aws-sdk-core 3.0.0.rc2 → 3.0.0.rc3
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/VERSION +1 -1
- data/lib/aws-sdk-core/log/param_filter.rb +1 -1
- data/lib/aws-sdk-core/plugins/retry_errors.rb +1 -0
- data/lib/aws-sdk-core/plugins/signature_v4.rb +1 -1
- data/lib/aws-sdk-core/rest/request/endpoint.rb +1 -1
- data/lib/aws-sdk-core/version.rb +1 -1
- data/lib/aws-sdk-sts.rb +1 -1
- data/lib/aws-sdk-sts/client.rb +1213 -1152
- data/lib/aws-sdk-sts/client_api.rb +254 -256
- data/lib/aws-sdk-sts/errors.rb +4 -13
- data/lib/aws-sdk-sts/resource.rb +12 -14
- data/lib/aws-sdk-sts/types.rb +859 -828
- data/lib/seahorse/client/net_http/handler.rb +5 -2
- data/lib/seahorse/client/plugin_list.rb +3 -1
- metadata +2 -2
@@ -1,266 +1,264 @@
|
|
1
1
|
# WARNING ABOUT GENERATED CODE
|
2
2
|
#
|
3
|
-
# This file is generated. See the contributing for
|
3
|
+
# This file is generated. See the contributing guide for more information:
|
4
4
|
# https://github.com/aws/aws-sdk-ruby/blob/master/CONTRIBUTING.md
|
5
5
|
#
|
6
6
|
# WARNING ABOUT GENERATED CODE
|
7
7
|
|
8
|
-
module Aws
|
9
|
-
|
10
|
-
|
11
|
-
|
12
|
-
|
13
|
-
|
14
|
-
|
15
|
-
|
16
|
-
|
17
|
-
|
18
|
-
|
19
|
-
|
20
|
-
|
21
|
-
|
22
|
-
|
23
|
-
|
24
|
-
|
25
|
-
|
26
|
-
|
27
|
-
|
28
|
-
|
29
|
-
|
30
|
-
|
31
|
-
|
32
|
-
|
33
|
-
|
34
|
-
|
35
|
-
|
36
|
-
|
37
|
-
|
38
|
-
|
39
|
-
|
40
|
-
|
41
|
-
|
42
|
-
|
43
|
-
|
44
|
-
|
45
|
-
|
46
|
-
|
47
|
-
|
48
|
-
|
49
|
-
|
50
|
-
|
51
|
-
|
52
|
-
|
53
|
-
|
54
|
-
|
55
|
-
|
56
|
-
|
57
|
-
|
58
|
-
|
59
|
-
|
60
|
-
|
61
|
-
|
62
|
-
|
63
|
-
|
64
|
-
|
65
|
-
|
66
|
-
|
67
|
-
|
68
|
-
|
69
|
-
|
70
|
-
|
71
|
-
|
72
|
-
|
73
|
-
|
74
|
-
|
75
|
-
|
76
|
-
|
77
|
-
|
78
|
-
|
79
|
-
|
80
|
-
|
81
|
-
|
82
|
-
|
83
|
-
|
84
|
-
|
85
|
-
|
86
|
-
|
87
|
-
|
88
|
-
|
89
|
-
|
90
|
-
|
91
|
-
|
92
|
-
|
93
|
-
|
94
|
-
|
95
|
-
|
96
|
-
|
97
|
-
|
98
|
-
|
99
|
-
|
100
|
-
|
101
|
-
|
102
|
-
|
103
|
-
|
104
|
-
|
105
|
-
|
106
|
-
|
107
|
-
|
108
|
-
|
109
|
-
|
110
|
-
|
111
|
-
|
112
|
-
|
113
|
-
|
114
|
-
|
115
|
-
|
116
|
-
|
117
|
-
|
118
|
-
|
119
|
-
|
120
|
-
|
121
|
-
|
122
|
-
|
123
|
-
|
124
|
-
|
125
|
-
|
126
|
-
|
127
|
-
|
128
|
-
|
129
|
-
|
130
|
-
|
131
|
-
|
132
|
-
|
133
|
-
|
134
|
-
|
135
|
-
|
136
|
-
|
137
|
-
|
138
|
-
|
139
|
-
|
140
|
-
|
141
|
-
|
142
|
-
|
143
|
-
|
144
|
-
|
145
|
-
|
146
|
-
|
147
|
-
|
148
|
-
|
149
|
-
|
150
|
-
|
151
|
-
|
152
|
-
|
153
|
-
|
154
|
-
|
155
|
-
|
156
|
-
|
157
|
-
|
158
|
-
|
159
|
-
|
160
|
-
|
161
|
-
|
162
|
-
|
163
|
-
|
164
|
-
|
165
|
-
|
166
|
-
|
167
|
-
|
168
|
-
|
169
|
-
|
170
|
-
|
171
|
-
# @api private
|
172
|
-
API = Seahorse::Model::Api.new.tap do |api|
|
173
|
-
|
174
|
-
api.version = "2011-06-15"
|
175
|
-
|
176
|
-
api.metadata = {
|
177
|
-
"endpointPrefix" => "sts",
|
178
|
-
"protocol" => "query",
|
179
|
-
"serviceFullName" => "AWS Security Token Service",
|
180
|
-
"signatureVersion" => "v4",
|
181
|
-
"xmlNamespace" => "https://sts.amazonaws.com/doc/2011-06-15/",
|
182
|
-
}
|
183
|
-
|
184
|
-
api.add_operation(:assume_role, Seahorse::Model::Operation.new.tap do |o|
|
185
|
-
o.name = "AssumeRole"
|
186
|
-
o.http_method = "POST"
|
187
|
-
o.http_request_uri = "/"
|
188
|
-
o.input = Shapes::ShapeRef.new(shape: AssumeRoleRequest)
|
189
|
-
o.output = Shapes::ShapeRef.new(shape: AssumeRoleResponse)
|
190
|
-
o.errors << Shapes::ShapeRef.new(shape: MalformedPolicyDocumentException)
|
191
|
-
o.errors << Shapes::ShapeRef.new(shape: PackedPolicyTooLargeException)
|
192
|
-
o.errors << Shapes::ShapeRef.new(shape: RegionDisabledException)
|
193
|
-
end)
|
194
|
-
|
195
|
-
api.add_operation(:assume_role_with_saml, Seahorse::Model::Operation.new.tap do |o|
|
196
|
-
o.name = "AssumeRoleWithSAML"
|
197
|
-
o.http_method = "POST"
|
198
|
-
o.http_request_uri = "/"
|
199
|
-
o['authtype'] = "none"
|
200
|
-
o.input = Shapes::ShapeRef.new(shape: AssumeRoleWithSAMLRequest)
|
201
|
-
o.output = Shapes::ShapeRef.new(shape: AssumeRoleWithSAMLResponse)
|
202
|
-
o.errors << Shapes::ShapeRef.new(shape: MalformedPolicyDocumentException)
|
203
|
-
o.errors << Shapes::ShapeRef.new(shape: PackedPolicyTooLargeException)
|
204
|
-
o.errors << Shapes::ShapeRef.new(shape: IDPRejectedClaimException)
|
205
|
-
o.errors << Shapes::ShapeRef.new(shape: InvalidIdentityTokenException)
|
206
|
-
o.errors << Shapes::ShapeRef.new(shape: ExpiredTokenException)
|
207
|
-
o.errors << Shapes::ShapeRef.new(shape: RegionDisabledException)
|
208
|
-
end)
|
209
|
-
|
210
|
-
api.add_operation(:assume_role_with_web_identity, Seahorse::Model::Operation.new.tap do |o|
|
211
|
-
o.name = "AssumeRoleWithWebIdentity"
|
212
|
-
o.http_method = "POST"
|
213
|
-
o.http_request_uri = "/"
|
214
|
-
o['authtype'] = "none"
|
215
|
-
o.input = Shapes::ShapeRef.new(shape: AssumeRoleWithWebIdentityRequest)
|
216
|
-
o.output = Shapes::ShapeRef.new(shape: AssumeRoleWithWebIdentityResponse)
|
217
|
-
o.errors << Shapes::ShapeRef.new(shape: MalformedPolicyDocumentException)
|
218
|
-
o.errors << Shapes::ShapeRef.new(shape: PackedPolicyTooLargeException)
|
219
|
-
o.errors << Shapes::ShapeRef.new(shape: IDPRejectedClaimException)
|
220
|
-
o.errors << Shapes::ShapeRef.new(shape: IDPCommunicationErrorException)
|
221
|
-
o.errors << Shapes::ShapeRef.new(shape: InvalidIdentityTokenException)
|
222
|
-
o.errors << Shapes::ShapeRef.new(shape: ExpiredTokenException)
|
223
|
-
o.errors << Shapes::ShapeRef.new(shape: RegionDisabledException)
|
224
|
-
end)
|
225
|
-
|
226
|
-
api.add_operation(:decode_authorization_message, Seahorse::Model::Operation.new.tap do |o|
|
227
|
-
o.name = "DecodeAuthorizationMessage"
|
228
|
-
o.http_method = "POST"
|
229
|
-
o.http_request_uri = "/"
|
230
|
-
o.input = Shapes::ShapeRef.new(shape: DecodeAuthorizationMessageRequest)
|
231
|
-
o.output = Shapes::ShapeRef.new(shape: DecodeAuthorizationMessageResponse)
|
232
|
-
o.errors << Shapes::ShapeRef.new(shape: InvalidAuthorizationMessageException)
|
233
|
-
end)
|
234
|
-
|
235
|
-
api.add_operation(:get_caller_identity, Seahorse::Model::Operation.new.tap do |o|
|
236
|
-
o.name = "GetCallerIdentity"
|
237
|
-
o.http_method = "POST"
|
238
|
-
o.http_request_uri = "/"
|
239
|
-
o.input = Shapes::ShapeRef.new(shape: GetCallerIdentityRequest)
|
240
|
-
o.output = Shapes::ShapeRef.new(shape: GetCallerIdentityResponse)
|
241
|
-
end)
|
242
|
-
|
243
|
-
api.add_operation(:get_federation_token, Seahorse::Model::Operation.new.tap do |o|
|
244
|
-
o.name = "GetFederationToken"
|
245
|
-
o.http_method = "POST"
|
246
|
-
o.http_request_uri = "/"
|
247
|
-
o.input = Shapes::ShapeRef.new(shape: GetFederationTokenRequest)
|
248
|
-
o.output = Shapes::ShapeRef.new(shape: GetFederationTokenResponse)
|
249
|
-
o.errors << Shapes::ShapeRef.new(shape: MalformedPolicyDocumentException)
|
250
|
-
o.errors << Shapes::ShapeRef.new(shape: PackedPolicyTooLargeException)
|
251
|
-
o.errors << Shapes::ShapeRef.new(shape: RegionDisabledException)
|
252
|
-
end)
|
253
|
-
|
254
|
-
api.add_operation(:get_session_token, Seahorse::Model::Operation.new.tap do |o|
|
255
|
-
o.name = "GetSessionToken"
|
256
|
-
o.http_method = "POST"
|
257
|
-
o.http_request_uri = "/"
|
258
|
-
o.input = Shapes::ShapeRef.new(shape: GetSessionTokenRequest)
|
259
|
-
o.output = Shapes::ShapeRef.new(shape: GetSessionTokenResponse)
|
260
|
-
o.errors << Shapes::ShapeRef.new(shape: RegionDisabledException)
|
261
|
-
end)
|
262
|
-
end
|
8
|
+
module Aws::STS
|
9
|
+
# @api private
|
10
|
+
module ClientApi
|
11
|
+
|
12
|
+
include Seahorse::Model
|
13
|
+
|
14
|
+
AssumeRoleRequest = Shapes::StructureShape.new(name: 'AssumeRoleRequest')
|
15
|
+
AssumeRoleResponse = Shapes::StructureShape.new(name: 'AssumeRoleResponse')
|
16
|
+
AssumeRoleWithSAMLRequest = Shapes::StructureShape.new(name: 'AssumeRoleWithSAMLRequest')
|
17
|
+
AssumeRoleWithSAMLResponse = Shapes::StructureShape.new(name: 'AssumeRoleWithSAMLResponse')
|
18
|
+
AssumeRoleWithWebIdentityRequest = Shapes::StructureShape.new(name: 'AssumeRoleWithWebIdentityRequest')
|
19
|
+
AssumeRoleWithWebIdentityResponse = Shapes::StructureShape.new(name: 'AssumeRoleWithWebIdentityResponse')
|
20
|
+
AssumedRoleUser = Shapes::StructureShape.new(name: 'AssumedRoleUser')
|
21
|
+
Audience = Shapes::StringShape.new(name: 'Audience')
|
22
|
+
Credentials = Shapes::StructureShape.new(name: 'Credentials')
|
23
|
+
DecodeAuthorizationMessageRequest = Shapes::StructureShape.new(name: 'DecodeAuthorizationMessageRequest')
|
24
|
+
DecodeAuthorizationMessageResponse = Shapes::StructureShape.new(name: 'DecodeAuthorizationMessageResponse')
|
25
|
+
ExpiredTokenException = Shapes::StructureShape.new(name: 'ExpiredTokenException')
|
26
|
+
FederatedUser = Shapes::StructureShape.new(name: 'FederatedUser')
|
27
|
+
GetCallerIdentityRequest = Shapes::StructureShape.new(name: 'GetCallerIdentityRequest')
|
28
|
+
GetCallerIdentityResponse = Shapes::StructureShape.new(name: 'GetCallerIdentityResponse')
|
29
|
+
GetFederationTokenRequest = Shapes::StructureShape.new(name: 'GetFederationTokenRequest')
|
30
|
+
GetFederationTokenResponse = Shapes::StructureShape.new(name: 'GetFederationTokenResponse')
|
31
|
+
GetSessionTokenRequest = Shapes::StructureShape.new(name: 'GetSessionTokenRequest')
|
32
|
+
GetSessionTokenResponse = Shapes::StructureShape.new(name: 'GetSessionTokenResponse')
|
33
|
+
IDPCommunicationErrorException = Shapes::StructureShape.new(name: 'IDPCommunicationErrorException')
|
34
|
+
IDPRejectedClaimException = Shapes::StructureShape.new(name: 'IDPRejectedClaimException')
|
35
|
+
InvalidAuthorizationMessageException = Shapes::StructureShape.new(name: 'InvalidAuthorizationMessageException')
|
36
|
+
InvalidIdentityTokenException = Shapes::StructureShape.new(name: 'InvalidIdentityTokenException')
|
37
|
+
Issuer = Shapes::StringShape.new(name: 'Issuer')
|
38
|
+
MalformedPolicyDocumentException = Shapes::StructureShape.new(name: 'MalformedPolicyDocumentException')
|
39
|
+
NameQualifier = Shapes::StringShape.new(name: 'NameQualifier')
|
40
|
+
PackedPolicyTooLargeException = Shapes::StructureShape.new(name: 'PackedPolicyTooLargeException')
|
41
|
+
RegionDisabledException = Shapes::StructureShape.new(name: 'RegionDisabledException')
|
42
|
+
SAMLAssertionType = Shapes::StringShape.new(name: 'SAMLAssertionType')
|
43
|
+
Subject = Shapes::StringShape.new(name: 'Subject')
|
44
|
+
SubjectType = Shapes::StringShape.new(name: 'SubjectType')
|
45
|
+
accessKeyIdType = Shapes::StringShape.new(name: 'accessKeyIdType')
|
46
|
+
accessKeySecretType = Shapes::StringShape.new(name: 'accessKeySecretType')
|
47
|
+
accountType = Shapes::StringShape.new(name: 'accountType')
|
48
|
+
arnType = Shapes::StringShape.new(name: 'arnType')
|
49
|
+
assumedRoleIdType = Shapes::StringShape.new(name: 'assumedRoleIdType')
|
50
|
+
clientTokenType = Shapes::StringShape.new(name: 'clientTokenType')
|
51
|
+
dateType = Shapes::TimestampShape.new(name: 'dateType')
|
52
|
+
decodedMessageType = Shapes::StringShape.new(name: 'decodedMessageType')
|
53
|
+
durationSecondsType = Shapes::IntegerShape.new(name: 'durationSecondsType')
|
54
|
+
encodedMessageType = Shapes::StringShape.new(name: 'encodedMessageType')
|
55
|
+
expiredIdentityTokenMessage = Shapes::StringShape.new(name: 'expiredIdentityTokenMessage')
|
56
|
+
externalIdType = Shapes::StringShape.new(name: 'externalIdType')
|
57
|
+
federatedIdType = Shapes::StringShape.new(name: 'federatedIdType')
|
58
|
+
idpCommunicationErrorMessage = Shapes::StringShape.new(name: 'idpCommunicationErrorMessage')
|
59
|
+
idpRejectedClaimMessage = Shapes::StringShape.new(name: 'idpRejectedClaimMessage')
|
60
|
+
invalidAuthorizationMessage = Shapes::StringShape.new(name: 'invalidAuthorizationMessage')
|
61
|
+
invalidIdentityTokenMessage = Shapes::StringShape.new(name: 'invalidIdentityTokenMessage')
|
62
|
+
malformedPolicyDocumentMessage = Shapes::StringShape.new(name: 'malformedPolicyDocumentMessage')
|
63
|
+
nonNegativeIntegerType = Shapes::IntegerShape.new(name: 'nonNegativeIntegerType')
|
64
|
+
packedPolicyTooLargeMessage = Shapes::StringShape.new(name: 'packedPolicyTooLargeMessage')
|
65
|
+
regionDisabledMessage = Shapes::StringShape.new(name: 'regionDisabledMessage')
|
66
|
+
roleDurationSecondsType = Shapes::IntegerShape.new(name: 'roleDurationSecondsType')
|
67
|
+
roleSessionNameType = Shapes::StringShape.new(name: 'roleSessionNameType')
|
68
|
+
serialNumberType = Shapes::StringShape.new(name: 'serialNumberType')
|
69
|
+
sessionPolicyDocumentType = Shapes::StringShape.new(name: 'sessionPolicyDocumentType')
|
70
|
+
tokenCodeType = Shapes::StringShape.new(name: 'tokenCodeType')
|
71
|
+
tokenType = Shapes::StringShape.new(name: 'tokenType')
|
72
|
+
urlType = Shapes::StringShape.new(name: 'urlType')
|
73
|
+
userIdType = Shapes::StringShape.new(name: 'userIdType')
|
74
|
+
userNameType = Shapes::StringShape.new(name: 'userNameType')
|
75
|
+
webIdentitySubjectType = Shapes::StringShape.new(name: 'webIdentitySubjectType')
|
76
|
+
|
77
|
+
AssumeRoleRequest.add_member(:role_arn, Shapes::ShapeRef.new(shape: arnType, required: true, location_name: "RoleArn"))
|
78
|
+
AssumeRoleRequest.add_member(:role_session_name, Shapes::ShapeRef.new(shape: roleSessionNameType, required: true, location_name: "RoleSessionName"))
|
79
|
+
AssumeRoleRequest.add_member(:policy, Shapes::ShapeRef.new(shape: sessionPolicyDocumentType, location_name: "Policy"))
|
80
|
+
AssumeRoleRequest.add_member(:duration_seconds, Shapes::ShapeRef.new(shape: roleDurationSecondsType, location_name: "DurationSeconds"))
|
81
|
+
AssumeRoleRequest.add_member(:external_id, Shapes::ShapeRef.new(shape: externalIdType, location_name: "ExternalId"))
|
82
|
+
AssumeRoleRequest.add_member(:serial_number, Shapes::ShapeRef.new(shape: serialNumberType, location_name: "SerialNumber"))
|
83
|
+
AssumeRoleRequest.add_member(:token_code, Shapes::ShapeRef.new(shape: tokenCodeType, location_name: "TokenCode"))
|
84
|
+
AssumeRoleRequest.struct_class = Types::AssumeRoleRequest
|
85
|
+
|
86
|
+
AssumeRoleResponse.add_member(:credentials, Shapes::ShapeRef.new(shape: Credentials, location_name: "Credentials"))
|
87
|
+
AssumeRoleResponse.add_member(:assumed_role_user, Shapes::ShapeRef.new(shape: AssumedRoleUser, location_name: "AssumedRoleUser"))
|
88
|
+
AssumeRoleResponse.add_member(:packed_policy_size, Shapes::ShapeRef.new(shape: nonNegativeIntegerType, location_name: "PackedPolicySize"))
|
89
|
+
AssumeRoleResponse.struct_class = Types::AssumeRoleResponse
|
90
|
+
|
91
|
+
AssumeRoleWithSAMLRequest.add_member(:role_arn, Shapes::ShapeRef.new(shape: arnType, required: true, location_name: "RoleArn"))
|
92
|
+
AssumeRoleWithSAMLRequest.add_member(:principal_arn, Shapes::ShapeRef.new(shape: arnType, required: true, location_name: "PrincipalArn"))
|
93
|
+
AssumeRoleWithSAMLRequest.add_member(:saml_assertion, Shapes::ShapeRef.new(shape: SAMLAssertionType, required: true, location_name: "SAMLAssertion"))
|
94
|
+
AssumeRoleWithSAMLRequest.add_member(:policy, Shapes::ShapeRef.new(shape: sessionPolicyDocumentType, location_name: "Policy"))
|
95
|
+
AssumeRoleWithSAMLRequest.add_member(:duration_seconds, Shapes::ShapeRef.new(shape: roleDurationSecondsType, location_name: "DurationSeconds"))
|
96
|
+
AssumeRoleWithSAMLRequest.struct_class = Types::AssumeRoleWithSAMLRequest
|
97
|
+
|
98
|
+
AssumeRoleWithSAMLResponse.add_member(:credentials, Shapes::ShapeRef.new(shape: Credentials, location_name: "Credentials"))
|
99
|
+
AssumeRoleWithSAMLResponse.add_member(:assumed_role_user, Shapes::ShapeRef.new(shape: AssumedRoleUser, location_name: "AssumedRoleUser"))
|
100
|
+
AssumeRoleWithSAMLResponse.add_member(:packed_policy_size, Shapes::ShapeRef.new(shape: nonNegativeIntegerType, location_name: "PackedPolicySize"))
|
101
|
+
AssumeRoleWithSAMLResponse.add_member(:subject, Shapes::ShapeRef.new(shape: Subject, location_name: "Subject"))
|
102
|
+
AssumeRoleWithSAMLResponse.add_member(:subject_type, Shapes::ShapeRef.new(shape: SubjectType, location_name: "SubjectType"))
|
103
|
+
AssumeRoleWithSAMLResponse.add_member(:issuer, Shapes::ShapeRef.new(shape: Issuer, location_name: "Issuer"))
|
104
|
+
AssumeRoleWithSAMLResponse.add_member(:audience, Shapes::ShapeRef.new(shape: Audience, location_name: "Audience"))
|
105
|
+
AssumeRoleWithSAMLResponse.add_member(:name_qualifier, Shapes::ShapeRef.new(shape: NameQualifier, location_name: "NameQualifier"))
|
106
|
+
AssumeRoleWithSAMLResponse.struct_class = Types::AssumeRoleWithSAMLResponse
|
107
|
+
|
108
|
+
AssumeRoleWithWebIdentityRequest.add_member(:role_arn, Shapes::ShapeRef.new(shape: arnType, required: true, location_name: "RoleArn"))
|
109
|
+
AssumeRoleWithWebIdentityRequest.add_member(:role_session_name, Shapes::ShapeRef.new(shape: roleSessionNameType, required: true, location_name: "RoleSessionName"))
|
110
|
+
AssumeRoleWithWebIdentityRequest.add_member(:web_identity_token, Shapes::ShapeRef.new(shape: clientTokenType, required: true, location_name: "WebIdentityToken"))
|
111
|
+
AssumeRoleWithWebIdentityRequest.add_member(:provider_id, Shapes::ShapeRef.new(shape: urlType, location_name: "ProviderId"))
|
112
|
+
AssumeRoleWithWebIdentityRequest.add_member(:policy, Shapes::ShapeRef.new(shape: sessionPolicyDocumentType, location_name: "Policy"))
|
113
|
+
AssumeRoleWithWebIdentityRequest.add_member(:duration_seconds, Shapes::ShapeRef.new(shape: roleDurationSecondsType, location_name: "DurationSeconds"))
|
114
|
+
AssumeRoleWithWebIdentityRequest.struct_class = Types::AssumeRoleWithWebIdentityRequest
|
115
|
+
|
116
|
+
AssumeRoleWithWebIdentityResponse.add_member(:credentials, Shapes::ShapeRef.new(shape: Credentials, location_name: "Credentials"))
|
117
|
+
AssumeRoleWithWebIdentityResponse.add_member(:subject_from_web_identity_token, Shapes::ShapeRef.new(shape: webIdentitySubjectType, location_name: "SubjectFromWebIdentityToken"))
|
118
|
+
AssumeRoleWithWebIdentityResponse.add_member(:assumed_role_user, Shapes::ShapeRef.new(shape: AssumedRoleUser, location_name: "AssumedRoleUser"))
|
119
|
+
AssumeRoleWithWebIdentityResponse.add_member(:packed_policy_size, Shapes::ShapeRef.new(shape: nonNegativeIntegerType, location_name: "PackedPolicySize"))
|
120
|
+
AssumeRoleWithWebIdentityResponse.add_member(:provider, Shapes::ShapeRef.new(shape: Issuer, location_name: "Provider"))
|
121
|
+
AssumeRoleWithWebIdentityResponse.add_member(:audience, Shapes::ShapeRef.new(shape: Audience, location_name: "Audience"))
|
122
|
+
AssumeRoleWithWebIdentityResponse.struct_class = Types::AssumeRoleWithWebIdentityResponse
|
123
|
+
|
124
|
+
AssumedRoleUser.add_member(:assumed_role_id, Shapes::ShapeRef.new(shape: assumedRoleIdType, required: true, location_name: "AssumedRoleId"))
|
125
|
+
AssumedRoleUser.add_member(:arn, Shapes::ShapeRef.new(shape: arnType, required: true, location_name: "Arn"))
|
126
|
+
AssumedRoleUser.struct_class = Types::AssumedRoleUser
|
127
|
+
|
128
|
+
Credentials.add_member(:access_key_id, Shapes::ShapeRef.new(shape: accessKeyIdType, required: true, location_name: "AccessKeyId"))
|
129
|
+
Credentials.add_member(:secret_access_key, Shapes::ShapeRef.new(shape: accessKeySecretType, required: true, location_name: "SecretAccessKey"))
|
130
|
+
Credentials.add_member(:session_token, Shapes::ShapeRef.new(shape: tokenType, required: true, location_name: "SessionToken"))
|
131
|
+
Credentials.add_member(:expiration, Shapes::ShapeRef.new(shape: dateType, required: true, location_name: "Expiration"))
|
132
|
+
Credentials.struct_class = Types::Credentials
|
133
|
+
|
134
|
+
DecodeAuthorizationMessageRequest.add_member(:encoded_message, Shapes::ShapeRef.new(shape: encodedMessageType, required: true, location_name: "EncodedMessage"))
|
135
|
+
DecodeAuthorizationMessageRequest.struct_class = Types::DecodeAuthorizationMessageRequest
|
136
|
+
|
137
|
+
DecodeAuthorizationMessageResponse.add_member(:decoded_message, Shapes::ShapeRef.new(shape: decodedMessageType, location_name: "DecodedMessage"))
|
138
|
+
DecodeAuthorizationMessageResponse.struct_class = Types::DecodeAuthorizationMessageResponse
|
139
|
+
|
140
|
+
FederatedUser.add_member(:federated_user_id, Shapes::ShapeRef.new(shape: federatedIdType, required: true, location_name: "FederatedUserId"))
|
141
|
+
FederatedUser.add_member(:arn, Shapes::ShapeRef.new(shape: arnType, required: true, location_name: "Arn"))
|
142
|
+
FederatedUser.struct_class = Types::FederatedUser
|
143
|
+
|
144
|
+
GetCallerIdentityRequest.struct_class = Types::GetCallerIdentityRequest
|
145
|
+
|
146
|
+
GetCallerIdentityResponse.add_member(:user_id, Shapes::ShapeRef.new(shape: userIdType, location_name: "UserId"))
|
147
|
+
GetCallerIdentityResponse.add_member(:account, Shapes::ShapeRef.new(shape: accountType, location_name: "Account"))
|
148
|
+
GetCallerIdentityResponse.add_member(:arn, Shapes::ShapeRef.new(shape: arnType, location_name: "Arn"))
|
149
|
+
GetCallerIdentityResponse.struct_class = Types::GetCallerIdentityResponse
|
150
|
+
|
151
|
+
GetFederationTokenRequest.add_member(:name, Shapes::ShapeRef.new(shape: userNameType, required: true, location_name: "Name"))
|
152
|
+
GetFederationTokenRequest.add_member(:policy, Shapes::ShapeRef.new(shape: sessionPolicyDocumentType, location_name: "Policy"))
|
153
|
+
GetFederationTokenRequest.add_member(:duration_seconds, Shapes::ShapeRef.new(shape: durationSecondsType, location_name: "DurationSeconds"))
|
154
|
+
GetFederationTokenRequest.struct_class = Types::GetFederationTokenRequest
|
155
|
+
|
156
|
+
GetFederationTokenResponse.add_member(:credentials, Shapes::ShapeRef.new(shape: Credentials, location_name: "Credentials"))
|
157
|
+
GetFederationTokenResponse.add_member(:federated_user, Shapes::ShapeRef.new(shape: FederatedUser, location_name: "FederatedUser"))
|
158
|
+
GetFederationTokenResponse.add_member(:packed_policy_size, Shapes::ShapeRef.new(shape: nonNegativeIntegerType, location_name: "PackedPolicySize"))
|
159
|
+
GetFederationTokenResponse.struct_class = Types::GetFederationTokenResponse
|
160
|
+
|
161
|
+
GetSessionTokenRequest.add_member(:duration_seconds, Shapes::ShapeRef.new(shape: durationSecondsType, location_name: "DurationSeconds"))
|
162
|
+
GetSessionTokenRequest.add_member(:serial_number, Shapes::ShapeRef.new(shape: serialNumberType, location_name: "SerialNumber"))
|
163
|
+
GetSessionTokenRequest.add_member(:token_code, Shapes::ShapeRef.new(shape: tokenCodeType, location_name: "TokenCode"))
|
164
|
+
GetSessionTokenRequest.struct_class = Types::GetSessionTokenRequest
|
165
|
+
|
166
|
+
GetSessionTokenResponse.add_member(:credentials, Shapes::ShapeRef.new(shape: Credentials, location_name: "Credentials"))
|
167
|
+
GetSessionTokenResponse.struct_class = Types::GetSessionTokenResponse
|
168
|
+
|
263
169
|
|
170
|
+
# @api private
|
171
|
+
API = Seahorse::Model::Api.new.tap do |api|
|
172
|
+
|
173
|
+
api.version = "2011-06-15"
|
174
|
+
|
175
|
+
api.metadata = {
|
176
|
+
"endpointPrefix" => "sts",
|
177
|
+
"protocol" => "query",
|
178
|
+
"serviceFullName" => "AWS Security Token Service",
|
179
|
+
"signatureVersion" => "v4",
|
180
|
+
"xmlNamespace" => "https://sts.amazonaws.com/doc/2011-06-15/",
|
181
|
+
}
|
182
|
+
|
183
|
+
api.add_operation(:assume_role, Seahorse::Model::Operation.new.tap do |o|
|
184
|
+
o.name = "AssumeRole"
|
185
|
+
o.http_method = "POST"
|
186
|
+
o.http_request_uri = "/"
|
187
|
+
o.input = Shapes::ShapeRef.new(shape: AssumeRoleRequest)
|
188
|
+
o.output = Shapes::ShapeRef.new(shape: AssumeRoleResponse)
|
189
|
+
o.errors << Shapes::ShapeRef.new(shape: MalformedPolicyDocumentException)
|
190
|
+
o.errors << Shapes::ShapeRef.new(shape: PackedPolicyTooLargeException)
|
191
|
+
o.errors << Shapes::ShapeRef.new(shape: RegionDisabledException)
|
192
|
+
end)
|
193
|
+
|
194
|
+
api.add_operation(:assume_role_with_saml, Seahorse::Model::Operation.new.tap do |o|
|
195
|
+
o.name = "AssumeRoleWithSAML"
|
196
|
+
o.http_method = "POST"
|
197
|
+
o.http_request_uri = "/"
|
198
|
+
o['authtype'] = "none"
|
199
|
+
o.input = Shapes::ShapeRef.new(shape: AssumeRoleWithSAMLRequest)
|
200
|
+
o.output = Shapes::ShapeRef.new(shape: AssumeRoleWithSAMLResponse)
|
201
|
+
o.errors << Shapes::ShapeRef.new(shape: MalformedPolicyDocumentException)
|
202
|
+
o.errors << Shapes::ShapeRef.new(shape: PackedPolicyTooLargeException)
|
203
|
+
o.errors << Shapes::ShapeRef.new(shape: IDPRejectedClaimException)
|
204
|
+
o.errors << Shapes::ShapeRef.new(shape: InvalidIdentityTokenException)
|
205
|
+
o.errors << Shapes::ShapeRef.new(shape: ExpiredTokenException)
|
206
|
+
o.errors << Shapes::ShapeRef.new(shape: RegionDisabledException)
|
207
|
+
end)
|
208
|
+
|
209
|
+
api.add_operation(:assume_role_with_web_identity, Seahorse::Model::Operation.new.tap do |o|
|
210
|
+
o.name = "AssumeRoleWithWebIdentity"
|
211
|
+
o.http_method = "POST"
|
212
|
+
o.http_request_uri = "/"
|
213
|
+
o['authtype'] = "none"
|
214
|
+
o.input = Shapes::ShapeRef.new(shape: AssumeRoleWithWebIdentityRequest)
|
215
|
+
o.output = Shapes::ShapeRef.new(shape: AssumeRoleWithWebIdentityResponse)
|
216
|
+
o.errors << Shapes::ShapeRef.new(shape: MalformedPolicyDocumentException)
|
217
|
+
o.errors << Shapes::ShapeRef.new(shape: PackedPolicyTooLargeException)
|
218
|
+
o.errors << Shapes::ShapeRef.new(shape: IDPRejectedClaimException)
|
219
|
+
o.errors << Shapes::ShapeRef.new(shape: IDPCommunicationErrorException)
|
220
|
+
o.errors << Shapes::ShapeRef.new(shape: InvalidIdentityTokenException)
|
221
|
+
o.errors << Shapes::ShapeRef.new(shape: ExpiredTokenException)
|
222
|
+
o.errors << Shapes::ShapeRef.new(shape: RegionDisabledException)
|
223
|
+
end)
|
224
|
+
|
225
|
+
api.add_operation(:decode_authorization_message, Seahorse::Model::Operation.new.tap do |o|
|
226
|
+
o.name = "DecodeAuthorizationMessage"
|
227
|
+
o.http_method = "POST"
|
228
|
+
o.http_request_uri = "/"
|
229
|
+
o.input = Shapes::ShapeRef.new(shape: DecodeAuthorizationMessageRequest)
|
230
|
+
o.output = Shapes::ShapeRef.new(shape: DecodeAuthorizationMessageResponse)
|
231
|
+
o.errors << Shapes::ShapeRef.new(shape: InvalidAuthorizationMessageException)
|
232
|
+
end)
|
233
|
+
|
234
|
+
api.add_operation(:get_caller_identity, Seahorse::Model::Operation.new.tap do |o|
|
235
|
+
o.name = "GetCallerIdentity"
|
236
|
+
o.http_method = "POST"
|
237
|
+
o.http_request_uri = "/"
|
238
|
+
o.input = Shapes::ShapeRef.new(shape: GetCallerIdentityRequest)
|
239
|
+
o.output = Shapes::ShapeRef.new(shape: GetCallerIdentityResponse)
|
240
|
+
end)
|
241
|
+
|
242
|
+
api.add_operation(:get_federation_token, Seahorse::Model::Operation.new.tap do |o|
|
243
|
+
o.name = "GetFederationToken"
|
244
|
+
o.http_method = "POST"
|
245
|
+
o.http_request_uri = "/"
|
246
|
+
o.input = Shapes::ShapeRef.new(shape: GetFederationTokenRequest)
|
247
|
+
o.output = Shapes::ShapeRef.new(shape: GetFederationTokenResponse)
|
248
|
+
o.errors << Shapes::ShapeRef.new(shape: MalformedPolicyDocumentException)
|
249
|
+
o.errors << Shapes::ShapeRef.new(shape: PackedPolicyTooLargeException)
|
250
|
+
o.errors << Shapes::ShapeRef.new(shape: RegionDisabledException)
|
251
|
+
end)
|
252
|
+
|
253
|
+
api.add_operation(:get_session_token, Seahorse::Model::Operation.new.tap do |o|
|
254
|
+
o.name = "GetSessionToken"
|
255
|
+
o.http_method = "POST"
|
256
|
+
o.http_request_uri = "/"
|
257
|
+
o.input = Shapes::ShapeRef.new(shape: GetSessionTokenRequest)
|
258
|
+
o.output = Shapes::ShapeRef.new(shape: GetSessionTokenResponse)
|
259
|
+
o.errors << Shapes::ShapeRef.new(shape: RegionDisabledException)
|
260
|
+
end)
|
264
261
|
end
|
262
|
+
|
265
263
|
end
|
266
264
|
end
|