aws-sdk-core 3.127.0 → 3.128.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/CHANGELOG.md +5 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-sso/client.rb +1 -1
- data/lib/aws-sdk-sso.rb +1 -1
- data/lib/aws-sdk-sts/client.rb +53 -51
- data/lib/aws-sdk-sts/types.rb +7 -7
- data/lib/aws-sdk-sts.rb +1 -1
- metadata +2 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 1cf93a52549a583ebf666ac76c7c9243e3068ff7c3e2bd18051ed14d6b2dda36
|
4
|
+
data.tar.gz: c5dd331a95e8437164d33537b0e415de2d74dacc596f2e7675124bd1afded021
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 4b35894b76ba7531148db72002bbad246a2617a8ec412426520002ef10f82e91b7b89d0cb99cea33b2123a9a7641c98cf4d97769cbccd8c6e6f7bbf5ae4fbb98
|
7
|
+
data.tar.gz: e0818ff963cf8f516a741348d625099c4f3a1d70ad5f30a8722a152f77e251d08a5411eae07a5840b718d636d0eb486a2ea59c6f968d0550bf4e230564baa763
|
data/CHANGELOG.md
CHANGED
data/VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
3.
|
1
|
+
3.128.0
|
data/lib/aws-sdk-sso/client.rb
CHANGED
data/lib/aws-sdk-sso.rb
CHANGED
data/lib/aws-sdk-sts/client.rb
CHANGED
@@ -641,7 +641,7 @@ module Aws::STS
|
|
641
641
|
#
|
642
642
|
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html
|
643
643
|
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-limits.html#reference_iam-limits-entity-length
|
644
|
-
# [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
644
|
+
# [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html#id_session-tags_ctlogs
|
645
645
|
#
|
646
646
|
# @option params [Array<String>] :transitive_tag_keys
|
647
647
|
# A list of keys for session tags that you want to set as transitive. If
|
@@ -1179,19 +1179,20 @@ module Aws::STS
|
|
1179
1179
|
|
1180
1180
|
# Returns a set of temporary security credentials for users who have
|
1181
1181
|
# been authenticated in a mobile or web application with a web identity
|
1182
|
-
# provider. Example providers include
|
1183
|
-
# Facebook,
|
1182
|
+
# provider. Example providers include the OAuth 2.0 providers Login with
|
1183
|
+
# Amazon and Facebook, or any OpenID Connect-compatible identity
|
1184
|
+
# provider such as Google or [Amazon Cognito federated identities][1].
|
1184
1185
|
#
|
1185
1186
|
# <note markdown="1"> For mobile applications, we recommend that you use Amazon Cognito. You
|
1186
1187
|
# can use Amazon Cognito with the [Amazon Web Services SDK for iOS
|
1187
|
-
# Developer Guide][
|
1188
|
-
# Developer Guide][
|
1188
|
+
# Developer Guide][2] and the [Amazon Web Services SDK for Android
|
1189
|
+
# Developer Guide][3] to uniquely identify a user. You can also supply
|
1189
1190
|
# the user with a consistent identity throughout the lifetime of an
|
1190
1191
|
# application.
|
1191
1192
|
#
|
1192
|
-
# To learn more about Amazon Cognito, see [Amazon Cognito Overview][
|
1193
|
+
# To learn more about Amazon Cognito, see [Amazon Cognito Overview][4]
|
1193
1194
|
# in *Amazon Web Services SDK for Android Developer Guide* and [Amazon
|
1194
|
-
# Cognito Overview][
|
1195
|
+
# Cognito Overview][5] in the *Amazon Web Services SDK for iOS Developer
|
1195
1196
|
# Guide*.
|
1196
1197
|
#
|
1197
1198
|
# </note>
|
@@ -1206,8 +1207,8 @@ module Aws::STS
|
|
1206
1207
|
# a token from the web identity provider. For a comparison of
|
1207
1208
|
# `AssumeRoleWithWebIdentity` with the other API operations that produce
|
1208
1209
|
# temporary credentials, see [Requesting Temporary Security
|
1209
|
-
# Credentials][
|
1210
|
-
# operations][
|
1210
|
+
# Credentials][6] and [Comparing the Amazon Web Services STS API
|
1211
|
+
# operations][7] in the *IAM User Guide*.
|
1211
1212
|
#
|
1212
1213
|
# The temporary security credentials returned by this API consist of an
|
1213
1214
|
# access key ID, a secret access key, and a security token. Applications
|
@@ -1223,11 +1224,11 @@ module Aws::STS
|
|
1223
1224
|
# to the maximum session duration setting for the role. This setting can
|
1224
1225
|
# have a value from 1 hour to 12 hours. To learn how to view the maximum
|
1225
1226
|
# value for your role, see [View the Maximum Session Duration Setting
|
1226
|
-
# for a Role][
|
1227
|
+
# for a Role][8] in the *IAM User Guide*. The maximum session duration
|
1227
1228
|
# limit applies when you use the `AssumeRole*` API operations or the
|
1228
1229
|
# `assume-role*` CLI commands. However the limit does not apply when you
|
1229
1230
|
# use those operations to create a console URL. For more information,
|
1230
|
-
# see [Using IAM Roles][
|
1231
|
+
# see [Using IAM Roles][9] in the *IAM User Guide*.
|
1231
1232
|
#
|
1232
1233
|
# **Permissions**
|
1233
1234
|
#
|
@@ -1236,7 +1237,7 @@ module Aws::STS
|
|
1236
1237
|
# Amazon Web Services service with the following exception: you cannot
|
1237
1238
|
# call the STS `GetFederationToken` or `GetSessionToken` API operations.
|
1238
1239
|
#
|
1239
|
-
# (Optional) You can pass inline or managed [session policies][
|
1240
|
+
# (Optional) You can pass inline or managed [session policies][10] to
|
1240
1241
|
# this operation. You can pass a single JSON policy document to use as
|
1241
1242
|
# an inline session policy. You can also specify up to 10 managed
|
1242
1243
|
# policies to use as managed session policies. The plaintext that you
|
@@ -1248,7 +1249,7 @@ module Aws::STS
|
|
1248
1249
|
# Services API calls to access resources in the account that owns the
|
1249
1250
|
# role. You cannot use session policies to grant more permissions than
|
1250
1251
|
# those allowed by the identity-based policy of the role that is being
|
1251
|
-
# assumed. For more information, see [Session Policies][
|
1252
|
+
# assumed. For more information, see [Session Policies][10] in the *IAM
|
1252
1253
|
# User Guide*.
|
1253
1254
|
#
|
1254
1255
|
# **Tags**
|
@@ -1256,12 +1257,12 @@ module Aws::STS
|
|
1256
1257
|
# (Optional) You can configure your IdP to pass attributes into your web
|
1257
1258
|
# identity token as session tags. Each session tag consists of a key
|
1258
1259
|
# name and an associated value. For more information about session tags,
|
1259
|
-
# see [Passing Session Tags in STS][
|
1260
|
+
# see [Passing Session Tags in STS][11] in the *IAM User Guide*.
|
1260
1261
|
#
|
1261
1262
|
# You can pass up to 50 session tags. The plaintext session tag keys
|
1262
1263
|
# can’t exceed 128 characters and the values can’t exceed 256
|
1263
1264
|
# characters. For these and additional limits, see [IAM and STS
|
1264
|
-
# Character Limits][
|
1265
|
+
# Character Limits][12] in the *IAM User Guide*.
|
1265
1266
|
#
|
1266
1267
|
# <note markdown="1"> An Amazon Web Services conversion compresses the passed session
|
1267
1268
|
# policies and session tags into a packed binary format that has a
|
@@ -1279,12 +1280,12 @@ module Aws::STS
|
|
1279
1280
|
# An administrator must grant you the permissions necessary to pass
|
1280
1281
|
# session tags. The administrator can also create granular permissions
|
1281
1282
|
# to allow you to pass only specific session tags. For more information,
|
1282
|
-
# see [Tutorial: Using Tags for Attribute-Based Access Control][
|
1283
|
+
# see [Tutorial: Using Tags for Attribute-Based Access Control][13] in
|
1283
1284
|
# the *IAM User Guide*.
|
1284
1285
|
#
|
1285
1286
|
# You can set the session tags as transitive. Transitive tags persist
|
1286
1287
|
# during role chaining. For more information, see [Chaining Roles with
|
1287
|
-
# Session Tags][
|
1288
|
+
# Session Tags][14] in the *IAM User Guide*.
|
1288
1289
|
#
|
1289
1290
|
# **Identities**
|
1290
1291
|
#
|
@@ -1296,54 +1297,55 @@ module Aws::STS
|
|
1296
1297
|
# specified in the role's trust policy.
|
1297
1298
|
#
|
1298
1299
|
# Calling `AssumeRoleWithWebIdentity` can result in an entry in your
|
1299
|
-
# CloudTrail logs. The entry includes the [Subject][
|
1300
|
+
# CloudTrail logs. The entry includes the [Subject][15] of the provided
|
1300
1301
|
# web identity token. We recommend that you avoid using any personally
|
1301
1302
|
# identifiable information (PII) in this field. For example, you could
|
1302
1303
|
# instead use a GUID or a pairwise identifier, as [suggested in the OIDC
|
1303
|
-
# specification][
|
1304
|
+
# specification][16].
|
1304
1305
|
#
|
1305
1306
|
# For more information about how to use web identity federation and the
|
1306
1307
|
# `AssumeRoleWithWebIdentity` API, see the following resources:
|
1307
1308
|
#
|
1308
|
-
# * [Using Web Identity Federation API Operations for Mobile Apps][
|
1309
|
-
# and [Federation Through a Web-based Identity Provider][
|
1309
|
+
# * [Using Web Identity Federation API Operations for Mobile Apps][17]
|
1310
|
+
# and [Federation Through a Web-based Identity Provider][18].
|
1310
1311
|
#
|
1311
|
-
# * [ Web Identity Federation Playground][
|
1312
|
+
# * [ Web Identity Federation Playground][19]. Walk through the process
|
1312
1313
|
# of authenticating through Login with Amazon, Facebook, or Google,
|
1313
1314
|
# getting temporary security credentials, and then using those
|
1314
1315
|
# credentials to make a request to Amazon Web Services.
|
1315
1316
|
#
|
1316
|
-
# * [Amazon Web Services SDK for iOS Developer Guide][
|
1317
|
-
# Services SDK for Android Developer Guide][
|
1317
|
+
# * [Amazon Web Services SDK for iOS Developer Guide][2] and [Amazon Web
|
1318
|
+
# Services SDK for Android Developer Guide][3]. These toolkits contain
|
1318
1319
|
# sample apps that show how to invoke the identity providers. The
|
1319
1320
|
# toolkits then show how to use the information from these providers
|
1320
1321
|
# to get and use temporary security credentials.
|
1321
1322
|
#
|
1322
|
-
# * [Web Identity Federation with Mobile Applications][
|
1323
|
+
# * [Web Identity Federation with Mobile Applications][20]. This article
|
1323
1324
|
# discusses web identity federation and shows an example of how to use
|
1324
1325
|
# web identity federation to get access to content in Amazon S3.
|
1325
1326
|
#
|
1326
1327
|
#
|
1327
1328
|
#
|
1328
|
-
# [1]:
|
1329
|
-
# [2]: http://aws.amazon.com/
|
1330
|
-
# [3]:
|
1331
|
-
# [4]: https://docs.aws.amazon.com/mobile/
|
1332
|
-
# [5]: https://docs.aws.amazon.com/
|
1333
|
-
# [6]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html
|
1334
|
-
# [7]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
1335
|
-
# [8]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html
|
1336
|
-
# [9]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
1337
|
-
# [10]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
1338
|
-
# [11]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
1339
|
-
# [12]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
1340
|
-
# [13]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
1341
|
-
# [14]:
|
1342
|
-
# [15]: http://openid.net/specs/openid-connect-core-1_0.html#
|
1343
|
-
# [16]:
|
1344
|
-
# [17]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
1345
|
-
# [18]: https://aws.amazon.com/
|
1346
|
-
# [19]:
|
1329
|
+
# [1]: https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-identity.html
|
1330
|
+
# [2]: http://aws.amazon.com/sdkforios/
|
1331
|
+
# [3]: http://aws.amazon.com/sdkforandroid/
|
1332
|
+
# [4]: https://docs.aws.amazon.com/mobile/sdkforandroid/developerguide/cognito-auth.html#d0e840
|
1333
|
+
# [5]: https://docs.aws.amazon.com/mobile/sdkforios/developerguide/cognito-auth.html#d0e664
|
1334
|
+
# [6]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html
|
1335
|
+
# [7]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#stsapi_comparison
|
1336
|
+
# [8]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html#id_roles_use_view-role-max-session
|
1337
|
+
# [9]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html
|
1338
|
+
# [10]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
|
1339
|
+
# [11]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html
|
1340
|
+
# [12]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-limits.html#reference_iam-limits-entity-length
|
1341
|
+
# [13]: https://docs.aws.amazon.com/IAM/latest/UserGuide/tutorial_attribute-based-access-control.html
|
1342
|
+
# [14]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html#id_session-tags_role-chaining
|
1343
|
+
# [15]: http://openid.net/specs/openid-connect-core-1_0.html#Claims
|
1344
|
+
# [16]: http://openid.net/specs/openid-connect-core-1_0.html#SubjectIDTypes
|
1345
|
+
# [17]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_oidc_manual.html
|
1346
|
+
# [18]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#api_assumerolewithwebidentity
|
1347
|
+
# [19]: https://aws.amazon.com/blogs/aws/the-aws-web-identity-federation-playground/
|
1348
|
+
# [20]: http://aws.amazon.com/articles/web-identity-federation-with-mobile-applications
|
1347
1349
|
#
|
1348
1350
|
# @option params [required, String] :role_arn
|
1349
1351
|
# The Amazon Resource Name (ARN) of the role that the caller is
|
@@ -1370,13 +1372,13 @@ module Aws::STS
|
|
1370
1372
|
# `AssumeRoleWithWebIdentity` call.
|
1371
1373
|
#
|
1372
1374
|
# @option params [String] :provider_id
|
1373
|
-
# The fully qualified host component of the domain name of the
|
1374
|
-
# provider.
|
1375
|
+
# The fully qualified host component of the domain name of the OAuth 2.0
|
1376
|
+
# identity provider. Do not specify this value for an OpenID Connect
|
1377
|
+
# identity provider.
|
1375
1378
|
#
|
1376
|
-
#
|
1377
|
-
#
|
1378
|
-
#
|
1379
|
-
# schemes and port numbers.
|
1379
|
+
# Currently `www.amazon.com` and `graph.facebook.com` are the only
|
1380
|
+
# supported identity providers for OAuth 2.0 access tokens. Do not
|
1381
|
+
# include URL schemes and port numbers.
|
1380
1382
|
#
|
1381
1383
|
# Do not specify this value for OpenID Connect ID tokens.
|
1382
1384
|
#
|
@@ -2288,7 +2290,7 @@ module Aws::STS
|
|
2288
2290
|
params: params,
|
2289
2291
|
config: config)
|
2290
2292
|
context[:gem_name] = 'aws-sdk-core'
|
2291
|
-
context[:gem_version] = '3.
|
2293
|
+
context[:gem_version] = '3.128.0'
|
2292
2294
|
Seahorse::Client::Request.new(handlers, context)
|
2293
2295
|
end
|
2294
2296
|
|
data/lib/aws-sdk-sts/types.rb
CHANGED
@@ -213,7 +213,7 @@ module Aws::STS
|
|
213
213
|
#
|
214
214
|
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html
|
215
215
|
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-limits.html#reference_iam-limits-entity-length
|
216
|
-
# [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
216
|
+
# [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html#id_session-tags_ctlogs
|
217
217
|
# @return [Array<Types::Tag>]
|
218
218
|
#
|
219
219
|
# @!attribute [rw] transitive_tag_keys
|
@@ -710,13 +710,13 @@ module Aws::STS
|
|
710
710
|
# @return [String]
|
711
711
|
#
|
712
712
|
# @!attribute [rw] provider_id
|
713
|
-
# The fully qualified host component of the domain name of the
|
714
|
-
# identity provider.
|
713
|
+
# The fully qualified host component of the domain name of the OAuth
|
714
|
+
# 2.0 identity provider. Do not specify this value for an OpenID
|
715
|
+
# Connect identity provider.
|
715
716
|
#
|
716
|
-
#
|
717
|
-
#
|
718
|
-
#
|
719
|
-
# schemes and port numbers.
|
717
|
+
# Currently `www.amazon.com` and `graph.facebook.com` are the only
|
718
|
+
# supported identity providers for OAuth 2.0 access tokens. Do not
|
719
|
+
# include URL schemes and port numbers.
|
720
720
|
#
|
721
721
|
# Do not specify this value for OpenID Connect ID tokens.
|
722
722
|
# @return [String]
|
data/lib/aws-sdk-sts.rb
CHANGED
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: aws-sdk-core
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 3.
|
4
|
+
version: 3.128.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Amazon Web Services
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2022-
|
11
|
+
date: 2022-03-04 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: jmespath
|