aws-sdk-core 3.17.1 → 3.18.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/VERSION +1 -1
- data/lib/aws-sdk-sts.rb +1 -1
- data/lib/aws-sdk-sts/client.rb +138 -76
- data/lib/aws-sdk-sts/types.rb +64 -39
- metadata +2 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA1:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: c2ae7ca81288c6143ec77918a7c61b3cf6e447ab
|
4
|
+
data.tar.gz: d07b54378f5ed3a5360720044fa41de21816e435
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: b1b234195ab3a435504d69ec542ad221e14d1f40239d3f3e395e441c66b81126e0b0363733ce170a8cbe9d452a50dd4e14bc7de602f7bb1582778924083220fe
|
7
|
+
data.tar.gz: 1c14e90c4a573ed198cd84e0379635cc724a7aa70004b9e773648ab809139043f45cab347df1f0a6767453a526c45591b42fdb2753dc2762e4e3cbec64907482
|
data/VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
3.
|
1
|
+
3.18.0
|
data/lib/aws-sdk-sts.rb
CHANGED
data/lib/aws-sdk-sts/client.rb
CHANGED
@@ -180,9 +180,18 @@ module Aws::STS
|
|
180
180
|
# information, see [Common Scenarios for Temporary Credentials][4] in
|
181
181
|
# the *IAM User Guide*.
|
182
182
|
#
|
183
|
-
#
|
184
|
-
#
|
185
|
-
#
|
183
|
+
# By default, the temporary security credentials created by `AssumeRole`
|
184
|
+
# last for one hour. However, you can use the optional `DurationSeconds`
|
185
|
+
# parameter to specify the duration of your session. You can provide a
|
186
|
+
# value from 900 seconds (15 minutes) up to the maximum session duration
|
187
|
+
# setting for the role. This setting can have a value from 1 hour to 12
|
188
|
+
# hours. To learn how to view the maximum value for your role, see [View
|
189
|
+
# the Maximum Session Duration Setting for a Role][5] in the *IAM User
|
190
|
+
# Guide*. The maximum session duration limit applies when you use the
|
191
|
+
# `AssumeRole*` API operations or the `assume-role*` CLI operations but
|
192
|
+
# does not apply when you use those operations to create a console URL.
|
193
|
+
# For more information, see [Using IAM Roles][6] in the *IAM User
|
194
|
+
# Guide*.
|
186
195
|
#
|
187
196
|
# The temporary security credentials created by `AssumeRole` can be used
|
188
197
|
# to make API calls to any AWS service with the following exception: you
|
@@ -201,7 +210,7 @@ module Aws::STS
|
|
201
210
|
# credentials. You cannot use the passed policy to grant permissions
|
202
211
|
# that are in excess of those allowed by the access policy of the role
|
203
212
|
# that is being assumed. For more information, see [Permissions for
|
204
|
-
# AssumeRole, AssumeRoleWithSAML, and AssumeRoleWithWebIdentity][
|
213
|
+
# AssumeRole, AssumeRoleWithSAML, and AssumeRoleWithWebIdentity][7] in
|
205
214
|
# the *IAM User Guide*.
|
206
215
|
#
|
207
216
|
# To assume a role, your AWS account must be trusted by the role. The
|
@@ -220,7 +229,7 @@ module Aws::STS
|
|
220
229
|
# trust policy acts as the only resource-based policy in IAM, and users
|
221
230
|
# in the same account as the role do not need explicit permission to
|
222
231
|
# assume the role. For more information about trust policies and
|
223
|
-
# resource-based policies, see [IAM Policies][
|
232
|
+
# resource-based policies, see [IAM Policies][8] in the *IAM User
|
224
233
|
# Guide*.
|
225
234
|
#
|
226
235
|
# **Using MFA with AssumeRole**
|
@@ -237,7 +246,7 @@ module Aws::STS
|
|
237
246
|
#
|
238
247
|
# `"Condition": \{"Bool": \{"aws:MultiFactorAuthPresent": true\}\}`
|
239
248
|
#
|
240
|
-
# For more information, see [Configuring MFA-Protected API Access][
|
249
|
+
# For more information, see [Configuring MFA-Protected API Access][9] in
|
241
250
|
# the *IAM User Guide* guide.
|
242
251
|
#
|
243
252
|
# To use MFA with `AssumeRole`, you pass values for the `SerialNumber`
|
@@ -251,9 +260,11 @@ module Aws::STS
|
|
251
260
|
# [2]: http://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#stsapi_comparison
|
252
261
|
# [3]: http://docs.aws.amazon.com/IAM/latest/UserGuide/roles-toplevel.html
|
253
262
|
# [4]: http://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp.html#sts-introduction
|
254
|
-
# [5]: http://docs.aws.amazon.com/IAM/latest/UserGuide/
|
255
|
-
# [6]: http://docs.aws.amazon.com/IAM/latest/UserGuide/
|
256
|
-
# [7]: http://docs.aws.amazon.com/IAM/latest/UserGuide/
|
263
|
+
# [5]: http://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html#id_roles_use_view-role-max-session
|
264
|
+
# [6]: http://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html
|
265
|
+
# [7]: http://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_assumerole.html
|
266
|
+
# [8]: http://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html
|
267
|
+
# [9]: http://docs.aws.amazon.com/IAM/latest/UserGuide/MFAProtectedAPI.html
|
257
268
|
#
|
258
269
|
# @option params [required, String] :role_arn
|
259
270
|
# The Amazon Resource Name (ARN) of the role to assume.
|
@@ -310,22 +321,31 @@ module Aws::STS
|
|
310
321
|
#
|
311
322
|
# @option params [Integer] :duration_seconds
|
312
323
|
# The duration, in seconds, of the role session. The value can range
|
313
|
-
# from 900 seconds (15 minutes) to
|
314
|
-
# the value
|
324
|
+
# from 900 seconds (15 minutes) up to the maximum session duration
|
325
|
+
# setting for the role. This setting can have a value from 1 hour to 12
|
326
|
+
# hours. If you specify a value higher than this setting, the operation
|
327
|
+
# fails. For example, if you specify a session duration of 12 hours, but
|
328
|
+
# your administrator set the maximum session duration to 6 hours, your
|
329
|
+
# operation fails. To learn how to view the maximum value for your role,
|
330
|
+
# see [View the Maximum Session Duration Setting for a Role][1] in the
|
331
|
+
# *IAM User Guide*.
|
332
|
+
#
|
333
|
+
# By default, the value is set to 3600 seconds.
|
315
334
|
#
|
316
|
-
# <note markdown="1">
|
317
|
-
# request using the returned credentials.
|
318
|
-
# endpoint for a console sign-in token
|
319
|
-
# parameter that specifies the maximum length
|
320
|
-
#
|
321
|
-
#
|
322
|
-
#
|
335
|
+
# <note markdown="1"> The `DurationSeconds` parameter is separate from the duration of a
|
336
|
+
# console session that you might request using the returned credentials.
|
337
|
+
# The request to the federation endpoint for a console sign-in token
|
338
|
+
# takes a `SessionDuration` parameter that specifies the maximum length
|
339
|
+
# of the console session. For more information, see [Creating a URL that
|
340
|
+
# Enables Federated Users to Access the AWS Management Console][2] in
|
341
|
+
# the *IAM User Guide*.
|
323
342
|
#
|
324
343
|
# </note>
|
325
344
|
#
|
326
345
|
#
|
327
346
|
#
|
328
|
-
# [1]: http://docs.aws.amazon.com/IAM/latest/UserGuide/
|
347
|
+
# [1]: http://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html#id_roles_use_view-role-max-session
|
348
|
+
# [2]: http://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_enable-console-custom-url.html
|
329
349
|
#
|
330
350
|
# @option params [String] :external_id
|
331
351
|
# A unique identifier that is used by third parties when assuming roles
|
@@ -449,11 +469,21 @@ module Aws::STS
|
|
449
469
|
# Applications can use these temporary security credentials to sign
|
450
470
|
# calls to AWS services.
|
451
471
|
#
|
452
|
-
#
|
453
|
-
#
|
454
|
-
#
|
455
|
-
#
|
456
|
-
#
|
472
|
+
# By default, the temporary security credentials created by
|
473
|
+
# `AssumeRoleWithSAML` last for one hour. However, you can use the
|
474
|
+
# optional `DurationSeconds` parameter to specify the duration of your
|
475
|
+
# session. Your role session lasts for the duration that you specify, or
|
476
|
+
# until the time specified in the SAML authentication response's
|
477
|
+
# `SessionNotOnOrAfter` value, whichever is shorter. You can provide a
|
478
|
+
# `DurationSeconds` value from 900 seconds (15 minutes) up to the
|
479
|
+
# maximum session duration setting for the role. This setting can have a
|
480
|
+
# value from 1 hour to 12 hours. To learn how to view the maximum value
|
481
|
+
# for your role, see [View the Maximum Session Duration Setting for a
|
482
|
+
# Role][3] in the *IAM User Guide*. The maximum session duration limit
|
483
|
+
# applies when you use the `AssumeRole*` API operations or the
|
484
|
+
# `assume-role*` CLI operations but does not apply when you use those
|
485
|
+
# operations to create a console URL. For more information, see [Using
|
486
|
+
# IAM Roles][4] in the *IAM User Guide*.
|
457
487
|
#
|
458
488
|
# The temporary security credentials created by `AssumeRoleWithSAML` can
|
459
489
|
# be used to make API calls to any AWS service with the following
|
@@ -474,7 +504,7 @@ module Aws::STS
|
|
474
504
|
# passed policy to grant permissions that are in excess of those allowed
|
475
505
|
# by the access policy of the role that is being assumed. For more
|
476
506
|
# information, see [Permissions for AssumeRole, AssumeRoleWithSAML, and
|
477
|
-
# AssumeRoleWithWebIdentity][
|
507
|
+
# AssumeRoleWithWebIdentity][5] in the *IAM User Guide*.
|
478
508
|
#
|
479
509
|
# Before your application can call `AssumeRoleWithSAML`, you must
|
480
510
|
# configure your SAML identity provider (IdP) to issue the claims
|
@@ -497,24 +527,26 @@ module Aws::STS
|
|
497
527
|
#
|
498
528
|
# For more information, see the following resources:
|
499
529
|
#
|
500
|
-
# * [About SAML 2.0-based Federation][
|
530
|
+
# * [About SAML 2.0-based Federation][6] in the *IAM User Guide*.
|
501
531
|
#
|
502
|
-
# * [Creating SAML Identity Providers][
|
532
|
+
# * [Creating SAML Identity Providers][7] in the *IAM User Guide*.
|
503
533
|
#
|
504
|
-
# * [Configuring a Relying Party and Claims][
|
534
|
+
# * [Configuring a Relying Party and Claims][8] in the *IAM User Guide*.
|
505
535
|
#
|
506
|
-
# * [Creating a Role for SAML 2.0 Federation][
|
536
|
+
# * [Creating a Role for SAML 2.0 Federation][9] in the *IAM User
|
507
537
|
# Guide*.
|
508
538
|
#
|
509
539
|
#
|
510
540
|
#
|
511
541
|
# [1]: http://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html
|
512
542
|
# [2]: http://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#stsapi_comparison
|
513
|
-
# [3]: http://docs.aws.amazon.com/IAM/latest/UserGuide/
|
514
|
-
# [4]: http://docs.aws.amazon.com/IAM/latest/UserGuide/
|
515
|
-
# [5]: http://docs.aws.amazon.com/IAM/latest/UserGuide/
|
516
|
-
# [6]: http://docs.aws.amazon.com/IAM/latest/UserGuide/
|
517
|
-
# [7]: http://docs.aws.amazon.com/IAM/latest/UserGuide/
|
543
|
+
# [3]: http://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html#id_roles_use_view-role-max-session
|
544
|
+
# [4]: http://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html
|
545
|
+
# [5]: http://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_assumerole.html
|
546
|
+
# [6]: http://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_saml.html
|
547
|
+
# [7]: http://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_create_saml.html
|
548
|
+
# [8]: http://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_create_saml_relying-party.html
|
549
|
+
# [9]: http://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_create_for-idp_saml.html
|
518
550
|
#
|
519
551
|
# @option params [required, String] :role_arn
|
520
552
|
# The Amazon Resource Name (ARN) of the role that the caller is
|
@@ -568,25 +600,35 @@ module Aws::STS
|
|
568
600
|
# [1]: http://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_assumerole.html
|
569
601
|
#
|
570
602
|
# @option params [Integer] :duration_seconds
|
571
|
-
# The duration, in seconds, of the role session.
|
572
|
-
#
|
573
|
-
#
|
574
|
-
#
|
575
|
-
#
|
576
|
-
#
|
577
|
-
#
|
578
|
-
#
|
579
|
-
#
|
580
|
-
#
|
581
|
-
#
|
582
|
-
#
|
583
|
-
#
|
603
|
+
# The duration, in seconds, of the role session. Your role session lasts
|
604
|
+
# for the duration that you specify for the `DurationSeconds` parameter,
|
605
|
+
# or until the time specified in the SAML authentication response's
|
606
|
+
# `SessionNotOnOrAfter` value, whichever is shorter. You can provide a
|
607
|
+
# `DurationSeconds` value from 900 seconds (15 minutes) up to the
|
608
|
+
# maximum session duration setting for the role. This setting can have a
|
609
|
+
# value from 1 hour to 12 hours. If you specify a value higher than this
|
610
|
+
# setting, the operation fails. For example, if you specify a session
|
611
|
+
# duration of 12 hours, but your administrator set the maximum session
|
612
|
+
# duration to 6 hours, your operation fails. To learn how to view the
|
613
|
+
# maximum value for your role, see [View the Maximum Session Duration
|
614
|
+
# Setting for a Role][1] in the *IAM User Guide*.
|
615
|
+
#
|
616
|
+
# By default, the value is set to 3600 seconds.
|
617
|
+
#
|
618
|
+
# <note markdown="1"> The `DurationSeconds` parameter is separate from the duration of a
|
619
|
+
# console session that you might request using the returned credentials.
|
620
|
+
# The request to the federation endpoint for a console sign-in token
|
621
|
+
# takes a `SessionDuration` parameter that specifies the maximum length
|
622
|
+
# of the console session. For more information, see [Creating a URL that
|
623
|
+
# Enables Federated Users to Access the AWS Management Console][2] in
|
624
|
+
# the *IAM User Guide*.
|
584
625
|
#
|
585
626
|
# </note>
|
586
627
|
#
|
587
628
|
#
|
588
629
|
#
|
589
|
-
# [1]: http://docs.aws.amazon.com/IAM/latest/UserGuide/
|
630
|
+
# [1]: http://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html#id_roles_use_view-role-max-session
|
631
|
+
# [2]: http://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_enable-console-custom-url.html
|
590
632
|
#
|
591
633
|
# @return [Types::AssumeRoleWithSAMLResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
592
634
|
#
|
@@ -666,9 +708,18 @@ module Aws::STS
|
|
666
708
|
# can use these temporary security credentials to sign calls to AWS
|
667
709
|
# service APIs.
|
668
710
|
#
|
669
|
-
#
|
670
|
-
#
|
671
|
-
#
|
711
|
+
# By default, the temporary security credentials created by
|
712
|
+
# `AssumeRoleWithWebIdentity` last for one hour. However, you can use
|
713
|
+
# the optional `DurationSeconds` parameter to specify the duration of
|
714
|
+
# your session. You can provide a value from 900 seconds (15 minutes) up
|
715
|
+
# to the maximum session duration setting for the role. This setting can
|
716
|
+
# have a value from 1 hour to 12 hours. To learn how to view the maximum
|
717
|
+
# value for your role, see [View the Maximum Session Duration Setting
|
718
|
+
# for a Role][7] in the *IAM User Guide*. The maximum session duration
|
719
|
+
# limit applies when you use the `AssumeRole*` API operations or the
|
720
|
+
# `assume-role*` CLI operations but does not apply when you use those
|
721
|
+
# operations to create a console URL. For more information, see [Using
|
722
|
+
# IAM Roles][8] in the *IAM User Guide*.
|
672
723
|
#
|
673
724
|
# The temporary security credentials created by
|
674
725
|
# `AssumeRoleWithWebIdentity` can be used to make API calls to any AWS
|
@@ -687,7 +738,7 @@ module Aws::STS
|
|
687
738
|
# credentials. You cannot use the passed policy to grant permissions
|
688
739
|
# that are in excess of those allowed by the access policy of the role
|
689
740
|
# that is being assumed. For more information, see [Permissions for
|
690
|
-
# AssumeRole, AssumeRoleWithSAML, and AssumeRoleWithWebIdentity][
|
741
|
+
# AssumeRole, AssumeRoleWithSAML, and AssumeRoleWithWebIdentity][9] in
|
691
742
|
# the *IAM User Guide*.
|
692
743
|
#
|
693
744
|
# Before your application can call `AssumeRoleWithWebIdentity`, you must
|
@@ -698,19 +749,19 @@ module Aws::STS
|
|
698
749
|
# specified in the role's trust policy.
|
699
750
|
#
|
700
751
|
# Calling `AssumeRoleWithWebIdentity` can result in an entry in your AWS
|
701
|
-
# CloudTrail logs. The entry includes the [Subject][
|
752
|
+
# CloudTrail logs. The entry includes the [Subject][10] of the provided
|
702
753
|
# Web Identity Token. We recommend that you avoid using any personally
|
703
754
|
# identifiable information (PII) in this field. For example, you could
|
704
755
|
# instead use a GUID or a pairwise identifier, as [suggested in the OIDC
|
705
|
-
# specification][
|
756
|
+
# specification][11].
|
706
757
|
#
|
707
758
|
# For more information about how to use web identity federation and the
|
708
759
|
# `AssumeRoleWithWebIdentity` API, see the following resources:
|
709
760
|
#
|
710
|
-
# * [Using Web Identity Federation APIs for Mobile Apps][
|
711
|
-
# [Federation Through a Web-based Identity Provider][
|
761
|
+
# * [Using Web Identity Federation APIs for Mobile Apps][12] and
|
762
|
+
# [Federation Through a Web-based Identity Provider][13].
|
712
763
|
#
|
713
|
-
# * [ Web Identity Federation Playground][
|
764
|
+
# * [ Web Identity Federation Playground][14]. This interactive website
|
714
765
|
# lets you walk through the process of authenticating via Login with
|
715
766
|
# Amazon, Facebook, or Google, getting temporary security credentials,
|
716
767
|
# and then using those credentials to make a request to AWS.
|
@@ -720,7 +771,7 @@ module Aws::STS
|
|
720
771
|
# and then how to use the information from these providers to get and
|
721
772
|
# use temporary security credentials.
|
722
773
|
#
|
723
|
-
# * [Web Identity Federation with Mobile Applications][
|
774
|
+
# * [Web Identity Federation with Mobile Applications][15]. This article
|
724
775
|
# discusses web identity federation and shows an example of how to use
|
725
776
|
# web identity federation to get access to content in Amazon S3.
|
726
777
|
#
|
@@ -732,13 +783,15 @@ module Aws::STS
|
|
732
783
|
# [4]: http://docs.aws.amazon.com/mobile/sdkforios/developerguide/cognito-auth.html#d0e664
|
733
784
|
# [5]: http://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html
|
734
785
|
# [6]: http://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#stsapi_comparison
|
735
|
-
# [7]: http://docs.aws.amazon.com/IAM/latest/UserGuide/
|
736
|
-
# [8]: http://
|
737
|
-
# [9]: http://
|
738
|
-
# [10]: http://
|
739
|
-
# [11]: http://
|
740
|
-
# [12]:
|
741
|
-
# [13]: http://aws.amazon.com/
|
786
|
+
# [7]: http://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html#id_roles_use_view-role-max-session
|
787
|
+
# [8]: http://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html
|
788
|
+
# [9]: http://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_assumerole.html
|
789
|
+
# [10]: http://openid.net/specs/openid-connect-core-1_0.html#Claims
|
790
|
+
# [11]: http://openid.net/specs/openid-connect-core-1_0.html#SubjectIDTypes
|
791
|
+
# [12]: http://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_oidc_manual.html
|
792
|
+
# [13]: http://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#api_assumerolewithwebidentity
|
793
|
+
# [14]: https://web-identity-federation-playground.s3.amazonaws.com/index.html
|
794
|
+
# [15]: http://aws.amazon.com/articles/web-identity-federation-with-mobile-applications
|
742
795
|
#
|
743
796
|
# @option params [required, String] :role_arn
|
744
797
|
# The Amazon Resource Name (ARN) of the role that the caller is
|
@@ -810,22 +863,31 @@ module Aws::STS
|
|
810
863
|
#
|
811
864
|
# @option params [Integer] :duration_seconds
|
812
865
|
# The duration, in seconds, of the role session. The value can range
|
813
|
-
# from 900 seconds (15 minutes) to
|
814
|
-
# the value
|
866
|
+
# from 900 seconds (15 minutes) up to the maximum session duration
|
867
|
+
# setting for the role. This setting can have a value from 1 hour to 12
|
868
|
+
# hours. If you specify a value higher than this setting, the operation
|
869
|
+
# fails. For example, if you specify a session duration of 12 hours, but
|
870
|
+
# your administrator set the maximum session duration to 6 hours, your
|
871
|
+
# operation fails. To learn how to view the maximum value for your role,
|
872
|
+
# see [View the Maximum Session Duration Setting for a Role][1] in the
|
873
|
+
# *IAM User Guide*.
|
874
|
+
#
|
875
|
+
# By default, the value is set to 3600 seconds.
|
815
876
|
#
|
816
|
-
# <note markdown="1">
|
817
|
-
# request using the returned credentials.
|
818
|
-
# endpoint for a console sign-in token
|
819
|
-
# parameter that specifies the maximum length
|
820
|
-
#
|
821
|
-
#
|
822
|
-
#
|
877
|
+
# <note markdown="1"> The `DurationSeconds` parameter is separate from the duration of a
|
878
|
+
# console session that you might request using the returned credentials.
|
879
|
+
# The request to the federation endpoint for a console sign-in token
|
880
|
+
# takes a `SessionDuration` parameter that specifies the maximum length
|
881
|
+
# of the console session. For more information, see [Creating a URL that
|
882
|
+
# Enables Federated Users to Access the AWS Management Console][2] in
|
883
|
+
# the *IAM User Guide*.
|
823
884
|
#
|
824
885
|
# </note>
|
825
886
|
#
|
826
887
|
#
|
827
888
|
#
|
828
|
-
# [1]: http://docs.aws.amazon.com/IAM/latest/UserGuide/
|
889
|
+
# [1]: http://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html#id_roles_use_view-role-max-session
|
890
|
+
# [2]: http://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_enable-console-custom-url.html
|
829
891
|
#
|
830
892
|
# @return [Types::AssumeRoleWithWebIdentityResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
831
893
|
#
|
@@ -1413,7 +1475,7 @@ module Aws::STS
|
|
1413
1475
|
params: params,
|
1414
1476
|
config: config)
|
1415
1477
|
context[:gem_name] = 'aws-sdk-core'
|
1416
|
-
context[:gem_version] = '3.
|
1478
|
+
context[:gem_version] = '3.18.0'
|
1417
1479
|
Seahorse::Client::Request.new(handlers, context)
|
1418
1480
|
end
|
1419
1481
|
|
data/lib/aws-sdk-sts/types.rb
CHANGED
@@ -80,23 +80,31 @@ module Aws::STS
|
|
80
80
|
#
|
81
81
|
# @!attribute [rw] duration_seconds
|
82
82
|
# The duration, in seconds, of the role session. The value can range
|
83
|
-
# from 900 seconds (15 minutes) to
|
84
|
-
# the value
|
85
|
-
#
|
86
|
-
#
|
87
|
-
#
|
88
|
-
#
|
89
|
-
#
|
90
|
-
#
|
91
|
-
#
|
92
|
-
#
|
93
|
-
#
|
83
|
+
# from 900 seconds (15 minutes) up to the maximum session duration
|
84
|
+
# setting for the role. This setting can have a value from 1 hour to
|
85
|
+
# 12 hours. If you specify a value higher than this setting, the
|
86
|
+
# operation fails. For example, if you specify a session duration of
|
87
|
+
# 12 hours, but your administrator set the maximum session duration to
|
88
|
+
# 6 hours, your operation fails. To learn how to view the maximum
|
89
|
+
# value for your role, see [View the Maximum Session Duration Setting
|
90
|
+
# for a Role][1] in the *IAM User Guide*.
|
91
|
+
#
|
92
|
+
# By default, the value is set to 3600 seconds.
|
93
|
+
#
|
94
|
+
# <note markdown="1"> The `DurationSeconds` parameter is separate from the duration of a
|
95
|
+
# console session that you might request using the returned
|
96
|
+
# credentials. The request to the federation endpoint for a console
|
97
|
+
# sign-in token takes a `SessionDuration` parameter that specifies the
|
98
|
+
# maximum length of the console session. For more information, see
|
99
|
+
# [Creating a URL that Enables Federated Users to Access the AWS
|
100
|
+
# Management Console][2] in the *IAM User Guide*.
|
94
101
|
#
|
95
102
|
# </note>
|
96
103
|
#
|
97
104
|
#
|
98
105
|
#
|
99
|
-
# [1]: http://docs.aws.amazon.com/IAM/latest/UserGuide/
|
106
|
+
# [1]: http://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html#id_roles_use_view-role-max-session
|
107
|
+
# [2]: http://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_enable-console-custom-url.html
|
100
108
|
# @return [Integer]
|
101
109
|
#
|
102
110
|
# @!attribute [rw] external_id
|
@@ -266,27 +274,36 @@ module Aws::STS
|
|
266
274
|
# @return [String]
|
267
275
|
#
|
268
276
|
# @!attribute [rw] duration_seconds
|
269
|
-
# The duration, in seconds, of the role session.
|
270
|
-
#
|
271
|
-
#
|
272
|
-
#
|
273
|
-
# `
|
274
|
-
#
|
275
|
-
#
|
276
|
-
#
|
277
|
-
#
|
278
|
-
#
|
279
|
-
#
|
280
|
-
#
|
281
|
-
# this API. For more information, see [Enabling SAML 2.0 Federated
|
282
|
-
# Users to Access the AWS Management Console][1] in the *IAM User
|
277
|
+
# The duration, in seconds, of the role session. Your role session
|
278
|
+
# lasts for the duration that you specify for the `DurationSeconds`
|
279
|
+
# parameter, or until the time specified in the SAML authentication
|
280
|
+
# response's `SessionNotOnOrAfter` value, whichever is shorter. You
|
281
|
+
# can provide a `DurationSeconds` value from 900 seconds (15 minutes)
|
282
|
+
# up to the maximum session duration setting for the role. This
|
283
|
+
# setting can have a value from 1 hour to 12 hours. If you specify a
|
284
|
+
# value higher than this setting, the operation fails. For example, if
|
285
|
+
# you specify a session duration of 12 hours, but your administrator
|
286
|
+
# set the maximum session duration to 6 hours, your operation fails.
|
287
|
+
# To learn how to view the maximum value for your role, see [View the
|
288
|
+
# Maximum Session Duration Setting for a Role][1] in the *IAM User
|
283
289
|
# Guide*.
|
284
290
|
#
|
291
|
+
# By default, the value is set to 3600 seconds.
|
292
|
+
#
|
293
|
+
# <note markdown="1"> The `DurationSeconds` parameter is separate from the duration of a
|
294
|
+
# console session that you might request using the returned
|
295
|
+
# credentials. The request to the federation endpoint for a console
|
296
|
+
# sign-in token takes a `SessionDuration` parameter that specifies the
|
297
|
+
# maximum length of the console session. For more information, see
|
298
|
+
# [Creating a URL that Enables Federated Users to Access the AWS
|
299
|
+
# Management Console][2] in the *IAM User Guide*.
|
300
|
+
#
|
285
301
|
# </note>
|
286
302
|
#
|
287
303
|
#
|
288
304
|
#
|
289
|
-
# [1]: http://docs.aws.amazon.com/IAM/latest/UserGuide/
|
305
|
+
# [1]: http://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html#id_roles_use_view-role-max-session
|
306
|
+
# [2]: http://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_enable-console-custom-url.html
|
290
307
|
# @return [Integer]
|
291
308
|
#
|
292
309
|
# @see http://docs.aws.amazon.com/goto/WebAPI/sts-2011-06-15/AssumeRoleWithSAMLRequest AWS API Documentation
|
@@ -466,23 +483,31 @@ module Aws::STS
|
|
466
483
|
#
|
467
484
|
# @!attribute [rw] duration_seconds
|
468
485
|
# The duration, in seconds, of the role session. The value can range
|
469
|
-
# from 900 seconds (15 minutes) to
|
470
|
-
# the value
|
471
|
-
#
|
472
|
-
#
|
473
|
-
#
|
474
|
-
#
|
475
|
-
#
|
476
|
-
#
|
477
|
-
#
|
478
|
-
#
|
479
|
-
#
|
486
|
+
# from 900 seconds (15 minutes) up to the maximum session duration
|
487
|
+
# setting for the role. This setting can have a value from 1 hour to
|
488
|
+
# 12 hours. If you specify a value higher than this setting, the
|
489
|
+
# operation fails. For example, if you specify a session duration of
|
490
|
+
# 12 hours, but your administrator set the maximum session duration to
|
491
|
+
# 6 hours, your operation fails. To learn how to view the maximum
|
492
|
+
# value for your role, see [View the Maximum Session Duration Setting
|
493
|
+
# for a Role][1] in the *IAM User Guide*.
|
494
|
+
#
|
495
|
+
# By default, the value is set to 3600 seconds.
|
496
|
+
#
|
497
|
+
# <note markdown="1"> The `DurationSeconds` parameter is separate from the duration of a
|
498
|
+
# console session that you might request using the returned
|
499
|
+
# credentials. The request to the federation endpoint for a console
|
500
|
+
# sign-in token takes a `SessionDuration` parameter that specifies the
|
501
|
+
# maximum length of the console session. For more information, see
|
502
|
+
# [Creating a URL that Enables Federated Users to Access the AWS
|
503
|
+
# Management Console][2] in the *IAM User Guide*.
|
480
504
|
#
|
481
505
|
# </note>
|
482
506
|
#
|
483
507
|
#
|
484
508
|
#
|
485
|
-
# [1]: http://docs.aws.amazon.com/IAM/latest/UserGuide/
|
509
|
+
# [1]: http://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html#id_roles_use_view-role-max-session
|
510
|
+
# [2]: http://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_enable-console-custom-url.html
|
486
511
|
# @return [Integer]
|
487
512
|
#
|
488
513
|
# @see http://docs.aws.amazon.com/goto/WebAPI/sts-2011-06-15/AssumeRoleWithWebIdentityRequest AWS API Documentation
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: aws-sdk-core
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 3.
|
4
|
+
version: 3.18.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Amazon Web Services
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2018-03-
|
11
|
+
date: 2018-03-28 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: jmespath
|