aws-sdk-iam 1.75.0 → 1.76.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +5 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-iam/client.rb +18 -7
- data/lib/aws-sdk-iam/endpoint_parameters.rb +0 -3
- data/lib/aws-sdk-iam/endpoint_provider.rb +105 -102
- data/lib/aws-sdk-iam/resource.rb +11 -2
- data/lib/aws-sdk-iam/role.rb +1 -1
- data/lib/aws-sdk-iam/types.rb +18 -9
- data/lib/aws-sdk-iam.rb +1 -1
- metadata +2 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 4a338135d35d293d96f6adaaff90cc637e1622164c670c215e3ea294f7918abd
|
4
|
+
data.tar.gz: 76d331e00da6de881cfcd70d00f2cc404952d7a3ef98043020f93bcce88cd2bc
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 181b0658ff859256eb96c0ff80f54a07ba8bf26bfd15569b0e1c7d9deb269138c0fa504e1ba672e04243733a60cfe7ddcf0374aaf5d6439675ba8b7d9ff5832d
|
7
|
+
data.tar.gz: 7a17eb50ab3b44f866011af847ce088b652cc1105a45f8f6cd4ee934b274a6807f5b7201bb33448c140a614739c2b543bf37f0dececc37cc386f856b59787e8a
|
data/CHANGELOG.md
CHANGED
data/VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
1.
|
1
|
+
1.76.0
|
data/lib/aws-sdk-iam/client.rb
CHANGED
@@ -1289,6 +1289,8 @@ module Aws::IAM
|
|
1289
1289
|
# application or applications allowed to authenticate using the OIDC
|
1290
1290
|
# provider
|
1291
1291
|
#
|
1292
|
+
# * A list of tags that are attached to the specified IAM OIDC provider
|
1293
|
+
#
|
1292
1294
|
# * A list of thumbprints of one or more server certificates that the
|
1293
1295
|
# IdP uses
|
1294
1296
|
#
|
@@ -1364,7 +1366,7 @@ module Aws::IAM
|
|
1364
1366
|
#
|
1365
1367
|
# For more information about obtaining the OIDC provider thumbprint, see
|
1366
1368
|
# [Obtaining the thumbprint for an OpenID Connect provider][1] in the
|
1367
|
-
# *IAM
|
1369
|
+
# *IAM user Guide*.
|
1368
1370
|
#
|
1369
1371
|
#
|
1370
1372
|
#
|
@@ -1737,6 +1739,15 @@ module Aws::IAM
|
|
1737
1739
|
# account. Names are not distinguished by case. For example, you cannot
|
1738
1740
|
# create resources named both "MyResource" and "myresource".
|
1739
1741
|
#
|
1742
|
+
# This parameter allows (through its [regex pattern][1]) a string of
|
1743
|
+
# characters consisting of upper and lowercase alphanumeric characters
|
1744
|
+
# with no spaces. You can also include any of the following characters:
|
1745
|
+
# \_+=,.@-
|
1746
|
+
#
|
1747
|
+
#
|
1748
|
+
#
|
1749
|
+
# [1]: http://wikipedia.org/wiki/regex
|
1750
|
+
#
|
1740
1751
|
# @option params [required, String] :assume_role_policy_document
|
1741
1752
|
# The trust relationship policy document that grants an entity
|
1742
1753
|
# permission to assume the role.
|
@@ -2333,8 +2344,8 @@ module Aws::IAM
|
|
2333
2344
|
# [2]: http://wikipedia.org/wiki/regex
|
2334
2345
|
#
|
2335
2346
|
# @option params [required, String] :virtual_mfa_device_name
|
2336
|
-
# The name of the virtual MFA device
|
2337
|
-
# a virtual MFA device.
|
2347
|
+
# The name of the virtual MFA device, which must be unique. Use with
|
2348
|
+
# path to uniquely identify a virtual MFA device.
|
2338
2349
|
#
|
2339
2350
|
# This parameter allows (through its [regex pattern][1]) a string of
|
2340
2351
|
# characters consisting of upper and lowercase alphanumeric characters
|
@@ -5079,7 +5090,7 @@ module Aws::IAM
|
|
5079
5090
|
# operation. For more information, see [Refining permissions using
|
5080
5091
|
# service last accessed data][1] in the *IAM User Guide*.
|
5081
5092
|
#
|
5082
|
-
# For each service that principals in an account (root
|
5093
|
+
# For each service that principals in an account (root user, IAM users,
|
5083
5094
|
# or IAM roles) could access using SCPs, the operation returns details
|
5084
5095
|
# about the most recent access attempt. If there was no attempt, the
|
5085
5096
|
# service is listed without details about the most recent attempt to
|
@@ -10986,7 +10997,7 @@ module Aws::IAM
|
|
10986
10997
|
# *MyImportantProject*. Or search for all resources with the key name
|
10987
10998
|
# *Cost Center* and the value *41200*.
|
10988
10999
|
#
|
10989
|
-
# * **Access control** - Include tags in IAM
|
11000
|
+
# * **Access control** - Include tags in IAM identity-based and
|
10990
11001
|
# resource-based policies. You can use tags to restrict access to only
|
10991
11002
|
# an OIDC provider that has a specified tag attached. For examples of
|
10992
11003
|
# policies that show how to use tags to control access, see [Control
|
@@ -11405,7 +11416,7 @@ module Aws::IAM
|
|
11405
11416
|
# *MyImportantProject*. Or search for all resources with the key name
|
11406
11417
|
# *Cost Center* and the value *41200*.
|
11407
11418
|
#
|
11408
|
-
# * **Access control** - Include tags in IAM
|
11419
|
+
# * **Access control** - Include tags in IAM identity-based and
|
11409
11420
|
# resource-based policies. You can use tags to restrict access to only
|
11410
11421
|
# an IAM requesting user that has a specified tag attached. You can
|
11411
11422
|
# also restrict access to only those resources that have a certain tag
|
@@ -13335,7 +13346,7 @@ module Aws::IAM
|
|
13335
13346
|
params: params,
|
13336
13347
|
config: config)
|
13337
13348
|
context[:gem_name] = 'aws-sdk-iam'
|
13338
|
-
context[:gem_version] = '1.
|
13349
|
+
context[:gem_version] = '1.76.0'
|
13339
13350
|
Seahorse::Client::Request.new(handlers, context)
|
13340
13351
|
end
|
13341
13352
|
|
@@ -50,9 +50,6 @@ module Aws::IAM
|
|
50
50
|
|
51
51
|
def initialize(options = {})
|
52
52
|
self[:region] = options[:region]
|
53
|
-
if self[:region].nil?
|
54
|
-
raise ArgumentError, "Missing required EndpointParameter: :region"
|
55
|
-
end
|
56
53
|
self[:use_dual_stack] = options[:use_dual_stack]
|
57
54
|
self[:use_dual_stack] = false if self[:use_dual_stack].nil?
|
58
55
|
if self[:use_dual_stack].nil?
|
@@ -14,138 +14,141 @@ module Aws::IAM
|
|
14
14
|
use_dual_stack = parameters.use_dual_stack
|
15
15
|
use_fips = parameters.use_fips
|
16
16
|
endpoint = parameters.endpoint
|
17
|
-
if
|
18
|
-
if Aws::Endpoints::Matchers.
|
19
|
-
|
20
|
-
raise ArgumentError, "Invalid Configuration: FIPS and custom endpoint are not supported"
|
21
|
-
end
|
22
|
-
if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
|
23
|
-
raise ArgumentError, "Invalid Configuration: Dualstack and custom endpoint are not supported"
|
24
|
-
end
|
25
|
-
return Aws::Endpoints::Endpoint.new(url: endpoint, headers: {}, properties: {})
|
17
|
+
if Aws::Endpoints::Matchers.set?(endpoint)
|
18
|
+
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
|
19
|
+
raise ArgumentError, "Invalid Configuration: FIPS and custom endpoint are not supported"
|
26
20
|
end
|
27
|
-
if Aws::Endpoints::Matchers.
|
28
|
-
|
29
|
-
|
30
|
-
|
21
|
+
if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
|
22
|
+
raise ArgumentError, "Invalid Configuration: Dualstack and custom endpoint are not supported"
|
23
|
+
end
|
24
|
+
return Aws::Endpoints::Endpoint.new(url: endpoint, headers: {}, properties: {})
|
25
|
+
end
|
26
|
+
if Aws::Endpoints::Matchers.set?(region)
|
27
|
+
if (partition_result = Aws::Endpoints::Matchers.aws_partition(region))
|
28
|
+
if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws")
|
29
|
+
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true) && Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
|
30
|
+
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS")) && Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
|
31
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.api.aws", headers: {}, properties: {})
|
32
|
+
end
|
33
|
+
raise ArgumentError, "FIPS and DualStack are enabled, but this partition does not support one or both"
|
31
34
|
end
|
32
|
-
|
33
|
-
|
34
|
-
|
35
|
-
|
36
|
-
|
35
|
+
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
|
36
|
+
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
|
37
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-east-1"}]})
|
38
|
+
end
|
39
|
+
raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
|
37
40
|
end
|
38
|
-
|
39
|
-
|
40
|
-
|
41
|
-
|
42
|
-
|
41
|
+
if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
|
42
|
+
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
|
43
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.api.aws", headers: {}, properties: {})
|
44
|
+
end
|
45
|
+
raise ArgumentError, "DualStack is enabled but this partition does not support DualStack"
|
43
46
|
end
|
44
|
-
|
45
|
-
end
|
46
|
-
|
47
|
-
|
48
|
-
|
49
|
-
|
50
|
-
|
51
|
-
|
47
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-east-1"}]})
|
48
|
+
end
|
49
|
+
if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws-cn")
|
50
|
+
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true) && Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
|
51
|
+
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS")) && Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
|
52
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.api.amazonwebservices.com.cn", headers: {}, properties: {})
|
53
|
+
end
|
54
|
+
raise ArgumentError, "FIPS and DualStack are enabled, but this partition does not support one or both"
|
52
55
|
end
|
53
|
-
|
54
|
-
|
55
|
-
|
56
|
-
|
57
|
-
|
56
|
+
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
|
57
|
+
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
|
58
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.amazonaws.com.cn", headers: {}, properties: {})
|
59
|
+
end
|
60
|
+
raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
|
58
61
|
end
|
59
|
-
|
60
|
-
|
61
|
-
|
62
|
-
|
63
|
-
|
62
|
+
if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
|
63
|
+
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
|
64
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.api.amazonwebservices.com.cn", headers: {}, properties: {})
|
65
|
+
end
|
66
|
+
raise ArgumentError, "DualStack is enabled but this partition does not support DualStack"
|
64
67
|
end
|
65
|
-
|
68
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam.cn-north-1.amazonaws.com.cn", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"cn-north-1"}]})
|
69
|
+
end
|
70
|
+
if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws-us-gov")
|
71
|
+
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true) && Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
|
72
|
+
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS")) && Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
|
73
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.api.aws", headers: {}, properties: {})
|
74
|
+
end
|
75
|
+
raise ArgumentError, "FIPS and DualStack are enabled, but this partition does not support one or both"
|
76
|
+
end
|
77
|
+
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
|
78
|
+
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
|
79
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam.us-gov.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-gov-west-1"}]})
|
80
|
+
end
|
81
|
+
raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
|
82
|
+
end
|
83
|
+
if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
|
84
|
+
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
|
85
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.api.aws", headers: {}, properties: {})
|
86
|
+
end
|
87
|
+
raise ArgumentError, "DualStack is enabled but this partition does not support DualStack"
|
88
|
+
end
|
89
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam.us-gov.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-gov-west-1"}]})
|
90
|
+
end
|
91
|
+
if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws-iso")
|
92
|
+
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
|
93
|
+
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
|
94
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.c2s.ic.gov", headers: {}, properties: {})
|
95
|
+
end
|
96
|
+
raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
|
97
|
+
end
|
98
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam.us-iso-east-1.c2s.ic.gov", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-iso-east-1"}]})
|
99
|
+
end
|
100
|
+
if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws-iso-b")
|
101
|
+
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
|
102
|
+
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
|
103
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.sc2s.sgov.gov", headers: {}, properties: {})
|
104
|
+
end
|
105
|
+
raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
|
106
|
+
end
|
107
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam.us-isob-east-1.sc2s.sgov.gov", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-isob-east-1"}]})
|
66
108
|
end
|
67
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam.cn-north-1.amazonaws.com.cn", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"cn-north-1", "signingName"=>"iam"}]})
|
68
|
-
end
|
69
|
-
if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws-us-gov")
|
70
109
|
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true) && Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
|
71
110
|
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS")) && Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
|
72
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}
|
111
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.#{partition_result['dualStackDnsSuffix']}", headers: {}, properties: {})
|
73
112
|
end
|
74
113
|
raise ArgumentError, "FIPS and DualStack are enabled, but this partition does not support one or both"
|
75
114
|
end
|
76
115
|
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
|
77
116
|
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
|
78
|
-
|
117
|
+
if Aws::Endpoints::Matchers.string_equals?(region, "aws-global")
|
118
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-east-1"}]})
|
119
|
+
end
|
120
|
+
if Aws::Endpoints::Matchers.string_equals?(region, "aws-us-gov-global")
|
121
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam.us-gov.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-gov-west-1"}]})
|
122
|
+
end
|
123
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.#{partition_result['dnsSuffix']}", headers: {}, properties: {})
|
79
124
|
end
|
80
125
|
raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
|
81
126
|
end
|
82
127
|
if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
|
83
128
|
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
|
84
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}
|
129
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.#{partition_result['dualStackDnsSuffix']}", headers: {}, properties: {})
|
85
130
|
end
|
86
131
|
raise ArgumentError, "DualStack is enabled but this partition does not support DualStack"
|
87
132
|
end
|
88
|
-
|
89
|
-
|
90
|
-
if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws-iso")
|
91
|
-
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
|
92
|
-
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
|
93
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.c2s.ic.gov", headers: {}, properties: {})
|
94
|
-
end
|
95
|
-
raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
|
133
|
+
if Aws::Endpoints::Matchers.string_equals?(region, "aws-global")
|
134
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-east-1"}]})
|
96
135
|
end
|
97
|
-
|
98
|
-
|
99
|
-
if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws-iso-b")
|
100
|
-
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
|
101
|
-
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
|
102
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.sc2s.sgov.gov", headers: {}, properties: {})
|
103
|
-
end
|
104
|
-
raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
|
136
|
+
if Aws::Endpoints::Matchers.string_equals?(region, "aws-cn-global")
|
137
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam.cn-north-1.amazonaws.com.cn", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"cn-north-1"}]})
|
105
138
|
end
|
106
|
-
|
107
|
-
|
108
|
-
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true) && Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
|
109
|
-
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS")) && Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
|
110
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.#{partition_result['dualStackDnsSuffix']}", headers: {}, properties: {})
|
139
|
+
if Aws::Endpoints::Matchers.string_equals?(region, "aws-us-gov-global")
|
140
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam.us-gov.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-gov-west-1"}]})
|
111
141
|
end
|
112
|
-
|
113
|
-
|
114
|
-
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
|
115
|
-
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
|
116
|
-
if Aws::Endpoints::Matchers.string_equals?(region, "aws-global")
|
117
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-east-1", "signingName"=>"iam"}]})
|
118
|
-
end
|
119
|
-
if Aws::Endpoints::Matchers.string_equals?(region, "aws-us-gov-global")
|
120
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam.us-gov.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-gov-west-1", "signingName"=>"iam"}]})
|
121
|
-
end
|
122
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.#{partition_result['dnsSuffix']}", headers: {}, properties: {})
|
142
|
+
if Aws::Endpoints::Matchers.string_equals?(region, "aws-iso-global")
|
143
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam.us-iso-east-1.c2s.ic.gov", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-iso-east-1"}]})
|
123
144
|
end
|
124
|
-
|
125
|
-
|
126
|
-
if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
|
127
|
-
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
|
128
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.#{partition_result['dualStackDnsSuffix']}", headers: {}, properties: {})
|
145
|
+
if Aws::Endpoints::Matchers.string_equals?(region, "aws-iso-b-global")
|
146
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam.us-isob-east-1.sc2s.sgov.gov", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-isob-east-1"}]})
|
129
147
|
end
|
130
|
-
|
131
|
-
end
|
132
|
-
if Aws::Endpoints::Matchers.string_equals?(region, "aws-global")
|
133
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-east-1", "signingName"=>"iam"}]})
|
134
|
-
end
|
135
|
-
if Aws::Endpoints::Matchers.string_equals?(region, "aws-cn-global")
|
136
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam.cn-north-1.amazonaws.com.cn", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"cn-north-1", "signingName"=>"iam"}]})
|
137
|
-
end
|
138
|
-
if Aws::Endpoints::Matchers.string_equals?(region, "aws-us-gov-global")
|
139
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam.us-gov.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-gov-west-1", "signingName"=>"iam"}]})
|
140
|
-
end
|
141
|
-
if Aws::Endpoints::Matchers.string_equals?(region, "aws-iso-global")
|
142
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam.us-iso-east-1.c2s.ic.gov", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-iso-east-1", "signingName"=>"iam"}]})
|
143
|
-
end
|
144
|
-
if Aws::Endpoints::Matchers.string_equals?(region, "aws-iso-b-global")
|
145
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam.us-isob-east-1.sc2s.sgov.gov", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-isob-east-1", "signingName"=>"iam"}]})
|
148
|
+
return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.#{partition_result['dnsSuffix']}", headers: {}, properties: {})
|
146
149
|
end
|
147
|
-
return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.#{partition_result['dnsSuffix']}", headers: {}, properties: {})
|
148
150
|
end
|
151
|
+
raise ArgumentError, "Invalid Configuration: Missing Region"
|
149
152
|
raise ArgumentError, 'No endpoint could be resolved'
|
150
153
|
|
151
154
|
end
|
data/lib/aws-sdk-iam/resource.rb
CHANGED
@@ -455,6 +455,15 @@ module Aws::IAM
|
|
455
455
|
# IAM user, group, role, and policy names must be unique within the
|
456
456
|
# account. Names are not distinguished by case. For example, you cannot
|
457
457
|
# create resources named both "MyResource" and "myresource".
|
458
|
+
#
|
459
|
+
# This parameter allows (through its [regex pattern][1]) a string of
|
460
|
+
# characters consisting of upper and lowercase alphanumeric characters
|
461
|
+
# with no spaces. You can also include any of the following characters:
|
462
|
+
# \_+=,.@-
|
463
|
+
#
|
464
|
+
#
|
465
|
+
#
|
466
|
+
# [1]: http://wikipedia.org/wiki/regex
|
458
467
|
# @option options [required, String] :assume_role_policy_document
|
459
468
|
# The trust relationship policy document that grants an entity
|
460
469
|
# permission to assume the role.
|
@@ -896,8 +905,8 @@ module Aws::IAM
|
|
896
905
|
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html
|
897
906
|
# [2]: http://wikipedia.org/wiki/regex
|
898
907
|
# @option options [required, String] :virtual_mfa_device_name
|
899
|
-
# The name of the virtual MFA device
|
900
|
-
# a virtual MFA device.
|
908
|
+
# The name of the virtual MFA device, which must be unique. Use with
|
909
|
+
# path to uniquely identify a virtual MFA device.
|
901
910
|
#
|
902
911
|
# This parameter allows (through its [regex pattern][1]) a string of
|
903
912
|
# characters consisting of upper and lowercase alphanumeric characters
|
data/lib/aws-sdk-iam/role.rb
CHANGED
@@ -133,7 +133,7 @@ module Aws::IAM
|
|
133
133
|
# period can be shorter if your Region began supporting these features
|
134
134
|
# within the last year. The role might have been used more than 400 days
|
135
135
|
# ago. For more information, see [Regions where data is tracked][1] in
|
136
|
-
# the *IAM
|
136
|
+
# the *IAM user Guide*.
|
137
137
|
#
|
138
138
|
#
|
139
139
|
#
|
data/lib/aws-sdk-iam/types.rb
CHANGED
@@ -60,7 +60,7 @@ module Aws::IAM
|
|
60
60
|
# unauthenticated requests.
|
61
61
|
#
|
62
62
|
# This field is null if no principals (IAM users, IAM roles, or root
|
63
|
-
#
|
63
|
+
# user) in the reported Organizations entity attempted to access the
|
64
64
|
# service within the [tracking period][1].
|
65
65
|
#
|
66
66
|
#
|
@@ -85,9 +85,9 @@ module Aws::IAM
|
|
85
85
|
# @return [Time]
|
86
86
|
#
|
87
87
|
# @!attribute [rw] total_authenticated_entities
|
88
|
-
# The number of accounts with authenticated principals (root
|
89
|
-
#
|
90
|
-
#
|
88
|
+
# The number of accounts with authenticated principals (root user, IAM
|
89
|
+
# users, and IAM roles) that attempted to access the service in the
|
90
|
+
# tracking period.
|
91
91
|
# @return [Integer]
|
92
92
|
#
|
93
93
|
# @see http://docs.aws.amazon.com/goto/WebAPI/iam-2010-05-08/AccessDetail AWS API Documentation
|
@@ -891,7 +891,7 @@ module Aws::IAM
|
|
891
891
|
#
|
892
892
|
# For more information about obtaining the OIDC provider thumbprint,
|
893
893
|
# see [Obtaining the thumbprint for an OpenID Connect provider][1] in
|
894
|
-
# the *IAM
|
894
|
+
# the *IAM user Guide*.
|
895
895
|
#
|
896
896
|
#
|
897
897
|
#
|
@@ -1191,6 +1191,15 @@ module Aws::IAM
|
|
1191
1191
|
# account. Names are not distinguished by case. For example, you
|
1192
1192
|
# cannot create resources named both "MyResource" and
|
1193
1193
|
# "myresource".
|
1194
|
+
#
|
1195
|
+
# This parameter allows (through its [regex pattern][1]) a string of
|
1196
|
+
# characters consisting of upper and lowercase alphanumeric characters
|
1197
|
+
# with no spaces. You can also include any of the following
|
1198
|
+
# characters: \_+=,.@-
|
1199
|
+
#
|
1200
|
+
#
|
1201
|
+
#
|
1202
|
+
# [1]: http://wikipedia.org/wiki/regex
|
1194
1203
|
# @return [String]
|
1195
1204
|
#
|
1196
1205
|
# @!attribute [rw] assume_role_policy_document
|
@@ -1613,8 +1622,8 @@ module Aws::IAM
|
|
1613
1622
|
# @return [String]
|
1614
1623
|
#
|
1615
1624
|
# @!attribute [rw] virtual_mfa_device_name
|
1616
|
-
# The name of the virtual MFA device. Use with
|
1617
|
-
# identify a virtual MFA device.
|
1625
|
+
# The name of the virtual MFA device, which must be unique. Use with
|
1626
|
+
# path to uniquely identify a virtual MFA device.
|
1618
1627
|
#
|
1619
1628
|
# This parameter allows (through its [regex pattern][1]) a string of
|
1620
1629
|
# characters consisting of upper and lowercase alphanumeric characters
|
@@ -8708,7 +8717,7 @@ module Aws::IAM
|
|
8708
8717
|
# period can be shorter if your Region began supporting these features
|
8709
8718
|
# within the last year. The role might have been used more than 400
|
8710
8719
|
# days ago. For more information, see [Regions where data is
|
8711
|
-
# tracked][1] in the *IAM
|
8720
|
+
# tracked][1] in the *IAM user Guide*.
|
8712
8721
|
#
|
8713
8722
|
#
|
8714
8723
|
#
|
@@ -8862,7 +8871,7 @@ module Aws::IAM
|
|
8862
8871
|
# period can be shorter if your Region began supporting these features
|
8863
8872
|
# within the last year. The role might have been used more than 400 days
|
8864
8873
|
# ago. For more information, see [Regions where data is tracked][1] in
|
8865
|
-
# the *IAM
|
8874
|
+
# the *IAM user Guide*.
|
8866
8875
|
#
|
8867
8876
|
# This data type is returned as a response element in the GetRole and
|
8868
8877
|
# GetAccountAuthorizationDetails operations.
|
data/lib/aws-sdk-iam.rb
CHANGED
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: aws-sdk-iam
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 1.
|
4
|
+
version: 1.76.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Amazon Web Services
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2023-
|
11
|
+
date: 2023-03-14 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: aws-sdk-core
|