aws-sdk-core 3.53.1 → 3.54.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA1:
3
- metadata.gz: 2f8defb7d940b06eabc03632deb2c197b111cbd7
4
- data.tar.gz: 6cf019bcf9c5ecc81112bedddb9256e9b28d3db4
3
+ metadata.gz: '04595a7828c9ea3ecb9f9e7818f0a7f7cde55947'
4
+ data.tar.gz: 0e545e952bf847b829f308cff87a858b3d7c684b
5
5
  SHA512:
6
- metadata.gz: bff12b5138a875b05291d93850f07a6cb3b141f0761c8dc676a7149ae9ad4b5888649485b0f50f9b506dfbef00db4d0bd49aafa9757d7ea8aeaae5022d159789
7
- data.tar.gz: 8d7f861b6d7a3342361b0dcda6fe5935c3f2739ea5954bb15dd7f93bd3a3a0ff5a2cd3e9b6c309fa33da8d2d5859793418dbb7532a52b3e3326cf80bea4e9924
6
+ metadata.gz: 709831f76f27d68b8d9b9be58062390ebf9f64eca3ac34c5c0ff59c75ac06868885e0cfd61b0411a56a4e8ca26e15acf38ca653fd161d9b23ea51a503b5f8a68
7
+ data.tar.gz: 4355687a52ce970a8aec7b14d34c138ac97d2a689d7f72a30339f6ec41eff07001500fff563bf47d7a85c566b34adf4cf11297cd6cb909c0d0e7e9a93febbcb5
data/VERSION CHANGED
@@ -1 +1 @@
1
- 3.53.1
1
+ 3.54.0
@@ -11,7 +11,7 @@ module Aws
11
11
  #
12
12
  # @api private
13
13
  # begin
14
- SENSITIVE = [:access_token, :account_name, :account_password, :address, :admin_contact, :admin_password, :artifact_credentials, :auth_code, :authentication_token, :authorization_result, :backup_plan_tags, :backup_vault_tags, :base_32_string_seed, :body, :bot_configuration, :bot_email, :cause, :client_id, :client_secret, :configuration, :copy_source_sse_customer_key, :credentials, :current_password, :custom_attributes, :db_password, :default_phone_number, :definition, :description, :display_name, :e164_phone_number, :email, :email_address, :email_message, :embed_url, :error, :feedback_token, :file, :first_name, :id, :id_token, :input, :input_text, :key_id, :key_store_password, :kms_key_id, :kms_master_key_id, :lambda_function_arn, :last_name, :local_console_password, :master_account_email, :master_user_password, :message, :name, :new_password, :next_password, :notes, :old_password, :outbound_events_https_endpoint, :output, :owner_information, :parameters, :passphrase, :password, :payload, :phone_number, :plaintext, :previous_password, :primary_email, :primary_provisioned_number, :private_key, :proposed_password, :public_key, :qr_code_png, :query, :recovery_point_tags, :refresh_token, :registrant_contact, :request_attributes, :search_query, :secret_access_key, :secret_binary, :secret_code, :secret_hash, :secret_string, :security_token, :service_password, :session_attributes, :share_notes, :shared_secret, :slots, :sse_customer_key, :ssekms_key_id, :status_message, :tag_key_list, :tags, :task_parameters, :tech_contact, :temporary_password, :text, :token, :trust_password, :upload_credentials, :upload_url, :user_email, :user_name, :username, :value, :values, :variables, :zip_file]
14
+ SENSITIVE = [:access_token, :account_name, :account_password, :address, :admin_contact, :admin_password, :artifact_credentials, :auth_code, :authentication_token, :authorization_result, :backup_plan_tags, :backup_vault_tags, :base_32_string_seed, :body, :bot_configuration, :bot_email, :cause, :client_id, :client_secret, :configuration, :copy_source_sse_customer_key, :credentials, :current_password, :custom_attributes, :db_password, :default_phone_number, :definition, :description, :display_name, :e164_phone_number, :email, :email_address, :email_message, :embed_url, :error, :feedback_token, :file, :first_name, :id, :id_token, :input, :input_text, :key_id, :key_store_password, :kms_key_id, :kms_master_key_id, :lambda_function_arn, :last_name, :local_console_password, :master_account_email, :master_user_password, :message, :name, :new_password, :next_password, :notes, :old_password, :outbound_events_https_endpoint, :output, :owner_information, :parameters, :passphrase, :password, :payload, :phone_number, :plaintext, :previous_password, :primary_email, :primary_provisioned_number, :private_key, :proposed_password, :public_key, :qr_code_png, :query, :recovery_point_tags, :refresh_token, :registrant_contact, :request_attributes, :search_query, :secret_access_key, :secret_binary, :secret_code, :secret_hash, :secret_string, :secret_to_authenticate_initiator, :secret_to_authenticate_target, :security_token, :service_password, :session_attributes, :share_notes, :shared_secret, :slots, :sse_customer_key, :ssekms_key_id, :status_message, :tag_key_list, :tags, :task_parameters, :tech_contact, :temporary_password, :text, :token, :trust_password, :upload_credentials, :upload_url, :user_email, :user_name, :username, :value, :values, :variables, :zip_file]
15
15
  # end
16
16
 
17
17
  def initialize(options = {})
@@ -40,6 +40,6 @@ require_relative 'aws-sdk-sts/customizations'
40
40
  # @service
41
41
  module Aws::STS
42
42
 
43
- GEM_VERSION = '3.53.1'
43
+ GEM_VERSION = '3.54.0'
44
44
 
45
45
  end
@@ -303,7 +303,7 @@ module Aws::STS
303
303
  # AWS API calls to access resources in the account that owns the role.
304
304
  # You cannot use session policies to grant more permissions than those
305
305
  # allowed by the identity-based policy of the role that is being
306
- # assumed. For more information, see [Session Policies][7] in the *IAM
306
+ # assumed. For more information, see [Session Policies][6] in the *IAM
307
307
  # User Guide*.
308
308
  #
309
309
  # To assume a role from a different account, your AWS account must be
@@ -326,7 +326,7 @@ module Aws::STS
326
326
  # In this case, the trust policy acts as an IAM resource-based policy.
327
327
  # Users in the same account as the role do not need explicit permission
328
328
  # to assume the role. For more information about trust policies and
329
- # resource-based policies, see [IAM Policies][8] in the *IAM User
329
+ # resource-based policies, see [IAM Policies][7] in the *IAM User
330
330
  # Guide*.
331
331
  #
332
332
  # **Using MFA with AssumeRole**
@@ -343,7 +343,7 @@ module Aws::STS
343
343
  #
344
344
  # `"Condition": \{"Bool": \{"aws:MultiFactorAuthPresent": true\}\}`
345
345
  #
346
- # For more information, see [Configuring MFA-Protected API Access][9] in
346
+ # For more information, see [Configuring MFA-Protected API Access][8] in
347
347
  # the *IAM User Guide* guide.
348
348
  #
349
349
  # To use MFA with `AssumeRole`, you pass values for the `SerialNumber`
@@ -359,9 +359,8 @@ module Aws::STS
359
359
  # [4]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html#id_roles_use_view-role-max-session
360
360
  # [5]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html
361
361
  # [6]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
362
- # [7]: https://docs.aws.amazon.com/IAM/latest/UserGuide/IAM/latest/UserGuide/access_policies.html#policies_session
363
- # [8]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html
364
- # [9]: https://docs.aws.amazon.com/IAM/latest/UserGuide/MFAProtectedAPI.html
362
+ # [7]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html
363
+ # [8]: https://docs.aws.amazon.com/IAM/latest/UserGuide/MFAProtectedAPI.html
365
364
  #
366
365
  # @option params [required, String] :role_arn
367
366
  # The Amazon Resource Name (ARN) of the role to assume.
@@ -415,7 +414,7 @@ module Aws::STS
415
414
  #
416
415
  #
417
416
  #
418
- # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/IAM/latest/UserGuide/access_policies.html#policies_session
417
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
419
418
  #
420
419
  # @option params [String] :policy
421
420
  # An IAM policy in JSON format that you want to use as an inline session
@@ -449,7 +448,7 @@ module Aws::STS
449
448
  #
450
449
  #
451
450
  #
452
- # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/IAM/latest/UserGuide/access_policies.html#policies_session
451
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
453
452
  #
454
453
  # @option params [Integer] :duration_seconds
455
454
  # The duration, in seconds, of the role session. The value can range
@@ -640,7 +639,7 @@ module Aws::STS
640
639
  # AWS API calls to access resources in the account that owns the role.
641
640
  # You cannot use session policies to grant more permissions than those
642
641
  # allowed by the identity-based policy of the role that is being
643
- # assumed. For more information, see [Session Policies][6] in the *IAM
642
+ # assumed. For more information, see [Session Policies][5] in the *IAM
644
643
  # User Guide*.
645
644
  #
646
645
  # Before your application can call `AssumeRoleWithSAML`, you must
@@ -664,13 +663,13 @@ module Aws::STS
664
663
  #
665
664
  # For more information, see the following resources:
666
665
  #
667
- # * [About SAML 2.0-based Federation][7] in the *IAM User Guide*.
666
+ # * [About SAML 2.0-based Federation][6] in the *IAM User Guide*.
668
667
  #
669
- # * [Creating SAML Identity Providers][8] in the *IAM User Guide*.
668
+ # * [Creating SAML Identity Providers][7] in the *IAM User Guide*.
670
669
  #
671
- # * [Configuring a Relying Party and Claims][9] in the *IAM User Guide*.
670
+ # * [Configuring a Relying Party and Claims][8] in the *IAM User Guide*.
672
671
  #
673
- # * [Creating a Role for SAML 2.0 Federation][10] in the *IAM User
672
+ # * [Creating a Role for SAML 2.0 Federation][9] in the *IAM User
674
673
  # Guide*.
675
674
  #
676
675
  #
@@ -680,11 +679,10 @@ module Aws::STS
680
679
  # [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html#id_roles_use_view-role-max-session
681
680
  # [4]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html
682
681
  # [5]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
683
- # [6]: https://docs.aws.amazon.com/IAM/latest/UserGuide/IAM/latest/UserGuide/access_policies.html#policies_session
684
- # [7]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_saml.html
685
- # [8]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_create_saml.html
686
- # [9]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_create_saml_relying-party.html
687
- # [10]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_create_for-idp_saml.html
682
+ # [6]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_saml.html
683
+ # [7]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_create_saml.html
684
+ # [8]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_create_saml_relying-party.html
685
+ # [9]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_create_for-idp_saml.html
688
686
  #
689
687
  # @option params [required, String] :role_arn
690
688
  # The Amazon Resource Name (ARN) of the role that the caller is
@@ -736,7 +734,7 @@ module Aws::STS
736
734
  #
737
735
  #
738
736
  #
739
- # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/IAM/latest/UserGuide/access_policies.html#policies_session
737
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
740
738
  #
741
739
  # @option params [String] :policy
742
740
  # An IAM policy in JSON format that you want to use as an inline session
@@ -770,7 +768,7 @@ module Aws::STS
770
768
  #
771
769
  #
772
770
  #
773
- # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/IAM/latest/UserGuide/access_policies.html#policies_session
771
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
774
772
  #
775
773
  # @option params [Integer] :duration_seconds
776
774
  # The duration, in seconds, of the role session. Your role session lasts
@@ -917,7 +915,7 @@ module Aws::STS
917
915
  # AWS API calls to access resources in the account that owns the role.
918
916
  # You cannot use session policies to grant more permissions than those
919
917
  # allowed by the identity-based policy of the role that is being
920
- # assumed. For more information, see [Session Policies][10] in the *IAM
918
+ # assumed. For more information, see [Session Policies][9] in the *IAM
921
919
  # User Guide*.
922
920
  #
923
921
  # Before your application can call `AssumeRoleWithWebIdentity`, you must
@@ -928,19 +926,19 @@ module Aws::STS
928
926
  # specified in the role's trust policy.
929
927
  #
930
928
  # Calling `AssumeRoleWithWebIdentity` can result in an entry in your AWS
931
- # CloudTrail logs. The entry includes the [Subject][11] of the provided
929
+ # CloudTrail logs. The entry includes the [Subject][10] of the provided
932
930
  # Web Identity Token. We recommend that you avoid using any personally
933
931
  # identifiable information (PII) in this field. For example, you could
934
932
  # instead use a GUID or a pairwise identifier, as [suggested in the OIDC
935
- # specification][12].
933
+ # specification][11].
936
934
  #
937
935
  # For more information about how to use web identity federation and the
938
936
  # `AssumeRoleWithWebIdentity` API, see the following resources:
939
937
  #
940
- # * [Using Web Identity Federation API Operations for Mobile Apps][13]
941
- # and [Federation Through a Web-based Identity Provider][14].
938
+ # * [Using Web Identity Federation API Operations for Mobile Apps][12]
939
+ # and [Federation Through a Web-based Identity Provider][13].
942
940
  #
943
- # * [ Web Identity Federation Playground][15]. Walk through the process
941
+ # * [ Web Identity Federation Playground][14]. Walk through the process
944
942
  # of authenticating through Login with Amazon, Facebook, or Google,
945
943
  # getting temporary security credentials, and then using those
946
944
  # credentials to make a request to AWS.
@@ -951,7 +949,7 @@ module Aws::STS
951
949
  # information from these providers to get and use temporary security
952
950
  # credentials.
953
951
  #
954
- # * [Web Identity Federation with Mobile Applications][16]. This article
952
+ # * [Web Identity Federation with Mobile Applications][15]. This article
955
953
  # discusses web identity federation and shows an example of how to use
956
954
  # web identity federation to get access to content in Amazon S3.
957
955
  #
@@ -966,13 +964,12 @@ module Aws::STS
966
964
  # [7]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html#id_roles_use_view-role-max-session
967
965
  # [8]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html
968
966
  # [9]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
969
- # [10]: https://docs.aws.amazon.com/IAM/latest/UserGuide/IAM/latest/UserGuide/access_policies.html#policies_session
970
- # [11]: http://openid.net/specs/openid-connect-core-1_0.html#Claims
971
- # [12]: http://openid.net/specs/openid-connect-core-1_0.html#SubjectIDTypes
972
- # [13]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_oidc_manual.html
973
- # [14]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#api_assumerolewithwebidentity
974
- # [15]: https://web-identity-federation-playground.s3.amazonaws.com/index.html
975
- # [16]: http://aws.amazon.com/articles/web-identity-federation-with-mobile-applications
967
+ # [10]: http://openid.net/specs/openid-connect-core-1_0.html#Claims
968
+ # [11]: http://openid.net/specs/openid-connect-core-1_0.html#SubjectIDTypes
969
+ # [12]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_oidc_manual.html
970
+ # [13]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#api_assumerolewithwebidentity
971
+ # [14]: https://web-identity-federation-playground.s3.amazonaws.com/index.html
972
+ # [15]: http://aws.amazon.com/articles/web-identity-federation-with-mobile-applications
976
973
  #
977
974
  # @option params [required, String] :role_arn
978
975
  # The Amazon Resource Name (ARN) of the role that the caller is
@@ -1041,7 +1038,7 @@ module Aws::STS
1041
1038
  #
1042
1039
  #
1043
1040
  #
1044
- # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/IAM/latest/UserGuide/access_policies.html#policies_session
1041
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
1045
1042
  #
1046
1043
  # @option params [String] :policy
1047
1044
  # An IAM policy in JSON format that you want to use as an inline session
@@ -1075,7 +1072,7 @@ module Aws::STS
1075
1072
  #
1076
1073
  #
1077
1074
  #
1078
- # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/IAM/latest/UserGuide/access_policies.html#policies_session
1075
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
1079
1076
  #
1080
1077
  # @option params [Integer] :duration_seconds
1081
1078
  # The duration, in seconds, of the role session. The value can range
@@ -1396,9 +1393,9 @@ module Aws::STS
1396
1393
  # permissions for a federated user. You cannot use session policies to
1397
1394
  # grant more permissions than those that are defined in the permissions
1398
1395
  # policy of the IAM user. For more information, see [Session
1399
- # Policies][7] in the *IAM User Guide*. For information about using
1396
+ # Policies][6] in the *IAM User Guide*. For information about using
1400
1397
  # `GetFederationToken` to create temporary security credentials, see
1401
- # [GetFederationToken—Federation Through a Custom Identity Broker][8].
1398
+ # [GetFederationToken—Federation Through a Custom Identity Broker][7].
1402
1399
  #
1403
1400
  #
1404
1401
  #
@@ -1408,8 +1405,7 @@ module Aws::STS
1408
1405
  # [4]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#api_assumerolewithwebidentity
1409
1406
  # [5]: https://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html
1410
1407
  # [6]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
1411
- # [7]: https://docs.aws.amazon.com/IAM/latest/UserGuide/IAM/latest/UserGuide/access_policies.html#policies_session
1412
- # [8]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#api_getfederationtoken
1408
+ # [7]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#api_getfederationtoken
1413
1409
  #
1414
1410
  # @option params [required, String] :name
1415
1411
  # The name of the federated user. The name is used as an identifier for
@@ -1443,7 +1439,7 @@ module Aws::STS
1443
1439
  # you pass. This gives you a way to further restrict the permissions for
1444
1440
  # a federated user. You cannot use session policies to grant more
1445
1441
  # permissions than those that are defined in the permissions policy of
1446
- # the IAM user. For more information, see [Session Policies][2] in the
1442
+ # the IAM user. For more information, see [Session Policies][1] in the
1447
1443
  # *IAM User Guide*.
1448
1444
  #
1449
1445
  # The plain text that you use for both inline and managed session
@@ -1465,7 +1461,6 @@ module Aws::STS
1465
1461
  #
1466
1462
  #
1467
1463
  # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
1468
- # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/IAM/latest/UserGuide/access_policies.html#policies_session
1469
1464
  #
1470
1465
  # @option params [Array<Types::PolicyDescriptorType>] :policy_arns
1471
1466
  # The Amazon Resource Names (ARNs) of the IAM managed policies that you
@@ -1494,7 +1489,7 @@ module Aws::STS
1494
1489
  # you pass. This gives you a way to further restrict the permissions for
1495
1490
  # a federated user. You cannot use session policies to grant more
1496
1491
  # permissions than those that are defined in the permissions policy of
1497
- # the IAM user. For more information, see [Session Policies][2] in the
1492
+ # the IAM user. For more information, see [Session Policies][1] in the
1498
1493
  # *IAM User Guide*.
1499
1494
  #
1500
1495
  # <note markdown="1"> The characters in this parameter count towards the 2048 character
@@ -1509,7 +1504,6 @@ module Aws::STS
1509
1504
  #
1510
1505
  #
1511
1506
  # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
1512
- # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/IAM/latest/UserGuide/access_policies.html#policies_session
1513
1507
  #
1514
1508
  # @option params [Integer] :duration_seconds
1515
1509
  # The duration, in seconds, that the session should last. Acceptable
@@ -1736,7 +1730,7 @@ module Aws::STS
1736
1730
  params: params,
1737
1731
  config: config)
1738
1732
  context[:gem_name] = 'aws-sdk-core'
1739
- context[:gem_version] = '3.53.1'
1733
+ context[:gem_version] = '3.54.0'
1740
1734
  Seahorse::Client::Request.new(handlers, context)
1741
1735
  end
1742
1736
 
@@ -81,7 +81,7 @@ module Aws::STS
81
81
  #
82
82
  #
83
83
  #
84
- # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/IAM/latest/UserGuide/access_policies.html#policies_session
84
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
85
85
  # @return [Array<Types::PolicyDescriptorType>]
86
86
  #
87
87
  # @!attribute [rw] policy
@@ -116,7 +116,7 @@ module Aws::STS
116
116
  #
117
117
  #
118
118
  #
119
- # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/IAM/latest/UserGuide/access_policies.html#policies_session
119
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
120
120
  # @return [String]
121
121
  #
122
122
  # @!attribute [rw] duration_seconds
@@ -321,7 +321,7 @@ module Aws::STS
321
321
  #
322
322
  #
323
323
  #
324
- # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/IAM/latest/UserGuide/access_policies.html#policies_session
324
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
325
325
  # @return [Array<Types::PolicyDescriptorType>]
326
326
  #
327
327
  # @!attribute [rw] policy
@@ -356,7 +356,7 @@ module Aws::STS
356
356
  #
357
357
  #
358
358
  #
359
- # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/IAM/latest/UserGuide/access_policies.html#policies_session
359
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
360
360
  # @return [String]
361
361
  #
362
362
  # @!attribute [rw] duration_seconds
@@ -572,7 +572,7 @@ module Aws::STS
572
572
  #
573
573
  #
574
574
  #
575
- # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/IAM/latest/UserGuide/access_policies.html#policies_session
575
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
576
576
  # @return [Array<Types::PolicyDescriptorType>]
577
577
  #
578
578
  # @!attribute [rw] policy
@@ -607,7 +607,7 @@ module Aws::STS
607
607
  #
608
608
  #
609
609
  #
610
- # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/IAM/latest/UserGuide/access_policies.html#policies_session
610
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
611
611
  # @return [String]
612
612
  #
613
613
  # @!attribute [rw] duration_seconds
@@ -934,7 +934,7 @@ module Aws::STS
934
934
  # you pass. This gives you a way to further restrict the permissions
935
935
  # for a federated user. You cannot use session policies to grant more
936
936
  # permissions than those that are defined in the permissions policy of
937
- # the IAM user. For more information, see [Session Policies][2] in the
937
+ # the IAM user. For more information, see [Session Policies][1] in the
938
938
  # *IAM User Guide*.
939
939
  #
940
940
  # The plain text that you use for both inline and managed session
@@ -956,7 +956,6 @@ module Aws::STS
956
956
  #
957
957
  #
958
958
  # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
959
- # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/IAM/latest/UserGuide/access_policies.html#policies_session
960
959
  # @return [String]
961
960
  #
962
961
  # @!attribute [rw] policy_arns
@@ -988,7 +987,7 @@ module Aws::STS
988
987
  # you pass. This gives you a way to further restrict the permissions
989
988
  # for a federated user. You cannot use session policies to grant more
990
989
  # permissions than those that are defined in the permissions policy of
991
- # the IAM user. For more information, see [Session Policies][2] in the
990
+ # the IAM user. For more information, see [Session Policies][1] in the
992
991
  # *IAM User Guide*.
993
992
  #
994
993
  # <note markdown="1"> The characters in this parameter count towards the 2048 character
@@ -1003,7 +1002,6 @@ module Aws::STS
1003
1002
  #
1004
1003
  #
1005
1004
  # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
1006
- # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/IAM/latest/UserGuide/access_policies.html#policies_session
1007
1005
  # @return [Array<Types::PolicyDescriptorType>]
1008
1006
  #
1009
1007
  # @!attribute [rw] duration_seconds
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-core
3
3
  version: !ruby/object:Gem::Version
4
- version: 3.53.1
4
+ version: 3.54.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2019-05-22 00:00:00.000000000 Z
11
+ date: 2019-05-28 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: jmespath