aws-sdk-core 3.59.0 → 3.62.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/VERSION +1 -1
- data/lib/aws-sdk-core/assume_role_web_identity_credentials.rb +1 -1
- data/lib/aws-sdk-core/credential_provider_chain.rb +2 -2
- data/lib/aws-sdk-core/json.rb +5 -5
- data/lib/aws-sdk-core/log/param_filter.rb +1 -1
- data/lib/aws-sdk-core/plugins/retry_errors.rb +2 -0
- data/lib/aws-sdk-sts.rb +1 -1
- data/lib/aws-sdk-sts/client.rb +91 -17
- data/lib/aws-sdk-sts/client_api.rb +16 -0
- data/lib/aws-sdk-sts/types.rb +52 -17
- metadata +2 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA1:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 2b811af0a0b6f98eff0ac41814b2bf3fa42a01f2
|
4
|
+
data.tar.gz: e0048beaf3b680698a72a26f25fa36d8e6ff67d8
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: f2a3dfce2817aff05eb3e3e4204cde255458a8ea15ea349b7329779e22341e12162f00b5f46dc3c9273a7a7ab755cfd82b367899de5d79a517b1d2d15672f5f1
|
7
|
+
data.tar.gz: 23e4d29427d6b99f40ed78f874761056ed8855ee79d629798d17e163b7bd0f602bab422103171c5774c55465f360f67e31510a5ed9fc4a05fbce2c18fc94f72f
|
data/VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
3.
|
1
|
+
3.62.0
|
@@ -52,7 +52,7 @@ module Aws
|
|
52
52
|
# not provided, generate encoded UUID as session name
|
53
53
|
@assume_role_web_identity_params[:role_session_name] = _session_name
|
54
54
|
end
|
55
|
-
@client = client_opts[:client] || STS::Client.new(client_opts)
|
55
|
+
@client = client_opts[:client] || STS::Client.new(client_opts.merge(credentials: false))
|
56
56
|
super
|
57
57
|
end
|
58
58
|
|
@@ -100,8 +100,8 @@ module Aws
|
|
100
100
|
end
|
101
101
|
|
102
102
|
def assume_role_web_identity_credentials(options)
|
103
|
-
if role_arn = ENV['AWS_ROLE_ARN'] &&
|
104
|
-
token_file = ENV['AWS_WEB_IDENTITY_TOKEN_FILE']
|
103
|
+
if (role_arn = ENV['AWS_ROLE_ARN']) &&
|
104
|
+
(token_file = ENV['AWS_WEB_IDENTITY_TOKEN_FILE'])
|
105
105
|
AssumeRoleWebIdentityCredentials.new(
|
106
106
|
role_arn: role_arn,
|
107
107
|
web_identity_token_file: token_file,
|
data/lib/aws-sdk-core/json.rb
CHANGED
@@ -23,7 +23,7 @@ module Aws
|
|
23
23
|
|
24
24
|
def load(json)
|
25
25
|
ENGINE.load(json, *ENGINE_LOAD_OPTIONS)
|
26
|
-
rescue
|
26
|
+
rescue *ENGINE_ERRORS => e
|
27
27
|
raise ParseError.new(e)
|
28
28
|
end
|
29
29
|
|
@@ -45,21 +45,21 @@ module Aws
|
|
45
45
|
end
|
46
46
|
|
47
47
|
def json_engine
|
48
|
-
[JSON, [], [], JSON::ParserError]
|
48
|
+
[JSON, [], [], [JSON::ParserError]]
|
49
49
|
end
|
50
50
|
|
51
51
|
def oj_parse_error
|
52
52
|
if Oj.const_defined?('ParseError')
|
53
|
-
Oj::ParseError
|
53
|
+
[Oj::ParseError, EncodingError]
|
54
54
|
else
|
55
|
-
SyntaxError
|
55
|
+
[SyntaxError]
|
56
56
|
end
|
57
57
|
end
|
58
58
|
|
59
59
|
end
|
60
60
|
|
61
61
|
# @api private
|
62
|
-
ENGINE, ENGINE_LOAD_OPTIONS, ENGINE_DUMP_OPTIONS,
|
62
|
+
ENGINE, ENGINE_LOAD_OPTIONS, ENGINE_DUMP_OPTIONS, ENGINE_ERRORS =
|
63
63
|
oj_engine || json_engine
|
64
64
|
|
65
65
|
end
|
@@ -11,7 +11,7 @@ module Aws
|
|
11
11
|
#
|
12
12
|
# @api private
|
13
13
|
# begin
|
14
|
-
SENSITIVE = [:access_token, :account_name, :account_password, :address, :admin_contact, :admin_password, :artifact_credentials, :auth_code, :authentication_token, :authorization_result, :backup_plan_tags, :backup_vault_tags, :base_32_string_seed, :body, :bot_configuration, :bot_email, :cause, :client_id, :client_secret, :comment, :configuration, :copy_source_sse_customer_key, :credentials, :current_password, :custom_attributes, :db_password, :default_phone_number, :definition, :description, :display_name, :e164_phone_number, :email, :email_address, :email_message, :embed_url, :error, :feedback_token, :file, :first_name, :id, :id_token, :input, :input_text, :key_id, :key_store_password, :kms_key_id, :kms_master_key_id, :lambda_function_arn, :last_name, :local_console_password, :master_account_email, :master_user_password, :message, :name, :new_password, :next_password, :notes, :number, :old_password, :outbound_events_https_endpoint, :output, :owner_information, :parameters, :passphrase, :password, :payload, :phone_number, :plaintext, :previous_password, :primary_email, :primary_provisioned_number, :private_key, :proposed_password, :public_key, :qr_code_png, :query, :recovery_point_tags, :refresh_token, :registrant_contact, :request_attributes, :search_query, :secret_access_key, :secret_binary, :secret_code, :secret_hash, :secret_string, :secret_to_authenticate_initiator, :secret_to_authenticate_target, :security_token, :service_password, :session_attributes, :share_notes, :shared_secret, :slots, :sse_customer_key, :ssekms_encryption_context, :ssekms_key_id, :status_message, :tag_key_list, :tags, :task_parameters, :tech_contact, :temporary_password, :text, :token, :trust_password, :type, :upload_credentials, :upload_url, :uri, :user_email, :user_name, :username, :value, :values, :variables, :zip_file]
|
14
|
+
SENSITIVE = [:access_token, :account_name, :account_password, :address, :admin_contact, :admin_password, :artifact_credentials, :auth_code, :authentication_token, :authorization_result, :backup_plan_tags, :backup_vault_tags, :base_32_string_seed, :body, :bot_configuration, :bot_email, :cause, :client_id, :client_secret, :comment, :configuration, :copy_source_sse_customer_key, :credentials, :current_password, :custom_attributes, :db_password, :default_phone_number, :definition, :description, :display_name, :e164_phone_number, :email, :email_address, :email_message, :embed_url, :error, :feedback_token, :file, :first_name, :id, :id_token, :input, :input_text, :key_id, :key_store_password, :kms_key_id, :kms_master_key_id, :lambda_function_arn, :last_name, :local_console_password, :master_account_email, :master_user_password, :message, :name, :new_password, :next_password, :notes, :number, :old_password, :outbound_events_https_endpoint, :output, :owner_information, :parameters, :passphrase, :password, :payload, :phone_number, :plaintext, :previous_password, :primary_email, :primary_provisioned_number, :private_key, :proposed_password, :public_key, :qr_code_png, :query, :random_password, :recovery_point_tags, :refresh_token, :registrant_contact, :request_attributes, :search_query, :secret_access_key, :secret_binary, :secret_code, :secret_hash, :secret_string, :secret_to_authenticate_initiator, :secret_to_authenticate_target, :security_token, :service_password, :session_attributes, :share_notes, :shared_secret, :slots, :sse_customer_key, :ssekms_encryption_context, :ssekms_key_id, :status_message, :tag_key_list, :tags, :task_parameters, :tech_contact, :temporary_password, :text, :token, :trust_password, :type, :upload_credentials, :upload_url, :uri, :user_email, :user_name, :username, :value, :values, :variables, :zip_file]
|
15
15
|
# end
|
16
16
|
|
17
17
|
def initialize(options = {})
|
@@ -72,6 +72,7 @@ A delay randomiser function used by the default backoff function. Some predefine
|
|
72
72
|
'UnrecognizedClientException', # json services
|
73
73
|
'InvalidAccessKeyId', # s3
|
74
74
|
'AuthFailure', # ec2
|
75
|
+
'InvalidIdentityToken', # sts
|
75
76
|
])
|
76
77
|
|
77
78
|
THROTTLING_ERRORS = Set.new([
|
@@ -117,6 +118,7 @@ A delay randomiser function used by the default backoff function. Some predefine
|
|
117
118
|
|
118
119
|
def networking?
|
119
120
|
@error.is_a?(Seahorse::Client::NetworkingError) ||
|
121
|
+
@error.is_a?(Errors::NoSuchEndpointError) ||
|
120
122
|
NETWORKING_ERRORS.include?(@name)
|
121
123
|
end
|
122
124
|
|
data/lib/aws-sdk-sts.rb
CHANGED
data/lib/aws-sdk-sts/client.rb
CHANGED
@@ -395,8 +395,7 @@ module Aws::STS
|
|
395
395
|
# ARNs. However, the plain text that you use for both inline and managed
|
396
396
|
# session policies shouldn't exceed 2048 characters. For more
|
397
397
|
# information about ARNs, see [Amazon Resource Names (ARNs) and AWS
|
398
|
-
# Service Namespaces]
|
399
|
-
# the AWS General Reference.
|
398
|
+
# Service Namespaces][1] in the AWS General Reference.
|
400
399
|
#
|
401
400
|
# <note markdown="1"> The characters in this parameter count towards the 2048 character
|
402
401
|
# session policy guideline. However, an AWS conversion compresses the
|
@@ -414,11 +413,12 @@ module Aws::STS
|
|
414
413
|
# access resources in the account that owns the role. You cannot use
|
415
414
|
# session policies to grant more permissions than those allowed by the
|
416
415
|
# identity-based policy of the role that is being assumed. For more
|
417
|
-
# information, see [Session Policies][
|
416
|
+
# information, see [Session Policies][2] in the *IAM User Guide*.
|
418
417
|
#
|
419
418
|
#
|
420
419
|
#
|
421
|
-
# [1]: https://docs.aws.amazon.com/
|
420
|
+
# [1]: https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html
|
421
|
+
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
|
422
422
|
#
|
423
423
|
# @option params [String] :policy
|
424
424
|
# An IAM policy in JSON format that you want to use as an inline session
|
@@ -715,8 +715,7 @@ module Aws::STS
|
|
715
715
|
# ARNs. However, the plain text that you use for both inline and managed
|
716
716
|
# session policies shouldn't exceed 2048 characters. For more
|
717
717
|
# information about ARNs, see [Amazon Resource Names (ARNs) and AWS
|
718
|
-
# Service Namespaces]
|
719
|
-
# the AWS General Reference.
|
718
|
+
# Service Namespaces][1] in the AWS General Reference.
|
720
719
|
#
|
721
720
|
# <note markdown="1"> The characters in this parameter count towards the 2048 character
|
722
721
|
# session policy guideline. However, an AWS conversion compresses the
|
@@ -734,11 +733,12 @@ module Aws::STS
|
|
734
733
|
# access resources in the account that owns the role. You cannot use
|
735
734
|
# session policies to grant more permissions than those allowed by the
|
736
735
|
# identity-based policy of the role that is being assumed. For more
|
737
|
-
# information, see [Session Policies][
|
736
|
+
# information, see [Session Policies][2] in the *IAM User Guide*.
|
738
737
|
#
|
739
738
|
#
|
740
739
|
#
|
741
|
-
# [1]: https://docs.aws.amazon.com/
|
740
|
+
# [1]: https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html
|
741
|
+
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
|
742
742
|
#
|
743
743
|
# @option params [String] :policy
|
744
744
|
# An IAM policy in JSON format that you want to use as an inline session
|
@@ -1019,8 +1019,7 @@ module Aws::STS
|
|
1019
1019
|
# ARNs. However, the plain text that you use for both inline and managed
|
1020
1020
|
# session policies shouldn't exceed 2048 characters. For more
|
1021
1021
|
# information about ARNs, see [Amazon Resource Names (ARNs) and AWS
|
1022
|
-
# Service Namespaces]
|
1023
|
-
# the AWS General Reference.
|
1022
|
+
# Service Namespaces][1] in the AWS General Reference.
|
1024
1023
|
#
|
1025
1024
|
# <note markdown="1"> The characters in this parameter count towards the 2048 character
|
1026
1025
|
# session policy guideline. However, an AWS conversion compresses the
|
@@ -1038,11 +1037,12 @@ module Aws::STS
|
|
1038
1037
|
# access resources in the account that owns the role. You cannot use
|
1039
1038
|
# session policies to grant more permissions than those allowed by the
|
1040
1039
|
# identity-based policy of the role that is being assumed. For more
|
1041
|
-
# information, see [Session Policies][
|
1040
|
+
# information, see [Session Policies][2] in the *IAM User Guide*.
|
1042
1041
|
#
|
1043
1042
|
#
|
1044
1043
|
#
|
1045
|
-
# [1]: https://docs.aws.amazon.com/
|
1044
|
+
# [1]: https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html
|
1045
|
+
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
|
1046
1046
|
#
|
1047
1047
|
# @option params [String] :policy
|
1048
1048
|
# An IAM policy in JSON format that you want to use as an inline session
|
@@ -1263,8 +1263,82 @@ module Aws::STS
|
|
1263
1263
|
req.send_request(options)
|
1264
1264
|
end
|
1265
1265
|
|
1266
|
-
# Returns
|
1267
|
-
#
|
1266
|
+
# Returns the account identifier for the specified access key ID.
|
1267
|
+
#
|
1268
|
+
# Access keys consist of two parts: an access key ID (for example,
|
1269
|
+
# `AKIAIOSFODNN7EXAMPLE`) and a secret access key (for example,
|
1270
|
+
# `wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY`). For more information
|
1271
|
+
# about access keys, see [Managing Access Keys for IAM Users][1] in the
|
1272
|
+
# *IAM User Guide*.
|
1273
|
+
#
|
1274
|
+
# When you pass an access key ID to this operation, it returns the ID of
|
1275
|
+
# the AWS account to which the keys belong. Access key IDs beginning
|
1276
|
+
# with `AKIA` are long-term credentials for an IAM user or the AWS
|
1277
|
+
# account root user. Access key IDs beginning with `ASIA` are temporary
|
1278
|
+
# credentials that are created using STS operations. If the account in
|
1279
|
+
# the response belongs to you, you can sign in as the root user and
|
1280
|
+
# review your root user access keys. Then, you can pull a [credentials
|
1281
|
+
# report][2] to learn which IAM user owns the keys. To learn who
|
1282
|
+
# requested the temporary credentials for an `ASIA` access key, view the
|
1283
|
+
# STS events in your [CloudTrail logs][3].
|
1284
|
+
#
|
1285
|
+
# This operation does not indicate the state of the access key. The key
|
1286
|
+
# might be active, inactive, or deleted. Active keys might not have
|
1287
|
+
# permissions to perform an operation. Providing a deleted access key
|
1288
|
+
# might return an error that the key doesn't exist.
|
1289
|
+
#
|
1290
|
+
#
|
1291
|
+
#
|
1292
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_access-keys.html
|
1293
|
+
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_getting-report.html
|
1294
|
+
# [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/cloudtrail-integration.html
|
1295
|
+
#
|
1296
|
+
# @option params [required, String] :access_key_id
|
1297
|
+
# The identifier of an access key.
|
1298
|
+
#
|
1299
|
+
# This parameter allows (through its regex pattern) a string of
|
1300
|
+
# characters that can consist of any upper- or lowercased letter or
|
1301
|
+
# digit.
|
1302
|
+
#
|
1303
|
+
# @return [Types::GetAccessKeyInfoResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
1304
|
+
#
|
1305
|
+
# * {Types::GetAccessKeyInfoResponse#account #account} => String
|
1306
|
+
#
|
1307
|
+
# @example Request syntax with placeholder values
|
1308
|
+
#
|
1309
|
+
# resp = client.get_access_key_info({
|
1310
|
+
# access_key_id: "accessKeyIdType", # required
|
1311
|
+
# })
|
1312
|
+
#
|
1313
|
+
# @example Response structure
|
1314
|
+
#
|
1315
|
+
# resp.account #=> String
|
1316
|
+
#
|
1317
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/sts-2011-06-15/GetAccessKeyInfo AWS API Documentation
|
1318
|
+
#
|
1319
|
+
# @overload get_access_key_info(params = {})
|
1320
|
+
# @param [Hash] params ({})
|
1321
|
+
def get_access_key_info(params = {}, options = {})
|
1322
|
+
req = build_request(:get_access_key_info, params)
|
1323
|
+
req.send_request(options)
|
1324
|
+
end
|
1325
|
+
|
1326
|
+
# Returns details about the IAM user or role whose credentials are used
|
1327
|
+
# to call the operation.
|
1328
|
+
#
|
1329
|
+
# <note markdown="1"> No permissions are required to perform this operation. If an
|
1330
|
+
# administrator adds a policy to your IAM user or role that explicitly
|
1331
|
+
# denies access to the `sts:GetCallerIdentity` action, you can still
|
1332
|
+
# perform this operation. Permissions are not required because the same
|
1333
|
+
# information is returned when an IAM user or role is denied access. To
|
1334
|
+
# view an example response, see [I Am Not Authorized to Perform:
|
1335
|
+
# iam:DeleteVirtualMFADevice][1].
|
1336
|
+
#
|
1337
|
+
# </note>
|
1338
|
+
#
|
1339
|
+
#
|
1340
|
+
#
|
1341
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/troubleshoot_general.html#troubleshoot_general_access-denied-delete-mfa
|
1268
1342
|
#
|
1269
1343
|
# @return [Types::GetCallerIdentityResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
1270
1344
|
#
|
@@ -1478,8 +1552,7 @@ module Aws::STS
|
|
1478
1552
|
# both inline and managed session policies shouldn't exceed 2048
|
1479
1553
|
# characters. You can provide up to 10 managed policy ARNs. For more
|
1480
1554
|
# information about ARNs, see [Amazon Resource Names (ARNs) and AWS
|
1481
|
-
# Service Namespaces]
|
1482
|
-
# the AWS General Reference.
|
1555
|
+
# Service Namespaces][2] in the AWS General Reference.
|
1483
1556
|
#
|
1484
1557
|
# This parameter is optional. However, if you do not pass any session
|
1485
1558
|
# policies, then the resulting federated user session has no
|
@@ -1508,6 +1581,7 @@ module Aws::STS
|
|
1508
1581
|
#
|
1509
1582
|
#
|
1510
1583
|
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
|
1584
|
+
# [2]: https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html
|
1511
1585
|
#
|
1512
1586
|
# @option params [Integer] :duration_seconds
|
1513
1587
|
# The duration, in seconds, that the session should last. Acceptable
|
@@ -1734,7 +1808,7 @@ module Aws::STS
|
|
1734
1808
|
params: params,
|
1735
1809
|
config: config)
|
1736
1810
|
context[:gem_name] = 'aws-sdk-core'
|
1737
|
-
context[:gem_version] = '3.
|
1811
|
+
context[:gem_version] = '3.62.0'
|
1738
1812
|
Seahorse::Client::Request.new(handlers, context)
|
1739
1813
|
end
|
1740
1814
|
|
@@ -24,6 +24,8 @@ module Aws::STS
|
|
24
24
|
DecodeAuthorizationMessageResponse = Shapes::StructureShape.new(name: 'DecodeAuthorizationMessageResponse')
|
25
25
|
ExpiredTokenException = Shapes::StructureShape.new(name: 'ExpiredTokenException')
|
26
26
|
FederatedUser = Shapes::StructureShape.new(name: 'FederatedUser')
|
27
|
+
GetAccessKeyInfoRequest = Shapes::StructureShape.new(name: 'GetAccessKeyInfoRequest')
|
28
|
+
GetAccessKeyInfoResponse = Shapes::StructureShape.new(name: 'GetAccessKeyInfoResponse')
|
27
29
|
GetCallerIdentityRequest = Shapes::StructureShape.new(name: 'GetCallerIdentityRequest')
|
28
30
|
GetCallerIdentityResponse = Shapes::StructureShape.new(name: 'GetCallerIdentityResponse')
|
29
31
|
GetFederationTokenRequest = Shapes::StructureShape.new(name: 'GetFederationTokenRequest')
|
@@ -149,6 +151,12 @@ module Aws::STS
|
|
149
151
|
FederatedUser.add_member(:arn, Shapes::ShapeRef.new(shape: arnType, required: true, location_name: "Arn"))
|
150
152
|
FederatedUser.struct_class = Types::FederatedUser
|
151
153
|
|
154
|
+
GetAccessKeyInfoRequest.add_member(:access_key_id, Shapes::ShapeRef.new(shape: accessKeyIdType, required: true, location_name: "AccessKeyId"))
|
155
|
+
GetAccessKeyInfoRequest.struct_class = Types::GetAccessKeyInfoRequest
|
156
|
+
|
157
|
+
GetAccessKeyInfoResponse.add_member(:account, Shapes::ShapeRef.new(shape: accountType, location_name: "Account"))
|
158
|
+
GetAccessKeyInfoResponse.struct_class = Types::GetAccessKeyInfoResponse
|
159
|
+
|
152
160
|
GetCallerIdentityRequest.struct_class = Types::GetCallerIdentityRequest
|
153
161
|
|
154
162
|
GetCallerIdentityResponse.add_member(:user_id, Shapes::ShapeRef.new(shape: userIdType, location_name: "UserId"))
|
@@ -271,6 +279,14 @@ module Aws::STS
|
|
271
279
|
o.errors << Shapes::ShapeRef.new(shape: InvalidAuthorizationMessageException)
|
272
280
|
end)
|
273
281
|
|
282
|
+
api.add_operation(:get_access_key_info, Seahorse::Model::Operation.new.tap do |o|
|
283
|
+
o.name = "GetAccessKeyInfo"
|
284
|
+
o.http_method = "POST"
|
285
|
+
o.http_request_uri = "/"
|
286
|
+
o.input = Shapes::ShapeRef.new(shape: GetAccessKeyInfoRequest)
|
287
|
+
o.output = Shapes::ShapeRef.new(shape: GetAccessKeyInfoResponse)
|
288
|
+
end)
|
289
|
+
|
274
290
|
api.add_operation(:get_caller_identity, Seahorse::Model::Operation.new.tap do |o|
|
275
291
|
o.name = "GetCallerIdentity"
|
276
292
|
o.http_method = "POST"
|
data/lib/aws-sdk-sts/types.rb
CHANGED
@@ -57,8 +57,7 @@ module Aws::STS
|
|
57
57
|
# ARNs. However, the plain text that you use for both inline and
|
58
58
|
# managed session policies shouldn't exceed 2048 characters. For more
|
59
59
|
# information about ARNs, see [Amazon Resource Names (ARNs) and AWS
|
60
|
-
# Service Namespaces]
|
61
|
-
# in the AWS General Reference.
|
60
|
+
# Service Namespaces][1] in the AWS General Reference.
|
62
61
|
#
|
63
62
|
# <note markdown="1"> The characters in this parameter count towards the 2048 character
|
64
63
|
# session policy guideline. However, an AWS conversion compresses the
|
@@ -77,11 +76,12 @@ module Aws::STS
|
|
77
76
|
# owns the role. You cannot use session policies to grant more
|
78
77
|
# permissions than those allowed by the identity-based policy of the
|
79
78
|
# role that is being assumed. For more information, see [Session
|
80
|
-
# Policies][
|
79
|
+
# Policies][2] in the *IAM User Guide*.
|
81
80
|
#
|
82
81
|
#
|
83
82
|
#
|
84
|
-
# [1]: https://docs.aws.amazon.com/
|
83
|
+
# [1]: https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html
|
84
|
+
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
|
85
85
|
# @return [Array<Types::PolicyDescriptorType>]
|
86
86
|
#
|
87
87
|
# @!attribute [rw] policy
|
@@ -297,8 +297,7 @@ module Aws::STS
|
|
297
297
|
# ARNs. However, the plain text that you use for both inline and
|
298
298
|
# managed session policies shouldn't exceed 2048 characters. For more
|
299
299
|
# information about ARNs, see [Amazon Resource Names (ARNs) and AWS
|
300
|
-
# Service Namespaces]
|
301
|
-
# in the AWS General Reference.
|
300
|
+
# Service Namespaces][1] in the AWS General Reference.
|
302
301
|
#
|
303
302
|
# <note markdown="1"> The characters in this parameter count towards the 2048 character
|
304
303
|
# session policy guideline. However, an AWS conversion compresses the
|
@@ -317,11 +316,12 @@ module Aws::STS
|
|
317
316
|
# owns the role. You cannot use session policies to grant more
|
318
317
|
# permissions than those allowed by the identity-based policy of the
|
319
318
|
# role that is being assumed. For more information, see [Session
|
320
|
-
# Policies][
|
319
|
+
# Policies][2] in the *IAM User Guide*.
|
321
320
|
#
|
322
321
|
#
|
323
322
|
#
|
324
|
-
# [1]: https://docs.aws.amazon.com/
|
323
|
+
# [1]: https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html
|
324
|
+
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
|
325
325
|
# @return [Array<Types::PolicyDescriptorType>]
|
326
326
|
#
|
327
327
|
# @!attribute [rw] policy
|
@@ -548,8 +548,7 @@ module Aws::STS
|
|
548
548
|
# ARNs. However, the plain text that you use for both inline and
|
549
549
|
# managed session policies shouldn't exceed 2048 characters. For more
|
550
550
|
# information about ARNs, see [Amazon Resource Names (ARNs) and AWS
|
551
|
-
# Service Namespaces]
|
552
|
-
# in the AWS General Reference.
|
551
|
+
# Service Namespaces][1] in the AWS General Reference.
|
553
552
|
#
|
554
553
|
# <note markdown="1"> The characters in this parameter count towards the 2048 character
|
555
554
|
# session policy guideline. However, an AWS conversion compresses the
|
@@ -568,11 +567,12 @@ module Aws::STS
|
|
568
567
|
# owns the role. You cannot use session policies to grant more
|
569
568
|
# permissions than those allowed by the identity-based policy of the
|
570
569
|
# role that is being assumed. For more information, see [Session
|
571
|
-
# Policies][
|
570
|
+
# Policies][2] in the *IAM User Guide*.
|
572
571
|
#
|
573
572
|
#
|
574
573
|
#
|
575
|
-
# [1]: https://docs.aws.amazon.com/
|
574
|
+
# [1]: https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html
|
575
|
+
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
|
576
576
|
# @return [Array<Types::PolicyDescriptorType>]
|
577
577
|
#
|
578
578
|
# @!attribute [rw] policy
|
@@ -848,6 +848,39 @@ module Aws::STS
|
|
848
848
|
include Aws::Structure
|
849
849
|
end
|
850
850
|
|
851
|
+
# @note When making an API call, you may pass GetAccessKeyInfoRequest
|
852
|
+
# data as a hash:
|
853
|
+
#
|
854
|
+
# {
|
855
|
+
# access_key_id: "accessKeyIdType", # required
|
856
|
+
# }
|
857
|
+
#
|
858
|
+
# @!attribute [rw] access_key_id
|
859
|
+
# The identifier of an access key.
|
860
|
+
#
|
861
|
+
# This parameter allows (through its regex pattern) a string of
|
862
|
+
# characters that can consist of any upper- or lowercased letter or
|
863
|
+
# digit.
|
864
|
+
# @return [String]
|
865
|
+
#
|
866
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/sts-2011-06-15/GetAccessKeyInfoRequest AWS API Documentation
|
867
|
+
#
|
868
|
+
class GetAccessKeyInfoRequest < Struct.new(
|
869
|
+
:access_key_id)
|
870
|
+
include Aws::Structure
|
871
|
+
end
|
872
|
+
|
873
|
+
# @!attribute [rw] account
|
874
|
+
# The number used to identify the AWS account.
|
875
|
+
# @return [String]
|
876
|
+
#
|
877
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/sts-2011-06-15/GetAccessKeyInfoResponse AWS API Documentation
|
878
|
+
#
|
879
|
+
class GetAccessKeyInfoResponse < Struct.new(
|
880
|
+
:account)
|
881
|
+
include Aws::Structure
|
882
|
+
end
|
883
|
+
|
851
884
|
# @api private
|
852
885
|
#
|
853
886
|
# @see http://docs.aws.amazon.com/goto/WebAPI/sts-2011-06-15/GetCallerIdentityRequest AWS API Documentation
|
@@ -971,9 +1004,7 @@ module Aws::STS
|
|
971
1004
|
# use for both inline and managed session policies shouldn't exceed
|
972
1005
|
# 2048 characters. You can provide up to 10 managed policy ARNs. For
|
973
1006
|
# more information about ARNs, see [Amazon Resource Names (ARNs) and
|
974
|
-
# AWS Service
|
975
|
-
# Namespaces](general/latest/gr/aws-arns-and-namespaces.html) in the
|
976
|
-
# AWS General Reference.
|
1007
|
+
# AWS Service Namespaces][2] in the AWS General Reference.
|
977
1008
|
#
|
978
1009
|
# This parameter is optional. However, if you do not pass any session
|
979
1010
|
# policies, then the resulting federated user session has no
|
@@ -1002,6 +1033,7 @@ module Aws::STS
|
|
1002
1033
|
#
|
1003
1034
|
#
|
1004
1035
|
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
|
1036
|
+
# [2]: https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html
|
1005
1037
|
# @return [Array<Types::PolicyDescriptorType>]
|
1006
1038
|
#
|
1007
1039
|
# @!attribute [rw] duration_seconds
|
@@ -1241,9 +1273,12 @@ module Aws::STS
|
|
1241
1273
|
# @!attribute [rw] arn
|
1242
1274
|
# The Amazon Resource Name (ARN) of the IAM managed policy to use as a
|
1243
1275
|
# session policy for the role. For more information about ARNs, see
|
1244
|
-
# [Amazon Resource Names (ARNs) and AWS Service
|
1245
|
-
# Namespaces](general/latest/gr/aws-arns-and-namespaces.html) in the
|
1276
|
+
# [Amazon Resource Names (ARNs) and AWS Service Namespaces][1] in the
|
1246
1277
|
# *AWS General Reference*.
|
1278
|
+
#
|
1279
|
+
#
|
1280
|
+
#
|
1281
|
+
# [1]: https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html
|
1247
1282
|
# @return [String]
|
1248
1283
|
#
|
1249
1284
|
# @see http://docs.aws.amazon.com/goto/WebAPI/sts-2011-06-15/PolicyDescriptorType AWS API Documentation
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: aws-sdk-core
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 3.
|
4
|
+
version: 3.62.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Amazon Web Services
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2019-
|
11
|
+
date: 2019-08-02 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: jmespath
|