aws-sdk-iam 1.74.0 → 1.75.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 772aef53edcb2dcfd825515204fcb855d4c189accf178b15c21949a755bac3d5
4
- data.tar.gz: 1d8109abe12a8082ad44f2672d1fd3189dac90dd49cd947992997f80c7f861a5
3
+ metadata.gz: ef84c0d91723ced85c4f386e729ccce65d8015eb3a211e43ecfd82e3f0e66704
4
+ data.tar.gz: 1bbdbb017d13ce2fcf7cf1a7ff11206be46086df7c6757474e15bdf082a97d0b
5
5
  SHA512:
6
- metadata.gz: c345d0c8a4cfdc02be9938560f8cb82196176c14fd9822a903e8e032f5aae4423d2af3a99bbf88c2c14be01fc86f3ef2399d9d933ce6ac2333ff97337a239dfb
7
- data.tar.gz: f8f21b795a257ece2eda80c18ec9cf8a0b68a1034982243423a12991fa10db563dbfdfdc5d5fc515c3b4d97bd15d23c420d4fd1b63cdf8d92a5dc28f780e3d0e
6
+ metadata.gz: e5de3cb4467504346c82b05c019201baa34aa21eb77309ae1fc3a382c33536dfa22dbc450ef428004de1ca85429777076a8345a43784c8e93b34b9dec09d5698
7
+ data.tar.gz: 239df2e18c8248c0456b5ace08e77991507f75223c74169ed5cc4f42effd64c482c2ec7bcf9c64ae3484b8150c5789b9c393f6b94bdba4728112abb741bcbf4c
data/CHANGELOG.md CHANGED
@@ -1,6 +1,11 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.75.0 (2023-02-01)
5
+ ------------------
6
+
7
+ * Feature - Documentation updates for AWS Identity and Access Management (IAM).
8
+
4
9
  1.74.0 (2023-01-18)
5
10
  ------------------
6
11
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.74.0
1
+ 1.75.0
@@ -1298,10 +1298,10 @@ module Aws::IAM
1298
1298
  # <note markdown="1"> Amazon Web Services secures communication with some OIDC identity
1299
1299
  # providers (IdPs) through our library of trusted certificate
1300
1300
  # authorities (CAs) instead of using a certificate thumbprint to verify
1301
- # your IdP server certificate. These OIDC IdPs include Google, and those
1302
- # that use an Amazon S3 bucket to host a JSON Web Key Set (JWKS)
1303
- # endpoint. In these cases, your legacy thumbprint remains in your
1304
- # configuration, but is no longer used for validation.
1301
+ # your IdP server certificate. These OIDC IdPs include Google, Auth0,
1302
+ # and those that use an Amazon S3 bucket to host a JSON Web Key Set
1303
+ # (JWKS) endpoint. In these cases, your legacy thumbprint remains in
1304
+ # your configuration, but is no longer used for validation.
1305
1305
  #
1306
1306
  # </note>
1307
1307
  #
@@ -1790,8 +1790,23 @@ module Aws::IAM
1790
1790
  # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html
1791
1791
  #
1792
1792
  # @option params [String] :permissions_boundary
1793
- # The ARN of the policy that is used to set the permissions boundary for
1794
- # the role.
1793
+ # The ARN of the managed policy that is used to set the permissions
1794
+ # boundary for the role.
1795
+ #
1796
+ # A permissions boundary policy defines the maximum permissions that
1797
+ # identity-based policies can grant to an entity, but does not grant
1798
+ # permissions. Permissions boundaries do not define the maximum
1799
+ # permissions that a resource-based policy can grant to an entity. To
1800
+ # learn more, see [Permissions boundaries for IAM entities][1] in the
1801
+ # *IAM User Guide*.
1802
+ #
1803
+ # For more information about policy types, see [Policy types ][2] in the
1804
+ # *IAM User Guide*.
1805
+ #
1806
+ #
1807
+ #
1808
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
1809
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
1795
1810
  #
1796
1811
  # @option params [Array<Types::Tag>] :tags
1797
1812
  # A list of tags that you want to attach to the new role. Each tag
@@ -2183,8 +2198,23 @@ module Aws::IAM
2183
2198
  # create resources named both "MyResource" and "myresource".
2184
2199
  #
2185
2200
  # @option params [String] :permissions_boundary
2186
- # The ARN of the policy that is used to set the permissions boundary for
2187
- # the user.
2201
+ # The ARN of the managed policy that is used to set the permissions
2202
+ # boundary for the user.
2203
+ #
2204
+ # A permissions boundary policy defines the maximum permissions that
2205
+ # identity-based policies can grant to an entity, but does not grant
2206
+ # permissions. Permissions boundaries do not define the maximum
2207
+ # permissions that a resource-based policy can grant to an entity. To
2208
+ # learn more, see [Permissions boundaries for IAM entities][1] in the
2209
+ # *IAM User Guide*.
2210
+ #
2211
+ # For more information about policy types, see [Policy types ][2] in the
2212
+ # *IAM User Guide*.
2213
+ #
2214
+ #
2215
+ #
2216
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
2217
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
2188
2218
  #
2189
2219
  # @option params [Array<Types::Tag>] :tags
2190
2220
  # A list of tags that you want to attach to the new user. Each tag
@@ -2916,9 +2946,20 @@ module Aws::IAM
2916
2946
  req.send_request(options)
2917
2947
  end
2918
2948
 
2919
- # Deletes the specified role. The role must not have any policies
2920
- # attached. For more information about roles, see [Working with
2921
- # roles][1].
2949
+ # Deletes the specified role. Unlike the Amazon Web Services Management
2950
+ # Console, when you delete a role programmatically, you must delete the
2951
+ # items attached to the role manually, or the deletion fails. For more
2952
+ # information, see [Deleting an IAM role][1]. Before attempting to
2953
+ # delete a role, remove the following attached items:
2954
+ #
2955
+ # * Inline policies (DeleteRolePolicy)
2956
+ #
2957
+ # * Attached managed policies (DetachRolePolicy)
2958
+ #
2959
+ # * Instance profile (RemoveRoleFromInstanceProfile)
2960
+ #
2961
+ # * Optional – Delete instance profile after detaching from role for
2962
+ # resource clean up (DeleteInstanceProfile)
2922
2963
  #
2923
2964
  # Make sure that you do not have any Amazon EC2 instances running with
2924
2965
  # the role you are about to delete. Deleting a role or instance profile
@@ -2927,7 +2968,7 @@ module Aws::IAM
2927
2968
  #
2928
2969
  #
2929
2970
  #
2930
- # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/WorkingWithRoles.html
2971
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_manage_delete.html#roles-managingrole-deleting-cli
2931
2972
  #
2932
2973
  # @option params [required, String] :role_name
2933
2974
  # The name of the role to delete.
@@ -9356,8 +9397,23 @@ module Aws::IAM
9356
9397
  # to set the permissions boundary.
9357
9398
  #
9358
9399
  # @option params [required, String] :permissions_boundary
9359
- # The ARN of the policy that is used to set the permissions boundary for
9360
- # the role.
9400
+ # The ARN of the managed policy that is used to set the permissions
9401
+ # boundary for the role.
9402
+ #
9403
+ # A permissions boundary policy defines the maximum permissions that
9404
+ # identity-based policies can grant to an entity, but does not grant
9405
+ # permissions. Permissions boundaries do not define the maximum
9406
+ # permissions that a resource-based policy can grant to an entity. To
9407
+ # learn more, see [Permissions boundaries for IAM entities][1] in the
9408
+ # *IAM User Guide*.
9409
+ #
9410
+ # For more information about policy types, see [Policy types ][2] in the
9411
+ # *IAM User Guide*.
9412
+ #
9413
+ #
9414
+ #
9415
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
9416
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
9361
9417
  #
9362
9418
  # @return [Struct] Returns an empty {Seahorse::Client::Response response}.
9363
9419
  #
@@ -9509,8 +9565,23 @@ module Aws::IAM
9509
9565
  # to set the permissions boundary.
9510
9566
  #
9511
9567
  # @option params [required, String] :permissions_boundary
9512
- # The ARN of the policy that is used to set the permissions boundary for
9513
- # the user.
9568
+ # The ARN of the managed policy that is used to set the permissions
9569
+ # boundary for the user.
9570
+ #
9571
+ # A permissions boundary policy defines the maximum permissions that
9572
+ # identity-based policies can grant to an entity, but does not grant
9573
+ # permissions. Permissions boundaries do not define the maximum
9574
+ # permissions that a resource-based policy can grant to an entity. To
9575
+ # learn more, see [Permissions boundaries for IAM entities][1] in the
9576
+ # *IAM User Guide*.
9577
+ #
9578
+ # For more information about policy types, see [Policy types ][2] in the
9579
+ # *IAM User Guide*.
9580
+ #
9581
+ #
9582
+ #
9583
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
9584
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
9514
9585
  #
9515
9586
  # @return [Struct] Returns an empty {Seahorse::Client::Response response}.
9516
9587
  #
@@ -10071,9 +10142,16 @@ module Aws::IAM
10071
10142
  # If the output is long, you can use `MaxItems` and `Marker` parameters
10072
10143
  # to paginate the results.
10073
10144
  #
10074
- # For more information about using the policy simulator, see [Testing
10075
- # IAM policies with the IAM policy simulator ][1]in the *IAM User
10076
- # Guide*.
10145
+ # <note markdown="1"> The IAM policy simulator evaluates statements in the identity-based
10146
+ # policy and the inputs that you provide during simulation. The policy
10147
+ # simulator results can differ from your live Amazon Web Services
10148
+ # environment. We recommend that you check your policies against your
10149
+ # live Amazon Web Services environment after testing using the policy
10150
+ # simulator to confirm that you have the desired results. For more
10151
+ # information about using the policy simulator, see [Testing IAM
10152
+ # policies with the IAM policy simulator ][1]in the *IAM User Guide*.
10153
+ #
10154
+ # </note>
10077
10155
  #
10078
10156
  #
10079
10157
  #
@@ -10173,6 +10251,10 @@ module Aws::IAM
10173
10251
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
10174
10252
  # in the *Amazon Web Services General Reference*.
10175
10253
  #
10254
+ # <note markdown="1"> Simulation of resource-based policies isn't supported for IAM roles.
10255
+ #
10256
+ # </note>
10257
+ #
10176
10258
  #
10177
10259
  #
10178
10260
  # [1]: https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html
@@ -10200,6 +10282,10 @@ module Aws::IAM
10200
10282
  # * The special characters tab (`\u0009`), line feed (`\u000A`), and
10201
10283
  # carriage return (`\u000D`)
10202
10284
  #
10285
+ # <note markdown="1"> Simulation of resource-based policies isn't supported for IAM roles.
10286
+ #
10287
+ # </note>
10288
+ #
10203
10289
  #
10204
10290
  #
10205
10291
  # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-quotas-entity-length
@@ -10382,7 +10468,8 @@ module Aws::IAM
10382
10468
  # instead.
10383
10469
  #
10384
10470
  # You can also optionally include one resource-based policy to be
10385
- # evaluated with each of the resources included in the simulation.
10471
+ # evaluated with each of the resources included in the simulation for
10472
+ # IAM users only.
10386
10473
  #
10387
10474
  # The simulation does not perform the API operations; it only checks the
10388
10475
  # authorization to determine if the simulated policies allow or deny the
@@ -10403,9 +10490,16 @@ module Aws::IAM
10403
10490
  # If the output is long, you can use the `MaxItems` and `Marker`
10404
10491
  # parameters to paginate the results.
10405
10492
  #
10406
- # For more information about using the policy simulator, see [Testing
10407
- # IAM policies with the IAM policy simulator ][1]in the *IAM User
10408
- # Guide*.
10493
+ # <note markdown="1"> The IAM policy simulator evaluates statements in the identity-based
10494
+ # policy and the inputs that you provide during simulation. The policy
10495
+ # simulator results can differ from your live Amazon Web Services
10496
+ # environment. We recommend that you check your policies against your
10497
+ # live Amazon Web Services environment after testing using the policy
10498
+ # simulator to confirm that you have the desired results. For more
10499
+ # information about using the policy simulator, see [Testing IAM
10500
+ # policies with the IAM policy simulator ][1]in the *IAM User Guide*.
10501
+ #
10502
+ # </note>
10409
10503
  #
10410
10504
  #
10411
10505
  #
@@ -10511,6 +10605,10 @@ module Aws::IAM
10511
10605
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
10512
10606
  # in the *Amazon Web Services General Reference*.
10513
10607
  #
10608
+ # <note markdown="1"> Simulation of resource-based policies isn't supported for IAM roles.
10609
+ #
10610
+ # </note>
10611
+ #
10514
10612
  #
10515
10613
  #
10516
10614
  # [1]: https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html
@@ -10538,6 +10636,10 @@ module Aws::IAM
10538
10636
  # * The special characters tab (`\u0009`), line feed (`\u000A`), and
10539
10637
  # carriage return (`\u000D`)
10540
10638
  #
10639
+ # <note markdown="1"> Simulation of resource-based policies isn't supported for IAM roles.
10640
+ #
10641
+ # </note>
10642
+ #
10541
10643
  #
10542
10644
  #
10543
10645
  # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-quotas-entity-length
@@ -12255,10 +12357,10 @@ module Aws::IAM
12255
12357
  # <note markdown="1"> Amazon Web Services secures communication with some OIDC identity
12256
12358
  # providers (IdPs) through our library of trusted certificate
12257
12359
  # authorities (CAs) instead of using a certificate thumbprint to verify
12258
- # your IdP server certificate. These OIDC IdPs include Google, and those
12259
- # that use an Amazon S3 bucket to host a JSON Web Key Set (JWKS)
12260
- # endpoint. In these cases, your legacy thumbprint remains in your
12261
- # configuration, but is no longer used for validation.
12360
+ # your IdP server certificate. These OIDC IdPs include Google, Auth0,
12361
+ # and those that use an Amazon S3 bucket to host a JSON Web Key Set
12362
+ # (JWKS) endpoint. In these cases, your legacy thumbprint remains in
12363
+ # your configuration, but is no longer used for validation.
12262
12364
  #
12263
12365
  # </note>
12264
12366
  #
@@ -13233,7 +13335,7 @@ module Aws::IAM
13233
13335
  params: params,
13234
13336
  config: config)
13235
13337
  context[:gem_name] = 'aws-sdk-iam'
13236
- context[:gem_version] = '1.74.0'
13338
+ context[:gem_version] = '1.75.0'
13237
13339
  Seahorse::Client::Request.new(handlers, context)
13238
13340
  end
13239
13341
 
@@ -50,6 +50,9 @@ module Aws::IAM
50
50
 
51
51
  def initialize(options = {})
52
52
  self[:region] = options[:region]
53
+ if self[:region].nil?
54
+ raise ArgumentError, "Missing required EndpointParameter: :region"
55
+ end
53
56
  self[:use_dual_stack] = options[:use_dual_stack]
54
57
  self[:use_dual_stack] = false if self[:use_dual_stack].nil?
55
58
  if self[:use_dual_stack].nil?
@@ -15,7 +15,7 @@ module Aws::IAM
15
15
  use_fips = parameters.use_fips
16
16
  endpoint = parameters.endpoint
17
17
  if (partition_result = Aws::Endpoints::Matchers.aws_partition(region))
18
- if Aws::Endpoints::Matchers.set?(endpoint) && (url = Aws::Endpoints::Matchers.parse_url(endpoint))
18
+ if Aws::Endpoints::Matchers.set?(endpoint)
19
19
  if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
20
20
  raise ArgumentError, "Invalid Configuration: FIPS and custom endpoint are not supported"
21
21
  end
@@ -27,7 +27,7 @@ module Aws::IAM
27
27
  if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws")
28
28
  if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true) && Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
29
29
  if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS")) && Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
30
- return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.api.aws", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-east-1", "signingName"=>"iam"}]})
30
+ return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.api.aws", headers: {}, properties: {})
31
31
  end
32
32
  raise ArgumentError, "FIPS and DualStack are enabled, but this partition does not support one or both"
33
33
  end
@@ -39,7 +39,7 @@ module Aws::IAM
39
39
  end
40
40
  if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
41
41
  if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
42
- return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.api.aws", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-east-1", "signingName"=>"iam"}]})
42
+ return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.api.aws", headers: {}, properties: {})
43
43
  end
44
44
  raise ArgumentError, "DualStack is enabled but this partition does not support DualStack"
45
45
  end
@@ -48,19 +48,19 @@ module Aws::IAM
48
48
  if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws-cn")
49
49
  if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true) && Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
50
50
  if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS")) && Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
51
- return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.api.amazonwebservices.com.cn", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"cn-north-1", "signingName"=>"iam"}]})
51
+ return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.api.amazonwebservices.com.cn", headers: {}, properties: {})
52
52
  end
53
53
  raise ArgumentError, "FIPS and DualStack are enabled, but this partition does not support one or both"
54
54
  end
55
55
  if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
56
56
  if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
57
- return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.amazonaws.com.cn", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"cn-north-1", "signingName"=>"iam"}]})
57
+ return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.amazonaws.com.cn", headers: {}, properties: {})
58
58
  end
59
59
  raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
60
60
  end
61
61
  if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
62
62
  if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
63
- return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.api.amazonwebservices.com.cn", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"cn-north-1", "signingName"=>"iam"}]})
63
+ return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.api.amazonwebservices.com.cn", headers: {}, properties: {})
64
64
  end
65
65
  raise ArgumentError, "DualStack is enabled but this partition does not support DualStack"
66
66
  end
@@ -69,7 +69,7 @@ module Aws::IAM
69
69
  if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws-us-gov")
70
70
  if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true) && Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
71
71
  if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS")) && Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
72
- return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.api.aws", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-gov-west-1", "signingName"=>"iam"}]})
72
+ return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.api.aws", headers: {}, properties: {})
73
73
  end
74
74
  raise ArgumentError, "FIPS and DualStack are enabled, but this partition does not support one or both"
75
75
  end
@@ -81,7 +81,7 @@ module Aws::IAM
81
81
  end
82
82
  if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
83
83
  if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
84
- return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.api.aws", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-gov-west-1", "signingName"=>"iam"}]})
84
+ return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.api.aws", headers: {}, properties: {})
85
85
  end
86
86
  raise ArgumentError, "DualStack is enabled but this partition does not support DualStack"
87
87
  end
@@ -90,7 +90,7 @@ module Aws::IAM
90
90
  if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws-iso")
91
91
  if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
92
92
  if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
93
- return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.c2s.ic.gov", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-iso-east-1", "signingName"=>"iam"}]})
93
+ return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.c2s.ic.gov", headers: {}, properties: {})
94
94
  end
95
95
  raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
96
96
  end
@@ -99,7 +99,7 @@ module Aws::IAM
99
99
  if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws-iso-b")
100
100
  if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
101
101
  if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
102
- return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.sc2s.sgov.gov", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-isob-east-1", "signingName"=>"iam"}]})
102
+ return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.sc2s.sgov.gov", headers: {}, properties: {})
103
103
  end
104
104
  raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
105
105
  end
@@ -113,15 +113,9 @@ module Aws::IAM
113
113
  end
114
114
  if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
115
115
  if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
116
- if Aws::Endpoints::Matchers.string_equals?(region, "iam")
117
- return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-east-1", "signingName"=>"iam"}]})
118
- end
119
116
  if Aws::Endpoints::Matchers.string_equals?(region, "aws-global")
120
117
  return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-east-1", "signingName"=>"iam"}]})
121
118
  end
122
- if Aws::Endpoints::Matchers.string_equals?(region, "iam-govcloud")
123
- return Aws::Endpoints::Endpoint.new(url: "https://iam.us-gov.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-gov-west-1", "signingName"=>"iam"}]})
124
- end
125
119
  if Aws::Endpoints::Matchers.string_equals?(region, "aws-us-gov-global")
126
120
  return Aws::Endpoints::Endpoint.new(url: "https://iam.us-gov.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-gov-west-1", "signingName"=>"iam"}]})
127
121
  end
@@ -505,8 +505,23 @@ module Aws::IAM
505
505
  #
506
506
  # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html
507
507
  # @option options [String] :permissions_boundary
508
- # The ARN of the policy that is used to set the permissions boundary for
509
- # the role.
508
+ # The ARN of the managed policy that is used to set the permissions
509
+ # boundary for the role.
510
+ #
511
+ # A permissions boundary policy defines the maximum permissions that
512
+ # identity-based policies can grant to an entity, but does not grant
513
+ # permissions. Permissions boundaries do not define the maximum
514
+ # permissions that a resource-based policy can grant to an entity. To
515
+ # learn more, see [Permissions boundaries for IAM entities][1] in the
516
+ # *IAM User Guide*.
517
+ #
518
+ # For more information about policy types, see [Policy types ][2] in the
519
+ # *IAM User Guide*.
520
+ #
521
+ #
522
+ #
523
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
524
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
510
525
  # @option options [Array<Types::Tag>] :tags
511
526
  # A list of tags that you want to attach to the new role. Each tag
512
527
  # consists of a key name and an associated value. For more information
@@ -808,8 +823,23 @@ module Aws::IAM
808
823
  # account. Names are not distinguished by case. For example, you cannot
809
824
  # create resources named both "MyResource" and "myresource".
810
825
  # @option options [String] :permissions_boundary
811
- # The ARN of the policy that is used to set the permissions boundary for
812
- # the user.
826
+ # The ARN of the managed policy that is used to set the permissions
827
+ # boundary for the user.
828
+ #
829
+ # A permissions boundary policy defines the maximum permissions that
830
+ # identity-based policies can grant to an entity, but does not grant
831
+ # permissions. Permissions boundaries do not define the maximum
832
+ # permissions that a resource-based policy can grant to an entity. To
833
+ # learn more, see [Permissions boundaries for IAM entities][1] in the
834
+ # *IAM User Guide*.
835
+ #
836
+ # For more information about policy types, see [Policy types ][2] in the
837
+ # *IAM User Guide*.
838
+ #
839
+ #
840
+ #
841
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
842
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
813
843
  # @option options [Array<Types::Tag>] :tags
814
844
  # A list of tags that you want to attach to the new user. Each tag
815
845
  # consists of a key name and an associated value. For more information
@@ -1250,8 +1250,23 @@ module Aws::IAM
1250
1250
  # @return [Integer]
1251
1251
  #
1252
1252
  # @!attribute [rw] permissions_boundary
1253
- # The ARN of the policy that is used to set the permissions boundary
1254
- # for the role.
1253
+ # The ARN of the managed policy that is used to set the permissions
1254
+ # boundary for the role.
1255
+ #
1256
+ # A permissions boundary policy defines the maximum permissions that
1257
+ # identity-based policies can grant to an entity, but does not grant
1258
+ # permissions. Permissions boundaries do not define the maximum
1259
+ # permissions that a resource-based policy can grant to an entity. To
1260
+ # learn more, see [Permissions boundaries for IAM entities][1] in the
1261
+ # *IAM User Guide*.
1262
+ #
1263
+ # For more information about policy types, see [Policy types ][2] in
1264
+ # the *IAM User Guide*.
1265
+ #
1266
+ #
1267
+ #
1268
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
1269
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
1255
1270
  # @return [String]
1256
1271
  #
1257
1272
  # @!attribute [rw] tags
@@ -1516,8 +1531,23 @@ module Aws::IAM
1516
1531
  # @return [String]
1517
1532
  #
1518
1533
  # @!attribute [rw] permissions_boundary
1519
- # The ARN of the policy that is used to set the permissions boundary
1520
- # for the user.
1534
+ # The ARN of the managed policy that is used to set the permissions
1535
+ # boundary for the user.
1536
+ #
1537
+ # A permissions boundary policy defines the maximum permissions that
1538
+ # identity-based policies can grant to an entity, but does not grant
1539
+ # permissions. Permissions boundaries do not define the maximum
1540
+ # permissions that a resource-based policy can grant to an entity. To
1541
+ # learn more, see [Permissions boundaries for IAM entities][1] in the
1542
+ # *IAM User Guide*.
1543
+ #
1544
+ # For more information about policy types, see [Policy types ][2] in
1545
+ # the *IAM User Guide*.
1546
+ #
1547
+ #
1548
+ #
1549
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
1550
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
1521
1551
  # @return [String]
1522
1552
  #
1523
1553
  # @!attribute [rw] tags
@@ -8130,8 +8160,23 @@ module Aws::IAM
8130
8160
  # @return [String]
8131
8161
  #
8132
8162
  # @!attribute [rw] permissions_boundary
8133
- # The ARN of the policy that is used to set the permissions boundary
8134
- # for the role.
8163
+ # The ARN of the managed policy that is used to set the permissions
8164
+ # boundary for the role.
8165
+ #
8166
+ # A permissions boundary policy defines the maximum permissions that
8167
+ # identity-based policies can grant to an entity, but does not grant
8168
+ # permissions. Permissions boundaries do not define the maximum
8169
+ # permissions that a resource-based policy can grant to an entity. To
8170
+ # learn more, see [Permissions boundaries for IAM entities][1] in the
8171
+ # *IAM User Guide*.
8172
+ #
8173
+ # For more information about policy types, see [Policy types ][2] in
8174
+ # the *IAM User Guide*.
8175
+ #
8176
+ #
8177
+ #
8178
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
8179
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
8135
8180
  # @return [String]
8136
8181
  #
8137
8182
  # @see http://docs.aws.amazon.com/goto/WebAPI/iam-2010-05-08/PutRolePermissionsBoundaryRequest AWS API Documentation
@@ -8210,8 +8255,23 @@ module Aws::IAM
8210
8255
  # @return [String]
8211
8256
  #
8212
8257
  # @!attribute [rw] permissions_boundary
8213
- # The ARN of the policy that is used to set the permissions boundary
8214
- # for the user.
8258
+ # The ARN of the managed policy that is used to set the permissions
8259
+ # boundary for the user.
8260
+ #
8261
+ # A permissions boundary policy defines the maximum permissions that
8262
+ # identity-based policies can grant to an entity, but does not grant
8263
+ # permissions. Permissions boundaries do not define the maximum
8264
+ # permissions that a resource-based policy can grant to an entity. To
8265
+ # learn more, see [Permissions boundaries for IAM entities][1] in the
8266
+ # *IAM User Guide*.
8267
+ #
8268
+ # For more information about policy types, see [Policy types ][2] in
8269
+ # the *IAM User Guide*.
8270
+ #
8271
+ #
8272
+ #
8273
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
8274
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
8215
8275
  # @return [String]
8216
8276
  #
8217
8277
  # @see http://docs.aws.amazon.com/goto/WebAPI/iam-2010-05-08/PutUserPermissionsBoundaryRequest AWS API Documentation
@@ -9504,6 +9564,11 @@ module Aws::IAM
9504
9564
  # For more information about ARNs, see [Amazon Resource Names
9505
9565
  # (ARNs)][1] in the *Amazon Web Services General Reference*.
9506
9566
  #
9567
+ # <note markdown="1"> Simulation of resource-based policies isn't supported for IAM
9568
+ # roles.
9569
+ #
9570
+ # </note>
9571
+ #
9507
9572
  #
9508
9573
  #
9509
9574
  # [1]: https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html
@@ -9532,6 +9597,11 @@ module Aws::IAM
9532
9597
  # * The special characters tab (`\u0009`), line feed (`\u000A`), and
9533
9598
  # carriage return (`\u000D`)
9534
9599
  #
9600
+ # <note markdown="1"> Simulation of resource-based policies isn't supported for IAM
9601
+ # roles.
9602
+ #
9603
+ # </note>
9604
+ #
9535
9605
  #
9536
9606
  #
9537
9607
  # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-quotas-entity-length
@@ -9789,6 +9859,11 @@ module Aws::IAM
9789
9859
  # For more information about ARNs, see [Amazon Resource Names
9790
9860
  # (ARNs)][1] in the *Amazon Web Services General Reference*.
9791
9861
  #
9862
+ # <note markdown="1"> Simulation of resource-based policies isn't supported for IAM
9863
+ # roles.
9864
+ #
9865
+ # </note>
9866
+ #
9792
9867
  #
9793
9868
  #
9794
9869
  # [1]: https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html
@@ -9817,6 +9892,11 @@ module Aws::IAM
9817
9892
  # * The special characters tab (`\u0009`), line feed (`\u000A`), and
9818
9893
  # carriage return (`\u000D`)
9819
9894
  #
9895
+ # <note markdown="1"> Simulation of resource-based policies isn't supported for IAM
9896
+ # roles.
9897
+ #
9898
+ # </note>
9899
+ #
9820
9900
  #
9821
9901
  #
9822
9902
  # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-quotas-entity-length
@@ -379,8 +379,23 @@ module Aws::IAM
379
379
  # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html
380
380
  # [2]: http://wikipedia.org/wiki/regex
381
381
  # @option options [String] :permissions_boundary
382
- # The ARN of the policy that is used to set the permissions boundary for
383
- # the user.
382
+ # The ARN of the managed policy that is used to set the permissions
383
+ # boundary for the user.
384
+ #
385
+ # A permissions boundary policy defines the maximum permissions that
386
+ # identity-based policies can grant to an entity, but does not grant
387
+ # permissions. Permissions boundaries do not define the maximum
388
+ # permissions that a resource-based policy can grant to an entity. To
389
+ # learn more, see [Permissions boundaries for IAM entities][1] in the
390
+ # *IAM User Guide*.
391
+ #
392
+ # For more information about policy types, see [Policy types ][2] in the
393
+ # *IAM User Guide*.
394
+ #
395
+ #
396
+ #
397
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
398
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
384
399
  # @option options [Array<Types::Tag>] :tags
385
400
  # A list of tags that you want to attach to the new user. Each tag
386
401
  # consists of a key name and an associated value. For more information
data/lib/aws-sdk-iam.rb CHANGED
@@ -74,6 +74,6 @@ require_relative 'aws-sdk-iam/customizations'
74
74
  # @!group service
75
75
  module Aws::IAM
76
76
 
77
- GEM_VERSION = '1.74.0'
77
+ GEM_VERSION = '1.75.0'
78
78
 
79
79
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-iam
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.74.0
4
+ version: 1.75.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2023-01-18 00:00:00.000000000 Z
11
+ date: 2023-02-01 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core