aws-sdk-core 3.53.1 → 3.54.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/VERSION +1 -1
- data/lib/aws-sdk-core/log/param_filter.rb +1 -1
- data/lib/aws-sdk-sts.rb +1 -1
- data/lib/aws-sdk-sts/client.rb +39 -45
- data/lib/aws-sdk-sts/types.rb +8 -10
- metadata +2 -2
checksums.yaml
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
---
|
|
2
2
|
SHA1:
|
|
3
|
-
metadata.gz:
|
|
4
|
-
data.tar.gz:
|
|
3
|
+
metadata.gz: '04595a7828c9ea3ecb9f9e7818f0a7f7cde55947'
|
|
4
|
+
data.tar.gz: 0e545e952bf847b829f308cff87a858b3d7c684b
|
|
5
5
|
SHA512:
|
|
6
|
-
metadata.gz:
|
|
7
|
-
data.tar.gz:
|
|
6
|
+
metadata.gz: 709831f76f27d68b8d9b9be58062390ebf9f64eca3ac34c5c0ff59c75ac06868885e0cfd61b0411a56a4e8ca26e15acf38ca653fd161d9b23ea51a503b5f8a68
|
|
7
|
+
data.tar.gz: 4355687a52ce970a8aec7b14d34c138ac97d2a689d7f72a30339f6ec41eff07001500fff563bf47d7a85c566b34adf4cf11297cd6cb909c0d0e7e9a93febbcb5
|
data/VERSION
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
3.
|
|
1
|
+
3.54.0
|
|
@@ -11,7 +11,7 @@ module Aws
|
|
|
11
11
|
#
|
|
12
12
|
# @api private
|
|
13
13
|
# begin
|
|
14
|
-
SENSITIVE = [:access_token, :account_name, :account_password, :address, :admin_contact, :admin_password, :artifact_credentials, :auth_code, :authentication_token, :authorization_result, :backup_plan_tags, :backup_vault_tags, :base_32_string_seed, :body, :bot_configuration, :bot_email, :cause, :client_id, :client_secret, :configuration, :copy_source_sse_customer_key, :credentials, :current_password, :custom_attributes, :db_password, :default_phone_number, :definition, :description, :display_name, :e164_phone_number, :email, :email_address, :email_message, :embed_url, :error, :feedback_token, :file, :first_name, :id, :id_token, :input, :input_text, :key_id, :key_store_password, :kms_key_id, :kms_master_key_id, :lambda_function_arn, :last_name, :local_console_password, :master_account_email, :master_user_password, :message, :name, :new_password, :next_password, :notes, :old_password, :outbound_events_https_endpoint, :output, :owner_information, :parameters, :passphrase, :password, :payload, :phone_number, :plaintext, :previous_password, :primary_email, :primary_provisioned_number, :private_key, :proposed_password, :public_key, :qr_code_png, :query, :recovery_point_tags, :refresh_token, :registrant_contact, :request_attributes, :search_query, :secret_access_key, :secret_binary, :secret_code, :secret_hash, :secret_string, :security_token, :service_password, :session_attributes, :share_notes, :shared_secret, :slots, :sse_customer_key, :ssekms_key_id, :status_message, :tag_key_list, :tags, :task_parameters, :tech_contact, :temporary_password, :text, :token, :trust_password, :upload_credentials, :upload_url, :user_email, :user_name, :username, :value, :values, :variables, :zip_file]
|
|
14
|
+
SENSITIVE = [:access_token, :account_name, :account_password, :address, :admin_contact, :admin_password, :artifact_credentials, :auth_code, :authentication_token, :authorization_result, :backup_plan_tags, :backup_vault_tags, :base_32_string_seed, :body, :bot_configuration, :bot_email, :cause, :client_id, :client_secret, :configuration, :copy_source_sse_customer_key, :credentials, :current_password, :custom_attributes, :db_password, :default_phone_number, :definition, :description, :display_name, :e164_phone_number, :email, :email_address, :email_message, :embed_url, :error, :feedback_token, :file, :first_name, :id, :id_token, :input, :input_text, :key_id, :key_store_password, :kms_key_id, :kms_master_key_id, :lambda_function_arn, :last_name, :local_console_password, :master_account_email, :master_user_password, :message, :name, :new_password, :next_password, :notes, :old_password, :outbound_events_https_endpoint, :output, :owner_information, :parameters, :passphrase, :password, :payload, :phone_number, :plaintext, :previous_password, :primary_email, :primary_provisioned_number, :private_key, :proposed_password, :public_key, :qr_code_png, :query, :recovery_point_tags, :refresh_token, :registrant_contact, :request_attributes, :search_query, :secret_access_key, :secret_binary, :secret_code, :secret_hash, :secret_string, :secret_to_authenticate_initiator, :secret_to_authenticate_target, :security_token, :service_password, :session_attributes, :share_notes, :shared_secret, :slots, :sse_customer_key, :ssekms_key_id, :status_message, :tag_key_list, :tags, :task_parameters, :tech_contact, :temporary_password, :text, :token, :trust_password, :upload_credentials, :upload_url, :user_email, :user_name, :username, :value, :values, :variables, :zip_file]
|
|
15
15
|
# end
|
|
16
16
|
|
|
17
17
|
def initialize(options = {})
|
data/lib/aws-sdk-sts.rb
CHANGED
data/lib/aws-sdk-sts/client.rb
CHANGED
|
@@ -303,7 +303,7 @@ module Aws::STS
|
|
|
303
303
|
# AWS API calls to access resources in the account that owns the role.
|
|
304
304
|
# You cannot use session policies to grant more permissions than those
|
|
305
305
|
# allowed by the identity-based policy of the role that is being
|
|
306
|
-
# assumed. For more information, see [Session Policies][
|
|
306
|
+
# assumed. For more information, see [Session Policies][6] in the *IAM
|
|
307
307
|
# User Guide*.
|
|
308
308
|
#
|
|
309
309
|
# To assume a role from a different account, your AWS account must be
|
|
@@ -326,7 +326,7 @@ module Aws::STS
|
|
|
326
326
|
# In this case, the trust policy acts as an IAM resource-based policy.
|
|
327
327
|
# Users in the same account as the role do not need explicit permission
|
|
328
328
|
# to assume the role. For more information about trust policies and
|
|
329
|
-
# resource-based policies, see [IAM Policies][
|
|
329
|
+
# resource-based policies, see [IAM Policies][7] in the *IAM User
|
|
330
330
|
# Guide*.
|
|
331
331
|
#
|
|
332
332
|
# **Using MFA with AssumeRole**
|
|
@@ -343,7 +343,7 @@ module Aws::STS
|
|
|
343
343
|
#
|
|
344
344
|
# `"Condition": \{"Bool": \{"aws:MultiFactorAuthPresent": true\}\}`
|
|
345
345
|
#
|
|
346
|
-
# For more information, see [Configuring MFA-Protected API Access][
|
|
346
|
+
# For more information, see [Configuring MFA-Protected API Access][8] in
|
|
347
347
|
# the *IAM User Guide* guide.
|
|
348
348
|
#
|
|
349
349
|
# To use MFA with `AssumeRole`, you pass values for the `SerialNumber`
|
|
@@ -359,9 +359,8 @@ module Aws::STS
|
|
|
359
359
|
# [4]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html#id_roles_use_view-role-max-session
|
|
360
360
|
# [5]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html
|
|
361
361
|
# [6]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
|
|
362
|
-
# [7]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
|
363
|
-
# [8]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
|
364
|
-
# [9]: https://docs.aws.amazon.com/IAM/latest/UserGuide/MFAProtectedAPI.html
|
|
362
|
+
# [7]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html
|
|
363
|
+
# [8]: https://docs.aws.amazon.com/IAM/latest/UserGuide/MFAProtectedAPI.html
|
|
365
364
|
#
|
|
366
365
|
# @option params [required, String] :role_arn
|
|
367
366
|
# The Amazon Resource Name (ARN) of the role to assume.
|
|
@@ -415,7 +414,7 @@ module Aws::STS
|
|
|
415
414
|
#
|
|
416
415
|
#
|
|
417
416
|
#
|
|
418
|
-
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
|
417
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
|
|
419
418
|
#
|
|
420
419
|
# @option params [String] :policy
|
|
421
420
|
# An IAM policy in JSON format that you want to use as an inline session
|
|
@@ -449,7 +448,7 @@ module Aws::STS
|
|
|
449
448
|
#
|
|
450
449
|
#
|
|
451
450
|
#
|
|
452
|
-
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
|
451
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
|
|
453
452
|
#
|
|
454
453
|
# @option params [Integer] :duration_seconds
|
|
455
454
|
# The duration, in seconds, of the role session. The value can range
|
|
@@ -640,7 +639,7 @@ module Aws::STS
|
|
|
640
639
|
# AWS API calls to access resources in the account that owns the role.
|
|
641
640
|
# You cannot use session policies to grant more permissions than those
|
|
642
641
|
# allowed by the identity-based policy of the role that is being
|
|
643
|
-
# assumed. For more information, see [Session Policies][
|
|
642
|
+
# assumed. For more information, see [Session Policies][5] in the *IAM
|
|
644
643
|
# User Guide*.
|
|
645
644
|
#
|
|
646
645
|
# Before your application can call `AssumeRoleWithSAML`, you must
|
|
@@ -664,13 +663,13 @@ module Aws::STS
|
|
|
664
663
|
#
|
|
665
664
|
# For more information, see the following resources:
|
|
666
665
|
#
|
|
667
|
-
# * [About SAML 2.0-based Federation][
|
|
666
|
+
# * [About SAML 2.0-based Federation][6] in the *IAM User Guide*.
|
|
668
667
|
#
|
|
669
|
-
# * [Creating SAML Identity Providers][
|
|
668
|
+
# * [Creating SAML Identity Providers][7] in the *IAM User Guide*.
|
|
670
669
|
#
|
|
671
|
-
# * [Configuring a Relying Party and Claims][
|
|
670
|
+
# * [Configuring a Relying Party and Claims][8] in the *IAM User Guide*.
|
|
672
671
|
#
|
|
673
|
-
# * [Creating a Role for SAML 2.0 Federation][
|
|
672
|
+
# * [Creating a Role for SAML 2.0 Federation][9] in the *IAM User
|
|
674
673
|
# Guide*.
|
|
675
674
|
#
|
|
676
675
|
#
|
|
@@ -680,11 +679,10 @@ module Aws::STS
|
|
|
680
679
|
# [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html#id_roles_use_view-role-max-session
|
|
681
680
|
# [4]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html
|
|
682
681
|
# [5]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
|
|
683
|
-
# [6]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
|
684
|
-
# [7]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
|
685
|
-
# [8]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
|
686
|
-
# [9]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
|
687
|
-
# [10]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_create_for-idp_saml.html
|
|
682
|
+
# [6]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_saml.html
|
|
683
|
+
# [7]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_create_saml.html
|
|
684
|
+
# [8]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_create_saml_relying-party.html
|
|
685
|
+
# [9]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_create_for-idp_saml.html
|
|
688
686
|
#
|
|
689
687
|
# @option params [required, String] :role_arn
|
|
690
688
|
# The Amazon Resource Name (ARN) of the role that the caller is
|
|
@@ -736,7 +734,7 @@ module Aws::STS
|
|
|
736
734
|
#
|
|
737
735
|
#
|
|
738
736
|
#
|
|
739
|
-
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
|
737
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
|
|
740
738
|
#
|
|
741
739
|
# @option params [String] :policy
|
|
742
740
|
# An IAM policy in JSON format that you want to use as an inline session
|
|
@@ -770,7 +768,7 @@ module Aws::STS
|
|
|
770
768
|
#
|
|
771
769
|
#
|
|
772
770
|
#
|
|
773
|
-
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
|
771
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
|
|
774
772
|
#
|
|
775
773
|
# @option params [Integer] :duration_seconds
|
|
776
774
|
# The duration, in seconds, of the role session. Your role session lasts
|
|
@@ -917,7 +915,7 @@ module Aws::STS
|
|
|
917
915
|
# AWS API calls to access resources in the account that owns the role.
|
|
918
916
|
# You cannot use session policies to grant more permissions than those
|
|
919
917
|
# allowed by the identity-based policy of the role that is being
|
|
920
|
-
# assumed. For more information, see [Session Policies][
|
|
918
|
+
# assumed. For more information, see [Session Policies][9] in the *IAM
|
|
921
919
|
# User Guide*.
|
|
922
920
|
#
|
|
923
921
|
# Before your application can call `AssumeRoleWithWebIdentity`, you must
|
|
@@ -928,19 +926,19 @@ module Aws::STS
|
|
|
928
926
|
# specified in the role's trust policy.
|
|
929
927
|
#
|
|
930
928
|
# Calling `AssumeRoleWithWebIdentity` can result in an entry in your AWS
|
|
931
|
-
# CloudTrail logs. The entry includes the [Subject][
|
|
929
|
+
# CloudTrail logs. The entry includes the [Subject][10] of the provided
|
|
932
930
|
# Web Identity Token. We recommend that you avoid using any personally
|
|
933
931
|
# identifiable information (PII) in this field. For example, you could
|
|
934
932
|
# instead use a GUID or a pairwise identifier, as [suggested in the OIDC
|
|
935
|
-
# specification][
|
|
933
|
+
# specification][11].
|
|
936
934
|
#
|
|
937
935
|
# For more information about how to use web identity federation and the
|
|
938
936
|
# `AssumeRoleWithWebIdentity` API, see the following resources:
|
|
939
937
|
#
|
|
940
|
-
# * [Using Web Identity Federation API Operations for Mobile Apps][
|
|
941
|
-
# and [Federation Through a Web-based Identity Provider][
|
|
938
|
+
# * [Using Web Identity Federation API Operations for Mobile Apps][12]
|
|
939
|
+
# and [Federation Through a Web-based Identity Provider][13].
|
|
942
940
|
#
|
|
943
|
-
# * [ Web Identity Federation Playground][
|
|
941
|
+
# * [ Web Identity Federation Playground][14]. Walk through the process
|
|
944
942
|
# of authenticating through Login with Amazon, Facebook, or Google,
|
|
945
943
|
# getting temporary security credentials, and then using those
|
|
946
944
|
# credentials to make a request to AWS.
|
|
@@ -951,7 +949,7 @@ module Aws::STS
|
|
|
951
949
|
# information from these providers to get and use temporary security
|
|
952
950
|
# credentials.
|
|
953
951
|
#
|
|
954
|
-
# * [Web Identity Federation with Mobile Applications][
|
|
952
|
+
# * [Web Identity Federation with Mobile Applications][15]. This article
|
|
955
953
|
# discusses web identity federation and shows an example of how to use
|
|
956
954
|
# web identity federation to get access to content in Amazon S3.
|
|
957
955
|
#
|
|
@@ -966,13 +964,12 @@ module Aws::STS
|
|
|
966
964
|
# [7]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html#id_roles_use_view-role-max-session
|
|
967
965
|
# [8]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html
|
|
968
966
|
# [9]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
|
|
969
|
-
# [10]:
|
|
970
|
-
# [11]: http://openid.net/specs/openid-connect-core-1_0.html#
|
|
971
|
-
# [12]:
|
|
972
|
-
# [13]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
|
973
|
-
# [14]: https://
|
|
974
|
-
# [15]:
|
|
975
|
-
# [16]: http://aws.amazon.com/articles/web-identity-federation-with-mobile-applications
|
|
967
|
+
# [10]: http://openid.net/specs/openid-connect-core-1_0.html#Claims
|
|
968
|
+
# [11]: http://openid.net/specs/openid-connect-core-1_0.html#SubjectIDTypes
|
|
969
|
+
# [12]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_oidc_manual.html
|
|
970
|
+
# [13]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#api_assumerolewithwebidentity
|
|
971
|
+
# [14]: https://web-identity-federation-playground.s3.amazonaws.com/index.html
|
|
972
|
+
# [15]: http://aws.amazon.com/articles/web-identity-federation-with-mobile-applications
|
|
976
973
|
#
|
|
977
974
|
# @option params [required, String] :role_arn
|
|
978
975
|
# The Amazon Resource Name (ARN) of the role that the caller is
|
|
@@ -1041,7 +1038,7 @@ module Aws::STS
|
|
|
1041
1038
|
#
|
|
1042
1039
|
#
|
|
1043
1040
|
#
|
|
1044
|
-
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
|
1041
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
|
|
1045
1042
|
#
|
|
1046
1043
|
# @option params [String] :policy
|
|
1047
1044
|
# An IAM policy in JSON format that you want to use as an inline session
|
|
@@ -1075,7 +1072,7 @@ module Aws::STS
|
|
|
1075
1072
|
#
|
|
1076
1073
|
#
|
|
1077
1074
|
#
|
|
1078
|
-
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
|
1075
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
|
|
1079
1076
|
#
|
|
1080
1077
|
# @option params [Integer] :duration_seconds
|
|
1081
1078
|
# The duration, in seconds, of the role session. The value can range
|
|
@@ -1396,9 +1393,9 @@ module Aws::STS
|
|
|
1396
1393
|
# permissions for a federated user. You cannot use session policies to
|
|
1397
1394
|
# grant more permissions than those that are defined in the permissions
|
|
1398
1395
|
# policy of the IAM user. For more information, see [Session
|
|
1399
|
-
# Policies][
|
|
1396
|
+
# Policies][6] in the *IAM User Guide*. For information about using
|
|
1400
1397
|
# `GetFederationToken` to create temporary security credentials, see
|
|
1401
|
-
# [GetFederationToken—Federation Through a Custom Identity Broker][
|
|
1398
|
+
# [GetFederationToken—Federation Through a Custom Identity Broker][7].
|
|
1402
1399
|
#
|
|
1403
1400
|
#
|
|
1404
1401
|
#
|
|
@@ -1408,8 +1405,7 @@ module Aws::STS
|
|
|
1408
1405
|
# [4]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#api_assumerolewithwebidentity
|
|
1409
1406
|
# [5]: https://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html
|
|
1410
1407
|
# [6]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
|
|
1411
|
-
# [7]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
|
1412
|
-
# [8]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#api_getfederationtoken
|
|
1408
|
+
# [7]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#api_getfederationtoken
|
|
1413
1409
|
#
|
|
1414
1410
|
# @option params [required, String] :name
|
|
1415
1411
|
# The name of the federated user. The name is used as an identifier for
|
|
@@ -1443,7 +1439,7 @@ module Aws::STS
|
|
|
1443
1439
|
# you pass. This gives you a way to further restrict the permissions for
|
|
1444
1440
|
# a federated user. You cannot use session policies to grant more
|
|
1445
1441
|
# permissions than those that are defined in the permissions policy of
|
|
1446
|
-
# the IAM user. For more information, see [Session Policies][
|
|
1442
|
+
# the IAM user. For more information, see [Session Policies][1] in the
|
|
1447
1443
|
# *IAM User Guide*.
|
|
1448
1444
|
#
|
|
1449
1445
|
# The plain text that you use for both inline and managed session
|
|
@@ -1465,7 +1461,6 @@ module Aws::STS
|
|
|
1465
1461
|
#
|
|
1466
1462
|
#
|
|
1467
1463
|
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
|
|
1468
|
-
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/IAM/latest/UserGuide/access_policies.html#policies_session
|
|
1469
1464
|
#
|
|
1470
1465
|
# @option params [Array<Types::PolicyDescriptorType>] :policy_arns
|
|
1471
1466
|
# The Amazon Resource Names (ARNs) of the IAM managed policies that you
|
|
@@ -1494,7 +1489,7 @@ module Aws::STS
|
|
|
1494
1489
|
# you pass. This gives you a way to further restrict the permissions for
|
|
1495
1490
|
# a federated user. You cannot use session policies to grant more
|
|
1496
1491
|
# permissions than those that are defined in the permissions policy of
|
|
1497
|
-
# the IAM user. For more information, see [Session Policies][
|
|
1492
|
+
# the IAM user. For more information, see [Session Policies][1] in the
|
|
1498
1493
|
# *IAM User Guide*.
|
|
1499
1494
|
#
|
|
1500
1495
|
# <note markdown="1"> The characters in this parameter count towards the 2048 character
|
|
@@ -1509,7 +1504,6 @@ module Aws::STS
|
|
|
1509
1504
|
#
|
|
1510
1505
|
#
|
|
1511
1506
|
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
|
|
1512
|
-
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/IAM/latest/UserGuide/access_policies.html#policies_session
|
|
1513
1507
|
#
|
|
1514
1508
|
# @option params [Integer] :duration_seconds
|
|
1515
1509
|
# The duration, in seconds, that the session should last. Acceptable
|
|
@@ -1736,7 +1730,7 @@ module Aws::STS
|
|
|
1736
1730
|
params: params,
|
|
1737
1731
|
config: config)
|
|
1738
1732
|
context[:gem_name] = 'aws-sdk-core'
|
|
1739
|
-
context[:gem_version] = '3.
|
|
1733
|
+
context[:gem_version] = '3.54.0'
|
|
1740
1734
|
Seahorse::Client::Request.new(handlers, context)
|
|
1741
1735
|
end
|
|
1742
1736
|
|
data/lib/aws-sdk-sts/types.rb
CHANGED
|
@@ -81,7 +81,7 @@ module Aws::STS
|
|
|
81
81
|
#
|
|
82
82
|
#
|
|
83
83
|
#
|
|
84
|
-
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
|
84
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
|
|
85
85
|
# @return [Array<Types::PolicyDescriptorType>]
|
|
86
86
|
#
|
|
87
87
|
# @!attribute [rw] policy
|
|
@@ -116,7 +116,7 @@ module Aws::STS
|
|
|
116
116
|
#
|
|
117
117
|
#
|
|
118
118
|
#
|
|
119
|
-
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
|
119
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
|
|
120
120
|
# @return [String]
|
|
121
121
|
#
|
|
122
122
|
# @!attribute [rw] duration_seconds
|
|
@@ -321,7 +321,7 @@ module Aws::STS
|
|
|
321
321
|
#
|
|
322
322
|
#
|
|
323
323
|
#
|
|
324
|
-
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
|
324
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
|
|
325
325
|
# @return [Array<Types::PolicyDescriptorType>]
|
|
326
326
|
#
|
|
327
327
|
# @!attribute [rw] policy
|
|
@@ -356,7 +356,7 @@ module Aws::STS
|
|
|
356
356
|
#
|
|
357
357
|
#
|
|
358
358
|
#
|
|
359
|
-
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
|
359
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
|
|
360
360
|
# @return [String]
|
|
361
361
|
#
|
|
362
362
|
# @!attribute [rw] duration_seconds
|
|
@@ -572,7 +572,7 @@ module Aws::STS
|
|
|
572
572
|
#
|
|
573
573
|
#
|
|
574
574
|
#
|
|
575
|
-
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
|
575
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
|
|
576
576
|
# @return [Array<Types::PolicyDescriptorType>]
|
|
577
577
|
#
|
|
578
578
|
# @!attribute [rw] policy
|
|
@@ -607,7 +607,7 @@ module Aws::STS
|
|
|
607
607
|
#
|
|
608
608
|
#
|
|
609
609
|
#
|
|
610
|
-
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
|
610
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
|
|
611
611
|
# @return [String]
|
|
612
612
|
#
|
|
613
613
|
# @!attribute [rw] duration_seconds
|
|
@@ -934,7 +934,7 @@ module Aws::STS
|
|
|
934
934
|
# you pass. This gives you a way to further restrict the permissions
|
|
935
935
|
# for a federated user. You cannot use session policies to grant more
|
|
936
936
|
# permissions than those that are defined in the permissions policy of
|
|
937
|
-
# the IAM user. For more information, see [Session Policies][
|
|
937
|
+
# the IAM user. For more information, see [Session Policies][1] in the
|
|
938
938
|
# *IAM User Guide*.
|
|
939
939
|
#
|
|
940
940
|
# The plain text that you use for both inline and managed session
|
|
@@ -956,7 +956,6 @@ module Aws::STS
|
|
|
956
956
|
#
|
|
957
957
|
#
|
|
958
958
|
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
|
|
959
|
-
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/IAM/latest/UserGuide/access_policies.html#policies_session
|
|
960
959
|
# @return [String]
|
|
961
960
|
#
|
|
962
961
|
# @!attribute [rw] policy_arns
|
|
@@ -988,7 +987,7 @@ module Aws::STS
|
|
|
988
987
|
# you pass. This gives you a way to further restrict the permissions
|
|
989
988
|
# for a federated user. You cannot use session policies to grant more
|
|
990
989
|
# permissions than those that are defined in the permissions policy of
|
|
991
|
-
# the IAM user. For more information, see [Session Policies][
|
|
990
|
+
# the IAM user. For more information, see [Session Policies][1] in the
|
|
992
991
|
# *IAM User Guide*.
|
|
993
992
|
#
|
|
994
993
|
# <note markdown="1"> The characters in this parameter count towards the 2048 character
|
|
@@ -1003,7 +1002,6 @@ module Aws::STS
|
|
|
1003
1002
|
#
|
|
1004
1003
|
#
|
|
1005
1004
|
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
|
|
1006
|
-
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/IAM/latest/UserGuide/access_policies.html#policies_session
|
|
1007
1005
|
# @return [Array<Types::PolicyDescriptorType>]
|
|
1008
1006
|
#
|
|
1009
1007
|
# @!attribute [rw] duration_seconds
|
metadata
CHANGED
|
@@ -1,14 +1,14 @@
|
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
|
2
2
|
name: aws-sdk-core
|
|
3
3
|
version: !ruby/object:Gem::Version
|
|
4
|
-
version: 3.
|
|
4
|
+
version: 3.54.0
|
|
5
5
|
platform: ruby
|
|
6
6
|
authors:
|
|
7
7
|
- Amazon Web Services
|
|
8
8
|
autorequire:
|
|
9
9
|
bindir: bin
|
|
10
10
|
cert_chain: []
|
|
11
|
-
date: 2019-05-
|
|
11
|
+
date: 2019-05-28 00:00:00.000000000 Z
|
|
12
12
|
dependencies:
|
|
13
13
|
- !ruby/object:Gem::Dependency
|
|
14
14
|
name: jmespath
|