aws-sdk-core 3.165.0 → 3.201.0

Sign up to get free protection for your applications and to get access to all the features.
Files changed (164) hide show
  1. checksums.yaml +4 -4
  2. data/CHANGELOG.md +462 -0
  3. data/VERSION +1 -1
  4. data/lib/aws-defaults/default_configuration.rb +4 -4
  5. data/lib/aws-sdk-core/binary/decode_handler.rb +3 -9
  6. data/lib/aws-sdk-core/binary/encode_handler.rb +1 -1
  7. data/lib/aws-sdk-core/binary/event_builder.rb +34 -37
  8. data/lib/aws-sdk-core/binary/event_stream_decoder.rb +1 -0
  9. data/lib/aws-sdk-core/binary/event_stream_encoder.rb +4 -3
  10. data/lib/aws-sdk-core/cbor/cbor_engine.rb +19 -0
  11. data/lib/aws-sdk-core/cbor/decoder.rb +310 -0
  12. data/lib/aws-sdk-core/cbor/encoder.rb +243 -0
  13. data/lib/aws-sdk-core/cbor.rb +106 -0
  14. data/lib/aws-sdk-core/client_stubs.rb +18 -14
  15. data/lib/aws-sdk-core/credential_provider.rb +4 -1
  16. data/lib/aws-sdk-core/credential_provider_chain.rb +8 -5
  17. data/lib/aws-sdk-core/ec2_metadata.rb +1 -1
  18. data/lib/aws-sdk-core/ecs_credentials.rb +178 -53
  19. data/lib/aws-sdk-core/endpoints/condition.rb +5 -0
  20. data/lib/aws-sdk-core/endpoints/endpoint_rule.rb +5 -1
  21. data/lib/aws-sdk-core/endpoints/error_rule.rb +5 -0
  22. data/lib/aws-sdk-core/endpoints/function.rb +5 -0
  23. data/lib/aws-sdk-core/endpoints/matchers.rb +18 -10
  24. data/lib/aws-sdk-core/endpoints/reference.rb +5 -0
  25. data/lib/aws-sdk-core/endpoints/rule.rb +5 -0
  26. data/lib/aws-sdk-core/endpoints/rule_set.rb +5 -0
  27. data/lib/aws-sdk-core/endpoints/rules_provider.rb +5 -0
  28. data/lib/aws-sdk-core/endpoints/templater.rb +6 -0
  29. data/lib/aws-sdk-core/endpoints/tree_rule.rb +5 -0
  30. data/lib/aws-sdk-core/endpoints/url.rb +1 -0
  31. data/lib/aws-sdk-core/endpoints.rb +69 -19
  32. data/lib/aws-sdk-core/error_handler.rb +41 -0
  33. data/lib/aws-sdk-core/errors.rb +12 -3
  34. data/lib/aws-sdk-core/event_emitter.rb +0 -16
  35. data/lib/aws-sdk-core/ini_parser.rb +7 -0
  36. data/lib/aws-sdk-core/instance_profile_credentials.rb +55 -32
  37. data/lib/aws-sdk-core/json/builder.rb +8 -1
  38. data/lib/aws-sdk-core/json/error_handler.rb +29 -14
  39. data/lib/aws-sdk-core/json/handler.rb +12 -6
  40. data/lib/aws-sdk-core/json/json_engine.rb +3 -1
  41. data/lib/aws-sdk-core/json/oj_engine.rb +7 -1
  42. data/lib/aws-sdk-core/json/parser.rb +33 -3
  43. data/lib/aws-sdk-core/json.rb +43 -14
  44. data/lib/aws-sdk-core/log/formatter.rb +6 -0
  45. data/lib/aws-sdk-core/lru_cache.rb +75 -0
  46. data/lib/aws-sdk-core/pageable_response.rb +3 -1
  47. data/lib/aws-sdk-core/param_validator.rb +9 -4
  48. data/lib/aws-sdk-core/plugins/bearer_authorization.rb +2 -0
  49. data/lib/aws-sdk-core/plugins/checksum_algorithm.rb +7 -4
  50. data/lib/aws-sdk-core/plugins/client_metrics_plugin.rb +1 -0
  51. data/lib/aws-sdk-core/plugins/client_metrics_send_plugin.rb +14 -2
  52. data/lib/aws-sdk-core/plugins/credentials_configuration.rb +2 -0
  53. data/lib/aws-sdk-core/plugins/global_configuration.rb +8 -9
  54. data/lib/aws-sdk-core/plugins/http_checksum.rb +2 -1
  55. data/lib/aws-sdk-core/plugins/invocation_id.rb +1 -11
  56. data/lib/aws-sdk-core/plugins/logging.rb +2 -0
  57. data/lib/aws-sdk-core/plugins/protocols/api_gateway.rb +3 -1
  58. data/lib/aws-sdk-core/plugins/protocols/ec2.rb +2 -24
  59. data/lib/aws-sdk-core/plugins/protocols/json_rpc.rb +6 -8
  60. data/lib/aws-sdk-core/plugins/protocols/query.rb +4 -2
  61. data/lib/aws-sdk-core/plugins/protocols/rest_json.rb +3 -15
  62. data/lib/aws-sdk-core/plugins/protocols/rest_xml.rb +3 -0
  63. data/lib/aws-sdk-core/plugins/protocols/rpc_v2.rb +17 -0
  64. data/lib/aws-sdk-core/plugins/regional_endpoint.rb +140 -35
  65. data/lib/aws-sdk-core/plugins/request_compression.rb +226 -0
  66. data/lib/aws-sdk-core/plugins/retries/error_inspector.rb +2 -1
  67. data/lib/aws-sdk-core/plugins/retry_errors.rb +12 -3
  68. data/lib/aws-sdk-core/plugins/sign.rb +43 -19
  69. data/lib/aws-sdk-core/plugins/signature_v2.rb +2 -1
  70. data/lib/aws-sdk-core/plugins/signature_v4.rb +2 -1
  71. data/lib/aws-sdk-core/plugins/stub_responses.rb +1 -0
  72. data/lib/aws-sdk-core/plugins/transfer_encoding.rb +16 -9
  73. data/lib/aws-sdk-core/plugins/user_agent.rb +152 -14
  74. data/lib/aws-sdk-core/process_credentials.rb +45 -27
  75. data/lib/aws-sdk-core/query/ec2_handler.rb +27 -0
  76. data/lib/aws-sdk-core/query/ec2_param_builder.rb +5 -7
  77. data/lib/aws-sdk-core/query/handler.rb +4 -4
  78. data/lib/aws-sdk-core/query/param_builder.rb +2 -2
  79. data/lib/aws-sdk-core/query.rb +2 -1
  80. data/lib/aws-sdk-core/refreshing_credentials.rb +12 -12
  81. data/lib/aws-sdk-core/rest/content_type_handler.rb +60 -0
  82. data/lib/aws-sdk-core/rest/handler.rb +3 -4
  83. data/lib/aws-sdk-core/rest/request/body.rb +32 -5
  84. data/lib/aws-sdk-core/rest/request/endpoint.rb +24 -4
  85. data/lib/aws-sdk-core/rest/request/headers.rb +15 -7
  86. data/lib/aws-sdk-core/rest/request/querystring_builder.rb +62 -36
  87. data/lib/aws-sdk-core/rest/response/body.rb +15 -1
  88. data/lib/aws-sdk-core/rest/response/header_list_parser.rb +79 -0
  89. data/lib/aws-sdk-core/rest/response/headers.rb +8 -3
  90. data/lib/aws-sdk-core/rest.rb +1 -0
  91. data/lib/aws-sdk-core/rpc_v2/builder.rb +62 -0
  92. data/lib/aws-sdk-core/rpc_v2/content_type_handler.rb +45 -0
  93. data/lib/aws-sdk-core/rpc_v2/error_handler.rb +84 -0
  94. data/lib/aws-sdk-core/rpc_v2/handler.rb +74 -0
  95. data/lib/aws-sdk-core/rpc_v2/parser.rb +90 -0
  96. data/lib/aws-sdk-core/rpc_v2.rb +6 -0
  97. data/lib/aws-sdk-core/shared_config.rb +77 -18
  98. data/lib/aws-sdk-core/sso_credentials.rb +80 -45
  99. data/lib/aws-sdk-core/sso_token_provider.rb +3 -2
  100. data/lib/aws-sdk-core/stubbing/protocols/rpc_v2.rb +41 -0
  101. data/lib/aws-sdk-core/stubbing/stub_data.rb +11 -0
  102. data/lib/aws-sdk-core/util.rb +39 -0
  103. data/lib/aws-sdk-core/waiters/poller.rb +4 -2
  104. data/lib/aws-sdk-core/xml/builder.rb +17 -9
  105. data/lib/aws-sdk-core/xml/error_handler.rb +32 -42
  106. data/lib/aws-sdk-core/xml/parser/frame.rb +4 -20
  107. data/lib/aws-sdk-core/xml/parser/{engines/oga.rb → oga_engine.rb} +2 -0
  108. data/lib/aws-sdk-core/xml/parser/stack.rb +2 -0
  109. data/lib/aws-sdk-core/xml/parser.rb +2 -6
  110. data/lib/aws-sdk-core.rb +8 -2
  111. data/lib/aws-sdk-sso/client.rb +103 -46
  112. data/lib/aws-sdk-sso/client_api.rb +6 -0
  113. data/lib/aws-sdk-sso/endpoint_provider.rb +41 -96
  114. data/lib/aws-sdk-sso/endpoints.rb +1 -0
  115. data/lib/aws-sdk-sso/plugins/endpoints.rb +4 -2
  116. data/lib/aws-sdk-sso/types.rb +0 -35
  117. data/lib/aws-sdk-sso.rb +1 -1
  118. data/lib/aws-sdk-ssooidc/client.rb +488 -74
  119. data/lib/aws-sdk-ssooidc/client_api.rb +82 -1
  120. data/lib/aws-sdk-ssooidc/endpoint_provider.rb +41 -95
  121. data/lib/aws-sdk-ssooidc/endpoints.rb +15 -0
  122. data/lib/aws-sdk-ssooidc/errors.rb +52 -0
  123. data/lib/aws-sdk-ssooidc/plugins/endpoints.rb +6 -2
  124. data/lib/aws-sdk-ssooidc/types.rb +372 -83
  125. data/lib/aws-sdk-ssooidc.rb +1 -1
  126. data/lib/aws-sdk-sts/client.rb +361 -288
  127. data/lib/aws-sdk-sts/client_api.rb +24 -11
  128. data/lib/aws-sdk-sts/endpoint_provider.rb +96 -213
  129. data/lib/aws-sdk-sts/endpoints.rb +1 -0
  130. data/lib/aws-sdk-sts/plugins/endpoints.rb +4 -2
  131. data/lib/aws-sdk-sts/presigner.rb +1 -1
  132. data/lib/aws-sdk-sts/types.rb +128 -197
  133. data/lib/aws-sdk-sts.rb +1 -1
  134. data/lib/seahorse/client/async_base.rb +1 -1
  135. data/lib/seahorse/client/async_response.rb +19 -0
  136. data/lib/seahorse/client/base.rb +18 -7
  137. data/lib/seahorse/client/configuration.rb +0 -4
  138. data/lib/seahorse/client/h2/connection.rb +12 -11
  139. data/lib/seahorse/client/h2/handler.rb +1 -0
  140. data/lib/seahorse/client/handler.rb +1 -1
  141. data/lib/seahorse/client/net_http/connection_pool.rb +3 -9
  142. data/lib/seahorse/client/net_http/patches.rb +1 -4
  143. data/lib/seahorse/client/plugin.rb +9 -0
  144. data/lib/seahorse/client/plugins/endpoint.rb +0 -1
  145. data/lib/seahorse/client/plugins/h2.rb +3 -3
  146. data/lib/seahorse/client/plugins/net_http.rb +48 -16
  147. data/lib/seahorse/client/plugins/request_callback.rb +31 -0
  148. data/lib/seahorse/client/response.rb +6 -0
  149. data/lib/seahorse/model/operation.rb +3 -0
  150. data/lib/seahorse/model/shapes.rb +2 -2
  151. data/sig/aws-sdk-core/client_stubs.rbs +10 -0
  152. data/sig/aws-sdk-core/errors.rbs +22 -0
  153. data/sig/aws-sdk-core/resources/collection.rbs +21 -0
  154. data/sig/aws-sdk-core/structure.rbs +4 -0
  155. data/sig/aws-sdk-core/waiters/errors.rbs +20 -0
  156. data/sig/aws-sdk-core.rbs +7 -0
  157. data/sig/seahorse/client/base.rbs +25 -0
  158. data/sig/seahorse/client/handler_builder.rbs +16 -0
  159. data/sig/seahorse/client/response.rbs +61 -0
  160. metadata +44 -17
  161. /data/lib/aws-sdk-core/xml/parser/{engines/libxml.rb → libxml_engine.rb} +0 -0
  162. /data/lib/aws-sdk-core/xml/parser/{engines/nokogiri.rb → nokogiri_engine.rb} +0 -0
  163. /data/lib/aws-sdk-core/xml/parser/{engines/ox.rb → ox_engine.rb} +0 -0
  164. /data/lib/aws-sdk-core/xml/parser/{engines/rexml.rb → rexml_engine.rb} +0 -0
@@ -22,12 +22,14 @@ require 'aws-sdk-core/plugins/endpoint_pattern.rb'
22
22
  require 'aws-sdk-core/plugins/response_paging.rb'
23
23
  require 'aws-sdk-core/plugins/stub_responses.rb'
24
24
  require 'aws-sdk-core/plugins/idempotency_token.rb'
25
+ require 'aws-sdk-core/plugins/invocation_id.rb'
25
26
  require 'aws-sdk-core/plugins/jsonvalue_converter.rb'
26
27
  require 'aws-sdk-core/plugins/client_metrics_plugin.rb'
27
28
  require 'aws-sdk-core/plugins/client_metrics_send_plugin.rb'
28
29
  require 'aws-sdk-core/plugins/transfer_encoding.rb'
29
30
  require 'aws-sdk-core/plugins/http_checksum.rb'
30
31
  require 'aws-sdk-core/plugins/checksum_algorithm.rb'
32
+ require 'aws-sdk-core/plugins/request_compression.rb'
31
33
  require 'aws-sdk-core/plugins/defaults_mode.rb'
32
34
  require 'aws-sdk-core/plugins/recursion_detection.rb'
33
35
  require 'aws-sdk-core/plugins/sign.rb'
@@ -72,12 +74,14 @@ module Aws::STS
72
74
  add_plugin(Aws::Plugins::ResponsePaging)
73
75
  add_plugin(Aws::Plugins::StubResponses)
74
76
  add_plugin(Aws::Plugins::IdempotencyToken)
77
+ add_plugin(Aws::Plugins::InvocationId)
75
78
  add_plugin(Aws::Plugins::JsonvalueConverter)
76
79
  add_plugin(Aws::Plugins::ClientMetricsPlugin)
77
80
  add_plugin(Aws::Plugins::ClientMetricsSendPlugin)
78
81
  add_plugin(Aws::Plugins::TransferEncoding)
79
82
  add_plugin(Aws::Plugins::HttpChecksum)
80
83
  add_plugin(Aws::Plugins::ChecksumAlgorithm)
84
+ add_plugin(Aws::Plugins::RequestCompression)
81
85
  add_plugin(Aws::Plugins::DefaultsMode)
82
86
  add_plugin(Aws::Plugins::RecursionDetection)
83
87
  add_plugin(Aws::Plugins::Sign)
@@ -87,6 +91,11 @@ module Aws::STS
87
91
 
88
92
  # @overload initialize(options)
89
93
  # @param [Hash] options
94
+ #
95
+ # @option options [Array<Seahorse::Client::Plugin>] :plugins ([]])
96
+ # A list of plugins to apply to the client. Each plugin is either a
97
+ # class name or an instance of a plugin class.
98
+ #
90
99
  # @option options [required, Aws::CredentialProvider] :credentials
91
100
  # Your AWS credentials. This can be an instance of any one of the
92
101
  # following classes:
@@ -192,10 +201,20 @@ module Aws::STS
192
201
  # Set to true to disable SDK automatically adding host prefix
193
202
  # to default service endpoint when available.
194
203
  #
195
- # @option options [String] :endpoint
196
- # The client endpoint is normally constructed from the `:region`
197
- # option. You should only configure an `:endpoint` when connecting
198
- # to test or custom endpoints. This should be a valid HTTP(S) URI.
204
+ # @option options [Boolean] :disable_request_compression (false)
205
+ # When set to 'true' the request body will not be compressed
206
+ # for supported operations.
207
+ #
208
+ # @option options [String, URI::HTTPS, URI::HTTP] :endpoint
209
+ # Normally you should not configure the `:endpoint` option
210
+ # directly. This is normally constructed from the `:region`
211
+ # option. Configuring `:endpoint` is normally reserved for
212
+ # connecting to test or custom endpoints. The endpoint should
213
+ # be a URI formatted like:
214
+ #
215
+ # 'http://example.com'
216
+ # 'https://example.com'
217
+ # 'http://example.com:123'
199
218
  #
200
219
  # @option options [Integer] :endpoint_cache_max_entries (1000)
201
220
  # Used for the maximum size limit of the LRU cache storing endpoints data
@@ -212,6 +231,10 @@ module Aws::STS
212
231
  # @option options [Boolean] :endpoint_discovery (false)
213
232
  # When set to `true`, endpoint discovery will be enabled for operations when available.
214
233
  #
234
+ # @option options [Boolean] :ignore_configured_endpoint_urls
235
+ # Setting to true disables use of endpoint URLs provided via environment
236
+ # variables and the shared configuration file.
237
+ #
215
238
  # @option options [Aws::Log::Formatter] :log_formatter (Aws::Log::Formatter.default)
216
239
  # The log formatter.
217
240
  #
@@ -232,6 +255,11 @@ module Aws::STS
232
255
  # Used when loading credentials from the shared credentials file
233
256
  # at HOME/.aws/credentials. When not specified, 'default' is used.
234
257
  #
258
+ # @option options [Integer] :request_min_compression_size_bytes (10240)
259
+ # The minimum size in bytes that triggers compression for request
260
+ # bodies. The value must be non-negative integer value between 0
261
+ # and 10485780 bytes inclusive.
262
+ #
235
263
  # @option options [Proc] :retry_backoff
236
264
  # A proc or lambda used for backoff. Defaults to 2**retries * retry_base_delay.
237
265
  # This option is only used in the `legacy` retry mode.
@@ -276,11 +304,25 @@ module Aws::STS
276
304
  # throttling. This is a provisional mode that may change behavior
277
305
  # in the future.
278
306
  #
307
+ # @option options [String] :sdk_ua_app_id
308
+ # A unique and opaque application ID that is appended to the
309
+ # User-Agent header as app/sdk_ua_app_id. It should have a
310
+ # maximum length of 50. This variable is sourced from environment
311
+ # variable AWS_SDK_UA_APP_ID or the shared config profile attribute sdk_ua_app_id.
279
312
  #
280
313
  # @option options [String] :secret_access_key
281
314
  #
282
315
  # @option options [String] :session_token
283
316
  #
317
+ # @option options [Array] :sigv4a_signing_region_set
318
+ # A list of regions that should be signed with SigV4a signing. When
319
+ # not passed, a default `:sigv4a_signing_region_set` is searched for
320
+ # in the following locations:
321
+ #
322
+ # * `Aws.config[:sigv4a_signing_region_set]`
323
+ # * `ENV['AWS_SIGV4A_SIGNING_REGION_SET']`
324
+ # * `~/.aws/config`
325
+ #
284
326
  # @option options [String] :sts_regional_endpoints ("regional")
285
327
  # Passing in 'regional' to enable regional endpoint for STS for all supported
286
328
  # regions (except 'aws-global'). Using 'legacy' mode will force all legacy
@@ -324,50 +366,65 @@ module Aws::STS
324
366
  # @option options [Aws::STS::EndpointProvider] :endpoint_provider
325
367
  # The endpoint provider used to resolve endpoints. Any object that responds to `#resolve_endpoint(parameters)` where `parameters` is a Struct similar to `Aws::STS::EndpointParameters`
326
368
  #
327
- # @option options [URI::HTTP,String] :http_proxy A proxy to send
328
- # requests through. Formatted like 'http://proxy.com:123'.
329
- #
330
- # @option options [Float] :http_open_timeout (15) The number of
331
- # seconds to wait when opening a HTTP session before raising a
332
- # `Timeout::Error`.
333
- #
334
- # @option options [Float] :http_read_timeout (60) The default
335
- # number of seconds to wait for response data. This value can
336
- # safely be set per-request on the session.
337
- #
338
- # @option options [Float] :http_idle_timeout (5) The number of
339
- # seconds a connection is allowed to sit idle before it is
340
- # considered stale. Stale connections are closed and removed
341
- # from the pool before making a request.
342
- #
343
- # @option options [Float] :http_continue_timeout (1) The number of
344
- # seconds to wait for a 100-continue response before sending the
345
- # request body. This option has no effect unless the request has
346
- # "Expect" header set to "100-continue". Defaults to `nil` which
347
- # disables this behaviour. This value can safely be set per
348
- # request on the session.
349
- #
350
- # @option options [Float] :ssl_timeout (nil) Sets the SSL timeout
351
- # in seconds.
352
- #
353
- # @option options [Boolean] :http_wire_trace (false) When `true`,
354
- # HTTP debug output will be sent to the `:logger`.
369
+ # @option options [Float] :http_continue_timeout (1)
370
+ # The number of seconds to wait for a 100-continue response before sending the
371
+ # request body. This option has no effect unless the request has "Expect"
372
+ # header set to "100-continue". Defaults to `nil` which disables this
373
+ # behaviour. This value can safely be set per request on the session.
374
+ #
375
+ # @option options [Float] :http_idle_timeout (5)
376
+ # The number of seconds a connection is allowed to sit idle before it
377
+ # is considered stale. Stale connections are closed and removed from the
378
+ # pool before making a request.
379
+ #
380
+ # @option options [Float] :http_open_timeout (15)
381
+ # The default number of seconds to wait for response data.
382
+ # This value can safely be set per-request on the session.
383
+ #
384
+ # @option options [URI::HTTP,String] :http_proxy
385
+ # A proxy to send requests through. Formatted like 'http://proxy.com:123'.
386
+ #
387
+ # @option options [Float] :http_read_timeout (60)
388
+ # The default number of seconds to wait for response data.
389
+ # This value can safely be set per-request on the session.
390
+ #
391
+ # @option options [Boolean] :http_wire_trace (false)
392
+ # When `true`, HTTP debug output will be sent to the `:logger`.
393
+ #
394
+ # @option options [Proc] :on_chunk_received
395
+ # When a Proc object is provided, it will be used as callback when each chunk
396
+ # of the response body is received. It provides three arguments: the chunk,
397
+ # the number of bytes received, and the total number of
398
+ # bytes in the response (or nil if the server did not send a `content-length`).
399
+ #
400
+ # @option options [Proc] :on_chunk_sent
401
+ # When a Proc object is provided, it will be used as callback when each chunk
402
+ # of the request body is sent. It provides three arguments: the chunk,
403
+ # the number of bytes read from the body, and the total number of
404
+ # bytes in the body.
405
+ #
406
+ # @option options [Boolean] :raise_response_errors (true)
407
+ # When `true`, response errors are raised.
408
+ #
409
+ # @option options [String] :ssl_ca_bundle
410
+ # Full path to the SSL certificate authority bundle file that should be used when
411
+ # verifying peer certificates. If you do not pass `:ssl_ca_bundle` or
412
+ # `:ssl_ca_directory` the the system default will be used if available.
413
+ #
414
+ # @option options [String] :ssl_ca_directory
415
+ # Full path of the directory that contains the unbundled SSL certificate
416
+ # authority files for verifying peer certificates. If you do
417
+ # not pass `:ssl_ca_bundle` or `:ssl_ca_directory` the the system
418
+ # default will be used if available.
355
419
  #
356
- # @option options [Boolean] :ssl_verify_peer (true) When `true`,
357
- # SSL peer certificates are verified when establishing a
358
- # connection.
420
+ # @option options [String] :ssl_ca_store
421
+ # Sets the X509::Store to verify peer certificate.
359
422
  #
360
- # @option options [String] :ssl_ca_bundle Full path to the SSL
361
- # certificate authority bundle file that should be used when
362
- # verifying peer certificates. If you do not pass
363
- # `:ssl_ca_bundle` or `:ssl_ca_directory` the the system default
364
- # will be used if available.
423
+ # @option options [Float] :ssl_timeout
424
+ # Sets the SSL timeout in seconds
365
425
  #
366
- # @option options [String] :ssl_ca_directory Full path of the
367
- # directory that contains the unbundled SSL certificate
368
- # authority files for verifying peer certificates. If you do
369
- # not pass `:ssl_ca_bundle` or `:ssl_ca_directory` the the
370
- # system default will be used if available.
426
+ # @option options [Boolean] :ssl_verify_peer (true)
427
+ # When `true`, SSL peer certificates are verified when establishing a connection.
371
428
  #
372
429
  def initialize(*args)
373
430
  super
@@ -376,14 +433,13 @@ module Aws::STS
376
433
  # @!group API Operations
377
434
 
378
435
  # Returns a set of temporary security credentials that you can use to
379
- # access Amazon Web Services resources that you might not normally have
380
- # access to. These temporary credentials consist of an access key ID, a
381
- # secret access key, and a security token. Typically, you use
382
- # `AssumeRole` within your account or for cross-account access. For a
383
- # comparison of `AssumeRole` with other API operations that produce
384
- # temporary credentials, see [Requesting Temporary Security
385
- # Credentials][1] and [Comparing the Amazon Web Services STS API
386
- # operations][2] in the *IAM User Guide*.
436
+ # access Amazon Web Services resources. These temporary credentials
437
+ # consist of an access key ID, a secret access key, and a security
438
+ # token. Typically, you use `AssumeRole` within your account or for
439
+ # cross-account access. For a comparison of `AssumeRole` with other API
440
+ # operations that produce temporary credentials, see [Requesting
441
+ # Temporary Security Credentials][1] and [Comparing the Amazon Web
442
+ # Services STS API operations][2] in the *IAM User Guide*.
387
443
  #
388
444
  # **Permissions**
389
445
  #
@@ -394,23 +450,24 @@ module Aws::STS
394
450
  #
395
451
  # (Optional) You can pass inline or managed [session policies][3] to
396
452
  # this operation. You can pass a single JSON policy document to use as
397
- # an inline session policy. You can also specify up to 10 managed
398
- # policies to use as managed session policies. The plaintext that you
399
- # use for both inline and managed session policies can't exceed 2,048
400
- # characters. Passing policies to this operation returns new temporary
401
- # credentials. The resulting session's permissions are the intersection
402
- # of the role's identity-based policy and the session policies. You can
403
- # use the role's temporary credentials in subsequent Amazon Web
404
- # Services API calls to access resources in the account that owns the
405
- # role. You cannot use session policies to grant more permissions than
406
- # those allowed by the identity-based policy of the role that is being
407
- # assumed. For more information, see [Session Policies][3] in the *IAM
408
- # User Guide*.
409
- #
410
- # When you create a role, you create two policies: A role trust policy
411
- # that specifies *who* can assume the role and a permissions policy that
412
- # specifies *what* can be done with the role. You specify the trusted
413
- # principal who is allowed to assume the role in the role trust policy.
453
+ # an inline session policy. You can also specify up to 10 managed policy
454
+ # Amazon Resource Names (ARNs) to use as managed session policies. The
455
+ # plaintext that you use for both inline and managed session policies
456
+ # can't exceed 2,048 characters. Passing policies to this operation
457
+ # returns new temporary credentials. The resulting session's
458
+ # permissions are the intersection of the role's identity-based policy
459
+ # and the session policies. You can use the role's temporary
460
+ # credentials in subsequent Amazon Web Services API calls to access
461
+ # resources in the account that owns the role. You cannot use session
462
+ # policies to grant more permissions than those allowed by the
463
+ # identity-based policy of the role that is being assumed. For more
464
+ # information, see [Session Policies][3] in the *IAM User Guide*.
465
+ #
466
+ # When you create a role, you create two policies: a role trust policy
467
+ # that specifies *who* can assume the role, and a permissions policy
468
+ # that specifies *what* can be done with the role. You specify the
469
+ # trusted principal that is allowed to assume the role in the role trust
470
+ # policy.
414
471
  #
415
472
  # To assume a role from a different account, your Amazon Web Services
416
473
  # account must be trusted by the role. The trust relationship is defined
@@ -419,10 +476,9 @@ module Aws::STS
419
476
  # users in the account.
420
477
  #
421
478
  # A user who wants to access a role in a different account must also
422
- # have permissions that are delegated from the user account
423
- # administrator. The administrator must attach a policy that allows the
424
- # user to call `AssumeRole` for the ARN of the role in the other
425
- # account.
479
+ # have permissions that are delegated from the account administrator.
480
+ # The administrator must attach a policy that allows the user to call
481
+ # `AssumeRole` for the ARN of the role in the other account.
426
482
  #
427
483
  # To allow a user to assume a role in the same account, you can do
428
484
  # either of the following:
@@ -519,12 +575,12 @@ module Aws::STS
519
575
  # about ARNs, see [Amazon Resource Names (ARNs) and Amazon Web Services
520
576
  # Service Namespaces][1] in the Amazon Web Services General Reference.
521
577
  #
522
- # <note markdown="1"> An Amazon Web Services conversion compresses the passed session
523
- # policies and session tags into a packed binary format that has a
524
- # separate limit. Your request can fail for this limit even if your
525
- # plaintext meets the other requirements. The `PackedPolicySize`
526
- # response element indicates by percentage how close the policies and
527
- # tags for your request are to the upper size limit.
578
+ # <note markdown="1"> An Amazon Web Services conversion compresses the passed inline session
579
+ # policy, managed policy ARNs, and session tags into a packed binary
580
+ # format that has a separate limit. Your request can fail for this limit
581
+ # even if your plaintext meets the other requirements. The
582
+ # `PackedPolicySize` response element indicates by percentage how close
583
+ # the policies and tags for your request are to the upper size limit.
528
584
  #
529
585
  # </note>
530
586
  #
@@ -564,12 +620,12 @@ module Aws::STS
564
620
  # the tab (\\u0009), linefeed (\\u000A), and carriage return (\\u000D)
565
621
  # characters.
566
622
  #
567
- # <note markdown="1"> An Amazon Web Services conversion compresses the passed session
568
- # policies and session tags into a packed binary format that has a
569
- # separate limit. Your request can fail for this limit even if your
570
- # plaintext meets the other requirements. The `PackedPolicySize`
571
- # response element indicates by percentage how close the policies and
572
- # tags for your request are to the upper size limit.
623
+ # <note markdown="1"> An Amazon Web Services conversion compresses the passed inline session
624
+ # policy, managed policy ARNs, and session tags into a packed binary
625
+ # format that has a separate limit. Your request can fail for this limit
626
+ # even if your plaintext meets the other requirements. The
627
+ # `PackedPolicySize` response element indicates by percentage how close
628
+ # the policies and tags for your request are to the upper size limit.
573
629
  #
574
630
  # </note>
575
631
  #
@@ -627,12 +683,12 @@ module Aws::STS
627
683
  # can’t exceed 256 characters. For these and additional limits, see [IAM
628
684
  # and STS Character Limits][2] in the *IAM User Guide*.
629
685
  #
630
- # <note markdown="1"> An Amazon Web Services conversion compresses the passed session
631
- # policies and session tags into a packed binary format that has a
632
- # separate limit. Your request can fail for this limit even if your
633
- # plaintext meets the other requirements. The `PackedPolicySize`
634
- # response element indicates by percentage how close the policies and
635
- # tags for your request are to the upper size limit.
686
+ # <note markdown="1"> An Amazon Web Services conversion compresses the passed inline session
687
+ # policy, managed policy ARNs, and session tags into a packed binary
688
+ # format that has a separate limit. Your request can fail for this limit
689
+ # even if your plaintext meets the other requirements. The
690
+ # `PackedPolicySize` response element indicates by percentage how close
691
+ # the policies and tags for your request are to the upper size limit.
636
692
  #
637
693
  # </note>
638
694
  #
@@ -747,6 +803,17 @@ module Aws::STS
747
803
  #
748
804
  # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_monitor.html
749
805
  #
806
+ # @option params [Array<Types::ProvidedContext>] :provided_contexts
807
+ # A list of previously acquired trusted context assertions in the format
808
+ # of a JSON array. The trusted context assertion is signed and encrypted
809
+ # by Amazon Web Services STS.
810
+ #
811
+ # The following is an example of a `ProvidedContext` value that includes
812
+ # a single trusted context assertion and the ARN of the context provider
813
+ # from which the trusted context assertion was generated.
814
+ #
815
+ # `[\{"ProviderArn":"arn:aws:iam::aws:contextProvider/IdentityCenter","ContextAssertion":"trusted-context-assertion"\}]`
816
+ #
750
817
  # @return [Types::AssumeRoleResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
751
818
  #
752
819
  # * {Types::AssumeRoleResponse#credentials #credentials} => Types::Credentials
@@ -807,7 +874,7 @@ module Aws::STS
807
874
  # arn: "arnType",
808
875
  # },
809
876
  # ],
810
- # policy: "sessionPolicyDocumentType",
877
+ # policy: "unrestrictedSessionPolicyDocumentType",
811
878
  # duration_seconds: 1,
812
879
  # tags: [
813
880
  # {
@@ -820,6 +887,12 @@ module Aws::STS
820
887
  # serial_number: "serialNumberType",
821
888
  # token_code: "tokenCodeType",
822
889
  # source_identity: "sourceIdentityType",
890
+ # provided_contexts: [
891
+ # {
892
+ # provider_arn: "arnType",
893
+ # context_assertion: "contextAssertionType",
894
+ # },
895
+ # ],
823
896
  # })
824
897
  #
825
898
  # @example Response structure
@@ -895,18 +968,18 @@ module Aws::STS
895
968
  #
896
969
  # (Optional) You can pass inline or managed [session policies][6] to
897
970
  # this operation. You can pass a single JSON policy document to use as
898
- # an inline session policy. You can also specify up to 10 managed
899
- # policies to use as managed session policies. The plaintext that you
900
- # use for both inline and managed session policies can't exceed 2,048
901
- # characters. Passing policies to this operation returns new temporary
902
- # credentials. The resulting session's permissions are the intersection
903
- # of the role's identity-based policy and the session policies. You can
904
- # use the role's temporary credentials in subsequent Amazon Web
905
- # Services API calls to access resources in the account that owns the
906
- # role. You cannot use session policies to grant more permissions than
907
- # those allowed by the identity-based policy of the role that is being
908
- # assumed. For more information, see [Session Policies][6] in the *IAM
909
- # User Guide*.
971
+ # an inline session policy. You can also specify up to 10 managed policy
972
+ # Amazon Resource Names (ARNs) to use as managed session policies. The
973
+ # plaintext that you use for both inline and managed session policies
974
+ # can't exceed 2,048 characters. Passing policies to this operation
975
+ # returns new temporary credentials. The resulting session's
976
+ # permissions are the intersection of the role's identity-based policy
977
+ # and the session policies. You can use the role's temporary
978
+ # credentials in subsequent Amazon Web Services API calls to access
979
+ # resources in the account that owns the role. You cannot use session
980
+ # policies to grant more permissions than those allowed by the
981
+ # identity-based policy of the role that is being assumed. For more
982
+ # information, see [Session Policies][6] in the *IAM User Guide*.
910
983
  #
911
984
  # Calling `AssumeRoleWithSAML` does not require the use of Amazon Web
912
985
  # Services security credentials. The identity of the caller is validated
@@ -932,12 +1005,12 @@ module Aws::STS
932
1005
  # characters. For these and additional limits, see [IAM and STS
933
1006
  # Character Limits][8] in the *IAM User Guide*.
934
1007
  #
935
- # <note markdown="1"> An Amazon Web Services conversion compresses the passed session
936
- # policies and session tags into a packed binary format that has a
937
- # separate limit. Your request can fail for this limit even if your
938
- # plaintext meets the other requirements. The `PackedPolicySize`
939
- # response element indicates by percentage how close the policies and
940
- # tags for your request are to the upper size limit.
1008
+ # <note markdown="1"> An Amazon Web Services conversion compresses the passed inline session
1009
+ # policy, managed policy ARNs, and session tags into a packed binary
1010
+ # format that has a separate limit. Your request can fail for this limit
1011
+ # even if your plaintext meets the other requirements. The
1012
+ # `PackedPolicySize` response element indicates by percentage how close
1013
+ # the policies and tags for your request are to the upper size limit.
941
1014
  #
942
1015
  # </note>
943
1016
  #
@@ -1023,12 +1096,12 @@ module Aws::STS
1023
1096
  # about ARNs, see [Amazon Resource Names (ARNs) and Amazon Web Services
1024
1097
  # Service Namespaces][1] in the Amazon Web Services General Reference.
1025
1098
  #
1026
- # <note markdown="1"> An Amazon Web Services conversion compresses the passed session
1027
- # policies and session tags into a packed binary format that has a
1028
- # separate limit. Your request can fail for this limit even if your
1029
- # plaintext meets the other requirements. The `PackedPolicySize`
1030
- # response element indicates by percentage how close the policies and
1031
- # tags for your request are to the upper size limit.
1099
+ # <note markdown="1"> An Amazon Web Services conversion compresses the passed inline session
1100
+ # policy, managed policy ARNs, and session tags into a packed binary
1101
+ # format that has a separate limit. Your request can fail for this limit
1102
+ # even if your plaintext meets the other requirements. The
1103
+ # `PackedPolicySize` response element indicates by percentage how close
1104
+ # the policies and tags for your request are to the upper size limit.
1032
1105
  #
1033
1106
  # </note>
1034
1107
  #
@@ -1068,12 +1141,12 @@ module Aws::STS
1068
1141
  # the tab (\\u0009), linefeed (\\u000A), and carriage return (\\u000D)
1069
1142
  # characters.
1070
1143
  #
1071
- # <note markdown="1"> An Amazon Web Services conversion compresses the passed session
1072
- # policies and session tags into a packed binary format that has a
1073
- # separate limit. Your request can fail for this limit even if your
1074
- # plaintext meets the other requirements. The `PackedPolicySize`
1075
- # response element indicates by percentage how close the policies and
1076
- # tags for your request are to the upper size limit.
1144
+ # <note markdown="1"> An Amazon Web Services conversion compresses the passed inline session
1145
+ # policy, managed policy ARNs, and session tags into a packed binary
1146
+ # format that has a separate limit. Your request can fail for this limit
1147
+ # even if your plaintext meets the other requirements. The
1148
+ # `PackedPolicySize` response element indicates by percentage how close
1149
+ # the policies and tags for your request are to the upper size limit.
1077
1150
  #
1078
1151
  # </note>
1079
1152
  #
@@ -1207,10 +1280,8 @@ module Aws::STS
1207
1280
  # the user with a consistent identity throughout the lifetime of an
1208
1281
  # application.
1209
1282
  #
1210
- # To learn more about Amazon Cognito, see [Amazon Cognito Overview][4]
1211
- # in *Amazon Web Services SDK for Android Developer Guide* and [Amazon
1212
- # Cognito Overview][5] in the *Amazon Web Services SDK for iOS Developer
1213
- # Guide*.
1283
+ # To learn more about Amazon Cognito, see [Amazon Cognito identity
1284
+ # pools][1] in *Amazon Cognito Developer Guide*.
1214
1285
  #
1215
1286
  # </note>
1216
1287
  #
@@ -1224,8 +1295,8 @@ module Aws::STS
1224
1295
  # a token from the web identity provider. For a comparison of
1225
1296
  # `AssumeRoleWithWebIdentity` with the other API operations that produce
1226
1297
  # temporary credentials, see [Requesting Temporary Security
1227
- # Credentials][6] and [Comparing the Amazon Web Services STS API
1228
- # operations][7] in the *IAM User Guide*.
1298
+ # Credentials][4] and [Comparing the Amazon Web Services STS API
1299
+ # operations][5] in the *IAM User Guide*.
1229
1300
  #
1230
1301
  # The temporary security credentials returned by this API consist of an
1231
1302
  # access key ID, a secret access key, and a security token. Applications
@@ -1241,11 +1312,11 @@ module Aws::STS
1241
1312
  # to the maximum session duration setting for the role. This setting can
1242
1313
  # have a value from 1 hour to 12 hours. To learn how to view the maximum
1243
1314
  # value for your role, see [View the Maximum Session Duration Setting
1244
- # for a Role][8] in the *IAM User Guide*. The maximum session duration
1315
+ # for a Role][6] in the *IAM User Guide*. The maximum session duration
1245
1316
  # limit applies when you use the `AssumeRole*` API operations or the
1246
1317
  # `assume-role*` CLI commands. However the limit does not apply when you
1247
1318
  # use those operations to create a console URL. For more information,
1248
- # see [Using IAM Roles][9] in the *IAM User Guide*.
1319
+ # see [Using IAM Roles][7] in the *IAM User Guide*.
1249
1320
  #
1250
1321
  # **Permissions**
1251
1322
  #
@@ -1254,39 +1325,39 @@ module Aws::STS
1254
1325
  # Amazon Web Services service with the following exception: you cannot
1255
1326
  # call the STS `GetFederationToken` or `GetSessionToken` API operations.
1256
1327
  #
1257
- # (Optional) You can pass inline or managed [session policies][10] to
1328
+ # (Optional) You can pass inline or managed [session policies][8] to
1258
1329
  # this operation. You can pass a single JSON policy document to use as
1259
- # an inline session policy. You can also specify up to 10 managed
1260
- # policies to use as managed session policies. The plaintext that you
1261
- # use for both inline and managed session policies can't exceed 2,048
1262
- # characters. Passing policies to this operation returns new temporary
1263
- # credentials. The resulting session's permissions are the intersection
1264
- # of the role's identity-based policy and the session policies. You can
1265
- # use the role's temporary credentials in subsequent Amazon Web
1266
- # Services API calls to access resources in the account that owns the
1267
- # role. You cannot use session policies to grant more permissions than
1268
- # those allowed by the identity-based policy of the role that is being
1269
- # assumed. For more information, see [Session Policies][10] in the *IAM
1270
- # User Guide*.
1330
+ # an inline session policy. You can also specify up to 10 managed policy
1331
+ # Amazon Resource Names (ARNs) to use as managed session policies. The
1332
+ # plaintext that you use for both inline and managed session policies
1333
+ # can't exceed 2,048 characters. Passing policies to this operation
1334
+ # returns new temporary credentials. The resulting session's
1335
+ # permissions are the intersection of the role's identity-based policy
1336
+ # and the session policies. You can use the role's temporary
1337
+ # credentials in subsequent Amazon Web Services API calls to access
1338
+ # resources in the account that owns the role. You cannot use session
1339
+ # policies to grant more permissions than those allowed by the
1340
+ # identity-based policy of the role that is being assumed. For more
1341
+ # information, see [Session Policies][8] in the *IAM User Guide*.
1271
1342
  #
1272
1343
  # **Tags**
1273
1344
  #
1274
1345
  # (Optional) You can configure your IdP to pass attributes into your web
1275
1346
  # identity token as session tags. Each session tag consists of a key
1276
1347
  # name and an associated value. For more information about session tags,
1277
- # see [Passing Session Tags in STS][11] in the *IAM User Guide*.
1348
+ # see [Passing Session Tags in STS][9] in the *IAM User Guide*.
1278
1349
  #
1279
1350
  # You can pass up to 50 session tags. The plaintext session tag keys
1280
1351
  # can’t exceed 128 characters and the values can’t exceed 256
1281
1352
  # characters. For these and additional limits, see [IAM and STS
1282
- # Character Limits][12] in the *IAM User Guide*.
1353
+ # Character Limits][10] in the *IAM User Guide*.
1283
1354
  #
1284
- # <note markdown="1"> An Amazon Web Services conversion compresses the passed session
1285
- # policies and session tags into a packed binary format that has a
1286
- # separate limit. Your request can fail for this limit even if your
1287
- # plaintext meets the other requirements. The `PackedPolicySize`
1288
- # response element indicates by percentage how close the policies and
1289
- # tags for your request are to the upper size limit.
1355
+ # <note markdown="1"> An Amazon Web Services conversion compresses the passed inline session
1356
+ # policy, managed policy ARNs, and session tags into a packed binary
1357
+ # format that has a separate limit. Your request can fail for this limit
1358
+ # even if your plaintext meets the other requirements. The
1359
+ # `PackedPolicySize` response element indicates by percentage how close
1360
+ # the policies and tags for your request are to the upper size limit.
1290
1361
  #
1291
1362
  # </note>
1292
1363
  #
@@ -1297,12 +1368,12 @@ module Aws::STS
1297
1368
  # An administrator must grant you the permissions necessary to pass
1298
1369
  # session tags. The administrator can also create granular permissions
1299
1370
  # to allow you to pass only specific session tags. For more information,
1300
- # see [Tutorial: Using Tags for Attribute-Based Access Control][13] in
1371
+ # see [Tutorial: Using Tags for Attribute-Based Access Control][11] in
1301
1372
  # the *IAM User Guide*.
1302
1373
  #
1303
1374
  # You can set the session tags as transitive. Transitive tags persist
1304
1375
  # during role chaining. For more information, see [Chaining Roles with
1305
- # Session Tags][14] in the *IAM User Guide*.
1376
+ # Session Tags][12] in the *IAM User Guide*.
1306
1377
  #
1307
1378
  # **Identities**
1308
1379
  #
@@ -1314,19 +1385,19 @@ module Aws::STS
1314
1385
  # specified in the role's trust policy.
1315
1386
  #
1316
1387
  # Calling `AssumeRoleWithWebIdentity` can result in an entry in your
1317
- # CloudTrail logs. The entry includes the [Subject][15] of the provided
1388
+ # CloudTrail logs. The entry includes the [Subject][13] of the provided
1318
1389
  # web identity token. We recommend that you avoid using any personally
1319
1390
  # identifiable information (PII) in this field. For example, you could
1320
1391
  # instead use a GUID or a pairwise identifier, as [suggested in the OIDC
1321
- # specification][16].
1392
+ # specification][14].
1322
1393
  #
1323
1394
  # For more information about how to use web identity federation and the
1324
1395
  # `AssumeRoleWithWebIdentity` API, see the following resources:
1325
1396
  #
1326
- # * [Using Web Identity Federation API Operations for Mobile Apps][17]
1327
- # and [Federation Through a Web-based Identity Provider][18].
1397
+ # * [Using Web Identity Federation API Operations for Mobile Apps][15]
1398
+ # and [Federation Through a Web-based Identity Provider][16].
1328
1399
  #
1329
- # * [ Web Identity Federation Playground][19]. Walk through the process
1400
+ # * [ Web Identity Federation Playground][17]. Walk through the process
1330
1401
  # of authenticating through Login with Amazon, Facebook, or Google,
1331
1402
  # getting temporary security credentials, and then using those
1332
1403
  # credentials to make a request to Amazon Web Services.
@@ -1337,7 +1408,7 @@ module Aws::STS
1337
1408
  # toolkits then show how to use the information from these providers
1338
1409
  # to get and use temporary security credentials.
1339
1410
  #
1340
- # * [Web Identity Federation with Mobile Applications][20]. This article
1411
+ # * [Web Identity Federation with Mobile Applications][18]. This article
1341
1412
  # discusses web identity federation and shows an example of how to use
1342
1413
  # web identity federation to get access to content in Amazon S3.
1343
1414
  #
@@ -1346,23 +1417,21 @@ module Aws::STS
1346
1417
  # [1]: https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-identity.html
1347
1418
  # [2]: http://aws.amazon.com/sdkforios/
1348
1419
  # [3]: http://aws.amazon.com/sdkforandroid/
1349
- # [4]: https://docs.aws.amazon.com/mobile/sdkforandroid/developerguide/cognito-auth.html#d0e840
1350
- # [5]: https://docs.aws.amazon.com/mobile/sdkforios/developerguide/cognito-auth.html#d0e664
1351
- # [6]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html
1352
- # [7]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#stsapi_comparison
1353
- # [8]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html#id_roles_use_view-role-max-session
1354
- # [9]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html
1355
- # [10]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
1356
- # [11]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html
1357
- # [12]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-limits.html#reference_iam-limits-entity-length
1358
- # [13]: https://docs.aws.amazon.com/IAM/latest/UserGuide/tutorial_attribute-based-access-control.html
1359
- # [14]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html#id_session-tags_role-chaining
1360
- # [15]: http://openid.net/specs/openid-connect-core-1_0.html#Claims
1361
- # [16]: http://openid.net/specs/openid-connect-core-1_0.html#SubjectIDTypes
1362
- # [17]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_oidc_manual.html
1363
- # [18]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#api_assumerolewithwebidentity
1364
- # [19]: https://aws.amazon.com/blogs/aws/the-aws-web-identity-federation-playground/
1365
- # [20]: http://aws.amazon.com/articles/web-identity-federation-with-mobile-applications
1420
+ # [4]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html
1421
+ # [5]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#stsapi_comparison
1422
+ # [6]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html#id_roles_use_view-role-max-session
1423
+ # [7]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html
1424
+ # [8]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
1425
+ # [9]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html
1426
+ # [10]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-limits.html#reference_iam-limits-entity-length
1427
+ # [11]: https://docs.aws.amazon.com/IAM/latest/UserGuide/tutorial_attribute-based-access-control.html
1428
+ # [12]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html#id_session-tags_role-chaining
1429
+ # [13]: http://openid.net/specs/openid-connect-core-1_0.html#Claims
1430
+ # [14]: http://openid.net/specs/openid-connect-core-1_0.html#SubjectIDTypes
1431
+ # [15]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_oidc_manual.html
1432
+ # [16]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#api_assumerolewithwebidentity
1433
+ # [17]: https://aws.amazon.com/blogs/aws/the-aws-web-identity-federation-playground/
1434
+ # [18]: http://aws.amazon.com/articles/web-identity-federation-with-mobile-applications
1366
1435
  #
1367
1436
  # @option params [required, String] :role_arn
1368
1437
  # The Amazon Resource Name (ARN) of the role that the caller is
@@ -1386,7 +1455,8 @@ module Aws::STS
1386
1455
  # by the identity provider. Your application must get this token by
1387
1456
  # authenticating the user who is using your application with a web
1388
1457
  # identity provider before the application makes an
1389
- # `AssumeRoleWithWebIdentity` call.
1458
+ # `AssumeRoleWithWebIdentity` call. Only tokens with RSA algorithms
1459
+ # (RS256) are supported.
1390
1460
  #
1391
1461
  # @option params [String] :provider_id
1392
1462
  # The fully qualified host component of the domain name of the OAuth 2.0
@@ -1410,12 +1480,12 @@ module Aws::STS
1410
1480
  # about ARNs, see [Amazon Resource Names (ARNs) and Amazon Web Services
1411
1481
  # Service Namespaces][1] in the Amazon Web Services General Reference.
1412
1482
  #
1413
- # <note markdown="1"> An Amazon Web Services conversion compresses the passed session
1414
- # policies and session tags into a packed binary format that has a
1415
- # separate limit. Your request can fail for this limit even if your
1416
- # plaintext meets the other requirements. The `PackedPolicySize`
1417
- # response element indicates by percentage how close the policies and
1418
- # tags for your request are to the upper size limit.
1483
+ # <note markdown="1"> An Amazon Web Services conversion compresses the passed inline session
1484
+ # policy, managed policy ARNs, and session tags into a packed binary
1485
+ # format that has a separate limit. Your request can fail for this limit
1486
+ # even if your plaintext meets the other requirements. The
1487
+ # `PackedPolicySize` response element indicates by percentage how close
1488
+ # the policies and tags for your request are to the upper size limit.
1419
1489
  #
1420
1490
  # </note>
1421
1491
  #
@@ -1455,12 +1525,12 @@ module Aws::STS
1455
1525
  # the tab (\\u0009), linefeed (\\u000A), and carriage return (\\u000D)
1456
1526
  # characters.
1457
1527
  #
1458
- # <note markdown="1"> An Amazon Web Services conversion compresses the passed session
1459
- # policies and session tags into a packed binary format that has a
1460
- # separate limit. Your request can fail for this limit even if your
1461
- # plaintext meets the other requirements. The `PackedPolicySize`
1462
- # response element indicates by percentage how close the policies and
1463
- # tags for your request are to the upper size limit.
1528
+ # <note markdown="1"> An Amazon Web Services conversion compresses the passed inline session
1529
+ # policy, managed policy ARNs, and session tags into a packed binary
1530
+ # format that has a separate limit. Your request can fail for this limit
1531
+ # even if your plaintext meets the other requirements. The
1532
+ # `PackedPolicySize` response element indicates by percentage how close
1533
+ # the policies and tags for your request are to the upper size limit.
1464
1534
  #
1465
1535
  # </note>
1466
1536
  #
@@ -1721,11 +1791,11 @@ module Aws::STS
1721
1791
  # to call the operation.
1722
1792
  #
1723
1793
  # <note markdown="1"> No permissions are required to perform this operation. If an
1724
- # administrator adds a policy to your IAM user or role that explicitly
1794
+ # administrator attaches a policy to your identity that explicitly
1725
1795
  # denies access to the `sts:GetCallerIdentity` action, you can still
1726
1796
  # perform this operation. Permissions are not required because the same
1727
- # information is returned when an IAM user or role is denied access. To
1728
- # view an example response, see [I Am Not Authorized to Perform:
1797
+ # information is returned when access is denied. To view an example
1798
+ # response, see [I Am Not Authorized to Perform:
1729
1799
  # iam:DeleteVirtualMFADevice][1] in the *IAM User Guide*.
1730
1800
  #
1731
1801
  # </note>
@@ -1802,60 +1872,63 @@ module Aws::STS
1802
1872
  end
1803
1873
 
1804
1874
  # Returns a set of temporary security credentials (consisting of an
1805
- # access key ID, a secret access key, and a security token) for a
1806
- # federated user. A typical use is in a proxy application that gets
1807
- # temporary security credentials on behalf of distributed applications
1808
- # inside a corporate network. You must call the `GetFederationToken`
1809
- # operation using the long-term security credentials of an IAM user. As
1810
- # a result, this call is appropriate in contexts where those credentials
1811
- # can be safely stored, usually in a server-based application. For a
1812
- # comparison of `GetFederationToken` with the other API operations that
1813
- # produce temporary credentials, see [Requesting Temporary Security
1875
+ # access key ID, a secret access key, and a security token) for a user.
1876
+ # A typical use is in a proxy application that gets temporary security
1877
+ # credentials on behalf of distributed applications inside a corporate
1878
+ # network.
1879
+ #
1880
+ # You must call the `GetFederationToken` operation using the long-term
1881
+ # security credentials of an IAM user. As a result, this call is
1882
+ # appropriate in contexts where those credentials can be safeguarded,
1883
+ # usually in a server-based application. For a comparison of
1884
+ # `GetFederationToken` with the other API operations that produce
1885
+ # temporary credentials, see [Requesting Temporary Security
1814
1886
  # Credentials][1] and [Comparing the Amazon Web Services STS API
1815
1887
  # operations][2] in the *IAM User Guide*.
1816
1888
  #
1889
+ # Although it is possible to call `GetFederationToken` using the
1890
+ # security credentials of an Amazon Web Services account root user
1891
+ # rather than an IAM user that you create for the purpose of a proxy
1892
+ # application, we do not recommend it. For more information, see
1893
+ # [Safeguard your root user credentials and don't use them for everyday
1894
+ # tasks][3] in the *IAM User Guide*.
1895
+ #
1817
1896
  # <note markdown="1"> You can create a mobile-based or browser-based app that can
1818
1897
  # authenticate users using a web identity provider like Login with
1819
1898
  # Amazon, Facebook, Google, or an OpenID Connect-compatible identity
1820
- # provider. In this case, we recommend that you use [Amazon Cognito][3]
1899
+ # provider. In this case, we recommend that you use [Amazon Cognito][4]
1821
1900
  # or `AssumeRoleWithWebIdentity`. For more information, see [Federation
1822
- # Through a Web-based Identity Provider][4] in the *IAM User Guide*.
1901
+ # Through a Web-based Identity Provider][5] in the *IAM User Guide*.
1823
1902
  #
1824
1903
  # </note>
1825
1904
  #
1826
- # You can also call `GetFederationToken` using the security credentials
1827
- # of an Amazon Web Services account root user, but we do not recommend
1828
- # it. Instead, we recommend that you create an IAM user for the purpose
1829
- # of the proxy application. Then attach a policy to the IAM user that
1830
- # limits federated users to only the actions and resources that they
1831
- # need to access. For more information, see [IAM Best Practices][5] in
1832
- # the *IAM User Guide*.
1833
- #
1834
1905
  # **Session duration**
1835
1906
  #
1836
1907
  # The temporary credentials are valid for the specified duration, from
1837
1908
  # 900 seconds (15 minutes) up to a maximum of 129,600 seconds (36
1838
1909
  # hours). The default session duration is 43,200 seconds (12 hours).
1839
- # Temporary credentials obtained by using the Amazon Web Services
1840
- # account root user credentials have a maximum duration of 3,600 seconds
1841
- # (1 hour).
1910
+ # Temporary credentials obtained by using the root user credentials have
1911
+ # a maximum duration of 3,600 seconds (1 hour).
1842
1912
  #
1843
1913
  # **Permissions**
1844
1914
  #
1845
1915
  # You can use the temporary credentials created by `GetFederationToken`
1846
- # in any Amazon Web Services service except the following:
1916
+ # in any Amazon Web Services service with the following exceptions:
1847
1917
  #
1848
1918
  # * You cannot call any IAM operations using the CLI or the Amazon Web
1849
- # Services API.
1919
+ # Services API. This limitation does not apply to console sessions.
1850
1920
  #
1851
1921
  # * You cannot call any STS operations except `GetCallerIdentity`.
1852
1922
  #
1923
+ # You can use temporary credentials for single sign-on (SSO) to the
1924
+ # console.
1925
+ #
1853
1926
  # You must pass an inline or managed [session policy][6] to this
1854
1927
  # operation. You can pass a single JSON policy document to use as an
1855
- # inline session policy. You can also specify up to 10 managed policies
1856
- # to use as managed session policies. The plaintext that you use for
1857
- # both inline and managed session policies can't exceed 2,048
1858
- # characters.
1928
+ # inline session policy. You can also specify up to 10 managed policy
1929
+ # Amazon Resource Names (ARNs) to use as managed session policies. The
1930
+ # plaintext that you use for both inline and managed session policies
1931
+ # can't exceed 2,048 characters.
1859
1932
  #
1860
1933
  # Though the session policy parameters are optional, if you do not pass
1861
1934
  # a policy, then the resulting federated user session has no
@@ -1885,9 +1958,9 @@ module Aws::STS
1885
1958
  # <note markdown="1"> You can create a mobile-based or browser-based app that can
1886
1959
  # authenticate users using a web identity provider like Login with
1887
1960
  # Amazon, Facebook, Google, or an OpenID Connect-compatible identity
1888
- # provider. In this case, we recommend that you use [Amazon Cognito][3]
1961
+ # provider. In this case, we recommend that you use [Amazon Cognito][4]
1889
1962
  # or `AssumeRoleWithWebIdentity`. For more information, see [Federation
1890
- # Through a Web-based Identity Provider][4] in the *IAM User Guide*.
1963
+ # Through a Web-based Identity Provider][5] in the *IAM User Guide*.
1891
1964
  #
1892
1965
  # </note>
1893
1966
  #
@@ -1909,9 +1982,9 @@ module Aws::STS
1909
1982
  #
1910
1983
  # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html
1911
1984
  # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#stsapi_comparison
1912
- # [3]: http://aws.amazon.com/cognito/
1913
- # [4]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#api_assumerolewithwebidentity
1914
- # [5]: https://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html
1985
+ # [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html#lock-away-credentials
1986
+ # [4]: http://aws.amazon.com/cognito/
1987
+ # [5]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#api_assumerolewithwebidentity
1915
1988
  # [6]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
1916
1989
  # [7]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#api_getfederationtoken
1917
1990
  # [8]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html
@@ -1934,8 +2007,8 @@ module Aws::STS
1934
2007
  #
1935
2008
  # You must pass an inline or managed [session policy][1] to this
1936
2009
  # operation. You can pass a single JSON policy document to use as an
1937
- # inline session policy. You can also specify up to 10 managed policies
1938
- # to use as managed session policies.
2010
+ # inline session policy. You can also specify up to 10 managed policy
2011
+ # Amazon Resource Names (ARNs) to use as managed session policies.
1939
2012
  #
1940
2013
  # This parameter is optional. However, if you do not pass any session
1941
2014
  # policies, then the resulting federated user session has no
@@ -1963,12 +2036,12 @@ module Aws::STS
1963
2036
  # the tab (\\u0009), linefeed (\\u000A), and carriage return (\\u000D)
1964
2037
  # characters.
1965
2038
  #
1966
- # <note markdown="1"> An Amazon Web Services conversion compresses the passed session
1967
- # policies and session tags into a packed binary format that has a
1968
- # separate limit. Your request can fail for this limit even if your
1969
- # plaintext meets the other requirements. The `PackedPolicySize`
1970
- # response element indicates by percentage how close the policies and
1971
- # tags for your request are to the upper size limit.
2039
+ # <note markdown="1"> An Amazon Web Services conversion compresses the passed inline session
2040
+ # policy, managed policy ARNs, and session tags into a packed binary
2041
+ # format that has a separate limit. Your request can fail for this limit
2042
+ # even if your plaintext meets the other requirements. The
2043
+ # `PackedPolicySize` response element indicates by percentage how close
2044
+ # the policies and tags for your request are to the upper size limit.
1972
2045
  #
1973
2046
  # </note>
1974
2047
  #
@@ -1983,13 +2056,13 @@ module Aws::STS
1983
2056
  #
1984
2057
  # You must pass an inline or managed [session policy][1] to this
1985
2058
  # operation. You can pass a single JSON policy document to use as an
1986
- # inline session policy. You can also specify up to 10 managed policies
1987
- # to use as managed session policies. The plaintext that you use for
1988
- # both inline and managed session policies can't exceed 2,048
1989
- # characters. You can provide up to 10 managed policy ARNs. For more
1990
- # information about ARNs, see [Amazon Resource Names (ARNs) and Amazon
1991
- # Web Services Service Namespaces][2] in the Amazon Web Services General
1992
- # Reference.
2059
+ # inline session policy. You can also specify up to 10 managed policy
2060
+ # Amazon Resource Names (ARNs) to use as managed session policies. The
2061
+ # plaintext that you use for both inline and managed session policies
2062
+ # can't exceed 2,048 characters. You can provide up to 10 managed
2063
+ # policy ARNs. For more information about ARNs, see [Amazon Resource
2064
+ # Names (ARNs) and Amazon Web Services Service Namespaces][2] in the
2065
+ # Amazon Web Services General Reference.
1993
2066
  #
1994
2067
  # This parameter is optional. However, if you do not pass any session
1995
2068
  # policies, then the resulting federated user session has no
@@ -2010,12 +2083,12 @@ module Aws::STS
2010
2083
  # are granted in addition to the permissions that are granted by the
2011
2084
  # session policies.
2012
2085
  #
2013
- # <note markdown="1"> An Amazon Web Services conversion compresses the passed session
2014
- # policies and session tags into a packed binary format that has a
2015
- # separate limit. Your request can fail for this limit even if your
2016
- # plaintext meets the other requirements. The `PackedPolicySize`
2017
- # response element indicates by percentage how close the policies and
2018
- # tags for your request are to the upper size limit.
2086
+ # <note markdown="1"> An Amazon Web Services conversion compresses the passed inline session
2087
+ # policy, managed policy ARNs, and session tags into a packed binary
2088
+ # format that has a separate limit. Your request can fail for this limit
2089
+ # even if your plaintext meets the other requirements. The
2090
+ # `PackedPolicySize` response element indicates by percentage how close
2091
+ # the policies and tags for your request are to the upper size limit.
2019
2092
  #
2020
2093
  # </note>
2021
2094
  #
@@ -2028,10 +2101,10 @@ module Aws::STS
2028
2101
  # The duration, in seconds, that the session should last. Acceptable
2029
2102
  # durations for federation sessions range from 900 seconds (15 minutes)
2030
2103
  # to 129,600 seconds (36 hours), with 43,200 seconds (12 hours) as the
2031
- # default. Sessions obtained using Amazon Web Services account root user
2032
- # credentials are restricted to a maximum of 3,600 seconds (one hour).
2033
- # If the specified duration is longer than one hour, the session
2034
- # obtained by using root user credentials defaults to one hour.
2104
+ # default. Sessions obtained using root user credentials are restricted
2105
+ # to a maximum of 3,600 seconds (one hour). If the specified duration is
2106
+ # longer than one hour, the session obtained by using root user
2107
+ # credentials defaults to one hour.
2035
2108
  #
2036
2109
  # @option params [Array<Types::Tag>] :tags
2037
2110
  # A list of session tags. Each session tag consists of a key name and an
@@ -2043,12 +2116,12 @@ module Aws::STS
2043
2116
  # can’t exceed 256 characters. For these and additional limits, see [IAM
2044
2117
  # and STS Character Limits][2] in the *IAM User Guide*.
2045
2118
  #
2046
- # <note markdown="1"> An Amazon Web Services conversion compresses the passed session
2047
- # policies and session tags into a packed binary format that has a
2048
- # separate limit. Your request can fail for this limit even if your
2049
- # plaintext meets the other requirements. The `PackedPolicySize`
2050
- # response element indicates by percentage how close the policies and
2051
- # tags for your request are to the upper size limit.
2119
+ # <note markdown="1"> An Amazon Web Services conversion compresses the passed inline session
2120
+ # policy, managed policy ARNs, and session tags into a packed binary
2121
+ # format that has a separate limit. Your request can fail for this limit
2122
+ # even if your plaintext meets the other requirements. The
2123
+ # `PackedPolicySize` response element indicates by percentage how close
2124
+ # the policies and tags for your request are to the upper size limit.
2052
2125
  #
2053
2126
  # </note>
2054
2127
  #
@@ -2151,14 +2224,15 @@ module Aws::STS
2151
2224
  # secret access key, and a security token. Typically, you use
2152
2225
  # `GetSessionToken` if you want to use MFA to protect programmatic calls
2153
2226
  # to specific Amazon Web Services API operations like Amazon EC2
2154
- # `StopInstances`. MFA-enabled IAM users would need to call
2155
- # `GetSessionToken` and submit an MFA code that is associated with their
2156
- # MFA device. Using the temporary security credentials that are returned
2157
- # from the call, IAM users can then make programmatic calls to API
2158
- # operations that require MFA authentication. If you do not supply a
2159
- # correct MFA code, then the API returns an access denied error. For a
2160
- # comparison of `GetSessionToken` with the other API operations that
2161
- # produce temporary credentials, see [Requesting Temporary Security
2227
+ # `StopInstances`.
2228
+ #
2229
+ # MFA-enabled IAM users must call `GetSessionToken` and submit an MFA
2230
+ # code that is associated with their MFA device. Using the temporary
2231
+ # security credentials that the call returns, IAM users can then make
2232
+ # programmatic calls to API operations that require MFA authentication.
2233
+ # An incorrect MFA code causes the API to return an access denied error.
2234
+ # For a comparison of `GetSessionToken` with the other API operations
2235
+ # that produce temporary credentials, see [Requesting Temporary Security
2162
2236
  # Credentials][1] and [Comparing the Amazon Web Services STS API
2163
2237
  # operations][2] in the *IAM User Guide*.
2164
2238
  #
@@ -2173,13 +2247,13 @@ module Aws::STS
2173
2247
  # **Session Duration**
2174
2248
  #
2175
2249
  # The `GetSessionToken` operation must be called by using the long-term
2176
- # Amazon Web Services security credentials of the Amazon Web Services
2177
- # account root user or an IAM user. Credentials that are created by IAM
2178
- # users are valid for the duration that you specify. This duration can
2179
- # range from 900 seconds (15 minutes) up to a maximum of 129,600 seconds
2180
- # (36 hours), with a default of 43,200 seconds (12 hours). Credentials
2181
- # based on account credentials can range from 900 seconds (15 minutes)
2182
- # up to 3,600 seconds (1 hour), with a default of 1 hour.
2250
+ # Amazon Web Services security credentials of an IAM user. Credentials
2251
+ # that are created by IAM users are valid for the duration that you
2252
+ # specify. This duration can range from 900 seconds (15 minutes) up to a
2253
+ # maximum of 129,600 seconds (36 hours), with a default of 43,200
2254
+ # seconds (12 hours). Credentials based on account credentials can range
2255
+ # from 900 seconds (15 minutes) up to 3,600 seconds (1 hour), with a
2256
+ # default of 1 hour.
2183
2257
  #
2184
2258
  # **Permissions**
2185
2259
  #
@@ -2193,24 +2267,23 @@ module Aws::STS
2193
2267
  # * You cannot call any STS API *except* `AssumeRole` or
2194
2268
  # `GetCallerIdentity`.
2195
2269
  #
2196
- # <note markdown="1"> We recommend that you do not call `GetSessionToken` with Amazon Web
2197
- # Services account root user credentials. Instead, follow our [best
2198
- # practices][4] by creating one or more IAM users, giving them the
2199
- # necessary permissions, and using IAM users for everyday interaction
2200
- # with Amazon Web Services.
2270
+ # The credentials that `GetSessionToken` returns are based on
2271
+ # permissions associated with the IAM user whose credentials were used
2272
+ # to call the operation. The temporary credentials have the same
2273
+ # permissions as the IAM user.
2201
2274
  #
2202
- # </note>
2275
+ # <note markdown="1"> Although it is possible to call `GetSessionToken` using the security
2276
+ # credentials of an Amazon Web Services account root user rather than an
2277
+ # IAM user, we do not recommend it. If `GetSessionToken` is called using
2278
+ # root user credentials, the temporary credentials have root user
2279
+ # permissions. For more information, see [Safeguard your root user
2280
+ # credentials and don't use them for everyday tasks][4] in the *IAM
2281
+ # User Guide*
2203
2282
  #
2204
- # The credentials that are returned by `GetSessionToken` are based on
2205
- # permissions associated with the user whose credentials were used to
2206
- # call the operation. If `GetSessionToken` is called using Amazon Web
2207
- # Services account root user credentials, the temporary credentials have
2208
- # root user permissions. Similarly, if `GetSessionToken` is called using
2209
- # the credentials of an IAM user, the temporary credentials have the
2210
- # same permissions as the IAM user.
2283
+ # </note>
2211
2284
  #
2212
2285
  # For more information about using `GetSessionToken` to create temporary
2213
- # credentials, go to [Temporary Credentials for Users in Untrusted
2286
+ # credentials, see [Temporary Credentials for Users in Untrusted
2214
2287
  # Environments][5] in the *IAM User Guide*.
2215
2288
  #
2216
2289
  #
@@ -2218,7 +2291,7 @@ module Aws::STS
2218
2291
  # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html
2219
2292
  # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#stsapi_comparison
2220
2293
  # [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_getsessiontoken.html
2221
- # [4]: https://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html#create-iam-users
2294
+ # [4]: https://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html#lock-away-credentials
2222
2295
  # [5]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#api_getsessiontoken
2223
2296
  #
2224
2297
  # @option params [Integer] :duration_seconds
@@ -2316,7 +2389,7 @@ module Aws::STS
2316
2389
  params: params,
2317
2390
  config: config)
2318
2391
  context[:gem_name] = 'aws-sdk-core'
2319
- context[:gem_version] = '3.165.0'
2392
+ context[:gem_version] = '3.201.0'
2320
2393
  Seahorse::Client::Request.new(handlers, context)
2321
2394
  end
2322
2395