aws-sdk-core 3.127.0 → 3.128.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 918c0204898bdad127acf619312dbce114cb19cc5c33e072548ac948c85c34a8
4
- data.tar.gz: 79b434c6e925efbf6c8921a915aa20171a702cfd89bfd9caee27739017a46978
3
+ metadata.gz: 1cf93a52549a583ebf666ac76c7c9243e3068ff7c3e2bd18051ed14d6b2dda36
4
+ data.tar.gz: c5dd331a95e8437164d33537b0e415de2d74dacc596f2e7675124bd1afded021
5
5
  SHA512:
6
- metadata.gz: 51b4885b28f643ae32d0765fd5ca08f565cd60235c4d21e2b432710353afd1d25c957c7e0fd462c489263272f809b2dedbd4803eaa7b26266738bee764b5c2e4
7
- data.tar.gz: dc8671e28caf0a7dcf0cef57ef25e35a8b6ed846d428e8c80aec1c6cb14b9b24e62705e231d497c917254202a4588ea8379b451457a2c6e2f292a66edf1df0cd
6
+ metadata.gz: 4b35894b76ba7531148db72002bbad246a2617a8ec412426520002ef10f82e91b7b89d0cb99cea33b2123a9a7641c98cf4d97769cbccd8c6e6f7bbf5ae4fbb98
7
+ data.tar.gz: e0818ff963cf8f516a741348d625099c4f3a1d70ad5f30a8722a152f77e251d08a5411eae07a5840b718d636d0eb486a2ea59c6f968d0550bf4e230564baa763
data/CHANGELOG.md CHANGED
@@ -1,6 +1,11 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 3.128.0 (2022-03-04)
5
+ ------------------
6
+
7
+ * Feature - Updated Aws::STS::Client with the latest API changes.
8
+
4
9
  3.127.0 (2022-02-24)
5
10
  ------------------
6
11
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 3.127.0
1
+ 3.128.0
@@ -545,7 +545,7 @@ module Aws::SSO
545
545
  params: params,
546
546
  config: config)
547
547
  context[:gem_name] = 'aws-sdk-core'
548
- context[:gem_version] = '3.127.0'
548
+ context[:gem_version] = '3.128.0'
549
549
  Seahorse::Client::Request.new(handlers, context)
550
550
  end
551
551
 
data/lib/aws-sdk-sso.rb CHANGED
@@ -50,6 +50,6 @@ require_relative 'aws-sdk-sso/customizations'
50
50
  # @!group service
51
51
  module Aws::SSO
52
52
 
53
- GEM_VERSION = '3.127.0'
53
+ GEM_VERSION = '3.128.0'
54
54
 
55
55
  end
@@ -641,7 +641,7 @@ module Aws::STS
641
641
  #
642
642
  # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html
643
643
  # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-limits.html#reference_iam-limits-entity-length
644
- # [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/session-tags.html#id_session-tags_ctlogs
644
+ # [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html#id_session-tags_ctlogs
645
645
  #
646
646
  # @option params [Array<String>] :transitive_tag_keys
647
647
  # A list of keys for session tags that you want to set as transitive. If
@@ -1179,19 +1179,20 @@ module Aws::STS
1179
1179
 
1180
1180
  # Returns a set of temporary security credentials for users who have
1181
1181
  # been authenticated in a mobile or web application with a web identity
1182
- # provider. Example providers include Amazon Cognito, Login with Amazon,
1183
- # Facebook, Google, or any OpenID Connect-compatible identity provider.
1182
+ # provider. Example providers include the OAuth 2.0 providers Login with
1183
+ # Amazon and Facebook, or any OpenID Connect-compatible identity
1184
+ # provider such as Google or [Amazon Cognito federated identities][1].
1184
1185
  #
1185
1186
  # <note markdown="1"> For mobile applications, we recommend that you use Amazon Cognito. You
1186
1187
  # can use Amazon Cognito with the [Amazon Web Services SDK for iOS
1187
- # Developer Guide][1] and the [Amazon Web Services SDK for Android
1188
- # Developer Guide][2] to uniquely identify a user. You can also supply
1188
+ # Developer Guide][2] and the [Amazon Web Services SDK for Android
1189
+ # Developer Guide][3] to uniquely identify a user. You can also supply
1189
1190
  # the user with a consistent identity throughout the lifetime of an
1190
1191
  # application.
1191
1192
  #
1192
- # To learn more about Amazon Cognito, see [Amazon Cognito Overview][3]
1193
+ # To learn more about Amazon Cognito, see [Amazon Cognito Overview][4]
1193
1194
  # in *Amazon Web Services SDK for Android Developer Guide* and [Amazon
1194
- # Cognito Overview][4] in the *Amazon Web Services SDK for iOS Developer
1195
+ # Cognito Overview][5] in the *Amazon Web Services SDK for iOS Developer
1195
1196
  # Guide*.
1196
1197
  #
1197
1198
  # </note>
@@ -1206,8 +1207,8 @@ module Aws::STS
1206
1207
  # a token from the web identity provider. For a comparison of
1207
1208
  # `AssumeRoleWithWebIdentity` with the other API operations that produce
1208
1209
  # temporary credentials, see [Requesting Temporary Security
1209
- # Credentials][5] and [Comparing the Amazon Web Services STS API
1210
- # operations][6] in the *IAM User Guide*.
1210
+ # Credentials][6] and [Comparing the Amazon Web Services STS API
1211
+ # operations][7] in the *IAM User Guide*.
1211
1212
  #
1212
1213
  # The temporary security credentials returned by this API consist of an
1213
1214
  # access key ID, a secret access key, and a security token. Applications
@@ -1223,11 +1224,11 @@ module Aws::STS
1223
1224
  # to the maximum session duration setting for the role. This setting can
1224
1225
  # have a value from 1 hour to 12 hours. To learn how to view the maximum
1225
1226
  # value for your role, see [View the Maximum Session Duration Setting
1226
- # for a Role][7] in the *IAM User Guide*. The maximum session duration
1227
+ # for a Role][8] in the *IAM User Guide*. The maximum session duration
1227
1228
  # limit applies when you use the `AssumeRole*` API operations or the
1228
1229
  # `assume-role*` CLI commands. However the limit does not apply when you
1229
1230
  # use those operations to create a console URL. For more information,
1230
- # see [Using IAM Roles][8] in the *IAM User Guide*.
1231
+ # see [Using IAM Roles][9] in the *IAM User Guide*.
1231
1232
  #
1232
1233
  # **Permissions**
1233
1234
  #
@@ -1236,7 +1237,7 @@ module Aws::STS
1236
1237
  # Amazon Web Services service with the following exception: you cannot
1237
1238
  # call the STS `GetFederationToken` or `GetSessionToken` API operations.
1238
1239
  #
1239
- # (Optional) You can pass inline or managed [session policies][9] to
1240
+ # (Optional) You can pass inline or managed [session policies][10] to
1240
1241
  # this operation. You can pass a single JSON policy document to use as
1241
1242
  # an inline session policy. You can also specify up to 10 managed
1242
1243
  # policies to use as managed session policies. The plaintext that you
@@ -1248,7 +1249,7 @@ module Aws::STS
1248
1249
  # Services API calls to access resources in the account that owns the
1249
1250
  # role. You cannot use session policies to grant more permissions than
1250
1251
  # those allowed by the identity-based policy of the role that is being
1251
- # assumed. For more information, see [Session Policies][9] in the *IAM
1252
+ # assumed. For more information, see [Session Policies][10] in the *IAM
1252
1253
  # User Guide*.
1253
1254
  #
1254
1255
  # **Tags**
@@ -1256,12 +1257,12 @@ module Aws::STS
1256
1257
  # (Optional) You can configure your IdP to pass attributes into your web
1257
1258
  # identity token as session tags. Each session tag consists of a key
1258
1259
  # name and an associated value. For more information about session tags,
1259
- # see [Passing Session Tags in STS][10] in the *IAM User Guide*.
1260
+ # see [Passing Session Tags in STS][11] in the *IAM User Guide*.
1260
1261
  #
1261
1262
  # You can pass up to 50 session tags. The plaintext session tag keys
1262
1263
  # can’t exceed 128 characters and the values can’t exceed 256
1263
1264
  # characters. For these and additional limits, see [IAM and STS
1264
- # Character Limits][11] in the *IAM User Guide*.
1265
+ # Character Limits][12] in the *IAM User Guide*.
1265
1266
  #
1266
1267
  # <note markdown="1"> An Amazon Web Services conversion compresses the passed session
1267
1268
  # policies and session tags into a packed binary format that has a
@@ -1279,12 +1280,12 @@ module Aws::STS
1279
1280
  # An administrator must grant you the permissions necessary to pass
1280
1281
  # session tags. The administrator can also create granular permissions
1281
1282
  # to allow you to pass only specific session tags. For more information,
1282
- # see [Tutorial: Using Tags for Attribute-Based Access Control][12] in
1283
+ # see [Tutorial: Using Tags for Attribute-Based Access Control][13] in
1283
1284
  # the *IAM User Guide*.
1284
1285
  #
1285
1286
  # You can set the session tags as transitive. Transitive tags persist
1286
1287
  # during role chaining. For more information, see [Chaining Roles with
1287
- # Session Tags][13] in the *IAM User Guide*.
1288
+ # Session Tags][14] in the *IAM User Guide*.
1288
1289
  #
1289
1290
  # **Identities**
1290
1291
  #
@@ -1296,54 +1297,55 @@ module Aws::STS
1296
1297
  # specified in the role's trust policy.
1297
1298
  #
1298
1299
  # Calling `AssumeRoleWithWebIdentity` can result in an entry in your
1299
- # CloudTrail logs. The entry includes the [Subject][14] of the provided
1300
+ # CloudTrail logs. The entry includes the [Subject][15] of the provided
1300
1301
  # web identity token. We recommend that you avoid using any personally
1301
1302
  # identifiable information (PII) in this field. For example, you could
1302
1303
  # instead use a GUID or a pairwise identifier, as [suggested in the OIDC
1303
- # specification][15].
1304
+ # specification][16].
1304
1305
  #
1305
1306
  # For more information about how to use web identity federation and the
1306
1307
  # `AssumeRoleWithWebIdentity` API, see the following resources:
1307
1308
  #
1308
- # * [Using Web Identity Federation API Operations for Mobile Apps][16]
1309
- # and [Federation Through a Web-based Identity Provider][17].
1309
+ # * [Using Web Identity Federation API Operations for Mobile Apps][17]
1310
+ # and [Federation Through a Web-based Identity Provider][18].
1310
1311
  #
1311
- # * [ Web Identity Federation Playground][18]. Walk through the process
1312
+ # * [ Web Identity Federation Playground][19]. Walk through the process
1312
1313
  # of authenticating through Login with Amazon, Facebook, or Google,
1313
1314
  # getting temporary security credentials, and then using those
1314
1315
  # credentials to make a request to Amazon Web Services.
1315
1316
  #
1316
- # * [Amazon Web Services SDK for iOS Developer Guide][1] and [Amazon Web
1317
- # Services SDK for Android Developer Guide][2]. These toolkits contain
1317
+ # * [Amazon Web Services SDK for iOS Developer Guide][2] and [Amazon Web
1318
+ # Services SDK for Android Developer Guide][3]. These toolkits contain
1318
1319
  # sample apps that show how to invoke the identity providers. The
1319
1320
  # toolkits then show how to use the information from these providers
1320
1321
  # to get and use temporary security credentials.
1321
1322
  #
1322
- # * [Web Identity Federation with Mobile Applications][19]. This article
1323
+ # * [Web Identity Federation with Mobile Applications][20]. This article
1323
1324
  # discusses web identity federation and shows an example of how to use
1324
1325
  # web identity federation to get access to content in Amazon S3.
1325
1326
  #
1326
1327
  #
1327
1328
  #
1328
- # [1]: http://aws.amazon.com/sdkforios/
1329
- # [2]: http://aws.amazon.com/sdkforandroid/
1330
- # [3]: https://docs.aws.amazon.com/mobile/sdkforandroid/developerguide/cognito-auth.html#d0e840
1331
- # [4]: https://docs.aws.amazon.com/mobile/sdkforios/developerguide/cognito-auth.html#d0e664
1332
- # [5]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html
1333
- # [6]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#stsapi_comparison
1334
- # [7]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html#id_roles_use_view-role-max-session
1335
- # [8]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html
1336
- # [9]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
1337
- # [10]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html
1338
- # [11]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-limits.html#reference_iam-limits-entity-length
1339
- # [12]: https://docs.aws.amazon.com/IAM/latest/UserGuide/tutorial_attribute-based-access-control.html
1340
- # [13]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html#id_session-tags_role-chaining
1341
- # [14]: http://openid.net/specs/openid-connect-core-1_0.html#Claims
1342
- # [15]: http://openid.net/specs/openid-connect-core-1_0.html#SubjectIDTypes
1343
- # [16]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_oidc_manual.html
1344
- # [17]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#api_assumerolewithwebidentity
1345
- # [18]: https://aws.amazon.com/blogs/aws/the-aws-web-identity-federation-playground/
1346
- # [19]: http://aws.amazon.com/articles/web-identity-federation-with-mobile-applications
1329
+ # [1]: https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-identity.html
1330
+ # [2]: http://aws.amazon.com/sdkforios/
1331
+ # [3]: http://aws.amazon.com/sdkforandroid/
1332
+ # [4]: https://docs.aws.amazon.com/mobile/sdkforandroid/developerguide/cognito-auth.html#d0e840
1333
+ # [5]: https://docs.aws.amazon.com/mobile/sdkforios/developerguide/cognito-auth.html#d0e664
1334
+ # [6]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html
1335
+ # [7]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#stsapi_comparison
1336
+ # [8]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html#id_roles_use_view-role-max-session
1337
+ # [9]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html
1338
+ # [10]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
1339
+ # [11]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html
1340
+ # [12]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-limits.html#reference_iam-limits-entity-length
1341
+ # [13]: https://docs.aws.amazon.com/IAM/latest/UserGuide/tutorial_attribute-based-access-control.html
1342
+ # [14]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html#id_session-tags_role-chaining
1343
+ # [15]: http://openid.net/specs/openid-connect-core-1_0.html#Claims
1344
+ # [16]: http://openid.net/specs/openid-connect-core-1_0.html#SubjectIDTypes
1345
+ # [17]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_oidc_manual.html
1346
+ # [18]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#api_assumerolewithwebidentity
1347
+ # [19]: https://aws.amazon.com/blogs/aws/the-aws-web-identity-federation-playground/
1348
+ # [20]: http://aws.amazon.com/articles/web-identity-federation-with-mobile-applications
1347
1349
  #
1348
1350
  # @option params [required, String] :role_arn
1349
1351
  # The Amazon Resource Name (ARN) of the role that the caller is
@@ -1370,13 +1372,13 @@ module Aws::STS
1370
1372
  # `AssumeRoleWithWebIdentity` call.
1371
1373
  #
1372
1374
  # @option params [String] :provider_id
1373
- # The fully qualified host component of the domain name of the identity
1374
- # provider.
1375
+ # The fully qualified host component of the domain name of the OAuth 2.0
1376
+ # identity provider. Do not specify this value for an OpenID Connect
1377
+ # identity provider.
1375
1378
  #
1376
- # Specify this value only for OAuth 2.0 access tokens. Currently
1377
- # `www.amazon.com` and `graph.facebook.com` are the only supported
1378
- # identity providers for OAuth 2.0 access tokens. Do not include URL
1379
- # schemes and port numbers.
1379
+ # Currently `www.amazon.com` and `graph.facebook.com` are the only
1380
+ # supported identity providers for OAuth 2.0 access tokens. Do not
1381
+ # include URL schemes and port numbers.
1380
1382
  #
1381
1383
  # Do not specify this value for OpenID Connect ID tokens.
1382
1384
  #
@@ -2288,7 +2290,7 @@ module Aws::STS
2288
2290
  params: params,
2289
2291
  config: config)
2290
2292
  context[:gem_name] = 'aws-sdk-core'
2291
- context[:gem_version] = '3.127.0'
2293
+ context[:gem_version] = '3.128.0'
2292
2294
  Seahorse::Client::Request.new(handlers, context)
2293
2295
  end
2294
2296
 
@@ -213,7 +213,7 @@ module Aws::STS
213
213
  #
214
214
  # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html
215
215
  # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-limits.html#reference_iam-limits-entity-length
216
- # [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/session-tags.html#id_session-tags_ctlogs
216
+ # [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html#id_session-tags_ctlogs
217
217
  # @return [Array<Types::Tag>]
218
218
  #
219
219
  # @!attribute [rw] transitive_tag_keys
@@ -710,13 +710,13 @@ module Aws::STS
710
710
  # @return [String]
711
711
  #
712
712
  # @!attribute [rw] provider_id
713
- # The fully qualified host component of the domain name of the
714
- # identity provider.
713
+ # The fully qualified host component of the domain name of the OAuth
714
+ # 2.0 identity provider. Do not specify this value for an OpenID
715
+ # Connect identity provider.
715
716
  #
716
- # Specify this value only for OAuth 2.0 access tokens. Currently
717
- # `www.amazon.com` and `graph.facebook.com` are the only supported
718
- # identity providers for OAuth 2.0 access tokens. Do not include URL
719
- # schemes and port numbers.
717
+ # Currently `www.amazon.com` and `graph.facebook.com` are the only
718
+ # supported identity providers for OAuth 2.0 access tokens. Do not
719
+ # include URL schemes and port numbers.
720
720
  #
721
721
  # Do not specify this value for OpenID Connect ID tokens.
722
722
  # @return [String]
data/lib/aws-sdk-sts.rb CHANGED
@@ -50,6 +50,6 @@ require_relative 'aws-sdk-sts/customizations'
50
50
  # @!group service
51
51
  module Aws::STS
52
52
 
53
- GEM_VERSION = '3.127.0'
53
+ GEM_VERSION = '3.128.0'
54
54
 
55
55
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-core
3
3
  version: !ruby/object:Gem::Version
4
- version: 3.127.0
4
+ version: 3.128.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2022-02-24 00:00:00.000000000 Z
11
+ date: 2022-03-04 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: jmespath