aws-sdk-core 3.236.0 → 3.237.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +7 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-core/instance_profile_credentials.rb +7 -7
- data/lib/aws-sdk-sso/client.rb +1 -1
- data/lib/aws-sdk-sso.rb +1 -1
- data/lib/aws-sdk-ssooidc/client.rb +1 -1
- data/lib/aws-sdk-ssooidc.rb +1 -1
- data/lib/aws-sdk-sts/client.rb +65 -12
- data/lib/aws-sdk-sts/client_api.rb +26 -0
- data/lib/aws-sdk-sts/errors.rb +16 -0
- data/lib/aws-sdk-sts/types.rb +48 -6
- data/lib/aws-sdk-sts.rb +1 -1
- metadata +1 -1
checksums.yaml
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
---
|
|
2
2
|
SHA256:
|
|
3
|
-
metadata.gz:
|
|
4
|
-
data.tar.gz:
|
|
3
|
+
metadata.gz: 95d07e9b7ee04171f8d93e7d0616d89c8d7e738372b772d6f66a67fac0710c41
|
|
4
|
+
data.tar.gz: 00b8b6b00d2e61dee0054b198e73f76f27d2af1e282e01374126522e67991d98
|
|
5
5
|
SHA512:
|
|
6
|
-
metadata.gz:
|
|
7
|
-
data.tar.gz:
|
|
6
|
+
metadata.gz: b77063dba0c37595b4096dd4a022a5446dc3fcb850bf24fff5546c025ce0dfb9fa96570e3259591708836a40c591df299879ebfb7b8648a4cbd736101fad30be
|
|
7
|
+
data.tar.gz: 05b16dade46a24d7c53d4dc4fa48226f18deaa2ebb410b9bf42a63305cdac965b888bc5b11d283d1ff6c8c5b73ee107135bc8b6dd861386eaea44a02148341cb
|
data/CHANGELOG.md
CHANGED
|
@@ -1,6 +1,13 @@
|
|
|
1
1
|
Unreleased Changes
|
|
2
2
|
------------------
|
|
3
3
|
|
|
4
|
+
3.237.0 (2025-11-10)
|
|
5
|
+
------------------
|
|
6
|
+
|
|
7
|
+
* Feature - Updated Aws::STS::Client with the latest API changes.
|
|
8
|
+
|
|
9
|
+
* Feature - Added GetDelegatedAccessToken API, which is not available for general use at this time.
|
|
10
|
+
|
|
4
11
|
3.236.0 (2025-10-30)
|
|
5
12
|
------------------
|
|
6
13
|
|
data/VERSION
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
3.
|
|
1
|
+
3.237.0
|
|
@@ -57,6 +57,9 @@ module Aws
|
|
|
57
57
|
|
|
58
58
|
# @param [Hash] options
|
|
59
59
|
# @option options [Integer] :retries (1) Number of times to retry when retrieving credentials.
|
|
60
|
+
# @option options [Numeric, Proc] :backoff By default, failures are retried with exponential back-off, i.e.
|
|
61
|
+
# `lambda { |num_failures| sleep(1.2 ** num_failures) }`. You can pass a number of seconds to sleep
|
|
62
|
+
# between failed attempts, or a Proc that accepts the number of failures.
|
|
60
63
|
# @option options [String] :endpoint ('http://169.254.169.254') The IMDS endpoint. This option has precedence
|
|
61
64
|
# over the `:endpoint_mode`.
|
|
62
65
|
# @option options [String] :endpoint_mode ('IPv4') The endpoint mode for the instance metadata service. This is
|
|
@@ -67,14 +70,11 @@ module Aws
|
|
|
67
70
|
# @option options [Integer] :port (80)
|
|
68
71
|
# @option options [Float] :http_open_timeout (1)
|
|
69
72
|
# @option options [Float] :http_read_timeout (1)
|
|
70
|
-
# @option options [Numeric, Proc] :delay By default, failures are retried with exponential back-off, i.e.
|
|
71
|
-
# `sleep(1.2 ** num_failures)`. You can pass a number of seconds to sleep between failed attempts, or a Proc
|
|
72
|
-
# that accepts the number of failures.
|
|
73
73
|
# @option options [IO] :http_debug_output (nil) HTTP wire traces are sent to this object.
|
|
74
74
|
# You can specify something like `$stdout`.
|
|
75
|
-
# @option options [Integer] :token_ttl Time-to-Live in seconds for EC2 Metadata Token used for fetching
|
|
76
|
-
# Metadata Profile Credentials
|
|
77
|
-
# @option options [
|
|
75
|
+
# @option options [Integer] :token_ttl (21600) Time-to-Live in seconds for EC2 Metadata Token used for fetching
|
|
76
|
+
# Metadata Profile Credentials.
|
|
77
|
+
# @option options [Proc] :before_refresh A Proc called before credentials are refreshed. `:before_refresh`
|
|
78
78
|
# is called with an instance of this object when AWS credentials are required and need to be refreshed.
|
|
79
79
|
def initialize(options = {})
|
|
80
80
|
@backoff = resolve_backoff(options[:backoff])
|
|
@@ -95,7 +95,7 @@ module Aws
|
|
|
95
95
|
super
|
|
96
96
|
end
|
|
97
97
|
|
|
98
|
-
# @return [
|
|
98
|
+
# @return [Boolean]
|
|
99
99
|
attr_reader :disable_imds_v1
|
|
100
100
|
|
|
101
101
|
# @return [Integer]
|
data/lib/aws-sdk-sso/client.rb
CHANGED
data/lib/aws-sdk-sso.rb
CHANGED
data/lib/aws-sdk-ssooidc.rb
CHANGED
data/lib/aws-sdk-sts/client.rb
CHANGED
|
@@ -619,7 +619,7 @@ module Aws::STS
|
|
|
619
619
|
# The regex used to validate this parameter is a string of characters
|
|
620
620
|
# consisting of upper- and lower-case alphanumeric characters with no
|
|
621
621
|
# spaces. You can also include underscores or any of the following
|
|
622
|
-
# characters:
|
|
622
|
+
# characters: +=,.@-
|
|
623
623
|
#
|
|
624
624
|
#
|
|
625
625
|
#
|
|
@@ -813,7 +813,7 @@ module Aws::STS
|
|
|
813
813
|
# The regex used to validate this parameter is a string of characters
|
|
814
814
|
# consisting of upper- and lower-case alphanumeric characters with no
|
|
815
815
|
# spaces. You can also include underscores or any of the following
|
|
816
|
-
# characters:
|
|
816
|
+
# characters: +=,.@:\\/-
|
|
817
817
|
#
|
|
818
818
|
#
|
|
819
819
|
#
|
|
@@ -831,7 +831,7 @@ module Aws::STS
|
|
|
831
831
|
# The regex used to validate this parameter is a string of characters
|
|
832
832
|
# consisting of upper- and lower-case alphanumeric characters with no
|
|
833
833
|
# spaces. You can also include underscores or any of the following
|
|
834
|
-
# characters:
|
|
834
|
+
# characters: +=/:,.@-
|
|
835
835
|
#
|
|
836
836
|
# @option params [String] :token_code
|
|
837
837
|
# The value provided by the MFA device, if the trust policy of the role
|
|
@@ -892,7 +892,7 @@ module Aws::STS
|
|
|
892
892
|
#
|
|
893
893
|
# resp = client.assume_role({
|
|
894
894
|
# external_id: "123ABC",
|
|
895
|
-
# policy: "
|
|
895
|
+
# policy: "escaped-JSON-IAM-POLICY",
|
|
896
896
|
# role_arn: "arn:aws:iam::123456789012:role/demo",
|
|
897
897
|
# role_session_name: "testAssumeRoleSession",
|
|
898
898
|
# tags: [
|
|
@@ -996,6 +996,11 @@ module Aws::STS
|
|
|
996
996
|
# Applications can use these temporary security credentials to sign
|
|
997
997
|
# calls to Amazon Web Services services.
|
|
998
998
|
#
|
|
999
|
+
# <note markdown="1"> AssumeRoleWithSAML will not work on IAM Identity Center managed roles.
|
|
1000
|
+
# These roles' names start with `AWSReservedSSO_`.
|
|
1001
|
+
#
|
|
1002
|
+
# </note>
|
|
1003
|
+
#
|
|
999
1004
|
# **Session Duration**
|
|
1000
1005
|
#
|
|
1001
1006
|
# By default, the temporary security credentials created by
|
|
@@ -1414,7 +1419,8 @@ module Aws::STS
|
|
|
1414
1419
|
# (Optional) You can configure your IdP to pass attributes into your web
|
|
1415
1420
|
# identity token as session tags. Each session tag consists of a key
|
|
1416
1421
|
# name and an associated value. For more information about session tags,
|
|
1417
|
-
# see [Passing
|
|
1422
|
+
# see [Passing session tags using AssumeRoleWithWebIdentity][9] in the
|
|
1423
|
+
# *IAM User Guide*.
|
|
1418
1424
|
#
|
|
1419
1425
|
# You can pass up to 50 session tags. The plaintext session tag keys
|
|
1420
1426
|
# can’t exceed 128 characters and the values can’t exceed 256
|
|
@@ -1482,7 +1488,7 @@ module Aws::STS
|
|
|
1482
1488
|
# [6]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_update-role-settings.html#id_roles_update-session-duration
|
|
1483
1489
|
# [7]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html
|
|
1484
1490
|
# [8]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
|
|
1485
|
-
# [9]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html
|
|
1491
|
+
# [9]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html#id_session-tags_adding-assume-role-idp
|
|
1486
1492
|
# [10]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-limits.html#reference_iam-limits-entity-length
|
|
1487
1493
|
# [11]: https://docs.aws.amazon.com/IAM/latest/UserGuide/tutorial_attribute-based-access-control.html
|
|
1488
1494
|
# [12]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html#id_session-tags_role-chaining
|
|
@@ -1673,7 +1679,7 @@ module Aws::STS
|
|
|
1673
1679
|
#
|
|
1674
1680
|
# resp = client.assume_role_with_web_identity({
|
|
1675
1681
|
# duration_seconds: 3600,
|
|
1676
|
-
# policy: "
|
|
1682
|
+
# policy: "escaped-JSON-IAM-POLICY",
|
|
1677
1683
|
# provider_id: "www.amazon.com",
|
|
1678
1684
|
# role_arn: "arn:aws:iam::123456789012:role/FederatedWebIdentityRole",
|
|
1679
1685
|
# role_session_name: "app1",
|
|
@@ -1738,7 +1744,10 @@ module Aws::STS
|
|
|
1738
1744
|
end
|
|
1739
1745
|
|
|
1740
1746
|
# Returns a set of short term credentials you can use to perform
|
|
1741
|
-
# privileged tasks on a member account in your organization.
|
|
1747
|
+
# privileged tasks on a member account in your organization. You must
|
|
1748
|
+
# use credentials from an Organizations management account or a
|
|
1749
|
+
# delegated administrator account for IAM to call `AssumeRoot`. You
|
|
1750
|
+
# cannot use root user credentials to make this call.
|
|
1742
1751
|
#
|
|
1743
1752
|
# Before you can launch a privileged session, you must have centralized
|
|
1744
1753
|
# root access in your organization. For steps to enable this feature,
|
|
@@ -1755,19 +1764,29 @@ module Aws::STS
|
|
|
1755
1764
|
# were performed in a session. For more information, see [Track
|
|
1756
1765
|
# privileged tasks in CloudTrail][3] in the *IAM User Guide*.
|
|
1757
1766
|
#
|
|
1767
|
+
# When granting access to privileged tasks you should only grant the
|
|
1768
|
+
# necessary permissions required to perform that task. For more
|
|
1769
|
+
# information, see [Security best practices in IAM][4]. In addition, you
|
|
1770
|
+
# can use [service control policies][5] (SCPs) to manage and limit
|
|
1771
|
+
# permissions in your organization. See [General examples][6] in the
|
|
1772
|
+
# *Organizations User Guide* for more information on SCPs.
|
|
1773
|
+
#
|
|
1758
1774
|
#
|
|
1759
1775
|
#
|
|
1760
1776
|
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_root-enable-root-access.html
|
|
1761
1777
|
# [2]: https://docs.aws.amazon.com/STS/latest/APIReference/welcome.html#sts-endpoints
|
|
1762
1778
|
# [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/cloudtrail-track-privileged-tasks.html
|
|
1779
|
+
# [4]: https://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html
|
|
1780
|
+
# [5]: https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_policies_scps.html
|
|
1781
|
+
# [6]: https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_policies_scps_examples_general.html
|
|
1763
1782
|
#
|
|
1764
1783
|
# @option params [required, String] :target_principal
|
|
1765
1784
|
# The member account principal ARN or account ID.
|
|
1766
1785
|
#
|
|
1767
1786
|
# @option params [required, Types::PolicyDescriptorType] :task_policy_arn
|
|
1768
1787
|
# The identity based policy that scopes the session to the privileged
|
|
1769
|
-
# tasks that can be performed. You
|
|
1770
|
-
# Services managed policies to scope root session actions
|
|
1788
|
+
# tasks that can be performed. You must use one of following Amazon Web
|
|
1789
|
+
# Services managed policies to scope root session actions:
|
|
1771
1790
|
#
|
|
1772
1791
|
# * [IAMAuditRootUserCredentials][1]
|
|
1773
1792
|
#
|
|
@@ -2078,6 +2097,40 @@ module Aws::STS
|
|
|
2078
2097
|
req.send_request(options)
|
|
2079
2098
|
end
|
|
2080
2099
|
|
|
2100
|
+
# This API is currently unavailable for general use.
|
|
2101
|
+
#
|
|
2102
|
+
# @option params [required, String] :trade_in_token
|
|
2103
|
+
#
|
|
2104
|
+
# @return [Types::GetDelegatedAccessTokenResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
|
2105
|
+
#
|
|
2106
|
+
# * {Types::GetDelegatedAccessTokenResponse#credentials #credentials} => Types::Credentials
|
|
2107
|
+
# * {Types::GetDelegatedAccessTokenResponse#packed_policy_size #packed_policy_size} => Integer
|
|
2108
|
+
# * {Types::GetDelegatedAccessTokenResponse#assumed_principal #assumed_principal} => String
|
|
2109
|
+
#
|
|
2110
|
+
# @example Request syntax with placeholder values
|
|
2111
|
+
#
|
|
2112
|
+
# resp = client.get_delegated_access_token({
|
|
2113
|
+
# trade_in_token: "tradeInTokenType", # required
|
|
2114
|
+
# })
|
|
2115
|
+
#
|
|
2116
|
+
# @example Response structure
|
|
2117
|
+
#
|
|
2118
|
+
# resp.credentials.access_key_id #=> String
|
|
2119
|
+
# resp.credentials.secret_access_key #=> String
|
|
2120
|
+
# resp.credentials.session_token #=> String
|
|
2121
|
+
# resp.credentials.expiration #=> Time
|
|
2122
|
+
# resp.packed_policy_size #=> Integer
|
|
2123
|
+
# resp.assumed_principal #=> String
|
|
2124
|
+
#
|
|
2125
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/sts-2011-06-15/GetDelegatedAccessToken AWS API Documentation
|
|
2126
|
+
#
|
|
2127
|
+
# @overload get_delegated_access_token(params = {})
|
|
2128
|
+
# @param [Hash] params ({})
|
|
2129
|
+
def get_delegated_access_token(params = {}, options = {})
|
|
2130
|
+
req = build_request(:get_delegated_access_token, params)
|
|
2131
|
+
req.send_request(options)
|
|
2132
|
+
end
|
|
2133
|
+
|
|
2081
2134
|
# Returns a set of temporary security credentials (consisting of an
|
|
2082
2135
|
# access key ID, a secret access key, and a security token) for a user.
|
|
2083
2136
|
# A typical use is in a proxy application that gets temporary security
|
|
@@ -2360,7 +2413,7 @@ module Aws::STS
|
|
|
2360
2413
|
# resp = client.get_federation_token({
|
|
2361
2414
|
# duration_seconds: 3600,
|
|
2362
2415
|
# name: "testFedUserSession",
|
|
2363
|
-
# policy: "
|
|
2416
|
+
# policy: "escaped-JSON-IAM-POLICY",
|
|
2364
2417
|
# tags: [
|
|
2365
2418
|
# {
|
|
2366
2419
|
# key: "Project",
|
|
@@ -2601,7 +2654,7 @@ module Aws::STS
|
|
|
2601
2654
|
tracer: tracer
|
|
2602
2655
|
)
|
|
2603
2656
|
context[:gem_name] = 'aws-sdk-core'
|
|
2604
|
-
context[:gem_version] = '3.
|
|
2657
|
+
context[:gem_version] = '3.237.0'
|
|
2605
2658
|
Seahorse::Client::Request.new(handlers, context)
|
|
2606
2659
|
end
|
|
2607
2660
|
|
|
@@ -28,11 +28,14 @@ module Aws::STS
|
|
|
28
28
|
DecodeAuthorizationMessageRequest = Shapes::StructureShape.new(name: 'DecodeAuthorizationMessageRequest')
|
|
29
29
|
DecodeAuthorizationMessageResponse = Shapes::StructureShape.new(name: 'DecodeAuthorizationMessageResponse')
|
|
30
30
|
ExpiredTokenException = Shapes::StructureShape.new(name: 'ExpiredTokenException', error: {"code" => "ExpiredTokenException", "httpStatusCode" => 400, "senderFault" => true})
|
|
31
|
+
ExpiredTradeInTokenException = Shapes::StructureShape.new(name: 'ExpiredTradeInTokenException', error: {"code" => "ExpiredTradeInTokenException", "httpStatusCode" => 400, "senderFault" => true})
|
|
31
32
|
FederatedUser = Shapes::StructureShape.new(name: 'FederatedUser')
|
|
32
33
|
GetAccessKeyInfoRequest = Shapes::StructureShape.new(name: 'GetAccessKeyInfoRequest')
|
|
33
34
|
GetAccessKeyInfoResponse = Shapes::StructureShape.new(name: 'GetAccessKeyInfoResponse')
|
|
34
35
|
GetCallerIdentityRequest = Shapes::StructureShape.new(name: 'GetCallerIdentityRequest')
|
|
35
36
|
GetCallerIdentityResponse = Shapes::StructureShape.new(name: 'GetCallerIdentityResponse')
|
|
37
|
+
GetDelegatedAccessTokenRequest = Shapes::StructureShape.new(name: 'GetDelegatedAccessTokenRequest')
|
|
38
|
+
GetDelegatedAccessTokenResponse = Shapes::StructureShape.new(name: 'GetDelegatedAccessTokenResponse')
|
|
36
39
|
GetFederationTokenRequest = Shapes::StructureShape.new(name: 'GetFederationTokenRequest')
|
|
37
40
|
GetFederationTokenResponse = Shapes::StructureShape.new(name: 'GetFederationTokenResponse')
|
|
38
41
|
GetSessionTokenRequest = Shapes::StructureShape.new(name: 'GetSessionTokenRequest')
|
|
@@ -67,6 +70,7 @@ module Aws::STS
|
|
|
67
70
|
durationSecondsType = Shapes::IntegerShape.new(name: 'durationSecondsType')
|
|
68
71
|
encodedMessageType = Shapes::StringShape.new(name: 'encodedMessageType')
|
|
69
72
|
expiredIdentityTokenMessage = Shapes::StringShape.new(name: 'expiredIdentityTokenMessage')
|
|
73
|
+
expiredTradeInTokenExceptionMessage = Shapes::StringShape.new(name: 'expiredTradeInTokenExceptionMessage')
|
|
70
74
|
externalIdType = Shapes::StringShape.new(name: 'externalIdType')
|
|
71
75
|
federatedIdType = Shapes::StringShape.new(name: 'federatedIdType')
|
|
72
76
|
idpCommunicationErrorMessage = Shapes::StringShape.new(name: 'idpCommunicationErrorMessage')
|
|
@@ -89,6 +93,7 @@ module Aws::STS
|
|
|
89
93
|
tagValueType = Shapes::StringShape.new(name: 'tagValueType')
|
|
90
94
|
tokenCodeType = Shapes::StringShape.new(name: 'tokenCodeType')
|
|
91
95
|
tokenType = Shapes::StringShape.new(name: 'tokenType')
|
|
96
|
+
tradeInTokenType = Shapes::StringShape.new(name: 'tradeInTokenType')
|
|
92
97
|
unrestrictedSessionPolicyDocumentType = Shapes::StringShape.new(name: 'unrestrictedSessionPolicyDocumentType')
|
|
93
98
|
urlType = Shapes::StringShape.new(name: 'urlType')
|
|
94
99
|
userIdType = Shapes::StringShape.new(name: 'userIdType')
|
|
@@ -180,6 +185,9 @@ module Aws::STS
|
|
|
180
185
|
ExpiredTokenException.add_member(:message, Shapes::ShapeRef.new(shape: expiredIdentityTokenMessage, location_name: "message"))
|
|
181
186
|
ExpiredTokenException.struct_class = Types::ExpiredTokenException
|
|
182
187
|
|
|
188
|
+
ExpiredTradeInTokenException.add_member(:message, Shapes::ShapeRef.new(shape: expiredTradeInTokenExceptionMessage, location_name: "message"))
|
|
189
|
+
ExpiredTradeInTokenException.struct_class = Types::ExpiredTradeInTokenException
|
|
190
|
+
|
|
183
191
|
FederatedUser.add_member(:federated_user_id, Shapes::ShapeRef.new(shape: federatedIdType, required: true, location_name: "FederatedUserId"))
|
|
184
192
|
FederatedUser.add_member(:arn, Shapes::ShapeRef.new(shape: arnType, required: true, location_name: "Arn"))
|
|
185
193
|
FederatedUser.struct_class = Types::FederatedUser
|
|
@@ -197,6 +205,14 @@ module Aws::STS
|
|
|
197
205
|
GetCallerIdentityResponse.add_member(:arn, Shapes::ShapeRef.new(shape: arnType, location_name: "Arn"))
|
|
198
206
|
GetCallerIdentityResponse.struct_class = Types::GetCallerIdentityResponse
|
|
199
207
|
|
|
208
|
+
GetDelegatedAccessTokenRequest.add_member(:trade_in_token, Shapes::ShapeRef.new(shape: tradeInTokenType, required: true, location_name: "TradeInToken"))
|
|
209
|
+
GetDelegatedAccessTokenRequest.struct_class = Types::GetDelegatedAccessTokenRequest
|
|
210
|
+
|
|
211
|
+
GetDelegatedAccessTokenResponse.add_member(:credentials, Shapes::ShapeRef.new(shape: Credentials, location_name: "Credentials"))
|
|
212
|
+
GetDelegatedAccessTokenResponse.add_member(:packed_policy_size, Shapes::ShapeRef.new(shape: nonNegativeIntegerType, location_name: "PackedPolicySize"))
|
|
213
|
+
GetDelegatedAccessTokenResponse.add_member(:assumed_principal, Shapes::ShapeRef.new(shape: arnType, location_name: "AssumedPrincipal"))
|
|
214
|
+
GetDelegatedAccessTokenResponse.struct_class = Types::GetDelegatedAccessTokenResponse
|
|
215
|
+
|
|
200
216
|
GetFederationTokenRequest.add_member(:name, Shapes::ShapeRef.new(shape: userNameType, required: true, location_name: "Name"))
|
|
201
217
|
GetFederationTokenRequest.add_member(:policy, Shapes::ShapeRef.new(shape: sessionPolicyDocumentType, location_name: "Policy"))
|
|
202
218
|
GetFederationTokenRequest.add_member(:policy_arns, Shapes::ShapeRef.new(shape: policyDescriptorListType, location_name: "PolicyArns"))
|
|
@@ -358,6 +374,16 @@ module Aws::STS
|
|
|
358
374
|
o.output = Shapes::ShapeRef.new(shape: GetCallerIdentityResponse)
|
|
359
375
|
end)
|
|
360
376
|
|
|
377
|
+
api.add_operation(:get_delegated_access_token, Seahorse::Model::Operation.new.tap do |o|
|
|
378
|
+
o.name = "GetDelegatedAccessToken"
|
|
379
|
+
o.http_method = "POST"
|
|
380
|
+
o.http_request_uri = "/"
|
|
381
|
+
o.input = Shapes::ShapeRef.new(shape: GetDelegatedAccessTokenRequest)
|
|
382
|
+
o.output = Shapes::ShapeRef.new(shape: GetDelegatedAccessTokenResponse)
|
|
383
|
+
o.errors << Shapes::ShapeRef.new(shape: ExpiredTradeInTokenException)
|
|
384
|
+
o.errors << Shapes::ShapeRef.new(shape: RegionDisabledException)
|
|
385
|
+
end)
|
|
386
|
+
|
|
361
387
|
api.add_operation(:get_federation_token, Seahorse::Model::Operation.new.tap do |o|
|
|
362
388
|
o.name = "GetFederationToken"
|
|
363
389
|
o.http_method = "POST"
|
data/lib/aws-sdk-sts/errors.rb
CHANGED
|
@@ -28,6 +28,7 @@ module Aws::STS
|
|
|
28
28
|
#
|
|
29
29
|
# ## Error Classes
|
|
30
30
|
# * {ExpiredTokenException}
|
|
31
|
+
# * {ExpiredTradeInTokenException}
|
|
31
32
|
# * {IDPCommunicationErrorException}
|
|
32
33
|
# * This error class is not used. `IDPCommunicationError` is used during parsing instead.
|
|
33
34
|
# * {IDPRejectedClaimException}
|
|
@@ -62,6 +63,21 @@ module Aws::STS
|
|
|
62
63
|
end
|
|
63
64
|
end
|
|
64
65
|
|
|
66
|
+
class ExpiredTradeInTokenException < ServiceError
|
|
67
|
+
|
|
68
|
+
# @param [Seahorse::Client::RequestContext] context
|
|
69
|
+
# @param [String] message
|
|
70
|
+
# @param [Aws::STS::Types::ExpiredTradeInTokenException] data
|
|
71
|
+
def initialize(context, message, data = Aws::EmptyStructure.new)
|
|
72
|
+
super(context, message, data)
|
|
73
|
+
end
|
|
74
|
+
|
|
75
|
+
# @return [String]
|
|
76
|
+
def message
|
|
77
|
+
@message || @data[:message]
|
|
78
|
+
end
|
|
79
|
+
end
|
|
80
|
+
|
|
65
81
|
# @deprecated This error class is not used during parsing.
|
|
66
82
|
# Please use `IDPCommunicationError` instead.
|
|
67
83
|
class IDPCommunicationErrorException < ServiceError
|
data/lib/aws-sdk-sts/types.rb
CHANGED
|
@@ -35,7 +35,7 @@ module Aws::STS
|
|
|
35
35
|
# The regex used to validate this parameter is a string of characters
|
|
36
36
|
# consisting of upper- and lower-case alphanumeric characters with no
|
|
37
37
|
# spaces. You can also include underscores or any of the following
|
|
38
|
-
# characters:
|
|
38
|
+
# characters: +=,.@-
|
|
39
39
|
#
|
|
40
40
|
#
|
|
41
41
|
#
|
|
@@ -240,7 +240,7 @@ module Aws::STS
|
|
|
240
240
|
# The regex used to validate this parameter is a string of characters
|
|
241
241
|
# consisting of upper- and lower-case alphanumeric characters with no
|
|
242
242
|
# spaces. You can also include underscores or any of the following
|
|
243
|
-
# characters:
|
|
243
|
+
# characters: +=,.@:\\/-
|
|
244
244
|
#
|
|
245
245
|
#
|
|
246
246
|
#
|
|
@@ -259,7 +259,7 @@ module Aws::STS
|
|
|
259
259
|
# The regex used to validate this parameter is a string of characters
|
|
260
260
|
# consisting of upper- and lower-case alphanumeric characters with no
|
|
261
261
|
# spaces. You can also include underscores or any of the following
|
|
262
|
-
# characters:
|
|
262
|
+
# characters: +=/:,.@-
|
|
263
263
|
# @return [String]
|
|
264
264
|
#
|
|
265
265
|
# @!attribute [rw] token_code
|
|
@@ -961,8 +961,8 @@ module Aws::STS
|
|
|
961
961
|
#
|
|
962
962
|
# @!attribute [rw] task_policy_arn
|
|
963
963
|
# The identity based policy that scopes the session to the privileged
|
|
964
|
-
# tasks that can be performed. You
|
|
965
|
-
# Services managed policies to scope root session actions
|
|
964
|
+
# tasks that can be performed. You must use one of following Amazon
|
|
965
|
+
# Web Services managed policies to scope root session actions:
|
|
966
966
|
#
|
|
967
967
|
# * [IAMAuditRootUserCredentials][1]
|
|
968
968
|
#
|
|
@@ -1144,6 +1144,17 @@ module Aws::STS
|
|
|
1144
1144
|
include Aws::Structure
|
|
1145
1145
|
end
|
|
1146
1146
|
|
|
1147
|
+
# @!attribute [rw] message
|
|
1148
|
+
# @return [String]
|
|
1149
|
+
#
|
|
1150
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/sts-2011-06-15/ExpiredTradeInTokenException AWS API Documentation
|
|
1151
|
+
#
|
|
1152
|
+
class ExpiredTradeInTokenException < Struct.new(
|
|
1153
|
+
:message)
|
|
1154
|
+
SENSITIVE = []
|
|
1155
|
+
include Aws::Structure
|
|
1156
|
+
end
|
|
1157
|
+
|
|
1147
1158
|
# Identifiers for the federated user that is associated with the
|
|
1148
1159
|
# credentials.
|
|
1149
1160
|
#
|
|
@@ -1239,6 +1250,37 @@ module Aws::STS
|
|
|
1239
1250
|
include Aws::Structure
|
|
1240
1251
|
end
|
|
1241
1252
|
|
|
1253
|
+
# @!attribute [rw] trade_in_token
|
|
1254
|
+
# @return [String]
|
|
1255
|
+
#
|
|
1256
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/sts-2011-06-15/GetDelegatedAccessTokenRequest AWS API Documentation
|
|
1257
|
+
#
|
|
1258
|
+
class GetDelegatedAccessTokenRequest < Struct.new(
|
|
1259
|
+
:trade_in_token)
|
|
1260
|
+
SENSITIVE = [:trade_in_token]
|
|
1261
|
+
include Aws::Structure
|
|
1262
|
+
end
|
|
1263
|
+
|
|
1264
|
+
# @!attribute [rw] credentials
|
|
1265
|
+
# Amazon Web Services credentials for API authentication.
|
|
1266
|
+
# @return [Types::Credentials]
|
|
1267
|
+
#
|
|
1268
|
+
# @!attribute [rw] packed_policy_size
|
|
1269
|
+
# @return [Integer]
|
|
1270
|
+
#
|
|
1271
|
+
# @!attribute [rw] assumed_principal
|
|
1272
|
+
# @return [String]
|
|
1273
|
+
#
|
|
1274
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/sts-2011-06-15/GetDelegatedAccessTokenResponse AWS API Documentation
|
|
1275
|
+
#
|
|
1276
|
+
class GetDelegatedAccessTokenResponse < Struct.new(
|
|
1277
|
+
:credentials,
|
|
1278
|
+
:packed_policy_size,
|
|
1279
|
+
:assumed_principal)
|
|
1280
|
+
SENSITIVE = []
|
|
1281
|
+
include Aws::Structure
|
|
1282
|
+
end
|
|
1283
|
+
|
|
1242
1284
|
# @!attribute [rw] name
|
|
1243
1285
|
# The name of the federated user. The name is used as an identifier
|
|
1244
1286
|
# for the temporary security credentials (such as `Bob`). For example,
|
|
@@ -1686,7 +1728,7 @@ module Aws::STS
|
|
|
1686
1728
|
#
|
|
1687
1729
|
#
|
|
1688
1730
|
#
|
|
1689
|
-
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html
|
|
1731
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html#sts-regions-activate-deactivate
|
|
1690
1732
|
#
|
|
1691
1733
|
# @!attribute [rw] message
|
|
1692
1734
|
# @return [String]
|
data/lib/aws-sdk-sts.rb
CHANGED