aws-sdk-core 3.200.0 → 3.201.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 370a79ef96fb4ff40cbbfcba57d5b0f01d19220c46f8bc77e96984ed14f10ffd
4
- data.tar.gz: 5be2366a83a15ced7f51ceb976a934f5b3a4f26b16337f298d12152f9fe576e8
3
+ metadata.gz: 66b895cbab1c128ae492f8b02d379edf6856cd38a6eadf985b97a798f4cf4252
4
+ data.tar.gz: dadbea139b8d5e9f72dc66492478f80e17d501c2b1a6f8acb482a0c8b036ace6
5
5
  SHA512:
6
- metadata.gz: 164598c925b921092a9a9cebc3a28786f6add8737971d3e7322308dad25035d07664a90b7d9cdc01aabb2601a6ebeebeb6ee83a3cfd309fdcd2849eed3f50c51
7
- data.tar.gz: 306ce42e04c16d1c7bf3e6509f7641b60be02e74efa80698b3feef014117ee07c256a8703bb6e8de3dd5fc5e33018ff8f1551bef712eb81093b8289e4322ab60
6
+ metadata.gz: 7f60df6c8bc98191884bfd56ce021b337c2f08e4b87b235afb4a8ea39de9e15f6ff036a9a442cf6b4fb40635a5b03a0bbe082310e498474f251c7e5119cc3d28
7
+ data.tar.gz: 6ba5a5f1afb8f00cb676a5b61b59a7ca3ccc0922fa92f5548c126151d4d9446a745ea275a88d01ba275fa00583f0cde7fcd276847c513e4e72b26dbb15f2cfc0
data/CHANGELOG.md CHANGED
@@ -1,6 +1,19 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 3.201.0 (2024-07-02)
5
+ ------------------
6
+
7
+ * Feature - Updated Aws::STS::Client with the latest API changes.
8
+
9
+ * Feature - Updated Aws::SSOOIDC::Client with the latest API changes.
10
+
11
+ * Feature - Updated Aws::SSO::Client with the latest API changes.
12
+
13
+ * Feature - Support `auth` trait to enable SigV4a based services.
14
+
15
+ * Feature - Support configuration for sigv4a signing regions using `ENV['AWS_SIGV4A_SIGNING_REGION_SET']`, `sigv4a_signing_region_set` shared config, or the `sigv4a_signing_region_set` client option.
16
+
4
17
  3.200.0 (2024-06-28)
5
18
  ------------------
6
19
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 3.200.0
1
+ 3.201.0
@@ -14,9 +14,15 @@ require_relative 'endpoints/templater'
14
14
  require_relative 'endpoints/tree_rule'
15
15
  require_relative 'endpoints/url'
16
16
 
17
+ require 'aws-sigv4'
18
+
17
19
  module Aws
18
20
  # @api private
19
21
  module Endpoints
22
+ supported_auth_traits = %w[aws.auth#sigv4 smithy.api#httpBearerAuth smithy.api#noAuth]
23
+ supported_auth_traits += ['aws.auth#sigv4a'] if Aws::Sigv4::Signer.use_crt?
24
+ SUPPORTED_AUTH_TRAITS = supported_auth_traits.freeze
25
+
20
26
  class << self
21
27
  def resolve_auth_scheme(context, endpoint)
22
28
  if endpoint && (auth_schemes = endpoint.properties['authSchemes'])
@@ -33,8 +39,64 @@ module Aws
33
39
 
34
40
  private
35
41
 
42
+ def merge_signing_defaults(auth_scheme, config)
43
+ if %w[sigv4 sigv4a sigv4-s3express].include?(auth_scheme['name'])
44
+ auth_scheme['signingName'] ||= sigv4_name(config)
45
+ if auth_scheme['name'] == 'sigv4a'
46
+ # config option supersedes endpoint properties
47
+ auth_scheme['signingRegionSet'] =
48
+ config.sigv4a_signing_region_set || auth_scheme['signingRegionSet'] || [config.region]
49
+ else
50
+ auth_scheme['signingRegion'] ||= config.region
51
+ end
52
+ end
53
+ auth_scheme
54
+ end
55
+
56
+ def sigv4_name(config)
57
+ config.api.metadata['signingName'] ||
58
+ config.api.metadata['endpointPrefix']
59
+ end
60
+
36
61
  def default_auth_scheme(context)
37
- case default_api_authtype(context)
62
+ if (auth_list = default_api_auth(context))
63
+ auth = auth_list.find { |a| SUPPORTED_AUTH_TRAITS.include?(a) }
64
+ case auth
65
+ when 'aws.auth#sigv4', 'aws.auth#sigv4a'
66
+ auth_scheme = { 'name' => auth.split('#').last }
67
+ if s3_or_s3v4_signature_version?(context)
68
+ auth_scheme = auth_scheme.merge(
69
+ 'disableDoubleEncoding' => true,
70
+ 'disableNormalizePath' => true
71
+ )
72
+ end
73
+ merge_signing_defaults(auth_scheme, context.config)
74
+ when 'smithy.api#httpBearerAuth'
75
+ { 'name' => 'bearer' }
76
+ when 'smithy.api#noAuth'
77
+ { 'name' => 'none' }
78
+ else
79
+ raise 'No supported auth trait for this endpoint.'
80
+ end
81
+ else
82
+ legacy_default_auth_scheme(context)
83
+ end
84
+ end
85
+
86
+ def default_api_auth(context)
87
+ context.config.api.operation(context.operation_name)['auth'] ||
88
+ context.config.api.metadata['auth']
89
+ end
90
+
91
+ def s3_or_s3v4_signature_version?(context)
92
+ %w[s3 s3v4].include?(context.config.api.metadata['signatureVersion'])
93
+ end
94
+
95
+ # Legacy auth resolution - looks for deprecated signatureVersion
96
+ # and authType traits.
97
+
98
+ def legacy_default_auth_scheme(context)
99
+ case legacy_default_api_authtype(context)
38
100
  when 'v4', 'v4-unsigned-body'
39
101
  auth_scheme = { 'name' => 'sigv4' }
40
102
  merge_signing_defaults(auth_scheme, context.config)
@@ -52,27 +114,11 @@ module Aws
52
114
  end
53
115
  end
54
116
 
55
- def merge_signing_defaults(auth_scheme, config)
56
- if %w[sigv4 sigv4a sigv4-s3express].include?(auth_scheme['name'])
57
- auth_scheme['signingName'] ||= sigv4_name(config)
58
- if auth_scheme['name'] == 'sigv4a'
59
- auth_scheme['signingRegionSet'] ||= ['*']
60
- else
61
- auth_scheme['signingRegion'] ||= config.region
62
- end
63
- end
64
- auth_scheme
65
- end
66
-
67
- def default_api_authtype(context)
117
+ def legacy_default_api_authtype(context)
68
118
  context.config.api.operation(context.operation_name)['authtype'] ||
69
119
  context.config.api.metadata['signatureVersion']
70
120
  end
71
121
 
72
- def sigv4_name(config)
73
- config.api.metadata['signingName'] ||
74
- config.api.metadata['endpointPrefix']
75
- end
76
122
  end
77
123
  end
78
124
  end
@@ -236,6 +236,15 @@ module Aws
236
236
  end
237
237
  end
238
238
 
239
+ # Raised when a client is constructed and the sigv4a region set is invalid.
240
+ # It is invalid when it is empty and/or contains empty strings.
241
+ class InvalidRegionSetError < ArgumentError
242
+ def initialize(*args)
243
+ msg = 'The provided sigv4a region set was empty or invalid.'
244
+ super(msg)
245
+ end
246
+ end
247
+
239
248
  # Raised when a client is contsructed and the region is not valid.
240
249
  class InvalidRegionError < ArgumentError
241
250
  def initialize(*args)
@@ -4,6 +4,8 @@ module Aws
4
4
  # @api private
5
5
  module Plugins
6
6
  # @api private
7
+ # Deprecated - does not look at new traits like `auth` and `unsignedPayload`
8
+ # Necessary to exist after endpoints 2.0 for old service clients + new core
7
9
  class BearerAuthorization < Seahorse::Client::Plugin
8
10
 
9
11
  option(:token_provider,
@@ -238,7 +238,8 @@ module Aws
238
238
 
239
239
  # determine where (header vs trailer) a request checksum should be added
240
240
  def checksum_request_in(context)
241
- if context.operation['authtype'].eql?('v4-unsigned-body')
241
+ if context.operation['unsignedPayload'] ||
242
+ context.operation['authtype'] == 'v4-unsigned-body'
242
243
  'trailer'
243
244
  else
244
245
  'header'
@@ -24,6 +24,21 @@ a default `:region` is searched for in the following locations:
24
24
  resolve_region(cfg)
25
25
  end
26
26
 
27
+ option(:sigv4a_signing_region_set,
28
+ doc_type: Array,
29
+ rbs_type: 'Array[String]',
30
+ docstring: <<-DOCS) do |cfg|
31
+ A list of regions that should be signed with SigV4a signing. When
32
+ not passed, a default `:sigv4a_signing_region_set` is searched for
33
+ in the following locations:
34
+
35
+ * `Aws.config[:sigv4a_signing_region_set]`
36
+ * `ENV['AWS_SIGV4A_SIGNING_REGION_SET']`
37
+ * `~/.aws/config`
38
+ DOCS
39
+ resolve_sigv4a_signing_region_set(cfg)
40
+ end
41
+
27
42
  option(:use_dualstack_endpoint,
28
43
  doc_type: 'Boolean',
29
44
  docstring: <<-DOCS) do |cfg|
@@ -65,9 +80,17 @@ to test or custom endpoints. This should be a valid HTTP(S) URI.
65
80
  end
66
81
 
67
82
  def after_initialize(client)
68
- if client.config.region.nil? || client.config.region == ''
69
- raise Errors::MissingRegionError
70
- end
83
+ region = client.config.region
84
+ raise Errors::MissingRegionError if region.nil? || region == ''
85
+
86
+ region_set = client.config.sigv4a_signing_region_set
87
+ return if region_set.nil?
88
+ raise Errors::InvalidRegionSetError unless region_set.is_a?(Array)
89
+
90
+ region_set = region_set.compact.reject(&:empty?)
91
+ raise Errors::InvalidRegionSetError if region_set.empty?
92
+
93
+ client.config.sigv4a_signing_region_set = region_set
71
94
  end
72
95
 
73
96
  class << self
@@ -81,6 +104,12 @@ to test or custom endpoints. This should be a valid HTTP(S) URI.
81
104
  env_region || cfg_region
82
105
  end
83
106
 
107
+ def resolve_sigv4a_signing_region_set(cfg)
108
+ value = ENV['AWS_SIGV4A_SIGNING_REGION_SET']
109
+ value ||= Aws.shared_config.sigv4a_signing_region_set(profile: cfg.profile)
110
+ value.split(',') if value
111
+ end
112
+
84
113
  def resolve_use_dualstack_endpoint(cfg)
85
114
  value = ENV['AWS_USE_DUALSTACK_ENDPOINT']
86
115
  value ||= Aws.shared_config.use_dualstack_endpoint(
@@ -102,7 +102,7 @@ module Aws
102
102
  end
103
103
 
104
104
  region = if scheme_name == 'sigv4a'
105
- auth_scheme['signingRegionSet'].first
105
+ auth_scheme['signingRegionSet'].join(',')
106
106
  else
107
107
  auth_scheme['signingRegion']
108
108
  end
@@ -159,17 +159,20 @@ module Aws
159
159
  private
160
160
 
161
161
  def apply_authtype(context, req)
162
- # only used for eventstreaming at input
162
+ # only used for event streaming at input
163
163
  if context[:input_event_emitter]
164
164
  req.headers['X-Amz-Content-Sha256'] = 'STREAMING-AWS4-HMAC-SHA256-EVENTS'
165
- else
166
- if context.operation['authtype'].eql?('v4-unsigned-body') &&
167
- req.endpoint.scheme.eql?('https')
168
- req.headers['X-Amz-Content-Sha256'] ||= 'UNSIGNED-PAYLOAD'
169
- end
165
+ elsif unsigned_payload?(context, req)
166
+ req.headers['X-Amz-Content-Sha256'] ||= 'UNSIGNED-PAYLOAD'
170
167
  end
171
168
  end
172
169
 
170
+ def unsigned_payload?(context, req)
171
+ (context.operation['unsignedPayload'] ||
172
+ context.operation['authtype'] == 'v4-unsigned-body') &&
173
+ req.endpoint.scheme == 'https'
174
+ end
175
+
173
176
  def reset_signature(req)
174
177
  # in case this request is being re-signed
175
178
  req.headers.delete('Authorization')
@@ -3,7 +3,8 @@
3
3
  module Aws
4
4
  module Plugins
5
5
  # @api private
6
- # Necessary to keep after Endpoints 2.0
6
+ # Deprecated - does not look at new traits like `auth` and `unsignedPayload`
7
+ # Necessary to exist after endpoints 2.0 for old service clients + new core
7
8
  class SignatureV2 < Seahorse::Client::Plugin
8
9
 
9
10
  option(:v2_signer) do |cfg|
@@ -5,7 +5,8 @@ require 'aws-sigv4'
5
5
  module Aws
6
6
  module Plugins
7
7
  # @api private
8
- # Necessary to exist after endpoints 2.0
8
+ # Deprecated - does not look at new traits like `auth` and `unsignedPayload`
9
+ # Necessary to exist after endpoints 2.0 for old service clients + new core
9
10
  class SignatureV4 < Seahorse::Client::Plugin
10
11
 
11
12
  V4_AUTH = %w[v4 v4-unsigned-payload v4-unsigned-body]
@@ -5,7 +5,8 @@ module Aws
5
5
 
6
6
  # For Streaming Input Operations, when `requiresLength` is enabled
7
7
  # checking whether `Content-Length` header can be set,
8
- # for `v4-unsigned-body` operations, set `Transfer-Encoding` header
8
+ # for `unsignedPayload` and `v4-unsigned-body` operations,
9
+ # set `Transfer-Encoding` header.
9
10
  class TransferEncoding < Seahorse::Client::Plugin
10
11
 
11
12
  # @api private
@@ -16,8 +17,8 @@ module Aws
16
17
  unless context.http_request.body.respond_to?(:size)
17
18
  if requires_length?(context.operation.input)
18
19
  # if size of the IO is not available but required
19
- raise Aws::Errors::MissingContentLength.new
20
- elsif context.operation['authtype'] == "v4-unsigned-body"
20
+ raise Aws::Errors::MissingContentLength
21
+ elsif unsigned_payload?(context.operation)
21
22
  context.http_request.headers['Transfer-Encoding'] = 'chunked'
22
23
  end
23
24
  end
@@ -29,18 +30,24 @@ module Aws
29
30
  private
30
31
 
31
32
  def streaming?(ref)
32
- if payload = ref[:payload_member]
33
- payload["streaming"] || # checking ref and shape
34
- payload.shape["streaming"]
33
+ if (payload = ref[:payload_member])
34
+ payload['streaming'] || payload.shape['streaming']
35
35
  else
36
36
  false
37
37
  end
38
38
  end
39
39
 
40
+ def unsigned_payload?(operation)
41
+ operation['unsignedPayload'] ||
42
+ operation['authtype'] == 'v4-unsigned-body'
43
+ end
44
+
40
45
  def requires_length?(ref)
41
- payload = ref[:payload_member]
42
- payload["requiresLength"] || # checking ref and shape
43
- payload.shape["requiresLength"]
46
+ if (payload = ref[:payload_member])
47
+ payload['requiresLength'] || payload.shape['requiresLength']
48
+ else
49
+ false
50
+ end
44
51
  end
45
52
 
46
53
  end
@@ -198,6 +198,7 @@ module Aws
198
198
 
199
199
  config_reader(
200
200
  :region,
201
+ :sigv4a_signing_region_set,
201
202
  :ca_bundle,
202
203
  :credential_process,
203
204
  :endpoint_discovery_enabled,
@@ -312,6 +312,15 @@ module Aws::SSO
312
312
  #
313
313
  # @option options [String] :session_token
314
314
  #
315
+ # @option options [Array] :sigv4a_signing_region_set
316
+ # A list of regions that should be signed with SigV4a signing. When
317
+ # not passed, a default `:sigv4a_signing_region_set` is searched for
318
+ # in the following locations:
319
+ #
320
+ # * `Aws.config[:sigv4a_signing_region_set]`
321
+ # * `ENV['AWS_SIGV4A_SIGNING_REGION_SET']`
322
+ # * `~/.aws/config`
323
+ #
315
324
  # @option options [Boolean] :stub_responses (false)
316
325
  # Causes the client to return stubbed responses. By default
317
326
  # fake responses are generated and returned. You can specify
@@ -633,7 +642,7 @@ module Aws::SSO
633
642
  params: params,
634
643
  config: config)
635
644
  context[:gem_name] = 'aws-sdk-core'
636
- context[:gem_version] = '3.200.0'
645
+ context[:gem_version] = '3.201.0'
637
646
  Seahorse::Client::Request.new(handlers, context)
638
647
  end
639
648
 
@@ -129,6 +129,7 @@ module Aws::SSO
129
129
  o.http_method = "GET"
130
130
  o.http_request_uri = "/federation/credentials"
131
131
  o['authtype'] = "none"
132
+ o['auth'] = ["smithy.api#noAuth"]
132
133
  o.input = Shapes::ShapeRef.new(shape: GetRoleCredentialsRequest)
133
134
  o.output = Shapes::ShapeRef.new(shape: GetRoleCredentialsResponse)
134
135
  o.errors << Shapes::ShapeRef.new(shape: InvalidRequestException)
@@ -142,6 +143,7 @@ module Aws::SSO
142
143
  o.http_method = "GET"
143
144
  o.http_request_uri = "/assignment/roles"
144
145
  o['authtype'] = "none"
146
+ o['auth'] = ["smithy.api#noAuth"]
145
147
  o.input = Shapes::ShapeRef.new(shape: ListAccountRolesRequest)
146
148
  o.output = Shapes::ShapeRef.new(shape: ListAccountRolesResponse)
147
149
  o.errors << Shapes::ShapeRef.new(shape: InvalidRequestException)
@@ -161,6 +163,7 @@ module Aws::SSO
161
163
  o.http_method = "GET"
162
164
  o.http_request_uri = "/assignment/accounts"
163
165
  o['authtype'] = "none"
166
+ o['auth'] = ["smithy.api#noAuth"]
164
167
  o.input = Shapes::ShapeRef.new(shape: ListAccountsRequest)
165
168
  o.output = Shapes::ShapeRef.new(shape: ListAccountsResponse)
166
169
  o.errors << Shapes::ShapeRef.new(shape: InvalidRequestException)
@@ -180,6 +183,7 @@ module Aws::SSO
180
183
  o.http_method = "POST"
181
184
  o.http_request_uri = "/logout"
182
185
  o['authtype'] = "none"
186
+ o['auth'] = ["smithy.api#noAuth"]
183
187
  o.input = Shapes::ShapeRef.new(shape: LogoutRequest)
184
188
  o.output = Shapes::ShapeRef.new(shape: Shapes::StructureShape.new(struct_class: Aws::EmptyStructure))
185
189
  o.errors << Shapes::ShapeRef.new(shape: InvalidRequestException)
data/lib/aws-sdk-sso.rb CHANGED
@@ -54,6 +54,6 @@ require_relative 'aws-sdk-sso/customizations'
54
54
  # @!group service
55
55
  module Aws::SSO
56
56
 
57
- GEM_VERSION = '3.200.0'
57
+ GEM_VERSION = '3.201.0'
58
58
 
59
59
  end
@@ -312,6 +312,15 @@ module Aws::SSOOIDC
312
312
  #
313
313
  # @option options [String] :session_token
314
314
  #
315
+ # @option options [Array] :sigv4a_signing_region_set
316
+ # A list of regions that should be signed with SigV4a signing. When
317
+ # not passed, a default `:sigv4a_signing_region_set` is searched for
318
+ # in the following locations:
319
+ #
320
+ # * `Aws.config[:sigv4a_signing_region_set]`
321
+ # * `ENV['AWS_SIGV4A_SIGNING_REGION_SET']`
322
+ # * `~/.aws/config`
323
+ #
315
324
  # @option options [Boolean] :stub_responses (false)
316
325
  # Causes the client to return stubbed responses. By default
317
326
  # fake responses are generated and returned. You can specify
@@ -986,7 +995,7 @@ module Aws::SSOOIDC
986
995
  params: params,
987
996
  config: config)
988
997
  context[:gem_name] = 'aws-sdk-core'
989
- context[:gem_version] = '3.200.0'
998
+ context[:gem_version] = '3.201.0'
990
999
  Seahorse::Client::Request.new(handlers, context)
991
1000
  end
992
1001
 
@@ -225,6 +225,7 @@ module Aws::SSOOIDC
225
225
  o.http_method = "POST"
226
226
  o.http_request_uri = "/token"
227
227
  o['authtype'] = "none"
228
+ o['auth'] = ["smithy.api#noAuth"]
228
229
  o.input = Shapes::ShapeRef.new(shape: CreateTokenRequest)
229
230
  o.output = Shapes::ShapeRef.new(shape: CreateTokenResponse)
230
231
  o.errors << Shapes::ShapeRef.new(shape: InvalidRequestException)
@@ -265,6 +266,7 @@ module Aws::SSOOIDC
265
266
  o.http_method = "POST"
266
267
  o.http_request_uri = "/client/register"
267
268
  o['authtype'] = "none"
269
+ o['auth'] = ["smithy.api#noAuth"]
268
270
  o.input = Shapes::ShapeRef.new(shape: RegisterClientRequest)
269
271
  o.output = Shapes::ShapeRef.new(shape: RegisterClientResponse)
270
272
  o.errors << Shapes::ShapeRef.new(shape: InvalidRequestException)
@@ -280,6 +282,7 @@ module Aws::SSOOIDC
280
282
  o.http_method = "POST"
281
283
  o.http_request_uri = "/device_authorization"
282
284
  o['authtype'] = "none"
285
+ o['auth'] = ["smithy.api#noAuth"]
283
286
  o.input = Shapes::ShapeRef.new(shape: StartDeviceAuthorizationRequest)
284
287
  o.output = Shapes::ShapeRef.new(shape: StartDeviceAuthorizationResponse)
285
288
  o.errors << Shapes::ShapeRef.new(shape: InvalidRequestException)
@@ -54,6 +54,6 @@ require_relative 'aws-sdk-ssooidc/customizations'
54
54
  # @!group service
55
55
  module Aws::SSOOIDC
56
56
 
57
- GEM_VERSION = '3.200.0'
57
+ GEM_VERSION = '3.201.0'
58
58
 
59
59
  end
@@ -314,6 +314,15 @@ module Aws::STS
314
314
  #
315
315
  # @option options [String] :session_token
316
316
  #
317
+ # @option options [Array] :sigv4a_signing_region_set
318
+ # A list of regions that should be signed with SigV4a signing. When
319
+ # not passed, a default `:sigv4a_signing_region_set` is searched for
320
+ # in the following locations:
321
+ #
322
+ # * `Aws.config[:sigv4a_signing_region_set]`
323
+ # * `ENV['AWS_SIGV4A_SIGNING_REGION_SET']`
324
+ # * `~/.aws/config`
325
+ #
317
326
  # @option options [String] :sts_regional_endpoints ("regional")
318
327
  # Passing in 'regional' to enable regional endpoint for STS for all supported
319
328
  # regions (except 'aws-global'). Using 'legacy' mode will force all legacy
@@ -2380,7 +2389,7 @@ module Aws::STS
2380
2389
  params: params,
2381
2390
  config: config)
2382
2391
  context[:gem_name] = 'aws-sdk-core'
2383
- context[:gem_version] = '3.200.0'
2392
+ context[:gem_version] = '3.201.0'
2384
2393
  Seahorse::Client::Request.new(handlers, context)
2385
2394
  end
2386
2395
 
@@ -280,7 +280,7 @@ module Aws::STS
280
280
  o.name = "AssumeRoleWithSAML"
281
281
  o.http_method = "POST"
282
282
  o.http_request_uri = "/"
283
- o['authtype'] = "none"
283
+ o['auth'] = ["smithy.api#noAuth"]
284
284
  o.input = Shapes::ShapeRef.new(shape: AssumeRoleWithSAMLRequest)
285
285
  o.output = Shapes::ShapeRef.new(shape: AssumeRoleWithSAMLResponse)
286
286
  o.errors << Shapes::ShapeRef.new(shape: MalformedPolicyDocumentException)
@@ -295,7 +295,7 @@ module Aws::STS
295
295
  o.name = "AssumeRoleWithWebIdentity"
296
296
  o.http_method = "POST"
297
297
  o.http_request_uri = "/"
298
- o['authtype'] = "none"
298
+ o['auth'] = ["smithy.api#noAuth"]
299
299
  o.input = Shapes::ShapeRef.new(shape: AssumeRoleWithWebIdentityRequest)
300
300
  o.output = Shapes::ShapeRef.new(shape: AssumeRoleWithWebIdentityResponse)
301
301
  o.errors << Shapes::ShapeRef.new(shape: MalformedPolicyDocumentException)
data/lib/aws-sdk-sts.rb CHANGED
@@ -54,6 +54,6 @@ require_relative 'aws-sdk-sts/customizations'
54
54
  # @!group service
55
55
  module Aws::STS
56
56
 
57
- GEM_VERSION = '3.200.0'
57
+ GEM_VERSION = '3.201.0'
58
58
 
59
59
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-core
3
3
  version: !ruby/object:Gem::Version
4
- version: 3.200.0
4
+ version: 3.201.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2024-06-28 00:00:00.000000000 Z
11
+ date: 2024-07-02 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: jmespath