aws-sdk-core 3.185.1 → 3.240.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (204) hide show
  1. checksums.yaml +4 -4
  2. data/CHANGELOG.md +705 -0
  3. data/VERSION +1 -1
  4. data/lib/aws-defaults.rb +4 -1
  5. data/lib/aws-sdk-core/arn.rb +1 -3
  6. data/lib/aws-sdk-core/assume_role_credentials.rb +21 -13
  7. data/lib/aws-sdk-core/assume_role_web_identity_credentials.rb +16 -9
  8. data/lib/aws-sdk-core/binary/decode_handler.rb +3 -9
  9. data/lib/aws-sdk-core/binary/encode_handler.rb +1 -1
  10. data/lib/aws-sdk-core/binary/event_builder.rb +34 -37
  11. data/lib/aws-sdk-core/binary/event_stream_decoder.rb +1 -0
  12. data/lib/aws-sdk-core/binary/event_stream_encoder.rb +4 -3
  13. data/lib/aws-sdk-core/cbor/decoder.rb +308 -0
  14. data/lib/aws-sdk-core/cbor/encoder.rb +243 -0
  15. data/lib/aws-sdk-core/cbor.rb +53 -0
  16. data/lib/aws-sdk-core/client_side_monitoring.rb +9 -0
  17. data/lib/aws-sdk-core/client_stubs.rb +39 -55
  18. data/lib/aws-sdk-core/credential_provider.rb +5 -1
  19. data/lib/aws-sdk-core/credential_provider_chain.rb +101 -25
  20. data/lib/aws-sdk-core/credentials.rb +19 -6
  21. data/lib/aws-sdk-core/ec2_metadata.rb +1 -1
  22. data/lib/aws-sdk-core/ecs_credentials.rb +92 -24
  23. data/lib/aws-sdk-core/endpoints/endpoint.rb +3 -1
  24. data/lib/aws-sdk-core/endpoints/matchers.rb +8 -10
  25. data/lib/aws-sdk-core/endpoints.rb +101 -21
  26. data/lib/aws-sdk-core/error_handler.rb +46 -0
  27. data/lib/aws-sdk-core/errors.rb +16 -4
  28. data/lib/aws-sdk-core/event_emitter.rb +1 -17
  29. data/lib/aws-sdk-core/instance_profile_credentials.rb +168 -155
  30. data/lib/aws-sdk-core/json/builder.rb +8 -1
  31. data/lib/aws-sdk-core/json/error_handler.rb +29 -13
  32. data/lib/aws-sdk-core/json/handler.rb +13 -6
  33. data/lib/aws-sdk-core/json/json_engine.rb +3 -1
  34. data/lib/aws-sdk-core/json/oj_engine.rb +7 -1
  35. data/lib/aws-sdk-core/json/parser.rb +32 -2
  36. data/lib/aws-sdk-core/json.rb +43 -14
  37. data/lib/aws-sdk-core/log/param_filter.rb +2 -2
  38. data/lib/aws-sdk-core/log/param_formatter.rb +7 -3
  39. data/lib/aws-sdk-core/log.rb +10 -0
  40. data/lib/aws-sdk-core/login_credentials.rb +229 -0
  41. data/lib/aws-sdk-core/lru_cache.rb +75 -0
  42. data/lib/aws-sdk-core/pageable_response.rb +1 -1
  43. data/lib/aws-sdk-core/param_validator.rb +7 -2
  44. data/lib/aws-sdk-core/plugins/bearer_authorization.rb +2 -0
  45. data/lib/aws-sdk-core/plugins/checksum_algorithm.rb +347 -168
  46. data/lib/aws-sdk-core/plugins/client_metrics_plugin.rb +1 -1
  47. data/lib/aws-sdk-core/plugins/client_metrics_send_plugin.rb +14 -2
  48. data/lib/aws-sdk-core/plugins/credentials_configuration.rb +78 -56
  49. data/lib/aws-sdk-core/plugins/endpoint_pattern.rb +40 -32
  50. data/lib/aws-sdk-core/plugins/global_configuration.rb +8 -9
  51. data/lib/aws-sdk-core/plugins/http_checksum.rb +3 -8
  52. data/lib/aws-sdk-core/plugins/invocation_id.rb +1 -11
  53. data/lib/aws-sdk-core/plugins/logging.rb +2 -0
  54. data/lib/aws-sdk-core/plugins/protocols/api_gateway.rb +3 -1
  55. data/lib/aws-sdk-core/plugins/protocols/ec2.rb +2 -24
  56. data/lib/aws-sdk-core/plugins/protocols/json_rpc.rb +6 -8
  57. data/lib/aws-sdk-core/plugins/protocols/query.rb +4 -2
  58. data/lib/aws-sdk-core/plugins/protocols/rest_json.rb +3 -15
  59. data/lib/aws-sdk-core/plugins/protocols/rest_xml.rb +3 -0
  60. data/lib/aws-sdk-core/plugins/protocols/rpc_v2.rb +17 -0
  61. data/lib/aws-sdk-core/plugins/regional_endpoint.rb +74 -25
  62. data/lib/aws-sdk-core/plugins/request_compression.rb +11 -2
  63. data/lib/aws-sdk-core/plugins/retry_errors.rb +12 -3
  64. data/lib/aws-sdk-core/plugins/sign.rb +55 -34
  65. data/lib/aws-sdk-core/plugins/signature_v2.rb +2 -1
  66. data/lib/aws-sdk-core/plugins/signature_v4.rb +2 -1
  67. data/lib/aws-sdk-core/plugins/stub_responses.rb +59 -9
  68. data/lib/aws-sdk-core/plugins/telemetry.rb +75 -0
  69. data/lib/aws-sdk-core/plugins/transfer_encoding.rb +16 -9
  70. data/lib/aws-sdk-core/plugins/user_agent.rb +103 -26
  71. data/lib/aws-sdk-core/plugins.rb +39 -0
  72. data/lib/aws-sdk-core/process_credentials.rb +48 -29
  73. data/lib/aws-sdk-core/query/ec2_handler.rb +27 -0
  74. data/lib/aws-sdk-core/query/ec2_param_builder.rb +5 -7
  75. data/lib/aws-sdk-core/query/handler.rb +4 -4
  76. data/lib/aws-sdk-core/query/param_builder.rb +2 -2
  77. data/lib/aws-sdk-core/query.rb +2 -1
  78. data/lib/aws-sdk-core/refreshing_credentials.rb +20 -17
  79. data/lib/aws-sdk-core/resources.rb +8 -0
  80. data/lib/aws-sdk-core/rest/content_type_handler.rb +60 -0
  81. data/lib/aws-sdk-core/rest/handler.rb +3 -4
  82. data/lib/aws-sdk-core/rest/request/body.rb +32 -5
  83. data/lib/aws-sdk-core/rest/request/endpoint.rb +24 -4
  84. data/lib/aws-sdk-core/rest/request/headers.rb +15 -7
  85. data/lib/aws-sdk-core/rest/request/querystring_builder.rb +62 -36
  86. data/lib/aws-sdk-core/rest/response/body.rb +15 -1
  87. data/lib/aws-sdk-core/rest/response/header_list_parser.rb +79 -0
  88. data/lib/aws-sdk-core/rest/response/headers.rb +8 -3
  89. data/lib/aws-sdk-core/rest.rb +1 -0
  90. data/lib/aws-sdk-core/rpc_v2/builder.rb +62 -0
  91. data/lib/aws-sdk-core/rpc_v2/cbor_engine.rb +18 -0
  92. data/lib/aws-sdk-core/rpc_v2/content_type_handler.rb +47 -0
  93. data/lib/aws-sdk-core/rpc_v2/error_handler.rb +95 -0
  94. data/lib/aws-sdk-core/rpc_v2/handler.rb +79 -0
  95. data/lib/aws-sdk-core/rpc_v2/parser.rb +98 -0
  96. data/lib/aws-sdk-core/rpc_v2.rb +69 -0
  97. data/lib/aws-sdk-core/shared_config.rb +110 -22
  98. data/lib/aws-sdk-core/shared_credentials.rb +1 -7
  99. data/lib/aws-sdk-core/sso_credentials.rb +5 -2
  100. data/lib/aws-sdk-core/static_token_provider.rb +1 -2
  101. data/lib/aws-sdk-core/stubbing/protocols/ec2.rb +12 -11
  102. data/lib/aws-sdk-core/stubbing/protocols/json.rb +11 -10
  103. data/lib/aws-sdk-core/stubbing/protocols/query.rb +7 -6
  104. data/lib/aws-sdk-core/stubbing/protocols/rest.rb +2 -1
  105. data/lib/aws-sdk-core/stubbing/protocols/rest_json.rb +9 -8
  106. data/lib/aws-sdk-core/stubbing/protocols/rest_xml.rb +6 -5
  107. data/lib/aws-sdk-core/stubbing/protocols/rpc_v2.rb +39 -0
  108. data/lib/aws-sdk-core/stubbing.rb +22 -0
  109. data/lib/aws-sdk-core/telemetry/base.rb +177 -0
  110. data/lib/aws-sdk-core/telemetry/no_op.rb +70 -0
  111. data/lib/aws-sdk-core/telemetry/otel.rb +235 -0
  112. data/lib/aws-sdk-core/telemetry/span_kind.rb +22 -0
  113. data/lib/aws-sdk-core/telemetry/span_status.rb +59 -0
  114. data/lib/aws-sdk-core/telemetry.rb +78 -0
  115. data/lib/aws-sdk-core/token.rb +3 -3
  116. data/lib/aws-sdk-core/token_provider.rb +4 -0
  117. data/lib/aws-sdk-core/token_provider_chain.rb +2 -6
  118. data/lib/aws-sdk-core/util.rb +41 -1
  119. data/lib/aws-sdk-core/waiters/poller.rb +10 -5
  120. data/lib/aws-sdk-core/xml/builder.rb +17 -9
  121. data/lib/aws-sdk-core/xml/error_handler.rb +35 -43
  122. data/lib/aws-sdk-core/xml/parser/frame.rb +4 -20
  123. data/lib/aws-sdk-core/xml/parser/stack.rb +2 -0
  124. data/lib/aws-sdk-core/xml/parser.rb +2 -6
  125. data/lib/aws-sdk-core.rb +86 -107
  126. data/lib/aws-sdk-signin/client.rb +604 -0
  127. data/lib/aws-sdk-signin/client_api.rb +119 -0
  128. data/lib/aws-sdk-signin/customizations.rb +1 -0
  129. data/lib/aws-sdk-signin/endpoint_parameters.rb +69 -0
  130. data/lib/aws-sdk-signin/endpoint_provider.rb +59 -0
  131. data/lib/aws-sdk-signin/endpoints.rb +20 -0
  132. data/lib/aws-sdk-signin/errors.rb +122 -0
  133. data/lib/aws-sdk-signin/plugins/endpoints.rb +77 -0
  134. data/lib/aws-sdk-signin/resource.rb +26 -0
  135. data/lib/aws-sdk-signin/types.rb +299 -0
  136. data/lib/aws-sdk-signin.rb +63 -0
  137. data/lib/aws-sdk-sso/client.rb +189 -96
  138. data/lib/aws-sdk-sso/client_api.rb +7 -0
  139. data/lib/aws-sdk-sso/endpoint_parameters.rb +13 -10
  140. data/lib/aws-sdk-sso/endpoint_provider.rb +16 -20
  141. data/lib/aws-sdk-sso/endpoints.rb +2 -54
  142. data/lib/aws-sdk-sso/plugins/endpoints.rb +23 -22
  143. data/lib/aws-sdk-sso/types.rb +1 -0
  144. data/lib/aws-sdk-sso.rb +15 -11
  145. data/lib/aws-sdk-ssooidc/client.rb +609 -129
  146. data/lib/aws-sdk-ssooidc/client_api.rb +94 -1
  147. data/lib/aws-sdk-ssooidc/endpoint_parameters.rb +13 -10
  148. data/lib/aws-sdk-ssooidc/endpoint_provider.rb +16 -20
  149. data/lib/aws-sdk-ssooidc/endpoints.rb +2 -40
  150. data/lib/aws-sdk-ssooidc/errors.rb +62 -0
  151. data/lib/aws-sdk-ssooidc/plugins/endpoints.rb +23 -20
  152. data/lib/aws-sdk-ssooidc/types.rb +419 -53
  153. data/lib/aws-sdk-ssooidc.rb +15 -11
  154. data/lib/aws-sdk-sts/client.rb +537 -156
  155. data/lib/aws-sdk-sts/client_api.rb +108 -8
  156. data/lib/aws-sdk-sts/customizations.rb +5 -2
  157. data/lib/aws-sdk-sts/endpoint_parameters.rb +15 -14
  158. data/lib/aws-sdk-sts/endpoint_provider.rb +52 -57
  159. data/lib/aws-sdk-sts/endpoints.rb +2 -118
  160. data/lib/aws-sdk-sts/errors.rb +79 -0
  161. data/lib/aws-sdk-sts/plugins/endpoints.rb +23 -30
  162. data/lib/aws-sdk-sts/presigner.rb +3 -7
  163. data/lib/aws-sdk-sts/types.rb +361 -35
  164. data/lib/aws-sdk-sts.rb +15 -11
  165. data/lib/seahorse/client/async_base.rb +4 -5
  166. data/lib/seahorse/client/async_response.rb +19 -0
  167. data/lib/seahorse/client/base.rb +18 -21
  168. data/lib/seahorse/client/h2/connection.rb +18 -28
  169. data/lib/seahorse/client/h2/handler.rb +19 -3
  170. data/lib/seahorse/client/handler.rb +1 -1
  171. data/lib/seahorse/client/http/response.rb +1 -1
  172. data/lib/seahorse/client/net_http/connection_pool.rb +15 -12
  173. data/lib/seahorse/client/net_http/handler.rb +21 -9
  174. data/lib/seahorse/client/net_http/patches.rb +1 -4
  175. data/lib/seahorse/client/networking_error.rb +1 -1
  176. data/lib/seahorse/client/plugin.rb +9 -0
  177. data/lib/seahorse/client/plugins/endpoint.rb +0 -1
  178. data/lib/seahorse/client/plugins/h2.rb +4 -4
  179. data/lib/seahorse/client/plugins/net_http.rb +57 -16
  180. data/lib/seahorse/client/request_context.rb +9 -2
  181. data/lib/seahorse/client/response.rb +2 -0
  182. data/lib/seahorse/model/shapes.rb +2 -2
  183. data/lib/seahorse/util.rb +2 -1
  184. data/sig/aws-sdk-core/async_client_stubs.rbs +21 -0
  185. data/sig/aws-sdk-core/client_stubs.rbs +10 -0
  186. data/sig/aws-sdk-core/errors.rbs +22 -0
  187. data/sig/aws-sdk-core/resources/collection.rbs +21 -0
  188. data/sig/aws-sdk-core/structure.rbs +4 -0
  189. data/sig/aws-sdk-core/telemetry/base.rbs +46 -0
  190. data/sig/aws-sdk-core/telemetry/otel.rbs +22 -0
  191. data/sig/aws-sdk-core/telemetry/span_kind.rbs +15 -0
  192. data/sig/aws-sdk-core/telemetry/span_status.rbs +24 -0
  193. data/sig/aws-sdk-core/waiters/errors.rbs +20 -0
  194. data/sig/aws-sdk-core.rbs +7 -0
  195. data/sig/seahorse/client/async_base.rbs +18 -0
  196. data/sig/seahorse/client/base.rbs +25 -0
  197. data/sig/seahorse/client/handler_builder.rbs +16 -0
  198. data/sig/seahorse/client/response.rbs +61 -0
  199. metadata +117 -23
  200. /data/lib/aws-sdk-core/xml/parser/{engines/libxml.rb → libxml_engine.rb} +0 -0
  201. /data/lib/aws-sdk-core/xml/parser/{engines/nokogiri.rb → nokogiri_engine.rb} +0 -0
  202. /data/lib/aws-sdk-core/xml/parser/{engines/oga.rb → oga_engine.rb} +0 -0
  203. /data/lib/aws-sdk-core/xml/parser/{engines/ox.rb → ox_engine.rb} +0 -0
  204. /data/lib/aws-sdk-core/xml/parser/{engines/rexml.rb → rexml_engine.rb} +0 -0
@@ -26,10 +26,21 @@ module Aws::STS
26
26
  # that use the temporary security credentials will expose the role
27
27
  # session name to the external account in their CloudTrail logs.
28
28
  #
29
+ # For security purposes, administrators can view this field in
30
+ # [CloudTrail logs][1] to help identify who performed an action in
31
+ # Amazon Web Services. Your administrator might require that you
32
+ # specify your user name as the session name when you assume the role.
33
+ # For more information, see [ `sts:RoleSessionName` ][2].
34
+ #
29
35
  # The regex used to validate this parameter is a string of characters
30
36
  # consisting of upper- and lower-case alphanumeric characters with no
31
37
  # spaces. You can also include underscores or any of the following
32
- # characters: =,.@-
38
+ # characters: +=,.@-
39
+ #
40
+ #
41
+ #
42
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/cloudtrail-integration.html#cloudtrail-integration_signin-tempcreds
43
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_iam-condition-keys.html#ck_rolesessionname
33
44
  # @return [String]
34
45
  #
35
46
  # @!attribute [rw] policy_arns
@@ -101,6 +112,9 @@ module Aws::STS
101
112
  #
102
113
  # </note>
103
114
  #
115
+ # For more information about role session permissions, see [Session
116
+ # policies][1].
117
+ #
104
118
  #
105
119
  #
106
120
  # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
@@ -125,8 +139,7 @@ module Aws::STS
125
139
  # However, if you assume a role using role chaining and provide a
126
140
  # `DurationSeconds` parameter value greater than one hour, the
127
141
  # operation fails. To learn how to view the maximum value for your
128
- # role, see [View the Maximum Session Duration Setting for a Role][1]
129
- # in the *IAM User Guide*.
142
+ # role, see [Update the maximum session duration for a role][1].
130
143
  #
131
144
  # By default, the value is set to `3600` seconds.
132
145
  #
@@ -142,7 +155,7 @@ module Aws::STS
142
155
  #
143
156
  #
144
157
  #
145
- # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html#id_roles_use_view-role-max-session
158
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_update-role-settings.html#id_roles_update-session-duration
146
159
  # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_enable-console-custom-url.html
147
160
  # @return [Integer]
148
161
  #
@@ -199,9 +212,8 @@ module Aws::STS
199
212
  # passes to subsequent sessions in a role chain. For more information,
200
213
  # see [Chaining Roles with Session Tags][1] in the *IAM User Guide*.
201
214
  #
202
- # This parameter is optional. When you set session tags as transitive,
203
- # the session policy and session tags packed binary limit is not
204
- # affected.
215
+ # This parameter is optional. The transitive status of a session tag
216
+ # does not impact its packed binary size.
205
217
  #
206
218
  # If you choose not to specify a transitive tag key, then no tags are
207
219
  # passed from this session to any subsequent sessions.
@@ -228,7 +240,7 @@ module Aws::STS
228
240
  # The regex used to validate this parameter is a string of characters
229
241
  # consisting of upper- and lower-case alphanumeric characters with no
230
242
  # spaces. You can also include underscores or any of the following
231
- # characters: =,.@:/-
243
+ # characters: +=,.@:\\/-
232
244
  #
233
245
  #
234
246
  #
@@ -247,7 +259,7 @@ module Aws::STS
247
259
  # The regex used to validate this parameter is a string of characters
248
260
  # consisting of upper- and lower-case alphanumeric characters with no
249
261
  # spaces. You can also include underscores or any of the following
250
- # characters: =,.@-
262
+ # characters: +=/:,.@-
251
263
  # @return [String]
252
264
  #
253
265
  # @!attribute [rw] token_code
@@ -263,32 +275,44 @@ module Aws::STS
263
275
  #
264
276
  # @!attribute [rw] source_identity
265
277
  # The source identity specified by the principal that is calling the
266
- # `AssumeRole` operation.
278
+ # `AssumeRole` operation. The source identity value persists across
279
+ # [chained role][1] sessions.
267
280
  #
268
281
  # You can require users to specify a source identity when they assume
269
- # a role. You do this by using the `sts:SourceIdentity` condition key
270
- # in a role trust policy. You can use source identity information in
271
- # CloudTrail logs to determine who took actions with a role. You can
272
- # use the `aws:SourceIdentity` condition key to further control access
273
- # to Amazon Web Services resources based on the value of source
274
- # identity. For more information about using source identity, see
275
- # [Monitor and control actions taken with assumed roles][1] in the
276
- # *IAM User Guide*.
282
+ # a role. You do this by using the [ `sts:SourceIdentity` ][2]
283
+ # condition key in a role trust policy. You can use source identity
284
+ # information in CloudTrail logs to determine who took actions with a
285
+ # role. You can use the `aws:SourceIdentity` condition key to further
286
+ # control access to Amazon Web Services resources based on the value
287
+ # of source identity. For more information about using source
288
+ # identity, see [Monitor and control actions taken with assumed
289
+ # roles][3] in the *IAM User Guide*.
277
290
  #
278
291
  # The regex used to validate this parameter is a string of characters
279
292
  # consisting of upper- and lower-case alphanumeric characters with no
280
293
  # spaces. You can also include underscores or any of the following
281
- # characters: =,.@-. You cannot use a value that begins with the text
294
+ # characters: +=,.@-. You cannot use a value that begins with the text
282
295
  # `aws:`. This prefix is reserved for Amazon Web Services internal
283
296
  # use.
284
297
  #
285
298
  #
286
299
  #
287
- # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_monitor.html
300
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles.html#iam-term-role-chaining
301
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html#condition-keys-sourceidentity
302
+ # [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_monitor.html
288
303
  # @return [String]
289
304
  #
290
305
  # @!attribute [rw] provided_contexts
291
- # Reserved for future use.
306
+ # A list of previously acquired trusted context assertions in the
307
+ # format of a JSON array. The trusted context assertion is signed and
308
+ # encrypted by Amazon Web Services STS.
309
+ #
310
+ # The following is an example of a `ProvidedContext` value that
311
+ # includes a single trusted context assertion and the ARN of the
312
+ # context provider from which the trusted context assertion was
313
+ # generated.
314
+ #
315
+ # `[{"ProviderArn":"arn:aws:iam::aws:contextProvider/IdentityCenter","ContextAssertion":"trusted-context-assertion"}]`
292
316
  # @return [Array<Types::ProvidedContext>]
293
317
  #
294
318
  # @see http://docs.aws.amazon.com/goto/WebAPI/sts-2011-06-15/AssumeRoleRequest AWS API Documentation
@@ -456,6 +480,9 @@ module Aws::STS
456
480
  # include the tab (\\u0009), linefeed (\\u000A), and carriage return
457
481
  # (\\u000D) characters.
458
482
  #
483
+ # For more information about role session permissions, see [Session
484
+ # policies][1].
485
+ #
459
486
  # <note markdown="1"> An Amazon Web Services conversion compresses the passed inline
460
487
  # session policy, managed policy ARNs, and session tags into a packed
461
488
  # binary format that has a separate limit. Your request can fail for
@@ -591,6 +618,8 @@ module Aws::STS
591
618
  #
592
619
  # @!attribute [rw] source_identity
593
620
  # The value in the `SourceIdentity` attribute in the SAML assertion.
621
+ # The source identity value persists across [chained role][1]
622
+ # sessions.
594
623
  #
595
624
  # You can require users to set a source identity value when they
596
625
  # assume a role. You do this by using the `sts:SourceIdentity`
@@ -598,12 +627,12 @@ module Aws::STS
598
627
  # taken with the role are associated with that user. After the source
599
628
  # identity is set, the value cannot be changed. It is present in the
600
629
  # request for all actions that are taken by the role and persists
601
- # across [chained role][1] sessions. You can configure your SAML
630
+ # across [chained role][2] sessions. You can configure your SAML
602
631
  # identity provider to use an attribute associated with your users,
603
632
  # like user name or email, as the source identity when calling
604
633
  # `AssumeRoleWithSAML`. You do this by adding an attribute to the SAML
605
634
  # assertion. For more information about using source identity, see
606
- # [Monitor and control actions taken with assumed roles][2] in the
635
+ # [Monitor and control actions taken with assumed roles][3] in the
607
636
  # *IAM User Guide*.
608
637
  #
609
638
  # The regex used to validate this parameter is a string of characters
@@ -613,8 +642,9 @@ module Aws::STS
613
642
  #
614
643
  #
615
644
  #
616
- # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_terms-and-concepts#iam-term-role-chaining
617
- # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_monitor.html
645
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles.html#iam-term-role-chaining
646
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles.html#id_roles_terms-and-concepts
647
+ # [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_monitor.html
618
648
  # @return [String]
619
649
  #
620
650
  # @see http://docs.aws.amazon.com/goto/WebAPI/sts-2011-06-15/AssumeRoleWithSAMLResponse AWS API Documentation
@@ -636,6 +666,24 @@ module Aws::STS
636
666
  # @!attribute [rw] role_arn
637
667
  # The Amazon Resource Name (ARN) of the role that the caller is
638
668
  # assuming.
669
+ #
670
+ # <note markdown="1"> Additional considerations apply to Amazon Cognito identity pools
671
+ # that assume [cross-account IAM roles][1]. The trust policies of
672
+ # these roles must accept the `cognito-identity.amazonaws.com` service
673
+ # principal and must contain the `cognito-identity.amazonaws.com:aud`
674
+ # condition key to restrict role assumption to users from your
675
+ # intended identity pools. A policy that trusts Amazon Cognito
676
+ # identity pools without this condition creates a risk that a user
677
+ # from an unintended identity pool can assume the role. For more
678
+ # information, see [ Trust policies for IAM roles in Basic (Classic)
679
+ # authentication ][2] in the *Amazon Cognito Developer Guide*.
680
+ #
681
+ # </note>
682
+ #
683
+ #
684
+ #
685
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies-cross-account-resource-access.html
686
+ # [2]: https://docs.aws.amazon.com/cognito/latest/developerguide/iam-roles.html#trust-policies
639
687
  # @return [String]
640
688
  #
641
689
  # @!attribute [rw] role_session_name
@@ -646,10 +694,21 @@ module Aws::STS
646
694
  # session name is included as part of the ARN and assumed role ID in
647
695
  # the `AssumedRoleUser` response element.
648
696
  #
697
+ # For security purposes, administrators can view this field in
698
+ # [CloudTrail logs][1] to help identify who performed an action in
699
+ # Amazon Web Services. Your administrator might require that you
700
+ # specify your user name as the session name when you assume the role.
701
+ # For more information, see [ `sts:RoleSessionName` ][2].
702
+ #
649
703
  # The regex used to validate this parameter is a string of characters
650
704
  # consisting of upper- and lower-case alphanumeric characters with no
651
705
  # spaces. You can also include underscores or any of the following
652
706
  # characters: =,.@-
707
+ #
708
+ #
709
+ #
710
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/cloudtrail-integration.html#cloudtrail-integration_signin-tempcreds
711
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_iam-condition-keys.html#ck_rolesessionname
653
712
  # @return [String]
654
713
  #
655
714
  # @!attribute [rw] web_identity_token
@@ -657,8 +716,10 @@ module Aws::STS
657
716
  # provided by the identity provider. Your application must get this
658
717
  # token by authenticating the user who is using your application with
659
718
  # a web identity provider before the application makes an
660
- # `AssumeRoleWithWebIdentity` call. Only tokens with RSA algorithms
661
- # (RS256) are supported.
719
+ # `AssumeRoleWithWebIdentity` call. Timestamps in the token must be
720
+ # formatted as either an integer or a long integer. Tokens must be
721
+ # signed using either RSA keys (RS256, RS384, or RS512) or ECDSA keys
722
+ # (ES256, ES384, or ES512).
662
723
  # @return [String]
663
724
  #
664
725
  # @!attribute [rw] provider_id
@@ -732,6 +793,9 @@ module Aws::STS
732
793
  # include the tab (\\u0009), linefeed (\\u000A), and carriage return
733
794
  # (\\u000D) characters.
734
795
  #
796
+ # For more information about role session permissions, see [Session
797
+ # policies][1].
798
+ #
735
799
  # <note markdown="1"> An Amazon Web Services conversion compresses the passed inline
736
800
  # session policy, managed policy ARNs, and session tags into a packed
737
801
  # binary format that has a separate limit. Your request can fail for
@@ -872,7 +936,7 @@ module Aws::STS
872
936
  #
873
937
  #
874
938
  #
875
- # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_terms-and-concepts#iam-term-role-chaining
939
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles.html#id_roles_terms-and-concepts
876
940
  # [2]: https://docs.aws.amazon.com/cognito/latest/developerguide/amazon-cognito-user-pools-using-tokens-with-identity-providers.html
877
941
  # [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_monitor.html
878
942
  # @return [String]
@@ -891,6 +955,92 @@ module Aws::STS
891
955
  include Aws::Structure
892
956
  end
893
957
 
958
+ # @!attribute [rw] target_principal
959
+ # The member account principal ARN or account ID.
960
+ # @return [String]
961
+ #
962
+ # @!attribute [rw] task_policy_arn
963
+ # The identity based policy that scopes the session to the privileged
964
+ # tasks that can be performed. You must use one of following Amazon
965
+ # Web Services managed policies to scope root session actions:
966
+ #
967
+ # * [IAMAuditRootUserCredentials][1]
968
+ #
969
+ # * [IAMCreateRootUserPassword][2]
970
+ #
971
+ # * [IAMDeleteRootUserCredentials][3]
972
+ #
973
+ # * [S3UnlockBucketPolicy][4]
974
+ #
975
+ # * [SQSUnlockQueuePolicy][5]
976
+ #
977
+ #
978
+ #
979
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/security-iam-awsmanpol.html#security-iam-awsmanpol-IAMAuditRootUserCredentials
980
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/security-iam-awsmanpol.html#security-iam-awsmanpol-IAMCreateRootUserPassword
981
+ # [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/security-iam-awsmanpol.html#security-iam-awsmanpol-IAMDeleteRootUserCredentials
982
+ # [4]: https://docs.aws.amazon.com/IAM/latest/UserGuide/security-iam-awsmanpol.html#security-iam-awsmanpol-S3UnlockBucketPolicy
983
+ # [5]: https://docs.aws.amazon.com/IAM/latest/UserGuide/security-iam-awsmanpol.html#security-iam-awsmanpol-SQSUnlockQueuePolicy
984
+ # @return [Types::PolicyDescriptorType]
985
+ #
986
+ # @!attribute [rw] duration_seconds
987
+ # The duration, in seconds, of the privileged session. The value can
988
+ # range from 0 seconds up to the maximum session duration of 900
989
+ # seconds (15 minutes). If you specify a value higher than this
990
+ # setting, the operation fails.
991
+ #
992
+ # By default, the value is set to `900` seconds.
993
+ # @return [Integer]
994
+ #
995
+ # @see http://docs.aws.amazon.com/goto/WebAPI/sts-2011-06-15/AssumeRootRequest AWS API Documentation
996
+ #
997
+ class AssumeRootRequest < Struct.new(
998
+ :target_principal,
999
+ :task_policy_arn,
1000
+ :duration_seconds)
1001
+ SENSITIVE = []
1002
+ include Aws::Structure
1003
+ end
1004
+
1005
+ # @!attribute [rw] credentials
1006
+ # The temporary security credentials, which include an access key ID,
1007
+ # a secret access key, and a security token.
1008
+ #
1009
+ # <note markdown="1"> The size of the security token that STS API operations return is not
1010
+ # fixed. We strongly recommend that you make no assumptions about the
1011
+ # maximum size.
1012
+ #
1013
+ # </note>
1014
+ # @return [Types::Credentials]
1015
+ #
1016
+ # @!attribute [rw] source_identity
1017
+ # The source identity specified by the principal that is calling the
1018
+ # `AssumeRoot` operation.
1019
+ #
1020
+ # You can use the `aws:SourceIdentity` condition key to control access
1021
+ # based on the value of source identity. For more information about
1022
+ # using source identity, see [Monitor and control actions taken with
1023
+ # assumed roles][1] in the *IAM User Guide*.
1024
+ #
1025
+ # The regex used to validate this parameter is a string of characters
1026
+ # consisting of upper- and lower-case alphanumeric characters with no
1027
+ # spaces. You can also include underscores or any of the following
1028
+ # characters: =,.@-
1029
+ #
1030
+ #
1031
+ #
1032
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_monitor.html
1033
+ # @return [String]
1034
+ #
1035
+ # @see http://docs.aws.amazon.com/goto/WebAPI/sts-2011-06-15/AssumeRootResponse AWS API Documentation
1036
+ #
1037
+ class AssumeRootResponse < Struct.new(
1038
+ :credentials,
1039
+ :source_identity)
1040
+ SENSITIVE = []
1041
+ include Aws::Structure
1042
+ end
1043
+
894
1044
  # The identifiers for the temporary security credentials that the
895
1045
  # operation returns.
896
1046
  #
@@ -994,6 +1144,21 @@ module Aws::STS
994
1144
  include Aws::Structure
995
1145
  end
996
1146
 
1147
+ # The trade-in token provided in the request has expired and can no
1148
+ # longer be exchanged for credentials. Request a new token and retry the
1149
+ # operation.
1150
+ #
1151
+ # @!attribute [rw] message
1152
+ # @return [String]
1153
+ #
1154
+ # @see http://docs.aws.amazon.com/goto/WebAPI/sts-2011-06-15/ExpiredTradeInTokenException AWS API Documentation
1155
+ #
1156
+ class ExpiredTradeInTokenException < Struct.new(
1157
+ :message)
1158
+ SENSITIVE = []
1159
+ include Aws::Structure
1160
+ end
1161
+
997
1162
  # Identifiers for the federated user that is associated with the
998
1163
  # credentials.
999
1164
  #
@@ -1089,6 +1254,47 @@ module Aws::STS
1089
1254
  include Aws::Structure
1090
1255
  end
1091
1256
 
1257
+ # @!attribute [rw] trade_in_token
1258
+ # The token to exchange for temporary Amazon Web Services credentials.
1259
+ # This token must be valid and unexpired at the time of the request.
1260
+ # @return [String]
1261
+ #
1262
+ # @see http://docs.aws.amazon.com/goto/WebAPI/sts-2011-06-15/GetDelegatedAccessTokenRequest AWS API Documentation
1263
+ #
1264
+ class GetDelegatedAccessTokenRequest < Struct.new(
1265
+ :trade_in_token)
1266
+ SENSITIVE = [:trade_in_token]
1267
+ include Aws::Structure
1268
+ end
1269
+
1270
+ # @!attribute [rw] credentials
1271
+ # Amazon Web Services credentials for API authentication.
1272
+ # @return [Types::Credentials]
1273
+ #
1274
+ # @!attribute [rw] packed_policy_size
1275
+ # The percentage of the maximum policy size that is used by the
1276
+ # session policy. The policy size is calculated as the sum of all the
1277
+ # session policies and permission boundaries attached to the session.
1278
+ # If the packed size exceeds 100%, the request fails.
1279
+ # @return [Integer]
1280
+ #
1281
+ # @!attribute [rw] assumed_principal
1282
+ # The Amazon Resource Name (ARN) of the principal that was assumed
1283
+ # when obtaining the delegated access token. This ARN identifies the
1284
+ # IAM entity whose permissions are granted by the temporary
1285
+ # credentials.
1286
+ # @return [String]
1287
+ #
1288
+ # @see http://docs.aws.amazon.com/goto/WebAPI/sts-2011-06-15/GetDelegatedAccessTokenResponse AWS API Documentation
1289
+ #
1290
+ class GetDelegatedAccessTokenResponse < Struct.new(
1291
+ :credentials,
1292
+ :packed_policy_size,
1293
+ :assumed_principal)
1294
+ SENSITIVE = []
1295
+ include Aws::Structure
1296
+ end
1297
+
1092
1298
  # @!attribute [rw] name
1093
1299
  # The name of the federated user. The name is used as an identifier
1094
1300
  # for the temporary security credentials (such as `Bob`). For example,
@@ -1372,6 +1578,73 @@ module Aws::STS
1372
1578
  include Aws::Structure
1373
1579
  end
1374
1580
 
1581
+ # @!attribute [rw] audience
1582
+ # The intended recipient of the web identity token. This value
1583
+ # populates the `aud` claim in the JWT and should identify the service
1584
+ # or application that will validate and use the token. The external
1585
+ # service should verify this claim to ensure the token was intended
1586
+ # for their use.
1587
+ # @return [Array<String>]
1588
+ #
1589
+ # @!attribute [rw] duration_seconds
1590
+ # The duration, in seconds, for which the JSON Web Token (JWT) will
1591
+ # remain valid. The value can range from 60 seconds (1 minute) to 3600
1592
+ # seconds (1 hour). If not specified, the default duration is 300
1593
+ # seconds (5 minutes). The token is designed to be short-lived and
1594
+ # should be used for proof of identity, then exchanged for credentials
1595
+ # or short-lived tokens in the external service.
1596
+ # @return [Integer]
1597
+ #
1598
+ # @!attribute [rw] signing_algorithm
1599
+ # The cryptographic algorithm to use for signing the JSON Web Token
1600
+ # (JWT). Valid values are RS256 (RSA with SHA-256) and ES384 (ECDSA
1601
+ # using P-384 curve with SHA-384).
1602
+ # @return [String]
1603
+ #
1604
+ # @!attribute [rw] tags
1605
+ # An optional list of tags to include in the JSON Web Token (JWT).
1606
+ # These tags are added as custom claims to the JWT and can be used by
1607
+ # the downstream service for authorization decisions.
1608
+ # @return [Array<Types::Tag>]
1609
+ #
1610
+ # @see http://docs.aws.amazon.com/goto/WebAPI/sts-2011-06-15/GetWebIdentityTokenRequest AWS API Documentation
1611
+ #
1612
+ class GetWebIdentityTokenRequest < Struct.new(
1613
+ :audience,
1614
+ :duration_seconds,
1615
+ :signing_algorithm,
1616
+ :tags)
1617
+ SENSITIVE = []
1618
+ include Aws::Structure
1619
+ end
1620
+
1621
+ # @!attribute [rw] web_identity_token
1622
+ # A signed JSON Web Token (JWT) that represents the caller's Amazon
1623
+ # Web Services identity. The token contains standard JWT claims such
1624
+ # as subject, audience, expiration time, and additional identity
1625
+ # attributes added by STS as custom claims. You can also add your own
1626
+ # custom claims to the token by passing tags as request parameters to
1627
+ # the `GetWebIdentityToken` API. The token is signed using the
1628
+ # specified signing algorithm and can be verified using the
1629
+ # verification keys available at the issuer's JWKS endpoint.
1630
+ # @return [String]
1631
+ #
1632
+ # @!attribute [rw] expiration
1633
+ # The date and time when the web identity token expires, in UTC. The
1634
+ # expiration is determined by adding the `DurationSeconds` value to
1635
+ # the time the token was issued. After this time, the token should no
1636
+ # longer be considered valid.
1637
+ # @return [Time]
1638
+ #
1639
+ # @see http://docs.aws.amazon.com/goto/WebAPI/sts-2011-06-15/GetWebIdentityTokenResponse AWS API Documentation
1640
+ #
1641
+ class GetWebIdentityTokenResponse < Struct.new(
1642
+ :web_identity_token,
1643
+ :expiration)
1644
+ SENSITIVE = [:web_identity_token]
1645
+ include Aws::Structure
1646
+ end
1647
+
1375
1648
  # The request could not be fulfilled because the identity provider (IDP)
1376
1649
  # that was asked to verify the incoming identity token could not be
1377
1650
  # reached. This is often a transient error caused by network conditions.
@@ -1410,7 +1683,8 @@ module Aws::STS
1410
1683
 
1411
1684
  # The error returned if the message passed to
1412
1685
  # `DecodeAuthorizationMessage` was invalid. This can happen if the token
1413
- # contains invalid characters, such as linebreaks.
1686
+ # contains invalid characters, such as line breaks, or if the message
1687
+ # has expired.
1414
1688
  #
1415
1689
  # @!attribute [rw] message
1416
1690
  # @return [String]
@@ -1438,6 +1712,21 @@ module Aws::STS
1438
1712
  include Aws::Structure
1439
1713
  end
1440
1714
 
1715
+ # The requested token payload size exceeds the maximum allowed size.
1716
+ # Reduce the number of request tags included in the
1717
+ # `GetWebIdentityToken` API call to reduce the token payload size.
1718
+ #
1719
+ # @!attribute [rw] message
1720
+ # @return [String]
1721
+ #
1722
+ # @see http://docs.aws.amazon.com/goto/WebAPI/sts-2011-06-15/JWTPayloadSizeExceededException AWS API Documentation
1723
+ #
1724
+ class JWTPayloadSizeExceededException < Struct.new(
1725
+ :message)
1726
+ SENSITIVE = []
1727
+ include Aws::Structure
1728
+ end
1729
+
1441
1730
  # The request was rejected because the policy document was malformed.
1442
1731
  # The error message describes the specific error.
1443
1732
  #
@@ -1452,6 +1741,21 @@ module Aws::STS
1452
1741
  include Aws::Structure
1453
1742
  end
1454
1743
 
1744
+ # The outbound web identity federation feature is not enabled for this
1745
+ # account. To use this feature, you must first enable it through the
1746
+ # Amazon Web Services Management Console or API.
1747
+ #
1748
+ # @!attribute [rw] message
1749
+ # @return [String]
1750
+ #
1751
+ # @see http://docs.aws.amazon.com/goto/WebAPI/sts-2011-06-15/OutboundWebIdentityFederationDisabledException AWS API Documentation
1752
+ #
1753
+ class OutboundWebIdentityFederationDisabledException < Struct.new(
1754
+ :message)
1755
+ SENSITIVE = []
1756
+ include Aws::Structure
1757
+ end
1758
+
1455
1759
  # The request was rejected because the total packed size of the session
1456
1760
  # policies and session tags combined was too large. An Amazon Web
1457
1761
  # Services conversion compresses the session policy document, session
@@ -1503,14 +1807,19 @@ module Aws::STS
1503
1807
  include Aws::Structure
1504
1808
  end
1505
1809
 
1506
- # Reserved for future use.
1810
+ # Contains information about the provided context. This includes the
1811
+ # signed and encrypted trusted context assertion and the context
1812
+ # provider ARN from which the trusted context assertion was generated.
1507
1813
  #
1508
1814
  # @!attribute [rw] provider_arn
1509
- # Reserved for future use.
1815
+ # The context provider ARN from which the trusted context assertion
1816
+ # was generated.
1510
1817
  # @return [String]
1511
1818
  #
1512
1819
  # @!attribute [rw] context_assertion
1513
- # Reserved for future use.
1820
+ # The signed and encrypted trusted context assertion generated by the
1821
+ # context provider. The trusted context assertion is signed and
1822
+ # encrypted by Amazon Web Services STS.
1514
1823
  # @return [String]
1515
1824
  #
1516
1825
  # @see http://docs.aws.amazon.com/goto/WebAPI/sts-2011-06-15/ProvidedContext AWS API Documentation
@@ -1525,12 +1834,12 @@ module Aws::STS
1525
1834
  # STS is not activated in the requested region for the account that is
1526
1835
  # being asked to generate credentials. The account administrator must
1527
1836
  # use the IAM console to activate STS in that region. For more
1528
- # information, see [Activating and Deactivating Amazon Web Services STS
1529
- # in an Amazon Web Services Region][1] in the *IAM User Guide*.
1837
+ # information, see [Activating and Deactivating STS in an Amazon Web
1838
+ # Services Region][1] in the *IAM User Guide*.
1530
1839
  #
1531
1840
  #
1532
1841
  #
1533
- # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html
1842
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html#sts-regions-activate-deactivate
1534
1843
  #
1535
1844
  # @!attribute [rw] message
1536
1845
  # @return [String]
@@ -1543,6 +1852,22 @@ module Aws::STS
1543
1852
  include Aws::Structure
1544
1853
  end
1545
1854
 
1855
+ # The requested token duration would extend the session beyond its
1856
+ # original expiration time. You cannot use this operation to extend the
1857
+ # lifetime of a session beyond what was granted when the session was
1858
+ # originally created.
1859
+ #
1860
+ # @!attribute [rw] message
1861
+ # @return [String]
1862
+ #
1863
+ # @see http://docs.aws.amazon.com/goto/WebAPI/sts-2011-06-15/SessionDurationEscalationException AWS API Documentation
1864
+ #
1865
+ class SessionDurationEscalationException < Struct.new(
1866
+ :message)
1867
+ SENSITIVE = []
1868
+ include Aws::Structure
1869
+ end
1870
+
1546
1871
  # You can pass custom key-value pair attributes when you assume a role
1547
1872
  # or federate a user. These are called session tags. You can then use
1548
1873
  # the session tags to control access to resources. For more information,
@@ -1588,3 +1913,4 @@ module Aws::STS
1588
1913
 
1589
1914
  end
1590
1915
  end
1916
+
data/lib/aws-sdk-sts.rb CHANGED
@@ -13,16 +13,7 @@ unless Module.const_defined?(:Aws)
13
13
  require 'aws-sigv4'
14
14
  end
15
15
 
16
- require_relative 'aws-sdk-sts/types'
17
- require_relative 'aws-sdk-sts/client_api'
18
- require_relative 'aws-sdk-sts/plugins/endpoints.rb'
19
- require_relative 'aws-sdk-sts/client'
20
- require_relative 'aws-sdk-sts/errors'
21
- require_relative 'aws-sdk-sts/resource'
22
- require_relative 'aws-sdk-sts/endpoint_parameters'
23
- require_relative 'aws-sdk-sts/endpoint_provider'
24
- require_relative 'aws-sdk-sts/endpoints'
25
- require_relative 'aws-sdk-sts/customizations'
16
+ Aws::Plugins::GlobalConfiguration.add_identifier(:sts)
26
17
 
27
18
  # This module provides support for AWS Security Token Service. This module is available in the
28
19
  # `aws-sdk-core` gem.
@@ -53,7 +44,20 @@ require_relative 'aws-sdk-sts/customizations'
53
44
  #
54
45
  # @!group service
55
46
  module Aws::STS
47
+ autoload :Types, 'aws-sdk-sts/types'
48
+ autoload :ClientApi, 'aws-sdk-sts/client_api'
49
+ module Plugins
50
+ autoload :Endpoints, 'aws-sdk-sts/plugins/endpoints.rb'
51
+ end
52
+ autoload :Client, 'aws-sdk-sts/client'
53
+ autoload :Errors, 'aws-sdk-sts/errors'
54
+ autoload :Resource, 'aws-sdk-sts/resource'
55
+ autoload :EndpointParameters, 'aws-sdk-sts/endpoint_parameters'
56
+ autoload :EndpointProvider, 'aws-sdk-sts/endpoint_provider'
57
+ autoload :Endpoints, 'aws-sdk-sts/endpoints'
56
58
 
57
- GEM_VERSION = '3.185.1'
59
+ GEM_VERSION = '3.240.0'
58
60
 
59
61
  end
62
+
63
+ require_relative 'aws-sdk-sts/customizations'
@@ -3,8 +3,8 @@
3
3
  module Seahorse
4
4
  module Client
5
5
  class AsyncBase < Seahorse::Client::Base
6
-
7
6
  # default H2 plugins
7
+ # @api private
8
8
  @plugins = PluginList.new([
9
9
  Plugins::Endpoint,
10
10
  Plugins::H2,
@@ -12,9 +12,8 @@ module Seahorse
12
12
  ])
13
13
 
14
14
  def initialize(plugins, options)
15
- super
16
- @connection = H2::Connection.new(options)
17
- @options = options
15
+ super(plugins, options)
16
+ @connection = H2::Connection.new(@config)
18
17
  end
19
18
 
20
19
  # @return [H2::Connection]
@@ -36,7 +35,7 @@ module Seahorse
36
35
  # @return [Seahorse::Client::H2::Connection]
37
36
  def new_connection
38
37
  if @connection.closed?
39
- @connection = H2::Connection.new(@options)
38
+ @connection = H2::Connection.new(@config)
40
39
  else
41
40
  @connection
42
41
  end