Skip to content

Commit b6b07c4

Browse files
committedDec 26, 2023
Documentation updates for AWS Identity and Access Management (IAM).
1 parent 5866812 commit b6b07c4

File tree

6 files changed

+86
-40
lines changed

6 files changed

+86
-40
lines changed
 

‎VERSION

+1-1
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
1.11.231
1+
1.11.232

‎generated/src/aws-cpp-sdk-iam/include/aws/iam/IAMClient.h

+15-14
Original file line numberDiff line numberDiff line change
@@ -524,13 +524,13 @@ namespace IAM
524524
* <p>Amazon Web Services secures communication with some OIDC identity
525525
* providers (IdPs) through our library of trusted root certificate authorities
526526
* (CAs) instead of using a certificate thumbprint to verify your IdP server
527-
* certificate. These OIDC IdPs include Auth0, GitHub, Google, and those that use
528-
* an Amazon S3 bucket to host a JSON Web Key Set (JWKS) endpoint. In these cases,
529-
* your legacy thumbprint remains in your configuration, but is no longer used for
530-
* validation.</p> <p>The trust for the OIDC provider is derived
531-
* from the IAM provider that this operation creates. Therefore, it is best to
532-
* limit access to the <a>CreateOpenIDConnectProvider</a> operation to highly
533-
* privileged users.</p> <p><h3>See Also:</h3> <a
527+
* certificate. In these cases, your legacy thumbprint remains in your
528+
* configuration, but is no longer used for validation. These OIDC IdPs include
529+
* Auth0, GitHub, GitLab, Google, and those that use an Amazon S3 bucket to host a
530+
* JSON Web Key Set (JWKS) endpoint.</p> <p>The trust for the OIDC
531+
* provider is derived from the IAM provider that this operation creates.
532+
* Therefore, it is best to limit access to the <a>CreateOpenIDConnectProvider</a>
533+
* operation to highly privileged users.</p> <p><h3>See Also:</h3> <a
534534
* href="http://docs.aws.amazon.com/goto/WebAPI/iam-2010-05-08/CreateOpenIDConnectProvider">AWS
535535
* API Reference</a></p>
536536
*/
@@ -5338,13 +5338,14 @@ namespace IAM
53385338
* <p>Amazon Web Services secures communication with some OIDC identity
53395339
* providers (IdPs) through our library of trusted root certificate authorities
53405340
* (CAs) instead of using a certificate thumbprint to verify your IdP server
5341-
* certificate. These OIDC IdPs include Auth0, GitHub, Google, and those that use
5342-
* an Amazon S3 bucket to host a JSON Web Key Set (JWKS) endpoint. In these cases,
5343-
* your legacy thumbprint remains in your configuration, but is no longer used for
5344-
* validation.</p> <p>Trust for the OIDC provider is derived from
5345-
* the provider certificate and is validated by the thumbprint. Therefore, it is
5346-
* best to limit access to the <code>UpdateOpenIDConnectProviderThumbprint</code>
5347-
* operation to highly privileged users.</p> <p><h3>See Also:</h3> <a
5341+
* certificate. In these cases, your legacy thumbprint remains in your
5342+
* configuration, but is no longer used for validation. These OIDC IdPs include
5343+
* Auth0, GitHub, GitLab, Google, and those that use an Amazon S3 bucket to host a
5344+
* JSON Web Key Set (JWKS) endpoint.</p> <p>Trust for the OIDC
5345+
* provider is derived from the provider certificate and is validated by the
5346+
* thumbprint. Therefore, it is best to limit access to the
5347+
* <code>UpdateOpenIDConnectProviderThumbprint</code> operation to highly
5348+
* privileged users.</p> <p><h3>See Also:</h3> <a
53485349
* href="http://docs.aws.amazon.com/goto/WebAPI/iam-2010-05-08/UpdateOpenIDConnectProviderThumbprint">AWS
53495350
* API Reference</a></p>
53505351
*/

‎generated/tests/iam-gen-tests/IAMEndpointProviderTests.cpp

+22-10
Original file line numberDiff line numberDiff line change
@@ -288,6 +288,24 @@ static const Aws::Vector<IAMEndpointProviderEndpointTestCase> TEST_CASES = {
288288
{/*headers*/}}, {/*No error*/}} // expect
289289
},
290290
/*TEST CASE 27*/
291+
{"For region eu-isoe-west-1 with FIPS disabled and DualStack disabled", // documentation
292+
{EpParam("UseFIPS", false), EpParam("Region", "eu-isoe-west-1"), EpParam("UseDualStack", false)}, // params
293+
{}, // tags
294+
{{/*epUrl*/"https://iam.eu-isoe-west-1.cloud.adc-e.uk",
295+
{/*authScheme*/},
296+
{/*properties*/},
297+
{/*headers*/}}, {/*No error*/}} // expect
298+
},
299+
/*TEST CASE 28*/
300+
{"For region us-isof-south-1 with FIPS disabled and DualStack disabled", // documentation
301+
{EpParam("UseFIPS", false), EpParam("Region", "us-isof-south-1"), EpParam("UseDualStack", false)}, // params
302+
{}, // tags
303+
{{/*epUrl*/"https://iam.us-isof-south-1.csp.hci.ic.gov",
304+
{/*authScheme*/},
305+
{/*properties*/},
306+
{/*headers*/}}, {/*No error*/}} // expect
307+
},
308+
/*TEST CASE 29*/
291309
{"For custom endpoint with region set and fips disabled and dualstack disabled", // documentation
292310
{EpParam("UseFIPS", false), EpParam("Endpoint", "https://example.com"), EpParam("Region", "us-east-1"), EpParam("UseDualStack", false)}, // params
293311
{}, // tags
@@ -296,7 +314,7 @@ static const Aws::Vector<IAMEndpointProviderEndpointTestCase> TEST_CASES = {
296314
{/*properties*/},
297315
{/*headers*/}}, {/*No error*/}} // expect
298316
},
299-
/*TEST CASE 28*/
317+
/*TEST CASE 30*/
300318
{"For custom endpoint with region not set and fips disabled and dualstack disabled", // documentation
301319
{EpParam("UseFIPS", false), EpParam("Endpoint", "https://example.com"), EpParam("UseDualStack", false)}, // params
302320
{}, // tags
@@ -305,29 +323,23 @@ static const Aws::Vector<IAMEndpointProviderEndpointTestCase> TEST_CASES = {
305323
{/*properties*/},
306324
{/*headers*/}}, {/*No error*/}} // expect
307325
},
308-
/*TEST CASE 29*/
326+
/*TEST CASE 31*/
309327
{"For custom endpoint with fips enabled and dualstack disabled", // documentation
310328
{EpParam("UseFIPS", true), EpParam("Endpoint", "https://example.com"), EpParam("Region", "us-east-1"), EpParam("UseDualStack", false)}, // params
311329
{}, // tags
312330
{{/*No endpoint expected*/}, /*error*/"Invalid Configuration: FIPS and custom endpoint are not supported"} // expect
313331
},
314-
/*TEST CASE 30*/
332+
/*TEST CASE 32*/
315333
{"For custom endpoint with fips disabled and dualstack enabled", // documentation
316334
{EpParam("UseFIPS", false), EpParam("Endpoint", "https://example.com"), EpParam("Region", "us-east-1"), EpParam("UseDualStack", true)}, // params
317335
{}, // tags
318336
{{/*No endpoint expected*/}, /*error*/"Invalid Configuration: Dualstack and custom endpoint are not supported"} // expect
319337
},
320-
/*TEST CASE 31*/
338+
/*TEST CASE 33*/
321339
{"Missing region", // documentation
322340
{}, // params
323341
{}, // tags
324342
{{/*No endpoint expected*/}, /*error*/"Invalid Configuration: Missing Region"} // expect
325-
},
326-
/*TEST CASE 32*/
327-
{"Partition doesn't support DualStack", // documentation
328-
{EpParam("UseFIPS", false), EpParam("Region", "us-isob-east-1"), EpParam("UseDualStack", true)}, // params
329-
{}, // tags
330-
{{/*No endpoint expected*/}, /*error*/"DualStack is enabled but this partition does not support DualStack"} // expect
331343
}
332344
};
333345

‎src/aws-cpp-sdk-core/include/aws/core/VersionConfig.h

+2-2
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44
*/
55
#pragma once
66

7-
#define AWS_SDK_VERSION_STRING "1.11.231"
7+
#define AWS_SDK_VERSION_STRING "1.11.232"
88
#define AWS_SDK_VERSION_MAJOR 1
99
#define AWS_SDK_VERSION_MINOR 11
10-
#define AWS_SDK_VERSION_PATCH 231
10+
#define AWS_SDK_VERSION_PATCH 232

‎tools/code-generation/api-descriptions/iam-2010-05-08.normal.json

+2-2
Original file line numberDiff line numberDiff line change
@@ -234,7 +234,7 @@
234234
{"shape":"ConcurrentModificationException"},
235235
{"shape":"ServiceFailureException"}
236236
],
237-
"documentation":"<p>Creates an IAM entity to describe an identity provider (IdP) that supports <a href=\"http://openid.net/connect/\">OpenID Connect (OIDC)</a>.</p> <p>The OIDC provider that you create with this operation can be used as a principal in a role's trust policy. Such a policy establishes a trust relationship between Amazon Web Services and the OIDC provider.</p> <p>If you are using an OIDC identity provider from Google, Facebook, or Amazon Cognito, you don't need to create a separate IAM identity provider. These OIDC identity providers are already built-in to Amazon Web Services and are available for your use. Instead, you can move directly to creating new roles using your identity provider. To learn more, see <a href=\"https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_create_for-idp_oidc.html\">Creating a role for web identity or OpenID connect federation</a> in the <i>IAM User Guide</i>.</p> <p>When you create the IAM OIDC provider, you specify the following:</p> <ul> <li> <p>The URL of the OIDC identity provider (IdP) to trust</p> </li> <li> <p>A list of client IDs (also known as audiences) that identify the application or applications allowed to authenticate using the OIDC provider</p> </li> <li> <p>A list of tags that are attached to the specified IAM OIDC provider</p> </li> <li> <p>A list of thumbprints of one or more server certificates that the IdP uses</p> </li> </ul> <p>You get all of this information from the OIDC IdP you want to use to access Amazon Web Services.</p> <note> <p>Amazon Web Services secures communication with some OIDC identity providers (IdPs) through our library of trusted root certificate authorities (CAs) instead of using a certificate thumbprint to verify your IdP server certificate. These OIDC IdPs include Auth0, GitHub, Google, and those that use an Amazon S3 bucket to host a JSON Web Key Set (JWKS) endpoint. In these cases, your legacy thumbprint remains in your configuration, but is no longer used for validation.</p> </note> <note> <p>The trust for the OIDC provider is derived from the IAM provider that this operation creates. Therefore, it is best to limit access to the <a>CreateOpenIDConnectProvider</a> operation to highly privileged users.</p> </note>"
237+
"documentation":"<p>Creates an IAM entity to describe an identity provider (IdP) that supports <a href=\"http://openid.net/connect/\">OpenID Connect (OIDC)</a>.</p> <p>The OIDC provider that you create with this operation can be used as a principal in a role's trust policy. Such a policy establishes a trust relationship between Amazon Web Services and the OIDC provider.</p> <p>If you are using an OIDC identity provider from Google, Facebook, or Amazon Cognito, you don't need to create a separate IAM identity provider. These OIDC identity providers are already built-in to Amazon Web Services and are available for your use. Instead, you can move directly to creating new roles using your identity provider. To learn more, see <a href=\"https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_create_for-idp_oidc.html\">Creating a role for web identity or OpenID connect federation</a> in the <i>IAM User Guide</i>.</p> <p>When you create the IAM OIDC provider, you specify the following:</p> <ul> <li> <p>The URL of the OIDC identity provider (IdP) to trust</p> </li> <li> <p>A list of client IDs (also known as audiences) that identify the application or applications allowed to authenticate using the OIDC provider</p> </li> <li> <p>A list of tags that are attached to the specified IAM OIDC provider</p> </li> <li> <p>A list of thumbprints of one or more server certificates that the IdP uses</p> </li> </ul> <p>You get all of this information from the OIDC IdP you want to use to access Amazon Web Services.</p> <note> <p>Amazon Web Services secures communication with some OIDC identity providers (IdPs) through our library of trusted root certificate authorities (CAs) instead of using a certificate thumbprint to verify your IdP server certificate. In these cases, your legacy thumbprint remains in your configuration, but is no longer used for validation. These OIDC IdPs include Auth0, GitHub, GitLab, Google, and those that use an Amazon S3 bucket to host a JSON Web Key Set (JWKS) endpoint.</p> </note> <note> <p>The trust for the OIDC provider is derived from the IAM provider that this operation creates. Therefore, it is best to limit access to the <a>CreateOpenIDConnectProvider</a> operation to highly privileged users.</p> </note>"
238238
},
239239
"CreatePolicy":{
240240
"name":"CreatePolicy",
@@ -2423,7 +2423,7 @@
24232423
{"shape":"NoSuchEntityException"},
24242424
{"shape":"ServiceFailureException"}
24252425
],
2426-
"documentation":"<p>Replaces the existing list of server certificate thumbprints associated with an OpenID Connect (OIDC) provider resource object with a new list of thumbprints.</p> <p>The list that you pass with this operation completely replaces the existing list of thumbprints. (The lists are not merged.)</p> <p>Typically, you need to update a thumbprint only when the identity provider certificate changes, which occurs rarely. However, if the provider's certificate <i>does</i> change, any attempt to assume an IAM role that specifies the OIDC provider as a principal fails until the certificate thumbprint is updated.</p> <note> <p>Amazon Web Services secures communication with some OIDC identity providers (IdPs) through our library of trusted root certificate authorities (CAs) instead of using a certificate thumbprint to verify your IdP server certificate. These OIDC IdPs include Auth0, GitHub, Google, and those that use an Amazon S3 bucket to host a JSON Web Key Set (JWKS) endpoint. In these cases, your legacy thumbprint remains in your configuration, but is no longer used for validation.</p> </note> <note> <p>Trust for the OIDC provider is derived from the provider certificate and is validated by the thumbprint. Therefore, it is best to limit access to the <code>UpdateOpenIDConnectProviderThumbprint</code> operation to highly privileged users.</p> </note>"
2426+
"documentation":"<p>Replaces the existing list of server certificate thumbprints associated with an OpenID Connect (OIDC) provider resource object with a new list of thumbprints.</p> <p>The list that you pass with this operation completely replaces the existing list of thumbprints. (The lists are not merged.)</p> <p>Typically, you need to update a thumbprint only when the identity provider certificate changes, which occurs rarely. However, if the provider's certificate <i>does</i> change, any attempt to assume an IAM role that specifies the OIDC provider as a principal fails until the certificate thumbprint is updated.</p> <note> <p>Amazon Web Services secures communication with some OIDC identity providers (IdPs) through our library of trusted root certificate authorities (CAs) instead of using a certificate thumbprint to verify your IdP server certificate. In these cases, your legacy thumbprint remains in your configuration, but is no longer used for validation. These OIDC IdPs include Auth0, GitHub, GitLab, Google, and those that use an Amazon S3 bucket to host a JSON Web Key Set (JWKS) endpoint.</p> </note> <note> <p>Trust for the OIDC provider is derived from the provider certificate and is validated by the thumbprint. Therefore, it is best to limit access to the <code>UpdateOpenIDConnectProviderThumbprint</code> operation to highly privileged users.</p> </note>"
24272427
},
24282428
"UpdateRole":{
24292429
"name":"UpdateRole",

‎tools/code-generation/endpoints/iam-2010-05-08.endpoint-tests.json

+44-11
Original file line numberDiff line numberDiff line change
@@ -469,6 +469,50 @@
469469
"UseDualStack": false
470470
}
471471
},
472+
{
473+
"documentation": "For region eu-isoe-west-1 with FIPS disabled and DualStack disabled",
474+
"expect": {
475+
"endpoint": {
476+
"properties": {
477+
"authSchemes": [
478+
{
479+
"name": "sigv4",
480+
"signingName": "iam",
481+
"signingRegion": "eu-isoe-west-1"
482+
}
483+
]
484+
},
485+
"url": "https://iam.eu-isoe-west-1.cloud.adc-e.uk"
486+
}
487+
},
488+
"params": {
489+
"Region": "eu-isoe-west-1",
490+
"UseFIPS": false,
491+
"UseDualStack": false
492+
}
493+
},
494+
{
495+
"documentation": "For region us-isof-south-1 with FIPS disabled and DualStack disabled",
496+
"expect": {
497+
"endpoint": {
498+
"properties": {
499+
"authSchemes": [
500+
{
501+
"name": "sigv4",
502+
"signingName": "iam",
503+
"signingRegion": "us-isof-south-1"
504+
}
505+
]
506+
},
507+
"url": "https://iam.us-isof-south-1.csp.hci.ic.gov"
508+
}
509+
},
510+
"params": {
511+
"Region": "us-isof-south-1",
512+
"UseFIPS": false,
513+
"UseDualStack": false
514+
}
515+
},
472516
{
473517
"documentation": "For custom endpoint with region set and fips disabled and dualstack disabled",
474518
"expect": {
@@ -525,17 +569,6 @@
525569
"expect": {
526570
"error": "Invalid Configuration: Missing Region"
527571
}
528-
},
529-
{
530-
"documentation": "Partition doesn't support DualStack",
531-
"expect": {
532-
"error": "DualStack is enabled but this partition does not support DualStack"
533-
},
534-
"params": {
535-
"Region": "us-isob-east-1",
536-
"UseFIPS": false,
537-
"UseDualStack": true
538-
}
539572
}
540573
],
541574
"version": "1.0"

0 commit comments

Comments
 (0)
Please sign in to comment.