aws-sdk-core 3.209.1 → 3.228.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +231 -0
- data/VERSION +1 -1
- data/lib/aws-defaults/default_configuration.rb +1 -2
- data/lib/aws-sdk-core/arn.rb +1 -3
- data/lib/aws-sdk-core/assume_role_credentials.rb +1 -0
- data/lib/aws-sdk-core/assume_role_web_identity_credentials.rb +1 -0
- data/lib/aws-sdk-core/cbor/decoder.rb +0 -2
- data/lib/aws-sdk-core/cbor/encoder.rb +2 -2
- data/lib/aws-sdk-core/cbor.rb +3 -56
- data/lib/aws-sdk-core/client_stubs.rb +29 -55
- data/lib/aws-sdk-core/credential_provider.rb +4 -0
- data/lib/aws-sdk-core/credential_provider_chain.rb +28 -8
- data/lib/aws-sdk-core/credentials.rb +6 -0
- data/lib/aws-sdk-core/ecs_credentials.rb +1 -0
- data/lib/aws-sdk-core/endpoints/matchers.rb +3 -9
- data/lib/aws-sdk-core/endpoints.rb +37 -13
- data/lib/aws-sdk-core/error_handler.rb +5 -0
- data/lib/aws-sdk-core/errors.rb +2 -2
- data/lib/aws-sdk-core/event_emitter.rb +1 -1
- data/lib/aws-sdk-core/instance_profile_credentials.rb +147 -157
- data/lib/aws-sdk-core/json/error_handler.rb +14 -3
- data/lib/aws-sdk-core/json/handler.rb +1 -0
- data/lib/aws-sdk-core/log/param_formatter.rb +7 -3
- data/lib/aws-sdk-core/plugins/checksum_algorithm.rb +332 -170
- data/lib/aws-sdk-core/plugins/client_metrics_plugin.rb +0 -1
- data/lib/aws-sdk-core/plugins/credentials_configuration.rb +85 -70
- data/lib/aws-sdk-core/plugins/endpoint_pattern.rb +40 -32
- data/lib/aws-sdk-core/plugins/http_checksum.rb +2 -8
- data/lib/aws-sdk-core/plugins/regional_endpoint.rb +44 -25
- data/lib/aws-sdk-core/plugins/sign.rb +30 -21
- data/lib/aws-sdk-core/plugins/stub_responses.rb +30 -8
- data/lib/aws-sdk-core/plugins/user_agent.rb +33 -2
- data/lib/aws-sdk-core/process_credentials.rb +1 -1
- data/lib/aws-sdk-core/rest/request/headers.rb +3 -3
- data/lib/aws-sdk-core/rpc_v2/builder.rb +1 -1
- data/lib/aws-sdk-core/{cbor → rpc_v2}/cbor_engine.rb +4 -5
- data/lib/aws-sdk-core/rpc_v2/content_type_handler.rb +3 -1
- data/lib/aws-sdk-core/rpc_v2/error_handler.rb +27 -16
- data/lib/aws-sdk-core/rpc_v2/handler.rb +2 -1
- data/lib/aws-sdk-core/rpc_v2/parser.rb +9 -1
- data/lib/aws-sdk-core/rpc_v2.rb +65 -2
- data/lib/aws-sdk-core/shared_config.rb +75 -21
- data/lib/aws-sdk-core/shared_credentials.rb +1 -0
- data/lib/aws-sdk-core/sso_credentials.rb +2 -0
- data/lib/aws-sdk-core/static_token_provider.rb +1 -2
- data/lib/aws-sdk-core/stubbing/protocols/ec2.rb +12 -11
- data/lib/aws-sdk-core/stubbing/protocols/json.rb +11 -10
- data/lib/aws-sdk-core/stubbing/protocols/query.rb +7 -6
- data/lib/aws-sdk-core/stubbing/protocols/rest.rb +2 -1
- data/lib/aws-sdk-core/stubbing/protocols/rest_json.rb +9 -8
- data/lib/aws-sdk-core/stubbing/protocols/rest_xml.rb +6 -5
- data/lib/aws-sdk-core/stubbing/protocols/rpc_v2.rb +13 -15
- data/lib/aws-sdk-core/stubbing.rb +2 -2
- data/lib/aws-sdk-core/token.rb +3 -3
- data/lib/aws-sdk-core/token_provider.rb +4 -0
- data/lib/aws-sdk-core/token_provider_chain.rb +2 -6
- data/lib/aws-sdk-core/util.rb +2 -1
- data/lib/aws-sdk-core/xml/error_handler.rb +3 -1
- data/lib/aws-sdk-sso/client.rb +71 -39
- data/lib/aws-sdk-sso/endpoint_parameters.rb +9 -6
- data/lib/aws-sdk-sso/endpoint_provider.rb +14 -18
- data/lib/aws-sdk-sso/endpoints.rb +2 -42
- data/lib/aws-sdk-sso/plugins/endpoints.rb +1 -14
- data/lib/aws-sdk-sso.rb +1 -1
- data/lib/aws-sdk-ssooidc/client.rb +108 -59
- data/lib/aws-sdk-ssooidc/client_api.rb +6 -0
- data/lib/aws-sdk-ssooidc/endpoint_parameters.rb +9 -6
- data/lib/aws-sdk-ssooidc/endpoint_provider.rb +14 -18
- data/lib/aws-sdk-ssooidc/endpoints.rb +2 -42
- data/lib/aws-sdk-ssooidc/plugins/endpoints.rb +1 -14
- data/lib/aws-sdk-ssooidc/types.rb +48 -16
- data/lib/aws-sdk-ssooidc.rb +1 -1
- data/lib/aws-sdk-sts/client.rb +279 -91
- data/lib/aws-sdk-sts/client_api.rb +33 -8
- data/lib/aws-sdk-sts/endpoint_parameters.rb +10 -9
- data/lib/aws-sdk-sts/endpoint_provider.rb +50 -55
- data/lib/aws-sdk-sts/endpoints.rb +2 -94
- data/lib/aws-sdk-sts/errors.rb +15 -0
- data/lib/aws-sdk-sts/plugins/endpoints.rb +1 -22
- data/lib/aws-sdk-sts/presigner.rb +2 -6
- data/lib/aws-sdk-sts/types.rb +170 -28
- data/lib/aws-sdk-sts.rb +1 -1
- data/lib/seahorse/client/async_base.rb +4 -5
- data/lib/seahorse/client/base.rb +0 -14
- data/lib/seahorse/client/h2/connection.rb +18 -28
- data/lib/seahorse/client/http/response.rb +1 -1
- data/lib/seahorse/client/net_http/connection_pool.rb +4 -1
- data/lib/seahorse/client/networking_error.rb +1 -1
- data/lib/seahorse/client/plugins/h2.rb +4 -4
- data/lib/seahorse/client/request_context.rb +2 -2
- data/lib/seahorse/client/response.rb +2 -0
- data/lib/seahorse/util.rb +2 -1
- data/sig/aws-sdk-core/async_client_stubs.rbs +21 -0
- data/sig/seahorse/client/async_base.rbs +18 -0
- metadata +57 -17
data/lib/aws-sdk-sts/client.rb
CHANGED
@@ -7,35 +7,35 @@
|
|
7
7
|
#
|
8
8
|
# WARNING ABOUT GENERATED CODE
|
9
9
|
|
10
|
-
require 'seahorse/client/plugins/content_length
|
11
|
-
require 'aws-sdk-core/plugins/credentials_configuration
|
12
|
-
require 'aws-sdk-core/plugins/logging
|
13
|
-
require 'aws-sdk-core/plugins/param_converter
|
14
|
-
require 'aws-sdk-core/plugins/param_validator
|
15
|
-
require 'aws-sdk-core/plugins/user_agent
|
16
|
-
require 'aws-sdk-core/plugins/helpful_socket_errors
|
17
|
-
require 'aws-sdk-core/plugins/retry_errors
|
18
|
-
require 'aws-sdk-core/plugins/global_configuration
|
19
|
-
require 'aws-sdk-core/plugins/regional_endpoint
|
20
|
-
require 'aws-sdk-core/plugins/endpoint_discovery
|
21
|
-
require 'aws-sdk-core/plugins/endpoint_pattern
|
22
|
-
require 'aws-sdk-core/plugins/response_paging
|
23
|
-
require 'aws-sdk-core/plugins/stub_responses
|
24
|
-
require 'aws-sdk-core/plugins/idempotency_token
|
25
|
-
require 'aws-sdk-core/plugins/invocation_id
|
26
|
-
require 'aws-sdk-core/plugins/jsonvalue_converter
|
27
|
-
require 'aws-sdk-core/plugins/client_metrics_plugin
|
28
|
-
require 'aws-sdk-core/plugins/client_metrics_send_plugin
|
29
|
-
require 'aws-sdk-core/plugins/transfer_encoding
|
30
|
-
require 'aws-sdk-core/plugins/http_checksum
|
31
|
-
require 'aws-sdk-core/plugins/checksum_algorithm
|
32
|
-
require 'aws-sdk-core/plugins/request_compression
|
33
|
-
require 'aws-sdk-core/plugins/defaults_mode
|
34
|
-
require 'aws-sdk-core/plugins/recursion_detection
|
35
|
-
require 'aws-sdk-core/plugins/telemetry
|
36
|
-
require 'aws-sdk-core/plugins/sign
|
37
|
-
require 'aws-sdk-core/plugins/protocols/query
|
38
|
-
require 'aws-sdk-sts/plugins/sts_regional_endpoints
|
10
|
+
require 'seahorse/client/plugins/content_length'
|
11
|
+
require 'aws-sdk-core/plugins/credentials_configuration'
|
12
|
+
require 'aws-sdk-core/plugins/logging'
|
13
|
+
require 'aws-sdk-core/plugins/param_converter'
|
14
|
+
require 'aws-sdk-core/plugins/param_validator'
|
15
|
+
require 'aws-sdk-core/plugins/user_agent'
|
16
|
+
require 'aws-sdk-core/plugins/helpful_socket_errors'
|
17
|
+
require 'aws-sdk-core/plugins/retry_errors'
|
18
|
+
require 'aws-sdk-core/plugins/global_configuration'
|
19
|
+
require 'aws-sdk-core/plugins/regional_endpoint'
|
20
|
+
require 'aws-sdk-core/plugins/endpoint_discovery'
|
21
|
+
require 'aws-sdk-core/plugins/endpoint_pattern'
|
22
|
+
require 'aws-sdk-core/plugins/response_paging'
|
23
|
+
require 'aws-sdk-core/plugins/stub_responses'
|
24
|
+
require 'aws-sdk-core/plugins/idempotency_token'
|
25
|
+
require 'aws-sdk-core/plugins/invocation_id'
|
26
|
+
require 'aws-sdk-core/plugins/jsonvalue_converter'
|
27
|
+
require 'aws-sdk-core/plugins/client_metrics_plugin'
|
28
|
+
require 'aws-sdk-core/plugins/client_metrics_send_plugin'
|
29
|
+
require 'aws-sdk-core/plugins/transfer_encoding'
|
30
|
+
require 'aws-sdk-core/plugins/http_checksum'
|
31
|
+
require 'aws-sdk-core/plugins/checksum_algorithm'
|
32
|
+
require 'aws-sdk-core/plugins/request_compression'
|
33
|
+
require 'aws-sdk-core/plugins/defaults_mode'
|
34
|
+
require 'aws-sdk-core/plugins/recursion_detection'
|
35
|
+
require 'aws-sdk-core/plugins/telemetry'
|
36
|
+
require 'aws-sdk-core/plugins/sign'
|
37
|
+
require 'aws-sdk-core/plugins/protocols/query'
|
38
|
+
require 'aws-sdk-sts/plugins/sts_regional_endpoints'
|
39
39
|
|
40
40
|
module Aws::STS
|
41
41
|
# An API client for STS. To construct a client, you need to configure a `:region` and `:credentials`.
|
@@ -97,7 +97,7 @@ module Aws::STS
|
|
97
97
|
# class name or an instance of a plugin class.
|
98
98
|
#
|
99
99
|
# @option options [required, Aws::CredentialProvider] :credentials
|
100
|
-
# Your AWS credentials. This can be an instance of any one of the
|
100
|
+
# Your AWS credentials used for authentication. This can be an instance of any one of the
|
101
101
|
# following classes:
|
102
102
|
#
|
103
103
|
# * `Aws::Credentials` - Used for configuring static, non-refreshing
|
@@ -130,18 +130,23 @@ module Aws::STS
|
|
130
130
|
# locations will be searched for credentials:
|
131
131
|
#
|
132
132
|
# * `Aws.config[:credentials]`
|
133
|
+
#
|
133
134
|
# * The `:access_key_id`, `:secret_access_key`, `:session_token`, and
|
134
135
|
# `:account_id` options.
|
135
|
-
#
|
136
|
-
#
|
136
|
+
#
|
137
|
+
# * `ENV['AWS_ACCESS_KEY_ID']`, `ENV['AWS_SECRET_ACCESS_KEY']`,
|
138
|
+
# `ENV['AWS_SESSION_TOKEN']`, and `ENV['AWS_ACCOUNT_ID']`.
|
139
|
+
#
|
137
140
|
# * `~/.aws/credentials`
|
141
|
+
#
|
138
142
|
# * `~/.aws/config`
|
143
|
+
#
|
139
144
|
# * EC2/ECS IMDS instance profile - When used by default, the timeouts
|
140
145
|
# are very aggressive. Construct and pass an instance of
|
141
146
|
# `Aws::InstanceProfileCredentials` or `Aws::ECSCredentials` to
|
142
147
|
# enable retries and extended timeouts. Instance profile credential
|
143
|
-
# fetching can be disabled by setting ENV['AWS_EC2_METADATA_DISABLED']
|
144
|
-
# to true
|
148
|
+
# fetching can be disabled by setting `ENV['AWS_EC2_METADATA_DISABLED']`
|
149
|
+
# to `true`.
|
145
150
|
#
|
146
151
|
# @option options [required, String] :region
|
147
152
|
# The AWS region to connect to. The configured `:region` is
|
@@ -169,6 +174,11 @@ module Aws::STS
|
|
169
174
|
# When false, the request will raise a `RetryCapacityNotAvailableError` and will
|
170
175
|
# not retry instead of sleeping.
|
171
176
|
#
|
177
|
+
# @option options [Array<String>] :auth_scheme_preference
|
178
|
+
# A list of preferred authentication schemes to use when making a request. Supported values are:
|
179
|
+
# `sigv4`, `sigv4a`, `httpBearerAuth`, and `noAuth`. When set using `ENV['AWS_AUTH_SCHEME_PREFERENCE']` or in
|
180
|
+
# shared config as `auth_scheme_preference`, the value should be a comma-separated list.
|
181
|
+
#
|
172
182
|
# @option options [Boolean] :client_side_monitoring (false)
|
173
183
|
# When `true`, client-side metrics will be collected for all API requests from
|
174
184
|
# this client.
|
@@ -202,8 +212,7 @@ module Aws::STS
|
|
202
212
|
# accepted modes and the configuration defaults that are included.
|
203
213
|
#
|
204
214
|
# @option options [Boolean] :disable_host_prefix_injection (false)
|
205
|
-
#
|
206
|
-
# to default service endpoint when available.
|
215
|
+
# When `true`, the SDK will not prepend the modeled host prefix to the endpoint.
|
207
216
|
#
|
208
217
|
# @option options [Boolean] :disable_request_compression (false)
|
209
218
|
# When set to 'true' the request body will not be compressed
|
@@ -256,14 +265,37 @@ module Aws::STS
|
|
256
265
|
# 4 times. Used in `standard` and `adaptive` retry modes.
|
257
266
|
#
|
258
267
|
# @option options [String] :profile ("default")
|
259
|
-
# Used when loading credentials from the shared credentials file
|
260
|
-
#
|
268
|
+
# Used when loading credentials from the shared credentials file at `HOME/.aws/credentials`.
|
269
|
+
# When not specified, 'default' is used.
|
270
|
+
#
|
271
|
+
# @option options [String] :request_checksum_calculation ("when_supported")
|
272
|
+
# Determines when a checksum will be calculated for request payloads. Values are:
|
273
|
+
#
|
274
|
+
# * `when_supported` - (default) When set, a checksum will be
|
275
|
+
# calculated for all request payloads of operations modeled with the
|
276
|
+
# `httpChecksum` trait where `requestChecksumRequired` is `true` and/or a
|
277
|
+
# `requestAlgorithmMember` is modeled.
|
278
|
+
# * `when_required` - When set, a checksum will only be calculated for
|
279
|
+
# request payloads of operations modeled with the `httpChecksum` trait where
|
280
|
+
# `requestChecksumRequired` is `true` or where a `requestAlgorithmMember`
|
281
|
+
# is modeled and supplied.
|
261
282
|
#
|
262
283
|
# @option options [Integer] :request_min_compression_size_bytes (10240)
|
263
284
|
# The minimum size in bytes that triggers compression for request
|
264
285
|
# bodies. The value must be non-negative integer value between 0
|
265
286
|
# and 10485780 bytes inclusive.
|
266
287
|
#
|
288
|
+
# @option options [String] :response_checksum_validation ("when_supported")
|
289
|
+
# Determines when checksum validation will be performed on response payloads. Values are:
|
290
|
+
#
|
291
|
+
# * `when_supported` - (default) When set, checksum validation is performed on all
|
292
|
+
# response payloads of operations modeled with the `httpChecksum` trait where
|
293
|
+
# `responseAlgorithms` is modeled, except when no modeled checksum algorithms
|
294
|
+
# are supported.
|
295
|
+
# * `when_required` - When set, checksum validation is not performed on
|
296
|
+
# response payloads of operations unless the checksum algorithm is supported and
|
297
|
+
# the `requestValidationModeMember` member is set to `ENABLED`.
|
298
|
+
#
|
267
299
|
# @option options [Proc] :retry_backoff
|
268
300
|
# A proc or lambda used for backoff. Defaults to 2**retries * retry_base_delay.
|
269
301
|
# This option is only used in the `legacy` retry mode.
|
@@ -352,7 +384,7 @@ module Aws::STS
|
|
352
384
|
# `Aws::Telemetry::OTelProvider` for telemetry provider.
|
353
385
|
#
|
354
386
|
# @option options [Aws::TokenProvider] :token_provider
|
355
|
-
#
|
387
|
+
# Your Bearer token used for authentication. This can be an instance of any one of the
|
356
388
|
# following classes:
|
357
389
|
#
|
358
390
|
# * `Aws::StaticTokenProvider` - Used for configuring static, non-refreshing
|
@@ -460,8 +492,8 @@ module Aws::STS
|
|
460
492
|
# token. Typically, you use `AssumeRole` within your account or for
|
461
493
|
# cross-account access. For a comparison of `AssumeRole` with other API
|
462
494
|
# operations that produce temporary credentials, see [Requesting
|
463
|
-
# Temporary Security Credentials][1] and [
|
464
|
-
#
|
495
|
+
# Temporary Security Credentials][1] and [Compare STS credentials][2] in
|
496
|
+
# the *IAM User Guide*.
|
465
497
|
#
|
466
498
|
# **Permissions**
|
467
499
|
#
|
@@ -470,9 +502,9 @@ module Aws::STS
|
|
470
502
|
# following exception: You cannot call the Amazon Web Services STS
|
471
503
|
# `GetFederationToken` or `GetSessionToken` API operations.
|
472
504
|
#
|
473
|
-
# (Optional) You can pass inline or managed
|
474
|
-
#
|
475
|
-
#
|
505
|
+
# (Optional) You can pass inline or managed session policies to this
|
506
|
+
# operation. You can pass a single JSON policy document to use as an
|
507
|
+
# inline session policy. You can also specify up to 10 managed policy
|
476
508
|
# Amazon Resource Names (ARNs) to use as managed session policies. The
|
477
509
|
# plaintext that you use for both inline and managed session policies
|
478
510
|
# can't exceed 2,048 characters. Passing policies to this operation
|
@@ -545,7 +577,7 @@ module Aws::STS
|
|
545
577
|
# denied. The condition in a trust policy that tests for MFA
|
546
578
|
# authentication might look like the following example.
|
547
579
|
#
|
548
|
-
# `"Condition":
|
580
|
+
# `"Condition": {"Bool": {"aws:MultiFactorAuthPresent": true}}`
|
549
581
|
#
|
550
582
|
# For more information, see [Configuring MFA-Protected API Access][8] in
|
551
583
|
# the *IAM User Guide* guide.
|
@@ -558,7 +590,7 @@ module Aws::STS
|
|
558
590
|
#
|
559
591
|
#
|
560
592
|
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html
|
561
|
-
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
593
|
+
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_sts-comparison.html
|
562
594
|
# [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
|
563
595
|
# [4]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html
|
564
596
|
# [5]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html
|
@@ -581,11 +613,22 @@ module Aws::STS
|
|
581
613
|
# credentials will expose the role session name to the external account
|
582
614
|
# in their CloudTrail logs.
|
583
615
|
#
|
616
|
+
# For security purposes, administrators can view this field in
|
617
|
+
# [CloudTrail logs][1] to help identify who performed an action in
|
618
|
+
# Amazon Web Services. Your administrator might require that you specify
|
619
|
+
# your user name as the session name when you assume the role. For more
|
620
|
+
# information, see [ `sts:RoleSessionName` ][2].
|
621
|
+
#
|
584
622
|
# The regex used to validate this parameter is a string of characters
|
585
623
|
# consisting of upper- and lower-case alphanumeric characters with no
|
586
624
|
# spaces. You can also include underscores or any of the following
|
587
625
|
# characters: =,.@-
|
588
626
|
#
|
627
|
+
#
|
628
|
+
#
|
629
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/cloudtrail-integration.html#cloudtrail-integration_signin-tempcreds
|
630
|
+
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_iam-condition-keys.html#ck_rolesessionname
|
631
|
+
#
|
589
632
|
# @option params [Array<Types::PolicyDescriptorType>] :policy_arns
|
590
633
|
# The Amazon Resource Names (ARNs) of the IAM managed policies that you
|
591
634
|
# want to use as managed session policies. The policies must exist in
|
@@ -651,6 +694,9 @@ module Aws::STS
|
|
651
694
|
#
|
652
695
|
# </note>
|
653
696
|
#
|
697
|
+
# For more information about role session permissions, see [Session
|
698
|
+
# policies][1].
|
699
|
+
#
|
654
700
|
#
|
655
701
|
#
|
656
702
|
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
|
@@ -673,9 +719,8 @@ module Aws::STS
|
|
673
719
|
# depending on the maximum session duration setting for your role.
|
674
720
|
# However, if you assume a role using role chaining and provide a
|
675
721
|
# `DurationSeconds` parameter value greater than one hour, the operation
|
676
|
-
# fails. To learn how to view the maximum value for your role, see
|
677
|
-
# the
|
678
|
-
# Guide*.
|
722
|
+
# fails. To learn how to view the maximum value for your role, see
|
723
|
+
# [Update the maximum session duration for a role][1].
|
679
724
|
#
|
680
725
|
# By default, the value is set to `3600` seconds.
|
681
726
|
#
|
@@ -691,7 +736,7 @@ module Aws::STS
|
|
691
736
|
#
|
692
737
|
#
|
693
738
|
#
|
694
|
-
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
739
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_update-role-settings.html#id_roles_update-session-duration
|
695
740
|
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_enable-console-custom-url.html
|
696
741
|
#
|
697
742
|
# @option params [Array<Types::Tag>] :tags
|
@@ -744,9 +789,8 @@ module Aws::STS
|
|
744
789
|
# passes to subsequent sessions in a role chain. For more information,
|
745
790
|
# see [Chaining Roles with Session Tags][1] in the *IAM User Guide*.
|
746
791
|
#
|
747
|
-
# This parameter is optional.
|
748
|
-
#
|
749
|
-
# affected.
|
792
|
+
# This parameter is optional. The transitive status of a session tag
|
793
|
+
# does not impact its packed binary size.
|
750
794
|
#
|
751
795
|
# If you choose not to specify a transitive tag key, then no tags are
|
752
796
|
# passed from this session to any subsequent sessions.
|
@@ -804,26 +848,29 @@ module Aws::STS
|
|
804
848
|
#
|
805
849
|
# @option params [String] :source_identity
|
806
850
|
# The source identity specified by the principal that is calling the
|
807
|
-
# `AssumeRole` operation.
|
851
|
+
# `AssumeRole` operation. The source identity value persists across
|
852
|
+
# [chained role][1] sessions.
|
808
853
|
#
|
809
854
|
# You can require users to specify a source identity when they assume a
|
810
|
-
# role. You do this by using the `sts:SourceIdentity` condition
|
811
|
-
# role trust policy. You can use source identity information in
|
855
|
+
# role. You do this by using the [ `sts:SourceIdentity` ][2] condition
|
856
|
+
# key in a role trust policy. You can use source identity information in
|
812
857
|
# CloudTrail logs to determine who took actions with a role. You can use
|
813
858
|
# the `aws:SourceIdentity` condition key to further control access to
|
814
859
|
# Amazon Web Services resources based on the value of source identity.
|
815
860
|
# For more information about using source identity, see [Monitor and
|
816
|
-
# control actions taken with assumed roles][
|
861
|
+
# control actions taken with assumed roles][3] in the *IAM User Guide*.
|
817
862
|
#
|
818
863
|
# The regex used to validate this parameter is a string of characters
|
819
864
|
# consisting of upper- and lower-case alphanumeric characters with no
|
820
865
|
# spaces. You can also include underscores or any of the following
|
821
|
-
# characters:
|
866
|
+
# characters: +=,.@-. You cannot use a value that begins with the text
|
822
867
|
# `aws:`. This prefix is reserved for Amazon Web Services internal use.
|
823
868
|
#
|
824
869
|
#
|
825
870
|
#
|
826
|
-
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
871
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles.html#iam-term-role-chaining
|
872
|
+
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html#condition-keys-sourceidentity
|
873
|
+
# [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_monitor.html
|
827
874
|
#
|
828
875
|
# @option params [Array<Types::ProvidedContext>] :provided_contexts
|
829
876
|
# A list of previously acquired trusted context assertions in the format
|
@@ -834,7 +881,7 @@ module Aws::STS
|
|
834
881
|
# a single trusted context assertion and the ARN of the context provider
|
835
882
|
# from which the trusted context assertion was generated.
|
836
883
|
#
|
837
|
-
# `[
|
884
|
+
# `[{"ProviderArn":"arn:aws:iam::aws:contextProvider/IdentityCenter","ContextAssertion":"trusted-context-assertion"}]`
|
838
885
|
#
|
839
886
|
# @return [Types::AssumeRoleResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
840
887
|
#
|
@@ -944,8 +991,8 @@ module Aws::STS
|
|
944
991
|
# user-specific credentials or configuration. For a comparison of
|
945
992
|
# `AssumeRoleWithSAML` with the other API operations that produce
|
946
993
|
# temporary credentials, see [Requesting Temporary Security
|
947
|
-
# Credentials][1] and [
|
948
|
-
#
|
994
|
+
# Credentials][1] and [Compare STS credentials][2] in the *IAM User
|
995
|
+
# Guide*.
|
949
996
|
#
|
950
997
|
# The temporary security credentials returned by this operation consist
|
951
998
|
# of an access key ID, a secret access key, and a security token.
|
@@ -1075,7 +1122,7 @@ module Aws::STS
|
|
1075
1122
|
#
|
1076
1123
|
#
|
1077
1124
|
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html
|
1078
|
-
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
1125
|
+
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_sts-comparison.html
|
1079
1126
|
# [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html#id_roles_use_view-role-max-session
|
1080
1127
|
# [4]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html
|
1081
1128
|
# [5]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_terms-and-concepts.html#iam-term-role-chaining
|
@@ -1163,6 +1210,9 @@ module Aws::STS
|
|
1163
1210
|
# the tab (\\u0009), linefeed (\\u000A), and carriage return (\\u000D)
|
1164
1211
|
# characters.
|
1165
1212
|
#
|
1213
|
+
# For more information about role session permissions, see [Session
|
1214
|
+
# policies][1].
|
1215
|
+
#
|
1166
1216
|
# <note markdown="1"> An Amazon Web Services conversion compresses the passed inline session
|
1167
1217
|
# policy, managed policy ARNs, and session tags into a packed binary
|
1168
1218
|
# format that has a separate limit. Your request can fail for this limit
|
@@ -1317,8 +1367,8 @@ module Aws::STS
|
|
1317
1367
|
# a token from the web identity provider. For a comparison of
|
1318
1368
|
# `AssumeRoleWithWebIdentity` with the other API operations that produce
|
1319
1369
|
# temporary credentials, see [Requesting Temporary Security
|
1320
|
-
# Credentials][4] and [
|
1321
|
-
#
|
1370
|
+
# Credentials][4] and [Compare STS credentials][5] in the *IAM User
|
1371
|
+
# Guide*.
|
1322
1372
|
#
|
1323
1373
|
# The temporary security credentials returned by this API consist of an
|
1324
1374
|
# access key ID, a secret access key, and a security token. Applications
|
@@ -1333,9 +1383,9 @@ module Aws::STS
|
|
1333
1383
|
# your session. You can provide a value from 900 seconds (15 minutes) up
|
1334
1384
|
# to the maximum session duration setting for the role. This setting can
|
1335
1385
|
# have a value from 1 hour to 12 hours. To learn how to view the maximum
|
1336
|
-
# value for your role, see [
|
1337
|
-
#
|
1338
|
-
#
|
1386
|
+
# value for your role, see [Update the maximum session duration for a
|
1387
|
+
# role ][6] in the *IAM User Guide*. The maximum session duration limit
|
1388
|
+
# applies when you use the `AssumeRole*` API operations or the
|
1339
1389
|
# `assume-role*` CLI commands. However the limit does not apply when you
|
1340
1390
|
# use those operations to create a console URL. For more information,
|
1341
1391
|
# see [Using IAM Roles][7] in the *IAM User Guide*.
|
@@ -1413,35 +1463,26 @@ module Aws::STS
|
|
1413
1463
|
# instead use a GUID or a pairwise identifier, as [suggested in the OIDC
|
1414
1464
|
# specification][14].
|
1415
1465
|
#
|
1416
|
-
# For more information about how to use
|
1466
|
+
# For more information about how to use OIDC federation and the
|
1417
1467
|
# `AssumeRoleWithWebIdentity` API, see the following resources:
|
1418
1468
|
#
|
1419
1469
|
# * [Using Web Identity Federation API Operations for Mobile Apps][15]
|
1420
1470
|
# and [Federation Through a Web-based Identity Provider][16].
|
1421
1471
|
#
|
1422
|
-
# * [ Web Identity Federation Playground][17]. Walk through the process
|
1423
|
-
# of authenticating through Login with Amazon, Facebook, or Google,
|
1424
|
-
# getting temporary security credentials, and then using those
|
1425
|
-
# credentials to make a request to Amazon Web Services.
|
1426
|
-
#
|
1427
1472
|
# * [Amazon Web Services SDK for iOS Developer Guide][2] and [Amazon Web
|
1428
1473
|
# Services SDK for Android Developer Guide][3]. These toolkits contain
|
1429
1474
|
# sample apps that show how to invoke the identity providers. The
|
1430
1475
|
# toolkits then show how to use the information from these providers
|
1431
1476
|
# to get and use temporary security credentials.
|
1432
1477
|
#
|
1433
|
-
# * [Web Identity Federation with Mobile Applications][18]. This article
|
1434
|
-
# discusses web identity federation and shows an example of how to use
|
1435
|
-
# web identity federation to get access to content in Amazon S3.
|
1436
|
-
#
|
1437
1478
|
#
|
1438
1479
|
#
|
1439
1480
|
# [1]: https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-identity.html
|
1440
1481
|
# [2]: http://aws.amazon.com/sdkforios/
|
1441
1482
|
# [3]: http://aws.amazon.com/sdkforandroid/
|
1442
1483
|
# [4]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html
|
1443
|
-
# [5]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
1444
|
-
# [6]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
1484
|
+
# [5]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_sts-comparison.html
|
1485
|
+
# [6]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_update-role-settings.html#id_roles_update-session-duration
|
1445
1486
|
# [7]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html
|
1446
1487
|
# [8]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
|
1447
1488
|
# [9]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html
|
@@ -1452,13 +1493,29 @@ module Aws::STS
|
|
1452
1493
|
# [14]: http://openid.net/specs/openid-connect-core-1_0.html#SubjectIDTypes
|
1453
1494
|
# [15]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_oidc_manual.html
|
1454
1495
|
# [16]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#api_assumerolewithwebidentity
|
1455
|
-
# [17]: https://aws.amazon.com/blogs/aws/the-aws-web-identity-federation-playground/
|
1456
|
-
# [18]: http://aws.amazon.com/articles/web-identity-federation-with-mobile-applications
|
1457
1496
|
#
|
1458
1497
|
# @option params [required, String] :role_arn
|
1459
1498
|
# The Amazon Resource Name (ARN) of the role that the caller is
|
1460
1499
|
# assuming.
|
1461
1500
|
#
|
1501
|
+
# <note markdown="1"> Additional considerations apply to Amazon Cognito identity pools that
|
1502
|
+
# assume [cross-account IAM roles][1]. The trust policies of these roles
|
1503
|
+
# must accept the `cognito-identity.amazonaws.com` service principal and
|
1504
|
+
# must contain the `cognito-identity.amazonaws.com:aud` condition key to
|
1505
|
+
# restrict role assumption to users from your intended identity pools. A
|
1506
|
+
# policy that trusts Amazon Cognito identity pools without this
|
1507
|
+
# condition creates a risk that a user from an unintended identity pool
|
1508
|
+
# can assume the role. For more information, see [ Trust policies for
|
1509
|
+
# IAM roles in Basic (Classic) authentication ][2] in the *Amazon
|
1510
|
+
# Cognito Developer Guide*.
|
1511
|
+
#
|
1512
|
+
# </note>
|
1513
|
+
#
|
1514
|
+
#
|
1515
|
+
#
|
1516
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies-cross-account-resource-access.html
|
1517
|
+
# [2]: https://docs.aws.amazon.com/cognito/latest/developerguide/iam-roles.html#trust-policies
|
1518
|
+
#
|
1462
1519
|
# @option params [required, String] :role_session_name
|
1463
1520
|
# An identifier for the assumed role session. Typically, you pass the
|
1464
1521
|
# name or identifier that is associated with the user who is using your
|
@@ -1467,18 +1524,31 @@ module Aws::STS
|
|
1467
1524
|
# is included as part of the ARN and assumed role ID in the
|
1468
1525
|
# `AssumedRoleUser` response element.
|
1469
1526
|
#
|
1527
|
+
# For security purposes, administrators can view this field in
|
1528
|
+
# [CloudTrail logs][1] to help identify who performed an action in
|
1529
|
+
# Amazon Web Services. Your administrator might require that you specify
|
1530
|
+
# your user name as the session name when you assume the role. For more
|
1531
|
+
# information, see [ `sts:RoleSessionName` ][2].
|
1532
|
+
#
|
1470
1533
|
# The regex used to validate this parameter is a string of characters
|
1471
1534
|
# consisting of upper- and lower-case alphanumeric characters with no
|
1472
1535
|
# spaces. You can also include underscores or any of the following
|
1473
1536
|
# characters: =,.@-
|
1474
1537
|
#
|
1538
|
+
#
|
1539
|
+
#
|
1540
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/cloudtrail-integration.html#cloudtrail-integration_signin-tempcreds
|
1541
|
+
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_iam-condition-keys.html#ck_rolesessionname
|
1542
|
+
#
|
1475
1543
|
# @option params [required, String] :web_identity_token
|
1476
1544
|
# The OAuth 2.0 access token or OpenID Connect ID token that is provided
|
1477
1545
|
# by the identity provider. Your application must get this token by
|
1478
1546
|
# authenticating the user who is using your application with a web
|
1479
1547
|
# identity provider before the application makes an
|
1480
|
-
# `AssumeRoleWithWebIdentity` call.
|
1481
|
-
#
|
1548
|
+
# `AssumeRoleWithWebIdentity` call. Timestamps in the token must be
|
1549
|
+
# formatted as either an integer or a long integer. Tokens must be
|
1550
|
+
# signed using either RSA keys (RS256, RS384, or RS512) or ECDSA keys
|
1551
|
+
# (ES256, ES384, or ES512).
|
1482
1552
|
#
|
1483
1553
|
# @option params [String] :provider_id
|
1484
1554
|
# The fully qualified host component of the domain name of the OAuth 2.0
|
@@ -1547,6 +1617,9 @@ module Aws::STS
|
|
1547
1617
|
# the tab (\\u0009), linefeed (\\u000A), and carriage return (\\u000D)
|
1548
1618
|
# characters.
|
1549
1619
|
#
|
1620
|
+
# For more information about role session permissions, see [Session
|
1621
|
+
# policies][1].
|
1622
|
+
#
|
1550
1623
|
# <note markdown="1"> An Amazon Web Services conversion compresses the passed inline session
|
1551
1624
|
# policy, managed policy ARNs, and session tags into a packed binary
|
1552
1625
|
# format that has a separate limit. Your request can fail for this limit
|
@@ -1667,6 +1740,121 @@ module Aws::STS
|
|
1667
1740
|
req.send_request(options)
|
1668
1741
|
end
|
1669
1742
|
|
1743
|
+
# Returns a set of short term credentials you can use to perform
|
1744
|
+
# privileged tasks on a member account in your organization.
|
1745
|
+
#
|
1746
|
+
# Before you can launch a privileged session, you must have centralized
|
1747
|
+
# root access in your organization. For steps to enable this feature,
|
1748
|
+
# see [Centralize root access for member accounts][1] in the *IAM User
|
1749
|
+
# Guide*.
|
1750
|
+
#
|
1751
|
+
# <note markdown="1"> The STS global endpoint is not supported for AssumeRoot. You must send
|
1752
|
+
# this request to a Regional STS endpoint. For more information, see
|
1753
|
+
# [Endpoints][2].
|
1754
|
+
#
|
1755
|
+
# </note>
|
1756
|
+
#
|
1757
|
+
# You can track AssumeRoot in CloudTrail logs to determine what actions
|
1758
|
+
# were performed in a session. For more information, see [Track
|
1759
|
+
# privileged tasks in CloudTrail][3] in the *IAM User Guide*.
|
1760
|
+
#
|
1761
|
+
#
|
1762
|
+
#
|
1763
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_root-enable-root-access.html
|
1764
|
+
# [2]: https://docs.aws.amazon.com/STS/latest/APIReference/welcome.html#sts-endpoints
|
1765
|
+
# [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/cloudtrail-track-privileged-tasks.html
|
1766
|
+
#
|
1767
|
+
# @option params [required, String] :target_principal
|
1768
|
+
# The member account principal ARN or account ID.
|
1769
|
+
#
|
1770
|
+
# @option params [required, Types::PolicyDescriptorType] :task_policy_arn
|
1771
|
+
# The identity based policy that scopes the session to the privileged
|
1772
|
+
# tasks that can be performed. You can use one of following Amazon Web
|
1773
|
+
# Services managed policies to scope root session actions.
|
1774
|
+
#
|
1775
|
+
# * [IAMAuditRootUserCredentials][1]
|
1776
|
+
#
|
1777
|
+
# * [IAMCreateRootUserPassword][2]
|
1778
|
+
#
|
1779
|
+
# * [IAMDeleteRootUserCredentials][3]
|
1780
|
+
#
|
1781
|
+
# * [S3UnlockBucketPolicy][4]
|
1782
|
+
#
|
1783
|
+
# * [SQSUnlockQueuePolicy][5]
|
1784
|
+
#
|
1785
|
+
#
|
1786
|
+
#
|
1787
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/security-iam-awsmanpol.html#security-iam-awsmanpol-IAMAuditRootUserCredentials
|
1788
|
+
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/security-iam-awsmanpol.html#security-iam-awsmanpol-IAMCreateRootUserPassword
|
1789
|
+
# [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/security-iam-awsmanpol.html#security-iam-awsmanpol-IAMDeleteRootUserCredentials
|
1790
|
+
# [4]: https://docs.aws.amazon.com/IAM/latest/UserGuide/security-iam-awsmanpol.html#security-iam-awsmanpol-S3UnlockBucketPolicy
|
1791
|
+
# [5]: https://docs.aws.amazon.com/IAM/latest/UserGuide/security-iam-awsmanpol.html#security-iam-awsmanpol-SQSUnlockQueuePolicy
|
1792
|
+
#
|
1793
|
+
# @option params [Integer] :duration_seconds
|
1794
|
+
# The duration, in seconds, of the privileged session. The value can
|
1795
|
+
# range from 0 seconds up to the maximum session duration of 900 seconds
|
1796
|
+
# (15 minutes). If you specify a value higher than this setting, the
|
1797
|
+
# operation fails.
|
1798
|
+
#
|
1799
|
+
# By default, the value is set to `900` seconds.
|
1800
|
+
#
|
1801
|
+
# @return [Types::AssumeRootResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
1802
|
+
#
|
1803
|
+
# * {Types::AssumeRootResponse#credentials #credentials} => Types::Credentials
|
1804
|
+
# * {Types::AssumeRootResponse#source_identity #source_identity} => String
|
1805
|
+
#
|
1806
|
+
#
|
1807
|
+
# @example Example: To launch a privileged session
|
1808
|
+
#
|
1809
|
+
# # The following command retrieves a set of short-term credentials you can use to unlock an S3 bucket for a member account
|
1810
|
+
# # by removing the bucket policy.
|
1811
|
+
#
|
1812
|
+
# resp = client.assume_root({
|
1813
|
+
# duration_seconds: 900,
|
1814
|
+
# target_principal: "111122223333",
|
1815
|
+
# task_policy_arn: {
|
1816
|
+
# arn: "arn:aws:iam::aws:policy/root-task/S3UnlockBucketPolicy",
|
1817
|
+
# },
|
1818
|
+
# })
|
1819
|
+
#
|
1820
|
+
# resp.to_h outputs the following:
|
1821
|
+
# {
|
1822
|
+
# credentials: {
|
1823
|
+
# access_key_id: "ASIAJEXAMPLEXEG2JICEA",
|
1824
|
+
# expiration: Time.parse("2024-11-15T00:05:07Z"),
|
1825
|
+
# secret_access_key: "9drTJvcXLB89EXAMPLELB8923FB892xMFI",
|
1826
|
+
# session_token: "AQoXdzELDDY//////////wEaoAK1wvxJY12r2IrDFT2IvAzTCn3zHoZ7YNtpiQLF0MqZye/qwjzP2iEXAMPLEbw/m3hsj8VBTkPORGvr9jM5sgP+w9IZWZnU+LWhmg+a5fDi2oTGUYcdg9uexQ4mtCHIHfi4citgqZTgco40Yqr4lIlo4V2b2Dyauk0eYFNebHtYlFVgAUj+7Indz3LU0aTWk1WKIjHmmMCIoTkyYp/k7kUG7moeEYKSitwQIi6Gjn+nyzM+PtoA3685ixzv0R7i5rjQi0YE0lf1oeie3bDiNHncmzosRM6SFiPzSvp6h/32xQuZsjcypmwsPSDtTPYcs0+YN/8BRi2/IcrxSpnWEXAMPLEXSDFTAQAM6Dl9zR0tXoybnlrZIwMLlMi1Kcgo5OytwU=",
|
1827
|
+
# },
|
1828
|
+
# source_identity: "Alice",
|
1829
|
+
# }
|
1830
|
+
#
|
1831
|
+
# @example Request syntax with placeholder values
|
1832
|
+
#
|
1833
|
+
# resp = client.assume_root({
|
1834
|
+
# target_principal: "TargetPrincipalType", # required
|
1835
|
+
# task_policy_arn: { # required
|
1836
|
+
# arn: "arnType",
|
1837
|
+
# },
|
1838
|
+
# duration_seconds: 1,
|
1839
|
+
# })
|
1840
|
+
#
|
1841
|
+
# @example Response structure
|
1842
|
+
#
|
1843
|
+
# resp.credentials.access_key_id #=> String
|
1844
|
+
# resp.credentials.secret_access_key #=> String
|
1845
|
+
# resp.credentials.session_token #=> String
|
1846
|
+
# resp.credentials.expiration #=> Time
|
1847
|
+
# resp.source_identity #=> String
|
1848
|
+
#
|
1849
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/sts-2011-06-15/AssumeRoot AWS API Documentation
|
1850
|
+
#
|
1851
|
+
# @overload assume_root(params = {})
|
1852
|
+
# @param [Hash] params ({})
|
1853
|
+
def assume_root(params = {}, options = {})
|
1854
|
+
req = build_request(:assume_root, params)
|
1855
|
+
req.send_request(options)
|
1856
|
+
end
|
1857
|
+
|
1670
1858
|
# Decodes additional information about the authorization status of a
|
1671
1859
|
# request from an encoded message returned in response to an Amazon Web
|
1672
1860
|
# Services request.
|
@@ -1905,8 +2093,8 @@ module Aws::STS
|
|
1905
2093
|
# usually in a server-based application. For a comparison of
|
1906
2094
|
# `GetFederationToken` with the other API operations that produce
|
1907
2095
|
# temporary credentials, see [Requesting Temporary Security
|
1908
|
-
# Credentials][1] and [
|
1909
|
-
#
|
2096
|
+
# Credentials][1] and [Compare STS credentials][2] in the *IAM User
|
2097
|
+
# Guide*.
|
1910
2098
|
#
|
1911
2099
|
# Although it is possible to call `GetFederationToken` using the
|
1912
2100
|
# security credentials of an Amazon Web Services account root user
|
@@ -2003,7 +2191,7 @@ module Aws::STS
|
|
2003
2191
|
#
|
2004
2192
|
#
|
2005
2193
|
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html
|
2006
|
-
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
2194
|
+
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_sts-comparison.html
|
2007
2195
|
# [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html#lock-away-credentials
|
2008
2196
|
# [4]: http://aws.amazon.com/cognito/
|
2009
2197
|
# [5]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#api_assumerolewithwebidentity
|
@@ -2255,8 +2443,8 @@ module Aws::STS
|
|
2255
2443
|
# An incorrect MFA code causes the API to return an access denied error.
|
2256
2444
|
# For a comparison of `GetSessionToken` with the other API operations
|
2257
2445
|
# that produce temporary credentials, see [Requesting Temporary Security
|
2258
|
-
# Credentials][1] and [
|
2259
|
-
#
|
2446
|
+
# Credentials][1] and [Compare STS credentials][2] in the *IAM User
|
2447
|
+
# Guide*.
|
2260
2448
|
#
|
2261
2449
|
# <note markdown="1"> No permissions are required for users to perform this operation. The
|
2262
2450
|
# purpose of the `sts:GetSessionToken` operation is to authenticate the
|
@@ -2311,7 +2499,7 @@ module Aws::STS
|
|
2311
2499
|
#
|
2312
2500
|
#
|
2313
2501
|
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html
|
2314
|
-
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
2502
|
+
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_sts-comparison.html
|
2315
2503
|
# [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_getsessiontoken.html
|
2316
2504
|
# [4]: https://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html#lock-away-credentials
|
2317
2505
|
# [5]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#api_getsessiontoken
|
@@ -2416,7 +2604,7 @@ module Aws::STS
|
|
2416
2604
|
tracer: tracer
|
2417
2605
|
)
|
2418
2606
|
context[:gem_name] = 'aws-sdk-core'
|
2419
|
-
context[:gem_version] = '3.
|
2607
|
+
context[:gem_version] = '3.228.0'
|
2420
2608
|
Seahorse::Client::Request.new(handlers, context)
|
2421
2609
|
end
|
2422
2610
|
|