aws-sdk-iam 1.85.0 → 1.86.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: ce9372daded0bb2c01827a3f240f1d53e8eedf95e6f3861b85a24265ec5c2b85
4
- data.tar.gz: ccdcd7a060dad3135d17d6d6de0e66e2bf9e64cb03624e8da32d5e1dcb3f4ec4
3
+ metadata.gz: 05564251cdc0010edb62ccd338cec38d1df359cef7dd5a1f0b1dd36f1767fdb9
4
+ data.tar.gz: 916022a599cdf91cb6d2207d1dfe189ad8e9ecec3d29a36ae983de095cf0e012
5
5
  SHA512:
6
- metadata.gz: 211e3bf9413fc9512d6a25195663129e12400c8791f59d738eeb86e44d368d6d12554e31ce142e4b80059cbe798810e1f2d25511d329a2f0ae15eff356965cf1
7
- data.tar.gz: 5bfbd8cba7d7589c044be2daa707188c2d064b43417f7836f624839159853a4ce788868c181539f7922847268749ec983a4d0ff3dae72558bf2893e01ad7011e
6
+ metadata.gz: 9e6f0d2c8ed3cbd8b11e289ca4b8829ee051ec5a53769ae600d3eb9d1278a56b5b222855da08a4241e93dbe81efd9802adc60261600beb9a228b115723f55b10
7
+ data.tar.gz: dd3dee41a7047f6cdda0394243dfc7a3a6dc967b8d68b387d3bd0cc93cff635339a78bee8d5f863e499db53eecdfb01bb4b68ba9277dbc142f23db551879fdbd
data/CHANGELOG.md CHANGED
@@ -1,6 +1,11 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.86.0 (2023-07-13)
5
+ ------------------
6
+
7
+ * Feature - Documentation updates for AWS Identity and Access Management (IAM).
8
+
4
9
  1.85.0 (2023-07-11)
5
10
  ------------------
6
11
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.85.0
1
+ 1.86.0
@@ -447,17 +447,17 @@ module Aws::IAM
447
447
  #
448
448
  # </note>
449
449
  #
450
- # For more information about roles, see [Working with roles][4]. For
451
- # more information about instance profiles, see [About instance
452
- # profiles][5].
450
+ # For more information about roles, see [IAM roles][4] in the *IAM User
451
+ # Guide*. For more information about instance profiles, see [Using
452
+ # instance profiles][5] in the *IAM User Guide*.
453
453
  #
454
454
  #
455
455
  #
456
456
  # [1]: https://en.wikipedia.org/wiki/Eventual_consistency
457
457
  # [2]: https://docs.aws.amazon.com/AWSEC2/latest/APIReference/API_DisassociateIamInstanceProfile.html
458
458
  # [3]: https://docs.aws.amazon.com/AWSEC2/latest/APIReference/API_AssociateIamInstanceProfile.html
459
- # [4]: https://docs.aws.amazon.com/IAM/latest/UserGuide/WorkingWithRoles.html
460
- # [5]: https://docs.aws.amazon.com/IAM/latest/UserGuide/AboutInstanceProfiles.html
459
+ # [4]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles.html
460
+ # [5]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use_switch-role-ec2_instance-profiles.html
461
461
  #
462
462
  # @option params [required, String] :instance_profile_name
463
463
  # The name of the instance profile to update.
@@ -1324,11 +1324,11 @@ module Aws::IAM
1324
1324
  # access Amazon Web Services.
1325
1325
  #
1326
1326
  # <note markdown="1"> Amazon Web Services secures communication with some OIDC identity
1327
- # providers (IdPs) through our library of trusted certificate
1327
+ # providers (IdPs) through our library of trusted root certificate
1328
1328
  # authorities (CAs) instead of using a certificate thumbprint to verify
1329
- # your IdP server certificate. These OIDC IdPs include Google, Auth0,
1330
- # and those that use an Amazon S3 bucket to host a JSON Web Key Set
1331
- # (JWKS) endpoint. In these cases, your legacy thumbprint remains in
1329
+ # your IdP server certificate. These OIDC IdPs include Auth0, GitHub,
1330
+ # Google, and those that use an Amazon S3 bucket to host a JSON Web Key
1331
+ # Set (JWKS) endpoint. In these cases, your legacy thumbprint remains in
1332
1332
  # your configuration, but is no longer used for validation.
1333
1333
  #
1334
1334
  # </note>
@@ -1729,14 +1729,16 @@ module Aws::IAM
1729
1729
  req.send_request(options)
1730
1730
  end
1731
1731
 
1732
- # Creates a new role for your Amazon Web Services account. For more
1733
- # information about roles, see [IAM roles][1]. For information about
1734
- # quotas for role names and the number of roles you can create, see [IAM
1735
- # and STS quotas][2] in the *IAM User Guide*.
1732
+ # Creates a new role for your Amazon Web Services account.
1733
+ #
1734
+ # For more information about roles, see [IAM roles][1] in the *IAM User
1735
+ # Guide*. For information about quotas for role names and the number of
1736
+ # roles you can create, see [IAM and STS quotas][2] in the *IAM User
1737
+ # Guide*.
1736
1738
  #
1737
1739
  #
1738
1740
  #
1739
- # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/WorkingWithRoles.html
1741
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles.html
1740
1742
  # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html
1741
1743
  #
1742
1744
  # @option params [String] :path
@@ -2734,12 +2736,12 @@ module Aws::IAM
2734
2736
  # instance profile that is associated with a running instance will break
2735
2737
  # any applications running on the instance.
2736
2738
  #
2737
- # For more information about instance profiles, see [About instance
2738
- # profiles][1].
2739
+ # For more information about instance profiles, see [Using instance
2740
+ # profiles][1] in the *IAM User Guide*.
2739
2741
  #
2740
2742
  #
2741
2743
  #
2742
- # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/AboutInstanceProfiles.html
2744
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use_switch-role-ec2_instance-profiles.html
2743
2745
  #
2744
2746
  # @option params [required, String] :instance_profile_name
2745
2747
  # The name of the instance profile to delete.
@@ -4883,12 +4885,12 @@ module Aws::IAM
4883
4885
 
4884
4886
  # Retrieves information about the specified instance profile, including
4885
4887
  # the instance profile's path, GUID, ARN, and role. For more
4886
- # information about instance profiles, see [About instance profiles][1]
4888
+ # information about instance profiles, see [Using instance profiles][1]
4887
4889
  # in the *IAM User Guide*.
4888
4890
  #
4889
4891
  #
4890
4892
  #
4891
- # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/AboutInstanceProfiles.html
4893
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use_switch-role-ec2_instance-profiles.html
4892
4894
  #
4893
4895
  # @option params [required, String] :instance_profile_name
4894
4896
  # The name of the instance profile to get information about.
@@ -5446,8 +5448,8 @@ module Aws::IAM
5446
5448
 
5447
5449
  # Retrieves information about the specified role, including the role's
5448
5450
  # path, GUID, ARN, and the role's trust policy that grants permission
5449
- # to assume the role. For more information about roles, see [Working
5450
- # with roles][1].
5451
+ # to assume the role. For more information about roles, see [IAM
5452
+ # roles][1] in the *IAM User Guide*.
5451
5453
  #
5452
5454
  # <note markdown="1"> Policies returned by this operation are URL-encoded compliant with
5453
5455
  # [RFC 3986][2]. You can use a URL decoding method to convert the policy
@@ -5459,7 +5461,7 @@ module Aws::IAM
5459
5461
  #
5460
5462
  #
5461
5463
  #
5462
- # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/WorkingWithRoles.html
5464
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles.html
5463
5465
  # [2]: https://tools.ietf.org/html/rfc3986
5464
5466
  #
5465
5467
  # @option params [required, String] :role_name
@@ -5561,14 +5563,14 @@ module Aws::IAM
5561
5563
  # For more information about policies, see [Managed policies and inline
5562
5564
  # policies][2] in the *IAM User Guide*.
5563
5565
  #
5564
- # For more information about roles, see [Using roles to delegate
5565
- # permissions and federate identities][3].
5566
+ # For more information about roles, see [IAM roles][3] in the *IAM User
5567
+ # Guide*.
5566
5568
  #
5567
5569
  #
5568
5570
  #
5569
5571
  # [1]: https://tools.ietf.org/html/rfc3986
5570
5572
  # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html
5571
- # [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/roles-toplevel.html
5573
+ # [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles.html
5572
5574
  #
5573
5575
  # @option params [required, String] :role_name
5574
5576
  # The name of the role associated with the policy.
@@ -7284,7 +7286,8 @@ module Aws::IAM
7284
7286
 
7285
7287
  # Lists the instance profiles that have the specified path prefix. If
7286
7288
  # there are none, the operation returns an empty list. For more
7287
- # information about instance profiles, see [About instance profiles][1].
7289
+ # information about instance profiles, see [Using instance profiles][1]
7290
+ # in the *IAM User Guide*.
7288
7291
  #
7289
7292
  # <note markdown="1"> IAM resource-listing operations return a subset of the available
7290
7293
  # attributes for the resource. For example, this operation does not
@@ -7299,7 +7302,7 @@ module Aws::IAM
7299
7302
  #
7300
7303
  #
7301
7304
  #
7302
- # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/AboutInstanceProfiles.html
7305
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use_switch-role-ec2_instance-profiles.html
7303
7306
  #
7304
7307
  # @option params [String] :path_prefix
7305
7308
  # The path prefix for filtering the results. For example, the prefix
@@ -7393,15 +7396,15 @@ module Aws::IAM
7393
7396
 
7394
7397
  # Lists the instance profiles that have the specified associated IAM
7395
7398
  # role. If there are none, the operation returns an empty list. For more
7396
- # information about instance profiles, go to [About instance
7397
- # profiles][1].
7399
+ # information about instance profiles, go to [Using instance
7400
+ # profiles][1] in the *IAM User Guide*.
7398
7401
  #
7399
7402
  # You can paginate the results using the `MaxItems` and `Marker`
7400
7403
  # parameters.
7401
7404
  #
7402
7405
  #
7403
7406
  #
7404
- # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/AboutInstanceProfiles.html
7407
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use_switch-role-ec2_instance-profiles.html
7405
7408
  #
7406
7409
  # @option params [required, String] :role_name
7407
7410
  # The name of the role to list instance profiles for.
@@ -8343,7 +8346,7 @@ module Aws::IAM
8343
8346
 
8344
8347
  # Lists the IAM roles that have the specified path prefix. If there are
8345
8348
  # none, the operation returns an empty list. For more information about
8346
- # roles, see [Working with roles][1].
8349
+ # roles, see [IAM roles][1] in the *IAM User Guide*.
8347
8350
  #
8348
8351
  # <note markdown="1"> IAM resource-listing operations return a subset of the available
8349
8352
  # attributes for the resource. This operation does not return the
@@ -8365,7 +8368,7 @@ module Aws::IAM
8365
8368
  #
8366
8369
  #
8367
8370
  #
8368
- # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/WorkingWithRoles.html
8371
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles.html
8369
8372
  #
8370
8373
  # @option params [String] :path_prefix
8371
8374
  # The path prefix for filtering the results. For example, the prefix
@@ -9441,7 +9444,7 @@ module Aws::IAM
9441
9444
  # You must provide policies in JSON format in IAM. However, for
9442
9445
  # CloudFormation templates formatted in YAML, you can provide the policy
9443
9446
  # in JSON or YAML format. CloudFormation always converts a YAML policy
9444
- # to JSON format before submitting it to = IAM.
9447
+ # to JSON format before submitting it to IAM.
9445
9448
  #
9446
9449
  # The [regex pattern][1] used to validate this parameter is a string of
9447
9450
  # characters consisting of the following:
@@ -9555,8 +9558,8 @@ module Aws::IAM
9555
9558
  # as part of the role's access (permissions) policy. The role's trust
9556
9559
  # policy is created at the same time as the role, using [ `CreateRole`
9557
9560
  # ][1]. You can update a role's trust policy using [
9558
- # `UpdateAssumerolePolicy` ][2]. For more information about IAM roles,
9559
- # see [Using roles to delegate permissions and federate identities][3].
9561
+ # `UpdateAssumeRolePolicy` ][2]. For more information about roles, see
9562
+ # [IAM roles][3] in the *IAM User Guide*.
9560
9563
  #
9561
9564
  # A role can also have a managed policy attached to it. To attach a
9562
9565
  # managed policy to a role, use [ `AttachRolePolicy` ][4]. To create a
@@ -9877,14 +9880,14 @@ module Aws::IAM
9877
9880
  # role from an instance profile that is associated with a running
9878
9881
  # instance might break any applications running on the instance.
9879
9882
  #
9880
- # For more information about IAM roles, see [Working with roles][1]. For
9881
- # more information about instance profiles, see [About instance
9882
- # profiles][2].
9883
+ # For more information about roles, see [IAM roles][1] in the *IAM User
9884
+ # Guide*. For more information about instance profiles, see [Using
9885
+ # instance profiles][2] in the *IAM User Guide*.
9883
9886
  #
9884
9887
  #
9885
9888
  #
9886
- # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/WorkingWithRoles.html
9887
- # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/AboutInstanceProfiles.html
9889
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles.html
9890
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use_switch-role-ec2_instance-profiles.html
9888
9891
  #
9889
9892
  # @option params [required, String] :instance_profile_name
9890
9893
  # The name of the instance profile to update.
@@ -12478,11 +12481,11 @@ module Aws::IAM
12478
12481
  # certificate thumbprint is updated.
12479
12482
  #
12480
12483
  # <note markdown="1"> Amazon Web Services secures communication with some OIDC identity
12481
- # providers (IdPs) through our library of trusted certificate
12484
+ # providers (IdPs) through our library of trusted root certificate
12482
12485
  # authorities (CAs) instead of using a certificate thumbprint to verify
12483
- # your IdP server certificate. These OIDC IdPs include Google, Auth0,
12484
- # and those that use an Amazon S3 bucket to host a JSON Web Key Set
12485
- # (JWKS) endpoint. In these cases, your legacy thumbprint remains in
12486
+ # your IdP server certificate. These OIDC IdPs include Auth0, GitHub,
12487
+ # Google, and those that use an Amazon S3 bucket to host a JSON Web Key
12488
+ # Set (JWKS) endpoint. In these cases, your legacy thumbprint remains in
12486
12489
  # your configuration, but is no longer used for validation.
12487
12490
  #
12488
12491
  # </note>
@@ -13458,7 +13461,7 @@ module Aws::IAM
13458
13461
  params: params,
13459
13462
  config: config)
13460
13463
  context[:gem_name] = 'aws-sdk-iam'
13461
- context[:gem_version] = '1.85.0'
13464
+ context[:gem_version] = '1.86.0'
13462
13465
  Seahorse::Client::Request.new(handlers, context)
13463
13466
  end
13464
13467
 
@@ -330,7 +330,7 @@ module Aws::IAM
330
330
  # You must provide policies in JSON format in IAM. However, for
331
331
  # CloudFormation templates formatted in YAML, you can provide the policy
332
332
  # in JSON or YAML format. CloudFormation always converts a YAML policy
333
- # to JSON format before submitting it to = IAM.
333
+ # to JSON format before submitting it to IAM.
334
334
  #
335
335
  # The [regex pattern][1] used to validate this parameter is a string of
336
336
  # characters consisting of the following:
@@ -223,7 +223,7 @@ module Aws::IAM
223
223
  # You must provide policies in JSON format in IAM. However, for
224
224
  # CloudFormation templates formatted in YAML, you can provide the policy
225
225
  # in JSON or YAML format. CloudFormation always converts a YAML policy
226
- # to JSON format before submitting it to = IAM.
226
+ # to JSON format before submitting it to IAM.
227
227
  #
228
228
  # The [regex pattern][1] used to validate this parameter is a string of
229
229
  # characters consisting of the following:
@@ -8194,7 +8194,7 @@ module Aws::IAM
8194
8194
  # You must provide policies in JSON format in IAM. However, for
8195
8195
  # CloudFormation templates formatted in YAML, you can provide the
8196
8196
  # policy in JSON or YAML format. CloudFormation always converts a YAML
8197
- # policy to JSON format before submitting it to = IAM.
8197
+ # policy to JSON format before submitting it to IAM.
8198
8198
  #
8199
8199
  # The [regex pattern][1] used to validate this parameter is a string
8200
8200
  # of characters consisting of the following:
data/lib/aws-sdk-iam.rb CHANGED
@@ -74,6 +74,6 @@ require_relative 'aws-sdk-iam/customizations'
74
74
  # @!group service
75
75
  module Aws::IAM
76
76
 
77
- GEM_VERSION = '1.85.0'
77
+ GEM_VERSION = '1.86.0'
78
78
 
79
79
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-iam
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.85.0
4
+ version: 1.86.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2023-07-11 00:00:00.000000000 Z
11
+ date: 2023-07-13 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core