aws-sdk-iam 1.74.0 → 1.76.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 772aef53edcb2dcfd825515204fcb855d4c189accf178b15c21949a755bac3d5
4
- data.tar.gz: 1d8109abe12a8082ad44f2672d1fd3189dac90dd49cd947992997f80c7f861a5
3
+ metadata.gz: 4a338135d35d293d96f6adaaff90cc637e1622164c670c215e3ea294f7918abd
4
+ data.tar.gz: 76d331e00da6de881cfcd70d00f2cc404952d7a3ef98043020f93bcce88cd2bc
5
5
  SHA512:
6
- metadata.gz: c345d0c8a4cfdc02be9938560f8cb82196176c14fd9822a903e8e032f5aae4423d2af3a99bbf88c2c14be01fc86f3ef2399d9d933ce6ac2333ff97337a239dfb
7
- data.tar.gz: f8f21b795a257ece2eda80c18ec9cf8a0b68a1034982243423a12991fa10db563dbfdfdc5d5fc515c3b4d97bd15d23c420d4fd1b63cdf8d92a5dc28f780e3d0e
6
+ metadata.gz: 181b0658ff859256eb96c0ff80f54a07ba8bf26bfd15569b0e1c7d9deb269138c0fa504e1ba672e04243733a60cfe7ddcf0374aaf5d6439675ba8b7d9ff5832d
7
+ data.tar.gz: 7a17eb50ab3b44f866011af847ce088b652cc1105a45f8f6cd4ee934b274a6807f5b7201bb33448c140a614739c2b543bf37f0dececc37cc386f856b59787e8a
data/CHANGELOG.md CHANGED
@@ -1,6 +1,16 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.76.0 (2023-03-14)
5
+ ------------------
6
+
7
+ * Feature - Documentation only updates to correct customer-reported issues
8
+
9
+ 1.75.0 (2023-02-01)
10
+ ------------------
11
+
12
+ * Feature - Documentation updates for AWS Identity and Access Management (IAM).
13
+
4
14
  1.74.0 (2023-01-18)
5
15
  ------------------
6
16
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.74.0
1
+ 1.76.0
@@ -1289,6 +1289,8 @@ module Aws::IAM
1289
1289
  # application or applications allowed to authenticate using the OIDC
1290
1290
  # provider
1291
1291
  #
1292
+ # * A list of tags that are attached to the specified IAM OIDC provider
1293
+ #
1292
1294
  # * A list of thumbprints of one or more server certificates that the
1293
1295
  # IdP uses
1294
1296
  #
@@ -1298,10 +1300,10 @@ module Aws::IAM
1298
1300
  # <note markdown="1"> Amazon Web Services secures communication with some OIDC identity
1299
1301
  # providers (IdPs) through our library of trusted certificate
1300
1302
  # authorities (CAs) instead of using a certificate thumbprint to verify
1301
- # your IdP server certificate. These OIDC IdPs include Google, and those
1302
- # that use an Amazon S3 bucket to host a JSON Web Key Set (JWKS)
1303
- # endpoint. In these cases, your legacy thumbprint remains in your
1304
- # configuration, but is no longer used for validation.
1303
+ # your IdP server certificate. These OIDC IdPs include Google, Auth0,
1304
+ # and those that use an Amazon S3 bucket to host a JSON Web Key Set
1305
+ # (JWKS) endpoint. In these cases, your legacy thumbprint remains in
1306
+ # your configuration, but is no longer used for validation.
1305
1307
  #
1306
1308
  # </note>
1307
1309
  #
@@ -1364,7 +1366,7 @@ module Aws::IAM
1364
1366
  #
1365
1367
  # For more information about obtaining the OIDC provider thumbprint, see
1366
1368
  # [Obtaining the thumbprint for an OpenID Connect provider][1] in the
1367
- # *IAM User Guide*.
1369
+ # *IAM user Guide*.
1368
1370
  #
1369
1371
  #
1370
1372
  #
@@ -1737,6 +1739,15 @@ module Aws::IAM
1737
1739
  # account. Names are not distinguished by case. For example, you cannot
1738
1740
  # create resources named both "MyResource" and "myresource".
1739
1741
  #
1742
+ # This parameter allows (through its [regex pattern][1]) a string of
1743
+ # characters consisting of upper and lowercase alphanumeric characters
1744
+ # with no spaces. You can also include any of the following characters:
1745
+ # \_+=,.@-
1746
+ #
1747
+ #
1748
+ #
1749
+ # [1]: http://wikipedia.org/wiki/regex
1750
+ #
1740
1751
  # @option params [required, String] :assume_role_policy_document
1741
1752
  # The trust relationship policy document that grants an entity
1742
1753
  # permission to assume the role.
@@ -1790,8 +1801,23 @@ module Aws::IAM
1790
1801
  # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html
1791
1802
  #
1792
1803
  # @option params [String] :permissions_boundary
1793
- # The ARN of the policy that is used to set the permissions boundary for
1794
- # the role.
1804
+ # The ARN of the managed policy that is used to set the permissions
1805
+ # boundary for the role.
1806
+ #
1807
+ # A permissions boundary policy defines the maximum permissions that
1808
+ # identity-based policies can grant to an entity, but does not grant
1809
+ # permissions. Permissions boundaries do not define the maximum
1810
+ # permissions that a resource-based policy can grant to an entity. To
1811
+ # learn more, see [Permissions boundaries for IAM entities][1] in the
1812
+ # *IAM User Guide*.
1813
+ #
1814
+ # For more information about policy types, see [Policy types ][2] in the
1815
+ # *IAM User Guide*.
1816
+ #
1817
+ #
1818
+ #
1819
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
1820
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
1795
1821
  #
1796
1822
  # @option params [Array<Types::Tag>] :tags
1797
1823
  # A list of tags that you want to attach to the new role. Each tag
@@ -2183,8 +2209,23 @@ module Aws::IAM
2183
2209
  # create resources named both "MyResource" and "myresource".
2184
2210
  #
2185
2211
  # @option params [String] :permissions_boundary
2186
- # The ARN of the policy that is used to set the permissions boundary for
2187
- # the user.
2212
+ # The ARN of the managed policy that is used to set the permissions
2213
+ # boundary for the user.
2214
+ #
2215
+ # A permissions boundary policy defines the maximum permissions that
2216
+ # identity-based policies can grant to an entity, but does not grant
2217
+ # permissions. Permissions boundaries do not define the maximum
2218
+ # permissions that a resource-based policy can grant to an entity. To
2219
+ # learn more, see [Permissions boundaries for IAM entities][1] in the
2220
+ # *IAM User Guide*.
2221
+ #
2222
+ # For more information about policy types, see [Policy types ][2] in the
2223
+ # *IAM User Guide*.
2224
+ #
2225
+ #
2226
+ #
2227
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
2228
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
2188
2229
  #
2189
2230
  # @option params [Array<Types::Tag>] :tags
2190
2231
  # A list of tags that you want to attach to the new user. Each tag
@@ -2303,8 +2344,8 @@ module Aws::IAM
2303
2344
  # [2]: http://wikipedia.org/wiki/regex
2304
2345
  #
2305
2346
  # @option params [required, String] :virtual_mfa_device_name
2306
- # The name of the virtual MFA device. Use with path to uniquely identify
2307
- # a virtual MFA device.
2347
+ # The name of the virtual MFA device, which must be unique. Use with
2348
+ # path to uniquely identify a virtual MFA device.
2308
2349
  #
2309
2350
  # This parameter allows (through its [regex pattern][1]) a string of
2310
2351
  # characters consisting of upper and lowercase alphanumeric characters
@@ -2916,9 +2957,20 @@ module Aws::IAM
2916
2957
  req.send_request(options)
2917
2958
  end
2918
2959
 
2919
- # Deletes the specified role. The role must not have any policies
2920
- # attached. For more information about roles, see [Working with
2921
- # roles][1].
2960
+ # Deletes the specified role. Unlike the Amazon Web Services Management
2961
+ # Console, when you delete a role programmatically, you must delete the
2962
+ # items attached to the role manually, or the deletion fails. For more
2963
+ # information, see [Deleting an IAM role][1]. Before attempting to
2964
+ # delete a role, remove the following attached items:
2965
+ #
2966
+ # * Inline policies (DeleteRolePolicy)
2967
+ #
2968
+ # * Attached managed policies (DetachRolePolicy)
2969
+ #
2970
+ # * Instance profile (RemoveRoleFromInstanceProfile)
2971
+ #
2972
+ # * Optional – Delete instance profile after detaching from role for
2973
+ # resource clean up (DeleteInstanceProfile)
2922
2974
  #
2923
2975
  # Make sure that you do not have any Amazon EC2 instances running with
2924
2976
  # the role you are about to delete. Deleting a role or instance profile
@@ -2927,7 +2979,7 @@ module Aws::IAM
2927
2979
  #
2928
2980
  #
2929
2981
  #
2930
- # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/WorkingWithRoles.html
2982
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_manage_delete.html#roles-managingrole-deleting-cli
2931
2983
  #
2932
2984
  # @option params [required, String] :role_name
2933
2985
  # The name of the role to delete.
@@ -5038,7 +5090,7 @@ module Aws::IAM
5038
5090
  # operation. For more information, see [Refining permissions using
5039
5091
  # service last accessed data][1] in the *IAM User Guide*.
5040
5092
  #
5041
- # For each service that principals in an account (root users, IAM users,
5093
+ # For each service that principals in an account (root user, IAM users,
5042
5094
  # or IAM roles) could access using SCPs, the operation returns details
5043
5095
  # about the most recent access attempt. If there was no attempt, the
5044
5096
  # service is listed without details about the most recent attempt to
@@ -9356,8 +9408,23 @@ module Aws::IAM
9356
9408
  # to set the permissions boundary.
9357
9409
  #
9358
9410
  # @option params [required, String] :permissions_boundary
9359
- # The ARN of the policy that is used to set the permissions boundary for
9360
- # the role.
9411
+ # The ARN of the managed policy that is used to set the permissions
9412
+ # boundary for the role.
9413
+ #
9414
+ # A permissions boundary policy defines the maximum permissions that
9415
+ # identity-based policies can grant to an entity, but does not grant
9416
+ # permissions. Permissions boundaries do not define the maximum
9417
+ # permissions that a resource-based policy can grant to an entity. To
9418
+ # learn more, see [Permissions boundaries for IAM entities][1] in the
9419
+ # *IAM User Guide*.
9420
+ #
9421
+ # For more information about policy types, see [Policy types ][2] in the
9422
+ # *IAM User Guide*.
9423
+ #
9424
+ #
9425
+ #
9426
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
9427
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
9361
9428
  #
9362
9429
  # @return [Struct] Returns an empty {Seahorse::Client::Response response}.
9363
9430
  #
@@ -9509,8 +9576,23 @@ module Aws::IAM
9509
9576
  # to set the permissions boundary.
9510
9577
  #
9511
9578
  # @option params [required, String] :permissions_boundary
9512
- # The ARN of the policy that is used to set the permissions boundary for
9513
- # the user.
9579
+ # The ARN of the managed policy that is used to set the permissions
9580
+ # boundary for the user.
9581
+ #
9582
+ # A permissions boundary policy defines the maximum permissions that
9583
+ # identity-based policies can grant to an entity, but does not grant
9584
+ # permissions. Permissions boundaries do not define the maximum
9585
+ # permissions that a resource-based policy can grant to an entity. To
9586
+ # learn more, see [Permissions boundaries for IAM entities][1] in the
9587
+ # *IAM User Guide*.
9588
+ #
9589
+ # For more information about policy types, see [Policy types ][2] in the
9590
+ # *IAM User Guide*.
9591
+ #
9592
+ #
9593
+ #
9594
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
9595
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
9514
9596
  #
9515
9597
  # @return [Struct] Returns an empty {Seahorse::Client::Response response}.
9516
9598
  #
@@ -10071,9 +10153,16 @@ module Aws::IAM
10071
10153
  # If the output is long, you can use `MaxItems` and `Marker` parameters
10072
10154
  # to paginate the results.
10073
10155
  #
10074
- # For more information about using the policy simulator, see [Testing
10075
- # IAM policies with the IAM policy simulator ][1]in the *IAM User
10076
- # Guide*.
10156
+ # <note markdown="1"> The IAM policy simulator evaluates statements in the identity-based
10157
+ # policy and the inputs that you provide during simulation. The policy
10158
+ # simulator results can differ from your live Amazon Web Services
10159
+ # environment. We recommend that you check your policies against your
10160
+ # live Amazon Web Services environment after testing using the policy
10161
+ # simulator to confirm that you have the desired results. For more
10162
+ # information about using the policy simulator, see [Testing IAM
10163
+ # policies with the IAM policy simulator ][1]in the *IAM User Guide*.
10164
+ #
10165
+ # </note>
10077
10166
  #
10078
10167
  #
10079
10168
  #
@@ -10173,6 +10262,10 @@ module Aws::IAM
10173
10262
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
10174
10263
  # in the *Amazon Web Services General Reference*.
10175
10264
  #
10265
+ # <note markdown="1"> Simulation of resource-based policies isn't supported for IAM roles.
10266
+ #
10267
+ # </note>
10268
+ #
10176
10269
  #
10177
10270
  #
10178
10271
  # [1]: https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html
@@ -10200,6 +10293,10 @@ module Aws::IAM
10200
10293
  # * The special characters tab (`\u0009`), line feed (`\u000A`), and
10201
10294
  # carriage return (`\u000D`)
10202
10295
  #
10296
+ # <note markdown="1"> Simulation of resource-based policies isn't supported for IAM roles.
10297
+ #
10298
+ # </note>
10299
+ #
10203
10300
  #
10204
10301
  #
10205
10302
  # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-quotas-entity-length
@@ -10382,7 +10479,8 @@ module Aws::IAM
10382
10479
  # instead.
10383
10480
  #
10384
10481
  # You can also optionally include one resource-based policy to be
10385
- # evaluated with each of the resources included in the simulation.
10482
+ # evaluated with each of the resources included in the simulation for
10483
+ # IAM users only.
10386
10484
  #
10387
10485
  # The simulation does not perform the API operations; it only checks the
10388
10486
  # authorization to determine if the simulated policies allow or deny the
@@ -10403,9 +10501,16 @@ module Aws::IAM
10403
10501
  # If the output is long, you can use the `MaxItems` and `Marker`
10404
10502
  # parameters to paginate the results.
10405
10503
  #
10406
- # For more information about using the policy simulator, see [Testing
10407
- # IAM policies with the IAM policy simulator ][1]in the *IAM User
10408
- # Guide*.
10504
+ # <note markdown="1"> The IAM policy simulator evaluates statements in the identity-based
10505
+ # policy and the inputs that you provide during simulation. The policy
10506
+ # simulator results can differ from your live Amazon Web Services
10507
+ # environment. We recommend that you check your policies against your
10508
+ # live Amazon Web Services environment after testing using the policy
10509
+ # simulator to confirm that you have the desired results. For more
10510
+ # information about using the policy simulator, see [Testing IAM
10511
+ # policies with the IAM policy simulator ][1]in the *IAM User Guide*.
10512
+ #
10513
+ # </note>
10409
10514
  #
10410
10515
  #
10411
10516
  #
@@ -10511,6 +10616,10 @@ module Aws::IAM
10511
10616
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
10512
10617
  # in the *Amazon Web Services General Reference*.
10513
10618
  #
10619
+ # <note markdown="1"> Simulation of resource-based policies isn't supported for IAM roles.
10620
+ #
10621
+ # </note>
10622
+ #
10514
10623
  #
10515
10624
  #
10516
10625
  # [1]: https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html
@@ -10538,6 +10647,10 @@ module Aws::IAM
10538
10647
  # * The special characters tab (`\u0009`), line feed (`\u000A`), and
10539
10648
  # carriage return (`\u000D`)
10540
10649
  #
10650
+ # <note markdown="1"> Simulation of resource-based policies isn't supported for IAM roles.
10651
+ #
10652
+ # </note>
10653
+ #
10541
10654
  #
10542
10655
  #
10543
10656
  # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-quotas-entity-length
@@ -10884,7 +10997,7 @@ module Aws::IAM
10884
10997
  # *MyImportantProject*. Or search for all resources with the key name
10885
10998
  # *Cost Center* and the value *41200*.
10886
10999
  #
10887
- # * **Access control** - Include tags in IAM user-based and
11000
+ # * **Access control** - Include tags in IAM identity-based and
10888
11001
  # resource-based policies. You can use tags to restrict access to only
10889
11002
  # an OIDC provider that has a specified tag attached. For examples of
10890
11003
  # policies that show how to use tags to control access, see [Control
@@ -11303,7 +11416,7 @@ module Aws::IAM
11303
11416
  # *MyImportantProject*. Or search for all resources with the key name
11304
11417
  # *Cost Center* and the value *41200*.
11305
11418
  #
11306
- # * **Access control** - Include tags in IAM user-based and
11419
+ # * **Access control** - Include tags in IAM identity-based and
11307
11420
  # resource-based policies. You can use tags to restrict access to only
11308
11421
  # an IAM requesting user that has a specified tag attached. You can
11309
11422
  # also restrict access to only those resources that have a certain tag
@@ -12255,10 +12368,10 @@ module Aws::IAM
12255
12368
  # <note markdown="1"> Amazon Web Services secures communication with some OIDC identity
12256
12369
  # providers (IdPs) through our library of trusted certificate
12257
12370
  # authorities (CAs) instead of using a certificate thumbprint to verify
12258
- # your IdP server certificate. These OIDC IdPs include Google, and those
12259
- # that use an Amazon S3 bucket to host a JSON Web Key Set (JWKS)
12260
- # endpoint. In these cases, your legacy thumbprint remains in your
12261
- # configuration, but is no longer used for validation.
12371
+ # your IdP server certificate. These OIDC IdPs include Google, Auth0,
12372
+ # and those that use an Amazon S3 bucket to host a JSON Web Key Set
12373
+ # (JWKS) endpoint. In these cases, your legacy thumbprint remains in
12374
+ # your configuration, but is no longer used for validation.
12262
12375
  #
12263
12376
  # </note>
12264
12377
  #
@@ -13233,7 +13346,7 @@ module Aws::IAM
13233
13346
  params: params,
13234
13347
  config: config)
13235
13348
  context[:gem_name] = 'aws-sdk-iam'
13236
- context[:gem_version] = '1.74.0'
13349
+ context[:gem_version] = '1.76.0'
13237
13350
  Seahorse::Client::Request.new(handlers, context)
13238
13351
  end
13239
13352
 
@@ -14,144 +14,141 @@ module Aws::IAM
14
14
  use_dual_stack = parameters.use_dual_stack
15
15
  use_fips = parameters.use_fips
16
16
  endpoint = parameters.endpoint
17
- if (partition_result = Aws::Endpoints::Matchers.aws_partition(region))
18
- if Aws::Endpoints::Matchers.set?(endpoint) && (url = Aws::Endpoints::Matchers.parse_url(endpoint))
19
- if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
20
- raise ArgumentError, "Invalid Configuration: FIPS and custom endpoint are not supported"
21
- end
22
- if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
23
- raise ArgumentError, "Invalid Configuration: Dualstack and custom endpoint are not supported"
24
- end
25
- return Aws::Endpoints::Endpoint.new(url: endpoint, headers: {}, properties: {})
17
+ if Aws::Endpoints::Matchers.set?(endpoint)
18
+ if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
19
+ raise ArgumentError, "Invalid Configuration: FIPS and custom endpoint are not supported"
26
20
  end
27
- if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws")
28
- if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true) && Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
29
- if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS")) && Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
30
- return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.api.aws", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-east-1", "signingName"=>"iam"}]})
21
+ if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
22
+ raise ArgumentError, "Invalid Configuration: Dualstack and custom endpoint are not supported"
23
+ end
24
+ return Aws::Endpoints::Endpoint.new(url: endpoint, headers: {}, properties: {})
25
+ end
26
+ if Aws::Endpoints::Matchers.set?(region)
27
+ if (partition_result = Aws::Endpoints::Matchers.aws_partition(region))
28
+ if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws")
29
+ if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true) && Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
30
+ if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS")) && Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
31
+ return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.api.aws", headers: {}, properties: {})
32
+ end
33
+ raise ArgumentError, "FIPS and DualStack are enabled, but this partition does not support one or both"
31
34
  end
32
- raise ArgumentError, "FIPS and DualStack are enabled, but this partition does not support one or both"
33
- end
34
- if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
35
- if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
36
- return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-east-1", "signingName"=>"iam"}]})
35
+ if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
36
+ if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
37
+ return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-east-1"}]})
38
+ end
39
+ raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
37
40
  end
38
- raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
39
- end
40
- if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
41
- if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
42
- return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.api.aws", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-east-1", "signingName"=>"iam"}]})
41
+ if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
42
+ if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
43
+ return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.api.aws", headers: {}, properties: {})
44
+ end
45
+ raise ArgumentError, "DualStack is enabled but this partition does not support DualStack"
43
46
  end
44
- raise ArgumentError, "DualStack is enabled but this partition does not support DualStack"
45
- end
46
- return Aws::Endpoints::Endpoint.new(url: "https://iam.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-east-1", "signingName"=>"iam"}]})
47
- end
48
- if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws-cn")
49
- if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true) && Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
50
- if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS")) && Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
51
- return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.api.amazonwebservices.com.cn", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"cn-north-1", "signingName"=>"iam"}]})
47
+ return Aws::Endpoints::Endpoint.new(url: "https://iam.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-east-1"}]})
48
+ end
49
+ if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws-cn")
50
+ if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true) && Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
51
+ if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS")) && Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
52
+ return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.api.amazonwebservices.com.cn", headers: {}, properties: {})
53
+ end
54
+ raise ArgumentError, "FIPS and DualStack are enabled, but this partition does not support one or both"
52
55
  end
53
- raise ArgumentError, "FIPS and DualStack are enabled, but this partition does not support one or both"
54
- end
55
- if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
56
- if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
57
- return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.amazonaws.com.cn", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"cn-north-1", "signingName"=>"iam"}]})
56
+ if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
57
+ if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
58
+ return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.amazonaws.com.cn", headers: {}, properties: {})
59
+ end
60
+ raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
58
61
  end
59
- raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
60
- end
61
- if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
62
- if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
63
- return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.api.amazonwebservices.com.cn", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"cn-north-1", "signingName"=>"iam"}]})
62
+ if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
63
+ if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
64
+ return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.api.amazonwebservices.com.cn", headers: {}, properties: {})
65
+ end
66
+ raise ArgumentError, "DualStack is enabled but this partition does not support DualStack"
64
67
  end
65
- raise ArgumentError, "DualStack is enabled but this partition does not support DualStack"
68
+ return Aws::Endpoints::Endpoint.new(url: "https://iam.cn-north-1.amazonaws.com.cn", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"cn-north-1"}]})
69
+ end
70
+ if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws-us-gov")
71
+ if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true) && Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
72
+ if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS")) && Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
73
+ return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.api.aws", headers: {}, properties: {})
74
+ end
75
+ raise ArgumentError, "FIPS and DualStack are enabled, but this partition does not support one or both"
76
+ end
77
+ if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
78
+ if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
79
+ return Aws::Endpoints::Endpoint.new(url: "https://iam.us-gov.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-gov-west-1"}]})
80
+ end
81
+ raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
82
+ end
83
+ if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
84
+ if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
85
+ return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.api.aws", headers: {}, properties: {})
86
+ end
87
+ raise ArgumentError, "DualStack is enabled but this partition does not support DualStack"
88
+ end
89
+ return Aws::Endpoints::Endpoint.new(url: "https://iam.us-gov.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-gov-west-1"}]})
90
+ end
91
+ if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws-iso")
92
+ if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
93
+ if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
94
+ return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.c2s.ic.gov", headers: {}, properties: {})
95
+ end
96
+ raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
97
+ end
98
+ return Aws::Endpoints::Endpoint.new(url: "https://iam.us-iso-east-1.c2s.ic.gov", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-iso-east-1"}]})
99
+ end
100
+ if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws-iso-b")
101
+ if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
102
+ if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
103
+ return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.sc2s.sgov.gov", headers: {}, properties: {})
104
+ end
105
+ raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
106
+ end
107
+ return Aws::Endpoints::Endpoint.new(url: "https://iam.us-isob-east-1.sc2s.sgov.gov", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-isob-east-1"}]})
66
108
  end
67
- return Aws::Endpoints::Endpoint.new(url: "https://iam.cn-north-1.amazonaws.com.cn", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"cn-north-1", "signingName"=>"iam"}]})
68
- end
69
- if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws-us-gov")
70
109
  if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true) && Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
71
110
  if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS")) && Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
72
- return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.api.aws", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-gov-west-1", "signingName"=>"iam"}]})
111
+ return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.#{partition_result['dualStackDnsSuffix']}", headers: {}, properties: {})
73
112
  end
74
113
  raise ArgumentError, "FIPS and DualStack are enabled, but this partition does not support one or both"
75
114
  end
76
115
  if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
77
116
  if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
78
- return Aws::Endpoints::Endpoint.new(url: "https://iam.us-gov.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-gov-west-1", "signingName"=>"iam"}]})
117
+ if Aws::Endpoints::Matchers.string_equals?(region, "aws-global")
118
+ return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-east-1"}]})
119
+ end
120
+ if Aws::Endpoints::Matchers.string_equals?(region, "aws-us-gov-global")
121
+ return Aws::Endpoints::Endpoint.new(url: "https://iam.us-gov.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-gov-west-1"}]})
122
+ end
123
+ return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.#{partition_result['dnsSuffix']}", headers: {}, properties: {})
79
124
  end
80
125
  raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
81
126
  end
82
127
  if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
83
128
  if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
84
- return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.api.aws", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-gov-west-1", "signingName"=>"iam"}]})
129
+ return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.#{partition_result['dualStackDnsSuffix']}", headers: {}, properties: {})
85
130
  end
86
131
  raise ArgumentError, "DualStack is enabled but this partition does not support DualStack"
87
132
  end
88
- return Aws::Endpoints::Endpoint.new(url: "https://iam.us-gov.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-gov-west-1", "signingName"=>"iam"}]})
89
- end
90
- if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws-iso")
91
- if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
92
- if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
93
- return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.c2s.ic.gov", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-iso-east-1", "signingName"=>"iam"}]})
94
- end
95
- raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
133
+ if Aws::Endpoints::Matchers.string_equals?(region, "aws-global")
134
+ return Aws::Endpoints::Endpoint.new(url: "https://iam.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-east-1"}]})
96
135
  end
97
- return Aws::Endpoints::Endpoint.new(url: "https://iam.us-iso-east-1.c2s.ic.gov", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-iso-east-1", "signingName"=>"iam"}]})
98
- end
99
- if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws-iso-b")
100
- if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
101
- if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
102
- return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.sc2s.sgov.gov", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-isob-east-1", "signingName"=>"iam"}]})
103
- end
104
- raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
136
+ if Aws::Endpoints::Matchers.string_equals?(region, "aws-cn-global")
137
+ return Aws::Endpoints::Endpoint.new(url: "https://iam.cn-north-1.amazonaws.com.cn", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"cn-north-1"}]})
105
138
  end
106
- return Aws::Endpoints::Endpoint.new(url: "https://iam.us-isob-east-1.sc2s.sgov.gov", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-isob-east-1", "signingName"=>"iam"}]})
107
- end
108
- if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true) && Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
109
- if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS")) && Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
110
- return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.#{partition_result['dualStackDnsSuffix']}", headers: {}, properties: {})
139
+ if Aws::Endpoints::Matchers.string_equals?(region, "aws-us-gov-global")
140
+ return Aws::Endpoints::Endpoint.new(url: "https://iam.us-gov.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-gov-west-1"}]})
111
141
  end
112
- raise ArgumentError, "FIPS and DualStack are enabled, but this partition does not support one or both"
113
- end
114
- if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
115
- if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
116
- if Aws::Endpoints::Matchers.string_equals?(region, "iam")
117
- return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-east-1", "signingName"=>"iam"}]})
118
- end
119
- if Aws::Endpoints::Matchers.string_equals?(region, "aws-global")
120
- return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-east-1", "signingName"=>"iam"}]})
121
- end
122
- if Aws::Endpoints::Matchers.string_equals?(region, "iam-govcloud")
123
- return Aws::Endpoints::Endpoint.new(url: "https://iam.us-gov.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-gov-west-1", "signingName"=>"iam"}]})
124
- end
125
- if Aws::Endpoints::Matchers.string_equals?(region, "aws-us-gov-global")
126
- return Aws::Endpoints::Endpoint.new(url: "https://iam.us-gov.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-gov-west-1", "signingName"=>"iam"}]})
127
- end
128
- return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.#{partition_result['dnsSuffix']}", headers: {}, properties: {})
142
+ if Aws::Endpoints::Matchers.string_equals?(region, "aws-iso-global")
143
+ return Aws::Endpoints::Endpoint.new(url: "https://iam.us-iso-east-1.c2s.ic.gov", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-iso-east-1"}]})
129
144
  end
130
- raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
131
- end
132
- if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
133
- if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
134
- return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.#{partition_result['dualStackDnsSuffix']}", headers: {}, properties: {})
145
+ if Aws::Endpoints::Matchers.string_equals?(region, "aws-iso-b-global")
146
+ return Aws::Endpoints::Endpoint.new(url: "https://iam.us-isob-east-1.sc2s.sgov.gov", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-isob-east-1"}]})
135
147
  end
136
- raise ArgumentError, "DualStack is enabled but this partition does not support DualStack"
137
- end
138
- if Aws::Endpoints::Matchers.string_equals?(region, "aws-global")
139
- return Aws::Endpoints::Endpoint.new(url: "https://iam.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-east-1", "signingName"=>"iam"}]})
140
- end
141
- if Aws::Endpoints::Matchers.string_equals?(region, "aws-cn-global")
142
- return Aws::Endpoints::Endpoint.new(url: "https://iam.cn-north-1.amazonaws.com.cn", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"cn-north-1", "signingName"=>"iam"}]})
143
- end
144
- if Aws::Endpoints::Matchers.string_equals?(region, "aws-us-gov-global")
145
- return Aws::Endpoints::Endpoint.new(url: "https://iam.us-gov.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-gov-west-1", "signingName"=>"iam"}]})
146
- end
147
- if Aws::Endpoints::Matchers.string_equals?(region, "aws-iso-global")
148
- return Aws::Endpoints::Endpoint.new(url: "https://iam.us-iso-east-1.c2s.ic.gov", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-iso-east-1", "signingName"=>"iam"}]})
149
- end
150
- if Aws::Endpoints::Matchers.string_equals?(region, "aws-iso-b-global")
151
- return Aws::Endpoints::Endpoint.new(url: "https://iam.us-isob-east-1.sc2s.sgov.gov", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-isob-east-1", "signingName"=>"iam"}]})
148
+ return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.#{partition_result['dnsSuffix']}", headers: {}, properties: {})
152
149
  end
153
- return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.#{partition_result['dnsSuffix']}", headers: {}, properties: {})
154
150
  end
151
+ raise ArgumentError, "Invalid Configuration: Missing Region"
155
152
  raise ArgumentError, 'No endpoint could be resolved'
156
153
 
157
154
  end
@@ -455,6 +455,15 @@ module Aws::IAM
455
455
  # IAM user, group, role, and policy names must be unique within the
456
456
  # account. Names are not distinguished by case. For example, you cannot
457
457
  # create resources named both "MyResource" and "myresource".
458
+ #
459
+ # This parameter allows (through its [regex pattern][1]) a string of
460
+ # characters consisting of upper and lowercase alphanumeric characters
461
+ # with no spaces. You can also include any of the following characters:
462
+ # \_+=,.@-
463
+ #
464
+ #
465
+ #
466
+ # [1]: http://wikipedia.org/wiki/regex
458
467
  # @option options [required, String] :assume_role_policy_document
459
468
  # The trust relationship policy document that grants an entity
460
469
  # permission to assume the role.
@@ -505,8 +514,23 @@ module Aws::IAM
505
514
  #
506
515
  # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html
507
516
  # @option options [String] :permissions_boundary
508
- # The ARN of the policy that is used to set the permissions boundary for
509
- # the role.
517
+ # The ARN of the managed policy that is used to set the permissions
518
+ # boundary for the role.
519
+ #
520
+ # A permissions boundary policy defines the maximum permissions that
521
+ # identity-based policies can grant to an entity, but does not grant
522
+ # permissions. Permissions boundaries do not define the maximum
523
+ # permissions that a resource-based policy can grant to an entity. To
524
+ # learn more, see [Permissions boundaries for IAM entities][1] in the
525
+ # *IAM User Guide*.
526
+ #
527
+ # For more information about policy types, see [Policy types ][2] in the
528
+ # *IAM User Guide*.
529
+ #
530
+ #
531
+ #
532
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
533
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
510
534
  # @option options [Array<Types::Tag>] :tags
511
535
  # A list of tags that you want to attach to the new role. Each tag
512
536
  # consists of a key name and an associated value. For more information
@@ -808,8 +832,23 @@ module Aws::IAM
808
832
  # account. Names are not distinguished by case. For example, you cannot
809
833
  # create resources named both "MyResource" and "myresource".
810
834
  # @option options [String] :permissions_boundary
811
- # The ARN of the policy that is used to set the permissions boundary for
812
- # the user.
835
+ # The ARN of the managed policy that is used to set the permissions
836
+ # boundary for the user.
837
+ #
838
+ # A permissions boundary policy defines the maximum permissions that
839
+ # identity-based policies can grant to an entity, but does not grant
840
+ # permissions. Permissions boundaries do not define the maximum
841
+ # permissions that a resource-based policy can grant to an entity. To
842
+ # learn more, see [Permissions boundaries for IAM entities][1] in the
843
+ # *IAM User Guide*.
844
+ #
845
+ # For more information about policy types, see [Policy types ][2] in the
846
+ # *IAM User Guide*.
847
+ #
848
+ #
849
+ #
850
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
851
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
813
852
  # @option options [Array<Types::Tag>] :tags
814
853
  # A list of tags that you want to attach to the new user. Each tag
815
854
  # consists of a key name and an associated value. For more information
@@ -866,8 +905,8 @@ module Aws::IAM
866
905
  # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html
867
906
  # [2]: http://wikipedia.org/wiki/regex
868
907
  # @option options [required, String] :virtual_mfa_device_name
869
- # The name of the virtual MFA device. Use with path to uniquely identify
870
- # a virtual MFA device.
908
+ # The name of the virtual MFA device, which must be unique. Use with
909
+ # path to uniquely identify a virtual MFA device.
871
910
  #
872
911
  # This parameter allows (through its [regex pattern][1]) a string of
873
912
  # characters consisting of upper and lowercase alphanumeric characters
@@ -133,7 +133,7 @@ module Aws::IAM
133
133
  # period can be shorter if your Region began supporting these features
134
134
  # within the last year. The role might have been used more than 400 days
135
135
  # ago. For more information, see [Regions where data is tracked][1] in
136
- # the *IAM User Guide*.
136
+ # the *IAM user Guide*.
137
137
  #
138
138
  #
139
139
  #
@@ -60,7 +60,7 @@ module Aws::IAM
60
60
  # unauthenticated requests.
61
61
  #
62
62
  # This field is null if no principals (IAM users, IAM roles, or root
63
- # users) in the reported Organizations entity attempted to access the
63
+ # user) in the reported Organizations entity attempted to access the
64
64
  # service within the [tracking period][1].
65
65
  #
66
66
  #
@@ -85,9 +85,9 @@ module Aws::IAM
85
85
  # @return [Time]
86
86
  #
87
87
  # @!attribute [rw] total_authenticated_entities
88
- # The number of accounts with authenticated principals (root users,
89
- # IAM users, and IAM roles) that attempted to access the service in
90
- # the tracking period.
88
+ # The number of accounts with authenticated principals (root user, IAM
89
+ # users, and IAM roles) that attempted to access the service in the
90
+ # tracking period.
91
91
  # @return [Integer]
92
92
  #
93
93
  # @see http://docs.aws.amazon.com/goto/WebAPI/iam-2010-05-08/AccessDetail AWS API Documentation
@@ -891,7 +891,7 @@ module Aws::IAM
891
891
  #
892
892
  # For more information about obtaining the OIDC provider thumbprint,
893
893
  # see [Obtaining the thumbprint for an OpenID Connect provider][1] in
894
- # the *IAM User Guide*.
894
+ # the *IAM user Guide*.
895
895
  #
896
896
  #
897
897
  #
@@ -1191,6 +1191,15 @@ module Aws::IAM
1191
1191
  # account. Names are not distinguished by case. For example, you
1192
1192
  # cannot create resources named both "MyResource" and
1193
1193
  # "myresource".
1194
+ #
1195
+ # This parameter allows (through its [regex pattern][1]) a string of
1196
+ # characters consisting of upper and lowercase alphanumeric characters
1197
+ # with no spaces. You can also include any of the following
1198
+ # characters: \_+=,.@-
1199
+ #
1200
+ #
1201
+ #
1202
+ # [1]: http://wikipedia.org/wiki/regex
1194
1203
  # @return [String]
1195
1204
  #
1196
1205
  # @!attribute [rw] assume_role_policy_document
@@ -1250,8 +1259,23 @@ module Aws::IAM
1250
1259
  # @return [Integer]
1251
1260
  #
1252
1261
  # @!attribute [rw] permissions_boundary
1253
- # The ARN of the policy that is used to set the permissions boundary
1254
- # for the role.
1262
+ # The ARN of the managed policy that is used to set the permissions
1263
+ # boundary for the role.
1264
+ #
1265
+ # A permissions boundary policy defines the maximum permissions that
1266
+ # identity-based policies can grant to an entity, but does not grant
1267
+ # permissions. Permissions boundaries do not define the maximum
1268
+ # permissions that a resource-based policy can grant to an entity. To
1269
+ # learn more, see [Permissions boundaries for IAM entities][1] in the
1270
+ # *IAM User Guide*.
1271
+ #
1272
+ # For more information about policy types, see [Policy types ][2] in
1273
+ # the *IAM User Guide*.
1274
+ #
1275
+ #
1276
+ #
1277
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
1278
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
1255
1279
  # @return [String]
1256
1280
  #
1257
1281
  # @!attribute [rw] tags
@@ -1516,8 +1540,23 @@ module Aws::IAM
1516
1540
  # @return [String]
1517
1541
  #
1518
1542
  # @!attribute [rw] permissions_boundary
1519
- # The ARN of the policy that is used to set the permissions boundary
1520
- # for the user.
1543
+ # The ARN of the managed policy that is used to set the permissions
1544
+ # boundary for the user.
1545
+ #
1546
+ # A permissions boundary policy defines the maximum permissions that
1547
+ # identity-based policies can grant to an entity, but does not grant
1548
+ # permissions. Permissions boundaries do not define the maximum
1549
+ # permissions that a resource-based policy can grant to an entity. To
1550
+ # learn more, see [Permissions boundaries for IAM entities][1] in the
1551
+ # *IAM User Guide*.
1552
+ #
1553
+ # For more information about policy types, see [Policy types ][2] in
1554
+ # the *IAM User Guide*.
1555
+ #
1556
+ #
1557
+ #
1558
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
1559
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
1521
1560
  # @return [String]
1522
1561
  #
1523
1562
  # @!attribute [rw] tags
@@ -1583,8 +1622,8 @@ module Aws::IAM
1583
1622
  # @return [String]
1584
1623
  #
1585
1624
  # @!attribute [rw] virtual_mfa_device_name
1586
- # The name of the virtual MFA device. Use with path to uniquely
1587
- # identify a virtual MFA device.
1625
+ # The name of the virtual MFA device, which must be unique. Use with
1626
+ # path to uniquely identify a virtual MFA device.
1588
1627
  #
1589
1628
  # This parameter allows (through its [regex pattern][1]) a string of
1590
1629
  # characters consisting of upper and lowercase alphanumeric characters
@@ -8130,8 +8169,23 @@ module Aws::IAM
8130
8169
  # @return [String]
8131
8170
  #
8132
8171
  # @!attribute [rw] permissions_boundary
8133
- # The ARN of the policy that is used to set the permissions boundary
8134
- # for the role.
8172
+ # The ARN of the managed policy that is used to set the permissions
8173
+ # boundary for the role.
8174
+ #
8175
+ # A permissions boundary policy defines the maximum permissions that
8176
+ # identity-based policies can grant to an entity, but does not grant
8177
+ # permissions. Permissions boundaries do not define the maximum
8178
+ # permissions that a resource-based policy can grant to an entity. To
8179
+ # learn more, see [Permissions boundaries for IAM entities][1] in the
8180
+ # *IAM User Guide*.
8181
+ #
8182
+ # For more information about policy types, see [Policy types ][2] in
8183
+ # the *IAM User Guide*.
8184
+ #
8185
+ #
8186
+ #
8187
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
8188
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
8135
8189
  # @return [String]
8136
8190
  #
8137
8191
  # @see http://docs.aws.amazon.com/goto/WebAPI/iam-2010-05-08/PutRolePermissionsBoundaryRequest AWS API Documentation
@@ -8210,8 +8264,23 @@ module Aws::IAM
8210
8264
  # @return [String]
8211
8265
  #
8212
8266
  # @!attribute [rw] permissions_boundary
8213
- # The ARN of the policy that is used to set the permissions boundary
8214
- # for the user.
8267
+ # The ARN of the managed policy that is used to set the permissions
8268
+ # boundary for the user.
8269
+ #
8270
+ # A permissions boundary policy defines the maximum permissions that
8271
+ # identity-based policies can grant to an entity, but does not grant
8272
+ # permissions. Permissions boundaries do not define the maximum
8273
+ # permissions that a resource-based policy can grant to an entity. To
8274
+ # learn more, see [Permissions boundaries for IAM entities][1] in the
8275
+ # *IAM User Guide*.
8276
+ #
8277
+ # For more information about policy types, see [Policy types ][2] in
8278
+ # the *IAM User Guide*.
8279
+ #
8280
+ #
8281
+ #
8282
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
8283
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
8215
8284
  # @return [String]
8216
8285
  #
8217
8286
  # @see http://docs.aws.amazon.com/goto/WebAPI/iam-2010-05-08/PutUserPermissionsBoundaryRequest AWS API Documentation
@@ -8648,7 +8717,7 @@ module Aws::IAM
8648
8717
  # period can be shorter if your Region began supporting these features
8649
8718
  # within the last year. The role might have been used more than 400
8650
8719
  # days ago. For more information, see [Regions where data is
8651
- # tracked][1] in the *IAM User Guide*.
8720
+ # tracked][1] in the *IAM user Guide*.
8652
8721
  #
8653
8722
  #
8654
8723
  #
@@ -8802,7 +8871,7 @@ module Aws::IAM
8802
8871
  # period can be shorter if your Region began supporting these features
8803
8872
  # within the last year. The role might have been used more than 400 days
8804
8873
  # ago. For more information, see [Regions where data is tracked][1] in
8805
- # the *IAM User Guide*.
8874
+ # the *IAM user Guide*.
8806
8875
  #
8807
8876
  # This data type is returned as a response element in the GetRole and
8808
8877
  # GetAccountAuthorizationDetails operations.
@@ -9504,6 +9573,11 @@ module Aws::IAM
9504
9573
  # For more information about ARNs, see [Amazon Resource Names
9505
9574
  # (ARNs)][1] in the *Amazon Web Services General Reference*.
9506
9575
  #
9576
+ # <note markdown="1"> Simulation of resource-based policies isn't supported for IAM
9577
+ # roles.
9578
+ #
9579
+ # </note>
9580
+ #
9507
9581
  #
9508
9582
  #
9509
9583
  # [1]: https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html
@@ -9532,6 +9606,11 @@ module Aws::IAM
9532
9606
  # * The special characters tab (`\u0009`), line feed (`\u000A`), and
9533
9607
  # carriage return (`\u000D`)
9534
9608
  #
9609
+ # <note markdown="1"> Simulation of resource-based policies isn't supported for IAM
9610
+ # roles.
9611
+ #
9612
+ # </note>
9613
+ #
9535
9614
  #
9536
9615
  #
9537
9616
  # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-quotas-entity-length
@@ -9789,6 +9868,11 @@ module Aws::IAM
9789
9868
  # For more information about ARNs, see [Amazon Resource Names
9790
9869
  # (ARNs)][1] in the *Amazon Web Services General Reference*.
9791
9870
  #
9871
+ # <note markdown="1"> Simulation of resource-based policies isn't supported for IAM
9872
+ # roles.
9873
+ #
9874
+ # </note>
9875
+ #
9792
9876
  #
9793
9877
  #
9794
9878
  # [1]: https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html
@@ -9817,6 +9901,11 @@ module Aws::IAM
9817
9901
  # * The special characters tab (`\u0009`), line feed (`\u000A`), and
9818
9902
  # carriage return (`\u000D`)
9819
9903
  #
9904
+ # <note markdown="1"> Simulation of resource-based policies isn't supported for IAM
9905
+ # roles.
9906
+ #
9907
+ # </note>
9908
+ #
9820
9909
  #
9821
9910
  #
9822
9911
  # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-quotas-entity-length
@@ -379,8 +379,23 @@ module Aws::IAM
379
379
  # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html
380
380
  # [2]: http://wikipedia.org/wiki/regex
381
381
  # @option options [String] :permissions_boundary
382
- # The ARN of the policy that is used to set the permissions boundary for
383
- # the user.
382
+ # The ARN of the managed policy that is used to set the permissions
383
+ # boundary for the user.
384
+ #
385
+ # A permissions boundary policy defines the maximum permissions that
386
+ # identity-based policies can grant to an entity, but does not grant
387
+ # permissions. Permissions boundaries do not define the maximum
388
+ # permissions that a resource-based policy can grant to an entity. To
389
+ # learn more, see [Permissions boundaries for IAM entities][1] in the
390
+ # *IAM User Guide*.
391
+ #
392
+ # For more information about policy types, see [Policy types ][2] in the
393
+ # *IAM User Guide*.
394
+ #
395
+ #
396
+ #
397
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
398
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
384
399
  # @option options [Array<Types::Tag>] :tags
385
400
  # A list of tags that you want to attach to the new user. Each tag
386
401
  # consists of a key name and an associated value. For more information
data/lib/aws-sdk-iam.rb CHANGED
@@ -74,6 +74,6 @@ require_relative 'aws-sdk-iam/customizations'
74
74
  # @!group service
75
75
  module Aws::IAM
76
76
 
77
- GEM_VERSION = '1.74.0'
77
+ GEM_VERSION = '1.76.0'
78
78
 
79
79
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-iam
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.74.0
4
+ version: 1.76.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2023-01-18 00:00:00.000000000 Z
11
+ date: 2023-03-14 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core