aws-sdk-core 3.114.1 → 3.130.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +216 -0
- data/VERSION +1 -1
- data/lib/aws-defaults/default_configuration.rb +153 -0
- data/lib/aws-defaults/defaults_mode_config_resolver.rb +107 -0
- data/lib/aws-defaults.rb +3 -0
- data/lib/aws-sdk-core/assume_role_credentials.rb +19 -0
- data/lib/aws-sdk-core/assume_role_web_identity_credentials.rb +7 -1
- data/lib/aws-sdk-core/client_stubs.rb +5 -1
- data/lib/aws-sdk-core/credential_provider_chain.rb +2 -1
- data/lib/aws-sdk-core/ec2_metadata.rb +27 -7
- data/lib/aws-sdk-core/ecs_credentials.rb +5 -0
- data/lib/aws-sdk-core/errors.rb +5 -1
- data/lib/aws-sdk-core/instance_profile_credentials.rb +119 -18
- data/lib/aws-sdk-core/json/json_engine.rb +10 -8
- data/lib/aws-sdk-core/json/oj_engine.rb +33 -6
- data/lib/aws-sdk-core/json/parser.rb +8 -0
- data/lib/aws-sdk-core/json.rb +8 -26
- data/lib/aws-sdk-core/log/param_filter.rb +9 -1
- data/lib/aws-sdk-core/pageable_response.rb +72 -26
- data/lib/aws-sdk-core/pager.rb +3 -0
- data/lib/aws-sdk-core/param_validator.rb +29 -0
- data/lib/aws-sdk-core/plugins/checksum_algorithm.rb +340 -0
- data/lib/aws-sdk-core/plugins/credentials_configuration.rb +3 -1
- data/lib/aws-sdk-core/plugins/defaults_mode.rb +40 -0
- data/lib/aws-sdk-core/plugins/http_checksum.rb +8 -1
- data/lib/aws-sdk-core/plugins/protocols/api_gateway.rb +17 -0
- data/lib/aws-sdk-core/plugins/protocols/rest_json.rb +16 -1
- data/lib/aws-sdk-core/plugins/recursion_detection.rb +27 -0
- data/lib/aws-sdk-core/plugins/regional_endpoint.rb +47 -1
- data/lib/aws-sdk-core/plugins/response_paging.rb +1 -1
- data/lib/aws-sdk-core/plugins/retries/error_inspector.rb +5 -3
- data/lib/aws-sdk-core/plugins/retry_errors.rb +21 -5
- data/lib/aws-sdk-core/plugins/signature_v4.rb +15 -24
- data/lib/aws-sdk-core/plugins/stub_responses.rb +5 -1
- data/lib/aws-sdk-core/process_credentials.rb +3 -2
- data/lib/aws-sdk-core/refreshing_credentials.rb +40 -11
- data/lib/aws-sdk-core/rest/request/body.rb +19 -1
- data/lib/aws-sdk-core/rest/request/headers.rb +18 -6
- data/lib/aws-sdk-core/rest/response/headers.rb +3 -1
- data/lib/aws-sdk-core/shared_config.rb +27 -8
- data/lib/aws-sdk-core/shared_credentials.rb +7 -1
- data/lib/aws-sdk-core/sso_credentials.rb +8 -3
- data/lib/aws-sdk-core/structure.rb +10 -1
- data/lib/aws-sdk-core/xml/parser/engines/ox.rb +1 -1
- data/lib/aws-sdk-core/xml/parser/engines/rexml.rb +0 -8
- data/lib/aws-sdk-core/xml/parser/frame.rb +23 -0
- data/lib/aws-sdk-core.rb +6 -0
- data/lib/aws-sdk-sso/client.rb +27 -5
- data/lib/aws-sdk-sso.rb +1 -1
- data/lib/aws-sdk-sts/client.rb +424 -415
- data/lib/aws-sdk-sts/plugins/sts_regional_endpoints.rb +5 -1
- data/lib/aws-sdk-sts/presigner.rb +7 -1
- data/lib/aws-sdk-sts/types.rb +199 -181
- data/lib/aws-sdk-sts.rb +1 -1
- data/lib/seahorse/client/configuration.rb +4 -0
- data/lib/seahorse/client/h2/connection.rb +14 -11
- data/lib/seahorse/client/h2/handler.rb +4 -5
- data/lib/seahorse/client/net_http/connection_pool.rb +7 -0
- data/lib/seahorse/client/net_http/handler.rb +15 -7
- data/lib/seahorse/client/net_http/patches.rb +13 -84
- data/lib/seahorse/client/plugins/content_length.rb +11 -5
- data/lib/seahorse/client/plugins/net_http.rb +33 -2
- data/lib/seahorse/model/operation.rb +3 -0
- data/lib/seahorse/model/shapes.rb +25 -0
- metadata +11 -6
- data/lib/aws-sdk-sso/plugins/content_type.rb +0 -25
data/lib/aws-sdk-sts/types.rb
CHANGED
@@ -50,7 +50,7 @@ module Aws::STS
|
|
50
50
|
# role session name is also used in the ARN of the assumed role
|
51
51
|
# principal. This means that subsequent cross-account API requests
|
52
52
|
# that use the temporary security credentials will expose the role
|
53
|
-
# session name to the external account in their
|
53
|
+
# session name to the external account in their CloudTrail logs.
|
54
54
|
#
|
55
55
|
# The regex used to validate this parameter is a string of characters
|
56
56
|
# consisting of upper- and lower-case alphanumeric characters with no
|
@@ -66,15 +66,16 @@ module Aws::STS
|
|
66
66
|
# This parameter is optional. You can provide up to 10 managed policy
|
67
67
|
# ARNs. However, the plaintext that you use for both inline and
|
68
68
|
# managed session policies can't exceed 2,048 characters. For more
|
69
|
-
# information about ARNs, see [Amazon Resource Names (ARNs) and
|
70
|
-
# Service Namespaces][1] in the
|
69
|
+
# information about ARNs, see [Amazon Resource Names (ARNs) and Amazon
|
70
|
+
# Web Services Service Namespaces][1] in the Amazon Web Services
|
71
|
+
# General Reference.
|
71
72
|
#
|
72
|
-
# <note markdown="1"> An
|
73
|
-
# tags into a packed binary format that has a
|
74
|
-
# request can fail for this limit even if your
|
75
|
-
# other requirements. The `PackedPolicySize`
|
76
|
-
# indicates by percentage how close the policies and
|
77
|
-
# request are to the upper size limit.
|
73
|
+
# <note markdown="1"> An Amazon Web Services conversion compresses the passed session
|
74
|
+
# policies and session tags into a packed binary format that has a
|
75
|
+
# separate limit. Your request can fail for this limit even if your
|
76
|
+
# plaintext meets the other requirements. The `PackedPolicySize`
|
77
|
+
# response element indicates by percentage how close the policies and
|
78
|
+
# tags for your request are to the upper size limit.
|
78
79
|
#
|
79
80
|
# </note>
|
80
81
|
#
|
@@ -82,10 +83,10 @@ module Aws::STS
|
|
82
83
|
# credentials. The resulting session's permissions are the
|
83
84
|
# intersection of the role's identity-based policy and the session
|
84
85
|
# policies. You can use the role's temporary credentials in
|
85
|
-
# subsequent
|
86
|
-
# owns the role. You cannot use session policies to grant
|
87
|
-
# permissions than those allowed by the identity-based policy of
|
88
|
-
# role that is being assumed. For more information, see [Session
|
86
|
+
# subsequent Amazon Web Services API calls to access resources in the
|
87
|
+
# account that owns the role. You cannot use session policies to grant
|
88
|
+
# more permissions than those allowed by the identity-based policy of
|
89
|
+
# the role that is being assumed. For more information, see [Session
|
89
90
|
# Policies][2] in the *IAM User Guide*.
|
90
91
|
#
|
91
92
|
#
|
@@ -102,11 +103,11 @@ module Aws::STS
|
|
102
103
|
# returns new temporary credentials. The resulting session's
|
103
104
|
# permissions are the intersection of the role's identity-based
|
104
105
|
# policy and the session policies. You can use the role's temporary
|
105
|
-
# credentials in subsequent
|
106
|
-
# account that owns the role. You cannot use session
|
107
|
-
# more permissions than those allowed by the
|
108
|
-
# the role that is being assumed. For more
|
109
|
-
# Policies][1] in the *IAM User Guide*.
|
106
|
+
# credentials in subsequent Amazon Web Services API calls to access
|
107
|
+
# resources in the account that owns the role. You cannot use session
|
108
|
+
# policies to grant more permissions than those allowed by the
|
109
|
+
# identity-based policy of the role that is being assumed. For more
|
110
|
+
# information, see [Session Policies][1] in the *IAM User Guide*.
|
110
111
|
#
|
111
112
|
# The plaintext that you use for both inline and managed session
|
112
113
|
# policies can't exceed 2,048 characters. The JSON policy characters
|
@@ -115,12 +116,12 @@ module Aws::STS
|
|
115
116
|
# include the tab (\\u0009), linefeed (\\u000A), and carriage return
|
116
117
|
# (\\u000D) characters.
|
117
118
|
#
|
118
|
-
# <note markdown="1"> An
|
119
|
-
# tags into a packed binary format that has a
|
120
|
-
# request can fail for this limit even if your
|
121
|
-
# other requirements. The `PackedPolicySize`
|
122
|
-
# indicates by percentage how close the policies and
|
123
|
-
# request are to the upper size limit.
|
119
|
+
# <note markdown="1"> An Amazon Web Services conversion compresses the passed session
|
120
|
+
# policies and session tags into a packed binary format that has a
|
121
|
+
# separate limit. Your request can fail for this limit even if your
|
122
|
+
# plaintext meets the other requirements. The `PackedPolicySize`
|
123
|
+
# response element indicates by percentage how close the policies and
|
124
|
+
# tags for your request are to the upper size limit.
|
124
125
|
#
|
125
126
|
# </note>
|
126
127
|
#
|
@@ -131,16 +132,25 @@ module Aws::STS
|
|
131
132
|
#
|
132
133
|
# @!attribute [rw] duration_seconds
|
133
134
|
# The duration, in seconds, of the role session. The value specified
|
134
|
-
# can
|
135
|
-
#
|
136
|
-
#
|
137
|
-
#
|
138
|
-
#
|
139
|
-
#
|
140
|
-
#
|
141
|
-
#
|
142
|
-
#
|
143
|
-
#
|
135
|
+
# can range from 900 seconds (15 minutes) up to the maximum session
|
136
|
+
# duration set for the role. The maximum session duration setting can
|
137
|
+
# have a value from 1 hour to 12 hours. If you specify a value higher
|
138
|
+
# than this setting or the administrator setting (whichever is lower),
|
139
|
+
# the operation fails. For example, if you specify a session duration
|
140
|
+
# of 12 hours, but your administrator set the maximum session duration
|
141
|
+
# to 6 hours, your operation fails.
|
142
|
+
#
|
143
|
+
# Role chaining limits your Amazon Web Services CLI or Amazon Web
|
144
|
+
# Services API role session to a maximum of one hour. When you use the
|
145
|
+
# `AssumeRole` API operation to assume a role, you can specify the
|
146
|
+
# duration of your role session with the `DurationSeconds` parameter.
|
147
|
+
# You can specify a parameter value of up to 43200 seconds (12 hours),
|
148
|
+
# depending on the maximum session duration setting for your role.
|
149
|
+
# However, if you assume a role using role chaining and provide a
|
150
|
+
# `DurationSeconds` parameter value greater than one hour, the
|
151
|
+
# operation fails. To learn how to view the maximum value for your
|
152
|
+
# role, see [View the Maximum Session Duration Setting for a Role][1]
|
153
|
+
# in the *IAM User Guide*.
|
144
154
|
#
|
145
155
|
# By default, the value is set to `3600` seconds.
|
146
156
|
#
|
@@ -149,8 +159,8 @@ module Aws::STS
|
|
149
159
|
# credentials. The request to the federation endpoint for a console
|
150
160
|
# sign-in token takes a `SessionDuration` parameter that specifies the
|
151
161
|
# maximum length of the console session. For more information, see
|
152
|
-
# [Creating a URL that Enables Federated Users to Access the
|
153
|
-
# Management Console][2] in the *IAM User Guide*.
|
162
|
+
# [Creating a URL that Enables Federated Users to Access the Amazon
|
163
|
+
# Web Services Management Console][2] in the *IAM User Guide*.
|
154
164
|
#
|
155
165
|
# </note>
|
156
166
|
#
|
@@ -163,20 +173,20 @@ module Aws::STS
|
|
163
173
|
# @!attribute [rw] tags
|
164
174
|
# A list of session tags that you want to pass. Each session tag
|
165
175
|
# consists of a key name and an associated value. For more information
|
166
|
-
# about session tags, see [Tagging
|
167
|
-
# User Guide*.
|
176
|
+
# about session tags, see [Tagging Amazon Web Services STS
|
177
|
+
# Sessions][1] in the *IAM User Guide*.
|
168
178
|
#
|
169
179
|
# This parameter is optional. You can pass up to 50 session tags. The
|
170
180
|
# plaintext session tag keys can’t exceed 128 characters, and the
|
171
181
|
# values can’t exceed 256 characters. For these and additional limits,
|
172
182
|
# see [IAM and STS Character Limits][2] in the *IAM User Guide*.
|
173
183
|
#
|
174
|
-
# <note markdown="1"> An
|
175
|
-
# tags into a packed binary format that has a
|
176
|
-
# request can fail for this limit even if your
|
177
|
-
# other requirements. The `PackedPolicySize`
|
178
|
-
# indicates by percentage how close the policies and
|
179
|
-
# request are to the upper size limit.
|
184
|
+
# <note markdown="1"> An Amazon Web Services conversion compresses the passed session
|
185
|
+
# policies and session tags into a packed binary format that has a
|
186
|
+
# separate limit. Your request can fail for this limit even if your
|
187
|
+
# plaintext meets the other requirements. The `PackedPolicySize`
|
188
|
+
# response element indicates by percentage how close the policies and
|
189
|
+
# tags for your request are to the upper size limit.
|
180
190
|
#
|
181
191
|
# </note>
|
182
192
|
#
|
@@ -196,14 +206,14 @@ module Aws::STS
|
|
196
206
|
# operation, the new session inherits any transitive session tags from
|
197
207
|
# the calling session. If you pass a session tag with the same key as
|
198
208
|
# an inherited tag, the operation fails. To view the inherited tags
|
199
|
-
# for a session, see the
|
200
|
-
#
|
209
|
+
# for a session, see the CloudTrail logs. For more information, see
|
210
|
+
# [Viewing Session Tags in CloudTrail][3] in the *IAM User Guide*.
|
201
211
|
#
|
202
212
|
#
|
203
213
|
#
|
204
214
|
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html
|
205
215
|
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-limits.html#reference_iam-limits-entity-length
|
206
|
-
# [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
216
|
+
# [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html#id_session-tags_ctlogs
|
207
217
|
# @return [Array<Types::Tag>]
|
208
218
|
#
|
209
219
|
# @!attribute [rw] transitive_tag_keys
|
@@ -235,8 +245,8 @@ module Aws::STS
|
|
235
245
|
# the administrator of the trusted account. That way, only someone
|
236
246
|
# with the ID can assume the role, rather than everyone in the
|
237
247
|
# account. For more information about the external ID, see [How to Use
|
238
|
-
# an External ID When Granting Access to Your
|
239
|
-
# Party][1] in the *IAM User Guide*.
|
248
|
+
# an External ID When Granting Access to Your Amazon Web Services
|
249
|
+
# Resources to a Third Party][1] in the *IAM User Guide*.
|
240
250
|
#
|
241
251
|
# The regex used to validate this parameter is a string of characters
|
242
252
|
# consisting of upper- and lower-case alphanumeric characters with no
|
@@ -281,18 +291,19 @@ module Aws::STS
|
|
281
291
|
# You can require users to specify a source identity when they assume
|
282
292
|
# a role. You do this by using the `sts:SourceIdentity` condition key
|
283
293
|
# in a role trust policy. You can use source identity information in
|
284
|
-
#
|
285
|
-
#
|
286
|
-
#
|
287
|
-
# more information about using source identity, see
|
288
|
-
# control actions taken with assumed roles][1] in the
|
289
|
-
# Guide*.
|
294
|
+
# CloudTrail logs to determine who took actions with a role. You can
|
295
|
+
# use the `aws:SourceIdentity` condition key to further control access
|
296
|
+
# to Amazon Web Services resources based on the value of source
|
297
|
+
# identity. For more information about using source identity, see
|
298
|
+
# [Monitor and control actions taken with assumed roles][1] in the
|
299
|
+
# *IAM User Guide*.
|
290
300
|
#
|
291
301
|
# The regex used to validate this parameter is a string of characters
|
292
302
|
# consisting of upper- and lower-case alphanumeric characters with no
|
293
303
|
# spaces. You can also include underscores or any of the following
|
294
304
|
# characters: =,.@-. You cannot use a value that begins with the text
|
295
|
-
# `aws:`. This prefix is reserved for
|
305
|
+
# `aws:`. This prefix is reserved for Amazon Web Services internal
|
306
|
+
# use.
|
296
307
|
#
|
297
308
|
#
|
298
309
|
#
|
@@ -318,7 +329,8 @@ module Aws::STS
|
|
318
329
|
end
|
319
330
|
|
320
331
|
# Contains the response to a successful AssumeRole request, including
|
321
|
-
# temporary
|
332
|
+
# temporary Amazon Web Services credentials that can be used to make
|
333
|
+
# Amazon Web Services requests.
|
322
334
|
#
|
323
335
|
# @!attribute [rw] credentials
|
324
336
|
# The temporary security credentials, which include an access key ID,
|
@@ -354,12 +366,12 @@ module Aws::STS
|
|
354
366
|
# You can require users to specify a source identity when they assume
|
355
367
|
# a role. You do this by using the `sts:SourceIdentity` condition key
|
356
368
|
# in a role trust policy. You can use source identity information in
|
357
|
-
#
|
358
|
-
#
|
359
|
-
#
|
360
|
-
# more information about using source identity, see
|
361
|
-
# control actions taken with assumed roles][1] in the
|
362
|
-
# Guide*.
|
369
|
+
# CloudTrail logs to determine who took actions with a role. You can
|
370
|
+
# use the `aws:SourceIdentity` condition key to further control access
|
371
|
+
# to Amazon Web Services resources based on the value of source
|
372
|
+
# identity. For more information about using source identity, see
|
373
|
+
# [Monitor and control actions taken with assumed roles][1] in the
|
374
|
+
# *IAM User Guide*.
|
363
375
|
#
|
364
376
|
# The regex used to validate this parameter is a string of characters
|
365
377
|
# consisting of upper- and lower-case alphanumeric characters with no
|
@@ -427,15 +439,16 @@ module Aws::STS
|
|
427
439
|
# This parameter is optional. You can provide up to 10 managed policy
|
428
440
|
# ARNs. However, the plaintext that you use for both inline and
|
429
441
|
# managed session policies can't exceed 2,048 characters. For more
|
430
|
-
# information about ARNs, see [Amazon Resource Names (ARNs) and
|
431
|
-
# Service Namespaces][1] in the
|
442
|
+
# information about ARNs, see [Amazon Resource Names (ARNs) and Amazon
|
443
|
+
# Web Services Service Namespaces][1] in the Amazon Web Services
|
444
|
+
# General Reference.
|
432
445
|
#
|
433
|
-
# <note markdown="1"> An
|
434
|
-
# tags into a packed binary format that has a
|
435
|
-
# request can fail for this limit even if your
|
436
|
-
# other requirements. The `PackedPolicySize`
|
437
|
-
# indicates by percentage how close the policies and
|
438
|
-
# request are to the upper size limit.
|
446
|
+
# <note markdown="1"> An Amazon Web Services conversion compresses the passed session
|
447
|
+
# policies and session tags into a packed binary format that has a
|
448
|
+
# separate limit. Your request can fail for this limit even if your
|
449
|
+
# plaintext meets the other requirements. The `PackedPolicySize`
|
450
|
+
# response element indicates by percentage how close the policies and
|
451
|
+
# tags for your request are to the upper size limit.
|
439
452
|
#
|
440
453
|
# </note>
|
441
454
|
#
|
@@ -443,10 +456,10 @@ module Aws::STS
|
|
443
456
|
# credentials. The resulting session's permissions are the
|
444
457
|
# intersection of the role's identity-based policy and the session
|
445
458
|
# policies. You can use the role's temporary credentials in
|
446
|
-
# subsequent
|
447
|
-
# owns the role. You cannot use session policies to grant
|
448
|
-
# permissions than those allowed by the identity-based policy of
|
449
|
-
# role that is being assumed. For more information, see [Session
|
459
|
+
# subsequent Amazon Web Services API calls to access resources in the
|
460
|
+
# account that owns the role. You cannot use session policies to grant
|
461
|
+
# more permissions than those allowed by the identity-based policy of
|
462
|
+
# the role that is being assumed. For more information, see [Session
|
450
463
|
# Policies][2] in the *IAM User Guide*.
|
451
464
|
#
|
452
465
|
#
|
@@ -463,11 +476,11 @@ module Aws::STS
|
|
463
476
|
# returns new temporary credentials. The resulting session's
|
464
477
|
# permissions are the intersection of the role's identity-based
|
465
478
|
# policy and the session policies. You can use the role's temporary
|
466
|
-
# credentials in subsequent
|
467
|
-
# account that owns the role. You cannot use session
|
468
|
-
# more permissions than those allowed by the
|
469
|
-
# the role that is being assumed. For more
|
470
|
-
# Policies][1] in the *IAM User Guide*.
|
479
|
+
# credentials in subsequent Amazon Web Services API calls to access
|
480
|
+
# resources in the account that owns the role. You cannot use session
|
481
|
+
# policies to grant more permissions than those allowed by the
|
482
|
+
# identity-based policy of the role that is being assumed. For more
|
483
|
+
# information, see [Session Policies][1] in the *IAM User Guide*.
|
471
484
|
#
|
472
485
|
# The plaintext that you use for both inline and managed session
|
473
486
|
# policies can't exceed 2,048 characters. The JSON policy characters
|
@@ -476,12 +489,12 @@ module Aws::STS
|
|
476
489
|
# include the tab (\\u0009), linefeed (\\u000A), and carriage return
|
477
490
|
# (\\u000D) characters.
|
478
491
|
#
|
479
|
-
# <note markdown="1"> An
|
480
|
-
# tags into a packed binary format that has a
|
481
|
-
# request can fail for this limit even if your
|
482
|
-
# other requirements. The `PackedPolicySize`
|
483
|
-
# indicates by percentage how close the policies and
|
484
|
-
# request are to the upper size limit.
|
492
|
+
# <note markdown="1"> An Amazon Web Services conversion compresses the passed session
|
493
|
+
# policies and session tags into a packed binary format that has a
|
494
|
+
# separate limit. Your request can fail for this limit even if your
|
495
|
+
# plaintext meets the other requirements. The `PackedPolicySize`
|
496
|
+
# response element indicates by percentage how close the policies and
|
497
|
+
# tags for your request are to the upper size limit.
|
485
498
|
#
|
486
499
|
# </note>
|
487
500
|
#
|
@@ -512,8 +525,8 @@ module Aws::STS
|
|
512
525
|
# credentials. The request to the federation endpoint for a console
|
513
526
|
# sign-in token takes a `SessionDuration` parameter that specifies the
|
514
527
|
# maximum length of the console session. For more information, see
|
515
|
-
# [Creating a URL that Enables Federated Users to Access the
|
516
|
-
# Management Console][2] in the *IAM User Guide*.
|
528
|
+
# [Creating a URL that Enables Federated Users to Access the Amazon
|
529
|
+
# Web Services Management Console][2] in the *IAM User Guide*.
|
517
530
|
#
|
518
531
|
# </note>
|
519
532
|
#
|
@@ -537,8 +550,8 @@ module Aws::STS
|
|
537
550
|
end
|
538
551
|
|
539
552
|
# Contains the response to a successful AssumeRoleWithSAML request,
|
540
|
-
# including temporary
|
541
|
-
# requests.
|
553
|
+
# including temporary Amazon Web Services credentials that can be used
|
554
|
+
# to make Amazon Web Services requests.
|
542
555
|
#
|
543
556
|
# @!attribute [rw] credentials
|
544
557
|
# The temporary security credentials, which include an access key ID,
|
@@ -594,7 +607,7 @@ module Aws::STS
|
|
594
607
|
#
|
595
608
|
# * The `Issuer` response value.
|
596
609
|
#
|
597
|
-
# * The
|
610
|
+
# * The Amazon Web Services account ID.
|
598
611
|
#
|
599
612
|
# * The friendly name (the last part of the ARN) of the SAML provider
|
600
613
|
# in IAM.
|
@@ -697,13 +710,13 @@ module Aws::STS
|
|
697
710
|
# @return [String]
|
698
711
|
#
|
699
712
|
# @!attribute [rw] provider_id
|
700
|
-
# The fully qualified host component of the domain name of the
|
701
|
-
# identity provider.
|
713
|
+
# The fully qualified host component of the domain name of the OAuth
|
714
|
+
# 2.0 identity provider. Do not specify this value for an OpenID
|
715
|
+
# Connect identity provider.
|
702
716
|
#
|
703
|
-
#
|
704
|
-
#
|
705
|
-
#
|
706
|
-
# schemes and port numbers.
|
717
|
+
# Currently `www.amazon.com` and `graph.facebook.com` are the only
|
718
|
+
# supported identity providers for OAuth 2.0 access tokens. Do not
|
719
|
+
# include URL schemes and port numbers.
|
707
720
|
#
|
708
721
|
# Do not specify this value for OpenID Connect ID tokens.
|
709
722
|
# @return [String]
|
@@ -716,15 +729,16 @@ module Aws::STS
|
|
716
729
|
# This parameter is optional. You can provide up to 10 managed policy
|
717
730
|
# ARNs. However, the plaintext that you use for both inline and
|
718
731
|
# managed session policies can't exceed 2,048 characters. For more
|
719
|
-
# information about ARNs, see [Amazon Resource Names (ARNs) and
|
720
|
-
# Service Namespaces][1] in the
|
732
|
+
# information about ARNs, see [Amazon Resource Names (ARNs) and Amazon
|
733
|
+
# Web Services Service Namespaces][1] in the Amazon Web Services
|
734
|
+
# General Reference.
|
721
735
|
#
|
722
|
-
# <note markdown="1"> An
|
723
|
-
# tags into a packed binary format that has a
|
724
|
-
# request can fail for this limit even if your
|
725
|
-
# other requirements. The `PackedPolicySize`
|
726
|
-
# indicates by percentage how close the policies and
|
727
|
-
# request are to the upper size limit.
|
736
|
+
# <note markdown="1"> An Amazon Web Services conversion compresses the passed session
|
737
|
+
# policies and session tags into a packed binary format that has a
|
738
|
+
# separate limit. Your request can fail for this limit even if your
|
739
|
+
# plaintext meets the other requirements. The `PackedPolicySize`
|
740
|
+
# response element indicates by percentage how close the policies and
|
741
|
+
# tags for your request are to the upper size limit.
|
728
742
|
#
|
729
743
|
# </note>
|
730
744
|
#
|
@@ -732,10 +746,10 @@ module Aws::STS
|
|
732
746
|
# credentials. The resulting session's permissions are the
|
733
747
|
# intersection of the role's identity-based policy and the session
|
734
748
|
# policies. You can use the role's temporary credentials in
|
735
|
-
# subsequent
|
736
|
-
# owns the role. You cannot use session policies to grant
|
737
|
-
# permissions than those allowed by the identity-based policy of
|
738
|
-
# role that is being assumed. For more information, see [Session
|
749
|
+
# subsequent Amazon Web Services API calls to access resources in the
|
750
|
+
# account that owns the role. You cannot use session policies to grant
|
751
|
+
# more permissions than those allowed by the identity-based policy of
|
752
|
+
# the role that is being assumed. For more information, see [Session
|
739
753
|
# Policies][2] in the *IAM User Guide*.
|
740
754
|
#
|
741
755
|
#
|
@@ -752,11 +766,11 @@ module Aws::STS
|
|
752
766
|
# returns new temporary credentials. The resulting session's
|
753
767
|
# permissions are the intersection of the role's identity-based
|
754
768
|
# policy and the session policies. You can use the role's temporary
|
755
|
-
# credentials in subsequent
|
756
|
-
# account that owns the role. You cannot use session
|
757
|
-
# more permissions than those allowed by the
|
758
|
-
# the role that is being assumed. For more
|
759
|
-
# Policies][1] in the *IAM User Guide*.
|
769
|
+
# credentials in subsequent Amazon Web Services API calls to access
|
770
|
+
# resources in the account that owns the role. You cannot use session
|
771
|
+
# policies to grant more permissions than those allowed by the
|
772
|
+
# identity-based policy of the role that is being assumed. For more
|
773
|
+
# information, see [Session Policies][1] in the *IAM User Guide*.
|
760
774
|
#
|
761
775
|
# The plaintext that you use for both inline and managed session
|
762
776
|
# policies can't exceed 2,048 characters. The JSON policy characters
|
@@ -765,12 +779,12 @@ module Aws::STS
|
|
765
779
|
# include the tab (\\u0009), linefeed (\\u000A), and carriage return
|
766
780
|
# (\\u000D) characters.
|
767
781
|
#
|
768
|
-
# <note markdown="1"> An
|
769
|
-
# tags into a packed binary format that has a
|
770
|
-
# request can fail for this limit even if your
|
771
|
-
# other requirements. The `PackedPolicySize`
|
772
|
-
# indicates by percentage how close the policies and
|
773
|
-
# request are to the upper size limit.
|
782
|
+
# <note markdown="1"> An Amazon Web Services conversion compresses the passed session
|
783
|
+
# policies and session tags into a packed binary format that has a
|
784
|
+
# separate limit. Your request can fail for this limit even if your
|
785
|
+
# plaintext meets the other requirements. The `PackedPolicySize`
|
786
|
+
# response element indicates by percentage how close the policies and
|
787
|
+
# tags for your request are to the upper size limit.
|
774
788
|
#
|
775
789
|
# </note>
|
776
790
|
#
|
@@ -797,8 +811,8 @@ module Aws::STS
|
|
797
811
|
# credentials. The request to the federation endpoint for a console
|
798
812
|
# sign-in token takes a `SessionDuration` parameter that specifies the
|
799
813
|
# maximum length of the console session. For more information, see
|
800
|
-
# [Creating a URL that Enables Federated Users to Access the
|
801
|
-
# Management Console][2] in the *IAM User Guide*.
|
814
|
+
# [Creating a URL that Enables Federated Users to Access the Amazon
|
815
|
+
# Web Services Management Console][2] in the *IAM User Guide*.
|
802
816
|
#
|
803
817
|
# </note>
|
804
818
|
#
|
@@ -823,8 +837,8 @@ module Aws::STS
|
|
823
837
|
end
|
824
838
|
|
825
839
|
# Contains the response to a successful AssumeRoleWithWebIdentity
|
826
|
-
# request, including temporary
|
827
|
-
#
|
840
|
+
# request, including temporary Amazon Web Services credentials that can
|
841
|
+
# be used to make Amazon Web Services requests.
|
828
842
|
#
|
829
843
|
# @!attribute [rw] credentials
|
830
844
|
# The temporary security credentials, which include an access key ID,
|
@@ -929,7 +943,7 @@ module Aws::STS
|
|
929
943
|
# @!attribute [rw] assumed_role_id
|
930
944
|
# A unique identifier that contains the role ID and the role session
|
931
945
|
# name of the role that is being assumed. The role ID is generated by
|
932
|
-
#
|
946
|
+
# Amazon Web Services when the role is created.
|
933
947
|
# @return [String]
|
934
948
|
#
|
935
949
|
# @!attribute [rw] arn
|
@@ -952,7 +966,7 @@ module Aws::STS
|
|
952
966
|
include Aws::Structure
|
953
967
|
end
|
954
968
|
|
955
|
-
#
|
969
|
+
# Amazon Web Services credentials for API authentication.
|
956
970
|
#
|
957
971
|
# @!attribute [rw] access_key_id
|
958
972
|
# The access key ID that identifies the temporary security
|
@@ -1004,10 +1018,10 @@ module Aws::STS
|
|
1004
1018
|
|
1005
1019
|
# A document that contains additional information about the
|
1006
1020
|
# authorization status of a request from an encoded message that is
|
1007
|
-
# returned in response to an
|
1021
|
+
# returned in response to an Amazon Web Services request.
|
1008
1022
|
#
|
1009
1023
|
# @!attribute [rw] decoded_message
|
1010
|
-
#
|
1024
|
+
# The API returns a response with the decoded message.
|
1011
1025
|
# @return [String]
|
1012
1026
|
#
|
1013
1027
|
# @see http://docs.aws.amazon.com/goto/WebAPI/sts-2011-06-15/DecodeAuthorizationMessageResponse AWS API Documentation
|
@@ -1084,7 +1098,7 @@ module Aws::STS
|
|
1084
1098
|
end
|
1085
1099
|
|
1086
1100
|
# @!attribute [rw] account
|
1087
|
-
# The number used to identify the
|
1101
|
+
# The number used to identify the Amazon Web Services account.
|
1088
1102
|
# @return [String]
|
1089
1103
|
#
|
1090
1104
|
# @see http://docs.aws.amazon.com/goto/WebAPI/sts-2011-06-15/GetAccessKeyInfoResponse AWS API Documentation
|
@@ -1117,12 +1131,12 @@ module Aws::STS
|
|
1117
1131
|
# @return [String]
|
1118
1132
|
#
|
1119
1133
|
# @!attribute [rw] account
|
1120
|
-
# The
|
1121
|
-
# calling entity.
|
1134
|
+
# The Amazon Web Services account ID number of the account that owns
|
1135
|
+
# or contains the calling entity.
|
1122
1136
|
# @return [String]
|
1123
1137
|
#
|
1124
1138
|
# @!attribute [rw] arn
|
1125
|
-
# The
|
1139
|
+
# The Amazon Web Services ARN associated with the calling entity.
|
1126
1140
|
# @return [String]
|
1127
1141
|
#
|
1128
1142
|
# @see http://docs.aws.amazon.com/goto/WebAPI/sts-2011-06-15/GetCallerIdentityResponse AWS API Documentation
|
@@ -1202,12 +1216,12 @@ module Aws::STS
|
|
1202
1216
|
# include the tab (\\u0009), linefeed (\\u000A), and carriage return
|
1203
1217
|
# (\\u000D) characters.
|
1204
1218
|
#
|
1205
|
-
# <note markdown="1"> An
|
1206
|
-
# tags into a packed binary format that has a
|
1207
|
-
# request can fail for this limit even if your
|
1208
|
-
# other requirements. The `PackedPolicySize`
|
1209
|
-
# indicates by percentage how close the policies and
|
1210
|
-
# request are to the upper size limit.
|
1219
|
+
# <note markdown="1"> An Amazon Web Services conversion compresses the passed session
|
1220
|
+
# policies and session tags into a packed binary format that has a
|
1221
|
+
# separate limit. Your request can fail for this limit even if your
|
1222
|
+
# plaintext meets the other requirements. The `PackedPolicySize`
|
1223
|
+
# response element indicates by percentage how close the policies and
|
1224
|
+
# tags for your request are to the upper size limit.
|
1211
1225
|
#
|
1212
1226
|
# </note>
|
1213
1227
|
#
|
@@ -1228,8 +1242,9 @@ module Aws::STS
|
|
1228
1242
|
# policies to use as managed session policies. The plaintext that you
|
1229
1243
|
# use for both inline and managed session policies can't exceed 2,048
|
1230
1244
|
# characters. You can provide up to 10 managed policy ARNs. For more
|
1231
|
-
# information about ARNs, see [Amazon Resource Names (ARNs) and
|
1232
|
-
# Service Namespaces][2] in the
|
1245
|
+
# information about ARNs, see [Amazon Resource Names (ARNs) and Amazon
|
1246
|
+
# Web Services Service Namespaces][2] in the Amazon Web Services
|
1247
|
+
# General Reference.
|
1233
1248
|
#
|
1234
1249
|
# This parameter is optional. However, if you do not pass any session
|
1235
1250
|
# policies, then the resulting federated user session has no
|
@@ -1250,12 +1265,12 @@ module Aws::STS
|
|
1250
1265
|
# are granted in addition to the permissions that are granted by the
|
1251
1266
|
# session policies.
|
1252
1267
|
#
|
1253
|
-
# <note markdown="1"> An
|
1254
|
-
# tags into a packed binary format that has a
|
1255
|
-
# request can fail for this limit even if your
|
1256
|
-
# other requirements. The `PackedPolicySize`
|
1257
|
-
# indicates by percentage how close the policies and
|
1258
|
-
# request are to the upper size limit.
|
1268
|
+
# <note markdown="1"> An Amazon Web Services conversion compresses the passed session
|
1269
|
+
# policies and session tags into a packed binary format that has a
|
1270
|
+
# separate limit. Your request can fail for this limit even if your
|
1271
|
+
# plaintext meets the other requirements. The `PackedPolicySize`
|
1272
|
+
# response element indicates by percentage how close the policies and
|
1273
|
+
# tags for your request are to the upper size limit.
|
1259
1274
|
#
|
1260
1275
|
# </note>
|
1261
1276
|
#
|
@@ -1269,10 +1284,11 @@ module Aws::STS
|
|
1269
1284
|
# The duration, in seconds, that the session should last. Acceptable
|
1270
1285
|
# durations for federation sessions range from 900 seconds (15
|
1271
1286
|
# minutes) to 129,600 seconds (36 hours), with 43,200 seconds (12
|
1272
|
-
# hours) as the default. Sessions obtained using
|
1273
|
-
# credentials are restricted to a maximum of 3,600
|
1274
|
-
# If the specified duration is longer than one
|
1275
|
-
# obtained by using root user credentials defaults
|
1287
|
+
# hours) as the default. Sessions obtained using Amazon Web Services
|
1288
|
+
# account root user credentials are restricted to a maximum of 3,600
|
1289
|
+
# seconds (one hour). If the specified duration is longer than one
|
1290
|
+
# hour, the session obtained by using root user credentials defaults
|
1291
|
+
# to one hour.
|
1276
1292
|
# @return [Integer]
|
1277
1293
|
#
|
1278
1294
|
# @!attribute [rw] tags
|
@@ -1285,12 +1301,12 @@ module Aws::STS
|
|
1285
1301
|
# values can’t exceed 256 characters. For these and additional limits,
|
1286
1302
|
# see [IAM and STS Character Limits][2] in the *IAM User Guide*.
|
1287
1303
|
#
|
1288
|
-
# <note markdown="1"> An
|
1289
|
-
# tags into a packed binary format that has a
|
1290
|
-
# request can fail for this limit even if your
|
1291
|
-
# other requirements. The `PackedPolicySize`
|
1292
|
-
# indicates by percentage how close the policies and
|
1293
|
-
# request are to the upper size limit.
|
1304
|
+
# <note markdown="1"> An Amazon Web Services conversion compresses the passed session
|
1305
|
+
# policies and session tags into a packed binary format that has a
|
1306
|
+
# separate limit. Your request can fail for this limit even if your
|
1307
|
+
# plaintext meets the other requirements. The `PackedPolicySize`
|
1308
|
+
# response element indicates by percentage how close the policies and
|
1309
|
+
# tags for your request are to the upper size limit.
|
1294
1310
|
#
|
1295
1311
|
# </note>
|
1296
1312
|
#
|
@@ -1325,8 +1341,8 @@ module Aws::STS
|
|
1325
1341
|
end
|
1326
1342
|
|
1327
1343
|
# Contains the response to a successful GetFederationToken request,
|
1328
|
-
# including temporary
|
1329
|
-
# requests.
|
1344
|
+
# including temporary Amazon Web Services credentials that can be used
|
1345
|
+
# to make Amazon Web Services requests.
|
1330
1346
|
#
|
1331
1347
|
# @!attribute [rw] credentials
|
1332
1348
|
# The temporary security credentials, which include an access key ID,
|
@@ -1376,10 +1392,10 @@ module Aws::STS
|
|
1376
1392
|
# The duration, in seconds, that the credentials should remain valid.
|
1377
1393
|
# Acceptable durations for IAM user sessions range from 900 seconds
|
1378
1394
|
# (15 minutes) to 129,600 seconds (36 hours), with 43,200 seconds (12
|
1379
|
-
# hours) as the default. Sessions for
|
1380
|
-
# restricted to a maximum of 3,600 seconds (one hour). If
|
1381
|
-
# is longer than one hour, the session for
|
1382
|
-
# to one hour.
|
1395
|
+
# hours) as the default. Sessions for Amazon Web Services account
|
1396
|
+
# owners are restricted to a maximum of 3,600 seconds (one hour). If
|
1397
|
+
# the duration is longer than one hour, the session for Amazon Web
|
1398
|
+
# Services account owners defaults to one hour.
|
1383
1399
|
# @return [Integer]
|
1384
1400
|
#
|
1385
1401
|
# @!attribute [rw] serial_number
|
@@ -1389,8 +1405,8 @@ module Aws::STS
|
|
1389
1405
|
# The value is either the serial number for a hardware device (such as
|
1390
1406
|
# `GAHT12345678`) or an Amazon Resource Name (ARN) for a virtual
|
1391
1407
|
# device (such as `arn:aws:iam::123456789012:mfa/user`). You can find
|
1392
|
-
# the device for an IAM user by going to the
|
1393
|
-
# and viewing the user's security credentials.
|
1408
|
+
# the device for an IAM user by going to the Amazon Web Services
|
1409
|
+
# Management Console and viewing the user's security credentials.
|
1394
1410
|
#
|
1395
1411
|
# The regex used to validate this parameter is a string of characters
|
1396
1412
|
# consisting of upper- and lower-case alphanumeric characters with no
|
@@ -1421,8 +1437,8 @@ module Aws::STS
|
|
1421
1437
|
end
|
1422
1438
|
|
1423
1439
|
# Contains the response to a successful GetSessionToken request,
|
1424
|
-
# including temporary
|
1425
|
-
# requests.
|
1440
|
+
# including temporary Amazon Web Services credentials that can be used
|
1441
|
+
# to make Amazon Web Services requests.
|
1426
1442
|
#
|
1427
1443
|
# @!attribute [rw] credentials
|
1428
1444
|
# The temporary security credentials, which include an access key ID,
|
@@ -1494,9 +1510,9 @@ module Aws::STS
|
|
1494
1510
|
include Aws::Structure
|
1495
1511
|
end
|
1496
1512
|
|
1497
|
-
# The web identity token that was passed could not be validated by
|
1498
|
-
# Get a new identity token from the identity
|
1499
|
-
# request.
|
1513
|
+
# The web identity token that was passed could not be validated by
|
1514
|
+
# Amazon Web Services. Get a new identity token from the identity
|
1515
|
+
# provider and then retry the request.
|
1500
1516
|
#
|
1501
1517
|
# @!attribute [rw] message
|
1502
1518
|
# @return [String]
|
@@ -1524,12 +1540,13 @@ module Aws::STS
|
|
1524
1540
|
end
|
1525
1541
|
|
1526
1542
|
# The request was rejected because the total packed size of the session
|
1527
|
-
# policies and session tags combined was too large. An
|
1528
|
-
# compresses the session policy document, session
|
1529
|
-
# session tags into a packed binary format that has a
|
1530
|
-
# The error message indicates by percentage how close
|
1531
|
-
# tags are to the upper size limit. For more
|
1532
|
-
# Session Tags in STS][1] in the *IAM User
|
1543
|
+
# policies and session tags combined was too large. An Amazon Web
|
1544
|
+
# Services conversion compresses the session policy document, session
|
1545
|
+
# policy ARNs, and session tags into a packed binary format that has a
|
1546
|
+
# separate limit. The error message indicates by percentage how close
|
1547
|
+
# the policies and tags are to the upper size limit. For more
|
1548
|
+
# information, see [Passing Session Tags in STS][1] in the *IAM User
|
1549
|
+
# Guide*.
|
1533
1550
|
#
|
1534
1551
|
# You could receive this error even though you meet other defined
|
1535
1552
|
# session policy and session tag limits. For more information, see [IAM
|
@@ -1538,7 +1555,7 @@ module Aws::STS
|
|
1538
1555
|
#
|
1539
1556
|
#
|
1540
1557
|
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html
|
1541
|
-
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
1558
|
+
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-limits-entity-length
|
1542
1559
|
#
|
1543
1560
|
# @!attribute [rw] message
|
1544
1561
|
# @return [String]
|
@@ -1564,8 +1581,8 @@ module Aws::STS
|
|
1564
1581
|
# @!attribute [rw] arn
|
1565
1582
|
# The Amazon Resource Name (ARN) of the IAM managed policy to use as a
|
1566
1583
|
# session policy for the role. For more information about ARNs, see
|
1567
|
-
# [Amazon Resource Names (ARNs) and
|
1568
|
-
# *
|
1584
|
+
# [Amazon Resource Names (ARNs) and Amazon Web Services Service
|
1585
|
+
# Namespaces][1] in the *Amazon Web Services General Reference*.
|
1569
1586
|
#
|
1570
1587
|
#
|
1571
1588
|
#
|
@@ -1583,8 +1600,8 @@ module Aws::STS
|
|
1583
1600
|
# STS is not activated in the requested region for the account that is
|
1584
1601
|
# being asked to generate credentials. The account administrator must
|
1585
1602
|
# use the IAM console to activate STS in that region. For more
|
1586
|
-
# information, see [Activating and Deactivating
|
1587
|
-
# Region][1] in the *IAM User Guide*.
|
1603
|
+
# information, see [Activating and Deactivating Amazon Web Services STS
|
1604
|
+
# in an Amazon Web Services Region][1] in the *IAM User Guide*.
|
1588
1605
|
#
|
1589
1606
|
#
|
1590
1607
|
#
|
@@ -1604,7 +1621,8 @@ module Aws::STS
|
|
1604
1621
|
# You can pass custom key-value pair attributes when you assume a role
|
1605
1622
|
# or federate a user. These are called session tags. You can then use
|
1606
1623
|
# the session tags to control access to resources. For more information,
|
1607
|
-
# see [Tagging
|
1624
|
+
# see [Tagging Amazon Web Services STS Sessions][1] in the *IAM User
|
1625
|
+
# Guide*.
|
1608
1626
|
#
|
1609
1627
|
#
|
1610
1628
|
#
|