aws-sdk-iam 1.74.0 → 1.75.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 772aef53edcb2dcfd825515204fcb855d4c189accf178b15c21949a755bac3d5
4
- data.tar.gz: 1d8109abe12a8082ad44f2672d1fd3189dac90dd49cd947992997f80c7f861a5
3
+ metadata.gz: ef84c0d91723ced85c4f386e729ccce65d8015eb3a211e43ecfd82e3f0e66704
4
+ data.tar.gz: 1bbdbb017d13ce2fcf7cf1a7ff11206be46086df7c6757474e15bdf082a97d0b
5
5
  SHA512:
6
- metadata.gz: c345d0c8a4cfdc02be9938560f8cb82196176c14fd9822a903e8e032f5aae4423d2af3a99bbf88c2c14be01fc86f3ef2399d9d933ce6ac2333ff97337a239dfb
7
- data.tar.gz: f8f21b795a257ece2eda80c18ec9cf8a0b68a1034982243423a12991fa10db563dbfdfdc5d5fc515c3b4d97bd15d23c420d4fd1b63cdf8d92a5dc28f780e3d0e
6
+ metadata.gz: e5de3cb4467504346c82b05c019201baa34aa21eb77309ae1fc3a382c33536dfa22dbc450ef428004de1ca85429777076a8345a43784c8e93b34b9dec09d5698
7
+ data.tar.gz: 239df2e18c8248c0456b5ace08e77991507f75223c74169ed5cc4f42effd64c482c2ec7bcf9c64ae3484b8150c5789b9c393f6b94bdba4728112abb741bcbf4c
data/CHANGELOG.md CHANGED
@@ -1,6 +1,11 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.75.0 (2023-02-01)
5
+ ------------------
6
+
7
+ * Feature - Documentation updates for AWS Identity and Access Management (IAM).
8
+
4
9
  1.74.0 (2023-01-18)
5
10
  ------------------
6
11
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.74.0
1
+ 1.75.0
@@ -1298,10 +1298,10 @@ module Aws::IAM
1298
1298
  # <note markdown="1"> Amazon Web Services secures communication with some OIDC identity
1299
1299
  # providers (IdPs) through our library of trusted certificate
1300
1300
  # authorities (CAs) instead of using a certificate thumbprint to verify
1301
- # your IdP server certificate. These OIDC IdPs include Google, and those
1302
- # that use an Amazon S3 bucket to host a JSON Web Key Set (JWKS)
1303
- # endpoint. In these cases, your legacy thumbprint remains in your
1304
- # configuration, but is no longer used for validation.
1301
+ # your IdP server certificate. These OIDC IdPs include Google, Auth0,
1302
+ # and those that use an Amazon S3 bucket to host a JSON Web Key Set
1303
+ # (JWKS) endpoint. In these cases, your legacy thumbprint remains in
1304
+ # your configuration, but is no longer used for validation.
1305
1305
  #
1306
1306
  # </note>
1307
1307
  #
@@ -1790,8 +1790,23 @@ module Aws::IAM
1790
1790
  # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html
1791
1791
  #
1792
1792
  # @option params [String] :permissions_boundary
1793
- # The ARN of the policy that is used to set the permissions boundary for
1794
- # the role.
1793
+ # The ARN of the managed policy that is used to set the permissions
1794
+ # boundary for the role.
1795
+ #
1796
+ # A permissions boundary policy defines the maximum permissions that
1797
+ # identity-based policies can grant to an entity, but does not grant
1798
+ # permissions. Permissions boundaries do not define the maximum
1799
+ # permissions that a resource-based policy can grant to an entity. To
1800
+ # learn more, see [Permissions boundaries for IAM entities][1] in the
1801
+ # *IAM User Guide*.
1802
+ #
1803
+ # For more information about policy types, see [Policy types ][2] in the
1804
+ # *IAM User Guide*.
1805
+ #
1806
+ #
1807
+ #
1808
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
1809
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
1795
1810
  #
1796
1811
  # @option params [Array<Types::Tag>] :tags
1797
1812
  # A list of tags that you want to attach to the new role. Each tag
@@ -2183,8 +2198,23 @@ module Aws::IAM
2183
2198
  # create resources named both "MyResource" and "myresource".
2184
2199
  #
2185
2200
  # @option params [String] :permissions_boundary
2186
- # The ARN of the policy that is used to set the permissions boundary for
2187
- # the user.
2201
+ # The ARN of the managed policy that is used to set the permissions
2202
+ # boundary for the user.
2203
+ #
2204
+ # A permissions boundary policy defines the maximum permissions that
2205
+ # identity-based policies can grant to an entity, but does not grant
2206
+ # permissions. Permissions boundaries do not define the maximum
2207
+ # permissions that a resource-based policy can grant to an entity. To
2208
+ # learn more, see [Permissions boundaries for IAM entities][1] in the
2209
+ # *IAM User Guide*.
2210
+ #
2211
+ # For more information about policy types, see [Policy types ][2] in the
2212
+ # *IAM User Guide*.
2213
+ #
2214
+ #
2215
+ #
2216
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
2217
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
2188
2218
  #
2189
2219
  # @option params [Array<Types::Tag>] :tags
2190
2220
  # A list of tags that you want to attach to the new user. Each tag
@@ -2916,9 +2946,20 @@ module Aws::IAM
2916
2946
  req.send_request(options)
2917
2947
  end
2918
2948
 
2919
- # Deletes the specified role. The role must not have any policies
2920
- # attached. For more information about roles, see [Working with
2921
- # roles][1].
2949
+ # Deletes the specified role. Unlike the Amazon Web Services Management
2950
+ # Console, when you delete a role programmatically, you must delete the
2951
+ # items attached to the role manually, or the deletion fails. For more
2952
+ # information, see [Deleting an IAM role][1]. Before attempting to
2953
+ # delete a role, remove the following attached items:
2954
+ #
2955
+ # * Inline policies (DeleteRolePolicy)
2956
+ #
2957
+ # * Attached managed policies (DetachRolePolicy)
2958
+ #
2959
+ # * Instance profile (RemoveRoleFromInstanceProfile)
2960
+ #
2961
+ # * Optional – Delete instance profile after detaching from role for
2962
+ # resource clean up (DeleteInstanceProfile)
2922
2963
  #
2923
2964
  # Make sure that you do not have any Amazon EC2 instances running with
2924
2965
  # the role you are about to delete. Deleting a role or instance profile
@@ -2927,7 +2968,7 @@ module Aws::IAM
2927
2968
  #
2928
2969
  #
2929
2970
  #
2930
- # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/WorkingWithRoles.html
2971
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_manage_delete.html#roles-managingrole-deleting-cli
2931
2972
  #
2932
2973
  # @option params [required, String] :role_name
2933
2974
  # The name of the role to delete.
@@ -9356,8 +9397,23 @@ module Aws::IAM
9356
9397
  # to set the permissions boundary.
9357
9398
  #
9358
9399
  # @option params [required, String] :permissions_boundary
9359
- # The ARN of the policy that is used to set the permissions boundary for
9360
- # the role.
9400
+ # The ARN of the managed policy that is used to set the permissions
9401
+ # boundary for the role.
9402
+ #
9403
+ # A permissions boundary policy defines the maximum permissions that
9404
+ # identity-based policies can grant to an entity, but does not grant
9405
+ # permissions. Permissions boundaries do not define the maximum
9406
+ # permissions that a resource-based policy can grant to an entity. To
9407
+ # learn more, see [Permissions boundaries for IAM entities][1] in the
9408
+ # *IAM User Guide*.
9409
+ #
9410
+ # For more information about policy types, see [Policy types ][2] in the
9411
+ # *IAM User Guide*.
9412
+ #
9413
+ #
9414
+ #
9415
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
9416
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
9361
9417
  #
9362
9418
  # @return [Struct] Returns an empty {Seahorse::Client::Response response}.
9363
9419
  #
@@ -9509,8 +9565,23 @@ module Aws::IAM
9509
9565
  # to set the permissions boundary.
9510
9566
  #
9511
9567
  # @option params [required, String] :permissions_boundary
9512
- # The ARN of the policy that is used to set the permissions boundary for
9513
- # the user.
9568
+ # The ARN of the managed policy that is used to set the permissions
9569
+ # boundary for the user.
9570
+ #
9571
+ # A permissions boundary policy defines the maximum permissions that
9572
+ # identity-based policies can grant to an entity, but does not grant
9573
+ # permissions. Permissions boundaries do not define the maximum
9574
+ # permissions that a resource-based policy can grant to an entity. To
9575
+ # learn more, see [Permissions boundaries for IAM entities][1] in the
9576
+ # *IAM User Guide*.
9577
+ #
9578
+ # For more information about policy types, see [Policy types ][2] in the
9579
+ # *IAM User Guide*.
9580
+ #
9581
+ #
9582
+ #
9583
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
9584
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
9514
9585
  #
9515
9586
  # @return [Struct] Returns an empty {Seahorse::Client::Response response}.
9516
9587
  #
@@ -10071,9 +10142,16 @@ module Aws::IAM
10071
10142
  # If the output is long, you can use `MaxItems` and `Marker` parameters
10072
10143
  # to paginate the results.
10073
10144
  #
10074
- # For more information about using the policy simulator, see [Testing
10075
- # IAM policies with the IAM policy simulator ][1]in the *IAM User
10076
- # Guide*.
10145
+ # <note markdown="1"> The IAM policy simulator evaluates statements in the identity-based
10146
+ # policy and the inputs that you provide during simulation. The policy
10147
+ # simulator results can differ from your live Amazon Web Services
10148
+ # environment. We recommend that you check your policies against your
10149
+ # live Amazon Web Services environment after testing using the policy
10150
+ # simulator to confirm that you have the desired results. For more
10151
+ # information about using the policy simulator, see [Testing IAM
10152
+ # policies with the IAM policy simulator ][1]in the *IAM User Guide*.
10153
+ #
10154
+ # </note>
10077
10155
  #
10078
10156
  #
10079
10157
  #
@@ -10173,6 +10251,10 @@ module Aws::IAM
10173
10251
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
10174
10252
  # in the *Amazon Web Services General Reference*.
10175
10253
  #
10254
+ # <note markdown="1"> Simulation of resource-based policies isn't supported for IAM roles.
10255
+ #
10256
+ # </note>
10257
+ #
10176
10258
  #
10177
10259
  #
10178
10260
  # [1]: https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html
@@ -10200,6 +10282,10 @@ module Aws::IAM
10200
10282
  # * The special characters tab (`\u0009`), line feed (`\u000A`), and
10201
10283
  # carriage return (`\u000D`)
10202
10284
  #
10285
+ # <note markdown="1"> Simulation of resource-based policies isn't supported for IAM roles.
10286
+ #
10287
+ # </note>
10288
+ #
10203
10289
  #
10204
10290
  #
10205
10291
  # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-quotas-entity-length
@@ -10382,7 +10468,8 @@ module Aws::IAM
10382
10468
  # instead.
10383
10469
  #
10384
10470
  # You can also optionally include one resource-based policy to be
10385
- # evaluated with each of the resources included in the simulation.
10471
+ # evaluated with each of the resources included in the simulation for
10472
+ # IAM users only.
10386
10473
  #
10387
10474
  # The simulation does not perform the API operations; it only checks the
10388
10475
  # authorization to determine if the simulated policies allow or deny the
@@ -10403,9 +10490,16 @@ module Aws::IAM
10403
10490
  # If the output is long, you can use the `MaxItems` and `Marker`
10404
10491
  # parameters to paginate the results.
10405
10492
  #
10406
- # For more information about using the policy simulator, see [Testing
10407
- # IAM policies with the IAM policy simulator ][1]in the *IAM User
10408
- # Guide*.
10493
+ # <note markdown="1"> The IAM policy simulator evaluates statements in the identity-based
10494
+ # policy and the inputs that you provide during simulation. The policy
10495
+ # simulator results can differ from your live Amazon Web Services
10496
+ # environment. We recommend that you check your policies against your
10497
+ # live Amazon Web Services environment after testing using the policy
10498
+ # simulator to confirm that you have the desired results. For more
10499
+ # information about using the policy simulator, see [Testing IAM
10500
+ # policies with the IAM policy simulator ][1]in the *IAM User Guide*.
10501
+ #
10502
+ # </note>
10409
10503
  #
10410
10504
  #
10411
10505
  #
@@ -10511,6 +10605,10 @@ module Aws::IAM
10511
10605
  # For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
10512
10606
  # in the *Amazon Web Services General Reference*.
10513
10607
  #
10608
+ # <note markdown="1"> Simulation of resource-based policies isn't supported for IAM roles.
10609
+ #
10610
+ # </note>
10611
+ #
10514
10612
  #
10515
10613
  #
10516
10614
  # [1]: https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html
@@ -10538,6 +10636,10 @@ module Aws::IAM
10538
10636
  # * The special characters tab (`\u0009`), line feed (`\u000A`), and
10539
10637
  # carriage return (`\u000D`)
10540
10638
  #
10639
+ # <note markdown="1"> Simulation of resource-based policies isn't supported for IAM roles.
10640
+ #
10641
+ # </note>
10642
+ #
10541
10643
  #
10542
10644
  #
10543
10645
  # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-quotas-entity-length
@@ -12255,10 +12357,10 @@ module Aws::IAM
12255
12357
  # <note markdown="1"> Amazon Web Services secures communication with some OIDC identity
12256
12358
  # providers (IdPs) through our library of trusted certificate
12257
12359
  # authorities (CAs) instead of using a certificate thumbprint to verify
12258
- # your IdP server certificate. These OIDC IdPs include Google, and those
12259
- # that use an Amazon S3 bucket to host a JSON Web Key Set (JWKS)
12260
- # endpoint. In these cases, your legacy thumbprint remains in your
12261
- # configuration, but is no longer used for validation.
12360
+ # your IdP server certificate. These OIDC IdPs include Google, Auth0,
12361
+ # and those that use an Amazon S3 bucket to host a JSON Web Key Set
12362
+ # (JWKS) endpoint. In these cases, your legacy thumbprint remains in
12363
+ # your configuration, but is no longer used for validation.
12262
12364
  #
12263
12365
  # </note>
12264
12366
  #
@@ -13233,7 +13335,7 @@ module Aws::IAM
13233
13335
  params: params,
13234
13336
  config: config)
13235
13337
  context[:gem_name] = 'aws-sdk-iam'
13236
- context[:gem_version] = '1.74.0'
13338
+ context[:gem_version] = '1.75.0'
13237
13339
  Seahorse::Client::Request.new(handlers, context)
13238
13340
  end
13239
13341
 
@@ -50,6 +50,9 @@ module Aws::IAM
50
50
 
51
51
  def initialize(options = {})
52
52
  self[:region] = options[:region]
53
+ if self[:region].nil?
54
+ raise ArgumentError, "Missing required EndpointParameter: :region"
55
+ end
53
56
  self[:use_dual_stack] = options[:use_dual_stack]
54
57
  self[:use_dual_stack] = false if self[:use_dual_stack].nil?
55
58
  if self[:use_dual_stack].nil?
@@ -15,7 +15,7 @@ module Aws::IAM
15
15
  use_fips = parameters.use_fips
16
16
  endpoint = parameters.endpoint
17
17
  if (partition_result = Aws::Endpoints::Matchers.aws_partition(region))
18
- if Aws::Endpoints::Matchers.set?(endpoint) && (url = Aws::Endpoints::Matchers.parse_url(endpoint))
18
+ if Aws::Endpoints::Matchers.set?(endpoint)
19
19
  if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
20
20
  raise ArgumentError, "Invalid Configuration: FIPS and custom endpoint are not supported"
21
21
  end
@@ -27,7 +27,7 @@ module Aws::IAM
27
27
  if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws")
28
28
  if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true) && Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
29
29
  if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS")) && Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
30
- return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.api.aws", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-east-1", "signingName"=>"iam"}]})
30
+ return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.api.aws", headers: {}, properties: {})
31
31
  end
32
32
  raise ArgumentError, "FIPS and DualStack are enabled, but this partition does not support one or both"
33
33
  end
@@ -39,7 +39,7 @@ module Aws::IAM
39
39
  end
40
40
  if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
41
41
  if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
42
- return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.api.aws", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-east-1", "signingName"=>"iam"}]})
42
+ return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.api.aws", headers: {}, properties: {})
43
43
  end
44
44
  raise ArgumentError, "DualStack is enabled but this partition does not support DualStack"
45
45
  end
@@ -48,19 +48,19 @@ module Aws::IAM
48
48
  if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws-cn")
49
49
  if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true) && Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
50
50
  if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS")) && Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
51
- return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.api.amazonwebservices.com.cn", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"cn-north-1", "signingName"=>"iam"}]})
51
+ return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.api.amazonwebservices.com.cn", headers: {}, properties: {})
52
52
  end
53
53
  raise ArgumentError, "FIPS and DualStack are enabled, but this partition does not support one or both"
54
54
  end
55
55
  if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
56
56
  if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
57
- return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.amazonaws.com.cn", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"cn-north-1", "signingName"=>"iam"}]})
57
+ return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.amazonaws.com.cn", headers: {}, properties: {})
58
58
  end
59
59
  raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
60
60
  end
61
61
  if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
62
62
  if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
63
- return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.api.amazonwebservices.com.cn", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"cn-north-1", "signingName"=>"iam"}]})
63
+ return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.api.amazonwebservices.com.cn", headers: {}, properties: {})
64
64
  end
65
65
  raise ArgumentError, "DualStack is enabled but this partition does not support DualStack"
66
66
  end
@@ -69,7 +69,7 @@ module Aws::IAM
69
69
  if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws-us-gov")
70
70
  if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true) && Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
71
71
  if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS")) && Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
72
- return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.api.aws", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-gov-west-1", "signingName"=>"iam"}]})
72
+ return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.api.aws", headers: {}, properties: {})
73
73
  end
74
74
  raise ArgumentError, "FIPS and DualStack are enabled, but this partition does not support one or both"
75
75
  end
@@ -81,7 +81,7 @@ module Aws::IAM
81
81
  end
82
82
  if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
83
83
  if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
84
- return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.api.aws", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-gov-west-1", "signingName"=>"iam"}]})
84
+ return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.api.aws", headers: {}, properties: {})
85
85
  end
86
86
  raise ArgumentError, "DualStack is enabled but this partition does not support DualStack"
87
87
  end
@@ -90,7 +90,7 @@ module Aws::IAM
90
90
  if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws-iso")
91
91
  if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
92
92
  if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
93
- return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.c2s.ic.gov", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-iso-east-1", "signingName"=>"iam"}]})
93
+ return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.c2s.ic.gov", headers: {}, properties: {})
94
94
  end
95
95
  raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
96
96
  end
@@ -99,7 +99,7 @@ module Aws::IAM
99
99
  if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws-iso-b")
100
100
  if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
101
101
  if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
102
- return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.sc2s.sgov.gov", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-isob-east-1", "signingName"=>"iam"}]})
102
+ return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.sc2s.sgov.gov", headers: {}, properties: {})
103
103
  end
104
104
  raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
105
105
  end
@@ -113,15 +113,9 @@ module Aws::IAM
113
113
  end
114
114
  if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
115
115
  if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
116
- if Aws::Endpoints::Matchers.string_equals?(region, "iam")
117
- return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-east-1", "signingName"=>"iam"}]})
118
- end
119
116
  if Aws::Endpoints::Matchers.string_equals?(region, "aws-global")
120
117
  return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-east-1", "signingName"=>"iam"}]})
121
118
  end
122
- if Aws::Endpoints::Matchers.string_equals?(region, "iam-govcloud")
123
- return Aws::Endpoints::Endpoint.new(url: "https://iam.us-gov.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-gov-west-1", "signingName"=>"iam"}]})
124
- end
125
119
  if Aws::Endpoints::Matchers.string_equals?(region, "aws-us-gov-global")
126
120
  return Aws::Endpoints::Endpoint.new(url: "https://iam.us-gov.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-gov-west-1", "signingName"=>"iam"}]})
127
121
  end
@@ -505,8 +505,23 @@ module Aws::IAM
505
505
  #
506
506
  # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html
507
507
  # @option options [String] :permissions_boundary
508
- # The ARN of the policy that is used to set the permissions boundary for
509
- # the role.
508
+ # The ARN of the managed policy that is used to set the permissions
509
+ # boundary for the role.
510
+ #
511
+ # A permissions boundary policy defines the maximum permissions that
512
+ # identity-based policies can grant to an entity, but does not grant
513
+ # permissions. Permissions boundaries do not define the maximum
514
+ # permissions that a resource-based policy can grant to an entity. To
515
+ # learn more, see [Permissions boundaries for IAM entities][1] in the
516
+ # *IAM User Guide*.
517
+ #
518
+ # For more information about policy types, see [Policy types ][2] in the
519
+ # *IAM User Guide*.
520
+ #
521
+ #
522
+ #
523
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
524
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
510
525
  # @option options [Array<Types::Tag>] :tags
511
526
  # A list of tags that you want to attach to the new role. Each tag
512
527
  # consists of a key name and an associated value. For more information
@@ -808,8 +823,23 @@ module Aws::IAM
808
823
  # account. Names are not distinguished by case. For example, you cannot
809
824
  # create resources named both "MyResource" and "myresource".
810
825
  # @option options [String] :permissions_boundary
811
- # The ARN of the policy that is used to set the permissions boundary for
812
- # the user.
826
+ # The ARN of the managed policy that is used to set the permissions
827
+ # boundary for the user.
828
+ #
829
+ # A permissions boundary policy defines the maximum permissions that
830
+ # identity-based policies can grant to an entity, but does not grant
831
+ # permissions. Permissions boundaries do not define the maximum
832
+ # permissions that a resource-based policy can grant to an entity. To
833
+ # learn more, see [Permissions boundaries for IAM entities][1] in the
834
+ # *IAM User Guide*.
835
+ #
836
+ # For more information about policy types, see [Policy types ][2] in the
837
+ # *IAM User Guide*.
838
+ #
839
+ #
840
+ #
841
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
842
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
813
843
  # @option options [Array<Types::Tag>] :tags
814
844
  # A list of tags that you want to attach to the new user. Each tag
815
845
  # consists of a key name and an associated value. For more information
@@ -1250,8 +1250,23 @@ module Aws::IAM
1250
1250
  # @return [Integer]
1251
1251
  #
1252
1252
  # @!attribute [rw] permissions_boundary
1253
- # The ARN of the policy that is used to set the permissions boundary
1254
- # for the role.
1253
+ # The ARN of the managed policy that is used to set the permissions
1254
+ # boundary for the role.
1255
+ #
1256
+ # A permissions boundary policy defines the maximum permissions that
1257
+ # identity-based policies can grant to an entity, but does not grant
1258
+ # permissions. Permissions boundaries do not define the maximum
1259
+ # permissions that a resource-based policy can grant to an entity. To
1260
+ # learn more, see [Permissions boundaries for IAM entities][1] in the
1261
+ # *IAM User Guide*.
1262
+ #
1263
+ # For more information about policy types, see [Policy types ][2] in
1264
+ # the *IAM User Guide*.
1265
+ #
1266
+ #
1267
+ #
1268
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
1269
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
1255
1270
  # @return [String]
1256
1271
  #
1257
1272
  # @!attribute [rw] tags
@@ -1516,8 +1531,23 @@ module Aws::IAM
1516
1531
  # @return [String]
1517
1532
  #
1518
1533
  # @!attribute [rw] permissions_boundary
1519
- # The ARN of the policy that is used to set the permissions boundary
1520
- # for the user.
1534
+ # The ARN of the managed policy that is used to set the permissions
1535
+ # boundary for the user.
1536
+ #
1537
+ # A permissions boundary policy defines the maximum permissions that
1538
+ # identity-based policies can grant to an entity, but does not grant
1539
+ # permissions. Permissions boundaries do not define the maximum
1540
+ # permissions that a resource-based policy can grant to an entity. To
1541
+ # learn more, see [Permissions boundaries for IAM entities][1] in the
1542
+ # *IAM User Guide*.
1543
+ #
1544
+ # For more information about policy types, see [Policy types ][2] in
1545
+ # the *IAM User Guide*.
1546
+ #
1547
+ #
1548
+ #
1549
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
1550
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
1521
1551
  # @return [String]
1522
1552
  #
1523
1553
  # @!attribute [rw] tags
@@ -8130,8 +8160,23 @@ module Aws::IAM
8130
8160
  # @return [String]
8131
8161
  #
8132
8162
  # @!attribute [rw] permissions_boundary
8133
- # The ARN of the policy that is used to set the permissions boundary
8134
- # for the role.
8163
+ # The ARN of the managed policy that is used to set the permissions
8164
+ # boundary for the role.
8165
+ #
8166
+ # A permissions boundary policy defines the maximum permissions that
8167
+ # identity-based policies can grant to an entity, but does not grant
8168
+ # permissions. Permissions boundaries do not define the maximum
8169
+ # permissions that a resource-based policy can grant to an entity. To
8170
+ # learn more, see [Permissions boundaries for IAM entities][1] in the
8171
+ # *IAM User Guide*.
8172
+ #
8173
+ # For more information about policy types, see [Policy types ][2] in
8174
+ # the *IAM User Guide*.
8175
+ #
8176
+ #
8177
+ #
8178
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
8179
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
8135
8180
  # @return [String]
8136
8181
  #
8137
8182
  # @see http://docs.aws.amazon.com/goto/WebAPI/iam-2010-05-08/PutRolePermissionsBoundaryRequest AWS API Documentation
@@ -8210,8 +8255,23 @@ module Aws::IAM
8210
8255
  # @return [String]
8211
8256
  #
8212
8257
  # @!attribute [rw] permissions_boundary
8213
- # The ARN of the policy that is used to set the permissions boundary
8214
- # for the user.
8258
+ # The ARN of the managed policy that is used to set the permissions
8259
+ # boundary for the user.
8260
+ #
8261
+ # A permissions boundary policy defines the maximum permissions that
8262
+ # identity-based policies can grant to an entity, but does not grant
8263
+ # permissions. Permissions boundaries do not define the maximum
8264
+ # permissions that a resource-based policy can grant to an entity. To
8265
+ # learn more, see [Permissions boundaries for IAM entities][1] in the
8266
+ # *IAM User Guide*.
8267
+ #
8268
+ # For more information about policy types, see [Policy types ][2] in
8269
+ # the *IAM User Guide*.
8270
+ #
8271
+ #
8272
+ #
8273
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
8274
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
8215
8275
  # @return [String]
8216
8276
  #
8217
8277
  # @see http://docs.aws.amazon.com/goto/WebAPI/iam-2010-05-08/PutUserPermissionsBoundaryRequest AWS API Documentation
@@ -9504,6 +9564,11 @@ module Aws::IAM
9504
9564
  # For more information about ARNs, see [Amazon Resource Names
9505
9565
  # (ARNs)][1] in the *Amazon Web Services General Reference*.
9506
9566
  #
9567
+ # <note markdown="1"> Simulation of resource-based policies isn't supported for IAM
9568
+ # roles.
9569
+ #
9570
+ # </note>
9571
+ #
9507
9572
  #
9508
9573
  #
9509
9574
  # [1]: https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html
@@ -9532,6 +9597,11 @@ module Aws::IAM
9532
9597
  # * The special characters tab (`\u0009`), line feed (`\u000A`), and
9533
9598
  # carriage return (`\u000D`)
9534
9599
  #
9600
+ # <note markdown="1"> Simulation of resource-based policies isn't supported for IAM
9601
+ # roles.
9602
+ #
9603
+ # </note>
9604
+ #
9535
9605
  #
9536
9606
  #
9537
9607
  # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-quotas-entity-length
@@ -9789,6 +9859,11 @@ module Aws::IAM
9789
9859
  # For more information about ARNs, see [Amazon Resource Names
9790
9860
  # (ARNs)][1] in the *Amazon Web Services General Reference*.
9791
9861
  #
9862
+ # <note markdown="1"> Simulation of resource-based policies isn't supported for IAM
9863
+ # roles.
9864
+ #
9865
+ # </note>
9866
+ #
9792
9867
  #
9793
9868
  #
9794
9869
  # [1]: https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html
@@ -9817,6 +9892,11 @@ module Aws::IAM
9817
9892
  # * The special characters tab (`\u0009`), line feed (`\u000A`), and
9818
9893
  # carriage return (`\u000D`)
9819
9894
  #
9895
+ # <note markdown="1"> Simulation of resource-based policies isn't supported for IAM
9896
+ # roles.
9897
+ #
9898
+ # </note>
9899
+ #
9820
9900
  #
9821
9901
  #
9822
9902
  # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-quotas-entity-length
@@ -379,8 +379,23 @@ module Aws::IAM
379
379
  # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html
380
380
  # [2]: http://wikipedia.org/wiki/regex
381
381
  # @option options [String] :permissions_boundary
382
- # The ARN of the policy that is used to set the permissions boundary for
383
- # the user.
382
+ # The ARN of the managed policy that is used to set the permissions
383
+ # boundary for the user.
384
+ #
385
+ # A permissions boundary policy defines the maximum permissions that
386
+ # identity-based policies can grant to an entity, but does not grant
387
+ # permissions. Permissions boundaries do not define the maximum
388
+ # permissions that a resource-based policy can grant to an entity. To
389
+ # learn more, see [Permissions boundaries for IAM entities][1] in the
390
+ # *IAM User Guide*.
391
+ #
392
+ # For more information about policy types, see [Policy types ][2] in the
393
+ # *IAM User Guide*.
394
+ #
395
+ #
396
+ #
397
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
398
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
384
399
  # @option options [Array<Types::Tag>] :tags
385
400
  # A list of tags that you want to attach to the new user. Each tag
386
401
  # consists of a key name and an associated value. For more information
data/lib/aws-sdk-iam.rb CHANGED
@@ -74,6 +74,6 @@ require_relative 'aws-sdk-iam/customizations'
74
74
  # @!group service
75
75
  module Aws::IAM
76
76
 
77
- GEM_VERSION = '1.74.0'
77
+ GEM_VERSION = '1.75.0'
78
78
 
79
79
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-iam
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.74.0
4
+ version: 1.75.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2023-01-18 00:00:00.000000000 Z
11
+ date: 2023-02-01 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core