aws-sdk-core 3.53.1 → 3.54.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA1:
3
- metadata.gz: 2f8defb7d940b06eabc03632deb2c197b111cbd7
4
- data.tar.gz: 6cf019bcf9c5ecc81112bedddb9256e9b28d3db4
3
+ metadata.gz: '04595a7828c9ea3ecb9f9e7818f0a7f7cde55947'
4
+ data.tar.gz: 0e545e952bf847b829f308cff87a858b3d7c684b
5
5
  SHA512:
6
- metadata.gz: bff12b5138a875b05291d93850f07a6cb3b141f0761c8dc676a7149ae9ad4b5888649485b0f50f9b506dfbef00db4d0bd49aafa9757d7ea8aeaae5022d159789
7
- data.tar.gz: 8d7f861b6d7a3342361b0dcda6fe5935c3f2739ea5954bb15dd7f93bd3a3a0ff5a2cd3e9b6c309fa33da8d2d5859793418dbb7532a52b3e3326cf80bea4e9924
6
+ metadata.gz: 709831f76f27d68b8d9b9be58062390ebf9f64eca3ac34c5c0ff59c75ac06868885e0cfd61b0411a56a4e8ca26e15acf38ca653fd161d9b23ea51a503b5f8a68
7
+ data.tar.gz: 4355687a52ce970a8aec7b14d34c138ac97d2a689d7f72a30339f6ec41eff07001500fff563bf47d7a85c566b34adf4cf11297cd6cb909c0d0e7e9a93febbcb5
data/VERSION CHANGED
@@ -1 +1 @@
1
- 3.53.1
1
+ 3.54.0
@@ -11,7 +11,7 @@ module Aws
11
11
  #
12
12
  # @api private
13
13
  # begin
14
- SENSITIVE = [:access_token, :account_name, :account_password, :address, :admin_contact, :admin_password, :artifact_credentials, :auth_code, :authentication_token, :authorization_result, :backup_plan_tags, :backup_vault_tags, :base_32_string_seed, :body, :bot_configuration, :bot_email, :cause, :client_id, :client_secret, :configuration, :copy_source_sse_customer_key, :credentials, :current_password, :custom_attributes, :db_password, :default_phone_number, :definition, :description, :display_name, :e164_phone_number, :email, :email_address, :email_message, :embed_url, :error, :feedback_token, :file, :first_name, :id, :id_token, :input, :input_text, :key_id, :key_store_password, :kms_key_id, :kms_master_key_id, :lambda_function_arn, :last_name, :local_console_password, :master_account_email, :master_user_password, :message, :name, :new_password, :next_password, :notes, :old_password, :outbound_events_https_endpoint, :output, :owner_information, :parameters, :passphrase, :password, :payload, :phone_number, :plaintext, :previous_password, :primary_email, :primary_provisioned_number, :private_key, :proposed_password, :public_key, :qr_code_png, :query, :recovery_point_tags, :refresh_token, :registrant_contact, :request_attributes, :search_query, :secret_access_key, :secret_binary, :secret_code, :secret_hash, :secret_string, :security_token, :service_password, :session_attributes, :share_notes, :shared_secret, :slots, :sse_customer_key, :ssekms_key_id, :status_message, :tag_key_list, :tags, :task_parameters, :tech_contact, :temporary_password, :text, :token, :trust_password, :upload_credentials, :upload_url, :user_email, :user_name, :username, :value, :values, :variables, :zip_file]
14
+ SENSITIVE = [:access_token, :account_name, :account_password, :address, :admin_contact, :admin_password, :artifact_credentials, :auth_code, :authentication_token, :authorization_result, :backup_plan_tags, :backup_vault_tags, :base_32_string_seed, :body, :bot_configuration, :bot_email, :cause, :client_id, :client_secret, :configuration, :copy_source_sse_customer_key, :credentials, :current_password, :custom_attributes, :db_password, :default_phone_number, :definition, :description, :display_name, :e164_phone_number, :email, :email_address, :email_message, :embed_url, :error, :feedback_token, :file, :first_name, :id, :id_token, :input, :input_text, :key_id, :key_store_password, :kms_key_id, :kms_master_key_id, :lambda_function_arn, :last_name, :local_console_password, :master_account_email, :master_user_password, :message, :name, :new_password, :next_password, :notes, :old_password, :outbound_events_https_endpoint, :output, :owner_information, :parameters, :passphrase, :password, :payload, :phone_number, :plaintext, :previous_password, :primary_email, :primary_provisioned_number, :private_key, :proposed_password, :public_key, :qr_code_png, :query, :recovery_point_tags, :refresh_token, :registrant_contact, :request_attributes, :search_query, :secret_access_key, :secret_binary, :secret_code, :secret_hash, :secret_string, :secret_to_authenticate_initiator, :secret_to_authenticate_target, :security_token, :service_password, :session_attributes, :share_notes, :shared_secret, :slots, :sse_customer_key, :ssekms_key_id, :status_message, :tag_key_list, :tags, :task_parameters, :tech_contact, :temporary_password, :text, :token, :trust_password, :upload_credentials, :upload_url, :user_email, :user_name, :username, :value, :values, :variables, :zip_file]
15
15
  # end
16
16
 
17
17
  def initialize(options = {})
@@ -40,6 +40,6 @@ require_relative 'aws-sdk-sts/customizations'
40
40
  # @service
41
41
  module Aws::STS
42
42
 
43
- GEM_VERSION = '3.53.1'
43
+ GEM_VERSION = '3.54.0'
44
44
 
45
45
  end
@@ -303,7 +303,7 @@ module Aws::STS
303
303
  # AWS API calls to access resources in the account that owns the role.
304
304
  # You cannot use session policies to grant more permissions than those
305
305
  # allowed by the identity-based policy of the role that is being
306
- # assumed. For more information, see [Session Policies][7] in the *IAM
306
+ # assumed. For more information, see [Session Policies][6] in the *IAM
307
307
  # User Guide*.
308
308
  #
309
309
  # To assume a role from a different account, your AWS account must be
@@ -326,7 +326,7 @@ module Aws::STS
326
326
  # In this case, the trust policy acts as an IAM resource-based policy.
327
327
  # Users in the same account as the role do not need explicit permission
328
328
  # to assume the role. For more information about trust policies and
329
- # resource-based policies, see [IAM Policies][8] in the *IAM User
329
+ # resource-based policies, see [IAM Policies][7] in the *IAM User
330
330
  # Guide*.
331
331
  #
332
332
  # **Using MFA with AssumeRole**
@@ -343,7 +343,7 @@ module Aws::STS
343
343
  #
344
344
  # `"Condition": \{"Bool": \{"aws:MultiFactorAuthPresent": true\}\}`
345
345
  #
346
- # For more information, see [Configuring MFA-Protected API Access][9] in
346
+ # For more information, see [Configuring MFA-Protected API Access][8] in
347
347
  # the *IAM User Guide* guide.
348
348
  #
349
349
  # To use MFA with `AssumeRole`, you pass values for the `SerialNumber`
@@ -359,9 +359,8 @@ module Aws::STS
359
359
  # [4]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html#id_roles_use_view-role-max-session
360
360
  # [5]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html
361
361
  # [6]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
362
- # [7]: https://docs.aws.amazon.com/IAM/latest/UserGuide/IAM/latest/UserGuide/access_policies.html#policies_session
363
- # [8]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html
364
- # [9]: https://docs.aws.amazon.com/IAM/latest/UserGuide/MFAProtectedAPI.html
362
+ # [7]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html
363
+ # [8]: https://docs.aws.amazon.com/IAM/latest/UserGuide/MFAProtectedAPI.html
365
364
  #
366
365
  # @option params [required, String] :role_arn
367
366
  # The Amazon Resource Name (ARN) of the role to assume.
@@ -415,7 +414,7 @@ module Aws::STS
415
414
  #
416
415
  #
417
416
  #
418
- # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/IAM/latest/UserGuide/access_policies.html#policies_session
417
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
419
418
  #
420
419
  # @option params [String] :policy
421
420
  # An IAM policy in JSON format that you want to use as an inline session
@@ -449,7 +448,7 @@ module Aws::STS
449
448
  #
450
449
  #
451
450
  #
452
- # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/IAM/latest/UserGuide/access_policies.html#policies_session
451
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
453
452
  #
454
453
  # @option params [Integer] :duration_seconds
455
454
  # The duration, in seconds, of the role session. The value can range
@@ -640,7 +639,7 @@ module Aws::STS
640
639
  # AWS API calls to access resources in the account that owns the role.
641
640
  # You cannot use session policies to grant more permissions than those
642
641
  # allowed by the identity-based policy of the role that is being
643
- # assumed. For more information, see [Session Policies][6] in the *IAM
642
+ # assumed. For more information, see [Session Policies][5] in the *IAM
644
643
  # User Guide*.
645
644
  #
646
645
  # Before your application can call `AssumeRoleWithSAML`, you must
@@ -664,13 +663,13 @@ module Aws::STS
664
663
  #
665
664
  # For more information, see the following resources:
666
665
  #
667
- # * [About SAML 2.0-based Federation][7] in the *IAM User Guide*.
666
+ # * [About SAML 2.0-based Federation][6] in the *IAM User Guide*.
668
667
  #
669
- # * [Creating SAML Identity Providers][8] in the *IAM User Guide*.
668
+ # * [Creating SAML Identity Providers][7] in the *IAM User Guide*.
670
669
  #
671
- # * [Configuring a Relying Party and Claims][9] in the *IAM User Guide*.
670
+ # * [Configuring a Relying Party and Claims][8] in the *IAM User Guide*.
672
671
  #
673
- # * [Creating a Role for SAML 2.0 Federation][10] in the *IAM User
672
+ # * [Creating a Role for SAML 2.0 Federation][9] in the *IAM User
674
673
  # Guide*.
675
674
  #
676
675
  #
@@ -680,11 +679,10 @@ module Aws::STS
680
679
  # [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html#id_roles_use_view-role-max-session
681
680
  # [4]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html
682
681
  # [5]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
683
- # [6]: https://docs.aws.amazon.com/IAM/latest/UserGuide/IAM/latest/UserGuide/access_policies.html#policies_session
684
- # [7]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_saml.html
685
- # [8]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_create_saml.html
686
- # [9]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_create_saml_relying-party.html
687
- # [10]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_create_for-idp_saml.html
682
+ # [6]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_saml.html
683
+ # [7]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_create_saml.html
684
+ # [8]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_create_saml_relying-party.html
685
+ # [9]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_create_for-idp_saml.html
688
686
  #
689
687
  # @option params [required, String] :role_arn
690
688
  # The Amazon Resource Name (ARN) of the role that the caller is
@@ -736,7 +734,7 @@ module Aws::STS
736
734
  #
737
735
  #
738
736
  #
739
- # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/IAM/latest/UserGuide/access_policies.html#policies_session
737
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
740
738
  #
741
739
  # @option params [String] :policy
742
740
  # An IAM policy in JSON format that you want to use as an inline session
@@ -770,7 +768,7 @@ module Aws::STS
770
768
  #
771
769
  #
772
770
  #
773
- # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/IAM/latest/UserGuide/access_policies.html#policies_session
771
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
774
772
  #
775
773
  # @option params [Integer] :duration_seconds
776
774
  # The duration, in seconds, of the role session. Your role session lasts
@@ -917,7 +915,7 @@ module Aws::STS
917
915
  # AWS API calls to access resources in the account that owns the role.
918
916
  # You cannot use session policies to grant more permissions than those
919
917
  # allowed by the identity-based policy of the role that is being
920
- # assumed. For more information, see [Session Policies][10] in the *IAM
918
+ # assumed. For more information, see [Session Policies][9] in the *IAM
921
919
  # User Guide*.
922
920
  #
923
921
  # Before your application can call `AssumeRoleWithWebIdentity`, you must
@@ -928,19 +926,19 @@ module Aws::STS
928
926
  # specified in the role's trust policy.
929
927
  #
930
928
  # Calling `AssumeRoleWithWebIdentity` can result in an entry in your AWS
931
- # CloudTrail logs. The entry includes the [Subject][11] of the provided
929
+ # CloudTrail logs. The entry includes the [Subject][10] of the provided
932
930
  # Web Identity Token. We recommend that you avoid using any personally
933
931
  # identifiable information (PII) in this field. For example, you could
934
932
  # instead use a GUID or a pairwise identifier, as [suggested in the OIDC
935
- # specification][12].
933
+ # specification][11].
936
934
  #
937
935
  # For more information about how to use web identity federation and the
938
936
  # `AssumeRoleWithWebIdentity` API, see the following resources:
939
937
  #
940
- # * [Using Web Identity Federation API Operations for Mobile Apps][13]
941
- # and [Federation Through a Web-based Identity Provider][14].
938
+ # * [Using Web Identity Federation API Operations for Mobile Apps][12]
939
+ # and [Federation Through a Web-based Identity Provider][13].
942
940
  #
943
- # * [ Web Identity Federation Playground][15]. Walk through the process
941
+ # * [ Web Identity Federation Playground][14]. Walk through the process
944
942
  # of authenticating through Login with Amazon, Facebook, or Google,
945
943
  # getting temporary security credentials, and then using those
946
944
  # credentials to make a request to AWS.
@@ -951,7 +949,7 @@ module Aws::STS
951
949
  # information from these providers to get and use temporary security
952
950
  # credentials.
953
951
  #
954
- # * [Web Identity Federation with Mobile Applications][16]. This article
952
+ # * [Web Identity Federation with Mobile Applications][15]. This article
955
953
  # discusses web identity federation and shows an example of how to use
956
954
  # web identity federation to get access to content in Amazon S3.
957
955
  #
@@ -966,13 +964,12 @@ module Aws::STS
966
964
  # [7]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html#id_roles_use_view-role-max-session
967
965
  # [8]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html
968
966
  # [9]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
969
- # [10]: https://docs.aws.amazon.com/IAM/latest/UserGuide/IAM/latest/UserGuide/access_policies.html#policies_session
970
- # [11]: http://openid.net/specs/openid-connect-core-1_0.html#Claims
971
- # [12]: http://openid.net/specs/openid-connect-core-1_0.html#SubjectIDTypes
972
- # [13]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_oidc_manual.html
973
- # [14]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#api_assumerolewithwebidentity
974
- # [15]: https://web-identity-federation-playground.s3.amazonaws.com/index.html
975
- # [16]: http://aws.amazon.com/articles/web-identity-federation-with-mobile-applications
967
+ # [10]: http://openid.net/specs/openid-connect-core-1_0.html#Claims
968
+ # [11]: http://openid.net/specs/openid-connect-core-1_0.html#SubjectIDTypes
969
+ # [12]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_oidc_manual.html
970
+ # [13]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#api_assumerolewithwebidentity
971
+ # [14]: https://web-identity-federation-playground.s3.amazonaws.com/index.html
972
+ # [15]: http://aws.amazon.com/articles/web-identity-federation-with-mobile-applications
976
973
  #
977
974
  # @option params [required, String] :role_arn
978
975
  # The Amazon Resource Name (ARN) of the role that the caller is
@@ -1041,7 +1038,7 @@ module Aws::STS
1041
1038
  #
1042
1039
  #
1043
1040
  #
1044
- # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/IAM/latest/UserGuide/access_policies.html#policies_session
1041
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
1045
1042
  #
1046
1043
  # @option params [String] :policy
1047
1044
  # An IAM policy in JSON format that you want to use as an inline session
@@ -1075,7 +1072,7 @@ module Aws::STS
1075
1072
  #
1076
1073
  #
1077
1074
  #
1078
- # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/IAM/latest/UserGuide/access_policies.html#policies_session
1075
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
1079
1076
  #
1080
1077
  # @option params [Integer] :duration_seconds
1081
1078
  # The duration, in seconds, of the role session. The value can range
@@ -1396,9 +1393,9 @@ module Aws::STS
1396
1393
  # permissions for a federated user. You cannot use session policies to
1397
1394
  # grant more permissions than those that are defined in the permissions
1398
1395
  # policy of the IAM user. For more information, see [Session
1399
- # Policies][7] in the *IAM User Guide*. For information about using
1396
+ # Policies][6] in the *IAM User Guide*. For information about using
1400
1397
  # `GetFederationToken` to create temporary security credentials, see
1401
- # [GetFederationToken—Federation Through a Custom Identity Broker][8].
1398
+ # [GetFederationToken—Federation Through a Custom Identity Broker][7].
1402
1399
  #
1403
1400
  #
1404
1401
  #
@@ -1408,8 +1405,7 @@ module Aws::STS
1408
1405
  # [4]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#api_assumerolewithwebidentity
1409
1406
  # [5]: https://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html
1410
1407
  # [6]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
1411
- # [7]: https://docs.aws.amazon.com/IAM/latest/UserGuide/IAM/latest/UserGuide/access_policies.html#policies_session
1412
- # [8]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#api_getfederationtoken
1408
+ # [7]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#api_getfederationtoken
1413
1409
  #
1414
1410
  # @option params [required, String] :name
1415
1411
  # The name of the federated user. The name is used as an identifier for
@@ -1443,7 +1439,7 @@ module Aws::STS
1443
1439
  # you pass. This gives you a way to further restrict the permissions for
1444
1440
  # a federated user. You cannot use session policies to grant more
1445
1441
  # permissions than those that are defined in the permissions policy of
1446
- # the IAM user. For more information, see [Session Policies][2] in the
1442
+ # the IAM user. For more information, see [Session Policies][1] in the
1447
1443
  # *IAM User Guide*.
1448
1444
  #
1449
1445
  # The plain text that you use for both inline and managed session
@@ -1465,7 +1461,6 @@ module Aws::STS
1465
1461
  #
1466
1462
  #
1467
1463
  # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
1468
- # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/IAM/latest/UserGuide/access_policies.html#policies_session
1469
1464
  #
1470
1465
  # @option params [Array<Types::PolicyDescriptorType>] :policy_arns
1471
1466
  # The Amazon Resource Names (ARNs) of the IAM managed policies that you
@@ -1494,7 +1489,7 @@ module Aws::STS
1494
1489
  # you pass. This gives you a way to further restrict the permissions for
1495
1490
  # a federated user. You cannot use session policies to grant more
1496
1491
  # permissions than those that are defined in the permissions policy of
1497
- # the IAM user. For more information, see [Session Policies][2] in the
1492
+ # the IAM user. For more information, see [Session Policies][1] in the
1498
1493
  # *IAM User Guide*.
1499
1494
  #
1500
1495
  # <note markdown="1"> The characters in this parameter count towards the 2048 character
@@ -1509,7 +1504,6 @@ module Aws::STS
1509
1504
  #
1510
1505
  #
1511
1506
  # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
1512
- # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/IAM/latest/UserGuide/access_policies.html#policies_session
1513
1507
  #
1514
1508
  # @option params [Integer] :duration_seconds
1515
1509
  # The duration, in seconds, that the session should last. Acceptable
@@ -1736,7 +1730,7 @@ module Aws::STS
1736
1730
  params: params,
1737
1731
  config: config)
1738
1732
  context[:gem_name] = 'aws-sdk-core'
1739
- context[:gem_version] = '3.53.1'
1733
+ context[:gem_version] = '3.54.0'
1740
1734
  Seahorse::Client::Request.new(handlers, context)
1741
1735
  end
1742
1736
 
@@ -81,7 +81,7 @@ module Aws::STS
81
81
  #
82
82
  #
83
83
  #
84
- # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/IAM/latest/UserGuide/access_policies.html#policies_session
84
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
85
85
  # @return [Array<Types::PolicyDescriptorType>]
86
86
  #
87
87
  # @!attribute [rw] policy
@@ -116,7 +116,7 @@ module Aws::STS
116
116
  #
117
117
  #
118
118
  #
119
- # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/IAM/latest/UserGuide/access_policies.html#policies_session
119
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
120
120
  # @return [String]
121
121
  #
122
122
  # @!attribute [rw] duration_seconds
@@ -321,7 +321,7 @@ module Aws::STS
321
321
  #
322
322
  #
323
323
  #
324
- # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/IAM/latest/UserGuide/access_policies.html#policies_session
324
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
325
325
  # @return [Array<Types::PolicyDescriptorType>]
326
326
  #
327
327
  # @!attribute [rw] policy
@@ -356,7 +356,7 @@ module Aws::STS
356
356
  #
357
357
  #
358
358
  #
359
- # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/IAM/latest/UserGuide/access_policies.html#policies_session
359
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
360
360
  # @return [String]
361
361
  #
362
362
  # @!attribute [rw] duration_seconds
@@ -572,7 +572,7 @@ module Aws::STS
572
572
  #
573
573
  #
574
574
  #
575
- # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/IAM/latest/UserGuide/access_policies.html#policies_session
575
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
576
576
  # @return [Array<Types::PolicyDescriptorType>]
577
577
  #
578
578
  # @!attribute [rw] policy
@@ -607,7 +607,7 @@ module Aws::STS
607
607
  #
608
608
  #
609
609
  #
610
- # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/IAM/latest/UserGuide/access_policies.html#policies_session
610
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
611
611
  # @return [String]
612
612
  #
613
613
  # @!attribute [rw] duration_seconds
@@ -934,7 +934,7 @@ module Aws::STS
934
934
  # you pass. This gives you a way to further restrict the permissions
935
935
  # for a federated user. You cannot use session policies to grant more
936
936
  # permissions than those that are defined in the permissions policy of
937
- # the IAM user. For more information, see [Session Policies][2] in the
937
+ # the IAM user. For more information, see [Session Policies][1] in the
938
938
  # *IAM User Guide*.
939
939
  #
940
940
  # The plain text that you use for both inline and managed session
@@ -956,7 +956,6 @@ module Aws::STS
956
956
  #
957
957
  #
958
958
  # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
959
- # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/IAM/latest/UserGuide/access_policies.html#policies_session
960
959
  # @return [String]
961
960
  #
962
961
  # @!attribute [rw] policy_arns
@@ -988,7 +987,7 @@ module Aws::STS
988
987
  # you pass. This gives you a way to further restrict the permissions
989
988
  # for a federated user. You cannot use session policies to grant more
990
989
  # permissions than those that are defined in the permissions policy of
991
- # the IAM user. For more information, see [Session Policies][2] in the
990
+ # the IAM user. For more information, see [Session Policies][1] in the
992
991
  # *IAM User Guide*.
993
992
  #
994
993
  # <note markdown="1"> The characters in this parameter count towards the 2048 character
@@ -1003,7 +1002,6 @@ module Aws::STS
1003
1002
  #
1004
1003
  #
1005
1004
  # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
1006
- # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/IAM/latest/UserGuide/access_policies.html#policies_session
1007
1005
  # @return [Array<Types::PolicyDescriptorType>]
1008
1006
  #
1009
1007
  # @!attribute [rw] duration_seconds
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-core
3
3
  version: !ruby/object:Gem::Version
4
- version: 3.53.1
4
+ version: 3.54.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2019-05-22 00:00:00.000000000 Z
11
+ date: 2019-05-28 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: jmespath