aws-sdk-core 3.60.0 → 3.61.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA1:
3
- metadata.gz: 0bb3cbc8b28eea247e7b01fe9aa1d0ef8387c4c4
4
- data.tar.gz: cd816ce44d681de599915e227134961c6de97de3
3
+ metadata.gz: 72fde71bfdfac6e1d5eb3593fce8a0d8a2322488
4
+ data.tar.gz: a0866520629cb224b581580d775139859938b1b5
5
5
  SHA512:
6
- metadata.gz: '0189664e9cdca26b2d498a90351f4cfcc07fc5bc0c4998926520fd56eebd080c44184ad02a04cbd1ddb3c3a91afe301f2182869028ecde1509f911fe27a7bcc0'
7
- data.tar.gz: 45d0f4b16ce22ef6e1e6945e30fa2ade39786cd6d2dcb9214b282164707732fd7ed96ccb177aa6a770366343a2a6936db7db10fdeb8cd38f9a6a6ea0bc635fd4
6
+ metadata.gz: d46517eec8d11c114e4b55d972d8d0fb1302aa580ba0fad863419379addf3749032e916fbb5f966affcdd1ae1a54a8dae909f144f3ee011718404a24d14e9996
7
+ data.tar.gz: 712a99fa4eb1924d4398539e83d870d71332848ba19f82602b2fa27132731b08a33522e5f36d230e040dcf10c8ca5d9ae85d1b8fc3905b190bf60ddb8124f456
data/VERSION CHANGED
@@ -1 +1 @@
1
- 3.60.0
1
+ 3.61.0
@@ -40,6 +40,6 @@ require_relative 'aws-sdk-sts/customizations'
40
40
  # @service
41
41
  module Aws::STS
42
42
 
43
- GEM_VERSION = '3.60.0'
43
+ GEM_VERSION = '3.61.0'
44
44
 
45
45
  end
@@ -395,8 +395,7 @@ module Aws::STS
395
395
  # ARNs. However, the plain text that you use for both inline and managed
396
396
  # session policies shouldn't exceed 2048 characters. For more
397
397
  # information about ARNs, see [Amazon Resource Names (ARNs) and AWS
398
- # Service Namespaces](general/latest/gr/aws-arns-and-namespaces.html) in
399
- # the AWS General Reference.
398
+ # Service Namespaces][1] in the AWS General Reference.
400
399
  #
401
400
  # <note markdown="1"> The characters in this parameter count towards the 2048 character
402
401
  # session policy guideline. However, an AWS conversion compresses the
@@ -414,11 +413,12 @@ module Aws::STS
414
413
  # access resources in the account that owns the role. You cannot use
415
414
  # session policies to grant more permissions than those allowed by the
416
415
  # identity-based policy of the role that is being assumed. For more
417
- # information, see [Session Policies][1] in the *IAM User Guide*.
416
+ # information, see [Session Policies][2] in the *IAM User Guide*.
418
417
  #
419
418
  #
420
419
  #
421
- # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
420
+ # [1]: https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html
421
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
422
422
  #
423
423
  # @option params [String] :policy
424
424
  # An IAM policy in JSON format that you want to use as an inline session
@@ -715,8 +715,7 @@ module Aws::STS
715
715
  # ARNs. However, the plain text that you use for both inline and managed
716
716
  # session policies shouldn't exceed 2048 characters. For more
717
717
  # information about ARNs, see [Amazon Resource Names (ARNs) and AWS
718
- # Service Namespaces](general/latest/gr/aws-arns-and-namespaces.html) in
719
- # the AWS General Reference.
718
+ # Service Namespaces][1] in the AWS General Reference.
720
719
  #
721
720
  # <note markdown="1"> The characters in this parameter count towards the 2048 character
722
721
  # session policy guideline. However, an AWS conversion compresses the
@@ -734,11 +733,12 @@ module Aws::STS
734
733
  # access resources in the account that owns the role. You cannot use
735
734
  # session policies to grant more permissions than those allowed by the
736
735
  # identity-based policy of the role that is being assumed. For more
737
- # information, see [Session Policies][1] in the *IAM User Guide*.
736
+ # information, see [Session Policies][2] in the *IAM User Guide*.
738
737
  #
739
738
  #
740
739
  #
741
- # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
740
+ # [1]: https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html
741
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
742
742
  #
743
743
  # @option params [String] :policy
744
744
  # An IAM policy in JSON format that you want to use as an inline session
@@ -1019,8 +1019,7 @@ module Aws::STS
1019
1019
  # ARNs. However, the plain text that you use for both inline and managed
1020
1020
  # session policies shouldn't exceed 2048 characters. For more
1021
1021
  # information about ARNs, see [Amazon Resource Names (ARNs) and AWS
1022
- # Service Namespaces](general/latest/gr/aws-arns-and-namespaces.html) in
1023
- # the AWS General Reference.
1022
+ # Service Namespaces][1] in the AWS General Reference.
1024
1023
  #
1025
1024
  # <note markdown="1"> The characters in this parameter count towards the 2048 character
1026
1025
  # session policy guideline. However, an AWS conversion compresses the
@@ -1038,11 +1037,12 @@ module Aws::STS
1038
1037
  # access resources in the account that owns the role. You cannot use
1039
1038
  # session policies to grant more permissions than those allowed by the
1040
1039
  # identity-based policy of the role that is being assumed. For more
1041
- # information, see [Session Policies][1] in the *IAM User Guide*.
1040
+ # information, see [Session Policies][2] in the *IAM User Guide*.
1042
1041
  #
1043
1042
  #
1044
1043
  #
1045
- # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
1044
+ # [1]: https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html
1045
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
1046
1046
  #
1047
1047
  # @option params [String] :policy
1048
1048
  # An IAM policy in JSON format that you want to use as an inline session
@@ -1263,6 +1263,66 @@ module Aws::STS
1263
1263
  req.send_request(options)
1264
1264
  end
1265
1265
 
1266
+ # Returns the account identifier for the specified access key ID.
1267
+ #
1268
+ # Access keys consist of two parts: an access key ID (for example,
1269
+ # `AKIAIOSFODNN7EXAMPLE`) and a secret access key (for example,
1270
+ # `wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY`). For more information
1271
+ # about access keys, see [Managing Access Keys for IAM Users][1] in the
1272
+ # *IAM User Guide*.
1273
+ #
1274
+ # When you pass an access key ID to this operation, it returns the ID of
1275
+ # the AWS account to which the keys belong. Access key IDs beginning
1276
+ # with `AKIA` are long-term credentials for an IAM user or the AWS
1277
+ # account root user. Access key IDs beginning with `ASIA` are temporary
1278
+ # credentials that are created using STS operations. If the account in
1279
+ # the response belongs to you, you can sign in as the root user and
1280
+ # review your root user access keys. Then, you can pull a [credentials
1281
+ # report][2] to learn which IAM user owns the keys. To learn who
1282
+ # requested the temporary credentials for an `ASIA` access key, view the
1283
+ # STS events in your [CloudTrail logs][3].
1284
+ #
1285
+ # This operation does not indicate the state of the access key. The key
1286
+ # might be active, inactive, or deleted. Active keys might not have
1287
+ # permissions to perform an operation. Providing a deleted keys might
1288
+ # return an error that the key doesn't exist.
1289
+ #
1290
+ #
1291
+ #
1292
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_access-keys.html
1293
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_getting-report
1294
+ # [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/cloudtrail-integration
1295
+ #
1296
+ # @option params [required, String] :access_key_id
1297
+ # The identifier of an access key.
1298
+ #
1299
+ # This parameter allows (through its regex pattern) a string of
1300
+ # characters that can consist of any upper- or lowercased letter or
1301
+ # digit.
1302
+ #
1303
+ # @return [Types::GetAccessKeyInfoResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
1304
+ #
1305
+ # * {Types::GetAccessKeyInfoResponse#account #account} => String
1306
+ #
1307
+ # @example Request syntax with placeholder values
1308
+ #
1309
+ # resp = client.get_access_key_info({
1310
+ # access_key_id: "accessKeyIdType", # required
1311
+ # })
1312
+ #
1313
+ # @example Response structure
1314
+ #
1315
+ # resp.account #=> String
1316
+ #
1317
+ # @see http://docs.aws.amazon.com/goto/WebAPI/sts-2011-06-15/GetAccessKeyInfo AWS API Documentation
1318
+ #
1319
+ # @overload get_access_key_info(params = {})
1320
+ # @param [Hash] params ({})
1321
+ def get_access_key_info(params = {}, options = {})
1322
+ req = build_request(:get_access_key_info, params)
1323
+ req.send_request(options)
1324
+ end
1325
+
1266
1326
  # Returns details about the IAM identity whose credentials are used to
1267
1327
  # call the API.
1268
1328
  #
@@ -1734,7 +1794,7 @@ module Aws::STS
1734
1794
  params: params,
1735
1795
  config: config)
1736
1796
  context[:gem_name] = 'aws-sdk-core'
1737
- context[:gem_version] = '3.60.0'
1797
+ context[:gem_version] = '3.61.0'
1738
1798
  Seahorse::Client::Request.new(handlers, context)
1739
1799
  end
1740
1800
 
@@ -24,6 +24,8 @@ module Aws::STS
24
24
  DecodeAuthorizationMessageResponse = Shapes::StructureShape.new(name: 'DecodeAuthorizationMessageResponse')
25
25
  ExpiredTokenException = Shapes::StructureShape.new(name: 'ExpiredTokenException')
26
26
  FederatedUser = Shapes::StructureShape.new(name: 'FederatedUser')
27
+ GetAccessKeyInfoRequest = Shapes::StructureShape.new(name: 'GetAccessKeyInfoRequest')
28
+ GetAccessKeyInfoResponse = Shapes::StructureShape.new(name: 'GetAccessKeyInfoResponse')
27
29
  GetCallerIdentityRequest = Shapes::StructureShape.new(name: 'GetCallerIdentityRequest')
28
30
  GetCallerIdentityResponse = Shapes::StructureShape.new(name: 'GetCallerIdentityResponse')
29
31
  GetFederationTokenRequest = Shapes::StructureShape.new(name: 'GetFederationTokenRequest')
@@ -149,6 +151,12 @@ module Aws::STS
149
151
  FederatedUser.add_member(:arn, Shapes::ShapeRef.new(shape: arnType, required: true, location_name: "Arn"))
150
152
  FederatedUser.struct_class = Types::FederatedUser
151
153
 
154
+ GetAccessKeyInfoRequest.add_member(:access_key_id, Shapes::ShapeRef.new(shape: accessKeyIdType, required: true, location_name: "AccessKeyId"))
155
+ GetAccessKeyInfoRequest.struct_class = Types::GetAccessKeyInfoRequest
156
+
157
+ GetAccessKeyInfoResponse.add_member(:account, Shapes::ShapeRef.new(shape: accountType, location_name: "Account"))
158
+ GetAccessKeyInfoResponse.struct_class = Types::GetAccessKeyInfoResponse
159
+
152
160
  GetCallerIdentityRequest.struct_class = Types::GetCallerIdentityRequest
153
161
 
154
162
  GetCallerIdentityResponse.add_member(:user_id, Shapes::ShapeRef.new(shape: userIdType, location_name: "UserId"))
@@ -271,6 +279,14 @@ module Aws::STS
271
279
  o.errors << Shapes::ShapeRef.new(shape: InvalidAuthorizationMessageException)
272
280
  end)
273
281
 
282
+ api.add_operation(:get_access_key_info, Seahorse::Model::Operation.new.tap do |o|
283
+ o.name = "GetAccessKeyInfo"
284
+ o.http_method = "POST"
285
+ o.http_request_uri = "/"
286
+ o.input = Shapes::ShapeRef.new(shape: GetAccessKeyInfoRequest)
287
+ o.output = Shapes::ShapeRef.new(shape: GetAccessKeyInfoResponse)
288
+ end)
289
+
274
290
  api.add_operation(:get_caller_identity, Seahorse::Model::Operation.new.tap do |o|
275
291
  o.name = "GetCallerIdentity"
276
292
  o.http_method = "POST"
@@ -57,8 +57,7 @@ module Aws::STS
57
57
  # ARNs. However, the plain text that you use for both inline and
58
58
  # managed session policies shouldn't exceed 2048 characters. For more
59
59
  # information about ARNs, see [Amazon Resource Names (ARNs) and AWS
60
- # Service Namespaces](general/latest/gr/aws-arns-and-namespaces.html)
61
- # in the AWS General Reference.
60
+ # Service Namespaces][1] in the AWS General Reference.
62
61
  #
63
62
  # <note markdown="1"> The characters in this parameter count towards the 2048 character
64
63
  # session policy guideline. However, an AWS conversion compresses the
@@ -77,11 +76,12 @@ module Aws::STS
77
76
  # owns the role. You cannot use session policies to grant more
78
77
  # permissions than those allowed by the identity-based policy of the
79
78
  # role that is being assumed. For more information, see [Session
80
- # Policies][1] in the *IAM User Guide*.
79
+ # Policies][2] in the *IAM User Guide*.
81
80
  #
82
81
  #
83
82
  #
84
- # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
83
+ # [1]: https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html
84
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
85
85
  # @return [Array<Types::PolicyDescriptorType>]
86
86
  #
87
87
  # @!attribute [rw] policy
@@ -297,8 +297,7 @@ module Aws::STS
297
297
  # ARNs. However, the plain text that you use for both inline and
298
298
  # managed session policies shouldn't exceed 2048 characters. For more
299
299
  # information about ARNs, see [Amazon Resource Names (ARNs) and AWS
300
- # Service Namespaces](general/latest/gr/aws-arns-and-namespaces.html)
301
- # in the AWS General Reference.
300
+ # Service Namespaces][1] in the AWS General Reference.
302
301
  #
303
302
  # <note markdown="1"> The characters in this parameter count towards the 2048 character
304
303
  # session policy guideline. However, an AWS conversion compresses the
@@ -317,11 +316,12 @@ module Aws::STS
317
316
  # owns the role. You cannot use session policies to grant more
318
317
  # permissions than those allowed by the identity-based policy of the
319
318
  # role that is being assumed. For more information, see [Session
320
- # Policies][1] in the *IAM User Guide*.
319
+ # Policies][2] in the *IAM User Guide*.
321
320
  #
322
321
  #
323
322
  #
324
- # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
323
+ # [1]: https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html
324
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
325
325
  # @return [Array<Types::PolicyDescriptorType>]
326
326
  #
327
327
  # @!attribute [rw] policy
@@ -548,8 +548,7 @@ module Aws::STS
548
548
  # ARNs. However, the plain text that you use for both inline and
549
549
  # managed session policies shouldn't exceed 2048 characters. For more
550
550
  # information about ARNs, see [Amazon Resource Names (ARNs) and AWS
551
- # Service Namespaces](general/latest/gr/aws-arns-and-namespaces.html)
552
- # in the AWS General Reference.
551
+ # Service Namespaces][1] in the AWS General Reference.
553
552
  #
554
553
  # <note markdown="1"> The characters in this parameter count towards the 2048 character
555
554
  # session policy guideline. However, an AWS conversion compresses the
@@ -568,11 +567,12 @@ module Aws::STS
568
567
  # owns the role. You cannot use session policies to grant more
569
568
  # permissions than those allowed by the identity-based policy of the
570
569
  # role that is being assumed. For more information, see [Session
571
- # Policies][1] in the *IAM User Guide*.
570
+ # Policies][2] in the *IAM User Guide*.
572
571
  #
573
572
  #
574
573
  #
575
- # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
574
+ # [1]: https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html
575
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
576
576
  # @return [Array<Types::PolicyDescriptorType>]
577
577
  #
578
578
  # @!attribute [rw] policy
@@ -848,6 +848,39 @@ module Aws::STS
848
848
  include Aws::Structure
849
849
  end
850
850
 
851
+ # @note When making an API call, you may pass GetAccessKeyInfoRequest
852
+ # data as a hash:
853
+ #
854
+ # {
855
+ # access_key_id: "accessKeyIdType", # required
856
+ # }
857
+ #
858
+ # @!attribute [rw] access_key_id
859
+ # The identifier of an access key.
860
+ #
861
+ # This parameter allows (through its regex pattern) a string of
862
+ # characters that can consist of any upper- or lowercased letter or
863
+ # digit.
864
+ # @return [String]
865
+ #
866
+ # @see http://docs.aws.amazon.com/goto/WebAPI/sts-2011-06-15/GetAccessKeyInfoRequest AWS API Documentation
867
+ #
868
+ class GetAccessKeyInfoRequest < Struct.new(
869
+ :access_key_id)
870
+ include Aws::Structure
871
+ end
872
+
873
+ # @!attribute [rw] account
874
+ # The number used to identify the AWS account.
875
+ # @return [String]
876
+ #
877
+ # @see http://docs.aws.amazon.com/goto/WebAPI/sts-2011-06-15/GetAccessKeyInfoResponse AWS API Documentation
878
+ #
879
+ class GetAccessKeyInfoResponse < Struct.new(
880
+ :account)
881
+ include Aws::Structure
882
+ end
883
+
851
884
  # @api private
852
885
  #
853
886
  # @see http://docs.aws.amazon.com/goto/WebAPI/sts-2011-06-15/GetCallerIdentityRequest AWS API Documentation
@@ -1241,9 +1274,12 @@ module Aws::STS
1241
1274
  # @!attribute [rw] arn
1242
1275
  # The Amazon Resource Name (ARN) of the IAM managed policy to use as a
1243
1276
  # session policy for the role. For more information about ARNs, see
1244
- # [Amazon Resource Names (ARNs) and AWS Service
1245
- # Namespaces](general/latest/gr/aws-arns-and-namespaces.html) in the
1277
+ # [Amazon Resource Names (ARNs) and AWS Service Namespaces][1] in the
1246
1278
  # *AWS General Reference*.
1279
+ #
1280
+ #
1281
+ #
1282
+ # [1]: https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html
1247
1283
  # @return [String]
1248
1284
  #
1249
1285
  # @see http://docs.aws.amazon.com/goto/WebAPI/sts-2011-06-15/PolicyDescriptorType AWS API Documentation
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-core
3
3
  version: !ruby/object:Gem::Version
4
- version: 3.60.0
4
+ version: 3.61.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2019-07-23 00:00:00.000000000 Z
11
+ date: 2019-07-24 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: jmespath