aws-sdk-iam 1.74.0 → 1.76.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 772aef53edcb2dcfd825515204fcb855d4c189accf178b15c21949a755bac3d5
4
- data.tar.gz: 1d8109abe12a8082ad44f2672d1fd3189dac90dd49cd947992997f80c7f861a5
3
+ metadata.gz: 4a338135d35d293d96f6adaaff90cc637e1622164c670c215e3ea294f7918abd
4
+ data.tar.gz: 76d331e00da6de881cfcd70d00f2cc404952d7a3ef98043020f93bcce88cd2bc
5
5
  SHA512:
6
- metadata.gz: c345d0c8a4cfdc02be9938560f8cb82196176c14fd9822a903e8e032f5aae4423d2af3a99bbf88c2c14be01fc86f3ef2399d9d933ce6ac2333ff97337a239dfb
7
- data.tar.gz: f8f21b795a257ece2eda80c18ec9cf8a0b68a1034982243423a12991fa10db563dbfdfdc5d5fc515c3b4d97bd15d23c420d4fd1b63cdf8d92a5dc28f780e3d0e
6
+ metadata.gz: 181b0658ff859256eb96c0ff80f54a07ba8bf26bfd15569b0e1c7d9deb269138c0fa504e1ba672e04243733a60cfe7ddcf0374aaf5d6439675ba8b7d9ff5832d
7
+ data.tar.gz: 7a17eb50ab3b44f866011af847ce088b652cc1105a45f8f6cd4ee934b274a6807f5b7201bb33448c140a614739c2b543bf37f0dececc37cc386f856b59787e8a
data/CHANGELOG.md CHANGED
@@ -1,6 +1,16 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.76.0 (2023-03-14)
5
+ ------------------
6
+
7
+ * Feature - Documentation only updates to correct customer-reported issues
8
+
9
+ 1.75.0 (2023-02-01)
10
+ ------------------
11
+
12
+ * Feature - Documentation updates for AWS Identity and Access Management (IAM).
13
+
4
14
  1.74.0 (2023-01-18)
5
15
  ------------------
6
16
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.74.0
1
+ 1.76.0
@@ -1289,6 +1289,8 @@ module Aws::IAM
1289
1289
  # application or applications allowed to authenticate using the OIDC
1290
1290
  # provider
1291
1291
  #
1292
+ # * A list of tags that are attached to the specified IAM OIDC provider
1293
+ #
1292
1294
  # * A list of thumbprints of one or more server certificates that the
1293
1295
  # IdP uses
1294
1296
  #
@@ -1298,10 +1300,10 @@ module Aws::IAM
1298
1300
  # <note markdown="1"> Amazon Web Services secures communication with some OIDC identity
1299
1301
  # providers (IdPs) through our library of trusted certificate
1300
1302
  # authorities (CAs) instead of using a certificate thumbprint to verify
1301
- # your IdP server certificate. These OIDC IdPs include Google, and those
1302
- # that use an Amazon S3 bucket to host a JSON Web Key Set (JWKS)
1303
- # endpoint. In these cases, your legacy thumbprint remains in your
1304
- # configuration, but is no longer used for validation.
1303
+ # your IdP server certificate. These OIDC IdPs include Google, Auth0,
1304
+ # and those that use an Amazon S3 bucket to host a JSON Web Key Set
1305
+ # (JWKS) endpoint. In these cases, your legacy thumbprint remains in
1306
+ # your configuration, but is no longer used for validation.
1305
1307
  #
1306
1308
  # </note>
1307
1309
  #
@@ -1364,7 +1366,7 @@ module Aws::IAM
1364
1366
  #
1365
1367
  # For more information about obtaining the OIDC provider thumbprint, see
1366
1368
  # [Obtaining the thumbprint for an OpenID Connect provider][1] in the
1367
- # *IAM User Guide*.
1369
+ # *IAM user Guide*.
1368
1370
  #
1369
1371
  #
1370
1372
  #
@@ -1737,6 +1739,15 @@ module Aws::IAM
1737
1739
  # account. Names are not distinguished by case. For example, you cannot
1738
1740
  # create resources named both "MyResource" and "myresource".
1739
1741
  #
1742
+ # This parameter allows (through its [regex pattern][1]) a string of
1743
+ # characters consisting of upper and lowercase alphanumeric characters
1744
+ # with no spaces. You can also include any of the following characters:
1745
+ # \_+=,.@-
1746
+ #
1747
+ #
1748
+ #
1749
+ # [1]: http://wikipedia.org/wiki/regex
1750
+ #
1740
1751
  # @option params [required, String] :assume_role_policy_document
1741
1752
  # The trust relationship policy document that grants an entity
1742
1753
  # permission to assume the role.
@@ -1790,8 +1801,23 @@ module Aws::IAM
1790
1801
  # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html
1791
1802
  #
1792
1803
  # @option params [String] :permissions_boundary
1793
- # The ARN of the policy that is used to set the permissions boundary for
1794
- # the role.
1804
+ # The ARN of the managed policy that is used to set the permissions
1805
+ # boundary for the role.
1806
+ #
1807
+ # A permissions boundary policy defines the maximum permissions that
1808
+ # identity-based policies can grant to an entity, but does not grant
1809
+ # permissions. Permissions boundaries do not define the maximum
1810
+ # permissions that a resource-based policy can grant to an entity. To
1811
+ # learn more, see [Permissions boundaries for IAM entities][1] in the
1812
+ # *IAM User Guide*.
1813
+ #
1814
+ # For more information about policy types, see [Policy types ][2] in the
1815
+ # *IAM User Guide*.
1816
+ #
1817
+ #
1818
+ #
1819
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
1820
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
1795
1821
  #
1796
1822
  # @option params [Array<Types::Tag>] :tags
1797
1823
  # A list of tags that you want to attach to the new role. Each tag
@@ -2183,8 +2209,23 @@ module Aws::IAM
2183
2209
  # create resources named both "MyResource" and "myresource".
2184
2210
  #
2185
2211
  # @option params [String] :permissions_boundary
2186
- # The ARN of the policy that is used to set the permissions boundary for
2187
- # the user.
2212
+ # The ARN of the managed policy that is used to set the permissions
2213
+ # boundary for the user.
2214
+ #
2215
+ # A permissions boundary policy defines the maximum permissions that
2216
+ # identity-based policies can grant to an entity, but does not grant
2217
+ # permissions. Permissions boundaries do not define the maximum
2218
+ # permissions that a resource-based policy can grant to an entity. To
2219
+ # learn more, see [Permissions boundaries for IAM entities][1] in the
2220
+ # *IAM User Guide*.
2221
+ #
2222
+ # For more information about policy types, see [Policy types ][2] in the
2223
+ # *IAM User Guide*.
2224
+ #
2225
+ #
2226
+ #
2227
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
2228
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
2188
2229
  #
2189
2230
  # @option params [Array<Types::Tag>] :tags
2190
2231
  # A list of tags that you want to attach to the new user. Each tag
@@ -2303,8 +2344,8 @@ module Aws::IAM
2303
2344
  # [2]: http://wikipedia.org/wiki/regex
2304
2345
  #
2305
2346
  # @option params [required, String] :virtual_mfa_device_name
2306
- # The name of the virtual MFA device. Use with path to uniquely identify
2307
- # a virtual MFA device.
2347
+ # The name of the virtual MFA device, which must be unique. Use with
2348
+ # path to uniquely identify a virtual MFA device.
2308
2349
  #
2309
2350
  # This parameter allows (through its [regex pattern][1]) a string of
2310
2351
  # characters consisting of upper and lowercase alphanumeric characters
@@ -2916,9 +2957,20 @@ module Aws::IAM
2916
2957
  req.send_request(options)
2917
2958
  end
2918
2959
 
2919
- # Deletes the specified role. The role must not have any policies
2920
- # attached. For more information about roles, see [Working with
2921
- # roles][1].
2960
+ # Deletes the specified role. Unlike the Amazon Web Services Management
2961
+ # Console, when you delete a role programmatically, you must delete the
2962
+ # items attached to the role manually, or the deletion fails. For more
2963
+ # information, see [Deleting an IAM role][1]. Before attempting to
2964
+ # delete a role, remove the following attached items:
2965
+ #
2966
+ # * Inline policies (DeleteRolePolicy)
2967
+ #
2968
+ # * Attached managed policies (DetachRolePolicy)
2969
+ #
2970
+ # * Instance profile (RemoveRoleFromInstanceProfile)
2971
+ #
2972
+ # * Optional – Delete instance profile after detaching from role for
2973
+ # resource clean up (DeleteInstanceProfile)
2922
2974
  #
2923
2975
  # Make sure that you do not have any Amazon EC2 instances running with
2924
2976
  # the role you are about to delete. Deleting a role or instance profile
@@ -2927,7 +2979,7 @@ module Aws::IAM
2927
2979
  #
2928
2980
  #
2929
2981
  #
2930
- # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/WorkingWithRoles.html
2982
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_manage_delete.html#roles-managingrole-deleting-cli
2931
2983
  #
2932
2984
  # @option params [required, String] :role_name
2933
2985
  # The name of the role to delete.
@@ -5038,7 +5090,7 @@ module Aws::IAM
5038
5090
  # operation. For more information, see [Refining permissions using
5039
5091
  # service last accessed data][1] in the *IAM User Guide*.
5040
5092
  #
5041
- # For each service that principals in an account (root users, IAM users,
5093
+ # For each service that principals in an account (root user, IAM users,
5042
5094
  # or IAM roles) could access using SCPs, the operation returns details
5043
5095
  # about the most recent access attempt. If there was no attempt, the
5044
5096
  # service is listed without details about the most recent attempt to
@@ -9356,8 +9408,23 @@ module Aws::IAM
9356
9408
  # to set the permissions boundary.
9357
9409
  #
9358
9410
  # @option params [required, String] :permissions_boundary
9359
- # The ARN of the policy that is used to set the permissions boundary for
9360
- # the role.
9411
+ # The ARN of the managed policy that is used to set the permissions
9412
+ # boundary for the role.
9413
+ #
9414
+ # A permissions boundary policy defines the maximum permissions that
9415
+ # identity-based policies can grant to an entity, but does not grant
9416
+ # permissions. Permissions boundaries do not define the maximum
9417
+ # permissions that a resource-based policy can grant to an entity. To
9418
+ # learn more, see [Permissions boundaries for IAM entities][1] in the
9419
+ # *IAM User Guide*.
9420
+ #
9421
+ # For more information about policy types, see [Policy types ][2] in the
9422
+ # *IAM User Guide*.
9423
+ #
9424
+ #
9425
+ #
9426
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
9427
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
9361
9428
  #
9362
9429
  # @return [Struct] Returns an empty {Seahorse::Client::Response response}.
9363
9430
  #
@@ -9509,8 +9576,23 @@ module Aws::IAM
9509
9576
  # to set the permissions boundary.
9510
9577
  #
9511
9578
  # @option params [required, String] :permissions_boundary
9512
- # The ARN of the policy that is used to set the permissions boundary for
9513
- # the user.
9579
+ # The ARN of the managed policy that is used to set the permissions
9580
+ # boundary for the user.
9581
+ #
9582
+ # A permissions boundary policy defines the maximum permissions that
9583
+ # identity-based policies can grant to an entity, but does not grant
9584
+ # permissions. Permissions boundaries do not define the maximum
9585
+ # permissions that a resource-based policy can grant to an entity. To
9586
+ # learn more, see [Permissions boundaries for IAM entities][1] in the
9587
+ # *IAM User Guide*.
9588
+ #
9589
+ # For more information about policy types, see [Policy types ][2] in the
9590
+ # *IAM User Guide*.
9591
+ #
9592
+ #
9593
+ #
9594
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
9595
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
9514
9596
  #
9515
9597
  # @return [Struct] Returns an empty {Seahorse::Client::Response response}.
9516
9598
  #
@@ -10071,9 +10153,16 @@ module Aws::IAM
10071
10153
  # If the output is long, you can use `MaxItems` and `Marker` parameters
10072
10154
  # to paginate the results.
10073
10155
  #
10074
- # For more information about using the policy simulator, see [Testing
10075
- # IAM policies with the IAM policy simulator ][1]in the *IAM User
10076
- # Guide*.
10156
+ # <note markdown="1"> The IAM policy simulator evaluates statements in the identity-based
10157
+ # policy and the inputs that you provide during simulation. The policy
10158
+ # simulator results can differ from your live Amazon Web Services
10159
+ # environment. We recommend that you check your policies against your
10160
+ # live Amazon Web Services environment after testing using the policy
10161
+ # simulator to confirm that you have the desired results. For more
10162
+ # information about using the policy simulator, see [Testing IAM
10163
+ # policies with the IAM policy simulator ][1]in the *IAM User Guide*.
10164
+ #
10165
+ # </note>
10077
10166
  #
10078
10167
  #
10079
10168
  #
@@ -10173,6 +10262,10 @@ module Aws::IAM
10173
10262
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
10174
10263
  # in the *Amazon Web Services General Reference*.
10175
10264
  #
10265
+ # <note markdown="1"> Simulation of resource-based policies isn't supported for IAM roles.
10266
+ #
10267
+ # </note>
10268
+ #
10176
10269
  #
10177
10270
  #
10178
10271
  # [1]: https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html
@@ -10200,6 +10293,10 @@ module Aws::IAM
10200
10293
  # * The special characters tab (`\u0009`), line feed (`\u000A`), and
10201
10294
  # carriage return (`\u000D`)
10202
10295
  #
10296
+ # <note markdown="1"> Simulation of resource-based policies isn't supported for IAM roles.
10297
+ #
10298
+ # </note>
10299
+ #
10203
10300
  #
10204
10301
  #
10205
10302
  # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-quotas-entity-length
@@ -10382,7 +10479,8 @@ module Aws::IAM
10382
10479
  # instead.
10383
10480
  #
10384
10481
  # You can also optionally include one resource-based policy to be
10385
- # evaluated with each of the resources included in the simulation.
10482
+ # evaluated with each of the resources included in the simulation for
10483
+ # IAM users only.
10386
10484
  #
10387
10485
  # The simulation does not perform the API operations; it only checks the
10388
10486
  # authorization to determine if the simulated policies allow or deny the
@@ -10403,9 +10501,16 @@ module Aws::IAM
10403
10501
  # If the output is long, you can use the `MaxItems` and `Marker`
10404
10502
  # parameters to paginate the results.
10405
10503
  #
10406
- # For more information about using the policy simulator, see [Testing
10407
- # IAM policies with the IAM policy simulator ][1]in the *IAM User
10408
- # Guide*.
10504
+ # <note markdown="1"> The IAM policy simulator evaluates statements in the identity-based
10505
+ # policy and the inputs that you provide during simulation. The policy
10506
+ # simulator results can differ from your live Amazon Web Services
10507
+ # environment. We recommend that you check your policies against your
10508
+ # live Amazon Web Services environment after testing using the policy
10509
+ # simulator to confirm that you have the desired results. For more
10510
+ # information about using the policy simulator, see [Testing IAM
10511
+ # policies with the IAM policy simulator ][1]in the *IAM User Guide*.
10512
+ #
10513
+ # </note>
10409
10514
  #
10410
10515
  #
10411
10516
  #
@@ -10511,6 +10616,10 @@ module Aws::IAM
10511
10616
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
10512
10617
  # in the *Amazon Web Services General Reference*.
10513
10618
  #
10619
+ # <note markdown="1"> Simulation of resource-based policies isn't supported for IAM roles.
10620
+ #
10621
+ # </note>
10622
+ #
10514
10623
  #
10515
10624
  #
10516
10625
  # [1]: https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html
@@ -10538,6 +10647,10 @@ module Aws::IAM
10538
10647
  # * The special characters tab (`\u0009`), line feed (`\u000A`), and
10539
10648
  # carriage return (`\u000D`)
10540
10649
  #
10650
+ # <note markdown="1"> Simulation of resource-based policies isn't supported for IAM roles.
10651
+ #
10652
+ # </note>
10653
+ #
10541
10654
  #
10542
10655
  #
10543
10656
  # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-quotas-entity-length
@@ -10884,7 +10997,7 @@ module Aws::IAM
10884
10997
  # *MyImportantProject*. Or search for all resources with the key name
10885
10998
  # *Cost Center* and the value *41200*.
10886
10999
  #
10887
- # * **Access control** - Include tags in IAM user-based and
11000
+ # * **Access control** - Include tags in IAM identity-based and
10888
11001
  # resource-based policies. You can use tags to restrict access to only
10889
11002
  # an OIDC provider that has a specified tag attached. For examples of
10890
11003
  # policies that show how to use tags to control access, see [Control
@@ -11303,7 +11416,7 @@ module Aws::IAM
11303
11416
  # *MyImportantProject*. Or search for all resources with the key name
11304
11417
  # *Cost Center* and the value *41200*.
11305
11418
  #
11306
- # * **Access control** - Include tags in IAM user-based and
11419
+ # * **Access control** - Include tags in IAM identity-based and
11307
11420
  # resource-based policies. You can use tags to restrict access to only
11308
11421
  # an IAM requesting user that has a specified tag attached. You can
11309
11422
  # also restrict access to only those resources that have a certain tag
@@ -12255,10 +12368,10 @@ module Aws::IAM
12255
12368
  # <note markdown="1"> Amazon Web Services secures communication with some OIDC identity
12256
12369
  # providers (IdPs) through our library of trusted certificate
12257
12370
  # authorities (CAs) instead of using a certificate thumbprint to verify
12258
- # your IdP server certificate. These OIDC IdPs include Google, and those
12259
- # that use an Amazon S3 bucket to host a JSON Web Key Set (JWKS)
12260
- # endpoint. In these cases, your legacy thumbprint remains in your
12261
- # configuration, but is no longer used for validation.
12371
+ # your IdP server certificate. These OIDC IdPs include Google, Auth0,
12372
+ # and those that use an Amazon S3 bucket to host a JSON Web Key Set
12373
+ # (JWKS) endpoint. In these cases, your legacy thumbprint remains in
12374
+ # your configuration, but is no longer used for validation.
12262
12375
  #
12263
12376
  # </note>
12264
12377
  #
@@ -13233,7 +13346,7 @@ module Aws::IAM
13233
13346
  params: params,
13234
13347
  config: config)
13235
13348
  context[:gem_name] = 'aws-sdk-iam'
13236
- context[:gem_version] = '1.74.0'
13349
+ context[:gem_version] = '1.76.0'
13237
13350
  Seahorse::Client::Request.new(handlers, context)
13238
13351
  end
13239
13352
 
@@ -14,144 +14,141 @@ module Aws::IAM
14
14
  use_dual_stack = parameters.use_dual_stack
15
15
  use_fips = parameters.use_fips
16
16
  endpoint = parameters.endpoint
17
- if (partition_result = Aws::Endpoints::Matchers.aws_partition(region))
18
- if Aws::Endpoints::Matchers.set?(endpoint) && (url = Aws::Endpoints::Matchers.parse_url(endpoint))
19
- if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
20
- raise ArgumentError, "Invalid Configuration: FIPS and custom endpoint are not supported"
21
- end
22
- if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
23
- raise ArgumentError, "Invalid Configuration: Dualstack and custom endpoint are not supported"
24
- end
25
- return Aws::Endpoints::Endpoint.new(url: endpoint, headers: {}, properties: {})
17
+ if Aws::Endpoints::Matchers.set?(endpoint)
18
+ if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
19
+ raise ArgumentError, "Invalid Configuration: FIPS and custom endpoint are not supported"
26
20
  end
27
- if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws")
28
- if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true) && Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
29
- if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS")) && Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
30
- return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.api.aws", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-east-1", "signingName"=>"iam"}]})
21
+ if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
22
+ raise ArgumentError, "Invalid Configuration: Dualstack and custom endpoint are not supported"
23
+ end
24
+ return Aws::Endpoints::Endpoint.new(url: endpoint, headers: {}, properties: {})
25
+ end
26
+ if Aws::Endpoints::Matchers.set?(region)
27
+ if (partition_result = Aws::Endpoints::Matchers.aws_partition(region))
28
+ if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws")
29
+ if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true) && Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
30
+ if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS")) && Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
31
+ return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.api.aws", headers: {}, properties: {})
32
+ end
33
+ raise ArgumentError, "FIPS and DualStack are enabled, but this partition does not support one or both"
31
34
  end
32
- raise ArgumentError, "FIPS and DualStack are enabled, but this partition does not support one or both"
33
- end
34
- if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
35
- if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
36
- return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-east-1", "signingName"=>"iam"}]})
35
+ if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
36
+ if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
37
+ return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-east-1"}]})
38
+ end
39
+ raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
37
40
  end
38
- raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
39
- end
40
- if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
41
- if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
42
- return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.api.aws", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-east-1", "signingName"=>"iam"}]})
41
+ if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
42
+ if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
43
+ return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.api.aws", headers: {}, properties: {})
44
+ end
45
+ raise ArgumentError, "DualStack is enabled but this partition does not support DualStack"
43
46
  end
44
- raise ArgumentError, "DualStack is enabled but this partition does not support DualStack"
45
- end
46
- return Aws::Endpoints::Endpoint.new(url: "https://iam.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-east-1", "signingName"=>"iam"}]})
47
- end
48
- if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws-cn")
49
- if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true) && Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
50
- if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS")) && Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
51
- return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.api.amazonwebservices.com.cn", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"cn-north-1", "signingName"=>"iam"}]})
47
+ return Aws::Endpoints::Endpoint.new(url: "https://iam.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-east-1"}]})
48
+ end
49
+ if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws-cn")
50
+ if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true) && Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
51
+ if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS")) && Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
52
+ return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.api.amazonwebservices.com.cn", headers: {}, properties: {})
53
+ end
54
+ raise ArgumentError, "FIPS and DualStack are enabled, but this partition does not support one or both"
52
55
  end
53
- raise ArgumentError, "FIPS and DualStack are enabled, but this partition does not support one or both"
54
- end
55
- if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
56
- if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
57
- return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.amazonaws.com.cn", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"cn-north-1", "signingName"=>"iam"}]})
56
+ if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
57
+ if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
58
+ return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.amazonaws.com.cn", headers: {}, properties: {})
59
+ end
60
+ raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
58
61
  end
59
- raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
60
- end
61
- if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
62
- if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
63
- return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.api.amazonwebservices.com.cn", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"cn-north-1", "signingName"=>"iam"}]})
62
+ if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
63
+ if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
64
+ return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.api.amazonwebservices.com.cn", headers: {}, properties: {})
65
+ end
66
+ raise ArgumentError, "DualStack is enabled but this partition does not support DualStack"
64
67
  end
65
- raise ArgumentError, "DualStack is enabled but this partition does not support DualStack"
68
+ return Aws::Endpoints::Endpoint.new(url: "https://iam.cn-north-1.amazonaws.com.cn", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"cn-north-1"}]})
69
+ end
70
+ if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws-us-gov")
71
+ if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true) && Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
72
+ if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS")) && Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
73
+ return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.api.aws", headers: {}, properties: {})
74
+ end
75
+ raise ArgumentError, "FIPS and DualStack are enabled, but this partition does not support one or both"
76
+ end
77
+ if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
78
+ if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
79
+ return Aws::Endpoints::Endpoint.new(url: "https://iam.us-gov.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-gov-west-1"}]})
80
+ end
81
+ raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
82
+ end
83
+ if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
84
+ if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
85
+ return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.api.aws", headers: {}, properties: {})
86
+ end
87
+ raise ArgumentError, "DualStack is enabled but this partition does not support DualStack"
88
+ end
89
+ return Aws::Endpoints::Endpoint.new(url: "https://iam.us-gov.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-gov-west-1"}]})
90
+ end
91
+ if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws-iso")
92
+ if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
93
+ if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
94
+ return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.c2s.ic.gov", headers: {}, properties: {})
95
+ end
96
+ raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
97
+ end
98
+ return Aws::Endpoints::Endpoint.new(url: "https://iam.us-iso-east-1.c2s.ic.gov", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-iso-east-1"}]})
99
+ end
100
+ if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws-iso-b")
101
+ if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
102
+ if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
103
+ return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.sc2s.sgov.gov", headers: {}, properties: {})
104
+ end
105
+ raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
106
+ end
107
+ return Aws::Endpoints::Endpoint.new(url: "https://iam.us-isob-east-1.sc2s.sgov.gov", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-isob-east-1"}]})
66
108
  end
67
- return Aws::Endpoints::Endpoint.new(url: "https://iam.cn-north-1.amazonaws.com.cn", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"cn-north-1", "signingName"=>"iam"}]})
68
- end
69
- if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws-us-gov")
70
109
  if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true) && Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
71
110
  if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS")) && Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
72
- return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.api.aws", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-gov-west-1", "signingName"=>"iam"}]})
111
+ return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.#{partition_result['dualStackDnsSuffix']}", headers: {}, properties: {})
73
112
  end
74
113
  raise ArgumentError, "FIPS and DualStack are enabled, but this partition does not support one or both"
75
114
  end
76
115
  if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
77
116
  if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
78
- return Aws::Endpoints::Endpoint.new(url: "https://iam.us-gov.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-gov-west-1", "signingName"=>"iam"}]})
117
+ if Aws::Endpoints::Matchers.string_equals?(region, "aws-global")
118
+ return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-east-1"}]})
119
+ end
120
+ if Aws::Endpoints::Matchers.string_equals?(region, "aws-us-gov-global")
121
+ return Aws::Endpoints::Endpoint.new(url: "https://iam.us-gov.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-gov-west-1"}]})
122
+ end
123
+ return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.#{partition_result['dnsSuffix']}", headers: {}, properties: {})
79
124
  end
80
125
  raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
81
126
  end
82
127
  if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
83
128
  if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
84
- return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.api.aws", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-gov-west-1", "signingName"=>"iam"}]})
129
+ return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.#{partition_result['dualStackDnsSuffix']}", headers: {}, properties: {})
85
130
  end
86
131
  raise ArgumentError, "DualStack is enabled but this partition does not support DualStack"
87
132
  end
88
- return Aws::Endpoints::Endpoint.new(url: "https://iam.us-gov.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-gov-west-1", "signingName"=>"iam"}]})
89
- end
90
- if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws-iso")
91
- if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
92
- if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
93
- return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.c2s.ic.gov", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-iso-east-1", "signingName"=>"iam"}]})
94
- end
95
- raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
133
+ if Aws::Endpoints::Matchers.string_equals?(region, "aws-global")
134
+ return Aws::Endpoints::Endpoint.new(url: "https://iam.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-east-1"}]})
96
135
  end
97
- return Aws::Endpoints::Endpoint.new(url: "https://iam.us-iso-east-1.c2s.ic.gov", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-iso-east-1", "signingName"=>"iam"}]})
98
- end
99
- if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws-iso-b")
100
- if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
101
- if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
102
- return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.sc2s.sgov.gov", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-isob-east-1", "signingName"=>"iam"}]})
103
- end
104
- raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
136
+ if Aws::Endpoints::Matchers.string_equals?(region, "aws-cn-global")
137
+ return Aws::Endpoints::Endpoint.new(url: "https://iam.cn-north-1.amazonaws.com.cn", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"cn-north-1"}]})
105
138
  end
106
- return Aws::Endpoints::Endpoint.new(url: "https://iam.us-isob-east-1.sc2s.sgov.gov", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-isob-east-1", "signingName"=>"iam"}]})
107
- end
108
- if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true) && Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
109
- if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS")) && Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
110
- return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.#{partition_result['dualStackDnsSuffix']}", headers: {}, properties: {})
139
+ if Aws::Endpoints::Matchers.string_equals?(region, "aws-us-gov-global")
140
+ return Aws::Endpoints::Endpoint.new(url: "https://iam.us-gov.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-gov-west-1"}]})
111
141
  end
112
- raise ArgumentError, "FIPS and DualStack are enabled, but this partition does not support one or both"
113
- end
114
- if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
115
- if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
116
- if Aws::Endpoints::Matchers.string_equals?(region, "iam")
117
- return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-east-1", "signingName"=>"iam"}]})
118
- end
119
- if Aws::Endpoints::Matchers.string_equals?(region, "aws-global")
120
- return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-east-1", "signingName"=>"iam"}]})
121
- end
122
- if Aws::Endpoints::Matchers.string_equals?(region, "iam-govcloud")
123
- return Aws::Endpoints::Endpoint.new(url: "https://iam.us-gov.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-gov-west-1", "signingName"=>"iam"}]})
124
- end
125
- if Aws::Endpoints::Matchers.string_equals?(region, "aws-us-gov-global")
126
- return Aws::Endpoints::Endpoint.new(url: "https://iam.us-gov.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-gov-west-1", "signingName"=>"iam"}]})
127
- end
128
- return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.#{partition_result['dnsSuffix']}", headers: {}, properties: {})
142
+ if Aws::Endpoints::Matchers.string_equals?(region, "aws-iso-global")
143
+ return Aws::Endpoints::Endpoint.new(url: "https://iam.us-iso-east-1.c2s.ic.gov", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-iso-east-1"}]})
129
144
  end
130
- raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
131
- end
132
- if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
133
- if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
134
- return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.#{partition_result['dualStackDnsSuffix']}", headers: {}, properties: {})
145
+ if Aws::Endpoints::Matchers.string_equals?(region, "aws-iso-b-global")
146
+ return Aws::Endpoints::Endpoint.new(url: "https://iam.us-isob-east-1.sc2s.sgov.gov", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-isob-east-1"}]})
135
147
  end
136
- raise ArgumentError, "DualStack is enabled but this partition does not support DualStack"
137
- end
138
- if Aws::Endpoints::Matchers.string_equals?(region, "aws-global")
139
- return Aws::Endpoints::Endpoint.new(url: "https://iam.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-east-1", "signingName"=>"iam"}]})
140
- end
141
- if Aws::Endpoints::Matchers.string_equals?(region, "aws-cn-global")
142
- return Aws::Endpoints::Endpoint.new(url: "https://iam.cn-north-1.amazonaws.com.cn", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"cn-north-1", "signingName"=>"iam"}]})
143
- end
144
- if Aws::Endpoints::Matchers.string_equals?(region, "aws-us-gov-global")
145
- return Aws::Endpoints::Endpoint.new(url: "https://iam.us-gov.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-gov-west-1", "signingName"=>"iam"}]})
146
- end
147
- if Aws::Endpoints::Matchers.string_equals?(region, "aws-iso-global")
148
- return Aws::Endpoints::Endpoint.new(url: "https://iam.us-iso-east-1.c2s.ic.gov", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-iso-east-1", "signingName"=>"iam"}]})
149
- end
150
- if Aws::Endpoints::Matchers.string_equals?(region, "aws-iso-b-global")
151
- return Aws::Endpoints::Endpoint.new(url: "https://iam.us-isob-east-1.sc2s.sgov.gov", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-isob-east-1", "signingName"=>"iam"}]})
148
+ return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.#{partition_result['dnsSuffix']}", headers: {}, properties: {})
152
149
  end
153
- return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.#{partition_result['dnsSuffix']}", headers: {}, properties: {})
154
150
  end
151
+ raise ArgumentError, "Invalid Configuration: Missing Region"
155
152
  raise ArgumentError, 'No endpoint could be resolved'
156
153
 
157
154
  end
@@ -455,6 +455,15 @@ module Aws::IAM
455
455
  # IAM user, group, role, and policy names must be unique within the
456
456
  # account. Names are not distinguished by case. For example, you cannot
457
457
  # create resources named both "MyResource" and "myresource".
458
+ #
459
+ # This parameter allows (through its [regex pattern][1]) a string of
460
+ # characters consisting of upper and lowercase alphanumeric characters
461
+ # with no spaces. You can also include any of the following characters:
462
+ # \_+=,.@-
463
+ #
464
+ #
465
+ #
466
+ # [1]: http://wikipedia.org/wiki/regex
458
467
  # @option options [required, String] :assume_role_policy_document
459
468
  # The trust relationship policy document that grants an entity
460
469
  # permission to assume the role.
@@ -505,8 +514,23 @@ module Aws::IAM
505
514
  #
506
515
  # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html
507
516
  # @option options [String] :permissions_boundary
508
- # The ARN of the policy that is used to set the permissions boundary for
509
- # the role.
517
+ # The ARN of the managed policy that is used to set the permissions
518
+ # boundary for the role.
519
+ #
520
+ # A permissions boundary policy defines the maximum permissions that
521
+ # identity-based policies can grant to an entity, but does not grant
522
+ # permissions. Permissions boundaries do not define the maximum
523
+ # permissions that a resource-based policy can grant to an entity. To
524
+ # learn more, see [Permissions boundaries for IAM entities][1] in the
525
+ # *IAM User Guide*.
526
+ #
527
+ # For more information about policy types, see [Policy types ][2] in the
528
+ # *IAM User Guide*.
529
+ #
530
+ #
531
+ #
532
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
533
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
510
534
  # @option options [Array<Types::Tag>] :tags
511
535
  # A list of tags that you want to attach to the new role. Each tag
512
536
  # consists of a key name and an associated value. For more information
@@ -808,8 +832,23 @@ module Aws::IAM
808
832
  # account. Names are not distinguished by case. For example, you cannot
809
833
  # create resources named both "MyResource" and "myresource".
810
834
  # @option options [String] :permissions_boundary
811
- # The ARN of the policy that is used to set the permissions boundary for
812
- # the user.
835
+ # The ARN of the managed policy that is used to set the permissions
836
+ # boundary for the user.
837
+ #
838
+ # A permissions boundary policy defines the maximum permissions that
839
+ # identity-based policies can grant to an entity, but does not grant
840
+ # permissions. Permissions boundaries do not define the maximum
841
+ # permissions that a resource-based policy can grant to an entity. To
842
+ # learn more, see [Permissions boundaries for IAM entities][1] in the
843
+ # *IAM User Guide*.
844
+ #
845
+ # For more information about policy types, see [Policy types ][2] in the
846
+ # *IAM User Guide*.
847
+ #
848
+ #
849
+ #
850
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
851
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
813
852
  # @option options [Array<Types::Tag>] :tags
814
853
  # A list of tags that you want to attach to the new user. Each tag
815
854
  # consists of a key name and an associated value. For more information
@@ -866,8 +905,8 @@ module Aws::IAM
866
905
  # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html
867
906
  # [2]: http://wikipedia.org/wiki/regex
868
907
  # @option options [required, String] :virtual_mfa_device_name
869
- # The name of the virtual MFA device. Use with path to uniquely identify
870
- # a virtual MFA device.
908
+ # The name of the virtual MFA device, which must be unique. Use with
909
+ # path to uniquely identify a virtual MFA device.
871
910
  #
872
911
  # This parameter allows (through its [regex pattern][1]) a string of
873
912
  # characters consisting of upper and lowercase alphanumeric characters
@@ -133,7 +133,7 @@ module Aws::IAM
133
133
  # period can be shorter if your Region began supporting these features
134
134
  # within the last year. The role might have been used more than 400 days
135
135
  # ago. For more information, see [Regions where data is tracked][1] in
136
- # the *IAM User Guide*.
136
+ # the *IAM user Guide*.
137
137
  #
138
138
  #
139
139
  #
@@ -60,7 +60,7 @@ module Aws::IAM
60
60
  # unauthenticated requests.
61
61
  #
62
62
  # This field is null if no principals (IAM users, IAM roles, or root
63
- # users) in the reported Organizations entity attempted to access the
63
+ # user) in the reported Organizations entity attempted to access the
64
64
  # service within the [tracking period][1].
65
65
  #
66
66
  #
@@ -85,9 +85,9 @@ module Aws::IAM
85
85
  # @return [Time]
86
86
  #
87
87
  # @!attribute [rw] total_authenticated_entities
88
- # The number of accounts with authenticated principals (root users,
89
- # IAM users, and IAM roles) that attempted to access the service in
90
- # the tracking period.
88
+ # The number of accounts with authenticated principals (root user, IAM
89
+ # users, and IAM roles) that attempted to access the service in the
90
+ # tracking period.
91
91
  # @return [Integer]
92
92
  #
93
93
  # @see http://docs.aws.amazon.com/goto/WebAPI/iam-2010-05-08/AccessDetail AWS API Documentation
@@ -891,7 +891,7 @@ module Aws::IAM
891
891
  #
892
892
  # For more information about obtaining the OIDC provider thumbprint,
893
893
  # see [Obtaining the thumbprint for an OpenID Connect provider][1] in
894
- # the *IAM User Guide*.
894
+ # the *IAM user Guide*.
895
895
  #
896
896
  #
897
897
  #
@@ -1191,6 +1191,15 @@ module Aws::IAM
1191
1191
  # account. Names are not distinguished by case. For example, you
1192
1192
  # cannot create resources named both "MyResource" and
1193
1193
  # "myresource".
1194
+ #
1195
+ # This parameter allows (through its [regex pattern][1]) a string of
1196
+ # characters consisting of upper and lowercase alphanumeric characters
1197
+ # with no spaces. You can also include any of the following
1198
+ # characters: \_+=,.@-
1199
+ #
1200
+ #
1201
+ #
1202
+ # [1]: http://wikipedia.org/wiki/regex
1194
1203
  # @return [String]
1195
1204
  #
1196
1205
  # @!attribute [rw] assume_role_policy_document
@@ -1250,8 +1259,23 @@ module Aws::IAM
1250
1259
  # @return [Integer]
1251
1260
  #
1252
1261
  # @!attribute [rw] permissions_boundary
1253
- # The ARN of the policy that is used to set the permissions boundary
1254
- # for the role.
1262
+ # The ARN of the managed policy that is used to set the permissions
1263
+ # boundary for the role.
1264
+ #
1265
+ # A permissions boundary policy defines the maximum permissions that
1266
+ # identity-based policies can grant to an entity, but does not grant
1267
+ # permissions. Permissions boundaries do not define the maximum
1268
+ # permissions that a resource-based policy can grant to an entity. To
1269
+ # learn more, see [Permissions boundaries for IAM entities][1] in the
1270
+ # *IAM User Guide*.
1271
+ #
1272
+ # For more information about policy types, see [Policy types ][2] in
1273
+ # the *IAM User Guide*.
1274
+ #
1275
+ #
1276
+ #
1277
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
1278
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
1255
1279
  # @return [String]
1256
1280
  #
1257
1281
  # @!attribute [rw] tags
@@ -1516,8 +1540,23 @@ module Aws::IAM
1516
1540
  # @return [String]
1517
1541
  #
1518
1542
  # @!attribute [rw] permissions_boundary
1519
- # The ARN of the policy that is used to set the permissions boundary
1520
- # for the user.
1543
+ # The ARN of the managed policy that is used to set the permissions
1544
+ # boundary for the user.
1545
+ #
1546
+ # A permissions boundary policy defines the maximum permissions that
1547
+ # identity-based policies can grant to an entity, but does not grant
1548
+ # permissions. Permissions boundaries do not define the maximum
1549
+ # permissions that a resource-based policy can grant to an entity. To
1550
+ # learn more, see [Permissions boundaries for IAM entities][1] in the
1551
+ # *IAM User Guide*.
1552
+ #
1553
+ # For more information about policy types, see [Policy types ][2] in
1554
+ # the *IAM User Guide*.
1555
+ #
1556
+ #
1557
+ #
1558
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
1559
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
1521
1560
  # @return [String]
1522
1561
  #
1523
1562
  # @!attribute [rw] tags
@@ -1583,8 +1622,8 @@ module Aws::IAM
1583
1622
  # @return [String]
1584
1623
  #
1585
1624
  # @!attribute [rw] virtual_mfa_device_name
1586
- # The name of the virtual MFA device. Use with path to uniquely
1587
- # identify a virtual MFA device.
1625
+ # The name of the virtual MFA device, which must be unique. Use with
1626
+ # path to uniquely identify a virtual MFA device.
1588
1627
  #
1589
1628
  # This parameter allows (through its [regex pattern][1]) a string of
1590
1629
  # characters consisting of upper and lowercase alphanumeric characters
@@ -8130,8 +8169,23 @@ module Aws::IAM
8130
8169
  # @return [String]
8131
8170
  #
8132
8171
  # @!attribute [rw] permissions_boundary
8133
- # The ARN of the policy that is used to set the permissions boundary
8134
- # for the role.
8172
+ # The ARN of the managed policy that is used to set the permissions
8173
+ # boundary for the role.
8174
+ #
8175
+ # A permissions boundary policy defines the maximum permissions that
8176
+ # identity-based policies can grant to an entity, but does not grant
8177
+ # permissions. Permissions boundaries do not define the maximum
8178
+ # permissions that a resource-based policy can grant to an entity. To
8179
+ # learn more, see [Permissions boundaries for IAM entities][1] in the
8180
+ # *IAM User Guide*.
8181
+ #
8182
+ # For more information about policy types, see [Policy types ][2] in
8183
+ # the *IAM User Guide*.
8184
+ #
8185
+ #
8186
+ #
8187
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
8188
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
8135
8189
  # @return [String]
8136
8190
  #
8137
8191
  # @see http://docs.aws.amazon.com/goto/WebAPI/iam-2010-05-08/PutRolePermissionsBoundaryRequest AWS API Documentation
@@ -8210,8 +8264,23 @@ module Aws::IAM
8210
8264
  # @return [String]
8211
8265
  #
8212
8266
  # @!attribute [rw] permissions_boundary
8213
- # The ARN of the policy that is used to set the permissions boundary
8214
- # for the user.
8267
+ # The ARN of the managed policy that is used to set the permissions
8268
+ # boundary for the user.
8269
+ #
8270
+ # A permissions boundary policy defines the maximum permissions that
8271
+ # identity-based policies can grant to an entity, but does not grant
8272
+ # permissions. Permissions boundaries do not define the maximum
8273
+ # permissions that a resource-based policy can grant to an entity. To
8274
+ # learn more, see [Permissions boundaries for IAM entities][1] in the
8275
+ # *IAM User Guide*.
8276
+ #
8277
+ # For more information about policy types, see [Policy types ][2] in
8278
+ # the *IAM User Guide*.
8279
+ #
8280
+ #
8281
+ #
8282
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
8283
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
8215
8284
  # @return [String]
8216
8285
  #
8217
8286
  # @see http://docs.aws.amazon.com/goto/WebAPI/iam-2010-05-08/PutUserPermissionsBoundaryRequest AWS API Documentation
@@ -8648,7 +8717,7 @@ module Aws::IAM
8648
8717
  # period can be shorter if your Region began supporting these features
8649
8718
  # within the last year. The role might have been used more than 400
8650
8719
  # days ago. For more information, see [Regions where data is
8651
- # tracked][1] in the *IAM User Guide*.
8720
+ # tracked][1] in the *IAM user Guide*.
8652
8721
  #
8653
8722
  #
8654
8723
  #
@@ -8802,7 +8871,7 @@ module Aws::IAM
8802
8871
  # period can be shorter if your Region began supporting these features
8803
8872
  # within the last year. The role might have been used more than 400 days
8804
8873
  # ago. For more information, see [Regions where data is tracked][1] in
8805
- # the *IAM User Guide*.
8874
+ # the *IAM user Guide*.
8806
8875
  #
8807
8876
  # This data type is returned as a response element in the GetRole and
8808
8877
  # GetAccountAuthorizationDetails operations.
@@ -9504,6 +9573,11 @@ module Aws::IAM
9504
9573
  # For more information about ARNs, see [Amazon Resource Names
9505
9574
  # (ARNs)][1] in the *Amazon Web Services General Reference*.
9506
9575
  #
9576
+ # <note markdown="1"> Simulation of resource-based policies isn't supported for IAM
9577
+ # roles.
9578
+ #
9579
+ # </note>
9580
+ #
9507
9581
  #
9508
9582
  #
9509
9583
  # [1]: https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html
@@ -9532,6 +9606,11 @@ module Aws::IAM
9532
9606
  # * The special characters tab (`\u0009`), line feed (`\u000A`), and
9533
9607
  # carriage return (`\u000D`)
9534
9608
  #
9609
+ # <note markdown="1"> Simulation of resource-based policies isn't supported for IAM
9610
+ # roles.
9611
+ #
9612
+ # </note>
9613
+ #
9535
9614
  #
9536
9615
  #
9537
9616
  # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-quotas-entity-length
@@ -9789,6 +9868,11 @@ module Aws::IAM
9789
9868
  # For more information about ARNs, see [Amazon Resource Names
9790
9869
  # (ARNs)][1] in the *Amazon Web Services General Reference*.
9791
9870
  #
9871
+ # <note markdown="1"> Simulation of resource-based policies isn't supported for IAM
9872
+ # roles.
9873
+ #
9874
+ # </note>
9875
+ #
9792
9876
  #
9793
9877
  #
9794
9878
  # [1]: https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html
@@ -9817,6 +9901,11 @@ module Aws::IAM
9817
9901
  # * The special characters tab (`\u0009`), line feed (`\u000A`), and
9818
9902
  # carriage return (`\u000D`)
9819
9903
  #
9904
+ # <note markdown="1"> Simulation of resource-based policies isn't supported for IAM
9905
+ # roles.
9906
+ #
9907
+ # </note>
9908
+ #
9820
9909
  #
9821
9910
  #
9822
9911
  # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-quotas-entity-length
@@ -379,8 +379,23 @@ module Aws::IAM
379
379
  # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html
380
380
  # [2]: http://wikipedia.org/wiki/regex
381
381
  # @option options [String] :permissions_boundary
382
- # The ARN of the policy that is used to set the permissions boundary for
383
- # the user.
382
+ # The ARN of the managed policy that is used to set the permissions
383
+ # boundary for the user.
384
+ #
385
+ # A permissions boundary policy defines the maximum permissions that
386
+ # identity-based policies can grant to an entity, but does not grant
387
+ # permissions. Permissions boundaries do not define the maximum
388
+ # permissions that a resource-based policy can grant to an entity. To
389
+ # learn more, see [Permissions boundaries for IAM entities][1] in the
390
+ # *IAM User Guide*.
391
+ #
392
+ # For more information about policy types, see [Policy types ][2] in the
393
+ # *IAM User Guide*.
394
+ #
395
+ #
396
+ #
397
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
398
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
384
399
  # @option options [Array<Types::Tag>] :tags
385
400
  # A list of tags that you want to attach to the new user. Each tag
386
401
  # consists of a key name and an associated value. For more information
data/lib/aws-sdk-iam.rb CHANGED
@@ -74,6 +74,6 @@ require_relative 'aws-sdk-iam/customizations'
74
74
  # @!group service
75
75
  module Aws::IAM
76
76
 
77
- GEM_VERSION = '1.74.0'
77
+ GEM_VERSION = '1.76.0'
78
78
 
79
79
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-iam
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.74.0
4
+ version: 1.76.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2023-01-18 00:00:00.000000000 Z
11
+ date: 2023-03-14 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core