aws-sdk-core 3.170.1 → 3.240.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +855 -0
- data/VERSION +1 -1
- data/lib/aws-defaults/default_configuration.rb +4 -4
- data/lib/aws-defaults.rb +4 -1
- data/lib/aws-sdk-core/arn.rb +1 -3
- data/lib/aws-sdk-core/assume_role_credentials.rb +21 -13
- data/lib/aws-sdk-core/assume_role_web_identity_credentials.rb +16 -9
- data/lib/aws-sdk-core/binary/decode_handler.rb +3 -9
- data/lib/aws-sdk-core/binary/encode_handler.rb +1 -1
- data/lib/aws-sdk-core/binary/event_builder.rb +34 -37
- data/lib/aws-sdk-core/binary/event_stream_decoder.rb +1 -0
- data/lib/aws-sdk-core/binary/event_stream_encoder.rb +4 -3
- data/lib/aws-sdk-core/cbor/decoder.rb +308 -0
- data/lib/aws-sdk-core/cbor/encoder.rb +243 -0
- data/lib/aws-sdk-core/cbor.rb +53 -0
- data/lib/aws-sdk-core/client_side_monitoring.rb +9 -0
- data/lib/aws-sdk-core/client_stubs.rb +39 -55
- data/lib/aws-sdk-core/credential_provider.rb +8 -1
- data/lib/aws-sdk-core/credential_provider_chain.rb +103 -26
- data/lib/aws-sdk-core/credentials.rb +19 -6
- data/lib/aws-sdk-core/ec2_metadata.rb +1 -1
- data/lib/aws-sdk-core/ecs_credentials.rb +186 -60
- data/lib/aws-sdk-core/endpoints/endpoint.rb +3 -1
- data/lib/aws-sdk-core/endpoints/matchers.rb +21 -19
- data/lib/aws-sdk-core/endpoints.rb +106 -22
- data/lib/aws-sdk-core/error_handler.rb +46 -0
- data/lib/aws-sdk-core/errors.rb +17 -5
- data/lib/aws-sdk-core/event_emitter.rb +1 -17
- data/lib/aws-sdk-core/ini_parser.rb +7 -0
- data/lib/aws-sdk-core/instance_profile_credentials.rb +168 -155
- data/lib/aws-sdk-core/json/builder.rb +8 -1
- data/lib/aws-sdk-core/json/error_handler.rb +41 -15
- data/lib/aws-sdk-core/json/handler.rb +13 -6
- data/lib/aws-sdk-core/json/json_engine.rb +3 -1
- data/lib/aws-sdk-core/json/oj_engine.rb +7 -1
- data/lib/aws-sdk-core/json/parser.rb +33 -3
- data/lib/aws-sdk-core/json.rb +43 -14
- data/lib/aws-sdk-core/log/formatter.rb +6 -0
- data/lib/aws-sdk-core/log/param_filter.rb +2 -2
- data/lib/aws-sdk-core/log/param_formatter.rb +7 -3
- data/lib/aws-sdk-core/log.rb +10 -0
- data/lib/aws-sdk-core/login_credentials.rb +229 -0
- data/lib/aws-sdk-core/lru_cache.rb +75 -0
- data/lib/aws-sdk-core/pageable_response.rb +3 -1
- data/lib/aws-sdk-core/param_validator.rb +9 -4
- data/lib/aws-sdk-core/plugins/bearer_authorization.rb +2 -0
- data/lib/aws-sdk-core/plugins/checksum_algorithm.rb +348 -169
- data/lib/aws-sdk-core/plugins/client_metrics_plugin.rb +1 -1
- data/lib/aws-sdk-core/plugins/client_metrics_send_plugin.rb +14 -2
- data/lib/aws-sdk-core/plugins/credentials_configuration.rb +78 -56
- data/lib/aws-sdk-core/plugins/endpoint_pattern.rb +40 -32
- data/lib/aws-sdk-core/plugins/global_configuration.rb +8 -9
- data/lib/aws-sdk-core/plugins/http_checksum.rb +3 -8
- data/lib/aws-sdk-core/plugins/invocation_id.rb +1 -11
- data/lib/aws-sdk-core/plugins/logging.rb +2 -0
- data/lib/aws-sdk-core/plugins/protocols/api_gateway.rb +3 -1
- data/lib/aws-sdk-core/plugins/protocols/ec2.rb +2 -24
- data/lib/aws-sdk-core/plugins/protocols/json_rpc.rb +6 -8
- data/lib/aws-sdk-core/plugins/protocols/query.rb +4 -2
- data/lib/aws-sdk-core/plugins/protocols/rest_json.rb +3 -15
- data/lib/aws-sdk-core/plugins/protocols/rest_xml.rb +3 -0
- data/lib/aws-sdk-core/plugins/protocols/rpc_v2.rb +17 -0
- data/lib/aws-sdk-core/plugins/regional_endpoint.rb +162 -37
- data/lib/aws-sdk-core/plugins/request_compression.rb +226 -0
- data/lib/aws-sdk-core/plugins/retry_errors.rb +12 -3
- data/lib/aws-sdk-core/plugins/sign.rb +55 -33
- data/lib/aws-sdk-core/plugins/signature_v2.rb +2 -1
- data/lib/aws-sdk-core/plugins/signature_v4.rb +2 -1
- data/lib/aws-sdk-core/plugins/stub_responses.rb +59 -9
- data/lib/aws-sdk-core/plugins/telemetry.rb +75 -0
- data/lib/aws-sdk-core/plugins/transfer_encoding.rb +16 -9
- data/lib/aws-sdk-core/plugins/user_agent.rb +194 -14
- data/lib/aws-sdk-core/plugins.rb +39 -0
- data/lib/aws-sdk-core/process_credentials.rb +48 -29
- data/lib/aws-sdk-core/query/ec2_handler.rb +27 -0
- data/lib/aws-sdk-core/query/ec2_param_builder.rb +5 -7
- data/lib/aws-sdk-core/query/handler.rb +4 -4
- data/lib/aws-sdk-core/query/param_builder.rb +2 -2
- data/lib/aws-sdk-core/query.rb +2 -1
- data/lib/aws-sdk-core/refreshing_credentials.rb +20 -23
- data/lib/aws-sdk-core/resources.rb +8 -0
- data/lib/aws-sdk-core/rest/content_type_handler.rb +60 -0
- data/lib/aws-sdk-core/rest/handler.rb +3 -4
- data/lib/aws-sdk-core/rest/request/body.rb +32 -5
- data/lib/aws-sdk-core/rest/request/endpoint.rb +24 -4
- data/lib/aws-sdk-core/rest/request/headers.rb +15 -7
- data/lib/aws-sdk-core/rest/request/querystring_builder.rb +62 -36
- data/lib/aws-sdk-core/rest/response/body.rb +15 -1
- data/lib/aws-sdk-core/rest/response/header_list_parser.rb +79 -0
- data/lib/aws-sdk-core/rest/response/headers.rb +8 -3
- data/lib/aws-sdk-core/rest.rb +1 -0
- data/lib/aws-sdk-core/rpc_v2/builder.rb +62 -0
- data/lib/aws-sdk-core/rpc_v2/cbor_engine.rb +18 -0
- data/lib/aws-sdk-core/rpc_v2/content_type_handler.rb +47 -0
- data/lib/aws-sdk-core/rpc_v2/error_handler.rb +95 -0
- data/lib/aws-sdk-core/rpc_v2/handler.rb +79 -0
- data/lib/aws-sdk-core/rpc_v2/parser.rb +98 -0
- data/lib/aws-sdk-core/rpc_v2.rb +69 -0
- data/lib/aws-sdk-core/shared_config.rb +155 -39
- data/lib/aws-sdk-core/shared_credentials.rb +1 -7
- data/lib/aws-sdk-core/sso_credentials.rb +6 -3
- data/lib/aws-sdk-core/static_token_provider.rb +1 -2
- data/lib/aws-sdk-core/stubbing/protocols/ec2.rb +12 -11
- data/lib/aws-sdk-core/stubbing/protocols/json.rb +11 -10
- data/lib/aws-sdk-core/stubbing/protocols/query.rb +7 -6
- data/lib/aws-sdk-core/stubbing/protocols/rest.rb +2 -1
- data/lib/aws-sdk-core/stubbing/protocols/rest_json.rb +9 -8
- data/lib/aws-sdk-core/stubbing/protocols/rest_xml.rb +6 -5
- data/lib/aws-sdk-core/stubbing/protocols/rpc_v2.rb +39 -0
- data/lib/aws-sdk-core/stubbing/stub_data.rb +11 -0
- data/lib/aws-sdk-core/stubbing.rb +22 -0
- data/lib/aws-sdk-core/telemetry/base.rb +177 -0
- data/lib/aws-sdk-core/telemetry/no_op.rb +70 -0
- data/lib/aws-sdk-core/telemetry/otel.rb +235 -0
- data/lib/aws-sdk-core/telemetry/span_kind.rb +22 -0
- data/lib/aws-sdk-core/telemetry/span_status.rb +59 -0
- data/lib/aws-sdk-core/telemetry.rb +78 -0
- data/lib/aws-sdk-core/token.rb +3 -3
- data/lib/aws-sdk-core/token_provider.rb +4 -0
- data/lib/aws-sdk-core/token_provider_chain.rb +2 -6
- data/lib/aws-sdk-core/util.rb +41 -1
- data/lib/aws-sdk-core/waiters/poller.rb +12 -5
- data/lib/aws-sdk-core/xml/builder.rb +17 -9
- data/lib/aws-sdk-core/xml/error_handler.rb +35 -43
- data/lib/aws-sdk-core/xml/parser/frame.rb +4 -20
- data/lib/aws-sdk-core/xml/parser/stack.rb +2 -0
- data/lib/aws-sdk-core/xml/parser.rb +2 -6
- data/lib/aws-sdk-core.rb +86 -107
- data/lib/aws-sdk-signin/client.rb +604 -0
- data/lib/aws-sdk-signin/client_api.rb +119 -0
- data/lib/aws-sdk-signin/customizations.rb +1 -0
- data/lib/aws-sdk-signin/endpoint_parameters.rb +69 -0
- data/lib/aws-sdk-signin/endpoint_provider.rb +59 -0
- data/lib/aws-sdk-signin/endpoints.rb +20 -0
- data/lib/aws-sdk-signin/errors.rb +122 -0
- data/lib/aws-sdk-signin/plugins/endpoints.rb +77 -0
- data/lib/aws-sdk-signin/resource.rb +26 -0
- data/lib/aws-sdk-signin/types.rb +299 -0
- data/lib/aws-sdk-signin.rb +63 -0
- data/lib/aws-sdk-sso/client.rb +205 -92
- data/lib/aws-sdk-sso/client_api.rb +7 -0
- data/lib/aws-sdk-sso/endpoint_parameters.rb +13 -10
- data/lib/aws-sdk-sso/endpoint_provider.rb +30 -28
- data/lib/aws-sdk-sso/endpoints.rb +3 -54
- data/lib/aws-sdk-sso/plugins/endpoints.rb +23 -22
- data/lib/aws-sdk-sso/types.rb +1 -0
- data/lib/aws-sdk-sso.rb +15 -11
- data/lib/aws-sdk-ssooidc/client.rb +625 -125
- data/lib/aws-sdk-ssooidc/client_api.rb +94 -1
- data/lib/aws-sdk-ssooidc/endpoint_parameters.rb +13 -10
- data/lib/aws-sdk-ssooidc/endpoint_provider.rb +30 -28
- data/lib/aws-sdk-ssooidc/endpoints.rb +3 -40
- data/lib/aws-sdk-ssooidc/errors.rb +62 -0
- data/lib/aws-sdk-ssooidc/plugins/endpoints.rb +23 -20
- data/lib/aws-sdk-ssooidc/types.rb +419 -53
- data/lib/aws-sdk-ssooidc.rb +15 -11
- data/lib/aws-sdk-sts/client.rb +656 -249
- data/lib/aws-sdk-sts/client_api.rb +120 -9
- data/lib/aws-sdk-sts/customizations.rb +5 -2
- data/lib/aws-sdk-sts/endpoint_parameters.rb +15 -14
- data/lib/aws-sdk-sts/endpoint_provider.rb +82 -84
- data/lib/aws-sdk-sts/endpoints.rb +3 -118
- data/lib/aws-sdk-sts/errors.rb +79 -0
- data/lib/aws-sdk-sts/plugins/endpoints.rb +23 -30
- data/lib/aws-sdk-sts/presigner.rb +3 -7
- data/lib/aws-sdk-sts/types.rb +390 -40
- data/lib/aws-sdk-sts.rb +15 -11
- data/lib/seahorse/client/async_base.rb +4 -5
- data/lib/seahorse/client/async_response.rb +19 -0
- data/lib/seahorse/client/base.rb +18 -21
- data/lib/seahorse/client/configuration.rb +0 -4
- data/lib/seahorse/client/h2/connection.rb +18 -28
- data/lib/seahorse/client/h2/handler.rb +19 -3
- data/lib/seahorse/client/handler.rb +1 -1
- data/lib/seahorse/client/http/response.rb +1 -1
- data/lib/seahorse/client/net_http/connection_pool.rb +15 -12
- data/lib/seahorse/client/net_http/handler.rb +21 -9
- data/lib/seahorse/client/net_http/patches.rb +1 -4
- data/lib/seahorse/client/networking_error.rb +1 -1
- data/lib/seahorse/client/plugin.rb +9 -0
- data/lib/seahorse/client/plugins/endpoint.rb +0 -1
- data/lib/seahorse/client/plugins/h2.rb +4 -4
- data/lib/seahorse/client/plugins/net_http.rb +57 -16
- data/lib/seahorse/client/plugins/request_callback.rb +31 -0
- data/lib/seahorse/client/request_context.rb +9 -2
- data/lib/seahorse/client/response.rb +8 -0
- data/lib/seahorse/model/operation.rb +3 -0
- data/lib/seahorse/model/shapes.rb +2 -2
- data/lib/seahorse/util.rb +2 -1
- data/sig/aws-sdk-core/async_client_stubs.rbs +21 -0
- data/sig/aws-sdk-core/client_stubs.rbs +10 -0
- data/sig/aws-sdk-core/errors.rbs +22 -0
- data/sig/aws-sdk-core/resources/collection.rbs +21 -0
- data/sig/aws-sdk-core/structure.rbs +4 -0
- data/sig/aws-sdk-core/telemetry/base.rbs +46 -0
- data/sig/aws-sdk-core/telemetry/otel.rbs +22 -0
- data/sig/aws-sdk-core/telemetry/span_kind.rbs +15 -0
- data/sig/aws-sdk-core/telemetry/span_status.rbs +24 -0
- data/sig/aws-sdk-core/waiters/errors.rbs +20 -0
- data/sig/aws-sdk-core.rbs +7 -0
- data/sig/seahorse/client/async_base.rbs +18 -0
- data/sig/seahorse/client/base.rbs +25 -0
- data/sig/seahorse/client/handler_builder.rbs +16 -0
- data/sig/seahorse/client/response.rbs +61 -0
- metadata +118 -23
- /data/lib/aws-sdk-core/xml/parser/{engines/libxml.rb → libxml_engine.rb} +0 -0
- /data/lib/aws-sdk-core/xml/parser/{engines/nokogiri.rb → nokogiri_engine.rb} +0 -0
- /data/lib/aws-sdk-core/xml/parser/{engines/oga.rb → oga_engine.rb} +0 -0
- /data/lib/aws-sdk-core/xml/parser/{engines/ox.rb → ox_engine.rb} +0 -0
- /data/lib/aws-sdk-core/xml/parser/{engines/rexml.rb → rexml_engine.rb} +0 -0
data/lib/aws-sdk-sts/types.rb
CHANGED
|
@@ -26,10 +26,21 @@ module Aws::STS
|
|
|
26
26
|
# that use the temporary security credentials will expose the role
|
|
27
27
|
# session name to the external account in their CloudTrail logs.
|
|
28
28
|
#
|
|
29
|
+
# For security purposes, administrators can view this field in
|
|
30
|
+
# [CloudTrail logs][1] to help identify who performed an action in
|
|
31
|
+
# Amazon Web Services. Your administrator might require that you
|
|
32
|
+
# specify your user name as the session name when you assume the role.
|
|
33
|
+
# For more information, see [ `sts:RoleSessionName` ][2].
|
|
34
|
+
#
|
|
29
35
|
# The regex used to validate this parameter is a string of characters
|
|
30
36
|
# consisting of upper- and lower-case alphanumeric characters with no
|
|
31
37
|
# spaces. You can also include underscores or any of the following
|
|
32
|
-
# characters:
|
|
38
|
+
# characters: +=,.@-
|
|
39
|
+
#
|
|
40
|
+
#
|
|
41
|
+
#
|
|
42
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/cloudtrail-integration.html#cloudtrail-integration_signin-tempcreds
|
|
43
|
+
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_iam-condition-keys.html#ck_rolesessionname
|
|
33
44
|
# @return [String]
|
|
34
45
|
#
|
|
35
46
|
# @!attribute [rw] policy_arns
|
|
@@ -101,6 +112,9 @@ module Aws::STS
|
|
|
101
112
|
#
|
|
102
113
|
# </note>
|
|
103
114
|
#
|
|
115
|
+
# For more information about role session permissions, see [Session
|
|
116
|
+
# policies][1].
|
|
117
|
+
#
|
|
104
118
|
#
|
|
105
119
|
#
|
|
106
120
|
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
|
|
@@ -125,8 +139,7 @@ module Aws::STS
|
|
|
125
139
|
# However, if you assume a role using role chaining and provide a
|
|
126
140
|
# `DurationSeconds` parameter value greater than one hour, the
|
|
127
141
|
# operation fails. To learn how to view the maximum value for your
|
|
128
|
-
# role, see [
|
|
129
|
-
# in the *IAM User Guide*.
|
|
142
|
+
# role, see [Update the maximum session duration for a role][1].
|
|
130
143
|
#
|
|
131
144
|
# By default, the value is set to `3600` seconds.
|
|
132
145
|
#
|
|
@@ -142,7 +155,7 @@ module Aws::STS
|
|
|
142
155
|
#
|
|
143
156
|
#
|
|
144
157
|
#
|
|
145
|
-
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
|
158
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_update-role-settings.html#id_roles_update-session-duration
|
|
146
159
|
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_enable-console-custom-url.html
|
|
147
160
|
# @return [Integer]
|
|
148
161
|
#
|
|
@@ -199,9 +212,8 @@ module Aws::STS
|
|
|
199
212
|
# passes to subsequent sessions in a role chain. For more information,
|
|
200
213
|
# see [Chaining Roles with Session Tags][1] in the *IAM User Guide*.
|
|
201
214
|
#
|
|
202
|
-
# This parameter is optional.
|
|
203
|
-
#
|
|
204
|
-
# affected.
|
|
215
|
+
# This parameter is optional. The transitive status of a session tag
|
|
216
|
+
# does not impact its packed binary size.
|
|
205
217
|
#
|
|
206
218
|
# If you choose not to specify a transitive tag key, then no tags are
|
|
207
219
|
# passed from this session to any subsequent sessions.
|
|
@@ -228,7 +240,7 @@ module Aws::STS
|
|
|
228
240
|
# The regex used to validate this parameter is a string of characters
|
|
229
241
|
# consisting of upper- and lower-case alphanumeric characters with no
|
|
230
242
|
# spaces. You can also include underscores or any of the following
|
|
231
|
-
# characters:
|
|
243
|
+
# characters: +=,.@:\\/-
|
|
232
244
|
#
|
|
233
245
|
#
|
|
234
246
|
#
|
|
@@ -247,7 +259,7 @@ module Aws::STS
|
|
|
247
259
|
# The regex used to validate this parameter is a string of characters
|
|
248
260
|
# consisting of upper- and lower-case alphanumeric characters with no
|
|
249
261
|
# spaces. You can also include underscores or any of the following
|
|
250
|
-
# characters:
|
|
262
|
+
# characters: +=/:,.@-
|
|
251
263
|
# @return [String]
|
|
252
264
|
#
|
|
253
265
|
# @!attribute [rw] token_code
|
|
@@ -263,30 +275,46 @@ module Aws::STS
|
|
|
263
275
|
#
|
|
264
276
|
# @!attribute [rw] source_identity
|
|
265
277
|
# The source identity specified by the principal that is calling the
|
|
266
|
-
# `AssumeRole` operation.
|
|
278
|
+
# `AssumeRole` operation. The source identity value persists across
|
|
279
|
+
# [chained role][1] sessions.
|
|
267
280
|
#
|
|
268
281
|
# You can require users to specify a source identity when they assume
|
|
269
|
-
# a role. You do this by using the `sts:SourceIdentity`
|
|
270
|
-
# in a role trust policy. You can use source identity
|
|
271
|
-
# CloudTrail logs to determine who took actions with a
|
|
272
|
-
# use the `aws:SourceIdentity` condition key to further
|
|
273
|
-
# to Amazon Web Services resources based on the value
|
|
274
|
-
# identity. For more information about using source
|
|
275
|
-
# [Monitor and control actions taken with assumed
|
|
276
|
-
# *IAM User Guide*.
|
|
282
|
+
# a role. You do this by using the [ `sts:SourceIdentity` ][2]
|
|
283
|
+
# condition key in a role trust policy. You can use source identity
|
|
284
|
+
# information in CloudTrail logs to determine who took actions with a
|
|
285
|
+
# role. You can use the `aws:SourceIdentity` condition key to further
|
|
286
|
+
# control access to Amazon Web Services resources based on the value
|
|
287
|
+
# of source identity. For more information about using source
|
|
288
|
+
# identity, see [Monitor and control actions taken with assumed
|
|
289
|
+
# roles][3] in the *IAM User Guide*.
|
|
277
290
|
#
|
|
278
291
|
# The regex used to validate this parameter is a string of characters
|
|
279
292
|
# consisting of upper- and lower-case alphanumeric characters with no
|
|
280
293
|
# spaces. You can also include underscores or any of the following
|
|
281
|
-
# characters:
|
|
294
|
+
# characters: +=,.@-. You cannot use a value that begins with the text
|
|
282
295
|
# `aws:`. This prefix is reserved for Amazon Web Services internal
|
|
283
296
|
# use.
|
|
284
297
|
#
|
|
285
298
|
#
|
|
286
299
|
#
|
|
287
|
-
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
|
300
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles.html#iam-term-role-chaining
|
|
301
|
+
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html#condition-keys-sourceidentity
|
|
302
|
+
# [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_monitor.html
|
|
288
303
|
# @return [String]
|
|
289
304
|
#
|
|
305
|
+
# @!attribute [rw] provided_contexts
|
|
306
|
+
# A list of previously acquired trusted context assertions in the
|
|
307
|
+
# format of a JSON array. The trusted context assertion is signed and
|
|
308
|
+
# encrypted by Amazon Web Services STS.
|
|
309
|
+
#
|
|
310
|
+
# The following is an example of a `ProvidedContext` value that
|
|
311
|
+
# includes a single trusted context assertion and the ARN of the
|
|
312
|
+
# context provider from which the trusted context assertion was
|
|
313
|
+
# generated.
|
|
314
|
+
#
|
|
315
|
+
# `[{"ProviderArn":"arn:aws:iam::aws:contextProvider/IdentityCenter","ContextAssertion":"trusted-context-assertion"}]`
|
|
316
|
+
# @return [Array<Types::ProvidedContext>]
|
|
317
|
+
#
|
|
290
318
|
# @see http://docs.aws.amazon.com/goto/WebAPI/sts-2011-06-15/AssumeRoleRequest AWS API Documentation
|
|
291
319
|
#
|
|
292
320
|
class AssumeRoleRequest < Struct.new(
|
|
@@ -300,7 +328,8 @@ module Aws::STS
|
|
|
300
328
|
:external_id,
|
|
301
329
|
:serial_number,
|
|
302
330
|
:token_code,
|
|
303
|
-
:source_identity
|
|
331
|
+
:source_identity,
|
|
332
|
+
:provided_contexts)
|
|
304
333
|
SENSITIVE = []
|
|
305
334
|
include Aws::Structure
|
|
306
335
|
end
|
|
@@ -451,6 +480,9 @@ module Aws::STS
|
|
|
451
480
|
# include the tab (\\u0009), linefeed (\\u000A), and carriage return
|
|
452
481
|
# (\\u000D) characters.
|
|
453
482
|
#
|
|
483
|
+
# For more information about role session permissions, see [Session
|
|
484
|
+
# policies][1].
|
|
485
|
+
#
|
|
454
486
|
# <note markdown="1"> An Amazon Web Services conversion compresses the passed inline
|
|
455
487
|
# session policy, managed policy ARNs, and session tags into a packed
|
|
456
488
|
# binary format that has a separate limit. Your request can fail for
|
|
@@ -508,7 +540,7 @@ module Aws::STS
|
|
|
508
540
|
:policy_arns,
|
|
509
541
|
:policy,
|
|
510
542
|
:duration_seconds)
|
|
511
|
-
SENSITIVE = []
|
|
543
|
+
SENSITIVE = [:saml_assertion]
|
|
512
544
|
include Aws::Structure
|
|
513
545
|
end
|
|
514
546
|
|
|
@@ -576,7 +608,7 @@ module Aws::STS
|
|
|
576
608
|
# in IAM.
|
|
577
609
|
#
|
|
578
610
|
# The combination of `NameQualifier` and `Subject` can be used to
|
|
579
|
-
# uniquely identify a
|
|
611
|
+
# uniquely identify a user.
|
|
580
612
|
#
|
|
581
613
|
# The following pseudocode shows how the hash value is calculated:
|
|
582
614
|
#
|
|
@@ -586,6 +618,8 @@ module Aws::STS
|
|
|
586
618
|
#
|
|
587
619
|
# @!attribute [rw] source_identity
|
|
588
620
|
# The value in the `SourceIdentity` attribute in the SAML assertion.
|
|
621
|
+
# The source identity value persists across [chained role][1]
|
|
622
|
+
# sessions.
|
|
589
623
|
#
|
|
590
624
|
# You can require users to set a source identity value when they
|
|
591
625
|
# assume a role. You do this by using the `sts:SourceIdentity`
|
|
@@ -593,12 +627,12 @@ module Aws::STS
|
|
|
593
627
|
# taken with the role are associated with that user. After the source
|
|
594
628
|
# identity is set, the value cannot be changed. It is present in the
|
|
595
629
|
# request for all actions that are taken by the role and persists
|
|
596
|
-
# across [chained role][
|
|
630
|
+
# across [chained role][2] sessions. You can configure your SAML
|
|
597
631
|
# identity provider to use an attribute associated with your users,
|
|
598
632
|
# like user name or email, as the source identity when calling
|
|
599
633
|
# `AssumeRoleWithSAML`. You do this by adding an attribute to the SAML
|
|
600
634
|
# assertion. For more information about using source identity, see
|
|
601
|
-
# [Monitor and control actions taken with assumed roles][
|
|
635
|
+
# [Monitor and control actions taken with assumed roles][3] in the
|
|
602
636
|
# *IAM User Guide*.
|
|
603
637
|
#
|
|
604
638
|
# The regex used to validate this parameter is a string of characters
|
|
@@ -608,8 +642,9 @@ module Aws::STS
|
|
|
608
642
|
#
|
|
609
643
|
#
|
|
610
644
|
#
|
|
611
|
-
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
|
612
|
-
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
|
645
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles.html#iam-term-role-chaining
|
|
646
|
+
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles.html#id_roles_terms-and-concepts
|
|
647
|
+
# [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_monitor.html
|
|
613
648
|
# @return [String]
|
|
614
649
|
#
|
|
615
650
|
# @see http://docs.aws.amazon.com/goto/WebAPI/sts-2011-06-15/AssumeRoleWithSAMLResponse AWS API Documentation
|
|
@@ -631,6 +666,24 @@ module Aws::STS
|
|
|
631
666
|
# @!attribute [rw] role_arn
|
|
632
667
|
# The Amazon Resource Name (ARN) of the role that the caller is
|
|
633
668
|
# assuming.
|
|
669
|
+
#
|
|
670
|
+
# <note markdown="1"> Additional considerations apply to Amazon Cognito identity pools
|
|
671
|
+
# that assume [cross-account IAM roles][1]. The trust policies of
|
|
672
|
+
# these roles must accept the `cognito-identity.amazonaws.com` service
|
|
673
|
+
# principal and must contain the `cognito-identity.amazonaws.com:aud`
|
|
674
|
+
# condition key to restrict role assumption to users from your
|
|
675
|
+
# intended identity pools. A policy that trusts Amazon Cognito
|
|
676
|
+
# identity pools without this condition creates a risk that a user
|
|
677
|
+
# from an unintended identity pool can assume the role. For more
|
|
678
|
+
# information, see [ Trust policies for IAM roles in Basic (Classic)
|
|
679
|
+
# authentication ][2] in the *Amazon Cognito Developer Guide*.
|
|
680
|
+
#
|
|
681
|
+
# </note>
|
|
682
|
+
#
|
|
683
|
+
#
|
|
684
|
+
#
|
|
685
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies-cross-account-resource-access.html
|
|
686
|
+
# [2]: https://docs.aws.amazon.com/cognito/latest/developerguide/iam-roles.html#trust-policies
|
|
634
687
|
# @return [String]
|
|
635
688
|
#
|
|
636
689
|
# @!attribute [rw] role_session_name
|
|
@@ -641,10 +694,21 @@ module Aws::STS
|
|
|
641
694
|
# session name is included as part of the ARN and assumed role ID in
|
|
642
695
|
# the `AssumedRoleUser` response element.
|
|
643
696
|
#
|
|
697
|
+
# For security purposes, administrators can view this field in
|
|
698
|
+
# [CloudTrail logs][1] to help identify who performed an action in
|
|
699
|
+
# Amazon Web Services. Your administrator might require that you
|
|
700
|
+
# specify your user name as the session name when you assume the role.
|
|
701
|
+
# For more information, see [ `sts:RoleSessionName` ][2].
|
|
702
|
+
#
|
|
644
703
|
# The regex used to validate this parameter is a string of characters
|
|
645
704
|
# consisting of upper- and lower-case alphanumeric characters with no
|
|
646
705
|
# spaces. You can also include underscores or any of the following
|
|
647
706
|
# characters: =,.@-
|
|
707
|
+
#
|
|
708
|
+
#
|
|
709
|
+
#
|
|
710
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/cloudtrail-integration.html#cloudtrail-integration_signin-tempcreds
|
|
711
|
+
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_iam-condition-keys.html#ck_rolesessionname
|
|
648
712
|
# @return [String]
|
|
649
713
|
#
|
|
650
714
|
# @!attribute [rw] web_identity_token
|
|
@@ -652,7 +716,10 @@ module Aws::STS
|
|
|
652
716
|
# provided by the identity provider. Your application must get this
|
|
653
717
|
# token by authenticating the user who is using your application with
|
|
654
718
|
# a web identity provider before the application makes an
|
|
655
|
-
# `AssumeRoleWithWebIdentity` call.
|
|
719
|
+
# `AssumeRoleWithWebIdentity` call. Timestamps in the token must be
|
|
720
|
+
# formatted as either an integer or a long integer. Tokens must be
|
|
721
|
+
# signed using either RSA keys (RS256, RS384, or RS512) or ECDSA keys
|
|
722
|
+
# (ES256, ES384, or ES512).
|
|
656
723
|
# @return [String]
|
|
657
724
|
#
|
|
658
725
|
# @!attribute [rw] provider_id
|
|
@@ -726,6 +793,9 @@ module Aws::STS
|
|
|
726
793
|
# include the tab (\\u0009), linefeed (\\u000A), and carriage return
|
|
727
794
|
# (\\u000D) characters.
|
|
728
795
|
#
|
|
796
|
+
# For more information about role session permissions, see [Session
|
|
797
|
+
# policies][1].
|
|
798
|
+
#
|
|
729
799
|
# <note markdown="1"> An Amazon Web Services conversion compresses the passed inline
|
|
730
800
|
# session policy, managed policy ARNs, and session tags into a packed
|
|
731
801
|
# binary format that has a separate limit. Your request can fail for
|
|
@@ -780,7 +850,7 @@ module Aws::STS
|
|
|
780
850
|
:policy_arns,
|
|
781
851
|
:policy,
|
|
782
852
|
:duration_seconds)
|
|
783
|
-
SENSITIVE = []
|
|
853
|
+
SENSITIVE = [:web_identity_token]
|
|
784
854
|
include Aws::Structure
|
|
785
855
|
end
|
|
786
856
|
|
|
@@ -866,7 +936,7 @@ module Aws::STS
|
|
|
866
936
|
#
|
|
867
937
|
#
|
|
868
938
|
#
|
|
869
|
-
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_terms-and-concepts
|
|
939
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles.html#id_roles_terms-and-concepts
|
|
870
940
|
# [2]: https://docs.aws.amazon.com/cognito/latest/developerguide/amazon-cognito-user-pools-using-tokens-with-identity-providers.html
|
|
871
941
|
# [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_monitor.html
|
|
872
942
|
# @return [String]
|
|
@@ -885,6 +955,92 @@ module Aws::STS
|
|
|
885
955
|
include Aws::Structure
|
|
886
956
|
end
|
|
887
957
|
|
|
958
|
+
# @!attribute [rw] target_principal
|
|
959
|
+
# The member account principal ARN or account ID.
|
|
960
|
+
# @return [String]
|
|
961
|
+
#
|
|
962
|
+
# @!attribute [rw] task_policy_arn
|
|
963
|
+
# The identity based policy that scopes the session to the privileged
|
|
964
|
+
# tasks that can be performed. You must use one of following Amazon
|
|
965
|
+
# Web Services managed policies to scope root session actions:
|
|
966
|
+
#
|
|
967
|
+
# * [IAMAuditRootUserCredentials][1]
|
|
968
|
+
#
|
|
969
|
+
# * [IAMCreateRootUserPassword][2]
|
|
970
|
+
#
|
|
971
|
+
# * [IAMDeleteRootUserCredentials][3]
|
|
972
|
+
#
|
|
973
|
+
# * [S3UnlockBucketPolicy][4]
|
|
974
|
+
#
|
|
975
|
+
# * [SQSUnlockQueuePolicy][5]
|
|
976
|
+
#
|
|
977
|
+
#
|
|
978
|
+
#
|
|
979
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/security-iam-awsmanpol.html#security-iam-awsmanpol-IAMAuditRootUserCredentials
|
|
980
|
+
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/security-iam-awsmanpol.html#security-iam-awsmanpol-IAMCreateRootUserPassword
|
|
981
|
+
# [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/security-iam-awsmanpol.html#security-iam-awsmanpol-IAMDeleteRootUserCredentials
|
|
982
|
+
# [4]: https://docs.aws.amazon.com/IAM/latest/UserGuide/security-iam-awsmanpol.html#security-iam-awsmanpol-S3UnlockBucketPolicy
|
|
983
|
+
# [5]: https://docs.aws.amazon.com/IAM/latest/UserGuide/security-iam-awsmanpol.html#security-iam-awsmanpol-SQSUnlockQueuePolicy
|
|
984
|
+
# @return [Types::PolicyDescriptorType]
|
|
985
|
+
#
|
|
986
|
+
# @!attribute [rw] duration_seconds
|
|
987
|
+
# The duration, in seconds, of the privileged session. The value can
|
|
988
|
+
# range from 0 seconds up to the maximum session duration of 900
|
|
989
|
+
# seconds (15 minutes). If you specify a value higher than this
|
|
990
|
+
# setting, the operation fails.
|
|
991
|
+
#
|
|
992
|
+
# By default, the value is set to `900` seconds.
|
|
993
|
+
# @return [Integer]
|
|
994
|
+
#
|
|
995
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/sts-2011-06-15/AssumeRootRequest AWS API Documentation
|
|
996
|
+
#
|
|
997
|
+
class AssumeRootRequest < Struct.new(
|
|
998
|
+
:target_principal,
|
|
999
|
+
:task_policy_arn,
|
|
1000
|
+
:duration_seconds)
|
|
1001
|
+
SENSITIVE = []
|
|
1002
|
+
include Aws::Structure
|
|
1003
|
+
end
|
|
1004
|
+
|
|
1005
|
+
# @!attribute [rw] credentials
|
|
1006
|
+
# The temporary security credentials, which include an access key ID,
|
|
1007
|
+
# a secret access key, and a security token.
|
|
1008
|
+
#
|
|
1009
|
+
# <note markdown="1"> The size of the security token that STS API operations return is not
|
|
1010
|
+
# fixed. We strongly recommend that you make no assumptions about the
|
|
1011
|
+
# maximum size.
|
|
1012
|
+
#
|
|
1013
|
+
# </note>
|
|
1014
|
+
# @return [Types::Credentials]
|
|
1015
|
+
#
|
|
1016
|
+
# @!attribute [rw] source_identity
|
|
1017
|
+
# The source identity specified by the principal that is calling the
|
|
1018
|
+
# `AssumeRoot` operation.
|
|
1019
|
+
#
|
|
1020
|
+
# You can use the `aws:SourceIdentity` condition key to control access
|
|
1021
|
+
# based on the value of source identity. For more information about
|
|
1022
|
+
# using source identity, see [Monitor and control actions taken with
|
|
1023
|
+
# assumed roles][1] in the *IAM User Guide*.
|
|
1024
|
+
#
|
|
1025
|
+
# The regex used to validate this parameter is a string of characters
|
|
1026
|
+
# consisting of upper- and lower-case alphanumeric characters with no
|
|
1027
|
+
# spaces. You can also include underscores or any of the following
|
|
1028
|
+
# characters: =,.@-
|
|
1029
|
+
#
|
|
1030
|
+
#
|
|
1031
|
+
#
|
|
1032
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_monitor.html
|
|
1033
|
+
# @return [String]
|
|
1034
|
+
#
|
|
1035
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/sts-2011-06-15/AssumeRootResponse AWS API Documentation
|
|
1036
|
+
#
|
|
1037
|
+
class AssumeRootResponse < Struct.new(
|
|
1038
|
+
:credentials,
|
|
1039
|
+
:source_identity)
|
|
1040
|
+
SENSITIVE = []
|
|
1041
|
+
include Aws::Structure
|
|
1042
|
+
end
|
|
1043
|
+
|
|
888
1044
|
# The identifiers for the temporary security credentials that the
|
|
889
1045
|
# operation returns.
|
|
890
1046
|
#
|
|
@@ -941,7 +1097,7 @@ module Aws::STS
|
|
|
941
1097
|
:secret_access_key,
|
|
942
1098
|
:session_token,
|
|
943
1099
|
:expiration)
|
|
944
|
-
SENSITIVE = []
|
|
1100
|
+
SENSITIVE = [:secret_access_key]
|
|
945
1101
|
include Aws::Structure
|
|
946
1102
|
end
|
|
947
1103
|
|
|
@@ -988,6 +1144,21 @@ module Aws::STS
|
|
|
988
1144
|
include Aws::Structure
|
|
989
1145
|
end
|
|
990
1146
|
|
|
1147
|
+
# The trade-in token provided in the request has expired and can no
|
|
1148
|
+
# longer be exchanged for credentials. Request a new token and retry the
|
|
1149
|
+
# operation.
|
|
1150
|
+
#
|
|
1151
|
+
# @!attribute [rw] message
|
|
1152
|
+
# @return [String]
|
|
1153
|
+
#
|
|
1154
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/sts-2011-06-15/ExpiredTradeInTokenException AWS API Documentation
|
|
1155
|
+
#
|
|
1156
|
+
class ExpiredTradeInTokenException < Struct.new(
|
|
1157
|
+
:message)
|
|
1158
|
+
SENSITIVE = []
|
|
1159
|
+
include Aws::Structure
|
|
1160
|
+
end
|
|
1161
|
+
|
|
991
1162
|
# Identifiers for the federated user that is associated with the
|
|
992
1163
|
# credentials.
|
|
993
1164
|
#
|
|
@@ -1083,6 +1254,47 @@ module Aws::STS
|
|
|
1083
1254
|
include Aws::Structure
|
|
1084
1255
|
end
|
|
1085
1256
|
|
|
1257
|
+
# @!attribute [rw] trade_in_token
|
|
1258
|
+
# The token to exchange for temporary Amazon Web Services credentials.
|
|
1259
|
+
# This token must be valid and unexpired at the time of the request.
|
|
1260
|
+
# @return [String]
|
|
1261
|
+
#
|
|
1262
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/sts-2011-06-15/GetDelegatedAccessTokenRequest AWS API Documentation
|
|
1263
|
+
#
|
|
1264
|
+
class GetDelegatedAccessTokenRequest < Struct.new(
|
|
1265
|
+
:trade_in_token)
|
|
1266
|
+
SENSITIVE = [:trade_in_token]
|
|
1267
|
+
include Aws::Structure
|
|
1268
|
+
end
|
|
1269
|
+
|
|
1270
|
+
# @!attribute [rw] credentials
|
|
1271
|
+
# Amazon Web Services credentials for API authentication.
|
|
1272
|
+
# @return [Types::Credentials]
|
|
1273
|
+
#
|
|
1274
|
+
# @!attribute [rw] packed_policy_size
|
|
1275
|
+
# The percentage of the maximum policy size that is used by the
|
|
1276
|
+
# session policy. The policy size is calculated as the sum of all the
|
|
1277
|
+
# session policies and permission boundaries attached to the session.
|
|
1278
|
+
# If the packed size exceeds 100%, the request fails.
|
|
1279
|
+
# @return [Integer]
|
|
1280
|
+
#
|
|
1281
|
+
# @!attribute [rw] assumed_principal
|
|
1282
|
+
# The Amazon Resource Name (ARN) of the principal that was assumed
|
|
1283
|
+
# when obtaining the delegated access token. This ARN identifies the
|
|
1284
|
+
# IAM entity whose permissions are granted by the temporary
|
|
1285
|
+
# credentials.
|
|
1286
|
+
# @return [String]
|
|
1287
|
+
#
|
|
1288
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/sts-2011-06-15/GetDelegatedAccessTokenResponse AWS API Documentation
|
|
1289
|
+
#
|
|
1290
|
+
class GetDelegatedAccessTokenResponse < Struct.new(
|
|
1291
|
+
:credentials,
|
|
1292
|
+
:packed_policy_size,
|
|
1293
|
+
:assumed_principal)
|
|
1294
|
+
SENSITIVE = []
|
|
1295
|
+
include Aws::Structure
|
|
1296
|
+
end
|
|
1297
|
+
|
|
1086
1298
|
# @!attribute [rw] name
|
|
1087
1299
|
# The name of the federated user. The name is used as an identifier
|
|
1088
1300
|
# for the temporary security credentials (such as `Bob`). For example,
|
|
@@ -1200,11 +1412,10 @@ module Aws::STS
|
|
|
1200
1412
|
# The duration, in seconds, that the session should last. Acceptable
|
|
1201
1413
|
# durations for federation sessions range from 900 seconds (15
|
|
1202
1414
|
# minutes) to 129,600 seconds (36 hours), with 43,200 seconds (12
|
|
1203
|
-
# hours) as the default. Sessions obtained using
|
|
1204
|
-
#
|
|
1205
|
-
#
|
|
1206
|
-
#
|
|
1207
|
-
# to one hour.
|
|
1415
|
+
# hours) as the default. Sessions obtained using root user credentials
|
|
1416
|
+
# are restricted to a maximum of 3,600 seconds (one hour). If the
|
|
1417
|
+
# specified duration is longer than one hour, the session obtained by
|
|
1418
|
+
# using root user credentials defaults to one hour.
|
|
1208
1419
|
# @return [Integer]
|
|
1209
1420
|
#
|
|
1210
1421
|
# @!attribute [rw] tags
|
|
@@ -1367,6 +1578,73 @@ module Aws::STS
|
|
|
1367
1578
|
include Aws::Structure
|
|
1368
1579
|
end
|
|
1369
1580
|
|
|
1581
|
+
# @!attribute [rw] audience
|
|
1582
|
+
# The intended recipient of the web identity token. This value
|
|
1583
|
+
# populates the `aud` claim in the JWT and should identify the service
|
|
1584
|
+
# or application that will validate and use the token. The external
|
|
1585
|
+
# service should verify this claim to ensure the token was intended
|
|
1586
|
+
# for their use.
|
|
1587
|
+
# @return [Array<String>]
|
|
1588
|
+
#
|
|
1589
|
+
# @!attribute [rw] duration_seconds
|
|
1590
|
+
# The duration, in seconds, for which the JSON Web Token (JWT) will
|
|
1591
|
+
# remain valid. The value can range from 60 seconds (1 minute) to 3600
|
|
1592
|
+
# seconds (1 hour). If not specified, the default duration is 300
|
|
1593
|
+
# seconds (5 minutes). The token is designed to be short-lived and
|
|
1594
|
+
# should be used for proof of identity, then exchanged for credentials
|
|
1595
|
+
# or short-lived tokens in the external service.
|
|
1596
|
+
# @return [Integer]
|
|
1597
|
+
#
|
|
1598
|
+
# @!attribute [rw] signing_algorithm
|
|
1599
|
+
# The cryptographic algorithm to use for signing the JSON Web Token
|
|
1600
|
+
# (JWT). Valid values are RS256 (RSA with SHA-256) and ES384 (ECDSA
|
|
1601
|
+
# using P-384 curve with SHA-384).
|
|
1602
|
+
# @return [String]
|
|
1603
|
+
#
|
|
1604
|
+
# @!attribute [rw] tags
|
|
1605
|
+
# An optional list of tags to include in the JSON Web Token (JWT).
|
|
1606
|
+
# These tags are added as custom claims to the JWT and can be used by
|
|
1607
|
+
# the downstream service for authorization decisions.
|
|
1608
|
+
# @return [Array<Types::Tag>]
|
|
1609
|
+
#
|
|
1610
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/sts-2011-06-15/GetWebIdentityTokenRequest AWS API Documentation
|
|
1611
|
+
#
|
|
1612
|
+
class GetWebIdentityTokenRequest < Struct.new(
|
|
1613
|
+
:audience,
|
|
1614
|
+
:duration_seconds,
|
|
1615
|
+
:signing_algorithm,
|
|
1616
|
+
:tags)
|
|
1617
|
+
SENSITIVE = []
|
|
1618
|
+
include Aws::Structure
|
|
1619
|
+
end
|
|
1620
|
+
|
|
1621
|
+
# @!attribute [rw] web_identity_token
|
|
1622
|
+
# A signed JSON Web Token (JWT) that represents the caller's Amazon
|
|
1623
|
+
# Web Services identity. The token contains standard JWT claims such
|
|
1624
|
+
# as subject, audience, expiration time, and additional identity
|
|
1625
|
+
# attributes added by STS as custom claims. You can also add your own
|
|
1626
|
+
# custom claims to the token by passing tags as request parameters to
|
|
1627
|
+
# the `GetWebIdentityToken` API. The token is signed using the
|
|
1628
|
+
# specified signing algorithm and can be verified using the
|
|
1629
|
+
# verification keys available at the issuer's JWKS endpoint.
|
|
1630
|
+
# @return [String]
|
|
1631
|
+
#
|
|
1632
|
+
# @!attribute [rw] expiration
|
|
1633
|
+
# The date and time when the web identity token expires, in UTC. The
|
|
1634
|
+
# expiration is determined by adding the `DurationSeconds` value to
|
|
1635
|
+
# the time the token was issued. After this time, the token should no
|
|
1636
|
+
# longer be considered valid.
|
|
1637
|
+
# @return [Time]
|
|
1638
|
+
#
|
|
1639
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/sts-2011-06-15/GetWebIdentityTokenResponse AWS API Documentation
|
|
1640
|
+
#
|
|
1641
|
+
class GetWebIdentityTokenResponse < Struct.new(
|
|
1642
|
+
:web_identity_token,
|
|
1643
|
+
:expiration)
|
|
1644
|
+
SENSITIVE = [:web_identity_token]
|
|
1645
|
+
include Aws::Structure
|
|
1646
|
+
end
|
|
1647
|
+
|
|
1370
1648
|
# The request could not be fulfilled because the identity provider (IDP)
|
|
1371
1649
|
# that was asked to verify the incoming identity token could not be
|
|
1372
1650
|
# reached. This is often a transient error caused by network conditions.
|
|
@@ -1405,7 +1683,8 @@ module Aws::STS
|
|
|
1405
1683
|
|
|
1406
1684
|
# The error returned if the message passed to
|
|
1407
1685
|
# `DecodeAuthorizationMessage` was invalid. This can happen if the token
|
|
1408
|
-
# contains invalid characters, such as
|
|
1686
|
+
# contains invalid characters, such as line breaks, or if the message
|
|
1687
|
+
# has expired.
|
|
1409
1688
|
#
|
|
1410
1689
|
# @!attribute [rw] message
|
|
1411
1690
|
# @return [String]
|
|
@@ -1433,6 +1712,21 @@ module Aws::STS
|
|
|
1433
1712
|
include Aws::Structure
|
|
1434
1713
|
end
|
|
1435
1714
|
|
|
1715
|
+
# The requested token payload size exceeds the maximum allowed size.
|
|
1716
|
+
# Reduce the number of request tags included in the
|
|
1717
|
+
# `GetWebIdentityToken` API call to reduce the token payload size.
|
|
1718
|
+
#
|
|
1719
|
+
# @!attribute [rw] message
|
|
1720
|
+
# @return [String]
|
|
1721
|
+
#
|
|
1722
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/sts-2011-06-15/JWTPayloadSizeExceededException AWS API Documentation
|
|
1723
|
+
#
|
|
1724
|
+
class JWTPayloadSizeExceededException < Struct.new(
|
|
1725
|
+
:message)
|
|
1726
|
+
SENSITIVE = []
|
|
1727
|
+
include Aws::Structure
|
|
1728
|
+
end
|
|
1729
|
+
|
|
1436
1730
|
# The request was rejected because the policy document was malformed.
|
|
1437
1731
|
# The error message describes the specific error.
|
|
1438
1732
|
#
|
|
@@ -1447,6 +1741,21 @@ module Aws::STS
|
|
|
1447
1741
|
include Aws::Structure
|
|
1448
1742
|
end
|
|
1449
1743
|
|
|
1744
|
+
# The outbound web identity federation feature is not enabled for this
|
|
1745
|
+
# account. To use this feature, you must first enable it through the
|
|
1746
|
+
# Amazon Web Services Management Console or API.
|
|
1747
|
+
#
|
|
1748
|
+
# @!attribute [rw] message
|
|
1749
|
+
# @return [String]
|
|
1750
|
+
#
|
|
1751
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/sts-2011-06-15/OutboundWebIdentityFederationDisabledException AWS API Documentation
|
|
1752
|
+
#
|
|
1753
|
+
class OutboundWebIdentityFederationDisabledException < Struct.new(
|
|
1754
|
+
:message)
|
|
1755
|
+
SENSITIVE = []
|
|
1756
|
+
include Aws::Structure
|
|
1757
|
+
end
|
|
1758
|
+
|
|
1450
1759
|
# The request was rejected because the total packed size of the session
|
|
1451
1760
|
# policies and session tags combined was too large. An Amazon Web
|
|
1452
1761
|
# Services conversion compresses the session policy document, session
|
|
@@ -1498,15 +1807,39 @@ module Aws::STS
|
|
|
1498
1807
|
include Aws::Structure
|
|
1499
1808
|
end
|
|
1500
1809
|
|
|
1810
|
+
# Contains information about the provided context. This includes the
|
|
1811
|
+
# signed and encrypted trusted context assertion and the context
|
|
1812
|
+
# provider ARN from which the trusted context assertion was generated.
|
|
1813
|
+
#
|
|
1814
|
+
# @!attribute [rw] provider_arn
|
|
1815
|
+
# The context provider ARN from which the trusted context assertion
|
|
1816
|
+
# was generated.
|
|
1817
|
+
# @return [String]
|
|
1818
|
+
#
|
|
1819
|
+
# @!attribute [rw] context_assertion
|
|
1820
|
+
# The signed and encrypted trusted context assertion generated by the
|
|
1821
|
+
# context provider. The trusted context assertion is signed and
|
|
1822
|
+
# encrypted by Amazon Web Services STS.
|
|
1823
|
+
# @return [String]
|
|
1824
|
+
#
|
|
1825
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/sts-2011-06-15/ProvidedContext AWS API Documentation
|
|
1826
|
+
#
|
|
1827
|
+
class ProvidedContext < Struct.new(
|
|
1828
|
+
:provider_arn,
|
|
1829
|
+
:context_assertion)
|
|
1830
|
+
SENSITIVE = []
|
|
1831
|
+
include Aws::Structure
|
|
1832
|
+
end
|
|
1833
|
+
|
|
1501
1834
|
# STS is not activated in the requested region for the account that is
|
|
1502
1835
|
# being asked to generate credentials. The account administrator must
|
|
1503
1836
|
# use the IAM console to activate STS in that region. For more
|
|
1504
|
-
# information, see [Activating and Deactivating Amazon Web
|
|
1505
|
-
#
|
|
1837
|
+
# information, see [Activating and Deactivating STS in an Amazon Web
|
|
1838
|
+
# Services Region][1] in the *IAM User Guide*.
|
|
1506
1839
|
#
|
|
1507
1840
|
#
|
|
1508
1841
|
#
|
|
1509
|
-
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html
|
|
1842
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html#sts-regions-activate-deactivate
|
|
1510
1843
|
#
|
|
1511
1844
|
# @!attribute [rw] message
|
|
1512
1845
|
# @return [String]
|
|
@@ -1519,6 +1852,22 @@ module Aws::STS
|
|
|
1519
1852
|
include Aws::Structure
|
|
1520
1853
|
end
|
|
1521
1854
|
|
|
1855
|
+
# The requested token duration would extend the session beyond its
|
|
1856
|
+
# original expiration time. You cannot use this operation to extend the
|
|
1857
|
+
# lifetime of a session beyond what was granted when the session was
|
|
1858
|
+
# originally created.
|
|
1859
|
+
#
|
|
1860
|
+
# @!attribute [rw] message
|
|
1861
|
+
# @return [String]
|
|
1862
|
+
#
|
|
1863
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/sts-2011-06-15/SessionDurationEscalationException AWS API Documentation
|
|
1864
|
+
#
|
|
1865
|
+
class SessionDurationEscalationException < Struct.new(
|
|
1866
|
+
:message)
|
|
1867
|
+
SENSITIVE = []
|
|
1868
|
+
include Aws::Structure
|
|
1869
|
+
end
|
|
1870
|
+
|
|
1522
1871
|
# You can pass custom key-value pair attributes when you assume a role
|
|
1523
1872
|
# or federate a user. These are called session tags. You can then use
|
|
1524
1873
|
# the session tags to control access to resources. For more information,
|
|
@@ -1564,3 +1913,4 @@ module Aws::STS
|
|
|
1564
1913
|
|
|
1565
1914
|
end
|
|
1566
1915
|
end
|
|
1916
|
+
|