aws-sdk-iam 1.74.0 → 1.76.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/CHANGELOG.md +10 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-iam/client.rb +147 -34
- data/lib/aws-sdk-iam/endpoint_provider.rb +105 -108
- data/lib/aws-sdk-iam/resource.rb +45 -6
- data/lib/aws-sdk-iam/role.rb +1 -1
- data/lib/aws-sdk-iam/types.rb +106 -17
- data/lib/aws-sdk-iam/user.rb +17 -2
- data/lib/aws-sdk-iam.rb +1 -1
- metadata +2 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 4a338135d35d293d96f6adaaff90cc637e1622164c670c215e3ea294f7918abd
|
4
|
+
data.tar.gz: 76d331e00da6de881cfcd70d00f2cc404952d7a3ef98043020f93bcce88cd2bc
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 181b0658ff859256eb96c0ff80f54a07ba8bf26bfd15569b0e1c7d9deb269138c0fa504e1ba672e04243733a60cfe7ddcf0374aaf5d6439675ba8b7d9ff5832d
|
7
|
+
data.tar.gz: 7a17eb50ab3b44f866011af847ce088b652cc1105a45f8f6cd4ee934b274a6807f5b7201bb33448c140a614739c2b543bf37f0dececc37cc386f856b59787e8a
|
data/CHANGELOG.md
CHANGED
@@ -1,6 +1,16 @@
|
|
1
1
|
Unreleased Changes
|
2
2
|
------------------
|
3
3
|
|
4
|
+
1.76.0 (2023-03-14)
|
5
|
+
------------------
|
6
|
+
|
7
|
+
* Feature - Documentation only updates to correct customer-reported issues
|
8
|
+
|
9
|
+
1.75.0 (2023-02-01)
|
10
|
+
------------------
|
11
|
+
|
12
|
+
* Feature - Documentation updates for AWS Identity and Access Management (IAM).
|
13
|
+
|
4
14
|
1.74.0 (2023-01-18)
|
5
15
|
------------------
|
6
16
|
|
data/VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
1.
|
1
|
+
1.76.0
|
data/lib/aws-sdk-iam/client.rb
CHANGED
@@ -1289,6 +1289,8 @@ module Aws::IAM
|
|
1289
1289
|
# application or applications allowed to authenticate using the OIDC
|
1290
1290
|
# provider
|
1291
1291
|
#
|
1292
|
+
# * A list of tags that are attached to the specified IAM OIDC provider
|
1293
|
+
#
|
1292
1294
|
# * A list of thumbprints of one or more server certificates that the
|
1293
1295
|
# IdP uses
|
1294
1296
|
#
|
@@ -1298,10 +1300,10 @@ module Aws::IAM
|
|
1298
1300
|
# <note markdown="1"> Amazon Web Services secures communication with some OIDC identity
|
1299
1301
|
# providers (IdPs) through our library of trusted certificate
|
1300
1302
|
# authorities (CAs) instead of using a certificate thumbprint to verify
|
1301
|
-
# your IdP server certificate. These OIDC IdPs include Google,
|
1302
|
-
# that use an Amazon S3 bucket to host a JSON Web Key Set
|
1303
|
-
# endpoint. In these cases, your legacy thumbprint remains in
|
1304
|
-
# configuration, but is no longer used for validation.
|
1303
|
+
# your IdP server certificate. These OIDC IdPs include Google, Auth0,
|
1304
|
+
# and those that use an Amazon S3 bucket to host a JSON Web Key Set
|
1305
|
+
# (JWKS) endpoint. In these cases, your legacy thumbprint remains in
|
1306
|
+
# your configuration, but is no longer used for validation.
|
1305
1307
|
#
|
1306
1308
|
# </note>
|
1307
1309
|
#
|
@@ -1364,7 +1366,7 @@ module Aws::IAM
|
|
1364
1366
|
#
|
1365
1367
|
# For more information about obtaining the OIDC provider thumbprint, see
|
1366
1368
|
# [Obtaining the thumbprint for an OpenID Connect provider][1] in the
|
1367
|
-
# *IAM
|
1369
|
+
# *IAM user Guide*.
|
1368
1370
|
#
|
1369
1371
|
#
|
1370
1372
|
#
|
@@ -1737,6 +1739,15 @@ module Aws::IAM
|
|
1737
1739
|
# account. Names are not distinguished by case. For example, you cannot
|
1738
1740
|
# create resources named both "MyResource" and "myresource".
|
1739
1741
|
#
|
1742
|
+
# This parameter allows (through its [regex pattern][1]) a string of
|
1743
|
+
# characters consisting of upper and lowercase alphanumeric characters
|
1744
|
+
# with no spaces. You can also include any of the following characters:
|
1745
|
+
# \_+=,.@-
|
1746
|
+
#
|
1747
|
+
#
|
1748
|
+
#
|
1749
|
+
# [1]: http://wikipedia.org/wiki/regex
|
1750
|
+
#
|
1740
1751
|
# @option params [required, String] :assume_role_policy_document
|
1741
1752
|
# The trust relationship policy document that grants an entity
|
1742
1753
|
# permission to assume the role.
|
@@ -1790,8 +1801,23 @@ module Aws::IAM
|
|
1790
1801
|
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html
|
1791
1802
|
#
|
1792
1803
|
# @option params [String] :permissions_boundary
|
1793
|
-
# The ARN of the policy that is used to set the permissions
|
1794
|
-
# the role.
|
1804
|
+
# The ARN of the managed policy that is used to set the permissions
|
1805
|
+
# boundary for the role.
|
1806
|
+
#
|
1807
|
+
# A permissions boundary policy defines the maximum permissions that
|
1808
|
+
# identity-based policies can grant to an entity, but does not grant
|
1809
|
+
# permissions. Permissions boundaries do not define the maximum
|
1810
|
+
# permissions that a resource-based policy can grant to an entity. To
|
1811
|
+
# learn more, see [Permissions boundaries for IAM entities][1] in the
|
1812
|
+
# *IAM User Guide*.
|
1813
|
+
#
|
1814
|
+
# For more information about policy types, see [Policy types ][2] in the
|
1815
|
+
# *IAM User Guide*.
|
1816
|
+
#
|
1817
|
+
#
|
1818
|
+
#
|
1819
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
|
1820
|
+
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
|
1795
1821
|
#
|
1796
1822
|
# @option params [Array<Types::Tag>] :tags
|
1797
1823
|
# A list of tags that you want to attach to the new role. Each tag
|
@@ -2183,8 +2209,23 @@ module Aws::IAM
|
|
2183
2209
|
# create resources named both "MyResource" and "myresource".
|
2184
2210
|
#
|
2185
2211
|
# @option params [String] :permissions_boundary
|
2186
|
-
# The ARN of the policy that is used to set the permissions
|
2187
|
-
# the user.
|
2212
|
+
# The ARN of the managed policy that is used to set the permissions
|
2213
|
+
# boundary for the user.
|
2214
|
+
#
|
2215
|
+
# A permissions boundary policy defines the maximum permissions that
|
2216
|
+
# identity-based policies can grant to an entity, but does not grant
|
2217
|
+
# permissions. Permissions boundaries do not define the maximum
|
2218
|
+
# permissions that a resource-based policy can grant to an entity. To
|
2219
|
+
# learn more, see [Permissions boundaries for IAM entities][1] in the
|
2220
|
+
# *IAM User Guide*.
|
2221
|
+
#
|
2222
|
+
# For more information about policy types, see [Policy types ][2] in the
|
2223
|
+
# *IAM User Guide*.
|
2224
|
+
#
|
2225
|
+
#
|
2226
|
+
#
|
2227
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
|
2228
|
+
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
|
2188
2229
|
#
|
2189
2230
|
# @option params [Array<Types::Tag>] :tags
|
2190
2231
|
# A list of tags that you want to attach to the new user. Each tag
|
@@ -2303,8 +2344,8 @@ module Aws::IAM
|
|
2303
2344
|
# [2]: http://wikipedia.org/wiki/regex
|
2304
2345
|
#
|
2305
2346
|
# @option params [required, String] :virtual_mfa_device_name
|
2306
|
-
# The name of the virtual MFA device
|
2307
|
-
# a virtual MFA device.
|
2347
|
+
# The name of the virtual MFA device, which must be unique. Use with
|
2348
|
+
# path to uniquely identify a virtual MFA device.
|
2308
2349
|
#
|
2309
2350
|
# This parameter allows (through its [regex pattern][1]) a string of
|
2310
2351
|
# characters consisting of upper and lowercase alphanumeric characters
|
@@ -2916,9 +2957,20 @@ module Aws::IAM
|
|
2916
2957
|
req.send_request(options)
|
2917
2958
|
end
|
2918
2959
|
|
2919
|
-
# Deletes the specified role.
|
2920
|
-
#
|
2921
|
-
#
|
2960
|
+
# Deletes the specified role. Unlike the Amazon Web Services Management
|
2961
|
+
# Console, when you delete a role programmatically, you must delete the
|
2962
|
+
# items attached to the role manually, or the deletion fails. For more
|
2963
|
+
# information, see [Deleting an IAM role][1]. Before attempting to
|
2964
|
+
# delete a role, remove the following attached items:
|
2965
|
+
#
|
2966
|
+
# * Inline policies (DeleteRolePolicy)
|
2967
|
+
#
|
2968
|
+
# * Attached managed policies (DetachRolePolicy)
|
2969
|
+
#
|
2970
|
+
# * Instance profile (RemoveRoleFromInstanceProfile)
|
2971
|
+
#
|
2972
|
+
# * Optional – Delete instance profile after detaching from role for
|
2973
|
+
# resource clean up (DeleteInstanceProfile)
|
2922
2974
|
#
|
2923
2975
|
# Make sure that you do not have any Amazon EC2 instances running with
|
2924
2976
|
# the role you are about to delete. Deleting a role or instance profile
|
@@ -2927,7 +2979,7 @@ module Aws::IAM
|
|
2927
2979
|
#
|
2928
2980
|
#
|
2929
2981
|
#
|
2930
|
-
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
2982
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_manage_delete.html#roles-managingrole-deleting-cli
|
2931
2983
|
#
|
2932
2984
|
# @option params [required, String] :role_name
|
2933
2985
|
# The name of the role to delete.
|
@@ -5038,7 +5090,7 @@ module Aws::IAM
|
|
5038
5090
|
# operation. For more information, see [Refining permissions using
|
5039
5091
|
# service last accessed data][1] in the *IAM User Guide*.
|
5040
5092
|
#
|
5041
|
-
# For each service that principals in an account (root
|
5093
|
+
# For each service that principals in an account (root user, IAM users,
|
5042
5094
|
# or IAM roles) could access using SCPs, the operation returns details
|
5043
5095
|
# about the most recent access attempt. If there was no attempt, the
|
5044
5096
|
# service is listed without details about the most recent attempt to
|
@@ -9356,8 +9408,23 @@ module Aws::IAM
|
|
9356
9408
|
# to set the permissions boundary.
|
9357
9409
|
#
|
9358
9410
|
# @option params [required, String] :permissions_boundary
|
9359
|
-
# The ARN of the policy that is used to set the permissions
|
9360
|
-
# the role.
|
9411
|
+
# The ARN of the managed policy that is used to set the permissions
|
9412
|
+
# boundary for the role.
|
9413
|
+
#
|
9414
|
+
# A permissions boundary policy defines the maximum permissions that
|
9415
|
+
# identity-based policies can grant to an entity, but does not grant
|
9416
|
+
# permissions. Permissions boundaries do not define the maximum
|
9417
|
+
# permissions that a resource-based policy can grant to an entity. To
|
9418
|
+
# learn more, see [Permissions boundaries for IAM entities][1] in the
|
9419
|
+
# *IAM User Guide*.
|
9420
|
+
#
|
9421
|
+
# For more information about policy types, see [Policy types ][2] in the
|
9422
|
+
# *IAM User Guide*.
|
9423
|
+
#
|
9424
|
+
#
|
9425
|
+
#
|
9426
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
|
9427
|
+
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
|
9361
9428
|
#
|
9362
9429
|
# @return [Struct] Returns an empty {Seahorse::Client::Response response}.
|
9363
9430
|
#
|
@@ -9509,8 +9576,23 @@ module Aws::IAM
|
|
9509
9576
|
# to set the permissions boundary.
|
9510
9577
|
#
|
9511
9578
|
# @option params [required, String] :permissions_boundary
|
9512
|
-
# The ARN of the policy that is used to set the permissions
|
9513
|
-
# the user.
|
9579
|
+
# The ARN of the managed policy that is used to set the permissions
|
9580
|
+
# boundary for the user.
|
9581
|
+
#
|
9582
|
+
# A permissions boundary policy defines the maximum permissions that
|
9583
|
+
# identity-based policies can grant to an entity, but does not grant
|
9584
|
+
# permissions. Permissions boundaries do not define the maximum
|
9585
|
+
# permissions that a resource-based policy can grant to an entity. To
|
9586
|
+
# learn more, see [Permissions boundaries for IAM entities][1] in the
|
9587
|
+
# *IAM User Guide*.
|
9588
|
+
#
|
9589
|
+
# For more information about policy types, see [Policy types ][2] in the
|
9590
|
+
# *IAM User Guide*.
|
9591
|
+
#
|
9592
|
+
#
|
9593
|
+
#
|
9594
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
|
9595
|
+
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
|
9514
9596
|
#
|
9515
9597
|
# @return [Struct] Returns an empty {Seahorse::Client::Response response}.
|
9516
9598
|
#
|
@@ -10071,9 +10153,16 @@ module Aws::IAM
|
|
10071
10153
|
# If the output is long, you can use `MaxItems` and `Marker` parameters
|
10072
10154
|
# to paginate the results.
|
10073
10155
|
#
|
10074
|
-
#
|
10075
|
-
#
|
10076
|
-
#
|
10156
|
+
# <note markdown="1"> The IAM policy simulator evaluates statements in the identity-based
|
10157
|
+
# policy and the inputs that you provide during simulation. The policy
|
10158
|
+
# simulator results can differ from your live Amazon Web Services
|
10159
|
+
# environment. We recommend that you check your policies against your
|
10160
|
+
# live Amazon Web Services environment after testing using the policy
|
10161
|
+
# simulator to confirm that you have the desired results. For more
|
10162
|
+
# information about using the policy simulator, see [Testing IAM
|
10163
|
+
# policies with the IAM policy simulator ][1]in the *IAM User Guide*.
|
10164
|
+
#
|
10165
|
+
# </note>
|
10077
10166
|
#
|
10078
10167
|
#
|
10079
10168
|
#
|
@@ -10173,6 +10262,10 @@ module Aws::IAM
|
|
10173
10262
|
# For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
|
10174
10263
|
# in the *Amazon Web Services General Reference*.
|
10175
10264
|
#
|
10265
|
+
# <note markdown="1"> Simulation of resource-based policies isn't supported for IAM roles.
|
10266
|
+
#
|
10267
|
+
# </note>
|
10268
|
+
#
|
10176
10269
|
#
|
10177
10270
|
#
|
10178
10271
|
# [1]: https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html
|
@@ -10200,6 +10293,10 @@ module Aws::IAM
|
|
10200
10293
|
# * The special characters tab (`\u0009`), line feed (`\u000A`), and
|
10201
10294
|
# carriage return (`\u000D`)
|
10202
10295
|
#
|
10296
|
+
# <note markdown="1"> Simulation of resource-based policies isn't supported for IAM roles.
|
10297
|
+
#
|
10298
|
+
# </note>
|
10299
|
+
#
|
10203
10300
|
#
|
10204
10301
|
#
|
10205
10302
|
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-quotas-entity-length
|
@@ -10382,7 +10479,8 @@ module Aws::IAM
|
|
10382
10479
|
# instead.
|
10383
10480
|
#
|
10384
10481
|
# You can also optionally include one resource-based policy to be
|
10385
|
-
# evaluated with each of the resources included in the simulation
|
10482
|
+
# evaluated with each of the resources included in the simulation for
|
10483
|
+
# IAM users only.
|
10386
10484
|
#
|
10387
10485
|
# The simulation does not perform the API operations; it only checks the
|
10388
10486
|
# authorization to determine if the simulated policies allow or deny the
|
@@ -10403,9 +10501,16 @@ module Aws::IAM
|
|
10403
10501
|
# If the output is long, you can use the `MaxItems` and `Marker`
|
10404
10502
|
# parameters to paginate the results.
|
10405
10503
|
#
|
10406
|
-
#
|
10407
|
-
#
|
10408
|
-
#
|
10504
|
+
# <note markdown="1"> The IAM policy simulator evaluates statements in the identity-based
|
10505
|
+
# policy and the inputs that you provide during simulation. The policy
|
10506
|
+
# simulator results can differ from your live Amazon Web Services
|
10507
|
+
# environment. We recommend that you check your policies against your
|
10508
|
+
# live Amazon Web Services environment after testing using the policy
|
10509
|
+
# simulator to confirm that you have the desired results. For more
|
10510
|
+
# information about using the policy simulator, see [Testing IAM
|
10511
|
+
# policies with the IAM policy simulator ][1]in the *IAM User Guide*.
|
10512
|
+
#
|
10513
|
+
# </note>
|
10409
10514
|
#
|
10410
10515
|
#
|
10411
10516
|
#
|
@@ -10511,6 +10616,10 @@ module Aws::IAM
|
|
10511
10616
|
# For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
|
10512
10617
|
# in the *Amazon Web Services General Reference*.
|
10513
10618
|
#
|
10619
|
+
# <note markdown="1"> Simulation of resource-based policies isn't supported for IAM roles.
|
10620
|
+
#
|
10621
|
+
# </note>
|
10622
|
+
#
|
10514
10623
|
#
|
10515
10624
|
#
|
10516
10625
|
# [1]: https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html
|
@@ -10538,6 +10647,10 @@ module Aws::IAM
|
|
10538
10647
|
# * The special characters tab (`\u0009`), line feed (`\u000A`), and
|
10539
10648
|
# carriage return (`\u000D`)
|
10540
10649
|
#
|
10650
|
+
# <note markdown="1"> Simulation of resource-based policies isn't supported for IAM roles.
|
10651
|
+
#
|
10652
|
+
# </note>
|
10653
|
+
#
|
10541
10654
|
#
|
10542
10655
|
#
|
10543
10656
|
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-quotas-entity-length
|
@@ -10884,7 +10997,7 @@ module Aws::IAM
|
|
10884
10997
|
# *MyImportantProject*. Or search for all resources with the key name
|
10885
10998
|
# *Cost Center* and the value *41200*.
|
10886
10999
|
#
|
10887
|
-
# * **Access control** - Include tags in IAM
|
11000
|
+
# * **Access control** - Include tags in IAM identity-based and
|
10888
11001
|
# resource-based policies. You can use tags to restrict access to only
|
10889
11002
|
# an OIDC provider that has a specified tag attached. For examples of
|
10890
11003
|
# policies that show how to use tags to control access, see [Control
|
@@ -11303,7 +11416,7 @@ module Aws::IAM
|
|
11303
11416
|
# *MyImportantProject*. Or search for all resources with the key name
|
11304
11417
|
# *Cost Center* and the value *41200*.
|
11305
11418
|
#
|
11306
|
-
# * **Access control** - Include tags in IAM
|
11419
|
+
# * **Access control** - Include tags in IAM identity-based and
|
11307
11420
|
# resource-based policies. You can use tags to restrict access to only
|
11308
11421
|
# an IAM requesting user that has a specified tag attached. You can
|
11309
11422
|
# also restrict access to only those resources that have a certain tag
|
@@ -12255,10 +12368,10 @@ module Aws::IAM
|
|
12255
12368
|
# <note markdown="1"> Amazon Web Services secures communication with some OIDC identity
|
12256
12369
|
# providers (IdPs) through our library of trusted certificate
|
12257
12370
|
# authorities (CAs) instead of using a certificate thumbprint to verify
|
12258
|
-
# your IdP server certificate. These OIDC IdPs include Google,
|
12259
|
-
# that use an Amazon S3 bucket to host a JSON Web Key Set
|
12260
|
-
# endpoint. In these cases, your legacy thumbprint remains in
|
12261
|
-
# configuration, but is no longer used for validation.
|
12371
|
+
# your IdP server certificate. These OIDC IdPs include Google, Auth0,
|
12372
|
+
# and those that use an Amazon S3 bucket to host a JSON Web Key Set
|
12373
|
+
# (JWKS) endpoint. In these cases, your legacy thumbprint remains in
|
12374
|
+
# your configuration, but is no longer used for validation.
|
12262
12375
|
#
|
12263
12376
|
# </note>
|
12264
12377
|
#
|
@@ -13233,7 +13346,7 @@ module Aws::IAM
|
|
13233
13346
|
params: params,
|
13234
13347
|
config: config)
|
13235
13348
|
context[:gem_name] = 'aws-sdk-iam'
|
13236
|
-
context[:gem_version] = '1.
|
13349
|
+
context[:gem_version] = '1.76.0'
|
13237
13350
|
Seahorse::Client::Request.new(handlers, context)
|
13238
13351
|
end
|
13239
13352
|
|
@@ -14,144 +14,141 @@ module Aws::IAM
|
|
14
14
|
use_dual_stack = parameters.use_dual_stack
|
15
15
|
use_fips = parameters.use_fips
|
16
16
|
endpoint = parameters.endpoint
|
17
|
-
if
|
18
|
-
if Aws::Endpoints::Matchers.
|
19
|
-
|
20
|
-
raise ArgumentError, "Invalid Configuration: FIPS and custom endpoint are not supported"
|
21
|
-
end
|
22
|
-
if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
|
23
|
-
raise ArgumentError, "Invalid Configuration: Dualstack and custom endpoint are not supported"
|
24
|
-
end
|
25
|
-
return Aws::Endpoints::Endpoint.new(url: endpoint, headers: {}, properties: {})
|
17
|
+
if Aws::Endpoints::Matchers.set?(endpoint)
|
18
|
+
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
|
19
|
+
raise ArgumentError, "Invalid Configuration: FIPS and custom endpoint are not supported"
|
26
20
|
end
|
27
|
-
if Aws::Endpoints::Matchers.
|
28
|
-
|
29
|
-
|
30
|
-
|
21
|
+
if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
|
22
|
+
raise ArgumentError, "Invalid Configuration: Dualstack and custom endpoint are not supported"
|
23
|
+
end
|
24
|
+
return Aws::Endpoints::Endpoint.new(url: endpoint, headers: {}, properties: {})
|
25
|
+
end
|
26
|
+
if Aws::Endpoints::Matchers.set?(region)
|
27
|
+
if (partition_result = Aws::Endpoints::Matchers.aws_partition(region))
|
28
|
+
if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws")
|
29
|
+
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true) && Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
|
30
|
+
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS")) && Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
|
31
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.api.aws", headers: {}, properties: {})
|
32
|
+
end
|
33
|
+
raise ArgumentError, "FIPS and DualStack are enabled, but this partition does not support one or both"
|
31
34
|
end
|
32
|
-
|
33
|
-
|
34
|
-
|
35
|
-
|
36
|
-
|
35
|
+
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
|
36
|
+
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
|
37
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-east-1"}]})
|
38
|
+
end
|
39
|
+
raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
|
37
40
|
end
|
38
|
-
|
39
|
-
|
40
|
-
|
41
|
-
|
42
|
-
|
41
|
+
if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
|
42
|
+
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
|
43
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.api.aws", headers: {}, properties: {})
|
44
|
+
end
|
45
|
+
raise ArgumentError, "DualStack is enabled but this partition does not support DualStack"
|
43
46
|
end
|
44
|
-
|
45
|
-
end
|
46
|
-
|
47
|
-
|
48
|
-
|
49
|
-
|
50
|
-
|
51
|
-
|
47
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-east-1"}]})
|
48
|
+
end
|
49
|
+
if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws-cn")
|
50
|
+
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true) && Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
|
51
|
+
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS")) && Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
|
52
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.api.amazonwebservices.com.cn", headers: {}, properties: {})
|
53
|
+
end
|
54
|
+
raise ArgumentError, "FIPS and DualStack are enabled, but this partition does not support one or both"
|
52
55
|
end
|
53
|
-
|
54
|
-
|
55
|
-
|
56
|
-
|
57
|
-
|
56
|
+
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
|
57
|
+
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
|
58
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.amazonaws.com.cn", headers: {}, properties: {})
|
59
|
+
end
|
60
|
+
raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
|
58
61
|
end
|
59
|
-
|
60
|
-
|
61
|
-
|
62
|
-
|
63
|
-
|
62
|
+
if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
|
63
|
+
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
|
64
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.api.amazonwebservices.com.cn", headers: {}, properties: {})
|
65
|
+
end
|
66
|
+
raise ArgumentError, "DualStack is enabled but this partition does not support DualStack"
|
64
67
|
end
|
65
|
-
|
68
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam.cn-north-1.amazonaws.com.cn", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"cn-north-1"}]})
|
69
|
+
end
|
70
|
+
if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws-us-gov")
|
71
|
+
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true) && Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
|
72
|
+
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS")) && Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
|
73
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.api.aws", headers: {}, properties: {})
|
74
|
+
end
|
75
|
+
raise ArgumentError, "FIPS and DualStack are enabled, but this partition does not support one or both"
|
76
|
+
end
|
77
|
+
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
|
78
|
+
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
|
79
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam.us-gov.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-gov-west-1"}]})
|
80
|
+
end
|
81
|
+
raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
|
82
|
+
end
|
83
|
+
if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
|
84
|
+
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
|
85
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.api.aws", headers: {}, properties: {})
|
86
|
+
end
|
87
|
+
raise ArgumentError, "DualStack is enabled but this partition does not support DualStack"
|
88
|
+
end
|
89
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam.us-gov.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-gov-west-1"}]})
|
90
|
+
end
|
91
|
+
if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws-iso")
|
92
|
+
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
|
93
|
+
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
|
94
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.c2s.ic.gov", headers: {}, properties: {})
|
95
|
+
end
|
96
|
+
raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
|
97
|
+
end
|
98
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam.us-iso-east-1.c2s.ic.gov", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-iso-east-1"}]})
|
99
|
+
end
|
100
|
+
if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws-iso-b")
|
101
|
+
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
|
102
|
+
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
|
103
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.sc2s.sgov.gov", headers: {}, properties: {})
|
104
|
+
end
|
105
|
+
raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
|
106
|
+
end
|
107
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam.us-isob-east-1.sc2s.sgov.gov", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-isob-east-1"}]})
|
66
108
|
end
|
67
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam.cn-north-1.amazonaws.com.cn", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"cn-north-1", "signingName"=>"iam"}]})
|
68
|
-
end
|
69
|
-
if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws-us-gov")
|
70
109
|
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true) && Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
|
71
110
|
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS")) && Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
|
72
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}
|
111
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.#{partition_result['dualStackDnsSuffix']}", headers: {}, properties: {})
|
73
112
|
end
|
74
113
|
raise ArgumentError, "FIPS and DualStack are enabled, but this partition does not support one or both"
|
75
114
|
end
|
76
115
|
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
|
77
116
|
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
|
78
|
-
|
117
|
+
if Aws::Endpoints::Matchers.string_equals?(region, "aws-global")
|
118
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-east-1"}]})
|
119
|
+
end
|
120
|
+
if Aws::Endpoints::Matchers.string_equals?(region, "aws-us-gov-global")
|
121
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam.us-gov.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-gov-west-1"}]})
|
122
|
+
end
|
123
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.#{partition_result['dnsSuffix']}", headers: {}, properties: {})
|
79
124
|
end
|
80
125
|
raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
|
81
126
|
end
|
82
127
|
if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
|
83
128
|
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
|
84
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}
|
129
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.#{partition_result['dualStackDnsSuffix']}", headers: {}, properties: {})
|
85
130
|
end
|
86
131
|
raise ArgumentError, "DualStack is enabled but this partition does not support DualStack"
|
87
132
|
end
|
88
|
-
|
89
|
-
|
90
|
-
if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws-iso")
|
91
|
-
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
|
92
|
-
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
|
93
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.c2s.ic.gov", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-iso-east-1", "signingName"=>"iam"}]})
|
94
|
-
end
|
95
|
-
raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
|
133
|
+
if Aws::Endpoints::Matchers.string_equals?(region, "aws-global")
|
134
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-east-1"}]})
|
96
135
|
end
|
97
|
-
|
98
|
-
|
99
|
-
if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws-iso-b")
|
100
|
-
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
|
101
|
-
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
|
102
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.sc2s.sgov.gov", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-isob-east-1", "signingName"=>"iam"}]})
|
103
|
-
end
|
104
|
-
raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
|
136
|
+
if Aws::Endpoints::Matchers.string_equals?(region, "aws-cn-global")
|
137
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam.cn-north-1.amazonaws.com.cn", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"cn-north-1"}]})
|
105
138
|
end
|
106
|
-
|
107
|
-
|
108
|
-
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true) && Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
|
109
|
-
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS")) && Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
|
110
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.#{partition_result['dualStackDnsSuffix']}", headers: {}, properties: {})
|
139
|
+
if Aws::Endpoints::Matchers.string_equals?(region, "aws-us-gov-global")
|
140
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam.us-gov.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-gov-west-1"}]})
|
111
141
|
end
|
112
|
-
|
113
|
-
|
114
|
-
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
|
115
|
-
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
|
116
|
-
if Aws::Endpoints::Matchers.string_equals?(region, "iam")
|
117
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-east-1", "signingName"=>"iam"}]})
|
118
|
-
end
|
119
|
-
if Aws::Endpoints::Matchers.string_equals?(region, "aws-global")
|
120
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-east-1", "signingName"=>"iam"}]})
|
121
|
-
end
|
122
|
-
if Aws::Endpoints::Matchers.string_equals?(region, "iam-govcloud")
|
123
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam.us-gov.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-gov-west-1", "signingName"=>"iam"}]})
|
124
|
-
end
|
125
|
-
if Aws::Endpoints::Matchers.string_equals?(region, "aws-us-gov-global")
|
126
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam.us-gov.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-gov-west-1", "signingName"=>"iam"}]})
|
127
|
-
end
|
128
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.#{partition_result['dnsSuffix']}", headers: {}, properties: {})
|
142
|
+
if Aws::Endpoints::Matchers.string_equals?(region, "aws-iso-global")
|
143
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam.us-iso-east-1.c2s.ic.gov", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-iso-east-1"}]})
|
129
144
|
end
|
130
|
-
|
131
|
-
|
132
|
-
if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
|
133
|
-
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
|
134
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.#{partition_result['dualStackDnsSuffix']}", headers: {}, properties: {})
|
145
|
+
if Aws::Endpoints::Matchers.string_equals?(region, "aws-iso-b-global")
|
146
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam.us-isob-east-1.sc2s.sgov.gov", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-isob-east-1"}]})
|
135
147
|
end
|
136
|
-
|
137
|
-
end
|
138
|
-
if Aws::Endpoints::Matchers.string_equals?(region, "aws-global")
|
139
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-east-1", "signingName"=>"iam"}]})
|
140
|
-
end
|
141
|
-
if Aws::Endpoints::Matchers.string_equals?(region, "aws-cn-global")
|
142
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam.cn-north-1.amazonaws.com.cn", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"cn-north-1", "signingName"=>"iam"}]})
|
143
|
-
end
|
144
|
-
if Aws::Endpoints::Matchers.string_equals?(region, "aws-us-gov-global")
|
145
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam.us-gov.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-gov-west-1", "signingName"=>"iam"}]})
|
146
|
-
end
|
147
|
-
if Aws::Endpoints::Matchers.string_equals?(region, "aws-iso-global")
|
148
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam.us-iso-east-1.c2s.ic.gov", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-iso-east-1", "signingName"=>"iam"}]})
|
149
|
-
end
|
150
|
-
if Aws::Endpoints::Matchers.string_equals?(region, "aws-iso-b-global")
|
151
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam.us-isob-east-1.sc2s.sgov.gov", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-isob-east-1", "signingName"=>"iam"}]})
|
148
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.#{partition_result['dnsSuffix']}", headers: {}, properties: {})
|
152
149
|
end
|
153
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.#{partition_result['dnsSuffix']}", headers: {}, properties: {})
|
154
150
|
end
|
151
|
+
raise ArgumentError, "Invalid Configuration: Missing Region"
|
155
152
|
raise ArgumentError, 'No endpoint could be resolved'
|
156
153
|
|
157
154
|
end
|
data/lib/aws-sdk-iam/resource.rb
CHANGED
@@ -455,6 +455,15 @@ module Aws::IAM
|
|
455
455
|
# IAM user, group, role, and policy names must be unique within the
|
456
456
|
# account. Names are not distinguished by case. For example, you cannot
|
457
457
|
# create resources named both "MyResource" and "myresource".
|
458
|
+
#
|
459
|
+
# This parameter allows (through its [regex pattern][1]) a string of
|
460
|
+
# characters consisting of upper and lowercase alphanumeric characters
|
461
|
+
# with no spaces. You can also include any of the following characters:
|
462
|
+
# \_+=,.@-
|
463
|
+
#
|
464
|
+
#
|
465
|
+
#
|
466
|
+
# [1]: http://wikipedia.org/wiki/regex
|
458
467
|
# @option options [required, String] :assume_role_policy_document
|
459
468
|
# The trust relationship policy document that grants an entity
|
460
469
|
# permission to assume the role.
|
@@ -505,8 +514,23 @@ module Aws::IAM
|
|
505
514
|
#
|
506
515
|
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html
|
507
516
|
# @option options [String] :permissions_boundary
|
508
|
-
# The ARN of the policy that is used to set the permissions
|
509
|
-
# the role.
|
517
|
+
# The ARN of the managed policy that is used to set the permissions
|
518
|
+
# boundary for the role.
|
519
|
+
#
|
520
|
+
# A permissions boundary policy defines the maximum permissions that
|
521
|
+
# identity-based policies can grant to an entity, but does not grant
|
522
|
+
# permissions. Permissions boundaries do not define the maximum
|
523
|
+
# permissions that a resource-based policy can grant to an entity. To
|
524
|
+
# learn more, see [Permissions boundaries for IAM entities][1] in the
|
525
|
+
# *IAM User Guide*.
|
526
|
+
#
|
527
|
+
# For more information about policy types, see [Policy types ][2] in the
|
528
|
+
# *IAM User Guide*.
|
529
|
+
#
|
530
|
+
#
|
531
|
+
#
|
532
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
|
533
|
+
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
|
510
534
|
# @option options [Array<Types::Tag>] :tags
|
511
535
|
# A list of tags that you want to attach to the new role. Each tag
|
512
536
|
# consists of a key name and an associated value. For more information
|
@@ -808,8 +832,23 @@ module Aws::IAM
|
|
808
832
|
# account. Names are not distinguished by case. For example, you cannot
|
809
833
|
# create resources named both "MyResource" and "myresource".
|
810
834
|
# @option options [String] :permissions_boundary
|
811
|
-
# The ARN of the policy that is used to set the permissions
|
812
|
-
# the user.
|
835
|
+
# The ARN of the managed policy that is used to set the permissions
|
836
|
+
# boundary for the user.
|
837
|
+
#
|
838
|
+
# A permissions boundary policy defines the maximum permissions that
|
839
|
+
# identity-based policies can grant to an entity, but does not grant
|
840
|
+
# permissions. Permissions boundaries do not define the maximum
|
841
|
+
# permissions that a resource-based policy can grant to an entity. To
|
842
|
+
# learn more, see [Permissions boundaries for IAM entities][1] in the
|
843
|
+
# *IAM User Guide*.
|
844
|
+
#
|
845
|
+
# For more information about policy types, see [Policy types ][2] in the
|
846
|
+
# *IAM User Guide*.
|
847
|
+
#
|
848
|
+
#
|
849
|
+
#
|
850
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
|
851
|
+
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
|
813
852
|
# @option options [Array<Types::Tag>] :tags
|
814
853
|
# A list of tags that you want to attach to the new user. Each tag
|
815
854
|
# consists of a key name and an associated value. For more information
|
@@ -866,8 +905,8 @@ module Aws::IAM
|
|
866
905
|
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html
|
867
906
|
# [2]: http://wikipedia.org/wiki/regex
|
868
907
|
# @option options [required, String] :virtual_mfa_device_name
|
869
|
-
# The name of the virtual MFA device
|
870
|
-
# a virtual MFA device.
|
908
|
+
# The name of the virtual MFA device, which must be unique. Use with
|
909
|
+
# path to uniquely identify a virtual MFA device.
|
871
910
|
#
|
872
911
|
# This parameter allows (through its [regex pattern][1]) a string of
|
873
912
|
# characters consisting of upper and lowercase alphanumeric characters
|
data/lib/aws-sdk-iam/role.rb
CHANGED
@@ -133,7 +133,7 @@ module Aws::IAM
|
|
133
133
|
# period can be shorter if your Region began supporting these features
|
134
134
|
# within the last year. The role might have been used more than 400 days
|
135
135
|
# ago. For more information, see [Regions where data is tracked][1] in
|
136
|
-
# the *IAM
|
136
|
+
# the *IAM user Guide*.
|
137
137
|
#
|
138
138
|
#
|
139
139
|
#
|
data/lib/aws-sdk-iam/types.rb
CHANGED
@@ -60,7 +60,7 @@ module Aws::IAM
|
|
60
60
|
# unauthenticated requests.
|
61
61
|
#
|
62
62
|
# This field is null if no principals (IAM users, IAM roles, or root
|
63
|
-
#
|
63
|
+
# user) in the reported Organizations entity attempted to access the
|
64
64
|
# service within the [tracking period][1].
|
65
65
|
#
|
66
66
|
#
|
@@ -85,9 +85,9 @@ module Aws::IAM
|
|
85
85
|
# @return [Time]
|
86
86
|
#
|
87
87
|
# @!attribute [rw] total_authenticated_entities
|
88
|
-
# The number of accounts with authenticated principals (root
|
89
|
-
#
|
90
|
-
#
|
88
|
+
# The number of accounts with authenticated principals (root user, IAM
|
89
|
+
# users, and IAM roles) that attempted to access the service in the
|
90
|
+
# tracking period.
|
91
91
|
# @return [Integer]
|
92
92
|
#
|
93
93
|
# @see http://docs.aws.amazon.com/goto/WebAPI/iam-2010-05-08/AccessDetail AWS API Documentation
|
@@ -891,7 +891,7 @@ module Aws::IAM
|
|
891
891
|
#
|
892
892
|
# For more information about obtaining the OIDC provider thumbprint,
|
893
893
|
# see [Obtaining the thumbprint for an OpenID Connect provider][1] in
|
894
|
-
# the *IAM
|
894
|
+
# the *IAM user Guide*.
|
895
895
|
#
|
896
896
|
#
|
897
897
|
#
|
@@ -1191,6 +1191,15 @@ module Aws::IAM
|
|
1191
1191
|
# account. Names are not distinguished by case. For example, you
|
1192
1192
|
# cannot create resources named both "MyResource" and
|
1193
1193
|
# "myresource".
|
1194
|
+
#
|
1195
|
+
# This parameter allows (through its [regex pattern][1]) a string of
|
1196
|
+
# characters consisting of upper and lowercase alphanumeric characters
|
1197
|
+
# with no spaces. You can also include any of the following
|
1198
|
+
# characters: \_+=,.@-
|
1199
|
+
#
|
1200
|
+
#
|
1201
|
+
#
|
1202
|
+
# [1]: http://wikipedia.org/wiki/regex
|
1194
1203
|
# @return [String]
|
1195
1204
|
#
|
1196
1205
|
# @!attribute [rw] assume_role_policy_document
|
@@ -1250,8 +1259,23 @@ module Aws::IAM
|
|
1250
1259
|
# @return [Integer]
|
1251
1260
|
#
|
1252
1261
|
# @!attribute [rw] permissions_boundary
|
1253
|
-
# The ARN of the policy that is used to set the permissions
|
1254
|
-
# for the role.
|
1262
|
+
# The ARN of the managed policy that is used to set the permissions
|
1263
|
+
# boundary for the role.
|
1264
|
+
#
|
1265
|
+
# A permissions boundary policy defines the maximum permissions that
|
1266
|
+
# identity-based policies can grant to an entity, but does not grant
|
1267
|
+
# permissions. Permissions boundaries do not define the maximum
|
1268
|
+
# permissions that a resource-based policy can grant to an entity. To
|
1269
|
+
# learn more, see [Permissions boundaries for IAM entities][1] in the
|
1270
|
+
# *IAM User Guide*.
|
1271
|
+
#
|
1272
|
+
# For more information about policy types, see [Policy types ][2] in
|
1273
|
+
# the *IAM User Guide*.
|
1274
|
+
#
|
1275
|
+
#
|
1276
|
+
#
|
1277
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
|
1278
|
+
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
|
1255
1279
|
# @return [String]
|
1256
1280
|
#
|
1257
1281
|
# @!attribute [rw] tags
|
@@ -1516,8 +1540,23 @@ module Aws::IAM
|
|
1516
1540
|
# @return [String]
|
1517
1541
|
#
|
1518
1542
|
# @!attribute [rw] permissions_boundary
|
1519
|
-
# The ARN of the policy that is used to set the permissions
|
1520
|
-
# for the user.
|
1543
|
+
# The ARN of the managed policy that is used to set the permissions
|
1544
|
+
# boundary for the user.
|
1545
|
+
#
|
1546
|
+
# A permissions boundary policy defines the maximum permissions that
|
1547
|
+
# identity-based policies can grant to an entity, but does not grant
|
1548
|
+
# permissions. Permissions boundaries do not define the maximum
|
1549
|
+
# permissions that a resource-based policy can grant to an entity. To
|
1550
|
+
# learn more, see [Permissions boundaries for IAM entities][1] in the
|
1551
|
+
# *IAM User Guide*.
|
1552
|
+
#
|
1553
|
+
# For more information about policy types, see [Policy types ][2] in
|
1554
|
+
# the *IAM User Guide*.
|
1555
|
+
#
|
1556
|
+
#
|
1557
|
+
#
|
1558
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
|
1559
|
+
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
|
1521
1560
|
# @return [String]
|
1522
1561
|
#
|
1523
1562
|
# @!attribute [rw] tags
|
@@ -1583,8 +1622,8 @@ module Aws::IAM
|
|
1583
1622
|
# @return [String]
|
1584
1623
|
#
|
1585
1624
|
# @!attribute [rw] virtual_mfa_device_name
|
1586
|
-
# The name of the virtual MFA device. Use with
|
1587
|
-
# identify a virtual MFA device.
|
1625
|
+
# The name of the virtual MFA device, which must be unique. Use with
|
1626
|
+
# path to uniquely identify a virtual MFA device.
|
1588
1627
|
#
|
1589
1628
|
# This parameter allows (through its [regex pattern][1]) a string of
|
1590
1629
|
# characters consisting of upper and lowercase alphanumeric characters
|
@@ -8130,8 +8169,23 @@ module Aws::IAM
|
|
8130
8169
|
# @return [String]
|
8131
8170
|
#
|
8132
8171
|
# @!attribute [rw] permissions_boundary
|
8133
|
-
# The ARN of the policy that is used to set the permissions
|
8134
|
-
# for the role.
|
8172
|
+
# The ARN of the managed policy that is used to set the permissions
|
8173
|
+
# boundary for the role.
|
8174
|
+
#
|
8175
|
+
# A permissions boundary policy defines the maximum permissions that
|
8176
|
+
# identity-based policies can grant to an entity, but does not grant
|
8177
|
+
# permissions. Permissions boundaries do not define the maximum
|
8178
|
+
# permissions that a resource-based policy can grant to an entity. To
|
8179
|
+
# learn more, see [Permissions boundaries for IAM entities][1] in the
|
8180
|
+
# *IAM User Guide*.
|
8181
|
+
#
|
8182
|
+
# For more information about policy types, see [Policy types ][2] in
|
8183
|
+
# the *IAM User Guide*.
|
8184
|
+
#
|
8185
|
+
#
|
8186
|
+
#
|
8187
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
|
8188
|
+
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
|
8135
8189
|
# @return [String]
|
8136
8190
|
#
|
8137
8191
|
# @see http://docs.aws.amazon.com/goto/WebAPI/iam-2010-05-08/PutRolePermissionsBoundaryRequest AWS API Documentation
|
@@ -8210,8 +8264,23 @@ module Aws::IAM
|
|
8210
8264
|
# @return [String]
|
8211
8265
|
#
|
8212
8266
|
# @!attribute [rw] permissions_boundary
|
8213
|
-
# The ARN of the policy that is used to set the permissions
|
8214
|
-
# for the user.
|
8267
|
+
# The ARN of the managed policy that is used to set the permissions
|
8268
|
+
# boundary for the user.
|
8269
|
+
#
|
8270
|
+
# A permissions boundary policy defines the maximum permissions that
|
8271
|
+
# identity-based policies can grant to an entity, but does not grant
|
8272
|
+
# permissions. Permissions boundaries do not define the maximum
|
8273
|
+
# permissions that a resource-based policy can grant to an entity. To
|
8274
|
+
# learn more, see [Permissions boundaries for IAM entities][1] in the
|
8275
|
+
# *IAM User Guide*.
|
8276
|
+
#
|
8277
|
+
# For more information about policy types, see [Policy types ][2] in
|
8278
|
+
# the *IAM User Guide*.
|
8279
|
+
#
|
8280
|
+
#
|
8281
|
+
#
|
8282
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
|
8283
|
+
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
|
8215
8284
|
# @return [String]
|
8216
8285
|
#
|
8217
8286
|
# @see http://docs.aws.amazon.com/goto/WebAPI/iam-2010-05-08/PutUserPermissionsBoundaryRequest AWS API Documentation
|
@@ -8648,7 +8717,7 @@ module Aws::IAM
|
|
8648
8717
|
# period can be shorter if your Region began supporting these features
|
8649
8718
|
# within the last year. The role might have been used more than 400
|
8650
8719
|
# days ago. For more information, see [Regions where data is
|
8651
|
-
# tracked][1] in the *IAM
|
8720
|
+
# tracked][1] in the *IAM user Guide*.
|
8652
8721
|
#
|
8653
8722
|
#
|
8654
8723
|
#
|
@@ -8802,7 +8871,7 @@ module Aws::IAM
|
|
8802
8871
|
# period can be shorter if your Region began supporting these features
|
8803
8872
|
# within the last year. The role might have been used more than 400 days
|
8804
8873
|
# ago. For more information, see [Regions where data is tracked][1] in
|
8805
|
-
# the *IAM
|
8874
|
+
# the *IAM user Guide*.
|
8806
8875
|
#
|
8807
8876
|
# This data type is returned as a response element in the GetRole and
|
8808
8877
|
# GetAccountAuthorizationDetails operations.
|
@@ -9504,6 +9573,11 @@ module Aws::IAM
|
|
9504
9573
|
# For more information about ARNs, see [Amazon Resource Names
|
9505
9574
|
# (ARNs)][1] in the *Amazon Web Services General Reference*.
|
9506
9575
|
#
|
9576
|
+
# <note markdown="1"> Simulation of resource-based policies isn't supported for IAM
|
9577
|
+
# roles.
|
9578
|
+
#
|
9579
|
+
# </note>
|
9580
|
+
#
|
9507
9581
|
#
|
9508
9582
|
#
|
9509
9583
|
# [1]: https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html
|
@@ -9532,6 +9606,11 @@ module Aws::IAM
|
|
9532
9606
|
# * The special characters tab (`\u0009`), line feed (`\u000A`), and
|
9533
9607
|
# carriage return (`\u000D`)
|
9534
9608
|
#
|
9609
|
+
# <note markdown="1"> Simulation of resource-based policies isn't supported for IAM
|
9610
|
+
# roles.
|
9611
|
+
#
|
9612
|
+
# </note>
|
9613
|
+
#
|
9535
9614
|
#
|
9536
9615
|
#
|
9537
9616
|
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-quotas-entity-length
|
@@ -9789,6 +9868,11 @@ module Aws::IAM
|
|
9789
9868
|
# For more information about ARNs, see [Amazon Resource Names
|
9790
9869
|
# (ARNs)][1] in the *Amazon Web Services General Reference*.
|
9791
9870
|
#
|
9871
|
+
# <note markdown="1"> Simulation of resource-based policies isn't supported for IAM
|
9872
|
+
# roles.
|
9873
|
+
#
|
9874
|
+
# </note>
|
9875
|
+
#
|
9792
9876
|
#
|
9793
9877
|
#
|
9794
9878
|
# [1]: https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html
|
@@ -9817,6 +9901,11 @@ module Aws::IAM
|
|
9817
9901
|
# * The special characters tab (`\u0009`), line feed (`\u000A`), and
|
9818
9902
|
# carriage return (`\u000D`)
|
9819
9903
|
#
|
9904
|
+
# <note markdown="1"> Simulation of resource-based policies isn't supported for IAM
|
9905
|
+
# roles.
|
9906
|
+
#
|
9907
|
+
# </note>
|
9908
|
+
#
|
9820
9909
|
#
|
9821
9910
|
#
|
9822
9911
|
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-quotas-entity-length
|
data/lib/aws-sdk-iam/user.rb
CHANGED
@@ -379,8 +379,23 @@ module Aws::IAM
|
|
379
379
|
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html
|
380
380
|
# [2]: http://wikipedia.org/wiki/regex
|
381
381
|
# @option options [String] :permissions_boundary
|
382
|
-
# The ARN of the policy that is used to set the permissions
|
383
|
-
# the user.
|
382
|
+
# The ARN of the managed policy that is used to set the permissions
|
383
|
+
# boundary for the user.
|
384
|
+
#
|
385
|
+
# A permissions boundary policy defines the maximum permissions that
|
386
|
+
# identity-based policies can grant to an entity, but does not grant
|
387
|
+
# permissions. Permissions boundaries do not define the maximum
|
388
|
+
# permissions that a resource-based policy can grant to an entity. To
|
389
|
+
# learn more, see [Permissions boundaries for IAM entities][1] in the
|
390
|
+
# *IAM User Guide*.
|
391
|
+
#
|
392
|
+
# For more information about policy types, see [Policy types ][2] in the
|
393
|
+
# *IAM User Guide*.
|
394
|
+
#
|
395
|
+
#
|
396
|
+
#
|
397
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
|
398
|
+
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
|
384
399
|
# @option options [Array<Types::Tag>] :tags
|
385
400
|
# A list of tags that you want to attach to the new user. Each tag
|
386
401
|
# consists of a key name and an associated value. For more information
|
data/lib/aws-sdk-iam.rb
CHANGED
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: aws-sdk-iam
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 1.
|
4
|
+
version: 1.76.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Amazon Web Services
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2023-
|
11
|
+
date: 2023-03-14 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: aws-sdk-core
|