aws-sdk-iam 1.63.0 → 1.67.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 9fa3433396c62a683d3f1027e960f1b063f5451fae8eeee3df5079098251ae3e
4
- data.tar.gz: ef7ad364a3f2cacd4d18627ddbc3e55d238a9ed2d58a7c1720a0d679582867ab
3
+ metadata.gz: 5da2823800d51a971676fb664df4b1d6a8b479fc3c536672ece25d5b164bb33a
4
+ data.tar.gz: cde6895069144bfc4e8362394ba81ed75fca17d53ec95c0b1ce49f3d59d088bb
5
5
  SHA512:
6
- metadata.gz: 4abb7e8a0978c1c4282d503e9159c95a56e8f11cf5cd20d7938f5c438e7a69dd5f02f3ed883a3687cbeeb775e1f631e061e7fce3c748a17dd1bcab36e0e77855
7
- data.tar.gz: e7644e8888056627f6f1dc4c30767c768a95144861eb8b509e96ba12ec0d1e464a9e5bbedbb4bd236ce96d7745c8b1a10305396d6ac6fab61206a4bf613eaaed
6
+ metadata.gz: 8e2f98e4778bcc9e10aab3397dd7fc1debf6fd556fb077bffabe18893df78c8dc6065c00a9c1a3e2e85f0552880308822c91a02cdd8c4599542333f0bdbb6ef7
7
+ data.tar.gz: 0f082c39147da1095b31ec506b63722fcee70fef5b40d1daed6b75bb9469733b74e0b8e0075888a7d57f537f711a50f2acfb045d2de61b61c2b6fd7251994acf
data/CHANGELOG.md CHANGED
@@ -1,6 +1,26 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.67.0 (2022-02-17)
5
+ ------------------
6
+
7
+ * Feature - Documentation updates for AWS Identity and Access Management (IAM).
8
+
9
+ 1.66.0 (2022-02-03)
10
+ ------------------
11
+
12
+ * Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
13
+
14
+ 1.65.0 (2021-12-21)
15
+ ------------------
16
+
17
+ * Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
18
+
19
+ 1.64.0 (2021-11-30)
20
+ ------------------
21
+
22
+ * Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
23
+
4
24
  1.63.0 (2021-11-04)
5
25
  ------------------
6
26
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.63.0
1
+ 1.67.0
@@ -61,6 +61,10 @@ module Aws::IAM
61
61
  end
62
62
 
63
63
  # Specifies whether IAM users are allowed to change their own password.
64
+ # Gives IAM users permissions to `iam:ChangePassword` for only their
65
+ # user and to the `iam:GetAccountPasswordPolicy` action. This option
66
+ # does not attach a permissions policy to each user, rather the
67
+ # permissions are applied at the account-level for all users by IAM.
64
68
  # @return [Boolean]
65
69
  def allow_users_to_change_password
66
70
  data[:allow_users_to_change_password]
@@ -88,7 +92,11 @@ module Aws::IAM
88
92
  end
89
93
 
90
94
  # Specifies whether IAM users are prevented from setting a new password
91
- # after their password has expired.
95
+ # via the Amazon Web Services Management Console after their password
96
+ # has expired. The IAM user cannot access the console until an
97
+ # administrator resets the password. IAM users with `iam:ChangePassword`
98
+ # permission and active access keys can reset their own expired console
99
+ # password using the CLI or API.
92
100
  # @return [Boolean]
93
101
  def hard_expiry
94
102
  data[:hard_expiry]
@@ -290,8 +298,8 @@ module Aws::IAM
290
298
  # @option options [Boolean] :allow_users_to_change_password
291
299
  # Allows all IAM users in your account to use the Amazon Web Services
292
300
  # Management Console to change their own passwords. For more
293
- # information, see [Letting IAM users change their own passwords][1] in
294
- # the *IAM User Guide*.
301
+ # information, see [Permitting IAM users to change their own
302
+ # passwords][1] in the *IAM User Guide*.
295
303
  #
296
304
  # If you do not specify a value for this parameter, then the operation
297
305
  # uses the default value of `false`. The result is that IAM users in the
@@ -300,7 +308,7 @@ module Aws::IAM
300
308
  #
301
309
  #
302
310
  #
303
- # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/HowToPwdIAMUser.html
311
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_passwords_enable-user-change.html
304
312
  # @option options [Integer] :max_password_age
305
313
  # The number of days that an IAM user password is valid.
306
314
  #
@@ -315,14 +323,26 @@ module Aws::IAM
315
323
  # uses the default value of `0`. The result is that IAM users are not
316
324
  # prevented from reusing previous passwords.
317
325
  # @option options [Boolean] :hard_expiry
318
- # Prevents IAM users from setting a new password after their password
319
- # has expired. The IAM user cannot be accessed until an administrator
320
- # resets the password.
326
+ # Prevents IAM users who are accessing the account via the Amazon Web
327
+ # Services Management Console from setting a new console password after
328
+ # their password has expired. The IAM user cannot access the console
329
+ # until an administrator resets the password.
321
330
  #
322
331
  # If you do not specify a value for this parameter, then the operation
323
332
  # uses the default value of `false`. The result is that IAM users can
324
333
  # change their passwords after they expire and continue to sign in as
325
334
  # the user.
335
+ #
336
+ # <note markdown="1"> In the Amazon Web Services Management Console, the custom password
337
+ # policy option **Allow users to change their own password** gives IAM
338
+ # users permissions to `iam:ChangePassword` for only their user and to
339
+ # the `iam:GetAccountPasswordPolicy` action. This option does not attach
340
+ # a permissions policy to each user, rather the permissions are applied
341
+ # at the account-level for all users by IAM. IAM users with
342
+ # `iam:ChangePassword` permission and active access keys can reset their
343
+ # own expired console password using the CLI or API.
344
+ #
345
+ # </note>
326
346
  # @return [EmptyStructure]
327
347
  def update(options = {})
328
348
  resp = @client.update_account_password_policy(options)
@@ -27,6 +27,8 @@ require 'aws-sdk-core/plugins/client_metrics_plugin.rb'
27
27
  require 'aws-sdk-core/plugins/client_metrics_send_plugin.rb'
28
28
  require 'aws-sdk-core/plugins/transfer_encoding.rb'
29
29
  require 'aws-sdk-core/plugins/http_checksum.rb'
30
+ require 'aws-sdk-core/plugins/defaults_mode.rb'
31
+ require 'aws-sdk-core/plugins/recursion_detection.rb'
30
32
  require 'aws-sdk-core/plugins/signature_v4.rb'
31
33
  require 'aws-sdk-core/plugins/protocols/query.rb'
32
34
 
@@ -73,6 +75,8 @@ module Aws::IAM
73
75
  add_plugin(Aws::Plugins::ClientMetricsSendPlugin)
74
76
  add_plugin(Aws::Plugins::TransferEncoding)
75
77
  add_plugin(Aws::Plugins::HttpChecksum)
78
+ add_plugin(Aws::Plugins::DefaultsMode)
79
+ add_plugin(Aws::Plugins::RecursionDetection)
76
80
  add_plugin(Aws::Plugins::SignatureV4)
77
81
  add_plugin(Aws::Plugins::Protocols::Query)
78
82
 
@@ -119,7 +123,9 @@ module Aws::IAM
119
123
  # * EC2/ECS IMDS instance profile - When used by default, the timeouts
120
124
  # are very aggressive. Construct and pass an instance of
121
125
  # `Aws::InstanceProfileCredentails` or `Aws::ECSCredentials` to
122
- # enable retries and extended timeouts.
126
+ # enable retries and extended timeouts. Instance profile credential
127
+ # fetching can be disabled by setting ENV['AWS_EC2_METADATA_DISABLED']
128
+ # to true.
123
129
  #
124
130
  # @option options [required, String] :region
125
131
  # The AWS region to connect to. The configured `:region` is
@@ -173,6 +179,10 @@ module Aws::IAM
173
179
  # Used only in `standard` and adaptive retry modes. Specifies whether to apply
174
180
  # a clock skew correction and retry requests with skewed client clocks.
175
181
  #
182
+ # @option options [String] :defaults_mode ("legacy")
183
+ # See {Aws::DefaultsModeConfiguration} for a list of the
184
+ # accepted modes and the configuration defaults that are included.
185
+ #
176
186
  # @option options [Boolean] :disable_host_prefix_injection (false)
177
187
  # Set to true to disable SDK automatically adding host prefix
178
188
  # to default service endpoint when available.
@@ -295,7 +305,7 @@ module Aws::IAM
295
305
  # seconds to wait when opening a HTTP session before raising a
296
306
  # `Timeout::Error`.
297
307
  #
298
- # @option options [Integer] :http_read_timeout (60) The default
308
+ # @option options [Float] :http_read_timeout (60) The default
299
309
  # number of seconds to wait for response data. This value can
300
310
  # safely be set per-request on the session.
301
311
  #
@@ -311,6 +321,9 @@ module Aws::IAM
311
321
  # disables this behaviour. This value can safely be set per
312
322
  # request on the session.
313
323
  #
324
+ # @option options [Float] :ssl_timeout (nil) Sets the SSL timeout
325
+ # in seconds.
326
+ #
314
327
  # @option options [Boolean] :http_wire_trace (false) When `true`,
315
328
  # HTTP debug output will be sent to the `:logger`.
316
329
  #
@@ -3978,9 +3991,9 @@ module Aws::IAM
3978
3991
  # Generates a report that includes details about when an IAM resource
3979
3992
  # (user, group, role, or policy) was last used in an attempt to access
3980
3993
  # Amazon Web Services services. Recent activity usually appears within
3981
- # four hours. IAM reports activity for the last 365 days, or less if
3982
- # your Region began supporting this feature within the last year. For
3983
- # more information, see [Regions where data is tracked][1].
3994
+ # four hours. IAM reports activity for at least the last 400 days, or
3995
+ # less if your Region began supporting this feature within the last
3996
+ # year. For more information, see [Regions where data is tracked][1].
3984
3997
  #
3985
3998
  # The service last accessed data includes all attempts to access an
3986
3999
  # Amazon Web Services API, not just the successful ones. This includes
@@ -9094,8 +9107,8 @@ module Aws::IAM
9094
9107
  # <note markdown="1"> IAM resource-listing operations return a subset of the available
9095
9108
  # attributes for the resource. For example, this operation does not
9096
9109
  # return tags, even though they are an attribute of the returned object.
9097
- # To view all of the information for a virtual MFA device, see
9098
- # ListVirtualMFADevices.
9110
+ # To view tag information for a virtual MFA device, see
9111
+ # ListMFADeviceTags.
9099
9112
  #
9100
9113
  # </note>
9101
9114
  #
@@ -11831,15 +11844,13 @@ module Aws::IAM
11831
11844
  # Updates the password policy settings for the Amazon Web Services
11832
11845
  # account.
11833
11846
  #
11834
- # <note markdown="1"> * This operation does not support partial updates. No parameters are
11835
- # required, but if you do not specify a parameter, that parameter's
11836
- # value reverts to its default value. See the **Request Parameters**
11837
- # section for each parameter's default value. Also note that some
11838
- # parameters do not allow the default parameter to be explicitly set.
11839
- # Instead, to invoke the default value, do not include that parameter
11840
- # when you invoke the operation.
11841
- #
11842
- # ^
11847
+ # <note markdown="1"> This operation does not support partial updates. No parameters are
11848
+ # required, but if you do not specify a parameter, that parameter's
11849
+ # value reverts to its default value. See the **Request Parameters**
11850
+ # section for each parameter's default value. Also note that some
11851
+ # parameters do not allow the default parameter to be explicitly set.
11852
+ # Instead, to invoke the default value, do not include that parameter
11853
+ # when you invoke the operation.
11843
11854
  #
11844
11855
  # </note>
11845
11856
  #
@@ -11893,8 +11904,8 @@ module Aws::IAM
11893
11904
  # @option params [Boolean] :allow_users_to_change_password
11894
11905
  # Allows all IAM users in your account to use the Amazon Web Services
11895
11906
  # Management Console to change their own passwords. For more
11896
- # information, see [Letting IAM users change their own passwords][1] in
11897
- # the *IAM User Guide*.
11907
+ # information, see [Permitting IAM users to change their own
11908
+ # passwords][1] in the *IAM User Guide*.
11898
11909
  #
11899
11910
  # If you do not specify a value for this parameter, then the operation
11900
11911
  # uses the default value of `false`. The result is that IAM users in the
@@ -11903,7 +11914,7 @@ module Aws::IAM
11903
11914
  #
11904
11915
  #
11905
11916
  #
11906
- # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/HowToPwdIAMUser.html
11917
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_passwords_enable-user-change.html
11907
11918
  #
11908
11919
  # @option params [Integer] :max_password_age
11909
11920
  # The number of days that an IAM user password is valid.
@@ -11921,15 +11932,27 @@ module Aws::IAM
11921
11932
  # prevented from reusing previous passwords.
11922
11933
  #
11923
11934
  # @option params [Boolean] :hard_expiry
11924
- # Prevents IAM users from setting a new password after their password
11925
- # has expired. The IAM user cannot be accessed until an administrator
11926
- # resets the password.
11935
+ # Prevents IAM users who are accessing the account via the Amazon Web
11936
+ # Services Management Console from setting a new console password after
11937
+ # their password has expired. The IAM user cannot access the console
11938
+ # until an administrator resets the password.
11927
11939
  #
11928
11940
  # If you do not specify a value for this parameter, then the operation
11929
11941
  # uses the default value of `false`. The result is that IAM users can
11930
11942
  # change their passwords after they expire and continue to sign in as
11931
11943
  # the user.
11932
11944
  #
11945
+ # <note markdown="1"> In the Amazon Web Services Management Console, the custom password
11946
+ # policy option **Allow users to change their own password** gives IAM
11947
+ # users permissions to `iam:ChangePassword` for only their user and to
11948
+ # the `iam:GetAccountPasswordPolicy` action. This option does not attach
11949
+ # a permissions policy to each user, rather the permissions are applied
11950
+ # at the account-level for all users by IAM. IAM users with
11951
+ # `iam:ChangePassword` permission and active access keys can reset their
11952
+ # own expired console password using the CLI or API.
11953
+ #
11954
+ # </note>
11955
+ #
11933
11956
  # @return [Struct] Returns an empty {Seahorse::Client::Response response}.
11934
11957
  #
11935
11958
  #
@@ -13200,7 +13223,7 @@ module Aws::IAM
13200
13223
  params: params,
13201
13224
  config: config)
13202
13225
  context[:gem_name] = 'aws-sdk-iam'
13203
- context[:gem_version] = '1.63.0'
13226
+ context[:gem_version] = '1.67.0'
13204
13227
  Seahorse::Client::Request.new(handlers, context)
13205
13228
  end
13206
13229
 
@@ -142,8 +142,8 @@ module Aws::IAM
142
142
  # @option options [Boolean] :allow_users_to_change_password
143
143
  # Allows all IAM users in your account to use the Amazon Web Services
144
144
  # Management Console to change their own passwords. For more
145
- # information, see [Letting IAM users change their own passwords][1] in
146
- # the *IAM User Guide*.
145
+ # information, see [Permitting IAM users to change their own
146
+ # passwords][1] in the *IAM User Guide*.
147
147
  #
148
148
  # If you do not specify a value for this parameter, then the operation
149
149
  # uses the default value of `false`. The result is that IAM users in the
@@ -152,7 +152,7 @@ module Aws::IAM
152
152
  #
153
153
  #
154
154
  #
155
- # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/HowToPwdIAMUser.html
155
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_passwords_enable-user-change.html
156
156
  # @option options [Integer] :max_password_age
157
157
  # The number of days that an IAM user password is valid.
158
158
  #
@@ -167,14 +167,26 @@ module Aws::IAM
167
167
  # uses the default value of `0`. The result is that IAM users are not
168
168
  # prevented from reusing previous passwords.
169
169
  # @option options [Boolean] :hard_expiry
170
- # Prevents IAM users from setting a new password after their password
171
- # has expired. The IAM user cannot be accessed until an administrator
172
- # resets the password.
170
+ # Prevents IAM users who are accessing the account via the Amazon Web
171
+ # Services Management Console from setting a new console password after
172
+ # their password has expired. The IAM user cannot access the console
173
+ # until an administrator resets the password.
173
174
  #
174
175
  # If you do not specify a value for this parameter, then the operation
175
176
  # uses the default value of `false`. The result is that IAM users can
176
177
  # change their passwords after they expire and continue to sign in as
177
178
  # the user.
179
+ #
180
+ # <note markdown="1"> In the Amazon Web Services Management Console, the custom password
181
+ # policy option **Allow users to change their own password** gives IAM
182
+ # users permissions to `iam:ChangePassword` for only their user and to
183
+ # the `iam:GetAccountPasswordPolicy` action. This option does not attach
184
+ # a permissions policy to each user, rather the permissions are applied
185
+ # at the account-level for all users by IAM. IAM users with
186
+ # `iam:ChangePassword` permission and active access keys can reset their
187
+ # own expired console password using the CLI or API.
188
+ #
189
+ # </note>
178
190
  # @return [AccountPasswordPolicy]
179
191
  def create_account_password_policy(options = {})
180
192
  @client.update_account_password_policy(options)
@@ -8440,7 +8440,11 @@ module Aws::IAM
8440
8440
  #
8441
8441
  # @!attribute [rw] allow_users_to_change_password
8442
8442
  # Specifies whether IAM users are allowed to change their own
8443
- # password.
8443
+ # password. Gives IAM users permissions to `iam:ChangePassword` for
8444
+ # only their user and to the `iam:GetAccountPasswordPolicy` action.
8445
+ # This option does not attach a permissions policy to each user,
8446
+ # rather the permissions are applied at the account-level for all
8447
+ # users by IAM.
8444
8448
  # @return [Boolean]
8445
8449
  #
8446
8450
  # @!attribute [rw] expire_passwords
@@ -8460,7 +8464,11 @@ module Aws::IAM
8460
8464
  #
8461
8465
  # @!attribute [rw] hard_expiry
8462
8466
  # Specifies whether IAM users are prevented from setting a new
8463
- # password after their password has expired.
8467
+ # password via the Amazon Web Services Management Console after their
8468
+ # password has expired. The IAM user cannot access the console until
8469
+ # an administrator resets the password. IAM users with
8470
+ # `iam:ChangePassword` permission and active access keys can reset
8471
+ # their own expired console password using the CLI or API.
8464
8472
  # @return [Boolean]
8465
8473
  #
8466
8474
  # @see http://docs.aws.amazon.com/goto/WebAPI/iam-2010-05-08/PasswordPolicy AWS API Documentation
@@ -11922,8 +11930,8 @@ module Aws::IAM
11922
11930
  # @!attribute [rw] allow_users_to_change_password
11923
11931
  # Allows all IAM users in your account to use the Amazon Web Services
11924
11932
  # Management Console to change their own passwords. For more
11925
- # information, see [Letting IAM users change their own passwords][1]
11926
- # in the *IAM User Guide*.
11933
+ # information, see [Permitting IAM users to change their own
11934
+ # passwords][1] in the *IAM User Guide*.
11927
11935
  #
11928
11936
  # If you do not specify a value for this parameter, then the operation
11929
11937
  # uses the default value of `false`. The result is that IAM users in
@@ -11932,7 +11940,7 @@ module Aws::IAM
11932
11940
  #
11933
11941
  #
11934
11942
  #
11935
- # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/HowToPwdIAMUser.html
11943
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_passwords_enable-user-change.html
11936
11944
  # @return [Boolean]
11937
11945
  #
11938
11946
  # @!attribute [rw] max_password_age
@@ -11953,14 +11961,26 @@ module Aws::IAM
11953
11961
  # @return [Integer]
11954
11962
  #
11955
11963
  # @!attribute [rw] hard_expiry
11956
- # Prevents IAM users from setting a new password after their password
11957
- # has expired. The IAM user cannot be accessed until an administrator
11958
- # resets the password.
11964
+ # Prevents IAM users who are accessing the account via the Amazon Web
11965
+ # Services Management Console from setting a new console password
11966
+ # after their password has expired. The IAM user cannot access the
11967
+ # console until an administrator resets the password.
11959
11968
  #
11960
11969
  # If you do not specify a value for this parameter, then the operation
11961
11970
  # uses the default value of `false`. The result is that IAM users can
11962
11971
  # change their passwords after they expire and continue to sign in as
11963
11972
  # the user.
11973
+ #
11974
+ # <note markdown="1"> In the Amazon Web Services Management Console, the custom password
11975
+ # policy option **Allow users to change their own password** gives IAM
11976
+ # users permissions to `iam:ChangePassword` for only their user and to
11977
+ # the `iam:GetAccountPasswordPolicy` action. This option does not
11978
+ # attach a permissions policy to each user, rather the permissions are
11979
+ # applied at the account-level for all users by IAM. IAM users with
11980
+ # `iam:ChangePassword` permission and active access keys can reset
11981
+ # their own expired console password using the CLI or API.
11982
+ #
11983
+ # </note>
11964
11984
  # @return [Boolean]
11965
11985
  #
11966
11986
  # @see http://docs.aws.amazon.com/goto/WebAPI/iam-2010-05-08/UpdateAccountPasswordPolicyRequest AWS API Documentation
data/lib/aws-sdk-iam.rb CHANGED
@@ -70,6 +70,6 @@ require_relative 'aws-sdk-iam/customizations'
70
70
  # @!group service
71
71
  module Aws::IAM
72
72
 
73
- GEM_VERSION = '1.63.0'
73
+ GEM_VERSION = '1.67.0'
74
74
 
75
75
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-iam
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.63.0
4
+ version: 1.67.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2021-11-04 00:00:00.000000000 Z
11
+ date: 2022-02-17 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core
@@ -19,7 +19,7 @@ dependencies:
19
19
  version: '3'
20
20
  - - ">="
21
21
  - !ruby/object:Gem::Version
22
- version: 3.122.0
22
+ version: 3.126.0
23
23
  type: :runtime
24
24
  prerelease: false
25
25
  version_requirements: !ruby/object:Gem::Requirement
@@ -29,7 +29,7 @@ dependencies:
29
29
  version: '3'
30
30
  - - ">="
31
31
  - !ruby/object:Gem::Version
32
- version: 3.122.0
32
+ version: 3.126.0
33
33
  - !ruby/object:Gem::Dependency
34
34
  name: aws-sigv4
35
35
  requirement: !ruby/object:Gem::Requirement