Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

iam: add support for Account Password Policy APIs #2574

Merged
merged 3 commits into from Nov 12, 2014

Conversation

lucab
Copy link
Contributor

@lucab lucab commented Aug 28, 2014

This commits adds support to IAM module for all currently available APIs
related to Account Password Policy, introducing three new public methods:

  • get_account_password_policy()
  • delete_account_password_policy()
  • update_account_password_policy()

IAM Password Policy and API reference:
http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_ManagingPasswordPolicies.html

Signed-off-by: Luca Bruno luca.bruno@rocket-internet.de

@lucab
Copy link
Contributor Author

lucab commented Aug 28, 2014

cc @gvarisco

@danielgtaylor
Copy link
Member

Thanks for the pull request! This looks great, but before it can be merged you will need to add tests to cover the new functions. Please add tests and comment back on this issue and then I'll merge it in.

@lucab lucab force-pushed the lucab/to-upstream/iam-password-policy branch from 1ddcbb9 to 7bd265a Compare September 5, 2014 09:42
@lucab
Copy link
Contributor Author

lucab commented Sep 5, 2014

Ah sorry, I didn't realize there was a compulsory test suite. Added unit and integration tests, and properly tagged another existing IAM test in the meanwhile.

Rebased on current develop, all green on travis.

@lucab
Copy link
Contributor Author

lucab commented Sep 27, 2014

@danielgtaylor can you have another look at it and merge if ok?

@lucab
Copy link
Contributor Author

lucab commented Nov 11, 2014

@kyleknap @danielgtaylor another month passed, any chance to have this merged? It looks like people started reimplementing the same code (see PR #2658) and I'm losing motivation to continuously rebase my branch for conflicts, just to endlessly wait for another conflict to happen...

@danielgtaylor
Copy link
Member

@lucab sorry for the slow response. The code looks great, thanks for updating it 👍 Unfortunately it looks like it can't be merged cleanly, so if you can rebase one last time and ping us we'll pull it in for the next release, thanks!

Luca Bruno added 3 commits November 12, 2014 11:03
This commits adds support to iam module for all currently available APIs
related to Account Password Policy, introducing three new public methods:
 * get_account_password_policy()
 * delete_account_password_policy()
 * update_account_password_policy()

IAM Password Policy and API reference:
http://docs.aws.amazon.com/IAM/latest/UserGuide/Using_ManagingPasswordPolicies.html

Signed-off-by: Luca Bruno <luca.bruno@rocket-internet.de>
This commit adds one unit and one integration test for the IAM
Account Password Policy methods.

Signed-off-by: Luca Bruno <luca.bruno@rocket-internet.de>
Signed-off-by: Luca Bruno <luca.bruno@rocket-internet.de>
@lucab lucab force-pushed the lucab/to-upstream/iam-password-policy branch from 7bd265a to a788932 Compare November 12, 2014 10:22
@lucab
Copy link
Contributor Author

lucab commented Nov 12, 2014

Rebased against current develop branch by tail-appending my changes. Tests are ok locally, travis is green.

@kyleknap
Copy link
Member

Thanks! Merging pull request.

kyleknap added a commit that referenced this pull request Nov 12, 2014
…licy

iam: add support for Account Password Policy APIs
@kyleknap kyleknap merged commit 6c9bd53 into boto:develop Nov 12, 2014
@danielgtaylor
Copy link
Member

👍

@lucab
Copy link
Contributor Author

lucab commented Nov 13, 2014

Awesome, thanks for merging. You may want to mark PR #2658 as duplicate fixed, too. I see we are rapidly approaching 200 queued PRs. Is there anything that we (as in, external contributors) can do to drain the backlog?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

3 participants