Merge branch 'master' into add-organizations-tags
This commit is contained in:
commit
57c97e367e
24 changed files with 819 additions and 86 deletions
|
|
@ -563,7 +563,7 @@ def test_create_stage():
|
|||
api_id = response["id"]
|
||||
|
||||
create_method_integration(client, api_id)
|
||||
response = client.create_deployment(restApiId=api_id, stageName=stage_name,)
|
||||
response = client.create_deployment(restApiId=api_id, stageName=stage_name)
|
||||
deployment_id = response["id"]
|
||||
|
||||
response = client.get_deployment(restApiId=api_id, deploymentId=deployment_id)
|
||||
|
|
|
|||
|
|
@ -162,7 +162,7 @@ if settings.TEST_SERVER_MODE:
|
|||
conn = boto3.client("lambda", "us-west-2")
|
||||
conn.create_function(
|
||||
FunctionName="testFunction",
|
||||
Runtime="python2.7",
|
||||
Runtime="python3.7",
|
||||
Role="test-iam-role",
|
||||
Handler="lambda_function.lambda_handler",
|
||||
Code={"ZipFile": get_test_zip_file2()},
|
||||
|
|
@ -184,18 +184,20 @@ if settings.TEST_SERVER_MODE:
|
|||
vol.id,
|
||||
vol.state,
|
||||
vol.size,
|
||||
json.dumps(in_data),
|
||||
json.dumps(in_data).replace(
|
||||
" ", ""
|
||||
), # Makes the tests pass as the result is missing the whitespace
|
||||
)
|
||||
|
||||
log_result = base64.b64decode(result["LogResult"]).decode("utf-8")
|
||||
|
||||
# fix for running under travis (TODO: investigate why it has an extra newline)
|
||||
# The Docker lambda invocation will return an additional '\n', so need to replace it:
|
||||
log_result = log_result.replace("\n\n", "\n")
|
||||
log_result.should.equal(msg)
|
||||
|
||||
payload = result["Payload"].read().decode("utf-8")
|
||||
|
||||
# fix for running under travis (TODO: investigate why it has an extra newline)
|
||||
# The Docker lambda invocation will return an additional '\n', so need to replace it:
|
||||
payload = payload.replace("\n\n", "\n")
|
||||
payload.should.equal(msg)
|
||||
|
||||
|
|
@ -999,10 +1001,10 @@ def test_list_versions_by_function_for_nonexistent_function():
|
|||
@mock_lambda
|
||||
@mock_sqs
|
||||
def test_create_event_source_mapping():
|
||||
sqs = boto3.resource("sqs")
|
||||
sqs = boto3.resource("sqs", region_name="us-east-1")
|
||||
queue = sqs.create_queue(QueueName="test-sqs-queue1")
|
||||
|
||||
conn = boto3.client("lambda")
|
||||
conn = boto3.client("lambda", region_name="us-east-1")
|
||||
func = conn.create_function(
|
||||
FunctionName="testFunction",
|
||||
Runtime="python2.7",
|
||||
|
|
@ -1028,11 +1030,11 @@ def test_create_event_source_mapping():
|
|||
@mock_lambda
|
||||
@mock_sqs
|
||||
def test_invoke_function_from_sqs():
|
||||
logs_conn = boto3.client("logs")
|
||||
sqs = boto3.resource("sqs")
|
||||
logs_conn = boto3.client("logs", region_name="us-east-1")
|
||||
sqs = boto3.resource("sqs", region_name="us-east-1")
|
||||
queue = sqs.create_queue(QueueName="test-sqs-queue1")
|
||||
|
||||
conn = boto3.client("lambda")
|
||||
conn = boto3.client("lambda", region_name="us-east-1")
|
||||
func = conn.create_function(
|
||||
FunctionName="testFunction",
|
||||
Runtime="python2.7",
|
||||
|
|
@ -1052,7 +1054,7 @@ def test_invoke_function_from_sqs():
|
|||
assert response["EventSourceArn"] == queue.attributes["QueueArn"]
|
||||
assert response["State"] == "Enabled"
|
||||
|
||||
sqs_client = boto3.client("sqs")
|
||||
sqs_client = boto3.client("sqs", region_name="us-east-1")
|
||||
sqs_client.send_message(QueueUrl=queue.url, MessageBody="test")
|
||||
start = time.time()
|
||||
while (time.time() - start) < 30:
|
||||
|
|
@ -1079,8 +1081,8 @@ def test_invoke_function_from_sqs():
|
|||
@mock_lambda
|
||||
@mock_dynamodb2
|
||||
def test_invoke_function_from_dynamodb():
|
||||
logs_conn = boto3.client("logs")
|
||||
dynamodb = boto3.client("dynamodb")
|
||||
logs_conn = boto3.client("logs", region_name="us-east-1")
|
||||
dynamodb = boto3.client("dynamodb", region_name="us-east-1")
|
||||
table_name = "table_with_stream"
|
||||
table = dynamodb.create_table(
|
||||
TableName=table_name,
|
||||
|
|
@ -1092,7 +1094,7 @@ def test_invoke_function_from_dynamodb():
|
|||
},
|
||||
)
|
||||
|
||||
conn = boto3.client("lambda")
|
||||
conn = boto3.client("lambda", region_name="us-east-1")
|
||||
func = conn.create_function(
|
||||
FunctionName="testFunction",
|
||||
Runtime="python2.7",
|
||||
|
|
@ -1139,11 +1141,11 @@ def test_invoke_function_from_dynamodb():
|
|||
@mock_lambda
|
||||
@mock_sqs
|
||||
def test_invoke_function_from_sqs_exception():
|
||||
logs_conn = boto3.client("logs")
|
||||
sqs = boto3.resource("sqs")
|
||||
logs_conn = boto3.client("logs", region_name="us-east-1")
|
||||
sqs = boto3.resource("sqs", region_name="us-east-1")
|
||||
queue = sqs.create_queue(QueueName="test-sqs-queue1")
|
||||
|
||||
conn = boto3.client("lambda")
|
||||
conn = boto3.client("lambda", region_name="us-east-1")
|
||||
func = conn.create_function(
|
||||
FunctionName="testFunction",
|
||||
Runtime="python2.7",
|
||||
|
|
@ -1199,10 +1201,10 @@ def test_invoke_function_from_sqs_exception():
|
|||
@mock_lambda
|
||||
@mock_sqs
|
||||
def test_list_event_source_mappings():
|
||||
sqs = boto3.resource("sqs")
|
||||
sqs = boto3.resource("sqs", region_name="us-east-1")
|
||||
queue = sqs.create_queue(QueueName="test-sqs-queue1")
|
||||
|
||||
conn = boto3.client("lambda")
|
||||
conn = boto3.client("lambda", region_name="us-east-1")
|
||||
func = conn.create_function(
|
||||
FunctionName="testFunction",
|
||||
Runtime="python2.7",
|
||||
|
|
@ -1231,10 +1233,10 @@ def test_list_event_source_mappings():
|
|||
@mock_lambda
|
||||
@mock_sqs
|
||||
def test_get_event_source_mapping():
|
||||
sqs = boto3.resource("sqs")
|
||||
sqs = boto3.resource("sqs", region_name="us-east-1")
|
||||
queue = sqs.create_queue(QueueName="test-sqs-queue1")
|
||||
|
||||
conn = boto3.client("lambda")
|
||||
conn = boto3.client("lambda", region_name="us-east-1")
|
||||
func = conn.create_function(
|
||||
FunctionName="testFunction",
|
||||
Runtime="python2.7",
|
||||
|
|
@ -1261,10 +1263,10 @@ def test_get_event_source_mapping():
|
|||
@mock_lambda
|
||||
@mock_sqs
|
||||
def test_update_event_source_mapping():
|
||||
sqs = boto3.resource("sqs")
|
||||
sqs = boto3.resource("sqs", region_name="us-east-1")
|
||||
queue = sqs.create_queue(QueueName="test-sqs-queue1")
|
||||
|
||||
conn = boto3.client("lambda")
|
||||
conn = boto3.client("lambda", region_name="us-east-1")
|
||||
func1 = conn.create_function(
|
||||
FunctionName="testFunction",
|
||||
Runtime="python2.7",
|
||||
|
|
@ -1305,10 +1307,10 @@ def test_update_event_source_mapping():
|
|||
@mock_lambda
|
||||
@mock_sqs
|
||||
def test_delete_event_source_mapping():
|
||||
sqs = boto3.resource("sqs")
|
||||
sqs = boto3.resource("sqs", region_name="us-east-1")
|
||||
queue = sqs.create_queue(QueueName="test-sqs-queue1")
|
||||
|
||||
conn = boto3.client("lambda")
|
||||
conn = boto3.client("lambda", region_name="us-east-1")
|
||||
func1 = conn.create_function(
|
||||
FunctionName="testFunction",
|
||||
Runtime="python2.7",
|
||||
|
|
|
|||
|
|
@ -3119,8 +3119,8 @@ def test_sorted_query_with_numerical_sort_key():
|
|||
# https://github.com/spulec/moto/issues/1874
|
||||
@mock_dynamodb2
|
||||
def test_item_size_is_under_400KB():
|
||||
dynamodb = boto3.resource("dynamodb")
|
||||
client = boto3.client("dynamodb")
|
||||
dynamodb = boto3.resource("dynamodb", region_name="us-east-1")
|
||||
client = boto3.client("dynamodb", region_name="us-east-1")
|
||||
|
||||
dynamodb.create_table(
|
||||
TableName="moto-test",
|
||||
|
|
@ -3172,7 +3172,7 @@ def assert_failure_due_to_item_size(func, **kwargs):
|
|||
@mock_dynamodb2
|
||||
# https://docs.aws.amazon.com/amazondynamodb/latest/APIReference/API_Query.html#DDB-Query-request-KeyConditionExpression
|
||||
def test_hash_key_cannot_use_begins_with_operations():
|
||||
dynamodb = boto3.resource("dynamodb")
|
||||
dynamodb = boto3.resource("dynamodb", region_name="us-east-1")
|
||||
table = dynamodb.create_table(
|
||||
TableName="test-table",
|
||||
KeySchema=[{"AttributeName": "key", "KeyType": "HASH"}],
|
||||
|
|
@ -3201,7 +3201,7 @@ def test_hash_key_cannot_use_begins_with_operations():
|
|||
|
||||
@mock_dynamodb2
|
||||
def test_update_supports_complex_expression_attribute_values():
|
||||
client = boto3.client("dynamodb")
|
||||
client = boto3.client("dynamodb", region_name="us-east-1")
|
||||
|
||||
client.create_table(
|
||||
AttributeDefinitions=[{"AttributeName": "SHA256", "AttributeType": "S"}],
|
||||
|
|
@ -3237,7 +3237,7 @@ def test_update_supports_complex_expression_attribute_values():
|
|||
|
||||
@mock_dynamodb2
|
||||
def test_update_supports_list_append():
|
||||
client = boto3.client("dynamodb")
|
||||
client = boto3.client("dynamodb", region_name="us-east-1")
|
||||
|
||||
client.create_table(
|
||||
AttributeDefinitions=[{"AttributeName": "SHA256", "AttributeType": "S"}],
|
||||
|
|
@ -3272,7 +3272,7 @@ def test_update_supports_list_append():
|
|||
|
||||
@mock_dynamodb2
|
||||
def test_update_catches_invalid_list_append_operation():
|
||||
client = boto3.client("dynamodb")
|
||||
client = boto3.client("dynamodb", region_name="us-east-1")
|
||||
|
||||
client.create_table(
|
||||
AttributeDefinitions=[{"AttributeName": "SHA256", "AttributeType": "S"}],
|
||||
|
|
@ -3335,7 +3335,7 @@ def test_update_item_if_original_value_is_none():
|
|||
table.update_item(
|
||||
Key={"job_id": "a"},
|
||||
UpdateExpression="SET job_name = :output",
|
||||
ExpressionAttributeValues={":output": "updated",},
|
||||
ExpressionAttributeValues={":output": "updated"},
|
||||
)
|
||||
table.scan()["Items"][0]["job_name"].should.equal("updated")
|
||||
|
||||
|
|
@ -3354,7 +3354,7 @@ def test_update_nested_item_if_original_value_is_none():
|
|||
table.update_item(
|
||||
Key={"job_id": "a"},
|
||||
UpdateExpression="SET job_details.job_name = :output",
|
||||
ExpressionAttributeValues={":output": "updated",},
|
||||
ExpressionAttributeValues={":output": "updated"},
|
||||
)
|
||||
table.scan()["Items"][0]["job_details"]["job_name"].should.equal("updated")
|
||||
|
||||
|
|
|
|||
|
|
@ -213,7 +213,7 @@ class TestEdges:
|
|||
|
||||
resp = conn.update_table(
|
||||
TableName="test-streams",
|
||||
StreamSpecification={"StreamEnabled": True, "StreamViewType": "KEYS_ONLY"},
|
||||
StreamSpecification={"StreamViewType": "KEYS_ONLY", "StreamEnabled": True},
|
||||
)
|
||||
assert "StreamSpecification" in resp["TableDescription"]
|
||||
assert resp["TableDescription"]["StreamSpecification"] == {
|
||||
|
|
@ -227,8 +227,8 @@ class TestEdges:
|
|||
resp = conn.update_table(
|
||||
TableName="test-streams",
|
||||
StreamSpecification={
|
||||
"StreamEnabled": True,
|
||||
"StreamViewType": "OLD_IMAGES",
|
||||
"StreamEnabled": True,
|
||||
},
|
||||
)
|
||||
|
||||
|
|
@ -246,7 +246,7 @@ class TestEdges:
|
|||
{"AttributeName": "color", "AttributeType": "S"},
|
||||
],
|
||||
ProvisionedThroughput={"ReadCapacityUnits": 1, "WriteCapacityUnits": 1},
|
||||
StreamSpecification={"StreamEnabled": True, "StreamViewType": "NEW_IMAGES"},
|
||||
StreamSpecification={"StreamViewType": "NEW_IMAGES", "StreamEnabled": True},
|
||||
)
|
||||
stream_arn = resp["TableDescription"]["LatestStreamArn"]
|
||||
|
||||
|
|
|
|||
|
|
@ -1316,6 +1316,122 @@ def test_get_access_key_last_used():
|
|||
resp["UserName"].should.equal(create_key_response["UserName"])
|
||||
|
||||
|
||||
@mock_iam
|
||||
def test_upload_ssh_public_key():
|
||||
iam = boto3.resource("iam", region_name="us-east-1")
|
||||
client = iam.meta.client
|
||||
username = "test-user"
|
||||
iam.create_user(UserName=username)
|
||||
public_key = MOCK_CERT
|
||||
|
||||
resp = client.upload_ssh_public_key(UserName=username, SSHPublicKeyBody=public_key)
|
||||
pubkey = resp["SSHPublicKey"]
|
||||
pubkey["SSHPublicKeyBody"].should.equal(public_key)
|
||||
pubkey["UserName"].should.equal(username)
|
||||
pubkey["SSHPublicKeyId"].should.have.length_of(20)
|
||||
assert pubkey["SSHPublicKeyId"].startswith("APKA")
|
||||
pubkey.should.have.key("Fingerprint")
|
||||
pubkey["Status"].should.equal("Active")
|
||||
(
|
||||
datetime.utcnow() - pubkey["UploadDate"].replace(tzinfo=None)
|
||||
).seconds.should.be.within(0, 10)
|
||||
|
||||
|
||||
@mock_iam
|
||||
def test_get_ssh_public_key():
|
||||
iam = boto3.resource("iam", region_name="us-east-1")
|
||||
client = iam.meta.client
|
||||
username = "test-user"
|
||||
iam.create_user(UserName=username)
|
||||
public_key = MOCK_CERT
|
||||
|
||||
with assert_raises(ClientError):
|
||||
client.get_ssh_public_key(
|
||||
UserName=username, SSHPublicKeyId="xxnon-existent-keyxx", Encoding="SSH"
|
||||
)
|
||||
|
||||
resp = client.upload_ssh_public_key(UserName=username, SSHPublicKeyBody=public_key)
|
||||
ssh_public_key_id = resp["SSHPublicKey"]["SSHPublicKeyId"]
|
||||
|
||||
resp = client.get_ssh_public_key(
|
||||
UserName=username, SSHPublicKeyId=ssh_public_key_id, Encoding="SSH"
|
||||
)
|
||||
resp["SSHPublicKey"]["SSHPublicKeyBody"].should.equal(public_key)
|
||||
|
||||
|
||||
@mock_iam
|
||||
def test_list_ssh_public_keys():
|
||||
iam = boto3.resource("iam", region_name="us-east-1")
|
||||
client = iam.meta.client
|
||||
username = "test-user"
|
||||
iam.create_user(UserName=username)
|
||||
public_key = MOCK_CERT
|
||||
|
||||
resp = client.list_ssh_public_keys(UserName=username)
|
||||
resp["SSHPublicKeys"].should.have.length_of(0)
|
||||
|
||||
resp = client.upload_ssh_public_key(UserName=username, SSHPublicKeyBody=public_key)
|
||||
ssh_public_key_id = resp["SSHPublicKey"]["SSHPublicKeyId"]
|
||||
|
||||
resp = client.list_ssh_public_keys(UserName=username)
|
||||
resp["SSHPublicKeys"].should.have.length_of(1)
|
||||
resp["SSHPublicKeys"][0]["SSHPublicKeyId"].should.equal(ssh_public_key_id)
|
||||
|
||||
|
||||
@mock_iam
|
||||
def test_update_ssh_public_key():
|
||||
iam = boto3.resource("iam", region_name="us-east-1")
|
||||
client = iam.meta.client
|
||||
username = "test-user"
|
||||
iam.create_user(UserName=username)
|
||||
public_key = MOCK_CERT
|
||||
|
||||
with assert_raises(ClientError):
|
||||
client.update_ssh_public_key(
|
||||
UserName=username, SSHPublicKeyId="xxnon-existent-keyxx", Status="Inactive"
|
||||
)
|
||||
|
||||
resp = client.upload_ssh_public_key(UserName=username, SSHPublicKeyBody=public_key)
|
||||
ssh_public_key_id = resp["SSHPublicKey"]["SSHPublicKeyId"]
|
||||
resp["SSHPublicKey"]["Status"].should.equal("Active")
|
||||
|
||||
resp = client.update_ssh_public_key(
|
||||
UserName=username, SSHPublicKeyId=ssh_public_key_id, Status="Inactive"
|
||||
)
|
||||
|
||||
resp = client.get_ssh_public_key(
|
||||
UserName=username, SSHPublicKeyId=ssh_public_key_id, Encoding="SSH"
|
||||
)
|
||||
resp["SSHPublicKey"]["Status"].should.equal("Inactive")
|
||||
|
||||
|
||||
@mock_iam
|
||||
def test_delete_ssh_public_key():
|
||||
iam = boto3.resource("iam", region_name="us-east-1")
|
||||
client = iam.meta.client
|
||||
username = "test-user"
|
||||
iam.create_user(UserName=username)
|
||||
public_key = MOCK_CERT
|
||||
|
||||
with assert_raises(ClientError):
|
||||
client.delete_ssh_public_key(
|
||||
UserName=username, SSHPublicKeyId="xxnon-existent-keyxx"
|
||||
)
|
||||
|
||||
resp = client.upload_ssh_public_key(UserName=username, SSHPublicKeyBody=public_key)
|
||||
ssh_public_key_id = resp["SSHPublicKey"]["SSHPublicKeyId"]
|
||||
|
||||
resp = client.list_ssh_public_keys(UserName=username)
|
||||
resp["SSHPublicKeys"].should.have.length_of(1)
|
||||
|
||||
resp = client.delete_ssh_public_key(
|
||||
UserName=username, SSHPublicKeyId=ssh_public_key_id
|
||||
)
|
||||
|
||||
resp = client.list_ssh_public_keys(UserName=username)
|
||||
resp["SSHPublicKeys"].should.have.length_of(0)
|
||||
|
||||
|
||||
@mock_iam
|
||||
def test_get_account_authorization_details():
|
||||
test_policy = json.dumps(
|
||||
|
|
@ -2362,3 +2478,121 @@ def test_delete_account_password_policy_errors():
|
|||
client.delete_account_password_policy.when.called_with().should.throw(
|
||||
ClientError, "The account policy with name PasswordPolicy cannot be found."
|
||||
)
|
||||
|
||||
|
||||
@mock_iam
|
||||
def test_get_account_summary():
|
||||
client = boto3.client("iam", region_name="us-east-1")
|
||||
iam = boto3.resource("iam", region_name="us-east-1")
|
||||
|
||||
account_summary = iam.AccountSummary()
|
||||
|
||||
account_summary.summary_map.should.equal(
|
||||
{
|
||||
"GroupPolicySizeQuota": 5120,
|
||||
"InstanceProfilesQuota": 1000,
|
||||
"Policies": 0,
|
||||
"GroupsPerUserQuota": 10,
|
||||
"InstanceProfiles": 0,
|
||||
"AttachedPoliciesPerUserQuota": 10,
|
||||
"Users": 0,
|
||||
"PoliciesQuota": 1500,
|
||||
"Providers": 0,
|
||||
"AccountMFAEnabled": 0,
|
||||
"AccessKeysPerUserQuota": 2,
|
||||
"AssumeRolePolicySizeQuota": 2048,
|
||||
"PolicyVersionsInUseQuota": 10000,
|
||||
"GlobalEndpointTokenVersion": 1,
|
||||
"VersionsPerPolicyQuota": 5,
|
||||
"AttachedPoliciesPerGroupQuota": 10,
|
||||
"PolicySizeQuota": 6144,
|
||||
"Groups": 0,
|
||||
"AccountSigningCertificatesPresent": 0,
|
||||
"UsersQuota": 5000,
|
||||
"ServerCertificatesQuota": 20,
|
||||
"MFADevices": 0,
|
||||
"UserPolicySizeQuota": 2048,
|
||||
"PolicyVersionsInUse": 0,
|
||||
"ServerCertificates": 0,
|
||||
"Roles": 0,
|
||||
"RolesQuota": 1000,
|
||||
"SigningCertificatesPerUserQuota": 2,
|
||||
"MFADevicesInUse": 0,
|
||||
"RolePolicySizeQuota": 10240,
|
||||
"AttachedPoliciesPerRoleQuota": 10,
|
||||
"AccountAccessKeysPresent": 0,
|
||||
"GroupsQuota": 300,
|
||||
}
|
||||
)
|
||||
|
||||
client.create_instance_profile(InstanceProfileName="test-profile")
|
||||
client.create_open_id_connect_provider(Url="https://example.com", ThumbprintList=[])
|
||||
response_policy = client.create_policy(
|
||||
PolicyName="test-policy", PolicyDocument=MOCK_POLICY
|
||||
)
|
||||
client.create_role(RoleName="test-role", AssumeRolePolicyDocument="test policy")
|
||||
client.attach_role_policy(
|
||||
RoleName="test-role", PolicyArn=response_policy["Policy"]["Arn"]
|
||||
)
|
||||
client.create_saml_provider(
|
||||
Name="TestSAMLProvider", SAMLMetadataDocument="a" * 1024
|
||||
)
|
||||
client.create_group(GroupName="test-group")
|
||||
client.attach_group_policy(
|
||||
GroupName="test-group", PolicyArn=response_policy["Policy"]["Arn"]
|
||||
)
|
||||
client.create_user(UserName="test-user")
|
||||
client.attach_user_policy(
|
||||
UserName="test-user", PolicyArn=response_policy["Policy"]["Arn"]
|
||||
)
|
||||
client.enable_mfa_device(
|
||||
UserName="test-user",
|
||||
SerialNumber="123456789",
|
||||
AuthenticationCode1="234567",
|
||||
AuthenticationCode2="987654",
|
||||
)
|
||||
client.create_virtual_mfa_device(VirtualMFADeviceName="test-device")
|
||||
client.upload_server_certificate(
|
||||
ServerCertificateName="test-cert",
|
||||
CertificateBody="cert-body",
|
||||
PrivateKey="private-key",
|
||||
)
|
||||
account_summary.load()
|
||||
|
||||
account_summary.summary_map.should.equal(
|
||||
{
|
||||
"GroupPolicySizeQuota": 5120,
|
||||
"InstanceProfilesQuota": 1000,
|
||||
"Policies": 1,
|
||||
"GroupsPerUserQuota": 10,
|
||||
"InstanceProfiles": 1,
|
||||
"AttachedPoliciesPerUserQuota": 10,
|
||||
"Users": 1,
|
||||
"PoliciesQuota": 1500,
|
||||
"Providers": 2,
|
||||
"AccountMFAEnabled": 0,
|
||||
"AccessKeysPerUserQuota": 2,
|
||||
"AssumeRolePolicySizeQuota": 2048,
|
||||
"PolicyVersionsInUseQuota": 10000,
|
||||
"GlobalEndpointTokenVersion": 1,
|
||||
"VersionsPerPolicyQuota": 5,
|
||||
"AttachedPoliciesPerGroupQuota": 10,
|
||||
"PolicySizeQuota": 6144,
|
||||
"Groups": 1,
|
||||
"AccountSigningCertificatesPresent": 0,
|
||||
"UsersQuota": 5000,
|
||||
"ServerCertificatesQuota": 20,
|
||||
"MFADevices": 1,
|
||||
"UserPolicySizeQuota": 2048,
|
||||
"PolicyVersionsInUse": 3,
|
||||
"ServerCertificates": 1,
|
||||
"Roles": 1,
|
||||
"RolesQuota": 1000,
|
||||
"SigningCertificatesPerUserQuota": 2,
|
||||
"MFADevicesInUse": 1,
|
||||
"RolePolicySizeQuota": 10240,
|
||||
"AttachedPoliciesPerRoleQuota": 10,
|
||||
"AccountAccessKeysPresent": 0,
|
||||
"GroupsQuota": 300,
|
||||
}
|
||||
)
|
||||
|
|
|
|||
|
|
@ -524,7 +524,7 @@ def _get_account_id():
|
|||
global account_id
|
||||
if account_id:
|
||||
return account_id
|
||||
sts = boto3.client("sts")
|
||||
sts = boto3.client("sts", region_name=region)
|
||||
identity = sts.get_caller_identity()
|
||||
account_id = identity["Account"]
|
||||
return account_id
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue