aws-sdk-iam 1.74.0 → 1.76.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +10 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-iam/client.rb +147 -34
- data/lib/aws-sdk-iam/endpoint_provider.rb +105 -108
- data/lib/aws-sdk-iam/resource.rb +45 -6
- data/lib/aws-sdk-iam/role.rb +1 -1
- data/lib/aws-sdk-iam/types.rb +106 -17
- data/lib/aws-sdk-iam/user.rb +17 -2
- data/lib/aws-sdk-iam.rb +1 -1
- metadata +2 -2
checksums.yaml
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
---
|
|
2
2
|
SHA256:
|
|
3
|
-
metadata.gz:
|
|
4
|
-
data.tar.gz:
|
|
3
|
+
metadata.gz: 4a338135d35d293d96f6adaaff90cc637e1622164c670c215e3ea294f7918abd
|
|
4
|
+
data.tar.gz: 76d331e00da6de881cfcd70d00f2cc404952d7a3ef98043020f93bcce88cd2bc
|
|
5
5
|
SHA512:
|
|
6
|
-
metadata.gz:
|
|
7
|
-
data.tar.gz:
|
|
6
|
+
metadata.gz: 181b0658ff859256eb96c0ff80f54a07ba8bf26bfd15569b0e1c7d9deb269138c0fa504e1ba672e04243733a60cfe7ddcf0374aaf5d6439675ba8b7d9ff5832d
|
|
7
|
+
data.tar.gz: 7a17eb50ab3b44f866011af847ce088b652cc1105a45f8f6cd4ee934b274a6807f5b7201bb33448c140a614739c2b543bf37f0dececc37cc386f856b59787e8a
|
data/CHANGELOG.md
CHANGED
|
@@ -1,6 +1,16 @@
|
|
|
1
1
|
Unreleased Changes
|
|
2
2
|
------------------
|
|
3
3
|
|
|
4
|
+
1.76.0 (2023-03-14)
|
|
5
|
+
------------------
|
|
6
|
+
|
|
7
|
+
* Feature - Documentation only updates to correct customer-reported issues
|
|
8
|
+
|
|
9
|
+
1.75.0 (2023-02-01)
|
|
10
|
+
------------------
|
|
11
|
+
|
|
12
|
+
* Feature - Documentation updates for AWS Identity and Access Management (IAM).
|
|
13
|
+
|
|
4
14
|
1.74.0 (2023-01-18)
|
|
5
15
|
------------------
|
|
6
16
|
|
data/VERSION
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
1.
|
|
1
|
+
1.76.0
|
data/lib/aws-sdk-iam/client.rb
CHANGED
|
@@ -1289,6 +1289,8 @@ module Aws::IAM
|
|
|
1289
1289
|
# application or applications allowed to authenticate using the OIDC
|
|
1290
1290
|
# provider
|
|
1291
1291
|
#
|
|
1292
|
+
# * A list of tags that are attached to the specified IAM OIDC provider
|
|
1293
|
+
#
|
|
1292
1294
|
# * A list of thumbprints of one or more server certificates that the
|
|
1293
1295
|
# IdP uses
|
|
1294
1296
|
#
|
|
@@ -1298,10 +1300,10 @@ module Aws::IAM
|
|
|
1298
1300
|
# <note markdown="1"> Amazon Web Services secures communication with some OIDC identity
|
|
1299
1301
|
# providers (IdPs) through our library of trusted certificate
|
|
1300
1302
|
# authorities (CAs) instead of using a certificate thumbprint to verify
|
|
1301
|
-
# your IdP server certificate. These OIDC IdPs include Google,
|
|
1302
|
-
# that use an Amazon S3 bucket to host a JSON Web Key Set
|
|
1303
|
-
# endpoint. In these cases, your legacy thumbprint remains in
|
|
1304
|
-
# configuration, but is no longer used for validation.
|
|
1303
|
+
# your IdP server certificate. These OIDC IdPs include Google, Auth0,
|
|
1304
|
+
# and those that use an Amazon S3 bucket to host a JSON Web Key Set
|
|
1305
|
+
# (JWKS) endpoint. In these cases, your legacy thumbprint remains in
|
|
1306
|
+
# your configuration, but is no longer used for validation.
|
|
1305
1307
|
#
|
|
1306
1308
|
# </note>
|
|
1307
1309
|
#
|
|
@@ -1364,7 +1366,7 @@ module Aws::IAM
|
|
|
1364
1366
|
#
|
|
1365
1367
|
# For more information about obtaining the OIDC provider thumbprint, see
|
|
1366
1368
|
# [Obtaining the thumbprint for an OpenID Connect provider][1] in the
|
|
1367
|
-
# *IAM
|
|
1369
|
+
# *IAM user Guide*.
|
|
1368
1370
|
#
|
|
1369
1371
|
#
|
|
1370
1372
|
#
|
|
@@ -1737,6 +1739,15 @@ module Aws::IAM
|
|
|
1737
1739
|
# account. Names are not distinguished by case. For example, you cannot
|
|
1738
1740
|
# create resources named both "MyResource" and "myresource".
|
|
1739
1741
|
#
|
|
1742
|
+
# This parameter allows (through its [regex pattern][1]) a string of
|
|
1743
|
+
# characters consisting of upper and lowercase alphanumeric characters
|
|
1744
|
+
# with no spaces. You can also include any of the following characters:
|
|
1745
|
+
# \_+=,.@-
|
|
1746
|
+
#
|
|
1747
|
+
#
|
|
1748
|
+
#
|
|
1749
|
+
# [1]: http://wikipedia.org/wiki/regex
|
|
1750
|
+
#
|
|
1740
1751
|
# @option params [required, String] :assume_role_policy_document
|
|
1741
1752
|
# The trust relationship policy document that grants an entity
|
|
1742
1753
|
# permission to assume the role.
|
|
@@ -1790,8 +1801,23 @@ module Aws::IAM
|
|
|
1790
1801
|
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html
|
|
1791
1802
|
#
|
|
1792
1803
|
# @option params [String] :permissions_boundary
|
|
1793
|
-
# The ARN of the policy that is used to set the permissions
|
|
1794
|
-
# the role.
|
|
1804
|
+
# The ARN of the managed policy that is used to set the permissions
|
|
1805
|
+
# boundary for the role.
|
|
1806
|
+
#
|
|
1807
|
+
# A permissions boundary policy defines the maximum permissions that
|
|
1808
|
+
# identity-based policies can grant to an entity, but does not grant
|
|
1809
|
+
# permissions. Permissions boundaries do not define the maximum
|
|
1810
|
+
# permissions that a resource-based policy can grant to an entity. To
|
|
1811
|
+
# learn more, see [Permissions boundaries for IAM entities][1] in the
|
|
1812
|
+
# *IAM User Guide*.
|
|
1813
|
+
#
|
|
1814
|
+
# For more information about policy types, see [Policy types ][2] in the
|
|
1815
|
+
# *IAM User Guide*.
|
|
1816
|
+
#
|
|
1817
|
+
#
|
|
1818
|
+
#
|
|
1819
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
|
|
1820
|
+
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
|
|
1795
1821
|
#
|
|
1796
1822
|
# @option params [Array<Types::Tag>] :tags
|
|
1797
1823
|
# A list of tags that you want to attach to the new role. Each tag
|
|
@@ -2183,8 +2209,23 @@ module Aws::IAM
|
|
|
2183
2209
|
# create resources named both "MyResource" and "myresource".
|
|
2184
2210
|
#
|
|
2185
2211
|
# @option params [String] :permissions_boundary
|
|
2186
|
-
# The ARN of the policy that is used to set the permissions
|
|
2187
|
-
# the user.
|
|
2212
|
+
# The ARN of the managed policy that is used to set the permissions
|
|
2213
|
+
# boundary for the user.
|
|
2214
|
+
#
|
|
2215
|
+
# A permissions boundary policy defines the maximum permissions that
|
|
2216
|
+
# identity-based policies can grant to an entity, but does not grant
|
|
2217
|
+
# permissions. Permissions boundaries do not define the maximum
|
|
2218
|
+
# permissions that a resource-based policy can grant to an entity. To
|
|
2219
|
+
# learn more, see [Permissions boundaries for IAM entities][1] in the
|
|
2220
|
+
# *IAM User Guide*.
|
|
2221
|
+
#
|
|
2222
|
+
# For more information about policy types, see [Policy types ][2] in the
|
|
2223
|
+
# *IAM User Guide*.
|
|
2224
|
+
#
|
|
2225
|
+
#
|
|
2226
|
+
#
|
|
2227
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
|
|
2228
|
+
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
|
|
2188
2229
|
#
|
|
2189
2230
|
# @option params [Array<Types::Tag>] :tags
|
|
2190
2231
|
# A list of tags that you want to attach to the new user. Each tag
|
|
@@ -2303,8 +2344,8 @@ module Aws::IAM
|
|
|
2303
2344
|
# [2]: http://wikipedia.org/wiki/regex
|
|
2304
2345
|
#
|
|
2305
2346
|
# @option params [required, String] :virtual_mfa_device_name
|
|
2306
|
-
# The name of the virtual MFA device
|
|
2307
|
-
# a virtual MFA device.
|
|
2347
|
+
# The name of the virtual MFA device, which must be unique. Use with
|
|
2348
|
+
# path to uniquely identify a virtual MFA device.
|
|
2308
2349
|
#
|
|
2309
2350
|
# This parameter allows (through its [regex pattern][1]) a string of
|
|
2310
2351
|
# characters consisting of upper and lowercase alphanumeric characters
|
|
@@ -2916,9 +2957,20 @@ module Aws::IAM
|
|
|
2916
2957
|
req.send_request(options)
|
|
2917
2958
|
end
|
|
2918
2959
|
|
|
2919
|
-
# Deletes the specified role.
|
|
2920
|
-
#
|
|
2921
|
-
#
|
|
2960
|
+
# Deletes the specified role. Unlike the Amazon Web Services Management
|
|
2961
|
+
# Console, when you delete a role programmatically, you must delete the
|
|
2962
|
+
# items attached to the role manually, or the deletion fails. For more
|
|
2963
|
+
# information, see [Deleting an IAM role][1]. Before attempting to
|
|
2964
|
+
# delete a role, remove the following attached items:
|
|
2965
|
+
#
|
|
2966
|
+
# * Inline policies (DeleteRolePolicy)
|
|
2967
|
+
#
|
|
2968
|
+
# * Attached managed policies (DetachRolePolicy)
|
|
2969
|
+
#
|
|
2970
|
+
# * Instance profile (RemoveRoleFromInstanceProfile)
|
|
2971
|
+
#
|
|
2972
|
+
# * Optional – Delete instance profile after detaching from role for
|
|
2973
|
+
# resource clean up (DeleteInstanceProfile)
|
|
2922
2974
|
#
|
|
2923
2975
|
# Make sure that you do not have any Amazon EC2 instances running with
|
|
2924
2976
|
# the role you are about to delete. Deleting a role or instance profile
|
|
@@ -2927,7 +2979,7 @@ module Aws::IAM
|
|
|
2927
2979
|
#
|
|
2928
2980
|
#
|
|
2929
2981
|
#
|
|
2930
|
-
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
|
2982
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_manage_delete.html#roles-managingrole-deleting-cli
|
|
2931
2983
|
#
|
|
2932
2984
|
# @option params [required, String] :role_name
|
|
2933
2985
|
# The name of the role to delete.
|
|
@@ -5038,7 +5090,7 @@ module Aws::IAM
|
|
|
5038
5090
|
# operation. For more information, see [Refining permissions using
|
|
5039
5091
|
# service last accessed data][1] in the *IAM User Guide*.
|
|
5040
5092
|
#
|
|
5041
|
-
# For each service that principals in an account (root
|
|
5093
|
+
# For each service that principals in an account (root user, IAM users,
|
|
5042
5094
|
# or IAM roles) could access using SCPs, the operation returns details
|
|
5043
5095
|
# about the most recent access attempt. If there was no attempt, the
|
|
5044
5096
|
# service is listed without details about the most recent attempt to
|
|
@@ -9356,8 +9408,23 @@ module Aws::IAM
|
|
|
9356
9408
|
# to set the permissions boundary.
|
|
9357
9409
|
#
|
|
9358
9410
|
# @option params [required, String] :permissions_boundary
|
|
9359
|
-
# The ARN of the policy that is used to set the permissions
|
|
9360
|
-
# the role.
|
|
9411
|
+
# The ARN of the managed policy that is used to set the permissions
|
|
9412
|
+
# boundary for the role.
|
|
9413
|
+
#
|
|
9414
|
+
# A permissions boundary policy defines the maximum permissions that
|
|
9415
|
+
# identity-based policies can grant to an entity, but does not grant
|
|
9416
|
+
# permissions. Permissions boundaries do not define the maximum
|
|
9417
|
+
# permissions that a resource-based policy can grant to an entity. To
|
|
9418
|
+
# learn more, see [Permissions boundaries for IAM entities][1] in the
|
|
9419
|
+
# *IAM User Guide*.
|
|
9420
|
+
#
|
|
9421
|
+
# For more information about policy types, see [Policy types ][2] in the
|
|
9422
|
+
# *IAM User Guide*.
|
|
9423
|
+
#
|
|
9424
|
+
#
|
|
9425
|
+
#
|
|
9426
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
|
|
9427
|
+
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
|
|
9361
9428
|
#
|
|
9362
9429
|
# @return [Struct] Returns an empty {Seahorse::Client::Response response}.
|
|
9363
9430
|
#
|
|
@@ -9509,8 +9576,23 @@ module Aws::IAM
|
|
|
9509
9576
|
# to set the permissions boundary.
|
|
9510
9577
|
#
|
|
9511
9578
|
# @option params [required, String] :permissions_boundary
|
|
9512
|
-
# The ARN of the policy that is used to set the permissions
|
|
9513
|
-
# the user.
|
|
9579
|
+
# The ARN of the managed policy that is used to set the permissions
|
|
9580
|
+
# boundary for the user.
|
|
9581
|
+
#
|
|
9582
|
+
# A permissions boundary policy defines the maximum permissions that
|
|
9583
|
+
# identity-based policies can grant to an entity, but does not grant
|
|
9584
|
+
# permissions. Permissions boundaries do not define the maximum
|
|
9585
|
+
# permissions that a resource-based policy can grant to an entity. To
|
|
9586
|
+
# learn more, see [Permissions boundaries for IAM entities][1] in the
|
|
9587
|
+
# *IAM User Guide*.
|
|
9588
|
+
#
|
|
9589
|
+
# For more information about policy types, see [Policy types ][2] in the
|
|
9590
|
+
# *IAM User Guide*.
|
|
9591
|
+
#
|
|
9592
|
+
#
|
|
9593
|
+
#
|
|
9594
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
|
|
9595
|
+
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
|
|
9514
9596
|
#
|
|
9515
9597
|
# @return [Struct] Returns an empty {Seahorse::Client::Response response}.
|
|
9516
9598
|
#
|
|
@@ -10071,9 +10153,16 @@ module Aws::IAM
|
|
|
10071
10153
|
# If the output is long, you can use `MaxItems` and `Marker` parameters
|
|
10072
10154
|
# to paginate the results.
|
|
10073
10155
|
#
|
|
10074
|
-
#
|
|
10075
|
-
#
|
|
10076
|
-
#
|
|
10156
|
+
# <note markdown="1"> The IAM policy simulator evaluates statements in the identity-based
|
|
10157
|
+
# policy and the inputs that you provide during simulation. The policy
|
|
10158
|
+
# simulator results can differ from your live Amazon Web Services
|
|
10159
|
+
# environment. We recommend that you check your policies against your
|
|
10160
|
+
# live Amazon Web Services environment after testing using the policy
|
|
10161
|
+
# simulator to confirm that you have the desired results. For more
|
|
10162
|
+
# information about using the policy simulator, see [Testing IAM
|
|
10163
|
+
# policies with the IAM policy simulator ][1]in the *IAM User Guide*.
|
|
10164
|
+
#
|
|
10165
|
+
# </note>
|
|
10077
10166
|
#
|
|
10078
10167
|
#
|
|
10079
10168
|
#
|
|
@@ -10173,6 +10262,10 @@ module Aws::IAM
|
|
|
10173
10262
|
# For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
|
|
10174
10263
|
# in the *Amazon Web Services General Reference*.
|
|
10175
10264
|
#
|
|
10265
|
+
# <note markdown="1"> Simulation of resource-based policies isn't supported for IAM roles.
|
|
10266
|
+
#
|
|
10267
|
+
# </note>
|
|
10268
|
+
#
|
|
10176
10269
|
#
|
|
10177
10270
|
#
|
|
10178
10271
|
# [1]: https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html
|
|
@@ -10200,6 +10293,10 @@ module Aws::IAM
|
|
|
10200
10293
|
# * The special characters tab (`\u0009`), line feed (`\u000A`), and
|
|
10201
10294
|
# carriage return (`\u000D`)
|
|
10202
10295
|
#
|
|
10296
|
+
# <note markdown="1"> Simulation of resource-based policies isn't supported for IAM roles.
|
|
10297
|
+
#
|
|
10298
|
+
# </note>
|
|
10299
|
+
#
|
|
10203
10300
|
#
|
|
10204
10301
|
#
|
|
10205
10302
|
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-quotas-entity-length
|
|
@@ -10382,7 +10479,8 @@ module Aws::IAM
|
|
|
10382
10479
|
# instead.
|
|
10383
10480
|
#
|
|
10384
10481
|
# You can also optionally include one resource-based policy to be
|
|
10385
|
-
# evaluated with each of the resources included in the simulation
|
|
10482
|
+
# evaluated with each of the resources included in the simulation for
|
|
10483
|
+
# IAM users only.
|
|
10386
10484
|
#
|
|
10387
10485
|
# The simulation does not perform the API operations; it only checks the
|
|
10388
10486
|
# authorization to determine if the simulated policies allow or deny the
|
|
@@ -10403,9 +10501,16 @@ module Aws::IAM
|
|
|
10403
10501
|
# If the output is long, you can use the `MaxItems` and `Marker`
|
|
10404
10502
|
# parameters to paginate the results.
|
|
10405
10503
|
#
|
|
10406
|
-
#
|
|
10407
|
-
#
|
|
10408
|
-
#
|
|
10504
|
+
# <note markdown="1"> The IAM policy simulator evaluates statements in the identity-based
|
|
10505
|
+
# policy and the inputs that you provide during simulation. The policy
|
|
10506
|
+
# simulator results can differ from your live Amazon Web Services
|
|
10507
|
+
# environment. We recommend that you check your policies against your
|
|
10508
|
+
# live Amazon Web Services environment after testing using the policy
|
|
10509
|
+
# simulator to confirm that you have the desired results. For more
|
|
10510
|
+
# information about using the policy simulator, see [Testing IAM
|
|
10511
|
+
# policies with the IAM policy simulator ][1]in the *IAM User Guide*.
|
|
10512
|
+
#
|
|
10513
|
+
# </note>
|
|
10409
10514
|
#
|
|
10410
10515
|
#
|
|
10411
10516
|
#
|
|
@@ -10511,6 +10616,10 @@ module Aws::IAM
|
|
|
10511
10616
|
# For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
|
|
10512
10617
|
# in the *Amazon Web Services General Reference*.
|
|
10513
10618
|
#
|
|
10619
|
+
# <note markdown="1"> Simulation of resource-based policies isn't supported for IAM roles.
|
|
10620
|
+
#
|
|
10621
|
+
# </note>
|
|
10622
|
+
#
|
|
10514
10623
|
#
|
|
10515
10624
|
#
|
|
10516
10625
|
# [1]: https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html
|
|
@@ -10538,6 +10647,10 @@ module Aws::IAM
|
|
|
10538
10647
|
# * The special characters tab (`\u0009`), line feed (`\u000A`), and
|
|
10539
10648
|
# carriage return (`\u000D`)
|
|
10540
10649
|
#
|
|
10650
|
+
# <note markdown="1"> Simulation of resource-based policies isn't supported for IAM roles.
|
|
10651
|
+
#
|
|
10652
|
+
# </note>
|
|
10653
|
+
#
|
|
10541
10654
|
#
|
|
10542
10655
|
#
|
|
10543
10656
|
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-quotas-entity-length
|
|
@@ -10884,7 +10997,7 @@ module Aws::IAM
|
|
|
10884
10997
|
# *MyImportantProject*. Or search for all resources with the key name
|
|
10885
10998
|
# *Cost Center* and the value *41200*.
|
|
10886
10999
|
#
|
|
10887
|
-
# * **Access control** - Include tags in IAM
|
|
11000
|
+
# * **Access control** - Include tags in IAM identity-based and
|
|
10888
11001
|
# resource-based policies. You can use tags to restrict access to only
|
|
10889
11002
|
# an OIDC provider that has a specified tag attached. For examples of
|
|
10890
11003
|
# policies that show how to use tags to control access, see [Control
|
|
@@ -11303,7 +11416,7 @@ module Aws::IAM
|
|
|
11303
11416
|
# *MyImportantProject*. Or search for all resources with the key name
|
|
11304
11417
|
# *Cost Center* and the value *41200*.
|
|
11305
11418
|
#
|
|
11306
|
-
# * **Access control** - Include tags in IAM
|
|
11419
|
+
# * **Access control** - Include tags in IAM identity-based and
|
|
11307
11420
|
# resource-based policies. You can use tags to restrict access to only
|
|
11308
11421
|
# an IAM requesting user that has a specified tag attached. You can
|
|
11309
11422
|
# also restrict access to only those resources that have a certain tag
|
|
@@ -12255,10 +12368,10 @@ module Aws::IAM
|
|
|
12255
12368
|
# <note markdown="1"> Amazon Web Services secures communication with some OIDC identity
|
|
12256
12369
|
# providers (IdPs) through our library of trusted certificate
|
|
12257
12370
|
# authorities (CAs) instead of using a certificate thumbprint to verify
|
|
12258
|
-
# your IdP server certificate. These OIDC IdPs include Google,
|
|
12259
|
-
# that use an Amazon S3 bucket to host a JSON Web Key Set
|
|
12260
|
-
# endpoint. In these cases, your legacy thumbprint remains in
|
|
12261
|
-
# configuration, but is no longer used for validation.
|
|
12371
|
+
# your IdP server certificate. These OIDC IdPs include Google, Auth0,
|
|
12372
|
+
# and those that use an Amazon S3 bucket to host a JSON Web Key Set
|
|
12373
|
+
# (JWKS) endpoint. In these cases, your legacy thumbprint remains in
|
|
12374
|
+
# your configuration, but is no longer used for validation.
|
|
12262
12375
|
#
|
|
12263
12376
|
# </note>
|
|
12264
12377
|
#
|
|
@@ -13233,7 +13346,7 @@ module Aws::IAM
|
|
|
13233
13346
|
params: params,
|
|
13234
13347
|
config: config)
|
|
13235
13348
|
context[:gem_name] = 'aws-sdk-iam'
|
|
13236
|
-
context[:gem_version] = '1.
|
|
13349
|
+
context[:gem_version] = '1.76.0'
|
|
13237
13350
|
Seahorse::Client::Request.new(handlers, context)
|
|
13238
13351
|
end
|
|
13239
13352
|
|
|
@@ -14,144 +14,141 @@ module Aws::IAM
|
|
|
14
14
|
use_dual_stack = parameters.use_dual_stack
|
|
15
15
|
use_fips = parameters.use_fips
|
|
16
16
|
endpoint = parameters.endpoint
|
|
17
|
-
if
|
|
18
|
-
if Aws::Endpoints::Matchers.
|
|
19
|
-
|
|
20
|
-
raise ArgumentError, "Invalid Configuration: FIPS and custom endpoint are not supported"
|
|
21
|
-
end
|
|
22
|
-
if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
|
|
23
|
-
raise ArgumentError, "Invalid Configuration: Dualstack and custom endpoint are not supported"
|
|
24
|
-
end
|
|
25
|
-
return Aws::Endpoints::Endpoint.new(url: endpoint, headers: {}, properties: {})
|
|
17
|
+
if Aws::Endpoints::Matchers.set?(endpoint)
|
|
18
|
+
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
|
|
19
|
+
raise ArgumentError, "Invalid Configuration: FIPS and custom endpoint are not supported"
|
|
26
20
|
end
|
|
27
|
-
if Aws::Endpoints::Matchers.
|
|
28
|
-
|
|
29
|
-
|
|
30
|
-
|
|
21
|
+
if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
|
|
22
|
+
raise ArgumentError, "Invalid Configuration: Dualstack and custom endpoint are not supported"
|
|
23
|
+
end
|
|
24
|
+
return Aws::Endpoints::Endpoint.new(url: endpoint, headers: {}, properties: {})
|
|
25
|
+
end
|
|
26
|
+
if Aws::Endpoints::Matchers.set?(region)
|
|
27
|
+
if (partition_result = Aws::Endpoints::Matchers.aws_partition(region))
|
|
28
|
+
if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws")
|
|
29
|
+
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true) && Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
|
|
30
|
+
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS")) && Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
|
|
31
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.api.aws", headers: {}, properties: {})
|
|
32
|
+
end
|
|
33
|
+
raise ArgumentError, "FIPS and DualStack are enabled, but this partition does not support one or both"
|
|
31
34
|
end
|
|
32
|
-
|
|
33
|
-
|
|
34
|
-
|
|
35
|
-
|
|
36
|
-
|
|
35
|
+
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
|
|
36
|
+
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
|
|
37
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-east-1"}]})
|
|
38
|
+
end
|
|
39
|
+
raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
|
|
37
40
|
end
|
|
38
|
-
|
|
39
|
-
|
|
40
|
-
|
|
41
|
-
|
|
42
|
-
|
|
41
|
+
if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
|
|
42
|
+
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
|
|
43
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.api.aws", headers: {}, properties: {})
|
|
44
|
+
end
|
|
45
|
+
raise ArgumentError, "DualStack is enabled but this partition does not support DualStack"
|
|
43
46
|
end
|
|
44
|
-
|
|
45
|
-
end
|
|
46
|
-
|
|
47
|
-
|
|
48
|
-
|
|
49
|
-
|
|
50
|
-
|
|
51
|
-
|
|
47
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-east-1"}]})
|
|
48
|
+
end
|
|
49
|
+
if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws-cn")
|
|
50
|
+
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true) && Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
|
|
51
|
+
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS")) && Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
|
|
52
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.api.amazonwebservices.com.cn", headers: {}, properties: {})
|
|
53
|
+
end
|
|
54
|
+
raise ArgumentError, "FIPS and DualStack are enabled, but this partition does not support one or both"
|
|
52
55
|
end
|
|
53
|
-
|
|
54
|
-
|
|
55
|
-
|
|
56
|
-
|
|
57
|
-
|
|
56
|
+
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
|
|
57
|
+
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
|
|
58
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.amazonaws.com.cn", headers: {}, properties: {})
|
|
59
|
+
end
|
|
60
|
+
raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
|
|
58
61
|
end
|
|
59
|
-
|
|
60
|
-
|
|
61
|
-
|
|
62
|
-
|
|
63
|
-
|
|
62
|
+
if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
|
|
63
|
+
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
|
|
64
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.api.amazonwebservices.com.cn", headers: {}, properties: {})
|
|
65
|
+
end
|
|
66
|
+
raise ArgumentError, "DualStack is enabled but this partition does not support DualStack"
|
|
64
67
|
end
|
|
65
|
-
|
|
68
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam.cn-north-1.amazonaws.com.cn", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"cn-north-1"}]})
|
|
69
|
+
end
|
|
70
|
+
if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws-us-gov")
|
|
71
|
+
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true) && Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
|
|
72
|
+
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS")) && Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
|
|
73
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.api.aws", headers: {}, properties: {})
|
|
74
|
+
end
|
|
75
|
+
raise ArgumentError, "FIPS and DualStack are enabled, but this partition does not support one or both"
|
|
76
|
+
end
|
|
77
|
+
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
|
|
78
|
+
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
|
|
79
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam.us-gov.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-gov-west-1"}]})
|
|
80
|
+
end
|
|
81
|
+
raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
|
|
82
|
+
end
|
|
83
|
+
if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
|
|
84
|
+
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
|
|
85
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.api.aws", headers: {}, properties: {})
|
|
86
|
+
end
|
|
87
|
+
raise ArgumentError, "DualStack is enabled but this partition does not support DualStack"
|
|
88
|
+
end
|
|
89
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam.us-gov.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-gov-west-1"}]})
|
|
90
|
+
end
|
|
91
|
+
if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws-iso")
|
|
92
|
+
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
|
|
93
|
+
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
|
|
94
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.c2s.ic.gov", headers: {}, properties: {})
|
|
95
|
+
end
|
|
96
|
+
raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
|
|
97
|
+
end
|
|
98
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam.us-iso-east-1.c2s.ic.gov", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-iso-east-1"}]})
|
|
99
|
+
end
|
|
100
|
+
if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws-iso-b")
|
|
101
|
+
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
|
|
102
|
+
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
|
|
103
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.sc2s.sgov.gov", headers: {}, properties: {})
|
|
104
|
+
end
|
|
105
|
+
raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
|
|
106
|
+
end
|
|
107
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam.us-isob-east-1.sc2s.sgov.gov", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-isob-east-1"}]})
|
|
66
108
|
end
|
|
67
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam.cn-north-1.amazonaws.com.cn", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"cn-north-1", "signingName"=>"iam"}]})
|
|
68
|
-
end
|
|
69
|
-
if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws-us-gov")
|
|
70
109
|
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true) && Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
|
|
71
110
|
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS")) && Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
|
|
72
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}
|
|
111
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.#{partition_result['dualStackDnsSuffix']}", headers: {}, properties: {})
|
|
73
112
|
end
|
|
74
113
|
raise ArgumentError, "FIPS and DualStack are enabled, but this partition does not support one or both"
|
|
75
114
|
end
|
|
76
115
|
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
|
|
77
116
|
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
|
|
78
|
-
|
|
117
|
+
if Aws::Endpoints::Matchers.string_equals?(region, "aws-global")
|
|
118
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-east-1"}]})
|
|
119
|
+
end
|
|
120
|
+
if Aws::Endpoints::Matchers.string_equals?(region, "aws-us-gov-global")
|
|
121
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam.us-gov.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-gov-west-1"}]})
|
|
122
|
+
end
|
|
123
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.#{partition_result['dnsSuffix']}", headers: {}, properties: {})
|
|
79
124
|
end
|
|
80
125
|
raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
|
|
81
126
|
end
|
|
82
127
|
if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
|
|
83
128
|
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
|
|
84
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}
|
|
129
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.#{partition_result['dualStackDnsSuffix']}", headers: {}, properties: {})
|
|
85
130
|
end
|
|
86
131
|
raise ArgumentError, "DualStack is enabled but this partition does not support DualStack"
|
|
87
132
|
end
|
|
88
|
-
|
|
89
|
-
|
|
90
|
-
if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws-iso")
|
|
91
|
-
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
|
|
92
|
-
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
|
|
93
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.c2s.ic.gov", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-iso-east-1", "signingName"=>"iam"}]})
|
|
94
|
-
end
|
|
95
|
-
raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
|
|
133
|
+
if Aws::Endpoints::Matchers.string_equals?(region, "aws-global")
|
|
134
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-east-1"}]})
|
|
96
135
|
end
|
|
97
|
-
|
|
98
|
-
|
|
99
|
-
if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws-iso-b")
|
|
100
|
-
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
|
|
101
|
-
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
|
|
102
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.sc2s.sgov.gov", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-isob-east-1", "signingName"=>"iam"}]})
|
|
103
|
-
end
|
|
104
|
-
raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
|
|
136
|
+
if Aws::Endpoints::Matchers.string_equals?(region, "aws-cn-global")
|
|
137
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam.cn-north-1.amazonaws.com.cn", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"cn-north-1"}]})
|
|
105
138
|
end
|
|
106
|
-
|
|
107
|
-
|
|
108
|
-
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true) && Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
|
|
109
|
-
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS")) && Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
|
|
110
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.#{partition_result['dualStackDnsSuffix']}", headers: {}, properties: {})
|
|
139
|
+
if Aws::Endpoints::Matchers.string_equals?(region, "aws-us-gov-global")
|
|
140
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam.us-gov.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-gov-west-1"}]})
|
|
111
141
|
end
|
|
112
|
-
|
|
113
|
-
|
|
114
|
-
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
|
|
115
|
-
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
|
|
116
|
-
if Aws::Endpoints::Matchers.string_equals?(region, "iam")
|
|
117
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-east-1", "signingName"=>"iam"}]})
|
|
118
|
-
end
|
|
119
|
-
if Aws::Endpoints::Matchers.string_equals?(region, "aws-global")
|
|
120
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-east-1", "signingName"=>"iam"}]})
|
|
121
|
-
end
|
|
122
|
-
if Aws::Endpoints::Matchers.string_equals?(region, "iam-govcloud")
|
|
123
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam.us-gov.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-gov-west-1", "signingName"=>"iam"}]})
|
|
124
|
-
end
|
|
125
|
-
if Aws::Endpoints::Matchers.string_equals?(region, "aws-us-gov-global")
|
|
126
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam.us-gov.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-gov-west-1", "signingName"=>"iam"}]})
|
|
127
|
-
end
|
|
128
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.#{partition_result['dnsSuffix']}", headers: {}, properties: {})
|
|
142
|
+
if Aws::Endpoints::Matchers.string_equals?(region, "aws-iso-global")
|
|
143
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam.us-iso-east-1.c2s.ic.gov", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-iso-east-1"}]})
|
|
129
144
|
end
|
|
130
|
-
|
|
131
|
-
|
|
132
|
-
if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
|
|
133
|
-
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
|
|
134
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.#{partition_result['dualStackDnsSuffix']}", headers: {}, properties: {})
|
|
145
|
+
if Aws::Endpoints::Matchers.string_equals?(region, "aws-iso-b-global")
|
|
146
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam.us-isob-east-1.sc2s.sgov.gov", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-isob-east-1"}]})
|
|
135
147
|
end
|
|
136
|
-
|
|
137
|
-
end
|
|
138
|
-
if Aws::Endpoints::Matchers.string_equals?(region, "aws-global")
|
|
139
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-east-1", "signingName"=>"iam"}]})
|
|
140
|
-
end
|
|
141
|
-
if Aws::Endpoints::Matchers.string_equals?(region, "aws-cn-global")
|
|
142
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam.cn-north-1.amazonaws.com.cn", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"cn-north-1", "signingName"=>"iam"}]})
|
|
143
|
-
end
|
|
144
|
-
if Aws::Endpoints::Matchers.string_equals?(region, "aws-us-gov-global")
|
|
145
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam.us-gov.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-gov-west-1", "signingName"=>"iam"}]})
|
|
146
|
-
end
|
|
147
|
-
if Aws::Endpoints::Matchers.string_equals?(region, "aws-iso-global")
|
|
148
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam.us-iso-east-1.c2s.ic.gov", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-iso-east-1", "signingName"=>"iam"}]})
|
|
149
|
-
end
|
|
150
|
-
if Aws::Endpoints::Matchers.string_equals?(region, "aws-iso-b-global")
|
|
151
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam.us-isob-east-1.sc2s.sgov.gov", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-isob-east-1", "signingName"=>"iam"}]})
|
|
148
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.#{partition_result['dnsSuffix']}", headers: {}, properties: {})
|
|
152
149
|
end
|
|
153
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.#{partition_result['dnsSuffix']}", headers: {}, properties: {})
|
|
154
150
|
end
|
|
151
|
+
raise ArgumentError, "Invalid Configuration: Missing Region"
|
|
155
152
|
raise ArgumentError, 'No endpoint could be resolved'
|
|
156
153
|
|
|
157
154
|
end
|
data/lib/aws-sdk-iam/resource.rb
CHANGED
|
@@ -455,6 +455,15 @@ module Aws::IAM
|
|
|
455
455
|
# IAM user, group, role, and policy names must be unique within the
|
|
456
456
|
# account. Names are not distinguished by case. For example, you cannot
|
|
457
457
|
# create resources named both "MyResource" and "myresource".
|
|
458
|
+
#
|
|
459
|
+
# This parameter allows (through its [regex pattern][1]) a string of
|
|
460
|
+
# characters consisting of upper and lowercase alphanumeric characters
|
|
461
|
+
# with no spaces. You can also include any of the following characters:
|
|
462
|
+
# \_+=,.@-
|
|
463
|
+
#
|
|
464
|
+
#
|
|
465
|
+
#
|
|
466
|
+
# [1]: http://wikipedia.org/wiki/regex
|
|
458
467
|
# @option options [required, String] :assume_role_policy_document
|
|
459
468
|
# The trust relationship policy document that grants an entity
|
|
460
469
|
# permission to assume the role.
|
|
@@ -505,8 +514,23 @@ module Aws::IAM
|
|
|
505
514
|
#
|
|
506
515
|
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html
|
|
507
516
|
# @option options [String] :permissions_boundary
|
|
508
|
-
# The ARN of the policy that is used to set the permissions
|
|
509
|
-
# the role.
|
|
517
|
+
# The ARN of the managed policy that is used to set the permissions
|
|
518
|
+
# boundary for the role.
|
|
519
|
+
#
|
|
520
|
+
# A permissions boundary policy defines the maximum permissions that
|
|
521
|
+
# identity-based policies can grant to an entity, but does not grant
|
|
522
|
+
# permissions. Permissions boundaries do not define the maximum
|
|
523
|
+
# permissions that a resource-based policy can grant to an entity. To
|
|
524
|
+
# learn more, see [Permissions boundaries for IAM entities][1] in the
|
|
525
|
+
# *IAM User Guide*.
|
|
526
|
+
#
|
|
527
|
+
# For more information about policy types, see [Policy types ][2] in the
|
|
528
|
+
# *IAM User Guide*.
|
|
529
|
+
#
|
|
530
|
+
#
|
|
531
|
+
#
|
|
532
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
|
|
533
|
+
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
|
|
510
534
|
# @option options [Array<Types::Tag>] :tags
|
|
511
535
|
# A list of tags that you want to attach to the new role. Each tag
|
|
512
536
|
# consists of a key name and an associated value. For more information
|
|
@@ -808,8 +832,23 @@ module Aws::IAM
|
|
|
808
832
|
# account. Names are not distinguished by case. For example, you cannot
|
|
809
833
|
# create resources named both "MyResource" and "myresource".
|
|
810
834
|
# @option options [String] :permissions_boundary
|
|
811
|
-
# The ARN of the policy that is used to set the permissions
|
|
812
|
-
# the user.
|
|
835
|
+
# The ARN of the managed policy that is used to set the permissions
|
|
836
|
+
# boundary for the user.
|
|
837
|
+
#
|
|
838
|
+
# A permissions boundary policy defines the maximum permissions that
|
|
839
|
+
# identity-based policies can grant to an entity, but does not grant
|
|
840
|
+
# permissions. Permissions boundaries do not define the maximum
|
|
841
|
+
# permissions that a resource-based policy can grant to an entity. To
|
|
842
|
+
# learn more, see [Permissions boundaries for IAM entities][1] in the
|
|
843
|
+
# *IAM User Guide*.
|
|
844
|
+
#
|
|
845
|
+
# For more information about policy types, see [Policy types ][2] in the
|
|
846
|
+
# *IAM User Guide*.
|
|
847
|
+
#
|
|
848
|
+
#
|
|
849
|
+
#
|
|
850
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
|
|
851
|
+
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
|
|
813
852
|
# @option options [Array<Types::Tag>] :tags
|
|
814
853
|
# A list of tags that you want to attach to the new user. Each tag
|
|
815
854
|
# consists of a key name and an associated value. For more information
|
|
@@ -866,8 +905,8 @@ module Aws::IAM
|
|
|
866
905
|
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html
|
|
867
906
|
# [2]: http://wikipedia.org/wiki/regex
|
|
868
907
|
# @option options [required, String] :virtual_mfa_device_name
|
|
869
|
-
# The name of the virtual MFA device
|
|
870
|
-
# a virtual MFA device.
|
|
908
|
+
# The name of the virtual MFA device, which must be unique. Use with
|
|
909
|
+
# path to uniquely identify a virtual MFA device.
|
|
871
910
|
#
|
|
872
911
|
# This parameter allows (through its [regex pattern][1]) a string of
|
|
873
912
|
# characters consisting of upper and lowercase alphanumeric characters
|
data/lib/aws-sdk-iam/role.rb
CHANGED
|
@@ -133,7 +133,7 @@ module Aws::IAM
|
|
|
133
133
|
# period can be shorter if your Region began supporting these features
|
|
134
134
|
# within the last year. The role might have been used more than 400 days
|
|
135
135
|
# ago. For more information, see [Regions where data is tracked][1] in
|
|
136
|
-
# the *IAM
|
|
136
|
+
# the *IAM user Guide*.
|
|
137
137
|
#
|
|
138
138
|
#
|
|
139
139
|
#
|
data/lib/aws-sdk-iam/types.rb
CHANGED
|
@@ -60,7 +60,7 @@ module Aws::IAM
|
|
|
60
60
|
# unauthenticated requests.
|
|
61
61
|
#
|
|
62
62
|
# This field is null if no principals (IAM users, IAM roles, or root
|
|
63
|
-
#
|
|
63
|
+
# user) in the reported Organizations entity attempted to access the
|
|
64
64
|
# service within the [tracking period][1].
|
|
65
65
|
#
|
|
66
66
|
#
|
|
@@ -85,9 +85,9 @@ module Aws::IAM
|
|
|
85
85
|
# @return [Time]
|
|
86
86
|
#
|
|
87
87
|
# @!attribute [rw] total_authenticated_entities
|
|
88
|
-
# The number of accounts with authenticated principals (root
|
|
89
|
-
#
|
|
90
|
-
#
|
|
88
|
+
# The number of accounts with authenticated principals (root user, IAM
|
|
89
|
+
# users, and IAM roles) that attempted to access the service in the
|
|
90
|
+
# tracking period.
|
|
91
91
|
# @return [Integer]
|
|
92
92
|
#
|
|
93
93
|
# @see http://docs.aws.amazon.com/goto/WebAPI/iam-2010-05-08/AccessDetail AWS API Documentation
|
|
@@ -891,7 +891,7 @@ module Aws::IAM
|
|
|
891
891
|
#
|
|
892
892
|
# For more information about obtaining the OIDC provider thumbprint,
|
|
893
893
|
# see [Obtaining the thumbprint for an OpenID Connect provider][1] in
|
|
894
|
-
# the *IAM
|
|
894
|
+
# the *IAM user Guide*.
|
|
895
895
|
#
|
|
896
896
|
#
|
|
897
897
|
#
|
|
@@ -1191,6 +1191,15 @@ module Aws::IAM
|
|
|
1191
1191
|
# account. Names are not distinguished by case. For example, you
|
|
1192
1192
|
# cannot create resources named both "MyResource" and
|
|
1193
1193
|
# "myresource".
|
|
1194
|
+
#
|
|
1195
|
+
# This parameter allows (through its [regex pattern][1]) a string of
|
|
1196
|
+
# characters consisting of upper and lowercase alphanumeric characters
|
|
1197
|
+
# with no spaces. You can also include any of the following
|
|
1198
|
+
# characters: \_+=,.@-
|
|
1199
|
+
#
|
|
1200
|
+
#
|
|
1201
|
+
#
|
|
1202
|
+
# [1]: http://wikipedia.org/wiki/regex
|
|
1194
1203
|
# @return [String]
|
|
1195
1204
|
#
|
|
1196
1205
|
# @!attribute [rw] assume_role_policy_document
|
|
@@ -1250,8 +1259,23 @@ module Aws::IAM
|
|
|
1250
1259
|
# @return [Integer]
|
|
1251
1260
|
#
|
|
1252
1261
|
# @!attribute [rw] permissions_boundary
|
|
1253
|
-
# The ARN of the policy that is used to set the permissions
|
|
1254
|
-
# for the role.
|
|
1262
|
+
# The ARN of the managed policy that is used to set the permissions
|
|
1263
|
+
# boundary for the role.
|
|
1264
|
+
#
|
|
1265
|
+
# A permissions boundary policy defines the maximum permissions that
|
|
1266
|
+
# identity-based policies can grant to an entity, but does not grant
|
|
1267
|
+
# permissions. Permissions boundaries do not define the maximum
|
|
1268
|
+
# permissions that a resource-based policy can grant to an entity. To
|
|
1269
|
+
# learn more, see [Permissions boundaries for IAM entities][1] in the
|
|
1270
|
+
# *IAM User Guide*.
|
|
1271
|
+
#
|
|
1272
|
+
# For more information about policy types, see [Policy types ][2] in
|
|
1273
|
+
# the *IAM User Guide*.
|
|
1274
|
+
#
|
|
1275
|
+
#
|
|
1276
|
+
#
|
|
1277
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
|
|
1278
|
+
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
|
|
1255
1279
|
# @return [String]
|
|
1256
1280
|
#
|
|
1257
1281
|
# @!attribute [rw] tags
|
|
@@ -1516,8 +1540,23 @@ module Aws::IAM
|
|
|
1516
1540
|
# @return [String]
|
|
1517
1541
|
#
|
|
1518
1542
|
# @!attribute [rw] permissions_boundary
|
|
1519
|
-
# The ARN of the policy that is used to set the permissions
|
|
1520
|
-
# for the user.
|
|
1543
|
+
# The ARN of the managed policy that is used to set the permissions
|
|
1544
|
+
# boundary for the user.
|
|
1545
|
+
#
|
|
1546
|
+
# A permissions boundary policy defines the maximum permissions that
|
|
1547
|
+
# identity-based policies can grant to an entity, but does not grant
|
|
1548
|
+
# permissions. Permissions boundaries do not define the maximum
|
|
1549
|
+
# permissions that a resource-based policy can grant to an entity. To
|
|
1550
|
+
# learn more, see [Permissions boundaries for IAM entities][1] in the
|
|
1551
|
+
# *IAM User Guide*.
|
|
1552
|
+
#
|
|
1553
|
+
# For more information about policy types, see [Policy types ][2] in
|
|
1554
|
+
# the *IAM User Guide*.
|
|
1555
|
+
#
|
|
1556
|
+
#
|
|
1557
|
+
#
|
|
1558
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
|
|
1559
|
+
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
|
|
1521
1560
|
# @return [String]
|
|
1522
1561
|
#
|
|
1523
1562
|
# @!attribute [rw] tags
|
|
@@ -1583,8 +1622,8 @@ module Aws::IAM
|
|
|
1583
1622
|
# @return [String]
|
|
1584
1623
|
#
|
|
1585
1624
|
# @!attribute [rw] virtual_mfa_device_name
|
|
1586
|
-
# The name of the virtual MFA device. Use with
|
|
1587
|
-
# identify a virtual MFA device.
|
|
1625
|
+
# The name of the virtual MFA device, which must be unique. Use with
|
|
1626
|
+
# path to uniquely identify a virtual MFA device.
|
|
1588
1627
|
#
|
|
1589
1628
|
# This parameter allows (through its [regex pattern][1]) a string of
|
|
1590
1629
|
# characters consisting of upper and lowercase alphanumeric characters
|
|
@@ -8130,8 +8169,23 @@ module Aws::IAM
|
|
|
8130
8169
|
# @return [String]
|
|
8131
8170
|
#
|
|
8132
8171
|
# @!attribute [rw] permissions_boundary
|
|
8133
|
-
# The ARN of the policy that is used to set the permissions
|
|
8134
|
-
# for the role.
|
|
8172
|
+
# The ARN of the managed policy that is used to set the permissions
|
|
8173
|
+
# boundary for the role.
|
|
8174
|
+
#
|
|
8175
|
+
# A permissions boundary policy defines the maximum permissions that
|
|
8176
|
+
# identity-based policies can grant to an entity, but does not grant
|
|
8177
|
+
# permissions. Permissions boundaries do not define the maximum
|
|
8178
|
+
# permissions that a resource-based policy can grant to an entity. To
|
|
8179
|
+
# learn more, see [Permissions boundaries for IAM entities][1] in the
|
|
8180
|
+
# *IAM User Guide*.
|
|
8181
|
+
#
|
|
8182
|
+
# For more information about policy types, see [Policy types ][2] in
|
|
8183
|
+
# the *IAM User Guide*.
|
|
8184
|
+
#
|
|
8185
|
+
#
|
|
8186
|
+
#
|
|
8187
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
|
|
8188
|
+
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
|
|
8135
8189
|
# @return [String]
|
|
8136
8190
|
#
|
|
8137
8191
|
# @see http://docs.aws.amazon.com/goto/WebAPI/iam-2010-05-08/PutRolePermissionsBoundaryRequest AWS API Documentation
|
|
@@ -8210,8 +8264,23 @@ module Aws::IAM
|
|
|
8210
8264
|
# @return [String]
|
|
8211
8265
|
#
|
|
8212
8266
|
# @!attribute [rw] permissions_boundary
|
|
8213
|
-
# The ARN of the policy that is used to set the permissions
|
|
8214
|
-
# for the user.
|
|
8267
|
+
# The ARN of the managed policy that is used to set the permissions
|
|
8268
|
+
# boundary for the user.
|
|
8269
|
+
#
|
|
8270
|
+
# A permissions boundary policy defines the maximum permissions that
|
|
8271
|
+
# identity-based policies can grant to an entity, but does not grant
|
|
8272
|
+
# permissions. Permissions boundaries do not define the maximum
|
|
8273
|
+
# permissions that a resource-based policy can grant to an entity. To
|
|
8274
|
+
# learn more, see [Permissions boundaries for IAM entities][1] in the
|
|
8275
|
+
# *IAM User Guide*.
|
|
8276
|
+
#
|
|
8277
|
+
# For more information about policy types, see [Policy types ][2] in
|
|
8278
|
+
# the *IAM User Guide*.
|
|
8279
|
+
#
|
|
8280
|
+
#
|
|
8281
|
+
#
|
|
8282
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
|
|
8283
|
+
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
|
|
8215
8284
|
# @return [String]
|
|
8216
8285
|
#
|
|
8217
8286
|
# @see http://docs.aws.amazon.com/goto/WebAPI/iam-2010-05-08/PutUserPermissionsBoundaryRequest AWS API Documentation
|
|
@@ -8648,7 +8717,7 @@ module Aws::IAM
|
|
|
8648
8717
|
# period can be shorter if your Region began supporting these features
|
|
8649
8718
|
# within the last year. The role might have been used more than 400
|
|
8650
8719
|
# days ago. For more information, see [Regions where data is
|
|
8651
|
-
# tracked][1] in the *IAM
|
|
8720
|
+
# tracked][1] in the *IAM user Guide*.
|
|
8652
8721
|
#
|
|
8653
8722
|
#
|
|
8654
8723
|
#
|
|
@@ -8802,7 +8871,7 @@ module Aws::IAM
|
|
|
8802
8871
|
# period can be shorter if your Region began supporting these features
|
|
8803
8872
|
# within the last year. The role might have been used more than 400 days
|
|
8804
8873
|
# ago. For more information, see [Regions where data is tracked][1] in
|
|
8805
|
-
# the *IAM
|
|
8874
|
+
# the *IAM user Guide*.
|
|
8806
8875
|
#
|
|
8807
8876
|
# This data type is returned as a response element in the GetRole and
|
|
8808
8877
|
# GetAccountAuthorizationDetails operations.
|
|
@@ -9504,6 +9573,11 @@ module Aws::IAM
|
|
|
9504
9573
|
# For more information about ARNs, see [Amazon Resource Names
|
|
9505
9574
|
# (ARNs)][1] in the *Amazon Web Services General Reference*.
|
|
9506
9575
|
#
|
|
9576
|
+
# <note markdown="1"> Simulation of resource-based policies isn't supported for IAM
|
|
9577
|
+
# roles.
|
|
9578
|
+
#
|
|
9579
|
+
# </note>
|
|
9580
|
+
#
|
|
9507
9581
|
#
|
|
9508
9582
|
#
|
|
9509
9583
|
# [1]: https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html
|
|
@@ -9532,6 +9606,11 @@ module Aws::IAM
|
|
|
9532
9606
|
# * The special characters tab (`\u0009`), line feed (`\u000A`), and
|
|
9533
9607
|
# carriage return (`\u000D`)
|
|
9534
9608
|
#
|
|
9609
|
+
# <note markdown="1"> Simulation of resource-based policies isn't supported for IAM
|
|
9610
|
+
# roles.
|
|
9611
|
+
#
|
|
9612
|
+
# </note>
|
|
9613
|
+
#
|
|
9535
9614
|
#
|
|
9536
9615
|
#
|
|
9537
9616
|
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-quotas-entity-length
|
|
@@ -9789,6 +9868,11 @@ module Aws::IAM
|
|
|
9789
9868
|
# For more information about ARNs, see [Amazon Resource Names
|
|
9790
9869
|
# (ARNs)][1] in the *Amazon Web Services General Reference*.
|
|
9791
9870
|
#
|
|
9871
|
+
# <note markdown="1"> Simulation of resource-based policies isn't supported for IAM
|
|
9872
|
+
# roles.
|
|
9873
|
+
#
|
|
9874
|
+
# </note>
|
|
9875
|
+
#
|
|
9792
9876
|
#
|
|
9793
9877
|
#
|
|
9794
9878
|
# [1]: https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html
|
|
@@ -9817,6 +9901,11 @@ module Aws::IAM
|
|
|
9817
9901
|
# * The special characters tab (`\u0009`), line feed (`\u000A`), and
|
|
9818
9902
|
# carriage return (`\u000D`)
|
|
9819
9903
|
#
|
|
9904
|
+
# <note markdown="1"> Simulation of resource-based policies isn't supported for IAM
|
|
9905
|
+
# roles.
|
|
9906
|
+
#
|
|
9907
|
+
# </note>
|
|
9908
|
+
#
|
|
9820
9909
|
#
|
|
9821
9910
|
#
|
|
9822
9911
|
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-quotas-entity-length
|
data/lib/aws-sdk-iam/user.rb
CHANGED
|
@@ -379,8 +379,23 @@ module Aws::IAM
|
|
|
379
379
|
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html
|
|
380
380
|
# [2]: http://wikipedia.org/wiki/regex
|
|
381
381
|
# @option options [String] :permissions_boundary
|
|
382
|
-
# The ARN of the policy that is used to set the permissions
|
|
383
|
-
# the user.
|
|
382
|
+
# The ARN of the managed policy that is used to set the permissions
|
|
383
|
+
# boundary for the user.
|
|
384
|
+
#
|
|
385
|
+
# A permissions boundary policy defines the maximum permissions that
|
|
386
|
+
# identity-based policies can grant to an entity, but does not grant
|
|
387
|
+
# permissions. Permissions boundaries do not define the maximum
|
|
388
|
+
# permissions that a resource-based policy can grant to an entity. To
|
|
389
|
+
# learn more, see [Permissions boundaries for IAM entities][1] in the
|
|
390
|
+
# *IAM User Guide*.
|
|
391
|
+
#
|
|
392
|
+
# For more information about policy types, see [Policy types ][2] in the
|
|
393
|
+
# *IAM User Guide*.
|
|
394
|
+
#
|
|
395
|
+
#
|
|
396
|
+
#
|
|
397
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
|
|
398
|
+
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
|
|
384
399
|
# @option options [Array<Types::Tag>] :tags
|
|
385
400
|
# A list of tags that you want to attach to the new user. Each tag
|
|
386
401
|
# consists of a key name and an associated value. For more information
|
data/lib/aws-sdk-iam.rb
CHANGED
metadata
CHANGED
|
@@ -1,14 +1,14 @@
|
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
|
2
2
|
name: aws-sdk-iam
|
|
3
3
|
version: !ruby/object:Gem::Version
|
|
4
|
-
version: 1.
|
|
4
|
+
version: 1.76.0
|
|
5
5
|
platform: ruby
|
|
6
6
|
authors:
|
|
7
7
|
- Amazon Web Services
|
|
8
8
|
autorequire:
|
|
9
9
|
bindir: bin
|
|
10
10
|
cert_chain: []
|
|
11
|
-
date: 2023-
|
|
11
|
+
date: 2023-03-14 00:00:00.000000000 Z
|
|
12
12
|
dependencies:
|
|
13
13
|
- !ruby/object:Gem::Dependency
|
|
14
14
|
name: aws-sdk-core
|