws.amazon.com/IAM/latest/APIReference/API_ListAttachedRolePolicies.html
|
||||||
|
#
|
||||||
|
def list_attached_role_policies(role_name, options={})
|
||||||
|
request({
|
||||||
|
'Action' => 'ListAttachedRolePolicies',
|
||||||
|
'RoleName' => role_name,
|
||||||
|
:parser => Fog::Parsers::AWS::IAM::ListManagedPolicies.new
|
||||||
|
}.merge(options))
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
|
class Mock
|
||||||
|
def list_attached_role_policies(role_name, options={})
|
||||||
|
unless self.data[:roles].key?(role_name)
|
||||||
|
raise Fog::AWS::IAM::NotFound.new("The role with name #{role_name} cannot be found.")
|
||||||
|
end
|
||||||
|
|
||||||
|
limit = options['MaxItems']
|
||||||
|
marker = options['Marker']
|
||||||
|
role = self.data[:roles][role_name]
|
||||||
|
|
||||||
|
if limit
|
||||||
|
if limit > 1_000
|
||||||
|
raise Fog::AWS::IAM::Error.new(
|
||||||
|
"ValidationError => 1 validation error detected: Value '#{limit}' at 'limit' failed to satisfy constraint: Member must have value less than or equal to 1000"
|
||||||
|
)
|
||||||
|
elsif limit < 1
|
||||||
|
raise Fog::AWS::IAM::Error.new(
|
||||||
|
"ValidationError => 1 validation error detected: Value '#{limit}' at 'limit' failed to satisfy constraint: Member must have value greater than or equal to 1"
|
||||||
|
)
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
|
data_set = if marker
|
||||||
|
self.data[:markers][marker] || []
|
||||||
|
else
|
||||||
|
role[:attached_policies].map { |arn|
|
||||||
|
self.data[:managed_policies].fetch(arn)
|
||||||
|
}.map { |mp|
|
||||||
|
{ "PolicyName" => mp.fetch("PolicyName"), "PolicyArn" => mp.fetch("Arn") }
|
||||||
|
}
|
||||||
|
end
|
||||||
|
|
||||||
|
data = data_set.slice!(0, limit || 100)
|
||||||
|
truncated = data_set.size > 0
|
||||||
|
marker = truncated && Base64.encode64("metadata/l/#{account_id}/#{UUID.uuid}")
|
||||||
|
|
||||||
|
response = Excon::Response.new
|
||||||
|
|
||||||
|
body = {
|
||||||
|
'Policies' => data,
|
||||||
|
'IsTruncated' => truncated,
|
||||||
|
'RequestId' => Fog::AWS::Mock.request_id
|
||||||
|
}
|
||||||
|
|
||||||
|
if marker
|
||||||
|
self.data[:markers][marker] = data_set
|
||||||
|
body.merge!('Marker' => marker)
|
||||||
|
end
|
||||||
|
|
||||||
|
response.body = body
|
||||||
|
response.status = 200
|
||||||
|
|
||||||
|
response
|
||||||
|
end
|
||||||
|
end
|
||||||
|
end
|
||||||
|
end
|
||||||
|
end
|
84
lib/fog/aws/requests/iam/list_policy_versions.rb
Normal file
84
lib/fog/aws/requests/iam/list_policy_versions.rb
Normal file
|
@ -0,0 +1,84 @@
|
||||||
|
module Fog
|
||||||
|
module AWS
|
||||||
|
class IAM
|
||||||
|
class Real
|
||||||
|
require 'fog/aws/parsers/iam/list_policy_versions'
|
||||||
|
|
||||||
|
# Lists policy versions
|
||||||
|
#
|
||||||
|
# ==== Parameters
|
||||||
|
# * options <~Hash>: options that filter the result set
|
||||||
|
# * Marker <~String>
|
||||||
|
# * MaxItems <~Integer>
|
||||||
|
# * PolicyArn <~String>
|
||||||
|
# ==== Returns
|
||||||
|
# * response<~Excon::Response>:
|
||||||
|
# * body<~Hash>:
|
||||||
|
# * 'RequestId'<~String> - Id of the request
|
||||||
|
# * 'IsTruncated'<~Boolean>
|
||||||
|
# * 'Marker'<~String>
|
||||||
|
# * 'Versions'<~Array>:
|
||||||
|
# * CreateDate
|
||||||
|
# * IsDefaultVersion
|
||||||
|
# * VersionId
|
||||||
|
# ==== See Also
|
||||||
|
# http://docs.aws.amazon.com/IAM/latest/APIReference/API_ListPolicyVersions.html
|
||||||
|
#
|
||||||
|
def list_policy_versions(policy_arn, options={})
|
||||||
|
request({
|
||||||
|
'Action' => 'ListPolicyVersions',
|
||||||
|
'PolicyArn' => policy_arn,
|
||||||
|
:parser => Fog::Parsers::AWS::IAM::ListPolicyVersions.new
|
||||||
|
}.merge(options))
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
|
class Mock
|
||||||
|
def list_policy_versions(policy_arn, options={})
|
||||||
|
limit = options['MaxItems']
|
||||||
|
marker = options['Marker']
|
||||||
|
|
||||||
|
if limit
|
||||||
|
if limit > 1_000
|
||||||
|
raise Fog::AWS::IAM::Error.new(
|
||||||
|
"ValidationError => 1 validation error detected: Value '#{limit}' at 'limit' failed to satisfy constraint: Member must have value less than or equal to 1000"
|
||||||
|
)
|
||||||
|
elsif limit < 1
|
||||||
|
raise Fog::AWS::IAM::Error.new(
|
||||||
|
"ValidationError => 1 validation error detected: Value '#{limit}' at 'limit' failed to satisfy constraint: Member must have value greater than or equal to 1"
|
||||||
|
)
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
|
data_set = if marker
|
||||||
|
self.data[:markers][marker] || []
|
||||||
|
else
|
||||||
|
self.data[:policy_versions].values
|
||||||
|
end
|
||||||
|
|
||||||
|
data = data_set.slice!(0, limit || 100)
|
||||||
|
truncated = data_set.size > 0
|
||||||
|
marker = truncated && Base64.encode64("metadata/l/#{account_id}/#{UUID.uuid}")
|
||||||
|
|
||||||
|
response = Excon::Response.new
|
||||||
|
|
||||||
|
body = {
|
||||||
|
'Versions' => data,
|
||||||
|
'IsTruncated' => truncated,
|
||||||
|
'RequestId' => Fog::AWS::Mock.request_id
|
||||||
|
}
|
||||||
|
|
||||||
|
if marker
|
||||||
|
self.data[:markers][marker] = data_set
|
||||||
|
body.merge!('Marker' => marker)
|
||||||
|
end
|
||||||
|
|
||||||
|
response.body = body
|
||||||
|
response.status = 200
|
||||||
|
|
||||||
|
response
|
||||||
|
end
|
||||||
|
end
|
||||||
|
end
|
||||||
|
end
|
||||||
|
end
|
|
@ -32,6 +32,16 @@ Shindo.tests('AWS::IAM | managed policy requests', ['aws']) do
|
||||||
'IsTruncated' => Fog::Boolean
|
'IsTruncated' => Fog::Boolean
|
||||||
}
|
}
|
||||||
|
|
||||||
|
attached_policy_format = {
|
||||||
|
'PolicyArn' => String,
|
||||||
|
'PolicyName' => String
|
||||||
|
}
|
||||||
|
|
||||||
|
list_managed_policies_format = {
|
||||||
|
'RequestId' => String,
|
||||||
|
'AttachedPolicies' => [attached_policy_format]
|
||||||
|
}
|
||||||
|
|
||||||
tests("#create_policy('fog_policy')").formats(create_policy_format) do
|
tests("#create_policy('fog_policy')").formats(create_policy_format) do
|
||||||
body = Fog::AWS[:iam].create_policy('fog_policy', @policy, '/fog/').body
|
body = Fog::AWS[:iam].create_policy('fog_policy', @policy, '/fog/').body
|
||||||
puts body.inspect
|
puts body.inspect
|
||||||
|
@ -52,15 +62,22 @@ Shindo.tests('AWS::IAM | managed policy requests', ['aws']) do
|
||||||
Fog::AWS[:iam].attach_user_policy('fog_policy_test_user', @policy_arn).body
|
Fog::AWS[:iam].attach_user_policy('fog_policy_test_user', @policy_arn).body
|
||||||
end
|
end
|
||||||
|
|
||||||
|
tests("#list_attach_user_policies()").formats(list_managed_policies_format) do
|
||||||
|
Fog::AWS[:iam].list_attached_user_policies('fog_policy_test_user').body
|
||||||
|
end
|
||||||
|
|
||||||
tests("#detach_user_policy()").formats(AWS::IAM::Formats::BASIC) do
|
tests("#detach_user_policy()").formats(AWS::IAM::Formats::BASIC) do
|
||||||
Fog::AWS[:iam].detach_user_policy('fog_policy_test_user', @policy_arn).body
|
Fog::AWS[:iam].detach_user_policy('fog_policy_test_user', @policy_arn).body
|
||||||
end
|
end
|
||||||
|
|
||||||
|
|
||||||
tests("#attach_group_policy()").formats(AWS::IAM::Formats::BASIC) do
|
tests("#attach_group_policy()").formats(AWS::IAM::Formats::BASIC) do
|
||||||
Fog::AWS[:iam].attach_group_policy('fog_policy_test_group', @policy_arn).body
|
Fog::AWS[:iam].attach_group_policy('fog_policy_test_group', @policy_arn).body
|
||||||
end
|
end
|
||||||
|
|
||||||
|
tests("#list_attach_group_policies()").formats(fog_policy_test_group) do
|
||||||
|
Fog::AWS[:iam].list_attached_group_policies('fog_policy_test_group').body
|
||||||
|
end
|
||||||
|
|
||||||
tests("#detach_group_policy()").formats(AWS::IAM::Formats::BASIC) do
|
tests("#detach_group_policy()").formats(AWS::IAM::Formats::BASIC) do
|
||||||
Fog::AWS[:iam].detach_group_policy('fog_policy_test_group', @policy_arn).body
|
Fog::AWS[:iam].detach_group_policy('fog_policy_test_group', @policy_arn).body
|
||||||
end
|
end
|
||||||
|
@ -69,6 +86,10 @@ Shindo.tests('AWS::IAM | managed policy requests', ['aws']) do
|
||||||
Fog::AWS[:iam].attach_role_policy('fog_policy_test_role', @policy_arn).body
|
Fog::AWS[:iam].attach_role_policy('fog_policy_test_role', @policy_arn).body
|
||||||
end
|
end
|
||||||
|
|
||||||
|
tests("#list_attach_role_policies()").formats(fog_policy_test_group) do
|
||||||
|
Fog::AWS[:iam].attach_role_policies('fog_policy_test_role').body
|
||||||
|
end
|
||||||
|
|
||||||
tests("#detach_role_policy()").formats(AWS::IAM::Formats::BASIC) do
|
tests("#detach_role_policy()").formats(AWS::IAM::Formats::BASIC) do
|
||||||
Fog::AWS[:iam].detach_role_policy('fog_policy_test_role', @policy_arn).body
|
Fog::AWS[:iam].detach_role_policy('fog_policy_test_role', @policy_arn).body
|
||||||
end
|
end
|
||||||
|
|
114
tests/requests/iam/versioned_managed_policy_tests.rb
Normal file
114
tests/requests/iam/versioned_managed_policy_tests.rb
Normal file
|
@ -0,0 +1,114 @@
|
||||||
|
Shindo.tests('AWS::IAM | versioned managed policy requests', ['aws']) do
|
||||||
|
|
||||||
|
pending if Fog.mocking?
|
||||||
|
|
||||||
|
tests('success') do
|
||||||
|
@policy = {'Version' => '2012-10-17', "Statement" => [{"Effect" => "Deny", "Action" => "*", "Resource" => "*"}]}
|
||||||
|
@policy_v2 = {'Version' => '2012-10-17', "Statement" => [{"Effect" => "Deny", "Action" => "*", "Resource" => "EC2:*"}]}
|
||||||
|
|
||||||
|
@policy_format = {
|
||||||
|
'Arn' => String,
|
||||||
|
'AttachmentCount' => Integer,
|
||||||
|
'Description' => String,
|
||||||
|
'DefaultVersionId' => String,
|
||||||
|
'IsAttachable' => Fog::Boolean,
|
||||||
|
'Path' => String,
|
||||||
|
'PolicyId' => String,
|
||||||
|
'PolicyName' => String,
|
||||||
|
'CreateDate' => Time,
|
||||||
|
'UpdateDate' => Time
|
||||||
|
}
|
||||||
|
|
||||||
|
create_policy_format = {
|
||||||
|
'RequestId' => String,
|
||||||
|
'Policy' => @policy_format
|
||||||
|
}
|
||||||
|
|
||||||
|
list_policies_format = {
|
||||||
|
'RequestId' => String,
|
||||||
|
'Policies' => [@policy_format],
|
||||||
|
'Marker' => String,
|
||||||
|
'IsTruncated' => Fog::Boolean
|
||||||
|
}
|
||||||
|
|
||||||
|
versioned_policy_format = {
|
||||||
|
'CreateDate' => Time,
|
||||||
|
'Document' => Hash,
|
||||||
|
'IsDefaultVersion' => Fog::Boolean,
|
||||||
|
'Description' => String
|
||||||
|
}
|
||||||
|
|
||||||
|
create_versioned_policy_format = {
|
||||||
|
'RequestId' => String,
|
||||||
|
'PolicyVersion' => [versioned_policy_format]
|
||||||
|
}
|
||||||
|
|
||||||
|
policy_verions_format = {
|
||||||
|
'CreateDate' => Time,
|
||||||
|
'IsDefaultVersion' => Fog::Boolean,
|
||||||
|
'VersionId' => String
|
||||||
|
}
|
||||||
|
|
||||||
|
list_policy_versions_format = {
|
||||||
|
'RequestId' => String,
|
||||||
|
'Versions' => [policy_verions_format],
|
||||||
|
'Marker' => String,
|
||||||
|
'IsTruncated' => Fog::Boolean
|
||||||
|
}
|
||||||
|
|
||||||
|
tests("#create_policy('fog_policy')").formats(create_policy_format) do
|
||||||
|
body = Fog::AWS[:iam].create_policy('fog_policy', @policy, '/fog/').body
|
||||||
|
puts body.inspect
|
||||||
|
@policy_arn = body['Policy']['Arn']
|
||||||
|
body
|
||||||
|
end
|
||||||
|
|
||||||
|
tests("#list_policies('fog_policy')").formats(list_policies_format) do
|
||||||
|
body = Fog::AWS[:iam].list_policies('PathPrefix' => '/fog/').body
|
||||||
|
tests('length 1').returns(1) do
|
||||||
|
body['Policies'].length
|
||||||
|
end
|
||||||
|
body
|
||||||
|
end
|
||||||
|
|
||||||
|
tests("#create_versioned_policy('fog_policy')").formats(create_versioned_policy_format) do
|
||||||
|
body = Fog::AWS[:iam].create_versioned_policy(@policy_arn, @policy_v2, true).body
|
||||||
|
puts body.inspect
|
||||||
|
@policy_version_document = body['PolicyVersion']['Document']
|
||||||
|
body
|
||||||
|
end
|
||||||
|
|
||||||
|
tests("#list_policy_versions('fog_policy')").formats(list_policy_versions_format) do
|
||||||
|
body = Fog::AWS[:iam].list_policy_versions(@policy_arn).body
|
||||||
|
tests('length 2').returns(2) do
|
||||||
|
body['Versions'].length
|
||||||
|
end
|
||||||
|
body
|
||||||
|
end
|
||||||
|
|
||||||
|
tests("#set_default_policy_version('fog_policy')").formats(AWS::IAM::Formats::BASIC) do
|
||||||
|
body = Fog::AWS[:iam].set_default_policy_version(@policy_arn, 'v1').body
|
||||||
|
tests('length 2').returns(2) do
|
||||||
|
body['Versions'].length
|
||||||
|
end
|
||||||
|
body
|
||||||
|
end
|
||||||
|
|
||||||
|
tests("#delete_versioned_policy('fog_policy')").formats(AWS::IAM::Formats::BASIC) do
|
||||||
|
body = Fog::AWS[:iam].delete_policy(@policy_arn, 'v2').body
|
||||||
|
puts body.inspect
|
||||||
|
@policy_version_document = body['PolicyVersion']['Document']
|
||||||
|
body
|
||||||
|
end
|
||||||
|
|
||||||
|
tests("#delete_policy('fog_policy')").formats(AWS::IAM::Formats::BASIC) do
|
||||||
|
Fog::AWS[:iam].delete_policy(@policy_arn).body
|
||||||
|
end
|
||||||
|
|
||||||
|
end
|
||||||
|
|
||||||
|
tests('failure') do
|
||||||
|
test('failing conditions')
|
||||||
|
end
|
||||||
|
|
||||||
|
end
|
Loading…
Reference in a new issue