aws-sdk-core 3.171.1 → 3.199.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (143) hide show
  1. checksums.yaml +4 -4
  2. data/CHANGELOG.md +363 -0
  3. data/VERSION +1 -1
  4. data/lib/aws-defaults/default_configuration.rb +4 -4
  5. data/lib/aws-sdk-core/binary/decode_handler.rb +3 -9
  6. data/lib/aws-sdk-core/binary/encode_handler.rb +1 -1
  7. data/lib/aws-sdk-core/binary/event_builder.rb +34 -37
  8. data/lib/aws-sdk-core/binary/event_stream_decoder.rb +1 -0
  9. data/lib/aws-sdk-core/binary/event_stream_encoder.rb +4 -3
  10. data/lib/aws-sdk-core/cbor/cbor_engine.rb +19 -0
  11. data/lib/aws-sdk-core/cbor/decoder.rb +310 -0
  12. data/lib/aws-sdk-core/cbor/encoder.rb +243 -0
  13. data/lib/aws-sdk-core/cbor.rb +106 -0
  14. data/lib/aws-sdk-core/client_stubs.rb +18 -14
  15. data/lib/aws-sdk-core/credential_provider.rb +4 -1
  16. data/lib/aws-sdk-core/ec2_metadata.rb +1 -1
  17. data/lib/aws-sdk-core/ecs_credentials.rb +78 -11
  18. data/lib/aws-sdk-core/endpoints/matchers.rb +18 -10
  19. data/lib/aws-sdk-core/endpoints.rb +6 -2
  20. data/lib/aws-sdk-core/error_handler.rb +41 -0
  21. data/lib/aws-sdk-core/errors.rb +3 -3
  22. data/lib/aws-sdk-core/event_emitter.rb +0 -16
  23. data/lib/aws-sdk-core/ini_parser.rb +7 -0
  24. data/lib/aws-sdk-core/instance_profile_credentials.rb +55 -32
  25. data/lib/aws-sdk-core/json/builder.rb +8 -1
  26. data/lib/aws-sdk-core/json/error_handler.rb +15 -10
  27. data/lib/aws-sdk-core/json/handler.rb +12 -6
  28. data/lib/aws-sdk-core/json/json_engine.rb +3 -1
  29. data/lib/aws-sdk-core/json/oj_engine.rb +7 -1
  30. data/lib/aws-sdk-core/json/parser.rb +33 -3
  31. data/lib/aws-sdk-core/json.rb +43 -14
  32. data/lib/aws-sdk-core/log/formatter.rb +6 -0
  33. data/lib/aws-sdk-core/lru_cache.rb +75 -0
  34. data/lib/aws-sdk-core/pageable_response.rb +3 -1
  35. data/lib/aws-sdk-core/param_validator.rb +9 -4
  36. data/lib/aws-sdk-core/plugins/checksum_algorithm.rb +5 -3
  37. data/lib/aws-sdk-core/plugins/client_metrics_plugin.rb +1 -0
  38. data/lib/aws-sdk-core/plugins/client_metrics_send_plugin.rb +14 -2
  39. data/lib/aws-sdk-core/plugins/credentials_configuration.rb +2 -0
  40. data/lib/aws-sdk-core/plugins/global_configuration.rb +8 -9
  41. data/lib/aws-sdk-core/plugins/http_checksum.rb +2 -1
  42. data/lib/aws-sdk-core/plugins/invocation_id.rb +1 -11
  43. data/lib/aws-sdk-core/plugins/logging.rb +2 -0
  44. data/lib/aws-sdk-core/plugins/protocols/api_gateway.rb +3 -1
  45. data/lib/aws-sdk-core/plugins/protocols/ec2.rb +2 -24
  46. data/lib/aws-sdk-core/plugins/protocols/json_rpc.rb +6 -8
  47. data/lib/aws-sdk-core/plugins/protocols/query.rb +4 -2
  48. data/lib/aws-sdk-core/plugins/protocols/rest_json.rb +3 -15
  49. data/lib/aws-sdk-core/plugins/protocols/rest_xml.rb +3 -0
  50. data/lib/aws-sdk-core/plugins/protocols/rpc_v2.rb +17 -0
  51. data/lib/aws-sdk-core/plugins/regional_endpoint.rb +109 -33
  52. data/lib/aws-sdk-core/plugins/request_compression.rb +226 -0
  53. data/lib/aws-sdk-core/plugins/retry_errors.rb +12 -3
  54. data/lib/aws-sdk-core/plugins/sign.rb +24 -13
  55. data/lib/aws-sdk-core/plugins/stub_responses.rb +1 -0
  56. data/lib/aws-sdk-core/plugins/user_agent.rb +152 -14
  57. data/lib/aws-sdk-core/process_credentials.rb +45 -27
  58. data/lib/aws-sdk-core/query/ec2_handler.rb +27 -0
  59. data/lib/aws-sdk-core/query/ec2_param_builder.rb +5 -7
  60. data/lib/aws-sdk-core/query/handler.rb +4 -4
  61. data/lib/aws-sdk-core/query/param_builder.rb +2 -2
  62. data/lib/aws-sdk-core/query.rb +2 -1
  63. data/lib/aws-sdk-core/refreshing_credentials.rb +12 -12
  64. data/lib/aws-sdk-core/rest/content_type_handler.rb +60 -0
  65. data/lib/aws-sdk-core/rest/handler.rb +3 -4
  66. data/lib/aws-sdk-core/rest/request/body.rb +32 -5
  67. data/lib/aws-sdk-core/rest/request/endpoint.rb +24 -4
  68. data/lib/aws-sdk-core/rest/request/headers.rb +15 -7
  69. data/lib/aws-sdk-core/rest/request/querystring_builder.rb +62 -36
  70. data/lib/aws-sdk-core/rest/response/body.rb +15 -1
  71. data/lib/aws-sdk-core/rest/response/header_list_parser.rb +79 -0
  72. data/lib/aws-sdk-core/rest/response/headers.rb +8 -3
  73. data/lib/aws-sdk-core/rest.rb +1 -0
  74. data/lib/aws-sdk-core/rpc_v2/builder.rb +62 -0
  75. data/lib/aws-sdk-core/rpc_v2/content_type_handler.rb +45 -0
  76. data/lib/aws-sdk-core/rpc_v2/error_handler.rb +84 -0
  77. data/lib/aws-sdk-core/rpc_v2/handler.rb +74 -0
  78. data/lib/aws-sdk-core/rpc_v2/parser.rb +90 -0
  79. data/lib/aws-sdk-core/rpc_v2.rb +6 -0
  80. data/lib/aws-sdk-core/shared_config.rb +48 -18
  81. data/lib/aws-sdk-core/sso_credentials.rb +1 -1
  82. data/lib/aws-sdk-core/stubbing/protocols/rpc_v2.rb +41 -0
  83. data/lib/aws-sdk-core/stubbing/stub_data.rb +11 -0
  84. data/lib/aws-sdk-core/util.rb +39 -0
  85. data/lib/aws-sdk-core/waiters/poller.rb +4 -2
  86. data/lib/aws-sdk-core/xml/builder.rb +17 -9
  87. data/lib/aws-sdk-core/xml/error_handler.rb +32 -42
  88. data/lib/aws-sdk-core/xml/parser/frame.rb +4 -20
  89. data/lib/aws-sdk-core/xml/parser/stack.rb +2 -0
  90. data/lib/aws-sdk-core/xml/parser.rb +2 -6
  91. data/lib/aws-sdk-core.rb +7 -2
  92. data/lib/aws-sdk-sso/client.rb +94 -46
  93. data/lib/aws-sdk-sso/endpoint_provider.rb +30 -24
  94. data/lib/aws-sdk-sso/endpoints.rb +1 -0
  95. data/lib/aws-sdk-sso/plugins/endpoints.rb +4 -2
  96. data/lib/aws-sdk-sso.rb +1 -1
  97. data/lib/aws-sdk-ssooidc/client.rb +479 -74
  98. data/lib/aws-sdk-ssooidc/client_api.rb +78 -1
  99. data/lib/aws-sdk-ssooidc/endpoint_provider.rb +30 -24
  100. data/lib/aws-sdk-ssooidc/endpoints.rb +15 -0
  101. data/lib/aws-sdk-ssooidc/errors.rb +52 -0
  102. data/lib/aws-sdk-ssooidc/plugins/endpoints.rb +6 -2
  103. data/lib/aws-sdk-ssooidc/types.rb +372 -51
  104. data/lib/aws-sdk-ssooidc.rb +1 -1
  105. data/lib/aws-sdk-sts/client.rb +219 -157
  106. data/lib/aws-sdk-sts/client_api.rb +20 -9
  107. data/lib/aws-sdk-sts/endpoint_provider.rb +81 -78
  108. data/lib/aws-sdk-sts/endpoints.rb +1 -0
  109. data/lib/aws-sdk-sts/plugins/endpoints.rb +4 -2
  110. data/lib/aws-sdk-sts/presigner.rb +1 -1
  111. data/lib/aws-sdk-sts/types.rb +49 -11
  112. data/lib/aws-sdk-sts.rb +1 -1
  113. data/lib/seahorse/client/async_base.rb +1 -1
  114. data/lib/seahorse/client/async_response.rb +19 -0
  115. data/lib/seahorse/client/base.rb +18 -7
  116. data/lib/seahorse/client/configuration.rb +0 -4
  117. data/lib/seahorse/client/h2/handler.rb +1 -0
  118. data/lib/seahorse/client/handler.rb +1 -1
  119. data/lib/seahorse/client/net_http/connection_pool.rb +3 -9
  120. data/lib/seahorse/client/net_http/patches.rb +1 -4
  121. data/lib/seahorse/client/plugin.rb +9 -0
  122. data/lib/seahorse/client/plugins/endpoint.rb +0 -1
  123. data/lib/seahorse/client/plugins/h2.rb +3 -3
  124. data/lib/seahorse/client/plugins/net_http.rb +48 -16
  125. data/lib/seahorse/client/plugins/request_callback.rb +31 -0
  126. data/lib/seahorse/client/response.rb +6 -0
  127. data/lib/seahorse/model/operation.rb +3 -0
  128. data/lib/seahorse/model/shapes.rb +2 -2
  129. data/sig/aws-sdk-core/client_stubs.rbs +10 -0
  130. data/sig/aws-sdk-core/errors.rbs +22 -0
  131. data/sig/aws-sdk-core/resources/collection.rbs +21 -0
  132. data/sig/aws-sdk-core/structure.rbs +4 -0
  133. data/sig/aws-sdk-core/waiters/errors.rbs +20 -0
  134. data/sig/aws-sdk-core.rbs +7 -0
  135. data/sig/seahorse/client/base.rbs +25 -0
  136. data/sig/seahorse/client/handler_builder.rbs +16 -0
  137. data/sig/seahorse/client/response.rbs +61 -0
  138. metadata +44 -17
  139. /data/lib/aws-sdk-core/xml/parser/{engines/libxml.rb → libxml_engine.rb} +0 -0
  140. /data/lib/aws-sdk-core/xml/parser/{engines/nokogiri.rb → nokogiri_engine.rb} +0 -0
  141. /data/lib/aws-sdk-core/xml/parser/{engines/oga.rb → oga_engine.rb} +0 -0
  142. /data/lib/aws-sdk-core/xml/parser/{engines/ox.rb → ox_engine.rb} +0 -0
  143. /data/lib/aws-sdk-core/xml/parser/{engines/rexml.rb → rexml_engine.rb} +0 -0
@@ -22,12 +22,14 @@ require 'aws-sdk-core/plugins/endpoint_pattern.rb'
22
22
  require 'aws-sdk-core/plugins/response_paging.rb'
23
23
  require 'aws-sdk-core/plugins/stub_responses.rb'
24
24
  require 'aws-sdk-core/plugins/idempotency_token.rb'
25
+ require 'aws-sdk-core/plugins/invocation_id.rb'
25
26
  require 'aws-sdk-core/plugins/jsonvalue_converter.rb'
26
27
  require 'aws-sdk-core/plugins/client_metrics_plugin.rb'
27
28
  require 'aws-sdk-core/plugins/client_metrics_send_plugin.rb'
28
29
  require 'aws-sdk-core/plugins/transfer_encoding.rb'
29
30
  require 'aws-sdk-core/plugins/http_checksum.rb'
30
31
  require 'aws-sdk-core/plugins/checksum_algorithm.rb'
32
+ require 'aws-sdk-core/plugins/request_compression.rb'
31
33
  require 'aws-sdk-core/plugins/defaults_mode.rb'
32
34
  require 'aws-sdk-core/plugins/recursion_detection.rb'
33
35
  require 'aws-sdk-core/plugins/sign.rb'
@@ -72,12 +74,14 @@ module Aws::STS
72
74
  add_plugin(Aws::Plugins::ResponsePaging)
73
75
  add_plugin(Aws::Plugins::StubResponses)
74
76
  add_plugin(Aws::Plugins::IdempotencyToken)
77
+ add_plugin(Aws::Plugins::InvocationId)
75
78
  add_plugin(Aws::Plugins::JsonvalueConverter)
76
79
  add_plugin(Aws::Plugins::ClientMetricsPlugin)
77
80
  add_plugin(Aws::Plugins::ClientMetricsSendPlugin)
78
81
  add_plugin(Aws::Plugins::TransferEncoding)
79
82
  add_plugin(Aws::Plugins::HttpChecksum)
80
83
  add_plugin(Aws::Plugins::ChecksumAlgorithm)
84
+ add_plugin(Aws::Plugins::RequestCompression)
81
85
  add_plugin(Aws::Plugins::DefaultsMode)
82
86
  add_plugin(Aws::Plugins::RecursionDetection)
83
87
  add_plugin(Aws::Plugins::Sign)
@@ -87,6 +91,11 @@ module Aws::STS
87
91
 
88
92
  # @overload initialize(options)
89
93
  # @param [Hash] options
94
+ #
95
+ # @option options [Array<Seahorse::Client::Plugin>] :plugins ([]])
96
+ # A list of plugins to apply to the client. Each plugin is either a
97
+ # class name or an instance of a plugin class.
98
+ #
90
99
  # @option options [required, Aws::CredentialProvider] :credentials
91
100
  # Your AWS credentials. This can be an instance of any one of the
92
101
  # following classes:
@@ -192,10 +201,20 @@ module Aws::STS
192
201
  # Set to true to disable SDK automatically adding host prefix
193
202
  # to default service endpoint when available.
194
203
  #
195
- # @option options [String] :endpoint
196
- # The client endpoint is normally constructed from the `:region`
197
- # option. You should only configure an `:endpoint` when connecting
198
- # to test or custom endpoints. This should be a valid HTTP(S) URI.
204
+ # @option options [Boolean] :disable_request_compression (false)
205
+ # When set to 'true' the request body will not be compressed
206
+ # for supported operations.
207
+ #
208
+ # @option options [String, URI::HTTPS, URI::HTTP] :endpoint
209
+ # Normally you should not configure the `:endpoint` option
210
+ # directly. This is normally constructed from the `:region`
211
+ # option. Configuring `:endpoint` is normally reserved for
212
+ # connecting to test or custom endpoints. The endpoint should
213
+ # be a URI formatted like:
214
+ #
215
+ # 'http://example.com'
216
+ # 'https://example.com'
217
+ # 'http://example.com:123'
199
218
  #
200
219
  # @option options [Integer] :endpoint_cache_max_entries (1000)
201
220
  # Used for the maximum size limit of the LRU cache storing endpoints data
@@ -212,6 +231,10 @@ module Aws::STS
212
231
  # @option options [Boolean] :endpoint_discovery (false)
213
232
  # When set to `true`, endpoint discovery will be enabled for operations when available.
214
233
  #
234
+ # @option options [Boolean] :ignore_configured_endpoint_urls
235
+ # Setting to true disables use of endpoint URLs provided via environment
236
+ # variables and the shared configuration file.
237
+ #
215
238
  # @option options [Aws::Log::Formatter] :log_formatter (Aws::Log::Formatter.default)
216
239
  # The log formatter.
217
240
  #
@@ -232,6 +255,11 @@ module Aws::STS
232
255
  # Used when loading credentials from the shared credentials file
233
256
  # at HOME/.aws/credentials. When not specified, 'default' is used.
234
257
  #
258
+ # @option options [Integer] :request_min_compression_size_bytes (10240)
259
+ # The minimum size in bytes that triggers compression for request
260
+ # bodies. The value must be non-negative integer value between 0
261
+ # and 10485780 bytes inclusive.
262
+ #
235
263
  # @option options [Proc] :retry_backoff
236
264
  # A proc or lambda used for backoff. Defaults to 2**retries * retry_base_delay.
237
265
  # This option is only used in the `legacy` retry mode.
@@ -276,6 +304,11 @@ module Aws::STS
276
304
  # throttling. This is a provisional mode that may change behavior
277
305
  # in the future.
278
306
  #
307
+ # @option options [String] :sdk_ua_app_id
308
+ # A unique and opaque application ID that is appended to the
309
+ # User-Agent header as app/sdk_ua_app_id. It should have a
310
+ # maximum length of 50. This variable is sourced from environment
311
+ # variable AWS_SDK_UA_APP_ID or the shared config profile attribute sdk_ua_app_id.
279
312
  #
280
313
  # @option options [String] :secret_access_key
281
314
  #
@@ -324,50 +357,65 @@ module Aws::STS
324
357
  # @option options [Aws::STS::EndpointProvider] :endpoint_provider
325
358
  # The endpoint provider used to resolve endpoints. Any object that responds to `#resolve_endpoint(parameters)` where `parameters` is a Struct similar to `Aws::STS::EndpointParameters`
326
359
  #
327
- # @option options [URI::HTTP,String] :http_proxy A proxy to send
328
- # requests through. Formatted like 'http://proxy.com:123'.
329
- #
330
- # @option options [Float] :http_open_timeout (15) The number of
331
- # seconds to wait when opening a HTTP session before raising a
332
- # `Timeout::Error`.
333
- #
334
- # @option options [Float] :http_read_timeout (60) The default
335
- # number of seconds to wait for response data. This value can
336
- # safely be set per-request on the session.
337
- #
338
- # @option options [Float] :http_idle_timeout (5) The number of
339
- # seconds a connection is allowed to sit idle before it is
340
- # considered stale. Stale connections are closed and removed
341
- # from the pool before making a request.
342
- #
343
- # @option options [Float] :http_continue_timeout (1) The number of
344
- # seconds to wait for a 100-continue response before sending the
345
- # request body. This option has no effect unless the request has
346
- # "Expect" header set to "100-continue". Defaults to `nil` which
347
- # disables this behaviour. This value can safely be set per
348
- # request on the session.
349
- #
350
- # @option options [Float] :ssl_timeout (nil) Sets the SSL timeout
351
- # in seconds.
352
- #
353
- # @option options [Boolean] :http_wire_trace (false) When `true`,
354
- # HTTP debug output will be sent to the `:logger`.
360
+ # @option options [Float] :http_continue_timeout (1)
361
+ # The number of seconds to wait for a 100-continue response before sending the
362
+ # request body. This option has no effect unless the request has "Expect"
363
+ # header set to "100-continue". Defaults to `nil` which disables this
364
+ # behaviour. This value can safely be set per request on the session.
365
+ #
366
+ # @option options [Float] :http_idle_timeout (5)
367
+ # The number of seconds a connection is allowed to sit idle before it
368
+ # is considered stale. Stale connections are closed and removed from the
369
+ # pool before making a request.
370
+ #
371
+ # @option options [Float] :http_open_timeout (15)
372
+ # The default number of seconds to wait for response data.
373
+ # This value can safely be set per-request on the session.
374
+ #
375
+ # @option options [URI::HTTP,String] :http_proxy
376
+ # A proxy to send requests through. Formatted like 'http://proxy.com:123'.
377
+ #
378
+ # @option options [Float] :http_read_timeout (60)
379
+ # The default number of seconds to wait for response data.
380
+ # This value can safely be set per-request on the session.
381
+ #
382
+ # @option options [Boolean] :http_wire_trace (false)
383
+ # When `true`, HTTP debug output will be sent to the `:logger`.
384
+ #
385
+ # @option options [Proc] :on_chunk_received
386
+ # When a Proc object is provided, it will be used as callback when each chunk
387
+ # of the response body is received. It provides three arguments: the chunk,
388
+ # the number of bytes received, and the total number of
389
+ # bytes in the response (or nil if the server did not send a `content-length`).
390
+ #
391
+ # @option options [Proc] :on_chunk_sent
392
+ # When a Proc object is provided, it will be used as callback when each chunk
393
+ # of the request body is sent. It provides three arguments: the chunk,
394
+ # the number of bytes read from the body, and the total number of
395
+ # bytes in the body.
396
+ #
397
+ # @option options [Boolean] :raise_response_errors (true)
398
+ # When `true`, response errors are raised.
399
+ #
400
+ # @option options [String] :ssl_ca_bundle
401
+ # Full path to the SSL certificate authority bundle file that should be used when
402
+ # verifying peer certificates. If you do not pass `:ssl_ca_bundle` or
403
+ # `:ssl_ca_directory` the the system default will be used if available.
404
+ #
405
+ # @option options [String] :ssl_ca_directory
406
+ # Full path of the directory that contains the unbundled SSL certificate
407
+ # authority files for verifying peer certificates. If you do
408
+ # not pass `:ssl_ca_bundle` or `:ssl_ca_directory` the the system
409
+ # default will be used if available.
355
410
  #
356
- # @option options [Boolean] :ssl_verify_peer (true) When `true`,
357
- # SSL peer certificates are verified when establishing a
358
- # connection.
411
+ # @option options [String] :ssl_ca_store
412
+ # Sets the X509::Store to verify peer certificate.
359
413
  #
360
- # @option options [String] :ssl_ca_bundle Full path to the SSL
361
- # certificate authority bundle file that should be used when
362
- # verifying peer certificates. If you do not pass
363
- # `:ssl_ca_bundle` or `:ssl_ca_directory` the the system default
364
- # will be used if available.
414
+ # @option options [Float] :ssl_timeout
415
+ # Sets the SSL timeout in seconds
365
416
  #
366
- # @option options [String] :ssl_ca_directory Full path of the
367
- # directory that contains the unbundled SSL certificate
368
- # authority files for verifying peer certificates. If you do
369
- # not pass `:ssl_ca_bundle` or `:ssl_ca_directory` the the
370
- # system default will be used if available.
417
+ # @option options [Boolean] :ssl_verify_peer (true)
418
+ # When `true`, SSL peer certificates are verified when establishing a connection.
371
419
  #
372
420
  def initialize(*args)
373
421
  super
@@ -406,10 +454,11 @@ module Aws::STS
406
454
  # identity-based policy of the role that is being assumed. For more
407
455
  # information, see [Session Policies][3] in the *IAM User Guide*.
408
456
  #
409
- # When you create a role, you create two policies: A role trust policy
410
- # that specifies *who* can assume the role and a permissions policy that
411
- # specifies *what* can be done with the role. You specify the trusted
412
- # principal who is allowed to assume the role in the role trust policy.
457
+ # When you create a role, you create two policies: a role trust policy
458
+ # that specifies *who* can assume the role, and a permissions policy
459
+ # that specifies *what* can be done with the role. You specify the
460
+ # trusted principal that is allowed to assume the role in the role trust
461
+ # policy.
413
462
  #
414
463
  # To assume a role from a different account, your Amazon Web Services
415
464
  # account must be trusted by the role. The trust relationship is defined
@@ -418,10 +467,9 @@ module Aws::STS
418
467
  # users in the account.
419
468
  #
420
469
  # A user who wants to access a role in a different account must also
421
- # have permissions that are delegated from the user account
422
- # administrator. The administrator must attach a policy that allows the
423
- # user to call `AssumeRole` for the ARN of the role in the other
424
- # account.
470
+ # have permissions that are delegated from the account administrator.
471
+ # The administrator must attach a policy that allows the user to call
472
+ # `AssumeRole` for the ARN of the role in the other account.
425
473
  #
426
474
  # To allow a user to assume a role in the same account, you can do
427
475
  # either of the following:
@@ -746,6 +794,17 @@ module Aws::STS
746
794
  #
747
795
  # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_monitor.html
748
796
  #
797
+ # @option params [Array<Types::ProvidedContext>] :provided_contexts
798
+ # A list of previously acquired trusted context assertions in the format
799
+ # of a JSON array. The trusted context assertion is signed and encrypted
800
+ # by Amazon Web Services STS.
801
+ #
802
+ # The following is an example of a `ProvidedContext` value that includes
803
+ # a single trusted context assertion and the ARN of the context provider
804
+ # from which the trusted context assertion was generated.
805
+ #
806
+ # `[\{"ProviderArn":"arn:aws:iam::aws:contextProvider/IdentityCenter","ContextAssertion":"trusted-context-assertion"\}]`
807
+ #
749
808
  # @return [Types::AssumeRoleResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
750
809
  #
751
810
  # * {Types::AssumeRoleResponse#credentials #credentials} => Types::Credentials
@@ -806,7 +865,7 @@ module Aws::STS
806
865
  # arn: "arnType",
807
866
  # },
808
867
  # ],
809
- # policy: "sessionPolicyDocumentType",
868
+ # policy: "unrestrictedSessionPolicyDocumentType",
810
869
  # duration_seconds: 1,
811
870
  # tags: [
812
871
  # {
@@ -819,6 +878,12 @@ module Aws::STS
819
878
  # serial_number: "serialNumberType",
820
879
  # token_code: "tokenCodeType",
821
880
  # source_identity: "sourceIdentityType",
881
+ # provided_contexts: [
882
+ # {
883
+ # provider_arn: "arnType",
884
+ # context_assertion: "contextAssertionType",
885
+ # },
886
+ # ],
822
887
  # })
823
888
  #
824
889
  # @example Response structure
@@ -1206,10 +1271,8 @@ module Aws::STS
1206
1271
  # the user with a consistent identity throughout the lifetime of an
1207
1272
  # application.
1208
1273
  #
1209
- # To learn more about Amazon Cognito, see [Amazon Cognito Overview][4]
1210
- # in *Amazon Web Services SDK for Android Developer Guide* and [Amazon
1211
- # Cognito Overview][5] in the *Amazon Web Services SDK for iOS Developer
1212
- # Guide*.
1274
+ # To learn more about Amazon Cognito, see [Amazon Cognito identity
1275
+ # pools][1] in *Amazon Cognito Developer Guide*.
1213
1276
  #
1214
1277
  # </note>
1215
1278
  #
@@ -1223,8 +1286,8 @@ module Aws::STS
1223
1286
  # a token from the web identity provider. For a comparison of
1224
1287
  # `AssumeRoleWithWebIdentity` with the other API operations that produce
1225
1288
  # temporary credentials, see [Requesting Temporary Security
1226
- # Credentials][6] and [Comparing the Amazon Web Services STS API
1227
- # operations][7] in the *IAM User Guide*.
1289
+ # Credentials][4] and [Comparing the Amazon Web Services STS API
1290
+ # operations][5] in the *IAM User Guide*.
1228
1291
  #
1229
1292
  # The temporary security credentials returned by this API consist of an
1230
1293
  # access key ID, a secret access key, and a security token. Applications
@@ -1240,11 +1303,11 @@ module Aws::STS
1240
1303
  # to the maximum session duration setting for the role. This setting can
1241
1304
  # have a value from 1 hour to 12 hours. To learn how to view the maximum
1242
1305
  # value for your role, see [View the Maximum Session Duration Setting
1243
- # for a Role][8] in the *IAM User Guide*. The maximum session duration
1306
+ # for a Role][6] in the *IAM User Guide*. The maximum session duration
1244
1307
  # limit applies when you use the `AssumeRole*` API operations or the
1245
1308
  # `assume-role*` CLI commands. However the limit does not apply when you
1246
1309
  # use those operations to create a console URL. For more information,
1247
- # see [Using IAM Roles][9] in the *IAM User Guide*.
1310
+ # see [Using IAM Roles][7] in the *IAM User Guide*.
1248
1311
  #
1249
1312
  # **Permissions**
1250
1313
  #
@@ -1253,7 +1316,7 @@ module Aws::STS
1253
1316
  # Amazon Web Services service with the following exception: you cannot
1254
1317
  # call the STS `GetFederationToken` or `GetSessionToken` API operations.
1255
1318
  #
1256
- # (Optional) You can pass inline or managed [session policies][10] to
1319
+ # (Optional) You can pass inline or managed [session policies][8] to
1257
1320
  # this operation. You can pass a single JSON policy document to use as
1258
1321
  # an inline session policy. You can also specify up to 10 managed policy
1259
1322
  # Amazon Resource Names (ARNs) to use as managed session policies. The
@@ -1266,19 +1329,19 @@ module Aws::STS
1266
1329
  # resources in the account that owns the role. You cannot use session
1267
1330
  # policies to grant more permissions than those allowed by the
1268
1331
  # identity-based policy of the role that is being assumed. For more
1269
- # information, see [Session Policies][10] in the *IAM User Guide*.
1332
+ # information, see [Session Policies][8] in the *IAM User Guide*.
1270
1333
  #
1271
1334
  # **Tags**
1272
1335
  #
1273
1336
  # (Optional) You can configure your IdP to pass attributes into your web
1274
1337
  # identity token as session tags. Each session tag consists of a key
1275
1338
  # name and an associated value. For more information about session tags,
1276
- # see [Passing Session Tags in STS][11] in the *IAM User Guide*.
1339
+ # see [Passing Session Tags in STS][9] in the *IAM User Guide*.
1277
1340
  #
1278
1341
  # You can pass up to 50 session tags. The plaintext session tag keys
1279
1342
  # can’t exceed 128 characters and the values can’t exceed 256
1280
1343
  # characters. For these and additional limits, see [IAM and STS
1281
- # Character Limits][12] in the *IAM User Guide*.
1344
+ # Character Limits][10] in the *IAM User Guide*.
1282
1345
  #
1283
1346
  # <note markdown="1"> An Amazon Web Services conversion compresses the passed inline session
1284
1347
  # policy, managed policy ARNs, and session tags into a packed binary
@@ -1296,12 +1359,12 @@ module Aws::STS
1296
1359
  # An administrator must grant you the permissions necessary to pass
1297
1360
  # session tags. The administrator can also create granular permissions
1298
1361
  # to allow you to pass only specific session tags. For more information,
1299
- # see [Tutorial: Using Tags for Attribute-Based Access Control][13] in
1362
+ # see [Tutorial: Using Tags for Attribute-Based Access Control][11] in
1300
1363
  # the *IAM User Guide*.
1301
1364
  #
1302
1365
  # You can set the session tags as transitive. Transitive tags persist
1303
1366
  # during role chaining. For more information, see [Chaining Roles with
1304
- # Session Tags][14] in the *IAM User Guide*.
1367
+ # Session Tags][12] in the *IAM User Guide*.
1305
1368
  #
1306
1369
  # **Identities**
1307
1370
  #
@@ -1313,19 +1376,19 @@ module Aws::STS
1313
1376
  # specified in the role's trust policy.
1314
1377
  #
1315
1378
  # Calling `AssumeRoleWithWebIdentity` can result in an entry in your
1316
- # CloudTrail logs. The entry includes the [Subject][15] of the provided
1379
+ # CloudTrail logs. The entry includes the [Subject][13] of the provided
1317
1380
  # web identity token. We recommend that you avoid using any personally
1318
1381
  # identifiable information (PII) in this field. For example, you could
1319
1382
  # instead use a GUID or a pairwise identifier, as [suggested in the OIDC
1320
- # specification][16].
1383
+ # specification][14].
1321
1384
  #
1322
1385
  # For more information about how to use web identity federation and the
1323
1386
  # `AssumeRoleWithWebIdentity` API, see the following resources:
1324
1387
  #
1325
- # * [Using Web Identity Federation API Operations for Mobile Apps][17]
1326
- # and [Federation Through a Web-based Identity Provider][18].
1388
+ # * [Using Web Identity Federation API Operations for Mobile Apps][15]
1389
+ # and [Federation Through a Web-based Identity Provider][16].
1327
1390
  #
1328
- # * [ Web Identity Federation Playground][19]. Walk through the process
1391
+ # * [ Web Identity Federation Playground][17]. Walk through the process
1329
1392
  # of authenticating through Login with Amazon, Facebook, or Google,
1330
1393
  # getting temporary security credentials, and then using those
1331
1394
  # credentials to make a request to Amazon Web Services.
@@ -1336,7 +1399,7 @@ module Aws::STS
1336
1399
  # toolkits then show how to use the information from these providers
1337
1400
  # to get and use temporary security credentials.
1338
1401
  #
1339
- # * [Web Identity Federation with Mobile Applications][20]. This article
1402
+ # * [Web Identity Federation with Mobile Applications][18]. This article
1340
1403
  # discusses web identity federation and shows an example of how to use
1341
1404
  # web identity federation to get access to content in Amazon S3.
1342
1405
  #
@@ -1345,23 +1408,21 @@ module Aws::STS
1345
1408
  # [1]: https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-identity.html
1346
1409
  # [2]: http://aws.amazon.com/sdkforios/
1347
1410
  # [3]: http://aws.amazon.com/sdkforandroid/
1348
- # [4]: https://docs.aws.amazon.com/mobile/sdkforandroid/developerguide/cognito-auth.html#d0e840
1349
- # [5]: https://docs.aws.amazon.com/mobile/sdkforios/developerguide/cognito-auth.html#d0e664
1350
- # [6]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html
1351
- # [7]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#stsapi_comparison
1352
- # [8]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html#id_roles_use_view-role-max-session
1353
- # [9]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html
1354
- # [10]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
1355
- # [11]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html
1356
- # [12]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-limits.html#reference_iam-limits-entity-length
1357
- # [13]: https://docs.aws.amazon.com/IAM/latest/UserGuide/tutorial_attribute-based-access-control.html
1358
- # [14]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html#id_session-tags_role-chaining
1359
- # [15]: http://openid.net/specs/openid-connect-core-1_0.html#Claims
1360
- # [16]: http://openid.net/specs/openid-connect-core-1_0.html#SubjectIDTypes
1361
- # [17]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_oidc_manual.html
1362
- # [18]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#api_assumerolewithwebidentity
1363
- # [19]: https://aws.amazon.com/blogs/aws/the-aws-web-identity-federation-playground/
1364
- # [20]: http://aws.amazon.com/articles/web-identity-federation-with-mobile-applications
1411
+ # [4]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html
1412
+ # [5]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#stsapi_comparison
1413
+ # [6]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html#id_roles_use_view-role-max-session
1414
+ # [7]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html
1415
+ # [8]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
1416
+ # [9]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html
1417
+ # [10]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-limits.html#reference_iam-limits-entity-length
1418
+ # [11]: https://docs.aws.amazon.com/IAM/latest/UserGuide/tutorial_attribute-based-access-control.html
1419
+ # [12]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html#id_session-tags_role-chaining
1420
+ # [13]: http://openid.net/specs/openid-connect-core-1_0.html#Claims
1421
+ # [14]: http://openid.net/specs/openid-connect-core-1_0.html#SubjectIDTypes
1422
+ # [15]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_oidc_manual.html
1423
+ # [16]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#api_assumerolewithwebidentity
1424
+ # [17]: https://aws.amazon.com/blogs/aws/the-aws-web-identity-federation-playground/
1425
+ # [18]: http://aws.amazon.com/articles/web-identity-federation-with-mobile-applications
1365
1426
  #
1366
1427
  # @option params [required, String] :role_arn
1367
1428
  # The Amazon Resource Name (ARN) of the role that the caller is
@@ -1385,7 +1446,8 @@ module Aws::STS
1385
1446
  # by the identity provider. Your application must get this token by
1386
1447
  # authenticating the user who is using your application with a web
1387
1448
  # identity provider before the application makes an
1388
- # `AssumeRoleWithWebIdentity` call.
1449
+ # `AssumeRoleWithWebIdentity` call. Only tokens with RSA algorithms
1450
+ # (RS256) are supported.
1389
1451
  #
1390
1452
  # @option params [String] :provider_id
1391
1453
  # The fully qualified host component of the domain name of the OAuth 2.0
@@ -1720,11 +1782,11 @@ module Aws::STS
1720
1782
  # to call the operation.
1721
1783
  #
1722
1784
  # <note markdown="1"> No permissions are required to perform this operation. If an
1723
- # administrator adds a policy to your IAM user or role that explicitly
1785
+ # administrator attaches a policy to your identity that explicitly
1724
1786
  # denies access to the `sts:GetCallerIdentity` action, you can still
1725
1787
  # perform this operation. Permissions are not required because the same
1726
- # information is returned when an IAM user or role is denied access. To
1727
- # view an example response, see [I Am Not Authorized to Perform:
1788
+ # information is returned when access is denied. To view an example
1789
+ # response, see [I Am Not Authorized to Perform:
1728
1790
  # iam:DeleteVirtualMFADevice][1] in the *IAM User Guide*.
1729
1791
  #
1730
1792
  # </note>
@@ -1801,43 +1863,43 @@ module Aws::STS
1801
1863
  end
1802
1864
 
1803
1865
  # Returns a set of temporary security credentials (consisting of an
1804
- # access key ID, a secret access key, and a security token) for a
1805
- # federated user. A typical use is in a proxy application that gets
1806
- # temporary security credentials on behalf of distributed applications
1807
- # inside a corporate network. You must call the `GetFederationToken`
1808
- # operation using the long-term security credentials of an IAM user. As
1809
- # a result, this call is appropriate in contexts where those credentials
1810
- # can be safely stored, usually in a server-based application. For a
1811
- # comparison of `GetFederationToken` with the other API operations that
1812
- # produce temporary credentials, see [Requesting Temporary Security
1866
+ # access key ID, a secret access key, and a security token) for a user.
1867
+ # A typical use is in a proxy application that gets temporary security
1868
+ # credentials on behalf of distributed applications inside a corporate
1869
+ # network.
1870
+ #
1871
+ # You must call the `GetFederationToken` operation using the long-term
1872
+ # security credentials of an IAM user. As a result, this call is
1873
+ # appropriate in contexts where those credentials can be safeguarded,
1874
+ # usually in a server-based application. For a comparison of
1875
+ # `GetFederationToken` with the other API operations that produce
1876
+ # temporary credentials, see [Requesting Temporary Security
1813
1877
  # Credentials][1] and [Comparing the Amazon Web Services STS API
1814
1878
  # operations][2] in the *IAM User Guide*.
1815
1879
  #
1880
+ # Although it is possible to call `GetFederationToken` using the
1881
+ # security credentials of an Amazon Web Services account root user
1882
+ # rather than an IAM user that you create for the purpose of a proxy
1883
+ # application, we do not recommend it. For more information, see
1884
+ # [Safeguard your root user credentials and don't use them for everyday
1885
+ # tasks][3] in the *IAM User Guide*.
1886
+ #
1816
1887
  # <note markdown="1"> You can create a mobile-based or browser-based app that can
1817
1888
  # authenticate users using a web identity provider like Login with
1818
1889
  # Amazon, Facebook, Google, or an OpenID Connect-compatible identity
1819
- # provider. In this case, we recommend that you use [Amazon Cognito][3]
1890
+ # provider. In this case, we recommend that you use [Amazon Cognito][4]
1820
1891
  # or `AssumeRoleWithWebIdentity`. For more information, see [Federation
1821
- # Through a Web-based Identity Provider][4] in the *IAM User Guide*.
1892
+ # Through a Web-based Identity Provider][5] in the *IAM User Guide*.
1822
1893
  #
1823
1894
  # </note>
1824
1895
  #
1825
- # You can also call `GetFederationToken` using the security credentials
1826
- # of an Amazon Web Services account root user, but we do not recommend
1827
- # it. Instead, we recommend that you create an IAM user for the purpose
1828
- # of the proxy application. Then attach a policy to the IAM user that
1829
- # limits federated users to only the actions and resources that they
1830
- # need to access. For more information, see [IAM Best Practices][5] in
1831
- # the *IAM User Guide*.
1832
- #
1833
1896
  # **Session duration**
1834
1897
  #
1835
1898
  # The temporary credentials are valid for the specified duration, from
1836
1899
  # 900 seconds (15 minutes) up to a maximum of 129,600 seconds (36
1837
1900
  # hours). The default session duration is 43,200 seconds (12 hours).
1838
- # Temporary credentials obtained by using the Amazon Web Services
1839
- # account root user credentials have a maximum duration of 3,600 seconds
1840
- # (1 hour).
1901
+ # Temporary credentials obtained by using the root user credentials have
1902
+ # a maximum duration of 3,600 seconds (1 hour).
1841
1903
  #
1842
1904
  # **Permissions**
1843
1905
  #
@@ -1887,9 +1949,9 @@ module Aws::STS
1887
1949
  # <note markdown="1"> You can create a mobile-based or browser-based app that can
1888
1950
  # authenticate users using a web identity provider like Login with
1889
1951
  # Amazon, Facebook, Google, or an OpenID Connect-compatible identity
1890
- # provider. In this case, we recommend that you use [Amazon Cognito][3]
1952
+ # provider. In this case, we recommend that you use [Amazon Cognito][4]
1891
1953
  # or `AssumeRoleWithWebIdentity`. For more information, see [Federation
1892
- # Through a Web-based Identity Provider][4] in the *IAM User Guide*.
1954
+ # Through a Web-based Identity Provider][5] in the *IAM User Guide*.
1893
1955
  #
1894
1956
  # </note>
1895
1957
  #
@@ -1911,9 +1973,9 @@ module Aws::STS
1911
1973
  #
1912
1974
  # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html
1913
1975
  # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#stsapi_comparison
1914
- # [3]: http://aws.amazon.com/cognito/
1915
- # [4]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#api_assumerolewithwebidentity
1916
- # [5]: https://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html
1976
+ # [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html#lock-away-credentials
1977
+ # [4]: http://aws.amazon.com/cognito/
1978
+ # [5]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#api_assumerolewithwebidentity
1917
1979
  # [6]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
1918
1980
  # [7]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#api_getfederationtoken
1919
1981
  # [8]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html
@@ -2030,10 +2092,10 @@ module Aws::STS
2030
2092
  # The duration, in seconds, that the session should last. Acceptable
2031
2093
  # durations for federation sessions range from 900 seconds (15 minutes)
2032
2094
  # to 129,600 seconds (36 hours), with 43,200 seconds (12 hours) as the
2033
- # default. Sessions obtained using Amazon Web Services account root user
2034
- # credentials are restricted to a maximum of 3,600 seconds (one hour).
2035
- # If the specified duration is longer than one hour, the session
2036
- # obtained by using root user credentials defaults to one hour.
2095
+ # default. Sessions obtained using root user credentials are restricted
2096
+ # to a maximum of 3,600 seconds (one hour). If the specified duration is
2097
+ # longer than one hour, the session obtained by using root user
2098
+ # credentials defaults to one hour.
2037
2099
  #
2038
2100
  # @option params [Array<Types::Tag>] :tags
2039
2101
  # A list of session tags. Each session tag consists of a key name and an
@@ -2153,14 +2215,15 @@ module Aws::STS
2153
2215
  # secret access key, and a security token. Typically, you use
2154
2216
  # `GetSessionToken` if you want to use MFA to protect programmatic calls
2155
2217
  # to specific Amazon Web Services API operations like Amazon EC2
2156
- # `StopInstances`. MFA-enabled IAM users would need to call
2157
- # `GetSessionToken` and submit an MFA code that is associated with their
2158
- # MFA device. Using the temporary security credentials that are returned
2159
- # from the call, IAM users can then make programmatic calls to API
2160
- # operations that require MFA authentication. If you do not supply a
2161
- # correct MFA code, then the API returns an access denied error. For a
2162
- # comparison of `GetSessionToken` with the other API operations that
2163
- # produce temporary credentials, see [Requesting Temporary Security
2218
+ # `StopInstances`.
2219
+ #
2220
+ # MFA-enabled IAM users must call `GetSessionToken` and submit an MFA
2221
+ # code that is associated with their MFA device. Using the temporary
2222
+ # security credentials that the call returns, IAM users can then make
2223
+ # programmatic calls to API operations that require MFA authentication.
2224
+ # An incorrect MFA code causes the API to return an access denied error.
2225
+ # For a comparison of `GetSessionToken` with the other API operations
2226
+ # that produce temporary credentials, see [Requesting Temporary Security
2164
2227
  # Credentials][1] and [Comparing the Amazon Web Services STS API
2165
2228
  # operations][2] in the *IAM User Guide*.
2166
2229
  #
@@ -2175,13 +2238,13 @@ module Aws::STS
2175
2238
  # **Session Duration**
2176
2239
  #
2177
2240
  # The `GetSessionToken` operation must be called by using the long-term
2178
- # Amazon Web Services security credentials of the Amazon Web Services
2179
- # account root user or an IAM user. Credentials that are created by IAM
2180
- # users are valid for the duration that you specify. This duration can
2181
- # range from 900 seconds (15 minutes) up to a maximum of 129,600 seconds
2182
- # (36 hours), with a default of 43,200 seconds (12 hours). Credentials
2183
- # based on account credentials can range from 900 seconds (15 minutes)
2184
- # up to 3,600 seconds (1 hour), with a default of 1 hour.
2241
+ # Amazon Web Services security credentials of an IAM user. Credentials
2242
+ # that are created by IAM users are valid for the duration that you
2243
+ # specify. This duration can range from 900 seconds (15 minutes) up to a
2244
+ # maximum of 129,600 seconds (36 hours), with a default of 43,200
2245
+ # seconds (12 hours). Credentials based on account credentials can range
2246
+ # from 900 seconds (15 minutes) up to 3,600 seconds (1 hour), with a
2247
+ # default of 1 hour.
2185
2248
  #
2186
2249
  # **Permissions**
2187
2250
  #
@@ -2195,24 +2258,23 @@ module Aws::STS
2195
2258
  # * You cannot call any STS API *except* `AssumeRole` or
2196
2259
  # `GetCallerIdentity`.
2197
2260
  #
2198
- # <note markdown="1"> We recommend that you do not call `GetSessionToken` with Amazon Web
2199
- # Services account root user credentials. Instead, follow our [best
2200
- # practices][4] by creating one or more IAM users, giving them the
2201
- # necessary permissions, and using IAM users for everyday interaction
2202
- # with Amazon Web Services.
2261
+ # The credentials that `GetSessionToken` returns are based on
2262
+ # permissions associated with the IAM user whose credentials were used
2263
+ # to call the operation. The temporary credentials have the same
2264
+ # permissions as the IAM user.
2203
2265
  #
2204
- # </note>
2266
+ # <note markdown="1"> Although it is possible to call `GetSessionToken` using the security
2267
+ # credentials of an Amazon Web Services account root user rather than an
2268
+ # IAM user, we do not recommend it. If `GetSessionToken` is called using
2269
+ # root user credentials, the temporary credentials have root user
2270
+ # permissions. For more information, see [Safeguard your root user
2271
+ # credentials and don't use them for everyday tasks][4] in the *IAM
2272
+ # User Guide*
2205
2273
  #
2206
- # The credentials that are returned by `GetSessionToken` are based on
2207
- # permissions associated with the user whose credentials were used to
2208
- # call the operation. If `GetSessionToken` is called using Amazon Web
2209
- # Services account root user credentials, the temporary credentials have
2210
- # root user permissions. Similarly, if `GetSessionToken` is called using
2211
- # the credentials of an IAM user, the temporary credentials have the
2212
- # same permissions as the IAM user.
2274
+ # </note>
2213
2275
  #
2214
2276
  # For more information about using `GetSessionToken` to create temporary
2215
- # credentials, go to [Temporary Credentials for Users in Untrusted
2277
+ # credentials, see [Temporary Credentials for Users in Untrusted
2216
2278
  # Environments][5] in the *IAM User Guide*.
2217
2279
  #
2218
2280
  #
@@ -2220,7 +2282,7 @@ module Aws::STS
2220
2282
  # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html
2221
2283
  # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#stsapi_comparison
2222
2284
  # [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_getsessiontoken.html
2223
- # [4]: https://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html#create-iam-users
2285
+ # [4]: https://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html#lock-away-credentials
2224
2286
  # [5]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#api_getsessiontoken
2225
2287
  #
2226
2288
  # @option params [Integer] :duration_seconds
@@ -2318,7 +2380,7 @@ module Aws::STS
2318
2380
  params: params,
2319
2381
  config: config)
2320
2382
  context[:gem_name] = 'aws-sdk-core'
2321
- context[:gem_version] = '3.171.1'
2383
+ context[:gem_version] = '3.199.0'
2322
2384
  Seahorse::Client::Request.new(handlers, context)
2323
2385
  end
2324
2386