aws-sdk-iam 1.69.0 → 1.71.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +10 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-iam/client.rb +26 -35
- data/lib/aws-sdk-iam/types.rb +18 -34
- data/lib/aws-sdk-iam.rb +1 -1
- metadata +2 -2
checksums.yaml
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
---
|
|
2
2
|
SHA256:
|
|
3
|
-
metadata.gz:
|
|
4
|
-
data.tar.gz:
|
|
3
|
+
metadata.gz: 7604034a793e9914e599a151fdc43da98a15c96c15d3e34740ce3686f6cf1c98
|
|
4
|
+
data.tar.gz: fb1246259ce58fe44ab9de2cca7fd3b9b98108ffb19e93a0fba67040cf1d137a
|
|
5
5
|
SHA512:
|
|
6
|
-
metadata.gz:
|
|
7
|
-
data.tar.gz:
|
|
6
|
+
metadata.gz: 69e035e86511650c423006b1e597f0331329a2e21a9f5ad09166dba29e29fa204094119a11cc017fa6ee96e7318e037aef771a0134923d61c97776acdf17e0f8
|
|
7
|
+
data.tar.gz: cb58cb673931db49b322ea43fd77ab51f0a74dd539fcf3b8fcb9cbe76b9bee6a550725769785e6ddfc2e26d280a3d052786884b91604259697f489ebdef6ee43
|
data/CHANGELOG.md
CHANGED
|
@@ -1,6 +1,16 @@
|
|
|
1
1
|
Unreleased Changes
|
|
2
2
|
------------------
|
|
3
3
|
|
|
4
|
+
1.71.0 (2022-10-13)
|
|
5
|
+
------------------
|
|
6
|
+
|
|
7
|
+
* Feature - Documentation updates for the AWS Identity and Access Management API Reference.
|
|
8
|
+
|
|
9
|
+
1.70.0 (2022-08-24)
|
|
10
|
+
------------------
|
|
11
|
+
|
|
12
|
+
* Feature - Documentation updates for AWS Identity and Access Management (IAM).
|
|
13
|
+
|
|
4
14
|
1.69.0 (2022-06-08)
|
|
5
15
|
------------------
|
|
6
16
|
|
data/VERSION
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
1.
|
|
1
|
+
1.71.0
|
data/lib/aws-sdk-iam/client.rb
CHANGED
|
@@ -2695,9 +2695,8 @@ module Aws::IAM
|
|
|
2695
2695
|
req.send_request(options)
|
|
2696
2696
|
end
|
|
2697
2697
|
|
|
2698
|
-
# Deletes the password for the specified IAM user,
|
|
2699
|
-
#
|
|
2700
|
-
# Amazon Web Services Management Console.
|
|
2698
|
+
# Deletes the password for the specified IAM user, For more information,
|
|
2699
|
+
# see [Managing passwords for IAM users][1].
|
|
2701
2700
|
#
|
|
2702
2701
|
# You can use the CLI, the Amazon Web Services API, or the **Users**
|
|
2703
2702
|
# page in the IAM console to delete a password for any IAM user. You can
|
|
@@ -2711,6 +2710,10 @@ module Aws::IAM
|
|
|
2711
2710
|
# inactive or delete them. For more information about making keys
|
|
2712
2711
|
# inactive or deleting them, see UpdateAccessKey and DeleteAccessKey.
|
|
2713
2712
|
#
|
|
2713
|
+
#
|
|
2714
|
+
#
|
|
2715
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_passwords_admin-change-user.html
|
|
2716
|
+
#
|
|
2714
2717
|
# @option params [required, String] :user_name
|
|
2715
2718
|
# The name of the user whose password you want to delete.
|
|
2716
2719
|
#
|
|
@@ -6173,12 +6176,14 @@ module Aws::IAM
|
|
|
6173
6176
|
# Although each user is limited to a small number of keys, you can still
|
|
6174
6177
|
# paginate the results using the `MaxItems` and `Marker` parameters.
|
|
6175
6178
|
#
|
|
6176
|
-
# If the `UserName`
|
|
6179
|
+
# If the `UserName` is not specified, the user name is determined
|
|
6177
6180
|
# implicitly based on the Amazon Web Services access key ID used to sign
|
|
6178
|
-
# the request.
|
|
6179
|
-
#
|
|
6180
|
-
#
|
|
6181
|
-
# Web Services account
|
|
6181
|
+
# the request. If a temporary access key is used, then `UserName` is
|
|
6182
|
+
# required. If a long-term key is assigned to the user, then `UserName`
|
|
6183
|
+
# is not required. This operation works for access keys under the Amazon
|
|
6184
|
+
# Web Services account. Consequently, you can use this operation to
|
|
6185
|
+
# manage Amazon Web Services account root user credentials even if the
|
|
6186
|
+
# Amazon Web Services account has no associated users.
|
|
6182
6187
|
#
|
|
6183
6188
|
# <note markdown="1"> To ensure the security of your Amazon Web Services account, the secret
|
|
6184
6189
|
# access key is accessible only during key and user creation.
|
|
@@ -10226,36 +10231,28 @@ module Aws::IAM
|
|
|
10226
10231
|
# resources that you must define to run the simulation.
|
|
10227
10232
|
#
|
|
10228
10233
|
# Each of the EC2 scenarios requires that you specify instance, image,
|
|
10229
|
-
# and security
|
|
10234
|
+
# and security group resources. If your scenario includes an EBS volume,
|
|
10230
10235
|
# then you must specify that volume as a resource. If the EC2 scenario
|
|
10231
|
-
# includes VPC, then you must supply the network
|
|
10236
|
+
# includes VPC, then you must supply the network interface resource. If
|
|
10232
10237
|
# it includes an IP subnet, then you must specify the subnet resource.
|
|
10233
10238
|
# For more information on the EC2 scenario options, see [Supported
|
|
10234
10239
|
# platforms][1] in the *Amazon EC2 User Guide*.
|
|
10235
10240
|
#
|
|
10236
|
-
# * **EC2-Classic-InstanceStore**
|
|
10237
|
-
#
|
|
10238
|
-
# instance, image, security-group
|
|
10239
|
-
#
|
|
10240
|
-
# * **EC2-Classic-EBS**
|
|
10241
|
-
#
|
|
10242
|
-
# instance, image, security-group, volume
|
|
10243
|
-
#
|
|
10244
10241
|
# * **EC2-VPC-InstanceStore**
|
|
10245
10242
|
#
|
|
10246
|
-
# instance, image, security
|
|
10243
|
+
# instance, image, security group, network interface
|
|
10247
10244
|
#
|
|
10248
10245
|
# * **EC2-VPC-InstanceStore-Subnet**
|
|
10249
10246
|
#
|
|
10250
|
-
# instance, image, security
|
|
10247
|
+
# instance, image, security group, network interface, subnet
|
|
10251
10248
|
#
|
|
10252
10249
|
# * **EC2-VPC-EBS**
|
|
10253
10250
|
#
|
|
10254
|
-
# instance, image, security
|
|
10251
|
+
# instance, image, security group, network interface, volume
|
|
10255
10252
|
#
|
|
10256
10253
|
# * **EC2-VPC-EBS-Subnet**
|
|
10257
10254
|
#
|
|
10258
|
-
# instance, image, security
|
|
10255
|
+
# instance, image, security group, network interface, subnet, volume
|
|
10259
10256
|
#
|
|
10260
10257
|
#
|
|
10261
10258
|
#
|
|
@@ -10590,14 +10587,6 @@ module Aws::IAM
|
|
|
10590
10587
|
# For more information on the EC2 scenario options, see [Supported
|
|
10591
10588
|
# platforms][1] in the *Amazon EC2 User Guide*.
|
|
10592
10589
|
#
|
|
10593
|
-
# * **EC2-Classic-InstanceStore**
|
|
10594
|
-
#
|
|
10595
|
-
# instance, image, security group
|
|
10596
|
-
#
|
|
10597
|
-
# * **EC2-Classic-EBS**
|
|
10598
|
-
#
|
|
10599
|
-
# instance, image, security group, volume
|
|
10600
|
-
#
|
|
10601
10590
|
# * **EC2-VPC-InstanceStore**
|
|
10602
10591
|
#
|
|
10603
10592
|
# instance, image, security group, network interface
|
|
@@ -11772,10 +11761,12 @@ module Aws::IAM
|
|
|
11772
11761
|
#
|
|
11773
11762
|
# If the `UserName` is not specified, the user name is determined
|
|
11774
11763
|
# implicitly based on the Amazon Web Services access key ID used to sign
|
|
11775
|
-
# the request.
|
|
11776
|
-
#
|
|
11777
|
-
#
|
|
11778
|
-
# Web Services account
|
|
11764
|
+
# the request. If a temporary access key is used, then `UserName` is
|
|
11765
|
+
# required. If a long-term key is assigned to the user, then `UserName`
|
|
11766
|
+
# is not required. This operation works for access keys under the Amazon
|
|
11767
|
+
# Web Services account. Consequently, you can use this operation to
|
|
11768
|
+
# manage Amazon Web Services account root user credentials even if the
|
|
11769
|
+
# Amazon Web Services account has no associated users.
|
|
11779
11770
|
#
|
|
11780
11771
|
# For information about rotating keys, see [Managing keys and
|
|
11781
11772
|
# certificates][1] in the *IAM User Guide*.
|
|
@@ -13225,7 +13216,7 @@ module Aws::IAM
|
|
|
13225
13216
|
params: params,
|
|
13226
13217
|
config: config)
|
|
13227
13218
|
context[:gem_name] = 'aws-sdk-iam'
|
|
13228
|
-
context[:gem_version] = '1.
|
|
13219
|
+
context[:gem_version] = '1.71.0'
|
|
13229
13220
|
Seahorse::Client::Request.new(handlers, context)
|
|
13230
13221
|
end
|
|
13231
13222
|
|
data/lib/aws-sdk-iam/types.rb
CHANGED
|
@@ -45,7 +45,7 @@ module Aws::IAM
|
|
|
45
45
|
# The Region where the last service access attempt occurred.
|
|
46
46
|
#
|
|
47
47
|
# This field is null if no principals in the reported Organizations
|
|
48
|
-
# entity attempted to access the service within the [
|
|
48
|
+
# entity attempted to access the service within the [tracking
|
|
49
49
|
# period][1].
|
|
50
50
|
#
|
|
51
51
|
#
|
|
@@ -61,7 +61,7 @@ module Aws::IAM
|
|
|
61
61
|
#
|
|
62
62
|
# This field is null if no principals (IAM users, IAM roles, or root
|
|
63
63
|
# users) in the reported Organizations entity attempted to access the
|
|
64
|
-
# service within the [
|
|
64
|
+
# service within the [tracking period][1].
|
|
65
65
|
#
|
|
66
66
|
#
|
|
67
67
|
#
|
|
@@ -75,7 +75,7 @@ module Aws::IAM
|
|
|
75
75
|
# requests.
|
|
76
76
|
#
|
|
77
77
|
# This field is null if no principals in the reported Organizations
|
|
78
|
-
# entity attempted to access the service within the [
|
|
78
|
+
# entity attempted to access the service within the [tracking
|
|
79
79
|
# period][2].
|
|
80
80
|
#
|
|
81
81
|
#
|
|
@@ -87,7 +87,7 @@ module Aws::IAM
|
|
|
87
87
|
# @!attribute [rw] total_authenticated_entities
|
|
88
88
|
# The number of accounts with authenticated principals (root users,
|
|
89
89
|
# IAM users, and IAM roles) that attempted to access the service in
|
|
90
|
-
# the
|
|
90
|
+
# the tracking period.
|
|
91
91
|
# @return [Integer]
|
|
92
92
|
#
|
|
93
93
|
# @see http://docs.aws.amazon.com/goto/WebAPI/iam-2010-05-08/AccessDetail AWS API Documentation
|
|
@@ -2985,7 +2985,7 @@ module Aws::IAM
|
|
|
2985
2985
|
# Amazon Web Services does not report unauthenticated requests.
|
|
2986
2986
|
#
|
|
2987
2987
|
# This field is null if no IAM entities attempted to access the
|
|
2988
|
-
# service within the [
|
|
2988
|
+
# service within the [tracking period][2].
|
|
2989
2989
|
#
|
|
2990
2990
|
#
|
|
2991
2991
|
#
|
|
@@ -10104,7 +10104,7 @@ module Aws::IAM
|
|
|
10104
10104
|
# Amazon Web Services does not report unauthenticated requests.
|
|
10105
10105
|
#
|
|
10106
10106
|
# This field is null if no IAM entities attempted to access the
|
|
10107
|
-
# service within the [
|
|
10107
|
+
# service within the [tracking period][2].
|
|
10108
10108
|
#
|
|
10109
10109
|
#
|
|
10110
10110
|
#
|
|
@@ -10136,7 +10136,7 @@ module Aws::IAM
|
|
|
10136
10136
|
# unauthenticated requests.
|
|
10137
10137
|
#
|
|
10138
10138
|
# This field is null if no IAM entities attempted to access the
|
|
10139
|
-
# service within the [
|
|
10139
|
+
# service within the [tracking period][1].
|
|
10140
10140
|
#
|
|
10141
10141
|
#
|
|
10142
10142
|
#
|
|
@@ -10149,7 +10149,7 @@ module Aws::IAM
|
|
|
10149
10149
|
# unauthenticated requests.
|
|
10150
10150
|
#
|
|
10151
10151
|
# This field is null if no IAM entities attempted to access the
|
|
10152
|
-
# service within the [
|
|
10152
|
+
# service within the [tracking period][1].
|
|
10153
10153
|
#
|
|
10154
10154
|
#
|
|
10155
10155
|
#
|
|
@@ -10161,7 +10161,7 @@ module Aws::IAM
|
|
|
10161
10161
|
# or IAM roles) that have attempted to access the service.
|
|
10162
10162
|
#
|
|
10163
10163
|
# This field is null if no principals attempted to access the service
|
|
10164
|
-
# within the [
|
|
10164
|
+
# within the [tracking period][1].
|
|
10165
10165
|
#
|
|
10166
10166
|
#
|
|
10167
10167
|
#
|
|
@@ -10173,7 +10173,7 @@ module Aws::IAM
|
|
|
10173
10173
|
# access a tracked action within the service.
|
|
10174
10174
|
#
|
|
10175
10175
|
# This field is null if there no tracked actions or if the principal
|
|
10176
|
-
# did not use the tracked actions within the [
|
|
10176
|
+
# did not use the tracked actions within the [tracking period][1].
|
|
10177
10177
|
# This field is also null if the report was generated at the service
|
|
10178
10178
|
# level and not the action level. For more information, see the
|
|
10179
10179
|
# `Granularity` field in GenerateServiceLastAccessedDetails.
|
|
@@ -10624,36 +10624,28 @@ module Aws::IAM
|
|
|
10624
10624
|
# simulation.
|
|
10625
10625
|
#
|
|
10626
10626
|
# Each of the EC2 scenarios requires that you specify instance, image,
|
|
10627
|
-
# and security
|
|
10627
|
+
# and security group resources. If your scenario includes an EBS
|
|
10628
10628
|
# volume, then you must specify that volume as a resource. If the EC2
|
|
10629
|
-
# scenario includes VPC, then you must supply the network
|
|
10629
|
+
# scenario includes VPC, then you must supply the network interface
|
|
10630
10630
|
# resource. If it includes an IP subnet, then you must specify the
|
|
10631
10631
|
# subnet resource. For more information on the EC2 scenario options,
|
|
10632
10632
|
# see [Supported platforms][1] in the *Amazon EC2 User Guide*.
|
|
10633
10633
|
#
|
|
10634
|
-
# * **EC2-Classic-InstanceStore**
|
|
10635
|
-
#
|
|
10636
|
-
# instance, image, security-group
|
|
10637
|
-
#
|
|
10638
|
-
# * **EC2-Classic-EBS**
|
|
10639
|
-
#
|
|
10640
|
-
# instance, image, security-group, volume
|
|
10641
|
-
#
|
|
10642
10634
|
# * **EC2-VPC-InstanceStore**
|
|
10643
10635
|
#
|
|
10644
|
-
# instance, image, security
|
|
10636
|
+
# instance, image, security group, network interface
|
|
10645
10637
|
#
|
|
10646
10638
|
# * **EC2-VPC-InstanceStore-Subnet**
|
|
10647
10639
|
#
|
|
10648
|
-
# instance, image, security
|
|
10640
|
+
# instance, image, security group, network interface, subnet
|
|
10649
10641
|
#
|
|
10650
10642
|
# * **EC2-VPC-EBS**
|
|
10651
10643
|
#
|
|
10652
|
-
# instance, image, security
|
|
10644
|
+
# instance, image, security group, network interface, volume
|
|
10653
10645
|
#
|
|
10654
10646
|
# * **EC2-VPC-EBS-Subnet**
|
|
10655
10647
|
#
|
|
10656
|
-
# instance, image, security
|
|
10648
|
+
# instance, image, security group, network interface, subnet, volume
|
|
10657
10649
|
#
|
|
10658
10650
|
#
|
|
10659
10651
|
#
|
|
@@ -10960,14 +10952,6 @@ module Aws::IAM
|
|
|
10960
10952
|
# subnet resource. For more information on the EC2 scenario options,
|
|
10961
10953
|
# see [Supported platforms][1] in the *Amazon EC2 User Guide*.
|
|
10962
10954
|
#
|
|
10963
|
-
# * **EC2-Classic-InstanceStore**
|
|
10964
|
-
#
|
|
10965
|
-
# instance, image, security group
|
|
10966
|
-
#
|
|
10967
|
-
# * **EC2-Classic-EBS**
|
|
10968
|
-
#
|
|
10969
|
-
# instance, image, security group, volume
|
|
10970
|
-
#
|
|
10971
10955
|
# * **EC2-VPC-InstanceStore**
|
|
10972
10956
|
#
|
|
10973
10957
|
# instance, image, security group, network interface
|
|
@@ -11468,7 +11452,7 @@ module Aws::IAM
|
|
|
11468
11452
|
# requests.
|
|
11469
11453
|
#
|
|
11470
11454
|
# This field is null if no IAM entities attempted to access the
|
|
11471
|
-
# service within the [
|
|
11455
|
+
# service within the [tracking period][2].
|
|
11472
11456
|
#
|
|
11473
11457
|
#
|
|
11474
11458
|
#
|
|
@@ -11482,7 +11466,7 @@ module Aws::IAM
|
|
|
11482
11466
|
# report unauthenticated requests.
|
|
11483
11467
|
#
|
|
11484
11468
|
# This field is null if no IAM entities attempted to access the
|
|
11485
|
-
# service within the [
|
|
11469
|
+
# service within the [tracking period][1].
|
|
11486
11470
|
#
|
|
11487
11471
|
#
|
|
11488
11472
|
#
|
data/lib/aws-sdk-iam.rb
CHANGED
metadata
CHANGED
|
@@ -1,14 +1,14 @@
|
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
|
2
2
|
name: aws-sdk-iam
|
|
3
3
|
version: !ruby/object:Gem::Version
|
|
4
|
-
version: 1.
|
|
4
|
+
version: 1.71.0
|
|
5
5
|
platform: ruby
|
|
6
6
|
authors:
|
|
7
7
|
- Amazon Web Services
|
|
8
8
|
autorequire:
|
|
9
9
|
bindir: bin
|
|
10
10
|
cert_chain: []
|
|
11
|
-
date: 2022-
|
|
11
|
+
date: 2022-10-13 00:00:00.000000000 Z
|
|
12
12
|
dependencies:
|
|
13
13
|
- !ruby/object:Gem::Dependency
|
|
14
14
|
name: aws-sdk-core
|