aws-sdk-core 3.125.5 → 3.130.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -27,7 +27,9 @@ require 'aws-sdk-core/plugins/client_metrics_plugin.rb'
27
27
  require 'aws-sdk-core/plugins/client_metrics_send_plugin.rb'
28
28
  require 'aws-sdk-core/plugins/transfer_encoding.rb'
29
29
  require 'aws-sdk-core/plugins/http_checksum.rb'
30
+ require 'aws-sdk-core/plugins/checksum_algorithm.rb'
30
31
  require 'aws-sdk-core/plugins/defaults_mode.rb'
32
+ require 'aws-sdk-core/plugins/recursion_detection.rb'
31
33
  require 'aws-sdk-core/plugins/signature_v4.rb'
32
34
  require 'aws-sdk-core/plugins/protocols/query.rb'
33
35
  require 'aws-sdk-sts/plugins/sts_regional_endpoints.rb'
@@ -75,7 +77,9 @@ module Aws::STS
75
77
  add_plugin(Aws::Plugins::ClientMetricsSendPlugin)
76
78
  add_plugin(Aws::Plugins::TransferEncoding)
77
79
  add_plugin(Aws::Plugins::HttpChecksum)
80
+ add_plugin(Aws::Plugins::ChecksumAlgorithm)
78
81
  add_plugin(Aws::Plugins::DefaultsMode)
82
+ add_plugin(Aws::Plugins::RecursionDetection)
79
83
  add_plugin(Aws::Plugins::SignatureV4)
80
84
  add_plugin(Aws::Plugins::Protocols::Query)
81
85
  add_plugin(Aws::STS::Plugins::STSRegionalEndpoints)
@@ -637,7 +641,7 @@ module Aws::STS
637
641
  #
638
642
  # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html
639
643
  # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-limits.html#reference_iam-limits-entity-length
640
- # [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/session-tags.html#id_session-tags_ctlogs
644
+ # [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html#id_session-tags_ctlogs
641
645
  #
642
646
  # @option params [Array<String>] :transitive_tag_keys
643
647
  # A list of keys for session tags that you want to set as transitive. If
@@ -1175,19 +1179,20 @@ module Aws::STS
1175
1179
 
1176
1180
  # Returns a set of temporary security credentials for users who have
1177
1181
  # been authenticated in a mobile or web application with a web identity
1178
- # provider. Example providers include Amazon Cognito, Login with Amazon,
1179
- # Facebook, Google, or any OpenID Connect-compatible identity provider.
1182
+ # provider. Example providers include the OAuth 2.0 providers Login with
1183
+ # Amazon and Facebook, or any OpenID Connect-compatible identity
1184
+ # provider such as Google or [Amazon Cognito federated identities][1].
1180
1185
  #
1181
1186
  # <note markdown="1"> For mobile applications, we recommend that you use Amazon Cognito. You
1182
1187
  # can use Amazon Cognito with the [Amazon Web Services SDK for iOS
1183
- # Developer Guide][1] and the [Amazon Web Services SDK for Android
1184
- # Developer Guide][2] to uniquely identify a user. You can also supply
1188
+ # Developer Guide][2] and the [Amazon Web Services SDK for Android
1189
+ # Developer Guide][3] to uniquely identify a user. You can also supply
1185
1190
  # the user with a consistent identity throughout the lifetime of an
1186
1191
  # application.
1187
1192
  #
1188
- # To learn more about Amazon Cognito, see [Amazon Cognito Overview][3]
1193
+ # To learn more about Amazon Cognito, see [Amazon Cognito Overview][4]
1189
1194
  # in *Amazon Web Services SDK for Android Developer Guide* and [Amazon
1190
- # Cognito Overview][4] in the *Amazon Web Services SDK for iOS Developer
1195
+ # Cognito Overview][5] in the *Amazon Web Services SDK for iOS Developer
1191
1196
  # Guide*.
1192
1197
  #
1193
1198
  # </note>
@@ -1202,8 +1207,8 @@ module Aws::STS
1202
1207
  # a token from the web identity provider. For a comparison of
1203
1208
  # `AssumeRoleWithWebIdentity` with the other API operations that produce
1204
1209
  # temporary credentials, see [Requesting Temporary Security
1205
- # Credentials][5] and [Comparing the Amazon Web Services STS API
1206
- # operations][6] in the *IAM User Guide*.
1210
+ # Credentials][6] and [Comparing the Amazon Web Services STS API
1211
+ # operations][7] in the *IAM User Guide*.
1207
1212
  #
1208
1213
  # The temporary security credentials returned by this API consist of an
1209
1214
  # access key ID, a secret access key, and a security token. Applications
@@ -1219,11 +1224,11 @@ module Aws::STS
1219
1224
  # to the maximum session duration setting for the role. This setting can
1220
1225
  # have a value from 1 hour to 12 hours. To learn how to view the maximum
1221
1226
  # value for your role, see [View the Maximum Session Duration Setting
1222
- # for a Role][7] in the *IAM User Guide*. The maximum session duration
1227
+ # for a Role][8] in the *IAM User Guide*. The maximum session duration
1223
1228
  # limit applies when you use the `AssumeRole*` API operations or the
1224
1229
  # `assume-role*` CLI commands. However the limit does not apply when you
1225
1230
  # use those operations to create a console URL. For more information,
1226
- # see [Using IAM Roles][8] in the *IAM User Guide*.
1231
+ # see [Using IAM Roles][9] in the *IAM User Guide*.
1227
1232
  #
1228
1233
  # **Permissions**
1229
1234
  #
@@ -1232,7 +1237,7 @@ module Aws::STS
1232
1237
  # Amazon Web Services service with the following exception: you cannot
1233
1238
  # call the STS `GetFederationToken` or `GetSessionToken` API operations.
1234
1239
  #
1235
- # (Optional) You can pass inline or managed [session policies][9] to
1240
+ # (Optional) You can pass inline or managed [session policies][10] to
1236
1241
  # this operation. You can pass a single JSON policy document to use as
1237
1242
  # an inline session policy. You can also specify up to 10 managed
1238
1243
  # policies to use as managed session policies. The plaintext that you
@@ -1244,7 +1249,7 @@ module Aws::STS
1244
1249
  # Services API calls to access resources in the account that owns the
1245
1250
  # role. You cannot use session policies to grant more permissions than
1246
1251
  # those allowed by the identity-based policy of the role that is being
1247
- # assumed. For more information, see [Session Policies][9] in the *IAM
1252
+ # assumed. For more information, see [Session Policies][10] in the *IAM
1248
1253
  # User Guide*.
1249
1254
  #
1250
1255
  # **Tags**
@@ -1252,12 +1257,12 @@ module Aws::STS
1252
1257
  # (Optional) You can configure your IdP to pass attributes into your web
1253
1258
  # identity token as session tags. Each session tag consists of a key
1254
1259
  # name and an associated value. For more information about session tags,
1255
- # see [Passing Session Tags in STS][10] in the *IAM User Guide*.
1260
+ # see [Passing Session Tags in STS][11] in the *IAM User Guide*.
1256
1261
  #
1257
1262
  # You can pass up to 50 session tags. The plaintext session tag keys
1258
1263
  # can’t exceed 128 characters and the values can’t exceed 256
1259
1264
  # characters. For these and additional limits, see [IAM and STS
1260
- # Character Limits][11] in the *IAM User Guide*.
1265
+ # Character Limits][12] in the *IAM User Guide*.
1261
1266
  #
1262
1267
  # <note markdown="1"> An Amazon Web Services conversion compresses the passed session
1263
1268
  # policies and session tags into a packed binary format that has a
@@ -1275,12 +1280,12 @@ module Aws::STS
1275
1280
  # An administrator must grant you the permissions necessary to pass
1276
1281
  # session tags. The administrator can also create granular permissions
1277
1282
  # to allow you to pass only specific session tags. For more information,
1278
- # see [Tutorial: Using Tags for Attribute-Based Access Control][12] in
1283
+ # see [Tutorial: Using Tags for Attribute-Based Access Control][13] in
1279
1284
  # the *IAM User Guide*.
1280
1285
  #
1281
1286
  # You can set the session tags as transitive. Transitive tags persist
1282
1287
  # during role chaining. For more information, see [Chaining Roles with
1283
- # Session Tags][13] in the *IAM User Guide*.
1288
+ # Session Tags][14] in the *IAM User Guide*.
1284
1289
  #
1285
1290
  # **Identities**
1286
1291
  #
@@ -1292,54 +1297,55 @@ module Aws::STS
1292
1297
  # specified in the role's trust policy.
1293
1298
  #
1294
1299
  # Calling `AssumeRoleWithWebIdentity` can result in an entry in your
1295
- # CloudTrail logs. The entry includes the [Subject][14] of the provided
1300
+ # CloudTrail logs. The entry includes the [Subject][15] of the provided
1296
1301
  # web identity token. We recommend that you avoid using any personally
1297
1302
  # identifiable information (PII) in this field. For example, you could
1298
1303
  # instead use a GUID or a pairwise identifier, as [suggested in the OIDC
1299
- # specification][15].
1304
+ # specification][16].
1300
1305
  #
1301
1306
  # For more information about how to use web identity federation and the
1302
1307
  # `AssumeRoleWithWebIdentity` API, see the following resources:
1303
1308
  #
1304
- # * [Using Web Identity Federation API Operations for Mobile Apps][16]
1305
- # and [Federation Through a Web-based Identity Provider][17].
1309
+ # * [Using Web Identity Federation API Operations for Mobile Apps][17]
1310
+ # and [Federation Through a Web-based Identity Provider][18].
1306
1311
  #
1307
- # * [ Web Identity Federation Playground][18]. Walk through the process
1312
+ # * [ Web Identity Federation Playground][19]. Walk through the process
1308
1313
  # of authenticating through Login with Amazon, Facebook, or Google,
1309
1314
  # getting temporary security credentials, and then using those
1310
1315
  # credentials to make a request to Amazon Web Services.
1311
1316
  #
1312
- # * [Amazon Web Services SDK for iOS Developer Guide][1] and [Amazon Web
1313
- # Services SDK for Android Developer Guide][2]. These toolkits contain
1317
+ # * [Amazon Web Services SDK for iOS Developer Guide][2] and [Amazon Web
1318
+ # Services SDK for Android Developer Guide][3]. These toolkits contain
1314
1319
  # sample apps that show how to invoke the identity providers. The
1315
1320
  # toolkits then show how to use the information from these providers
1316
1321
  # to get and use temporary security credentials.
1317
1322
  #
1318
- # * [Web Identity Federation with Mobile Applications][19]. This article
1323
+ # * [Web Identity Federation with Mobile Applications][20]. This article
1319
1324
  # discusses web identity federation and shows an example of how to use
1320
1325
  # web identity federation to get access to content in Amazon S3.
1321
1326
  #
1322
1327
  #
1323
1328
  #
1324
- # [1]: http://aws.amazon.com/sdkforios/
1325
- # [2]: http://aws.amazon.com/sdkforandroid/
1326
- # [3]: https://docs.aws.amazon.com/mobile/sdkforandroid/developerguide/cognito-auth.html#d0e840
1327
- # [4]: https://docs.aws.amazon.com/mobile/sdkforios/developerguide/cognito-auth.html#d0e664
1328
- # [5]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html
1329
- # [6]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#stsapi_comparison
1330
- # [7]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html#id_roles_use_view-role-max-session
1331
- # [8]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html
1332
- # [9]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
1333
- # [10]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html
1334
- # [11]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-limits.html#reference_iam-limits-entity-length
1335
- # [12]: https://docs.aws.amazon.com/IAM/latest/UserGuide/tutorial_attribute-based-access-control.html
1336
- # [13]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html#id_session-tags_role-chaining
1337
- # [14]: http://openid.net/specs/openid-connect-core-1_0.html#Claims
1338
- # [15]: http://openid.net/specs/openid-connect-core-1_0.html#SubjectIDTypes
1339
- # [16]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_oidc_manual.html
1340
- # [17]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#api_assumerolewithwebidentity
1341
- # [18]: https://aws.amazon.com/blogs/aws/the-aws-web-identity-federation-playground/
1342
- # [19]: http://aws.amazon.com/articles/web-identity-federation-with-mobile-applications
1329
+ # [1]: https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-identity.html
1330
+ # [2]: http://aws.amazon.com/sdkforios/
1331
+ # [3]: http://aws.amazon.com/sdkforandroid/
1332
+ # [4]: https://docs.aws.amazon.com/mobile/sdkforandroid/developerguide/cognito-auth.html#d0e840
1333
+ # [5]: https://docs.aws.amazon.com/mobile/sdkforios/developerguide/cognito-auth.html#d0e664
1334
+ # [6]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html
1335
+ # [7]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#stsapi_comparison
1336
+ # [8]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html#id_roles_use_view-role-max-session
1337
+ # [9]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html
1338
+ # [10]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
1339
+ # [11]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html
1340
+ # [12]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-limits.html#reference_iam-limits-entity-length
1341
+ # [13]: https://docs.aws.amazon.com/IAM/latest/UserGuide/tutorial_attribute-based-access-control.html
1342
+ # [14]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html#id_session-tags_role-chaining
1343
+ # [15]: http://openid.net/specs/openid-connect-core-1_0.html#Claims
1344
+ # [16]: http://openid.net/specs/openid-connect-core-1_0.html#SubjectIDTypes
1345
+ # [17]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_oidc_manual.html
1346
+ # [18]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#api_assumerolewithwebidentity
1347
+ # [19]: https://aws.amazon.com/blogs/aws/the-aws-web-identity-federation-playground/
1348
+ # [20]: http://aws.amazon.com/articles/web-identity-federation-with-mobile-applications
1343
1349
  #
1344
1350
  # @option params [required, String] :role_arn
1345
1351
  # The Amazon Resource Name (ARN) of the role that the caller is
@@ -1366,13 +1372,13 @@ module Aws::STS
1366
1372
  # `AssumeRoleWithWebIdentity` call.
1367
1373
  #
1368
1374
  # @option params [String] :provider_id
1369
- # The fully qualified host component of the domain name of the identity
1370
- # provider.
1375
+ # The fully qualified host component of the domain name of the OAuth 2.0
1376
+ # identity provider. Do not specify this value for an OpenID Connect
1377
+ # identity provider.
1371
1378
  #
1372
- # Specify this value only for OAuth 2.0 access tokens. Currently
1373
- # `www.amazon.com` and `graph.facebook.com` are the only supported
1374
- # identity providers for OAuth 2.0 access tokens. Do not include URL
1375
- # schemes and port numbers.
1379
+ # Currently `www.amazon.com` and `graph.facebook.com` are the only
1380
+ # supported identity providers for OAuth 2.0 access tokens. Do not
1381
+ # include URL schemes and port numbers.
1376
1382
  #
1377
1383
  # Do not specify this value for OpenID Connect ID tokens.
1378
1384
  #
@@ -2284,7 +2290,7 @@ module Aws::STS
2284
2290
  params: params,
2285
2291
  config: config)
2286
2292
  context[:gem_name] = 'aws-sdk-core'
2287
- context[:gem_version] = '3.125.5'
2293
+ context[:gem_version] = '3.130.0'
2288
2294
  Seahorse::Client::Request.new(handlers, context)
2289
2295
  end
2290
2296
 
@@ -213,7 +213,7 @@ module Aws::STS
213
213
  #
214
214
  # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html
215
215
  # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-limits.html#reference_iam-limits-entity-length
216
- # [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/session-tags.html#id_session-tags_ctlogs
216
+ # [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html#id_session-tags_ctlogs
217
217
  # @return [Array<Types::Tag>]
218
218
  #
219
219
  # @!attribute [rw] transitive_tag_keys
@@ -710,13 +710,13 @@ module Aws::STS
710
710
  # @return [String]
711
711
  #
712
712
  # @!attribute [rw] provider_id
713
- # The fully qualified host component of the domain name of the
714
- # identity provider.
713
+ # The fully qualified host component of the domain name of the OAuth
714
+ # 2.0 identity provider. Do not specify this value for an OpenID
715
+ # Connect identity provider.
715
716
  #
716
- # Specify this value only for OAuth 2.0 access tokens. Currently
717
- # `www.amazon.com` and `graph.facebook.com` are the only supported
718
- # identity providers for OAuth 2.0 access tokens. Do not include URL
719
- # schemes and port numbers.
717
+ # Currently `www.amazon.com` and `graph.facebook.com` are the only
718
+ # supported identity providers for OAuth 2.0 access tokens. Do not
719
+ # include URL schemes and port numbers.
720
720
  #
721
721
  # Do not specify this value for OpenID Connect ID tokens.
722
722
  # @return [String]
data/lib/aws-sdk-sts.rb CHANGED
@@ -50,6 +50,6 @@ require_relative 'aws-sdk-sts/customizations'
50
50
  # @!group service
51
51
  module Aws::STS
52
52
 
53
- GEM_VERSION = '3.125.5'
53
+ GEM_VERSION = '3.130.0'
54
54
 
55
55
  end
@@ -25,6 +25,9 @@ module Seahorse
25
25
  # @return [Boolean]
26
26
  attr_accessor :http_checksum_required
27
27
 
28
+ # @return [Hash]
29
+ attr_accessor :http_checksum
30
+
28
31
  # @return [Boolean]
29
32
  attr_accessor :deprecated
30
33
 
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-core
3
3
  version: !ruby/object:Gem::Version
4
- version: 3.125.5
4
+ version: 3.130.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2022-01-19 00:00:00.000000000 Z
11
+ date: 2022-03-11 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: jmespath
@@ -139,6 +139,7 @@ files:
139
139
  - lib/aws-sdk-core/plugins/apig_authorizer_token.rb
140
140
  - lib/aws-sdk-core/plugins/apig_credentials_configuration.rb
141
141
  - lib/aws-sdk-core/plugins/apig_user_agent.rb
142
+ - lib/aws-sdk-core/plugins/checksum_algorithm.rb
142
143
  - lib/aws-sdk-core/plugins/client_metrics_plugin.rb
143
144
  - lib/aws-sdk-core/plugins/client_metrics_send_plugin.rb
144
145
  - lib/aws-sdk-core/plugins/credentials_configuration.rb
@@ -161,6 +162,7 @@ files:
161
162
  - lib/aws-sdk-core/plugins/protocols/query.rb
162
163
  - lib/aws-sdk-core/plugins/protocols/rest_json.rb
163
164
  - lib/aws-sdk-core/plugins/protocols/rest_xml.rb
165
+ - lib/aws-sdk-core/plugins/recursion_detection.rb
164
166
  - lib/aws-sdk-core/plugins/regional_endpoint.rb
165
167
  - lib/aws-sdk-core/plugins/response_paging.rb
166
168
  - lib/aws-sdk-core/plugins/retries/client_rate_limiter.rb