aws-sdk-iam 1.84.0 → 1.86.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: c26247739c2b16342988e890c5ccab52d6e46bf2eda99445600494f735778cd7
4
- data.tar.gz: 502845d8d3ad13030d50250aedec6f47132093b6c111af89bd79d79e823aec56
3
+ metadata.gz: 05564251cdc0010edb62ccd338cec38d1df359cef7dd5a1f0b1dd36f1767fdb9
4
+ data.tar.gz: 916022a599cdf91cb6d2207d1dfe189ad8e9ecec3d29a36ae983de095cf0e012
5
5
  SHA512:
6
- metadata.gz: bcc2360fab59fdb7feaa0ad79782d157de1f532006aa89261cb9a0c79755a8470d04f8424c8d71a3812d56ea552395625ef78da0c02c09b4e60a201d38ececb9
7
- data.tar.gz: 91f5c6284ab4453fea9773fb7e6b95ff390851500ec7d7d610fa94c545d1d6aacef1b8b8ba9aa8045dc66f7d8a3e38db3716883807369dac5ce11a05809ecf82
6
+ metadata.gz: 9e6f0d2c8ed3cbd8b11e289ca4b8829ee051ec5a53769ae600d3eb9d1278a56b5b222855da08a4241e93dbe81efd9802adc60261600beb9a228b115723f55b10
7
+ data.tar.gz: dd3dee41a7047f6cdda0394243dfc7a3a6dc967b8d68b387d3bd0cc93cff635339a78bee8d5f863e499db53eecdfb01bb4b68ba9277dbc142f23db551879fdbd
data/CHANGELOG.md CHANGED
@@ -1,6 +1,16 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.86.0 (2023-07-13)
5
+ ------------------
6
+
7
+ * Feature - Documentation updates for AWS Identity and Access Management (IAM).
8
+
9
+ 1.85.0 (2023-07-11)
10
+ ------------------
11
+
12
+ * Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
13
+
4
14
  1.84.0 (2023-07-06)
5
15
  ------------------
6
16
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.84.0
1
+ 1.86.0
@@ -216,6 +216,10 @@ module Aws::IAM
216
216
  # @option options [Boolean] :endpoint_discovery (false)
217
217
  # When set to `true`, endpoint discovery will be enabled for operations when available.
218
218
  #
219
+ # @option options [Boolean] :ignore_configured_endpoint_urls
220
+ # Setting to true disables use of endpoint URLs provided via environment
221
+ # variables and the shared configuration file.
222
+ #
219
223
  # @option options [Aws::Log::Formatter] :log_formatter (Aws::Log::Formatter.default)
220
224
  # The log formatter.
221
225
  #
@@ -443,17 +447,17 @@ module Aws::IAM
443
447
  #
444
448
  # </note>
445
449
  #
446
- # For more information about roles, see [Working with roles][4]. For
447
- # more information about instance profiles, see [About instance
448
- # profiles][5].
450
+ # For more information about roles, see [IAM roles][4] in the *IAM User
451
+ # Guide*. For more information about instance profiles, see [Using
452
+ # instance profiles][5] in the *IAM User Guide*.
449
453
  #
450
454
  #
451
455
  #
452
456
  # [1]: https://en.wikipedia.org/wiki/Eventual_consistency
453
457
  # [2]: https://docs.aws.amazon.com/AWSEC2/latest/APIReference/API_DisassociateIamInstanceProfile.html
454
458
  # [3]: https://docs.aws.amazon.com/AWSEC2/latest/APIReference/API_AssociateIamInstanceProfile.html
455
- # [4]: https://docs.aws.amazon.com/IAM/latest/UserGuide/WorkingWithRoles.html
456
- # [5]: https://docs.aws.amazon.com/IAM/latest/UserGuide/AboutInstanceProfiles.html
459
+ # [4]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles.html
460
+ # [5]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use_switch-role-ec2_instance-profiles.html
457
461
  #
458
462
  # @option params [required, String] :instance_profile_name
459
463
  # The name of the instance profile to update.
@@ -1320,11 +1324,11 @@ module Aws::IAM
1320
1324
  # access Amazon Web Services.
1321
1325
  #
1322
1326
  # <note markdown="1"> Amazon Web Services secures communication with some OIDC identity
1323
- # providers (IdPs) through our library of trusted certificate
1327
+ # providers (IdPs) through our library of trusted root certificate
1324
1328
  # authorities (CAs) instead of using a certificate thumbprint to verify
1325
- # your IdP server certificate. These OIDC IdPs include Google, Auth0,
1326
- # and those that use an Amazon S3 bucket to host a JSON Web Key Set
1327
- # (JWKS) endpoint. In these cases, your legacy thumbprint remains in
1329
+ # your IdP server certificate. These OIDC IdPs include Auth0, GitHub,
1330
+ # Google, and those that use an Amazon S3 bucket to host a JSON Web Key
1331
+ # Set (JWKS) endpoint. In these cases, your legacy thumbprint remains in
1328
1332
  # your configuration, but is no longer used for validation.
1329
1333
  #
1330
1334
  # </note>
@@ -1725,14 +1729,16 @@ module Aws::IAM
1725
1729
  req.send_request(options)
1726
1730
  end
1727
1731
 
1728
- # Creates a new role for your Amazon Web Services account. For more
1729
- # information about roles, see [IAM roles][1]. For information about
1730
- # quotas for role names and the number of roles you can create, see [IAM
1731
- # and STS quotas][2] in the *IAM User Guide*.
1732
+ # Creates a new role for your Amazon Web Services account.
1733
+ #
1734
+ # For more information about roles, see [IAM roles][1] in the *IAM User
1735
+ # Guide*. For information about quotas for role names and the number of
1736
+ # roles you can create, see [IAM and STS quotas][2] in the *IAM User
1737
+ # Guide*.
1732
1738
  #
1733
1739
  #
1734
1740
  #
1735
- # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/WorkingWithRoles.html
1741
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles.html
1736
1742
  # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html
1737
1743
  #
1738
1744
  # @option params [String] :path
@@ -2730,12 +2736,12 @@ module Aws::IAM
2730
2736
  # instance profile that is associated with a running instance will break
2731
2737
  # any applications running on the instance.
2732
2738
  #
2733
- # For more information about instance profiles, see [About instance
2734
- # profiles][1].
2739
+ # For more information about instance profiles, see [Using instance
2740
+ # profiles][1] in the *IAM User Guide*.
2735
2741
  #
2736
2742
  #
2737
2743
  #
2738
- # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/AboutInstanceProfiles.html
2744
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use_switch-role-ec2_instance-profiles.html
2739
2745
  #
2740
2746
  # @option params [required, String] :instance_profile_name
2741
2747
  # The name of the instance profile to delete.
@@ -4879,12 +4885,12 @@ module Aws::IAM
4879
4885
 
4880
4886
  # Retrieves information about the specified instance profile, including
4881
4887
  # the instance profile's path, GUID, ARN, and role. For more
4882
- # information about instance profiles, see [About instance profiles][1]
4888
+ # information about instance profiles, see [Using instance profiles][1]
4883
4889
  # in the *IAM User Guide*.
4884
4890
  #
4885
4891
  #
4886
4892
  #
4887
- # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/AboutInstanceProfiles.html
4893
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use_switch-role-ec2_instance-profiles.html
4888
4894
  #
4889
4895
  # @option params [required, String] :instance_profile_name
4890
4896
  # The name of the instance profile to get information about.
@@ -5442,8 +5448,8 @@ module Aws::IAM
5442
5448
 
5443
5449
  # Retrieves information about the specified role, including the role's
5444
5450
  # path, GUID, ARN, and the role's trust policy that grants permission
5445
- # to assume the role. For more information about roles, see [Working
5446
- # with roles][1].
5451
+ # to assume the role. For more information about roles, see [IAM
5452
+ # roles][1] in the *IAM User Guide*.
5447
5453
  #
5448
5454
  # <note markdown="1"> Policies returned by this operation are URL-encoded compliant with
5449
5455
  # [RFC 3986][2]. You can use a URL decoding method to convert the policy
@@ -5455,7 +5461,7 @@ module Aws::IAM
5455
5461
  #
5456
5462
  #
5457
5463
  #
5458
- # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/WorkingWithRoles.html
5464
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles.html
5459
5465
  # [2]: https://tools.ietf.org/html/rfc3986
5460
5466
  #
5461
5467
  # @option params [required, String] :role_name
@@ -5557,14 +5563,14 @@ module Aws::IAM
5557
5563
  # For more information about policies, see [Managed policies and inline
5558
5564
  # policies][2] in the *IAM User Guide*.
5559
5565
  #
5560
- # For more information about roles, see [Using roles to delegate
5561
- # permissions and federate identities][3].
5566
+ # For more information about roles, see [IAM roles][3] in the *IAM User
5567
+ # Guide*.
5562
5568
  #
5563
5569
  #
5564
5570
  #
5565
5571
  # [1]: https://tools.ietf.org/html/rfc3986
5566
5572
  # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html
5567
- # [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/roles-toplevel.html
5573
+ # [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles.html
5568
5574
  #
5569
5575
  # @option params [required, String] :role_name
5570
5576
  # The name of the role associated with the policy.
@@ -7280,7 +7286,8 @@ module Aws::IAM
7280
7286
 
7281
7287
  # Lists the instance profiles that have the specified path prefix. If
7282
7288
  # there are none, the operation returns an empty list. For more
7283
- # information about instance profiles, see [About instance profiles][1].
7289
+ # information about instance profiles, see [Using instance profiles][1]
7290
+ # in the *IAM User Guide*.
7284
7291
  #
7285
7292
  # <note markdown="1"> IAM resource-listing operations return a subset of the available
7286
7293
  # attributes for the resource. For example, this operation does not
@@ -7295,7 +7302,7 @@ module Aws::IAM
7295
7302
  #
7296
7303
  #
7297
7304
  #
7298
- # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/AboutInstanceProfiles.html
7305
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use_switch-role-ec2_instance-profiles.html
7299
7306
  #
7300
7307
  # @option params [String] :path_prefix
7301
7308
  # The path prefix for filtering the results. For example, the prefix
@@ -7389,15 +7396,15 @@ module Aws::IAM
7389
7396
 
7390
7397
  # Lists the instance profiles that have the specified associated IAM
7391
7398
  # role. If there are none, the operation returns an empty list. For more
7392
- # information about instance profiles, go to [About instance
7393
- # profiles][1].
7399
+ # information about instance profiles, go to [Using instance
7400
+ # profiles][1] in the *IAM User Guide*.
7394
7401
  #
7395
7402
  # You can paginate the results using the `MaxItems` and `Marker`
7396
7403
  # parameters.
7397
7404
  #
7398
7405
  #
7399
7406
  #
7400
- # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/AboutInstanceProfiles.html
7407
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use_switch-role-ec2_instance-profiles.html
7401
7408
  #
7402
7409
  # @option params [required, String] :role_name
7403
7410
  # The name of the role to list instance profiles for.
@@ -8339,7 +8346,7 @@ module Aws::IAM
8339
8346
 
8340
8347
  # Lists the IAM roles that have the specified path prefix. If there are
8341
8348
  # none, the operation returns an empty list. For more information about
8342
- # roles, see [Working with roles][1].
8349
+ # roles, see [IAM roles][1] in the *IAM User Guide*.
8343
8350
  #
8344
8351
  # <note markdown="1"> IAM resource-listing operations return a subset of the available
8345
8352
  # attributes for the resource. This operation does not return the
@@ -8361,7 +8368,7 @@ module Aws::IAM
8361
8368
  #
8362
8369
  #
8363
8370
  #
8364
- # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/WorkingWithRoles.html
8371
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles.html
8365
8372
  #
8366
8373
  # @option params [String] :path_prefix
8367
8374
  # The path prefix for filtering the results. For example, the prefix
@@ -9437,7 +9444,7 @@ module Aws::IAM
9437
9444
  # You must provide policies in JSON format in IAM. However, for
9438
9445
  # CloudFormation templates formatted in YAML, you can provide the policy
9439
9446
  # in JSON or YAML format. CloudFormation always converts a YAML policy
9440
- # to JSON format before submitting it to = IAM.
9447
+ # to JSON format before submitting it to IAM.
9441
9448
  #
9442
9449
  # The [regex pattern][1] used to validate this parameter is a string of
9443
9450
  # characters consisting of the following:
@@ -9551,8 +9558,8 @@ module Aws::IAM
9551
9558
  # as part of the role's access (permissions) policy. The role's trust
9552
9559
  # policy is created at the same time as the role, using [ `CreateRole`
9553
9560
  # ][1]. You can update a role's trust policy using [
9554
- # `UpdateAssumerolePolicy` ][2]. For more information about IAM roles,
9555
- # see [Using roles to delegate permissions and federate identities][3].
9561
+ # `UpdateAssumeRolePolicy` ][2]. For more information about roles, see
9562
+ # [IAM roles][3] in the *IAM User Guide*.
9556
9563
  #
9557
9564
  # A role can also have a managed policy attached to it. To attach a
9558
9565
  # managed policy to a role, use [ `AttachRolePolicy` ][4]. To create a
@@ -9873,14 +9880,14 @@ module Aws::IAM
9873
9880
  # role from an instance profile that is associated with a running
9874
9881
  # instance might break any applications running on the instance.
9875
9882
  #
9876
- # For more information about IAM roles, see [Working with roles][1]. For
9877
- # more information about instance profiles, see [About instance
9878
- # profiles][2].
9883
+ # For more information about roles, see [IAM roles][1] in the *IAM User
9884
+ # Guide*. For more information about instance profiles, see [Using
9885
+ # instance profiles][2] in the *IAM User Guide*.
9879
9886
  #
9880
9887
  #
9881
9888
  #
9882
- # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/WorkingWithRoles.html
9883
- # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/AboutInstanceProfiles.html
9889
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles.html
9890
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use_switch-role-ec2_instance-profiles.html
9884
9891
  #
9885
9892
  # @option params [required, String] :instance_profile_name
9886
9893
  # The name of the instance profile to update.
@@ -12474,11 +12481,11 @@ module Aws::IAM
12474
12481
  # certificate thumbprint is updated.
12475
12482
  #
12476
12483
  # <note markdown="1"> Amazon Web Services secures communication with some OIDC identity
12477
- # providers (IdPs) through our library of trusted certificate
12484
+ # providers (IdPs) through our library of trusted root certificate
12478
12485
  # authorities (CAs) instead of using a certificate thumbprint to verify
12479
- # your IdP server certificate. These OIDC IdPs include Google, Auth0,
12480
- # and those that use an Amazon S3 bucket to host a JSON Web Key Set
12481
- # (JWKS) endpoint. In these cases, your legacy thumbprint remains in
12486
+ # your IdP server certificate. These OIDC IdPs include Auth0, GitHub,
12487
+ # Google, and those that use an Amazon S3 bucket to host a JSON Web Key
12488
+ # Set (JWKS) endpoint. In these cases, your legacy thumbprint remains in
12482
12489
  # your configuration, but is no longer used for validation.
12483
12490
  #
12484
12491
  # </note>
@@ -13454,7 +13461,7 @@ module Aws::IAM
13454
13461
  params: params,
13455
13462
  config: config)
13456
13463
  context[:gem_name] = 'aws-sdk-iam'
13457
- context[:gem_version] = '1.84.0'
13464
+ context[:gem_version] = '1.86.0'
13458
13465
  Seahorse::Client::Request.new(handlers, context)
13459
13466
  end
13460
13467
 
@@ -330,7 +330,7 @@ module Aws::IAM
330
330
  # You must provide policies in JSON format in IAM. However, for
331
331
  # CloudFormation templates formatted in YAML, you can provide the policy
332
332
  # in JSON or YAML format. CloudFormation always converts a YAML policy
333
- # to JSON format before submitting it to = IAM.
333
+ # to JSON format before submitting it to IAM.
334
334
  #
335
335
  # The [regex pattern][1] used to validate this parameter is a string of
336
336
  # characters consisting of the following:
@@ -223,7 +223,7 @@ module Aws::IAM
223
223
  # You must provide policies in JSON format in IAM. However, for
224
224
  # CloudFormation templates formatted in YAML, you can provide the policy
225
225
  # in JSON or YAML format. CloudFormation always converts a YAML policy
226
- # to JSON format before submitting it to = IAM.
226
+ # to JSON format before submitting it to IAM.
227
227
  #
228
228
  # The [regex pattern][1] used to validate this parameter is a string of
229
229
  # characters consisting of the following:
@@ -8194,7 +8194,7 @@ module Aws::IAM
8194
8194
  # You must provide policies in JSON format in IAM. However, for
8195
8195
  # CloudFormation templates formatted in YAML, you can provide the
8196
8196
  # policy in JSON or YAML format. CloudFormation always converts a YAML
8197
- # policy to JSON format before submitting it to = IAM.
8197
+ # policy to JSON format before submitting it to IAM.
8198
8198
  #
8199
8199
  # The [regex pattern][1] used to validate this parameter is a string
8200
8200
  # of characters consisting of the following:
data/lib/aws-sdk-iam.rb CHANGED
@@ -74,6 +74,6 @@ require_relative 'aws-sdk-iam/customizations'
74
74
  # @!group service
75
75
  module Aws::IAM
76
76
 
77
- GEM_VERSION = '1.84.0'
77
+ GEM_VERSION = '1.86.0'
78
78
 
79
79
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-iam
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.84.0
4
+ version: 1.86.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2023-07-06 00:00:00.000000000 Z
11
+ date: 2023-07-13 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core