aws-sdk-core 3.113.0 → 3.114.3
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/CHANGELOG.md +25 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-core/pageable_response.rb +7 -1
- data/lib/aws-sdk-core/pager.rb +3 -0
- data/lib/aws-sdk-core/sso_credentials.rb +1 -2
- data/lib/aws-sdk-core/stubbing/protocols/json.rb +1 -1
- data/lib/aws-sdk-core/xml/builder.rb +1 -1
- data/lib/aws-sdk-core/xml/doc_builder.rb +6 -1
- data/lib/aws-sdk-sso.rb +1 -1
- data/lib/aws-sdk-sso/client.rb +1 -1
- data/lib/aws-sdk-sts.rb +1 -1
- data/lib/aws-sdk-sts/client.rb +220 -143
- data/lib/aws-sdk-sts/client_api.rb +5 -0
- data/lib/aws-sdk-sts/types.rb +164 -43
- metadata +5 -6
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: a2a923ececa57310eb125e17602c198dd858b3960e1a337d330eb1227aff96d0
|
4
|
+
data.tar.gz: f3d256f8d55d40e00e1647946eae2df2d6380de20f874e219015ae47de6af456
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 8d1be434b0538cc3608d27bda7e1be4a5f4ae43dc12dc81c66edf577cd5221351b8053996008a413bef6f81cf1a6cf7f68f11292c2c5308addd6fb2c993b2d3a
|
7
|
+
data.tar.gz: 6acdb965572b57ca443761b9d23c34f662d7ad391345c65a534d3409f5caaa427b3dc929774e8c0393eb21ee0829d92b8d7adf039b8e928a069441e2ee7f1c3c
|
data/CHANGELOG.md
CHANGED
@@ -1,6 +1,31 @@
|
|
1
1
|
Unreleased Changes
|
2
2
|
------------------
|
3
3
|
|
4
|
+
3.114.3 (2021-06-15)
|
5
|
+
------------------
|
6
|
+
|
7
|
+
* Issue - Fixed an issue with `Aws::PageableResponse` where it was modifying original params hash, causing frozen hashes to fail.
|
8
|
+
|
9
|
+
3.114.2 (2021-06-09)
|
10
|
+
------------------
|
11
|
+
|
12
|
+
* Issue - Fixed an issue with `Aws::PageableResponse` where intentionally nil tokens were not merged into the params for the next call.
|
13
|
+
|
14
|
+
3.114.1 (2021-06-02)
|
15
|
+
------------------
|
16
|
+
|
17
|
+
* Issue - Change XML Builder to not indent by default
|
18
|
+
|
19
|
+
3.114.0 (2021-04-13)
|
20
|
+
------------------
|
21
|
+
|
22
|
+
* Feature - Updated Aws::STS::Client with the latest API changes.
|
23
|
+
|
24
|
+
3.113.1 (2021-03-29)
|
25
|
+
------------------
|
26
|
+
|
27
|
+
* Issue - Ensure end of line characters are correctly encoded in XML.
|
28
|
+
|
4
29
|
3.113.0 (2021-03-10)
|
5
30
|
------------------
|
6
31
|
|
data/VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
3.
|
1
|
+
3.114.3
|
@@ -115,7 +115,13 @@ module Aws
|
|
115
115
|
# @return [Hash] Returns the hash of request parameters for the
|
116
116
|
# next page, merging any given params.
|
117
117
|
def next_page_params(params)
|
118
|
-
|
118
|
+
# Remove all previous tokens from original params
|
119
|
+
# Sometimes a token can be nil and merge would not include it.
|
120
|
+
tokens = @pager.tokens.values.map(&:to_sym)
|
121
|
+
|
122
|
+
params_without_tokens = context[:original_params].reject { |k, _v| tokens.include?(k) }
|
123
|
+
params_without_tokens.merge!(@pager.next_tokens(self).merge(params))
|
124
|
+
params_without_tokens
|
119
125
|
end
|
120
126
|
|
121
127
|
# Raised when calling {PageableResponse#next_page} on a pager that
|
data/lib/aws-sdk-core/pager.rb
CHANGED
@@ -8,8 +8,7 @@ module Aws
|
|
8
8
|
# AWS CLI with the correct profile.
|
9
9
|
#
|
10
10
|
# For more background on AWS SSO see the official
|
11
|
-
# {
|
12
|
-
# page.
|
11
|
+
# {https://docs.aws.amazon.com/singlesignon/latest/userguide/what-is.html what is SSO Userguide}
|
13
12
|
#
|
14
13
|
# ## Refreshing Credentials from SSO
|
15
14
|
#
|
@@ -11,7 +11,7 @@ module Aws
|
|
11
11
|
def initialize(rules, options = {})
|
12
12
|
@rules = rules
|
13
13
|
@xml = options[:target] || []
|
14
|
-
indent = options[:indent] || '
|
14
|
+
indent = options[:indent] || ''
|
15
15
|
pad = options[:pad] || ''
|
16
16
|
@builder = DocBuilder.new(target: @xml, indent: indent, pad: pad)
|
17
17
|
end
|
@@ -67,7 +67,12 @@ module Aws
|
|
67
67
|
end
|
68
68
|
|
69
69
|
def escape(string, text_or_attr)
|
70
|
-
string.to_s
|
70
|
+
string.to_s
|
71
|
+
.encode(:xml => text_or_attr)
|
72
|
+
.gsub("\u{000D}", '
') # Carriage Return
|
73
|
+
.gsub("\u{000A}", '
') # Line Feed
|
74
|
+
.gsub("\u{0085}", '…') # Next Line
|
75
|
+
.gsub("\u{2028}", '
') # Line Separator
|
71
76
|
end
|
72
77
|
|
73
78
|
def attributes(attr)
|
data/lib/aws-sdk-sso.rb
CHANGED
data/lib/aws-sdk-sso/client.rb
CHANGED
data/lib/aws-sdk-sts.rb
CHANGED
data/lib/aws-sdk-sts/client.rb
CHANGED
@@ -343,35 +343,6 @@ module Aws::STS
|
|
343
343
|
# [Requesting Temporary Security Credentials][1] and [Comparing the AWS
|
344
344
|
# STS API operations][2] in the *IAM User Guide*.
|
345
345
|
#
|
346
|
-
# You cannot use AWS account root user credentials to call `AssumeRole`.
|
347
|
-
# You must use credentials for an IAM user or an IAM role to call
|
348
|
-
# `AssumeRole`.
|
349
|
-
#
|
350
|
-
# For cross-account access, imagine that you own multiple accounts and
|
351
|
-
# need to access resources in each account. You could create long-term
|
352
|
-
# credentials in each account to access those resources. However,
|
353
|
-
# managing all those credentials and remembering which one can access
|
354
|
-
# which account can be time consuming. Instead, you can create one set
|
355
|
-
# of long-term credentials in one account. Then use temporary security
|
356
|
-
# credentials to access all the other accounts by assuming roles in
|
357
|
-
# those accounts. For more information about roles, see [IAM Roles][3]
|
358
|
-
# in the *IAM User Guide*.
|
359
|
-
#
|
360
|
-
# **Session Duration**
|
361
|
-
#
|
362
|
-
# By default, the temporary security credentials created by `AssumeRole`
|
363
|
-
# last for one hour. However, you can use the optional `DurationSeconds`
|
364
|
-
# parameter to specify the duration of your session. You can provide a
|
365
|
-
# value from 900 seconds (15 minutes) up to the maximum session duration
|
366
|
-
# setting for the role. This setting can have a value from 1 hour to 12
|
367
|
-
# hours. To learn how to view the maximum value for your role, see [View
|
368
|
-
# the Maximum Session Duration Setting for a Role][4] in the *IAM User
|
369
|
-
# Guide*. The maximum session duration limit applies when you use the
|
370
|
-
# `AssumeRole*` API operations or the `assume-role*` CLI commands.
|
371
|
-
# However the limit does not apply when you use those operations to
|
372
|
-
# create a console URL. For more information, see [Using IAM Roles][5]
|
373
|
-
# in the *IAM User Guide*.
|
374
|
-
#
|
375
346
|
# **Permissions**
|
376
347
|
#
|
377
348
|
# The temporary security credentials created by `AssumeRole` can be used
|
@@ -379,10 +350,10 @@ module Aws::STS
|
|
379
350
|
# cannot call the AWS STS `GetFederationToken` or `GetSessionToken` API
|
380
351
|
# operations.
|
381
352
|
#
|
382
|
-
# (Optional) You can pass inline or managed [session policies][
|
353
|
+
# (Optional) You can pass inline or managed [session policies][3] to
|
383
354
|
# this operation. You can pass a single JSON policy document to use as
|
384
355
|
# an inline session policy. You can also specify up to 10 managed
|
385
|
-
# policies to use as managed session policies. The
|
356
|
+
# policies to use as managed session policies. The plaintext that you
|
386
357
|
# use for both inline and managed session policies can't exceed 2,048
|
387
358
|
# characters. Passing policies to this operation returns new temporary
|
388
359
|
# credentials. The resulting session's permissions are the intersection
|
@@ -391,7 +362,7 @@ module Aws::STS
|
|
391
362
|
# access resources in the account that owns the role. You cannot use
|
392
363
|
# session policies to grant more permissions than those allowed by the
|
393
364
|
# identity-based policy of the role that is being assumed. For more
|
394
|
-
# information, see [Session Policies][
|
365
|
+
# information, see [Session Policies][3] in the *IAM User Guide*.
|
395
366
|
#
|
396
367
|
# To assume a role from a different account, your AWS account must be
|
397
368
|
# trusted by the role. The trust relationship is defined in the role's
|
@@ -413,24 +384,24 @@ module Aws::STS
|
|
413
384
|
# In this case, the trust policy acts as an IAM resource-based policy.
|
414
385
|
# Users in the same account as the role do not need explicit permission
|
415
386
|
# to assume the role. For more information about trust policies and
|
416
|
-
# resource-based policies, see [IAM Policies][
|
387
|
+
# resource-based policies, see [IAM Policies][4] in the *IAM User
|
417
388
|
# Guide*.
|
418
389
|
#
|
419
390
|
# **Tags**
|
420
391
|
#
|
421
392
|
# (Optional) You can pass tag key-value pairs to your session. These
|
422
393
|
# tags are called session tags. For more information about session tags,
|
423
|
-
# see [Passing Session Tags in STS][
|
394
|
+
# see [Passing Session Tags in STS][5] in the *IAM User Guide*.
|
424
395
|
#
|
425
396
|
# An administrator must grant you the permissions necessary to pass
|
426
397
|
# session tags. The administrator can also create granular permissions
|
427
398
|
# to allow you to pass only specific session tags. For more information,
|
428
|
-
# see [Tutorial: Using Tags for Attribute-Based Access Control][
|
399
|
+
# see [Tutorial: Using Tags for Attribute-Based Access Control][6] in
|
429
400
|
# the *IAM User Guide*.
|
430
401
|
#
|
431
402
|
# You can set the session tags as transitive. Transitive tags persist
|
432
403
|
# during role chaining. For more information, see [Chaining Roles with
|
433
|
-
# Session Tags][
|
404
|
+
# Session Tags][7] in the *IAM User Guide*.
|
434
405
|
#
|
435
406
|
# **Using MFA with AssumeRole**
|
436
407
|
#
|
@@ -446,8 +417,8 @@ module Aws::STS
|
|
446
417
|
#
|
447
418
|
# `"Condition": \{"Bool": \{"aws:MultiFactorAuthPresent": true\}\}`
|
448
419
|
#
|
449
|
-
# For more information, see [Configuring MFA-Protected API Access][
|
450
|
-
#
|
420
|
+
# For more information, see [Configuring MFA-Protected API Access][8] in
|
421
|
+
# the *IAM User Guide* guide.
|
451
422
|
#
|
452
423
|
# To use MFA with `AssumeRole`, you pass values for the `SerialNumber`
|
453
424
|
# and `TokenCode` parameters. The `SerialNumber` value identifies the
|
@@ -458,15 +429,12 @@ module Aws::STS
|
|
458
429
|
#
|
459
430
|
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html
|
460
431
|
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#stsapi_comparison
|
461
|
-
# [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
462
|
-
# [4]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
463
|
-
# [5]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
464
|
-
# [6]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
465
|
-
# [7]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
466
|
-
# [8]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
467
|
-
# [9]: https://docs.aws.amazon.com/IAM/latest/UserGuide/tutorial_attribute-based-access-control.html
|
468
|
-
# [10]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html#id_session-tags_role-chaining
|
469
|
-
# [11]: https://docs.aws.amazon.com/IAM/latest/UserGuide/MFAProtectedAPI.html
|
432
|
+
# [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
|
433
|
+
# [4]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html
|
434
|
+
# [5]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html
|
435
|
+
# [6]: https://docs.aws.amazon.com/IAM/latest/UserGuide/tutorial_attribute-based-access-control.html
|
436
|
+
# [7]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html#id_session-tags_role-chaining
|
437
|
+
# [8]: https://docs.aws.amazon.com/IAM/latest/UserGuide/MFAProtectedAPI.html
|
470
438
|
#
|
471
439
|
# @option params [required, String] :role_arn
|
472
440
|
# The Amazon Resource Name (ARN) of the role to assume.
|
@@ -494,17 +462,17 @@ module Aws::STS
|
|
494
462
|
# the same account as the role.
|
495
463
|
#
|
496
464
|
# This parameter is optional. You can provide up to 10 managed policy
|
497
|
-
# ARNs. However, the
|
465
|
+
# ARNs. However, the plaintext that you use for both inline and managed
|
498
466
|
# session policies can't exceed 2,048 characters. For more information
|
499
467
|
# about ARNs, see [Amazon Resource Names (ARNs) and AWS Service
|
500
468
|
# Namespaces][1] in the AWS General Reference.
|
501
469
|
#
|
502
470
|
# <note markdown="1"> An AWS conversion compresses the passed session policies and session
|
503
471
|
# tags into a packed binary format that has a separate limit. Your
|
504
|
-
# request can fail for this limit even if your
|
505
|
-
#
|
506
|
-
#
|
507
|
-
#
|
472
|
+
# request can fail for this limit even if your plaintext meets the other
|
473
|
+
# requirements. The `PackedPolicySize` response element indicates by
|
474
|
+
# percentage how close the policies and tags for your request are to the
|
475
|
+
# upper size limit.
|
508
476
|
#
|
509
477
|
# </note>
|
510
478
|
#
|
@@ -536,7 +504,7 @@ module Aws::STS
|
|
536
504
|
# assumed. For more information, see [Session Policies][1] in the *IAM
|
537
505
|
# User Guide*.
|
538
506
|
#
|
539
|
-
# The
|
507
|
+
# The plaintext that you use for both inline and managed session
|
540
508
|
# policies can't exceed 2,048 characters. The JSON policy characters
|
541
509
|
# can be any ASCII character from the space character to the end of the
|
542
510
|
# valid character list (\\u0020 through \\u00FF). It can also include
|
@@ -545,10 +513,10 @@ module Aws::STS
|
|
545
513
|
#
|
546
514
|
# <note markdown="1"> An AWS conversion compresses the passed session policies and session
|
547
515
|
# tags into a packed binary format that has a separate limit. Your
|
548
|
-
# request can fail for this limit even if your
|
549
|
-
#
|
550
|
-
#
|
551
|
-
#
|
516
|
+
# request can fail for this limit even if your plaintext meets the other
|
517
|
+
# requirements. The `PackedPolicySize` response element indicates by
|
518
|
+
# percentage how close the policies and tags for your request are to the
|
519
|
+
# upper size limit.
|
552
520
|
#
|
553
521
|
# </note>
|
554
522
|
#
|
@@ -557,15 +525,16 @@ module Aws::STS
|
|
557
525
|
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
|
558
526
|
#
|
559
527
|
# @option params [Integer] :duration_seconds
|
560
|
-
# The duration, in seconds, of the role session. The value can
|
561
|
-
# from 900 seconds (15 minutes) up to the maximum session
|
562
|
-
#
|
563
|
-
#
|
564
|
-
#
|
565
|
-
#
|
566
|
-
#
|
567
|
-
#
|
568
|
-
#
|
528
|
+
# The duration, in seconds, of the role session. The value specified can
|
529
|
+
# can range from 900 seconds (15 minutes) up to the maximum session
|
530
|
+
# duration that is set for the role. The maximum session duration
|
531
|
+
# setting can have a value from 1 hour to 12 hours. If you specify a
|
532
|
+
# value higher than this setting or the administrator setting (whichever
|
533
|
+
# is lower), the operation fails. For example, if you specify a session
|
534
|
+
# duration of 12 hours, but your administrator set the maximum session
|
535
|
+
# duration to 6 hours, your operation fails. To learn how to view the
|
536
|
+
# maximum value for your role, see [View the Maximum Session Duration
|
537
|
+
# Setting for a Role][1] in the *IAM User Guide*.
|
569
538
|
#
|
570
539
|
# By default, the value is set to `3600` seconds.
|
571
540
|
#
|
@@ -591,16 +560,16 @@ module Aws::STS
|
|
591
560
|
# Guide*.
|
592
561
|
#
|
593
562
|
# This parameter is optional. You can pass up to 50 session tags. The
|
594
|
-
#
|
595
|
-
#
|
596
|
-
#
|
563
|
+
# plaintext session tag keys can’t exceed 128 characters, and the values
|
564
|
+
# can’t exceed 256 characters. For these and additional limits, see [IAM
|
565
|
+
# and STS Character Limits][2] in the *IAM User Guide*.
|
597
566
|
#
|
598
567
|
# <note markdown="1"> An AWS conversion compresses the passed session policies and session
|
599
568
|
# tags into a packed binary format that has a separate limit. Your
|
600
|
-
# request can fail for this limit even if your
|
601
|
-
#
|
602
|
-
#
|
603
|
-
#
|
569
|
+
# request can fail for this limit even if your plaintext meets the other
|
570
|
+
# requirements. The `PackedPolicySize` response element indicates by
|
571
|
+
# percentage how close the policies and tags for your request are to the
|
572
|
+
# upper size limit.
|
604
573
|
#
|
605
574
|
# </note>
|
606
575
|
#
|
@@ -683,7 +652,7 @@ module Aws::STS
|
|
683
652
|
#
|
684
653
|
# @option params [String] :token_code
|
685
654
|
# The value provided by the MFA device, if the trust policy of the role
|
686
|
-
# being assumed requires MFA (
|
655
|
+
# being assumed requires MFA. (In other words, if the policy includes a
|
687
656
|
# condition that tests for MFA). If the role being assumed requires MFA
|
688
657
|
# and if the `TokenCode` value is missing or expired, the `AssumeRole`
|
689
658
|
# call returns an "access denied" error.
|
@@ -691,11 +660,35 @@ module Aws::STS
|
|
691
660
|
# The format for this parameter, as described by its regex pattern, is a
|
692
661
|
# sequence of six numeric digits.
|
693
662
|
#
|
663
|
+
# @option params [String] :source_identity
|
664
|
+
# The source identity specified by the principal that is calling the
|
665
|
+
# `AssumeRole` operation.
|
666
|
+
#
|
667
|
+
# You can require users to specify a source identity when they assume a
|
668
|
+
# role. You do this by using the `sts:SourceIdentity` condition key in a
|
669
|
+
# role trust policy. You can use source identity information in AWS
|
670
|
+
# CloudTrail logs to determine who took actions with a role. You can use
|
671
|
+
# the `aws:SourceIdentity` condition key to further control access to
|
672
|
+
# AWS resources based on the value of source identity. For more
|
673
|
+
# information about using source identity, see [Monitor and control
|
674
|
+
# actions taken with assumed roles][1] in the *IAM User Guide*.
|
675
|
+
#
|
676
|
+
# The regex used to validate this parameter is a string of characters
|
677
|
+
# consisting of upper- and lower-case alphanumeric characters with no
|
678
|
+
# spaces. You can also include underscores or any of the following
|
679
|
+
# characters: =,.@-. You cannot use a value that begins with the text
|
680
|
+
# `aws:`. This prefix is reserved for AWS internal use.
|
681
|
+
#
|
682
|
+
#
|
683
|
+
#
|
684
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_monitor.html
|
685
|
+
#
|
694
686
|
# @return [Types::AssumeRoleResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
695
687
|
#
|
696
688
|
# * {Types::AssumeRoleResponse#credentials #credentials} => Types::Credentials
|
697
689
|
# * {Types::AssumeRoleResponse#assumed_role_user #assumed_role_user} => Types::AssumedRoleUser
|
698
690
|
# * {Types::AssumeRoleResponse#packed_policy_size #packed_policy_size} => Integer
|
691
|
+
# * {Types::AssumeRoleResponse#source_identity #source_identity} => String
|
699
692
|
#
|
700
693
|
#
|
701
694
|
# @example Example: To assume a role
|
@@ -762,6 +755,7 @@ module Aws::STS
|
|
762
755
|
# external_id: "externalIdType",
|
763
756
|
# serial_number: "serialNumberType",
|
764
757
|
# token_code: "tokenCodeType",
|
758
|
+
# source_identity: "sourceIdentityType",
|
765
759
|
# })
|
766
760
|
#
|
767
761
|
# @example Response structure
|
@@ -773,6 +767,7 @@ module Aws::STS
|
|
773
767
|
# resp.assumed_role_user.assumed_role_id #=> String
|
774
768
|
# resp.assumed_role_user.arn #=> String
|
775
769
|
# resp.packed_policy_size #=> Integer
|
770
|
+
# resp.source_identity #=> String
|
776
771
|
#
|
777
772
|
# @see http://docs.aws.amazon.com/goto/WebAPI/sts-2011-06-15/AssumeRole AWS API Documentation
|
778
773
|
#
|
@@ -815,6 +810,17 @@ module Aws::STS
|
|
815
810
|
# use those operations to create a console URL. For more information,
|
816
811
|
# see [Using IAM Roles][4] in the *IAM User Guide*.
|
817
812
|
#
|
813
|
+
# <note markdown="1"> [Role chaining][5] limits your AWS CLI or AWS API role session to a
|
814
|
+
# maximum of one hour. When you use the `AssumeRole` API operation to
|
815
|
+
# assume a role, you can specify the duration of your role session with
|
816
|
+
# the `DurationSeconds` parameter. You can specify a parameter value of
|
817
|
+
# up to 43200 seconds (12 hours), depending on the maximum session
|
818
|
+
# duration setting for your role. However, if you assume a role using
|
819
|
+
# role chaining and provide a `DurationSeconds` parameter value greater
|
820
|
+
# than one hour, the operation fails.
|
821
|
+
#
|
822
|
+
# </note>
|
823
|
+
#
|
818
824
|
# **Permissions**
|
819
825
|
#
|
820
826
|
# The temporary security credentials created by `AssumeRoleWithSAML` can
|
@@ -822,10 +828,10 @@ module Aws::STS
|
|
822
828
|
# exception: you cannot call the STS `GetFederationToken` or
|
823
829
|
# `GetSessionToken` API operations.
|
824
830
|
#
|
825
|
-
# (Optional) You can pass inline or managed [session policies][
|
831
|
+
# (Optional) You can pass inline or managed [session policies][6] to
|
826
832
|
# this operation. You can pass a single JSON policy document to use as
|
827
833
|
# an inline session policy. You can also specify up to 10 managed
|
828
|
-
# policies to use as managed session policies. The
|
834
|
+
# policies to use as managed session policies. The plaintext that you
|
829
835
|
# use for both inline and managed session policies can't exceed 2,048
|
830
836
|
# characters. Passing policies to this operation returns new temporary
|
831
837
|
# credentials. The resulting session's permissions are the intersection
|
@@ -834,7 +840,7 @@ module Aws::STS
|
|
834
840
|
# access resources in the account that owns the role. You cannot use
|
835
841
|
# session policies to grant more permissions than those allowed by the
|
836
842
|
# identity-based policy of the role that is being assumed. For more
|
837
|
-
# information, see [Session Policies][
|
843
|
+
# information, see [Session Policies][6] in the *IAM User Guide*.
|
838
844
|
#
|
839
845
|
# Calling `AssumeRoleWithSAML` does not require the use of AWS security
|
840
846
|
# credentials. The identity of the caller is validated by using keys in
|
@@ -853,19 +859,19 @@ module Aws::STS
|
|
853
859
|
# (Optional) You can configure your IdP to pass attributes into your
|
854
860
|
# SAML assertion as session tags. Each session tag consists of a key
|
855
861
|
# name and an associated value. For more information about session tags,
|
856
|
-
# see [Passing Session Tags in STS][
|
862
|
+
# see [Passing Session Tags in STS][7] in the *IAM User Guide*.
|
857
863
|
#
|
858
|
-
# You can pass up to 50 session tags. The
|
864
|
+
# You can pass up to 50 session tags. The plaintext session tag keys
|
859
865
|
# can’t exceed 128 characters and the values can’t exceed 256
|
860
866
|
# characters. For these and additional limits, see [IAM and STS
|
861
|
-
# Character Limits][
|
867
|
+
# Character Limits][8] in the *IAM User Guide*.
|
862
868
|
#
|
863
869
|
# <note markdown="1"> An AWS conversion compresses the passed session policies and session
|
864
870
|
# tags into a packed binary format that has a separate limit. Your
|
865
|
-
# request can fail for this limit even if your
|
866
|
-
#
|
867
|
-
#
|
868
|
-
#
|
871
|
+
# request can fail for this limit even if your plaintext meets the other
|
872
|
+
# requirements. The `PackedPolicySize` response element indicates by
|
873
|
+
# percentage how close the policies and tags for your request are to the
|
874
|
+
# upper size limit.
|
869
875
|
#
|
870
876
|
# </note>
|
871
877
|
#
|
@@ -876,12 +882,12 @@ module Aws::STS
|
|
876
882
|
# An administrator must grant you the permissions necessary to pass
|
877
883
|
# session tags. The administrator can also create granular permissions
|
878
884
|
# to allow you to pass only specific session tags. For more information,
|
879
|
-
# see [Tutorial: Using Tags for Attribute-Based Access Control][
|
885
|
+
# see [Tutorial: Using Tags for Attribute-Based Access Control][9] in
|
880
886
|
# the *IAM User Guide*.
|
881
887
|
#
|
882
888
|
# You can set the session tags as transitive. Transitive tags persist
|
883
889
|
# during role chaining. For more information, see [Chaining Roles with
|
884
|
-
# Session Tags][
|
890
|
+
# Session Tags][10] in the *IAM User Guide*.
|
885
891
|
#
|
886
892
|
# **SAML Configuration**
|
887
893
|
#
|
@@ -894,14 +900,14 @@ module Aws::STS
|
|
894
900
|
#
|
895
901
|
# For more information, see the following resources:
|
896
902
|
#
|
897
|
-
# * [About SAML 2.0-based Federation][
|
903
|
+
# * [About SAML 2.0-based Federation][11] in the *IAM User Guide*.
|
898
904
|
#
|
899
|
-
# * [Creating SAML Identity Providers][
|
905
|
+
# * [Creating SAML Identity Providers][12] in the *IAM User Guide*.
|
900
906
|
#
|
901
|
-
# * [Configuring a Relying Party and Claims][
|
907
|
+
# * [Configuring a Relying Party and Claims][13] in the *IAM User
|
902
908
|
# Guide*.
|
903
909
|
#
|
904
|
-
# * [Creating a Role for SAML 2.0 Federation][
|
910
|
+
# * [Creating a Role for SAML 2.0 Federation][14] in the *IAM User
|
905
911
|
# Guide*.
|
906
912
|
#
|
907
913
|
#
|
@@ -910,15 +916,16 @@ module Aws::STS
|
|
910
916
|
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#stsapi_comparison
|
911
917
|
# [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html#id_roles_use_view-role-max-session
|
912
918
|
# [4]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html
|
913
|
-
# [5]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
914
|
-
# [6]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
915
|
-
# [7]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
916
|
-
# [8]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
917
|
-
# [9]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
918
|
-
# [10]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
919
|
-
# [11]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
920
|
-
# [12]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
921
|
-
# [13]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
919
|
+
# [5]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_terms-and-concepts.html#iam-term-role-chaining
|
920
|
+
# [6]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
|
921
|
+
# [7]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html
|
922
|
+
# [8]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-limits.html#reference_iam-limits-entity-length
|
923
|
+
# [9]: https://docs.aws.amazon.com/IAM/latest/UserGuide/tutorial_attribute-based-access-control.html
|
924
|
+
# [10]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html#id_session-tags_role-chaining
|
925
|
+
# [11]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_saml.html
|
926
|
+
# [12]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_create_saml.html
|
927
|
+
# [13]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_create_saml_relying-party.html
|
928
|
+
# [14]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_create_for-idp_saml.html
|
922
929
|
#
|
923
930
|
# @option params [required, String] :role_arn
|
924
931
|
# The Amazon Resource Name (ARN) of the role that the caller is
|
@@ -929,7 +936,7 @@ module Aws::STS
|
|
929
936
|
# describes the IdP.
|
930
937
|
#
|
931
938
|
# @option params [required, String] :saml_assertion
|
932
|
-
# The
|
939
|
+
# The base64 encoded SAML authentication response provided by the IdP.
|
933
940
|
#
|
934
941
|
# For more information, see [Configuring a Relying Party and Adding
|
935
942
|
# Claims][1] in the *IAM User Guide*.
|
@@ -944,17 +951,17 @@ module Aws::STS
|
|
944
951
|
# the same account as the role.
|
945
952
|
#
|
946
953
|
# This parameter is optional. You can provide up to 10 managed policy
|
947
|
-
# ARNs. However, the
|
954
|
+
# ARNs. However, the plaintext that you use for both inline and managed
|
948
955
|
# session policies can't exceed 2,048 characters. For more information
|
949
956
|
# about ARNs, see [Amazon Resource Names (ARNs) and AWS Service
|
950
957
|
# Namespaces][1] in the AWS General Reference.
|
951
958
|
#
|
952
959
|
# <note markdown="1"> An AWS conversion compresses the passed session policies and session
|
953
960
|
# tags into a packed binary format that has a separate limit. Your
|
954
|
-
# request can fail for this limit even if your
|
955
|
-
#
|
956
|
-
#
|
957
|
-
#
|
961
|
+
# request can fail for this limit even if your plaintext meets the other
|
962
|
+
# requirements. The `PackedPolicySize` response element indicates by
|
963
|
+
# percentage how close the policies and tags for your request are to the
|
964
|
+
# upper size limit.
|
958
965
|
#
|
959
966
|
# </note>
|
960
967
|
#
|
@@ -986,7 +993,7 @@ module Aws::STS
|
|
986
993
|
# assumed. For more information, see [Session Policies][1] in the *IAM
|
987
994
|
# User Guide*.
|
988
995
|
#
|
989
|
-
# The
|
996
|
+
# The plaintext that you use for both inline and managed session
|
990
997
|
# policies can't exceed 2,048 characters. The JSON policy characters
|
991
998
|
# can be any ASCII character from the space character to the end of the
|
992
999
|
# valid character list (\\u0020 through \\u00FF). It can also include
|
@@ -995,10 +1002,10 @@ module Aws::STS
|
|
995
1002
|
#
|
996
1003
|
# <note markdown="1"> An AWS conversion compresses the passed session policies and session
|
997
1004
|
# tags into a packed binary format that has a separate limit. Your
|
998
|
-
# request can fail for this limit even if your
|
999
|
-
#
|
1000
|
-
#
|
1001
|
-
#
|
1005
|
+
# request can fail for this limit even if your plaintext meets the other
|
1006
|
+
# requirements. The `PackedPolicySize` response element indicates by
|
1007
|
+
# percentage how close the policies and tags for your request are to the
|
1008
|
+
# upper size limit.
|
1002
1009
|
#
|
1003
1010
|
# </note>
|
1004
1011
|
#
|
@@ -1047,6 +1054,7 @@ module Aws::STS
|
|
1047
1054
|
# * {Types::AssumeRoleWithSAMLResponse#issuer #issuer} => String
|
1048
1055
|
# * {Types::AssumeRoleWithSAMLResponse#audience #audience} => String
|
1049
1056
|
# * {Types::AssumeRoleWithSAMLResponse#name_qualifier #name_qualifier} => String
|
1057
|
+
# * {Types::AssumeRoleWithSAMLResponse#source_identity #source_identity} => String
|
1050
1058
|
#
|
1051
1059
|
#
|
1052
1060
|
# @example Example: To assume a role using a SAML assertion
|
@@ -1107,6 +1115,7 @@ module Aws::STS
|
|
1107
1115
|
# resp.issuer #=> String
|
1108
1116
|
# resp.audience #=> String
|
1109
1117
|
# resp.name_qualifier #=> String
|
1118
|
+
# resp.source_identity #=> String
|
1110
1119
|
#
|
1111
1120
|
# @see http://docs.aws.amazon.com/goto/WebAPI/sts-2011-06-15/AssumeRoleWithSAML AWS API Documentation
|
1112
1121
|
#
|
@@ -1176,7 +1185,7 @@ module Aws::STS
|
|
1176
1185
|
# (Optional) You can pass inline or managed [session policies][9] to
|
1177
1186
|
# this operation. You can pass a single JSON policy document to use as
|
1178
1187
|
# an inline session policy. You can also specify up to 10 managed
|
1179
|
-
# policies to use as managed session policies. The
|
1188
|
+
# policies to use as managed session policies. The plaintext that you
|
1180
1189
|
# use for both inline and managed session policies can't exceed 2,048
|
1181
1190
|
# characters. Passing policies to this operation returns new temporary
|
1182
1191
|
# credentials. The resulting session's permissions are the intersection
|
@@ -1194,17 +1203,17 @@ module Aws::STS
|
|
1194
1203
|
# name and an associated value. For more information about session tags,
|
1195
1204
|
# see [Passing Session Tags in STS][10] in the *IAM User Guide*.
|
1196
1205
|
#
|
1197
|
-
# You can pass up to 50 session tags. The
|
1206
|
+
# You can pass up to 50 session tags. The plaintext session tag keys
|
1198
1207
|
# can’t exceed 128 characters and the values can’t exceed 256
|
1199
1208
|
# characters. For these and additional limits, see [IAM and STS
|
1200
1209
|
# Character Limits][11] in the *IAM User Guide*.
|
1201
1210
|
#
|
1202
1211
|
# <note markdown="1"> An AWS conversion compresses the passed session policies and session
|
1203
1212
|
# tags into a packed binary format that has a separate limit. Your
|
1204
|
-
# request can fail for this limit even if your
|
1205
|
-
#
|
1206
|
-
#
|
1207
|
-
#
|
1213
|
+
# request can fail for this limit even if your plaintext meets the other
|
1214
|
+
# requirements. The `PackedPolicySize` response element indicates by
|
1215
|
+
# percentage how close the policies and tags for your request are to the
|
1216
|
+
# upper size limit.
|
1208
1217
|
#
|
1209
1218
|
# </note>
|
1210
1219
|
#
|
@@ -1233,7 +1242,7 @@ module Aws::STS
|
|
1233
1242
|
#
|
1234
1243
|
# Calling `AssumeRoleWithWebIdentity` can result in an entry in your AWS
|
1235
1244
|
# CloudTrail logs. The entry includes the [Subject][14] of the provided
|
1236
|
-
#
|
1245
|
+
# web identity token. We recommend that you avoid using any personally
|
1237
1246
|
# identifiable information (PII) in this field. For example, you could
|
1238
1247
|
# instead use a GUID or a pairwise identifier, as [suggested in the OIDC
|
1239
1248
|
# specification][15].
|
@@ -1322,17 +1331,17 @@ module Aws::STS
|
|
1322
1331
|
# the same account as the role.
|
1323
1332
|
#
|
1324
1333
|
# This parameter is optional. You can provide up to 10 managed policy
|
1325
|
-
# ARNs. However, the
|
1334
|
+
# ARNs. However, the plaintext that you use for both inline and managed
|
1326
1335
|
# session policies can't exceed 2,048 characters. For more information
|
1327
1336
|
# about ARNs, see [Amazon Resource Names (ARNs) and AWS Service
|
1328
1337
|
# Namespaces][1] in the AWS General Reference.
|
1329
1338
|
#
|
1330
1339
|
# <note markdown="1"> An AWS conversion compresses the passed session policies and session
|
1331
1340
|
# tags into a packed binary format that has a separate limit. Your
|
1332
|
-
# request can fail for this limit even if your
|
1333
|
-
#
|
1334
|
-
#
|
1335
|
-
#
|
1341
|
+
# request can fail for this limit even if your plaintext meets the other
|
1342
|
+
# requirements. The `PackedPolicySize` response element indicates by
|
1343
|
+
# percentage how close the policies and tags for your request are to the
|
1344
|
+
# upper size limit.
|
1336
1345
|
#
|
1337
1346
|
# </note>
|
1338
1347
|
#
|
@@ -1364,7 +1373,7 @@ module Aws::STS
|
|
1364
1373
|
# assumed. For more information, see [Session Policies][1] in the *IAM
|
1365
1374
|
# User Guide*.
|
1366
1375
|
#
|
1367
|
-
# The
|
1376
|
+
# The plaintext that you use for both inline and managed session
|
1368
1377
|
# policies can't exceed 2,048 characters. The JSON policy characters
|
1369
1378
|
# can be any ASCII character from the space character to the end of the
|
1370
1379
|
# valid character list (\\u0020 through \\u00FF). It can also include
|
@@ -1373,10 +1382,10 @@ module Aws::STS
|
|
1373
1382
|
#
|
1374
1383
|
# <note markdown="1"> An AWS conversion compresses the passed session policies and session
|
1375
1384
|
# tags into a packed binary format that has a separate limit. Your
|
1376
|
-
# request can fail for this limit even if your
|
1377
|
-
#
|
1378
|
-
#
|
1379
|
-
#
|
1385
|
+
# request can fail for this limit even if your plaintext meets the other
|
1386
|
+
# requirements. The `PackedPolicySize` response element indicates by
|
1387
|
+
# percentage how close the policies and tags for your request are to the
|
1388
|
+
# upper size limit.
|
1380
1389
|
#
|
1381
1390
|
# </note>
|
1382
1391
|
#
|
@@ -1420,6 +1429,7 @@ module Aws::STS
|
|
1420
1429
|
# * {Types::AssumeRoleWithWebIdentityResponse#packed_policy_size #packed_policy_size} => Integer
|
1421
1430
|
# * {Types::AssumeRoleWithWebIdentityResponse#provider #provider} => String
|
1422
1431
|
# * {Types::AssumeRoleWithWebIdentityResponse#audience #audience} => String
|
1432
|
+
# * {Types::AssumeRoleWithWebIdentityResponse#source_identity #source_identity} => String
|
1423
1433
|
#
|
1424
1434
|
#
|
1425
1435
|
# @example Example: To assume a role as an OpenID Connect-federated user
|
@@ -1479,6 +1489,7 @@ module Aws::STS
|
|
1479
1489
|
# resp.packed_policy_size #=> Integer
|
1480
1490
|
# resp.provider #=> String
|
1481
1491
|
# resp.audience #=> String
|
1492
|
+
# resp.source_identity #=> String
|
1482
1493
|
#
|
1483
1494
|
# @see http://docs.aws.amazon.com/goto/WebAPI/sts-2011-06-15/AssumeRoleWithWebIdentity AWS API Documentation
|
1484
1495
|
#
|
@@ -1763,6 +1774,72 @@ module Aws::STS
|
|
1763
1774
|
# You must pass an inline or managed [session policy][6] to this
|
1764
1775
|
# operation. You can pass a single JSON policy document to use as an
|
1765
1776
|
# inline session policy. You can also specify up to 10 managed policies
|
1777
|
+
# to use as managed session policies. The plaintext that you use for
|
1778
|
+
# both inline and managed session policies can't exceed 2,048
|
1779
|
+
# characters.
|
1780
|
+
#
|
1781
|
+
# Though the session policy parameters are optional, if you do not pass
|
1782
|
+
# a policy, then the resulting federated user session has no
|
1783
|
+
# permissions. When you pass session policies, the session permissions
|
1784
|
+
# are the intersection of the IAM user policies and the session policies
|
1785
|
+
# that you pass. This gives you a way to further restrict the
|
1786
|
+
# permissions for a federated user. You cannot use session policies to
|
1787
|
+
# grant more permissions than those that are defined in the permissions
|
1788
|
+
# policy of the IAM user. For more information, see [Session
|
1789
|
+
# Policies][6] in the *IAM User Guide*. For information about using
|
1790
|
+
# `GetFederationToken` to create temporary security credentials, see
|
1791
|
+
# [GetFederationToken—Federation Through a Custom Identity Broker][7].
|
1792
|
+
#
|
1793
|
+
# You can use the credentials to access a resource that has a
|
1794
|
+
# resource-based policy. If that policy specifically references the
|
1795
|
+
# federated user session in the `Principal` element of the policy, the
|
1796
|
+
# session has the permissions allowed by the policy. These permissions
|
1797
|
+
# are granted in addition to the permissions granted by the session
|
1798
|
+
# policies.
|
1799
|
+
#
|
1800
|
+
# **Tags**
|
1801
|
+
#
|
1802
|
+
# (Optional) You can pass tag key-value pairs to your session. These are
|
1803
|
+
# called session tags. For more information about session tags, see
|
1804
|
+
# [Passing Session Tags in STS][8] in the *IAM User Guide*.
|
1805
|
+
#
|
1806
|
+
# <note markdown="1"> You can create a mobile-based or browser-based app that can
|
1807
|
+
# authenticate users using a web identity provider like Login with
|
1808
|
+
# Amazon, Facebook, Google, or an OpenID Connect-compatible identity
|
1809
|
+
# provider. In this case, we recommend that you use [Amazon Cognito][3]
|
1810
|
+
# or `AssumeRoleWithWebIdentity`. For more information, see [Federation
|
1811
|
+
# Through a Web-based Identity Provider][4] in the *IAM User Guide*.
|
1812
|
+
#
|
1813
|
+
# </note>
|
1814
|
+
#
|
1815
|
+
# You can also call `GetFederationToken` using the security credentials
|
1816
|
+
# of an AWS account root user, but we do not recommend it. Instead, we
|
1817
|
+
# recommend that you create an IAM user for the purpose of the proxy
|
1818
|
+
# application. Then attach a policy to the IAM user that limits
|
1819
|
+
# federated users to only the actions and resources that they need to
|
1820
|
+
# access. For more information, see [IAM Best Practices][5] in the *IAM
|
1821
|
+
# User Guide*.
|
1822
|
+
#
|
1823
|
+
# **Session duration**
|
1824
|
+
#
|
1825
|
+
# The temporary credentials are valid for the specified duration, from
|
1826
|
+
# 900 seconds (15 minutes) up to a maximum of 129,600 seconds (36
|
1827
|
+
# hours). The default session duration is 43,200 seconds (12 hours).
|
1828
|
+
# Temporary credentials that are obtained by using AWS account root user
|
1829
|
+
# credentials have a maximum duration of 3,600 seconds (1 hour).
|
1830
|
+
#
|
1831
|
+
# **Permissions**
|
1832
|
+
#
|
1833
|
+
# You can use the temporary credentials created by `GetFederationToken`
|
1834
|
+
# in any AWS service except the following:
|
1835
|
+
#
|
1836
|
+
# * You cannot call any IAM operations using the AWS CLI or the AWS API.
|
1837
|
+
#
|
1838
|
+
# * You cannot call any STS operations except `GetCallerIdentity`.
|
1839
|
+
#
|
1840
|
+
# You must pass an inline or managed [session policy][6] to this
|
1841
|
+
# operation. You can pass a single JSON policy document to use as an
|
1842
|
+
# inline session policy. You can also specify up to 10 managed policies
|
1766
1843
|
# to use as managed session policies. The plain text that you use for
|
1767
1844
|
# both inline and managed session policies can't exceed 2,048
|
1768
1845
|
# characters.
|
@@ -1857,7 +1934,7 @@ module Aws::STS
|
|
1857
1934
|
# are granted in addition to the permissions that are granted by the
|
1858
1935
|
# session policies.
|
1859
1936
|
#
|
1860
|
-
# The
|
1937
|
+
# The plaintext that you use for both inline and managed session
|
1861
1938
|
# policies can't exceed 2,048 characters. The JSON policy characters
|
1862
1939
|
# can be any ASCII character from the space character to the end of the
|
1863
1940
|
# valid character list (\\u0020 through \\u00FF). It can also include
|
@@ -1866,10 +1943,10 @@ module Aws::STS
|
|
1866
1943
|
#
|
1867
1944
|
# <note markdown="1"> An AWS conversion compresses the passed session policies and session
|
1868
1945
|
# tags into a packed binary format that has a separate limit. Your
|
1869
|
-
# request can fail for this limit even if your
|
1870
|
-
#
|
1871
|
-
#
|
1872
|
-
#
|
1946
|
+
# request can fail for this limit even if your plaintext meets the other
|
1947
|
+
# requirements. The `PackedPolicySize` response element indicates by
|
1948
|
+
# percentage how close the policies and tags for your request are to the
|
1949
|
+
# upper size limit.
|
1873
1950
|
#
|
1874
1951
|
# </note>
|
1875
1952
|
#
|
@@ -1885,7 +1962,7 @@ module Aws::STS
|
|
1885
1962
|
# You must pass an inline or managed [session policy][1] to this
|
1886
1963
|
# operation. You can pass a single JSON policy document to use as an
|
1887
1964
|
# inline session policy. You can also specify up to 10 managed policies
|
1888
|
-
# to use as managed session policies. The
|
1965
|
+
# to use as managed session policies. The plaintext that you use for
|
1889
1966
|
# both inline and managed session policies can't exceed 2,048
|
1890
1967
|
# characters. You can provide up to 10 managed policy ARNs. For more
|
1891
1968
|
# information about ARNs, see [Amazon Resource Names (ARNs) and AWS
|
@@ -1912,10 +1989,10 @@ module Aws::STS
|
|
1912
1989
|
#
|
1913
1990
|
# <note markdown="1"> An AWS conversion compresses the passed session policies and session
|
1914
1991
|
# tags into a packed binary format that has a separate limit. Your
|
1915
|
-
# request can fail for this limit even if your
|
1916
|
-
#
|
1917
|
-
#
|
1918
|
-
#
|
1992
|
+
# request can fail for this limit even if your plaintext meets the other
|
1993
|
+
# requirements. The `PackedPolicySize` response element indicates by
|
1994
|
+
# percentage how close the policies and tags for your request are to the
|
1995
|
+
# upper size limit.
|
1919
1996
|
#
|
1920
1997
|
# </note>
|
1921
1998
|
#
|
@@ -1939,16 +2016,16 @@ module Aws::STS
|
|
1939
2016
|
# [Passing Session Tags in STS][1] in the *IAM User Guide*.
|
1940
2017
|
#
|
1941
2018
|
# This parameter is optional. You can pass up to 50 session tags. The
|
1942
|
-
#
|
2019
|
+
# plaintext session tag keys can’t exceed 128 characters and the values
|
1943
2020
|
# can’t exceed 256 characters. For these and additional limits, see [IAM
|
1944
2021
|
# and STS Character Limits][2] in the *IAM User Guide*.
|
1945
2022
|
#
|
1946
2023
|
# <note markdown="1"> An AWS conversion compresses the passed session policies and session
|
1947
2024
|
# tags into a packed binary format that has a separate limit. Your
|
1948
|
-
# request can fail for this limit even if your
|
1949
|
-
#
|
1950
|
-
#
|
1951
|
-
#
|
2025
|
+
# request can fail for this limit even if your plaintext meets the other
|
2026
|
+
# requirements. The `PackedPolicySize` response element indicates by
|
2027
|
+
# percentage how close the policies and tags for your request are to the
|
2028
|
+
# upper size limit.
|
1952
2029
|
#
|
1953
2030
|
# </note>
|
1954
2031
|
#
|
@@ -2204,7 +2281,7 @@ module Aws::STS
|
|
2204
2281
|
params: params,
|
2205
2282
|
config: config)
|
2206
2283
|
context[:gem_name] = 'aws-sdk-core'
|
2207
|
-
context[:gem_version] = '3.
|
2284
|
+
context[:gem_version] = '3.114.3'
|
2208
2285
|
Seahorse::Client::Request.new(handlers, context)
|
2209
2286
|
end
|
2210
2287
|
|