aws-sdk-core 3.114.1 → 3.130.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (67) hide show
  1. checksums.yaml +4 -4
  2. data/CHANGELOG.md +216 -0
  3. data/VERSION +1 -1
  4. data/lib/aws-defaults/default_configuration.rb +153 -0
  5. data/lib/aws-defaults/defaults_mode_config_resolver.rb +107 -0
  6. data/lib/aws-defaults.rb +3 -0
  7. data/lib/aws-sdk-core/assume_role_credentials.rb +19 -0
  8. data/lib/aws-sdk-core/assume_role_web_identity_credentials.rb +7 -1
  9. data/lib/aws-sdk-core/client_stubs.rb +5 -1
  10. data/lib/aws-sdk-core/credential_provider_chain.rb +2 -1
  11. data/lib/aws-sdk-core/ec2_metadata.rb +27 -7
  12. data/lib/aws-sdk-core/ecs_credentials.rb +5 -0
  13. data/lib/aws-sdk-core/errors.rb +5 -1
  14. data/lib/aws-sdk-core/instance_profile_credentials.rb +119 -18
  15. data/lib/aws-sdk-core/json/json_engine.rb +10 -8
  16. data/lib/aws-sdk-core/json/oj_engine.rb +33 -6
  17. data/lib/aws-sdk-core/json/parser.rb +8 -0
  18. data/lib/aws-sdk-core/json.rb +8 -26
  19. data/lib/aws-sdk-core/log/param_filter.rb +9 -1
  20. data/lib/aws-sdk-core/pageable_response.rb +72 -26
  21. data/lib/aws-sdk-core/pager.rb +3 -0
  22. data/lib/aws-sdk-core/param_validator.rb +29 -0
  23. data/lib/aws-sdk-core/plugins/checksum_algorithm.rb +340 -0
  24. data/lib/aws-sdk-core/plugins/credentials_configuration.rb +3 -1
  25. data/lib/aws-sdk-core/plugins/defaults_mode.rb +40 -0
  26. data/lib/aws-sdk-core/plugins/http_checksum.rb +8 -1
  27. data/lib/aws-sdk-core/plugins/protocols/api_gateway.rb +17 -0
  28. data/lib/aws-sdk-core/plugins/protocols/rest_json.rb +16 -1
  29. data/lib/aws-sdk-core/plugins/recursion_detection.rb +27 -0
  30. data/lib/aws-sdk-core/plugins/regional_endpoint.rb +47 -1
  31. data/lib/aws-sdk-core/plugins/response_paging.rb +1 -1
  32. data/lib/aws-sdk-core/plugins/retries/error_inspector.rb +5 -3
  33. data/lib/aws-sdk-core/plugins/retry_errors.rb +21 -5
  34. data/lib/aws-sdk-core/plugins/signature_v4.rb +15 -24
  35. data/lib/aws-sdk-core/plugins/stub_responses.rb +5 -1
  36. data/lib/aws-sdk-core/process_credentials.rb +3 -2
  37. data/lib/aws-sdk-core/refreshing_credentials.rb +40 -11
  38. data/lib/aws-sdk-core/rest/request/body.rb +19 -1
  39. data/lib/aws-sdk-core/rest/request/headers.rb +18 -6
  40. data/lib/aws-sdk-core/rest/response/headers.rb +3 -1
  41. data/lib/aws-sdk-core/shared_config.rb +27 -8
  42. data/lib/aws-sdk-core/shared_credentials.rb +7 -1
  43. data/lib/aws-sdk-core/sso_credentials.rb +8 -3
  44. data/lib/aws-sdk-core/structure.rb +10 -1
  45. data/lib/aws-sdk-core/xml/parser/engines/ox.rb +1 -1
  46. data/lib/aws-sdk-core/xml/parser/engines/rexml.rb +0 -8
  47. data/lib/aws-sdk-core/xml/parser/frame.rb +23 -0
  48. data/lib/aws-sdk-core.rb +6 -0
  49. data/lib/aws-sdk-sso/client.rb +27 -5
  50. data/lib/aws-sdk-sso.rb +1 -1
  51. data/lib/aws-sdk-sts/client.rb +424 -415
  52. data/lib/aws-sdk-sts/plugins/sts_regional_endpoints.rb +5 -1
  53. data/lib/aws-sdk-sts/presigner.rb +7 -1
  54. data/lib/aws-sdk-sts/types.rb +199 -181
  55. data/lib/aws-sdk-sts.rb +1 -1
  56. data/lib/seahorse/client/configuration.rb +4 -0
  57. data/lib/seahorse/client/h2/connection.rb +14 -11
  58. data/lib/seahorse/client/h2/handler.rb +4 -5
  59. data/lib/seahorse/client/net_http/connection_pool.rb +7 -0
  60. data/lib/seahorse/client/net_http/handler.rb +15 -7
  61. data/lib/seahorse/client/net_http/patches.rb +13 -84
  62. data/lib/seahorse/client/plugins/content_length.rb +11 -5
  63. data/lib/seahorse/client/plugins/net_http.rb +33 -2
  64. data/lib/seahorse/model/operation.rb +3 -0
  65. data/lib/seahorse/model/shapes.rb +25 -0
  66. metadata +11 -6
  67. data/lib/aws-sdk-sso/plugins/content_type.rb +0 -25
@@ -50,7 +50,7 @@ module Aws::STS
50
50
  # role session name is also used in the ARN of the assumed role
51
51
  # principal. This means that subsequent cross-account API requests
52
52
  # that use the temporary security credentials will expose the role
53
- # session name to the external account in their AWS CloudTrail logs.
53
+ # session name to the external account in their CloudTrail logs.
54
54
  #
55
55
  # The regex used to validate this parameter is a string of characters
56
56
  # consisting of upper- and lower-case alphanumeric characters with no
@@ -66,15 +66,16 @@ module Aws::STS
66
66
  # This parameter is optional. You can provide up to 10 managed policy
67
67
  # ARNs. However, the plaintext that you use for both inline and
68
68
  # managed session policies can't exceed 2,048 characters. For more
69
- # information about ARNs, see [Amazon Resource Names (ARNs) and AWS
70
- # Service Namespaces][1] in the AWS General Reference.
69
+ # information about ARNs, see [Amazon Resource Names (ARNs) and Amazon
70
+ # Web Services Service Namespaces][1] in the Amazon Web Services
71
+ # General Reference.
71
72
  #
72
- # <note markdown="1"> An AWS conversion compresses the passed session policies and session
73
- # tags into a packed binary format that has a separate limit. Your
74
- # request can fail for this limit even if your plaintext meets the
75
- # other requirements. The `PackedPolicySize` response element
76
- # indicates by percentage how close the policies and tags for your
77
- # request are to the upper size limit.
73
+ # <note markdown="1"> An Amazon Web Services conversion compresses the passed session
74
+ # policies and session tags into a packed binary format that has a
75
+ # separate limit. Your request can fail for this limit even if your
76
+ # plaintext meets the other requirements. The `PackedPolicySize`
77
+ # response element indicates by percentage how close the policies and
78
+ # tags for your request are to the upper size limit.
78
79
  #
79
80
  # </note>
80
81
  #
@@ -82,10 +83,10 @@ module Aws::STS
82
83
  # credentials. The resulting session's permissions are the
83
84
  # intersection of the role's identity-based policy and the session
84
85
  # policies. You can use the role's temporary credentials in
85
- # subsequent AWS API calls to access resources in the account that
86
- # owns the role. You cannot use session policies to grant more
87
- # permissions than those allowed by the identity-based policy of the
88
- # role that is being assumed. For more information, see [Session
86
+ # subsequent Amazon Web Services API calls to access resources in the
87
+ # account that owns the role. You cannot use session policies to grant
88
+ # more permissions than those allowed by the identity-based policy of
89
+ # the role that is being assumed. For more information, see [Session
89
90
  # Policies][2] in the *IAM User Guide*.
90
91
  #
91
92
  #
@@ -102,11 +103,11 @@ module Aws::STS
102
103
  # returns new temporary credentials. The resulting session's
103
104
  # permissions are the intersection of the role's identity-based
104
105
  # policy and the session policies. You can use the role's temporary
105
- # credentials in subsequent AWS API calls to access resources in the
106
- # account that owns the role. You cannot use session policies to grant
107
- # more permissions than those allowed by the identity-based policy of
108
- # the role that is being assumed. For more information, see [Session
109
- # Policies][1] in the *IAM User Guide*.
106
+ # credentials in subsequent Amazon Web Services API calls to access
107
+ # resources in the account that owns the role. You cannot use session
108
+ # policies to grant more permissions than those allowed by the
109
+ # identity-based policy of the role that is being assumed. For more
110
+ # information, see [Session Policies][1] in the *IAM User Guide*.
110
111
  #
111
112
  # The plaintext that you use for both inline and managed session
112
113
  # policies can't exceed 2,048 characters. The JSON policy characters
@@ -115,12 +116,12 @@ module Aws::STS
115
116
  # include the tab (\\u0009), linefeed (\\u000A), and carriage return
116
117
  # (\\u000D) characters.
117
118
  #
118
- # <note markdown="1"> An AWS conversion compresses the passed session policies and session
119
- # tags into a packed binary format that has a separate limit. Your
120
- # request can fail for this limit even if your plaintext meets the
121
- # other requirements. The `PackedPolicySize` response element
122
- # indicates by percentage how close the policies and tags for your
123
- # request are to the upper size limit.
119
+ # <note markdown="1"> An Amazon Web Services conversion compresses the passed session
120
+ # policies and session tags into a packed binary format that has a
121
+ # separate limit. Your request can fail for this limit even if your
122
+ # plaintext meets the other requirements. The `PackedPolicySize`
123
+ # response element indicates by percentage how close the policies and
124
+ # tags for your request are to the upper size limit.
124
125
  #
125
126
  # </note>
126
127
  #
@@ -131,16 +132,25 @@ module Aws::STS
131
132
  #
132
133
  # @!attribute [rw] duration_seconds
133
134
  # The duration, in seconds, of the role session. The value specified
134
- # can can range from 900 seconds (15 minutes) up to the maximum
135
- # session duration that is set for the role. The maximum session
136
- # duration setting can have a value from 1 hour to 12 hours. If you
137
- # specify a value higher than this setting or the administrator
138
- # setting (whichever is lower), the operation fails. For example, if
139
- # you specify a session duration of 12 hours, but your administrator
140
- # set the maximum session duration to 6 hours, your operation fails.
141
- # To learn how to view the maximum value for your role, see [View the
142
- # Maximum Session Duration Setting for a Role][1] in the *IAM User
143
- # Guide*.
135
+ # can range from 900 seconds (15 minutes) up to the maximum session
136
+ # duration set for the role. The maximum session duration setting can
137
+ # have a value from 1 hour to 12 hours. If you specify a value higher
138
+ # than this setting or the administrator setting (whichever is lower),
139
+ # the operation fails. For example, if you specify a session duration
140
+ # of 12 hours, but your administrator set the maximum session duration
141
+ # to 6 hours, your operation fails.
142
+ #
143
+ # Role chaining limits your Amazon Web Services CLI or Amazon Web
144
+ # Services API role session to a maximum of one hour. When you use the
145
+ # `AssumeRole` API operation to assume a role, you can specify the
146
+ # duration of your role session with the `DurationSeconds` parameter.
147
+ # You can specify a parameter value of up to 43200 seconds (12 hours),
148
+ # depending on the maximum session duration setting for your role.
149
+ # However, if you assume a role using role chaining and provide a
150
+ # `DurationSeconds` parameter value greater than one hour, the
151
+ # operation fails. To learn how to view the maximum value for your
152
+ # role, see [View the Maximum Session Duration Setting for a Role][1]
153
+ # in the *IAM User Guide*.
144
154
  #
145
155
  # By default, the value is set to `3600` seconds.
146
156
  #
@@ -149,8 +159,8 @@ module Aws::STS
149
159
  # credentials. The request to the federation endpoint for a console
150
160
  # sign-in token takes a `SessionDuration` parameter that specifies the
151
161
  # maximum length of the console session. For more information, see
152
- # [Creating a URL that Enables Federated Users to Access the AWS
153
- # Management Console][2] in the *IAM User Guide*.
162
+ # [Creating a URL that Enables Federated Users to Access the Amazon
163
+ # Web Services Management Console][2] in the *IAM User Guide*.
154
164
  #
155
165
  # </note>
156
166
  #
@@ -163,20 +173,20 @@ module Aws::STS
163
173
  # @!attribute [rw] tags
164
174
  # A list of session tags that you want to pass. Each session tag
165
175
  # consists of a key name and an associated value. For more information
166
- # about session tags, see [Tagging AWS STS Sessions][1] in the *IAM
167
- # User Guide*.
176
+ # about session tags, see [Tagging Amazon Web Services STS
177
+ # Sessions][1] in the *IAM User Guide*.
168
178
  #
169
179
  # This parameter is optional. You can pass up to 50 session tags. The
170
180
  # plaintext session tag keys can’t exceed 128 characters, and the
171
181
  # values can’t exceed 256 characters. For these and additional limits,
172
182
  # see [IAM and STS Character Limits][2] in the *IAM User Guide*.
173
183
  #
174
- # <note markdown="1"> An AWS conversion compresses the passed session policies and session
175
- # tags into a packed binary format that has a separate limit. Your
176
- # request can fail for this limit even if your plaintext meets the
177
- # other requirements. The `PackedPolicySize` response element
178
- # indicates by percentage how close the policies and tags for your
179
- # request are to the upper size limit.
184
+ # <note markdown="1"> An Amazon Web Services conversion compresses the passed session
185
+ # policies and session tags into a packed binary format that has a
186
+ # separate limit. Your request can fail for this limit even if your
187
+ # plaintext meets the other requirements. The `PackedPolicySize`
188
+ # response element indicates by percentage how close the policies and
189
+ # tags for your request are to the upper size limit.
180
190
  #
181
191
  # </note>
182
192
  #
@@ -196,14 +206,14 @@ module Aws::STS
196
206
  # operation, the new session inherits any transitive session tags from
197
207
  # the calling session. If you pass a session tag with the same key as
198
208
  # an inherited tag, the operation fails. To view the inherited tags
199
- # for a session, see the AWS CloudTrail logs. For more information,
200
- # see [Viewing Session Tags in CloudTrail][3] in the *IAM User Guide*.
209
+ # for a session, see the CloudTrail logs. For more information, see
210
+ # [Viewing Session Tags in CloudTrail][3] in the *IAM User Guide*.
201
211
  #
202
212
  #
203
213
  #
204
214
  # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html
205
215
  # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-limits.html#reference_iam-limits-entity-length
206
- # [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/session-tags.html#id_session-tags_ctlogs
216
+ # [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html#id_session-tags_ctlogs
207
217
  # @return [Array<Types::Tag>]
208
218
  #
209
219
  # @!attribute [rw] transitive_tag_keys
@@ -235,8 +245,8 @@ module Aws::STS
235
245
  # the administrator of the trusted account. That way, only someone
236
246
  # with the ID can assume the role, rather than everyone in the
237
247
  # account. For more information about the external ID, see [How to Use
238
- # an External ID When Granting Access to Your AWS Resources to a Third
239
- # Party][1] in the *IAM User Guide*.
248
+ # an External ID When Granting Access to Your Amazon Web Services
249
+ # Resources to a Third Party][1] in the *IAM User Guide*.
240
250
  #
241
251
  # The regex used to validate this parameter is a string of characters
242
252
  # consisting of upper- and lower-case alphanumeric characters with no
@@ -281,18 +291,19 @@ module Aws::STS
281
291
  # You can require users to specify a source identity when they assume
282
292
  # a role. You do this by using the `sts:SourceIdentity` condition key
283
293
  # in a role trust policy. You can use source identity information in
284
- # AWS CloudTrail logs to determine who took actions with a role. You
285
- # can use the `aws:SourceIdentity` condition key to further control
286
- # access to AWS resources based on the value of source identity. For
287
- # more information about using source identity, see [Monitor and
288
- # control actions taken with assumed roles][1] in the *IAM User
289
- # Guide*.
294
+ # CloudTrail logs to determine who took actions with a role. You can
295
+ # use the `aws:SourceIdentity` condition key to further control access
296
+ # to Amazon Web Services resources based on the value of source
297
+ # identity. For more information about using source identity, see
298
+ # [Monitor and control actions taken with assumed roles][1] in the
299
+ # *IAM User Guide*.
290
300
  #
291
301
  # The regex used to validate this parameter is a string of characters
292
302
  # consisting of upper- and lower-case alphanumeric characters with no
293
303
  # spaces. You can also include underscores or any of the following
294
304
  # characters: =,.@-. You cannot use a value that begins with the text
295
- # `aws:`. This prefix is reserved for AWS internal use.
305
+ # `aws:`. This prefix is reserved for Amazon Web Services internal
306
+ # use.
296
307
  #
297
308
  #
298
309
  #
@@ -318,7 +329,8 @@ module Aws::STS
318
329
  end
319
330
 
320
331
  # Contains the response to a successful AssumeRole request, including
321
- # temporary AWS credentials that can be used to make AWS requests.
332
+ # temporary Amazon Web Services credentials that can be used to make
333
+ # Amazon Web Services requests.
322
334
  #
323
335
  # @!attribute [rw] credentials
324
336
  # The temporary security credentials, which include an access key ID,
@@ -354,12 +366,12 @@ module Aws::STS
354
366
  # You can require users to specify a source identity when they assume
355
367
  # a role. You do this by using the `sts:SourceIdentity` condition key
356
368
  # in a role trust policy. You can use source identity information in
357
- # AWS CloudTrail logs to determine who took actions with a role. You
358
- # can use the `aws:SourceIdentity` condition key to further control
359
- # access to AWS resources based on the value of source identity. For
360
- # more information about using source identity, see [Monitor and
361
- # control actions taken with assumed roles][1] in the *IAM User
362
- # Guide*.
369
+ # CloudTrail logs to determine who took actions with a role. You can
370
+ # use the `aws:SourceIdentity` condition key to further control access
371
+ # to Amazon Web Services resources based on the value of source
372
+ # identity. For more information about using source identity, see
373
+ # [Monitor and control actions taken with assumed roles][1] in the
374
+ # *IAM User Guide*.
363
375
  #
364
376
  # The regex used to validate this parameter is a string of characters
365
377
  # consisting of upper- and lower-case alphanumeric characters with no
@@ -427,15 +439,16 @@ module Aws::STS
427
439
  # This parameter is optional. You can provide up to 10 managed policy
428
440
  # ARNs. However, the plaintext that you use for both inline and
429
441
  # managed session policies can't exceed 2,048 characters. For more
430
- # information about ARNs, see [Amazon Resource Names (ARNs) and AWS
431
- # Service Namespaces][1] in the AWS General Reference.
442
+ # information about ARNs, see [Amazon Resource Names (ARNs) and Amazon
443
+ # Web Services Service Namespaces][1] in the Amazon Web Services
444
+ # General Reference.
432
445
  #
433
- # <note markdown="1"> An AWS conversion compresses the passed session policies and session
434
- # tags into a packed binary format that has a separate limit. Your
435
- # request can fail for this limit even if your plaintext meets the
436
- # other requirements. The `PackedPolicySize` response element
437
- # indicates by percentage how close the policies and tags for your
438
- # request are to the upper size limit.
446
+ # <note markdown="1"> An Amazon Web Services conversion compresses the passed session
447
+ # policies and session tags into a packed binary format that has a
448
+ # separate limit. Your request can fail for this limit even if your
449
+ # plaintext meets the other requirements. The `PackedPolicySize`
450
+ # response element indicates by percentage how close the policies and
451
+ # tags for your request are to the upper size limit.
439
452
  #
440
453
  # </note>
441
454
  #
@@ -443,10 +456,10 @@ module Aws::STS
443
456
  # credentials. The resulting session's permissions are the
444
457
  # intersection of the role's identity-based policy and the session
445
458
  # policies. You can use the role's temporary credentials in
446
- # subsequent AWS API calls to access resources in the account that
447
- # owns the role. You cannot use session policies to grant more
448
- # permissions than those allowed by the identity-based policy of the
449
- # role that is being assumed. For more information, see [Session
459
+ # subsequent Amazon Web Services API calls to access resources in the
460
+ # account that owns the role. You cannot use session policies to grant
461
+ # more permissions than those allowed by the identity-based policy of
462
+ # the role that is being assumed. For more information, see [Session
450
463
  # Policies][2] in the *IAM User Guide*.
451
464
  #
452
465
  #
@@ -463,11 +476,11 @@ module Aws::STS
463
476
  # returns new temporary credentials. The resulting session's
464
477
  # permissions are the intersection of the role's identity-based
465
478
  # policy and the session policies. You can use the role's temporary
466
- # credentials in subsequent AWS API calls to access resources in the
467
- # account that owns the role. You cannot use session policies to grant
468
- # more permissions than those allowed by the identity-based policy of
469
- # the role that is being assumed. For more information, see [Session
470
- # Policies][1] in the *IAM User Guide*.
479
+ # credentials in subsequent Amazon Web Services API calls to access
480
+ # resources in the account that owns the role. You cannot use session
481
+ # policies to grant more permissions than those allowed by the
482
+ # identity-based policy of the role that is being assumed. For more
483
+ # information, see [Session Policies][1] in the *IAM User Guide*.
471
484
  #
472
485
  # The plaintext that you use for both inline and managed session
473
486
  # policies can't exceed 2,048 characters. The JSON policy characters
@@ -476,12 +489,12 @@ module Aws::STS
476
489
  # include the tab (\\u0009), linefeed (\\u000A), and carriage return
477
490
  # (\\u000D) characters.
478
491
  #
479
- # <note markdown="1"> An AWS conversion compresses the passed session policies and session
480
- # tags into a packed binary format that has a separate limit. Your
481
- # request can fail for this limit even if your plaintext meets the
482
- # other requirements. The `PackedPolicySize` response element
483
- # indicates by percentage how close the policies and tags for your
484
- # request are to the upper size limit.
492
+ # <note markdown="1"> An Amazon Web Services conversion compresses the passed session
493
+ # policies and session tags into a packed binary format that has a
494
+ # separate limit. Your request can fail for this limit even if your
495
+ # plaintext meets the other requirements. The `PackedPolicySize`
496
+ # response element indicates by percentage how close the policies and
497
+ # tags for your request are to the upper size limit.
485
498
  #
486
499
  # </note>
487
500
  #
@@ -512,8 +525,8 @@ module Aws::STS
512
525
  # credentials. The request to the federation endpoint for a console
513
526
  # sign-in token takes a `SessionDuration` parameter that specifies the
514
527
  # maximum length of the console session. For more information, see
515
- # [Creating a URL that Enables Federated Users to Access the AWS
516
- # Management Console][2] in the *IAM User Guide*.
528
+ # [Creating a URL that Enables Federated Users to Access the Amazon
529
+ # Web Services Management Console][2] in the *IAM User Guide*.
517
530
  #
518
531
  # </note>
519
532
  #
@@ -537,8 +550,8 @@ module Aws::STS
537
550
  end
538
551
 
539
552
  # Contains the response to a successful AssumeRoleWithSAML request,
540
- # including temporary AWS credentials that can be used to make AWS
541
- # requests.
553
+ # including temporary Amazon Web Services credentials that can be used
554
+ # to make Amazon Web Services requests.
542
555
  #
543
556
  # @!attribute [rw] credentials
544
557
  # The temporary security credentials, which include an access key ID,
@@ -594,7 +607,7 @@ module Aws::STS
594
607
  #
595
608
  # * The `Issuer` response value.
596
609
  #
597
- # * The AWS account ID.
610
+ # * The Amazon Web Services account ID.
598
611
  #
599
612
  # * The friendly name (the last part of the ARN) of the SAML provider
600
613
  # in IAM.
@@ -697,13 +710,13 @@ module Aws::STS
697
710
  # @return [String]
698
711
  #
699
712
  # @!attribute [rw] provider_id
700
- # The fully qualified host component of the domain name of the
701
- # identity provider.
713
+ # The fully qualified host component of the domain name of the OAuth
714
+ # 2.0 identity provider. Do not specify this value for an OpenID
715
+ # Connect identity provider.
702
716
  #
703
- # Specify this value only for OAuth 2.0 access tokens. Currently
704
- # `www.amazon.com` and `graph.facebook.com` are the only supported
705
- # identity providers for OAuth 2.0 access tokens. Do not include URL
706
- # schemes and port numbers.
717
+ # Currently `www.amazon.com` and `graph.facebook.com` are the only
718
+ # supported identity providers for OAuth 2.0 access tokens. Do not
719
+ # include URL schemes and port numbers.
707
720
  #
708
721
  # Do not specify this value for OpenID Connect ID tokens.
709
722
  # @return [String]
@@ -716,15 +729,16 @@ module Aws::STS
716
729
  # This parameter is optional. You can provide up to 10 managed policy
717
730
  # ARNs. However, the plaintext that you use for both inline and
718
731
  # managed session policies can't exceed 2,048 characters. For more
719
- # information about ARNs, see [Amazon Resource Names (ARNs) and AWS
720
- # Service Namespaces][1] in the AWS General Reference.
732
+ # information about ARNs, see [Amazon Resource Names (ARNs) and Amazon
733
+ # Web Services Service Namespaces][1] in the Amazon Web Services
734
+ # General Reference.
721
735
  #
722
- # <note markdown="1"> An AWS conversion compresses the passed session policies and session
723
- # tags into a packed binary format that has a separate limit. Your
724
- # request can fail for this limit even if your plaintext meets the
725
- # other requirements. The `PackedPolicySize` response element
726
- # indicates by percentage how close the policies and tags for your
727
- # request are to the upper size limit.
736
+ # <note markdown="1"> An Amazon Web Services conversion compresses the passed session
737
+ # policies and session tags into a packed binary format that has a
738
+ # separate limit. Your request can fail for this limit even if your
739
+ # plaintext meets the other requirements. The `PackedPolicySize`
740
+ # response element indicates by percentage how close the policies and
741
+ # tags for your request are to the upper size limit.
728
742
  #
729
743
  # </note>
730
744
  #
@@ -732,10 +746,10 @@ module Aws::STS
732
746
  # credentials. The resulting session's permissions are the
733
747
  # intersection of the role's identity-based policy and the session
734
748
  # policies. You can use the role's temporary credentials in
735
- # subsequent AWS API calls to access resources in the account that
736
- # owns the role. You cannot use session policies to grant more
737
- # permissions than those allowed by the identity-based policy of the
738
- # role that is being assumed. For more information, see [Session
749
+ # subsequent Amazon Web Services API calls to access resources in the
750
+ # account that owns the role. You cannot use session policies to grant
751
+ # more permissions than those allowed by the identity-based policy of
752
+ # the role that is being assumed. For more information, see [Session
739
753
  # Policies][2] in the *IAM User Guide*.
740
754
  #
741
755
  #
@@ -752,11 +766,11 @@ module Aws::STS
752
766
  # returns new temporary credentials. The resulting session's
753
767
  # permissions are the intersection of the role's identity-based
754
768
  # policy and the session policies. You can use the role's temporary
755
- # credentials in subsequent AWS API calls to access resources in the
756
- # account that owns the role. You cannot use session policies to grant
757
- # more permissions than those allowed by the identity-based policy of
758
- # the role that is being assumed. For more information, see [Session
759
- # Policies][1] in the *IAM User Guide*.
769
+ # credentials in subsequent Amazon Web Services API calls to access
770
+ # resources in the account that owns the role. You cannot use session
771
+ # policies to grant more permissions than those allowed by the
772
+ # identity-based policy of the role that is being assumed. For more
773
+ # information, see [Session Policies][1] in the *IAM User Guide*.
760
774
  #
761
775
  # The plaintext that you use for both inline and managed session
762
776
  # policies can't exceed 2,048 characters. The JSON policy characters
@@ -765,12 +779,12 @@ module Aws::STS
765
779
  # include the tab (\\u0009), linefeed (\\u000A), and carriage return
766
780
  # (\\u000D) characters.
767
781
  #
768
- # <note markdown="1"> An AWS conversion compresses the passed session policies and session
769
- # tags into a packed binary format that has a separate limit. Your
770
- # request can fail for this limit even if your plaintext meets the
771
- # other requirements. The `PackedPolicySize` response element
772
- # indicates by percentage how close the policies and tags for your
773
- # request are to the upper size limit.
782
+ # <note markdown="1"> An Amazon Web Services conversion compresses the passed session
783
+ # policies and session tags into a packed binary format that has a
784
+ # separate limit. Your request can fail for this limit even if your
785
+ # plaintext meets the other requirements. The `PackedPolicySize`
786
+ # response element indicates by percentage how close the policies and
787
+ # tags for your request are to the upper size limit.
774
788
  #
775
789
  # </note>
776
790
  #
@@ -797,8 +811,8 @@ module Aws::STS
797
811
  # credentials. The request to the federation endpoint for a console
798
812
  # sign-in token takes a `SessionDuration` parameter that specifies the
799
813
  # maximum length of the console session. For more information, see
800
- # [Creating a URL that Enables Federated Users to Access the AWS
801
- # Management Console][2] in the *IAM User Guide*.
814
+ # [Creating a URL that Enables Federated Users to Access the Amazon
815
+ # Web Services Management Console][2] in the *IAM User Guide*.
802
816
  #
803
817
  # </note>
804
818
  #
@@ -823,8 +837,8 @@ module Aws::STS
823
837
  end
824
838
 
825
839
  # Contains the response to a successful AssumeRoleWithWebIdentity
826
- # request, including temporary AWS credentials that can be used to make
827
- # AWS requests.
840
+ # request, including temporary Amazon Web Services credentials that can
841
+ # be used to make Amazon Web Services requests.
828
842
  #
829
843
  # @!attribute [rw] credentials
830
844
  # The temporary security credentials, which include an access key ID,
@@ -929,7 +943,7 @@ module Aws::STS
929
943
  # @!attribute [rw] assumed_role_id
930
944
  # A unique identifier that contains the role ID and the role session
931
945
  # name of the role that is being assumed. The role ID is generated by
932
- # AWS when the role is created.
946
+ # Amazon Web Services when the role is created.
933
947
  # @return [String]
934
948
  #
935
949
  # @!attribute [rw] arn
@@ -952,7 +966,7 @@ module Aws::STS
952
966
  include Aws::Structure
953
967
  end
954
968
 
955
- # AWS credentials for API authentication.
969
+ # Amazon Web Services credentials for API authentication.
956
970
  #
957
971
  # @!attribute [rw] access_key_id
958
972
  # The access key ID that identifies the temporary security
@@ -1004,10 +1018,10 @@ module Aws::STS
1004
1018
 
1005
1019
  # A document that contains additional information about the
1006
1020
  # authorization status of a request from an encoded message that is
1007
- # returned in response to an AWS request.
1021
+ # returned in response to an Amazon Web Services request.
1008
1022
  #
1009
1023
  # @!attribute [rw] decoded_message
1010
- # An XML document that contains the decoded message.
1024
+ # The API returns a response with the decoded message.
1011
1025
  # @return [String]
1012
1026
  #
1013
1027
  # @see http://docs.aws.amazon.com/goto/WebAPI/sts-2011-06-15/DecodeAuthorizationMessageResponse AWS API Documentation
@@ -1084,7 +1098,7 @@ module Aws::STS
1084
1098
  end
1085
1099
 
1086
1100
  # @!attribute [rw] account
1087
- # The number used to identify the AWS account.
1101
+ # The number used to identify the Amazon Web Services account.
1088
1102
  # @return [String]
1089
1103
  #
1090
1104
  # @see http://docs.aws.amazon.com/goto/WebAPI/sts-2011-06-15/GetAccessKeyInfoResponse AWS API Documentation
@@ -1117,12 +1131,12 @@ module Aws::STS
1117
1131
  # @return [String]
1118
1132
  #
1119
1133
  # @!attribute [rw] account
1120
- # The AWS account ID number of the account that owns or contains the
1121
- # calling entity.
1134
+ # The Amazon Web Services account ID number of the account that owns
1135
+ # or contains the calling entity.
1122
1136
  # @return [String]
1123
1137
  #
1124
1138
  # @!attribute [rw] arn
1125
- # The AWS ARN associated with the calling entity.
1139
+ # The Amazon Web Services ARN associated with the calling entity.
1126
1140
  # @return [String]
1127
1141
  #
1128
1142
  # @see http://docs.aws.amazon.com/goto/WebAPI/sts-2011-06-15/GetCallerIdentityResponse AWS API Documentation
@@ -1202,12 +1216,12 @@ module Aws::STS
1202
1216
  # include the tab (\\u0009), linefeed (\\u000A), and carriage return
1203
1217
  # (\\u000D) characters.
1204
1218
  #
1205
- # <note markdown="1"> An AWS conversion compresses the passed session policies and session
1206
- # tags into a packed binary format that has a separate limit. Your
1207
- # request can fail for this limit even if your plaintext meets the
1208
- # other requirements. The `PackedPolicySize` response element
1209
- # indicates by percentage how close the policies and tags for your
1210
- # request are to the upper size limit.
1219
+ # <note markdown="1"> An Amazon Web Services conversion compresses the passed session
1220
+ # policies and session tags into a packed binary format that has a
1221
+ # separate limit. Your request can fail for this limit even if your
1222
+ # plaintext meets the other requirements. The `PackedPolicySize`
1223
+ # response element indicates by percentage how close the policies and
1224
+ # tags for your request are to the upper size limit.
1211
1225
  #
1212
1226
  # </note>
1213
1227
  #
@@ -1228,8 +1242,9 @@ module Aws::STS
1228
1242
  # policies to use as managed session policies. The plaintext that you
1229
1243
  # use for both inline and managed session policies can't exceed 2,048
1230
1244
  # characters. You can provide up to 10 managed policy ARNs. For more
1231
- # information about ARNs, see [Amazon Resource Names (ARNs) and AWS
1232
- # Service Namespaces][2] in the AWS General Reference.
1245
+ # information about ARNs, see [Amazon Resource Names (ARNs) and Amazon
1246
+ # Web Services Service Namespaces][2] in the Amazon Web Services
1247
+ # General Reference.
1233
1248
  #
1234
1249
  # This parameter is optional. However, if you do not pass any session
1235
1250
  # policies, then the resulting federated user session has no
@@ -1250,12 +1265,12 @@ module Aws::STS
1250
1265
  # are granted in addition to the permissions that are granted by the
1251
1266
  # session policies.
1252
1267
  #
1253
- # <note markdown="1"> An AWS conversion compresses the passed session policies and session
1254
- # tags into a packed binary format that has a separate limit. Your
1255
- # request can fail for this limit even if your plaintext meets the
1256
- # other requirements. The `PackedPolicySize` response element
1257
- # indicates by percentage how close the policies and tags for your
1258
- # request are to the upper size limit.
1268
+ # <note markdown="1"> An Amazon Web Services conversion compresses the passed session
1269
+ # policies and session tags into a packed binary format that has a
1270
+ # separate limit. Your request can fail for this limit even if your
1271
+ # plaintext meets the other requirements. The `PackedPolicySize`
1272
+ # response element indicates by percentage how close the policies and
1273
+ # tags for your request are to the upper size limit.
1259
1274
  #
1260
1275
  # </note>
1261
1276
  #
@@ -1269,10 +1284,11 @@ module Aws::STS
1269
1284
  # The duration, in seconds, that the session should last. Acceptable
1270
1285
  # durations for federation sessions range from 900 seconds (15
1271
1286
  # minutes) to 129,600 seconds (36 hours), with 43,200 seconds (12
1272
- # hours) as the default. Sessions obtained using AWS account root user
1273
- # credentials are restricted to a maximum of 3,600 seconds (one hour).
1274
- # If the specified duration is longer than one hour, the session
1275
- # obtained by using root user credentials defaults to one hour.
1287
+ # hours) as the default. Sessions obtained using Amazon Web Services
1288
+ # account root user credentials are restricted to a maximum of 3,600
1289
+ # seconds (one hour). If the specified duration is longer than one
1290
+ # hour, the session obtained by using root user credentials defaults
1291
+ # to one hour.
1276
1292
  # @return [Integer]
1277
1293
  #
1278
1294
  # @!attribute [rw] tags
@@ -1285,12 +1301,12 @@ module Aws::STS
1285
1301
  # values can’t exceed 256 characters. For these and additional limits,
1286
1302
  # see [IAM and STS Character Limits][2] in the *IAM User Guide*.
1287
1303
  #
1288
- # <note markdown="1"> An AWS conversion compresses the passed session policies and session
1289
- # tags into a packed binary format that has a separate limit. Your
1290
- # request can fail for this limit even if your plaintext meets the
1291
- # other requirements. The `PackedPolicySize` response element
1292
- # indicates by percentage how close the policies and tags for your
1293
- # request are to the upper size limit.
1304
+ # <note markdown="1"> An Amazon Web Services conversion compresses the passed session
1305
+ # policies and session tags into a packed binary format that has a
1306
+ # separate limit. Your request can fail for this limit even if your
1307
+ # plaintext meets the other requirements. The `PackedPolicySize`
1308
+ # response element indicates by percentage how close the policies and
1309
+ # tags for your request are to the upper size limit.
1294
1310
  #
1295
1311
  # </note>
1296
1312
  #
@@ -1325,8 +1341,8 @@ module Aws::STS
1325
1341
  end
1326
1342
 
1327
1343
  # Contains the response to a successful GetFederationToken request,
1328
- # including temporary AWS credentials that can be used to make AWS
1329
- # requests.
1344
+ # including temporary Amazon Web Services credentials that can be used
1345
+ # to make Amazon Web Services requests.
1330
1346
  #
1331
1347
  # @!attribute [rw] credentials
1332
1348
  # The temporary security credentials, which include an access key ID,
@@ -1376,10 +1392,10 @@ module Aws::STS
1376
1392
  # The duration, in seconds, that the credentials should remain valid.
1377
1393
  # Acceptable durations for IAM user sessions range from 900 seconds
1378
1394
  # (15 minutes) to 129,600 seconds (36 hours), with 43,200 seconds (12
1379
- # hours) as the default. Sessions for AWS account owners are
1380
- # restricted to a maximum of 3,600 seconds (one hour). If the duration
1381
- # is longer than one hour, the session for AWS account owners defaults
1382
- # to one hour.
1395
+ # hours) as the default. Sessions for Amazon Web Services account
1396
+ # owners are restricted to a maximum of 3,600 seconds (one hour). If
1397
+ # the duration is longer than one hour, the session for Amazon Web
1398
+ # Services account owners defaults to one hour.
1383
1399
  # @return [Integer]
1384
1400
  #
1385
1401
  # @!attribute [rw] serial_number
@@ -1389,8 +1405,8 @@ module Aws::STS
1389
1405
  # The value is either the serial number for a hardware device (such as
1390
1406
  # `GAHT12345678`) or an Amazon Resource Name (ARN) for a virtual
1391
1407
  # device (such as `arn:aws:iam::123456789012:mfa/user`). You can find
1392
- # the device for an IAM user by going to the AWS Management Console
1393
- # and viewing the user's security credentials.
1408
+ # the device for an IAM user by going to the Amazon Web Services
1409
+ # Management Console and viewing the user's security credentials.
1394
1410
  #
1395
1411
  # The regex used to validate this parameter is a string of characters
1396
1412
  # consisting of upper- and lower-case alphanumeric characters with no
@@ -1421,8 +1437,8 @@ module Aws::STS
1421
1437
  end
1422
1438
 
1423
1439
  # Contains the response to a successful GetSessionToken request,
1424
- # including temporary AWS credentials that can be used to make AWS
1425
- # requests.
1440
+ # including temporary Amazon Web Services credentials that can be used
1441
+ # to make Amazon Web Services requests.
1426
1442
  #
1427
1443
  # @!attribute [rw] credentials
1428
1444
  # The temporary security credentials, which include an access key ID,
@@ -1494,9 +1510,9 @@ module Aws::STS
1494
1510
  include Aws::Structure
1495
1511
  end
1496
1512
 
1497
- # The web identity token that was passed could not be validated by AWS.
1498
- # Get a new identity token from the identity provider and then retry the
1499
- # request.
1513
+ # The web identity token that was passed could not be validated by
1514
+ # Amazon Web Services. Get a new identity token from the identity
1515
+ # provider and then retry the request.
1500
1516
  #
1501
1517
  # @!attribute [rw] message
1502
1518
  # @return [String]
@@ -1524,12 +1540,13 @@ module Aws::STS
1524
1540
  end
1525
1541
 
1526
1542
  # The request was rejected because the total packed size of the session
1527
- # policies and session tags combined was too large. An AWS conversion
1528
- # compresses the session policy document, session policy ARNs, and
1529
- # session tags into a packed binary format that has a separate limit.
1530
- # The error message indicates by percentage how close the policies and
1531
- # tags are to the upper size limit. For more information, see [Passing
1532
- # Session Tags in STS][1] in the *IAM User Guide*.
1543
+ # policies and session tags combined was too large. An Amazon Web
1544
+ # Services conversion compresses the session policy document, session
1545
+ # policy ARNs, and session tags into a packed binary format that has a
1546
+ # separate limit. The error message indicates by percentage how close
1547
+ # the policies and tags are to the upper size limit. For more
1548
+ # information, see [Passing Session Tags in STS][1] in the *IAM User
1549
+ # Guide*.
1533
1550
  #
1534
1551
  # You could receive this error even though you meet other defined
1535
1552
  # session policy and session tag limits. For more information, see [IAM
@@ -1538,7 +1555,7 @@ module Aws::STS
1538
1555
  #
1539
1556
  #
1540
1557
  # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html
1541
- # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html
1558
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-limits-entity-length
1542
1559
  #
1543
1560
  # @!attribute [rw] message
1544
1561
  # @return [String]
@@ -1564,8 +1581,8 @@ module Aws::STS
1564
1581
  # @!attribute [rw] arn
1565
1582
  # The Amazon Resource Name (ARN) of the IAM managed policy to use as a
1566
1583
  # session policy for the role. For more information about ARNs, see
1567
- # [Amazon Resource Names (ARNs) and AWS Service Namespaces][1] in the
1568
- # *AWS General Reference*.
1584
+ # [Amazon Resource Names (ARNs) and Amazon Web Services Service
1585
+ # Namespaces][1] in the *Amazon Web Services General Reference*.
1569
1586
  #
1570
1587
  #
1571
1588
  #
@@ -1583,8 +1600,8 @@ module Aws::STS
1583
1600
  # STS is not activated in the requested region for the account that is
1584
1601
  # being asked to generate credentials. The account administrator must
1585
1602
  # use the IAM console to activate STS in that region. For more
1586
- # information, see [Activating and Deactivating AWS STS in an AWS
1587
- # Region][1] in the *IAM User Guide*.
1603
+ # information, see [Activating and Deactivating Amazon Web Services STS
1604
+ # in an Amazon Web Services Region][1] in the *IAM User Guide*.
1588
1605
  #
1589
1606
  #
1590
1607
  #
@@ -1604,7 +1621,8 @@ module Aws::STS
1604
1621
  # You can pass custom key-value pair attributes when you assume a role
1605
1622
  # or federate a user. These are called session tags. You can then use
1606
1623
  # the session tags to control access to resources. For more information,
1607
- # see [Tagging AWS STS Sessions][1] in the *IAM User Guide*.
1624
+ # see [Tagging Amazon Web Services STS Sessions][1] in the *IAM User
1625
+ # Guide*.
1608
1626
  #
1609
1627
  #
1610
1628
  #