aws-sdk-iam 1.75.0 → 1.76.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: ef84c0d91723ced85c4f386e729ccce65d8015eb3a211e43ecfd82e3f0e66704
4
- data.tar.gz: 1bbdbb017d13ce2fcf7cf1a7ff11206be46086df7c6757474e15bdf082a97d0b
3
+ metadata.gz: 4a338135d35d293d96f6adaaff90cc637e1622164c670c215e3ea294f7918abd
4
+ data.tar.gz: 76d331e00da6de881cfcd70d00f2cc404952d7a3ef98043020f93bcce88cd2bc
5
5
  SHA512:
6
- metadata.gz: e5de3cb4467504346c82b05c019201baa34aa21eb77309ae1fc3a382c33536dfa22dbc450ef428004de1ca85429777076a8345a43784c8e93b34b9dec09d5698
7
- data.tar.gz: 239df2e18c8248c0456b5ace08e77991507f75223c74169ed5cc4f42effd64c482c2ec7bcf9c64ae3484b8150c5789b9c393f6b94bdba4728112abb741bcbf4c
6
+ metadata.gz: 181b0658ff859256eb96c0ff80f54a07ba8bf26bfd15569b0e1c7d9deb269138c0fa504e1ba672e04243733a60cfe7ddcf0374aaf5d6439675ba8b7d9ff5832d
7
+ data.tar.gz: 7a17eb50ab3b44f866011af847ce088b652cc1105a45f8f6cd4ee934b274a6807f5b7201bb33448c140a614739c2b543bf37f0dececc37cc386f856b59787e8a
data/CHANGELOG.md CHANGED
@@ -1,6 +1,11 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.76.0 (2023-03-14)
5
+ ------------------
6
+
7
+ * Feature - Documentation only updates to correct customer-reported issues
8
+
4
9
  1.75.0 (2023-02-01)
5
10
  ------------------
6
11
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.75.0
1
+ 1.76.0
@@ -1289,6 +1289,8 @@ module Aws::IAM
1289
1289
  # application or applications allowed to authenticate using the OIDC
1290
1290
  # provider
1291
1291
  #
1292
+ # * A list of tags that are attached to the specified IAM OIDC provider
1293
+ #
1292
1294
  # * A list of thumbprints of one or more server certificates that the
1293
1295
  # IdP uses
1294
1296
  #
@@ -1364,7 +1366,7 @@ module Aws::IAM
1364
1366
  #
1365
1367
  # For more information about obtaining the OIDC provider thumbprint, see
1366
1368
  # [Obtaining the thumbprint for an OpenID Connect provider][1] in the
1367
- # *IAM User Guide*.
1369
+ # *IAM user Guide*.
1368
1370
  #
1369
1371
  #
1370
1372
  #
@@ -1737,6 +1739,15 @@ module Aws::IAM
1737
1739
  # account. Names are not distinguished by case. For example, you cannot
1738
1740
  # create resources named both "MyResource" and "myresource".
1739
1741
  #
1742
+ # This parameter allows (through its [regex pattern][1]) a string of
1743
+ # characters consisting of upper and lowercase alphanumeric characters
1744
+ # with no spaces. You can also include any of the following characters:
1745
+ # \_+=,.@-
1746
+ #
1747
+ #
1748
+ #
1749
+ # [1]: http://wikipedia.org/wiki/regex
1750
+ #
1740
1751
  # @option params [required, String] :assume_role_policy_document
1741
1752
  # The trust relationship policy document that grants an entity
1742
1753
  # permission to assume the role.
@@ -2333,8 +2344,8 @@ module Aws::IAM
2333
2344
  # [2]: http://wikipedia.org/wiki/regex
2334
2345
  #
2335
2346
  # @option params [required, String] :virtual_mfa_device_name
2336
- # The name of the virtual MFA device. Use with path to uniquely identify
2337
- # a virtual MFA device.
2347
+ # The name of the virtual MFA device, which must be unique. Use with
2348
+ # path to uniquely identify a virtual MFA device.
2338
2349
  #
2339
2350
  # This parameter allows (through its [regex pattern][1]) a string of
2340
2351
  # characters consisting of upper and lowercase alphanumeric characters
@@ -5079,7 +5090,7 @@ module Aws::IAM
5079
5090
  # operation. For more information, see [Refining permissions using
5080
5091
  # service last accessed data][1] in the *IAM User Guide*.
5081
5092
  #
5082
- # For each service that principals in an account (root users, IAM users,
5093
+ # For each service that principals in an account (root user, IAM users,
5083
5094
  # or IAM roles) could access using SCPs, the operation returns details
5084
5095
  # about the most recent access attempt. If there was no attempt, the
5085
5096
  # service is listed without details about the most recent attempt to
@@ -10986,7 +10997,7 @@ module Aws::IAM
10986
10997
  # *MyImportantProject*. Or search for all resources with the key name
10987
10998
  # *Cost Center* and the value *41200*.
10988
10999
  #
10989
- # * **Access control** - Include tags in IAM user-based and
11000
+ # * **Access control** - Include tags in IAM identity-based and
10990
11001
  # resource-based policies. You can use tags to restrict access to only
10991
11002
  # an OIDC provider that has a specified tag attached. For examples of
10992
11003
  # policies that show how to use tags to control access, see [Control
@@ -11405,7 +11416,7 @@ module Aws::IAM
11405
11416
  # *MyImportantProject*. Or search for all resources with the key name
11406
11417
  # *Cost Center* and the value *41200*.
11407
11418
  #
11408
- # * **Access control** - Include tags in IAM user-based and
11419
+ # * **Access control** - Include tags in IAM identity-based and
11409
11420
  # resource-based policies. You can use tags to restrict access to only
11410
11421
  # an IAM requesting user that has a specified tag attached. You can
11411
11422
  # also restrict access to only those resources that have a certain tag
@@ -13335,7 +13346,7 @@ module Aws::IAM
13335
13346
  params: params,
13336
13347
  config: config)
13337
13348
  context[:gem_name] = 'aws-sdk-iam'
13338
- context[:gem_version] = '1.75.0'
13349
+ context[:gem_version] = '1.76.0'
13339
13350
  Seahorse::Client::Request.new(handlers, context)
13340
13351
  end
13341
13352
 
@@ -50,9 +50,6 @@ module Aws::IAM
50
50
 
51
51
  def initialize(options = {})
52
52
  self[:region] = options[:region]
53
- if self[:region].nil?
54
- raise ArgumentError, "Missing required EndpointParameter: :region"
55
- end
56
53
  self[:use_dual_stack] = options[:use_dual_stack]
57
54
  self[:use_dual_stack] = false if self[:use_dual_stack].nil?
58
55
  if self[:use_dual_stack].nil?
@@ -14,138 +14,141 @@ module Aws::IAM
14
14
  use_dual_stack = parameters.use_dual_stack
15
15
  use_fips = parameters.use_fips
16
16
  endpoint = parameters.endpoint
17
- if (partition_result = Aws::Endpoints::Matchers.aws_partition(region))
18
- if Aws::Endpoints::Matchers.set?(endpoint)
19
- if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
20
- raise ArgumentError, "Invalid Configuration: FIPS and custom endpoint are not supported"
21
- end
22
- if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
23
- raise ArgumentError, "Invalid Configuration: Dualstack and custom endpoint are not supported"
24
- end
25
- return Aws::Endpoints::Endpoint.new(url: endpoint, headers: {}, properties: {})
17
+ if Aws::Endpoints::Matchers.set?(endpoint)
18
+ if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
19
+ raise ArgumentError, "Invalid Configuration: FIPS and custom endpoint are not supported"
26
20
  end
27
- if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws")
28
- if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true) && Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
29
- if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS")) && Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
30
- return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.api.aws", headers: {}, properties: {})
21
+ if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
22
+ raise ArgumentError, "Invalid Configuration: Dualstack and custom endpoint are not supported"
23
+ end
24
+ return Aws::Endpoints::Endpoint.new(url: endpoint, headers: {}, properties: {})
25
+ end
26
+ if Aws::Endpoints::Matchers.set?(region)
27
+ if (partition_result = Aws::Endpoints::Matchers.aws_partition(region))
28
+ if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws")
29
+ if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true) && Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
30
+ if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS")) && Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
31
+ return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.api.aws", headers: {}, properties: {})
32
+ end
33
+ raise ArgumentError, "FIPS and DualStack are enabled, but this partition does not support one or both"
31
34
  end
32
- raise ArgumentError, "FIPS and DualStack are enabled, but this partition does not support one or both"
33
- end
34
- if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
35
- if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
36
- return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-east-1", "signingName"=>"iam"}]})
35
+ if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
36
+ if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
37
+ return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-east-1"}]})
38
+ end
39
+ raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
37
40
  end
38
- raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
39
- end
40
- if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
41
- if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
42
- return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.api.aws", headers: {}, properties: {})
41
+ if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
42
+ if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
43
+ return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.api.aws", headers: {}, properties: {})
44
+ end
45
+ raise ArgumentError, "DualStack is enabled but this partition does not support DualStack"
43
46
  end
44
- raise ArgumentError, "DualStack is enabled but this partition does not support DualStack"
45
- end
46
- return Aws::Endpoints::Endpoint.new(url: "https://iam.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-east-1", "signingName"=>"iam"}]})
47
- end
48
- if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws-cn")
49
- if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true) && Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
50
- if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS")) && Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
51
- return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.api.amazonwebservices.com.cn", headers: {}, properties: {})
47
+ return Aws::Endpoints::Endpoint.new(url: "https://iam.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-east-1"}]})
48
+ end
49
+ if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws-cn")
50
+ if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true) && Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
51
+ if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS")) && Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
52
+ return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.api.amazonwebservices.com.cn", headers: {}, properties: {})
53
+ end
54
+ raise ArgumentError, "FIPS and DualStack are enabled, but this partition does not support one or both"
52
55
  end
53
- raise ArgumentError, "FIPS and DualStack are enabled, but this partition does not support one or both"
54
- end
55
- if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
56
- if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
57
- return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.amazonaws.com.cn", headers: {}, properties: {})
56
+ if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
57
+ if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
58
+ return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.amazonaws.com.cn", headers: {}, properties: {})
59
+ end
60
+ raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
58
61
  end
59
- raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
60
- end
61
- if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
62
- if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
63
- return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.api.amazonwebservices.com.cn", headers: {}, properties: {})
62
+ if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
63
+ if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
64
+ return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.api.amazonwebservices.com.cn", headers: {}, properties: {})
65
+ end
66
+ raise ArgumentError, "DualStack is enabled but this partition does not support DualStack"
64
67
  end
65
- raise ArgumentError, "DualStack is enabled but this partition does not support DualStack"
68
+ return Aws::Endpoints::Endpoint.new(url: "https://iam.cn-north-1.amazonaws.com.cn", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"cn-north-1"}]})
69
+ end
70
+ if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws-us-gov")
71
+ if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true) && Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
72
+ if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS")) && Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
73
+ return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.api.aws", headers: {}, properties: {})
74
+ end
75
+ raise ArgumentError, "FIPS and DualStack are enabled, but this partition does not support one or both"
76
+ end
77
+ if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
78
+ if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
79
+ return Aws::Endpoints::Endpoint.new(url: "https://iam.us-gov.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-gov-west-1"}]})
80
+ end
81
+ raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
82
+ end
83
+ if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
84
+ if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
85
+ return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.api.aws", headers: {}, properties: {})
86
+ end
87
+ raise ArgumentError, "DualStack is enabled but this partition does not support DualStack"
88
+ end
89
+ return Aws::Endpoints::Endpoint.new(url: "https://iam.us-gov.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-gov-west-1"}]})
90
+ end
91
+ if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws-iso")
92
+ if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
93
+ if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
94
+ return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.c2s.ic.gov", headers: {}, properties: {})
95
+ end
96
+ raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
97
+ end
98
+ return Aws::Endpoints::Endpoint.new(url: "https://iam.us-iso-east-1.c2s.ic.gov", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-iso-east-1"}]})
99
+ end
100
+ if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws-iso-b")
101
+ if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
102
+ if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
103
+ return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.sc2s.sgov.gov", headers: {}, properties: {})
104
+ end
105
+ raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
106
+ end
107
+ return Aws::Endpoints::Endpoint.new(url: "https://iam.us-isob-east-1.sc2s.sgov.gov", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-isob-east-1"}]})
66
108
  end
67
- return Aws::Endpoints::Endpoint.new(url: "https://iam.cn-north-1.amazonaws.com.cn", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"cn-north-1", "signingName"=>"iam"}]})
68
- end
69
- if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws-us-gov")
70
109
  if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true) && Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
71
110
  if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS")) && Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
72
- return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.api.aws", headers: {}, properties: {})
111
+ return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.#{partition_result['dualStackDnsSuffix']}", headers: {}, properties: {})
73
112
  end
74
113
  raise ArgumentError, "FIPS and DualStack are enabled, but this partition does not support one or both"
75
114
  end
76
115
  if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
77
116
  if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
78
- return Aws::Endpoints::Endpoint.new(url: "https://iam.us-gov.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-gov-west-1", "signingName"=>"iam"}]})
117
+ if Aws::Endpoints::Matchers.string_equals?(region, "aws-global")
118
+ return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-east-1"}]})
119
+ end
120
+ if Aws::Endpoints::Matchers.string_equals?(region, "aws-us-gov-global")
121
+ return Aws::Endpoints::Endpoint.new(url: "https://iam.us-gov.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-gov-west-1"}]})
122
+ end
123
+ return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.#{partition_result['dnsSuffix']}", headers: {}, properties: {})
79
124
  end
80
125
  raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
81
126
  end
82
127
  if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
83
128
  if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
84
- return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.api.aws", headers: {}, properties: {})
129
+ return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.#{partition_result['dualStackDnsSuffix']}", headers: {}, properties: {})
85
130
  end
86
131
  raise ArgumentError, "DualStack is enabled but this partition does not support DualStack"
87
132
  end
88
- return Aws::Endpoints::Endpoint.new(url: "https://iam.us-gov.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-gov-west-1", "signingName"=>"iam"}]})
89
- end
90
- if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws-iso")
91
- if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
92
- if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
93
- return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.c2s.ic.gov", headers: {}, properties: {})
94
- end
95
- raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
133
+ if Aws::Endpoints::Matchers.string_equals?(region, "aws-global")
134
+ return Aws::Endpoints::Endpoint.new(url: "https://iam.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-east-1"}]})
96
135
  end
97
- return Aws::Endpoints::Endpoint.new(url: "https://iam.us-iso-east-1.c2s.ic.gov", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-iso-east-1", "signingName"=>"iam"}]})
98
- end
99
- if Aws::Endpoints::Matchers.string_equals?(Aws::Endpoints::Matchers.attr(partition_result, "name"), "aws-iso-b")
100
- if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
101
- if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
102
- return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.sc2s.sgov.gov", headers: {}, properties: {})
103
- end
104
- raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
136
+ if Aws::Endpoints::Matchers.string_equals?(region, "aws-cn-global")
137
+ return Aws::Endpoints::Endpoint.new(url: "https://iam.cn-north-1.amazonaws.com.cn", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"cn-north-1"}]})
105
138
  end
106
- return Aws::Endpoints::Endpoint.new(url: "https://iam.us-isob-east-1.sc2s.sgov.gov", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-isob-east-1", "signingName"=>"iam"}]})
107
- end
108
- if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true) && Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
109
- if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS")) && Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
110
- return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.#{partition_result['dualStackDnsSuffix']}", headers: {}, properties: {})
139
+ if Aws::Endpoints::Matchers.string_equals?(region, "aws-us-gov-global")
140
+ return Aws::Endpoints::Endpoint.new(url: "https://iam.us-gov.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-gov-west-1"}]})
111
141
  end
112
- raise ArgumentError, "FIPS and DualStack are enabled, but this partition does not support one or both"
113
- end
114
- if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
115
- if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
116
- if Aws::Endpoints::Matchers.string_equals?(region, "aws-global")
117
- return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-east-1", "signingName"=>"iam"}]})
118
- end
119
- if Aws::Endpoints::Matchers.string_equals?(region, "aws-us-gov-global")
120
- return Aws::Endpoints::Endpoint.new(url: "https://iam.us-gov.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-gov-west-1", "signingName"=>"iam"}]})
121
- end
122
- return Aws::Endpoints::Endpoint.new(url: "https://iam-fips.#{region}.#{partition_result['dnsSuffix']}", headers: {}, properties: {})
142
+ if Aws::Endpoints::Matchers.string_equals?(region, "aws-iso-global")
143
+ return Aws::Endpoints::Endpoint.new(url: "https://iam.us-iso-east-1.c2s.ic.gov", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-iso-east-1"}]})
123
144
  end
124
- raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
125
- end
126
- if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
127
- if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
128
- return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.#{partition_result['dualStackDnsSuffix']}", headers: {}, properties: {})
145
+ if Aws::Endpoints::Matchers.string_equals?(region, "aws-iso-b-global")
146
+ return Aws::Endpoints::Endpoint.new(url: "https://iam.us-isob-east-1.sc2s.sgov.gov", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingName"=>"iam", "signingRegion"=>"us-isob-east-1"}]})
129
147
  end
130
- raise ArgumentError, "DualStack is enabled but this partition does not support DualStack"
131
- end
132
- if Aws::Endpoints::Matchers.string_equals?(region, "aws-global")
133
- return Aws::Endpoints::Endpoint.new(url: "https://iam.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-east-1", "signingName"=>"iam"}]})
134
- end
135
- if Aws::Endpoints::Matchers.string_equals?(region, "aws-cn-global")
136
- return Aws::Endpoints::Endpoint.new(url: "https://iam.cn-north-1.amazonaws.com.cn", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"cn-north-1", "signingName"=>"iam"}]})
137
- end
138
- if Aws::Endpoints::Matchers.string_equals?(region, "aws-us-gov-global")
139
- return Aws::Endpoints::Endpoint.new(url: "https://iam.us-gov.amazonaws.com", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-gov-west-1", "signingName"=>"iam"}]})
140
- end
141
- if Aws::Endpoints::Matchers.string_equals?(region, "aws-iso-global")
142
- return Aws::Endpoints::Endpoint.new(url: "https://iam.us-iso-east-1.c2s.ic.gov", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-iso-east-1", "signingName"=>"iam"}]})
143
- end
144
- if Aws::Endpoints::Matchers.string_equals?(region, "aws-iso-b-global")
145
- return Aws::Endpoints::Endpoint.new(url: "https://iam.us-isob-east-1.sc2s.sgov.gov", headers: {}, properties: {"authSchemes"=>[{"name"=>"sigv4", "signingRegion"=>"us-isob-east-1", "signingName"=>"iam"}]})
148
+ return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.#{partition_result['dnsSuffix']}", headers: {}, properties: {})
146
149
  end
147
- return Aws::Endpoints::Endpoint.new(url: "https://iam.#{region}.#{partition_result['dnsSuffix']}", headers: {}, properties: {})
148
150
  end
151
+ raise ArgumentError, "Invalid Configuration: Missing Region"
149
152
  raise ArgumentError, 'No endpoint could be resolved'
150
153
 
151
154
  end
@@ -455,6 +455,15 @@ module Aws::IAM
455
455
  # IAM user, group, role, and policy names must be unique within the
456
456
  # account. Names are not distinguished by case. For example, you cannot
457
457
  # create resources named both "MyResource" and "myresource".
458
+ #
459
+ # This parameter allows (through its [regex pattern][1]) a string of
460
+ # characters consisting of upper and lowercase alphanumeric characters
461
+ # with no spaces. You can also include any of the following characters:
462
+ # \_+=,.@-
463
+ #
464
+ #
465
+ #
466
+ # [1]: http://wikipedia.org/wiki/regex
458
467
  # @option options [required, String] :assume_role_policy_document
459
468
  # The trust relationship policy document that grants an entity
460
469
  # permission to assume the role.
@@ -896,8 +905,8 @@ module Aws::IAM
896
905
  # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/Using_Identifiers.html
897
906
  # [2]: http://wikipedia.org/wiki/regex
898
907
  # @option options [required, String] :virtual_mfa_device_name
899
- # The name of the virtual MFA device. Use with path to uniquely identify
900
- # a virtual MFA device.
908
+ # The name of the virtual MFA device, which must be unique. Use with
909
+ # path to uniquely identify a virtual MFA device.
901
910
  #
902
911
  # This parameter allows (through its [regex pattern][1]) a string of
903
912
  # characters consisting of upper and lowercase alphanumeric characters
@@ -133,7 +133,7 @@ module Aws::IAM
133
133
  # period can be shorter if your Region began supporting these features
134
134
  # within the last year. The role might have been used more than 400 days
135
135
  # ago. For more information, see [Regions where data is tracked][1] in
136
- # the *IAM User Guide*.
136
+ # the *IAM user Guide*.
137
137
  #
138
138
  #
139
139
  #
@@ -60,7 +60,7 @@ module Aws::IAM
60
60
  # unauthenticated requests.
61
61
  #
62
62
  # This field is null if no principals (IAM users, IAM roles, or root
63
- # users) in the reported Organizations entity attempted to access the
63
+ # user) in the reported Organizations entity attempted to access the
64
64
  # service within the [tracking period][1].
65
65
  #
66
66
  #
@@ -85,9 +85,9 @@ module Aws::IAM
85
85
  # @return [Time]
86
86
  #
87
87
  # @!attribute [rw] total_authenticated_entities
88
- # The number of accounts with authenticated principals (root users,
89
- # IAM users, and IAM roles) that attempted to access the service in
90
- # the tracking period.
88
+ # The number of accounts with authenticated principals (root user, IAM
89
+ # users, and IAM roles) that attempted to access the service in the
90
+ # tracking period.
91
91
  # @return [Integer]
92
92
  #
93
93
  # @see http://docs.aws.amazon.com/goto/WebAPI/iam-2010-05-08/AccessDetail AWS API Documentation
@@ -891,7 +891,7 @@ module Aws::IAM
891
891
  #
892
892
  # For more information about obtaining the OIDC provider thumbprint,
893
893
  # see [Obtaining the thumbprint for an OpenID Connect provider][1] in
894
- # the *IAM User Guide*.
894
+ # the *IAM user Guide*.
895
895
  #
896
896
  #
897
897
  #
@@ -1191,6 +1191,15 @@ module Aws::IAM
1191
1191
  # account. Names are not distinguished by case. For example, you
1192
1192
  # cannot create resources named both "MyResource" and
1193
1193
  # "myresource".
1194
+ #
1195
+ # This parameter allows (through its [regex pattern][1]) a string of
1196
+ # characters consisting of upper and lowercase alphanumeric characters
1197
+ # with no spaces. You can also include any of the following
1198
+ # characters: \_+=,.@-
1199
+ #
1200
+ #
1201
+ #
1202
+ # [1]: http://wikipedia.org/wiki/regex
1194
1203
  # @return [String]
1195
1204
  #
1196
1205
  # @!attribute [rw] assume_role_policy_document
@@ -1613,8 +1622,8 @@ module Aws::IAM
1613
1622
  # @return [String]
1614
1623
  #
1615
1624
  # @!attribute [rw] virtual_mfa_device_name
1616
- # The name of the virtual MFA device. Use with path to uniquely
1617
- # identify a virtual MFA device.
1625
+ # The name of the virtual MFA device, which must be unique. Use with
1626
+ # path to uniquely identify a virtual MFA device.
1618
1627
  #
1619
1628
  # This parameter allows (through its [regex pattern][1]) a string of
1620
1629
  # characters consisting of upper and lowercase alphanumeric characters
@@ -8708,7 +8717,7 @@ module Aws::IAM
8708
8717
  # period can be shorter if your Region began supporting these features
8709
8718
  # within the last year. The role might have been used more than 400
8710
8719
  # days ago. For more information, see [Regions where data is
8711
- # tracked][1] in the *IAM User Guide*.
8720
+ # tracked][1] in the *IAM user Guide*.
8712
8721
  #
8713
8722
  #
8714
8723
  #
@@ -8862,7 +8871,7 @@ module Aws::IAM
8862
8871
  # period can be shorter if your Region began supporting these features
8863
8872
  # within the last year. The role might have been used more than 400 days
8864
8873
  # ago. For more information, see [Regions where data is tracked][1] in
8865
- # the *IAM User Guide*.
8874
+ # the *IAM user Guide*.
8866
8875
  #
8867
8876
  # This data type is returned as a response element in the GetRole and
8868
8877
  # GetAccountAuthorizationDetails operations.
data/lib/aws-sdk-iam.rb CHANGED
@@ -74,6 +74,6 @@ require_relative 'aws-sdk-iam/customizations'
74
74
  # @!group service
75
75
  module Aws::IAM
76
76
 
77
- GEM_VERSION = '1.75.0'
77
+ GEM_VERSION = '1.76.0'
78
78
 
79
79
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-iam
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.75.0
4
+ version: 1.76.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2023-02-01 00:00:00.000000000 Z
11
+ date: 2023-03-14 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core