aws-sdk-core 3.127.0 → 3.128.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 918c0204898bdad127acf619312dbce114cb19cc5c33e072548ac948c85c34a8
4
- data.tar.gz: 79b434c6e925efbf6c8921a915aa20171a702cfd89bfd9caee27739017a46978
3
+ metadata.gz: 1cf93a52549a583ebf666ac76c7c9243e3068ff7c3e2bd18051ed14d6b2dda36
4
+ data.tar.gz: c5dd331a95e8437164d33537b0e415de2d74dacc596f2e7675124bd1afded021
5
5
  SHA512:
6
- metadata.gz: 51b4885b28f643ae32d0765fd5ca08f565cd60235c4d21e2b432710353afd1d25c957c7e0fd462c489263272f809b2dedbd4803eaa7b26266738bee764b5c2e4
7
- data.tar.gz: dc8671e28caf0a7dcf0cef57ef25e35a8b6ed846d428e8c80aec1c6cb14b9b24e62705e231d497c917254202a4588ea8379b451457a2c6e2f292a66edf1df0cd
6
+ metadata.gz: 4b35894b76ba7531148db72002bbad246a2617a8ec412426520002ef10f82e91b7b89d0cb99cea33b2123a9a7641c98cf4d97769cbccd8c6e6f7bbf5ae4fbb98
7
+ data.tar.gz: e0818ff963cf8f516a741348d625099c4f3a1d70ad5f30a8722a152f77e251d08a5411eae07a5840b718d636d0eb486a2ea59c6f968d0550bf4e230564baa763
data/CHANGELOG.md CHANGED
@@ -1,6 +1,11 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 3.128.0 (2022-03-04)
5
+ ------------------
6
+
7
+ * Feature - Updated Aws::STS::Client with the latest API changes.
8
+
4
9
  3.127.0 (2022-02-24)
5
10
  ------------------
6
11
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 3.127.0
1
+ 3.128.0
@@ -545,7 +545,7 @@ module Aws::SSO
545
545
  params: params,
546
546
  config: config)
547
547
  context[:gem_name] = 'aws-sdk-core'
548
- context[:gem_version] = '3.127.0'
548
+ context[:gem_version] = '3.128.0'
549
549
  Seahorse::Client::Request.new(handlers, context)
550
550
  end
551
551
 
data/lib/aws-sdk-sso.rb CHANGED
@@ -50,6 +50,6 @@ require_relative 'aws-sdk-sso/customizations'
50
50
  # @!group service
51
51
  module Aws::SSO
52
52
 
53
- GEM_VERSION = '3.127.0'
53
+ GEM_VERSION = '3.128.0'
54
54
 
55
55
  end
@@ -641,7 +641,7 @@ module Aws::STS
641
641
  #
642
642
  # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html
643
643
  # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-limits.html#reference_iam-limits-entity-length
644
- # [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/session-tags.html#id_session-tags_ctlogs
644
+ # [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html#id_session-tags_ctlogs
645
645
  #
646
646
  # @option params [Array<String>] :transitive_tag_keys
647
647
  # A list of keys for session tags that you want to set as transitive. If
@@ -1179,19 +1179,20 @@ module Aws::STS
1179
1179
 
1180
1180
  # Returns a set of temporary security credentials for users who have
1181
1181
  # been authenticated in a mobile or web application with a web identity
1182
- # provider. Example providers include Amazon Cognito, Login with Amazon,
1183
- # Facebook, Google, or any OpenID Connect-compatible identity provider.
1182
+ # provider. Example providers include the OAuth 2.0 providers Login with
1183
+ # Amazon and Facebook, or any OpenID Connect-compatible identity
1184
+ # provider such as Google or [Amazon Cognito federated identities][1].
1184
1185
  #
1185
1186
  # <note markdown="1"> For mobile applications, we recommend that you use Amazon Cognito. You
1186
1187
  # can use Amazon Cognito with the [Amazon Web Services SDK for iOS
1187
- # Developer Guide][1] and the [Amazon Web Services SDK for Android
1188
- # Developer Guide][2] to uniquely identify a user. You can also supply
1188
+ # Developer Guide][2] and the [Amazon Web Services SDK for Android
1189
+ # Developer Guide][3] to uniquely identify a user. You can also supply
1189
1190
  # the user with a consistent identity throughout the lifetime of an
1190
1191
  # application.
1191
1192
  #
1192
- # To learn more about Amazon Cognito, see [Amazon Cognito Overview][3]
1193
+ # To learn more about Amazon Cognito, see [Amazon Cognito Overview][4]
1193
1194
  # in *Amazon Web Services SDK for Android Developer Guide* and [Amazon
1194
- # Cognito Overview][4] in the *Amazon Web Services SDK for iOS Developer
1195
+ # Cognito Overview][5] in the *Amazon Web Services SDK for iOS Developer
1195
1196
  # Guide*.
1196
1197
  #
1197
1198
  # </note>
@@ -1206,8 +1207,8 @@ module Aws::STS
1206
1207
  # a token from the web identity provider. For a comparison of
1207
1208
  # `AssumeRoleWithWebIdentity` with the other API operations that produce
1208
1209
  # temporary credentials, see [Requesting Temporary Security
1209
- # Credentials][5] and [Comparing the Amazon Web Services STS API
1210
- # operations][6] in the *IAM User Guide*.
1210
+ # Credentials][6] and [Comparing the Amazon Web Services STS API
1211
+ # operations][7] in the *IAM User Guide*.
1211
1212
  #
1212
1213
  # The temporary security credentials returned by this API consist of an
1213
1214
  # access key ID, a secret access key, and a security token. Applications
@@ -1223,11 +1224,11 @@ module Aws::STS
1223
1224
  # to the maximum session duration setting for the role. This setting can
1224
1225
  # have a value from 1 hour to 12 hours. To learn how to view the maximum
1225
1226
  # value for your role, see [View the Maximum Session Duration Setting
1226
- # for a Role][7] in the *IAM User Guide*. The maximum session duration
1227
+ # for a Role][8] in the *IAM User Guide*. The maximum session duration
1227
1228
  # limit applies when you use the `AssumeRole*` API operations or the
1228
1229
  # `assume-role*` CLI commands. However the limit does not apply when you
1229
1230
  # use those operations to create a console URL. For more information,
1230
- # see [Using IAM Roles][8] in the *IAM User Guide*.
1231
+ # see [Using IAM Roles][9] in the *IAM User Guide*.
1231
1232
  #
1232
1233
  # **Permissions**
1233
1234
  #
@@ -1236,7 +1237,7 @@ module Aws::STS
1236
1237
  # Amazon Web Services service with the following exception: you cannot
1237
1238
  # call the STS `GetFederationToken` or `GetSessionToken` API operations.
1238
1239
  #
1239
- # (Optional) You can pass inline or managed [session policies][9] to
1240
+ # (Optional) You can pass inline or managed [session policies][10] to
1240
1241
  # this operation. You can pass a single JSON policy document to use as
1241
1242
  # an inline session policy. You can also specify up to 10 managed
1242
1243
  # policies to use as managed session policies. The plaintext that you
@@ -1248,7 +1249,7 @@ module Aws::STS
1248
1249
  # Services API calls to access resources in the account that owns the
1249
1250
  # role. You cannot use session policies to grant more permissions than
1250
1251
  # those allowed by the identity-based policy of the role that is being
1251
- # assumed. For more information, see [Session Policies][9] in the *IAM
1252
+ # assumed. For more information, see [Session Policies][10] in the *IAM
1252
1253
  # User Guide*.
1253
1254
  #
1254
1255
  # **Tags**
@@ -1256,12 +1257,12 @@ module Aws::STS
1256
1257
  # (Optional) You can configure your IdP to pass attributes into your web
1257
1258
  # identity token as session tags. Each session tag consists of a key
1258
1259
  # name and an associated value. For more information about session tags,
1259
- # see [Passing Session Tags in STS][10] in the *IAM User Guide*.
1260
+ # see [Passing Session Tags in STS][11] in the *IAM User Guide*.
1260
1261
  #
1261
1262
  # You can pass up to 50 session tags. The plaintext session tag keys
1262
1263
  # can’t exceed 128 characters and the values can’t exceed 256
1263
1264
  # characters. For these and additional limits, see [IAM and STS
1264
- # Character Limits][11] in the *IAM User Guide*.
1265
+ # Character Limits][12] in the *IAM User Guide*.
1265
1266
  #
1266
1267
  # <note markdown="1"> An Amazon Web Services conversion compresses the passed session
1267
1268
  # policies and session tags into a packed binary format that has a
@@ -1279,12 +1280,12 @@ module Aws::STS
1279
1280
  # An administrator must grant you the permissions necessary to pass
1280
1281
  # session tags. The administrator can also create granular permissions
1281
1282
  # to allow you to pass only specific session tags. For more information,
1282
- # see [Tutorial: Using Tags for Attribute-Based Access Control][12] in
1283
+ # see [Tutorial: Using Tags for Attribute-Based Access Control][13] in
1283
1284
  # the *IAM User Guide*.
1284
1285
  #
1285
1286
  # You can set the session tags as transitive. Transitive tags persist
1286
1287
  # during role chaining. For more information, see [Chaining Roles with
1287
- # Session Tags][13] in the *IAM User Guide*.
1288
+ # Session Tags][14] in the *IAM User Guide*.
1288
1289
  #
1289
1290
  # **Identities**
1290
1291
  #
@@ -1296,54 +1297,55 @@ module Aws::STS
1296
1297
  # specified in the role's trust policy.
1297
1298
  #
1298
1299
  # Calling `AssumeRoleWithWebIdentity` can result in an entry in your
1299
- # CloudTrail logs. The entry includes the [Subject][14] of the provided
1300
+ # CloudTrail logs. The entry includes the [Subject][15] of the provided
1300
1301
  # web identity token. We recommend that you avoid using any personally
1301
1302
  # identifiable information (PII) in this field. For example, you could
1302
1303
  # instead use a GUID or a pairwise identifier, as [suggested in the OIDC
1303
- # specification][15].
1304
+ # specification][16].
1304
1305
  #
1305
1306
  # For more information about how to use web identity federation and the
1306
1307
  # `AssumeRoleWithWebIdentity` API, see the following resources:
1307
1308
  #
1308
- # * [Using Web Identity Federation API Operations for Mobile Apps][16]
1309
- # and [Federation Through a Web-based Identity Provider][17].
1309
+ # * [Using Web Identity Federation API Operations for Mobile Apps][17]
1310
+ # and [Federation Through a Web-based Identity Provider][18].
1310
1311
  #
1311
- # * [ Web Identity Federation Playground][18]. Walk through the process
1312
+ # * [ Web Identity Federation Playground][19]. Walk through the process
1312
1313
  # of authenticating through Login with Amazon, Facebook, or Google,
1313
1314
  # getting temporary security credentials, and then using those
1314
1315
  # credentials to make a request to Amazon Web Services.
1315
1316
  #
1316
- # * [Amazon Web Services SDK for iOS Developer Guide][1] and [Amazon Web
1317
- # Services SDK for Android Developer Guide][2]. These toolkits contain
1317
+ # * [Amazon Web Services SDK for iOS Developer Guide][2] and [Amazon Web
1318
+ # Services SDK for Android Developer Guide][3]. These toolkits contain
1318
1319
  # sample apps that show how to invoke the identity providers. The
1319
1320
  # toolkits then show how to use the information from these providers
1320
1321
  # to get and use temporary security credentials.
1321
1322
  #
1322
- # * [Web Identity Federation with Mobile Applications][19]. This article
1323
+ # * [Web Identity Federation with Mobile Applications][20]. This article
1323
1324
  # discusses web identity federation and shows an example of how to use
1324
1325
  # web identity federation to get access to content in Amazon S3.
1325
1326
  #
1326
1327
  #
1327
1328
  #
1328
- # [1]: http://aws.amazon.com/sdkforios/
1329
- # [2]: http://aws.amazon.com/sdkforandroid/
1330
- # [3]: https://docs.aws.amazon.com/mobile/sdkforandroid/developerguide/cognito-auth.html#d0e840
1331
- # [4]: https://docs.aws.amazon.com/mobile/sdkforios/developerguide/cognito-auth.html#d0e664
1332
- # [5]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html
1333
- # [6]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#stsapi_comparison
1334
- # [7]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html#id_roles_use_view-role-max-session
1335
- # [8]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html
1336
- # [9]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
1337
- # [10]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html
1338
- # [11]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-limits.html#reference_iam-limits-entity-length
1339
- # [12]: https://docs.aws.amazon.com/IAM/latest/UserGuide/tutorial_attribute-based-access-control.html
1340
- # [13]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html#id_session-tags_role-chaining
1341
- # [14]: http://openid.net/specs/openid-connect-core-1_0.html#Claims
1342
- # [15]: http://openid.net/specs/openid-connect-core-1_0.html#SubjectIDTypes
1343
- # [16]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_oidc_manual.html
1344
- # [17]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#api_assumerolewithwebidentity
1345
- # [18]: https://aws.amazon.com/blogs/aws/the-aws-web-identity-federation-playground/
1346
- # [19]: http://aws.amazon.com/articles/web-identity-federation-with-mobile-applications
1329
+ # [1]: https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-identity.html
1330
+ # [2]: http://aws.amazon.com/sdkforios/
1331
+ # [3]: http://aws.amazon.com/sdkforandroid/
1332
+ # [4]: https://docs.aws.amazon.com/mobile/sdkforandroid/developerguide/cognito-auth.html#d0e840
1333
+ # [5]: https://docs.aws.amazon.com/mobile/sdkforios/developerguide/cognito-auth.html#d0e664
1334
+ # [6]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html
1335
+ # [7]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#stsapi_comparison
1336
+ # [8]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html#id_roles_use_view-role-max-session
1337
+ # [9]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html
1338
+ # [10]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
1339
+ # [11]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html
1340
+ # [12]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-limits.html#reference_iam-limits-entity-length
1341
+ # [13]: https://docs.aws.amazon.com/IAM/latest/UserGuide/tutorial_attribute-based-access-control.html
1342
+ # [14]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html#id_session-tags_role-chaining
1343
+ # [15]: http://openid.net/specs/openid-connect-core-1_0.html#Claims
1344
+ # [16]: http://openid.net/specs/openid-connect-core-1_0.html#SubjectIDTypes
1345
+ # [17]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_oidc_manual.html
1346
+ # [18]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#api_assumerolewithwebidentity
1347
+ # [19]: https://aws.amazon.com/blogs/aws/the-aws-web-identity-federation-playground/
1348
+ # [20]: http://aws.amazon.com/articles/web-identity-federation-with-mobile-applications
1347
1349
  #
1348
1350
  # @option params [required, String] :role_arn
1349
1351
  # The Amazon Resource Name (ARN) of the role that the caller is
@@ -1370,13 +1372,13 @@ module Aws::STS
1370
1372
  # `AssumeRoleWithWebIdentity` call.
1371
1373
  #
1372
1374
  # @option params [String] :provider_id
1373
- # The fully qualified host component of the domain name of the identity
1374
- # provider.
1375
+ # The fully qualified host component of the domain name of the OAuth 2.0
1376
+ # identity provider. Do not specify this value for an OpenID Connect
1377
+ # identity provider.
1375
1378
  #
1376
- # Specify this value only for OAuth 2.0 access tokens. Currently
1377
- # `www.amazon.com` and `graph.facebook.com` are the only supported
1378
- # identity providers for OAuth 2.0 access tokens. Do not include URL
1379
- # schemes and port numbers.
1379
+ # Currently `www.amazon.com` and `graph.facebook.com` are the only
1380
+ # supported identity providers for OAuth 2.0 access tokens. Do not
1381
+ # include URL schemes and port numbers.
1380
1382
  #
1381
1383
  # Do not specify this value for OpenID Connect ID tokens.
1382
1384
  #
@@ -2288,7 +2290,7 @@ module Aws::STS
2288
2290
  params: params,
2289
2291
  config: config)
2290
2292
  context[:gem_name] = 'aws-sdk-core'
2291
- context[:gem_version] = '3.127.0'
2293
+ context[:gem_version] = '3.128.0'
2292
2294
  Seahorse::Client::Request.new(handlers, context)
2293
2295
  end
2294
2296
 
@@ -213,7 +213,7 @@ module Aws::STS
213
213
  #
214
214
  # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html
215
215
  # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-limits.html#reference_iam-limits-entity-length
216
- # [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/session-tags.html#id_session-tags_ctlogs
216
+ # [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html#id_session-tags_ctlogs
217
217
  # @return [Array<Types::Tag>]
218
218
  #
219
219
  # @!attribute [rw] transitive_tag_keys
@@ -710,13 +710,13 @@ module Aws::STS
710
710
  # @return [String]
711
711
  #
712
712
  # @!attribute [rw] provider_id
713
- # The fully qualified host component of the domain name of the
714
- # identity provider.
713
+ # The fully qualified host component of the domain name of the OAuth
714
+ # 2.0 identity provider. Do not specify this value for an OpenID
715
+ # Connect identity provider.
715
716
  #
716
- # Specify this value only for OAuth 2.0 access tokens. Currently
717
- # `www.amazon.com` and `graph.facebook.com` are the only supported
718
- # identity providers for OAuth 2.0 access tokens. Do not include URL
719
- # schemes and port numbers.
717
+ # Currently `www.amazon.com` and `graph.facebook.com` are the only
718
+ # supported identity providers for OAuth 2.0 access tokens. Do not
719
+ # include URL schemes and port numbers.
720
720
  #
721
721
  # Do not specify this value for OpenID Connect ID tokens.
722
722
  # @return [String]
data/lib/aws-sdk-sts.rb CHANGED
@@ -50,6 +50,6 @@ require_relative 'aws-sdk-sts/customizations'
50
50
  # @!group service
51
51
  module Aws::STS
52
52
 
53
- GEM_VERSION = '3.127.0'
53
+ GEM_VERSION = '3.128.0'
54
54
 
55
55
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-core
3
3
  version: !ruby/object:Gem::Version
4
- version: 3.127.0
4
+ version: 3.128.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2022-02-24 00:00:00.000000000 Z
11
+ date: 2022-03-04 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: jmespath