Skip to content

Commit 9ee6c7c

Browse files
author
AWS
committed
AWS Identity and Access Management Update: Doc only update that corrects instances of CLI not using an entity.
1 parent cd4eef8 commit 9ee6c7c

File tree

3 files changed

+33
-27
lines changed

3 files changed

+33
-27
lines changed
Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,6 @@
1+
{
2+
"type": "feature",
3+
"category": "AWS Identity and Access Management",
4+
"contributor": "",
5+
"description": "Doc only update that corrects instances of CLI not using an entity."
6+
}

services/iam/src/main/resources/codegen-resources/endpoint-tests.json

Lines changed: 26 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -7,19 +7,19 @@
77
"properties": {
88
"authSchemes": [
99
{
10-
"name": "sigv4",
10+
"signingRegion": "cn-north-1",
1111
"signingName": "iam",
12-
"signingRegion": "cn-north-1"
12+
"name": "sigv4"
1313
}
1414
]
1515
},
1616
"url": "https://iam.cn-north-1.amazonaws.com.cn"
1717
}
1818
},
1919
"params": {
20-
"UseDualStack": false,
20+
"UseFIPS": false,
2121
"Region": "aws-cn-global",
22-
"UseFIPS": false
22+
"UseDualStack": false
2323
}
2424
},
2525
{
@@ -29,19 +29,19 @@
2929
"properties": {
3030
"authSchemes": [
3131
{
32-
"name": "sigv4",
32+
"signingRegion": "us-east-1",
3333
"signingName": "iam",
34-
"signingRegion": "us-east-1"
34+
"name": "sigv4"
3535
}
3636
]
3737
},
3838
"url": "https://iam.amazonaws.com"
3939
}
4040
},
4141
"params": {
42-
"UseDualStack": false,
42+
"UseFIPS": false,
4343
"Region": "aws-global",
44-
"UseFIPS": false
44+
"UseDualStack": false
4545
}
4646
},
4747
{
@@ -51,19 +51,19 @@
5151
"properties": {
5252
"authSchemes": [
5353
{
54-
"name": "sigv4",
54+
"signingRegion": "us-iso-east-1",
5555
"signingName": "iam",
56-
"signingRegion": "us-iso-east-1"
56+
"name": "sigv4"
5757
}
5858
]
5959
},
6060
"url": "https://iam.us-iso-east-1.c2s.ic.gov"
6161
}
6262
},
6363
"params": {
64-
"UseDualStack": false,
64+
"UseFIPS": false,
6565
"Region": "aws-iso-global",
66-
"UseFIPS": false
66+
"UseDualStack": false
6767
}
6868
},
6969
{
@@ -73,19 +73,19 @@
7373
"properties": {
7474
"authSchemes": [
7575
{
76-
"name": "sigv4",
76+
"signingRegion": "us-isob-east-1",
7777
"signingName": "iam",
78-
"signingRegion": "us-isob-east-1"
78+
"name": "sigv4"
7979
}
8080
]
8181
},
8282
"url": "https://iam.us-isob-east-1.sc2s.sgov.gov"
8383
}
8484
},
8585
"params": {
86-
"UseDualStack": false,
86+
"UseFIPS": false,
8787
"Region": "aws-iso-b-global",
88-
"UseFIPS": false
88+
"UseDualStack": false
8989
}
9090
},
9191
{
@@ -95,19 +95,19 @@
9595
"properties": {
9696
"authSchemes": [
9797
{
98-
"name": "sigv4",
98+
"signingRegion": "us-gov-west-1",
9999
"signingName": "iam",
100-
"signingRegion": "us-gov-west-1"
100+
"name": "sigv4"
101101
}
102102
]
103103
},
104104
"url": "https://iam.us-gov.amazonaws.com"
105105
}
106106
},
107107
"params": {
108-
"UseDualStack": false,
108+
"UseFIPS": false,
109109
"Region": "aws-us-gov-global",
110-
"UseFIPS": false
110+
"UseDualStack": false
111111
}
112112
},
113113
{
@@ -118,9 +118,9 @@
118118
}
119119
},
120120
"params": {
121-
"UseDualStack": false,
122-
"Region": "us-east-1",
123121
"UseFIPS": false,
122+
"Region": "us-east-1",
123+
"UseDualStack": false,
124124
"Endpoint": "https://example.com"
125125
}
126126
},
@@ -130,9 +130,9 @@
130130
"error": "Invalid Configuration: FIPS and custom endpoint are not supported"
131131
},
132132
"params": {
133-
"UseDualStack": false,
134-
"Region": "us-east-1",
135133
"UseFIPS": true,
134+
"Region": "us-east-1",
135+
"UseDualStack": false,
136136
"Endpoint": "https://example.com"
137137
}
138138
},
@@ -142,9 +142,9 @@
142142
"error": "Invalid Configuration: Dualstack and custom endpoint are not supported"
143143
},
144144
"params": {
145-
"UseDualStack": true,
146-
"Region": "us-east-1",
147145
"UseFIPS": false,
146+
"Region": "us-east-1",
147+
"UseDualStack": true,
148148
"Endpoint": "https://example.com"
149149
}
150150
}

services/iam/src/main/resources/codegen-resources/service-2.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3196,7 +3196,7 @@
31963196
},
31973197
"MaxSessionDuration":{
31983198
"shape":"roleMaxSessionDurationType",
3199-
"documentation":"<p>The maximum session duration (in seconds) that you want to set for the specified role. If you do not specify a value for this setting, the default value of one hour is applied. This setting can have a value from 1 hour to 12 hours.</p> <p>Anyone who assumes the role from the or API can use the <code>DurationSeconds</code> API parameter or the <code>duration-seconds</code> CLI parameter to request a longer session. The <code>MaxSessionDuration</code> setting determines the maximum duration that can be requested using the <code>DurationSeconds</code> parameter. If users don't specify a value for the <code>DurationSeconds</code> parameter, their security credentials are valid for one hour by default. This applies when you use the <code>AssumeRole*</code> API operations or the <code>assume-role*</code> CLI operations but does not apply when you use those operations to create a console URL. For more information, see <a href=\"https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html\">Using IAM roles</a> in the <i>IAM User Guide</i>.</p>"
3199+
"documentation":"<p>The maximum session duration (in seconds) that you want to set for the specified role. If you do not specify a value for this setting, the default value of one hour is applied. This setting can have a value from 1 hour to 12 hours.</p> <p>Anyone who assumes the role from the CLI or API can use the <code>DurationSeconds</code> API parameter or the <code>duration-seconds</code> CLI parameter to request a longer session. The <code>MaxSessionDuration</code> setting determines the maximum duration that can be requested using the <code>DurationSeconds</code> parameter. If users don't specify a value for the <code>DurationSeconds</code> parameter, their security credentials are valid for one hour by default. This applies when you use the <code>AssumeRole*</code> API operations or the <code>assume-role*</code> CLI operations but does not apply when you use those operations to create a console URL. For more information, see <a href=\"https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html\">Using IAM roles</a> in the <i>IAM User Guide</i>.</p>"
32003200
},
32013201
"PermissionsBoundary":{
32023202
"shape":"arnType",

0 commit comments

Comments
 (0)