aws-sdk-core 3.200.0 → 3.201.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +13 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-core/endpoints.rb +64 -18
- data/lib/aws-sdk-core/errors.rb +9 -0
- data/lib/aws-sdk-core/plugins/bearer_authorization.rb +2 -0
- data/lib/aws-sdk-core/plugins/checksum_algorithm.rb +2 -1
- data/lib/aws-sdk-core/plugins/regional_endpoint.rb +32 -3
- data/lib/aws-sdk-core/plugins/sign.rb +10 -7
- data/lib/aws-sdk-core/plugins/signature_v2.rb +2 -1
- data/lib/aws-sdk-core/plugins/signature_v4.rb +2 -1
- data/lib/aws-sdk-core/plugins/transfer_encoding.rb +16 -9
- data/lib/aws-sdk-core/shared_config.rb +1 -0
- data/lib/aws-sdk-sso/client.rb +10 -1
- data/lib/aws-sdk-sso/client_api.rb +4 -0
- data/lib/aws-sdk-sso.rb +1 -1
- data/lib/aws-sdk-ssooidc/client.rb +10 -1
- data/lib/aws-sdk-ssooidc/client_api.rb +3 -0
- data/lib/aws-sdk-ssooidc.rb +1 -1
- data/lib/aws-sdk-sts/client.rb +10 -1
- data/lib/aws-sdk-sts/client_api.rb +2 -2
- data/lib/aws-sdk-sts.rb +1 -1
- metadata +2 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 66b895cbab1c128ae492f8b02d379edf6856cd38a6eadf985b97a798f4cf4252
|
4
|
+
data.tar.gz: dadbea139b8d5e9f72dc66492478f80e17d501c2b1a6f8acb482a0c8b036ace6
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 7f60df6c8bc98191884bfd56ce021b337c2f08e4b87b235afb4a8ea39de9e15f6ff036a9a442cf6b4fb40635a5b03a0bbe082310e498474f251c7e5119cc3d28
|
7
|
+
data.tar.gz: 6ba5a5f1afb8f00cb676a5b61b59a7ca3ccc0922fa92f5548c126151d4d9446a745ea275a88d01ba275fa00583f0cde7fcd276847c513e4e72b26dbb15f2cfc0
|
data/CHANGELOG.md
CHANGED
@@ -1,6 +1,19 @@
|
|
1
1
|
Unreleased Changes
|
2
2
|
------------------
|
3
3
|
|
4
|
+
3.201.0 (2024-07-02)
|
5
|
+
------------------
|
6
|
+
|
7
|
+
* Feature - Updated Aws::STS::Client with the latest API changes.
|
8
|
+
|
9
|
+
* Feature - Updated Aws::SSOOIDC::Client with the latest API changes.
|
10
|
+
|
11
|
+
* Feature - Updated Aws::SSO::Client with the latest API changes.
|
12
|
+
|
13
|
+
* Feature - Support `auth` trait to enable SigV4a based services.
|
14
|
+
|
15
|
+
* Feature - Support configuration for sigv4a signing regions using `ENV['AWS_SIGV4A_SIGNING_REGION_SET']`, `sigv4a_signing_region_set` shared config, or the `sigv4a_signing_region_set` client option.
|
16
|
+
|
4
17
|
3.200.0 (2024-06-28)
|
5
18
|
------------------
|
6
19
|
|
data/VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
3.
|
1
|
+
3.201.0
|
@@ -14,9 +14,15 @@ require_relative 'endpoints/templater'
|
|
14
14
|
require_relative 'endpoints/tree_rule'
|
15
15
|
require_relative 'endpoints/url'
|
16
16
|
|
17
|
+
require 'aws-sigv4'
|
18
|
+
|
17
19
|
module Aws
|
18
20
|
# @api private
|
19
21
|
module Endpoints
|
22
|
+
supported_auth_traits = %w[aws.auth#sigv4 smithy.api#httpBearerAuth smithy.api#noAuth]
|
23
|
+
supported_auth_traits += ['aws.auth#sigv4a'] if Aws::Sigv4::Signer.use_crt?
|
24
|
+
SUPPORTED_AUTH_TRAITS = supported_auth_traits.freeze
|
25
|
+
|
20
26
|
class << self
|
21
27
|
def resolve_auth_scheme(context, endpoint)
|
22
28
|
if endpoint && (auth_schemes = endpoint.properties['authSchemes'])
|
@@ -33,8 +39,64 @@ module Aws
|
|
33
39
|
|
34
40
|
private
|
35
41
|
|
42
|
+
def merge_signing_defaults(auth_scheme, config)
|
43
|
+
if %w[sigv4 sigv4a sigv4-s3express].include?(auth_scheme['name'])
|
44
|
+
auth_scheme['signingName'] ||= sigv4_name(config)
|
45
|
+
if auth_scheme['name'] == 'sigv4a'
|
46
|
+
# config option supersedes endpoint properties
|
47
|
+
auth_scheme['signingRegionSet'] =
|
48
|
+
config.sigv4a_signing_region_set || auth_scheme['signingRegionSet'] || [config.region]
|
49
|
+
else
|
50
|
+
auth_scheme['signingRegion'] ||= config.region
|
51
|
+
end
|
52
|
+
end
|
53
|
+
auth_scheme
|
54
|
+
end
|
55
|
+
|
56
|
+
def sigv4_name(config)
|
57
|
+
config.api.metadata['signingName'] ||
|
58
|
+
config.api.metadata['endpointPrefix']
|
59
|
+
end
|
60
|
+
|
36
61
|
def default_auth_scheme(context)
|
37
|
-
|
62
|
+
if (auth_list = default_api_auth(context))
|
63
|
+
auth = auth_list.find { |a| SUPPORTED_AUTH_TRAITS.include?(a) }
|
64
|
+
case auth
|
65
|
+
when 'aws.auth#sigv4', 'aws.auth#sigv4a'
|
66
|
+
auth_scheme = { 'name' => auth.split('#').last }
|
67
|
+
if s3_or_s3v4_signature_version?(context)
|
68
|
+
auth_scheme = auth_scheme.merge(
|
69
|
+
'disableDoubleEncoding' => true,
|
70
|
+
'disableNormalizePath' => true
|
71
|
+
)
|
72
|
+
end
|
73
|
+
merge_signing_defaults(auth_scheme, context.config)
|
74
|
+
when 'smithy.api#httpBearerAuth'
|
75
|
+
{ 'name' => 'bearer' }
|
76
|
+
when 'smithy.api#noAuth'
|
77
|
+
{ 'name' => 'none' }
|
78
|
+
else
|
79
|
+
raise 'No supported auth trait for this endpoint.'
|
80
|
+
end
|
81
|
+
else
|
82
|
+
legacy_default_auth_scheme(context)
|
83
|
+
end
|
84
|
+
end
|
85
|
+
|
86
|
+
def default_api_auth(context)
|
87
|
+
context.config.api.operation(context.operation_name)['auth'] ||
|
88
|
+
context.config.api.metadata['auth']
|
89
|
+
end
|
90
|
+
|
91
|
+
def s3_or_s3v4_signature_version?(context)
|
92
|
+
%w[s3 s3v4].include?(context.config.api.metadata['signatureVersion'])
|
93
|
+
end
|
94
|
+
|
95
|
+
# Legacy auth resolution - looks for deprecated signatureVersion
|
96
|
+
# and authType traits.
|
97
|
+
|
98
|
+
def legacy_default_auth_scheme(context)
|
99
|
+
case legacy_default_api_authtype(context)
|
38
100
|
when 'v4', 'v4-unsigned-body'
|
39
101
|
auth_scheme = { 'name' => 'sigv4' }
|
40
102
|
merge_signing_defaults(auth_scheme, context.config)
|
@@ -52,27 +114,11 @@ module Aws
|
|
52
114
|
end
|
53
115
|
end
|
54
116
|
|
55
|
-
def
|
56
|
-
if %w[sigv4 sigv4a sigv4-s3express].include?(auth_scheme['name'])
|
57
|
-
auth_scheme['signingName'] ||= sigv4_name(config)
|
58
|
-
if auth_scheme['name'] == 'sigv4a'
|
59
|
-
auth_scheme['signingRegionSet'] ||= ['*']
|
60
|
-
else
|
61
|
-
auth_scheme['signingRegion'] ||= config.region
|
62
|
-
end
|
63
|
-
end
|
64
|
-
auth_scheme
|
65
|
-
end
|
66
|
-
|
67
|
-
def default_api_authtype(context)
|
117
|
+
def legacy_default_api_authtype(context)
|
68
118
|
context.config.api.operation(context.operation_name)['authtype'] ||
|
69
119
|
context.config.api.metadata['signatureVersion']
|
70
120
|
end
|
71
121
|
|
72
|
-
def sigv4_name(config)
|
73
|
-
config.api.metadata['signingName'] ||
|
74
|
-
config.api.metadata['endpointPrefix']
|
75
|
-
end
|
76
122
|
end
|
77
123
|
end
|
78
124
|
end
|
data/lib/aws-sdk-core/errors.rb
CHANGED
@@ -236,6 +236,15 @@ module Aws
|
|
236
236
|
end
|
237
237
|
end
|
238
238
|
|
239
|
+
# Raised when a client is constructed and the sigv4a region set is invalid.
|
240
|
+
# It is invalid when it is empty and/or contains empty strings.
|
241
|
+
class InvalidRegionSetError < ArgumentError
|
242
|
+
def initialize(*args)
|
243
|
+
msg = 'The provided sigv4a region set was empty or invalid.'
|
244
|
+
super(msg)
|
245
|
+
end
|
246
|
+
end
|
247
|
+
|
239
248
|
# Raised when a client is contsructed and the region is not valid.
|
240
249
|
class InvalidRegionError < ArgumentError
|
241
250
|
def initialize(*args)
|
@@ -4,6 +4,8 @@ module Aws
|
|
4
4
|
# @api private
|
5
5
|
module Plugins
|
6
6
|
# @api private
|
7
|
+
# Deprecated - does not look at new traits like `auth` and `unsignedPayload`
|
8
|
+
# Necessary to exist after endpoints 2.0 for old service clients + new core
|
7
9
|
class BearerAuthorization < Seahorse::Client::Plugin
|
8
10
|
|
9
11
|
option(:token_provider,
|
@@ -238,7 +238,8 @@ module Aws
|
|
238
238
|
|
239
239
|
# determine where (header vs trailer) a request checksum should be added
|
240
240
|
def checksum_request_in(context)
|
241
|
-
if context.operation['
|
241
|
+
if context.operation['unsignedPayload'] ||
|
242
|
+
context.operation['authtype'] == 'v4-unsigned-body'
|
242
243
|
'trailer'
|
243
244
|
else
|
244
245
|
'header'
|
@@ -24,6 +24,21 @@ a default `:region` is searched for in the following locations:
|
|
24
24
|
resolve_region(cfg)
|
25
25
|
end
|
26
26
|
|
27
|
+
option(:sigv4a_signing_region_set,
|
28
|
+
doc_type: Array,
|
29
|
+
rbs_type: 'Array[String]',
|
30
|
+
docstring: <<-DOCS) do |cfg|
|
31
|
+
A list of regions that should be signed with SigV4a signing. When
|
32
|
+
not passed, a default `:sigv4a_signing_region_set` is searched for
|
33
|
+
in the following locations:
|
34
|
+
|
35
|
+
* `Aws.config[:sigv4a_signing_region_set]`
|
36
|
+
* `ENV['AWS_SIGV4A_SIGNING_REGION_SET']`
|
37
|
+
* `~/.aws/config`
|
38
|
+
DOCS
|
39
|
+
resolve_sigv4a_signing_region_set(cfg)
|
40
|
+
end
|
41
|
+
|
27
42
|
option(:use_dualstack_endpoint,
|
28
43
|
doc_type: 'Boolean',
|
29
44
|
docstring: <<-DOCS) do |cfg|
|
@@ -65,9 +80,17 @@ to test or custom endpoints. This should be a valid HTTP(S) URI.
|
|
65
80
|
end
|
66
81
|
|
67
82
|
def after_initialize(client)
|
68
|
-
|
69
|
-
|
70
|
-
|
83
|
+
region = client.config.region
|
84
|
+
raise Errors::MissingRegionError if region.nil? || region == ''
|
85
|
+
|
86
|
+
region_set = client.config.sigv4a_signing_region_set
|
87
|
+
return if region_set.nil?
|
88
|
+
raise Errors::InvalidRegionSetError unless region_set.is_a?(Array)
|
89
|
+
|
90
|
+
region_set = region_set.compact.reject(&:empty?)
|
91
|
+
raise Errors::InvalidRegionSetError if region_set.empty?
|
92
|
+
|
93
|
+
client.config.sigv4a_signing_region_set = region_set
|
71
94
|
end
|
72
95
|
|
73
96
|
class << self
|
@@ -81,6 +104,12 @@ to test or custom endpoints. This should be a valid HTTP(S) URI.
|
|
81
104
|
env_region || cfg_region
|
82
105
|
end
|
83
106
|
|
107
|
+
def resolve_sigv4a_signing_region_set(cfg)
|
108
|
+
value = ENV['AWS_SIGV4A_SIGNING_REGION_SET']
|
109
|
+
value ||= Aws.shared_config.sigv4a_signing_region_set(profile: cfg.profile)
|
110
|
+
value.split(',') if value
|
111
|
+
end
|
112
|
+
|
84
113
|
def resolve_use_dualstack_endpoint(cfg)
|
85
114
|
value = ENV['AWS_USE_DUALSTACK_ENDPOINT']
|
86
115
|
value ||= Aws.shared_config.use_dualstack_endpoint(
|
@@ -102,7 +102,7 @@ module Aws
|
|
102
102
|
end
|
103
103
|
|
104
104
|
region = if scheme_name == 'sigv4a'
|
105
|
-
auth_scheme['signingRegionSet'].
|
105
|
+
auth_scheme['signingRegionSet'].join(',')
|
106
106
|
else
|
107
107
|
auth_scheme['signingRegion']
|
108
108
|
end
|
@@ -159,17 +159,20 @@ module Aws
|
|
159
159
|
private
|
160
160
|
|
161
161
|
def apply_authtype(context, req)
|
162
|
-
# only used for
|
162
|
+
# only used for event streaming at input
|
163
163
|
if context[:input_event_emitter]
|
164
164
|
req.headers['X-Amz-Content-Sha256'] = 'STREAMING-AWS4-HMAC-SHA256-EVENTS'
|
165
|
-
|
166
|
-
|
167
|
-
req.endpoint.scheme.eql?('https')
|
168
|
-
req.headers['X-Amz-Content-Sha256'] ||= 'UNSIGNED-PAYLOAD'
|
169
|
-
end
|
165
|
+
elsif unsigned_payload?(context, req)
|
166
|
+
req.headers['X-Amz-Content-Sha256'] ||= 'UNSIGNED-PAYLOAD'
|
170
167
|
end
|
171
168
|
end
|
172
169
|
|
170
|
+
def unsigned_payload?(context, req)
|
171
|
+
(context.operation['unsignedPayload'] ||
|
172
|
+
context.operation['authtype'] == 'v4-unsigned-body') &&
|
173
|
+
req.endpoint.scheme == 'https'
|
174
|
+
end
|
175
|
+
|
173
176
|
def reset_signature(req)
|
174
177
|
# in case this request is being re-signed
|
175
178
|
req.headers.delete('Authorization')
|
@@ -3,7 +3,8 @@
|
|
3
3
|
module Aws
|
4
4
|
module Plugins
|
5
5
|
# @api private
|
6
|
-
#
|
6
|
+
# Deprecated - does not look at new traits like `auth` and `unsignedPayload`
|
7
|
+
# Necessary to exist after endpoints 2.0 for old service clients + new core
|
7
8
|
class SignatureV2 < Seahorse::Client::Plugin
|
8
9
|
|
9
10
|
option(:v2_signer) do |cfg|
|
@@ -5,7 +5,8 @@ require 'aws-sigv4'
|
|
5
5
|
module Aws
|
6
6
|
module Plugins
|
7
7
|
# @api private
|
8
|
-
#
|
8
|
+
# Deprecated - does not look at new traits like `auth` and `unsignedPayload`
|
9
|
+
# Necessary to exist after endpoints 2.0 for old service clients + new core
|
9
10
|
class SignatureV4 < Seahorse::Client::Plugin
|
10
11
|
|
11
12
|
V4_AUTH = %w[v4 v4-unsigned-payload v4-unsigned-body]
|
@@ -5,7 +5,8 @@ module Aws
|
|
5
5
|
|
6
6
|
# For Streaming Input Operations, when `requiresLength` is enabled
|
7
7
|
# checking whether `Content-Length` header can be set,
|
8
|
-
# for `v4-unsigned-body` operations,
|
8
|
+
# for `unsignedPayload` and `v4-unsigned-body` operations,
|
9
|
+
# set `Transfer-Encoding` header.
|
9
10
|
class TransferEncoding < Seahorse::Client::Plugin
|
10
11
|
|
11
12
|
# @api private
|
@@ -16,8 +17,8 @@ module Aws
|
|
16
17
|
unless context.http_request.body.respond_to?(:size)
|
17
18
|
if requires_length?(context.operation.input)
|
18
19
|
# if size of the IO is not available but required
|
19
|
-
raise Aws::Errors::MissingContentLength
|
20
|
-
elsif context.operation
|
20
|
+
raise Aws::Errors::MissingContentLength
|
21
|
+
elsif unsigned_payload?(context.operation)
|
21
22
|
context.http_request.headers['Transfer-Encoding'] = 'chunked'
|
22
23
|
end
|
23
24
|
end
|
@@ -29,18 +30,24 @@ module Aws
|
|
29
30
|
private
|
30
31
|
|
31
32
|
def streaming?(ref)
|
32
|
-
if payload = ref[:payload_member]
|
33
|
-
payload[
|
34
|
-
payload.shape["streaming"]
|
33
|
+
if (payload = ref[:payload_member])
|
34
|
+
payload['streaming'] || payload.shape['streaming']
|
35
35
|
else
|
36
36
|
false
|
37
37
|
end
|
38
38
|
end
|
39
39
|
|
40
|
+
def unsigned_payload?(operation)
|
41
|
+
operation['unsignedPayload'] ||
|
42
|
+
operation['authtype'] == 'v4-unsigned-body'
|
43
|
+
end
|
44
|
+
|
40
45
|
def requires_length?(ref)
|
41
|
-
payload = ref[:payload_member]
|
42
|
-
|
43
|
-
|
46
|
+
if (payload = ref[:payload_member])
|
47
|
+
payload['requiresLength'] || payload.shape['requiresLength']
|
48
|
+
else
|
49
|
+
false
|
50
|
+
end
|
44
51
|
end
|
45
52
|
|
46
53
|
end
|
data/lib/aws-sdk-sso/client.rb
CHANGED
@@ -312,6 +312,15 @@ module Aws::SSO
|
|
312
312
|
#
|
313
313
|
# @option options [String] :session_token
|
314
314
|
#
|
315
|
+
# @option options [Array] :sigv4a_signing_region_set
|
316
|
+
# A list of regions that should be signed with SigV4a signing. When
|
317
|
+
# not passed, a default `:sigv4a_signing_region_set` is searched for
|
318
|
+
# in the following locations:
|
319
|
+
#
|
320
|
+
# * `Aws.config[:sigv4a_signing_region_set]`
|
321
|
+
# * `ENV['AWS_SIGV4A_SIGNING_REGION_SET']`
|
322
|
+
# * `~/.aws/config`
|
323
|
+
#
|
315
324
|
# @option options [Boolean] :stub_responses (false)
|
316
325
|
# Causes the client to return stubbed responses. By default
|
317
326
|
# fake responses are generated and returned. You can specify
|
@@ -633,7 +642,7 @@ module Aws::SSO
|
|
633
642
|
params: params,
|
634
643
|
config: config)
|
635
644
|
context[:gem_name] = 'aws-sdk-core'
|
636
|
-
context[:gem_version] = '3.
|
645
|
+
context[:gem_version] = '3.201.0'
|
637
646
|
Seahorse::Client::Request.new(handlers, context)
|
638
647
|
end
|
639
648
|
|
@@ -129,6 +129,7 @@ module Aws::SSO
|
|
129
129
|
o.http_method = "GET"
|
130
130
|
o.http_request_uri = "/federation/credentials"
|
131
131
|
o['authtype'] = "none"
|
132
|
+
o['auth'] = ["smithy.api#noAuth"]
|
132
133
|
o.input = Shapes::ShapeRef.new(shape: GetRoleCredentialsRequest)
|
133
134
|
o.output = Shapes::ShapeRef.new(shape: GetRoleCredentialsResponse)
|
134
135
|
o.errors << Shapes::ShapeRef.new(shape: InvalidRequestException)
|
@@ -142,6 +143,7 @@ module Aws::SSO
|
|
142
143
|
o.http_method = "GET"
|
143
144
|
o.http_request_uri = "/assignment/roles"
|
144
145
|
o['authtype'] = "none"
|
146
|
+
o['auth'] = ["smithy.api#noAuth"]
|
145
147
|
o.input = Shapes::ShapeRef.new(shape: ListAccountRolesRequest)
|
146
148
|
o.output = Shapes::ShapeRef.new(shape: ListAccountRolesResponse)
|
147
149
|
o.errors << Shapes::ShapeRef.new(shape: InvalidRequestException)
|
@@ -161,6 +163,7 @@ module Aws::SSO
|
|
161
163
|
o.http_method = "GET"
|
162
164
|
o.http_request_uri = "/assignment/accounts"
|
163
165
|
o['authtype'] = "none"
|
166
|
+
o['auth'] = ["smithy.api#noAuth"]
|
164
167
|
o.input = Shapes::ShapeRef.new(shape: ListAccountsRequest)
|
165
168
|
o.output = Shapes::ShapeRef.new(shape: ListAccountsResponse)
|
166
169
|
o.errors << Shapes::ShapeRef.new(shape: InvalidRequestException)
|
@@ -180,6 +183,7 @@ module Aws::SSO
|
|
180
183
|
o.http_method = "POST"
|
181
184
|
o.http_request_uri = "/logout"
|
182
185
|
o['authtype'] = "none"
|
186
|
+
o['auth'] = ["smithy.api#noAuth"]
|
183
187
|
o.input = Shapes::ShapeRef.new(shape: LogoutRequest)
|
184
188
|
o.output = Shapes::ShapeRef.new(shape: Shapes::StructureShape.new(struct_class: Aws::EmptyStructure))
|
185
189
|
o.errors << Shapes::ShapeRef.new(shape: InvalidRequestException)
|
data/lib/aws-sdk-sso.rb
CHANGED
@@ -312,6 +312,15 @@ module Aws::SSOOIDC
|
|
312
312
|
#
|
313
313
|
# @option options [String] :session_token
|
314
314
|
#
|
315
|
+
# @option options [Array] :sigv4a_signing_region_set
|
316
|
+
# A list of regions that should be signed with SigV4a signing. When
|
317
|
+
# not passed, a default `:sigv4a_signing_region_set` is searched for
|
318
|
+
# in the following locations:
|
319
|
+
#
|
320
|
+
# * `Aws.config[:sigv4a_signing_region_set]`
|
321
|
+
# * `ENV['AWS_SIGV4A_SIGNING_REGION_SET']`
|
322
|
+
# * `~/.aws/config`
|
323
|
+
#
|
315
324
|
# @option options [Boolean] :stub_responses (false)
|
316
325
|
# Causes the client to return stubbed responses. By default
|
317
326
|
# fake responses are generated and returned. You can specify
|
@@ -986,7 +995,7 @@ module Aws::SSOOIDC
|
|
986
995
|
params: params,
|
987
996
|
config: config)
|
988
997
|
context[:gem_name] = 'aws-sdk-core'
|
989
|
-
context[:gem_version] = '3.
|
998
|
+
context[:gem_version] = '3.201.0'
|
990
999
|
Seahorse::Client::Request.new(handlers, context)
|
991
1000
|
end
|
992
1001
|
|
@@ -225,6 +225,7 @@ module Aws::SSOOIDC
|
|
225
225
|
o.http_method = "POST"
|
226
226
|
o.http_request_uri = "/token"
|
227
227
|
o['authtype'] = "none"
|
228
|
+
o['auth'] = ["smithy.api#noAuth"]
|
228
229
|
o.input = Shapes::ShapeRef.new(shape: CreateTokenRequest)
|
229
230
|
o.output = Shapes::ShapeRef.new(shape: CreateTokenResponse)
|
230
231
|
o.errors << Shapes::ShapeRef.new(shape: InvalidRequestException)
|
@@ -265,6 +266,7 @@ module Aws::SSOOIDC
|
|
265
266
|
o.http_method = "POST"
|
266
267
|
o.http_request_uri = "/client/register"
|
267
268
|
o['authtype'] = "none"
|
269
|
+
o['auth'] = ["smithy.api#noAuth"]
|
268
270
|
o.input = Shapes::ShapeRef.new(shape: RegisterClientRequest)
|
269
271
|
o.output = Shapes::ShapeRef.new(shape: RegisterClientResponse)
|
270
272
|
o.errors << Shapes::ShapeRef.new(shape: InvalidRequestException)
|
@@ -280,6 +282,7 @@ module Aws::SSOOIDC
|
|
280
282
|
o.http_method = "POST"
|
281
283
|
o.http_request_uri = "/device_authorization"
|
282
284
|
o['authtype'] = "none"
|
285
|
+
o['auth'] = ["smithy.api#noAuth"]
|
283
286
|
o.input = Shapes::ShapeRef.new(shape: StartDeviceAuthorizationRequest)
|
284
287
|
o.output = Shapes::ShapeRef.new(shape: StartDeviceAuthorizationResponse)
|
285
288
|
o.errors << Shapes::ShapeRef.new(shape: InvalidRequestException)
|
data/lib/aws-sdk-ssooidc.rb
CHANGED
data/lib/aws-sdk-sts/client.rb
CHANGED
@@ -314,6 +314,15 @@ module Aws::STS
|
|
314
314
|
#
|
315
315
|
# @option options [String] :session_token
|
316
316
|
#
|
317
|
+
# @option options [Array] :sigv4a_signing_region_set
|
318
|
+
# A list of regions that should be signed with SigV4a signing. When
|
319
|
+
# not passed, a default `:sigv4a_signing_region_set` is searched for
|
320
|
+
# in the following locations:
|
321
|
+
#
|
322
|
+
# * `Aws.config[:sigv4a_signing_region_set]`
|
323
|
+
# * `ENV['AWS_SIGV4A_SIGNING_REGION_SET']`
|
324
|
+
# * `~/.aws/config`
|
325
|
+
#
|
317
326
|
# @option options [String] :sts_regional_endpoints ("regional")
|
318
327
|
# Passing in 'regional' to enable regional endpoint for STS for all supported
|
319
328
|
# regions (except 'aws-global'). Using 'legacy' mode will force all legacy
|
@@ -2380,7 +2389,7 @@ module Aws::STS
|
|
2380
2389
|
params: params,
|
2381
2390
|
config: config)
|
2382
2391
|
context[:gem_name] = 'aws-sdk-core'
|
2383
|
-
context[:gem_version] = '3.
|
2392
|
+
context[:gem_version] = '3.201.0'
|
2384
2393
|
Seahorse::Client::Request.new(handlers, context)
|
2385
2394
|
end
|
2386
2395
|
|
@@ -280,7 +280,7 @@ module Aws::STS
|
|
280
280
|
o.name = "AssumeRoleWithSAML"
|
281
281
|
o.http_method = "POST"
|
282
282
|
o.http_request_uri = "/"
|
283
|
-
o['
|
283
|
+
o['auth'] = ["smithy.api#noAuth"]
|
284
284
|
o.input = Shapes::ShapeRef.new(shape: AssumeRoleWithSAMLRequest)
|
285
285
|
o.output = Shapes::ShapeRef.new(shape: AssumeRoleWithSAMLResponse)
|
286
286
|
o.errors << Shapes::ShapeRef.new(shape: MalformedPolicyDocumentException)
|
@@ -295,7 +295,7 @@ module Aws::STS
|
|
295
295
|
o.name = "AssumeRoleWithWebIdentity"
|
296
296
|
o.http_method = "POST"
|
297
297
|
o.http_request_uri = "/"
|
298
|
-
o['
|
298
|
+
o['auth'] = ["smithy.api#noAuth"]
|
299
299
|
o.input = Shapes::ShapeRef.new(shape: AssumeRoleWithWebIdentityRequest)
|
300
300
|
o.output = Shapes::ShapeRef.new(shape: AssumeRoleWithWebIdentityResponse)
|
301
301
|
o.errors << Shapes::ShapeRef.new(shape: MalformedPolicyDocumentException)
|
data/lib/aws-sdk-sts.rb
CHANGED
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: aws-sdk-core
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 3.
|
4
|
+
version: 3.201.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Amazon Web Services
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2024-
|
11
|
+
date: 2024-07-02 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: jmespath
|