aws-sdk-core 3.190.2 → 3.240.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +650 -0
- data/VERSION +1 -1
- data/lib/aws-defaults.rb +4 -1
- data/lib/aws-sdk-core/arn.rb +1 -3
- data/lib/aws-sdk-core/assume_role_credentials.rb +21 -13
- data/lib/aws-sdk-core/assume_role_web_identity_credentials.rb +16 -9
- data/lib/aws-sdk-core/binary/decode_handler.rb +3 -9
- data/lib/aws-sdk-core/binary/encode_handler.rb +1 -1
- data/lib/aws-sdk-core/binary/event_builder.rb +34 -37
- data/lib/aws-sdk-core/binary/event_stream_decoder.rb +1 -0
- data/lib/aws-sdk-core/binary/event_stream_encoder.rb +4 -3
- data/lib/aws-sdk-core/cbor/decoder.rb +308 -0
- data/lib/aws-sdk-core/cbor/encoder.rb +243 -0
- data/lib/aws-sdk-core/cbor.rb +53 -0
- data/lib/aws-sdk-core/client_side_monitoring.rb +9 -0
- data/lib/aws-sdk-core/client_stubs.rb +39 -58
- data/lib/aws-sdk-core/credential_provider.rb +5 -1
- data/lib/aws-sdk-core/credential_provider_chain.rb +101 -25
- data/lib/aws-sdk-core/credentials.rb +19 -6
- data/lib/aws-sdk-core/ec2_metadata.rb +1 -1
- data/lib/aws-sdk-core/ecs_credentials.rb +16 -14
- data/lib/aws-sdk-core/endpoints/endpoint.rb +3 -1
- data/lib/aws-sdk-core/endpoints/matchers.rb +8 -10
- data/lib/aws-sdk-core/endpoints.rb +101 -21
- data/lib/aws-sdk-core/error_handler.rb +46 -0
- data/lib/aws-sdk-core/errors.rb +16 -4
- data/lib/aws-sdk-core/event_emitter.rb +1 -17
- data/lib/aws-sdk-core/instance_profile_credentials.rb +148 -157
- data/lib/aws-sdk-core/json/builder.rb +8 -1
- data/lib/aws-sdk-core/json/error_handler.rb +29 -13
- data/lib/aws-sdk-core/json/handler.rb +6 -6
- data/lib/aws-sdk-core/json/json_engine.rb +3 -1
- data/lib/aws-sdk-core/json/oj_engine.rb +7 -1
- data/lib/aws-sdk-core/json/parser.rb +6 -1
- data/lib/aws-sdk-core/json.rb +43 -14
- data/lib/aws-sdk-core/log/param_filter.rb +2 -2
- data/lib/aws-sdk-core/log/param_formatter.rb +7 -3
- data/lib/aws-sdk-core/log.rb +10 -0
- data/lib/aws-sdk-core/login_credentials.rb +229 -0
- data/lib/aws-sdk-core/lru_cache.rb +75 -0
- data/lib/aws-sdk-core/pageable_response.rb +1 -1
- data/lib/aws-sdk-core/param_validator.rb +7 -2
- data/lib/aws-sdk-core/plugins/bearer_authorization.rb +2 -0
- data/lib/aws-sdk-core/plugins/checksum_algorithm.rb +347 -170
- data/lib/aws-sdk-core/plugins/client_metrics_plugin.rb +1 -1
- data/lib/aws-sdk-core/plugins/client_metrics_send_plugin.rb +14 -2
- data/lib/aws-sdk-core/plugins/credentials_configuration.rb +78 -56
- data/lib/aws-sdk-core/plugins/endpoint_pattern.rb +40 -32
- data/lib/aws-sdk-core/plugins/global_configuration.rb +8 -9
- data/lib/aws-sdk-core/plugins/http_checksum.rb +2 -8
- data/lib/aws-sdk-core/plugins/invocation_id.rb +1 -11
- data/lib/aws-sdk-core/plugins/logging.rb +2 -0
- data/lib/aws-sdk-core/plugins/protocols/api_gateway.rb +3 -1
- data/lib/aws-sdk-core/plugins/protocols/ec2.rb +2 -24
- data/lib/aws-sdk-core/plugins/protocols/json_rpc.rb +6 -8
- data/lib/aws-sdk-core/plugins/protocols/query.rb +4 -2
- data/lib/aws-sdk-core/plugins/protocols/rest_json.rb +3 -15
- data/lib/aws-sdk-core/plugins/protocols/rest_xml.rb +3 -0
- data/lib/aws-sdk-core/plugins/protocols/rpc_v2.rb +17 -0
- data/lib/aws-sdk-core/plugins/regional_endpoint.rb +74 -25
- data/lib/aws-sdk-core/plugins/request_compression.rb +11 -2
- data/lib/aws-sdk-core/plugins/retry_errors.rb +12 -3
- data/lib/aws-sdk-core/plugins/sign.rb +42 -26
- data/lib/aws-sdk-core/plugins/signature_v2.rb +2 -1
- data/lib/aws-sdk-core/plugins/signature_v4.rb +2 -1
- data/lib/aws-sdk-core/plugins/stub_responses.rb +59 -9
- data/lib/aws-sdk-core/plugins/telemetry.rb +75 -0
- data/lib/aws-sdk-core/plugins/transfer_encoding.rb +16 -9
- data/lib/aws-sdk-core/plugins/user_agent.rb +103 -26
- data/lib/aws-sdk-core/plugins.rb +39 -0
- data/lib/aws-sdk-core/process_credentials.rb +48 -29
- data/lib/aws-sdk-core/query/ec2_handler.rb +27 -0
- data/lib/aws-sdk-core/query/ec2_param_builder.rb +5 -7
- data/lib/aws-sdk-core/query/handler.rb +4 -4
- data/lib/aws-sdk-core/query/param_builder.rb +2 -2
- data/lib/aws-sdk-core/query.rb +2 -1
- data/lib/aws-sdk-core/refreshing_credentials.rb +8 -11
- data/lib/aws-sdk-core/resources.rb +8 -0
- data/lib/aws-sdk-core/rest/content_type_handler.rb +60 -0
- data/lib/aws-sdk-core/rest/handler.rb +3 -4
- data/lib/aws-sdk-core/rest/request/body.rb +32 -5
- data/lib/aws-sdk-core/rest/request/endpoint.rb +24 -4
- data/lib/aws-sdk-core/rest/request/headers.rb +15 -7
- data/lib/aws-sdk-core/rest/request/querystring_builder.rb +23 -11
- data/lib/aws-sdk-core/rest/response/body.rb +15 -1
- data/lib/aws-sdk-core/rest/response/header_list_parser.rb +79 -0
- data/lib/aws-sdk-core/rest/response/headers.rb +8 -3
- data/lib/aws-sdk-core/rest.rb +1 -0
- data/lib/aws-sdk-core/rpc_v2/builder.rb +62 -0
- data/lib/aws-sdk-core/rpc_v2/cbor_engine.rb +18 -0
- data/lib/aws-sdk-core/rpc_v2/content_type_handler.rb +47 -0
- data/lib/aws-sdk-core/rpc_v2/error_handler.rb +95 -0
- data/lib/aws-sdk-core/rpc_v2/handler.rb +79 -0
- data/lib/aws-sdk-core/rpc_v2/parser.rb +98 -0
- data/lib/aws-sdk-core/rpc_v2.rb +69 -0
- data/lib/aws-sdk-core/shared_config.rb +108 -22
- data/lib/aws-sdk-core/shared_credentials.rb +1 -7
- data/lib/aws-sdk-core/sso_credentials.rb +5 -2
- data/lib/aws-sdk-core/static_token_provider.rb +1 -2
- data/lib/aws-sdk-core/stubbing/protocols/ec2.rb +12 -11
- data/lib/aws-sdk-core/stubbing/protocols/json.rb +11 -10
- data/lib/aws-sdk-core/stubbing/protocols/query.rb +7 -6
- data/lib/aws-sdk-core/stubbing/protocols/rest.rb +2 -1
- data/lib/aws-sdk-core/stubbing/protocols/rest_json.rb +9 -8
- data/lib/aws-sdk-core/stubbing/protocols/rest_xml.rb +6 -5
- data/lib/aws-sdk-core/stubbing/protocols/rpc_v2.rb +39 -0
- data/lib/aws-sdk-core/stubbing.rb +22 -0
- data/lib/aws-sdk-core/telemetry/base.rb +177 -0
- data/lib/aws-sdk-core/telemetry/no_op.rb +70 -0
- data/lib/aws-sdk-core/telemetry/otel.rb +235 -0
- data/lib/aws-sdk-core/telemetry/span_kind.rb +22 -0
- data/lib/aws-sdk-core/telemetry/span_status.rb +59 -0
- data/lib/aws-sdk-core/telemetry.rb +78 -0
- data/lib/aws-sdk-core/token.rb +3 -3
- data/lib/aws-sdk-core/token_provider.rb +4 -0
- data/lib/aws-sdk-core/token_provider_chain.rb +2 -6
- data/lib/aws-sdk-core/util.rb +41 -1
- data/lib/aws-sdk-core/waiters/poller.rb +10 -5
- data/lib/aws-sdk-core/xml/builder.rb +17 -9
- data/lib/aws-sdk-core/xml/error_handler.rb +35 -43
- data/lib/aws-sdk-core/xml/parser/frame.rb +4 -20
- data/lib/aws-sdk-core/xml/parser/stack.rb +2 -0
- data/lib/aws-sdk-core/xml/parser.rb +2 -6
- data/lib/aws-sdk-core.rb +86 -107
- data/lib/aws-sdk-signin/client.rb +604 -0
- data/lib/aws-sdk-signin/client_api.rb +119 -0
- data/lib/aws-sdk-signin/customizations.rb +1 -0
- data/lib/aws-sdk-signin/endpoint_parameters.rb +69 -0
- data/lib/aws-sdk-signin/endpoint_provider.rb +59 -0
- data/lib/aws-sdk-signin/endpoints.rb +20 -0
- data/lib/aws-sdk-signin/errors.rb +122 -0
- data/lib/aws-sdk-signin/plugins/endpoints.rb +77 -0
- data/lib/aws-sdk-signin/resource.rb +26 -0
- data/lib/aws-sdk-signin/types.rb +299 -0
- data/lib/aws-sdk-signin.rb +63 -0
- data/lib/aws-sdk-sso/client.rb +189 -96
- data/lib/aws-sdk-sso/client_api.rb +7 -0
- data/lib/aws-sdk-sso/endpoint_parameters.rb +13 -10
- data/lib/aws-sdk-sso/endpoint_provider.rb +16 -20
- data/lib/aws-sdk-sso/endpoints.rb +2 -54
- data/lib/aws-sdk-sso/plugins/endpoints.rb +20 -20
- data/lib/aws-sdk-sso/types.rb +1 -0
- data/lib/aws-sdk-sso.rb +15 -11
- data/lib/aws-sdk-ssooidc/client.rb +293 -122
- data/lib/aws-sdk-ssooidc/client_api.rb +38 -0
- data/lib/aws-sdk-ssooidc/endpoint_parameters.rb +13 -10
- data/lib/aws-sdk-ssooidc/endpoint_provider.rb +14 -18
- data/lib/aws-sdk-ssooidc/endpoints.rb +2 -54
- data/lib/aws-sdk-ssooidc/errors.rb +31 -0
- data/lib/aws-sdk-ssooidc/plugins/endpoints.rb +20 -20
- data/lib/aws-sdk-ssooidc/types.rb +142 -29
- data/lib/aws-sdk-ssooidc.rb +15 -11
- data/lib/aws-sdk-sts/client.rb +529 -156
- data/lib/aws-sdk-sts/client_api.rb +108 -8
- data/lib/aws-sdk-sts/customizations.rb +5 -2
- data/lib/aws-sdk-sts/endpoint_parameters.rb +15 -14
- data/lib/aws-sdk-sts/endpoint_provider.rb +50 -55
- data/lib/aws-sdk-sts/endpoints.rb +2 -118
- data/lib/aws-sdk-sts/errors.rb +79 -0
- data/lib/aws-sdk-sts/plugins/endpoints.rb +20 -28
- data/lib/aws-sdk-sts/presigner.rb +2 -6
- data/lib/aws-sdk-sts/types.rb +344 -32
- data/lib/aws-sdk-sts.rb +15 -11
- data/lib/seahorse/client/async_base.rb +4 -5
- data/lib/seahorse/client/async_response.rb +19 -0
- data/lib/seahorse/client/base.rb +18 -21
- data/lib/seahorse/client/h2/connection.rb +18 -28
- data/lib/seahorse/client/h2/handler.rb +19 -3
- data/lib/seahorse/client/handler.rb +1 -1
- data/lib/seahorse/client/http/response.rb +1 -1
- data/lib/seahorse/client/net_http/connection_pool.rb +15 -12
- data/lib/seahorse/client/net_http/handler.rb +21 -9
- data/lib/seahorse/client/networking_error.rb +1 -1
- data/lib/seahorse/client/plugin.rb +9 -0
- data/lib/seahorse/client/plugins/endpoint.rb +0 -1
- data/lib/seahorse/client/plugins/h2.rb +4 -4
- data/lib/seahorse/client/plugins/net_http.rb +57 -16
- data/lib/seahorse/client/request_context.rb +9 -2
- data/lib/seahorse/client/response.rb +2 -0
- data/lib/seahorse/model/shapes.rb +2 -2
- data/lib/seahorse/util.rb +2 -1
- data/sig/aws-sdk-core/async_client_stubs.rbs +21 -0
- data/sig/aws-sdk-core/client_stubs.rbs +10 -0
- data/sig/aws-sdk-core/errors.rbs +22 -0
- data/sig/aws-sdk-core/resources/collection.rbs +21 -0
- data/sig/aws-sdk-core/structure.rbs +4 -0
- data/sig/aws-sdk-core/telemetry/base.rbs +46 -0
- data/sig/aws-sdk-core/telemetry/otel.rbs +22 -0
- data/sig/aws-sdk-core/telemetry/span_kind.rbs +15 -0
- data/sig/aws-sdk-core/telemetry/span_status.rbs +24 -0
- data/sig/aws-sdk-core/waiters/errors.rbs +20 -0
- data/sig/aws-sdk-core.rbs +7 -0
- data/sig/seahorse/client/async_base.rbs +18 -0
- data/sig/seahorse/client/base.rbs +25 -0
- data/sig/seahorse/client/handler_builder.rbs +16 -0
- data/sig/seahorse/client/response.rbs +61 -0
- metadata +117 -23
- /data/lib/aws-sdk-core/xml/parser/{engines/libxml.rb → libxml_engine.rb} +0 -0
- /data/lib/aws-sdk-core/xml/parser/{engines/nokogiri.rb → nokogiri_engine.rb} +0 -0
- /data/lib/aws-sdk-core/xml/parser/{engines/oga.rb → oga_engine.rb} +0 -0
- /data/lib/aws-sdk-core/xml/parser/{engines/ox.rb → ox_engine.rb} +0 -0
- /data/lib/aws-sdk-core/xml/parser/{engines/rexml.rb → rexml_engine.rb} +0 -0
data/lib/aws-sdk-sts/types.rb
CHANGED
|
@@ -26,10 +26,21 @@ module Aws::STS
|
|
|
26
26
|
# that use the temporary security credentials will expose the role
|
|
27
27
|
# session name to the external account in their CloudTrail logs.
|
|
28
28
|
#
|
|
29
|
+
# For security purposes, administrators can view this field in
|
|
30
|
+
# [CloudTrail logs][1] to help identify who performed an action in
|
|
31
|
+
# Amazon Web Services. Your administrator might require that you
|
|
32
|
+
# specify your user name as the session name when you assume the role.
|
|
33
|
+
# For more information, see [ `sts:RoleSessionName` ][2].
|
|
34
|
+
#
|
|
29
35
|
# The regex used to validate this parameter is a string of characters
|
|
30
36
|
# consisting of upper- and lower-case alphanumeric characters with no
|
|
31
37
|
# spaces. You can also include underscores or any of the following
|
|
32
|
-
# characters:
|
|
38
|
+
# characters: +=,.@-
|
|
39
|
+
#
|
|
40
|
+
#
|
|
41
|
+
#
|
|
42
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/cloudtrail-integration.html#cloudtrail-integration_signin-tempcreds
|
|
43
|
+
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_iam-condition-keys.html#ck_rolesessionname
|
|
33
44
|
# @return [String]
|
|
34
45
|
#
|
|
35
46
|
# @!attribute [rw] policy_arns
|
|
@@ -101,6 +112,9 @@ module Aws::STS
|
|
|
101
112
|
#
|
|
102
113
|
# </note>
|
|
103
114
|
#
|
|
115
|
+
# For more information about role session permissions, see [Session
|
|
116
|
+
# policies][1].
|
|
117
|
+
#
|
|
104
118
|
#
|
|
105
119
|
#
|
|
106
120
|
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
|
|
@@ -125,8 +139,7 @@ module Aws::STS
|
|
|
125
139
|
# However, if you assume a role using role chaining and provide a
|
|
126
140
|
# `DurationSeconds` parameter value greater than one hour, the
|
|
127
141
|
# operation fails. To learn how to view the maximum value for your
|
|
128
|
-
# role, see [
|
|
129
|
-
# in the *IAM User Guide*.
|
|
142
|
+
# role, see [Update the maximum session duration for a role][1].
|
|
130
143
|
#
|
|
131
144
|
# By default, the value is set to `3600` seconds.
|
|
132
145
|
#
|
|
@@ -142,7 +155,7 @@ module Aws::STS
|
|
|
142
155
|
#
|
|
143
156
|
#
|
|
144
157
|
#
|
|
145
|
-
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
|
158
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_update-role-settings.html#id_roles_update-session-duration
|
|
146
159
|
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_enable-console-custom-url.html
|
|
147
160
|
# @return [Integer]
|
|
148
161
|
#
|
|
@@ -199,9 +212,8 @@ module Aws::STS
|
|
|
199
212
|
# passes to subsequent sessions in a role chain. For more information,
|
|
200
213
|
# see [Chaining Roles with Session Tags][1] in the *IAM User Guide*.
|
|
201
214
|
#
|
|
202
|
-
# This parameter is optional.
|
|
203
|
-
#
|
|
204
|
-
# affected.
|
|
215
|
+
# This parameter is optional. The transitive status of a session tag
|
|
216
|
+
# does not impact its packed binary size.
|
|
205
217
|
#
|
|
206
218
|
# If you choose not to specify a transitive tag key, then no tags are
|
|
207
219
|
# passed from this session to any subsequent sessions.
|
|
@@ -228,7 +240,7 @@ module Aws::STS
|
|
|
228
240
|
# The regex used to validate this parameter is a string of characters
|
|
229
241
|
# consisting of upper- and lower-case alphanumeric characters with no
|
|
230
242
|
# spaces. You can also include underscores or any of the following
|
|
231
|
-
# characters:
|
|
243
|
+
# characters: +=,.@:\\/-
|
|
232
244
|
#
|
|
233
245
|
#
|
|
234
246
|
#
|
|
@@ -247,7 +259,7 @@ module Aws::STS
|
|
|
247
259
|
# The regex used to validate this parameter is a string of characters
|
|
248
260
|
# consisting of upper- and lower-case alphanumeric characters with no
|
|
249
261
|
# spaces. You can also include underscores or any of the following
|
|
250
|
-
# characters:
|
|
262
|
+
# characters: +=/:,.@-
|
|
251
263
|
# @return [String]
|
|
252
264
|
#
|
|
253
265
|
# @!attribute [rw] token_code
|
|
@@ -263,28 +275,31 @@ module Aws::STS
|
|
|
263
275
|
#
|
|
264
276
|
# @!attribute [rw] source_identity
|
|
265
277
|
# The source identity specified by the principal that is calling the
|
|
266
|
-
# `AssumeRole` operation.
|
|
278
|
+
# `AssumeRole` operation. The source identity value persists across
|
|
279
|
+
# [chained role][1] sessions.
|
|
267
280
|
#
|
|
268
281
|
# You can require users to specify a source identity when they assume
|
|
269
|
-
# a role. You do this by using the `sts:SourceIdentity`
|
|
270
|
-
# in a role trust policy. You can use source identity
|
|
271
|
-
# CloudTrail logs to determine who took actions with a
|
|
272
|
-
# use the `aws:SourceIdentity` condition key to further
|
|
273
|
-
# to Amazon Web Services resources based on the value
|
|
274
|
-
# identity. For more information about using source
|
|
275
|
-
# [Monitor and control actions taken with assumed
|
|
276
|
-
# *IAM User Guide*.
|
|
282
|
+
# a role. You do this by using the [ `sts:SourceIdentity` ][2]
|
|
283
|
+
# condition key in a role trust policy. You can use source identity
|
|
284
|
+
# information in CloudTrail logs to determine who took actions with a
|
|
285
|
+
# role. You can use the `aws:SourceIdentity` condition key to further
|
|
286
|
+
# control access to Amazon Web Services resources based on the value
|
|
287
|
+
# of source identity. For more information about using source
|
|
288
|
+
# identity, see [Monitor and control actions taken with assumed
|
|
289
|
+
# roles][3] in the *IAM User Guide*.
|
|
277
290
|
#
|
|
278
291
|
# The regex used to validate this parameter is a string of characters
|
|
279
292
|
# consisting of upper- and lower-case alphanumeric characters with no
|
|
280
293
|
# spaces. You can also include underscores or any of the following
|
|
281
|
-
# characters:
|
|
294
|
+
# characters: +=,.@-. You cannot use a value that begins with the text
|
|
282
295
|
# `aws:`. This prefix is reserved for Amazon Web Services internal
|
|
283
296
|
# use.
|
|
284
297
|
#
|
|
285
298
|
#
|
|
286
299
|
#
|
|
287
|
-
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
|
300
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles.html#iam-term-role-chaining
|
|
301
|
+
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html#condition-keys-sourceidentity
|
|
302
|
+
# [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_monitor.html
|
|
288
303
|
# @return [String]
|
|
289
304
|
#
|
|
290
305
|
# @!attribute [rw] provided_contexts
|
|
@@ -297,7 +312,7 @@ module Aws::STS
|
|
|
297
312
|
# context provider from which the trusted context assertion was
|
|
298
313
|
# generated.
|
|
299
314
|
#
|
|
300
|
-
# `[
|
|
315
|
+
# `[{"ProviderArn":"arn:aws:iam::aws:contextProvider/IdentityCenter","ContextAssertion":"trusted-context-assertion"}]`
|
|
301
316
|
# @return [Array<Types::ProvidedContext>]
|
|
302
317
|
#
|
|
303
318
|
# @see http://docs.aws.amazon.com/goto/WebAPI/sts-2011-06-15/AssumeRoleRequest AWS API Documentation
|
|
@@ -465,6 +480,9 @@ module Aws::STS
|
|
|
465
480
|
# include the tab (\\u0009), linefeed (\\u000A), and carriage return
|
|
466
481
|
# (\\u000D) characters.
|
|
467
482
|
#
|
|
483
|
+
# For more information about role session permissions, see [Session
|
|
484
|
+
# policies][1].
|
|
485
|
+
#
|
|
468
486
|
# <note markdown="1"> An Amazon Web Services conversion compresses the passed inline
|
|
469
487
|
# session policy, managed policy ARNs, and session tags into a packed
|
|
470
488
|
# binary format that has a separate limit. Your request can fail for
|
|
@@ -600,6 +618,8 @@ module Aws::STS
|
|
|
600
618
|
#
|
|
601
619
|
# @!attribute [rw] source_identity
|
|
602
620
|
# The value in the `SourceIdentity` attribute in the SAML assertion.
|
|
621
|
+
# The source identity value persists across [chained role][1]
|
|
622
|
+
# sessions.
|
|
603
623
|
#
|
|
604
624
|
# You can require users to set a source identity value when they
|
|
605
625
|
# assume a role. You do this by using the `sts:SourceIdentity`
|
|
@@ -607,12 +627,12 @@ module Aws::STS
|
|
|
607
627
|
# taken with the role are associated with that user. After the source
|
|
608
628
|
# identity is set, the value cannot be changed. It is present in the
|
|
609
629
|
# request for all actions that are taken by the role and persists
|
|
610
|
-
# across [chained role][
|
|
630
|
+
# across [chained role][2] sessions. You can configure your SAML
|
|
611
631
|
# identity provider to use an attribute associated with your users,
|
|
612
632
|
# like user name or email, as the source identity when calling
|
|
613
633
|
# `AssumeRoleWithSAML`. You do this by adding an attribute to the SAML
|
|
614
634
|
# assertion. For more information about using source identity, see
|
|
615
|
-
# [Monitor and control actions taken with assumed roles][
|
|
635
|
+
# [Monitor and control actions taken with assumed roles][3] in the
|
|
616
636
|
# *IAM User Guide*.
|
|
617
637
|
#
|
|
618
638
|
# The regex used to validate this parameter is a string of characters
|
|
@@ -622,8 +642,9 @@ module Aws::STS
|
|
|
622
642
|
#
|
|
623
643
|
#
|
|
624
644
|
#
|
|
625
|
-
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
|
626
|
-
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
|
645
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles.html#iam-term-role-chaining
|
|
646
|
+
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles.html#id_roles_terms-and-concepts
|
|
647
|
+
# [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_monitor.html
|
|
627
648
|
# @return [String]
|
|
628
649
|
#
|
|
629
650
|
# @see http://docs.aws.amazon.com/goto/WebAPI/sts-2011-06-15/AssumeRoleWithSAMLResponse AWS API Documentation
|
|
@@ -645,6 +666,24 @@ module Aws::STS
|
|
|
645
666
|
# @!attribute [rw] role_arn
|
|
646
667
|
# The Amazon Resource Name (ARN) of the role that the caller is
|
|
647
668
|
# assuming.
|
|
669
|
+
#
|
|
670
|
+
# <note markdown="1"> Additional considerations apply to Amazon Cognito identity pools
|
|
671
|
+
# that assume [cross-account IAM roles][1]. The trust policies of
|
|
672
|
+
# these roles must accept the `cognito-identity.amazonaws.com` service
|
|
673
|
+
# principal and must contain the `cognito-identity.amazonaws.com:aud`
|
|
674
|
+
# condition key to restrict role assumption to users from your
|
|
675
|
+
# intended identity pools. A policy that trusts Amazon Cognito
|
|
676
|
+
# identity pools without this condition creates a risk that a user
|
|
677
|
+
# from an unintended identity pool can assume the role. For more
|
|
678
|
+
# information, see [ Trust policies for IAM roles in Basic (Classic)
|
|
679
|
+
# authentication ][2] in the *Amazon Cognito Developer Guide*.
|
|
680
|
+
#
|
|
681
|
+
# </note>
|
|
682
|
+
#
|
|
683
|
+
#
|
|
684
|
+
#
|
|
685
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies-cross-account-resource-access.html
|
|
686
|
+
# [2]: https://docs.aws.amazon.com/cognito/latest/developerguide/iam-roles.html#trust-policies
|
|
648
687
|
# @return [String]
|
|
649
688
|
#
|
|
650
689
|
# @!attribute [rw] role_session_name
|
|
@@ -655,10 +694,21 @@ module Aws::STS
|
|
|
655
694
|
# session name is included as part of the ARN and assumed role ID in
|
|
656
695
|
# the `AssumedRoleUser` response element.
|
|
657
696
|
#
|
|
697
|
+
# For security purposes, administrators can view this field in
|
|
698
|
+
# [CloudTrail logs][1] to help identify who performed an action in
|
|
699
|
+
# Amazon Web Services. Your administrator might require that you
|
|
700
|
+
# specify your user name as the session name when you assume the role.
|
|
701
|
+
# For more information, see [ `sts:RoleSessionName` ][2].
|
|
702
|
+
#
|
|
658
703
|
# The regex used to validate this parameter is a string of characters
|
|
659
704
|
# consisting of upper- and lower-case alphanumeric characters with no
|
|
660
705
|
# spaces. You can also include underscores or any of the following
|
|
661
706
|
# characters: =,.@-
|
|
707
|
+
#
|
|
708
|
+
#
|
|
709
|
+
#
|
|
710
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/cloudtrail-integration.html#cloudtrail-integration_signin-tempcreds
|
|
711
|
+
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_iam-condition-keys.html#ck_rolesessionname
|
|
662
712
|
# @return [String]
|
|
663
713
|
#
|
|
664
714
|
# @!attribute [rw] web_identity_token
|
|
@@ -666,8 +716,10 @@ module Aws::STS
|
|
|
666
716
|
# provided by the identity provider. Your application must get this
|
|
667
717
|
# token by authenticating the user who is using your application with
|
|
668
718
|
# a web identity provider before the application makes an
|
|
669
|
-
# `AssumeRoleWithWebIdentity` call.
|
|
670
|
-
#
|
|
719
|
+
# `AssumeRoleWithWebIdentity` call. Timestamps in the token must be
|
|
720
|
+
# formatted as either an integer or a long integer. Tokens must be
|
|
721
|
+
# signed using either RSA keys (RS256, RS384, or RS512) or ECDSA keys
|
|
722
|
+
# (ES256, ES384, or ES512).
|
|
671
723
|
# @return [String]
|
|
672
724
|
#
|
|
673
725
|
# @!attribute [rw] provider_id
|
|
@@ -741,6 +793,9 @@ module Aws::STS
|
|
|
741
793
|
# include the tab (\\u0009), linefeed (\\u000A), and carriage return
|
|
742
794
|
# (\\u000D) characters.
|
|
743
795
|
#
|
|
796
|
+
# For more information about role session permissions, see [Session
|
|
797
|
+
# policies][1].
|
|
798
|
+
#
|
|
744
799
|
# <note markdown="1"> An Amazon Web Services conversion compresses the passed inline
|
|
745
800
|
# session policy, managed policy ARNs, and session tags into a packed
|
|
746
801
|
# binary format that has a separate limit. Your request can fail for
|
|
@@ -881,7 +936,7 @@ module Aws::STS
|
|
|
881
936
|
#
|
|
882
937
|
#
|
|
883
938
|
#
|
|
884
|
-
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_terms-and-concepts
|
|
939
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles.html#id_roles_terms-and-concepts
|
|
885
940
|
# [2]: https://docs.aws.amazon.com/cognito/latest/developerguide/amazon-cognito-user-pools-using-tokens-with-identity-providers.html
|
|
886
941
|
# [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_monitor.html
|
|
887
942
|
# @return [String]
|
|
@@ -900,6 +955,92 @@ module Aws::STS
|
|
|
900
955
|
include Aws::Structure
|
|
901
956
|
end
|
|
902
957
|
|
|
958
|
+
# @!attribute [rw] target_principal
|
|
959
|
+
# The member account principal ARN or account ID.
|
|
960
|
+
# @return [String]
|
|
961
|
+
#
|
|
962
|
+
# @!attribute [rw] task_policy_arn
|
|
963
|
+
# The identity based policy that scopes the session to the privileged
|
|
964
|
+
# tasks that can be performed. You must use one of following Amazon
|
|
965
|
+
# Web Services managed policies to scope root session actions:
|
|
966
|
+
#
|
|
967
|
+
# * [IAMAuditRootUserCredentials][1]
|
|
968
|
+
#
|
|
969
|
+
# * [IAMCreateRootUserPassword][2]
|
|
970
|
+
#
|
|
971
|
+
# * [IAMDeleteRootUserCredentials][3]
|
|
972
|
+
#
|
|
973
|
+
# * [S3UnlockBucketPolicy][4]
|
|
974
|
+
#
|
|
975
|
+
# * [SQSUnlockQueuePolicy][5]
|
|
976
|
+
#
|
|
977
|
+
#
|
|
978
|
+
#
|
|
979
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/security-iam-awsmanpol.html#security-iam-awsmanpol-IAMAuditRootUserCredentials
|
|
980
|
+
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/security-iam-awsmanpol.html#security-iam-awsmanpol-IAMCreateRootUserPassword
|
|
981
|
+
# [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/security-iam-awsmanpol.html#security-iam-awsmanpol-IAMDeleteRootUserCredentials
|
|
982
|
+
# [4]: https://docs.aws.amazon.com/IAM/latest/UserGuide/security-iam-awsmanpol.html#security-iam-awsmanpol-S3UnlockBucketPolicy
|
|
983
|
+
# [5]: https://docs.aws.amazon.com/IAM/latest/UserGuide/security-iam-awsmanpol.html#security-iam-awsmanpol-SQSUnlockQueuePolicy
|
|
984
|
+
# @return [Types::PolicyDescriptorType]
|
|
985
|
+
#
|
|
986
|
+
# @!attribute [rw] duration_seconds
|
|
987
|
+
# The duration, in seconds, of the privileged session. The value can
|
|
988
|
+
# range from 0 seconds up to the maximum session duration of 900
|
|
989
|
+
# seconds (15 minutes). If you specify a value higher than this
|
|
990
|
+
# setting, the operation fails.
|
|
991
|
+
#
|
|
992
|
+
# By default, the value is set to `900` seconds.
|
|
993
|
+
# @return [Integer]
|
|
994
|
+
#
|
|
995
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/sts-2011-06-15/AssumeRootRequest AWS API Documentation
|
|
996
|
+
#
|
|
997
|
+
class AssumeRootRequest < Struct.new(
|
|
998
|
+
:target_principal,
|
|
999
|
+
:task_policy_arn,
|
|
1000
|
+
:duration_seconds)
|
|
1001
|
+
SENSITIVE = []
|
|
1002
|
+
include Aws::Structure
|
|
1003
|
+
end
|
|
1004
|
+
|
|
1005
|
+
# @!attribute [rw] credentials
|
|
1006
|
+
# The temporary security credentials, which include an access key ID,
|
|
1007
|
+
# a secret access key, and a security token.
|
|
1008
|
+
#
|
|
1009
|
+
# <note markdown="1"> The size of the security token that STS API operations return is not
|
|
1010
|
+
# fixed. We strongly recommend that you make no assumptions about the
|
|
1011
|
+
# maximum size.
|
|
1012
|
+
#
|
|
1013
|
+
# </note>
|
|
1014
|
+
# @return [Types::Credentials]
|
|
1015
|
+
#
|
|
1016
|
+
# @!attribute [rw] source_identity
|
|
1017
|
+
# The source identity specified by the principal that is calling the
|
|
1018
|
+
# `AssumeRoot` operation.
|
|
1019
|
+
#
|
|
1020
|
+
# You can use the `aws:SourceIdentity` condition key to control access
|
|
1021
|
+
# based on the value of source identity. For more information about
|
|
1022
|
+
# using source identity, see [Monitor and control actions taken with
|
|
1023
|
+
# assumed roles][1] in the *IAM User Guide*.
|
|
1024
|
+
#
|
|
1025
|
+
# The regex used to validate this parameter is a string of characters
|
|
1026
|
+
# consisting of upper- and lower-case alphanumeric characters with no
|
|
1027
|
+
# spaces. You can also include underscores or any of the following
|
|
1028
|
+
# characters: =,.@-
|
|
1029
|
+
#
|
|
1030
|
+
#
|
|
1031
|
+
#
|
|
1032
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_monitor.html
|
|
1033
|
+
# @return [String]
|
|
1034
|
+
#
|
|
1035
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/sts-2011-06-15/AssumeRootResponse AWS API Documentation
|
|
1036
|
+
#
|
|
1037
|
+
class AssumeRootResponse < Struct.new(
|
|
1038
|
+
:credentials,
|
|
1039
|
+
:source_identity)
|
|
1040
|
+
SENSITIVE = []
|
|
1041
|
+
include Aws::Structure
|
|
1042
|
+
end
|
|
1043
|
+
|
|
903
1044
|
# The identifiers for the temporary security credentials that the
|
|
904
1045
|
# operation returns.
|
|
905
1046
|
#
|
|
@@ -1003,6 +1144,21 @@ module Aws::STS
|
|
|
1003
1144
|
include Aws::Structure
|
|
1004
1145
|
end
|
|
1005
1146
|
|
|
1147
|
+
# The trade-in token provided in the request has expired and can no
|
|
1148
|
+
# longer be exchanged for credentials. Request a new token and retry the
|
|
1149
|
+
# operation.
|
|
1150
|
+
#
|
|
1151
|
+
# @!attribute [rw] message
|
|
1152
|
+
# @return [String]
|
|
1153
|
+
#
|
|
1154
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/sts-2011-06-15/ExpiredTradeInTokenException AWS API Documentation
|
|
1155
|
+
#
|
|
1156
|
+
class ExpiredTradeInTokenException < Struct.new(
|
|
1157
|
+
:message)
|
|
1158
|
+
SENSITIVE = []
|
|
1159
|
+
include Aws::Structure
|
|
1160
|
+
end
|
|
1161
|
+
|
|
1006
1162
|
# Identifiers for the federated user that is associated with the
|
|
1007
1163
|
# credentials.
|
|
1008
1164
|
#
|
|
@@ -1098,6 +1254,47 @@ module Aws::STS
|
|
|
1098
1254
|
include Aws::Structure
|
|
1099
1255
|
end
|
|
1100
1256
|
|
|
1257
|
+
# @!attribute [rw] trade_in_token
|
|
1258
|
+
# The token to exchange for temporary Amazon Web Services credentials.
|
|
1259
|
+
# This token must be valid and unexpired at the time of the request.
|
|
1260
|
+
# @return [String]
|
|
1261
|
+
#
|
|
1262
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/sts-2011-06-15/GetDelegatedAccessTokenRequest AWS API Documentation
|
|
1263
|
+
#
|
|
1264
|
+
class GetDelegatedAccessTokenRequest < Struct.new(
|
|
1265
|
+
:trade_in_token)
|
|
1266
|
+
SENSITIVE = [:trade_in_token]
|
|
1267
|
+
include Aws::Structure
|
|
1268
|
+
end
|
|
1269
|
+
|
|
1270
|
+
# @!attribute [rw] credentials
|
|
1271
|
+
# Amazon Web Services credentials for API authentication.
|
|
1272
|
+
# @return [Types::Credentials]
|
|
1273
|
+
#
|
|
1274
|
+
# @!attribute [rw] packed_policy_size
|
|
1275
|
+
# The percentage of the maximum policy size that is used by the
|
|
1276
|
+
# session policy. The policy size is calculated as the sum of all the
|
|
1277
|
+
# session policies and permission boundaries attached to the session.
|
|
1278
|
+
# If the packed size exceeds 100%, the request fails.
|
|
1279
|
+
# @return [Integer]
|
|
1280
|
+
#
|
|
1281
|
+
# @!attribute [rw] assumed_principal
|
|
1282
|
+
# The Amazon Resource Name (ARN) of the principal that was assumed
|
|
1283
|
+
# when obtaining the delegated access token. This ARN identifies the
|
|
1284
|
+
# IAM entity whose permissions are granted by the temporary
|
|
1285
|
+
# credentials.
|
|
1286
|
+
# @return [String]
|
|
1287
|
+
#
|
|
1288
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/sts-2011-06-15/GetDelegatedAccessTokenResponse AWS API Documentation
|
|
1289
|
+
#
|
|
1290
|
+
class GetDelegatedAccessTokenResponse < Struct.new(
|
|
1291
|
+
:credentials,
|
|
1292
|
+
:packed_policy_size,
|
|
1293
|
+
:assumed_principal)
|
|
1294
|
+
SENSITIVE = []
|
|
1295
|
+
include Aws::Structure
|
|
1296
|
+
end
|
|
1297
|
+
|
|
1101
1298
|
# @!attribute [rw] name
|
|
1102
1299
|
# The name of the federated user. The name is used as an identifier
|
|
1103
1300
|
# for the temporary security credentials (such as `Bob`). For example,
|
|
@@ -1381,6 +1578,73 @@ module Aws::STS
|
|
|
1381
1578
|
include Aws::Structure
|
|
1382
1579
|
end
|
|
1383
1580
|
|
|
1581
|
+
# @!attribute [rw] audience
|
|
1582
|
+
# The intended recipient of the web identity token. This value
|
|
1583
|
+
# populates the `aud` claim in the JWT and should identify the service
|
|
1584
|
+
# or application that will validate and use the token. The external
|
|
1585
|
+
# service should verify this claim to ensure the token was intended
|
|
1586
|
+
# for their use.
|
|
1587
|
+
# @return [Array<String>]
|
|
1588
|
+
#
|
|
1589
|
+
# @!attribute [rw] duration_seconds
|
|
1590
|
+
# The duration, in seconds, for which the JSON Web Token (JWT) will
|
|
1591
|
+
# remain valid. The value can range from 60 seconds (1 minute) to 3600
|
|
1592
|
+
# seconds (1 hour). If not specified, the default duration is 300
|
|
1593
|
+
# seconds (5 minutes). The token is designed to be short-lived and
|
|
1594
|
+
# should be used for proof of identity, then exchanged for credentials
|
|
1595
|
+
# or short-lived tokens in the external service.
|
|
1596
|
+
# @return [Integer]
|
|
1597
|
+
#
|
|
1598
|
+
# @!attribute [rw] signing_algorithm
|
|
1599
|
+
# The cryptographic algorithm to use for signing the JSON Web Token
|
|
1600
|
+
# (JWT). Valid values are RS256 (RSA with SHA-256) and ES384 (ECDSA
|
|
1601
|
+
# using P-384 curve with SHA-384).
|
|
1602
|
+
# @return [String]
|
|
1603
|
+
#
|
|
1604
|
+
# @!attribute [rw] tags
|
|
1605
|
+
# An optional list of tags to include in the JSON Web Token (JWT).
|
|
1606
|
+
# These tags are added as custom claims to the JWT and can be used by
|
|
1607
|
+
# the downstream service for authorization decisions.
|
|
1608
|
+
# @return [Array<Types::Tag>]
|
|
1609
|
+
#
|
|
1610
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/sts-2011-06-15/GetWebIdentityTokenRequest AWS API Documentation
|
|
1611
|
+
#
|
|
1612
|
+
class GetWebIdentityTokenRequest < Struct.new(
|
|
1613
|
+
:audience,
|
|
1614
|
+
:duration_seconds,
|
|
1615
|
+
:signing_algorithm,
|
|
1616
|
+
:tags)
|
|
1617
|
+
SENSITIVE = []
|
|
1618
|
+
include Aws::Structure
|
|
1619
|
+
end
|
|
1620
|
+
|
|
1621
|
+
# @!attribute [rw] web_identity_token
|
|
1622
|
+
# A signed JSON Web Token (JWT) that represents the caller's Amazon
|
|
1623
|
+
# Web Services identity. The token contains standard JWT claims such
|
|
1624
|
+
# as subject, audience, expiration time, and additional identity
|
|
1625
|
+
# attributes added by STS as custom claims. You can also add your own
|
|
1626
|
+
# custom claims to the token by passing tags as request parameters to
|
|
1627
|
+
# the `GetWebIdentityToken` API. The token is signed using the
|
|
1628
|
+
# specified signing algorithm and can be verified using the
|
|
1629
|
+
# verification keys available at the issuer's JWKS endpoint.
|
|
1630
|
+
# @return [String]
|
|
1631
|
+
#
|
|
1632
|
+
# @!attribute [rw] expiration
|
|
1633
|
+
# The date and time when the web identity token expires, in UTC. The
|
|
1634
|
+
# expiration is determined by adding the `DurationSeconds` value to
|
|
1635
|
+
# the time the token was issued. After this time, the token should no
|
|
1636
|
+
# longer be considered valid.
|
|
1637
|
+
# @return [Time]
|
|
1638
|
+
#
|
|
1639
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/sts-2011-06-15/GetWebIdentityTokenResponse AWS API Documentation
|
|
1640
|
+
#
|
|
1641
|
+
class GetWebIdentityTokenResponse < Struct.new(
|
|
1642
|
+
:web_identity_token,
|
|
1643
|
+
:expiration)
|
|
1644
|
+
SENSITIVE = [:web_identity_token]
|
|
1645
|
+
include Aws::Structure
|
|
1646
|
+
end
|
|
1647
|
+
|
|
1384
1648
|
# The request could not be fulfilled because the identity provider (IDP)
|
|
1385
1649
|
# that was asked to verify the incoming identity token could not be
|
|
1386
1650
|
# reached. This is often a transient error caused by network conditions.
|
|
@@ -1419,7 +1683,8 @@ module Aws::STS
|
|
|
1419
1683
|
|
|
1420
1684
|
# The error returned if the message passed to
|
|
1421
1685
|
# `DecodeAuthorizationMessage` was invalid. This can happen if the token
|
|
1422
|
-
# contains invalid characters, such as
|
|
1686
|
+
# contains invalid characters, such as line breaks, or if the message
|
|
1687
|
+
# has expired.
|
|
1423
1688
|
#
|
|
1424
1689
|
# @!attribute [rw] message
|
|
1425
1690
|
# @return [String]
|
|
@@ -1447,6 +1712,21 @@ module Aws::STS
|
|
|
1447
1712
|
include Aws::Structure
|
|
1448
1713
|
end
|
|
1449
1714
|
|
|
1715
|
+
# The requested token payload size exceeds the maximum allowed size.
|
|
1716
|
+
# Reduce the number of request tags included in the
|
|
1717
|
+
# `GetWebIdentityToken` API call to reduce the token payload size.
|
|
1718
|
+
#
|
|
1719
|
+
# @!attribute [rw] message
|
|
1720
|
+
# @return [String]
|
|
1721
|
+
#
|
|
1722
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/sts-2011-06-15/JWTPayloadSizeExceededException AWS API Documentation
|
|
1723
|
+
#
|
|
1724
|
+
class JWTPayloadSizeExceededException < Struct.new(
|
|
1725
|
+
:message)
|
|
1726
|
+
SENSITIVE = []
|
|
1727
|
+
include Aws::Structure
|
|
1728
|
+
end
|
|
1729
|
+
|
|
1450
1730
|
# The request was rejected because the policy document was malformed.
|
|
1451
1731
|
# The error message describes the specific error.
|
|
1452
1732
|
#
|
|
@@ -1461,6 +1741,21 @@ module Aws::STS
|
|
|
1461
1741
|
include Aws::Structure
|
|
1462
1742
|
end
|
|
1463
1743
|
|
|
1744
|
+
# The outbound web identity federation feature is not enabled for this
|
|
1745
|
+
# account. To use this feature, you must first enable it through the
|
|
1746
|
+
# Amazon Web Services Management Console or API.
|
|
1747
|
+
#
|
|
1748
|
+
# @!attribute [rw] message
|
|
1749
|
+
# @return [String]
|
|
1750
|
+
#
|
|
1751
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/sts-2011-06-15/OutboundWebIdentityFederationDisabledException AWS API Documentation
|
|
1752
|
+
#
|
|
1753
|
+
class OutboundWebIdentityFederationDisabledException < Struct.new(
|
|
1754
|
+
:message)
|
|
1755
|
+
SENSITIVE = []
|
|
1756
|
+
include Aws::Structure
|
|
1757
|
+
end
|
|
1758
|
+
|
|
1464
1759
|
# The request was rejected because the total packed size of the session
|
|
1465
1760
|
# policies and session tags combined was too large. An Amazon Web
|
|
1466
1761
|
# Services conversion compresses the session policy document, session
|
|
@@ -1539,12 +1834,12 @@ module Aws::STS
|
|
|
1539
1834
|
# STS is not activated in the requested region for the account that is
|
|
1540
1835
|
# being asked to generate credentials. The account administrator must
|
|
1541
1836
|
# use the IAM console to activate STS in that region. For more
|
|
1542
|
-
# information, see [Activating and Deactivating Amazon Web
|
|
1543
|
-
#
|
|
1837
|
+
# information, see [Activating and Deactivating STS in an Amazon Web
|
|
1838
|
+
# Services Region][1] in the *IAM User Guide*.
|
|
1544
1839
|
#
|
|
1545
1840
|
#
|
|
1546
1841
|
#
|
|
1547
|
-
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html
|
|
1842
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html#sts-regions-activate-deactivate
|
|
1548
1843
|
#
|
|
1549
1844
|
# @!attribute [rw] message
|
|
1550
1845
|
# @return [String]
|
|
@@ -1557,6 +1852,22 @@ module Aws::STS
|
|
|
1557
1852
|
include Aws::Structure
|
|
1558
1853
|
end
|
|
1559
1854
|
|
|
1855
|
+
# The requested token duration would extend the session beyond its
|
|
1856
|
+
# original expiration time. You cannot use this operation to extend the
|
|
1857
|
+
# lifetime of a session beyond what was granted when the session was
|
|
1858
|
+
# originally created.
|
|
1859
|
+
#
|
|
1860
|
+
# @!attribute [rw] message
|
|
1861
|
+
# @return [String]
|
|
1862
|
+
#
|
|
1863
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/sts-2011-06-15/SessionDurationEscalationException AWS API Documentation
|
|
1864
|
+
#
|
|
1865
|
+
class SessionDurationEscalationException < Struct.new(
|
|
1866
|
+
:message)
|
|
1867
|
+
SENSITIVE = []
|
|
1868
|
+
include Aws::Structure
|
|
1869
|
+
end
|
|
1870
|
+
|
|
1560
1871
|
# You can pass custom key-value pair attributes when you assume a role
|
|
1561
1872
|
# or federate a user. These are called session tags. You can then use
|
|
1562
1873
|
# the session tags to control access to resources. For more information,
|
|
@@ -1602,3 +1913,4 @@ module Aws::STS
|
|
|
1602
1913
|
|
|
1603
1914
|
end
|
|
1604
1915
|
end
|
|
1916
|
+
|
data/lib/aws-sdk-sts.rb
CHANGED
|
@@ -13,16 +13,7 @@ unless Module.const_defined?(:Aws)
|
|
|
13
13
|
require 'aws-sigv4'
|
|
14
14
|
end
|
|
15
15
|
|
|
16
|
-
|
|
17
|
-
require_relative 'aws-sdk-sts/client_api'
|
|
18
|
-
require_relative 'aws-sdk-sts/plugins/endpoints.rb'
|
|
19
|
-
require_relative 'aws-sdk-sts/client'
|
|
20
|
-
require_relative 'aws-sdk-sts/errors'
|
|
21
|
-
require_relative 'aws-sdk-sts/resource'
|
|
22
|
-
require_relative 'aws-sdk-sts/endpoint_parameters'
|
|
23
|
-
require_relative 'aws-sdk-sts/endpoint_provider'
|
|
24
|
-
require_relative 'aws-sdk-sts/endpoints'
|
|
25
|
-
require_relative 'aws-sdk-sts/customizations'
|
|
16
|
+
Aws::Plugins::GlobalConfiguration.add_identifier(:sts)
|
|
26
17
|
|
|
27
18
|
# This module provides support for AWS Security Token Service. This module is available in the
|
|
28
19
|
# `aws-sdk-core` gem.
|
|
@@ -53,7 +44,20 @@ require_relative 'aws-sdk-sts/customizations'
|
|
|
53
44
|
#
|
|
54
45
|
# @!group service
|
|
55
46
|
module Aws::STS
|
|
47
|
+
autoload :Types, 'aws-sdk-sts/types'
|
|
48
|
+
autoload :ClientApi, 'aws-sdk-sts/client_api'
|
|
49
|
+
module Plugins
|
|
50
|
+
autoload :Endpoints, 'aws-sdk-sts/plugins/endpoints.rb'
|
|
51
|
+
end
|
|
52
|
+
autoload :Client, 'aws-sdk-sts/client'
|
|
53
|
+
autoload :Errors, 'aws-sdk-sts/errors'
|
|
54
|
+
autoload :Resource, 'aws-sdk-sts/resource'
|
|
55
|
+
autoload :EndpointParameters, 'aws-sdk-sts/endpoint_parameters'
|
|
56
|
+
autoload :EndpointProvider, 'aws-sdk-sts/endpoint_provider'
|
|
57
|
+
autoload :Endpoints, 'aws-sdk-sts/endpoints'
|
|
56
58
|
|
|
57
|
-
GEM_VERSION = '3.
|
|
59
|
+
GEM_VERSION = '3.240.0'
|
|
58
60
|
|
|
59
61
|
end
|
|
62
|
+
|
|
63
|
+
require_relative 'aws-sdk-sts/customizations'
|
|
@@ -3,8 +3,8 @@
|
|
|
3
3
|
module Seahorse
|
|
4
4
|
module Client
|
|
5
5
|
class AsyncBase < Seahorse::Client::Base
|
|
6
|
-
|
|
7
6
|
# default H2 plugins
|
|
7
|
+
# @api private
|
|
8
8
|
@plugins = PluginList.new([
|
|
9
9
|
Plugins::Endpoint,
|
|
10
10
|
Plugins::H2,
|
|
@@ -12,9 +12,8 @@ module Seahorse
|
|
|
12
12
|
])
|
|
13
13
|
|
|
14
14
|
def initialize(plugins, options)
|
|
15
|
-
super
|
|
16
|
-
@connection = H2::Connection.new(
|
|
17
|
-
@options = options
|
|
15
|
+
super(plugins, options)
|
|
16
|
+
@connection = H2::Connection.new(@config)
|
|
18
17
|
end
|
|
19
18
|
|
|
20
19
|
# @return [H2::Connection]
|
|
@@ -36,7 +35,7 @@ module Seahorse
|
|
|
36
35
|
# @return [Seahorse::Client::H2::Connection]
|
|
37
36
|
def new_connection
|
|
38
37
|
if @connection.closed?
|
|
39
|
-
@connection = H2::Connection.new(@
|
|
38
|
+
@connection = H2::Connection.new(@config)
|
|
40
39
|
else
|
|
41
40
|
@connection
|
|
42
41
|
end
|