aws-sdk-core 3.59.0 → 3.62.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA1:
3
- metadata.gz: 579cb3497825b8f9c6790623cd575f06ce4940ad
4
- data.tar.gz: 2ea15b90b05c25240b8019b06d1919ec81f2049f
3
+ metadata.gz: 2b811af0a0b6f98eff0ac41814b2bf3fa42a01f2
4
+ data.tar.gz: e0048beaf3b680698a72a26f25fa36d8e6ff67d8
5
5
  SHA512:
6
- metadata.gz: 3653dca88c0d609fa823b2d449781fc00c3be689677c1826840afc6c8064dc0511f5bcf8f37926fe3daebbd427a164d06e22b590d2c3f381fabb6e25891b8a7c
7
- data.tar.gz: 8184138201557e240a01028e515f73943e2e226a9c1f982ecac09d906e592abfb25f57cc6e8e0a970f3427052879fd74574724e516e6f724b1fe4586013a0438
6
+ metadata.gz: f2a3dfce2817aff05eb3e3e4204cde255458a8ea15ea349b7329779e22341e12162f00b5f46dc3c9273a7a7ab755cfd82b367899de5d79a517b1d2d15672f5f1
7
+ data.tar.gz: 23e4d29427d6b99f40ed78f874761056ed8855ee79d629798d17e163b7bd0f602bab422103171c5774c55465f360f67e31510a5ed9fc4a05fbce2c18fc94f72f
data/VERSION CHANGED
@@ -1 +1 @@
1
- 3.59.0
1
+ 3.62.0
@@ -52,7 +52,7 @@ module Aws
52
52
  # not provided, generate encoded UUID as session name
53
53
  @assume_role_web_identity_params[:role_session_name] = _session_name
54
54
  end
55
- @client = client_opts[:client] || STS::Client.new(client_opts)
55
+ @client = client_opts[:client] || STS::Client.new(client_opts.merge(credentials: false))
56
56
  super
57
57
  end
58
58
 
@@ -100,8 +100,8 @@ module Aws
100
100
  end
101
101
 
102
102
  def assume_role_web_identity_credentials(options)
103
- if role_arn = ENV['AWS_ROLE_ARN'] &&
104
- token_file = ENV['AWS_WEB_IDENTITY_TOKEN_FILE']
103
+ if (role_arn = ENV['AWS_ROLE_ARN']) &&
104
+ (token_file = ENV['AWS_WEB_IDENTITY_TOKEN_FILE'])
105
105
  AssumeRoleWebIdentityCredentials.new(
106
106
  role_arn: role_arn,
107
107
  web_identity_token_file: token_file,
@@ -23,7 +23,7 @@ module Aws
23
23
 
24
24
  def load(json)
25
25
  ENGINE.load(json, *ENGINE_LOAD_OPTIONS)
26
- rescue ENGINE_ERROR => e
26
+ rescue *ENGINE_ERRORS => e
27
27
  raise ParseError.new(e)
28
28
  end
29
29
 
@@ -45,21 +45,21 @@ module Aws
45
45
  end
46
46
 
47
47
  def json_engine
48
- [JSON, [], [], JSON::ParserError]
48
+ [JSON, [], [], [JSON::ParserError]]
49
49
  end
50
50
 
51
51
  def oj_parse_error
52
52
  if Oj.const_defined?('ParseError')
53
- Oj::ParseError
53
+ [Oj::ParseError, EncodingError]
54
54
  else
55
- SyntaxError
55
+ [SyntaxError]
56
56
  end
57
57
  end
58
58
 
59
59
  end
60
60
 
61
61
  # @api private
62
- ENGINE, ENGINE_LOAD_OPTIONS, ENGINE_DUMP_OPTIONS, ENGINE_ERROR =
62
+ ENGINE, ENGINE_LOAD_OPTIONS, ENGINE_DUMP_OPTIONS, ENGINE_ERRORS =
63
63
  oj_engine || json_engine
64
64
 
65
65
  end
@@ -11,7 +11,7 @@ module Aws
11
11
  #
12
12
  # @api private
13
13
  # begin
14
- SENSITIVE = [:access_token, :account_name, :account_password, :address, :admin_contact, :admin_password, :artifact_credentials, :auth_code, :authentication_token, :authorization_result, :backup_plan_tags, :backup_vault_tags, :base_32_string_seed, :body, :bot_configuration, :bot_email, :cause, :client_id, :client_secret, :comment, :configuration, :copy_source_sse_customer_key, :credentials, :current_password, :custom_attributes, :db_password, :default_phone_number, :definition, :description, :display_name, :e164_phone_number, :email, :email_address, :email_message, :embed_url, :error, :feedback_token, :file, :first_name, :id, :id_token, :input, :input_text, :key_id, :key_store_password, :kms_key_id, :kms_master_key_id, :lambda_function_arn, :last_name, :local_console_password, :master_account_email, :master_user_password, :message, :name, :new_password, :next_password, :notes, :number, :old_password, :outbound_events_https_endpoint, :output, :owner_information, :parameters, :passphrase, :password, :payload, :phone_number, :plaintext, :previous_password, :primary_email, :primary_provisioned_number, :private_key, :proposed_password, :public_key, :qr_code_png, :query, :recovery_point_tags, :refresh_token, :registrant_contact, :request_attributes, :search_query, :secret_access_key, :secret_binary, :secret_code, :secret_hash, :secret_string, :secret_to_authenticate_initiator, :secret_to_authenticate_target, :security_token, :service_password, :session_attributes, :share_notes, :shared_secret, :slots, :sse_customer_key, :ssekms_encryption_context, :ssekms_key_id, :status_message, :tag_key_list, :tags, :task_parameters, :tech_contact, :temporary_password, :text, :token, :trust_password, :type, :upload_credentials, :upload_url, :uri, :user_email, :user_name, :username, :value, :values, :variables, :zip_file]
14
+ SENSITIVE = [:access_token, :account_name, :account_password, :address, :admin_contact, :admin_password, :artifact_credentials, :auth_code, :authentication_token, :authorization_result, :backup_plan_tags, :backup_vault_tags, :base_32_string_seed, :body, :bot_configuration, :bot_email, :cause, :client_id, :client_secret, :comment, :configuration, :copy_source_sse_customer_key, :credentials, :current_password, :custom_attributes, :db_password, :default_phone_number, :definition, :description, :display_name, :e164_phone_number, :email, :email_address, :email_message, :embed_url, :error, :feedback_token, :file, :first_name, :id, :id_token, :input, :input_text, :key_id, :key_store_password, :kms_key_id, :kms_master_key_id, :lambda_function_arn, :last_name, :local_console_password, :master_account_email, :master_user_password, :message, :name, :new_password, :next_password, :notes, :number, :old_password, :outbound_events_https_endpoint, :output, :owner_information, :parameters, :passphrase, :password, :payload, :phone_number, :plaintext, :previous_password, :primary_email, :primary_provisioned_number, :private_key, :proposed_password, :public_key, :qr_code_png, :query, :random_password, :recovery_point_tags, :refresh_token, :registrant_contact, :request_attributes, :search_query, :secret_access_key, :secret_binary, :secret_code, :secret_hash, :secret_string, :secret_to_authenticate_initiator, :secret_to_authenticate_target, :security_token, :service_password, :session_attributes, :share_notes, :shared_secret, :slots, :sse_customer_key, :ssekms_encryption_context, :ssekms_key_id, :status_message, :tag_key_list, :tags, :task_parameters, :tech_contact, :temporary_password, :text, :token, :trust_password, :type, :upload_credentials, :upload_url, :uri, :user_email, :user_name, :username, :value, :values, :variables, :zip_file]
15
15
  # end
16
16
 
17
17
  def initialize(options = {})
@@ -72,6 +72,7 @@ A delay randomiser function used by the default backoff function. Some predefine
72
72
  'UnrecognizedClientException', # json services
73
73
  'InvalidAccessKeyId', # s3
74
74
  'AuthFailure', # ec2
75
+ 'InvalidIdentityToken', # sts
75
76
  ])
76
77
 
77
78
  THROTTLING_ERRORS = Set.new([
@@ -117,6 +118,7 @@ A delay randomiser function used by the default backoff function. Some predefine
117
118
 
118
119
  def networking?
119
120
  @error.is_a?(Seahorse::Client::NetworkingError) ||
121
+ @error.is_a?(Errors::NoSuchEndpointError) ||
120
122
  NETWORKING_ERRORS.include?(@name)
121
123
  end
122
124
 
@@ -40,6 +40,6 @@ require_relative 'aws-sdk-sts/customizations'
40
40
  # @service
41
41
  module Aws::STS
42
42
 
43
- GEM_VERSION = '3.59.0'
43
+ GEM_VERSION = '3.62.0'
44
44
 
45
45
  end
@@ -395,8 +395,7 @@ module Aws::STS
395
395
  # ARNs. However, the plain text that you use for both inline and managed
396
396
  # session policies shouldn't exceed 2048 characters. For more
397
397
  # information about ARNs, see [Amazon Resource Names (ARNs) and AWS
398
- # Service Namespaces](general/latest/gr/aws-arns-and-namespaces.html) in
399
- # the AWS General Reference.
398
+ # Service Namespaces][1] in the AWS General Reference.
400
399
  #
401
400
  # <note markdown="1"> The characters in this parameter count towards the 2048 character
402
401
  # session policy guideline. However, an AWS conversion compresses the
@@ -414,11 +413,12 @@ module Aws::STS
414
413
  # access resources in the account that owns the role. You cannot use
415
414
  # session policies to grant more permissions than those allowed by the
416
415
  # identity-based policy of the role that is being assumed. For more
417
- # information, see [Session Policies][1] in the *IAM User Guide*.
416
+ # information, see [Session Policies][2] in the *IAM User Guide*.
418
417
  #
419
418
  #
420
419
  #
421
- # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
420
+ # [1]: https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html
421
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
422
422
  #
423
423
  # @option params [String] :policy
424
424
  # An IAM policy in JSON format that you want to use as an inline session
@@ -715,8 +715,7 @@ module Aws::STS
715
715
  # ARNs. However, the plain text that you use for both inline and managed
716
716
  # session policies shouldn't exceed 2048 characters. For more
717
717
  # information about ARNs, see [Amazon Resource Names (ARNs) and AWS
718
- # Service Namespaces](general/latest/gr/aws-arns-and-namespaces.html) in
719
- # the AWS General Reference.
718
+ # Service Namespaces][1] in the AWS General Reference.
720
719
  #
721
720
  # <note markdown="1"> The characters in this parameter count towards the 2048 character
722
721
  # session policy guideline. However, an AWS conversion compresses the
@@ -734,11 +733,12 @@ module Aws::STS
734
733
  # access resources in the account that owns the role. You cannot use
735
734
  # session policies to grant more permissions than those allowed by the
736
735
  # identity-based policy of the role that is being assumed. For more
737
- # information, see [Session Policies][1] in the *IAM User Guide*.
736
+ # information, see [Session Policies][2] in the *IAM User Guide*.
738
737
  #
739
738
  #
740
739
  #
741
- # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
740
+ # [1]: https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html
741
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
742
742
  #
743
743
  # @option params [String] :policy
744
744
  # An IAM policy in JSON format that you want to use as an inline session
@@ -1019,8 +1019,7 @@ module Aws::STS
1019
1019
  # ARNs. However, the plain text that you use for both inline and managed
1020
1020
  # session policies shouldn't exceed 2048 characters. For more
1021
1021
  # information about ARNs, see [Amazon Resource Names (ARNs) and AWS
1022
- # Service Namespaces](general/latest/gr/aws-arns-and-namespaces.html) in
1023
- # the AWS General Reference.
1022
+ # Service Namespaces][1] in the AWS General Reference.
1024
1023
  #
1025
1024
  # <note markdown="1"> The characters in this parameter count towards the 2048 character
1026
1025
  # session policy guideline. However, an AWS conversion compresses the
@@ -1038,11 +1037,12 @@ module Aws::STS
1038
1037
  # access resources in the account that owns the role. You cannot use
1039
1038
  # session policies to grant more permissions than those allowed by the
1040
1039
  # identity-based policy of the role that is being assumed. For more
1041
- # information, see [Session Policies][1] in the *IAM User Guide*.
1040
+ # information, see [Session Policies][2] in the *IAM User Guide*.
1042
1041
  #
1043
1042
  #
1044
1043
  #
1045
- # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
1044
+ # [1]: https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html
1045
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
1046
1046
  #
1047
1047
  # @option params [String] :policy
1048
1048
  # An IAM policy in JSON format that you want to use as an inline session
@@ -1263,8 +1263,82 @@ module Aws::STS
1263
1263
  req.send_request(options)
1264
1264
  end
1265
1265
 
1266
- # Returns details about the IAM identity whose credentials are used to
1267
- # call the API.
1266
+ # Returns the account identifier for the specified access key ID.
1267
+ #
1268
+ # Access keys consist of two parts: an access key ID (for example,
1269
+ # `AKIAIOSFODNN7EXAMPLE`) and a secret access key (for example,
1270
+ # `wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY`). For more information
1271
+ # about access keys, see [Managing Access Keys for IAM Users][1] in the
1272
+ # *IAM User Guide*.
1273
+ #
1274
+ # When you pass an access key ID to this operation, it returns the ID of
1275
+ # the AWS account to which the keys belong. Access key IDs beginning
1276
+ # with `AKIA` are long-term credentials for an IAM user or the AWS
1277
+ # account root user. Access key IDs beginning with `ASIA` are temporary
1278
+ # credentials that are created using STS operations. If the account in
1279
+ # the response belongs to you, you can sign in as the root user and
1280
+ # review your root user access keys. Then, you can pull a [credentials
1281
+ # report][2] to learn which IAM user owns the keys. To learn who
1282
+ # requested the temporary credentials for an `ASIA` access key, view the
1283
+ # STS events in your [CloudTrail logs][3].
1284
+ #
1285
+ # This operation does not indicate the state of the access key. The key
1286
+ # might be active, inactive, or deleted. Active keys might not have
1287
+ # permissions to perform an operation. Providing a deleted access key
1288
+ # might return an error that the key doesn't exist.
1289
+ #
1290
+ #
1291
+ #
1292
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_access-keys.html
1293
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_getting-report.html
1294
+ # [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/cloudtrail-integration.html
1295
+ #
1296
+ # @option params [required, String] :access_key_id
1297
+ # The identifier of an access key.
1298
+ #
1299
+ # This parameter allows (through its regex pattern) a string of
1300
+ # characters that can consist of any upper- or lowercased letter or
1301
+ # digit.
1302
+ #
1303
+ # @return [Types::GetAccessKeyInfoResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
1304
+ #
1305
+ # * {Types::GetAccessKeyInfoResponse#account #account} => String
1306
+ #
1307
+ # @example Request syntax with placeholder values
1308
+ #
1309
+ # resp = client.get_access_key_info({
1310
+ # access_key_id: "accessKeyIdType", # required
1311
+ # })
1312
+ #
1313
+ # @example Response structure
1314
+ #
1315
+ # resp.account #=> String
1316
+ #
1317
+ # @see http://docs.aws.amazon.com/goto/WebAPI/sts-2011-06-15/GetAccessKeyInfo AWS API Documentation
1318
+ #
1319
+ # @overload get_access_key_info(params = {})
1320
+ # @param [Hash] params ({})
1321
+ def get_access_key_info(params = {}, options = {})
1322
+ req = build_request(:get_access_key_info, params)
1323
+ req.send_request(options)
1324
+ end
1325
+
1326
+ # Returns details about the IAM user or role whose credentials are used
1327
+ # to call the operation.
1328
+ #
1329
+ # <note markdown="1"> No permissions are required to perform this operation. If an
1330
+ # administrator adds a policy to your IAM user or role that explicitly
1331
+ # denies access to the `sts:GetCallerIdentity` action, you can still
1332
+ # perform this operation. Permissions are not required because the same
1333
+ # information is returned when an IAM user or role is denied access. To
1334
+ # view an example response, see [I Am Not Authorized to Perform:
1335
+ # iam:DeleteVirtualMFADevice][1].
1336
+ #
1337
+ # </note>
1338
+ #
1339
+ #
1340
+ #
1341
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/troubleshoot_general.html#troubleshoot_general_access-denied-delete-mfa
1268
1342
  #
1269
1343
  # @return [Types::GetCallerIdentityResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
1270
1344
  #
@@ -1478,8 +1552,7 @@ module Aws::STS
1478
1552
  # both inline and managed session policies shouldn't exceed 2048
1479
1553
  # characters. You can provide up to 10 managed policy ARNs. For more
1480
1554
  # information about ARNs, see [Amazon Resource Names (ARNs) and AWS
1481
- # Service Namespaces](general/latest/gr/aws-arns-and-namespaces.html) in
1482
- # the AWS General Reference.
1555
+ # Service Namespaces][2] in the AWS General Reference.
1483
1556
  #
1484
1557
  # This parameter is optional. However, if you do not pass any session
1485
1558
  # policies, then the resulting federated user session has no
@@ -1508,6 +1581,7 @@ module Aws::STS
1508
1581
  #
1509
1582
  #
1510
1583
  # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
1584
+ # [2]: https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html
1511
1585
  #
1512
1586
  # @option params [Integer] :duration_seconds
1513
1587
  # The duration, in seconds, that the session should last. Acceptable
@@ -1734,7 +1808,7 @@ module Aws::STS
1734
1808
  params: params,
1735
1809
  config: config)
1736
1810
  context[:gem_name] = 'aws-sdk-core'
1737
- context[:gem_version] = '3.59.0'
1811
+ context[:gem_version] = '3.62.0'
1738
1812
  Seahorse::Client::Request.new(handlers, context)
1739
1813
  end
1740
1814
 
@@ -24,6 +24,8 @@ module Aws::STS
24
24
  DecodeAuthorizationMessageResponse = Shapes::StructureShape.new(name: 'DecodeAuthorizationMessageResponse')
25
25
  ExpiredTokenException = Shapes::StructureShape.new(name: 'ExpiredTokenException')
26
26
  FederatedUser = Shapes::StructureShape.new(name: 'FederatedUser')
27
+ GetAccessKeyInfoRequest = Shapes::StructureShape.new(name: 'GetAccessKeyInfoRequest')
28
+ GetAccessKeyInfoResponse = Shapes::StructureShape.new(name: 'GetAccessKeyInfoResponse')
27
29
  GetCallerIdentityRequest = Shapes::StructureShape.new(name: 'GetCallerIdentityRequest')
28
30
  GetCallerIdentityResponse = Shapes::StructureShape.new(name: 'GetCallerIdentityResponse')
29
31
  GetFederationTokenRequest = Shapes::StructureShape.new(name: 'GetFederationTokenRequest')
@@ -149,6 +151,12 @@ module Aws::STS
149
151
  FederatedUser.add_member(:arn, Shapes::ShapeRef.new(shape: arnType, required: true, location_name: "Arn"))
150
152
  FederatedUser.struct_class = Types::FederatedUser
151
153
 
154
+ GetAccessKeyInfoRequest.add_member(:access_key_id, Shapes::ShapeRef.new(shape: accessKeyIdType, required: true, location_name: "AccessKeyId"))
155
+ GetAccessKeyInfoRequest.struct_class = Types::GetAccessKeyInfoRequest
156
+
157
+ GetAccessKeyInfoResponse.add_member(:account, Shapes::ShapeRef.new(shape: accountType, location_name: "Account"))
158
+ GetAccessKeyInfoResponse.struct_class = Types::GetAccessKeyInfoResponse
159
+
152
160
  GetCallerIdentityRequest.struct_class = Types::GetCallerIdentityRequest
153
161
 
154
162
  GetCallerIdentityResponse.add_member(:user_id, Shapes::ShapeRef.new(shape: userIdType, location_name: "UserId"))
@@ -271,6 +279,14 @@ module Aws::STS
271
279
  o.errors << Shapes::ShapeRef.new(shape: InvalidAuthorizationMessageException)
272
280
  end)
273
281
 
282
+ api.add_operation(:get_access_key_info, Seahorse::Model::Operation.new.tap do |o|
283
+ o.name = "GetAccessKeyInfo"
284
+ o.http_method = "POST"
285
+ o.http_request_uri = "/"
286
+ o.input = Shapes::ShapeRef.new(shape: GetAccessKeyInfoRequest)
287
+ o.output = Shapes::ShapeRef.new(shape: GetAccessKeyInfoResponse)
288
+ end)
289
+
274
290
  api.add_operation(:get_caller_identity, Seahorse::Model::Operation.new.tap do |o|
275
291
  o.name = "GetCallerIdentity"
276
292
  o.http_method = "POST"
@@ -57,8 +57,7 @@ module Aws::STS
57
57
  # ARNs. However, the plain text that you use for both inline and
58
58
  # managed session policies shouldn't exceed 2048 characters. For more
59
59
  # information about ARNs, see [Amazon Resource Names (ARNs) and AWS
60
- # Service Namespaces](general/latest/gr/aws-arns-and-namespaces.html)
61
- # in the AWS General Reference.
60
+ # Service Namespaces][1] in the AWS General Reference.
62
61
  #
63
62
  # <note markdown="1"> The characters in this parameter count towards the 2048 character
64
63
  # session policy guideline. However, an AWS conversion compresses the
@@ -77,11 +76,12 @@ module Aws::STS
77
76
  # owns the role. You cannot use session policies to grant more
78
77
  # permissions than those allowed by the identity-based policy of the
79
78
  # role that is being assumed. For more information, see [Session
80
- # Policies][1] in the *IAM User Guide*.
79
+ # Policies][2] in the *IAM User Guide*.
81
80
  #
82
81
  #
83
82
  #
84
- # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
83
+ # [1]: https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html
84
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
85
85
  # @return [Array<Types::PolicyDescriptorType>]
86
86
  #
87
87
  # @!attribute [rw] policy
@@ -297,8 +297,7 @@ module Aws::STS
297
297
  # ARNs. However, the plain text that you use for both inline and
298
298
  # managed session policies shouldn't exceed 2048 characters. For more
299
299
  # information about ARNs, see [Amazon Resource Names (ARNs) and AWS
300
- # Service Namespaces](general/latest/gr/aws-arns-and-namespaces.html)
301
- # in the AWS General Reference.
300
+ # Service Namespaces][1] in the AWS General Reference.
302
301
  #
303
302
  # <note markdown="1"> The characters in this parameter count towards the 2048 character
304
303
  # session policy guideline. However, an AWS conversion compresses the
@@ -317,11 +316,12 @@ module Aws::STS
317
316
  # owns the role. You cannot use session policies to grant more
318
317
  # permissions than those allowed by the identity-based policy of the
319
318
  # role that is being assumed. For more information, see [Session
320
- # Policies][1] in the *IAM User Guide*.
319
+ # Policies][2] in the *IAM User Guide*.
321
320
  #
322
321
  #
323
322
  #
324
- # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
323
+ # [1]: https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html
324
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
325
325
  # @return [Array<Types::PolicyDescriptorType>]
326
326
  #
327
327
  # @!attribute [rw] policy
@@ -548,8 +548,7 @@ module Aws::STS
548
548
  # ARNs. However, the plain text that you use for both inline and
549
549
  # managed session policies shouldn't exceed 2048 characters. For more
550
550
  # information about ARNs, see [Amazon Resource Names (ARNs) and AWS
551
- # Service Namespaces](general/latest/gr/aws-arns-and-namespaces.html)
552
- # in the AWS General Reference.
551
+ # Service Namespaces][1] in the AWS General Reference.
553
552
  #
554
553
  # <note markdown="1"> The characters in this parameter count towards the 2048 character
555
554
  # session policy guideline. However, an AWS conversion compresses the
@@ -568,11 +567,12 @@ module Aws::STS
568
567
  # owns the role. You cannot use session policies to grant more
569
568
  # permissions than those allowed by the identity-based policy of the
570
569
  # role that is being assumed. For more information, see [Session
571
- # Policies][1] in the *IAM User Guide*.
570
+ # Policies][2] in the *IAM User Guide*.
572
571
  #
573
572
  #
574
573
  #
575
- # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
574
+ # [1]: https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html
575
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
576
576
  # @return [Array<Types::PolicyDescriptorType>]
577
577
  #
578
578
  # @!attribute [rw] policy
@@ -848,6 +848,39 @@ module Aws::STS
848
848
  include Aws::Structure
849
849
  end
850
850
 
851
+ # @note When making an API call, you may pass GetAccessKeyInfoRequest
852
+ # data as a hash:
853
+ #
854
+ # {
855
+ # access_key_id: "accessKeyIdType", # required
856
+ # }
857
+ #
858
+ # @!attribute [rw] access_key_id
859
+ # The identifier of an access key.
860
+ #
861
+ # This parameter allows (through its regex pattern) a string of
862
+ # characters that can consist of any upper- or lowercased letter or
863
+ # digit.
864
+ # @return [String]
865
+ #
866
+ # @see http://docs.aws.amazon.com/goto/WebAPI/sts-2011-06-15/GetAccessKeyInfoRequest AWS API Documentation
867
+ #
868
+ class GetAccessKeyInfoRequest < Struct.new(
869
+ :access_key_id)
870
+ include Aws::Structure
871
+ end
872
+
873
+ # @!attribute [rw] account
874
+ # The number used to identify the AWS account.
875
+ # @return [String]
876
+ #
877
+ # @see http://docs.aws.amazon.com/goto/WebAPI/sts-2011-06-15/GetAccessKeyInfoResponse AWS API Documentation
878
+ #
879
+ class GetAccessKeyInfoResponse < Struct.new(
880
+ :account)
881
+ include Aws::Structure
882
+ end
883
+
851
884
  # @api private
852
885
  #
853
886
  # @see http://docs.aws.amazon.com/goto/WebAPI/sts-2011-06-15/GetCallerIdentityRequest AWS API Documentation
@@ -971,9 +1004,7 @@ module Aws::STS
971
1004
  # use for both inline and managed session policies shouldn't exceed
972
1005
  # 2048 characters. You can provide up to 10 managed policy ARNs. For
973
1006
  # more information about ARNs, see [Amazon Resource Names (ARNs) and
974
- # AWS Service
975
- # Namespaces](general/latest/gr/aws-arns-and-namespaces.html) in the
976
- # AWS General Reference.
1007
+ # AWS Service Namespaces][2] in the AWS General Reference.
977
1008
  #
978
1009
  # This parameter is optional. However, if you do not pass any session
979
1010
  # policies, then the resulting federated user session has no
@@ -1002,6 +1033,7 @@ module Aws::STS
1002
1033
  #
1003
1034
  #
1004
1035
  # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
1036
+ # [2]: https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html
1005
1037
  # @return [Array<Types::PolicyDescriptorType>]
1006
1038
  #
1007
1039
  # @!attribute [rw] duration_seconds
@@ -1241,9 +1273,12 @@ module Aws::STS
1241
1273
  # @!attribute [rw] arn
1242
1274
  # The Amazon Resource Name (ARN) of the IAM managed policy to use as a
1243
1275
  # session policy for the role. For more information about ARNs, see
1244
- # [Amazon Resource Names (ARNs) and AWS Service
1245
- # Namespaces](general/latest/gr/aws-arns-and-namespaces.html) in the
1276
+ # [Amazon Resource Names (ARNs) and AWS Service Namespaces][1] in the
1246
1277
  # *AWS General Reference*.
1278
+ #
1279
+ #
1280
+ #
1281
+ # [1]: https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html
1247
1282
  # @return [String]
1248
1283
  #
1249
1284
  # @see http://docs.aws.amazon.com/goto/WebAPI/sts-2011-06-15/PolicyDescriptorType AWS API Documentation
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-core
3
3
  version: !ruby/object:Gem::Version
4
- version: 3.59.0
4
+ version: 3.62.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2019-07-03 00:00:00.000000000 Z
11
+ date: 2019-08-02 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: jmespath