aws-sdk-core 3.60.0 → 3.61.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA1:
3
- metadata.gz: 0bb3cbc8b28eea247e7b01fe9aa1d0ef8387c4c4
4
- data.tar.gz: cd816ce44d681de599915e227134961c6de97de3
3
+ metadata.gz: 72fde71bfdfac6e1d5eb3593fce8a0d8a2322488
4
+ data.tar.gz: a0866520629cb224b581580d775139859938b1b5
5
5
  SHA512:
6
- metadata.gz: '0189664e9cdca26b2d498a90351f4cfcc07fc5bc0c4998926520fd56eebd080c44184ad02a04cbd1ddb3c3a91afe301f2182869028ecde1509f911fe27a7bcc0'
7
- data.tar.gz: 45d0f4b16ce22ef6e1e6945e30fa2ade39786cd6d2dcb9214b282164707732fd7ed96ccb177aa6a770366343a2a6936db7db10fdeb8cd38f9a6a6ea0bc635fd4
6
+ metadata.gz: d46517eec8d11c114e4b55d972d8d0fb1302aa580ba0fad863419379addf3749032e916fbb5f966affcdd1ae1a54a8dae909f144f3ee011718404a24d14e9996
7
+ data.tar.gz: 712a99fa4eb1924d4398539e83d870d71332848ba19f82602b2fa27132731b08a33522e5f36d230e040dcf10c8ca5d9ae85d1b8fc3905b190bf60ddb8124f456
data/VERSION CHANGED
@@ -1 +1 @@
1
- 3.60.0
1
+ 3.61.0
@@ -40,6 +40,6 @@ require_relative 'aws-sdk-sts/customizations'
40
40
  # @service
41
41
  module Aws::STS
42
42
 
43
- GEM_VERSION = '3.60.0'
43
+ GEM_VERSION = '3.61.0'
44
44
 
45
45
  end
@@ -395,8 +395,7 @@ module Aws::STS
395
395
  # ARNs. However, the plain text that you use for both inline and managed
396
396
  # session policies shouldn't exceed 2048 characters. For more
397
397
  # information about ARNs, see [Amazon Resource Names (ARNs) and AWS
398
- # Service Namespaces](general/latest/gr/aws-arns-and-namespaces.html) in
399
- # the AWS General Reference.
398
+ # Service Namespaces][1] in the AWS General Reference.
400
399
  #
401
400
  # <note markdown="1"> The characters in this parameter count towards the 2048 character
402
401
  # session policy guideline. However, an AWS conversion compresses the
@@ -414,11 +413,12 @@ module Aws::STS
414
413
  # access resources in the account that owns the role. You cannot use
415
414
  # session policies to grant more permissions than those allowed by the
416
415
  # identity-based policy of the role that is being assumed. For more
417
- # information, see [Session Policies][1] in the *IAM User Guide*.
416
+ # information, see [Session Policies][2] in the *IAM User Guide*.
418
417
  #
419
418
  #
420
419
  #
421
- # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
420
+ # [1]: https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html
421
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
422
422
  #
423
423
  # @option params [String] :policy
424
424
  # An IAM policy in JSON format that you want to use as an inline session
@@ -715,8 +715,7 @@ module Aws::STS
715
715
  # ARNs. However, the plain text that you use for both inline and managed
716
716
  # session policies shouldn't exceed 2048 characters. For more
717
717
  # information about ARNs, see [Amazon Resource Names (ARNs) and AWS
718
- # Service Namespaces](general/latest/gr/aws-arns-and-namespaces.html) in
719
- # the AWS General Reference.
718
+ # Service Namespaces][1] in the AWS General Reference.
720
719
  #
721
720
  # <note markdown="1"> The characters in this parameter count towards the 2048 character
722
721
  # session policy guideline. However, an AWS conversion compresses the
@@ -734,11 +733,12 @@ module Aws::STS
734
733
  # access resources in the account that owns the role. You cannot use
735
734
  # session policies to grant more permissions than those allowed by the
736
735
  # identity-based policy of the role that is being assumed. For more
737
- # information, see [Session Policies][1] in the *IAM User Guide*.
736
+ # information, see [Session Policies][2] in the *IAM User Guide*.
738
737
  #
739
738
  #
740
739
  #
741
- # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
740
+ # [1]: https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html
741
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
742
742
  #
743
743
  # @option params [String] :policy
744
744
  # An IAM policy in JSON format that you want to use as an inline session
@@ -1019,8 +1019,7 @@ module Aws::STS
1019
1019
  # ARNs. However, the plain text that you use for both inline and managed
1020
1020
  # session policies shouldn't exceed 2048 characters. For more
1021
1021
  # information about ARNs, see [Amazon Resource Names (ARNs) and AWS
1022
- # Service Namespaces](general/latest/gr/aws-arns-and-namespaces.html) in
1023
- # the AWS General Reference.
1022
+ # Service Namespaces][1] in the AWS General Reference.
1024
1023
  #
1025
1024
  # <note markdown="1"> The characters in this parameter count towards the 2048 character
1026
1025
  # session policy guideline. However, an AWS conversion compresses the
@@ -1038,11 +1037,12 @@ module Aws::STS
1038
1037
  # access resources in the account that owns the role. You cannot use
1039
1038
  # session policies to grant more permissions than those allowed by the
1040
1039
  # identity-based policy of the role that is being assumed. For more
1041
- # information, see [Session Policies][1] in the *IAM User Guide*.
1040
+ # information, see [Session Policies][2] in the *IAM User Guide*.
1042
1041
  #
1043
1042
  #
1044
1043
  #
1045
- # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
1044
+ # [1]: https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html
1045
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
1046
1046
  #
1047
1047
  # @option params [String] :policy
1048
1048
  # An IAM policy in JSON format that you want to use as an inline session
@@ -1263,6 +1263,66 @@ module Aws::STS
1263
1263
  req.send_request(options)
1264
1264
  end
1265
1265
 
1266
+ # Returns the account identifier for the specified access key ID.
1267
+ #
1268
+ # Access keys consist of two parts: an access key ID (for example,
1269
+ # `AKIAIOSFODNN7EXAMPLE`) and a secret access key (for example,
1270
+ # `wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY`). For more information
1271
+ # about access keys, see [Managing Access Keys for IAM Users][1] in the
1272
+ # *IAM User Guide*.
1273
+ #
1274
+ # When you pass an access key ID to this operation, it returns the ID of
1275
+ # the AWS account to which the keys belong. Access key IDs beginning
1276
+ # with `AKIA` are long-term credentials for an IAM user or the AWS
1277
+ # account root user. Access key IDs beginning with `ASIA` are temporary
1278
+ # credentials that are created using STS operations. If the account in
1279
+ # the response belongs to you, you can sign in as the root user and
1280
+ # review your root user access keys. Then, you can pull a [credentials
1281
+ # report][2] to learn which IAM user owns the keys. To learn who
1282
+ # requested the temporary credentials for an `ASIA` access key, view the
1283
+ # STS events in your [CloudTrail logs][3].
1284
+ #
1285
+ # This operation does not indicate the state of the access key. The key
1286
+ # might be active, inactive, or deleted. Active keys might not have
1287
+ # permissions to perform an operation. Providing a deleted keys might
1288
+ # return an error that the key doesn't exist.
1289
+ #
1290
+ #
1291
+ #
1292
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_access-keys.html
1293
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_getting-report
1294
+ # [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/cloudtrail-integration
1295
+ #
1296
+ # @option params [required, String] :access_key_id
1297
+ # The identifier of an access key.
1298
+ #
1299
+ # This parameter allows (through its regex pattern) a string of
1300
+ # characters that can consist of any upper- or lowercased letter or
1301
+ # digit.
1302
+ #
1303
+ # @return [Types::GetAccessKeyInfoResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
1304
+ #
1305
+ # * {Types::GetAccessKeyInfoResponse#account #account} => String
1306
+ #
1307
+ # @example Request syntax with placeholder values
1308
+ #
1309
+ # resp = client.get_access_key_info({
1310
+ # access_key_id: "accessKeyIdType", # required
1311
+ # })
1312
+ #
1313
+ # @example Response structure
1314
+ #
1315
+ # resp.account #=> String
1316
+ #
1317
+ # @see http://docs.aws.amazon.com/goto/WebAPI/sts-2011-06-15/GetAccessKeyInfo AWS API Documentation
1318
+ #
1319
+ # @overload get_access_key_info(params = {})
1320
+ # @param [Hash] params ({})
1321
+ def get_access_key_info(params = {}, options = {})
1322
+ req = build_request(:get_access_key_info, params)
1323
+ req.send_request(options)
1324
+ end
1325
+
1266
1326
  # Returns details about the IAM identity whose credentials are used to
1267
1327
  # call the API.
1268
1328
  #
@@ -1734,7 +1794,7 @@ module Aws::STS
1734
1794
  params: params,
1735
1795
  config: config)
1736
1796
  context[:gem_name] = 'aws-sdk-core'
1737
- context[:gem_version] = '3.60.0'
1797
+ context[:gem_version] = '3.61.0'
1738
1798
  Seahorse::Client::Request.new(handlers, context)
1739
1799
  end
1740
1800
 
@@ -24,6 +24,8 @@ module Aws::STS
24
24
  DecodeAuthorizationMessageResponse = Shapes::StructureShape.new(name: 'DecodeAuthorizationMessageResponse')
25
25
  ExpiredTokenException = Shapes::StructureShape.new(name: 'ExpiredTokenException')
26
26
  FederatedUser = Shapes::StructureShape.new(name: 'FederatedUser')
27
+ GetAccessKeyInfoRequest = Shapes::StructureShape.new(name: 'GetAccessKeyInfoRequest')
28
+ GetAccessKeyInfoResponse = Shapes::StructureShape.new(name: 'GetAccessKeyInfoResponse')
27
29
  GetCallerIdentityRequest = Shapes::StructureShape.new(name: 'GetCallerIdentityRequest')
28
30
  GetCallerIdentityResponse = Shapes::StructureShape.new(name: 'GetCallerIdentityResponse')
29
31
  GetFederationTokenRequest = Shapes::StructureShape.new(name: 'GetFederationTokenRequest')
@@ -149,6 +151,12 @@ module Aws::STS
149
151
  FederatedUser.add_member(:arn, Shapes::ShapeRef.new(shape: arnType, required: true, location_name: "Arn"))
150
152
  FederatedUser.struct_class = Types::FederatedUser
151
153
 
154
+ GetAccessKeyInfoRequest.add_member(:access_key_id, Shapes::ShapeRef.new(shape: accessKeyIdType, required: true, location_name: "AccessKeyId"))
155
+ GetAccessKeyInfoRequest.struct_class = Types::GetAccessKeyInfoRequest
156
+
157
+ GetAccessKeyInfoResponse.add_member(:account, Shapes::ShapeRef.new(shape: accountType, location_name: "Account"))
158
+ GetAccessKeyInfoResponse.struct_class = Types::GetAccessKeyInfoResponse
159
+
152
160
  GetCallerIdentityRequest.struct_class = Types::GetCallerIdentityRequest
153
161
 
154
162
  GetCallerIdentityResponse.add_member(:user_id, Shapes::ShapeRef.new(shape: userIdType, location_name: "UserId"))
@@ -271,6 +279,14 @@ module Aws::STS
271
279
  o.errors << Shapes::ShapeRef.new(shape: InvalidAuthorizationMessageException)
272
280
  end)
273
281
 
282
+ api.add_operation(:get_access_key_info, Seahorse::Model::Operation.new.tap do |o|
283
+ o.name = "GetAccessKeyInfo"
284
+ o.http_method = "POST"
285
+ o.http_request_uri = "/"
286
+ o.input = Shapes::ShapeRef.new(shape: GetAccessKeyInfoRequest)
287
+ o.output = Shapes::ShapeRef.new(shape: GetAccessKeyInfoResponse)
288
+ end)
289
+
274
290
  api.add_operation(:get_caller_identity, Seahorse::Model::Operation.new.tap do |o|
275
291
  o.name = "GetCallerIdentity"
276
292
  o.http_method = "POST"
@@ -57,8 +57,7 @@ module Aws::STS
57
57
  # ARNs. However, the plain text that you use for both inline and
58
58
  # managed session policies shouldn't exceed 2048 characters. For more
59
59
  # information about ARNs, see [Amazon Resource Names (ARNs) and AWS
60
- # Service Namespaces](general/latest/gr/aws-arns-and-namespaces.html)
61
- # in the AWS General Reference.
60
+ # Service Namespaces][1] in the AWS General Reference.
62
61
  #
63
62
  # <note markdown="1"> The characters in this parameter count towards the 2048 character
64
63
  # session policy guideline. However, an AWS conversion compresses the
@@ -77,11 +76,12 @@ module Aws::STS
77
76
  # owns the role. You cannot use session policies to grant more
78
77
  # permissions than those allowed by the identity-based policy of the
79
78
  # role that is being assumed. For more information, see [Session
80
- # Policies][1] in the *IAM User Guide*.
79
+ # Policies][2] in the *IAM User Guide*.
81
80
  #
82
81
  #
83
82
  #
84
- # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
83
+ # [1]: https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html
84
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
85
85
  # @return [Array<Types::PolicyDescriptorType>]
86
86
  #
87
87
  # @!attribute [rw] policy
@@ -297,8 +297,7 @@ module Aws::STS
297
297
  # ARNs. However, the plain text that you use for both inline and
298
298
  # managed session policies shouldn't exceed 2048 characters. For more
299
299
  # information about ARNs, see [Amazon Resource Names (ARNs) and AWS
300
- # Service Namespaces](general/latest/gr/aws-arns-and-namespaces.html)
301
- # in the AWS General Reference.
300
+ # Service Namespaces][1] in the AWS General Reference.
302
301
  #
303
302
  # <note markdown="1"> The characters in this parameter count towards the 2048 character
304
303
  # session policy guideline. However, an AWS conversion compresses the
@@ -317,11 +316,12 @@ module Aws::STS
317
316
  # owns the role. You cannot use session policies to grant more
318
317
  # permissions than those allowed by the identity-based policy of the
319
318
  # role that is being assumed. For more information, see [Session
320
- # Policies][1] in the *IAM User Guide*.
319
+ # Policies][2] in the *IAM User Guide*.
321
320
  #
322
321
  #
323
322
  #
324
- # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
323
+ # [1]: https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html
324
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
325
325
  # @return [Array<Types::PolicyDescriptorType>]
326
326
  #
327
327
  # @!attribute [rw] policy
@@ -548,8 +548,7 @@ module Aws::STS
548
548
  # ARNs. However, the plain text that you use for both inline and
549
549
  # managed session policies shouldn't exceed 2048 characters. For more
550
550
  # information about ARNs, see [Amazon Resource Names (ARNs) and AWS
551
- # Service Namespaces](general/latest/gr/aws-arns-and-namespaces.html)
552
- # in the AWS General Reference.
551
+ # Service Namespaces][1] in the AWS General Reference.
553
552
  #
554
553
  # <note markdown="1"> The characters in this parameter count towards the 2048 character
555
554
  # session policy guideline. However, an AWS conversion compresses the
@@ -568,11 +567,12 @@ module Aws::STS
568
567
  # owns the role. You cannot use session policies to grant more
569
568
  # permissions than those allowed by the identity-based policy of the
570
569
  # role that is being assumed. For more information, see [Session
571
- # Policies][1] in the *IAM User Guide*.
570
+ # Policies][2] in the *IAM User Guide*.
572
571
  #
573
572
  #
574
573
  #
575
- # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
574
+ # [1]: https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html
575
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
576
576
  # @return [Array<Types::PolicyDescriptorType>]
577
577
  #
578
578
  # @!attribute [rw] policy
@@ -848,6 +848,39 @@ module Aws::STS
848
848
  include Aws::Structure
849
849
  end
850
850
 
851
+ # @note When making an API call, you may pass GetAccessKeyInfoRequest
852
+ # data as a hash:
853
+ #
854
+ # {
855
+ # access_key_id: "accessKeyIdType", # required
856
+ # }
857
+ #
858
+ # @!attribute [rw] access_key_id
859
+ # The identifier of an access key.
860
+ #
861
+ # This parameter allows (through its regex pattern) a string of
862
+ # characters that can consist of any upper- or lowercased letter or
863
+ # digit.
864
+ # @return [String]
865
+ #
866
+ # @see http://docs.aws.amazon.com/goto/WebAPI/sts-2011-06-15/GetAccessKeyInfoRequest AWS API Documentation
867
+ #
868
+ class GetAccessKeyInfoRequest < Struct.new(
869
+ :access_key_id)
870
+ include Aws::Structure
871
+ end
872
+
873
+ # @!attribute [rw] account
874
+ # The number used to identify the AWS account.
875
+ # @return [String]
876
+ #
877
+ # @see http://docs.aws.amazon.com/goto/WebAPI/sts-2011-06-15/GetAccessKeyInfoResponse AWS API Documentation
878
+ #
879
+ class GetAccessKeyInfoResponse < Struct.new(
880
+ :account)
881
+ include Aws::Structure
882
+ end
883
+
851
884
  # @api private
852
885
  #
853
886
  # @see http://docs.aws.amazon.com/goto/WebAPI/sts-2011-06-15/GetCallerIdentityRequest AWS API Documentation
@@ -1241,9 +1274,12 @@ module Aws::STS
1241
1274
  # @!attribute [rw] arn
1242
1275
  # The Amazon Resource Name (ARN) of the IAM managed policy to use as a
1243
1276
  # session policy for the role. For more information about ARNs, see
1244
- # [Amazon Resource Names (ARNs) and AWS Service
1245
- # Namespaces](general/latest/gr/aws-arns-and-namespaces.html) in the
1277
+ # [Amazon Resource Names (ARNs) and AWS Service Namespaces][1] in the
1246
1278
  # *AWS General Reference*.
1279
+ #
1280
+ #
1281
+ #
1282
+ # [1]: https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html
1247
1283
  # @return [String]
1248
1284
  #
1249
1285
  # @see http://docs.aws.amazon.com/goto/WebAPI/sts-2011-06-15/PolicyDescriptorType AWS API Documentation
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-core
3
3
  version: !ruby/object:Gem::Version
4
- version: 3.60.0
4
+ version: 3.61.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2019-07-23 00:00:00.000000000 Z
11
+ date: 2019-07-24 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: jmespath