aws-sdk-iam 1.69.0 → 1.71.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: c5dbcb4800f65764e4a3e2f28b774766916a84654d446ff44ecfaab60455a8fd
4
- data.tar.gz: ea560b72220beed42179d02fed3ad1363d1494230583feb82dcd96feaf16d40e
3
+ metadata.gz: 7604034a793e9914e599a151fdc43da98a15c96c15d3e34740ce3686f6cf1c98
4
+ data.tar.gz: fb1246259ce58fe44ab9de2cca7fd3b9b98108ffb19e93a0fba67040cf1d137a
5
5
  SHA512:
6
- metadata.gz: 987a30d8cce522de9f26923e76ac05a5ee2803538353d5ffb2e211022257792702eef1938e91ae90abdca4b1011b096972e432a6473dc22b011333f5737d10af
7
- data.tar.gz: 877f9d957f7a694a1045f439edf5316b98b0be38eadef0e2025459012c3a7fbd76e163e6a50dba13d9b4beacb03ee971c94e63b7a5222fcbb7e04c4903d187f4
6
+ metadata.gz: 69e035e86511650c423006b1e597f0331329a2e21a9f5ad09166dba29e29fa204094119a11cc017fa6ee96e7318e037aef771a0134923d61c97776acdf17e0f8
7
+ data.tar.gz: cb58cb673931db49b322ea43fd77ab51f0a74dd539fcf3b8fcb9cbe76b9bee6a550725769785e6ddfc2e26d280a3d052786884b91604259697f489ebdef6ee43
data/CHANGELOG.md CHANGED
@@ -1,6 +1,16 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.71.0 (2022-10-13)
5
+ ------------------
6
+
7
+ * Feature - Documentation updates for the AWS Identity and Access Management API Reference.
8
+
9
+ 1.70.0 (2022-08-24)
10
+ ------------------
11
+
12
+ * Feature - Documentation updates for AWS Identity and Access Management (IAM).
13
+
4
14
  1.69.0 (2022-06-08)
5
15
  ------------------
6
16
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.69.0
1
+ 1.71.0
@@ -2695,9 +2695,8 @@ module Aws::IAM
2695
2695
  req.send_request(options)
2696
2696
  end
2697
2697
 
2698
- # Deletes the password for the specified IAM user, which terminates the
2699
- # user's ability to access Amazon Web Services services through the
2700
- # Amazon Web Services Management Console.
2698
+ # Deletes the password for the specified IAM user, For more information,
2699
+ # see [Managing passwords for IAM users][1].
2701
2700
  #
2702
2701
  # You can use the CLI, the Amazon Web Services API, or the **Users**
2703
2702
  # page in the IAM console to delete a password for any IAM user. You can
@@ -2711,6 +2710,10 @@ module Aws::IAM
2711
2710
  # inactive or delete them. For more information about making keys
2712
2711
  # inactive or deleting them, see UpdateAccessKey and DeleteAccessKey.
2713
2712
  #
2713
+ #
2714
+ #
2715
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_passwords_admin-change-user.html
2716
+ #
2714
2717
  # @option params [required, String] :user_name
2715
2718
  # The name of the user whose password you want to delete.
2716
2719
  #
@@ -6173,12 +6176,14 @@ module Aws::IAM
6173
6176
  # Although each user is limited to a small number of keys, you can still
6174
6177
  # paginate the results using the `MaxItems` and `Marker` parameters.
6175
6178
  #
6176
- # If the `UserName` field is not specified, the user name is determined
6179
+ # If the `UserName` is not specified, the user name is determined
6177
6180
  # implicitly based on the Amazon Web Services access key ID used to sign
6178
- # the request. This operation works for access keys under the Amazon Web
6179
- # Services account. Consequently, you can use this operation to manage
6180
- # Amazon Web Services account root user credentials even if the Amazon
6181
- # Web Services account has no associated users.
6181
+ # the request. If a temporary access key is used, then `UserName` is
6182
+ # required. If a long-term key is assigned to the user, then `UserName`
6183
+ # is not required. This operation works for access keys under the Amazon
6184
+ # Web Services account. Consequently, you can use this operation to
6185
+ # manage Amazon Web Services account root user credentials even if the
6186
+ # Amazon Web Services account has no associated users.
6182
6187
  #
6183
6188
  # <note markdown="1"> To ensure the security of your Amazon Web Services account, the secret
6184
6189
  # access key is accessible only during key and user creation.
@@ -10226,36 +10231,28 @@ module Aws::IAM
10226
10231
  # resources that you must define to run the simulation.
10227
10232
  #
10228
10233
  # Each of the EC2 scenarios requires that you specify instance, image,
10229
- # and security-group resources. If your scenario includes an EBS volume,
10234
+ # and security group resources. If your scenario includes an EBS volume,
10230
10235
  # then you must specify that volume as a resource. If the EC2 scenario
10231
- # includes VPC, then you must supply the network-interface resource. If
10236
+ # includes VPC, then you must supply the network interface resource. If
10232
10237
  # it includes an IP subnet, then you must specify the subnet resource.
10233
10238
  # For more information on the EC2 scenario options, see [Supported
10234
10239
  # platforms][1] in the *Amazon EC2 User Guide*.
10235
10240
  #
10236
- # * **EC2-Classic-InstanceStore**
10237
- #
10238
- # instance, image, security-group
10239
- #
10240
- # * **EC2-Classic-EBS**
10241
- #
10242
- # instance, image, security-group, volume
10243
- #
10244
10241
  # * **EC2-VPC-InstanceStore**
10245
10242
  #
10246
- # instance, image, security-group, network-interface
10243
+ # instance, image, security group, network interface
10247
10244
  #
10248
10245
  # * **EC2-VPC-InstanceStore-Subnet**
10249
10246
  #
10250
- # instance, image, security-group, network-interface, subnet
10247
+ # instance, image, security group, network interface, subnet
10251
10248
  #
10252
10249
  # * **EC2-VPC-EBS**
10253
10250
  #
10254
- # instance, image, security-group, network-interface, volume
10251
+ # instance, image, security group, network interface, volume
10255
10252
  #
10256
10253
  # * **EC2-VPC-EBS-Subnet**
10257
10254
  #
10258
- # instance, image, security-group, network-interface, subnet, volume
10255
+ # instance, image, security group, network interface, subnet, volume
10259
10256
  #
10260
10257
  #
10261
10258
  #
@@ -10590,14 +10587,6 @@ module Aws::IAM
10590
10587
  # For more information on the EC2 scenario options, see [Supported
10591
10588
  # platforms][1] in the *Amazon EC2 User Guide*.
10592
10589
  #
10593
- # * **EC2-Classic-InstanceStore**
10594
- #
10595
- # instance, image, security group
10596
- #
10597
- # * **EC2-Classic-EBS**
10598
- #
10599
- # instance, image, security group, volume
10600
- #
10601
10590
  # * **EC2-VPC-InstanceStore**
10602
10591
  #
10603
10592
  # instance, image, security group, network interface
@@ -11772,10 +11761,12 @@ module Aws::IAM
11772
11761
  #
11773
11762
  # If the `UserName` is not specified, the user name is determined
11774
11763
  # implicitly based on the Amazon Web Services access key ID used to sign
11775
- # the request. This operation works for access keys under the Amazon Web
11776
- # Services account. Consequently, you can use this operation to manage
11777
- # Amazon Web Services account root user credentials even if the Amazon
11778
- # Web Services account has no associated users.
11764
+ # the request. If a temporary access key is used, then `UserName` is
11765
+ # required. If a long-term key is assigned to the user, then `UserName`
11766
+ # is not required. This operation works for access keys under the Amazon
11767
+ # Web Services account. Consequently, you can use this operation to
11768
+ # manage Amazon Web Services account root user credentials even if the
11769
+ # Amazon Web Services account has no associated users.
11779
11770
  #
11780
11771
  # For information about rotating keys, see [Managing keys and
11781
11772
  # certificates][1] in the *IAM User Guide*.
@@ -13225,7 +13216,7 @@ module Aws::IAM
13225
13216
  params: params,
13226
13217
  config: config)
13227
13218
  context[:gem_name] = 'aws-sdk-iam'
13228
- context[:gem_version] = '1.69.0'
13219
+ context[:gem_version] = '1.71.0'
13229
13220
  Seahorse::Client::Request.new(handlers, context)
13230
13221
  end
13231
13222
 
@@ -45,7 +45,7 @@ module Aws::IAM
45
45
  # The Region where the last service access attempt occurred.
46
46
  #
47
47
  # This field is null if no principals in the reported Organizations
48
- # entity attempted to access the service within the [reporting
48
+ # entity attempted to access the service within the [tracking
49
49
  # period][1].
50
50
  #
51
51
  #
@@ -61,7 +61,7 @@ module Aws::IAM
61
61
  #
62
62
  # This field is null if no principals (IAM users, IAM roles, or root
63
63
  # users) in the reported Organizations entity attempted to access the
64
- # service within the [reporting period][1].
64
+ # service within the [tracking period][1].
65
65
  #
66
66
  #
67
67
  #
@@ -75,7 +75,7 @@ module Aws::IAM
75
75
  # requests.
76
76
  #
77
77
  # This field is null if no principals in the reported Organizations
78
- # entity attempted to access the service within the [reporting
78
+ # entity attempted to access the service within the [tracking
79
79
  # period][2].
80
80
  #
81
81
  #
@@ -87,7 +87,7 @@ module Aws::IAM
87
87
  # @!attribute [rw] total_authenticated_entities
88
88
  # The number of accounts with authenticated principals (root users,
89
89
  # IAM users, and IAM roles) that attempted to access the service in
90
- # the reporting period.
90
+ # the tracking period.
91
91
  # @return [Integer]
92
92
  #
93
93
  # @see http://docs.aws.amazon.com/goto/WebAPI/iam-2010-05-08/AccessDetail AWS API Documentation
@@ -2985,7 +2985,7 @@ module Aws::IAM
2985
2985
  # Amazon Web Services does not report unauthenticated requests.
2986
2986
  #
2987
2987
  # This field is null if no IAM entities attempted to access the
2988
- # service within the [reporting period][2].
2988
+ # service within the [tracking period][2].
2989
2989
  #
2990
2990
  #
2991
2991
  #
@@ -10104,7 +10104,7 @@ module Aws::IAM
10104
10104
  # Amazon Web Services does not report unauthenticated requests.
10105
10105
  #
10106
10106
  # This field is null if no IAM entities attempted to access the
10107
- # service within the [reporting period][2].
10107
+ # service within the [tracking period][2].
10108
10108
  #
10109
10109
  #
10110
10110
  #
@@ -10136,7 +10136,7 @@ module Aws::IAM
10136
10136
  # unauthenticated requests.
10137
10137
  #
10138
10138
  # This field is null if no IAM entities attempted to access the
10139
- # service within the [reporting period][1].
10139
+ # service within the [tracking period][1].
10140
10140
  #
10141
10141
  #
10142
10142
  #
@@ -10149,7 +10149,7 @@ module Aws::IAM
10149
10149
  # unauthenticated requests.
10150
10150
  #
10151
10151
  # This field is null if no IAM entities attempted to access the
10152
- # service within the [reporting period][1].
10152
+ # service within the [tracking period][1].
10153
10153
  #
10154
10154
  #
10155
10155
  #
@@ -10161,7 +10161,7 @@ module Aws::IAM
10161
10161
  # or IAM roles) that have attempted to access the service.
10162
10162
  #
10163
10163
  # This field is null if no principals attempted to access the service
10164
- # within the [reporting period][1].
10164
+ # within the [tracking period][1].
10165
10165
  #
10166
10166
  #
10167
10167
  #
@@ -10173,7 +10173,7 @@ module Aws::IAM
10173
10173
  # access a tracked action within the service.
10174
10174
  #
10175
10175
  # This field is null if there no tracked actions or if the principal
10176
- # did not use the tracked actions within the [reporting period][1].
10176
+ # did not use the tracked actions within the [tracking period][1].
10177
10177
  # This field is also null if the report was generated at the service
10178
10178
  # level and not the action level. For more information, see the
10179
10179
  # `Granularity` field in GenerateServiceLastAccessedDetails.
@@ -10624,36 +10624,28 @@ module Aws::IAM
10624
10624
  # simulation.
10625
10625
  #
10626
10626
  # Each of the EC2 scenarios requires that you specify instance, image,
10627
- # and security-group resources. If your scenario includes an EBS
10627
+ # and security group resources. If your scenario includes an EBS
10628
10628
  # volume, then you must specify that volume as a resource. If the EC2
10629
- # scenario includes VPC, then you must supply the network-interface
10629
+ # scenario includes VPC, then you must supply the network interface
10630
10630
  # resource. If it includes an IP subnet, then you must specify the
10631
10631
  # subnet resource. For more information on the EC2 scenario options,
10632
10632
  # see [Supported platforms][1] in the *Amazon EC2 User Guide*.
10633
10633
  #
10634
- # * **EC2-Classic-InstanceStore**
10635
- #
10636
- # instance, image, security-group
10637
- #
10638
- # * **EC2-Classic-EBS**
10639
- #
10640
- # instance, image, security-group, volume
10641
- #
10642
10634
  # * **EC2-VPC-InstanceStore**
10643
10635
  #
10644
- # instance, image, security-group, network-interface
10636
+ # instance, image, security group, network interface
10645
10637
  #
10646
10638
  # * **EC2-VPC-InstanceStore-Subnet**
10647
10639
  #
10648
- # instance, image, security-group, network-interface, subnet
10640
+ # instance, image, security group, network interface, subnet
10649
10641
  #
10650
10642
  # * **EC2-VPC-EBS**
10651
10643
  #
10652
- # instance, image, security-group, network-interface, volume
10644
+ # instance, image, security group, network interface, volume
10653
10645
  #
10654
10646
  # * **EC2-VPC-EBS-Subnet**
10655
10647
  #
10656
- # instance, image, security-group, network-interface, subnet, volume
10648
+ # instance, image, security group, network interface, subnet, volume
10657
10649
  #
10658
10650
  #
10659
10651
  #
@@ -10960,14 +10952,6 @@ module Aws::IAM
10960
10952
  # subnet resource. For more information on the EC2 scenario options,
10961
10953
  # see [Supported platforms][1] in the *Amazon EC2 User Guide*.
10962
10954
  #
10963
- # * **EC2-Classic-InstanceStore**
10964
- #
10965
- # instance, image, security group
10966
- #
10967
- # * **EC2-Classic-EBS**
10968
- #
10969
- # instance, image, security group, volume
10970
- #
10971
10955
  # * **EC2-VPC-InstanceStore**
10972
10956
  #
10973
10957
  # instance, image, security group, network interface
@@ -11468,7 +11452,7 @@ module Aws::IAM
11468
11452
  # requests.
11469
11453
  #
11470
11454
  # This field is null if no IAM entities attempted to access the
11471
- # service within the [reporting period][2].
11455
+ # service within the [tracking period][2].
11472
11456
  #
11473
11457
  #
11474
11458
  #
@@ -11482,7 +11466,7 @@ module Aws::IAM
11482
11466
  # report unauthenticated requests.
11483
11467
  #
11484
11468
  # This field is null if no IAM entities attempted to access the
11485
- # service within the [reporting period][1].
11469
+ # service within the [tracking period][1].
11486
11470
  #
11487
11471
  #
11488
11472
  #
data/lib/aws-sdk-iam.rb CHANGED
@@ -70,6 +70,6 @@ require_relative 'aws-sdk-iam/customizations'
70
70
  # @!group service
71
71
  module Aws::IAM
72
72
 
73
- GEM_VERSION = '1.69.0'
73
+ GEM_VERSION = '1.71.0'
74
74
 
75
75
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-iam
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.69.0
4
+ version: 1.71.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2022-06-08 00:00:00.000000000 Z
11
+ date: 2022-10-13 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core