aws-sdk-iam 1.75.0 → 1.76.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/CHANGELOG.md +5 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-iam/client.rb +18 -7
- data/lib/aws-sdk-iam/endpoint_parameters.rb +0 -3
- data/lib/aws-sdk-iam/endpoint_provider.rb +105 -102
- data/lib/aws-sdk-iam/resource.rb +11 -2
- data/lib/aws-sdk-iam/role.rb +1 -1
- data/lib/aws-sdk-iam/types.rb +18 -9
- data/lib/aws-sdk-iam.rb +1 -1
- metadata +2 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 4a338135d35d293d96f6adaaff90cc637e1622164c670c215e3ea294f7918abd
|
4
|
+
data.tar.gz: 76d331e00da6de881cfcd70d00f2cc404952d7a3ef98043020f93bcce88cd2bc
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 181b0658ff859256eb96c0ff80f54a07ba8bf26bfd15569b0e1c7d9deb269138c0fa504e1ba672e04243733a60cfe7ddcf0374aaf5d6439675ba8b7d9ff5832d
|
7
|
+
data.tar.gz: 7a17eb50ab3b44f866011af847ce088b652cc1105a45f8f6cd4ee934b274a6807f5b7201bb33448c140a614739c2b543bf37f0dececc37cc386f856b59787e8a
|
data/CHANGELOG.md
CHANGED
data/VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
1.
|
1
|
+
1.76.0
|
data/lib/aws-sdk-iam/client.rb
CHANGED
@@ -1289,6 +1289,8 @@ module Aws::IAM
|
|
1289
1289
|
# application or applications allowed to authenticate using the OIDC
|
1290
1290
|
# provider
|
1291
1291
|
#
|
1292
|
+
# * A list of tags that are attached to the specified IAM OIDC provider
|
1293
|
+
#
|
1292
1294
|
# * A list of thumbprints of one or more server certificates that the
|
1293
1295
|
# IdP uses
|
1294
1296
|
#
|
@@ -1364,7 +1366,7 @@ module Aws::IAM
|
|
1364
1366
|
#
|
1365
1367
|
# For more information about obtaining the OIDC provider thumbprint, see
|
1366
1368
|
# [Obtaining the thumbprint for an OpenID Connect provider][1] in the
|
1367
|
-
# *IAM
|
1369
|
+
# *IAM user Guide*.
|
1368
1370
|
#
|
1369
1371
|
#
|
1370
1372
|
#
|
@@ -1737,6 +1739,15 @@ module Aws::IAM
|
|
1737
1739
|
# account. Names are not distinguished by case. For example, you cannot
|
1738
1740
|
# create resources named both "MyResource" and "myresource".
|
1739
1741
|
#
|
1742
|
+
# This parameter allows (through its [regex pattern][1]) a string of
|
1743
|
+
# characters consisting of upper and lowercase alphanumeric characters
|
1744
|
+
# with no spaces. You can also include any of the following characters:
|
1745
|
+
# \_+=,.@-
|
1746
|
+
#
|
1747
|
+
#
|
1748
|
+
#
|
1749
|
+
# [1]: http://wikipedia.org/wiki/regex
|
1750
|
+
#
|
1740
1751
|
# @option params [required, String] :assume_role_policy_document
|
1741
1752
|
# The trust relationship policy document that grants an entity
|
1742
1753
|
# permission to assume the role.
|
@@ -2333,8 +2344,8 @@ module Aws::IAM
|
|
2333
2344
|
# [2]: http://wikipedia.org/wiki/regex
|
2334
2345
|
#
|
2335
2346
|
# @option params [required, String] :virtual_mfa_device_name
|
2336
|
-
# The name of the virtual MFA device
|
2337
|
-
# a virtual MFA device.
|
2347
|
+
# The name of the virtual MFA device, which must be unique. Use with
|
2348
|
+
# path to uniquely identify a virtual MFA device.
|
2338
2349
|
#
|
2339
2350
|
# This parameter allows (through its [regex pattern][1]) a string of
|
2340
2351
|
# characters consisting of upper and lowercase alphanumeric characters
|
@@ -5079,7 +5090,7 @@ module Aws::IAM
|
|
5079
5090
|
# operation. For more information, see [Refining permissions using
|
5080
5091
|
# service last accessed data][1] in the *IAM User Guide*.
|
5081
5092
|
#
|
5082
|
-
# For each service that principals in an account (root
|
5093
|
+
# For each service that principals in an account (root user, IAM users,
|
5083
5094
|
# or IAM roles) could access using SCPs, the operation returns details
|
5084
5095
|
# about the most recent access attempt. If there was no attempt, the
|
5085
5096
|
# service is listed without details about the most recent attempt to
|
@@ -10986,7 +10997,7 @@ module Aws::IAM
|
|
10986
10997
|
# *MyImportantProject*. Or search for all resources with the key name
|
10987
10998
|
# *Cost Center* and the value *41200*.
|
10988
10999
|
#
|
10989
|
-
# * **Access control** - Include tags in IAM
|
11000
|
+
# * **Access control** - Include tags in IAM identity-based and
|
10990
11001
|
# resource-based policies. You can use tags to restrict access to only
|
10991
11002
|
# an OIDC provider that has a specified tag attached. For examples of
|
10992
11003
|
# policies that show how to use tags to control access, see [Control
|
@@ -11405,7 +11416,7 @@ module Aws::IAM
|
|
11405
11416
|
# *MyImportantProject*. Or search for all resources with the key name
|
11406
11417
|
# *Cost Center* and the value *41200*.
|
11407
11418
|
#
|
11408
|
-
# * **Access control** - Include tags in IAM
|
11419
|
+
# * **Access control** - Include tags in IAM identity-based and
|
11409
11420
|
# resource-based policies. You can use tags to restrict access to only
|
11410
11421
|
# an IAM requesting user that has a specified tag attached. You can
|
11411
11422
|
# also restrict access to only those resources that have a certain tag
|
@@ -13335,7 +13346,7 @@ module Aws::IAM
|
|
13335
13346
|
params: params,
|
13336
13347
|
config: config)
|
13337
13348
|
context[:gem_name] = 'aws-sdk-iam'
|
13338
|
-
context[:gem_version] = '1.
|
13349
|
+
context[:gem_version] = '1.76.0'
|
13339
13350
|
Seahorse::Client::Request.new(handlers, context)
|
13340
13351
|
end
|
13341
13352
|
|
@@ -50,9 +50,6 @@ module Aws::IAM
|
|
50
50
|
|
51
51
|
def initialize(options = {})
|
52
52
|
self[:region] = options[:region]
|
53
|
-
if self[:region].nil?
|
54
|
-
raise ArgumentError, "Missing required EndpointParameter: :region"
|
55
|
-
end
|
56
53
|
self[:use_dual_stack] = options[:use_dual_stack]
|
57
54
|
self[:use_dual_stack] = false if self[:use_dual_stack].nil?
|
58
55
|
if self[:use_dual_stack].nil?
|
@@ -14,138 +14,141 @@ module Aws::IAM
|
|
14
14
|
use_dual_stack = parameters.use_dual_stack
|
15
15
|
use_fips = parameters.use_fips
|
16
16
|
endpoint = parameters.endpoint
|
17
|
-
if
|
18
|
-
if Aws::Endpoints::Matchers.
|
19
|
-
|
20
|
-
raise ArgumentError, "Invalid Configuration: FIPS and custom endpoint are not supported"
|
21
|
-
end
|
22
|
-
if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
|
23
|
-
raise ArgumentError, "Invalid Configuration: Dualstack and custom endpoint are not supported"
|
24
|
-
end
|
25
|
-
return Aws::Endpoints::Endpoint.new(url: endpoint, headers: {}, properties: {})
|
17
|
+
if Aws::Endpoints::Matchers.set?(endpoint)
|
18
|
+
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
|
19
|
+
raise ArgumentError, "Invalid Configuration: FIPS and custom endpoint are not supported"
|
26
20
|
end
|
27
|
-
if Aws::Endpoints::Matchers.
|
28
|
-
|
29
|
-
|
30
|
-
|
21
|
+
if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
|
22
|
+
raise ArgumentError, "Invalid Configuration: Dualstack and custom endpoint are not supported"
|
23
|
+
end
|
24
|
+
return Aws::Endpoints::Endpoint.new(url: endpoint, headers: {}, properties: {})
|
25
|
+
end
|
26
|
+
if Aws::Endpoints::Matchers.set?(region)
|
27
|
+
if (partition_result = Aws::Endpoints::Matchers.aws_partition(region))
|
28
|
+
if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws")
|
29
|
+
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true) && Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
|
30
|
+
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS")) && Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
|
31
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.api.aws", headers: {}, properties: {})
|
32
|
+
end
|
33
|
+
raise ArgumentError, "FIPS and DualStack are enabled, but this partition does not support one or both"
|
31
34
|
end
|
32
|
-
|
33
|
-
|
34
|
-
|
35
|
-
|
36
|
-
|
35
|
+
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
|
36
|
+
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
|
37
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-east-1"}]})
|
38
|
+
end
|
39
|
+
raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
|
37
40
|
end
|
38
|
-
|
39
|
-
|
40
|
-
|
41
|
-
|
42
|
-
|
41
|
+
if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
|
42
|
+
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
|
43
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.api.aws", headers: {}, properties: {})
|
44
|
+
end
|
45
|
+
raise ArgumentError, "DualStack is enabled but this partition does not support DualStack"
|
43
46
|
end
|
44
|
-
|
45
|
-
end
|
46
|
-
|
47
|
-
|
48
|
-
|
49
|
-
|
50
|
-
|
51
|
-
|
47
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-east-1"}]})
|
48
|
+
end
|
49
|
+
if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws-cn")
|
50
|
+
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true) && Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
|
51
|
+
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS")) && Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
|
52
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.api.amazonwebservices.com.cn", headers: {}, properties: {})
|
53
|
+
end
|
54
|
+
raise ArgumentError, "FIPS and DualStack are enabled, but this partition does not support one or both"
|
52
55
|
end
|
53
|
-
|
54
|
-
|
55
|
-
|
56
|
-
|
57
|
-
|
56
|
+
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
|
57
|
+
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
|
58
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.amazonaws.com.cn", headers: {}, properties: {})
|
59
|
+
end
|
60
|
+
raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
|
58
61
|
end
|
59
|
-
|
60
|
-
|
61
|
-
|
62
|
-
|
63
|
-
|
62
|
+
if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
|
63
|
+
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
|
64
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.api.amazonwebservices.com.cn", headers: {}, properties: {})
|
65
|
+
end
|
66
|
+
raise ArgumentError, "DualStack is enabled but this partition does not support DualStack"
|
64
67
|
end
|
65
|
-
|
68
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam.cn-north-1.amazonaws.com.cn", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"cn-north-1"}]})
|
69
|
+
end
|
70
|
+
if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws-us-gov")
|
71
|
+
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true) && Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
|
72
|
+
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS")) && Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
|
73
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.api.aws", headers: {}, properties: {})
|
74
|
+
end
|
75
|
+
raise ArgumentError, "FIPS and DualStack are enabled, but this partition does not support one or both"
|
76
|
+
end
|
77
|
+
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
|
78
|
+
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
|
79
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam.us-gov.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-gov-west-1"}]})
|
80
|
+
end
|
81
|
+
raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
|
82
|
+
end
|
83
|
+
if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
|
84
|
+
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
|
85
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.api.aws", headers: {}, properties: {})
|
86
|
+
end
|
87
|
+
raise ArgumentError, "DualStack is enabled but this partition does not support DualStack"
|
88
|
+
end
|
89
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam.us-gov.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-gov-west-1"}]})
|
90
|
+
end
|
91
|
+
if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws-iso")
|
92
|
+
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
|
93
|
+
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
|
94
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.c2s.ic.gov", headers: {}, properties: {})
|
95
|
+
end
|
96
|
+
raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
|
97
|
+
end
|
98
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam.us-iso-east-1.c2s.ic.gov", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-iso-east-1"}]})
|
99
|
+
end
|
100
|
+
if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws-iso-b")
|
101
|
+
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
|
102
|
+
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
|
103
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.sc2s.sgov.gov", headers: {}, properties: {})
|
104
|
+
end
|
105
|
+
raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
|
106
|
+
end
|
107
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam.us-isob-east-1.sc2s.sgov.gov", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-isob-east-1"}]})
|
66
108
|
end
|
67
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam.cn-north-1.amazonaws.com.cn", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"cn-north-1", "signingName"=>"iam"}]})
|
68
|
-
end
|
69
|
-
if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws-us-gov")
|
70
109
|
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true) && Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
|
71
110
|
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS")) && Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
|
72
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}
|
111
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.#{partition_result['dualStackDnsSuffix']}", headers: {}, properties: {})
|
73
112
|
end
|
74
113
|
raise ArgumentError, "FIPS and DualStack are enabled, but this partition does not support one or both"
|
75
114
|
end
|
76
115
|
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
|
77
116
|
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
|
78
|
-
|
117
|
+
if Aws::Endpoints::Matchers.string_equals?(region, "aws-global")
|
118
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-east-1"}]})
|
119
|
+
end
|
120
|
+
if Aws::Endpoints::Matchers.string_equals?(region, "aws-us-gov-global")
|
121
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam.us-gov.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-gov-west-1"}]})
|
122
|
+
end
|
123
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.#{partition_result['dnsSuffix']}", headers: {}, properties: {})
|
79
124
|
end
|
80
125
|
raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
|
81
126
|
end
|
82
127
|
if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
|
83
128
|
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
|
84
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}
|
129
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.#{partition_result['dualStackDnsSuffix']}", headers: {}, properties: {})
|
85
130
|
end
|
86
131
|
raise ArgumentError, "DualStack is enabled but this partition does not support DualStack"
|
87
132
|
end
|
88
|
-
|
89
|
-
|
90
|
-
if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws-iso")
|
91
|
-
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
|
92
|
-
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
|
93
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.c2s.ic.gov", headers: {}, properties: {})
|
94
|
-
end
|
95
|
-
raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
|
133
|
+
if Aws::Endpoints::Matchers.string_equals?(region, "aws-global")
|
134
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-east-1"}]})
|
96
135
|
end
|
97
|
-
|
98
|
-
|
99
|
-
if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws-iso-b")
|
100
|
-
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
|
101
|
-
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
|
102
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.sc2s.sgov.gov", headers: {}, properties: {})
|
103
|
-
end
|
104
|
-
raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
|
136
|
+
if Aws::Endpoints::Matchers.string_equals?(region, "aws-cn-global")
|
137
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam.cn-north-1.amazonaws.com.cn", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"cn-north-1"}]})
|
105
138
|
end
|
106
|
-
|
107
|
-
|
108
|
-
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true) && Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
|
109
|
-
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS")) && Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
|
110
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.#{partition_result['dualStackDnsSuffix']}", headers: {}, properties: {})
|
139
|
+
if Aws::Endpoints::Matchers.string_equals?(region, "aws-us-gov-global")
|
140
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam.us-gov.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-gov-west-1"}]})
|
111
141
|
end
|
112
|
-
|
113
|
-
|
114
|
-
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
|
115
|
-
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
|
116
|
-
if Aws::Endpoints::Matchers.string_equals?(region, "aws-global")
|
117
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-east-1", "signingName"=>"iam"}]})
|
118
|
-
end
|
119
|
-
if Aws::Endpoints::Matchers.string_equals?(region, "aws-us-gov-global")
|
120
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam.us-gov.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-gov-west-1", "signingName"=>"iam"}]})
|
121
|
-
end
|
122
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.#{partition_result['dnsSuffix']}", headers: {}, properties: {})
|
142
|
+
if Aws::Endpoints::Matchers.string_equals?(region, "aws-iso-global")
|
143
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam.us-iso-east-1.c2s.ic.gov", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-iso-east-1"}]})
|
123
144
|
end
|
124
|
-
|
125
|
-
|
126
|
-
if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
|
127
|
-
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
|
128
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.#{partition_result['dualStackDnsSuffix']}", headers: {}, properties: {})
|
145
|
+
if Aws::Endpoints::Matchers.string_equals?(region, "aws-iso-b-global")
|
146
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam.us-isob-east-1.sc2s.sgov.gov", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-isob-east-1"}]})
|
129
147
|
end
|
130
|
-
|
131
|
-
end
|
132
|
-
if Aws::Endpoints::Matchers.string_equals?(region, "aws-global")
|
133
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-east-1", "signingName"=>"iam"}]})
|
134
|
-
end
|
135
|
-
if Aws::Endpoints::Matchers.string_equals?(region, "aws-cn-global")
|
136
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam.cn-north-1.amazonaws.com.cn", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"cn-north-1", "signingName"=>"iam"}]})
|
137
|
-
end
|
138
|
-
if Aws::Endpoints::Matchers.string_equals?(region, "aws-us-gov-global")
|
139
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam.us-gov.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-gov-west-1", "signingName"=>"iam"}]})
|
140
|
-
end
|
141
|
-
if Aws::Endpoints::Matchers.string_equals?(region, "aws-iso-global")
|
142
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam.us-iso-east-1.c2s.ic.gov", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-iso-east-1", "signingName"=>"iam"}]})
|
143
|
-
end
|
144
|
-
if Aws::Endpoints::Matchers.string_equals?(region, "aws-iso-b-global")
|
145
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam.us-isob-east-1.sc2s.sgov.gov", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-isob-east-1", "signingName"=>"iam"}]})
|
148
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.#{partition_result['dnsSuffix']}", headers: {}, properties: {})
|
146
149
|
end
|
147
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.#{partition_result['dnsSuffix']}", headers: {}, properties: {})
|
148
150
|
end
|
151
|
+
raise ArgumentError, "Invalid Configuration: Missing Region"
|
149
152
|
raise ArgumentError, 'No endpoint could be resolved'
|
150
153
|
|
151
154
|
end
|
data/lib/aws-sdk-iam/resource.rb
CHANGED
@@ -455,6 +455,15 @@ module Aws::IAM
|
|
455
455
|
# IAM user, group, role, and policy names must be unique within the
|
456
456
|
# account. Names are not distinguished by case. For example, you cannot
|
457
457
|
# create resources named both "MyResource" and "myresource".
|
458
|
+
#
|
459
|
+
# This parameter allows (through its [regex pattern][1]) a string of
|
460
|
+
# characters consisting of upper and lowercase alphanumeric characters
|
461
|
+
# with no spaces. You can also include any of the following characters:
|
462
|
+
# \_+=,.@-
|
463
|
+
#
|
464
|
+
#
|
465
|
+
#
|
466
|
+
# [1]: http://wikipedia.org/wiki/regex
|
458
467
|
# @option options [required, String] :assume_role_policy_document
|
459
468
|
# The trust relationship policy document that grants an entity
|
460
469
|
# permission to assume the role.
|
@@ -896,8 +905,8 @@ module Aws::IAM
|
|
896
905
|
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html
|
897
906
|
# [2]: http://wikipedia.org/wiki/regex
|
898
907
|
# @option options [required, String] :virtual_mfa_device_name
|
899
|
-
# The name of the virtual MFA device
|
900
|
-
# a virtual MFA device.
|
908
|
+
# The name of the virtual MFA device, which must be unique. Use with
|
909
|
+
# path to uniquely identify a virtual MFA device.
|
901
910
|
#
|
902
911
|
# This parameter allows (through its [regex pattern][1]) a string of
|
903
912
|
# characters consisting of upper and lowercase alphanumeric characters
|
data/lib/aws-sdk-iam/role.rb
CHANGED
@@ -133,7 +133,7 @@ module Aws::IAM
|
|
133
133
|
# period can be shorter if your Region began supporting these features
|
134
134
|
# within the last year. The role might have been used more than 400 days
|
135
135
|
# ago. For more information, see [Regions where data is tracked][1] in
|
136
|
-
# the *IAM
|
136
|
+
# the *IAM user Guide*.
|
137
137
|
#
|
138
138
|
#
|
139
139
|
#
|
data/lib/aws-sdk-iam/types.rb
CHANGED
@@ -60,7 +60,7 @@ module Aws::IAM
|
|
60
60
|
# unauthenticated requests.
|
61
61
|
#
|
62
62
|
# This field is null if no principals (IAM users, IAM roles, or root
|
63
|
-
#
|
63
|
+
# user) in the reported Organizations entity attempted to access the
|
64
64
|
# service within the [tracking period][1].
|
65
65
|
#
|
66
66
|
#
|
@@ -85,9 +85,9 @@ module Aws::IAM
|
|
85
85
|
# @return [Time]
|
86
86
|
#
|
87
87
|
# @!attribute [rw] total_authenticated_entities
|
88
|
-
# The number of accounts with authenticated principals (root
|
89
|
-
#
|
90
|
-
#
|
88
|
+
# The number of accounts with authenticated principals (root user, IAM
|
89
|
+
# users, and IAM roles) that attempted to access the service in the
|
90
|
+
# tracking period.
|
91
91
|
# @return [Integer]
|
92
92
|
#
|
93
93
|
# @see http://docs.aws.amazon.com/goto/WebAPI/iam-2010-05-08/AccessDetail AWS API Documentation
|
@@ -891,7 +891,7 @@ module Aws::IAM
|
|
891
891
|
#
|
892
892
|
# For more information about obtaining the OIDC provider thumbprint,
|
893
893
|
# see [Obtaining the thumbprint for an OpenID Connect provider][1] in
|
894
|
-
# the *IAM
|
894
|
+
# the *IAM user Guide*.
|
895
895
|
#
|
896
896
|
#
|
897
897
|
#
|
@@ -1191,6 +1191,15 @@ module Aws::IAM
|
|
1191
1191
|
# account. Names are not distinguished by case. For example, you
|
1192
1192
|
# cannot create resources named both "MyResource" and
|
1193
1193
|
# "myresource".
|
1194
|
+
#
|
1195
|
+
# This parameter allows (through its [regex pattern][1]) a string of
|
1196
|
+
# characters consisting of upper and lowercase alphanumeric characters
|
1197
|
+
# with no spaces. You can also include any of the following
|
1198
|
+
# characters: \_+=,.@-
|
1199
|
+
#
|
1200
|
+
#
|
1201
|
+
#
|
1202
|
+
# [1]: http://wikipedia.org/wiki/regex
|
1194
1203
|
# @return [String]
|
1195
1204
|
#
|
1196
1205
|
# @!attribute [rw] assume_role_policy_document
|
@@ -1613,8 +1622,8 @@ module Aws::IAM
|
|
1613
1622
|
# @return [String]
|
1614
1623
|
#
|
1615
1624
|
# @!attribute [rw] virtual_mfa_device_name
|
1616
|
-
# The name of the virtual MFA device. Use with
|
1617
|
-
# identify a virtual MFA device.
|
1625
|
+
# The name of the virtual MFA device, which must be unique. Use with
|
1626
|
+
# path to uniquely identify a virtual MFA device.
|
1618
1627
|
#
|
1619
1628
|
# This parameter allows (through its [regex pattern][1]) a string of
|
1620
1629
|
# characters consisting of upper and lowercase alphanumeric characters
|
@@ -8708,7 +8717,7 @@ module Aws::IAM
|
|
8708
8717
|
# period can be shorter if your Region began supporting these features
|
8709
8718
|
# within the last year. The role might have been used more than 400
|
8710
8719
|
# days ago. For more information, see [Regions where data is
|
8711
|
-
# tracked][1] in the *IAM
|
8720
|
+
# tracked][1] in the *IAM user Guide*.
|
8712
8721
|
#
|
8713
8722
|
#
|
8714
8723
|
#
|
@@ -8862,7 +8871,7 @@ module Aws::IAM
|
|
8862
8871
|
# period can be shorter if your Region began supporting these features
|
8863
8872
|
# within the last year. The role might have been used more than 400 days
|
8864
8873
|
# ago. For more information, see [Regions where data is tracked][1] in
|
8865
|
-
# the *IAM
|
8874
|
+
# the *IAM user Guide*.
|
8866
8875
|
#
|
8867
8876
|
# This data type is returned as a response element in the GetRole and
|
8868
8877
|
# GetAccountAuthorizationDetails operations.
|
data/lib/aws-sdk-iam.rb
CHANGED
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: aws-sdk-iam
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 1.
|
4
|
+
version: 1.76.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Amazon Web Services
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2023-
|
11
|
+
date: 2023-03-14 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: aws-sdk-core
|