aws-sdk-core 3.125.5 → 3.130.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +59 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-core/assume_role_credentials.rb +19 -0
- data/lib/aws-sdk-core/assume_role_web_identity_credentials.rb +7 -1
- data/lib/aws-sdk-core/client_stubs.rb +5 -1
- data/lib/aws-sdk-core/ec2_metadata.rb +3 -2
- data/lib/aws-sdk-core/ecs_credentials.rb +5 -0
- data/lib/aws-sdk-core/errors.rb +1 -1
- data/lib/aws-sdk-core/instance_profile_credentials.rb +80 -14
- data/lib/aws-sdk-core/pageable_response.rb +72 -32
- data/lib/aws-sdk-core/plugins/checksum_algorithm.rb +340 -0
- data/lib/aws-sdk-core/plugins/http_checksum.rb +8 -1
- data/lib/aws-sdk-core/plugins/recursion_detection.rb +27 -0
- data/lib/aws-sdk-core/plugins/response_paging.rb +1 -1
- data/lib/aws-sdk-core/plugins/retries/error_inspector.rb +1 -1
- data/lib/aws-sdk-core/plugins/signature_v4.rb +2 -1
- data/lib/aws-sdk-core/plugins/stub_responses.rb +5 -1
- data/lib/aws-sdk-core/process_credentials.rb +3 -2
- data/lib/aws-sdk-core/refreshing_credentials.rb +40 -11
- data/lib/aws-sdk-core/shared_config.rb +1 -6
- data/lib/aws-sdk-core/sso_credentials.rb +6 -0
- data/lib/aws-sdk-sso/client.rb +5 -1
- data/lib/aws-sdk-sso.rb +1 -1
- data/lib/aws-sdk-sts/client.rb +57 -51
- data/lib/aws-sdk-sts/types.rb +7 -7
- data/lib/aws-sdk-sts.rb +1 -1
- data/lib/seahorse/model/operation.rb +3 -0
- metadata +4 -2
data/lib/aws-sdk-sts/client.rb
CHANGED
@@ -27,7 +27,9 @@ require 'aws-sdk-core/plugins/client_metrics_plugin.rb'
|
|
27
27
|
require 'aws-sdk-core/plugins/client_metrics_send_plugin.rb'
|
28
28
|
require 'aws-sdk-core/plugins/transfer_encoding.rb'
|
29
29
|
require 'aws-sdk-core/plugins/http_checksum.rb'
|
30
|
+
require 'aws-sdk-core/plugins/checksum_algorithm.rb'
|
30
31
|
require 'aws-sdk-core/plugins/defaults_mode.rb'
|
32
|
+
require 'aws-sdk-core/plugins/recursion_detection.rb'
|
31
33
|
require 'aws-sdk-core/plugins/signature_v4.rb'
|
32
34
|
require 'aws-sdk-core/plugins/protocols/query.rb'
|
33
35
|
require 'aws-sdk-sts/plugins/sts_regional_endpoints.rb'
|
@@ -75,7 +77,9 @@ module Aws::STS
|
|
75
77
|
add_plugin(Aws::Plugins::ClientMetricsSendPlugin)
|
76
78
|
add_plugin(Aws::Plugins::TransferEncoding)
|
77
79
|
add_plugin(Aws::Plugins::HttpChecksum)
|
80
|
+
add_plugin(Aws::Plugins::ChecksumAlgorithm)
|
78
81
|
add_plugin(Aws::Plugins::DefaultsMode)
|
82
|
+
add_plugin(Aws::Plugins::RecursionDetection)
|
79
83
|
add_plugin(Aws::Plugins::SignatureV4)
|
80
84
|
add_plugin(Aws::Plugins::Protocols::Query)
|
81
85
|
add_plugin(Aws::STS::Plugins::STSRegionalEndpoints)
|
@@ -637,7 +641,7 @@ module Aws::STS
|
|
637
641
|
#
|
638
642
|
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html
|
639
643
|
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-limits.html#reference_iam-limits-entity-length
|
640
|
-
# [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
644
|
+
# [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html#id_session-tags_ctlogs
|
641
645
|
#
|
642
646
|
# @option params [Array<String>] :transitive_tag_keys
|
643
647
|
# A list of keys for session tags that you want to set as transitive. If
|
@@ -1175,19 +1179,20 @@ module Aws::STS
|
|
1175
1179
|
|
1176
1180
|
# Returns a set of temporary security credentials for users who have
|
1177
1181
|
# been authenticated in a mobile or web application with a web identity
|
1178
|
-
# provider. Example providers include
|
1179
|
-
# Facebook,
|
1182
|
+
# provider. Example providers include the OAuth 2.0 providers Login with
|
1183
|
+
# Amazon and Facebook, or any OpenID Connect-compatible identity
|
1184
|
+
# provider such as Google or [Amazon Cognito federated identities][1].
|
1180
1185
|
#
|
1181
1186
|
# <note markdown="1"> For mobile applications, we recommend that you use Amazon Cognito. You
|
1182
1187
|
# can use Amazon Cognito with the [Amazon Web Services SDK for iOS
|
1183
|
-
# Developer Guide][
|
1184
|
-
# Developer Guide][
|
1188
|
+
# Developer Guide][2] and the [Amazon Web Services SDK for Android
|
1189
|
+
# Developer Guide][3] to uniquely identify a user. You can also supply
|
1185
1190
|
# the user with a consistent identity throughout the lifetime of an
|
1186
1191
|
# application.
|
1187
1192
|
#
|
1188
|
-
# To learn more about Amazon Cognito, see [Amazon Cognito Overview][
|
1193
|
+
# To learn more about Amazon Cognito, see [Amazon Cognito Overview][4]
|
1189
1194
|
# in *Amazon Web Services SDK for Android Developer Guide* and [Amazon
|
1190
|
-
# Cognito Overview][
|
1195
|
+
# Cognito Overview][5] in the *Amazon Web Services SDK for iOS Developer
|
1191
1196
|
# Guide*.
|
1192
1197
|
#
|
1193
1198
|
# </note>
|
@@ -1202,8 +1207,8 @@ module Aws::STS
|
|
1202
1207
|
# a token from the web identity provider. For a comparison of
|
1203
1208
|
# `AssumeRoleWithWebIdentity` with the other API operations that produce
|
1204
1209
|
# temporary credentials, see [Requesting Temporary Security
|
1205
|
-
# Credentials][
|
1206
|
-
# operations][
|
1210
|
+
# Credentials][6] and [Comparing the Amazon Web Services STS API
|
1211
|
+
# operations][7] in the *IAM User Guide*.
|
1207
1212
|
#
|
1208
1213
|
# The temporary security credentials returned by this API consist of an
|
1209
1214
|
# access key ID, a secret access key, and a security token. Applications
|
@@ -1219,11 +1224,11 @@ module Aws::STS
|
|
1219
1224
|
# to the maximum session duration setting for the role. This setting can
|
1220
1225
|
# have a value from 1 hour to 12 hours. To learn how to view the maximum
|
1221
1226
|
# value for your role, see [View the Maximum Session Duration Setting
|
1222
|
-
# for a Role][
|
1227
|
+
# for a Role][8] in the *IAM User Guide*. The maximum session duration
|
1223
1228
|
# limit applies when you use the `AssumeRole*` API operations or the
|
1224
1229
|
# `assume-role*` CLI commands. However the limit does not apply when you
|
1225
1230
|
# use those operations to create a console URL. For more information,
|
1226
|
-
# see [Using IAM Roles][
|
1231
|
+
# see [Using IAM Roles][9] in the *IAM User Guide*.
|
1227
1232
|
#
|
1228
1233
|
# **Permissions**
|
1229
1234
|
#
|
@@ -1232,7 +1237,7 @@ module Aws::STS
|
|
1232
1237
|
# Amazon Web Services service with the following exception: you cannot
|
1233
1238
|
# call the STS `GetFederationToken` or `GetSessionToken` API operations.
|
1234
1239
|
#
|
1235
|
-
# (Optional) You can pass inline or managed [session policies][
|
1240
|
+
# (Optional) You can pass inline or managed [session policies][10] to
|
1236
1241
|
# this operation. You can pass a single JSON policy document to use as
|
1237
1242
|
# an inline session policy. You can also specify up to 10 managed
|
1238
1243
|
# policies to use as managed session policies. The plaintext that you
|
@@ -1244,7 +1249,7 @@ module Aws::STS
|
|
1244
1249
|
# Services API calls to access resources in the account that owns the
|
1245
1250
|
# role. You cannot use session policies to grant more permissions than
|
1246
1251
|
# those allowed by the identity-based policy of the role that is being
|
1247
|
-
# assumed. For more information, see [Session Policies][
|
1252
|
+
# assumed. For more information, see [Session Policies][10] in the *IAM
|
1248
1253
|
# User Guide*.
|
1249
1254
|
#
|
1250
1255
|
# **Tags**
|
@@ -1252,12 +1257,12 @@ module Aws::STS
|
|
1252
1257
|
# (Optional) You can configure your IdP to pass attributes into your web
|
1253
1258
|
# identity token as session tags. Each session tag consists of a key
|
1254
1259
|
# name and an associated value. For more information about session tags,
|
1255
|
-
# see [Passing Session Tags in STS][
|
1260
|
+
# see [Passing Session Tags in STS][11] in the *IAM User Guide*.
|
1256
1261
|
#
|
1257
1262
|
# You can pass up to 50 session tags. The plaintext session tag keys
|
1258
1263
|
# can’t exceed 128 characters and the values can’t exceed 256
|
1259
1264
|
# characters. For these and additional limits, see [IAM and STS
|
1260
|
-
# Character Limits][
|
1265
|
+
# Character Limits][12] in the *IAM User Guide*.
|
1261
1266
|
#
|
1262
1267
|
# <note markdown="1"> An Amazon Web Services conversion compresses the passed session
|
1263
1268
|
# policies and session tags into a packed binary format that has a
|
@@ -1275,12 +1280,12 @@ module Aws::STS
|
|
1275
1280
|
# An administrator must grant you the permissions necessary to pass
|
1276
1281
|
# session tags. The administrator can also create granular permissions
|
1277
1282
|
# to allow you to pass only specific session tags. For more information,
|
1278
|
-
# see [Tutorial: Using Tags for Attribute-Based Access Control][
|
1283
|
+
# see [Tutorial: Using Tags for Attribute-Based Access Control][13] in
|
1279
1284
|
# the *IAM User Guide*.
|
1280
1285
|
#
|
1281
1286
|
# You can set the session tags as transitive. Transitive tags persist
|
1282
1287
|
# during role chaining. For more information, see [Chaining Roles with
|
1283
|
-
# Session Tags][
|
1288
|
+
# Session Tags][14] in the *IAM User Guide*.
|
1284
1289
|
#
|
1285
1290
|
# **Identities**
|
1286
1291
|
#
|
@@ -1292,54 +1297,55 @@ module Aws::STS
|
|
1292
1297
|
# specified in the role's trust policy.
|
1293
1298
|
#
|
1294
1299
|
# Calling `AssumeRoleWithWebIdentity` can result in an entry in your
|
1295
|
-
# CloudTrail logs. The entry includes the [Subject][
|
1300
|
+
# CloudTrail logs. The entry includes the [Subject][15] of the provided
|
1296
1301
|
# web identity token. We recommend that you avoid using any personally
|
1297
1302
|
# identifiable information (PII) in this field. For example, you could
|
1298
1303
|
# instead use a GUID or a pairwise identifier, as [suggested in the OIDC
|
1299
|
-
# specification][
|
1304
|
+
# specification][16].
|
1300
1305
|
#
|
1301
1306
|
# For more information about how to use web identity federation and the
|
1302
1307
|
# `AssumeRoleWithWebIdentity` API, see the following resources:
|
1303
1308
|
#
|
1304
|
-
# * [Using Web Identity Federation API Operations for Mobile Apps][
|
1305
|
-
# and [Federation Through a Web-based Identity Provider][
|
1309
|
+
# * [Using Web Identity Federation API Operations for Mobile Apps][17]
|
1310
|
+
# and [Federation Through a Web-based Identity Provider][18].
|
1306
1311
|
#
|
1307
|
-
# * [ Web Identity Federation Playground][
|
1312
|
+
# * [ Web Identity Federation Playground][19]. Walk through the process
|
1308
1313
|
# of authenticating through Login with Amazon, Facebook, or Google,
|
1309
1314
|
# getting temporary security credentials, and then using those
|
1310
1315
|
# credentials to make a request to Amazon Web Services.
|
1311
1316
|
#
|
1312
|
-
# * [Amazon Web Services SDK for iOS Developer Guide][
|
1313
|
-
# Services SDK for Android Developer Guide][
|
1317
|
+
# * [Amazon Web Services SDK for iOS Developer Guide][2] and [Amazon Web
|
1318
|
+
# Services SDK for Android Developer Guide][3]. These toolkits contain
|
1314
1319
|
# sample apps that show how to invoke the identity providers. The
|
1315
1320
|
# toolkits then show how to use the information from these providers
|
1316
1321
|
# to get and use temporary security credentials.
|
1317
1322
|
#
|
1318
|
-
# * [Web Identity Federation with Mobile Applications][
|
1323
|
+
# * [Web Identity Federation with Mobile Applications][20]. This article
|
1319
1324
|
# discusses web identity federation and shows an example of how to use
|
1320
1325
|
# web identity federation to get access to content in Amazon S3.
|
1321
1326
|
#
|
1322
1327
|
#
|
1323
1328
|
#
|
1324
|
-
# [1]:
|
1325
|
-
# [2]: http://aws.amazon.com/
|
1326
|
-
# [3]:
|
1327
|
-
# [4]: https://docs.aws.amazon.com/mobile/
|
1328
|
-
# [5]: https://docs.aws.amazon.com/
|
1329
|
-
# [6]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html
|
1330
|
-
# [7]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
1331
|
-
# [8]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html
|
1332
|
-
# [9]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
1333
|
-
# [10]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
1334
|
-
# [11]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
1335
|
-
# [12]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
1336
|
-
# [13]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
1337
|
-
# [14]:
|
1338
|
-
# [15]: http://openid.net/specs/openid-connect-core-1_0.html#
|
1339
|
-
# [16]:
|
1340
|
-
# [17]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
1341
|
-
# [18]: https://aws.amazon.com/
|
1342
|
-
# [19]:
|
1329
|
+
# [1]: https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-identity.html
|
1330
|
+
# [2]: http://aws.amazon.com/sdkforios/
|
1331
|
+
# [3]: http://aws.amazon.com/sdkforandroid/
|
1332
|
+
# [4]: https://docs.aws.amazon.com/mobile/sdkforandroid/developerguide/cognito-auth.html#d0e840
|
1333
|
+
# [5]: https://docs.aws.amazon.com/mobile/sdkforios/developerguide/cognito-auth.html#d0e664
|
1334
|
+
# [6]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html
|
1335
|
+
# [7]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#stsapi_comparison
|
1336
|
+
# [8]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html#id_roles_use_view-role-max-session
|
1337
|
+
# [9]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html
|
1338
|
+
# [10]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
|
1339
|
+
# [11]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html
|
1340
|
+
# [12]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-limits.html#reference_iam-limits-entity-length
|
1341
|
+
# [13]: https://docs.aws.amazon.com/IAM/latest/UserGuide/tutorial_attribute-based-access-control.html
|
1342
|
+
# [14]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html#id_session-tags_role-chaining
|
1343
|
+
# [15]: http://openid.net/specs/openid-connect-core-1_0.html#Claims
|
1344
|
+
# [16]: http://openid.net/specs/openid-connect-core-1_0.html#SubjectIDTypes
|
1345
|
+
# [17]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_oidc_manual.html
|
1346
|
+
# [18]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#api_assumerolewithwebidentity
|
1347
|
+
# [19]: https://aws.amazon.com/blogs/aws/the-aws-web-identity-federation-playground/
|
1348
|
+
# [20]: http://aws.amazon.com/articles/web-identity-federation-with-mobile-applications
|
1343
1349
|
#
|
1344
1350
|
# @option params [required, String] :role_arn
|
1345
1351
|
# The Amazon Resource Name (ARN) of the role that the caller is
|
@@ -1366,13 +1372,13 @@ module Aws::STS
|
|
1366
1372
|
# `AssumeRoleWithWebIdentity` call.
|
1367
1373
|
#
|
1368
1374
|
# @option params [String] :provider_id
|
1369
|
-
# The fully qualified host component of the domain name of the
|
1370
|
-
# provider.
|
1375
|
+
# The fully qualified host component of the domain name of the OAuth 2.0
|
1376
|
+
# identity provider. Do not specify this value for an OpenID Connect
|
1377
|
+
# identity provider.
|
1371
1378
|
#
|
1372
|
-
#
|
1373
|
-
#
|
1374
|
-
#
|
1375
|
-
# schemes and port numbers.
|
1379
|
+
# Currently `www.amazon.com` and `graph.facebook.com` are the only
|
1380
|
+
# supported identity providers for OAuth 2.0 access tokens. Do not
|
1381
|
+
# include URL schemes and port numbers.
|
1376
1382
|
#
|
1377
1383
|
# Do not specify this value for OpenID Connect ID tokens.
|
1378
1384
|
#
|
@@ -2284,7 +2290,7 @@ module Aws::STS
|
|
2284
2290
|
params: params,
|
2285
2291
|
config: config)
|
2286
2292
|
context[:gem_name] = 'aws-sdk-core'
|
2287
|
-
context[:gem_version] = '3.
|
2293
|
+
context[:gem_version] = '3.130.0'
|
2288
2294
|
Seahorse::Client::Request.new(handlers, context)
|
2289
2295
|
end
|
2290
2296
|
|
data/lib/aws-sdk-sts/types.rb
CHANGED
@@ -213,7 +213,7 @@ module Aws::STS
|
|
213
213
|
#
|
214
214
|
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html
|
215
215
|
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-limits.html#reference_iam-limits-entity-length
|
216
|
-
# [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
216
|
+
# [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html#id_session-tags_ctlogs
|
217
217
|
# @return [Array<Types::Tag>]
|
218
218
|
#
|
219
219
|
# @!attribute [rw] transitive_tag_keys
|
@@ -710,13 +710,13 @@ module Aws::STS
|
|
710
710
|
# @return [String]
|
711
711
|
#
|
712
712
|
# @!attribute [rw] provider_id
|
713
|
-
# The fully qualified host component of the domain name of the
|
714
|
-
# identity provider.
|
713
|
+
# The fully qualified host component of the domain name of the OAuth
|
714
|
+
# 2.0 identity provider. Do not specify this value for an OpenID
|
715
|
+
# Connect identity provider.
|
715
716
|
#
|
716
|
-
#
|
717
|
-
#
|
718
|
-
#
|
719
|
-
# schemes and port numbers.
|
717
|
+
# Currently `www.amazon.com` and `graph.facebook.com` are the only
|
718
|
+
# supported identity providers for OAuth 2.0 access tokens. Do not
|
719
|
+
# include URL schemes and port numbers.
|
720
720
|
#
|
721
721
|
# Do not specify this value for OpenID Connect ID tokens.
|
722
722
|
# @return [String]
|
data/lib/aws-sdk-sts.rb
CHANGED
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: aws-sdk-core
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 3.
|
4
|
+
version: 3.130.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Amazon Web Services
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2022-
|
11
|
+
date: 2022-03-11 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: jmespath
|
@@ -139,6 +139,7 @@ files:
|
|
139
139
|
- lib/aws-sdk-core/plugins/apig_authorizer_token.rb
|
140
140
|
- lib/aws-sdk-core/plugins/apig_credentials_configuration.rb
|
141
141
|
- lib/aws-sdk-core/plugins/apig_user_agent.rb
|
142
|
+
- lib/aws-sdk-core/plugins/checksum_algorithm.rb
|
142
143
|
- lib/aws-sdk-core/plugins/client_metrics_plugin.rb
|
143
144
|
- lib/aws-sdk-core/plugins/client_metrics_send_plugin.rb
|
144
145
|
- lib/aws-sdk-core/plugins/credentials_configuration.rb
|
@@ -161,6 +162,7 @@ files:
|
|
161
162
|
- lib/aws-sdk-core/plugins/protocols/query.rb
|
162
163
|
- lib/aws-sdk-core/plugins/protocols/rest_json.rb
|
163
164
|
- lib/aws-sdk-core/plugins/protocols/rest_xml.rb
|
165
|
+
- lib/aws-sdk-core/plugins/recursion_detection.rb
|
164
166
|
- lib/aws-sdk-core/plugins/regional_endpoint.rb
|
165
167
|
- lib/aws-sdk-core/plugins/response_paging.rb
|
166
168
|
- lib/aws-sdk-core/plugins/retries/client_rate_limiter.rb
|