aws-sdk-core 2.6.9 → 2.7.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (233) hide show
  1. checksums.yaml +4 -4
  2. data/apis/acm/2015-12-08/api-2.json +34 -3
  3. data/apis/acm/2015-12-08/paginators-1.json +2 -2
  4. data/apis/apigateway/2015-07-09/api-2.json +625 -17
  5. data/apis/application-autoscaling/2016-02-06/api-2.json +5 -2
  6. data/apis/appstream/2016-12-01/api-2.json +820 -0
  7. data/apis/appstream/2016-12-01/examples-1.json +5 -0
  8. data/apis/appstream/2016-12-01/waiters-2.json +55 -0
  9. data/apis/autoscaling/2011-01-01/api-2.json +1 -0
  10. data/apis/autoscaling/2011-01-01/resources-1.json +12 -1
  11. data/apis/batch/2016-08-10/api-2.json +885 -0
  12. data/apis/batch/2016-08-10/examples-1.json +589 -0
  13. data/apis/budgets/2016-10-20/api-2.json +696 -0
  14. data/apis/budgets/2016-10-20/examples-1.json +5 -0
  15. data/apis/cloudformation/2010-05-15/api-2.json +126 -11
  16. data/apis/cloudformation/2010-05-15/examples-1.json +153 -0
  17. data/apis/cloudformation/2010-05-15/resources-1.json +10 -1
  18. data/apis/cloudformation/2010-05-15/waiters-2.json +18 -96
  19. data/apis/cloudfront/2016-01-28/api-2.json +1 -0
  20. data/apis/cloudfront/2016-08-01/api-2.json +1 -0
  21. data/apis/cloudfront/2016-08-20/api-2.json +1 -0
  22. data/apis/cloudfront/2016-09-07/api-2.json +1 -0
  23. data/apis/cloudfront/2016-09-29/api-2.json +2599 -0
  24. data/apis/cloudfront/2016-09-29/examples-1.json +5 -0
  25. data/apis/cloudfront/2016-09-29/paginators-1.json +32 -0
  26. data/apis/cloudfront/2016-09-29/waiters-2.json +47 -0
  27. data/apis/cloudfront/2016-11-25/api-2.json +2665 -0
  28. data/apis/cloudfront/2016-11-25/examples-1.json +5 -0
  29. data/apis/cloudfront/2016-11-25/paginators-1.json +32 -0
  30. data/apis/cloudfront/2016-11-25/waiters-2.json +47 -0
  31. data/apis/cloudhsm/2014-05-30/api-2.json +2 -1
  32. data/apis/cloudsearch/2013-01-01/api-2.json +2 -1
  33. data/apis/cloudsearchdomain/2013-01-01/api-2.json +2 -1
  34. data/apis/cloudtrail/2013-11-01/api-2.json +109 -3
  35. data/apis/cloudtrail/2013-11-01/paginators-1.json +6 -0
  36. data/apis/codebuild/2016-10-06/api-2.json +702 -0
  37. data/apis/codebuild/2016-10-06/examples-1.json +5 -0
  38. data/apis/codecommit/2015-04-13/api-2.json +2 -1
  39. data/apis/codedeploy/2014-10-06/api-2.json +35 -6
  40. data/apis/codepipeline/2015-07-09/api-2.json +3 -2
  41. data/apis/cognito-identity/2014-06-30/api-2.json +84 -5
  42. data/apis/cognito-idp/2016-04-18/api-2.json +368 -5
  43. data/apis/cognito-sync/2014-06-30/api-2.json +2 -1
  44. data/apis/config/2014-11-12/api-2.json +40 -9
  45. data/apis/config/2014-11-12/paginators-1.json +2 -2
  46. data/apis/cur/2017-01-06/api-2.json +226 -0
  47. data/apis/cur/2017-01-06/examples-1.json +5 -0
  48. data/apis/cur/2017-01-06/paginators-1.json +9 -0
  49. data/apis/datapipeline/2012-10-29/api-2.json +2 -1
  50. data/apis/devicefarm/2015-06-23/api-2.json +2 -1
  51. data/apis/directconnect/2012-10-25/api-2.json +257 -10
  52. data/apis/discovery/2015-11-01/api-2.json +316 -5
  53. data/apis/dms/2016-01-01/api-2.json +45 -9
  54. data/apis/ds/2015-04-16/api-2.json +144 -1
  55. data/apis/dynamodb/2011-12-05/api-2.json +802 -0
  56. data/apis/dynamodb/2011-12-05/examples-1.json +5 -0
  57. data/apis/dynamodb/2011-12-05/paginators-1.json +26 -0
  58. data/apis/dynamodb/2011-12-05/waiters-2.json +35 -0
  59. data/apis/dynamodb/2012-08-10/api-2.json +115 -1
  60. data/apis/dynamodb/2012-08-10/examples-1.json +623 -0
  61. data/apis/dynamodb/2012-08-10/paginators-1.json +4 -4
  62. data/apis/ec2/2015-10-01/api-2.json +1 -0
  63. data/apis/ec2/2016-04-01/api-2.json +1 -0
  64. data/apis/ec2/2016-09-15/api-2.json +1 -0
  65. data/apis/ec2/2016-11-15/api-2.json +15037 -0
  66. data/apis/ec2/2016-11-15/examples-1.json +3740 -0
  67. data/apis/ec2/2016-11-15/paginators-1.json +138 -0
  68. data/apis/ec2/2016-11-15/resources-1.json +2582 -0
  69. data/apis/ec2/2016-11-15/waiters-2.json +593 -0
  70. data/apis/ecr/2015-09-21/api-2.json +17 -3
  71. data/apis/ecr/2015-09-21/paginators-1.json +12 -6
  72. data/apis/ecs/2014-11-13/api-2.json +183 -9
  73. data/apis/elasticache/2015-02-02/api-2.json +5 -2
  74. data/apis/elasticache/2015-02-02/examples-1.json +2963 -0
  75. data/apis/elasticbeanstalk/2010-12-01/api-2.json +123 -6
  76. data/apis/elasticfilesystem/2015-02-01/api-2.json +2 -1
  77. data/apis/elasticfilesystem/2015-02-01/examples-1.json +217 -0
  78. data/apis/elasticloadbalancing/2012-06-01/api-2.json +1 -0
  79. data/apis/elasticloadbalancingv2/2015-12-01/api-2.json +1 -0
  80. data/apis/elasticmapreduce/2009-03-31/api-2.json +322 -5
  81. data/apis/elastictranscoder/2012-09-25/api-2.json +44 -13
  82. data/apis/elastictranscoder/2012-09-25/examples-1.json +5 -0
  83. data/apis/email/2010-12-01/api-2.json +425 -4
  84. data/apis/es/2015-01-01/api-2.json +1 -0
  85. data/apis/events/2015-10-07/api-2.json +1 -0
  86. data/apis/firehose/2015-08-04/api-2.json +151 -4
  87. data/apis/firehose/2015-08-04/examples-1.json +5 -0
  88. data/apis/gamelift/2015-10-01/api-2.json +59 -1
  89. data/apis/glacier/2012-06-01/api-2.json +369 -779
  90. data/apis/glacier/2012-06-01/examples-1.json +806 -0
  91. data/apis/glacier/2012-06-01/paginators-1.json +5 -5
  92. data/apis/health/2016-08-04/api-2.json +547 -0
  93. data/apis/health/2016-08-04/examples-1.json +5 -0
  94. data/apis/health/2016-08-04/paginators-1.json +31 -0
  95. data/apis/iam/2010-05-08/api-2.json +209 -0
  96. data/apis/iam/2010-05-08/examples-1.json +1186 -0
  97. data/apis/importexport/2010-06-01/api-2.json +1 -0
  98. data/apis/inspector/2016-02-16/api-2.json +2 -1
  99. data/apis/inspector/2016-02-16/examples-1.json +1135 -0
  100. data/apis/iot-data/2015-05-28/api-2.json +1 -0
  101. data/apis/iot/2015-05-28/api-2.json +16 -0
  102. data/apis/kinesis/2013-12-02/api-2.json +80 -12
  103. data/apis/kinesisanalytics/2015-08-14/api-2.json +7 -2
  104. data/apis/kms/2014-11-01/api-2.json +2 -1
  105. data/apis/kms/2014-11-01/examples-1.json +810 -0
  106. data/apis/lambda/2014-11-11/api-2.json +1 -0
  107. data/apis/lambda/2015-03-31/api-2.json +162 -9
  108. data/apis/lambda/2015-03-31/examples-1.json +609 -0
  109. data/apis/lightsail/2016-11-28/api-2.json +2137 -0
  110. data/apis/lightsail/2016-11-28/examples-1.json +5 -0
  111. data/apis/logs/2014-03-28/api-2.json +113 -6
  112. data/apis/machinelearning/2014-12-12/api-2.json +1 -0
  113. data/apis/marketplacecommerceanalytics/2015-07-01/api-2.json +5 -2
  114. data/apis/meteringmarketplace/2016-01-14/api-2.json +136 -0
  115. data/apis/monitoring/2010-08-01/api-2.json +27 -6
  116. data/apis/opsworks/2013-02-18/api-2.json +1 -0
  117. data/apis/opsworkscm/2016-11-01/api-2.json +712 -0
  118. data/apis/opsworkscm/2016-11-01/examples-1.json +5 -0
  119. data/apis/pinpoint/2016-12-01/api-2.json +2753 -0
  120. data/apis/pinpoint/2016-12-01/examples-1.json +5 -0
  121. data/apis/polly/2016-06-10/api-2.json +504 -0
  122. data/apis/polly/2016-06-10/examples-1.json +171 -0
  123. data/apis/rds/2013-01-10/api-2.json +2902 -0
  124. data/apis/rds/2013-01-10/examples-1.json +5 -0
  125. data/apis/rds/2013-01-10/paginators-1.json +97 -0
  126. data/apis/rds/2013-02-12/api-2.json +3058 -0
  127. data/apis/rds/2013-02-12/examples-1.json +5 -0
  128. data/apis/rds/2013-02-12/paginators-1.json +110 -0
  129. data/apis/rds/2013-09-09/api-2.json +3159 -0
  130. data/apis/rds/2013-09-09/examples-1.json +5 -0
  131. data/apis/rds/2013-09-09/paginators-1.json +110 -0
  132. data/apis/rds/2013-09-09/waiters-2.json +97 -0
  133. data/apis/rds/2014-09-01/api-2.json +3272 -0
  134. data/apis/rds/2014-09-01/examples-1.json +5 -0
  135. data/apis/rds/2014-09-01/paginators-1.json +4 -0
  136. data/apis/rds/2014-10-31/api-2.json +121 -6
  137. data/apis/rds/2014-10-31/examples-1.json +0 -444
  138. data/apis/rds/2014-10-31/paginators-1.json +18 -18
  139. data/apis/rds/2014-10-31/resources-1.json +1 -1
  140. data/apis/redshift/2012-12-01/api-2.json +1 -0
  141. data/apis/rekognition/2016-06-27/api-2.json +836 -0
  142. data/apis/rekognition/2016-06-27/examples-1.json +651 -0
  143. data/apis/rekognition/2016-06-27/paginators-1.json +16 -0
  144. data/apis/route53/2013-04-01/api-2.json +186 -219
  145. data/apis/route53/2013-04-01/paginators-1.json +9 -9
  146. data/apis/route53domains/2014-05-15/api-2.json +1 -0
  147. data/apis/s3/2006-03-01/api-2.json +843 -23
  148. data/apis/sdb/2009-04-15/api-2.json +1 -0
  149. data/apis/servicecatalog/2015-12-10/api-2.json +1214 -29
  150. data/apis/shield/2016-06-02/api-2.json +494 -0
  151. data/apis/shield/2016-06-02/examples-1.json +5 -0
  152. data/apis/sms/2016-10-24/api-2.json +612 -0
  153. data/apis/sms/2016-10-24/examples-1.json +5 -0
  154. data/apis/sms/2016-10-24/paginators-1.json +28 -0
  155. data/apis/snowball/2016-06-30/api-2.json +283 -11
  156. data/apis/snowball/2016-06-30/examples-1.json +437 -0
  157. data/apis/sns/2010-03-31/api-2.json +1 -0
  158. data/apis/sqs/2012-11-05/api-2.json +74 -38
  159. data/apis/sqs/2012-11-05/examples-1.json +0 -613
  160. data/apis/sqs/2012-11-05/resources-1.json +232 -0
  161. data/apis/ssm/2014-11-06/api-2.json +4036 -536
  162. data/apis/states/2016-11-23/api-2.json +1021 -0
  163. data/apis/states/2016-11-23/examples-1.json +5 -0
  164. data/apis/states/2016-11-23/paginators-1.json +28 -0
  165. data/apis/storagegateway/2013-06-30/api-2.json +269 -6
  166. data/apis/storagegateway/2013-06-30/examples-1.json +1376 -0
  167. data/apis/streams.dynamodb/2012-08-10/api-2.json +2 -1
  168. data/apis/streams.dynamodb/2012-08-10/examples-1.json +207 -0
  169. data/apis/sts/2011-06-15/api-2.json +1 -0
  170. data/apis/sts/2011-06-15/examples-1.json +201 -0
  171. data/apis/support/2013-04-15/api-2.json +1 -0
  172. data/apis/swf/2012-01-25/api-2.json +1 -0
  173. data/apis/waf-regional/2016-11-28/api-2.json +2090 -0
  174. data/apis/waf-regional/2016-11-28/examples-1.json +1017 -0
  175. data/apis/waf/2015-08-24/api-2.json +3 -1
  176. data/apis/waf/2015-08-24/examples-1.json +1012 -0
  177. data/apis/workspaces/2015-04-08/api-2.json +1 -0
  178. data/apis/xray/2016-04-12/api-2.json +491 -0
  179. data/apis/xray/2016-04-12/examples-1.json +5 -0
  180. data/endpoints.json +781 -392
  181. data/lib/aws-sdk-core.rb +20 -0
  182. data/lib/aws-sdk-core/api/customizations.rb +16 -0
  183. data/lib/aws-sdk-core/api/docs/builder.rb +2 -1
  184. data/lib/aws-sdk-core/api/docs/client_type_documenter.rb +9 -0
  185. data/lib/aws-sdk-core/api/docs/crosslink.rb +43 -0
  186. data/lib/aws-sdk-core/api/docs/operation_documenter.rb +11 -2
  187. data/lib/aws-sdk-core/appstream.rb +6 -0
  188. data/lib/aws-sdk-core/batch.rb +5 -0
  189. data/lib/aws-sdk-core/budgets.rb +5 -0
  190. data/lib/aws-sdk-core/client.rb +1 -0
  191. data/lib/aws-sdk-core/client_waiters.rb +5 -5
  192. data/lib/aws-sdk-core/cloudfront.rb +5 -5
  193. data/lib/aws-sdk-core/cloudfront/url_signer.rb +1 -1
  194. data/lib/aws-sdk-core/codebuild.rb +5 -0
  195. data/lib/aws-sdk-core/costandusagereportservice.rb +6 -0
  196. data/lib/aws-sdk-core/credential_provider_chain.rb +3 -3
  197. data/lib/aws-sdk-core/cur.rb +6 -0
  198. data/lib/aws-sdk-core/ec2.rb +6 -6
  199. data/lib/aws-sdk-core/elastictranscoder.rb +1 -0
  200. data/lib/aws-sdk-core/firehose.rb +1 -0
  201. data/lib/aws-sdk-core/glacier.rb +1 -0
  202. data/lib/aws-sdk-core/health.rb +6 -0
  203. data/lib/aws-sdk-core/lightsail.rb +5 -0
  204. data/lib/aws-sdk-core/opsworkscm.rb +5 -0
  205. data/lib/aws-sdk-core/partitions/region.rb +0 -12
  206. data/lib/aws-sdk-core/partitions/service.rb +1 -11
  207. data/lib/aws-sdk-core/pinpoint.rb +5 -0
  208. data/lib/aws-sdk-core/plugins/ec2_copy_encrypted_snapshot.rb +24 -55
  209. data/lib/aws-sdk-core/plugins/idempotency_token.rb +37 -0
  210. data/lib/aws-sdk-core/plugins/rds_cross_region_copying.rb +64 -0
  211. data/lib/aws-sdk-core/plugins/request_signer.rb +4 -0
  212. data/lib/aws-sdk-core/plugins/retry_errors.rb +1 -0
  213. data/lib/aws-sdk-core/plugins/s3_bucket_dns.rb +1 -1
  214. data/lib/aws-sdk-core/plugins/sqs_md5s.rb +1 -1
  215. data/lib/aws-sdk-core/polly.rb +13 -0
  216. data/lib/aws-sdk-core/polly/presigner.rb +70 -0
  217. data/lib/aws-sdk-core/rekognition.rb +6 -0
  218. data/lib/aws-sdk-core/rest/request/endpoint.rb +11 -66
  219. data/lib/aws-sdk-core/rest/request/querystring_builder.rb +90 -0
  220. data/lib/aws-sdk-core/shield.rb +5 -0
  221. data/lib/aws-sdk-core/signers/v4.rb +2 -1
  222. data/lib/aws-sdk-core/sms.rb +6 -0
  223. data/lib/aws-sdk-core/sqs.rb +1 -0
  224. data/lib/aws-sdk-core/states.rb +6 -0
  225. data/lib/aws-sdk-core/version.rb +1 -1
  226. data/lib/aws-sdk-core/wafregional.rb +5 -0
  227. data/lib/aws-sdk-core/xray.rb +5 -0
  228. data/lib/seahorse/client/net_http/connection_pool.rb +11 -7
  229. data/lib/seahorse/client/net_http/handler.rb +5 -2
  230. data/lib/seahorse/client/plugin_list.rb +3 -1
  231. data/lib/seahorse/client/response.rb +9 -20
  232. data/service-models.json +66 -2
  233. metadata +110 -2
@@ -0,0 +1,5 @@
1
+ {
2
+ "version": "1.0",
3
+ "examples": {
4
+ }
5
+ }
@@ -0,0 +1,31 @@
1
+ {
2
+ "pagination": {
3
+ "DescribeAffectedEntities": {
4
+ "input_token": "nextToken",
5
+ "output_token": "nextToken",
6
+ "limit_key": "maxResults",
7
+ "result_key": "entities"
8
+ },
9
+ "DescribeEntityAggregates": {
10
+ "result_key": "entityAggregates"
11
+ },
12
+ "DescribeEventAggregates": {
13
+ "input_token": "nextToken",
14
+ "output_token": "nextToken",
15
+ "limit_key": "maxResults",
16
+ "result_key": "eventAggregates"
17
+ },
18
+ "DescribeEvents": {
19
+ "input_token": "nextToken",
20
+ "output_token": "nextToken",
21
+ "limit_key": "maxResults",
22
+ "result_key": "events"
23
+ },
24
+ "DescribeEventTypes": {
25
+ "input_token": "nextToken",
26
+ "output_token": "nextToken",
27
+ "limit_key": "maxResults",
28
+ "result_key": "eventTypes"
29
+ }
30
+ }
31
+ }
@@ -8,6 +8,7 @@
8
8
  "serviceAbbreviation":"IAM",
9
9
  "serviceFullName":"AWS Identity and Access Management",
10
10
  "signatureVersion":"v4",
11
+ "uid":"iam-2010-05-08",
11
12
  "xmlNamespace":"https://iam.amazonaws.com/doc/2010-05-08/"
12
13
  },
13
14
  "operations":{
@@ -286,6 +287,23 @@
286
287
  {"shape":"ServiceFailureException"}
287
288
  ]
288
289
  },
290
+ "CreateServiceSpecificCredential":{
291
+ "name":"CreateServiceSpecificCredential",
292
+ "http":{
293
+ "method":"POST",
294
+ "requestUri":"/"
295
+ },
296
+ "input":{"shape":"CreateServiceSpecificCredentialRequest"},
297
+ "output":{
298
+ "shape":"CreateServiceSpecificCredentialResponse",
299
+ "resultWrapper":"CreateServiceSpecificCredentialResult"
300
+ },
301
+ "errors":[
302
+ {"shape":"LimitExceededException"},
303
+ {"shape":"NoSuchEntityException"},
304
+ {"shape":"ServiceNotSupportedException"}
305
+ ]
306
+ },
289
307
  "CreateUser":{
290
308
  "name":"CreateUser",
291
309
  "http":{
@@ -537,6 +555,17 @@
537
555
  {"shape":"ServiceFailureException"}
538
556
  ]
539
557
  },
558
+ "DeleteServiceSpecificCredential":{
559
+ "name":"DeleteServiceSpecificCredential",
560
+ "http":{
561
+ "method":"POST",
562
+ "requestUri":"/"
563
+ },
564
+ "input":{"shape":"DeleteServiceSpecificCredentialRequest"},
565
+ "errors":[
566
+ {"shape":"NoSuchEntityException"}
567
+ ]
568
+ },
540
569
  "DeleteSigningCertificate":{
541
570
  "name":"DeleteSigningCertificate",
542
571
  "http":{
@@ -1315,6 +1344,22 @@
1315
1344
  {"shape":"ServiceFailureException"}
1316
1345
  ]
1317
1346
  },
1347
+ "ListServiceSpecificCredentials":{
1348
+ "name":"ListServiceSpecificCredentials",
1349
+ "http":{
1350
+ "method":"POST",
1351
+ "requestUri":"/"
1352
+ },
1353
+ "input":{"shape":"ListServiceSpecificCredentialsRequest"},
1354
+ "output":{
1355
+ "shape":"ListServiceSpecificCredentialsResponse",
1356
+ "resultWrapper":"ListServiceSpecificCredentialsResult"
1357
+ },
1358
+ "errors":[
1359
+ {"shape":"NoSuchEntityException"},
1360
+ {"shape":"ServiceNotSupportedException"}
1361
+ ]
1362
+ },
1318
1363
  "ListSigningCertificates":{
1319
1364
  "name":"ListSigningCertificates",
1320
1365
  "http":{
@@ -1455,6 +1500,21 @@
1455
1500
  {"shape":"ServiceFailureException"}
1456
1501
  ]
1457
1502
  },
1503
+ "ResetServiceSpecificCredential":{
1504
+ "name":"ResetServiceSpecificCredential",
1505
+ "http":{
1506
+ "method":"POST",
1507
+ "requestUri":"/"
1508
+ },
1509
+ "input":{"shape":"ResetServiceSpecificCredentialRequest"},
1510
+ "output":{
1511
+ "shape":"ResetServiceSpecificCredentialResponse",
1512
+ "resultWrapper":"ResetServiceSpecificCredentialResult"
1513
+ },
1514
+ "errors":[
1515
+ {"shape":"NoSuchEntityException"}
1516
+ ]
1517
+ },
1458
1518
  "ResyncMFADevice":{
1459
1519
  "name":"ResyncMFADevice",
1460
1520
  "http":{
@@ -1642,6 +1702,17 @@
1642
1702
  {"shape":"ServiceFailureException"}
1643
1703
  ]
1644
1704
  },
1705
+ "UpdateServiceSpecificCredential":{
1706
+ "name":"UpdateServiceSpecificCredential",
1707
+ "http":{
1708
+ "method":"POST",
1709
+ "requestUri":"/"
1710
+ },
1711
+ "input":{"shape":"UpdateServiceSpecificCredentialRequest"},
1712
+ "errors":[
1713
+ {"shape":"NoSuchEntityException"}
1714
+ ]
1715
+ },
1645
1716
  "UpdateSigningCertificate":{
1646
1717
  "name":"UpdateSigningCertificate",
1647
1718
  "http":{
@@ -2070,6 +2141,23 @@
2070
2141
  "SAMLProviderArn":{"shape":"arnType"}
2071
2142
  }
2072
2143
  },
2144
+ "CreateServiceSpecificCredentialRequest":{
2145
+ "type":"structure",
2146
+ "required":[
2147
+ "UserName",
2148
+ "ServiceName"
2149
+ ],
2150
+ "members":{
2151
+ "UserName":{"shape":"userNameType"},
2152
+ "ServiceName":{"shape":"serviceName"}
2153
+ }
2154
+ },
2155
+ "CreateServiceSpecificCredentialResponse":{
2156
+ "type":"structure",
2157
+ "members":{
2158
+ "ServiceSpecificCredential":{"shape":"ServiceSpecificCredential"}
2159
+ }
2160
+ },
2073
2161
  "CreateUserRequest":{
2074
2162
  "type":"structure",
2075
2163
  "required":["UserName"],
@@ -2273,6 +2361,14 @@
2273
2361
  "ServerCertificateName":{"shape":"serverCertificateNameType"}
2274
2362
  }
2275
2363
  },
2364
+ "DeleteServiceSpecificCredentialRequest":{
2365
+ "type":"structure",
2366
+ "required":["ServiceSpecificCredentialId"],
2367
+ "members":{
2368
+ "UserName":{"shape":"userNameType"},
2369
+ "ServiceSpecificCredentialId":{"shape":"serviceSpecificCredentialId"}
2370
+ }
2371
+ },
2276
2372
  "DeleteSigningCertificateRequest":{
2277
2373
  "type":"structure",
2278
2374
  "required":["CertificateId"],
@@ -3238,6 +3334,19 @@
3238
3334
  "Marker":{"shape":"markerType"}
3239
3335
  }
3240
3336
  },
3337
+ "ListServiceSpecificCredentialsRequest":{
3338
+ "type":"structure",
3339
+ "members":{
3340
+ "UserName":{"shape":"userNameType"},
3341
+ "ServiceName":{"shape":"serviceName"}
3342
+ }
3343
+ },
3344
+ "ListServiceSpecificCredentialsResponse":{
3345
+ "type":"structure",
3346
+ "members":{
3347
+ "ServiceSpecificCredentials":{"shape":"ServiceSpecificCredentialsListType"}
3348
+ }
3349
+ },
3241
3350
  "ListSigningCertificatesRequest":{
3242
3351
  "type":"structure",
3243
3352
  "members":{
@@ -3619,6 +3728,20 @@
3619
3728
  "COMPLETE"
3620
3729
  ]
3621
3730
  },
3731
+ "ResetServiceSpecificCredentialRequest":{
3732
+ "type":"structure",
3733
+ "required":["ServiceSpecificCredentialId"],
3734
+ "members":{
3735
+ "UserName":{"shape":"userNameType"},
3736
+ "ServiceSpecificCredentialId":{"shape":"serviceSpecificCredentialId"}
3737
+ }
3738
+ },
3739
+ "ResetServiceSpecificCredentialResponse":{
3740
+ "type":"structure",
3741
+ "members":{
3742
+ "ServiceSpecificCredential":{"shape":"ServiceSpecificCredential"}
3743
+ }
3744
+ },
3622
3745
  "ResourceHandlingOptionType":{
3623
3746
  "type":"string",
3624
3747
  "max":64,
@@ -3798,6 +3921,62 @@
3798
3921
  },
3799
3922
  "exception":true
3800
3923
  },
3924
+ "ServiceNotSupportedException":{
3925
+ "type":"structure",
3926
+ "members":{
3927
+ "message":{"shape":"serviceNotSupportedMessage"}
3928
+ },
3929
+ "error":{
3930
+ "code":"NotSupportedService",
3931
+ "httpStatusCode":404,
3932
+ "senderFault":true
3933
+ },
3934
+ "exception":true
3935
+ },
3936
+ "ServiceSpecificCredential":{
3937
+ "type":"structure",
3938
+ "required":[
3939
+ "CreateDate",
3940
+ "ServiceName",
3941
+ "ServiceUserName",
3942
+ "ServicePassword",
3943
+ "ServiceSpecificCredentialId",
3944
+ "UserName",
3945
+ "Status"
3946
+ ],
3947
+ "members":{
3948
+ "CreateDate":{"shape":"dateType"},
3949
+ "ServiceName":{"shape":"serviceName"},
3950
+ "ServiceUserName":{"shape":"serviceUserName"},
3951
+ "ServicePassword":{"shape":"servicePassword"},
3952
+ "ServiceSpecificCredentialId":{"shape":"serviceSpecificCredentialId"},
3953
+ "UserName":{"shape":"userNameType"},
3954
+ "Status":{"shape":"statusType"}
3955
+ }
3956
+ },
3957
+ "ServiceSpecificCredentialMetadata":{
3958
+ "type":"structure",
3959
+ "required":[
3960
+ "UserName",
3961
+ "Status",
3962
+ "ServiceUserName",
3963
+ "CreateDate",
3964
+ "ServiceSpecificCredentialId",
3965
+ "ServiceName"
3966
+ ],
3967
+ "members":{
3968
+ "UserName":{"shape":"userNameType"},
3969
+ "Status":{"shape":"statusType"},
3970
+ "ServiceUserName":{"shape":"serviceUserName"},
3971
+ "CreateDate":{"shape":"dateType"},
3972
+ "ServiceSpecificCredentialId":{"shape":"serviceSpecificCredentialId"},
3973
+ "ServiceName":{"shape":"serviceName"}
3974
+ }
3975
+ },
3976
+ "ServiceSpecificCredentialsListType":{
3977
+ "type":"list",
3978
+ "member":{"shape":"ServiceSpecificCredentialMetadata"}
3979
+ },
3801
3980
  "SetDefaultPolicyVersionRequest":{
3802
3981
  "type":"structure",
3803
3982
  "required":[
@@ -4006,6 +4185,18 @@
4006
4185
  "NewServerCertificateName":{"shape":"serverCertificateNameType"}
4007
4186
  }
4008
4187
  },
4188
+ "UpdateServiceSpecificCredentialRequest":{
4189
+ "type":"structure",
4190
+ "required":[
4191
+ "ServiceSpecificCredentialId",
4192
+ "Status"
4193
+ ],
4194
+ "members":{
4195
+ "UserName":{"shape":"userNameType"},
4196
+ "ServiceSpecificCredentialId":{"shape":"serviceSpecificCredentialId"},
4197
+ "Status":{"shape":"statusType"}
4198
+ }
4199
+ },
4009
4200
  "UpdateSigningCertificateRequest":{
4010
4201
  "type":"structure",
4011
4202
  "required":[
@@ -4433,6 +4624,24 @@
4433
4624
  "pattern":"[\\w+=,.@-]+"
4434
4625
  },
4435
4626
  "serviceFailureExceptionMessage":{"type":"string"},
4627
+ "serviceName":{"type":"string"},
4628
+ "serviceNotSupportedMessage":{"type":"string"},
4629
+ "servicePassword":{
4630
+ "type":"string",
4631
+ "sensitive":true
4632
+ },
4633
+ "serviceSpecificCredentialId":{
4634
+ "type":"string",
4635
+ "max":128,
4636
+ "min":20,
4637
+ "pattern":"[\\w]+"
4638
+ },
4639
+ "serviceUserName":{
4640
+ "type":"string",
4641
+ "max":200,
4642
+ "min":17,
4643
+ "pattern":"[\\w+=,.@-]+"
4644
+ },
4436
4645
  "statusType":{
4437
4646
  "type":"string",
4438
4647
  "enum":[
@@ -1,5 +1,1191 @@
1
1
  {
2
2
  "version": "1.0",
3
3
  "examples": {
4
+ "AddClientIDToOpenIDConnectProvider": [
5
+ {
6
+ "input": {
7
+ "ClientID": "my-application-ID",
8
+ "OpenIDConnectProviderArn": "arn:aws:iam::123456789012:oidc-provider/server.example.com"
9
+ },
10
+ "comments": {
11
+ "input": {
12
+ },
13
+ "output": {
14
+ }
15
+ },
16
+ "description": "The following add-client-id-to-open-id-connect-provider command adds the client ID my-application-ID to the OIDC provider named server.example.com:",
17
+ "id": "028e91f4-e2a6-4d59-9e3b-4965a3fb19be",
18
+ "title": "To add a client ID (audience) to an Open-ID Connect (OIDC) provider"
19
+ }
20
+ ],
21
+ "AddRoleToInstanceProfile": [
22
+ {
23
+ "input": {
24
+ "InstanceProfileName": "Webserver",
25
+ "RoleName": "S3Access"
26
+ },
27
+ "comments": {
28
+ "input": {
29
+ },
30
+ "output": {
31
+ }
32
+ },
33
+ "description": "The following command adds the role named S3Access to the instance profile named Webserver:",
34
+ "id": "c107fac3-edb6-4827-8a71-8863ec91c81f",
35
+ "title": "To add a role to an instance profile"
36
+ }
37
+ ],
38
+ "AddUserToGroup": [
39
+ {
40
+ "input": {
41
+ "GroupName": "Admins",
42
+ "UserName": "Bob"
43
+ },
44
+ "comments": {
45
+ "input": {
46
+ },
47
+ "output": {
48
+ }
49
+ },
50
+ "description": "The following command adds an IAM user named Bob to the IAM group named Admins:",
51
+ "id": "619c7e6b-09f8-4036-857b-51a6ea5027ca",
52
+ "title": "To add a user to an IAM group"
53
+ }
54
+ ],
55
+ "AttachGroupPolicy": [
56
+ {
57
+ "input": {
58
+ "GroupName": "Finance",
59
+ "PolicyArn": "arn:aws:iam::aws:policy/ReadOnlyAccess"
60
+ },
61
+ "comments": {
62
+ "input": {
63
+ },
64
+ "output": {
65
+ }
66
+ },
67
+ "description": "The following command attaches the AWS managed policy named ReadOnlyAccess to the IAM group named Finance.",
68
+ "id": "87551489-86f0-45db-9889-759936778f2b",
69
+ "title": "To attach a managed policy to an IAM group"
70
+ }
71
+ ],
72
+ "AttachRolePolicy": [
73
+ {
74
+ "input": {
75
+ "PolicyArn": "arn:aws:iam::aws:policy/ReadOnlyAccess",
76
+ "RoleName": "ReadOnlyRole"
77
+ },
78
+ "comments": {
79
+ "input": {
80
+ },
81
+ "output": {
82
+ }
83
+ },
84
+ "description": "The following command attaches the AWS managed policy named ReadOnlyAccess to the IAM role named ReadOnlyRole.",
85
+ "id": "3e1b8c7c-99c8-4fc4-a20c-131fe3f22c7e",
86
+ "title": "To attach a managed policy to an IAM role"
87
+ }
88
+ ],
89
+ "AttachUserPolicy": [
90
+ {
91
+ "input": {
92
+ "PolicyArn": "arn:aws:iam::aws:policy/AdministratorAccess",
93
+ "UserName": "Alice"
94
+ },
95
+ "comments": {
96
+ "input": {
97
+ },
98
+ "output": {
99
+ }
100
+ },
101
+ "description": "The following command attaches the AWS managed policy named AdministratorAccess to the IAM user named Alice.",
102
+ "id": "1372ebd8-9475-4b1a-a479-23b6fd4b8b3e",
103
+ "title": "To attach a managed policy to an IAM user"
104
+ }
105
+ ],
106
+ "ChangePassword": [
107
+ {
108
+ "input": {
109
+ "NewPassword": "]35d/{pB9Fo9wJ",
110
+ "OldPassword": "3s0K_;xh4~8XXI"
111
+ },
112
+ "comments": {
113
+ "input": {
114
+ },
115
+ "output": {
116
+ }
117
+ },
118
+ "description": "The following command changes the password for the current IAM user.",
119
+ "id": "3a80c66f-bffb-46df-947c-1e8fa583b470",
120
+ "title": "To change the password for your IAM user"
121
+ }
122
+ ],
123
+ "CreateAccessKey": [
124
+ {
125
+ "input": {
126
+ "UserName": "Bob"
127
+ },
128
+ "output": {
129
+ "AccessKey": {
130
+ "AccessKeyId": "AKIAIOSFODNN7EXAMPLE",
131
+ "CreateDate": "2015-03-09T18:39:23.411Z",
132
+ "SecretAccessKey": "wJalrXUtnFEMI/K7MDENG/bPxRfiCYzEXAMPLEKEY",
133
+ "Status": "Active",
134
+ "UserName": "Bob"
135
+ }
136
+ },
137
+ "comments": {
138
+ "input": {
139
+ },
140
+ "output": {
141
+ }
142
+ },
143
+ "description": "The following command creates an access key (access key ID and secret access key) for the IAM user named Bob.",
144
+ "id": "1fbb3211-4cf2-41db-8c20-ba58d9f5802d",
145
+ "title": "To create an access key for an IAM user"
146
+ }
147
+ ],
148
+ "CreateAccountAlias": [
149
+ {
150
+ "input": {
151
+ "AccountAlias": "examplecorp"
152
+ },
153
+ "comments": {
154
+ "input": {
155
+ },
156
+ "output": {
157
+ }
158
+ },
159
+ "description": "The following command associates the alias examplecorp to your AWS account.",
160
+ "id": "5adaf6fb-94fc-4ca2-b825-2fbc2062add1",
161
+ "title": "To create an account alias"
162
+ }
163
+ ],
164
+ "CreateGroup": [
165
+ {
166
+ "input": {
167
+ "GroupName": "Admins"
168
+ },
169
+ "output": {
170
+ "Group": {
171
+ "Arn": "arn:aws:iam::123456789012:group/Admins",
172
+ "CreateDate": "2015-03-09T20:30:24.940Z",
173
+ "GroupId": "AIDGPMS9RO4H3FEXAMPLE",
174
+ "GroupName": "Admins",
175
+ "Path": "/"
176
+ }
177
+ },
178
+ "comments": {
179
+ "input": {
180
+ },
181
+ "output": {
182
+ }
183
+ },
184
+ "description": "The following command creates an IAM group named Admins.",
185
+ "id": "d5da2a90-5e69-4ef7-8ae8-4c33dc21fd21",
186
+ "title": "To create an IAM group"
187
+ }
188
+ ],
189
+ "CreateInstanceProfile": [
190
+ {
191
+ "input": {
192
+ "InstanceProfileName": "Webserver"
193
+ },
194
+ "output": {
195
+ "InstanceProfile": {
196
+ "Arn": "arn:aws:iam::123456789012:instance-profile/Webserver",
197
+ "CreateDate": "2015-03-09T20:33:19.626Z",
198
+ "InstanceProfileId": "AIPAJMBYC7DLSPEXAMPLE",
199
+ "InstanceProfileName": "Webserver",
200
+ "Path": "/",
201
+ "Roles": [
202
+
203
+ ]
204
+ }
205
+ },
206
+ "comments": {
207
+ "input": {
208
+ },
209
+ "output": {
210
+ }
211
+ },
212
+ "description": "The following command creates an instance profile named Webserver that is ready to have a role attached and then be associated with an EC2 instance.",
213
+ "id": "5d84e6ae-5921-4e39-8454-10232cd9ff9a",
214
+ "title": "To create an instance profile"
215
+ }
216
+ ],
217
+ "CreateLoginProfile": [
218
+ {
219
+ "input": {
220
+ "Password": "h]6EszR}vJ*m",
221
+ "PasswordResetRequired": true,
222
+ "UserName": "Bob"
223
+ },
224
+ "output": {
225
+ "LoginProfile": {
226
+ "CreateDate": "2015-03-10T20:55:40.274Z",
227
+ "PasswordResetRequired": true,
228
+ "UserName": "Bob"
229
+ }
230
+ },
231
+ "comments": {
232
+ "input": {
233
+ },
234
+ "output": {
235
+ }
236
+ },
237
+ "description": "The following command changes IAM user Bob's password and sets the flag that required Bob to change the password the next time he signs in.",
238
+ "id": "c63795bc-3444-40b3-89df-83c474ef88be",
239
+ "title": "To create an instance profile"
240
+ }
241
+ ],
242
+ "CreateOpenIDConnectProvider": [
243
+ {
244
+ "input": {
245
+ "ClientIDList": [
246
+ "my-application-id"
247
+ ],
248
+ "ThumbprintList": [
249
+ "3768084dfb3d2b68b7897bf5f565da8efEXAMPLE"
250
+ ],
251
+ "Url": "https://server.example.com"
252
+ },
253
+ "output": {
254
+ "OpenIDConnectProviderArn": "arn:aws:iam::123456789012:oidc-provider/server.example.com"
255
+ },
256
+ "comments": {
257
+ "input": {
258
+ },
259
+ "output": {
260
+ }
261
+ },
262
+ "description": "The following example defines a new OIDC provider in IAM with a client ID of my-application-id and pointing at the server with a URL of https://server.example.com.",
263
+ "id": "4e4a6bff-cc97-4406-922e-0ab4a82cdb63",
264
+ "title": "To create an instance profile"
265
+ }
266
+ ],
267
+ "CreateRole": [
268
+ {
269
+ "input": {
270
+ "AssumeRolePolicyDocument": "<URL-encoded-JSON>",
271
+ "Path": "/",
272
+ "RoleName": "Test-Role"
273
+ },
274
+ "output": {
275
+ "Role": {
276
+ "Arn": "arn:aws:iam::123456789012:role/Test-Role",
277
+ "AssumeRolePolicyDocument": "<URL-encoded-JSON>",
278
+ "CreateDate": "2013-06-07T20:43:32.821Z",
279
+ "Path": "/",
280
+ "RoleId": "AKIAIOSFODNN7EXAMPLE",
281
+ "RoleName": "Test-Role"
282
+ }
283
+ },
284
+ "comments": {
285
+ "input": {
286
+ },
287
+ "output": {
288
+ }
289
+ },
290
+ "description": "The following command creates a role named Test-Role and attaches a trust policy to it that is provided as a URL-encoded JSON string.",
291
+ "id": "eaaa4b5f-51f1-4f73-b0d3-30127040eff8",
292
+ "title": "To create an IAM role"
293
+ }
294
+ ],
295
+ "CreateUser": [
296
+ {
297
+ "input": {
298
+ "UserName": "Bob"
299
+ },
300
+ "output": {
301
+ "User": {
302
+ "Arn": "arn:aws:iam::123456789012:user/Bob",
303
+ "CreateDate": "2013-06-08T03:20:41.270Z",
304
+ "Path": "/",
305
+ "UserId": "AKIAIOSFODNN7EXAMPLE",
306
+ "UserName": "Bob"
307
+ }
308
+ },
309
+ "comments": {
310
+ "input": {
311
+ },
312
+ "output": {
313
+ }
314
+ },
315
+ "description": "The following create-user command creates an IAM user named Bob in the current account.",
316
+ "id": "eb15f90b-e5f5-4af8-a594-e4e82b181a62",
317
+ "title": "To create an IAM user"
318
+ }
319
+ ],
320
+ "DeleteAccessKey": [
321
+ {
322
+ "input": {
323
+ "AccessKeyId": "AKIDPMS9RO4H3FEXAMPLE",
324
+ "UserName": "Bob"
325
+ },
326
+ "comments": {
327
+ "input": {
328
+ },
329
+ "output": {
330
+ }
331
+ },
332
+ "description": "The following command deletes one access key (access key ID and secret access key) assigned to the IAM user named Bob.",
333
+ "id": "61a785a7-d30a-415a-ae18-ab9236e56871",
334
+ "title": "To delete an access key for an IAM user"
335
+ }
336
+ ],
337
+ "DeleteAccountAlias": [
338
+ {
339
+ "input": {
340
+ "AccountAlias": "mycompany"
341
+ },
342
+ "comments": {
343
+ "input": {
344
+ },
345
+ "output": {
346
+ }
347
+ },
348
+ "description": "The following command removes the alias mycompany from the current AWS account:",
349
+ "id": "7abeca65-04a8-4500-a890-47f1092bf766",
350
+ "title": "To delete an account alias"
351
+ }
352
+ ],
353
+ "DeleteAccountPasswordPolicy": [
354
+ {
355
+ "comments": {
356
+ "input": {
357
+ },
358
+ "output": {
359
+ }
360
+ },
361
+ "description": "The following command removes the password policy from the current AWS account:",
362
+ "id": "9ddf755e-495c-49bc-ae3b-ea6cc9b8ebcf",
363
+ "title": "To delete the current account password policy"
364
+ }
365
+ ],
366
+ "DeleteGroupPolicy": [
367
+ {
368
+ "input": {
369
+ "GroupName": "Admins",
370
+ "PolicyName": "ExamplePolicy"
371
+ },
372
+ "comments": {
373
+ "input": {
374
+ },
375
+ "output": {
376
+ }
377
+ },
378
+ "description": "The following command deletes the policy named ExamplePolicy from the group named Admins:",
379
+ "id": "e683f2bd-98a4-4fe0-bb66-33169c692d4a",
380
+ "title": "To delete a policy from an IAM group"
381
+ }
382
+ ],
383
+ "DeleteInstanceProfile": [
384
+ {
385
+ "input": {
386
+ "InstanceProfileName": "ExampleInstanceProfile"
387
+ },
388
+ "comments": {
389
+ "input": {
390
+ },
391
+ "output": {
392
+ }
393
+ },
394
+ "description": "The following command deletes the instance profile named ExampleInstanceProfile",
395
+ "id": "12d74fb8-3433-49db-8171-a1fc764e354d",
396
+ "title": "To delete an instance profile"
397
+ }
398
+ ],
399
+ "DeleteLoginProfile": [
400
+ {
401
+ "input": {
402
+ "UserName": "Bob"
403
+ },
404
+ "comments": {
405
+ "input": {
406
+ },
407
+ "output": {
408
+ }
409
+ },
410
+ "description": "The following command deletes the password for the IAM user named Bob.",
411
+ "id": "1fe57059-fc73-42e2-b992-517b7d573b5c",
412
+ "title": "To delete a password for an IAM user"
413
+ }
414
+ ],
415
+ "DeleteRole": [
416
+ {
417
+ "input": {
418
+ "RoleName": "Test-Role"
419
+ },
420
+ "comments": {
421
+ "input": {
422
+ },
423
+ "output": {
424
+ }
425
+ },
426
+ "description": "The following command removes the role named Test-Role.",
427
+ "id": "053cdf74-9bda-44b8-bdbb-140fd5a32603",
428
+ "title": "To delete an IAM role"
429
+ }
430
+ ],
431
+ "DeleteRolePolicy": [
432
+ {
433
+ "input": {
434
+ "PolicyName": "ExamplePolicy",
435
+ "RoleName": "Test-Role"
436
+ },
437
+ "comments": {
438
+ "input": {
439
+ },
440
+ "output": {
441
+ }
442
+ },
443
+ "description": "The following command removes the policy named ExamplePolicy from the role named Test-Role.",
444
+ "id": "9c667336-fde3-462c-b8f3-950800821e27",
445
+ "title": "To remove a policy from an IAM role"
446
+ }
447
+ ],
448
+ "DeleteSigningCertificate": [
449
+ {
450
+ "input": {
451
+ "CertificateId": "TA7SMP42TDN5Z26OBPJE7EXAMPLE",
452
+ "UserName": "Anika"
453
+ },
454
+ "comments": {
455
+ "input": {
456
+ },
457
+ "output": {
458
+ }
459
+ },
460
+ "description": "The following command deletes the specified signing certificate for the IAM user named Anika.",
461
+ "id": "e3357586-ba9c-4070-b35b-d1a899b71987",
462
+ "title": "To delete a signing certificate for an IAM user"
463
+ }
464
+ ],
465
+ "DeleteUser": [
466
+ {
467
+ "input": {
468
+ "UserName": "Bob"
469
+ },
470
+ "comments": {
471
+ "input": {
472
+ },
473
+ "output": {
474
+ }
475
+ },
476
+ "description": "The following command removes the IAM user named Bob from the current account.",
477
+ "id": "a13dc3f9-59fe-42d9-abbb-fb98b204fdf0",
478
+ "title": "To delete an IAM user"
479
+ }
480
+ ],
481
+ "DeleteUserPolicy": [
482
+ {
483
+ "input": {
484
+ "PolicyName": "ExamplePolicy",
485
+ "UserName": "Juan"
486
+ },
487
+ "comments": {
488
+ "input": {
489
+ },
490
+ "output": {
491
+ }
492
+ },
493
+ "description": "The following delete-user-policy command removes the specified policy from the IAM user named Juan:",
494
+ "id": "34f07ddc-9bc1-4f52-bc59-cd0a3ccd06c8",
495
+ "title": "To remove a policy from an IAM user"
496
+ }
497
+ ],
498
+ "DeleteVirtualMFADevice": [
499
+ {
500
+ "input": {
501
+ "SerialNumber": "arn:aws:iam::123456789012:mfa/ExampleName"
502
+ },
503
+ "comments": {
504
+ "input": {
505
+ },
506
+ "output": {
507
+ }
508
+ },
509
+ "description": "The following delete-virtual-mfa-device command removes the specified MFA device from the current AWS account.",
510
+ "id": "2933b08b-dbe7-4b89-b8c1-fdf75feea1ee",
511
+ "title": "To remove a virtual MFA device"
512
+ }
513
+ ],
514
+ "GetAccountPasswordPolicy": [
515
+ {
516
+ "output": {
517
+ "PasswordPolicy": {
518
+ "AllowUsersToChangePassword": false,
519
+ "ExpirePasswords": false,
520
+ "HardExpiry": false,
521
+ "MaxPasswordAge": 90,
522
+ "MinimumPasswordLength": 8,
523
+ "PasswordReusePrevention": 12,
524
+ "RequireLowercaseCharacters": false,
525
+ "RequireNumbers": true,
526
+ "RequireSymbols": true,
527
+ "RequireUppercaseCharacters": false
528
+ }
529
+ },
530
+ "comments": {
531
+ "input": {
532
+ },
533
+ "output": {
534
+ }
535
+ },
536
+ "description": "The following command displays details about the password policy for the current AWS account.",
537
+ "id": "5e4598c7-c425-431f-8af1-19073b3c4a5f",
538
+ "title": "To see the current account password policy"
539
+ }
540
+ ],
541
+ "GetAccountSummary": [
542
+ {
543
+ "output": {
544
+ "SummaryMap": {
545
+ "AccessKeysPerUserQuota": 2,
546
+ "AccountAccessKeysPresent": 1,
547
+ "AccountMFAEnabled": 0,
548
+ "AccountSigningCertificatesPresent": 0,
549
+ "AttachedPoliciesPerGroupQuota": 10,
550
+ "AttachedPoliciesPerRoleQuota": 10,
551
+ "AttachedPoliciesPerUserQuota": 10,
552
+ "GroupPolicySizeQuota": 5120,
553
+ "Groups": 15,
554
+ "GroupsPerUserQuota": 10,
555
+ "GroupsQuota": 100,
556
+ "MFADevices": 6,
557
+ "MFADevicesInUse": 3,
558
+ "Policies": 8,
559
+ "PoliciesQuota": 1000,
560
+ "PolicySizeQuota": 5120,
561
+ "PolicyVersionsInUse": 22,
562
+ "PolicyVersionsInUseQuota": 10000,
563
+ "ServerCertificates": 1,
564
+ "ServerCertificatesQuota": 20,
565
+ "SigningCertificatesPerUserQuota": 2,
566
+ "UserPolicySizeQuota": 2048,
567
+ "Users": 27,
568
+ "UsersQuota": 5000,
569
+ "VersionsPerPolicyQuota": 5
570
+ }
571
+ },
572
+ "comments": {
573
+ "input": {
574
+ },
575
+ "output": {
576
+ }
577
+ },
578
+ "description": "The following command returns information about the IAM entity quotas and usage in the current AWS account.",
579
+ "id": "9d8447af-f344-45de-8219-2cebc3cce7f2",
580
+ "title": "To get information about IAM entity quotas and usage in the current account"
581
+ }
582
+ ],
583
+ "GetInstanceProfile": [
584
+ {
585
+ "input": {
586
+ "InstanceProfileName": "ExampleInstanceProfile"
587
+ },
588
+ "output": {
589
+ "InstanceProfile": {
590
+ "Arn": "arn:aws:iam::336924118301:instance-profile/ExampleInstanceProfile",
591
+ "CreateDate": "2013-06-12T23:52:02Z",
592
+ "InstanceProfileId": "AID2MAB8DPLSRHEXAMPLE",
593
+ "InstanceProfileName": "ExampleInstanceProfile",
594
+ "Path": "/",
595
+ "Roles": [
596
+ {
597
+ "Arn": "arn:aws:iam::336924118301:role/Test-Role",
598
+ "AssumeRolePolicyDocument": "<URL-encoded-JSON>",
599
+ "CreateDate": "2013-01-09T06:33:26Z",
600
+ "Path": "/",
601
+ "RoleId": "AIDGPMS9RO4H3FEXAMPLE",
602
+ "RoleName": "Test-Role"
603
+ }
604
+ ]
605
+ }
606
+ },
607
+ "comments": {
608
+ "input": {
609
+ },
610
+ "output": {
611
+ }
612
+ },
613
+ "description": "The following command gets information about the instance profile named ExampleInstanceProfile.",
614
+ "id": "463b9ba5-18cc-4608-9ccb-5a7c6b6e5fe7",
615
+ "title": "To get information about an instance profile"
616
+ }
617
+ ],
618
+ "GetLoginProfile": [
619
+ {
620
+ "input": {
621
+ "UserName": "Anika"
622
+ },
623
+ "output": {
624
+ "LoginProfile": {
625
+ "CreateDate": "2012-09-21T23:03:39Z",
626
+ "UserName": "Anika"
627
+ }
628
+ },
629
+ "comments": {
630
+ "input": {
631
+ },
632
+ "output": {
633
+ }
634
+ },
635
+ "description": "The following command gets information about the password for the IAM user named Anika.",
636
+ "id": "d6b580cc-909f-4925-9caa-d425cbc1ad47",
637
+ "title": "To get password information for an IAM user"
638
+ }
639
+ ],
640
+ "GetRole": [
641
+ {
642
+ "input": {
643
+ "RoleName": "Test-Role"
644
+ },
645
+ "output": {
646
+ "Role": {
647
+ "Arn": "arn:aws:iam::123456789012:role/Test-Role",
648
+ "AssumeRolePolicyDocument": "<URL-encoded-JSON>",
649
+ "CreateDate": "2013-04-18T05:01:58Z",
650
+ "Path": "/",
651
+ "RoleId": "AIDIODR4TAW7CSEXAMPLE",
652
+ "RoleName": "Test-Role"
653
+ }
654
+ },
655
+ "comments": {
656
+ "input": {
657
+ },
658
+ "output": {
659
+ }
660
+ },
661
+ "description": "The following command gets information about the role named Test-Role.",
662
+ "id": "5b7d03a6-340c-472d-aa77-56425950d8b0",
663
+ "title": "To get information about an IAM role"
664
+ }
665
+ ],
666
+ "GetUser": [
667
+ {
668
+ "input": {
669
+ "UserName": "Bob"
670
+ },
671
+ "output": {
672
+ "User": {
673
+ "Arn": "arn:aws:iam::123456789012:user/Bob",
674
+ "CreateDate": "2012-09-21T23:03:13Z",
675
+ "Path": "/",
676
+ "UserId": "AKIAIOSFODNN7EXAMPLE",
677
+ "UserName": "Bob"
678
+ }
679
+ },
680
+ "comments": {
681
+ "input": {
682
+ },
683
+ "output": {
684
+ }
685
+ },
686
+ "description": "The following command gets information about the IAM user named Bob.",
687
+ "id": "ede000a1-9e4c-40db-bd0a-d4f95e41a6ab",
688
+ "title": "To get information about an IAM user"
689
+ }
690
+ ],
691
+ "ListAccessKeys": [
692
+ {
693
+ "input": {
694
+ "UserName": "Alice"
695
+ },
696
+ "output": {
697
+ "AccessKeyMetadata": [
698
+ {
699
+ "AccessKeyId": "AKIA111111111EXAMPLE",
700
+ "CreateDate": "2016-12-01T22:19:58Z",
701
+ "Status": "Active",
702
+ "UserName": "Alice"
703
+ },
704
+ {
705
+ "AccessKeyId": "AKIA222222222EXAMPLE",
706
+ "CreateDate": "2016-12-01T22:20:01Z",
707
+ "Status": "Active",
708
+ "UserName": "Alice"
709
+ }
710
+ ]
711
+ },
712
+ "comments": {
713
+ "input": {
714
+ },
715
+ "output": {
716
+ }
717
+ },
718
+ "description": "The following command lists the access keys IDs for the IAM user named Alice.",
719
+ "id": "15571463-ebea-411a-a021-1c76bd2a3625",
720
+ "title": "To list the access key IDs for an IAM user"
721
+ }
722
+ ],
723
+ "ListAccountAliases": [
724
+ {
725
+ "input": {
726
+ },
727
+ "output": {
728
+ "AccountAliases": [
729
+ "exmaple-corporation"
730
+ ]
731
+ },
732
+ "comments": {
733
+ "input": {
734
+ },
735
+ "output": {
736
+ }
737
+ },
738
+ "description": "The following command lists the aliases for the current account.",
739
+ "id": "e27b457a-16f9-4e05-a006-3df7b3472741",
740
+ "title": "To list account aliases"
741
+ }
742
+ ],
743
+ "ListGroupPolicies": [
744
+ {
745
+ "input": {
746
+ "GroupName": "Admins"
747
+ },
748
+ "output": {
749
+ "PolicyNames": [
750
+ "AdminRoot",
751
+ "KeyPolicy"
752
+ ]
753
+ },
754
+ "comments": {
755
+ "input": {
756
+ },
757
+ "output": {
758
+ }
759
+ },
760
+ "description": "The following command lists the names of in-line policies that are embedded in the IAM group named Admins.",
761
+ "id": "02de5095-2410-4d3a-ac1b-cc40234af68f",
762
+ "title": "To list the in-line policies for an IAM group"
763
+ }
764
+ ],
765
+ "ListGroups": [
766
+ {
767
+ "input": {
768
+ },
769
+ "output": {
770
+ "Groups": [
771
+ {
772
+ "Arn": "arn:aws:iam::123456789012:group/Admins",
773
+ "CreateDate": "2016-12-15T21:40:08.121Z",
774
+ "GroupId": "AGPA1111111111EXAMPLE",
775
+ "GroupName": "Admins",
776
+ "Path": "/division_abc/subdivision_xyz/"
777
+ },
778
+ {
779
+ "Arn": "arn:aws:iam::123456789012:group/division_abc/subdivision_xyz/product_1234/engineering/Test",
780
+ "CreateDate": "2016-11-30T14:10:01.156Z",
781
+ "GroupId": "AGP22222222222EXAMPLE",
782
+ "GroupName": "Test",
783
+ "Path": "/division_abc/subdivision_xyz/product_1234/engineering/"
784
+ },
785
+ {
786
+ "Arn": "arn:aws:iam::123456789012:group/division_abc/subdivision_xyz/product_1234/Managers",
787
+ "CreateDate": "2016-06-12T20:14:52.032Z",
788
+ "GroupId": "AGPI3333333333EXAMPLE",
789
+ "GroupName": "Managers",
790
+ "Path": "/division_abc/subdivision_xyz/product_1234/"
791
+ }
792
+ ]
793
+ },
794
+ "comments": {
795
+ "input": {
796
+ },
797
+ "output": {
798
+ }
799
+ },
800
+ "description": "The following command lists the IAM groups in the current account:",
801
+ "id": "b3ab1380-2a21-42fb-8e85-503f65512c66",
802
+ "title": "To list the IAM groups for the current account"
803
+ }
804
+ ],
805
+ "ListGroupsForUser": [
806
+ {
807
+ "input": {
808
+ "UserName": "Bob"
809
+ },
810
+ "output": {
811
+ "Groups": [
812
+ {
813
+ "Arn": "arn:aws:iam::123456789012:group/division_abc/subdivision_xyz/product_1234/engineering/Test",
814
+ "CreateDate": "2016-11-30T14:10:01.156Z",
815
+ "GroupId": "AGP2111111111EXAMPLE",
816
+ "GroupName": "Test",
817
+ "Path": "/division_abc/subdivision_xyz/product_1234/engineering/"
818
+ },
819
+ {
820
+ "Arn": "arn:aws:iam::123456789012:group/division_abc/subdivision_xyz/product_1234/Managers",
821
+ "CreateDate": "2016-06-12T20:14:52.032Z",
822
+ "GroupId": "AGPI222222222SEXAMPLE",
823
+ "GroupName": "Managers",
824
+ "Path": "/division_abc/subdivision_xyz/product_1234/"
825
+ }
826
+ ]
827
+ },
828
+ "comments": {
829
+ "input": {
830
+ },
831
+ "output": {
832
+ }
833
+ },
834
+ "description": "The following command displays the groups that the IAM user named Bob belongs to.",
835
+ "id": "278ec2ee-fc28-4136-83fb-433af0ae46a2",
836
+ "title": "To list the groups that an IAM user belongs to"
837
+ }
838
+ ],
839
+ "ListSigningCertificates": [
840
+ {
841
+ "input": {
842
+ "UserName": "Bob"
843
+ },
844
+ "output": {
845
+ "Certificates": [
846
+ {
847
+ "CertificateBody": "-----BEGIN CERTIFICATE-----<certificate-body>-----END CERTIFICATE-----",
848
+ "CertificateId": "TA7SMP42TDN5Z26OBPJE7EXAMPLE",
849
+ "Status": "Active",
850
+ "UploadDate": "2013-06-06T21:40:08Z",
851
+ "UserName": "Bob"
852
+ }
853
+ ]
854
+ },
855
+ "comments": {
856
+ "input": {
857
+ },
858
+ "output": {
859
+ }
860
+ },
861
+ "description": "The following command lists the signing certificates for the IAM user named Bob.",
862
+ "id": "b4c10256-4fc9-457e-b3fd-4a110d4d73dc",
863
+ "title": "To list the signing certificates for an IAM user"
864
+ }
865
+ ],
866
+ "ListUsers": [
867
+ {
868
+ "input": {
869
+ },
870
+ "output": {
871
+ "Users": [
872
+ {
873
+ "Arn": "arn:aws:iam::123456789012:user/division_abc/subdivision_xyz/engineering/Juan",
874
+ "CreateDate": "2012-09-05T19:38:48Z",
875
+ "PasswordLastUsed": "2016-09-08T21:47:36Z",
876
+ "Path": "/division_abc/subdivision_xyz/engineering/",
877
+ "UserId": "AID2MAB8DPLSRHEXAMPLE",
878
+ "UserName": "Juan"
879
+ },
880
+ {
881
+ "Arn": "arn:aws:iam::123456789012:user/division_abc/subdivision_xyz/engineering/Anika",
882
+ "CreateDate": "2014-04-09T15:43:45Z",
883
+ "PasswordLastUsed": "2016-09-24T16:18:07Z",
884
+ "Path": "/division_abc/subdivision_xyz/engineering/",
885
+ "UserId": "AIDIODR4TAW7CSEXAMPLE",
886
+ "UserName": "Anika"
887
+ }
888
+ ]
889
+ },
890
+ "comments": {
891
+ "input": {
892
+ },
893
+ "output": {
894
+ }
895
+ },
896
+ "description": "The following command lists the IAM users in the current account.",
897
+ "id": "9edfbd73-03d8-4d8a-9a79-76c85e8c8298",
898
+ "title": "To list IAM users"
899
+ }
900
+ ],
901
+ "ListVirtualMFADevices": [
902
+ {
903
+ "input": {
904
+ },
905
+ "output": {
906
+ "VirtualMFADevices": [
907
+ {
908
+ "SerialNumber": "arn:aws:iam::123456789012:mfa/ExampleMFADevice"
909
+ },
910
+ {
911
+ "SerialNumber": "arn:aws:iam::123456789012:mfa/Juan"
912
+ }
913
+ ]
914
+ },
915
+ "comments": {
916
+ "input": {
917
+ },
918
+ "output": {
919
+ }
920
+ },
921
+ "description": "The following command lists the virtual MFA devices that have been configured for the current account.",
922
+ "id": "54f9ac18-5100-4070-bec4-fe5f612710d5",
923
+ "title": "To list virtual MFA devices"
924
+ }
925
+ ],
926
+ "PutGroupPolicy": [
927
+ {
928
+ "input": {
929
+ "GroupName": "Admins",
930
+ "PolicyDocument": "{\"Version\":\"2012-10-17\",\"Statement\":{\"Effect\":\"Allow\",\"Action\":\"*\",\"Resource\":\"*\"}}",
931
+ "PolicyName": "AllPerms"
932
+ },
933
+ "comments": {
934
+ "input": {
935
+ },
936
+ "output": {
937
+ }
938
+ },
939
+ "description": "The following command adds a policy named AllPerms to the IAM group named Admins.",
940
+ "id": "4bc17418-758f-4d0f-ab0c-4d00265fec2e",
941
+ "title": "To add a policy to a group"
942
+ }
943
+ ],
944
+ "PutRolePolicy": [
945
+ {
946
+ "input": {
947
+ "PolicyDocument": "{\"Version\":\"2012-10-17\",\"Statement\":{\"Effect\":\"Allow\",\"Action\":\"s3:*\",\"Resource\":\"*\"}}",
948
+ "PolicyName": "S3AccessPolicy",
949
+ "RoleName": "S3Access"
950
+ },
951
+ "comments": {
952
+ "input": {
953
+ },
954
+ "output": {
955
+ }
956
+ },
957
+ "description": "The following command adds a permissions policy to the role named Test-Role.",
958
+ "id": "de62fd00-46c7-4601-9e0d-71d5fbb11ecb",
959
+ "title": "To attach a permissions policy to an IAM role"
960
+ }
961
+ ],
962
+ "PutUserPolicy": [
963
+ {
964
+ "input": {
965
+ "PolicyDocument": "{\"Version\":\"2012-10-17\",\"Statement\":{\"Effect\":\"Allow\",\"Action\":\"*\",\"Resource\":\"*\"}}",
966
+ "PolicyName": "AllAccessPolicy",
967
+ "UserName": "Bob"
968
+ },
969
+ "comments": {
970
+ "input": {
971
+ },
972
+ "output": {
973
+ }
974
+ },
975
+ "description": "The following command attaches a policy to the IAM user named Bob.",
976
+ "id": "2551ffc6-3576-4d39-823f-30b60bffc2c7",
977
+ "title": "To attach a policy to an IAM user"
978
+ }
979
+ ],
980
+ "RemoveRoleFromInstanceProfile": [
981
+ {
982
+ "input": {
983
+ "InstanceProfileName": "ExampleInstanceProfile",
984
+ "RoleName": "Test-Role"
985
+ },
986
+ "comments": {
987
+ "input": {
988
+ },
989
+ "output": {
990
+ }
991
+ },
992
+ "description": "The following command removes the role named Test-Role from the instance profile named ExampleInstanceProfile.",
993
+ "id": "6d9f46f1-9f4a-4873-b403-51a85c5c627c",
994
+ "title": "To remove a role from an instance profile"
995
+ }
996
+ ],
997
+ "RemoveUserFromGroup": [
998
+ {
999
+ "input": {
1000
+ "GroupName": "Admins",
1001
+ "UserName": "Bob"
1002
+ },
1003
+ "comments": {
1004
+ "input": {
1005
+ },
1006
+ "output": {
1007
+ }
1008
+ },
1009
+ "description": "The following command removes the user named Bob from the IAM group named Admins.",
1010
+ "id": "fb54d5b4-0caf-41d8-af0e-10a84413f174",
1011
+ "title": "To remove a user from an IAM group"
1012
+ }
1013
+ ],
1014
+ "UpdateAccessKey": [
1015
+ {
1016
+ "input": {
1017
+ "AccessKeyId": "AKIAIOSFODNN7EXAMPLE",
1018
+ "Status": "Inactive",
1019
+ "UserName": "Bob"
1020
+ },
1021
+ "comments": {
1022
+ "input": {
1023
+ },
1024
+ "output": {
1025
+ }
1026
+ },
1027
+ "description": "The following command deactivates the specified access key (access key ID and secret access key) for the IAM user named Bob.",
1028
+ "id": "02b556fd-e673-49b7-ab6b-f2f9035967d0",
1029
+ "title": "To activate or deactivate an access key for an IAM user"
1030
+ }
1031
+ ],
1032
+ "UpdateAccountPasswordPolicy": [
1033
+ {
1034
+ "input": {
1035
+ "MinimumPasswordLength": 8,
1036
+ "RequireNumbers": true
1037
+ },
1038
+ "comments": {
1039
+ "input": {
1040
+ },
1041
+ "output": {
1042
+ }
1043
+ },
1044
+ "description": "The following command sets the password policy to require a minimum length of eight characters and to require one or more numbers in the password:",
1045
+ "id": "c263a1af-37dc-4423-8dba-9790284ef5e0",
1046
+ "title": "To set or change the current account password policy"
1047
+ }
1048
+ ],
1049
+ "UpdateAssumeRolePolicy": [
1050
+ {
1051
+ "input": {
1052
+ "PolicyDocument": "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Effect\":\"Allow\",\"Principal\":{\"Service\":[\"ec2.amazonaws.com\"]},\"Action\":[\"sts:AssumeRole\"]}]}",
1053
+ "RoleName": "S3AccessForEC2Instances"
1054
+ },
1055
+ "comments": {
1056
+ "input": {
1057
+ },
1058
+ "output": {
1059
+ }
1060
+ },
1061
+ "description": "The following command updates the role trust policy for the role named Test-Role:",
1062
+ "id": "c9150063-d953-4e99-9576-9685872006c6",
1063
+ "title": "To update the trust policy for an IAM role"
1064
+ }
1065
+ ],
1066
+ "UpdateGroup": [
1067
+ {
1068
+ "input": {
1069
+ "GroupName": "Test",
1070
+ "NewGroupName": "Test-1"
1071
+ },
1072
+ "comments": {
1073
+ "input": {
1074
+ },
1075
+ "output": {
1076
+ }
1077
+ },
1078
+ "description": "The following command changes the name of the IAM group Test to Test-1.",
1079
+ "id": "f0cf1662-91ae-4278-a80e-7db54256ccba",
1080
+ "title": "To rename an IAM group"
1081
+ }
1082
+ ],
1083
+ "UpdateLoginProfile": [
1084
+ {
1085
+ "input": {
1086
+ "Password": "SomeKindOfPassword123!@#",
1087
+ "UserName": "Bob"
1088
+ },
1089
+ "comments": {
1090
+ "input": {
1091
+ },
1092
+ "output": {
1093
+ }
1094
+ },
1095
+ "description": "The following command creates or changes the password for the IAM user named Bob.",
1096
+ "id": "036d9498-ecdb-4ed6-a8d8-366c383d1487",
1097
+ "title": "To change the password for an IAM user"
1098
+ }
1099
+ ],
1100
+ "UpdateSigningCertificate": [
1101
+ {
1102
+ "input": {
1103
+ "CertificateId": "TA7SMP42TDN5Z26OBPJE7EXAMPLE",
1104
+ "Status": "Inactive",
1105
+ "UserName": "Bob"
1106
+ },
1107
+ "comments": {
1108
+ "input": {
1109
+ },
1110
+ "output": {
1111
+ }
1112
+ },
1113
+ "description": "The following command changes the status of a signing certificate for a user named Bob to Inactive.",
1114
+ "id": "829aee7b-efc5-4b3b-84a5-7f899b38018d",
1115
+ "title": "To change the active status of a signing certificate for an IAM user"
1116
+ }
1117
+ ],
1118
+ "UpdateUser": [
1119
+ {
1120
+ "input": {
1121
+ "NewUserName": "Robert",
1122
+ "UserName": "Bob"
1123
+ },
1124
+ "comments": {
1125
+ "input": {
1126
+ },
1127
+ "output": {
1128
+ }
1129
+ },
1130
+ "description": "The following command changes the name of the IAM user Bob to Robert. It does not change the user's path.",
1131
+ "id": "275d53ed-347a-44e6-b7d0-a96276154352",
1132
+ "title": "To change an IAM user's name"
1133
+ }
1134
+ ],
1135
+ "UploadServerCertificate": [
1136
+ {
1137
+ "input": {
1138
+ "CertificateBody": "-----BEGIN CERTIFICATE-----<a very long certificate text string>-----END CERTIFICATE-----",
1139
+ "Path": "/company/servercerts/",
1140
+ "PrivateKey": "-----BEGIN DSA PRIVATE KEY-----<a very long private key string>-----END DSA PRIVATE KEY-----",
1141
+ "ServerCertificateName": "ProdServerCert"
1142
+ },
1143
+ "output": {
1144
+ "ServerCertificateMetadata": {
1145
+ "Arn": "arn:aws:iam::123456789012:server-certificate/company/servercerts/ProdServerCert",
1146
+ "Expiration": "2012-05-08T01:02:03.004Z",
1147
+ "Path": "/company/servercerts/",
1148
+ "ServerCertificateId": "ASCA1111111111EXAMPLE",
1149
+ "ServerCertificateName": "ProdServerCert",
1150
+ "UploadDate": "2010-05-08T01:02:03.004Z"
1151
+ }
1152
+ },
1153
+ "comments": {
1154
+ "input": {
1155
+ },
1156
+ "output": {
1157
+ }
1158
+ },
1159
+ "description": "The following upload-server-certificate command uploads a server certificate to your AWS account:",
1160
+ "id": "06eab6d1-ebf2-4bd9-839d-f7508b9a38b6",
1161
+ "title": "To upload a server certificate to your AWS account"
1162
+ }
1163
+ ],
1164
+ "UploadSigningCertificate": [
1165
+ {
1166
+ "input": {
1167
+ "CertificateBody": "-----BEGIN CERTIFICATE-----<certificate-body>-----END CERTIFICATE-----",
1168
+ "UserName": "Bob"
1169
+ },
1170
+ "output": {
1171
+ "Certificate": {
1172
+ "CertificateBody": "-----BEGIN CERTIFICATE-----<certificate-body>-----END CERTIFICATE-----",
1173
+ "CertificateId": "ID123456789012345EXAMPLE",
1174
+ "Status": "Active",
1175
+ "UploadDate": "2015-06-06T21:40:08.121Z",
1176
+ "UserName": "Bob"
1177
+ }
1178
+ },
1179
+ "comments": {
1180
+ "input": {
1181
+ },
1182
+ "output": {
1183
+ }
1184
+ },
1185
+ "description": "The following command uploads a signing certificate for the IAM user named Bob.",
1186
+ "id": "e67489b6-7b73-4e30-9ed3-9a9e0231e458",
1187
+ "title": "To upload a signing certificate for an IAM user"
1188
+ }
1189
+ ]
4
1190
  }
5
1191
  }