aws-sdk-core 3.219.0 → 3.240.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (84) hide show
  1. checksums.yaml +4 -4
  2. data/CHANGELOG.md +222 -0
  3. data/VERSION +1 -1
  4. data/lib/aws-defaults/default_configuration.rb +2 -1
  5. data/lib/aws-sdk-core/assume_role_credentials.rb +9 -8
  6. data/lib/aws-sdk-core/assume_role_web_identity_credentials.rb +3 -2
  7. data/lib/aws-sdk-core/client_stubs.rb +28 -48
  8. data/lib/aws-sdk-core/credential_provider.rb +4 -0
  9. data/lib/aws-sdk-core/credential_provider_chain.rb +91 -22
  10. data/lib/aws-sdk-core/credentials.rb +6 -0
  11. data/lib/aws-sdk-core/ecs_credentials.rb +14 -13
  12. data/lib/aws-sdk-core/endpoints/matchers.rb +2 -1
  13. data/lib/aws-sdk-core/endpoints.rb +37 -13
  14. data/lib/aws-sdk-core/error_handler.rb +5 -0
  15. data/lib/aws-sdk-core/errors.rb +5 -2
  16. data/lib/aws-sdk-core/event_emitter.rb +1 -1
  17. data/lib/aws-sdk-core/instance_profile_credentials.rb +147 -157
  18. data/lib/aws-sdk-core/json/error_handler.rb +14 -4
  19. data/lib/aws-sdk-core/login_credentials.rb +229 -0
  20. data/lib/aws-sdk-core/plugins/checksum_algorithm.rb +28 -14
  21. data/lib/aws-sdk-core/plugins/client_metrics_plugin.rb +0 -1
  22. data/lib/aws-sdk-core/plugins/credentials_configuration.rb +75 -59
  23. data/lib/aws-sdk-core/plugins/endpoint_pattern.rb +40 -32
  24. data/lib/aws-sdk-core/plugins/sign.rb +29 -20
  25. data/lib/aws-sdk-core/plugins/stub_responses.rb +30 -8
  26. data/lib/aws-sdk-core/plugins/user_agent.rb +26 -2
  27. data/lib/aws-sdk-core/process_credentials.rb +1 -1
  28. data/lib/aws-sdk-core/refreshing_credentials.rb +8 -11
  29. data/lib/aws-sdk-core/rest/request/headers.rb +1 -1
  30. data/lib/aws-sdk-core/rpc_v2/error_handler.rb +26 -16
  31. data/lib/aws-sdk-core/rpc_v2/parser.rb +8 -0
  32. data/lib/aws-sdk-core/shared_config.rb +102 -21
  33. data/lib/aws-sdk-core/shared_credentials.rb +1 -0
  34. data/lib/aws-sdk-core/sso_credentials.rb +3 -1
  35. data/lib/aws-sdk-core/static_token_provider.rb +1 -2
  36. data/lib/aws-sdk-core/token.rb +3 -3
  37. data/lib/aws-sdk-core/token_provider.rb +4 -0
  38. data/lib/aws-sdk-core/token_provider_chain.rb +2 -6
  39. data/lib/aws-sdk-core/util.rb +2 -1
  40. data/lib/aws-sdk-core/xml/error_handler.rb +3 -1
  41. data/lib/aws-sdk-core.rb +4 -0
  42. data/lib/aws-sdk-signin/client.rb +604 -0
  43. data/lib/aws-sdk-signin/client_api.rb +119 -0
  44. data/lib/aws-sdk-signin/customizations.rb +1 -0
  45. data/lib/aws-sdk-signin/endpoint_parameters.rb +69 -0
  46. data/lib/aws-sdk-signin/endpoint_provider.rb +59 -0
  47. data/lib/aws-sdk-signin/endpoints.rb +20 -0
  48. data/lib/aws-sdk-signin/errors.rb +122 -0
  49. data/lib/aws-sdk-signin/plugins/endpoints.rb +77 -0
  50. data/lib/aws-sdk-signin/resource.rb +26 -0
  51. data/lib/aws-sdk-signin/types.rb +299 -0
  52. data/lib/aws-sdk-signin.rb +63 -0
  53. data/lib/aws-sdk-sso/client.rb +25 -19
  54. data/lib/aws-sdk-sso/endpoint_parameters.rb +4 -4
  55. data/lib/aws-sdk-sso/endpoint_provider.rb +2 -2
  56. data/lib/aws-sdk-sso.rb +1 -1
  57. data/lib/aws-sdk-ssooidc/client.rb +57 -27
  58. data/lib/aws-sdk-ssooidc/client_api.rb +11 -0
  59. data/lib/aws-sdk-ssooidc/endpoint_parameters.rb +4 -4
  60. data/lib/aws-sdk-ssooidc/errors.rb +10 -0
  61. data/lib/aws-sdk-ssooidc/types.rb +45 -6
  62. data/lib/aws-sdk-ssooidc.rb +1 -1
  63. data/lib/aws-sdk-sts/client.rb +160 -30
  64. data/lib/aws-sdk-sts/client_api.rb +82 -8
  65. data/lib/aws-sdk-sts/customizations.rb +0 -1
  66. data/lib/aws-sdk-sts/endpoint_parameters.rb +5 -5
  67. data/lib/aws-sdk-sts/endpoint_provider.rb +18 -18
  68. data/lib/aws-sdk-sts/errors.rb +79 -0
  69. data/lib/aws-sdk-sts/presigner.rb +2 -6
  70. data/lib/aws-sdk-sts/types.rb +175 -6
  71. data/lib/aws-sdk-sts.rb +1 -1
  72. data/lib/seahorse/client/async_base.rb +4 -5
  73. data/lib/seahorse/client/base.rb +0 -14
  74. data/lib/seahorse/client/h2/connection.rb +18 -28
  75. data/lib/seahorse/client/h2/handler.rb +6 -1
  76. data/lib/seahorse/client/http/response.rb +1 -1
  77. data/lib/seahorse/client/net_http/connection_pool.rb +2 -1
  78. data/lib/seahorse/client/networking_error.rb +1 -1
  79. data/lib/seahorse/client/plugins/h2.rb +4 -4
  80. data/lib/seahorse/client/request_context.rb +2 -2
  81. data/lib/seahorse/util.rb +2 -1
  82. data/sig/aws-sdk-core/async_client_stubs.rbs +21 -0
  83. data/sig/seahorse/client/async_base.rbs +18 -0
  84. metadata +46 -8
@@ -97,8 +97,8 @@ module Aws::STS
97
97
  # class name or an instance of a plugin class.
98
98
  #
99
99
  # @option options [required, Aws::CredentialProvider] :credentials
100
- # Your AWS credentials. This can be an instance of any one of the
101
- # following classes:
100
+ # Your AWS credentials used for authentication. This can be any class that includes and implements
101
+ # `Aws::CredentialProvider`, or instance of any one of the following classes:
102
102
  #
103
103
  # * `Aws::Credentials` - Used for configuring static, non-refreshing
104
104
  # credentials.
@@ -126,22 +126,24 @@ module Aws::STS
126
126
  # * `Aws::CognitoIdentityCredentials` - Used for loading credentials
127
127
  # from the Cognito Identity service.
128
128
  #
129
- # When `:credentials` are not configured directly, the following
130
- # locations will be searched for credentials:
129
+ # When `:credentials` are not configured directly, the following locations will be searched for credentials:
131
130
  #
132
131
  # * `Aws.config[:credentials]`
132
+ #
133
133
  # * The `:access_key_id`, `:secret_access_key`, `:session_token`, and
134
134
  # `:account_id` options.
135
- # * ENV['AWS_ACCESS_KEY_ID'], ENV['AWS_SECRET_ACCESS_KEY'],
136
- # ENV['AWS_SESSION_TOKEN'], and ENV['AWS_ACCOUNT_ID']
135
+ #
136
+ # * `ENV['AWS_ACCESS_KEY_ID']`, `ENV['AWS_SECRET_ACCESS_KEY']`,
137
+ # `ENV['AWS_SESSION_TOKEN']`, and `ENV['AWS_ACCOUNT_ID']`.
138
+ #
137
139
  # * `~/.aws/credentials`
140
+ #
138
141
  # * `~/.aws/config`
139
- # * EC2/ECS IMDS instance profile - When used by default, the timeouts
140
- # are very aggressive. Construct and pass an instance of
141
- # `Aws::InstanceProfileCredentials` or `Aws::ECSCredentials` to
142
- # enable retries and extended timeouts. Instance profile credential
143
- # fetching can be disabled by setting ENV['AWS_EC2_METADATA_DISABLED']
144
- # to true.
142
+ #
143
+ # * EC2/ECS IMDS instance profile - When used by default, the timeouts are very aggressive.
144
+ # Construct and pass an instance of `Aws::InstanceProfileCredentials` or `Aws::ECSCredentials` to
145
+ # enable retries and extended timeouts. Instance profile credential fetching can be disabled by
146
+ # setting `ENV['AWS_EC2_METADATA_DISABLED']` to `true`.
145
147
  #
146
148
  # @option options [required, String] :region
147
149
  # The AWS region to connect to. The configured `:region` is
@@ -169,6 +171,11 @@ module Aws::STS
169
171
  # When false, the request will raise a `RetryCapacityNotAvailableError` and will
170
172
  # not retry instead of sleeping.
171
173
  #
174
+ # @option options [Array<String>] :auth_scheme_preference
175
+ # A list of preferred authentication schemes to use when making a request. Supported values are:
176
+ # `sigv4`, `sigv4a`, `httpBearerAuth`, and `noAuth`. When set using `ENV['AWS_AUTH_SCHEME_PREFERENCE']` or in
177
+ # shared config as `auth_scheme_preference`, the value should be a comma-separated list.
178
+ #
172
179
  # @option options [Boolean] :client_side_monitoring (false)
173
180
  # When `true`, client-side metrics will be collected for all API requests from
174
181
  # this client.
@@ -202,8 +209,7 @@ module Aws::STS
202
209
  # accepted modes and the configuration defaults that are included.
203
210
  #
204
211
  # @option options [Boolean] :disable_host_prefix_injection (false)
205
- # Set to true to disable SDK automatically adding host prefix
206
- # to default service endpoint when available.
212
+ # When `true`, the SDK will not prepend the modeled host prefix to the endpoint.
207
213
  #
208
214
  # @option options [Boolean] :disable_request_compression (false)
209
215
  # When set to 'true' the request body will not be compressed
@@ -256,8 +262,8 @@ module Aws::STS
256
262
  # 4 times. Used in `standard` and `adaptive` retry modes.
257
263
  #
258
264
  # @option options [String] :profile ("default")
259
- # Used when loading credentials from the shared credentials file
260
- # at HOME/.aws/credentials. When not specified, 'default' is used.
265
+ # Used when loading credentials from the shared credentials file at `HOME/.aws/credentials`.
266
+ # When not specified, 'default' is used.
261
267
  #
262
268
  # @option options [String] :request_checksum_calculation ("when_supported")
263
269
  # Determines when a checksum will be calculated for request payloads. Values are:
@@ -375,8 +381,8 @@ module Aws::STS
375
381
  # `Aws::Telemetry::OTelProvider` for telemetry provider.
376
382
  #
377
383
  # @option options [Aws::TokenProvider] :token_provider
378
- # A Bearer Token Provider. This can be an instance of any one of the
379
- # following classes:
384
+ # Your Bearer token used for authentication. This can be any class that includes and implements
385
+ # `Aws::TokenProvider`, or instance of any one of the following classes:
380
386
  #
381
387
  # * `Aws::StaticTokenProvider` - Used for configuring static, non-refreshing
382
388
  # tokens.
@@ -613,7 +619,7 @@ module Aws::STS
613
619
  # The regex used to validate this parameter is a string of characters
614
620
  # consisting of upper- and lower-case alphanumeric characters with no
615
621
  # spaces. You can also include underscores or any of the following
616
- # characters: =,.@-
622
+ # characters: +=,.@-
617
623
  #
618
624
  #
619
625
  #
@@ -807,7 +813,7 @@ module Aws::STS
807
813
  # The regex used to validate this parameter is a string of characters
808
814
  # consisting of upper- and lower-case alphanumeric characters with no
809
815
  # spaces. You can also include underscores or any of the following
810
- # characters: =,.@:/-
816
+ # characters: +=,.@:\\/-
811
817
  #
812
818
  #
813
819
  #
@@ -825,7 +831,7 @@ module Aws::STS
825
831
  # The regex used to validate this parameter is a string of characters
826
832
  # consisting of upper- and lower-case alphanumeric characters with no
827
833
  # spaces. You can also include underscores or any of the following
828
- # characters: =,.@-
834
+ # characters: +=/:,.@-
829
835
  #
830
836
  # @option params [String] :token_code
831
837
  # The value provided by the MFA device, if the trust policy of the role
@@ -886,7 +892,7 @@ module Aws::STS
886
892
  #
887
893
  # resp = client.assume_role({
888
894
  # external_id: "123ABC",
889
- # policy: "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Sid\":\"Stmt1\",\"Effect\":\"Allow\",\"Action\":\"s3:ListAllMyBuckets\",\"Resource\":\"*\"}]}",
895
+ # policy: "escaped-JSON-IAM-POLICY",
890
896
  # role_arn: "arn:aws:iam::123456789012:role/demo",
891
897
  # role_session_name: "testAssumeRoleSession",
892
898
  # tags: [
@@ -990,6 +996,11 @@ module Aws::STS
990
996
  # Applications can use these temporary security credentials to sign
991
997
  # calls to Amazon Web Services services.
992
998
  #
999
+ # <note markdown="1"> AssumeRoleWithSAML will not work on IAM Identity Center managed roles.
1000
+ # These roles' names start with `AWSReservedSSO_`.
1001
+ #
1002
+ # </note>
1003
+ #
993
1004
  # **Session Duration**
994
1005
  #
995
1006
  # By default, the temporary security credentials created by
@@ -1408,7 +1419,8 @@ module Aws::STS
1408
1419
  # (Optional) You can configure your IdP to pass attributes into your web
1409
1420
  # identity token as session tags. Each session tag consists of a key
1410
1421
  # name and an associated value. For more information about session tags,
1411
- # see [Passing Session Tags in STS][9] in the *IAM User Guide*.
1422
+ # see [Passing session tags using AssumeRoleWithWebIdentity][9] in the
1423
+ # *IAM User Guide*.
1412
1424
  #
1413
1425
  # You can pass up to 50 session tags. The plaintext session tag keys
1414
1426
  # can’t exceed 128 characters and the values can’t exceed 256
@@ -1476,7 +1488,7 @@ module Aws::STS
1476
1488
  # [6]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_update-role-settings.html#id_roles_update-session-duration
1477
1489
  # [7]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html
1478
1490
  # [8]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
1479
- # [9]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html
1491
+ # [9]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html#id_session-tags_adding-assume-role-idp
1480
1492
  # [10]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-limits.html#reference_iam-limits-entity-length
1481
1493
  # [11]: https://docs.aws.amazon.com/IAM/latest/UserGuide/tutorial_attribute-based-access-control.html
1482
1494
  # [12]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html#id_session-tags_role-chaining
@@ -1667,7 +1679,7 @@ module Aws::STS
1667
1679
  #
1668
1680
  # resp = client.assume_role_with_web_identity({
1669
1681
  # duration_seconds: 3600,
1670
- # policy: "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Sid\":\"Stmt1\",\"Effect\":\"Allow\",\"Action\":\"s3:ListAllMyBuckets\",\"Resource\":\"*\"}]}",
1682
+ # policy: "escaped-JSON-IAM-POLICY",
1671
1683
  # provider_id: "www.amazon.com",
1672
1684
  # role_arn: "arn:aws:iam::123456789012:role/FederatedWebIdentityRole",
1673
1685
  # role_session_name: "app1",
@@ -1732,7 +1744,10 @@ module Aws::STS
1732
1744
  end
1733
1745
 
1734
1746
  # Returns a set of short term credentials you can use to perform
1735
- # privileged tasks on a member account in your organization.
1747
+ # privileged tasks on a member account in your organization. You must
1748
+ # use credentials from an Organizations management account or a
1749
+ # delegated administrator account for IAM to call `AssumeRoot`. You
1750
+ # cannot use root user credentials to make this call.
1736
1751
  #
1737
1752
  # Before you can launch a privileged session, you must have centralized
1738
1753
  # root access in your organization. For steps to enable this feature,
@@ -1749,19 +1764,29 @@ module Aws::STS
1749
1764
  # were performed in a session. For more information, see [Track
1750
1765
  # privileged tasks in CloudTrail][3] in the *IAM User Guide*.
1751
1766
  #
1767
+ # When granting access to privileged tasks you should only grant the
1768
+ # necessary permissions required to perform that task. For more
1769
+ # information, see [Security best practices in IAM][4]. In addition, you
1770
+ # can use [service control policies][5] (SCPs) to manage and limit
1771
+ # permissions in your organization. See [General examples][6] in the
1772
+ # *Organizations User Guide* for more information on SCPs.
1773
+ #
1752
1774
  #
1753
1775
  #
1754
1776
  # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_root-enable-root-access.html
1755
1777
  # [2]: https://docs.aws.amazon.com/STS/latest/APIReference/welcome.html#sts-endpoints
1756
1778
  # [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/cloudtrail-track-privileged-tasks.html
1779
+ # [4]: https://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html
1780
+ # [5]: https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_policies_scps.html
1781
+ # [6]: https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_policies_scps_examples_general.html
1757
1782
  #
1758
1783
  # @option params [required, String] :target_principal
1759
1784
  # The member account principal ARN or account ID.
1760
1785
  #
1761
1786
  # @option params [required, Types::PolicyDescriptorType] :task_policy_arn
1762
1787
  # The identity based policy that scopes the session to the privileged
1763
- # tasks that can be performed. You can use one of following Amazon Web
1764
- # Services managed policies to scope root session actions.
1788
+ # tasks that can be performed. You must use one of following Amazon Web
1789
+ # Services managed policies to scope root session actions:
1765
1790
  #
1766
1791
  # * [IAMAuditRootUserCredentials][1]
1767
1792
  #
@@ -2072,6 +2097,46 @@ module Aws::STS
2072
2097
  req.send_request(options)
2073
2098
  end
2074
2099
 
2100
+ # Exchanges a trade-in token for temporary Amazon Web Services
2101
+ # credentials with the permissions associated with the assumed
2102
+ # principal. This operation allows you to obtain credentials for a
2103
+ # specific principal based on a trade-in token, enabling delegation of
2104
+ # access to Amazon Web Services resources.
2105
+ #
2106
+ # @option params [required, String] :trade_in_token
2107
+ # The token to exchange for temporary Amazon Web Services credentials.
2108
+ # This token must be valid and unexpired at the time of the request.
2109
+ #
2110
+ # @return [Types::GetDelegatedAccessTokenResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
2111
+ #
2112
+ # * {Types::GetDelegatedAccessTokenResponse#credentials #credentials} => Types::Credentials
2113
+ # * {Types::GetDelegatedAccessTokenResponse#packed_policy_size #packed_policy_size} => Integer
2114
+ # * {Types::GetDelegatedAccessTokenResponse#assumed_principal #assumed_principal} => String
2115
+ #
2116
+ # @example Request syntax with placeholder values
2117
+ #
2118
+ # resp = client.get_delegated_access_token({
2119
+ # trade_in_token: "tradeInTokenType", # required
2120
+ # })
2121
+ #
2122
+ # @example Response structure
2123
+ #
2124
+ # resp.credentials.access_key_id #=> String
2125
+ # resp.credentials.secret_access_key #=> String
2126
+ # resp.credentials.session_token #=> String
2127
+ # resp.credentials.expiration #=> Time
2128
+ # resp.packed_policy_size #=> Integer
2129
+ # resp.assumed_principal #=> String
2130
+ #
2131
+ # @see http://docs.aws.amazon.com/goto/WebAPI/sts-2011-06-15/GetDelegatedAccessToken AWS API Documentation
2132
+ #
2133
+ # @overload get_delegated_access_token(params = {})
2134
+ # @param [Hash] params ({})
2135
+ def get_delegated_access_token(params = {}, options = {})
2136
+ req = build_request(:get_delegated_access_token, params)
2137
+ req.send_request(options)
2138
+ end
2139
+
2075
2140
  # Returns a set of temporary security credentials (consisting of an
2076
2141
  # access key ID, a secret access key, and a security token) for a user.
2077
2142
  # A typical use is in a proxy application that gets temporary security
@@ -2354,7 +2419,7 @@ module Aws::STS
2354
2419
  # resp = client.get_federation_token({
2355
2420
  # duration_seconds: 3600,
2356
2421
  # name: "testFedUserSession",
2357
- # policy: "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Sid\":\"Stmt1\",\"Effect\":\"Allow\",\"Action\":\"s3:ListAllMyBuckets\",\"Resource\":\"*\"}]}",
2422
+ # policy: "escaped-JSON-IAM-POLICY",
2358
2423
  # tags: [
2359
2424
  # {
2360
2425
  # key: "Project",
@@ -2577,6 +2642,71 @@ module Aws::STS
2577
2642
  req.send_request(options)
2578
2643
  end
2579
2644
 
2645
+ # Returns a signed JSON Web Token (JWT) that represents the calling
2646
+ # Amazon Web Services identity. The returned JWT can be used to
2647
+ # authenticate with external services that support OIDC discovery. The
2648
+ # token is signed by Amazon Web Services STS and can be publicly
2649
+ # verified using the verification keys published at the issuer's JWKS
2650
+ # endpoint.
2651
+ #
2652
+ # @option params [required, Array<String>] :audience
2653
+ # The intended recipient of the web identity token. This value populates
2654
+ # the `aud` claim in the JWT and should identify the service or
2655
+ # application that will validate and use the token. The external service
2656
+ # should verify this claim to ensure the token was intended for their
2657
+ # use.
2658
+ #
2659
+ # @option params [Integer] :duration_seconds
2660
+ # The duration, in seconds, for which the JSON Web Token (JWT) will
2661
+ # remain valid. The value can range from 60 seconds (1 minute) to 3600
2662
+ # seconds (1 hour). If not specified, the default duration is 300
2663
+ # seconds (5 minutes). The token is designed to be short-lived and
2664
+ # should be used for proof of identity, then exchanged for credentials
2665
+ # or short-lived tokens in the external service.
2666
+ #
2667
+ # @option params [required, String] :signing_algorithm
2668
+ # The cryptographic algorithm to use for signing the JSON Web Token
2669
+ # (JWT). Valid values are RS256 (RSA with SHA-256) and ES384 (ECDSA
2670
+ # using P-384 curve with SHA-384).
2671
+ #
2672
+ # @option params [Array<Types::Tag>] :tags
2673
+ # An optional list of tags to include in the JSON Web Token (JWT). These
2674
+ # tags are added as custom claims to the JWT and can be used by the
2675
+ # downstream service for authorization decisions.
2676
+ #
2677
+ # @return [Types::GetWebIdentityTokenResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
2678
+ #
2679
+ # * {Types::GetWebIdentityTokenResponse#web_identity_token #web_identity_token} => String
2680
+ # * {Types::GetWebIdentityTokenResponse#expiration #expiration} => Time
2681
+ #
2682
+ # @example Request syntax with placeholder values
2683
+ #
2684
+ # resp = client.get_web_identity_token({
2685
+ # audience: ["webIdentityTokenAudienceStringType"], # required
2686
+ # duration_seconds: 1,
2687
+ # signing_algorithm: "jwtAlgorithmType", # required
2688
+ # tags: [
2689
+ # {
2690
+ # key: "tagKeyType", # required
2691
+ # value: "tagValueType", # required
2692
+ # },
2693
+ # ],
2694
+ # })
2695
+ #
2696
+ # @example Response structure
2697
+ #
2698
+ # resp.web_identity_token #=> String
2699
+ # resp.expiration #=> Time
2700
+ #
2701
+ # @see http://docs.aws.amazon.com/goto/WebAPI/sts-2011-06-15/GetWebIdentityToken AWS API Documentation
2702
+ #
2703
+ # @overload get_web_identity_token(params = {})
2704
+ # @param [Hash] params ({})
2705
+ def get_web_identity_token(params = {}, options = {})
2706
+ req = build_request(:get_web_identity_token, params)
2707
+ req.send_request(options)
2708
+ end
2709
+
2580
2710
  # @!endgroup
2581
2711
 
2582
2712
  # @param params ({})
@@ -2595,7 +2725,7 @@ module Aws::STS
2595
2725
  tracer: tracer
2596
2726
  )
2597
2727
  context[:gem_name] = 'aws-sdk-core'
2598
- context[:gem_version] = '3.219.0'
2728
+ context[:gem_version] = '3.240.0'
2599
2729
  Seahorse::Client::Request.new(handlers, context)
2600
2730
  end
2601
2731
 
@@ -27,30 +27,38 @@ module Aws::STS
27
27
  Credentials = Shapes::StructureShape.new(name: 'Credentials')
28
28
  DecodeAuthorizationMessageRequest = Shapes::StructureShape.new(name: 'DecodeAuthorizationMessageRequest')
29
29
  DecodeAuthorizationMessageResponse = Shapes::StructureShape.new(name: 'DecodeAuthorizationMessageResponse')
30
- ExpiredTokenException = Shapes::StructureShape.new(name: 'ExpiredTokenException', error: {"code"=>"ExpiredTokenException", "httpStatusCode"=>400, "senderFault"=>true})
30
+ ExpiredTokenException = Shapes::StructureShape.new(name: 'ExpiredTokenException', error: {"code" => "ExpiredTokenException", "httpStatusCode" => 400, "senderFault" => true})
31
+ ExpiredTradeInTokenException = Shapes::StructureShape.new(name: 'ExpiredTradeInTokenException', error: {"code" => "ExpiredTradeInTokenException", "httpStatusCode" => 400, "senderFault" => true})
31
32
  FederatedUser = Shapes::StructureShape.new(name: 'FederatedUser')
32
33
  GetAccessKeyInfoRequest = Shapes::StructureShape.new(name: 'GetAccessKeyInfoRequest')
33
34
  GetAccessKeyInfoResponse = Shapes::StructureShape.new(name: 'GetAccessKeyInfoResponse')
34
35
  GetCallerIdentityRequest = Shapes::StructureShape.new(name: 'GetCallerIdentityRequest')
35
36
  GetCallerIdentityResponse = Shapes::StructureShape.new(name: 'GetCallerIdentityResponse')
37
+ GetDelegatedAccessTokenRequest = Shapes::StructureShape.new(name: 'GetDelegatedAccessTokenRequest')
38
+ GetDelegatedAccessTokenResponse = Shapes::StructureShape.new(name: 'GetDelegatedAccessTokenResponse')
36
39
  GetFederationTokenRequest = Shapes::StructureShape.new(name: 'GetFederationTokenRequest')
37
40
  GetFederationTokenResponse = Shapes::StructureShape.new(name: 'GetFederationTokenResponse')
38
41
  GetSessionTokenRequest = Shapes::StructureShape.new(name: 'GetSessionTokenRequest')
39
42
  GetSessionTokenResponse = Shapes::StructureShape.new(name: 'GetSessionTokenResponse')
40
- IDPCommunicationErrorException = Shapes::StructureShape.new(name: 'IDPCommunicationErrorException', error: {"code"=>"IDPCommunicationError", "httpStatusCode"=>400, "senderFault"=>true})
41
- IDPRejectedClaimException = Shapes::StructureShape.new(name: 'IDPRejectedClaimException', error: {"code"=>"IDPRejectedClaim", "httpStatusCode"=>403, "senderFault"=>true})
42
- InvalidAuthorizationMessageException = Shapes::StructureShape.new(name: 'InvalidAuthorizationMessageException', error: {"code"=>"InvalidAuthorizationMessageException", "httpStatusCode"=>400, "senderFault"=>true})
43
- InvalidIdentityTokenException = Shapes::StructureShape.new(name: 'InvalidIdentityTokenException', error: {"code"=>"InvalidIdentityToken", "httpStatusCode"=>400, "senderFault"=>true})
43
+ GetWebIdentityTokenRequest = Shapes::StructureShape.new(name: 'GetWebIdentityTokenRequest')
44
+ GetWebIdentityTokenResponse = Shapes::StructureShape.new(name: 'GetWebIdentityTokenResponse')
45
+ IDPCommunicationErrorException = Shapes::StructureShape.new(name: 'IDPCommunicationErrorException', error: {"code" => "IDPCommunicationError", "httpStatusCode" => 400, "senderFault" => true})
46
+ IDPRejectedClaimException = Shapes::StructureShape.new(name: 'IDPRejectedClaimException', error: {"code" => "IDPRejectedClaim", "httpStatusCode" => 403, "senderFault" => true})
47
+ InvalidAuthorizationMessageException = Shapes::StructureShape.new(name: 'InvalidAuthorizationMessageException', error: {"code" => "InvalidAuthorizationMessageException", "httpStatusCode" => 400, "senderFault" => true})
48
+ InvalidIdentityTokenException = Shapes::StructureShape.new(name: 'InvalidIdentityTokenException', error: {"code" => "InvalidIdentityToken", "httpStatusCode" => 400, "senderFault" => true})
44
49
  Issuer = Shapes::StringShape.new(name: 'Issuer')
45
- MalformedPolicyDocumentException = Shapes::StructureShape.new(name: 'MalformedPolicyDocumentException', error: {"code"=>"MalformedPolicyDocument", "httpStatusCode"=>400, "senderFault"=>true})
50
+ JWTPayloadSizeExceededException = Shapes::StructureShape.new(name: 'JWTPayloadSizeExceededException', error: {"code" => "JWTPayloadSizeExceededException", "httpStatusCode" => 400, "senderFault" => true})
51
+ MalformedPolicyDocumentException = Shapes::StructureShape.new(name: 'MalformedPolicyDocumentException', error: {"code" => "MalformedPolicyDocument", "httpStatusCode" => 400, "senderFault" => true})
46
52
  NameQualifier = Shapes::StringShape.new(name: 'NameQualifier')
47
- PackedPolicyTooLargeException = Shapes::StructureShape.new(name: 'PackedPolicyTooLargeException', error: {"code"=>"PackedPolicyTooLarge", "httpStatusCode"=>400, "senderFault"=>true})
53
+ OutboundWebIdentityFederationDisabledException = Shapes::StructureShape.new(name: 'OutboundWebIdentityFederationDisabledException', error: {"code" => "OutboundWebIdentityFederationDisabledException", "httpStatusCode" => 403, "senderFault" => true})
54
+ PackedPolicyTooLargeException = Shapes::StructureShape.new(name: 'PackedPolicyTooLargeException', error: {"code" => "PackedPolicyTooLarge", "httpStatusCode" => 400, "senderFault" => true})
48
55
  PolicyDescriptorType = Shapes::StructureShape.new(name: 'PolicyDescriptorType')
49
56
  ProvidedContext = Shapes::StructureShape.new(name: 'ProvidedContext')
50
57
  ProvidedContextsListType = Shapes::ListShape.new(name: 'ProvidedContextsListType')
51
- RegionDisabledException = Shapes::StructureShape.new(name: 'RegionDisabledException', error: {"code"=>"RegionDisabledException", "httpStatusCode"=>403, "senderFault"=>true})
58
+ RegionDisabledException = Shapes::StructureShape.new(name: 'RegionDisabledException', error: {"code" => "RegionDisabledException", "httpStatusCode" => 403, "senderFault" => true})
52
59
  RootDurationSecondsType = Shapes::IntegerShape.new(name: 'RootDurationSecondsType')
53
60
  SAMLAssertionType = Shapes::StringShape.new(name: 'SAMLAssertionType')
61
+ SessionDurationEscalationException = Shapes::StructureShape.new(name: 'SessionDurationEscalationException', error: {"code" => "SessionDurationEscalationException", "httpStatusCode" => 403, "senderFault" => true})
54
62
  Subject = Shapes::StringShape.new(name: 'Subject')
55
63
  SubjectType = Shapes::StringShape.new(name: 'SubjectType')
56
64
  Tag = Shapes::StructureShape.new(name: 'Tag')
@@ -67,20 +75,25 @@ module Aws::STS
67
75
  durationSecondsType = Shapes::IntegerShape.new(name: 'durationSecondsType')
68
76
  encodedMessageType = Shapes::StringShape.new(name: 'encodedMessageType')
69
77
  expiredIdentityTokenMessage = Shapes::StringShape.new(name: 'expiredIdentityTokenMessage')
78
+ expiredTradeInTokenExceptionMessage = Shapes::StringShape.new(name: 'expiredTradeInTokenExceptionMessage')
70
79
  externalIdType = Shapes::StringShape.new(name: 'externalIdType')
71
80
  federatedIdType = Shapes::StringShape.new(name: 'federatedIdType')
72
81
  idpCommunicationErrorMessage = Shapes::StringShape.new(name: 'idpCommunicationErrorMessage')
73
82
  idpRejectedClaimMessage = Shapes::StringShape.new(name: 'idpRejectedClaimMessage')
74
83
  invalidAuthorizationMessage = Shapes::StringShape.new(name: 'invalidAuthorizationMessage')
75
84
  invalidIdentityTokenMessage = Shapes::StringShape.new(name: 'invalidIdentityTokenMessage')
85
+ jwtAlgorithmType = Shapes::StringShape.new(name: 'jwtAlgorithmType')
86
+ jwtPayloadSizeExceededException = Shapes::StringShape.new(name: 'jwtPayloadSizeExceededException')
76
87
  malformedPolicyDocumentMessage = Shapes::StringShape.new(name: 'malformedPolicyDocumentMessage')
77
88
  nonNegativeIntegerType = Shapes::IntegerShape.new(name: 'nonNegativeIntegerType')
89
+ outboundWebIdentityFederationDisabledException = Shapes::StringShape.new(name: 'outboundWebIdentityFederationDisabledException')
78
90
  packedPolicyTooLargeMessage = Shapes::StringShape.new(name: 'packedPolicyTooLargeMessage')
79
91
  policyDescriptorListType = Shapes::ListShape.new(name: 'policyDescriptorListType')
80
92
  regionDisabledMessage = Shapes::StringShape.new(name: 'regionDisabledMessage')
81
93
  roleDurationSecondsType = Shapes::IntegerShape.new(name: 'roleDurationSecondsType')
82
94
  roleSessionNameType = Shapes::StringShape.new(name: 'roleSessionNameType')
83
95
  serialNumberType = Shapes::StringShape.new(name: 'serialNumberType')
96
+ sessionDurationEscalationException = Shapes::StringShape.new(name: 'sessionDurationEscalationException')
84
97
  sessionPolicyDocumentType = Shapes::StringShape.new(name: 'sessionPolicyDocumentType')
85
98
  sourceIdentityType = Shapes::StringShape.new(name: 'sourceIdentityType')
86
99
  tagKeyListType = Shapes::ListShape.new(name: 'tagKeyListType')
@@ -89,11 +102,16 @@ module Aws::STS
89
102
  tagValueType = Shapes::StringShape.new(name: 'tagValueType')
90
103
  tokenCodeType = Shapes::StringShape.new(name: 'tokenCodeType')
91
104
  tokenType = Shapes::StringShape.new(name: 'tokenType')
105
+ tradeInTokenType = Shapes::StringShape.new(name: 'tradeInTokenType')
92
106
  unrestrictedSessionPolicyDocumentType = Shapes::StringShape.new(name: 'unrestrictedSessionPolicyDocumentType')
93
107
  urlType = Shapes::StringShape.new(name: 'urlType')
94
108
  userIdType = Shapes::StringShape.new(name: 'userIdType')
95
109
  userNameType = Shapes::StringShape.new(name: 'userNameType')
96
110
  webIdentitySubjectType = Shapes::StringShape.new(name: 'webIdentitySubjectType')
111
+ webIdentityTokenAudienceListType = Shapes::ListShape.new(name: 'webIdentityTokenAudienceListType')
112
+ webIdentityTokenAudienceStringType = Shapes::StringShape.new(name: 'webIdentityTokenAudienceStringType')
113
+ webIdentityTokenDurationSecondsType = Shapes::IntegerShape.new(name: 'webIdentityTokenDurationSecondsType')
114
+ webIdentityTokenType = Shapes::StringShape.new(name: 'webIdentityTokenType')
97
115
 
98
116
  AssumeRoleRequest.add_member(:role_arn, Shapes::ShapeRef.new(shape: arnType, required: true, location_name: "RoleArn"))
99
117
  AssumeRoleRequest.add_member(:role_session_name, Shapes::ShapeRef.new(shape: roleSessionNameType, required: true, location_name: "RoleSessionName"))
@@ -180,6 +198,9 @@ module Aws::STS
180
198
  ExpiredTokenException.add_member(:message, Shapes::ShapeRef.new(shape: expiredIdentityTokenMessage, location_name: "message"))
181
199
  ExpiredTokenException.struct_class = Types::ExpiredTokenException
182
200
 
201
+ ExpiredTradeInTokenException.add_member(:message, Shapes::ShapeRef.new(shape: expiredTradeInTokenExceptionMessage, location_name: "message"))
202
+ ExpiredTradeInTokenException.struct_class = Types::ExpiredTradeInTokenException
203
+
183
204
  FederatedUser.add_member(:federated_user_id, Shapes::ShapeRef.new(shape: federatedIdType, required: true, location_name: "FederatedUserId"))
184
205
  FederatedUser.add_member(:arn, Shapes::ShapeRef.new(shape: arnType, required: true, location_name: "Arn"))
185
206
  FederatedUser.struct_class = Types::FederatedUser
@@ -197,6 +218,14 @@ module Aws::STS
197
218
  GetCallerIdentityResponse.add_member(:arn, Shapes::ShapeRef.new(shape: arnType, location_name: "Arn"))
198
219
  GetCallerIdentityResponse.struct_class = Types::GetCallerIdentityResponse
199
220
 
221
+ GetDelegatedAccessTokenRequest.add_member(:trade_in_token, Shapes::ShapeRef.new(shape: tradeInTokenType, required: true, location_name: "TradeInToken"))
222
+ GetDelegatedAccessTokenRequest.struct_class = Types::GetDelegatedAccessTokenRequest
223
+
224
+ GetDelegatedAccessTokenResponse.add_member(:credentials, Shapes::ShapeRef.new(shape: Credentials, location_name: "Credentials"))
225
+ GetDelegatedAccessTokenResponse.add_member(:packed_policy_size, Shapes::ShapeRef.new(shape: nonNegativeIntegerType, location_name: "PackedPolicySize"))
226
+ GetDelegatedAccessTokenResponse.add_member(:assumed_principal, Shapes::ShapeRef.new(shape: arnType, location_name: "AssumedPrincipal"))
227
+ GetDelegatedAccessTokenResponse.struct_class = Types::GetDelegatedAccessTokenResponse
228
+
200
229
  GetFederationTokenRequest.add_member(:name, Shapes::ShapeRef.new(shape: userNameType, required: true, location_name: "Name"))
201
230
  GetFederationTokenRequest.add_member(:policy, Shapes::ShapeRef.new(shape: sessionPolicyDocumentType, location_name: "Policy"))
202
231
  GetFederationTokenRequest.add_member(:policy_arns, Shapes::ShapeRef.new(shape: policyDescriptorListType, location_name: "PolicyArns"))
@@ -217,6 +246,16 @@ module Aws::STS
217
246
  GetSessionTokenResponse.add_member(:credentials, Shapes::ShapeRef.new(shape: Credentials, location_name: "Credentials"))
218
247
  GetSessionTokenResponse.struct_class = Types::GetSessionTokenResponse
219
248
 
249
+ GetWebIdentityTokenRequest.add_member(:audience, Shapes::ShapeRef.new(shape: webIdentityTokenAudienceListType, required: true, location_name: "Audience"))
250
+ GetWebIdentityTokenRequest.add_member(:duration_seconds, Shapes::ShapeRef.new(shape: webIdentityTokenDurationSecondsType, location_name: "DurationSeconds"))
251
+ GetWebIdentityTokenRequest.add_member(:signing_algorithm, Shapes::ShapeRef.new(shape: jwtAlgorithmType, required: true, location_name: "SigningAlgorithm"))
252
+ GetWebIdentityTokenRequest.add_member(:tags, Shapes::ShapeRef.new(shape: tagListType, location_name: "Tags"))
253
+ GetWebIdentityTokenRequest.struct_class = Types::GetWebIdentityTokenRequest
254
+
255
+ GetWebIdentityTokenResponse.add_member(:web_identity_token, Shapes::ShapeRef.new(shape: webIdentityTokenType, location_name: "WebIdentityToken"))
256
+ GetWebIdentityTokenResponse.add_member(:expiration, Shapes::ShapeRef.new(shape: dateType, location_name: "Expiration"))
257
+ GetWebIdentityTokenResponse.struct_class = Types::GetWebIdentityTokenResponse
258
+
220
259
  IDPCommunicationErrorException.add_member(:message, Shapes::ShapeRef.new(shape: idpCommunicationErrorMessage, location_name: "message"))
221
260
  IDPCommunicationErrorException.struct_class = Types::IDPCommunicationErrorException
222
261
 
@@ -229,9 +268,15 @@ module Aws::STS
229
268
  InvalidIdentityTokenException.add_member(:message, Shapes::ShapeRef.new(shape: invalidIdentityTokenMessage, location_name: "message"))
230
269
  InvalidIdentityTokenException.struct_class = Types::InvalidIdentityTokenException
231
270
 
271
+ JWTPayloadSizeExceededException.add_member(:message, Shapes::ShapeRef.new(shape: jwtPayloadSizeExceededException, location_name: "message"))
272
+ JWTPayloadSizeExceededException.struct_class = Types::JWTPayloadSizeExceededException
273
+
232
274
  MalformedPolicyDocumentException.add_member(:message, Shapes::ShapeRef.new(shape: malformedPolicyDocumentMessage, location_name: "message"))
233
275
  MalformedPolicyDocumentException.struct_class = Types::MalformedPolicyDocumentException
234
276
 
277
+ OutboundWebIdentityFederationDisabledException.add_member(:message, Shapes::ShapeRef.new(shape: outboundWebIdentityFederationDisabledException, location_name: "message"))
278
+ OutboundWebIdentityFederationDisabledException.struct_class = Types::OutboundWebIdentityFederationDisabledException
279
+
235
280
  PackedPolicyTooLargeException.add_member(:message, Shapes::ShapeRef.new(shape: packedPolicyTooLargeMessage, location_name: "message"))
236
281
  PackedPolicyTooLargeException.struct_class = Types::PackedPolicyTooLargeException
237
282
 
@@ -247,6 +292,9 @@ module Aws::STS
247
292
  RegionDisabledException.add_member(:message, Shapes::ShapeRef.new(shape: regionDisabledMessage, location_name: "message"))
248
293
  RegionDisabledException.struct_class = Types::RegionDisabledException
249
294
 
295
+ SessionDurationEscalationException.add_member(:message, Shapes::ShapeRef.new(shape: sessionDurationEscalationException, location_name: "message"))
296
+ SessionDurationEscalationException.struct_class = Types::SessionDurationEscalationException
297
+
250
298
  Tag.add_member(:key, Shapes::ShapeRef.new(shape: tagKeyType, required: true, location_name: "Key"))
251
299
  Tag.add_member(:value, Shapes::ShapeRef.new(shape: tagValueType, required: true, location_name: "Value"))
252
300
  Tag.struct_class = Types::Tag
@@ -257,6 +305,8 @@ module Aws::STS
257
305
 
258
306
  tagListType.member = Shapes::ShapeRef.new(shape: Tag)
259
307
 
308
+ webIdentityTokenAudienceListType.member = Shapes::ShapeRef.new(shape: webIdentityTokenAudienceStringType)
309
+
260
310
 
261
311
  # @api private
262
312
  API = Seahorse::Model::Api.new.tap do |api|
@@ -294,6 +344,7 @@ module Aws::STS
294
344
  o.name = "AssumeRoleWithSAML"
295
345
  o.http_method = "POST"
296
346
  o.http_request_uri = "/"
347
+ o['authtype'] = "none"
297
348
  o['auth'] = ["smithy.api#noAuth"]
298
349
  o.input = Shapes::ShapeRef.new(shape: AssumeRoleWithSAMLRequest)
299
350
  o.output = Shapes::ShapeRef.new(shape: AssumeRoleWithSAMLResponse)
@@ -309,6 +360,7 @@ module Aws::STS
309
360
  o.name = "AssumeRoleWithWebIdentity"
310
361
  o.http_method = "POST"
311
362
  o.http_request_uri = "/"
363
+ o['authtype'] = "none"
312
364
  o['auth'] = ["smithy.api#noAuth"]
313
365
  o.input = Shapes::ShapeRef.new(shape: AssumeRoleWithWebIdentityRequest)
314
366
  o.output = Shapes::ShapeRef.new(shape: AssumeRoleWithWebIdentityResponse)
@@ -356,6 +408,17 @@ module Aws::STS
356
408
  o.output = Shapes::ShapeRef.new(shape: GetCallerIdentityResponse)
357
409
  end)
358
410
 
411
+ api.add_operation(:get_delegated_access_token, Seahorse::Model::Operation.new.tap do |o|
412
+ o.name = "GetDelegatedAccessToken"
413
+ o.http_method = "POST"
414
+ o.http_request_uri = "/"
415
+ o.input = Shapes::ShapeRef.new(shape: GetDelegatedAccessTokenRequest)
416
+ o.output = Shapes::ShapeRef.new(shape: GetDelegatedAccessTokenResponse)
417
+ o.errors << Shapes::ShapeRef.new(shape: ExpiredTradeInTokenException)
418
+ o.errors << Shapes::ShapeRef.new(shape: RegionDisabledException)
419
+ o.errors << Shapes::ShapeRef.new(shape: PackedPolicyTooLargeException)
420
+ end)
421
+
359
422
  api.add_operation(:get_federation_token, Seahorse::Model::Operation.new.tap do |o|
360
423
  o.name = "GetFederationToken"
361
424
  o.http_method = "POST"
@@ -375,6 +438,17 @@ module Aws::STS
375
438
  o.output = Shapes::ShapeRef.new(shape: GetSessionTokenResponse)
376
439
  o.errors << Shapes::ShapeRef.new(shape: RegionDisabledException)
377
440
  end)
441
+
442
+ api.add_operation(:get_web_identity_token, Seahorse::Model::Operation.new.tap do |o|
443
+ o.name = "GetWebIdentityToken"
444
+ o.http_method = "POST"
445
+ o.http_request_uri = "/"
446
+ o.input = Shapes::ShapeRef.new(shape: GetWebIdentityTokenRequest)
447
+ o.output = Shapes::ShapeRef.new(shape: GetWebIdentityTokenResponse)
448
+ o.errors << Shapes::ShapeRef.new(shape: SessionDurationEscalationException)
449
+ o.errors << Shapes::ShapeRef.new(shape: OutboundWebIdentityFederationDisabledException)
450
+ o.errors << Shapes::ShapeRef.new(shape: JWTPayloadSizeExceededException)
451
+ end)
378
452
  end
379
453
 
380
454
  end
@@ -1,6 +1,5 @@
1
1
  # frozen_string_literal: true
2
2
 
3
- # utility classes
4
3
  module Aws
5
4
  module STS
6
5
  autoload :Presigner, 'aws-sdk-sts/presigner'
@@ -13,27 +13,27 @@ module Aws::STS
13
13
  # @!attribute region
14
14
  # The AWS region used to dispatch the request.
15
15
  #
16
- # @return [String]
16
+ # @return [string]
17
17
  #
18
18
  # @!attribute use_dual_stack
19
19
  # When true, use the dual-stack endpoint. If the configured endpoint does not support dual-stack, dispatching the request MAY return an error.
20
20
  #
21
- # @return [Boolean]
21
+ # @return [boolean]
22
22
  #
23
23
  # @!attribute use_fips
24
24
  # When true, send this request to the FIPS-compliant regional endpoint. If the configured endpoint does not have a FIPS compliant endpoint, dispatching the request will return an error.
25
25
  #
26
- # @return [Boolean]
26
+ # @return [boolean]
27
27
  #
28
28
  # @!attribute endpoint
29
29
  # Override the endpoint used to send this request
30
30
  #
31
- # @return [String]
31
+ # @return [string]
32
32
  #
33
33
  # @!attribute use_global_endpoint
34
34
  # Whether the global endpoint should be used, rather then the regional endpoint for us-east-1.
35
35
  #
36
- # @return [Boolean]
36
+ # @return [boolean]
37
37
  #
38
38
  EndpointParameters = Struct.new(
39
39
  :region,