aws-sdk-core 3.0.0.rc13 → 3.0.0.rc14
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/VERSION +1 -1
- data/lib/aws-sdk-sts.rb +1 -1
- data/lib/aws-sdk-sts/client.rb +164 -1
- metadata +2 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA1:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 95abd505491461539b404496d3adba36538b8f58
|
4
|
+
data.tar.gz: 5d6bbf09d44bf5bf4a651248a1cd547c3478cd07
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 539405211c1ae2203d53e736dc89f5492e3e9dd73c832c5adb57e185c1c7a685728b78a430e250559923131d28169e7b352890ec9457897b80237b537dc2d315
|
7
|
+
data.tar.gz: fd9873c3d9b278fffdccdf89706e9dc982e96864dae3abc2de19646d091f54e3d67a618e73bc12eaf695f753a90a71c88df43780e3f068890dc415dfcd962ed2
|
data/VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
3.0.0.
|
1
|
+
3.0.0.rc14
|
data/lib/aws-sdk-sts.rb
CHANGED
data/lib/aws-sdk-sts/client.rb
CHANGED
@@ -372,6 +372,34 @@ module Aws::STS
|
|
372
372
|
# * {Types::AssumeRoleResponse#assumed_role_user #assumed_role_user} => Types::AssumedRoleUser
|
373
373
|
# * {Types::AssumeRoleResponse#packed_policy_size #packed_policy_size} => Integer
|
374
374
|
#
|
375
|
+
#
|
376
|
+
# @example Example: To assume a role
|
377
|
+
#
|
378
|
+
# #
|
379
|
+
#
|
380
|
+
# resp = client.assume_role({
|
381
|
+
# duration_seconds: 3600,
|
382
|
+
# external_id: "123ABC",
|
383
|
+
# policy: "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Sid\":\"Stmt1\",\"Effect\":\"Allow\",\"Action\":\"s3:*\",\"Resource\":\"*\"}]}",
|
384
|
+
# role_arn: "arn:aws:iam::123456789012:role/demo",
|
385
|
+
# role_session_name: "Bob",
|
386
|
+
# })
|
387
|
+
#
|
388
|
+
# resp.to_h outputs the following:
|
389
|
+
# {
|
390
|
+
# assumed_role_user: {
|
391
|
+
# arn: "arn:aws:sts::123456789012:assumed-role/demo/Bob",
|
392
|
+
# assumed_role_id: "ARO123EXAMPLE123:Bob",
|
393
|
+
# },
|
394
|
+
# credentials: {
|
395
|
+
# access_key_id: "AKIAIOSFODNN7EXAMPLE",
|
396
|
+
# expiration: Time.parse("2011-07-15T23:28:33.359Z"),
|
397
|
+
# secret_access_key: "wJalrXUtnFEMI/K7MDENG/bPxRfiCYzEXAMPLEKEY",
|
398
|
+
# session_token: "AQoDYXdzEPT//////////wEXAMPLEtc764bNrC9SAPBSM22wDOk4x4HIZ8j4FZTwdQWLWsKWHGBuFqwAeMicRXmxfpSPfIeoIYRqTflfKD8YUuwthAx7mSEI/qkPpKPi/kMcGdQrmGdeehM4IC1NtBmUpp2wUE8phUZampKsburEDy0KPkyQDYwT7WZ0wq5VSXDvp75YU9HFvlRd8Tx6q6fE8YQcHNVXAkiY9q6d+xo0rKwT38xVqr7ZD0u0iPPkUL64lIZbqBAz+scqKmlzm8FDrypNC9Yjc8fPOLn9FX9KSYvKTr4rvx3iSIlTJabIQwj2ICCR/oLxBA==",
|
399
|
+
# },
|
400
|
+
# packed_policy_size: 6,
|
401
|
+
# }
|
402
|
+
#
|
375
403
|
# @example Request syntax with placeholder values
|
376
404
|
#
|
377
405
|
# resp = client.assume_role({
|
@@ -804,6 +832,37 @@ module Aws::STS
|
|
804
832
|
# * {Types::AssumeRoleWithWebIdentityResponse#provider #provider} => String
|
805
833
|
# * {Types::AssumeRoleWithWebIdentityResponse#audience #audience} => String
|
806
834
|
#
|
835
|
+
#
|
836
|
+
# @example Example: To assume a role as an OpenID Connect-federated user
|
837
|
+
#
|
838
|
+
# #
|
839
|
+
#
|
840
|
+
# resp = client.assume_role_with_web_identity({
|
841
|
+
# duration_seconds: 3600,
|
842
|
+
# provider_id: "www.amazon.com",
|
843
|
+
# role_arn: "arn:aws:iam::123456789012:role/FederatedWebIdentityRole",
|
844
|
+
# role_session_name: "app1",
|
845
|
+
# web_identity_token: "Atza%7CIQEBLjAsAhRFiXuWpUXuRvQ9PZL3GMFcYevydwIUFAHZwXZXXXXXXXXJnrulxKDHwy87oGKPznh0D6bEQZTSCzyoCtL_8S07pLpr0zMbn6w1lfVZKNTBdDansFBmtGnIsIapjI6xKR02Yc_2bQ8LZbUXSGm6Ry6_BG7PrtLZtj_dfCTj92xNGed-CrKqjG7nPBjNIL016GGvuS5gSvPRUxWES3VYfm1wl7WTI7jn-Pcb6M-buCgHhFOzTQxod27L9CqnOLio7N3gZAGpsp6n1-AJBOCJckcyXe2c6uD0srOJeZlKUm2eTDVMf8IehDVI0r1QOnTV6KzzAI3OY87Vd_cVMQ",
|
846
|
+
# })
|
847
|
+
#
|
848
|
+
# resp.to_h outputs the following:
|
849
|
+
# {
|
850
|
+
# assumed_role_user: {
|
851
|
+
# arn: "arn:aws:sts::123456789012:assumed-role/FederatedWebIdentityRole/app1",
|
852
|
+
# assumed_role_id: "AROACLKWSDQRAOEXAMPLE:app1",
|
853
|
+
# },
|
854
|
+
# audience: "client.5498841531868486423.1548@apps.example.com",
|
855
|
+
# credentials: {
|
856
|
+
# access_key_id: "AKIAIOSFODNN7EXAMPLE",
|
857
|
+
# expiration: Time.parse("2014-10-24T23:00:23Z"),
|
858
|
+
# secret_access_key: "wJalrXUtnFEMI/K7MDENG/bPxRfiCYzEXAMPLEKEY",
|
859
|
+
# session_token: "AQoDYXdzEE0a8ANXXXXXXXXNO1ewxE5TijQyp+IEXAMPLE",
|
860
|
+
# },
|
861
|
+
# packed_policy_size: 123,
|
862
|
+
# provider: "www.amazon.com",
|
863
|
+
# subject_from_web_identity_token: "amzn1.account.AF6RHO7KZU5XRVQJGXK6HEXAMPLE",
|
864
|
+
# }
|
865
|
+
#
|
807
866
|
# @example Request syntax with placeholder values
|
808
867
|
#
|
809
868
|
# resp = client.assume_role_with_web_identity({
|
@@ -885,6 +944,20 @@ module Aws::STS
|
|
885
944
|
#
|
886
945
|
# * {Types::DecodeAuthorizationMessageResponse#decoded_message #decoded_message} => String
|
887
946
|
#
|
947
|
+
#
|
948
|
+
# @example Example: To decode information about an authorization status of a request
|
949
|
+
#
|
950
|
+
# #
|
951
|
+
#
|
952
|
+
# resp = client.decode_authorization_message({
|
953
|
+
# encoded_message: "<encoded-message>",
|
954
|
+
# })
|
955
|
+
#
|
956
|
+
# resp.to_h outputs the following:
|
957
|
+
# {
|
958
|
+
# decoded_message: "{\"allowed\": \"false\",\"explicitDeny\": \"false\",\"matchedStatements\": \"\",\"failures\": \"\",\"context\": {\"principal\": {\"id\": \"AIDACKCEVSQ6C2EXAMPLE\",\"name\": \"Bob\",\"arn\": \"arn:aws:iam::123456789012:user/Bob\"},\"action\": \"ec2:StopInstances\",\"resource\": \"arn:aws:ec2:us-east-1:123456789012:instance/i-dd01c9bd\",\"conditions\": [{\"item\": {\"key\": \"ec2:Tenancy\",\"values\": [\"default\"]},{\"item\": {\"key\": \"ec2:ResourceTag/elasticbeanstalk:environment-name\",\"values\": [\"Default-Environment\"]}},(Additional items ...)]}}",
|
959
|
+
# }
|
960
|
+
#
|
888
961
|
# @example Request syntax with placeholder values
|
889
962
|
#
|
890
963
|
# resp = client.decode_authorization_message({
|
@@ -913,6 +986,49 @@ module Aws::STS
|
|
913
986
|
# * {Types::GetCallerIdentityResponse#account #account} => String
|
914
987
|
# * {Types::GetCallerIdentityResponse#arn #arn} => String
|
915
988
|
#
|
989
|
+
#
|
990
|
+
# @example Example: To get details about a calling IAM user
|
991
|
+
#
|
992
|
+
# # This example shows a request and response made with the credentials for a user named Alice in the AWS account 123456789012.
|
993
|
+
#
|
994
|
+
# resp = client.get_caller_identity({
|
995
|
+
# })
|
996
|
+
#
|
997
|
+
# resp.to_h outputs the following:
|
998
|
+
# {
|
999
|
+
# account: "123456789012",
|
1000
|
+
# arn: "arn:aws:iam::123456789012:user/Alice",
|
1001
|
+
# user_id: "AKIAI44QH8DHBEXAMPLE",
|
1002
|
+
# }
|
1003
|
+
#
|
1004
|
+
# @example Example: To get details about a calling user federated with AssumeRole
|
1005
|
+
#
|
1006
|
+
# # This example shows a request and response made with temporary credentials created by AssumeRole. The name of the assumed role is my-role-name, and the RoleSessionName is set to my-role-session-name.
|
1007
|
+
#
|
1008
|
+
# resp = client.get_caller_identity({
|
1009
|
+
# })
|
1010
|
+
#
|
1011
|
+
# resp.to_h outputs the following:
|
1012
|
+
# {
|
1013
|
+
# account: "123456789012",
|
1014
|
+
# arn: "arn:aws:sts::123456789012:assumed-role/my-role-name/my-role-session-name",
|
1015
|
+
# user_id: "AKIAI44QH8DHBEXAMPLE:my-role-session-name",
|
1016
|
+
# }
|
1017
|
+
#
|
1018
|
+
# @example Example: To get details about a calling user federated with GetFederationToken
|
1019
|
+
#
|
1020
|
+
# # This example shows a request and response made with temporary credentials created by using GetFederationToken. The Name parameter is set to my-federated-user-name.
|
1021
|
+
#
|
1022
|
+
# resp = client.get_caller_identity({
|
1023
|
+
# })
|
1024
|
+
#
|
1025
|
+
# resp.to_h outputs the following:
|
1026
|
+
# {
|
1027
|
+
# account: "123456789012",
|
1028
|
+
# arn: "arn:aws:sts::123456789012:federated-user/my-federated-user-name",
|
1029
|
+
# user_id: "123456789012:my-federated-user-name",
|
1030
|
+
# }
|
1031
|
+
#
|
916
1032
|
# @example Response structure
|
917
1033
|
#
|
918
1034
|
# resp.user_id #=> String
|
@@ -1090,6 +1206,32 @@ module Aws::STS
|
|
1090
1206
|
# * {Types::GetFederationTokenResponse#federated_user #federated_user} => Types::FederatedUser
|
1091
1207
|
# * {Types::GetFederationTokenResponse#packed_policy_size #packed_policy_size} => Integer
|
1092
1208
|
#
|
1209
|
+
#
|
1210
|
+
# @example Example: To get temporary credentials for a role by using GetFederationToken
|
1211
|
+
#
|
1212
|
+
# #
|
1213
|
+
#
|
1214
|
+
# resp = client.get_federation_token({
|
1215
|
+
# duration_seconds: 3600,
|
1216
|
+
# name: "Bob",
|
1217
|
+
# policy: "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Sid\":\"Stmt1\",\"Effect\":\"Allow\",\"Action\":\"s3:*\",\"Resource\":\"*\"}]}",
|
1218
|
+
# })
|
1219
|
+
#
|
1220
|
+
# resp.to_h outputs the following:
|
1221
|
+
# {
|
1222
|
+
# credentials: {
|
1223
|
+
# access_key_id: "AKIAIOSFODNN7EXAMPLE",
|
1224
|
+
# expiration: Time.parse("2011-07-15T23:28:33.359Z"),
|
1225
|
+
# secret_access_key: "wJalrXUtnFEMI/K7MDENG/bPxRfiCYzEXAMPLEKEY",
|
1226
|
+
# session_token: "AQoDYXdzEPT//////////wEXAMPLEtc764bNrC9SAPBSM22wDOk4x4HIZ8j4FZTwdQWLWsKWHGBuFqwAeMicRXmxfpSPfIeoIYRqTflfKD8YUuwthAx7mSEI/qkPpKPi/kMcGdQrmGdeehM4IC1NtBmUpp2wUE8phUZampKsburEDy0KPkyQDYwT7WZ0wq5VSXDvp75YU9HFvlRd8Tx6q6fE8YQcHNVXAkiY9q6d+xo0rKwT38xVqr7ZD0u0iPPkUL64lIZbqBAz+scqKmlzm8FDrypNC9Yjc8fPOLn9FX9KSYvKTr4rvx3iSIlTJabIQwj2ICCR/oLxBA==",
|
1227
|
+
# },
|
1228
|
+
# federated_user: {
|
1229
|
+
# arn: "arn:aws:sts::123456789012:federated-user/Bob",
|
1230
|
+
# federated_user_id: "123456789012:Bob",
|
1231
|
+
# },
|
1232
|
+
# packed_policy_size: 6,
|
1233
|
+
# }
|
1234
|
+
#
|
1093
1235
|
# @example Request syntax with placeholder values
|
1094
1236
|
#
|
1095
1237
|
# resp = client.get_federation_token({
|
@@ -1214,6 +1356,27 @@ module Aws::STS
|
|
1214
1356
|
#
|
1215
1357
|
# * {Types::GetSessionTokenResponse#credentials #credentials} => Types::Credentials
|
1216
1358
|
#
|
1359
|
+
#
|
1360
|
+
# @example Example: To get temporary credentials for an IAM user or an AWS account
|
1361
|
+
#
|
1362
|
+
# #
|
1363
|
+
#
|
1364
|
+
# resp = client.get_session_token({
|
1365
|
+
# duration_seconds: 3600,
|
1366
|
+
# serial_number: "YourMFASerialNumber",
|
1367
|
+
# token_code: "123456",
|
1368
|
+
# })
|
1369
|
+
#
|
1370
|
+
# resp.to_h outputs the following:
|
1371
|
+
# {
|
1372
|
+
# credentials: {
|
1373
|
+
# access_key_id: "AKIAIOSFODNN7EXAMPLE",
|
1374
|
+
# expiration: Time.parse("2011-07-11T19:55:29.611Z"),
|
1375
|
+
# secret_access_key: "wJalrXUtnFEMI/K7MDENG/bPxRfiCYzEXAMPLEKEY",
|
1376
|
+
# session_token: "AQoEXAMPLEH4aoAH0gNCAPyJxz4BlCFFxWNE1OPTgk5TthT+FvwqnKwRcOIfrRh3c/LTo6UDdyJwOOvEVPvLXCrrrUtdnniCEXAMPLE/IvU1dYUg2RVAJBanLiHb4IgRmpRV3zrkuWJOgQs8IZZaIv2BXIa2R4OlgkBN9bkUDNCJiBeb/AXlzBBko7b15fjrBs2+cTQtpZ3CYWFXG8C5zqx37wnOE49mRl/+OtkIKGO7fAE",
|
1377
|
+
# },
|
1378
|
+
# }
|
1379
|
+
#
|
1217
1380
|
# @example Request syntax with placeholder values
|
1218
1381
|
#
|
1219
1382
|
# resp = client.get_session_token({
|
@@ -1251,7 +1414,7 @@ module Aws::STS
|
|
1251
1414
|
params: params,
|
1252
1415
|
config: config)
|
1253
1416
|
context[:gem_name] = 'aws-sdk-core'
|
1254
|
-
context[:gem_version] = '3.0.0.
|
1417
|
+
context[:gem_version] = '3.0.0.rc13'
|
1255
1418
|
Seahorse::Client::Request.new(handlers, context)
|
1256
1419
|
end
|
1257
1420
|
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: aws-sdk-core
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 3.0.0.
|
4
|
+
version: 3.0.0.rc14
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Amazon Web Services
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2017-06-
|
11
|
+
date: 2017-06-29 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: jmespath
|