aws-sdk-iam 1.75.0 → 1.76.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: ef84c0d91723ced85c4f386e729ccce65d8015eb3a211e43ecfd82e3f0e66704
4
- data.tar.gz: 1bbdbb017d13ce2fcf7cf1a7ff11206be46086df7c6757474e15bdf082a97d0b
3
+ metadata.gz: 4a338135d35d293d96f6adaaff90cc637e1622164c670c215e3ea294f7918abd
4
+ data.tar.gz: 76d331e00da6de881cfcd70d00f2cc404952d7a3ef98043020f93bcce88cd2bc
5
5
  SHA512:
6
- metadata.gz: e5de3cb4467504346c82b05c019201baa34aa21eb77309ae1fc3a382c33536dfa22dbc450ef428004de1ca85429777076a8345a43784c8e93b34b9dec09d5698
7
- data.tar.gz: 239df2e18c8248c0456b5ace08e77991507f75223c74169ed5cc4f42effd64c482c2ec7bcf9c64ae3484b8150c5789b9c393f6b94bdba4728112abb741bcbf4c
6
+ metadata.gz: 181b0658ff859256eb96c0ff80f54a07ba8bf26bfd15569b0e1c7d9deb269138c0fa504e1ba672e04243733a60cfe7ddcf0374aaf5d6439675ba8b7d9ff5832d
7
+ data.tar.gz: 7a17eb50ab3b44f866011af847ce088b652cc1105a45f8f6cd4ee934b274a6807f5b7201bb33448c140a614739c2b543bf37f0dececc37cc386f856b59787e8a
data/CHANGELOG.md CHANGED
@@ -1,6 +1,11 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.76.0 (2023-03-14)
5
+ ------------------
6
+
7
+ * Feature - Documentation only updates to correct customer-reported issues
8
+
4
9
  1.75.0 (2023-02-01)
5
10
  ------------------
6
11
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.75.0
1
+ 1.76.0
@@ -1289,6 +1289,8 @@ module Aws::IAM
1289
1289
  # application or applications allowed to authenticate using the OIDC
1290
1290
  # provider
1291
1291
  #
1292
+ # * A list of tags that are attached to the specified IAM OIDC provider
1293
+ #
1292
1294
  # * A list of thumbprints of one or more server certificates that the
1293
1295
  # IdP uses
1294
1296
  #
@@ -1364,7 +1366,7 @@ module Aws::IAM
1364
1366
  #
1365
1367
  # For more information about obtaining the OIDC provider thumbprint, see
1366
1368
  # [Obtaining the thumbprint for an OpenID Connect provider][1] in the
1367
- # *IAM User Guide*.
1369
+ # *IAM user Guide*.
1368
1370
  #
1369
1371
  #
1370
1372
  #
@@ -1737,6 +1739,15 @@ module Aws::IAM
1737
1739
  # account. Names are not distinguished by case. For example, you cannot
1738
1740
  # create resources named both "MyResource" and "myresource".
1739
1741
  #
1742
+ # This parameter allows (through its [regex pattern][1]) a string of
1743
+ # characters consisting of upper and lowercase alphanumeric characters
1744
+ # with no spaces. You can also include any of the following characters:
1745
+ # \_+=,.@-
1746
+ #
1747
+ #
1748
+ #
1749
+ # [1]: http://wikipedia.org/wiki/regex
1750
+ #
1740
1751
  # @option params [required, String] :assume_role_policy_document
1741
1752
  # The trust relationship policy document that grants an entity
1742
1753
  # permission to assume the role.
@@ -2333,8 +2344,8 @@ module Aws::IAM
2333
2344
  # [2]: http://wikipedia.org/wiki/regex
2334
2345
  #
2335
2346
  # @option params [required, String] :virtual_mfa_device_name
2336
- # The name of the virtual MFA device. Use with path to uniquely identify
2337
- # a virtual MFA device.
2347
+ # The name of the virtual MFA device, which must be unique. Use with
2348
+ # path to uniquely identify a virtual MFA device.
2338
2349
  #
2339
2350
  # This parameter allows (through its [regex pattern][1]) a string of
2340
2351
  # characters consisting of upper and lowercase alphanumeric characters
@@ -5079,7 +5090,7 @@ module Aws::IAM
5079
5090
  # operation. For more information, see [Refining permissions using
5080
5091
  # service last accessed data][1] in the *IAM User Guide*.
5081
5092
  #
5082
- # For each service that principals in an account (root users, IAM users,
5093
+ # For each service that principals in an account (root user, IAM users,
5083
5094
  # or IAM roles) could access using SCPs, the operation returns details
5084
5095
  # about the most recent access attempt. If there was no attempt, the
5085
5096
  # service is listed without details about the most recent attempt to
@@ -10986,7 +10997,7 @@ module Aws::IAM
10986
10997
  # *MyImportantProject*. Or search for all resources with the key name
10987
10998
  # *Cost Center* and the value *41200*.
10988
10999
  #
10989
- # * **Access control** - Include tags in IAM user-based and
11000
+ # * **Access control** - Include tags in IAM identity-based and
10990
11001
  # resource-based policies. You can use tags to restrict access to only
10991
11002
  # an OIDC provider that has a specified tag attached. For examples of
10992
11003
  # policies that show how to use tags to control access, see [Control
@@ -11405,7 +11416,7 @@ module Aws::IAM
11405
11416
  # *MyImportantProject*. Or search for all resources with the key name
11406
11417
  # *Cost Center* and the value *41200*.
11407
11418
  #
11408
- # * **Access control** - Include tags in IAM user-based and
11419
+ # * **Access control** - Include tags in IAM identity-based and
11409
11420
  # resource-based policies. You can use tags to restrict access to only
11410
11421
  # an IAM requesting user that has a specified tag attached. You can
11411
11422
  # also restrict access to only those resources that have a certain tag
@@ -13335,7 +13346,7 @@ module Aws::IAM
13335
13346
  params: params,
13336
13347
  config: config)
13337
13348
  context[:gem_name] = 'aws-sdk-iam'
13338
- context[:gem_version] = '1.75.0'
13349
+ context[:gem_version] = '1.76.0'
13339
13350
  Seahorse::Client::Request.new(handlers, context)
13340
13351
  end
13341
13352
 
@@ -50,9 +50,6 @@ module Aws::IAM
50
50
 
51
51
  def initialize(options = {})
52
52
  self[:region] = options[:region]
53
- if self[:region].nil?
54
- raise ArgumentError, "Missing required EndpointParameter: :region"
55
- end
56
53
  self[:use_dual_stack] = options[:use_dual_stack]
57
54
  self[:use_dual_stack] = false if self[:use_dual_stack].nil?
58
55
  if self[:use_dual_stack].nil?
@@ -14,138 +14,141 @@ module Aws::IAM
14
14
  use_dual_stack = parameters.use_dual_stack
15
15
  use_fips = parameters.use_fips
16
16
  endpoint = parameters.endpoint
17
- if (partition_result = Aws::Endpoints::Matchers.aws_partition(region))
18
- if Aws::Endpoints::Matchers.set?(endpoint)
19
- if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
20
- raise ArgumentError, "Invalid Configuration: FIPS and custom endpoint are not supported"
21
- end
22
- if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
23
- raise ArgumentError, "Invalid Configuration: Dualstack and custom endpoint are not supported"
24
- end
25
- return Aws::Endpoints::Endpoint.new(url: endpoint, headers: {}, properties: {})
17
+ if Aws::Endpoints::Matchers.set?(endpoint)
18
+ if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
19
+ raise ArgumentError, "Invalid Configuration: FIPS and custom endpoint are not supported"
26
20
  end
27
- if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws")
28
- if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true) && Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
29
- if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS")) && Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
30
- return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.api.aws", headers: {}, properties: {})
21
+ if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
22
+ raise ArgumentError, "Invalid Configuration: Dualstack and custom endpoint are not supported"
23
+ end
24
+ return Aws::Endpoints::Endpoint.new(url: endpoint, headers: {}, properties: {})
25
+ end
26
+ if Aws::Endpoints::Matchers.set?(region)
27
+ if (partition_result = Aws::Endpoints::Matchers.aws_partition(region))
28
+ if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws")
29
+ if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true) && Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
30
+ if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS")) && Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
31
+ return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.api.aws", headers: {}, properties: {})
32
+ end
33
+ raise ArgumentError, "FIPS and DualStack are enabled, but this partition does not support one or both"
31
34
  end
32
- raise ArgumentError, "FIPS and DualStack are enabled, but this partition does not support one or both"
33
- end
34
- if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
35
- if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
36
- return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-east-1", "signingName"=>"iam"}]})
35
+ if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
36
+ if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
37
+ return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-east-1"}]})
38
+ end
39
+ raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
37
40
  end
38
- raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
39
- end
40
- if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
41
- if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
42
- return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.api.aws", headers: {}, properties: {})
41
+ if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
42
+ if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
43
+ return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.api.aws", headers: {}, properties: {})
44
+ end
45
+ raise ArgumentError, "DualStack is enabled but this partition does not support DualStack"
43
46
  end
44
- raise ArgumentError, "DualStack is enabled but this partition does not support DualStack"
45
- end
46
- return Aws::Endpoints::Endpoint.new(url: "https://iam.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-east-1", "signingName"=>"iam"}]})
47
- end
48
- if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws-cn")
49
- if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true) && Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
50
- if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS")) && Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
51
- return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.api.amazonwebservices.com.cn", headers: {}, properties: {})
47
+ return Aws::Endpoints::Endpoint.new(url: "https://iam.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-east-1"}]})
48
+ end
49
+ if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws-cn")
50
+ if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true) && Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
51
+ if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS")) && Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
52
+ return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.api.amazonwebservices.com.cn", headers: {}, properties: {})
53
+ end
54
+ raise ArgumentError, "FIPS and DualStack are enabled, but this partition does not support one or both"
52
55
  end
53
- raise ArgumentError, "FIPS and DualStack are enabled, but this partition does not support one or both"
54
- end
55
- if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
56
- if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
57
- return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.amazonaws.com.cn", headers: {}, properties: {})
56
+ if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
57
+ if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
58
+ return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.amazonaws.com.cn", headers: {}, properties: {})
59
+ end
60
+ raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
58
61
  end
59
- raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
60
- end
61
- if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
62
- if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
63
- return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.api.amazonwebservices.com.cn", headers: {}, properties: {})
62
+ if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
63
+ if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
64
+ return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.api.amazonwebservices.com.cn", headers: {}, properties: {})
65
+ end
66
+ raise ArgumentError, "DualStack is enabled but this partition does not support DualStack"
64
67
  end
65
- raise ArgumentError, "DualStack is enabled but this partition does not support DualStack"
68
+ return Aws::Endpoints::Endpoint.new(url: "https://iam.cn-north-1.amazonaws.com.cn", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"cn-north-1"}]})
69
+ end
70
+ if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws-us-gov")
71
+ if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true) && Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
72
+ if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS")) && Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
73
+ return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.api.aws", headers: {}, properties: {})
74
+ end
75
+ raise ArgumentError, "FIPS and DualStack are enabled, but this partition does not support one or both"
76
+ end
77
+ if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
78
+ if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
79
+ return Aws::Endpoints::Endpoint.new(url: "https://iam.us-gov.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-gov-west-1"}]})
80
+ end
81
+ raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
82
+ end
83
+ if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
84
+ if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
85
+ return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.api.aws", headers: {}, properties: {})
86
+ end
87
+ raise ArgumentError, "DualStack is enabled but this partition does not support DualStack"
88
+ end
89
+ return Aws::Endpoints::Endpoint.new(url: "https://iam.us-gov.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-gov-west-1"}]})
90
+ end
91
+ if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws-iso")
92
+ if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
93
+ if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
94
+ return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.c2s.ic.gov", headers: {}, properties: {})
95
+ end
96
+ raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
97
+ end
98
+ return Aws::Endpoints::Endpoint.new(url: "https://iam.us-iso-east-1.c2s.ic.gov", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-iso-east-1"}]})
99
+ end
100
+ if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws-iso-b")
101
+ if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
102
+ if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
103
+ return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.sc2s.sgov.gov", headers: {}, properties: {})
104
+ end
105
+ raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
106
+ end
107
+ return Aws::Endpoints::Endpoint.new(url: "https://iam.us-isob-east-1.sc2s.sgov.gov", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-isob-east-1"}]})
66
108
  end
67
- return Aws::Endpoints::Endpoint.new(url: "https://iam.cn-north-1.amazonaws.com.cn", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"cn-north-1", "signingName"=>"iam"}]})
68
- end
69
- if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws-us-gov")
70
109
  if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true) && Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
71
110
  if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS")) && Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
72
- return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.api.aws", headers: {}, properties: {})
111
+ return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.#{partition_result['dualStackDnsSuffix']}", headers: {}, properties: {})
73
112
  end
74
113
  raise ArgumentError, "FIPS and DualStack are enabled, but this partition does not support one or both"
75
114
  end
76
115
  if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
77
116
  if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
78
- return Aws::Endpoints::Endpoint.new(url: "https://iam.us-gov.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-gov-west-1", "signingName"=>"iam"}]})
117
+ if Aws::Endpoints::Matchers.string_equals?(region, "aws-global")
118
+ return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-east-1"}]})
119
+ end
120
+ if Aws::Endpoints::Matchers.string_equals?(region, "aws-us-gov-global")
121
+ return Aws::Endpoints::Endpoint.new(url: "https://iam.us-gov.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-gov-west-1"}]})
122
+ end
123
+ return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.#{partition_result['dnsSuffix']}", headers: {}, properties: {})
79
124
  end
80
125
  raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
81
126
  end
82
127
  if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
83
128
  if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
84
- return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.api.aws", headers: {}, properties: {})
129
+ return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.#{partition_result['dualStackDnsSuffix']}", headers: {}, properties: {})
85
130
  end
86
131
  raise ArgumentError, "DualStack is enabled but this partition does not support DualStack"
87
132
  end
88
- return Aws::Endpoints::Endpoint.new(url: "https://iam.us-gov.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-gov-west-1", "signingName"=>"iam"}]})
89
- end
90
- if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws-iso")
91
- if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
92
- if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
93
- return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.c2s.ic.gov", headers: {}, properties: {})
94
- end
95
- raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
133
+ if Aws::Endpoints::Matchers.string_equals?(region, "aws-global")
134
+ return Aws::Endpoints::Endpoint.new(url: "https://iam.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-east-1"}]})
96
135
  end
97
- return Aws::Endpoints::Endpoint.new(url: "https://iam.us-iso-east-1.c2s.ic.gov", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-iso-east-1", "signingName"=>"iam"}]})
98
- end
99
- if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws-iso-b")
100
- if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
101
- if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
102
- return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.sc2s.sgov.gov", headers: {}, properties: {})
103
- end
104
- raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
136
+ if Aws::Endpoints::Matchers.string_equals?(region, "aws-cn-global")
137
+ return Aws::Endpoints::Endpoint.new(url: "https://iam.cn-north-1.amazonaws.com.cn", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"cn-north-1"}]})
105
138
  end
106
- return Aws::Endpoints::Endpoint.new(url: "https://iam.us-isob-east-1.sc2s.sgov.gov", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-isob-east-1", "signingName"=>"iam"}]})
107
- end
108
- if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true) && Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
109
- if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS")) && Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
110
- return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.#{partition_result['dualStackDnsSuffix']}", headers: {}, properties: {})
139
+ if Aws::Endpoints::Matchers.string_equals?(region, "aws-us-gov-global")
140
+ return Aws::Endpoints::Endpoint.new(url: "https://iam.us-gov.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-gov-west-1"}]})
111
141
  end
112
- raise ArgumentError, "FIPS and DualStack are enabled, but this partition does not support one or both"
113
- end
114
- if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
115
- if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
116
- if Aws::Endpoints::Matchers.string_equals?(region, "aws-global")
117
- return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-east-1", "signingName"=>"iam"}]})
118
- end
119
- if Aws::Endpoints::Matchers.string_equals?(region, "aws-us-gov-global")
120
- return Aws::Endpoints::Endpoint.new(url: "https://iam.us-gov.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-gov-west-1", "signingName"=>"iam"}]})
121
- end
122
- return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.#{partition_result['dnsSuffix']}", headers: {}, properties: {})
142
+ if Aws::Endpoints::Matchers.string_equals?(region, "aws-iso-global")
143
+ return Aws::Endpoints::Endpoint.new(url: "https://iam.us-iso-east-1.c2s.ic.gov", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-iso-east-1"}]})
123
144
  end
124
- raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
125
- end
126
- if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
127
- if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
128
- return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.#{partition_result['dualStackDnsSuffix']}", headers: {}, properties: {})
145
+ if Aws::Endpoints::Matchers.string_equals?(region, "aws-iso-b-global")
146
+ return Aws::Endpoints::Endpoint.new(url: "https://iam.us-isob-east-1.sc2s.sgov.gov", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-isob-east-1"}]})
129
147
  end
130
- raise ArgumentError, "DualStack is enabled but this partition does not support DualStack"
131
- end
132
- if Aws::Endpoints::Matchers.string_equals?(region, "aws-global")
133
- return Aws::Endpoints::Endpoint.new(url: "https://iam.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-east-1", "signingName"=>"iam"}]})
134
- end
135
- if Aws::Endpoints::Matchers.string_equals?(region, "aws-cn-global")
136
- return Aws::Endpoints::Endpoint.new(url: "https://iam.cn-north-1.amazonaws.com.cn", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"cn-north-1", "signingName"=>"iam"}]})
137
- end
138
- if Aws::Endpoints::Matchers.string_equals?(region, "aws-us-gov-global")
139
- return Aws::Endpoints::Endpoint.new(url: "https://iam.us-gov.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-gov-west-1", "signingName"=>"iam"}]})
140
- end
141
- if Aws::Endpoints::Matchers.string_equals?(region, "aws-iso-global")
142
- return Aws::Endpoints::Endpoint.new(url: "https://iam.us-iso-east-1.c2s.ic.gov", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-iso-east-1", "signingName"=>"iam"}]})
143
- end
144
- if Aws::Endpoints::Matchers.string_equals?(region, "aws-iso-b-global")
145
- return Aws::Endpoints::Endpoint.new(url: "https://iam.us-isob-east-1.sc2s.sgov.gov", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-isob-east-1", "signingName"=>"iam"}]})
148
+ return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.#{partition_result['dnsSuffix']}", headers: {}, properties: {})
146
149
  end
147
- return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.#{partition_result['dnsSuffix']}", headers: {}, properties: {})
148
150
  end
151
+ raise ArgumentError, "Invalid Configuration: Missing Region"
149
152
  raise ArgumentError, 'No endpoint could be resolved'
150
153
 
151
154
  end
@@ -455,6 +455,15 @@ module Aws::IAM
455
455
  # IAM user, group, role, and policy names must be unique within the
456
456
  # account. Names are not distinguished by case. For example, you cannot
457
457
  # create resources named both "MyResource" and "myresource".
458
+ #
459
+ # This parameter allows (through its [regex pattern][1]) a string of
460
+ # characters consisting of upper and lowercase alphanumeric characters
461
+ # with no spaces. You can also include any of the following characters:
462
+ # \_+=,.@-
463
+ #
464
+ #
465
+ #
466
+ # [1]: http://wikipedia.org/wiki/regex
458
467
  # @option options [required, String] :assume_role_policy_document
459
468
  # The trust relationship policy document that grants an entity
460
469
  # permission to assume the role.
@@ -896,8 +905,8 @@ module Aws::IAM
896
905
  # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html
897
906
  # [2]: http://wikipedia.org/wiki/regex
898
907
  # @option options [required, String] :virtual_mfa_device_name
899
- # The name of the virtual MFA device. Use with path to uniquely identify
900
- # a virtual MFA device.
908
+ # The name of the virtual MFA device, which must be unique. Use with
909
+ # path to uniquely identify a virtual MFA device.
901
910
  #
902
911
  # This parameter allows (through its [regex pattern][1]) a string of
903
912
  # characters consisting of upper and lowercase alphanumeric characters
@@ -133,7 +133,7 @@ module Aws::IAM
133
133
  # period can be shorter if your Region began supporting these features
134
134
  # within the last year. The role might have been used more than 400 days
135
135
  # ago. For more information, see [Regions where data is tracked][1] in
136
- # the *IAM User Guide*.
136
+ # the *IAM user Guide*.
137
137
  #
138
138
  #
139
139
  #
@@ -60,7 +60,7 @@ module Aws::IAM
60
60
  # unauthenticated requests.
61
61
  #
62
62
  # This field is null if no principals (IAM users, IAM roles, or root
63
- # users) in the reported Organizations entity attempted to access the
63
+ # user) in the reported Organizations entity attempted to access the
64
64
  # service within the [tracking period][1].
65
65
  #
66
66
  #
@@ -85,9 +85,9 @@ module Aws::IAM
85
85
  # @return [Time]
86
86
  #
87
87
  # @!attribute [rw] total_authenticated_entities
88
- # The number of accounts with authenticated principals (root users,
89
- # IAM users, and IAM roles) that attempted to access the service in
90
- # the tracking period.
88
+ # The number of accounts with authenticated principals (root user, IAM
89
+ # users, and IAM roles) that attempted to access the service in the
90
+ # tracking period.
91
91
  # @return [Integer]
92
92
  #
93
93
  # @see http://docs.aws.amazon.com/goto/WebAPI/iam-2010-05-08/AccessDetail AWS API Documentation
@@ -891,7 +891,7 @@ module Aws::IAM
891
891
  #
892
892
  # For more information about obtaining the OIDC provider thumbprint,
893
893
  # see [Obtaining the thumbprint for an OpenID Connect provider][1] in
894
- # the *IAM User Guide*.
894
+ # the *IAM user Guide*.
895
895
  #
896
896
  #
897
897
  #
@@ -1191,6 +1191,15 @@ module Aws::IAM
1191
1191
  # account. Names are not distinguished by case. For example, you
1192
1192
  # cannot create resources named both "MyResource" and
1193
1193
  # "myresource".
1194
+ #
1195
+ # This parameter allows (through its [regex pattern][1]) a string of
1196
+ # characters consisting of upper and lowercase alphanumeric characters
1197
+ # with no spaces. You can also include any of the following
1198
+ # characters: \_+=,.@-
1199
+ #
1200
+ #
1201
+ #
1202
+ # [1]: http://wikipedia.org/wiki/regex
1194
1203
  # @return [String]
1195
1204
  #
1196
1205
  # @!attribute [rw] assume_role_policy_document
@@ -1613,8 +1622,8 @@ module Aws::IAM
1613
1622
  # @return [String]
1614
1623
  #
1615
1624
  # @!attribute [rw] virtual_mfa_device_name
1616
- # The name of the virtual MFA device. Use with path to uniquely
1617
- # identify a virtual MFA device.
1625
+ # The name of the virtual MFA device, which must be unique. Use with
1626
+ # path to uniquely identify a virtual MFA device.
1618
1627
  #
1619
1628
  # This parameter allows (through its [regex pattern][1]) a string of
1620
1629
  # characters consisting of upper and lowercase alphanumeric characters
@@ -8708,7 +8717,7 @@ module Aws::IAM
8708
8717
  # period can be shorter if your Region began supporting these features
8709
8718
  # within the last year. The role might have been used more than 400
8710
8719
  # days ago. For more information, see [Regions where data is
8711
- # tracked][1] in the *IAM User Guide*.
8720
+ # tracked][1] in the *IAM user Guide*.
8712
8721
  #
8713
8722
  #
8714
8723
  #
@@ -8862,7 +8871,7 @@ module Aws::IAM
8862
8871
  # period can be shorter if your Region began supporting these features
8863
8872
  # within the last year. The role might have been used more than 400 days
8864
8873
  # ago. For more information, see [Regions where data is tracked][1] in
8865
- # the *IAM User Guide*.
8874
+ # the *IAM user Guide*.
8866
8875
  #
8867
8876
  # This data type is returned as a response element in the GetRole and
8868
8877
  # GetAccountAuthorizationDetails operations.
data/lib/aws-sdk-iam.rb CHANGED
@@ -74,6 +74,6 @@ require_relative 'aws-sdk-iam/customizations'
74
74
  # @!group service
75
75
  module Aws::IAM
76
76
 
77
- GEM_VERSION = '1.75.0'
77
+ GEM_VERSION = '1.76.0'
78
78
 
79
79
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-iam
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.75.0
4
+ version: 1.76.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2023-02-01 00:00:00.000000000 Z
11
+ date: 2023-03-14 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core