aws-sdk-iam 1.55.0 → 1.56.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +5 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-iam.rb +1 -1
- data/lib/aws-sdk-iam/account_password_policy.rb +2 -2
- data/lib/aws-sdk-iam/assume_role_policy.rb +3 -3
- data/lib/aws-sdk-iam/client.rb +740 -671
- data/lib/aws-sdk-iam/current_user.rb +7 -6
- data/lib/aws-sdk-iam/group.rb +5 -5
- data/lib/aws-sdk-iam/group_policy.rb +5 -5
- data/lib/aws-sdk-iam/login_profile.rb +4 -4
- data/lib/aws-sdk-iam/policy.rb +11 -5
- data/lib/aws-sdk-iam/resource.rb +25 -20
- data/lib/aws-sdk-iam/role.rb +3 -3
- data/lib/aws-sdk-iam/role_policy.rb +5 -5
- data/lib/aws-sdk-iam/types.rb +563 -506
- data/lib/aws-sdk-iam/user.rb +14 -13
- data/lib/aws-sdk-iam/user_policy.rb +5 -5
- metadata +2 -2
data/lib/aws-sdk-iam/user.rb
CHANGED
@@ -85,12 +85,13 @@ module Aws::IAM
|
|
85
85
|
end
|
86
86
|
|
87
87
|
# The date and time, in [ISO 8601 date-time format][1], when the user's
|
88
|
-
# password was last used to sign in to an
|
89
|
-
# websites that capture a user's last
|
90
|
-
# reports][2] topic in the *IAM User
|
91
|
-
# than once in a five-minute span,
|
92
|
-
# this field. If the field is null (no
|
93
|
-
# they never signed in with a password.
|
88
|
+
# password was last used to sign in to an Amazon Web Services website.
|
89
|
+
# For a list of Amazon Web Services websites that capture a user's last
|
90
|
+
# sign-in time, see the [Credential reports][2] topic in the *IAM User
|
91
|
+
# Guide*. If a password is used more than once in a five-minute span,
|
92
|
+
# only the first use is returned in this field. If the field is null (no
|
93
|
+
# value), then it indicates that they never signed in with a password.
|
94
|
+
# This can be because:
|
94
95
|
#
|
95
96
|
# * The user never had a password.
|
96
97
|
#
|
@@ -334,7 +335,7 @@ module Aws::IAM
|
|
334
335
|
# The Amazon Resource Name (ARN) of the IAM policy you want to attach.
|
335
336
|
#
|
336
337
|
# For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
|
337
|
-
# in the *
|
338
|
+
# in the *Amazon Web Services General Reference*.
|
338
339
|
#
|
339
340
|
#
|
340
341
|
#
|
@@ -438,8 +439,8 @@ module Aws::IAM
|
|
438
439
|
# character range (`\u00FF`). You can also include the tab (`\u0009`),
|
439
440
|
# line feed (`\u000A`), and carriage return (`\u000D`) characters. Any
|
440
441
|
# of these characters are valid in a password. However, many tools, such
|
441
|
-
# as the
|
442
|
-
#
|
442
|
+
# as the Management Console, might restrict the ability to type certain
|
443
|
+
# characters because they have special meaning within that tool.
|
443
444
|
#
|
444
445
|
#
|
445
446
|
#
|
@@ -479,10 +480,10 @@ module Aws::IAM
|
|
479
480
|
# @option options [required, String] :policy_document
|
480
481
|
# The policy document.
|
481
482
|
#
|
482
|
-
# You must provide policies in JSON format in IAM. However, for
|
483
|
+
# You must provide policies in JSON format in IAM. However, for
|
483
484
|
# CloudFormation templates formatted in YAML, you can provide the policy
|
484
|
-
# in JSON or YAML format.
|
485
|
-
#
|
485
|
+
# in JSON or YAML format. CloudFormation always converts a YAML policy
|
486
|
+
# to JSON format before submitting it to IAM.
|
486
487
|
#
|
487
488
|
# The [regex pattern][1] used to validate this parameter is a string of
|
488
489
|
# characters consisting of the following:
|
@@ -531,7 +532,7 @@ module Aws::IAM
|
|
531
532
|
# The Amazon Resource Name (ARN) of the IAM policy you want to detach.
|
532
533
|
#
|
533
534
|
# For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
|
534
|
-
# in the *
|
535
|
+
# in the *Amazon Web Services General Reference*.
|
535
536
|
#
|
536
537
|
#
|
537
538
|
#
|
@@ -46,8 +46,8 @@ module Aws::IAM
|
|
46
46
|
# The policy document.
|
47
47
|
#
|
48
48
|
# IAM stores policies in JSON format. However, resources that were
|
49
|
-
# created using
|
50
|
-
#
|
49
|
+
# created using CloudFormation templates can be formatted in YAML.
|
50
|
+
# CloudFormation always converts a YAML policy to JSON format before
|
51
51
|
# submitting it to IAM.
|
52
52
|
# @return [String]
|
53
53
|
def policy_document
|
@@ -214,10 +214,10 @@ module Aws::IAM
|
|
214
214
|
# @option options [required, String] :policy_document
|
215
215
|
# The policy document.
|
216
216
|
#
|
217
|
-
# You must provide policies in JSON format in IAM. However, for
|
217
|
+
# You must provide policies in JSON format in IAM. However, for
|
218
218
|
# CloudFormation templates formatted in YAML, you can provide the policy
|
219
|
-
# in JSON or YAML format.
|
220
|
-
#
|
219
|
+
# in JSON or YAML format. CloudFormation always converts a YAML policy
|
220
|
+
# to JSON format before submitting it to IAM.
|
221
221
|
#
|
222
222
|
# The [regex pattern][1] used to validate this parameter is a string of
|
223
223
|
# characters consisting of the following:
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: aws-sdk-iam
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 1.
|
4
|
+
version: 1.56.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Amazon Web Services
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2021-
|
11
|
+
date: 2021-07-07 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: aws-sdk-core
|