aws-sdk-iam 1.74.0 → 1.75.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +5 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-iam/client.rb +130 -28
- data/lib/aws-sdk-iam/endpoint_parameters.rb +3 -0
- data/lib/aws-sdk-iam/endpoint_provider.rb +10 -16
- data/lib/aws-sdk-iam/resource.rb +34 -4
- data/lib/aws-sdk-iam/types.rb +88 -8
- data/lib/aws-sdk-iam/user.rb +17 -2
- data/lib/aws-sdk-iam.rb +1 -1
- metadata +2 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: ef84c0d91723ced85c4f386e729ccce65d8015eb3a211e43ecfd82e3f0e66704
|
4
|
+
data.tar.gz: 1bbdbb017d13ce2fcf7cf1a7ff11206be46086df7c6757474e15bdf082a97d0b
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: e5de3cb4467504346c82b05c019201baa34aa21eb77309ae1fc3a382c33536dfa22dbc450ef428004de1ca85429777076a8345a43784c8e93b34b9dec09d5698
|
7
|
+
data.tar.gz: 239df2e18c8248c0456b5ace08e77991507f75223c74169ed5cc4f42effd64c482c2ec7bcf9c64ae3484b8150c5789b9c393f6b94bdba4728112abb741bcbf4c
|
data/CHANGELOG.md
CHANGED
data/VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
1.
|
1
|
+
1.75.0
|
data/lib/aws-sdk-iam/client.rb
CHANGED
@@ -1298,10 +1298,10 @@ module Aws::IAM
|
|
1298
1298
|
# <note markdown="1"> Amazon Web Services secures communication with some OIDC identity
|
1299
1299
|
# providers (IdPs) through our library of trusted certificate
|
1300
1300
|
# authorities (CAs) instead of using a certificate thumbprint to verify
|
1301
|
-
# your IdP server certificate. These OIDC IdPs include Google,
|
1302
|
-
# that use an Amazon S3 bucket to host a JSON Web Key Set
|
1303
|
-
# endpoint. In these cases, your legacy thumbprint remains in
|
1304
|
-
# configuration, but is no longer used for validation.
|
1301
|
+
# your IdP server certificate. These OIDC IdPs include Google, Auth0,
|
1302
|
+
# and those that use an Amazon S3 bucket to host a JSON Web Key Set
|
1303
|
+
# (JWKS) endpoint. In these cases, your legacy thumbprint remains in
|
1304
|
+
# your configuration, but is no longer used for validation.
|
1305
1305
|
#
|
1306
1306
|
# </note>
|
1307
1307
|
#
|
@@ -1790,8 +1790,23 @@ module Aws::IAM
|
|
1790
1790
|
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html
|
1791
1791
|
#
|
1792
1792
|
# @option params [String] :permissions_boundary
|
1793
|
-
# The ARN of the policy that is used to set the permissions
|
1794
|
-
# the role.
|
1793
|
+
# The ARN of the managed policy that is used to set the permissions
|
1794
|
+
# boundary for the role.
|
1795
|
+
#
|
1796
|
+
# A permissions boundary policy defines the maximum permissions that
|
1797
|
+
# identity-based policies can grant to an entity, but does not grant
|
1798
|
+
# permissions. Permissions boundaries do not define the maximum
|
1799
|
+
# permissions that a resource-based policy can grant to an entity. To
|
1800
|
+
# learn more, see [Permissions boundaries for IAM entities][1] in the
|
1801
|
+
# *IAM User Guide*.
|
1802
|
+
#
|
1803
|
+
# For more information about policy types, see [Policy types ][2] in the
|
1804
|
+
# *IAM User Guide*.
|
1805
|
+
#
|
1806
|
+
#
|
1807
|
+
#
|
1808
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
|
1809
|
+
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
|
1795
1810
|
#
|
1796
1811
|
# @option params [Array<Types::Tag>] :tags
|
1797
1812
|
# A list of tags that you want to attach to the new role. Each tag
|
@@ -2183,8 +2198,23 @@ module Aws::IAM
|
|
2183
2198
|
# create resources named both "MyResource" and "myresource".
|
2184
2199
|
#
|
2185
2200
|
# @option params [String] :permissions_boundary
|
2186
|
-
# The ARN of the policy that is used to set the permissions
|
2187
|
-
# the user.
|
2201
|
+
# The ARN of the managed policy that is used to set the permissions
|
2202
|
+
# boundary for the user.
|
2203
|
+
#
|
2204
|
+
# A permissions boundary policy defines the maximum permissions that
|
2205
|
+
# identity-based policies can grant to an entity, but does not grant
|
2206
|
+
# permissions. Permissions boundaries do not define the maximum
|
2207
|
+
# permissions that a resource-based policy can grant to an entity. To
|
2208
|
+
# learn more, see [Permissions boundaries for IAM entities][1] in the
|
2209
|
+
# *IAM User Guide*.
|
2210
|
+
#
|
2211
|
+
# For more information about policy types, see [Policy types ][2] in the
|
2212
|
+
# *IAM User Guide*.
|
2213
|
+
#
|
2214
|
+
#
|
2215
|
+
#
|
2216
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
|
2217
|
+
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
|
2188
2218
|
#
|
2189
2219
|
# @option params [Array<Types::Tag>] :tags
|
2190
2220
|
# A list of tags that you want to attach to the new user. Each tag
|
@@ -2916,9 +2946,20 @@ module Aws::IAM
|
|
2916
2946
|
req.send_request(options)
|
2917
2947
|
end
|
2918
2948
|
|
2919
|
-
# Deletes the specified role.
|
2920
|
-
#
|
2921
|
-
#
|
2949
|
+
# Deletes the specified role. Unlike the Amazon Web Services Management
|
2950
|
+
# Console, when you delete a role programmatically, you must delete the
|
2951
|
+
# items attached to the role manually, or the deletion fails. For more
|
2952
|
+
# information, see [Deleting an IAM role][1]. Before attempting to
|
2953
|
+
# delete a role, remove the following attached items:
|
2954
|
+
#
|
2955
|
+
# * Inline policies (DeleteRolePolicy)
|
2956
|
+
#
|
2957
|
+
# * Attached managed policies (DetachRolePolicy)
|
2958
|
+
#
|
2959
|
+
# * Instance profile (RemoveRoleFromInstanceProfile)
|
2960
|
+
#
|
2961
|
+
# * Optional – Delete instance profile after detaching from role for
|
2962
|
+
# resource clean up (DeleteInstanceProfile)
|
2922
2963
|
#
|
2923
2964
|
# Make sure that you do not have any Amazon EC2 instances running with
|
2924
2965
|
# the role you are about to delete. Deleting a role or instance profile
|
@@ -2927,7 +2968,7 @@ module Aws::IAM
|
|
2927
2968
|
#
|
2928
2969
|
#
|
2929
2970
|
#
|
2930
|
-
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
2971
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_manage_delete.html#roles-managingrole-deleting-cli
|
2931
2972
|
#
|
2932
2973
|
# @option params [required, String] :role_name
|
2933
2974
|
# The name of the role to delete.
|
@@ -9356,8 +9397,23 @@ module Aws::IAM
|
|
9356
9397
|
# to set the permissions boundary.
|
9357
9398
|
#
|
9358
9399
|
# @option params [required, String] :permissions_boundary
|
9359
|
-
# The ARN of the policy that is used to set the permissions
|
9360
|
-
# the role.
|
9400
|
+
# The ARN of the managed policy that is used to set the permissions
|
9401
|
+
# boundary for the role.
|
9402
|
+
#
|
9403
|
+
# A permissions boundary policy defines the maximum permissions that
|
9404
|
+
# identity-based policies can grant to an entity, but does not grant
|
9405
|
+
# permissions. Permissions boundaries do not define the maximum
|
9406
|
+
# permissions that a resource-based policy can grant to an entity. To
|
9407
|
+
# learn more, see [Permissions boundaries for IAM entities][1] in the
|
9408
|
+
# *IAM User Guide*.
|
9409
|
+
#
|
9410
|
+
# For more information about policy types, see [Policy types ][2] in the
|
9411
|
+
# *IAM User Guide*.
|
9412
|
+
#
|
9413
|
+
#
|
9414
|
+
#
|
9415
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
|
9416
|
+
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
|
9361
9417
|
#
|
9362
9418
|
# @return [Struct] Returns an empty {Seahorse::Client::Response response}.
|
9363
9419
|
#
|
@@ -9509,8 +9565,23 @@ module Aws::IAM
|
|
9509
9565
|
# to set the permissions boundary.
|
9510
9566
|
#
|
9511
9567
|
# @option params [required, String] :permissions_boundary
|
9512
|
-
# The ARN of the policy that is used to set the permissions
|
9513
|
-
# the user.
|
9568
|
+
# The ARN of the managed policy that is used to set the permissions
|
9569
|
+
# boundary for the user.
|
9570
|
+
#
|
9571
|
+
# A permissions boundary policy defines the maximum permissions that
|
9572
|
+
# identity-based policies can grant to an entity, but does not grant
|
9573
|
+
# permissions. Permissions boundaries do not define the maximum
|
9574
|
+
# permissions that a resource-based policy can grant to an entity. To
|
9575
|
+
# learn more, see [Permissions boundaries for IAM entities][1] in the
|
9576
|
+
# *IAM User Guide*.
|
9577
|
+
#
|
9578
|
+
# For more information about policy types, see [Policy types ][2] in the
|
9579
|
+
# *IAM User Guide*.
|
9580
|
+
#
|
9581
|
+
#
|
9582
|
+
#
|
9583
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
|
9584
|
+
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
|
9514
9585
|
#
|
9515
9586
|
# @return [Struct] Returns an empty {Seahorse::Client::Response response}.
|
9516
9587
|
#
|
@@ -10071,9 +10142,16 @@ module Aws::IAM
|
|
10071
10142
|
# If the output is long, you can use `MaxItems` and `Marker` parameters
|
10072
10143
|
# to paginate the results.
|
10073
10144
|
#
|
10074
|
-
#
|
10075
|
-
#
|
10076
|
-
#
|
10145
|
+
# <note markdown="1"> The IAM policy simulator evaluates statements in the identity-based
|
10146
|
+
# policy and the inputs that you provide during simulation. The policy
|
10147
|
+
# simulator results can differ from your live Amazon Web Services
|
10148
|
+
# environment. We recommend that you check your policies against your
|
10149
|
+
# live Amazon Web Services environment after testing using the policy
|
10150
|
+
# simulator to confirm that you have the desired results. For more
|
10151
|
+
# information about using the policy simulator, see [Testing IAM
|
10152
|
+
# policies with the IAM policy simulator ][1]in the *IAM User Guide*.
|
10153
|
+
#
|
10154
|
+
# </note>
|
10077
10155
|
#
|
10078
10156
|
#
|
10079
10157
|
#
|
@@ -10173,6 +10251,10 @@ module Aws::IAM
|
|
10173
10251
|
# For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
|
10174
10252
|
# in the *Amazon Web Services General Reference*.
|
10175
10253
|
#
|
10254
|
+
# <note markdown="1"> Simulation of resource-based policies isn't supported for IAM roles.
|
10255
|
+
#
|
10256
|
+
# </note>
|
10257
|
+
#
|
10176
10258
|
#
|
10177
10259
|
#
|
10178
10260
|
# [1]: https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html
|
@@ -10200,6 +10282,10 @@ module Aws::IAM
|
|
10200
10282
|
# * The special characters tab (`\u0009`), line feed (`\u000A`), and
|
10201
10283
|
# carriage return (`\u000D`)
|
10202
10284
|
#
|
10285
|
+
# <note markdown="1"> Simulation of resource-based policies isn't supported for IAM roles.
|
10286
|
+
#
|
10287
|
+
# </note>
|
10288
|
+
#
|
10203
10289
|
#
|
10204
10290
|
#
|
10205
10291
|
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-quotas-entity-length
|
@@ -10382,7 +10468,8 @@ module Aws::IAM
|
|
10382
10468
|
# instead.
|
10383
10469
|
#
|
10384
10470
|
# You can also optionally include one resource-based policy to be
|
10385
|
-
# evaluated with each of the resources included in the simulation
|
10471
|
+
# evaluated with each of the resources included in the simulation for
|
10472
|
+
# IAM users only.
|
10386
10473
|
#
|
10387
10474
|
# The simulation does not perform the API operations; it only checks the
|
10388
10475
|
# authorization to determine if the simulated policies allow or deny the
|
@@ -10403,9 +10490,16 @@ module Aws::IAM
|
|
10403
10490
|
# If the output is long, you can use the `MaxItems` and `Marker`
|
10404
10491
|
# parameters to paginate the results.
|
10405
10492
|
#
|
10406
|
-
#
|
10407
|
-
#
|
10408
|
-
#
|
10493
|
+
# <note markdown="1"> The IAM policy simulator evaluates statements in the identity-based
|
10494
|
+
# policy and the inputs that you provide during simulation. The policy
|
10495
|
+
# simulator results can differ from your live Amazon Web Services
|
10496
|
+
# environment. We recommend that you check your policies against your
|
10497
|
+
# live Amazon Web Services environment after testing using the policy
|
10498
|
+
# simulator to confirm that you have the desired results. For more
|
10499
|
+
# information about using the policy simulator, see [Testing IAM
|
10500
|
+
# policies with the IAM policy simulator ][1]in the *IAM User Guide*.
|
10501
|
+
#
|
10502
|
+
# </note>
|
10409
10503
|
#
|
10410
10504
|
#
|
10411
10505
|
#
|
@@ -10511,6 +10605,10 @@ module Aws::IAM
|
|
10511
10605
|
# For more information about ARNs, see [Amazon Resource Names (ARNs)][1]
|
10512
10606
|
# in the *Amazon Web Services General Reference*.
|
10513
10607
|
#
|
10608
|
+
# <note markdown="1"> Simulation of resource-based policies isn't supported for IAM roles.
|
10609
|
+
#
|
10610
|
+
# </note>
|
10611
|
+
#
|
10514
10612
|
#
|
10515
10613
|
#
|
10516
10614
|
# [1]: https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html
|
@@ -10538,6 +10636,10 @@ module Aws::IAM
|
|
10538
10636
|
# * The special characters tab (`\u0009`), line feed (`\u000A`), and
|
10539
10637
|
# carriage return (`\u000D`)
|
10540
10638
|
#
|
10639
|
+
# <note markdown="1"> Simulation of resource-based policies isn't supported for IAM roles.
|
10640
|
+
#
|
10641
|
+
# </note>
|
10642
|
+
#
|
10541
10643
|
#
|
10542
10644
|
#
|
10543
10645
|
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-quotas-entity-length
|
@@ -12255,10 +12357,10 @@ module Aws::IAM
|
|
12255
12357
|
# <note markdown="1"> Amazon Web Services secures communication with some OIDC identity
|
12256
12358
|
# providers (IdPs) through our library of trusted certificate
|
12257
12359
|
# authorities (CAs) instead of using a certificate thumbprint to verify
|
12258
|
-
# your IdP server certificate. These OIDC IdPs include Google,
|
12259
|
-
# that use an Amazon S3 bucket to host a JSON Web Key Set
|
12260
|
-
# endpoint. In these cases, your legacy thumbprint remains in
|
12261
|
-
# configuration, but is no longer used for validation.
|
12360
|
+
# your IdP server certificate. These OIDC IdPs include Google, Auth0,
|
12361
|
+
# and those that use an Amazon S3 bucket to host a JSON Web Key Set
|
12362
|
+
# (JWKS) endpoint. In these cases, your legacy thumbprint remains in
|
12363
|
+
# your configuration, but is no longer used for validation.
|
12262
12364
|
#
|
12263
12365
|
# </note>
|
12264
12366
|
#
|
@@ -13233,7 +13335,7 @@ module Aws::IAM
|
|
13233
13335
|
params: params,
|
13234
13336
|
config: config)
|
13235
13337
|
context[:gem_name] = 'aws-sdk-iam'
|
13236
|
-
context[:gem_version] = '1.
|
13338
|
+
context[:gem_version] = '1.75.0'
|
13237
13339
|
Seahorse::Client::Request.new(handlers, context)
|
13238
13340
|
end
|
13239
13341
|
|
@@ -50,6 +50,9 @@ module Aws::IAM
|
|
50
50
|
|
51
51
|
def initialize(options = {})
|
52
52
|
self[:region] = options[:region]
|
53
|
+
if self[:region].nil?
|
54
|
+
raise ArgumentError, "Missing required EndpointParameter: :region"
|
55
|
+
end
|
53
56
|
self[:use_dual_stack] = options[:use_dual_stack]
|
54
57
|
self[:use_dual_stack] = false if self[:use_dual_stack].nil?
|
55
58
|
if self[:use_dual_stack].nil?
|
@@ -15,7 +15,7 @@ module Aws::IAM
|
|
15
15
|
use_fips = parameters.use_fips
|
16
16
|
endpoint = parameters.endpoint
|
17
17
|
if (partition_result = Aws::Endpoints::Matchers.aws_partition(region))
|
18
|
-
if Aws::Endpoints::Matchers.set?(endpoint)
|
18
|
+
if Aws::Endpoints::Matchers.set?(endpoint)
|
19
19
|
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
|
20
20
|
raise ArgumentError, "Invalid Configuration: FIPS and custom endpoint are not supported"
|
21
21
|
end
|
@@ -27,7 +27,7 @@ module Aws::IAM
|
|
27
27
|
if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws")
|
28
28
|
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true) && Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
|
29
29
|
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS")) && Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
|
30
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.api.aws", headers: {}, properties: {
|
30
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.api.aws", headers: {}, properties: {})
|
31
31
|
end
|
32
32
|
raise ArgumentError, "FIPS and DualStack are enabled, but this partition does not support one or both"
|
33
33
|
end
|
@@ -39,7 +39,7 @@ module Aws::IAM
|
|
39
39
|
end
|
40
40
|
if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
|
41
41
|
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
|
42
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.api.aws", headers: {}, properties: {
|
42
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.api.aws", headers: {}, properties: {})
|
43
43
|
end
|
44
44
|
raise ArgumentError, "DualStack is enabled but this partition does not support DualStack"
|
45
45
|
end
|
@@ -48,19 +48,19 @@ module Aws::IAM
|
|
48
48
|
if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws-cn")
|
49
49
|
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true) && Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
|
50
50
|
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS")) && Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
|
51
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.api.amazonwebservices.com.cn", headers: {}, properties: {
|
51
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.api.amazonwebservices.com.cn", headers: {}, properties: {})
|
52
52
|
end
|
53
53
|
raise ArgumentError, "FIPS and DualStack are enabled, but this partition does not support one or both"
|
54
54
|
end
|
55
55
|
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
|
56
56
|
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
|
57
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.amazonaws.com.cn", headers: {}, properties: {
|
57
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.amazonaws.com.cn", headers: {}, properties: {})
|
58
58
|
end
|
59
59
|
raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
|
60
60
|
end
|
61
61
|
if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
|
62
62
|
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
|
63
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.api.amazonwebservices.com.cn", headers: {}, properties: {
|
63
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.api.amazonwebservices.com.cn", headers: {}, properties: {})
|
64
64
|
end
|
65
65
|
raise ArgumentError, "DualStack is enabled but this partition does not support DualStack"
|
66
66
|
end
|
@@ -69,7 +69,7 @@ module Aws::IAM
|
|
69
69
|
if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws-us-gov")
|
70
70
|
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true) && Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
|
71
71
|
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS")) && Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
|
72
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.api.aws", headers: {}, properties: {
|
72
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.api.aws", headers: {}, properties: {})
|
73
73
|
end
|
74
74
|
raise ArgumentError, "FIPS and DualStack are enabled, but this partition does not support one or both"
|
75
75
|
end
|
@@ -81,7 +81,7 @@ module Aws::IAM
|
|
81
81
|
end
|
82
82
|
if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
|
83
83
|
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
|
84
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.api.aws", headers: {}, properties: {
|
84
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.api.aws", headers: {}, properties: {})
|
85
85
|
end
|
86
86
|
raise ArgumentError, "DualStack is enabled but this partition does not support DualStack"
|
87
87
|
end
|
@@ -90,7 +90,7 @@ module Aws::IAM
|
|
90
90
|
if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws-iso")
|
91
91
|
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
|
92
92
|
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
|
93
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.c2s.ic.gov", headers: {}, properties: {
|
93
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.c2s.ic.gov", headers: {}, properties: {})
|
94
94
|
end
|
95
95
|
raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
|
96
96
|
end
|
@@ -99,7 +99,7 @@ module Aws::IAM
|
|
99
99
|
if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws-iso-b")
|
100
100
|
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
|
101
101
|
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
|
102
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.sc2s.sgov.gov", headers: {}, properties: {
|
102
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.sc2s.sgov.gov", headers: {}, properties: {})
|
103
103
|
end
|
104
104
|
raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
|
105
105
|
end
|
@@ -113,15 +113,9 @@ module Aws::IAM
|
|
113
113
|
end
|
114
114
|
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
|
115
115
|
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
|
116
|
-
if Aws::Endpoints::Matchers.string_equals?(region, "iam")
|
117
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-east-1", "signingName"=>"iam"}]})
|
118
|
-
end
|
119
116
|
if Aws::Endpoints::Matchers.string_equals?(region, "aws-global")
|
120
117
|
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-east-1", "signingName"=>"iam"}]})
|
121
118
|
end
|
122
|
-
if Aws::Endpoints::Matchers.string_equals?(region, "iam-govcloud")
|
123
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam.us-gov.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-gov-west-1", "signingName"=>"iam"}]})
|
124
|
-
end
|
125
119
|
if Aws::Endpoints::Matchers.string_equals?(region, "aws-us-gov-global")
|
126
120
|
return Aws::Endpoints::Endpoint.new(url: "https://iam.us-gov.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-gov-west-1", "signingName"=>"iam"}]})
|
127
121
|
end
|
data/lib/aws-sdk-iam/resource.rb
CHANGED
@@ -505,8 +505,23 @@ module Aws::IAM
|
|
505
505
|
#
|
506
506
|
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html
|
507
507
|
# @option options [String] :permissions_boundary
|
508
|
-
# The ARN of the policy that is used to set the permissions
|
509
|
-
# the role.
|
508
|
+
# The ARN of the managed policy that is used to set the permissions
|
509
|
+
# boundary for the role.
|
510
|
+
#
|
511
|
+
# A permissions boundary policy defines the maximum permissions that
|
512
|
+
# identity-based policies can grant to an entity, but does not grant
|
513
|
+
# permissions. Permissions boundaries do not define the maximum
|
514
|
+
# permissions that a resource-based policy can grant to an entity. To
|
515
|
+
# learn more, see [Permissions boundaries for IAM entities][1] in the
|
516
|
+
# *IAM User Guide*.
|
517
|
+
#
|
518
|
+
# For more information about policy types, see [Policy types ][2] in the
|
519
|
+
# *IAM User Guide*.
|
520
|
+
#
|
521
|
+
#
|
522
|
+
#
|
523
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
|
524
|
+
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
|
510
525
|
# @option options [Array<Types::Tag>] :tags
|
511
526
|
# A list of tags that you want to attach to the new role. Each tag
|
512
527
|
# consists of a key name and an associated value. For more information
|
@@ -808,8 +823,23 @@ module Aws::IAM
|
|
808
823
|
# account. Names are not distinguished by case. For example, you cannot
|
809
824
|
# create resources named both "MyResource" and "myresource".
|
810
825
|
# @option options [String] :permissions_boundary
|
811
|
-
# The ARN of the policy that is used to set the permissions
|
812
|
-
# the user.
|
826
|
+
# The ARN of the managed policy that is used to set the permissions
|
827
|
+
# boundary for the user.
|
828
|
+
#
|
829
|
+
# A permissions boundary policy defines the maximum permissions that
|
830
|
+
# identity-based policies can grant to an entity, but does not grant
|
831
|
+
# permissions. Permissions boundaries do not define the maximum
|
832
|
+
# permissions that a resource-based policy can grant to an entity. To
|
833
|
+
# learn more, see [Permissions boundaries for IAM entities][1] in the
|
834
|
+
# *IAM User Guide*.
|
835
|
+
#
|
836
|
+
# For more information about policy types, see [Policy types ][2] in the
|
837
|
+
# *IAM User Guide*.
|
838
|
+
#
|
839
|
+
#
|
840
|
+
#
|
841
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
|
842
|
+
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
|
813
843
|
# @option options [Array<Types::Tag>] :tags
|
814
844
|
# A list of tags that you want to attach to the new user. Each tag
|
815
845
|
# consists of a key name and an associated value. For more information
|
data/lib/aws-sdk-iam/types.rb
CHANGED
@@ -1250,8 +1250,23 @@ module Aws::IAM
|
|
1250
1250
|
# @return [Integer]
|
1251
1251
|
#
|
1252
1252
|
# @!attribute [rw] permissions_boundary
|
1253
|
-
# The ARN of the policy that is used to set the permissions
|
1254
|
-
# for the role.
|
1253
|
+
# The ARN of the managed policy that is used to set the permissions
|
1254
|
+
# boundary for the role.
|
1255
|
+
#
|
1256
|
+
# A permissions boundary policy defines the maximum permissions that
|
1257
|
+
# identity-based policies can grant to an entity, but does not grant
|
1258
|
+
# permissions. Permissions boundaries do not define the maximum
|
1259
|
+
# permissions that a resource-based policy can grant to an entity. To
|
1260
|
+
# learn more, see [Permissions boundaries for IAM entities][1] in the
|
1261
|
+
# *IAM User Guide*.
|
1262
|
+
#
|
1263
|
+
# For more information about policy types, see [Policy types ][2] in
|
1264
|
+
# the *IAM User Guide*.
|
1265
|
+
#
|
1266
|
+
#
|
1267
|
+
#
|
1268
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
|
1269
|
+
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
|
1255
1270
|
# @return [String]
|
1256
1271
|
#
|
1257
1272
|
# @!attribute [rw] tags
|
@@ -1516,8 +1531,23 @@ module Aws::IAM
|
|
1516
1531
|
# @return [String]
|
1517
1532
|
#
|
1518
1533
|
# @!attribute [rw] permissions_boundary
|
1519
|
-
# The ARN of the policy that is used to set the permissions
|
1520
|
-
# for the user.
|
1534
|
+
# The ARN of the managed policy that is used to set the permissions
|
1535
|
+
# boundary for the user.
|
1536
|
+
#
|
1537
|
+
# A permissions boundary policy defines the maximum permissions that
|
1538
|
+
# identity-based policies can grant to an entity, but does not grant
|
1539
|
+
# permissions. Permissions boundaries do not define the maximum
|
1540
|
+
# permissions that a resource-based policy can grant to an entity. To
|
1541
|
+
# learn more, see [Permissions boundaries for IAM entities][1] in the
|
1542
|
+
# *IAM User Guide*.
|
1543
|
+
#
|
1544
|
+
# For more information about policy types, see [Policy types ][2] in
|
1545
|
+
# the *IAM User Guide*.
|
1546
|
+
#
|
1547
|
+
#
|
1548
|
+
#
|
1549
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
|
1550
|
+
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
|
1521
1551
|
# @return [String]
|
1522
1552
|
#
|
1523
1553
|
# @!attribute [rw] tags
|
@@ -8130,8 +8160,23 @@ module Aws::IAM
|
|
8130
8160
|
# @return [String]
|
8131
8161
|
#
|
8132
8162
|
# @!attribute [rw] permissions_boundary
|
8133
|
-
# The ARN of the policy that is used to set the permissions
|
8134
|
-
# for the role.
|
8163
|
+
# The ARN of the managed policy that is used to set the permissions
|
8164
|
+
# boundary for the role.
|
8165
|
+
#
|
8166
|
+
# A permissions boundary policy defines the maximum permissions that
|
8167
|
+
# identity-based policies can grant to an entity, but does not grant
|
8168
|
+
# permissions. Permissions boundaries do not define the maximum
|
8169
|
+
# permissions that a resource-based policy can grant to an entity. To
|
8170
|
+
# learn more, see [Permissions boundaries for IAM entities][1] in the
|
8171
|
+
# *IAM User Guide*.
|
8172
|
+
#
|
8173
|
+
# For more information about policy types, see [Policy types ][2] in
|
8174
|
+
# the *IAM User Guide*.
|
8175
|
+
#
|
8176
|
+
#
|
8177
|
+
#
|
8178
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
|
8179
|
+
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
|
8135
8180
|
# @return [String]
|
8136
8181
|
#
|
8137
8182
|
# @see http://docs.aws.amazon.com/goto/WebAPI/iam-2010-05-08/PutRolePermissionsBoundaryRequest AWS API Documentation
|
@@ -8210,8 +8255,23 @@ module Aws::IAM
|
|
8210
8255
|
# @return [String]
|
8211
8256
|
#
|
8212
8257
|
# @!attribute [rw] permissions_boundary
|
8213
|
-
# The ARN of the policy that is used to set the permissions
|
8214
|
-
# for the user.
|
8258
|
+
# The ARN of the managed policy that is used to set the permissions
|
8259
|
+
# boundary for the user.
|
8260
|
+
#
|
8261
|
+
# A permissions boundary policy defines the maximum permissions that
|
8262
|
+
# identity-based policies can grant to an entity, but does not grant
|
8263
|
+
# permissions. Permissions boundaries do not define the maximum
|
8264
|
+
# permissions that a resource-based policy can grant to an entity. To
|
8265
|
+
# learn more, see [Permissions boundaries for IAM entities][1] in the
|
8266
|
+
# *IAM User Guide*.
|
8267
|
+
#
|
8268
|
+
# For more information about policy types, see [Policy types ][2] in
|
8269
|
+
# the *IAM User Guide*.
|
8270
|
+
#
|
8271
|
+
#
|
8272
|
+
#
|
8273
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
|
8274
|
+
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
|
8215
8275
|
# @return [String]
|
8216
8276
|
#
|
8217
8277
|
# @see http://docs.aws.amazon.com/goto/WebAPI/iam-2010-05-08/PutUserPermissionsBoundaryRequest AWS API Documentation
|
@@ -9504,6 +9564,11 @@ module Aws::IAM
|
|
9504
9564
|
# For more information about ARNs, see [Amazon Resource Names
|
9505
9565
|
# (ARNs)][1] in the *Amazon Web Services General Reference*.
|
9506
9566
|
#
|
9567
|
+
# <note markdown="1"> Simulation of resource-based policies isn't supported for IAM
|
9568
|
+
# roles.
|
9569
|
+
#
|
9570
|
+
# </note>
|
9571
|
+
#
|
9507
9572
|
#
|
9508
9573
|
#
|
9509
9574
|
# [1]: https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html
|
@@ -9532,6 +9597,11 @@ module Aws::IAM
|
|
9532
9597
|
# * The special characters tab (`\u0009`), line feed (`\u000A`), and
|
9533
9598
|
# carriage return (`\u000D`)
|
9534
9599
|
#
|
9600
|
+
# <note markdown="1"> Simulation of resource-based policies isn't supported for IAM
|
9601
|
+
# roles.
|
9602
|
+
#
|
9603
|
+
# </note>
|
9604
|
+
#
|
9535
9605
|
#
|
9536
9606
|
#
|
9537
9607
|
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-quotas-entity-length
|
@@ -9789,6 +9859,11 @@ module Aws::IAM
|
|
9789
9859
|
# For more information about ARNs, see [Amazon Resource Names
|
9790
9860
|
# (ARNs)][1] in the *Amazon Web Services General Reference*.
|
9791
9861
|
#
|
9862
|
+
# <note markdown="1"> Simulation of resource-based policies isn't supported for IAM
|
9863
|
+
# roles.
|
9864
|
+
#
|
9865
|
+
# </note>
|
9866
|
+
#
|
9792
9867
|
#
|
9793
9868
|
#
|
9794
9869
|
# [1]: https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html
|
@@ -9817,6 +9892,11 @@ module Aws::IAM
|
|
9817
9892
|
# * The special characters tab (`\u0009`), line feed (`\u000A`), and
|
9818
9893
|
# carriage return (`\u000D`)
|
9819
9894
|
#
|
9895
|
+
# <note markdown="1"> Simulation of resource-based policies isn't supported for IAM
|
9896
|
+
# roles.
|
9897
|
+
#
|
9898
|
+
# </note>
|
9899
|
+
#
|
9820
9900
|
#
|
9821
9901
|
#
|
9822
9902
|
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-quotas-entity-length
|
data/lib/aws-sdk-iam/user.rb
CHANGED
@@ -379,8 +379,23 @@ module Aws::IAM
|
|
379
379
|
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html
|
380
380
|
# [2]: http://wikipedia.org/wiki/regex
|
381
381
|
# @option options [String] :permissions_boundary
|
382
|
-
# The ARN of the policy that is used to set the permissions
|
383
|
-
# the user.
|
382
|
+
# The ARN of the managed policy that is used to set the permissions
|
383
|
+
# boundary for the user.
|
384
|
+
#
|
385
|
+
# A permissions boundary policy defines the maximum permissions that
|
386
|
+
# identity-based policies can grant to an entity, but does not grant
|
387
|
+
# permissions. Permissions boundaries do not define the maximum
|
388
|
+
# permissions that a resource-based policy can grant to an entity. To
|
389
|
+
# learn more, see [Permissions boundaries for IAM entities][1] in the
|
390
|
+
# *IAM User Guide*.
|
391
|
+
#
|
392
|
+
# For more information about policy types, see [Policy types ][2] in the
|
393
|
+
# *IAM User Guide*.
|
394
|
+
#
|
395
|
+
#
|
396
|
+
#
|
397
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html
|
398
|
+
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policy-types
|
384
399
|
# @option options [Array<Types::Tag>] :tags
|
385
400
|
# A list of tags that you want to attach to the new user. Each tag
|
386
401
|
# consists of a key name and an associated value. For more information
|
data/lib/aws-sdk-iam.rb
CHANGED
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: aws-sdk-iam
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 1.
|
4
|
+
version: 1.75.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Amazon Web Services
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2023-01
|
11
|
+
date: 2023-02-01 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: aws-sdk-core
|