aws-sdk-iam 1.74.0 → 1.75.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/CHANGELOG.md +5 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-iam/client.rb +130 -28
- data/lib/aws-sdk-iam/endpoint_parameters.rb +3 -0
- data/lib/aws-sdk-iam/endpoint_provider.rb +10 -16
- data/lib/aws-sdk-iam/resource.rb +34 -4
- data/lib/aws-sdk-iam/types.rb +88 -8
- data/lib/aws-sdk-iam/user.rb +17 -2
- data/lib/aws-sdk-iam.rb +1 -1
- metadata +2 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: ef84c0d91723ced85c4f386e729ccce65d8015eb3a211e43ecfd82e3f0e66704
|
4
|
+
data.tar.gz: 1bbdbb017d13ce2fcf7cf1a7ff11206be46086df7c6757474e15bdf082a97d0b
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: e5de3cb4467504346c82b05c019201baa34aa21eb77309ae1fc3a382c33536dfa22dbc450ef428004de1ca85429777076a8345a43784c8e93b34b9dec09d5698
|
7
|
+
data.tar.gz: 239df2e18c8248c0456b5ace08e77991507f75223c74169ed5cc4f42effd64c482c2ec7bcf9c64ae3484b8150c5789b9c393f6b94bdba4728112abb741bcbf4c
|
data/CHANGELOG.md
CHANGED
data/VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
1.
|
1
|
+
1.75.0
|
data/lib/aws-sdk-iam/client.rb
CHANGED
@@ -1298,10 +1298,10 @@ module Aws::IAM
|
|
1298
1298
|
# <note markdown="1"> Amazon Web Services secures communication with some OIDC identity
|
1299
1299
|
# providers (IdPs) through our library of trusted certificate
|
1300
1300
|
# authorities (CAs) instead of using a certificate thumbprint to verify
|
1301
|
-
# your IdP server certificate. These OIDC IdPs include Google,
|
1302
|
-
# that use an Amazon S3 bucket to host a JSON Web Key Set
|
1303
|
-
# endpoint. In these cases, your legacy thumbprint remains in
|
1304
|
-
# configuration, but is no longer used for validation.
|
1301
|
+
# your IdP server certificate. These OIDC IdPs include Google, Auth0,
|
1302
|
+
# and those that use an Amazon S3 bucket to host a JSON Web Key Set
|
1303
|
+
# (JWKS) endpoint. In these cases, your legacy thumbprint remains in
|
1304
|
+
# your configuration, but is no longer used for validation.
|
1305
1305
|
#
|
1306
1306
|
# </note>
|
1307
1307
|
#
|
@@ -1790,8 +1790,23 @@ module Aws::IAM
|
|
1790
1790
|
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html
|
1791
1791
|
#
|
1792
1792
|
# @option params [String] :permissions_boundary
|
1793
|
-
# The ARN of the policy that is used to set the permissions
|
1794
|
-
# the role.
|
1793
|
+
# The ARN of the managed policy that is used to set the permissions
|
1794
|
+
# boundary for the role.
|
1795
|
+
#
|
1796
|
+
# A permissions boundary policy defines the maximum permissions that
|
1797
|
+
# identity-based policies can grant to an entity, but does not grant
|
1798
|
+
# permissions. Permissions boundaries do not define the maximum
|
1799
|
+
# permissions that a resource-based policy can grant to an entity. To
|
1800
|
+
# learn more, see [Permissions boundaries for IAM entities][1] in the
|
1801
|
+
# *IAM User Guide*.
|
1802
|
+
#
|
1803
|
+
# For more information about policy types, see [Policy types ][2] in the
|
1804
|
+
# *IAM User Guide*.
|
1805
|
+
#
|
1806
|
+
#
|
1807
|
+
#
|
1808
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
|
1809
|
+
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
|
1795
1810
|
#
|
1796
1811
|
# @option params [Array<Types::Tag>] :tags
|
1797
1812
|
# A list of tags that you want to attach to the new role. Each tag
|
@@ -2183,8 +2198,23 @@ module Aws::IAM
|
|
2183
2198
|
# create resources named both "MyResource" and "myresource".
|
2184
2199
|
#
|
2185
2200
|
# @option params [String] :permissions_boundary
|
2186
|
-
# The ARN of the policy that is used to set the permissions
|
2187
|
-
# the user.
|
2201
|
+
# The ARN of the managed policy that is used to set the permissions
|
2202
|
+
# boundary for the user.
|
2203
|
+
#
|
2204
|
+
# A permissions boundary policy defines the maximum permissions that
|
2205
|
+
# identity-based policies can grant to an entity, but does not grant
|
2206
|
+
# permissions. Permissions boundaries do not define the maximum
|
2207
|
+
# permissions that a resource-based policy can grant to an entity. To
|
2208
|
+
# learn more, see [Permissions boundaries for IAM entities][1] in the
|
2209
|
+
# *IAM User Guide*.
|
2210
|
+
#
|
2211
|
+
# For more information about policy types, see [Policy types ][2] in the
|
2212
|
+
# *IAM User Guide*.
|
2213
|
+
#
|
2214
|
+
#
|
2215
|
+
#
|
2216
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
|
2217
|
+
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
|
2188
2218
|
#
|
2189
2219
|
# @option params [Array<Types::Tag>] :tags
|
2190
2220
|
# A list of tags that you want to attach to the new user. Each tag
|
@@ -2916,9 +2946,20 @@ module Aws::IAM
|
|
2916
2946
|
req.send_request(options)
|
2917
2947
|
end
|
2918
2948
|
|
2919
|
-
# Deletes the specified role.
|
2920
|
-
#
|
2921
|
-
#
|
2949
|
+
# Deletes the specified role. Unlike the Amazon Web Services Management
|
2950
|
+
# Console, when you delete a role programmatically, you must delete the
|
2951
|
+
# items attached to the role manually, or the deletion fails. For more
|
2952
|
+
# information, see [Deleting an IAM role][1]. Before attempting to
|
2953
|
+
# delete a role, remove the following attached items:
|
2954
|
+
#
|
2955
|
+
# * Inline policies (DeleteRolePolicy)
|
2956
|
+
#
|
2957
|
+
# * Attached managed policies (DetachRolePolicy)
|
2958
|
+
#
|
2959
|
+
# * Instance profile (RemoveRoleFromInstanceProfile)
|
2960
|
+
#
|
2961
|
+
# * Optional – Delete instance profile after detaching from role for
|
2962
|
+
# resource clean up (DeleteInstanceProfile)
|
2922
2963
|
#
|
2923
2964
|
# Make sure that you do not have any Amazon EC2 instances running with
|
2924
2965
|
# the role you are about to delete. Deleting a role or instance profile
|
@@ -2927,7 +2968,7 @@ module Aws::IAM
|
|
2927
2968
|
#
|
2928
2969
|
#
|
2929
2970
|
#
|
2930
|
-
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
2971
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_manage_delete.html#roles-managingrole-deleting-cli
|
2931
2972
|
#
|
2932
2973
|
# @option params [required, String] :role_name
|
2933
2974
|
# The name of the role to delete.
|
@@ -9356,8 +9397,23 @@ module Aws::IAM
|
|
9356
9397
|
# to set the permissions boundary.
|
9357
9398
|
#
|
9358
9399
|
# @option params [required, String] :permissions_boundary
|
9359
|
-
# The ARN of the policy that is used to set the permissions
|
9360
|
-
# the role.
|
9400
|
+
# The ARN of the managed policy that is used to set the permissions
|
9401
|
+
# boundary for the role.
|
9402
|
+
#
|
9403
|
+
# A permissions boundary policy defines the maximum permissions that
|
9404
|
+
# identity-based policies can grant to an entity, but does not grant
|
9405
|
+
# permissions. Permissions boundaries do not define the maximum
|
9406
|
+
# permissions that a resource-based policy can grant to an entity. To
|
9407
|
+
# learn more, see [Permissions boundaries for IAM entities][1] in the
|
9408
|
+
# *IAM User Guide*.
|
9409
|
+
#
|
9410
|
+
# For more information about policy types, see [Policy types ][2] in the
|
9411
|
+
# *IAM User Guide*.
|
9412
|
+
#
|
9413
|
+
#
|
9414
|
+
#
|
9415
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
|
9416
|
+
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
|
9361
9417
|
#
|
9362
9418
|
# @return [Struct] Returns an empty {Seahorse::Client::Response response}.
|
9363
9419
|
#
|
@@ -9509,8 +9565,23 @@ module Aws::IAM
|
|
9509
9565
|
# to set the permissions boundary.
|
9510
9566
|
#
|
9511
9567
|
# @option params [required, String] :permissions_boundary
|
9512
|
-
# The ARN of the policy that is used to set the permissions
|
9513
|
-
# the user.
|
9568
|
+
# The ARN of the managed policy that is used to set the permissions
|
9569
|
+
# boundary for the user.
|
9570
|
+
#
|
9571
|
+
# A permissions boundary policy defines the maximum permissions that
|
9572
|
+
# identity-based policies can grant to an entity, but does not grant
|
9573
|
+
# permissions. Permissions boundaries do not define the maximum
|
9574
|
+
# permissions that a resource-based policy can grant to an entity. To
|
9575
|
+
# learn more, see [Permissions boundaries for IAM entities][1] in the
|
9576
|
+
# *IAM User Guide*.
|
9577
|
+
#
|
9578
|
+
# For more information about policy types, see [Policy types ][2] in the
|
9579
|
+
# *IAM User Guide*.
|
9580
|
+
#
|
9581
|
+
#
|
9582
|
+
#
|
9583
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
|
9584
|
+
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
|
9514
9585
|
#
|
9515
9586
|
# @return [Struct] Returns an empty {Seahorse::Client::Response response}.
|
9516
9587
|
#
|
@@ -10071,9 +10142,16 @@ module Aws::IAM
|
|
10071
10142
|
# If the output is long, you can use `MaxItems` and `Marker` parameters
|
10072
10143
|
# to paginate the results.
|
10073
10144
|
#
|
10074
|
-
#
|
10075
|
-
#
|
10076
|
-
#
|
10145
|
+
# <note markdown="1"> The IAM policy simulator evaluates statements in the identity-based
|
10146
|
+
# policy and the inputs that you provide during simulation. The policy
|
10147
|
+
# simulator results can differ from your live Amazon Web Services
|
10148
|
+
# environment. We recommend that you check your policies against your
|
10149
|
+
# live Amazon Web Services environment after testing using the policy
|
10150
|
+
# simulator to confirm that you have the desired results. For more
|
10151
|
+
# information about using the policy simulator, see [Testing IAM
|
10152
|
+
# policies with the IAM policy simulator ][1]in the *IAM User Guide*.
|
10153
|
+
#
|
10154
|
+
# </note>
|
10077
10155
|
#
|
10078
10156
|
#
|
10079
10157
|
#
|
@@ -10173,6 +10251,10 @@ module Aws::IAM
|
|
10173
10251
|
# For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
|
10174
10252
|
# in the *Amazon Web Services General Reference*.
|
10175
10253
|
#
|
10254
|
+
# <note markdown="1"> Simulation of resource-based policies isn't supported for IAM roles.
|
10255
|
+
#
|
10256
|
+
# </note>
|
10257
|
+
#
|
10176
10258
|
#
|
10177
10259
|
#
|
10178
10260
|
# [1]: https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html
|
@@ -10200,6 +10282,10 @@ module Aws::IAM
|
|
10200
10282
|
# * The special characters tab (`\u0009`), line feed (`\u000A`), and
|
10201
10283
|
# carriage return (`\u000D`)
|
10202
10284
|
#
|
10285
|
+
# <note markdown="1"> Simulation of resource-based policies isn't supported for IAM roles.
|
10286
|
+
#
|
10287
|
+
# </note>
|
10288
|
+
#
|
10203
10289
|
#
|
10204
10290
|
#
|
10205
10291
|
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-quotas-entity-length
|
@@ -10382,7 +10468,8 @@ module Aws::IAM
|
|
10382
10468
|
# instead.
|
10383
10469
|
#
|
10384
10470
|
# You can also optionally include one resource-based policy to be
|
10385
|
-
# evaluated with each of the resources included in the simulation
|
10471
|
+
# evaluated with each of the resources included in the simulation for
|
10472
|
+
# IAM users only.
|
10386
10473
|
#
|
10387
10474
|
# The simulation does not perform the API operations; it only checks the
|
10388
10475
|
# authorization to determine if the simulated policies allow or deny the
|
@@ -10403,9 +10490,16 @@ module Aws::IAM
|
|
10403
10490
|
# If the output is long, you can use the `MaxItems` and `Marker`
|
10404
10491
|
# parameters to paginate the results.
|
10405
10492
|
#
|
10406
|
-
#
|
10407
|
-
#
|
10408
|
-
#
|
10493
|
+
# <note markdown="1"> The IAM policy simulator evaluates statements in the identity-based
|
10494
|
+
# policy and the inputs that you provide during simulation. The policy
|
10495
|
+
# simulator results can differ from your live Amazon Web Services
|
10496
|
+
# environment. We recommend that you check your policies against your
|
10497
|
+
# live Amazon Web Services environment after testing using the policy
|
10498
|
+
# simulator to confirm that you have the desired results. For more
|
10499
|
+
# information about using the policy simulator, see [Testing IAM
|
10500
|
+
# policies with the IAM policy simulator ][1]in the *IAM User Guide*.
|
10501
|
+
#
|
10502
|
+
# </note>
|
10409
10503
|
#
|
10410
10504
|
#
|
10411
10505
|
#
|
@@ -10511,6 +10605,10 @@ module Aws::IAM
|
|
10511
10605
|
# For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
|
10512
10606
|
# in the *Amazon Web Services General Reference*.
|
10513
10607
|
#
|
10608
|
+
# <note markdown="1"> Simulation of resource-based policies isn't supported for IAM roles.
|
10609
|
+
#
|
10610
|
+
# </note>
|
10611
|
+
#
|
10514
10612
|
#
|
10515
10613
|
#
|
10516
10614
|
# [1]: https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html
|
@@ -10538,6 +10636,10 @@ module Aws::IAM
|
|
10538
10636
|
# * The special characters tab (`\u0009`), line feed (`\u000A`), and
|
10539
10637
|
# carriage return (`\u000D`)
|
10540
10638
|
#
|
10639
|
+
# <note markdown="1"> Simulation of resource-based policies isn't supported for IAM roles.
|
10640
|
+
#
|
10641
|
+
# </note>
|
10642
|
+
#
|
10541
10643
|
#
|
10542
10644
|
#
|
10543
10645
|
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-quotas-entity-length
|
@@ -12255,10 +12357,10 @@ module Aws::IAM
|
|
12255
12357
|
# <note markdown="1"> Amazon Web Services secures communication with some OIDC identity
|
12256
12358
|
# providers (IdPs) through our library of trusted certificate
|
12257
12359
|
# authorities (CAs) instead of using a certificate thumbprint to verify
|
12258
|
-
# your IdP server certificate. These OIDC IdPs include Google,
|
12259
|
-
# that use an Amazon S3 bucket to host a JSON Web Key Set
|
12260
|
-
# endpoint. In these cases, your legacy thumbprint remains in
|
12261
|
-
# configuration, but is no longer used for validation.
|
12360
|
+
# your IdP server certificate. These OIDC IdPs include Google, Auth0,
|
12361
|
+
# and those that use an Amazon S3 bucket to host a JSON Web Key Set
|
12362
|
+
# (JWKS) endpoint. In these cases, your legacy thumbprint remains in
|
12363
|
+
# your configuration, but is no longer used for validation.
|
12262
12364
|
#
|
12263
12365
|
# </note>
|
12264
12366
|
#
|
@@ -13233,7 +13335,7 @@ module Aws::IAM
|
|
13233
13335
|
params: params,
|
13234
13336
|
config: config)
|
13235
13337
|
context[:gem_name] = 'aws-sdk-iam'
|
13236
|
-
context[:gem_version] = '1.
|
13338
|
+
context[:gem_version] = '1.75.0'
|
13237
13339
|
Seahorse::Client::Request.new(handlers, context)
|
13238
13340
|
end
|
13239
13341
|
|
@@ -50,6 +50,9 @@ module Aws::IAM
|
|
50
50
|
|
51
51
|
def initialize(options = {})
|
52
52
|
self[:region] = options[:region]
|
53
|
+
if self[:region].nil?
|
54
|
+
raise ArgumentError, "Missing required EndpointParameter: :region"
|
55
|
+
end
|
53
56
|
self[:use_dual_stack] = options[:use_dual_stack]
|
54
57
|
self[:use_dual_stack] = false if self[:use_dual_stack].nil?
|
55
58
|
if self[:use_dual_stack].nil?
|
@@ -15,7 +15,7 @@ module Aws::IAM
|
|
15
15
|
use_fips = parameters.use_fips
|
16
16
|
endpoint = parameters.endpoint
|
17
17
|
if (partition_result = Aws::Endpoints::Matchers.aws_partition(region))
|
18
|
-
if Aws::Endpoints::Matchers.set?(endpoint)
|
18
|
+
if Aws::Endpoints::Matchers.set?(endpoint)
|
19
19
|
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
|
20
20
|
raise ArgumentError, "Invalid Configuration: FIPS and custom endpoint are not supported"
|
21
21
|
end
|
@@ -27,7 +27,7 @@ module Aws::IAM
|
|
27
27
|
if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws")
|
28
28
|
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true) && Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
|
29
29
|
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS")) && Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
|
30
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.api.aws", headers: {}, properties: {
|
30
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.api.aws", headers: {}, properties: {})
|
31
31
|
end
|
32
32
|
raise ArgumentError, "FIPS and DualStack are enabled, but this partition does not support one or both"
|
33
33
|
end
|
@@ -39,7 +39,7 @@ module Aws::IAM
|
|
39
39
|
end
|
40
40
|
if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
|
41
41
|
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
|
42
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.api.aws", headers: {}, properties: {
|
42
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.api.aws", headers: {}, properties: {})
|
43
43
|
end
|
44
44
|
raise ArgumentError, "DualStack is enabled but this partition does not support DualStack"
|
45
45
|
end
|
@@ -48,19 +48,19 @@ module Aws::IAM
|
|
48
48
|
if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws-cn")
|
49
49
|
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true) && Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
|
50
50
|
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS")) && Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
|
51
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.api.amazonwebservices.com.cn", headers: {}, properties: {
|
51
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.api.amazonwebservices.com.cn", headers: {}, properties: {})
|
52
52
|
end
|
53
53
|
raise ArgumentError, "FIPS and DualStack are enabled, but this partition does not support one or both"
|
54
54
|
end
|
55
55
|
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
|
56
56
|
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
|
57
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.amazonaws.com.cn", headers: {}, properties: {
|
57
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.amazonaws.com.cn", headers: {}, properties: {})
|
58
58
|
end
|
59
59
|
raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
|
60
60
|
end
|
61
61
|
if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
|
62
62
|
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
|
63
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.api.amazonwebservices.com.cn", headers: {}, properties: {
|
63
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.api.amazonwebservices.com.cn", headers: {}, properties: {})
|
64
64
|
end
|
65
65
|
raise ArgumentError, "DualStack is enabled but this partition does not support DualStack"
|
66
66
|
end
|
@@ -69,7 +69,7 @@ module Aws::IAM
|
|
69
69
|
if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws-us-gov")
|
70
70
|
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true) && Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
|
71
71
|
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS")) && Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
|
72
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.api.aws", headers: {}, properties: {
|
72
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.api.aws", headers: {}, properties: {})
|
73
73
|
end
|
74
74
|
raise ArgumentError, "FIPS and DualStack are enabled, but this partition does not support one or both"
|
75
75
|
end
|
@@ -81,7 +81,7 @@ module Aws::IAM
|
|
81
81
|
end
|
82
82
|
if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
|
83
83
|
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
|
84
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.api.aws", headers: {}, properties: {
|
84
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.api.aws", headers: {}, properties: {})
|
85
85
|
end
|
86
86
|
raise ArgumentError, "DualStack is enabled but this partition does not support DualStack"
|
87
87
|
end
|
@@ -90,7 +90,7 @@ module Aws::IAM
|
|
90
90
|
if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws-iso")
|
91
91
|
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
|
92
92
|
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
|
93
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.c2s.ic.gov", headers: {}, properties: {
|
93
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.c2s.ic.gov", headers: {}, properties: {})
|
94
94
|
end
|
95
95
|
raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
|
96
96
|
end
|
@@ -99,7 +99,7 @@ module Aws::IAM
|
|
99
99
|
if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws-iso-b")
|
100
100
|
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
|
101
101
|
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
|
102
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.sc2s.sgov.gov", headers: {}, properties: {
|
102
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.sc2s.sgov.gov", headers: {}, properties: {})
|
103
103
|
end
|
104
104
|
raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
|
105
105
|
end
|
@@ -113,15 +113,9 @@ module Aws::IAM
|
|
113
113
|
end
|
114
114
|
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
|
115
115
|
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
|
116
|
-
if Aws::Endpoints::Matchers.string_equals?(region, "iam")
|
117
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-east-1", "signingName"=>"iam"}]})
|
118
|
-
end
|
119
116
|
if Aws::Endpoints::Matchers.string_equals?(region, "aws-global")
|
120
117
|
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-east-1", "signingName"=>"iam"}]})
|
121
118
|
end
|
122
|
-
if Aws::Endpoints::Matchers.string_equals?(region, "iam-govcloud")
|
123
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam.us-gov.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-gov-west-1", "signingName"=>"iam"}]})
|
124
|
-
end
|
125
119
|
if Aws::Endpoints::Matchers.string_equals?(region, "aws-us-gov-global")
|
126
120
|
return Aws::Endpoints::Endpoint.new(url: "https://iam.us-gov.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-gov-west-1", "signingName"=>"iam"}]})
|
127
121
|
end
|
data/lib/aws-sdk-iam/resource.rb
CHANGED
@@ -505,8 +505,23 @@ module Aws::IAM
|
|
505
505
|
#
|
506
506
|
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html
|
507
507
|
# @option options [String] :permissions_boundary
|
508
|
-
# The ARN of the policy that is used to set the permissions
|
509
|
-
# the role.
|
508
|
+
# The ARN of the managed policy that is used to set the permissions
|
509
|
+
# boundary for the role.
|
510
|
+
#
|
511
|
+
# A permissions boundary policy defines the maximum permissions that
|
512
|
+
# identity-based policies can grant to an entity, but does not grant
|
513
|
+
# permissions. Permissions boundaries do not define the maximum
|
514
|
+
# permissions that a resource-based policy can grant to an entity. To
|
515
|
+
# learn more, see [Permissions boundaries for IAM entities][1] in the
|
516
|
+
# *IAM User Guide*.
|
517
|
+
#
|
518
|
+
# For more information about policy types, see [Policy types ][2] in the
|
519
|
+
# *IAM User Guide*.
|
520
|
+
#
|
521
|
+
#
|
522
|
+
#
|
523
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
|
524
|
+
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
|
510
525
|
# @option options [Array<Types::Tag>] :tags
|
511
526
|
# A list of tags that you want to attach to the new role. Each tag
|
512
527
|
# consists of a key name and an associated value. For more information
|
@@ -808,8 +823,23 @@ module Aws::IAM
|
|
808
823
|
# account. Names are not distinguished by case. For example, you cannot
|
809
824
|
# create resources named both "MyResource" and "myresource".
|
810
825
|
# @option options [String] :permissions_boundary
|
811
|
-
# The ARN of the policy that is used to set the permissions
|
812
|
-
# the user.
|
826
|
+
# The ARN of the managed policy that is used to set the permissions
|
827
|
+
# boundary for the user.
|
828
|
+
#
|
829
|
+
# A permissions boundary policy defines the maximum permissions that
|
830
|
+
# identity-based policies can grant to an entity, but does not grant
|
831
|
+
# permissions. Permissions boundaries do not define the maximum
|
832
|
+
# permissions that a resource-based policy can grant to an entity. To
|
833
|
+
# learn more, see [Permissions boundaries for IAM entities][1] in the
|
834
|
+
# *IAM User Guide*.
|
835
|
+
#
|
836
|
+
# For more information about policy types, see [Policy types ][2] in the
|
837
|
+
# *IAM User Guide*.
|
838
|
+
#
|
839
|
+
#
|
840
|
+
#
|
841
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
|
842
|
+
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
|
813
843
|
# @option options [Array<Types::Tag>] :tags
|
814
844
|
# A list of tags that you want to attach to the new user. Each tag
|
815
845
|
# consists of a key name and an associated value. For more information
|
data/lib/aws-sdk-iam/types.rb
CHANGED
@@ -1250,8 +1250,23 @@ module Aws::IAM
|
|
1250
1250
|
# @return [Integer]
|
1251
1251
|
#
|
1252
1252
|
# @!attribute [rw] permissions_boundary
|
1253
|
-
# The ARN of the policy that is used to set the permissions
|
1254
|
-
# for the role.
|
1253
|
+
# The ARN of the managed policy that is used to set the permissions
|
1254
|
+
# boundary for the role.
|
1255
|
+
#
|
1256
|
+
# A permissions boundary policy defines the maximum permissions that
|
1257
|
+
# identity-based policies can grant to an entity, but does not grant
|
1258
|
+
# permissions. Permissions boundaries do not define the maximum
|
1259
|
+
# permissions that a resource-based policy can grant to an entity. To
|
1260
|
+
# learn more, see [Permissions boundaries for IAM entities][1] in the
|
1261
|
+
# *IAM User Guide*.
|
1262
|
+
#
|
1263
|
+
# For more information about policy types, see [Policy types ][2] in
|
1264
|
+
# the *IAM User Guide*.
|
1265
|
+
#
|
1266
|
+
#
|
1267
|
+
#
|
1268
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
|
1269
|
+
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
|
1255
1270
|
# @return [String]
|
1256
1271
|
#
|
1257
1272
|
# @!attribute [rw] tags
|
@@ -1516,8 +1531,23 @@ module Aws::IAM
|
|
1516
1531
|
# @return [String]
|
1517
1532
|
#
|
1518
1533
|
# @!attribute [rw] permissions_boundary
|
1519
|
-
# The ARN of the policy that is used to set the permissions
|
1520
|
-
# for the user.
|
1534
|
+
# The ARN of the managed policy that is used to set the permissions
|
1535
|
+
# boundary for the user.
|
1536
|
+
#
|
1537
|
+
# A permissions boundary policy defines the maximum permissions that
|
1538
|
+
# identity-based policies can grant to an entity, but does not grant
|
1539
|
+
# permissions. Permissions boundaries do not define the maximum
|
1540
|
+
# permissions that a resource-based policy can grant to an entity. To
|
1541
|
+
# learn more, see [Permissions boundaries for IAM entities][1] in the
|
1542
|
+
# *IAM User Guide*.
|
1543
|
+
#
|
1544
|
+
# For more information about policy types, see [Policy types ][2] in
|
1545
|
+
# the *IAM User Guide*.
|
1546
|
+
#
|
1547
|
+
#
|
1548
|
+
#
|
1549
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
|
1550
|
+
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
|
1521
1551
|
# @return [String]
|
1522
1552
|
#
|
1523
1553
|
# @!attribute [rw] tags
|
@@ -8130,8 +8160,23 @@ module Aws::IAM
|
|
8130
8160
|
# @return [String]
|
8131
8161
|
#
|
8132
8162
|
# @!attribute [rw] permissions_boundary
|
8133
|
-
# The ARN of the policy that is used to set the permissions
|
8134
|
-
# for the role.
|
8163
|
+
# The ARN of the managed policy that is used to set the permissions
|
8164
|
+
# boundary for the role.
|
8165
|
+
#
|
8166
|
+
# A permissions boundary policy defines the maximum permissions that
|
8167
|
+
# identity-based policies can grant to an entity, but does not grant
|
8168
|
+
# permissions. Permissions boundaries do not define the maximum
|
8169
|
+
# permissions that a resource-based policy can grant to an entity. To
|
8170
|
+
# learn more, see [Permissions boundaries for IAM entities][1] in the
|
8171
|
+
# *IAM User Guide*.
|
8172
|
+
#
|
8173
|
+
# For more information about policy types, see [Policy types ][2] in
|
8174
|
+
# the *IAM User Guide*.
|
8175
|
+
#
|
8176
|
+
#
|
8177
|
+
#
|
8178
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
|
8179
|
+
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
|
8135
8180
|
# @return [String]
|
8136
8181
|
#
|
8137
8182
|
# @see http://docs.aws.amazon.com/goto/WebAPI/iam-2010-05-08/PutRolePermissionsBoundaryRequest AWS API Documentation
|
@@ -8210,8 +8255,23 @@ module Aws::IAM
|
|
8210
8255
|
# @return [String]
|
8211
8256
|
#
|
8212
8257
|
# @!attribute [rw] permissions_boundary
|
8213
|
-
# The ARN of the policy that is used to set the permissions
|
8214
|
-
# for the user.
|
8258
|
+
# The ARN of the managed policy that is used to set the permissions
|
8259
|
+
# boundary for the user.
|
8260
|
+
#
|
8261
|
+
# A permissions boundary policy defines the maximum permissions that
|
8262
|
+
# identity-based policies can grant to an entity, but does not grant
|
8263
|
+
# permissions. Permissions boundaries do not define the maximum
|
8264
|
+
# permissions that a resource-based policy can grant to an entity. To
|
8265
|
+
# learn more, see [Permissions boundaries for IAM entities][1] in the
|
8266
|
+
# *IAM User Guide*.
|
8267
|
+
#
|
8268
|
+
# For more information about policy types, see [Policy types ][2] in
|
8269
|
+
# the *IAM User Guide*.
|
8270
|
+
#
|
8271
|
+
#
|
8272
|
+
#
|
8273
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
|
8274
|
+
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
|
8215
8275
|
# @return [String]
|
8216
8276
|
#
|
8217
8277
|
# @see http://docs.aws.amazon.com/goto/WebAPI/iam-2010-05-08/PutUserPermissionsBoundaryRequest AWS API Documentation
|
@@ -9504,6 +9564,11 @@ module Aws::IAM
|
|
9504
9564
|
# For more information about ARNs, see [Amazon Resource Names
|
9505
9565
|
# (ARNs)][1] in the *Amazon Web Services General Reference*.
|
9506
9566
|
#
|
9567
|
+
# <note markdown="1"> Simulation of resource-based policies isn't supported for IAM
|
9568
|
+
# roles.
|
9569
|
+
#
|
9570
|
+
# </note>
|
9571
|
+
#
|
9507
9572
|
#
|
9508
9573
|
#
|
9509
9574
|
# [1]: https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html
|
@@ -9532,6 +9597,11 @@ module Aws::IAM
|
|
9532
9597
|
# * The special characters tab (`\u0009`), line feed (`\u000A`), and
|
9533
9598
|
# carriage return (`\u000D`)
|
9534
9599
|
#
|
9600
|
+
# <note markdown="1"> Simulation of resource-based policies isn't supported for IAM
|
9601
|
+
# roles.
|
9602
|
+
#
|
9603
|
+
# </note>
|
9604
|
+
#
|
9535
9605
|
#
|
9536
9606
|
#
|
9537
9607
|
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-quotas-entity-length
|
@@ -9789,6 +9859,11 @@ module Aws::IAM
|
|
9789
9859
|
# For more information about ARNs, see [Amazon Resource Names
|
9790
9860
|
# (ARNs)][1] in the *Amazon Web Services General Reference*.
|
9791
9861
|
#
|
9862
|
+
# <note markdown="1"> Simulation of resource-based policies isn't supported for IAM
|
9863
|
+
# roles.
|
9864
|
+
#
|
9865
|
+
# </note>
|
9866
|
+
#
|
9792
9867
|
#
|
9793
9868
|
#
|
9794
9869
|
# [1]: https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html
|
@@ -9817,6 +9892,11 @@ module Aws::IAM
|
|
9817
9892
|
# * The special characters tab (`\u0009`), line feed (`\u000A`), and
|
9818
9893
|
# carriage return (`\u000D`)
|
9819
9894
|
#
|
9895
|
+
# <note markdown="1"> Simulation of resource-based policies isn't supported for IAM
|
9896
|
+
# roles.
|
9897
|
+
#
|
9898
|
+
# </note>
|
9899
|
+
#
|
9820
9900
|
#
|
9821
9901
|
#
|
9822
9902
|
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-quotas-entity-length
|
data/lib/aws-sdk-iam/user.rb
CHANGED
@@ -379,8 +379,23 @@ module Aws::IAM
|
|
379
379
|
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html
|
380
380
|
# [2]: http://wikipedia.org/wiki/regex
|
381
381
|
# @option options [String] :permissions_boundary
|
382
|
-
# The ARN of the policy that is used to set the permissions
|
383
|
-
# the user.
|
382
|
+
# The ARN of the managed policy that is used to set the permissions
|
383
|
+
# boundary for the user.
|
384
|
+
#
|
385
|
+
# A permissions boundary policy defines the maximum permissions that
|
386
|
+
# identity-based policies can grant to an entity, but does not grant
|
387
|
+
# permissions. Permissions boundaries do not define the maximum
|
388
|
+
# permissions that a resource-based policy can grant to an entity. To
|
389
|
+
# learn more, see [Permissions boundaries for IAM entities][1] in the
|
390
|
+
# *IAM User Guide*.
|
391
|
+
#
|
392
|
+
# For more information about policy types, see [Policy types ][2] in the
|
393
|
+
# *IAM User Guide*.
|
394
|
+
#
|
395
|
+
#
|
396
|
+
#
|
397
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
|
398
|
+
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
|
384
399
|
# @option options [Array<Types::Tag>] :tags
|
385
400
|
# A list of tags that you want to attach to the new user. Each tag
|
386
401
|
# consists of a key name and an associated value. For more information
|
data/lib/aws-sdk-iam.rb
CHANGED
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: aws-sdk-iam
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 1.
|
4
|
+
version: 1.75.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Amazon Web Services
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2023-01
|
11
|
+
date: 2023-02-01 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: aws-sdk-core
|