aws-sdk-iam 1.65.0 → 1.68.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: '09284d42773fe540033c9eec5bc336c733452ceed9038c8f12448be2714f88b6'
4
- data.tar.gz: f10879414d3cb98eefb9fd0f59eb5c0ed86d41089e1e9c9432f4613e691fdf37
3
+ metadata.gz: 3cfe17357565eb402c90e99e7edf6c23c33f13142210108cb1f6473da339d6d4
4
+ data.tar.gz: c04dd3b12e59e27c59275800d65a3b73f6d78bbedd2bf43b79d689a4b7ac6993
5
5
  SHA512:
6
- metadata.gz: f3cc76626fdd724c0b12eabce3ae5b5de5c1776212c05afcf1867838e1da8cf8f280597374192393cc8eae7c67e054ad6decac76822958aabcd4fe20d0e458d5
7
- data.tar.gz: 476503e31f633f881b9e2dc39d48246eaa787071f2d0fbc7409395deb21d334d7b80c32e861b9f2059b416c17973f1211d4e565237f9ceb1b3a5fba49826e173
6
+ metadata.gz: 52c95b4065b16306f28694fd2b59fcf83a21717e3266898d0a2590aee6e0bdc1cc9ace1b30287a6b7e4498f6eeba8f158ccc19557fa64f54a01e5ba62eb5305e
7
+ data.tar.gz: 9de995bba510264e11fd5d3afa26e5211171f16f2564785e439f4c858cddaeea00a41860e92be7dfb425c49aa5159dc11edecd49234b75c2d27a7fc37b6a49e2
data/CHANGELOG.md CHANGED
@@ -1,6 +1,21 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.68.0 (2022-02-24)
5
+ ------------------
6
+
7
+ * Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
8
+
9
+ 1.67.0 (2022-02-17)
10
+ ------------------
11
+
12
+ * Feature - Documentation updates for AWS Identity and Access Management (IAM).
13
+
14
+ 1.66.0 (2022-02-03)
15
+ ------------------
16
+
17
+ * Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
18
+
4
19
  1.65.0 (2021-12-21)
5
20
  ------------------
6
21
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.65.0
1
+ 1.68.0
@@ -61,6 +61,10 @@ module Aws::IAM
61
61
  end
62
62
 
63
63
  # Specifies whether IAM users are allowed to change their own password.
64
+ # Gives IAM users permissions to `iam:ChangePassword` for only their
65
+ # user and to the `iam:GetAccountPasswordPolicy` action. This option
66
+ # does not attach a permissions policy to each user, rather the
67
+ # permissions are applied at the account-level for all users by IAM.
64
68
  # @return [Boolean]
65
69
  def allow_users_to_change_password
66
70
  data[:allow_users_to_change_password]
@@ -88,7 +92,11 @@ module Aws::IAM
88
92
  end
89
93
 
90
94
  # Specifies whether IAM users are prevented from setting a new password
91
- # after their password has expired.
95
+ # via the Amazon Web Services Management Console after their password
96
+ # has expired. The IAM user cannot access the console until an
97
+ # administrator resets the password. IAM users with `iam:ChangePassword`
98
+ # permission and active access keys can reset their own expired console
99
+ # password using the CLI or API.
92
100
  # @return [Boolean]
93
101
  def hard_expiry
94
102
  data[:hard_expiry]
@@ -290,8 +298,8 @@ module Aws::IAM
290
298
  # @option options [Boolean] :allow_users_to_change_password
291
299
  # Allows all IAM users in your account to use the Amazon Web Services
292
300
  # Management Console to change their own passwords. For more
293
- # information, see [Letting IAM users change their own passwords][1] in
294
- # the *IAM User Guide*.
301
+ # information, see [Permitting IAM users to change their own
302
+ # passwords][1] in the *IAM User Guide*.
295
303
  #
296
304
  # If you do not specify a value for this parameter, then the operation
297
305
  # uses the default value of `false`. The result is that IAM users in the
@@ -300,7 +308,7 @@ module Aws::IAM
300
308
  #
301
309
  #
302
310
  #
303
- # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/HowToPwdIAMUser.html
311
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_passwords_enable-user-change.html
304
312
  # @option options [Integer] :max_password_age
305
313
  # The number of days that an IAM user password is valid.
306
314
  #
@@ -315,14 +323,26 @@ module Aws::IAM
315
323
  # uses the default value of `0`. The result is that IAM users are not
316
324
  # prevented from reusing previous passwords.
317
325
  # @option options [Boolean] :hard_expiry
318
- # Prevents IAM users from setting a new password after their password
319
- # has expired. The IAM user cannot be accessed until an administrator
320
- # resets the password.
326
+ # Prevents IAM users who are accessing the account via the Amazon Web
327
+ # Services Management Console from setting a new console password after
328
+ # their password has expired. The IAM user cannot access the console
329
+ # until an administrator resets the password.
321
330
  #
322
331
  # If you do not specify a value for this parameter, then the operation
323
332
  # uses the default value of `false`. The result is that IAM users can
324
333
  # change their passwords after they expire and continue to sign in as
325
334
  # the user.
335
+ #
336
+ # <note markdown="1"> In the Amazon Web Services Management Console, the custom password
337
+ # policy option **Allow users to change their own password** gives IAM
338
+ # users permissions to `iam:ChangePassword` for only their user and to
339
+ # the `iam:GetAccountPasswordPolicy` action. This option does not attach
340
+ # a permissions policy to each user, rather the permissions are applied
341
+ # at the account-level for all users by IAM. IAM users with
342
+ # `iam:ChangePassword` permission and active access keys can reset their
343
+ # own expired console password using the CLI or API.
344
+ #
345
+ # </note>
326
346
  # @return [EmptyStructure]
327
347
  def update(options = {})
328
348
  resp = @client.update_account_password_policy(options)
@@ -27,7 +27,9 @@ require 'aws-sdk-core/plugins/client_metrics_plugin.rb'
27
27
  require 'aws-sdk-core/plugins/client_metrics_send_plugin.rb'
28
28
  require 'aws-sdk-core/plugins/transfer_encoding.rb'
29
29
  require 'aws-sdk-core/plugins/http_checksum.rb'
30
+ require 'aws-sdk-core/plugins/checksum_algorithm.rb'
30
31
  require 'aws-sdk-core/plugins/defaults_mode.rb'
32
+ require 'aws-sdk-core/plugins/recursion_detection.rb'
31
33
  require 'aws-sdk-core/plugins/signature_v4.rb'
32
34
  require 'aws-sdk-core/plugins/protocols/query.rb'
33
35
 
@@ -74,7 +76,9 @@ module Aws::IAM
74
76
  add_plugin(Aws::Plugins::ClientMetricsSendPlugin)
75
77
  add_plugin(Aws::Plugins::TransferEncoding)
76
78
  add_plugin(Aws::Plugins::HttpChecksum)
79
+ add_plugin(Aws::Plugins::ChecksumAlgorithm)
77
80
  add_plugin(Aws::Plugins::DefaultsMode)
81
+ add_plugin(Aws::Plugins::RecursionDetection)
78
82
  add_plugin(Aws::Plugins::SignatureV4)
79
83
  add_plugin(Aws::Plugins::Protocols::Query)
80
84
 
@@ -3989,9 +3993,9 @@ module Aws::IAM
3989
3993
  # Generates a report that includes details about when an IAM resource
3990
3994
  # (user, group, role, or policy) was last used in an attempt to access
3991
3995
  # Amazon Web Services services. Recent activity usually appears within
3992
- # four hours. IAM reports activity for the last 365 days, or less if
3993
- # your Region began supporting this feature within the last year. For
3994
- # more information, see [Regions where data is tracked][1].
3996
+ # four hours. IAM reports activity for at least the last 400 days, or
3997
+ # less if your Region began supporting this feature within the last
3998
+ # year. For more information, see [Regions where data is tracked][1].
3995
3999
  #
3996
4000
  # The service last accessed data includes all attempts to access an
3997
4001
  # Amazon Web Services API, not just the successful ones. This includes
@@ -9105,8 +9109,8 @@ module Aws::IAM
9105
9109
  # <note markdown="1"> IAM resource-listing operations return a subset of the available
9106
9110
  # attributes for the resource. For example, this operation does not
9107
9111
  # return tags, even though they are an attribute of the returned object.
9108
- # To view all of the information for a virtual MFA device, see
9109
- # ListVirtualMFADevices.
9112
+ # To view tag information for a virtual MFA device, see
9113
+ # ListMFADeviceTags.
9110
9114
  #
9111
9115
  # </note>
9112
9116
  #
@@ -11842,15 +11846,13 @@ module Aws::IAM
11842
11846
  # Updates the password policy settings for the Amazon Web Services
11843
11847
  # account.
11844
11848
  #
11845
- # <note markdown="1"> * This operation does not support partial updates. No parameters are
11846
- # required, but if you do not specify a parameter, that parameter's
11847
- # value reverts to its default value. See the **Request Parameters**
11848
- # section for each parameter's default value. Also note that some
11849
- # parameters do not allow the default parameter to be explicitly set.
11850
- # Instead, to invoke the default value, do not include that parameter
11851
- # when you invoke the operation.
11852
- #
11853
- # ^
11849
+ # <note markdown="1"> This operation does not support partial updates. No parameters are
11850
+ # required, but if you do not specify a parameter, that parameter's
11851
+ # value reverts to its default value. See the **Request Parameters**
11852
+ # section for each parameter's default value. Also note that some
11853
+ # parameters do not allow the default parameter to be explicitly set.
11854
+ # Instead, to invoke the default value, do not include that parameter
11855
+ # when you invoke the operation.
11854
11856
  #
11855
11857
  # </note>
11856
11858
  #
@@ -11904,8 +11906,8 @@ module Aws::IAM
11904
11906
  # @option params [Boolean] :allow_users_to_change_password
11905
11907
  # Allows all IAM users in your account to use the Amazon Web Services
11906
11908
  # Management Console to change their own passwords. For more
11907
- # information, see [Letting IAM users change their own passwords][1] in
11908
- # the *IAM User Guide*.
11909
+ # information, see [Permitting IAM users to change their own
11910
+ # passwords][1] in the *IAM User Guide*.
11909
11911
  #
11910
11912
  # If you do not specify a value for this parameter, then the operation
11911
11913
  # uses the default value of `false`. The result is that IAM users in the
@@ -11914,7 +11916,7 @@ module Aws::IAM
11914
11916
  #
11915
11917
  #
11916
11918
  #
11917
- # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/HowToPwdIAMUser.html
11919
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_passwords_enable-user-change.html
11918
11920
  #
11919
11921
  # @option params [Integer] :max_password_age
11920
11922
  # The number of days that an IAM user password is valid.
@@ -11932,15 +11934,27 @@ module Aws::IAM
11932
11934
  # prevented from reusing previous passwords.
11933
11935
  #
11934
11936
  # @option params [Boolean] :hard_expiry
11935
- # Prevents IAM users from setting a new password after their password
11936
- # has expired. The IAM user cannot be accessed until an administrator
11937
- # resets the password.
11937
+ # Prevents IAM users who are accessing the account via the Amazon Web
11938
+ # Services Management Console from setting a new console password after
11939
+ # their password has expired. The IAM user cannot access the console
11940
+ # until an administrator resets the password.
11938
11941
  #
11939
11942
  # If you do not specify a value for this parameter, then the operation
11940
11943
  # uses the default value of `false`. The result is that IAM users can
11941
11944
  # change their passwords after they expire and continue to sign in as
11942
11945
  # the user.
11943
11946
  #
11947
+ # <note markdown="1"> In the Amazon Web Services Management Console, the custom password
11948
+ # policy option **Allow users to change their own password** gives IAM
11949
+ # users permissions to `iam:ChangePassword` for only their user and to
11950
+ # the `iam:GetAccountPasswordPolicy` action. This option does not attach
11951
+ # a permissions policy to each user, rather the permissions are applied
11952
+ # at the account-level for all users by IAM. IAM users with
11953
+ # `iam:ChangePassword` permission and active access keys can reset their
11954
+ # own expired console password using the CLI or API.
11955
+ #
11956
+ # </note>
11957
+ #
11944
11958
  # @return [Struct] Returns an empty {Seahorse::Client::Response response}.
11945
11959
  #
11946
11960
  #
@@ -13211,7 +13225,7 @@ module Aws::IAM
13211
13225
  params: params,
13212
13226
  config: config)
13213
13227
  context[:gem_name] = 'aws-sdk-iam'
13214
- context[:gem_version] = '1.65.0'
13228
+ context[:gem_version] = '1.68.0'
13215
13229
  Seahorse::Client::Request.new(handlers, context)
13216
13230
  end
13217
13231
 
@@ -142,8 +142,8 @@ module Aws::IAM
142
142
  # @option options [Boolean] :allow_users_to_change_password
143
143
  # Allows all IAM users in your account to use the Amazon Web Services
144
144
  # Management Console to change their own passwords. For more
145
- # information, see [Letting IAM users change their own passwords][1] in
146
- # the *IAM User Guide*.
145
+ # information, see [Permitting IAM users to change their own
146
+ # passwords][1] in the *IAM User Guide*.
147
147
  #
148
148
  # If you do not specify a value for this parameter, then the operation
149
149
  # uses the default value of `false`. The result is that IAM users in the
@@ -152,7 +152,7 @@ module Aws::IAM
152
152
  #
153
153
  #
154
154
  #
155
- # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/HowToPwdIAMUser.html
155
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_passwords_enable-user-change.html
156
156
  # @option options [Integer] :max_password_age
157
157
  # The number of days that an IAM user password is valid.
158
158
  #
@@ -167,14 +167,26 @@ module Aws::IAM
167
167
  # uses the default value of `0`. The result is that IAM users are not
168
168
  # prevented from reusing previous passwords.
169
169
  # @option options [Boolean] :hard_expiry
170
- # Prevents IAM users from setting a new password after their password
171
- # has expired. The IAM user cannot be accessed until an administrator
172
- # resets the password.
170
+ # Prevents IAM users who are accessing the account via the Amazon Web
171
+ # Services Management Console from setting a new console password after
172
+ # their password has expired. The IAM user cannot access the console
173
+ # until an administrator resets the password.
173
174
  #
174
175
  # If you do not specify a value for this parameter, then the operation
175
176
  # uses the default value of `false`. The result is that IAM users can
176
177
  # change their passwords after they expire and continue to sign in as
177
178
  # the user.
179
+ #
180
+ # <note markdown="1"> In the Amazon Web Services Management Console, the custom password
181
+ # policy option **Allow users to change their own password** gives IAM
182
+ # users permissions to `iam:ChangePassword` for only their user and to
183
+ # the `iam:GetAccountPasswordPolicy` action. This option does not attach
184
+ # a permissions policy to each user, rather the permissions are applied
185
+ # at the account-level for all users by IAM. IAM users with
186
+ # `iam:ChangePassword` permission and active access keys can reset their
187
+ # own expired console password using the CLI or API.
188
+ #
189
+ # </note>
178
190
  # @return [AccountPasswordPolicy]
179
191
  def create_account_password_policy(options = {})
180
192
  @client.update_account_password_policy(options)
@@ -8440,7 +8440,11 @@ module Aws::IAM
8440
8440
  #
8441
8441
  # @!attribute [rw] allow_users_to_change_password
8442
8442
  # Specifies whether IAM users are allowed to change their own
8443
- # password.
8443
+ # password. Gives IAM users permissions to `iam:ChangePassword` for
8444
+ # only their user and to the `iam:GetAccountPasswordPolicy` action.
8445
+ # This option does not attach a permissions policy to each user,
8446
+ # rather the permissions are applied at the account-level for all
8447
+ # users by IAM.
8444
8448
  # @return [Boolean]
8445
8449
  #
8446
8450
  # @!attribute [rw] expire_passwords
@@ -8460,7 +8464,11 @@ module Aws::IAM
8460
8464
  #
8461
8465
  # @!attribute [rw] hard_expiry
8462
8466
  # Specifies whether IAM users are prevented from setting a new
8463
- # password after their password has expired.
8467
+ # password via the Amazon Web Services Management Console after their
8468
+ # password has expired. The IAM user cannot access the console until
8469
+ # an administrator resets the password. IAM users with
8470
+ # `iam:ChangePassword` permission and active access keys can reset
8471
+ # their own expired console password using the CLI or API.
8464
8472
  # @return [Boolean]
8465
8473
  #
8466
8474
  # @see http://docs.aws.amazon.com/goto/WebAPI/iam-2010-05-08/PasswordPolicy AWS API Documentation
@@ -11922,8 +11930,8 @@ module Aws::IAM
11922
11930
  # @!attribute [rw] allow_users_to_change_password
11923
11931
  # Allows all IAM users in your account to use the Amazon Web Services
11924
11932
  # Management Console to change their own passwords. For more
11925
- # information, see [Letting IAM users change their own passwords][1]
11926
- # in the *IAM User Guide*.
11933
+ # information, see [Permitting IAM users to change their own
11934
+ # passwords][1] in the *IAM User Guide*.
11927
11935
  #
11928
11936
  # If you do not specify a value for this parameter, then the operation
11929
11937
  # uses the default value of `false`. The result is that IAM users in
@@ -11932,7 +11940,7 @@ module Aws::IAM
11932
11940
  #
11933
11941
  #
11934
11942
  #
11935
- # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/HowToPwdIAMUser.html
11943
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_passwords_enable-user-change.html
11936
11944
  # @return [Boolean]
11937
11945
  #
11938
11946
  # @!attribute [rw] max_password_age
@@ -11953,14 +11961,26 @@ module Aws::IAM
11953
11961
  # @return [Integer]
11954
11962
  #
11955
11963
  # @!attribute [rw] hard_expiry
11956
- # Prevents IAM users from setting a new password after their password
11957
- # has expired. The IAM user cannot be accessed until an administrator
11958
- # resets the password.
11964
+ # Prevents IAM users who are accessing the account via the Amazon Web
11965
+ # Services Management Console from setting a new console password
11966
+ # after their password has expired. The IAM user cannot access the
11967
+ # console until an administrator resets the password.
11959
11968
  #
11960
11969
  # If you do not specify a value for this parameter, then the operation
11961
11970
  # uses the default value of `false`. The result is that IAM users can
11962
11971
  # change their passwords after they expire and continue to sign in as
11963
11972
  # the user.
11973
+ #
11974
+ # <note markdown="1"> In the Amazon Web Services Management Console, the custom password
11975
+ # policy option **Allow users to change their own password** gives IAM
11976
+ # users permissions to `iam:ChangePassword` for only their user and to
11977
+ # the `iam:GetAccountPasswordPolicy` action. This option does not
11978
+ # attach a permissions policy to each user, rather the permissions are
11979
+ # applied at the account-level for all users by IAM. IAM users with
11980
+ # `iam:ChangePassword` permission and active access keys can reset
11981
+ # their own expired console password using the CLI or API.
11982
+ #
11983
+ # </note>
11964
11984
  # @return [Boolean]
11965
11985
  #
11966
11986
  # @see http://docs.aws.amazon.com/goto/WebAPI/iam-2010-05-08/UpdateAccountPasswordPolicyRequest AWS API Documentation
data/lib/aws-sdk-iam.rb CHANGED
@@ -70,6 +70,6 @@ require_relative 'aws-sdk-iam/customizations'
70
70
  # @!group service
71
71
  module Aws::IAM
72
72
 
73
- GEM_VERSION = '1.65.0'
73
+ GEM_VERSION = '1.68.0'
74
74
 
75
75
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-iam
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.65.0
4
+ version: 1.68.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2021-12-21 00:00:00.000000000 Z
11
+ date: 2022-02-24 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core
@@ -19,7 +19,7 @@ dependencies:
19
19
  version: '3'
20
20
  - - ">="
21
21
  - !ruby/object:Gem::Version
22
- version: 3.125.0
22
+ version: 3.127.0
23
23
  type: :runtime
24
24
  prerelease: false
25
25
  version_requirements: !ruby/object:Gem::Requirement
@@ -29,7 +29,7 @@ dependencies:
29
29
  version: '3'
30
30
  - - ">="
31
31
  - !ruby/object:Gem::Version
32
- version: 3.125.0
32
+ version: 3.127.0
33
33
  - !ruby/object:Gem::Dependency
34
34
  name: aws-sigv4
35
35
  requirement: !ruby/object:Gem::Requirement