aws-sdk-iam 1.87.0 → 1.89.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 8cd23e72571ee6b6f132d5029f4d65a3bef8789c4b8e916166e6aafe5604aab4
4
- data.tar.gz: a98e465f2c30e9306e80c464130bc94e54494f34d2be75f318bd30dd73853643
3
+ metadata.gz: 875e82c55847b77bc6dc6da8ddcf329e9049f1e0f26394a615d9f2df24dae638
4
+ data.tar.gz: e161e3a0480e5aacd7a2a09c704e49f9e1d872e992ae69cc320c817ea34ce321
5
5
  SHA512:
6
- metadata.gz: 2ab6958433e853261157331c18eb6b1769deffc36608991c71887c96ef83024fdd3a46a30c6fa344b30d54cf709526a522d42ed730a35bc32ff91f9f7fdd0f18
7
- data.tar.gz: 118657f775d0adb3f607678009d949251baed6e0f50387c06840b969858cc573f82bc42ace645171ac8cec05b63a92b54bbb43ae0c5ffce6f521fd9fdbcd4cb0
6
+ metadata.gz: 4f5bda123f5b3b63a357d2443ebf94c3c6417dd0bd1e5e0e339f29593e93d57bd98e388b5b08185efb1422cb3a9232d5a17debce67a871759c055e720358d6d0
7
+ data.tar.gz: bdc3c85d154b7d9d21c099a5c12601e4d29e18aa897301a6fb458a621700d8a980e58ad573d5e63a0b863789c5fb74049f9c8906913d2d047445c248054e85c1
data/CHANGELOG.md CHANGED
@@ -1,6 +1,16 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.89.0 (2023-10-25)
5
+ ------------------
6
+
7
+ * Feature - Updates to GetAccessKeyLastUsed action to replace NoSuchEntity error with AccessDeniedException error.
8
+
9
+ 1.88.0 (2023-10-24)
10
+ ------------------
11
+
12
+ * Feature - Add the partitional endpoint for IAM in iso-f.
13
+
4
14
  1.87.0 (2023-09-27)
5
15
  ------------------
6
16
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.87.0
1
+ 1.89.0
@@ -4098,6 +4098,9 @@ module Aws::IAM
4098
4098
  # four hours. IAM reports activity for at least the last 400 days, or
4099
4099
  # less if your Region began supporting this feature within the last
4100
4100
  # year. For more information, see [Regions where data is tracked][1].
4101
+ # For more information about services and actions for which action last
4102
+ # accessed information is displayed, see [IAM action last accessed
4103
+ # information services and actions][2].
4101
4104
  #
4102
4105
  # The service last accessed data includes all attempts to access an
4103
4106
  # Amazon Web Services API, not just the successful ones. This includes
@@ -4108,7 +4111,7 @@ module Aws::IAM
4108
4111
  # because the request might have been denied. Refer to your CloudTrail
4109
4112
  # logs as the authoritative source for information about all API calls
4110
4113
  # and whether they were successful or denied access. For more
4111
- # information, see [Logging IAM events with CloudTrail][2] in the *IAM
4114
+ # information, see [Logging IAM events with CloudTrail][3] in the *IAM
4112
4115
  # User Guide*.
4113
4116
  #
4114
4117
  # The `GenerateServiceLastAccessedDetails` operation returns a `JobId`.
@@ -4143,21 +4146,22 @@ module Aws::IAM
4143
4146
  # policy types include resource-based policies, access control lists,
4144
4147
  # Organizations policies, IAM permissions boundaries, and STS assume
4145
4148
  # role policies. It only applies permissions policy logic. For more
4146
- # about the evaluation of policy types, see [Evaluating policies][3] in
4149
+ # about the evaluation of policy types, see [Evaluating policies][4] in
4147
4150
  # the *IAM User Guide*.
4148
4151
  #
4149
4152
  # </note>
4150
4153
  #
4151
4154
  # For more information about service and action last accessed data, see
4152
- # [Reducing permissions using service last accessed data][4] in the *IAM
4155
+ # [Reducing permissions using service last accessed data][5] in the *IAM
4153
4156
  # User Guide*.
4154
4157
  #
4155
4158
  #
4156
4159
  #
4157
4160
  # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_access-advisor.html#access-advisor_tracking-period
4158
- # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/cloudtrail-integration.html
4159
- # [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_evaluation-logic.html#policy-eval-basics
4160
- # [4]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_access-advisor.html
4161
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_access-advisor-action-last-accessed.html
4162
+ # [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/cloudtrail-integration.html
4163
+ # [4]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_evaluation-logic.html#policy-eval-basics
4164
+ # [5]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_access-advisor.html
4161
4165
  #
4162
4166
  # @option params [required, String] :arn
4163
4167
  # The ARN of the IAM resource (user, group, role, or managed policy)
@@ -6323,10 +6327,12 @@ module Aws::IAM
6323
6327
  # implicitly based on the Amazon Web Services access key ID used to sign
6324
6328
  # the request. If a temporary access key is used, then `UserName` is
6325
6329
  # required. If a long-term key is assigned to the user, then `UserName`
6326
- # is not required. This operation works for access keys under the Amazon
6327
- # Web Services account. Consequently, you can use this operation to
6328
- # manage Amazon Web Services account root user credentials even if the
6329
- # Amazon Web Services account has no associated users.
6330
+ # is not required.
6331
+ #
6332
+ # This operation works for access keys under the Amazon Web Services
6333
+ # account. If the Amazon Web Services account has no associated users,
6334
+ # the root user returns it's own access key IDs by running this
6335
+ # command.
6330
6336
  #
6331
6337
  # <note markdown="1"> To ensure the security of your Amazon Web Services account, the secret
6332
6338
  # access key is accessible only during key and user creation.
@@ -13461,7 +13467,7 @@ module Aws::IAM
13461
13467
  params: params,
13462
13468
  config: config)
13463
13469
  context[:gem_name] = 'aws-sdk-iam'
13464
- context[:gem_version] = '1.87.0'
13470
+ context[:gem_version] = '1.89.0'
13465
13471
  Seahorse::Client::Request.new(handlers, context)
13466
13472
  end
13467
13473
 
@@ -2763,7 +2763,6 @@ module Aws::IAM
2763
2763
  o.http_request_uri = "/"
2764
2764
  o.input = Shapes::ShapeRef.new(shape: GetAccessKeyLastUsedRequest)
2765
2765
  o.output = Shapes::ShapeRef.new(shape: GetAccessKeyLastUsedResponse)
2766
- o.errors << Shapes::ShapeRef.new(shape: NoSuchEntityException)
2767
2766
  end)
2768
2767
 
2769
2768
  api.add_operation(:get_account_authorization_details, Seahorse::Model::Operation.new.tap do |o|
@@ -46,6 +46,9 @@ module Aws::IAM
46
46
  if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws-iso-b") && Aws::Endpoints::Matchers.boolean_equals?(use_fips, false) && Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, false)
47
47
  return Aws::Endpoints::Endpoint.new(url: "https://iam.us-isob-east-1.sc2s.sgov.gov", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-isob-east-1"}]})
48
48
  end
49
+ if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws-iso-f") && Aws::Endpoints::Matchers.boolean_equals?(use_fips, false) && Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, false)
50
+ return Aws::Endpoints::Endpoint.new(url: "https://iam.us-isof-south-1.csp.hci.ic.gov", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-isof-south-1"}]})
51
+ end
49
52
  if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true) && Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
50
53
  if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS")) && Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
51
54
  return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.#{partition_result['dualStackDnsSuffix']}", headers: {}, properties: {})
@@ -53,7 +56,7 @@ module Aws::IAM
53
56
  raise ArgumentError, "FIPS and DualStack are enabled, but this partition does not support one or both"
54
57
  end
55
58
  if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
56
- if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
59
+ if Aws::Endpoints::Matchers.boolean_equals?(Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"), true)
57
60
  return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.#{partition_result['dnsSuffix']}", headers: {}, properties: {})
58
61
  end
59
62
  raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
data/lib/aws-sdk-iam.rb CHANGED
@@ -74,6 +74,6 @@ require_relative 'aws-sdk-iam/customizations'
74
74
  # @!group service
75
75
  module Aws::IAM
76
76
 
77
- GEM_VERSION = '1.87.0'
77
+ GEM_VERSION = '1.89.0'
78
78
 
79
79
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-iam
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.87.0
4
+ version: 1.89.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2023-09-27 00:00:00.000000000 Z
11
+ date: 2023-10-25 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core