aws-sdk-core 3.165.0 → 3.174.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +105 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-core/credential_provider_chain.rb +8 -5
- data/lib/aws-sdk-core/ecs_credentials.rb +111 -53
- data/lib/aws-sdk-core/endpoints/condition.rb +5 -0
- data/lib/aws-sdk-core/endpoints/endpoint_rule.rb +5 -1
- data/lib/aws-sdk-core/endpoints/error_rule.rb +5 -0
- data/lib/aws-sdk-core/endpoints/function.rb +5 -0
- data/lib/aws-sdk-core/endpoints/reference.rb +5 -0
- data/lib/aws-sdk-core/endpoints/rule.rb +5 -0
- data/lib/aws-sdk-core/endpoints/rule_set.rb +5 -0
- data/lib/aws-sdk-core/endpoints/rules_provider.rb +5 -0
- data/lib/aws-sdk-core/endpoints/templater.rb +6 -0
- data/lib/aws-sdk-core/endpoints/tree_rule.rb +5 -0
- data/lib/aws-sdk-core/endpoints/url.rb +1 -0
- data/lib/aws-sdk-core/json/error_handler.rb +15 -5
- data/lib/aws-sdk-core/log/formatter.rb +6 -0
- data/lib/aws-sdk-core/pageable_response.rb +3 -1
- data/lib/aws-sdk-core/plugins/checksum_algorithm.rb +1 -1
- data/lib/aws-sdk-core/plugins/retries/error_inspector.rb +2 -1
- data/lib/aws-sdk-core/plugins/sign.rb +17 -7
- data/lib/aws-sdk-core/plugins/user_agent.rb +117 -14
- data/lib/aws-sdk-core/shared_config.rb +38 -9
- data/lib/aws-sdk-core/sso_credentials.rb +79 -44
- data/lib/aws-sdk-core/sso_token_provider.rb +3 -2
- data/lib/aws-sdk-core/waiters/poller.rb +3 -1
- data/lib/aws-sdk-core/xml/parser/engines/oga.rb +2 -0
- data/lib/aws-sdk-core.rb +1 -0
- data/lib/aws-sdk-sso/client.rb +6 -1
- data/lib/aws-sdk-sso/endpoint_provider.rb +35 -96
- data/lib/aws-sdk-sso/types.rb +0 -35
- data/lib/aws-sdk-sso.rb +1 -1
- data/lib/aws-sdk-ssooidc/client.rb +6 -1
- data/lib/aws-sdk-ssooidc/endpoint_provider.rb +35 -95
- data/lib/aws-sdk-ssooidc/types.rb +0 -32
- data/lib/aws-sdk-ssooidc.rb +1 -1
- data/lib/aws-sdk-sts/client.rb +244 -241
- data/lib/aws-sdk-sts/endpoint_provider.rb +96 -213
- data/lib/aws-sdk-sts/types.rb +87 -195
- data/lib/aws-sdk-sts.rb +1 -1
- data/lib/seahorse/client/h2/connection.rb +12 -11
- metadata +4 -4
    
        data/lib/aws-sdk-sts/client.rb
    CHANGED
    
    | @@ -277,6 +277,11 @@ module Aws::STS | |
| 277 277 | 
             
                #       in the future.
         | 
| 278 278 | 
             
                #
         | 
| 279 279 | 
             
                #
         | 
| 280 | 
            +
                #   @option options [String] :sdk_ua_app_id
         | 
| 281 | 
            +
                #     A unique and opaque application ID that is appended to the
         | 
| 282 | 
            +
                #     User-Agent header as app/<sdk_ua_app_id>. It should have a
         | 
| 283 | 
            +
                #     maximum length of 50.
         | 
| 284 | 
            +
                #
         | 
| 280 285 | 
             
                #   @option options [String] :secret_access_key
         | 
| 281 286 | 
             
                #
         | 
| 282 287 | 
             
                #   @option options [String] :session_token
         | 
| @@ -376,14 +381,13 @@ module Aws::STS | |
| 376 381 | 
             
                # @!group API Operations
         | 
| 377 382 |  | 
| 378 383 | 
             
                # Returns a set of temporary security credentials that you can use to
         | 
| 379 | 
            -
                # access Amazon Web Services resources  | 
| 380 | 
            -
                #  | 
| 381 | 
            -
                #  | 
| 382 | 
            -
                #  | 
| 383 | 
            -
                #  | 
| 384 | 
            -
                #  | 
| 385 | 
            -
                #  | 
| 386 | 
            -
                # operations][2] in the *IAM User Guide*.
         | 
| 384 | 
            +
                # access Amazon Web Services resources. These temporary credentials
         | 
| 385 | 
            +
                # consist of an access key ID, a secret access key, and a security
         | 
| 386 | 
            +
                # token. Typically, you use `AssumeRole` within your account or for
         | 
| 387 | 
            +
                # cross-account access. For a comparison of `AssumeRole` with other API
         | 
| 388 | 
            +
                # operations that produce temporary credentials, see [Requesting
         | 
| 389 | 
            +
                # Temporary Security Credentials][1] and [Comparing the Amazon Web
         | 
| 390 | 
            +
                # Services STS API operations][2] in the *IAM User Guide*.
         | 
| 387 391 | 
             
                #
         | 
| 388 392 | 
             
                # **Permissions**
         | 
| 389 393 | 
             
                #
         | 
| @@ -394,23 +398,24 @@ module Aws::STS | |
| 394 398 | 
             
                #
         | 
| 395 399 | 
             
                # (Optional) You can pass inline or managed [session policies][3] to
         | 
| 396 400 | 
             
                # this operation. You can pass a single JSON policy document to use as
         | 
| 397 | 
            -
                # an inline session policy. You can also specify up to 10 managed
         | 
| 398 | 
            -
                #  | 
| 399 | 
            -
                # use for both inline and managed session policies | 
| 400 | 
            -
                # characters. Passing policies to this operation | 
| 401 | 
            -
                # credentials. The resulting session's | 
| 402 | 
            -
                # of the role's identity-based policy | 
| 403 | 
            -
                # use the role's temporary | 
| 404 | 
            -
                # Services API calls to access | 
| 405 | 
            -
                # role. You cannot use session | 
| 406 | 
            -
                #  | 
| 407 | 
            -
                #  | 
| 408 | 
            -
                # User Guide*.
         | 
| 409 | 
            -
                #
         | 
| 410 | 
            -
                # When you create a role, you create two policies:  | 
| 411 | 
            -
                # that specifies *who* can assume the role and a permissions policy | 
| 412 | 
            -
                # specifies *what* can be done with the role. You specify the | 
| 413 | 
            -
                # principal  | 
| 401 | 
            +
                # an inline session policy. You can also specify up to 10 managed policy
         | 
| 402 | 
            +
                # Amazon Resource Names (ARNs) to use as managed session policies. The
         | 
| 403 | 
            +
                # plaintext that you use for both inline and managed session policies
         | 
| 404 | 
            +
                # can't exceed 2,048 characters. Passing policies to this operation
         | 
| 405 | 
            +
                # returns new temporary credentials. The resulting session's
         | 
| 406 | 
            +
                # permissions are the intersection of the role's identity-based policy
         | 
| 407 | 
            +
                # and the session policies. You can use the role's temporary
         | 
| 408 | 
            +
                # credentials in subsequent Amazon Web Services API calls to access
         | 
| 409 | 
            +
                # resources in the account that owns the role. You cannot use session
         | 
| 410 | 
            +
                # policies to grant more permissions than those allowed by the
         | 
| 411 | 
            +
                # identity-based policy of the role that is being assumed. For more
         | 
| 412 | 
            +
                # information, see [Session Policies][3] in the *IAM User Guide*.
         | 
| 413 | 
            +
                #
         | 
| 414 | 
            +
                # When you create a role, you create two policies: a role trust policy
         | 
| 415 | 
            +
                # that specifies *who* can assume the role, and a permissions policy
         | 
| 416 | 
            +
                # that specifies *what* can be done with the role. You specify the
         | 
| 417 | 
            +
                # trusted principal that is allowed to assume the role in the role trust
         | 
| 418 | 
            +
                # policy.
         | 
| 414 419 | 
             
                #
         | 
| 415 420 | 
             
                # To assume a role from a different account, your Amazon Web Services
         | 
| 416 421 | 
             
                # account must be trusted by the role. The trust relationship is defined
         | 
| @@ -419,10 +424,9 @@ module Aws::STS | |
| 419 424 | 
             
                # users in the account.
         | 
| 420 425 | 
             
                #
         | 
| 421 426 | 
             
                # A user who wants to access a role in a different account must also
         | 
| 422 | 
            -
                # have permissions that are delegated from the  | 
| 423 | 
            -
                #  | 
| 424 | 
            -
                #  | 
| 425 | 
            -
                # account.
         | 
| 427 | 
            +
                # have permissions that are delegated from the account administrator.
         | 
| 428 | 
            +
                # The administrator must attach a policy that allows the user to call
         | 
| 429 | 
            +
                # `AssumeRole` for the ARN of the role in the other account.
         | 
| 426 430 | 
             
                #
         | 
| 427 431 | 
             
                # To allow a user to assume a role in the same account, you can do
         | 
| 428 432 | 
             
                # either of the following:
         | 
| @@ -519,12 +523,12 @@ module Aws::STS | |
| 519 523 | 
             
                #   about ARNs, see [Amazon Resource Names (ARNs) and Amazon Web Services
         | 
| 520 524 | 
             
                #   Service Namespaces][1] in the Amazon Web Services General Reference.
         | 
| 521 525 | 
             
                #
         | 
| 522 | 
            -
                #   <note markdown="1"> An Amazon Web Services conversion compresses the passed session
         | 
| 523 | 
            -
                #    | 
| 524 | 
            -
                #   separate limit. Your request can fail for this limit | 
| 525 | 
            -
                #   plaintext meets the other requirements. The | 
| 526 | 
            -
                #   response element indicates by percentage how close | 
| 527 | 
            -
                #   tags for your request are to the upper size limit.
         | 
| 526 | 
            +
                #   <note markdown="1"> An Amazon Web Services conversion compresses the passed inline session
         | 
| 527 | 
            +
                #   policy, managed policy ARNs, and session tags into a packed binary
         | 
| 528 | 
            +
                #   format that has a separate limit. Your request can fail for this limit
         | 
| 529 | 
            +
                #   even if your plaintext meets the other requirements. The
         | 
| 530 | 
            +
                #   `PackedPolicySize` response element indicates by percentage how close
         | 
| 531 | 
            +
                #   the policies and tags for your request are to the upper size limit.
         | 
| 528 532 | 
             
                #
         | 
| 529 533 | 
             
                #    </note>
         | 
| 530 534 | 
             
                #
         | 
| @@ -564,12 +568,12 @@ module Aws::STS | |
| 564 568 | 
             
                #   the tab (\\u0009), linefeed (\\u000A), and carriage return (\\u000D)
         | 
| 565 569 | 
             
                #   characters.
         | 
| 566 570 | 
             
                #
         | 
| 567 | 
            -
                #   <note markdown="1"> An Amazon Web Services conversion compresses the passed session
         | 
| 568 | 
            -
                #    | 
| 569 | 
            -
                #   separate limit. Your request can fail for this limit | 
| 570 | 
            -
                #   plaintext meets the other requirements. The | 
| 571 | 
            -
                #   response element indicates by percentage how close | 
| 572 | 
            -
                #   tags for your request are to the upper size limit.
         | 
| 571 | 
            +
                #   <note markdown="1"> An Amazon Web Services conversion compresses the passed inline session
         | 
| 572 | 
            +
                #   policy, managed policy ARNs, and session tags into a packed binary
         | 
| 573 | 
            +
                #   format that has a separate limit. Your request can fail for this limit
         | 
| 574 | 
            +
                #   even if your plaintext meets the other requirements. The
         | 
| 575 | 
            +
                #   `PackedPolicySize` response element indicates by percentage how close
         | 
| 576 | 
            +
                #   the policies and tags for your request are to the upper size limit.
         | 
| 573 577 | 
             
                #
         | 
| 574 578 | 
             
                #    </note>
         | 
| 575 579 | 
             
                #
         | 
| @@ -627,12 +631,12 @@ module Aws::STS | |
| 627 631 | 
             
                #   can’t exceed 256 characters. For these and additional limits, see [IAM
         | 
| 628 632 | 
             
                #   and STS Character Limits][2] in the *IAM User Guide*.
         | 
| 629 633 | 
             
                #
         | 
| 630 | 
            -
                #   <note markdown="1"> An Amazon Web Services conversion compresses the passed session
         | 
| 631 | 
            -
                #    | 
| 632 | 
            -
                #   separate limit. Your request can fail for this limit | 
| 633 | 
            -
                #   plaintext meets the other requirements. The | 
| 634 | 
            -
                #   response element indicates by percentage how close | 
| 635 | 
            -
                #   tags for your request are to the upper size limit.
         | 
| 634 | 
            +
                #   <note markdown="1"> An Amazon Web Services conversion compresses the passed inline session
         | 
| 635 | 
            +
                #   policy, managed policy ARNs, and session tags into a packed binary
         | 
| 636 | 
            +
                #   format that has a separate limit. Your request can fail for this limit
         | 
| 637 | 
            +
                #   even if your plaintext meets the other requirements. The
         | 
| 638 | 
            +
                #   `PackedPolicySize` response element indicates by percentage how close
         | 
| 639 | 
            +
                #   the policies and tags for your request are to the upper size limit.
         | 
| 636 640 | 
             
                #
         | 
| 637 641 | 
             
                #    </note>
         | 
| 638 642 | 
             
                #
         | 
| @@ -895,18 +899,18 @@ module Aws::STS | |
| 895 899 | 
             
                #
         | 
| 896 900 | 
             
                # (Optional) You can pass inline or managed [session policies][6] to
         | 
| 897 901 | 
             
                # this operation. You can pass a single JSON policy document to use as
         | 
| 898 | 
            -
                # an inline session policy. You can also specify up to 10 managed
         | 
| 899 | 
            -
                #  | 
| 900 | 
            -
                # use for both inline and managed session policies | 
| 901 | 
            -
                # characters. Passing policies to this operation | 
| 902 | 
            -
                # credentials. The resulting session's | 
| 903 | 
            -
                # of the role's identity-based policy | 
| 904 | 
            -
                # use the role's temporary | 
| 905 | 
            -
                # Services API calls to access | 
| 906 | 
            -
                # role. You cannot use session | 
| 907 | 
            -
                #  | 
| 908 | 
            -
                #  | 
| 909 | 
            -
                # User Guide*.
         | 
| 902 | 
            +
                # an inline session policy. You can also specify up to 10 managed policy
         | 
| 903 | 
            +
                # Amazon Resource Names (ARNs) to use as managed session policies. The
         | 
| 904 | 
            +
                # plaintext that you use for both inline and managed session policies
         | 
| 905 | 
            +
                # can't exceed 2,048 characters. Passing policies to this operation
         | 
| 906 | 
            +
                # returns new temporary credentials. The resulting session's
         | 
| 907 | 
            +
                # permissions are the intersection of the role's identity-based policy
         | 
| 908 | 
            +
                # and the session policies. You can use the role's temporary
         | 
| 909 | 
            +
                # credentials in subsequent Amazon Web Services API calls to access
         | 
| 910 | 
            +
                # resources in the account that owns the role. You cannot use session
         | 
| 911 | 
            +
                # policies to grant more permissions than those allowed by the
         | 
| 912 | 
            +
                # identity-based policy of the role that is being assumed. For more
         | 
| 913 | 
            +
                # information, see [Session Policies][6] in the *IAM User Guide*.
         | 
| 910 914 | 
             
                #
         | 
| 911 915 | 
             
                # Calling `AssumeRoleWithSAML` does not require the use of Amazon Web
         | 
| 912 916 | 
             
                # Services security credentials. The identity of the caller is validated
         | 
| @@ -932,12 +936,12 @@ module Aws::STS | |
| 932 936 | 
             
                # characters. For these and additional limits, see [IAM and STS
         | 
| 933 937 | 
             
                # Character Limits][8] in the *IAM User Guide*.
         | 
| 934 938 | 
             
                #
         | 
| 935 | 
            -
                # <note markdown="1"> An Amazon Web Services conversion compresses the passed session
         | 
| 936 | 
            -
                #  | 
| 937 | 
            -
                # separate limit. Your request can fail for this limit | 
| 938 | 
            -
                # plaintext meets the other requirements. The | 
| 939 | 
            -
                # response element indicates by percentage how close | 
| 940 | 
            -
                # tags for your request are to the upper size limit.
         | 
| 939 | 
            +
                # <note markdown="1"> An Amazon Web Services conversion compresses the passed inline session
         | 
| 940 | 
            +
                # policy, managed policy ARNs, and session tags into a packed binary
         | 
| 941 | 
            +
                # format that has a separate limit. Your request can fail for this limit
         | 
| 942 | 
            +
                # even if your plaintext meets the other requirements. The
         | 
| 943 | 
            +
                # `PackedPolicySize` response element indicates by percentage how close
         | 
| 944 | 
            +
                # the policies and tags for your request are to the upper size limit.
         | 
| 941 945 | 
             
                #
         | 
| 942 946 | 
             
                #  </note>
         | 
| 943 947 | 
             
                #
         | 
| @@ -1023,12 +1027,12 @@ module Aws::STS | |
| 1023 1027 | 
             
                #   about ARNs, see [Amazon Resource Names (ARNs) and Amazon Web Services
         | 
| 1024 1028 | 
             
                #   Service Namespaces][1] in the Amazon Web Services General Reference.
         | 
| 1025 1029 | 
             
                #
         | 
| 1026 | 
            -
                #   <note markdown="1"> An Amazon Web Services conversion compresses the passed session
         | 
| 1027 | 
            -
                #    | 
| 1028 | 
            -
                #   separate limit. Your request can fail for this limit | 
| 1029 | 
            -
                #   plaintext meets the other requirements. The | 
| 1030 | 
            -
                #   response element indicates by percentage how close | 
| 1031 | 
            -
                #   tags for your request are to the upper size limit.
         | 
| 1030 | 
            +
                #   <note markdown="1"> An Amazon Web Services conversion compresses the passed inline session
         | 
| 1031 | 
            +
                #   policy, managed policy ARNs, and session tags into a packed binary
         | 
| 1032 | 
            +
                #   format that has a separate limit. Your request can fail for this limit
         | 
| 1033 | 
            +
                #   even if your plaintext meets the other requirements. The
         | 
| 1034 | 
            +
                #   `PackedPolicySize` response element indicates by percentage how close
         | 
| 1035 | 
            +
                #   the policies and tags for your request are to the upper size limit.
         | 
| 1032 1036 | 
             
                #
         | 
| 1033 1037 | 
             
                #    </note>
         | 
| 1034 1038 | 
             
                #
         | 
| @@ -1068,12 +1072,12 @@ module Aws::STS | |
| 1068 1072 | 
             
                #   the tab (\\u0009), linefeed (\\u000A), and carriage return (\\u000D)
         | 
| 1069 1073 | 
             
                #   characters.
         | 
| 1070 1074 | 
             
                #
         | 
| 1071 | 
            -
                #   <note markdown="1"> An Amazon Web Services conversion compresses the passed session
         | 
| 1072 | 
            -
                #    | 
| 1073 | 
            -
                #   separate limit. Your request can fail for this limit | 
| 1074 | 
            -
                #   plaintext meets the other requirements. The | 
| 1075 | 
            -
                #   response element indicates by percentage how close | 
| 1076 | 
            -
                #   tags for your request are to the upper size limit.
         | 
| 1075 | 
            +
                #   <note markdown="1"> An Amazon Web Services conversion compresses the passed inline session
         | 
| 1076 | 
            +
                #   policy, managed policy ARNs, and session tags into a packed binary
         | 
| 1077 | 
            +
                #   format that has a separate limit. Your request can fail for this limit
         | 
| 1078 | 
            +
                #   even if your plaintext meets the other requirements. The
         | 
| 1079 | 
            +
                #   `PackedPolicySize` response element indicates by percentage how close
         | 
| 1080 | 
            +
                #   the policies and tags for your request are to the upper size limit.
         | 
| 1077 1081 | 
             
                #
         | 
| 1078 1082 | 
             
                #    </note>
         | 
| 1079 1083 | 
             
                #
         | 
| @@ -1207,10 +1211,8 @@ module Aws::STS | |
| 1207 1211 | 
             
                # the user with a consistent identity throughout the lifetime of an
         | 
| 1208 1212 | 
             
                # application.
         | 
| 1209 1213 | 
             
                #
         | 
| 1210 | 
            -
                #  To learn more about Amazon Cognito, see [Amazon Cognito  | 
| 1211 | 
            -
                # in *Amazon  | 
| 1212 | 
            -
                # Cognito Overview][5] in the *Amazon Web Services SDK for iOS Developer
         | 
| 1213 | 
            -
                # Guide*.
         | 
| 1214 | 
            +
                #  To learn more about Amazon Cognito, see [Amazon Cognito identity
         | 
| 1215 | 
            +
                # pools][1] in *Amazon Cognito Developer Guide*.
         | 
| 1214 1216 | 
             
                #
         | 
| 1215 1217 | 
             
                #  </note>
         | 
| 1216 1218 | 
             
                #
         | 
| @@ -1224,8 +1226,8 @@ module Aws::STS | |
| 1224 1226 | 
             
                # a token from the web identity provider. For a comparison of
         | 
| 1225 1227 | 
             
                # `AssumeRoleWithWebIdentity` with the other API operations that produce
         | 
| 1226 1228 | 
             
                # temporary credentials, see [Requesting Temporary Security
         | 
| 1227 | 
            -
                # Credentials][ | 
| 1228 | 
            -
                # operations][ | 
| 1229 | 
            +
                # Credentials][4] and [Comparing the Amazon Web Services STS API
         | 
| 1230 | 
            +
                # operations][5] in the *IAM User Guide*.
         | 
| 1229 1231 | 
             
                #
         | 
| 1230 1232 | 
             
                # The temporary security credentials returned by this API consist of an
         | 
| 1231 1233 | 
             
                # access key ID, a secret access key, and a security token. Applications
         | 
| @@ -1241,11 +1243,11 @@ module Aws::STS | |
| 1241 1243 | 
             
                # to the maximum session duration setting for the role. This setting can
         | 
| 1242 1244 | 
             
                # have a value from 1 hour to 12 hours. To learn how to view the maximum
         | 
| 1243 1245 | 
             
                # value for your role, see [View the Maximum Session Duration Setting
         | 
| 1244 | 
            -
                # for a Role][ | 
| 1246 | 
            +
                # for a Role][6] in the *IAM User Guide*. The maximum session duration
         | 
| 1245 1247 | 
             
                # limit applies when you use the `AssumeRole*` API operations or the
         | 
| 1246 1248 | 
             
                # `assume-role*` CLI commands. However the limit does not apply when you
         | 
| 1247 1249 | 
             
                # use those operations to create a console URL. For more information,
         | 
| 1248 | 
            -
                # see [Using IAM Roles][ | 
| 1250 | 
            +
                # see [Using IAM Roles][7] in the *IAM User Guide*.
         | 
| 1249 1251 | 
             
                #
         | 
| 1250 1252 | 
             
                # **Permissions**
         | 
| 1251 1253 | 
             
                #
         | 
| @@ -1254,39 +1256,39 @@ module Aws::STS | |
| 1254 1256 | 
             
                # Amazon Web Services service with the following exception: you cannot
         | 
| 1255 1257 | 
             
                # call the STS `GetFederationToken` or `GetSessionToken` API operations.
         | 
| 1256 1258 | 
             
                #
         | 
| 1257 | 
            -
                # (Optional) You can pass inline or managed [session policies][ | 
| 1259 | 
            +
                # (Optional) You can pass inline or managed [session policies][8] to
         | 
| 1258 1260 | 
             
                # this operation. You can pass a single JSON policy document to use as
         | 
| 1259 | 
            -
                # an inline session policy. You can also specify up to 10 managed
         | 
| 1260 | 
            -
                #  | 
| 1261 | 
            -
                # use for both inline and managed session policies | 
| 1262 | 
            -
                # characters. Passing policies to this operation | 
| 1263 | 
            -
                # credentials. The resulting session's | 
| 1264 | 
            -
                # of the role's identity-based policy | 
| 1265 | 
            -
                # use the role's temporary | 
| 1266 | 
            -
                # Services API calls to access | 
| 1267 | 
            -
                # role. You cannot use session | 
| 1268 | 
            -
                #  | 
| 1269 | 
            -
                #  | 
| 1270 | 
            -
                # User Guide*.
         | 
| 1261 | 
            +
                # an inline session policy. You can also specify up to 10 managed policy
         | 
| 1262 | 
            +
                # Amazon Resource Names (ARNs) to use as managed session policies. The
         | 
| 1263 | 
            +
                # plaintext that you use for both inline and managed session policies
         | 
| 1264 | 
            +
                # can't exceed 2,048 characters. Passing policies to this operation
         | 
| 1265 | 
            +
                # returns new temporary credentials. The resulting session's
         | 
| 1266 | 
            +
                # permissions are the intersection of the role's identity-based policy
         | 
| 1267 | 
            +
                # and the session policies. You can use the role's temporary
         | 
| 1268 | 
            +
                # credentials in subsequent Amazon Web Services API calls to access
         | 
| 1269 | 
            +
                # resources in the account that owns the role. You cannot use session
         | 
| 1270 | 
            +
                # policies to grant more permissions than those allowed by the
         | 
| 1271 | 
            +
                # identity-based policy of the role that is being assumed. For more
         | 
| 1272 | 
            +
                # information, see [Session Policies][8] in the *IAM User Guide*.
         | 
| 1271 1273 | 
             
                #
         | 
| 1272 1274 | 
             
                # **Tags**
         | 
| 1273 1275 | 
             
                #
         | 
| 1274 1276 | 
             
                # (Optional) You can configure your IdP to pass attributes into your web
         | 
| 1275 1277 | 
             
                # identity token as session tags. Each session tag consists of a key
         | 
| 1276 1278 | 
             
                # name and an associated value. For more information about session tags,
         | 
| 1277 | 
            -
                # see [Passing Session Tags in STS][ | 
| 1279 | 
            +
                # see [Passing Session Tags in STS][9] in the *IAM User Guide*.
         | 
| 1278 1280 | 
             
                #
         | 
| 1279 1281 | 
             
                # You can pass up to 50 session tags. The plaintext session tag keys
         | 
| 1280 1282 | 
             
                # can’t exceed 128 characters and the values can’t exceed 256
         | 
| 1281 1283 | 
             
                # characters. For these and additional limits, see [IAM and STS
         | 
| 1282 | 
            -
                # Character Limits][ | 
| 1284 | 
            +
                # Character Limits][10] in the *IAM User Guide*.
         | 
| 1283 1285 | 
             
                #
         | 
| 1284 | 
            -
                # <note markdown="1"> An Amazon Web Services conversion compresses the passed session
         | 
| 1285 | 
            -
                #  | 
| 1286 | 
            -
                # separate limit. Your request can fail for this limit | 
| 1287 | 
            -
                # plaintext meets the other requirements. The | 
| 1288 | 
            -
                # response element indicates by percentage how close | 
| 1289 | 
            -
                # tags for your request are to the upper size limit.
         | 
| 1286 | 
            +
                # <note markdown="1"> An Amazon Web Services conversion compresses the passed inline session
         | 
| 1287 | 
            +
                # policy, managed policy ARNs, and session tags into a packed binary
         | 
| 1288 | 
            +
                # format that has a separate limit. Your request can fail for this limit
         | 
| 1289 | 
            +
                # even if your plaintext meets the other requirements. The
         | 
| 1290 | 
            +
                # `PackedPolicySize` response element indicates by percentage how close
         | 
| 1291 | 
            +
                # the policies and tags for your request are to the upper size limit.
         | 
| 1290 1292 | 
             
                #
         | 
| 1291 1293 | 
             
                #  </note>
         | 
| 1292 1294 | 
             
                #
         | 
| @@ -1297,12 +1299,12 @@ module Aws::STS | |
| 1297 1299 | 
             
                # An administrator must grant you the permissions necessary to pass
         | 
| 1298 1300 | 
             
                # session tags. The administrator can also create granular permissions
         | 
| 1299 1301 | 
             
                # to allow you to pass only specific session tags. For more information,
         | 
| 1300 | 
            -
                # see [Tutorial: Using Tags for Attribute-Based Access Control][ | 
| 1302 | 
            +
                # see [Tutorial: Using Tags for Attribute-Based Access Control][11] in
         | 
| 1301 1303 | 
             
                # the *IAM User Guide*.
         | 
| 1302 1304 | 
             
                #
         | 
| 1303 1305 | 
             
                # You can set the session tags as transitive. Transitive tags persist
         | 
| 1304 1306 | 
             
                # during role chaining. For more information, see [Chaining Roles with
         | 
| 1305 | 
            -
                # Session Tags][ | 
| 1307 | 
            +
                # Session Tags][12] in the *IAM User Guide*.
         | 
| 1306 1308 | 
             
                #
         | 
| 1307 1309 | 
             
                # **Identities**
         | 
| 1308 1310 | 
             
                #
         | 
| @@ -1314,19 +1316,19 @@ module Aws::STS | |
| 1314 1316 | 
             
                # specified in the role's trust policy.
         | 
| 1315 1317 | 
             
                #
         | 
| 1316 1318 | 
             
                # Calling `AssumeRoleWithWebIdentity` can result in an entry in your
         | 
| 1317 | 
            -
                # CloudTrail logs. The entry includes the [Subject][ | 
| 1319 | 
            +
                # CloudTrail logs. The entry includes the [Subject][13] of the provided
         | 
| 1318 1320 | 
             
                # web identity token. We recommend that you avoid using any personally
         | 
| 1319 1321 | 
             
                # identifiable information (PII) in this field. For example, you could
         | 
| 1320 1322 | 
             
                # instead use a GUID or a pairwise identifier, as [suggested in the OIDC
         | 
| 1321 | 
            -
                # specification][ | 
| 1323 | 
            +
                # specification][14].
         | 
| 1322 1324 | 
             
                #
         | 
| 1323 1325 | 
             
                # For more information about how to use web identity federation and the
         | 
| 1324 1326 | 
             
                # `AssumeRoleWithWebIdentity` API, see the following resources:
         | 
| 1325 1327 | 
             
                #
         | 
| 1326 | 
            -
                # * [Using Web Identity Federation API Operations for Mobile Apps][ | 
| 1327 | 
            -
                #   and [Federation Through a Web-based Identity Provider][ | 
| 1328 | 
            +
                # * [Using Web Identity Federation API Operations for Mobile Apps][15]
         | 
| 1329 | 
            +
                #   and [Federation Through a Web-based Identity Provider][16].
         | 
| 1328 1330 | 
             
                #
         | 
| 1329 | 
            -
                # * [ Web Identity Federation Playground][ | 
| 1331 | 
            +
                # * [ Web Identity Federation Playground][17]. Walk through the process
         | 
| 1330 1332 | 
             
                #   of authenticating through Login with Amazon, Facebook, or Google,
         | 
| 1331 1333 | 
             
                #   getting temporary security credentials, and then using those
         | 
| 1332 1334 | 
             
                #   credentials to make a request to Amazon Web Services.
         | 
| @@ -1337,7 +1339,7 @@ module Aws::STS | |
| 1337 1339 | 
             
                #   toolkits then show how to use the information from these providers
         | 
| 1338 1340 | 
             
                #   to get and use temporary security credentials.
         | 
| 1339 1341 | 
             
                #
         | 
| 1340 | 
            -
                # * [Web Identity Federation with Mobile Applications][ | 
| 1342 | 
            +
                # * [Web Identity Federation with Mobile Applications][18]. This article
         | 
| 1341 1343 | 
             
                #   discusses web identity federation and shows an example of how to use
         | 
| 1342 1344 | 
             
                #   web identity federation to get access to content in Amazon S3.
         | 
| 1343 1345 | 
             
                #
         | 
| @@ -1346,23 +1348,21 @@ module Aws::STS | |
| 1346 1348 | 
             
                # [1]: https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-identity.html
         | 
| 1347 1349 | 
             
                # [2]: http://aws.amazon.com/sdkforios/
         | 
| 1348 1350 | 
             
                # [3]: http://aws.amazon.com/sdkforandroid/
         | 
| 1349 | 
            -
                # [4]: https://docs.aws.amazon.com/ | 
| 1350 | 
            -
                # [5]: https://docs.aws.amazon.com/ | 
| 1351 | 
            -
                # [6]: https://docs.aws.amazon.com/IAM/latest/UserGuide/ | 
| 1352 | 
            -
                # [7]: https://docs.aws.amazon.com/IAM/latest/UserGuide/ | 
| 1353 | 
            -
                # [8]: https://docs.aws.amazon.com/IAM/latest/UserGuide/ | 
| 1354 | 
            -
                # [9]: https://docs.aws.amazon.com/IAM/latest/UserGuide/ | 
| 1355 | 
            -
                # [10]: https://docs.aws.amazon.com/IAM/latest/UserGuide/ | 
| 1356 | 
            -
                # [11]: https://docs.aws.amazon.com/IAM/latest/UserGuide/ | 
| 1357 | 
            -
                # [12]: https://docs.aws.amazon.com/IAM/latest/UserGuide/ | 
| 1358 | 
            -
                # [13]:  | 
| 1359 | 
            -
                # [14]:  | 
| 1360 | 
            -
                # [15]:  | 
| 1361 | 
            -
                # [16]:  | 
| 1362 | 
            -
                # [17]: https:// | 
| 1363 | 
            -
                # [18]:  | 
| 1364 | 
            -
                # [19]: https://aws.amazon.com/blogs/aws/the-aws-web-identity-federation-playground/
         | 
| 1365 | 
            -
                # [20]: http://aws.amazon.com/articles/web-identity-federation-with-mobile-applications
         | 
| 1351 | 
            +
                # [4]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html
         | 
| 1352 | 
            +
                # [5]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#stsapi_comparison
         | 
| 1353 | 
            +
                # [6]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html#id_roles_use_view-role-max-session
         | 
| 1354 | 
            +
                # [7]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html
         | 
| 1355 | 
            +
                # [8]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
         | 
| 1356 | 
            +
                # [9]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html
         | 
| 1357 | 
            +
                # [10]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-limits.html#reference_iam-limits-entity-length
         | 
| 1358 | 
            +
                # [11]: https://docs.aws.amazon.com/IAM/latest/UserGuide/tutorial_attribute-based-access-control.html
         | 
| 1359 | 
            +
                # [12]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html#id_session-tags_role-chaining
         | 
| 1360 | 
            +
                # [13]: http://openid.net/specs/openid-connect-core-1_0.html#Claims
         | 
| 1361 | 
            +
                # [14]: http://openid.net/specs/openid-connect-core-1_0.html#SubjectIDTypes
         | 
| 1362 | 
            +
                # [15]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_oidc_manual.html
         | 
| 1363 | 
            +
                # [16]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#api_assumerolewithwebidentity
         | 
| 1364 | 
            +
                # [17]: https://aws.amazon.com/blogs/aws/the-aws-web-identity-federation-playground/
         | 
| 1365 | 
            +
                # [18]: http://aws.amazon.com/articles/web-identity-federation-with-mobile-applications
         | 
| 1366 1366 | 
             
                #
         | 
| 1367 1367 | 
             
                # @option params [required, String] :role_arn
         | 
| 1368 1368 | 
             
                #   The Amazon Resource Name (ARN) of the role that the caller is
         | 
| @@ -1410,12 +1410,12 @@ module Aws::STS | |
| 1410 1410 | 
             
                #   about ARNs, see [Amazon Resource Names (ARNs) and Amazon Web Services
         | 
| 1411 1411 | 
             
                #   Service Namespaces][1] in the Amazon Web Services General Reference.
         | 
| 1412 1412 | 
             
                #
         | 
| 1413 | 
            -
                #   <note markdown="1"> An Amazon Web Services conversion compresses the passed session
         | 
| 1414 | 
            -
                #    | 
| 1415 | 
            -
                #   separate limit. Your request can fail for this limit | 
| 1416 | 
            -
                #   plaintext meets the other requirements. The | 
| 1417 | 
            -
                #   response element indicates by percentage how close | 
| 1418 | 
            -
                #   tags for your request are to the upper size limit.
         | 
| 1413 | 
            +
                #   <note markdown="1"> An Amazon Web Services conversion compresses the passed inline session
         | 
| 1414 | 
            +
                #   policy, managed policy ARNs, and session tags into a packed binary
         | 
| 1415 | 
            +
                #   format that has a separate limit. Your request can fail for this limit
         | 
| 1416 | 
            +
                #   even if your plaintext meets the other requirements. The
         | 
| 1417 | 
            +
                #   `PackedPolicySize` response element indicates by percentage how close
         | 
| 1418 | 
            +
                #   the policies and tags for your request are to the upper size limit.
         | 
| 1419 1419 | 
             
                #
         | 
| 1420 1420 | 
             
                #    </note>
         | 
| 1421 1421 | 
             
                #
         | 
| @@ -1455,12 +1455,12 @@ module Aws::STS | |
| 1455 1455 | 
             
                #   the tab (\\u0009), linefeed (\\u000A), and carriage return (\\u000D)
         | 
| 1456 1456 | 
             
                #   characters.
         | 
| 1457 1457 | 
             
                #
         | 
| 1458 | 
            -
                #   <note markdown="1"> An Amazon Web Services conversion compresses the passed session
         | 
| 1459 | 
            -
                #    | 
| 1460 | 
            -
                #   separate limit. Your request can fail for this limit | 
| 1461 | 
            -
                #   plaintext meets the other requirements. The | 
| 1462 | 
            -
                #   response element indicates by percentage how close | 
| 1463 | 
            -
                #   tags for your request are to the upper size limit.
         | 
| 1458 | 
            +
                #   <note markdown="1"> An Amazon Web Services conversion compresses the passed inline session
         | 
| 1459 | 
            +
                #   policy, managed policy ARNs, and session tags into a packed binary
         | 
| 1460 | 
            +
                #   format that has a separate limit. Your request can fail for this limit
         | 
| 1461 | 
            +
                #   even if your plaintext meets the other requirements. The
         | 
| 1462 | 
            +
                #   `PackedPolicySize` response element indicates by percentage how close
         | 
| 1463 | 
            +
                #   the policies and tags for your request are to the upper size limit.
         | 
| 1464 1464 | 
             
                #
         | 
| 1465 1465 | 
             
                #    </note>
         | 
| 1466 1466 | 
             
                #
         | 
| @@ -1721,11 +1721,11 @@ module Aws::STS | |
| 1721 1721 | 
             
                # to call the operation.
         | 
| 1722 1722 | 
             
                #
         | 
| 1723 1723 | 
             
                # <note markdown="1"> No permissions are required to perform this operation. If an
         | 
| 1724 | 
            -
                # administrator  | 
| 1724 | 
            +
                # administrator attaches a policy to your identity that explicitly
         | 
| 1725 1725 | 
             
                # denies access to the `sts:GetCallerIdentity` action, you can still
         | 
| 1726 1726 | 
             
                # perform this operation. Permissions are not required because the same
         | 
| 1727 | 
            -
                # information is returned when  | 
| 1728 | 
            -
                #  | 
| 1727 | 
            +
                # information is returned when access is denied. To view an example
         | 
| 1728 | 
            +
                # response, see [I Am Not Authorized to Perform:
         | 
| 1729 1729 | 
             
                # iam:DeleteVirtualMFADevice][1] in the *IAM User Guide*.
         | 
| 1730 1730 | 
             
                #
         | 
| 1731 1731 | 
             
                #  </note>
         | 
| @@ -1802,60 +1802,63 @@ module Aws::STS | |
| 1802 1802 | 
             
                end
         | 
| 1803 1803 |  | 
| 1804 1804 | 
             
                # Returns a set of temporary security credentials (consisting of an
         | 
| 1805 | 
            -
                # access key ID, a secret access key, and a security token) for a
         | 
| 1806 | 
            -
                #  | 
| 1807 | 
            -
                #  | 
| 1808 | 
            -
                #  | 
| 1809 | 
            -
                # | 
| 1810 | 
            -
                #  | 
| 1811 | 
            -
                #  | 
| 1812 | 
            -
                #  | 
| 1813 | 
            -
                #  | 
| 1805 | 
            +
                # access key ID, a secret access key, and a security token) for a user.
         | 
| 1806 | 
            +
                # A typical use is in a proxy application that gets temporary security
         | 
| 1807 | 
            +
                # credentials on behalf of distributed applications inside a corporate
         | 
| 1808 | 
            +
                # network.
         | 
| 1809 | 
            +
                #
         | 
| 1810 | 
            +
                # You must call the `GetFederationToken` operation using the long-term
         | 
| 1811 | 
            +
                # security credentials of an IAM user. As a result, this call is
         | 
| 1812 | 
            +
                # appropriate in contexts where those credentials can be safeguarded,
         | 
| 1813 | 
            +
                # usually in a server-based application. For a comparison of
         | 
| 1814 | 
            +
                # `GetFederationToken` with the other API operations that produce
         | 
| 1815 | 
            +
                # temporary credentials, see [Requesting Temporary Security
         | 
| 1814 1816 | 
             
                # Credentials][1] and [Comparing the Amazon Web Services STS API
         | 
| 1815 1817 | 
             
                # operations][2] in the *IAM User Guide*.
         | 
| 1816 1818 | 
             
                #
         | 
| 1819 | 
            +
                # Although it is possible to call `GetFederationToken` using the
         | 
| 1820 | 
            +
                # security credentials of an Amazon Web Services account root user
         | 
| 1821 | 
            +
                # rather than an IAM user that you create for the purpose of a proxy
         | 
| 1822 | 
            +
                # application, we do not recommend it. For more information, see
         | 
| 1823 | 
            +
                # [Safeguard your root user credentials and don't use them for everyday
         | 
| 1824 | 
            +
                # tasks][3] in the *IAM User Guide*.
         | 
| 1825 | 
            +
                #
         | 
| 1817 1826 | 
             
                # <note markdown="1"> You can create a mobile-based or browser-based app that can
         | 
| 1818 1827 | 
             
                # authenticate users using a web identity provider like Login with
         | 
| 1819 1828 | 
             
                # Amazon, Facebook, Google, or an OpenID Connect-compatible identity
         | 
| 1820 | 
            -
                # provider. In this case, we recommend that you use [Amazon Cognito][ | 
| 1829 | 
            +
                # provider. In this case, we recommend that you use [Amazon Cognito][4]
         | 
| 1821 1830 | 
             
                # or `AssumeRoleWithWebIdentity`. For more information, see [Federation
         | 
| 1822 | 
            -
                # Through a Web-based Identity Provider][ | 
| 1831 | 
            +
                # Through a Web-based Identity Provider][5] in the *IAM User Guide*.
         | 
| 1823 1832 | 
             
                #
         | 
| 1824 1833 | 
             
                #  </note>
         | 
| 1825 1834 | 
             
                #
         | 
| 1826 | 
            -
                # You can also call `GetFederationToken` using the security credentials
         | 
| 1827 | 
            -
                # of an Amazon Web Services account root user, but we do not recommend
         | 
| 1828 | 
            -
                # it. Instead, we recommend that you create an IAM user for the purpose
         | 
| 1829 | 
            -
                # of the proxy application. Then attach a policy to the IAM user that
         | 
| 1830 | 
            -
                # limits federated users to only the actions and resources that they
         | 
| 1831 | 
            -
                # need to access. For more information, see [IAM Best Practices][5] in
         | 
| 1832 | 
            -
                # the *IAM User Guide*.
         | 
| 1833 | 
            -
                #
         | 
| 1834 1835 | 
             
                # **Session duration**
         | 
| 1835 1836 | 
             
                #
         | 
| 1836 1837 | 
             
                # The temporary credentials are valid for the specified duration, from
         | 
| 1837 1838 | 
             
                # 900 seconds (15 minutes) up to a maximum of 129,600 seconds (36
         | 
| 1838 1839 | 
             
                # hours). The default session duration is 43,200 seconds (12 hours).
         | 
| 1839 | 
            -
                # Temporary credentials obtained by using the  | 
| 1840 | 
            -
                #  | 
| 1841 | 
            -
                # (1 hour).
         | 
| 1840 | 
            +
                # Temporary credentials obtained by using the root user credentials have
         | 
| 1841 | 
            +
                # a maximum duration of 3,600 seconds (1 hour).
         | 
| 1842 1842 | 
             
                #
         | 
| 1843 1843 | 
             
                # **Permissions**
         | 
| 1844 1844 | 
             
                #
         | 
| 1845 1845 | 
             
                # You can use the temporary credentials created by `GetFederationToken`
         | 
| 1846 | 
            -
                # in any Amazon Web Services service  | 
| 1846 | 
            +
                # in any Amazon Web Services service with the following exceptions:
         | 
| 1847 1847 | 
             
                #
         | 
| 1848 1848 | 
             
                # * You cannot call any IAM operations using the CLI or the Amazon Web
         | 
| 1849 | 
            -
                #   Services API.
         | 
| 1849 | 
            +
                #   Services API. This limitation does not apply to console sessions.
         | 
| 1850 1850 | 
             
                #
         | 
| 1851 1851 | 
             
                # * You cannot call any STS operations except `GetCallerIdentity`.
         | 
| 1852 1852 | 
             
                #
         | 
| 1853 | 
            +
                # You can use temporary credentials for single sign-on (SSO) to the
         | 
| 1854 | 
            +
                # console.
         | 
| 1855 | 
            +
                #
         | 
| 1853 1856 | 
             
                # You must pass an inline or managed [session policy][6] to this
         | 
| 1854 1857 | 
             
                # operation. You can pass a single JSON policy document to use as an
         | 
| 1855 | 
            -
                # inline session policy. You can also specify up to 10 managed  | 
| 1856 | 
            -
                # to use as managed session policies. The | 
| 1857 | 
            -
                # both inline and managed session policies | 
| 1858 | 
            -
                # characters.
         | 
| 1858 | 
            +
                # inline session policy. You can also specify up to 10 managed policy
         | 
| 1859 | 
            +
                # Amazon Resource Names (ARNs) to use as managed session policies. The
         | 
| 1860 | 
            +
                # plaintext that you use for both inline and managed session policies
         | 
| 1861 | 
            +
                # can't exceed 2,048 characters.
         | 
| 1859 1862 | 
             
                #
         | 
| 1860 1863 | 
             
                # Though the session policy parameters are optional, if you do not pass
         | 
| 1861 1864 | 
             
                # a policy, then the resulting federated user session has no
         | 
| @@ -1885,9 +1888,9 @@ module Aws::STS | |
| 1885 1888 | 
             
                # <note markdown="1"> You can create a mobile-based or browser-based app that can
         | 
| 1886 1889 | 
             
                # authenticate users using a web identity provider like Login with
         | 
| 1887 1890 | 
             
                # Amazon, Facebook, Google, or an OpenID Connect-compatible identity
         | 
| 1888 | 
            -
                # provider. In this case, we recommend that you use [Amazon Cognito][ | 
| 1891 | 
            +
                # provider. In this case, we recommend that you use [Amazon Cognito][4]
         | 
| 1889 1892 | 
             
                # or `AssumeRoleWithWebIdentity`. For more information, see [Federation
         | 
| 1890 | 
            -
                # Through a Web-based Identity Provider][ | 
| 1893 | 
            +
                # Through a Web-based Identity Provider][5] in the *IAM User Guide*.
         | 
| 1891 1894 | 
             
                #
         | 
| 1892 1895 | 
             
                #  </note>
         | 
| 1893 1896 | 
             
                #
         | 
| @@ -1909,9 +1912,9 @@ module Aws::STS | |
| 1909 1912 | 
             
                #
         | 
| 1910 1913 | 
             
                # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html
         | 
| 1911 1914 | 
             
                # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#stsapi_comparison
         | 
| 1912 | 
            -
                # [3]:  | 
| 1913 | 
            -
                # [4]:  | 
| 1914 | 
            -
                # [5]: https://docs.aws.amazon.com/IAM/latest/UserGuide/ | 
| 1915 | 
            +
                # [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html#lock-away-credentials
         | 
| 1916 | 
            +
                # [4]: http://aws.amazon.com/cognito/
         | 
| 1917 | 
            +
                # [5]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#api_assumerolewithwebidentity
         | 
| 1915 1918 | 
             
                # [6]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
         | 
| 1916 1919 | 
             
                # [7]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#api_getfederationtoken
         | 
| 1917 1920 | 
             
                # [8]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html
         | 
| @@ -1934,8 +1937,8 @@ module Aws::STS | |
| 1934 1937 | 
             
                #
         | 
| 1935 1938 | 
             
                #   You must pass an inline or managed [session policy][1] to this
         | 
| 1936 1939 | 
             
                #   operation. You can pass a single JSON policy document to use as an
         | 
| 1937 | 
            -
                #   inline session policy. You can also specify up to 10 managed  | 
| 1938 | 
            -
                #   to use as managed session policies.
         | 
| 1940 | 
            +
                #   inline session policy. You can also specify up to 10 managed policy
         | 
| 1941 | 
            +
                #   Amazon Resource Names (ARNs) to use as managed session policies.
         | 
| 1939 1942 | 
             
                #
         | 
| 1940 1943 | 
             
                #   This parameter is optional. However, if you do not pass any session
         | 
| 1941 1944 | 
             
                #   policies, then the resulting federated user session has no
         | 
| @@ -1963,12 +1966,12 @@ module Aws::STS | |
| 1963 1966 | 
             
                #   the tab (\\u0009), linefeed (\\u000A), and carriage return (\\u000D)
         | 
| 1964 1967 | 
             
                #   characters.
         | 
| 1965 1968 | 
             
                #
         | 
| 1966 | 
            -
                #   <note markdown="1"> An Amazon Web Services conversion compresses the passed session
         | 
| 1967 | 
            -
                #    | 
| 1968 | 
            -
                #   separate limit. Your request can fail for this limit | 
| 1969 | 
            -
                #   plaintext meets the other requirements. The | 
| 1970 | 
            -
                #   response element indicates by percentage how close | 
| 1971 | 
            -
                #   tags for your request are to the upper size limit.
         | 
| 1969 | 
            +
                #   <note markdown="1"> An Amazon Web Services conversion compresses the passed inline session
         | 
| 1970 | 
            +
                #   policy, managed policy ARNs, and session tags into a packed binary
         | 
| 1971 | 
            +
                #   format that has a separate limit. Your request can fail for this limit
         | 
| 1972 | 
            +
                #   even if your plaintext meets the other requirements. The
         | 
| 1973 | 
            +
                #   `PackedPolicySize` response element indicates by percentage how close
         | 
| 1974 | 
            +
                #   the policies and tags for your request are to the upper size limit.
         | 
| 1972 1975 | 
             
                #
         | 
| 1973 1976 | 
             
                #    </note>
         | 
| 1974 1977 | 
             
                #
         | 
| @@ -1983,13 +1986,13 @@ module Aws::STS | |
| 1983 1986 | 
             
                #
         | 
| 1984 1987 | 
             
                #   You must pass an inline or managed [session policy][1] to this
         | 
| 1985 1988 | 
             
                #   operation. You can pass a single JSON policy document to use as an
         | 
| 1986 | 
            -
                #   inline session policy. You can also specify up to 10 managed  | 
| 1987 | 
            -
                #   to use as managed session policies. The | 
| 1988 | 
            -
                #   both inline and managed session policies | 
| 1989 | 
            -
                #   characters. You can provide up to 10 managed | 
| 1990 | 
            -
                #   information about ARNs, see [Amazon Resource | 
| 1991 | 
            -
                #   Web Services Service Namespaces][2] in the | 
| 1992 | 
            -
                #   Reference.
         | 
| 1989 | 
            +
                #   inline session policy. You can also specify up to 10 managed policy
         | 
| 1990 | 
            +
                #   Amazon Resource Names (ARNs) to use as managed session policies. The
         | 
| 1991 | 
            +
                #   plaintext that you use for both inline and managed session policies
         | 
| 1992 | 
            +
                #   can't exceed 2,048 characters. You can provide up to 10 managed
         | 
| 1993 | 
            +
                #   policy ARNs. For more information about ARNs, see [Amazon Resource
         | 
| 1994 | 
            +
                #   Names (ARNs) and Amazon Web Services Service Namespaces][2] in the
         | 
| 1995 | 
            +
                #   Amazon Web Services General Reference.
         | 
| 1993 1996 | 
             
                #
         | 
| 1994 1997 | 
             
                #   This parameter is optional. However, if you do not pass any session
         | 
| 1995 1998 | 
             
                #   policies, then the resulting federated user session has no
         | 
| @@ -2010,12 +2013,12 @@ module Aws::STS | |
| 2010 2013 | 
             
                #   are granted in addition to the permissions that are granted by the
         | 
| 2011 2014 | 
             
                #   session policies.
         | 
| 2012 2015 | 
             
                #
         | 
| 2013 | 
            -
                #   <note markdown="1"> An Amazon Web Services conversion compresses the passed session
         | 
| 2014 | 
            -
                #    | 
| 2015 | 
            -
                #   separate limit. Your request can fail for this limit | 
| 2016 | 
            -
                #   plaintext meets the other requirements. The | 
| 2017 | 
            -
                #   response element indicates by percentage how close | 
| 2018 | 
            -
                #   tags for your request are to the upper size limit.
         | 
| 2016 | 
            +
                #   <note markdown="1"> An Amazon Web Services conversion compresses the passed inline session
         | 
| 2017 | 
            +
                #   policy, managed policy ARNs, and session tags into a packed binary
         | 
| 2018 | 
            +
                #   format that has a separate limit. Your request can fail for this limit
         | 
| 2019 | 
            +
                #   even if your plaintext meets the other requirements. The
         | 
| 2020 | 
            +
                #   `PackedPolicySize` response element indicates by percentage how close
         | 
| 2021 | 
            +
                #   the policies and tags for your request are to the upper size limit.
         | 
| 2019 2022 | 
             
                #
         | 
| 2020 2023 | 
             
                #    </note>
         | 
| 2021 2024 | 
             
                #
         | 
| @@ -2028,10 +2031,10 @@ module Aws::STS | |
| 2028 2031 | 
             
                #   The duration, in seconds, that the session should last. Acceptable
         | 
| 2029 2032 | 
             
                #   durations for federation sessions range from 900 seconds (15 minutes)
         | 
| 2030 2033 | 
             
                #   to 129,600 seconds (36 hours), with 43,200 seconds (12 hours) as the
         | 
| 2031 | 
            -
                #   default. Sessions obtained using  | 
| 2032 | 
            -
                #    | 
| 2033 | 
            -
                #    | 
| 2034 | 
            -
                #    | 
| 2034 | 
            +
                #   default. Sessions obtained using root user credentials are restricted
         | 
| 2035 | 
            +
                #   to a maximum of 3,600 seconds (one hour). If the specified duration is
         | 
| 2036 | 
            +
                #   longer than one hour, the session obtained by using root user
         | 
| 2037 | 
            +
                #   credentials defaults to one hour.
         | 
| 2035 2038 | 
             
                #
         | 
| 2036 2039 | 
             
                # @option params [Array<Types::Tag>] :tags
         | 
| 2037 2040 | 
             
                #   A list of session tags. Each session tag consists of a key name and an
         | 
| @@ -2043,12 +2046,12 @@ module Aws::STS | |
| 2043 2046 | 
             
                #   can’t exceed 256 characters. For these and additional limits, see [IAM
         | 
| 2044 2047 | 
             
                #   and STS Character Limits][2] in the *IAM User Guide*.
         | 
| 2045 2048 | 
             
                #
         | 
| 2046 | 
            -
                #   <note markdown="1"> An Amazon Web Services conversion compresses the passed session
         | 
| 2047 | 
            -
                #    | 
| 2048 | 
            -
                #   separate limit. Your request can fail for this limit | 
| 2049 | 
            -
                #   plaintext meets the other requirements. The | 
| 2050 | 
            -
                #   response element indicates by percentage how close | 
| 2051 | 
            -
                #   tags for your request are to the upper size limit.
         | 
| 2049 | 
            +
                #   <note markdown="1"> An Amazon Web Services conversion compresses the passed inline session
         | 
| 2050 | 
            +
                #   policy, managed policy ARNs, and session tags into a packed binary
         | 
| 2051 | 
            +
                #   format that has a separate limit. Your request can fail for this limit
         | 
| 2052 | 
            +
                #   even if your plaintext meets the other requirements. The
         | 
| 2053 | 
            +
                #   `PackedPolicySize` response element indicates by percentage how close
         | 
| 2054 | 
            +
                #   the policies and tags for your request are to the upper size limit.
         | 
| 2052 2055 | 
             
                #
         | 
| 2053 2056 | 
             
                #    </note>
         | 
| 2054 2057 | 
             
                #
         | 
| @@ -2151,14 +2154,15 @@ module Aws::STS | |
| 2151 2154 | 
             
                # secret access key, and a security token. Typically, you use
         | 
| 2152 2155 | 
             
                # `GetSessionToken` if you want to use MFA to protect programmatic calls
         | 
| 2153 2156 | 
             
                # to specific Amazon Web Services API operations like Amazon EC2
         | 
| 2154 | 
            -
                # `StopInstances`. | 
| 2155 | 
            -
                # | 
| 2156 | 
            -
                # MFA  | 
| 2157 | 
            -
                #  | 
| 2158 | 
            -
                #  | 
| 2159 | 
            -
                #  | 
| 2160 | 
            -
                #  | 
| 2161 | 
            -
                #  | 
| 2157 | 
            +
                # `StopInstances`.
         | 
| 2158 | 
            +
                #
         | 
| 2159 | 
            +
                # MFA-enabled IAM users must call `GetSessionToken` and submit an MFA
         | 
| 2160 | 
            +
                # code that is associated with their MFA device. Using the temporary
         | 
| 2161 | 
            +
                # security credentials that the call returns, IAM users can then make
         | 
| 2162 | 
            +
                # programmatic calls to API operations that require MFA authentication.
         | 
| 2163 | 
            +
                # An incorrect MFA code causes the API to return an access denied error.
         | 
| 2164 | 
            +
                # For a comparison of `GetSessionToken` with the other API operations
         | 
| 2165 | 
            +
                # that produce temporary credentials, see [Requesting Temporary Security
         | 
| 2162 2166 | 
             
                # Credentials][1] and [Comparing the Amazon Web Services STS API
         | 
| 2163 2167 | 
             
                # operations][2] in the *IAM User Guide*.
         | 
| 2164 2168 | 
             
                #
         | 
| @@ -2173,13 +2177,13 @@ module Aws::STS | |
| 2173 2177 | 
             
                # **Session Duration**
         | 
| 2174 2178 | 
             
                #
         | 
| 2175 2179 | 
             
                # The `GetSessionToken` operation must be called by using the long-term
         | 
| 2176 | 
            -
                # Amazon Web Services security credentials of  | 
| 2177 | 
            -
                #  | 
| 2178 | 
            -
                #  | 
| 2179 | 
            -
                #  | 
| 2180 | 
            -
                # ( | 
| 2181 | 
            -
                #  | 
| 2182 | 
            -
                #  | 
| 2180 | 
            +
                # Amazon Web Services security credentials of an IAM user. Credentials
         | 
| 2181 | 
            +
                # that are created by IAM users are valid for the duration that you
         | 
| 2182 | 
            +
                # specify. This duration can range from 900 seconds (15 minutes) up to a
         | 
| 2183 | 
            +
                # maximum of 129,600 seconds (36 hours), with a default of 43,200
         | 
| 2184 | 
            +
                # seconds (12 hours). Credentials based on account credentials can range
         | 
| 2185 | 
            +
                # from 900 seconds (15 minutes) up to 3,600 seconds (1 hour), with a
         | 
| 2186 | 
            +
                # default of 1 hour.
         | 
| 2183 2187 | 
             
                #
         | 
| 2184 2188 | 
             
                # **Permissions**
         | 
| 2185 2189 | 
             
                #
         | 
| @@ -2193,24 +2197,23 @@ module Aws::STS | |
| 2193 2197 | 
             
                # * You cannot call any STS API *except* `AssumeRole` or
         | 
| 2194 2198 | 
             
                #   `GetCallerIdentity`.
         | 
| 2195 2199 | 
             
                #
         | 
| 2196 | 
            -
                #  | 
| 2197 | 
            -
                #  | 
| 2198 | 
            -
                #  | 
| 2199 | 
            -
                #  | 
| 2200 | 
            -
                # with Amazon Web Services.
         | 
| 2200 | 
            +
                # The credentials that `GetSessionToken` returns are based on
         | 
| 2201 | 
            +
                # permissions associated with the IAM user whose credentials were used
         | 
| 2202 | 
            +
                # to call the operation. The temporary credentials have the same
         | 
| 2203 | 
            +
                # permissions as the IAM user.
         | 
| 2201 2204 | 
             
                #
         | 
| 2202 | 
            -
                # | 
| 2205 | 
            +
                # <note markdown="1"> Although it is possible to call `GetSessionToken` using the security
         | 
| 2206 | 
            +
                # credentials of an Amazon Web Services account root user rather than an
         | 
| 2207 | 
            +
                # IAM user, we do not recommend it. If `GetSessionToken` is called using
         | 
| 2208 | 
            +
                # root user credentials, the temporary credentials have root user
         | 
| 2209 | 
            +
                # permissions. For more information, see [Safeguard your root user
         | 
| 2210 | 
            +
                # credentials and don't use them for everyday tasks][4] in the *IAM
         | 
| 2211 | 
            +
                # User Guide*
         | 
| 2203 2212 | 
             
                #
         | 
| 2204 | 
            -
                # | 
| 2205 | 
            -
                # permissions associated with the user whose credentials were used to
         | 
| 2206 | 
            -
                # call the operation. If `GetSessionToken` is called using Amazon Web
         | 
| 2207 | 
            -
                # Services account root user credentials, the temporary credentials have
         | 
| 2208 | 
            -
                # root user permissions. Similarly, if `GetSessionToken` is called using
         | 
| 2209 | 
            -
                # the credentials of an IAM user, the temporary credentials have the
         | 
| 2210 | 
            -
                # same permissions as the IAM user.
         | 
| 2213 | 
            +
                #  </note>
         | 
| 2211 2214 | 
             
                #
         | 
| 2212 2215 | 
             
                # For more information about using `GetSessionToken` to create temporary
         | 
| 2213 | 
            -
                # credentials,  | 
| 2216 | 
            +
                # credentials, see [Temporary Credentials for Users in Untrusted
         | 
| 2214 2217 | 
             
                # Environments][5] in the *IAM User Guide*.
         | 
| 2215 2218 | 
             
                #
         | 
| 2216 2219 | 
             
                #
         | 
| @@ -2218,7 +2221,7 @@ module Aws::STS | |
| 2218 2221 | 
             
                # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html
         | 
| 2219 2222 | 
             
                # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#stsapi_comparison
         | 
| 2220 2223 | 
             
                # [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_getsessiontoken.html
         | 
| 2221 | 
            -
                # [4]: https://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html# | 
| 2224 | 
            +
                # [4]: https://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html#lock-away-credentials
         | 
| 2222 2225 | 
             
                # [5]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#api_getsessiontoken
         | 
| 2223 2226 | 
             
                #
         | 
| 2224 2227 | 
             
                # @option params [Integer] :duration_seconds
         | 
| @@ -2316,7 +2319,7 @@ module Aws::STS | |
| 2316 2319 | 
             
                    params: params,
         | 
| 2317 2320 | 
             
                    config: config)
         | 
| 2318 2321 | 
             
                  context[:gem_name] = 'aws-sdk-core'
         | 
| 2319 | 
            -
                  context[:gem_version] = '3. | 
| 2322 | 
            +
                  context[:gem_version] = '3.174.0'
         | 
| 2320 2323 | 
             
                  Seahorse::Client::Request.new(handlers, context)
         | 
| 2321 2324 | 
             
                end
         | 
| 2322 2325 |  |