aws-sdk-core 3.171.1 → 3.199.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +363 -0
- data/VERSION +1 -1
- data/lib/aws-defaults/default_configuration.rb +4 -4
- data/lib/aws-sdk-core/binary/decode_handler.rb +3 -9
- data/lib/aws-sdk-core/binary/encode_handler.rb +1 -1
- data/lib/aws-sdk-core/binary/event_builder.rb +34 -37
- data/lib/aws-sdk-core/binary/event_stream_decoder.rb +1 -0
- data/lib/aws-sdk-core/binary/event_stream_encoder.rb +4 -3
- data/lib/aws-sdk-core/cbor/cbor_engine.rb +19 -0
- data/lib/aws-sdk-core/cbor/decoder.rb +310 -0
- data/lib/aws-sdk-core/cbor/encoder.rb +243 -0
- data/lib/aws-sdk-core/cbor.rb +106 -0
- data/lib/aws-sdk-core/client_stubs.rb +18 -14
- data/lib/aws-sdk-core/credential_provider.rb +4 -1
- data/lib/aws-sdk-core/ec2_metadata.rb +1 -1
- data/lib/aws-sdk-core/ecs_credentials.rb +78 -11
- data/lib/aws-sdk-core/endpoints/matchers.rb +18 -10
- data/lib/aws-sdk-core/endpoints.rb +6 -2
- data/lib/aws-sdk-core/error_handler.rb +41 -0
- data/lib/aws-sdk-core/errors.rb +3 -3
- data/lib/aws-sdk-core/event_emitter.rb +0 -16
- data/lib/aws-sdk-core/ini_parser.rb +7 -0
- data/lib/aws-sdk-core/instance_profile_credentials.rb +55 -32
- data/lib/aws-sdk-core/json/builder.rb +8 -1
- data/lib/aws-sdk-core/json/error_handler.rb +15 -10
- data/lib/aws-sdk-core/json/handler.rb +12 -6
- data/lib/aws-sdk-core/json/json_engine.rb +3 -1
- data/lib/aws-sdk-core/json/oj_engine.rb +7 -1
- data/lib/aws-sdk-core/json/parser.rb +33 -3
- data/lib/aws-sdk-core/json.rb +43 -14
- data/lib/aws-sdk-core/log/formatter.rb +6 -0
- data/lib/aws-sdk-core/lru_cache.rb +75 -0
- data/lib/aws-sdk-core/pageable_response.rb +3 -1
- data/lib/aws-sdk-core/param_validator.rb +9 -4
- data/lib/aws-sdk-core/plugins/checksum_algorithm.rb +5 -3
- data/lib/aws-sdk-core/plugins/client_metrics_plugin.rb +1 -0
- data/lib/aws-sdk-core/plugins/client_metrics_send_plugin.rb +14 -2
- data/lib/aws-sdk-core/plugins/credentials_configuration.rb +2 -0
- data/lib/aws-sdk-core/plugins/global_configuration.rb +8 -9
- data/lib/aws-sdk-core/plugins/http_checksum.rb +2 -1
- data/lib/aws-sdk-core/plugins/invocation_id.rb +1 -11
- data/lib/aws-sdk-core/plugins/logging.rb +2 -0
- data/lib/aws-sdk-core/plugins/protocols/api_gateway.rb +3 -1
- data/lib/aws-sdk-core/plugins/protocols/ec2.rb +2 -24
- data/lib/aws-sdk-core/plugins/protocols/json_rpc.rb +6 -8
- data/lib/aws-sdk-core/plugins/protocols/query.rb +4 -2
- data/lib/aws-sdk-core/plugins/protocols/rest_json.rb +3 -15
- data/lib/aws-sdk-core/plugins/protocols/rest_xml.rb +3 -0
- data/lib/aws-sdk-core/plugins/protocols/rpc_v2.rb +17 -0
- data/lib/aws-sdk-core/plugins/regional_endpoint.rb +109 -33
- data/lib/aws-sdk-core/plugins/request_compression.rb +226 -0
- data/lib/aws-sdk-core/plugins/retry_errors.rb +12 -3
- data/lib/aws-sdk-core/plugins/sign.rb +24 -13
- data/lib/aws-sdk-core/plugins/stub_responses.rb +1 -0
- data/lib/aws-sdk-core/plugins/user_agent.rb +152 -14
- data/lib/aws-sdk-core/process_credentials.rb +45 -27
- data/lib/aws-sdk-core/query/ec2_handler.rb +27 -0
- data/lib/aws-sdk-core/query/ec2_param_builder.rb +5 -7
- data/lib/aws-sdk-core/query/handler.rb +4 -4
- data/lib/aws-sdk-core/query/param_builder.rb +2 -2
- data/lib/aws-sdk-core/query.rb +2 -1
- data/lib/aws-sdk-core/refreshing_credentials.rb +12 -12
- data/lib/aws-sdk-core/rest/content_type_handler.rb +60 -0
- data/lib/aws-sdk-core/rest/handler.rb +3 -4
- data/lib/aws-sdk-core/rest/request/body.rb +32 -5
- data/lib/aws-sdk-core/rest/request/endpoint.rb +24 -4
- data/lib/aws-sdk-core/rest/request/headers.rb +15 -7
- data/lib/aws-sdk-core/rest/request/querystring_builder.rb +62 -36
- data/lib/aws-sdk-core/rest/response/body.rb +15 -1
- data/lib/aws-sdk-core/rest/response/header_list_parser.rb +79 -0
- data/lib/aws-sdk-core/rest/response/headers.rb +8 -3
- data/lib/aws-sdk-core/rest.rb +1 -0
- data/lib/aws-sdk-core/rpc_v2/builder.rb +62 -0
- data/lib/aws-sdk-core/rpc_v2/content_type_handler.rb +45 -0
- data/lib/aws-sdk-core/rpc_v2/error_handler.rb +84 -0
- data/lib/aws-sdk-core/rpc_v2/handler.rb +74 -0
- data/lib/aws-sdk-core/rpc_v2/parser.rb +90 -0
- data/lib/aws-sdk-core/rpc_v2.rb +6 -0
- data/lib/aws-sdk-core/shared_config.rb +48 -18
- data/lib/aws-sdk-core/sso_credentials.rb +1 -1
- data/lib/aws-sdk-core/stubbing/protocols/rpc_v2.rb +41 -0
- data/lib/aws-sdk-core/stubbing/stub_data.rb +11 -0
- data/lib/aws-sdk-core/util.rb +39 -0
- data/lib/aws-sdk-core/waiters/poller.rb +4 -2
- data/lib/aws-sdk-core/xml/builder.rb +17 -9
- data/lib/aws-sdk-core/xml/error_handler.rb +32 -42
- data/lib/aws-sdk-core/xml/parser/frame.rb +4 -20
- data/lib/aws-sdk-core/xml/parser/stack.rb +2 -0
- data/lib/aws-sdk-core/xml/parser.rb +2 -6
- data/lib/aws-sdk-core.rb +7 -2
- data/lib/aws-sdk-sso/client.rb +94 -46
- data/lib/aws-sdk-sso/endpoint_provider.rb +30 -24
- data/lib/aws-sdk-sso/endpoints.rb +1 -0
- data/lib/aws-sdk-sso/plugins/endpoints.rb +4 -2
- data/lib/aws-sdk-sso.rb +1 -1
- data/lib/aws-sdk-ssooidc/client.rb +479 -74
- data/lib/aws-sdk-ssooidc/client_api.rb +78 -1
- data/lib/aws-sdk-ssooidc/endpoint_provider.rb +30 -24
- data/lib/aws-sdk-ssooidc/endpoints.rb +15 -0
- data/lib/aws-sdk-ssooidc/errors.rb +52 -0
- data/lib/aws-sdk-ssooidc/plugins/endpoints.rb +6 -2
- data/lib/aws-sdk-ssooidc/types.rb +372 -51
- data/lib/aws-sdk-ssooidc.rb +1 -1
- data/lib/aws-sdk-sts/client.rb +219 -157
- data/lib/aws-sdk-sts/client_api.rb +20 -9
- data/lib/aws-sdk-sts/endpoint_provider.rb +81 -78
- data/lib/aws-sdk-sts/endpoints.rb +1 -0
- data/lib/aws-sdk-sts/plugins/endpoints.rb +4 -2
- data/lib/aws-sdk-sts/presigner.rb +1 -1
- data/lib/aws-sdk-sts/types.rb +49 -11
- data/lib/aws-sdk-sts.rb +1 -1
- data/lib/seahorse/client/async_base.rb +1 -1
- data/lib/seahorse/client/async_response.rb +19 -0
- data/lib/seahorse/client/base.rb +18 -7
- data/lib/seahorse/client/configuration.rb +0 -4
- data/lib/seahorse/client/h2/handler.rb +1 -0
- data/lib/seahorse/client/handler.rb +1 -1
- data/lib/seahorse/client/net_http/connection_pool.rb +3 -9
- data/lib/seahorse/client/net_http/patches.rb +1 -4
- data/lib/seahorse/client/plugin.rb +9 -0
- data/lib/seahorse/client/plugins/endpoint.rb +0 -1
- data/lib/seahorse/client/plugins/h2.rb +3 -3
- data/lib/seahorse/client/plugins/net_http.rb +48 -16
- data/lib/seahorse/client/plugins/request_callback.rb +31 -0
- data/lib/seahorse/client/response.rb +6 -0
- data/lib/seahorse/model/operation.rb +3 -0
- data/lib/seahorse/model/shapes.rb +2 -2
- data/sig/aws-sdk-core/client_stubs.rbs +10 -0
- data/sig/aws-sdk-core/errors.rbs +22 -0
- data/sig/aws-sdk-core/resources/collection.rbs +21 -0
- data/sig/aws-sdk-core/structure.rbs +4 -0
- data/sig/aws-sdk-core/waiters/errors.rbs +20 -0
- data/sig/aws-sdk-core.rbs +7 -0
- data/sig/seahorse/client/base.rbs +25 -0
- data/sig/seahorse/client/handler_builder.rbs +16 -0
- data/sig/seahorse/client/response.rbs +61 -0
- metadata +44 -17
- /data/lib/aws-sdk-core/xml/parser/{engines/libxml.rb → libxml_engine.rb} +0 -0
- /data/lib/aws-sdk-core/xml/parser/{engines/nokogiri.rb → nokogiri_engine.rb} +0 -0
- /data/lib/aws-sdk-core/xml/parser/{engines/oga.rb → oga_engine.rb} +0 -0
- /data/lib/aws-sdk-core/xml/parser/{engines/ox.rb → ox_engine.rb} +0 -0
- /data/lib/aws-sdk-core/xml/parser/{engines/rexml.rb → rexml_engine.rb} +0 -0
data/lib/aws-sdk-sts/client.rb
CHANGED
|
@@ -22,12 +22,14 @@ require 'aws-sdk-core/plugins/endpoint_pattern.rb'
|
|
|
22
22
|
require 'aws-sdk-core/plugins/response_paging.rb'
|
|
23
23
|
require 'aws-sdk-core/plugins/stub_responses.rb'
|
|
24
24
|
require 'aws-sdk-core/plugins/idempotency_token.rb'
|
|
25
|
+
require 'aws-sdk-core/plugins/invocation_id.rb'
|
|
25
26
|
require 'aws-sdk-core/plugins/jsonvalue_converter.rb'
|
|
26
27
|
require 'aws-sdk-core/plugins/client_metrics_plugin.rb'
|
|
27
28
|
require 'aws-sdk-core/plugins/client_metrics_send_plugin.rb'
|
|
28
29
|
require 'aws-sdk-core/plugins/transfer_encoding.rb'
|
|
29
30
|
require 'aws-sdk-core/plugins/http_checksum.rb'
|
|
30
31
|
require 'aws-sdk-core/plugins/checksum_algorithm.rb'
|
|
32
|
+
require 'aws-sdk-core/plugins/request_compression.rb'
|
|
31
33
|
require 'aws-sdk-core/plugins/defaults_mode.rb'
|
|
32
34
|
require 'aws-sdk-core/plugins/recursion_detection.rb'
|
|
33
35
|
require 'aws-sdk-core/plugins/sign.rb'
|
|
@@ -72,12 +74,14 @@ module Aws::STS
|
|
|
72
74
|
add_plugin(Aws::Plugins::ResponsePaging)
|
|
73
75
|
add_plugin(Aws::Plugins::StubResponses)
|
|
74
76
|
add_plugin(Aws::Plugins::IdempotencyToken)
|
|
77
|
+
add_plugin(Aws::Plugins::InvocationId)
|
|
75
78
|
add_plugin(Aws::Plugins::JsonvalueConverter)
|
|
76
79
|
add_plugin(Aws::Plugins::ClientMetricsPlugin)
|
|
77
80
|
add_plugin(Aws::Plugins::ClientMetricsSendPlugin)
|
|
78
81
|
add_plugin(Aws::Plugins::TransferEncoding)
|
|
79
82
|
add_plugin(Aws::Plugins::HttpChecksum)
|
|
80
83
|
add_plugin(Aws::Plugins::ChecksumAlgorithm)
|
|
84
|
+
add_plugin(Aws::Plugins::RequestCompression)
|
|
81
85
|
add_plugin(Aws::Plugins::DefaultsMode)
|
|
82
86
|
add_plugin(Aws::Plugins::RecursionDetection)
|
|
83
87
|
add_plugin(Aws::Plugins::Sign)
|
|
@@ -87,6 +91,11 @@ module Aws::STS
|
|
|
87
91
|
|
|
88
92
|
# @overload initialize(options)
|
|
89
93
|
# @param [Hash] options
|
|
94
|
+
#
|
|
95
|
+
# @option options [Array<Seahorse::Client::Plugin>] :plugins ([]])
|
|
96
|
+
# A list of plugins to apply to the client. Each plugin is either a
|
|
97
|
+
# class name or an instance of a plugin class.
|
|
98
|
+
#
|
|
90
99
|
# @option options [required, Aws::CredentialProvider] :credentials
|
|
91
100
|
# Your AWS credentials. This can be an instance of any one of the
|
|
92
101
|
# following classes:
|
|
@@ -192,10 +201,20 @@ module Aws::STS
|
|
|
192
201
|
# Set to true to disable SDK automatically adding host prefix
|
|
193
202
|
# to default service endpoint when available.
|
|
194
203
|
#
|
|
195
|
-
# @option options [
|
|
196
|
-
#
|
|
197
|
-
#
|
|
198
|
-
#
|
|
204
|
+
# @option options [Boolean] :disable_request_compression (false)
|
|
205
|
+
# When set to 'true' the request body will not be compressed
|
|
206
|
+
# for supported operations.
|
|
207
|
+
#
|
|
208
|
+
# @option options [String, URI::HTTPS, URI::HTTP] :endpoint
|
|
209
|
+
# Normally you should not configure the `:endpoint` option
|
|
210
|
+
# directly. This is normally constructed from the `:region`
|
|
211
|
+
# option. Configuring `:endpoint` is normally reserved for
|
|
212
|
+
# connecting to test or custom endpoints. The endpoint should
|
|
213
|
+
# be a URI formatted like:
|
|
214
|
+
#
|
|
215
|
+
# 'http://example.com'
|
|
216
|
+
# 'https://example.com'
|
|
217
|
+
# 'http://example.com:123'
|
|
199
218
|
#
|
|
200
219
|
# @option options [Integer] :endpoint_cache_max_entries (1000)
|
|
201
220
|
# Used for the maximum size limit of the LRU cache storing endpoints data
|
|
@@ -212,6 +231,10 @@ module Aws::STS
|
|
|
212
231
|
# @option options [Boolean] :endpoint_discovery (false)
|
|
213
232
|
# When set to `true`, endpoint discovery will be enabled for operations when available.
|
|
214
233
|
#
|
|
234
|
+
# @option options [Boolean] :ignore_configured_endpoint_urls
|
|
235
|
+
# Setting to true disables use of endpoint URLs provided via environment
|
|
236
|
+
# variables and the shared configuration file.
|
|
237
|
+
#
|
|
215
238
|
# @option options [Aws::Log::Formatter] :log_formatter (Aws::Log::Formatter.default)
|
|
216
239
|
# The log formatter.
|
|
217
240
|
#
|
|
@@ -232,6 +255,11 @@ module Aws::STS
|
|
|
232
255
|
# Used when loading credentials from the shared credentials file
|
|
233
256
|
# at HOME/.aws/credentials. When not specified, 'default' is used.
|
|
234
257
|
#
|
|
258
|
+
# @option options [Integer] :request_min_compression_size_bytes (10240)
|
|
259
|
+
# The minimum size in bytes that triggers compression for request
|
|
260
|
+
# bodies. The value must be non-negative integer value between 0
|
|
261
|
+
# and 10485780 bytes inclusive.
|
|
262
|
+
#
|
|
235
263
|
# @option options [Proc] :retry_backoff
|
|
236
264
|
# A proc or lambda used for backoff. Defaults to 2**retries * retry_base_delay.
|
|
237
265
|
# This option is only used in the `legacy` retry mode.
|
|
@@ -276,6 +304,11 @@ module Aws::STS
|
|
|
276
304
|
# throttling. This is a provisional mode that may change behavior
|
|
277
305
|
# in the future.
|
|
278
306
|
#
|
|
307
|
+
# @option options [String] :sdk_ua_app_id
|
|
308
|
+
# A unique and opaque application ID that is appended to the
|
|
309
|
+
# User-Agent header as app/sdk_ua_app_id. It should have a
|
|
310
|
+
# maximum length of 50. This variable is sourced from environment
|
|
311
|
+
# variable AWS_SDK_UA_APP_ID or the shared config profile attribute sdk_ua_app_id.
|
|
279
312
|
#
|
|
280
313
|
# @option options [String] :secret_access_key
|
|
281
314
|
#
|
|
@@ -324,50 +357,65 @@ module Aws::STS
|
|
|
324
357
|
# @option options [Aws::STS::EndpointProvider] :endpoint_provider
|
|
325
358
|
# The endpoint provider used to resolve endpoints. Any object that responds to `#resolve_endpoint(parameters)` where `parameters` is a Struct similar to `Aws::STS::EndpointParameters`
|
|
326
359
|
#
|
|
327
|
-
# @option options [
|
|
328
|
-
#
|
|
329
|
-
#
|
|
330
|
-
#
|
|
331
|
-
#
|
|
332
|
-
#
|
|
333
|
-
#
|
|
334
|
-
#
|
|
335
|
-
#
|
|
336
|
-
#
|
|
337
|
-
#
|
|
338
|
-
# @option options [Float] :
|
|
339
|
-
#
|
|
340
|
-
#
|
|
341
|
-
#
|
|
342
|
-
#
|
|
343
|
-
#
|
|
344
|
-
#
|
|
345
|
-
#
|
|
346
|
-
#
|
|
347
|
-
#
|
|
348
|
-
#
|
|
349
|
-
#
|
|
350
|
-
#
|
|
351
|
-
#
|
|
352
|
-
#
|
|
353
|
-
#
|
|
354
|
-
#
|
|
360
|
+
# @option options [Float] :http_continue_timeout (1)
|
|
361
|
+
# The number of seconds to wait for a 100-continue response before sending the
|
|
362
|
+
# request body. This option has no effect unless the request has "Expect"
|
|
363
|
+
# header set to "100-continue". Defaults to `nil` which disables this
|
|
364
|
+
# behaviour. This value can safely be set per request on the session.
|
|
365
|
+
#
|
|
366
|
+
# @option options [Float] :http_idle_timeout (5)
|
|
367
|
+
# The number of seconds a connection is allowed to sit idle before it
|
|
368
|
+
# is considered stale. Stale connections are closed and removed from the
|
|
369
|
+
# pool before making a request.
|
|
370
|
+
#
|
|
371
|
+
# @option options [Float] :http_open_timeout (15)
|
|
372
|
+
# The default number of seconds to wait for response data.
|
|
373
|
+
# This value can safely be set per-request on the session.
|
|
374
|
+
#
|
|
375
|
+
# @option options [URI::HTTP,String] :http_proxy
|
|
376
|
+
# A proxy to send requests through. Formatted like 'http://proxy.com:123'.
|
|
377
|
+
#
|
|
378
|
+
# @option options [Float] :http_read_timeout (60)
|
|
379
|
+
# The default number of seconds to wait for response data.
|
|
380
|
+
# This value can safely be set per-request on the session.
|
|
381
|
+
#
|
|
382
|
+
# @option options [Boolean] :http_wire_trace (false)
|
|
383
|
+
# When `true`, HTTP debug output will be sent to the `:logger`.
|
|
384
|
+
#
|
|
385
|
+
# @option options [Proc] :on_chunk_received
|
|
386
|
+
# When a Proc object is provided, it will be used as callback when each chunk
|
|
387
|
+
# of the response body is received. It provides three arguments: the chunk,
|
|
388
|
+
# the number of bytes received, and the total number of
|
|
389
|
+
# bytes in the response (or nil if the server did not send a `content-length`).
|
|
390
|
+
#
|
|
391
|
+
# @option options [Proc] :on_chunk_sent
|
|
392
|
+
# When a Proc object is provided, it will be used as callback when each chunk
|
|
393
|
+
# of the request body is sent. It provides three arguments: the chunk,
|
|
394
|
+
# the number of bytes read from the body, and the total number of
|
|
395
|
+
# bytes in the body.
|
|
396
|
+
#
|
|
397
|
+
# @option options [Boolean] :raise_response_errors (true)
|
|
398
|
+
# When `true`, response errors are raised.
|
|
399
|
+
#
|
|
400
|
+
# @option options [String] :ssl_ca_bundle
|
|
401
|
+
# Full path to the SSL certificate authority bundle file that should be used when
|
|
402
|
+
# verifying peer certificates. If you do not pass `:ssl_ca_bundle` or
|
|
403
|
+
# `:ssl_ca_directory` the the system default will be used if available.
|
|
404
|
+
#
|
|
405
|
+
# @option options [String] :ssl_ca_directory
|
|
406
|
+
# Full path of the directory that contains the unbundled SSL certificate
|
|
407
|
+
# authority files for verifying peer certificates. If you do
|
|
408
|
+
# not pass `:ssl_ca_bundle` or `:ssl_ca_directory` the the system
|
|
409
|
+
# default will be used if available.
|
|
355
410
|
#
|
|
356
|
-
# @option options [
|
|
357
|
-
#
|
|
358
|
-
# connection.
|
|
411
|
+
# @option options [String] :ssl_ca_store
|
|
412
|
+
# Sets the X509::Store to verify peer certificate.
|
|
359
413
|
#
|
|
360
|
-
# @option options [
|
|
361
|
-
#
|
|
362
|
-
# verifying peer certificates. If you do not pass
|
|
363
|
-
# `:ssl_ca_bundle` or `:ssl_ca_directory` the the system default
|
|
364
|
-
# will be used if available.
|
|
414
|
+
# @option options [Float] :ssl_timeout
|
|
415
|
+
# Sets the SSL timeout in seconds
|
|
365
416
|
#
|
|
366
|
-
# @option options [
|
|
367
|
-
#
|
|
368
|
-
# authority files for verifying peer certificates. If you do
|
|
369
|
-
# not pass `:ssl_ca_bundle` or `:ssl_ca_directory` the the
|
|
370
|
-
# system default will be used if available.
|
|
417
|
+
# @option options [Boolean] :ssl_verify_peer (true)
|
|
418
|
+
# When `true`, SSL peer certificates are verified when establishing a connection.
|
|
371
419
|
#
|
|
372
420
|
def initialize(*args)
|
|
373
421
|
super
|
|
@@ -406,10 +454,11 @@ module Aws::STS
|
|
|
406
454
|
# identity-based policy of the role that is being assumed. For more
|
|
407
455
|
# information, see [Session Policies][3] in the *IAM User Guide*.
|
|
408
456
|
#
|
|
409
|
-
# When you create a role, you create two policies:
|
|
410
|
-
# that specifies *who* can assume the role and a permissions policy
|
|
411
|
-
# specifies *what* can be done with the role. You specify the
|
|
412
|
-
# principal
|
|
457
|
+
# When you create a role, you create two policies: a role trust policy
|
|
458
|
+
# that specifies *who* can assume the role, and a permissions policy
|
|
459
|
+
# that specifies *what* can be done with the role. You specify the
|
|
460
|
+
# trusted principal that is allowed to assume the role in the role trust
|
|
461
|
+
# policy.
|
|
413
462
|
#
|
|
414
463
|
# To assume a role from a different account, your Amazon Web Services
|
|
415
464
|
# account must be trusted by the role. The trust relationship is defined
|
|
@@ -418,10 +467,9 @@ module Aws::STS
|
|
|
418
467
|
# users in the account.
|
|
419
468
|
#
|
|
420
469
|
# A user who wants to access a role in a different account must also
|
|
421
|
-
# have permissions that are delegated from the
|
|
422
|
-
#
|
|
423
|
-
#
|
|
424
|
-
# account.
|
|
470
|
+
# have permissions that are delegated from the account administrator.
|
|
471
|
+
# The administrator must attach a policy that allows the user to call
|
|
472
|
+
# `AssumeRole` for the ARN of the role in the other account.
|
|
425
473
|
#
|
|
426
474
|
# To allow a user to assume a role in the same account, you can do
|
|
427
475
|
# either of the following:
|
|
@@ -746,6 +794,17 @@ module Aws::STS
|
|
|
746
794
|
#
|
|
747
795
|
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_monitor.html
|
|
748
796
|
#
|
|
797
|
+
# @option params [Array<Types::ProvidedContext>] :provided_contexts
|
|
798
|
+
# A list of previously acquired trusted context assertions in the format
|
|
799
|
+
# of a JSON array. The trusted context assertion is signed and encrypted
|
|
800
|
+
# by Amazon Web Services STS.
|
|
801
|
+
#
|
|
802
|
+
# The following is an example of a `ProvidedContext` value that includes
|
|
803
|
+
# a single trusted context assertion and the ARN of the context provider
|
|
804
|
+
# from which the trusted context assertion was generated.
|
|
805
|
+
#
|
|
806
|
+
# `[\{"ProviderArn":"arn:aws:iam::aws:contextProvider/IdentityCenter","ContextAssertion":"trusted-context-assertion"\}]`
|
|
807
|
+
#
|
|
749
808
|
# @return [Types::AssumeRoleResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
|
750
809
|
#
|
|
751
810
|
# * {Types::AssumeRoleResponse#credentials #credentials} => Types::Credentials
|
|
@@ -806,7 +865,7 @@ module Aws::STS
|
|
|
806
865
|
# arn: "arnType",
|
|
807
866
|
# },
|
|
808
867
|
# ],
|
|
809
|
-
# policy: "
|
|
868
|
+
# policy: "unrestrictedSessionPolicyDocumentType",
|
|
810
869
|
# duration_seconds: 1,
|
|
811
870
|
# tags: [
|
|
812
871
|
# {
|
|
@@ -819,6 +878,12 @@ module Aws::STS
|
|
|
819
878
|
# serial_number: "serialNumberType",
|
|
820
879
|
# token_code: "tokenCodeType",
|
|
821
880
|
# source_identity: "sourceIdentityType",
|
|
881
|
+
# provided_contexts: [
|
|
882
|
+
# {
|
|
883
|
+
# provider_arn: "arnType",
|
|
884
|
+
# context_assertion: "contextAssertionType",
|
|
885
|
+
# },
|
|
886
|
+
# ],
|
|
822
887
|
# })
|
|
823
888
|
#
|
|
824
889
|
# @example Response structure
|
|
@@ -1206,10 +1271,8 @@ module Aws::STS
|
|
|
1206
1271
|
# the user with a consistent identity throughout the lifetime of an
|
|
1207
1272
|
# application.
|
|
1208
1273
|
#
|
|
1209
|
-
# To learn more about Amazon Cognito, see [Amazon Cognito
|
|
1210
|
-
# in *Amazon
|
|
1211
|
-
# Cognito Overview][5] in the *Amazon Web Services SDK for iOS Developer
|
|
1212
|
-
# Guide*.
|
|
1274
|
+
# To learn more about Amazon Cognito, see [Amazon Cognito identity
|
|
1275
|
+
# pools][1] in *Amazon Cognito Developer Guide*.
|
|
1213
1276
|
#
|
|
1214
1277
|
# </note>
|
|
1215
1278
|
#
|
|
@@ -1223,8 +1286,8 @@ module Aws::STS
|
|
|
1223
1286
|
# a token from the web identity provider. For a comparison of
|
|
1224
1287
|
# `AssumeRoleWithWebIdentity` with the other API operations that produce
|
|
1225
1288
|
# temporary credentials, see [Requesting Temporary Security
|
|
1226
|
-
# Credentials][
|
|
1227
|
-
# operations][
|
|
1289
|
+
# Credentials][4] and [Comparing the Amazon Web Services STS API
|
|
1290
|
+
# operations][5] in the *IAM User Guide*.
|
|
1228
1291
|
#
|
|
1229
1292
|
# The temporary security credentials returned by this API consist of an
|
|
1230
1293
|
# access key ID, a secret access key, and a security token. Applications
|
|
@@ -1240,11 +1303,11 @@ module Aws::STS
|
|
|
1240
1303
|
# to the maximum session duration setting for the role. This setting can
|
|
1241
1304
|
# have a value from 1 hour to 12 hours. To learn how to view the maximum
|
|
1242
1305
|
# value for your role, see [View the Maximum Session Duration Setting
|
|
1243
|
-
# for a Role][
|
|
1306
|
+
# for a Role][6] in the *IAM User Guide*. The maximum session duration
|
|
1244
1307
|
# limit applies when you use the `AssumeRole*` API operations or the
|
|
1245
1308
|
# `assume-role*` CLI commands. However the limit does not apply when you
|
|
1246
1309
|
# use those operations to create a console URL. For more information,
|
|
1247
|
-
# see [Using IAM Roles][
|
|
1310
|
+
# see [Using IAM Roles][7] in the *IAM User Guide*.
|
|
1248
1311
|
#
|
|
1249
1312
|
# **Permissions**
|
|
1250
1313
|
#
|
|
@@ -1253,7 +1316,7 @@ module Aws::STS
|
|
|
1253
1316
|
# Amazon Web Services service with the following exception: you cannot
|
|
1254
1317
|
# call the STS `GetFederationToken` or `GetSessionToken` API operations.
|
|
1255
1318
|
#
|
|
1256
|
-
# (Optional) You can pass inline or managed [session policies][
|
|
1319
|
+
# (Optional) You can pass inline or managed [session policies][8] to
|
|
1257
1320
|
# this operation. You can pass a single JSON policy document to use as
|
|
1258
1321
|
# an inline session policy. You can also specify up to 10 managed policy
|
|
1259
1322
|
# Amazon Resource Names (ARNs) to use as managed session policies. The
|
|
@@ -1266,19 +1329,19 @@ module Aws::STS
|
|
|
1266
1329
|
# resources in the account that owns the role. You cannot use session
|
|
1267
1330
|
# policies to grant more permissions than those allowed by the
|
|
1268
1331
|
# identity-based policy of the role that is being assumed. For more
|
|
1269
|
-
# information, see [Session Policies][
|
|
1332
|
+
# information, see [Session Policies][8] in the *IAM User Guide*.
|
|
1270
1333
|
#
|
|
1271
1334
|
# **Tags**
|
|
1272
1335
|
#
|
|
1273
1336
|
# (Optional) You can configure your IdP to pass attributes into your web
|
|
1274
1337
|
# identity token as session tags. Each session tag consists of a key
|
|
1275
1338
|
# name and an associated value. For more information about session tags,
|
|
1276
|
-
# see [Passing Session Tags in STS][
|
|
1339
|
+
# see [Passing Session Tags in STS][9] in the *IAM User Guide*.
|
|
1277
1340
|
#
|
|
1278
1341
|
# You can pass up to 50 session tags. The plaintext session tag keys
|
|
1279
1342
|
# can’t exceed 128 characters and the values can’t exceed 256
|
|
1280
1343
|
# characters. For these and additional limits, see [IAM and STS
|
|
1281
|
-
# Character Limits][
|
|
1344
|
+
# Character Limits][10] in the *IAM User Guide*.
|
|
1282
1345
|
#
|
|
1283
1346
|
# <note markdown="1"> An Amazon Web Services conversion compresses the passed inline session
|
|
1284
1347
|
# policy, managed policy ARNs, and session tags into a packed binary
|
|
@@ -1296,12 +1359,12 @@ module Aws::STS
|
|
|
1296
1359
|
# An administrator must grant you the permissions necessary to pass
|
|
1297
1360
|
# session tags. The administrator can also create granular permissions
|
|
1298
1361
|
# to allow you to pass only specific session tags. For more information,
|
|
1299
|
-
# see [Tutorial: Using Tags for Attribute-Based Access Control][
|
|
1362
|
+
# see [Tutorial: Using Tags for Attribute-Based Access Control][11] in
|
|
1300
1363
|
# the *IAM User Guide*.
|
|
1301
1364
|
#
|
|
1302
1365
|
# You can set the session tags as transitive. Transitive tags persist
|
|
1303
1366
|
# during role chaining. For more information, see [Chaining Roles with
|
|
1304
|
-
# Session Tags][
|
|
1367
|
+
# Session Tags][12] in the *IAM User Guide*.
|
|
1305
1368
|
#
|
|
1306
1369
|
# **Identities**
|
|
1307
1370
|
#
|
|
@@ -1313,19 +1376,19 @@ module Aws::STS
|
|
|
1313
1376
|
# specified in the role's trust policy.
|
|
1314
1377
|
#
|
|
1315
1378
|
# Calling `AssumeRoleWithWebIdentity` can result in an entry in your
|
|
1316
|
-
# CloudTrail logs. The entry includes the [Subject][
|
|
1379
|
+
# CloudTrail logs. The entry includes the [Subject][13] of the provided
|
|
1317
1380
|
# web identity token. We recommend that you avoid using any personally
|
|
1318
1381
|
# identifiable information (PII) in this field. For example, you could
|
|
1319
1382
|
# instead use a GUID or a pairwise identifier, as [suggested in the OIDC
|
|
1320
|
-
# specification][
|
|
1383
|
+
# specification][14].
|
|
1321
1384
|
#
|
|
1322
1385
|
# For more information about how to use web identity federation and the
|
|
1323
1386
|
# `AssumeRoleWithWebIdentity` API, see the following resources:
|
|
1324
1387
|
#
|
|
1325
|
-
# * [Using Web Identity Federation API Operations for Mobile Apps][
|
|
1326
|
-
# and [Federation Through a Web-based Identity Provider][
|
|
1388
|
+
# * [Using Web Identity Federation API Operations for Mobile Apps][15]
|
|
1389
|
+
# and [Federation Through a Web-based Identity Provider][16].
|
|
1327
1390
|
#
|
|
1328
|
-
# * [ Web Identity Federation Playground][
|
|
1391
|
+
# * [ Web Identity Federation Playground][17]. Walk through the process
|
|
1329
1392
|
# of authenticating through Login with Amazon, Facebook, or Google,
|
|
1330
1393
|
# getting temporary security credentials, and then using those
|
|
1331
1394
|
# credentials to make a request to Amazon Web Services.
|
|
@@ -1336,7 +1399,7 @@ module Aws::STS
|
|
|
1336
1399
|
# toolkits then show how to use the information from these providers
|
|
1337
1400
|
# to get and use temporary security credentials.
|
|
1338
1401
|
#
|
|
1339
|
-
# * [Web Identity Federation with Mobile Applications][
|
|
1402
|
+
# * [Web Identity Federation with Mobile Applications][18]. This article
|
|
1340
1403
|
# discusses web identity federation and shows an example of how to use
|
|
1341
1404
|
# web identity federation to get access to content in Amazon S3.
|
|
1342
1405
|
#
|
|
@@ -1345,23 +1408,21 @@ module Aws::STS
|
|
|
1345
1408
|
# [1]: https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-identity.html
|
|
1346
1409
|
# [2]: http://aws.amazon.com/sdkforios/
|
|
1347
1410
|
# [3]: http://aws.amazon.com/sdkforandroid/
|
|
1348
|
-
# [4]: https://docs.aws.amazon.com/
|
|
1349
|
-
# [5]: https://docs.aws.amazon.com/
|
|
1350
|
-
# [6]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
|
1351
|
-
# [7]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
|
1352
|
-
# [8]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
|
1353
|
-
# [9]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
|
1354
|
-
# [10]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
|
1355
|
-
# [11]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
|
1356
|
-
# [12]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
|
1357
|
-
# [13]:
|
|
1358
|
-
# [14]:
|
|
1359
|
-
# [15]:
|
|
1360
|
-
# [16]:
|
|
1361
|
-
# [17]: https://
|
|
1362
|
-
# [18]:
|
|
1363
|
-
# [19]: https://aws.amazon.com/blogs/aws/the-aws-web-identity-federation-playground/
|
|
1364
|
-
# [20]: http://aws.amazon.com/articles/web-identity-federation-with-mobile-applications
|
|
1411
|
+
# [4]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html
|
|
1412
|
+
# [5]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#stsapi_comparison
|
|
1413
|
+
# [6]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html#id_roles_use_view-role-max-session
|
|
1414
|
+
# [7]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html
|
|
1415
|
+
# [8]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
|
|
1416
|
+
# [9]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html
|
|
1417
|
+
# [10]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-limits.html#reference_iam-limits-entity-length
|
|
1418
|
+
# [11]: https://docs.aws.amazon.com/IAM/latest/UserGuide/tutorial_attribute-based-access-control.html
|
|
1419
|
+
# [12]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html#id_session-tags_role-chaining
|
|
1420
|
+
# [13]: http://openid.net/specs/openid-connect-core-1_0.html#Claims
|
|
1421
|
+
# [14]: http://openid.net/specs/openid-connect-core-1_0.html#SubjectIDTypes
|
|
1422
|
+
# [15]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_oidc_manual.html
|
|
1423
|
+
# [16]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#api_assumerolewithwebidentity
|
|
1424
|
+
# [17]: https://aws.amazon.com/blogs/aws/the-aws-web-identity-federation-playground/
|
|
1425
|
+
# [18]: http://aws.amazon.com/articles/web-identity-federation-with-mobile-applications
|
|
1365
1426
|
#
|
|
1366
1427
|
# @option params [required, String] :role_arn
|
|
1367
1428
|
# The Amazon Resource Name (ARN) of the role that the caller is
|
|
@@ -1385,7 +1446,8 @@ module Aws::STS
|
|
|
1385
1446
|
# by the identity provider. Your application must get this token by
|
|
1386
1447
|
# authenticating the user who is using your application with a web
|
|
1387
1448
|
# identity provider before the application makes an
|
|
1388
|
-
# `AssumeRoleWithWebIdentity` call.
|
|
1449
|
+
# `AssumeRoleWithWebIdentity` call. Only tokens with RSA algorithms
|
|
1450
|
+
# (RS256) are supported.
|
|
1389
1451
|
#
|
|
1390
1452
|
# @option params [String] :provider_id
|
|
1391
1453
|
# The fully qualified host component of the domain name of the OAuth 2.0
|
|
@@ -1720,11 +1782,11 @@ module Aws::STS
|
|
|
1720
1782
|
# to call the operation.
|
|
1721
1783
|
#
|
|
1722
1784
|
# <note markdown="1"> No permissions are required to perform this operation. If an
|
|
1723
|
-
# administrator
|
|
1785
|
+
# administrator attaches a policy to your identity that explicitly
|
|
1724
1786
|
# denies access to the `sts:GetCallerIdentity` action, you can still
|
|
1725
1787
|
# perform this operation. Permissions are not required because the same
|
|
1726
|
-
# information is returned when
|
|
1727
|
-
#
|
|
1788
|
+
# information is returned when access is denied. To view an example
|
|
1789
|
+
# response, see [I Am Not Authorized to Perform:
|
|
1728
1790
|
# iam:DeleteVirtualMFADevice][1] in the *IAM User Guide*.
|
|
1729
1791
|
#
|
|
1730
1792
|
# </note>
|
|
@@ -1801,43 +1863,43 @@ module Aws::STS
|
|
|
1801
1863
|
end
|
|
1802
1864
|
|
|
1803
1865
|
# Returns a set of temporary security credentials (consisting of an
|
|
1804
|
-
# access key ID, a secret access key, and a security token) for a
|
|
1805
|
-
#
|
|
1806
|
-
#
|
|
1807
|
-
#
|
|
1808
|
-
#
|
|
1809
|
-
#
|
|
1810
|
-
#
|
|
1811
|
-
#
|
|
1812
|
-
#
|
|
1866
|
+
# access key ID, a secret access key, and a security token) for a user.
|
|
1867
|
+
# A typical use is in a proxy application that gets temporary security
|
|
1868
|
+
# credentials on behalf of distributed applications inside a corporate
|
|
1869
|
+
# network.
|
|
1870
|
+
#
|
|
1871
|
+
# You must call the `GetFederationToken` operation using the long-term
|
|
1872
|
+
# security credentials of an IAM user. As a result, this call is
|
|
1873
|
+
# appropriate in contexts where those credentials can be safeguarded,
|
|
1874
|
+
# usually in a server-based application. For a comparison of
|
|
1875
|
+
# `GetFederationToken` with the other API operations that produce
|
|
1876
|
+
# temporary credentials, see [Requesting Temporary Security
|
|
1813
1877
|
# Credentials][1] and [Comparing the Amazon Web Services STS API
|
|
1814
1878
|
# operations][2] in the *IAM User Guide*.
|
|
1815
1879
|
#
|
|
1880
|
+
# Although it is possible to call `GetFederationToken` using the
|
|
1881
|
+
# security credentials of an Amazon Web Services account root user
|
|
1882
|
+
# rather than an IAM user that you create for the purpose of a proxy
|
|
1883
|
+
# application, we do not recommend it. For more information, see
|
|
1884
|
+
# [Safeguard your root user credentials and don't use them for everyday
|
|
1885
|
+
# tasks][3] in the *IAM User Guide*.
|
|
1886
|
+
#
|
|
1816
1887
|
# <note markdown="1"> You can create a mobile-based or browser-based app that can
|
|
1817
1888
|
# authenticate users using a web identity provider like Login with
|
|
1818
1889
|
# Amazon, Facebook, Google, or an OpenID Connect-compatible identity
|
|
1819
|
-
# provider. In this case, we recommend that you use [Amazon Cognito][
|
|
1890
|
+
# provider. In this case, we recommend that you use [Amazon Cognito][4]
|
|
1820
1891
|
# or `AssumeRoleWithWebIdentity`. For more information, see [Federation
|
|
1821
|
-
# Through a Web-based Identity Provider][
|
|
1892
|
+
# Through a Web-based Identity Provider][5] in the *IAM User Guide*.
|
|
1822
1893
|
#
|
|
1823
1894
|
# </note>
|
|
1824
1895
|
#
|
|
1825
|
-
# You can also call `GetFederationToken` using the security credentials
|
|
1826
|
-
# of an Amazon Web Services account root user, but we do not recommend
|
|
1827
|
-
# it. Instead, we recommend that you create an IAM user for the purpose
|
|
1828
|
-
# of the proxy application. Then attach a policy to the IAM user that
|
|
1829
|
-
# limits federated users to only the actions and resources that they
|
|
1830
|
-
# need to access. For more information, see [IAM Best Practices][5] in
|
|
1831
|
-
# the *IAM User Guide*.
|
|
1832
|
-
#
|
|
1833
1896
|
# **Session duration**
|
|
1834
1897
|
#
|
|
1835
1898
|
# The temporary credentials are valid for the specified duration, from
|
|
1836
1899
|
# 900 seconds (15 minutes) up to a maximum of 129,600 seconds (36
|
|
1837
1900
|
# hours). The default session duration is 43,200 seconds (12 hours).
|
|
1838
|
-
# Temporary credentials obtained by using the
|
|
1839
|
-
#
|
|
1840
|
-
# (1 hour).
|
|
1901
|
+
# Temporary credentials obtained by using the root user credentials have
|
|
1902
|
+
# a maximum duration of 3,600 seconds (1 hour).
|
|
1841
1903
|
#
|
|
1842
1904
|
# **Permissions**
|
|
1843
1905
|
#
|
|
@@ -1887,9 +1949,9 @@ module Aws::STS
|
|
|
1887
1949
|
# <note markdown="1"> You can create a mobile-based or browser-based app that can
|
|
1888
1950
|
# authenticate users using a web identity provider like Login with
|
|
1889
1951
|
# Amazon, Facebook, Google, or an OpenID Connect-compatible identity
|
|
1890
|
-
# provider. In this case, we recommend that you use [Amazon Cognito][
|
|
1952
|
+
# provider. In this case, we recommend that you use [Amazon Cognito][4]
|
|
1891
1953
|
# or `AssumeRoleWithWebIdentity`. For more information, see [Federation
|
|
1892
|
-
# Through a Web-based Identity Provider][
|
|
1954
|
+
# Through a Web-based Identity Provider][5] in the *IAM User Guide*.
|
|
1893
1955
|
#
|
|
1894
1956
|
# </note>
|
|
1895
1957
|
#
|
|
@@ -1911,9 +1973,9 @@ module Aws::STS
|
|
|
1911
1973
|
#
|
|
1912
1974
|
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html
|
|
1913
1975
|
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#stsapi_comparison
|
|
1914
|
-
# [3]:
|
|
1915
|
-
# [4]:
|
|
1916
|
-
# [5]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
|
1976
|
+
# [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html#lock-away-credentials
|
|
1977
|
+
# [4]: http://aws.amazon.com/cognito/
|
|
1978
|
+
# [5]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#api_assumerolewithwebidentity
|
|
1917
1979
|
# [6]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
|
|
1918
1980
|
# [7]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#api_getfederationtoken
|
|
1919
1981
|
# [8]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html
|
|
@@ -2030,10 +2092,10 @@ module Aws::STS
|
|
|
2030
2092
|
# The duration, in seconds, that the session should last. Acceptable
|
|
2031
2093
|
# durations for federation sessions range from 900 seconds (15 minutes)
|
|
2032
2094
|
# to 129,600 seconds (36 hours), with 43,200 seconds (12 hours) as the
|
|
2033
|
-
# default. Sessions obtained using
|
|
2034
|
-
#
|
|
2035
|
-
#
|
|
2036
|
-
#
|
|
2095
|
+
# default. Sessions obtained using root user credentials are restricted
|
|
2096
|
+
# to a maximum of 3,600 seconds (one hour). If the specified duration is
|
|
2097
|
+
# longer than one hour, the session obtained by using root user
|
|
2098
|
+
# credentials defaults to one hour.
|
|
2037
2099
|
#
|
|
2038
2100
|
# @option params [Array<Types::Tag>] :tags
|
|
2039
2101
|
# A list of session tags. Each session tag consists of a key name and an
|
|
@@ -2153,14 +2215,15 @@ module Aws::STS
|
|
|
2153
2215
|
# secret access key, and a security token. Typically, you use
|
|
2154
2216
|
# `GetSessionToken` if you want to use MFA to protect programmatic calls
|
|
2155
2217
|
# to specific Amazon Web Services API operations like Amazon EC2
|
|
2156
|
-
# `StopInstances`.
|
|
2157
|
-
#
|
|
2158
|
-
# MFA
|
|
2159
|
-
#
|
|
2160
|
-
#
|
|
2161
|
-
#
|
|
2162
|
-
#
|
|
2163
|
-
#
|
|
2218
|
+
# `StopInstances`.
|
|
2219
|
+
#
|
|
2220
|
+
# MFA-enabled IAM users must call `GetSessionToken` and submit an MFA
|
|
2221
|
+
# code that is associated with their MFA device. Using the temporary
|
|
2222
|
+
# security credentials that the call returns, IAM users can then make
|
|
2223
|
+
# programmatic calls to API operations that require MFA authentication.
|
|
2224
|
+
# An incorrect MFA code causes the API to return an access denied error.
|
|
2225
|
+
# For a comparison of `GetSessionToken` with the other API operations
|
|
2226
|
+
# that produce temporary credentials, see [Requesting Temporary Security
|
|
2164
2227
|
# Credentials][1] and [Comparing the Amazon Web Services STS API
|
|
2165
2228
|
# operations][2] in the *IAM User Guide*.
|
|
2166
2229
|
#
|
|
@@ -2175,13 +2238,13 @@ module Aws::STS
|
|
|
2175
2238
|
# **Session Duration**
|
|
2176
2239
|
#
|
|
2177
2240
|
# The `GetSessionToken` operation must be called by using the long-term
|
|
2178
|
-
# Amazon Web Services security credentials of
|
|
2179
|
-
#
|
|
2180
|
-
#
|
|
2181
|
-
#
|
|
2182
|
-
# (
|
|
2183
|
-
#
|
|
2184
|
-
#
|
|
2241
|
+
# Amazon Web Services security credentials of an IAM user. Credentials
|
|
2242
|
+
# that are created by IAM users are valid for the duration that you
|
|
2243
|
+
# specify. This duration can range from 900 seconds (15 minutes) up to a
|
|
2244
|
+
# maximum of 129,600 seconds (36 hours), with a default of 43,200
|
|
2245
|
+
# seconds (12 hours). Credentials based on account credentials can range
|
|
2246
|
+
# from 900 seconds (15 minutes) up to 3,600 seconds (1 hour), with a
|
|
2247
|
+
# default of 1 hour.
|
|
2185
2248
|
#
|
|
2186
2249
|
# **Permissions**
|
|
2187
2250
|
#
|
|
@@ -2195,24 +2258,23 @@ module Aws::STS
|
|
|
2195
2258
|
# * You cannot call any STS API *except* `AssumeRole` or
|
|
2196
2259
|
# `GetCallerIdentity`.
|
|
2197
2260
|
#
|
|
2198
|
-
#
|
|
2199
|
-
#
|
|
2200
|
-
#
|
|
2201
|
-
#
|
|
2202
|
-
# with Amazon Web Services.
|
|
2261
|
+
# The credentials that `GetSessionToken` returns are based on
|
|
2262
|
+
# permissions associated with the IAM user whose credentials were used
|
|
2263
|
+
# to call the operation. The temporary credentials have the same
|
|
2264
|
+
# permissions as the IAM user.
|
|
2203
2265
|
#
|
|
2204
|
-
#
|
|
2266
|
+
# <note markdown="1"> Although it is possible to call `GetSessionToken` using the security
|
|
2267
|
+
# credentials of an Amazon Web Services account root user rather than an
|
|
2268
|
+
# IAM user, we do not recommend it. If `GetSessionToken` is called using
|
|
2269
|
+
# root user credentials, the temporary credentials have root user
|
|
2270
|
+
# permissions. For more information, see [Safeguard your root user
|
|
2271
|
+
# credentials and don't use them for everyday tasks][4] in the *IAM
|
|
2272
|
+
# User Guide*
|
|
2205
2273
|
#
|
|
2206
|
-
#
|
|
2207
|
-
# permissions associated with the user whose credentials were used to
|
|
2208
|
-
# call the operation. If `GetSessionToken` is called using Amazon Web
|
|
2209
|
-
# Services account root user credentials, the temporary credentials have
|
|
2210
|
-
# root user permissions. Similarly, if `GetSessionToken` is called using
|
|
2211
|
-
# the credentials of an IAM user, the temporary credentials have the
|
|
2212
|
-
# same permissions as the IAM user.
|
|
2274
|
+
# </note>
|
|
2213
2275
|
#
|
|
2214
2276
|
# For more information about using `GetSessionToken` to create temporary
|
|
2215
|
-
# credentials,
|
|
2277
|
+
# credentials, see [Temporary Credentials for Users in Untrusted
|
|
2216
2278
|
# Environments][5] in the *IAM User Guide*.
|
|
2217
2279
|
#
|
|
2218
2280
|
#
|
|
@@ -2220,7 +2282,7 @@ module Aws::STS
|
|
|
2220
2282
|
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html
|
|
2221
2283
|
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#stsapi_comparison
|
|
2222
2284
|
# [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_getsessiontoken.html
|
|
2223
|
-
# [4]: https://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html#
|
|
2285
|
+
# [4]: https://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html#lock-away-credentials
|
|
2224
2286
|
# [5]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#api_getsessiontoken
|
|
2225
2287
|
#
|
|
2226
2288
|
# @option params [Integer] :duration_seconds
|
|
@@ -2318,7 +2380,7 @@ module Aws::STS
|
|
|
2318
2380
|
params: params,
|
|
2319
2381
|
config: config)
|
|
2320
2382
|
context[:gem_name] = 'aws-sdk-core'
|
|
2321
|
-
context[:gem_version] = '3.
|
|
2383
|
+
context[:gem_version] = '3.199.0'
|
|
2322
2384
|
Seahorse::Client::Request.new(handlers, context)
|
|
2323
2385
|
end
|
|
2324
2386
|
|