aws-sdk-core 3.53.1 → 3.54.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/VERSION +1 -1
- data/lib/aws-sdk-core/log/param_filter.rb +1 -1
- data/lib/aws-sdk-sts.rb +1 -1
- data/lib/aws-sdk-sts/client.rb +39 -45
- data/lib/aws-sdk-sts/types.rb +8 -10
- metadata +2 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA1:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: '04595a7828c9ea3ecb9f9e7818f0a7f7cde55947'
|
4
|
+
data.tar.gz: 0e545e952bf847b829f308cff87a858b3d7c684b
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 709831f76f27d68b8d9b9be58062390ebf9f64eca3ac34c5c0ff59c75ac06868885e0cfd61b0411a56a4e8ca26e15acf38ca653fd161d9b23ea51a503b5f8a68
|
7
|
+
data.tar.gz: 4355687a52ce970a8aec7b14d34c138ac97d2a689d7f72a30339f6ec41eff07001500fff563bf47d7a85c566b34adf4cf11297cd6cb909c0d0e7e9a93febbcb5
|
data/VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
3.
|
1
|
+
3.54.0
|
@@ -11,7 +11,7 @@ module Aws
|
|
11
11
|
#
|
12
12
|
# @api private
|
13
13
|
# begin
|
14
|
-
SENSITIVE = [:access_token, :account_name, :account_password, :address, :admin_contact, :admin_password, :artifact_credentials, :auth_code, :authentication_token, :authorization_result, :backup_plan_tags, :backup_vault_tags, :base_32_string_seed, :body, :bot_configuration, :bot_email, :cause, :client_id, :client_secret, :configuration, :copy_source_sse_customer_key, :credentials, :current_password, :custom_attributes, :db_password, :default_phone_number, :definition, :description, :display_name, :e164_phone_number, :email, :email_address, :email_message, :embed_url, :error, :feedback_token, :file, :first_name, :id, :id_token, :input, :input_text, :key_id, :key_store_password, :kms_key_id, :kms_master_key_id, :lambda_function_arn, :last_name, :local_console_password, :master_account_email, :master_user_password, :message, :name, :new_password, :next_password, :notes, :old_password, :outbound_events_https_endpoint, :output, :owner_information, :parameters, :passphrase, :password, :payload, :phone_number, :plaintext, :previous_password, :primary_email, :primary_provisioned_number, :private_key, :proposed_password, :public_key, :qr_code_png, :query, :recovery_point_tags, :refresh_token, :registrant_contact, :request_attributes, :search_query, :secret_access_key, :secret_binary, :secret_code, :secret_hash, :secret_string, :security_token, :service_password, :session_attributes, :share_notes, :shared_secret, :slots, :sse_customer_key, :ssekms_key_id, :status_message, :tag_key_list, :tags, :task_parameters, :tech_contact, :temporary_password, :text, :token, :trust_password, :upload_credentials, :upload_url, :user_email, :user_name, :username, :value, :values, :variables, :zip_file]
|
14
|
+
SENSITIVE = [:access_token, :account_name, :account_password, :address, :admin_contact, :admin_password, :artifact_credentials, :auth_code, :authentication_token, :authorization_result, :backup_plan_tags, :backup_vault_tags, :base_32_string_seed, :body, :bot_configuration, :bot_email, :cause, :client_id, :client_secret, :configuration, :copy_source_sse_customer_key, :credentials, :current_password, :custom_attributes, :db_password, :default_phone_number, :definition, :description, :display_name, :e164_phone_number, :email, :email_address, :email_message, :embed_url, :error, :feedback_token, :file, :first_name, :id, :id_token, :input, :input_text, :key_id, :key_store_password, :kms_key_id, :kms_master_key_id, :lambda_function_arn, :last_name, :local_console_password, :master_account_email, :master_user_password, :message, :name, :new_password, :next_password, :notes, :old_password, :outbound_events_https_endpoint, :output, :owner_information, :parameters, :passphrase, :password, :payload, :phone_number, :plaintext, :previous_password, :primary_email, :primary_provisioned_number, :private_key, :proposed_password, :public_key, :qr_code_png, :query, :recovery_point_tags, :refresh_token, :registrant_contact, :request_attributes, :search_query, :secret_access_key, :secret_binary, :secret_code, :secret_hash, :secret_string, :secret_to_authenticate_initiator, :secret_to_authenticate_target, :security_token, :service_password, :session_attributes, :share_notes, :shared_secret, :slots, :sse_customer_key, :ssekms_key_id, :status_message, :tag_key_list, :tags, :task_parameters, :tech_contact, :temporary_password, :text, :token, :trust_password, :upload_credentials, :upload_url, :user_email, :user_name, :username, :value, :values, :variables, :zip_file]
|
15
15
|
# end
|
16
16
|
|
17
17
|
def initialize(options = {})
|
data/lib/aws-sdk-sts.rb
CHANGED
data/lib/aws-sdk-sts/client.rb
CHANGED
@@ -303,7 +303,7 @@ module Aws::STS
|
|
303
303
|
# AWS API calls to access resources in the account that owns the role.
|
304
304
|
# You cannot use session policies to grant more permissions than those
|
305
305
|
# allowed by the identity-based policy of the role that is being
|
306
|
-
# assumed. For more information, see [Session Policies][
|
306
|
+
# assumed. For more information, see [Session Policies][6] in the *IAM
|
307
307
|
# User Guide*.
|
308
308
|
#
|
309
309
|
# To assume a role from a different account, your AWS account must be
|
@@ -326,7 +326,7 @@ module Aws::STS
|
|
326
326
|
# In this case, the trust policy acts as an IAM resource-based policy.
|
327
327
|
# Users in the same account as the role do not need explicit permission
|
328
328
|
# to assume the role. For more information about trust policies and
|
329
|
-
# resource-based policies, see [IAM Policies][
|
329
|
+
# resource-based policies, see [IAM Policies][7] in the *IAM User
|
330
330
|
# Guide*.
|
331
331
|
#
|
332
332
|
# **Using MFA with AssumeRole**
|
@@ -343,7 +343,7 @@ module Aws::STS
|
|
343
343
|
#
|
344
344
|
# `"Condition": \{"Bool": \{"aws:MultiFactorAuthPresent": true\}\}`
|
345
345
|
#
|
346
|
-
# For more information, see [Configuring MFA-Protected API Access][
|
346
|
+
# For more information, see [Configuring MFA-Protected API Access][8] in
|
347
347
|
# the *IAM User Guide* guide.
|
348
348
|
#
|
349
349
|
# To use MFA with `AssumeRole`, you pass values for the `SerialNumber`
|
@@ -359,9 +359,8 @@ module Aws::STS
|
|
359
359
|
# [4]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html#id_roles_use_view-role-max-session
|
360
360
|
# [5]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html
|
361
361
|
# [6]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
|
362
|
-
# [7]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
363
|
-
# [8]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
364
|
-
# [9]: https://docs.aws.amazon.com/IAM/latest/UserGuide/MFAProtectedAPI.html
|
362
|
+
# [7]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html
|
363
|
+
# [8]: https://docs.aws.amazon.com/IAM/latest/UserGuide/MFAProtectedAPI.html
|
365
364
|
#
|
366
365
|
# @option params [required, String] :role_arn
|
367
366
|
# The Amazon Resource Name (ARN) of the role to assume.
|
@@ -415,7 +414,7 @@ module Aws::STS
|
|
415
414
|
#
|
416
415
|
#
|
417
416
|
#
|
418
|
-
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
417
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
|
419
418
|
#
|
420
419
|
# @option params [String] :policy
|
421
420
|
# An IAM policy in JSON format that you want to use as an inline session
|
@@ -449,7 +448,7 @@ module Aws::STS
|
|
449
448
|
#
|
450
449
|
#
|
451
450
|
#
|
452
|
-
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
451
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
|
453
452
|
#
|
454
453
|
# @option params [Integer] :duration_seconds
|
455
454
|
# The duration, in seconds, of the role session. The value can range
|
@@ -640,7 +639,7 @@ module Aws::STS
|
|
640
639
|
# AWS API calls to access resources in the account that owns the role.
|
641
640
|
# You cannot use session policies to grant more permissions than those
|
642
641
|
# allowed by the identity-based policy of the role that is being
|
643
|
-
# assumed. For more information, see [Session Policies][
|
642
|
+
# assumed. For more information, see [Session Policies][5] in the *IAM
|
644
643
|
# User Guide*.
|
645
644
|
#
|
646
645
|
# Before your application can call `AssumeRoleWithSAML`, you must
|
@@ -664,13 +663,13 @@ module Aws::STS
|
|
664
663
|
#
|
665
664
|
# For more information, see the following resources:
|
666
665
|
#
|
667
|
-
# * [About SAML 2.0-based Federation][
|
666
|
+
# * [About SAML 2.0-based Federation][6] in the *IAM User Guide*.
|
668
667
|
#
|
669
|
-
# * [Creating SAML Identity Providers][
|
668
|
+
# * [Creating SAML Identity Providers][7] in the *IAM User Guide*.
|
670
669
|
#
|
671
|
-
# * [Configuring a Relying Party and Claims][
|
670
|
+
# * [Configuring a Relying Party and Claims][8] in the *IAM User Guide*.
|
672
671
|
#
|
673
|
-
# * [Creating a Role for SAML 2.0 Federation][
|
672
|
+
# * [Creating a Role for SAML 2.0 Federation][9] in the *IAM User
|
674
673
|
# Guide*.
|
675
674
|
#
|
676
675
|
#
|
@@ -680,11 +679,10 @@ module Aws::STS
|
|
680
679
|
# [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html#id_roles_use_view-role-max-session
|
681
680
|
# [4]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html
|
682
681
|
# [5]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
|
683
|
-
# [6]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
684
|
-
# [7]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
685
|
-
# [8]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
686
|
-
# [9]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
687
|
-
# [10]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_create_for-idp_saml.html
|
682
|
+
# [6]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_saml.html
|
683
|
+
# [7]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_create_saml.html
|
684
|
+
# [8]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_create_saml_relying-party.html
|
685
|
+
# [9]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_create_for-idp_saml.html
|
688
686
|
#
|
689
687
|
# @option params [required, String] :role_arn
|
690
688
|
# The Amazon Resource Name (ARN) of the role that the caller is
|
@@ -736,7 +734,7 @@ module Aws::STS
|
|
736
734
|
#
|
737
735
|
#
|
738
736
|
#
|
739
|
-
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
737
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
|
740
738
|
#
|
741
739
|
# @option params [String] :policy
|
742
740
|
# An IAM policy in JSON format that you want to use as an inline session
|
@@ -770,7 +768,7 @@ module Aws::STS
|
|
770
768
|
#
|
771
769
|
#
|
772
770
|
#
|
773
|
-
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
771
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
|
774
772
|
#
|
775
773
|
# @option params [Integer] :duration_seconds
|
776
774
|
# The duration, in seconds, of the role session. Your role session lasts
|
@@ -917,7 +915,7 @@ module Aws::STS
|
|
917
915
|
# AWS API calls to access resources in the account that owns the role.
|
918
916
|
# You cannot use session policies to grant more permissions than those
|
919
917
|
# allowed by the identity-based policy of the role that is being
|
920
|
-
# assumed. For more information, see [Session Policies][
|
918
|
+
# assumed. For more information, see [Session Policies][9] in the *IAM
|
921
919
|
# User Guide*.
|
922
920
|
#
|
923
921
|
# Before your application can call `AssumeRoleWithWebIdentity`, you must
|
@@ -928,19 +926,19 @@ module Aws::STS
|
|
928
926
|
# specified in the role's trust policy.
|
929
927
|
#
|
930
928
|
# Calling `AssumeRoleWithWebIdentity` can result in an entry in your AWS
|
931
|
-
# CloudTrail logs. The entry includes the [Subject][
|
929
|
+
# CloudTrail logs. The entry includes the [Subject][10] of the provided
|
932
930
|
# Web Identity Token. We recommend that you avoid using any personally
|
933
931
|
# identifiable information (PII) in this field. For example, you could
|
934
932
|
# instead use a GUID or a pairwise identifier, as [suggested in the OIDC
|
935
|
-
# specification][
|
933
|
+
# specification][11].
|
936
934
|
#
|
937
935
|
# For more information about how to use web identity federation and the
|
938
936
|
# `AssumeRoleWithWebIdentity` API, see the following resources:
|
939
937
|
#
|
940
|
-
# * [Using Web Identity Federation API Operations for Mobile Apps][
|
941
|
-
# and [Federation Through a Web-based Identity Provider][
|
938
|
+
# * [Using Web Identity Federation API Operations for Mobile Apps][12]
|
939
|
+
# and [Federation Through a Web-based Identity Provider][13].
|
942
940
|
#
|
943
|
-
# * [ Web Identity Federation Playground][
|
941
|
+
# * [ Web Identity Federation Playground][14]. Walk through the process
|
944
942
|
# of authenticating through Login with Amazon, Facebook, or Google,
|
945
943
|
# getting temporary security credentials, and then using those
|
946
944
|
# credentials to make a request to AWS.
|
@@ -951,7 +949,7 @@ module Aws::STS
|
|
951
949
|
# information from these providers to get and use temporary security
|
952
950
|
# credentials.
|
953
951
|
#
|
954
|
-
# * [Web Identity Federation with Mobile Applications][
|
952
|
+
# * [Web Identity Federation with Mobile Applications][15]. This article
|
955
953
|
# discusses web identity federation and shows an example of how to use
|
956
954
|
# web identity federation to get access to content in Amazon S3.
|
957
955
|
#
|
@@ -966,13 +964,12 @@ module Aws::STS
|
|
966
964
|
# [7]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html#id_roles_use_view-role-max-session
|
967
965
|
# [8]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html
|
968
966
|
# [9]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
|
969
|
-
# [10]:
|
970
|
-
# [11]: http://openid.net/specs/openid-connect-core-1_0.html#
|
971
|
-
# [12]:
|
972
|
-
# [13]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
973
|
-
# [14]: https://
|
974
|
-
# [15]:
|
975
|
-
# [16]: http://aws.amazon.com/articles/web-identity-federation-with-mobile-applications
|
967
|
+
# [10]: http://openid.net/specs/openid-connect-core-1_0.html#Claims
|
968
|
+
# [11]: http://openid.net/specs/openid-connect-core-1_0.html#SubjectIDTypes
|
969
|
+
# [12]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_oidc_manual.html
|
970
|
+
# [13]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#api_assumerolewithwebidentity
|
971
|
+
# [14]: https://web-identity-federation-playground.s3.amazonaws.com/index.html
|
972
|
+
# [15]: http://aws.amazon.com/articles/web-identity-federation-with-mobile-applications
|
976
973
|
#
|
977
974
|
# @option params [required, String] :role_arn
|
978
975
|
# The Amazon Resource Name (ARN) of the role that the caller is
|
@@ -1041,7 +1038,7 @@ module Aws::STS
|
|
1041
1038
|
#
|
1042
1039
|
#
|
1043
1040
|
#
|
1044
|
-
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
1041
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
|
1045
1042
|
#
|
1046
1043
|
# @option params [String] :policy
|
1047
1044
|
# An IAM policy in JSON format that you want to use as an inline session
|
@@ -1075,7 +1072,7 @@ module Aws::STS
|
|
1075
1072
|
#
|
1076
1073
|
#
|
1077
1074
|
#
|
1078
|
-
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
1075
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
|
1079
1076
|
#
|
1080
1077
|
# @option params [Integer] :duration_seconds
|
1081
1078
|
# The duration, in seconds, of the role session. The value can range
|
@@ -1396,9 +1393,9 @@ module Aws::STS
|
|
1396
1393
|
# permissions for a federated user. You cannot use session policies to
|
1397
1394
|
# grant more permissions than those that are defined in the permissions
|
1398
1395
|
# policy of the IAM user. For more information, see [Session
|
1399
|
-
# Policies][
|
1396
|
+
# Policies][6] in the *IAM User Guide*. For information about using
|
1400
1397
|
# `GetFederationToken` to create temporary security credentials, see
|
1401
|
-
# [GetFederationToken—Federation Through a Custom Identity Broker][
|
1398
|
+
# [GetFederationToken—Federation Through a Custom Identity Broker][7].
|
1402
1399
|
#
|
1403
1400
|
#
|
1404
1401
|
#
|
@@ -1408,8 +1405,7 @@ module Aws::STS
|
|
1408
1405
|
# [4]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#api_assumerolewithwebidentity
|
1409
1406
|
# [5]: https://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html
|
1410
1407
|
# [6]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
|
1411
|
-
# [7]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
1412
|
-
# [8]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#api_getfederationtoken
|
1408
|
+
# [7]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#api_getfederationtoken
|
1413
1409
|
#
|
1414
1410
|
# @option params [required, String] :name
|
1415
1411
|
# The name of the federated user. The name is used as an identifier for
|
@@ -1443,7 +1439,7 @@ module Aws::STS
|
|
1443
1439
|
# you pass. This gives you a way to further restrict the permissions for
|
1444
1440
|
# a federated user. You cannot use session policies to grant more
|
1445
1441
|
# permissions than those that are defined in the permissions policy of
|
1446
|
-
# the IAM user. For more information, see [Session Policies][
|
1442
|
+
# the IAM user. For more information, see [Session Policies][1] in the
|
1447
1443
|
# *IAM User Guide*.
|
1448
1444
|
#
|
1449
1445
|
# The plain text that you use for both inline and managed session
|
@@ -1465,7 +1461,6 @@ module Aws::STS
|
|
1465
1461
|
#
|
1466
1462
|
#
|
1467
1463
|
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
|
1468
|
-
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/IAM/latest/UserGuide/access_policies.html#policies_session
|
1469
1464
|
#
|
1470
1465
|
# @option params [Array<Types::PolicyDescriptorType>] :policy_arns
|
1471
1466
|
# The Amazon Resource Names (ARNs) of the IAM managed policies that you
|
@@ -1494,7 +1489,7 @@ module Aws::STS
|
|
1494
1489
|
# you pass. This gives you a way to further restrict the permissions for
|
1495
1490
|
# a federated user. You cannot use session policies to grant more
|
1496
1491
|
# permissions than those that are defined in the permissions policy of
|
1497
|
-
# the IAM user. For more information, see [Session Policies][
|
1492
|
+
# the IAM user. For more information, see [Session Policies][1] in the
|
1498
1493
|
# *IAM User Guide*.
|
1499
1494
|
#
|
1500
1495
|
# <note markdown="1"> The characters in this parameter count towards the 2048 character
|
@@ -1509,7 +1504,6 @@ module Aws::STS
|
|
1509
1504
|
#
|
1510
1505
|
#
|
1511
1506
|
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
|
1512
|
-
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/IAM/latest/UserGuide/access_policies.html#policies_session
|
1513
1507
|
#
|
1514
1508
|
# @option params [Integer] :duration_seconds
|
1515
1509
|
# The duration, in seconds, that the session should last. Acceptable
|
@@ -1736,7 +1730,7 @@ module Aws::STS
|
|
1736
1730
|
params: params,
|
1737
1731
|
config: config)
|
1738
1732
|
context[:gem_name] = 'aws-sdk-core'
|
1739
|
-
context[:gem_version] = '3.
|
1733
|
+
context[:gem_version] = '3.54.0'
|
1740
1734
|
Seahorse::Client::Request.new(handlers, context)
|
1741
1735
|
end
|
1742
1736
|
|
data/lib/aws-sdk-sts/types.rb
CHANGED
@@ -81,7 +81,7 @@ module Aws::STS
|
|
81
81
|
#
|
82
82
|
#
|
83
83
|
#
|
84
|
-
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
84
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
|
85
85
|
# @return [Array<Types::PolicyDescriptorType>]
|
86
86
|
#
|
87
87
|
# @!attribute [rw] policy
|
@@ -116,7 +116,7 @@ module Aws::STS
|
|
116
116
|
#
|
117
117
|
#
|
118
118
|
#
|
119
|
-
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
119
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
|
120
120
|
# @return [String]
|
121
121
|
#
|
122
122
|
# @!attribute [rw] duration_seconds
|
@@ -321,7 +321,7 @@ module Aws::STS
|
|
321
321
|
#
|
322
322
|
#
|
323
323
|
#
|
324
|
-
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
324
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
|
325
325
|
# @return [Array<Types::PolicyDescriptorType>]
|
326
326
|
#
|
327
327
|
# @!attribute [rw] policy
|
@@ -356,7 +356,7 @@ module Aws::STS
|
|
356
356
|
#
|
357
357
|
#
|
358
358
|
#
|
359
|
-
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
359
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
|
360
360
|
# @return [String]
|
361
361
|
#
|
362
362
|
# @!attribute [rw] duration_seconds
|
@@ -572,7 +572,7 @@ module Aws::STS
|
|
572
572
|
#
|
573
573
|
#
|
574
574
|
#
|
575
|
-
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
575
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
|
576
576
|
# @return [Array<Types::PolicyDescriptorType>]
|
577
577
|
#
|
578
578
|
# @!attribute [rw] policy
|
@@ -607,7 +607,7 @@ module Aws::STS
|
|
607
607
|
#
|
608
608
|
#
|
609
609
|
#
|
610
|
-
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
610
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
|
611
611
|
# @return [String]
|
612
612
|
#
|
613
613
|
# @!attribute [rw] duration_seconds
|
@@ -934,7 +934,7 @@ module Aws::STS
|
|
934
934
|
# you pass. This gives you a way to further restrict the permissions
|
935
935
|
# for a federated user. You cannot use session policies to grant more
|
936
936
|
# permissions than those that are defined in the permissions policy of
|
937
|
-
# the IAM user. For more information, see [Session Policies][
|
937
|
+
# the IAM user. For more information, see [Session Policies][1] in the
|
938
938
|
# *IAM User Guide*.
|
939
939
|
#
|
940
940
|
# The plain text that you use for both inline and managed session
|
@@ -956,7 +956,6 @@ module Aws::STS
|
|
956
956
|
#
|
957
957
|
#
|
958
958
|
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
|
959
|
-
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/IAM/latest/UserGuide/access_policies.html#policies_session
|
960
959
|
# @return [String]
|
961
960
|
#
|
962
961
|
# @!attribute [rw] policy_arns
|
@@ -988,7 +987,7 @@ module Aws::STS
|
|
988
987
|
# you pass. This gives you a way to further restrict the permissions
|
989
988
|
# for a federated user. You cannot use session policies to grant more
|
990
989
|
# permissions than those that are defined in the permissions policy of
|
991
|
-
# the IAM user. For more information, see [Session Policies][
|
990
|
+
# the IAM user. For more information, see [Session Policies][1] in the
|
992
991
|
# *IAM User Guide*.
|
993
992
|
#
|
994
993
|
# <note markdown="1"> The characters in this parameter count towards the 2048 character
|
@@ -1003,7 +1002,6 @@ module Aws::STS
|
|
1003
1002
|
#
|
1004
1003
|
#
|
1005
1004
|
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
|
1006
|
-
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/IAM/latest/UserGuide/access_policies.html#policies_session
|
1007
1005
|
# @return [Array<Types::PolicyDescriptorType>]
|
1008
1006
|
#
|
1009
1007
|
# @!attribute [rw] duration_seconds
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: aws-sdk-core
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 3.
|
4
|
+
version: 3.54.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Amazon Web Services
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2019-05-
|
11
|
+
date: 2019-05-28 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: jmespath
|