aws-sdk 1.10.0 → 1.11.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -100,6 +100,7 @@
100
100
  - :string
101
101
  :key_param: Name
102
102
  :value_param: Value
103
+ :flattened: true
103
104
  - :rename: attributes
104
105
  :outputs:
105
106
  :children:
@@ -309,6 +310,7 @@
309
310
  - :string
310
311
  :key_param: Name
311
312
  :value_param: Value
313
+ :flattened: true
312
314
  - :required
313
315
  - :rename: attributes
314
316
  :outputs:
@@ -40,6 +40,35 @@
40
40
  :type: :time
41
41
  PackedPolicySize:
42
42
  :type: :integer
43
+ - :name: AssumeRoleWithWebIdentity
44
+ :method: :assume_role_with_web_identity
45
+ :inputs:
46
+ RoleArn:
47
+ - :string
48
+ - :required
49
+ RoleSessionName:
50
+ - :string
51
+ - :required
52
+ WebIdentityToken:
53
+ - :string
54
+ - :required
55
+ ProviderId:
56
+ - :string
57
+ Policy:
58
+ - :string
59
+ DurationSeconds:
60
+ - :integer
61
+ :outputs:
62
+ :children:
63
+ AssumeRoleWithWebIdentityResult:
64
+ :ignore: true
65
+ :children:
66
+ Credentials:
67
+ :children:
68
+ Expiration:
69
+ :type: :time
70
+ PackedPolicySize:
71
+ :type: :integer
43
72
  - :name: GetFederationToken
44
73
  :method: :get_federation_token
45
74
  :inputs:
@@ -393,6 +393,9 @@ module AWS
393
393
  key_option.param_name = members[:key_param] if members[:key_param]
394
394
  value_option.param_name = members[:value_param] if members[:value_param]
395
395
 
396
+ separator = members[:flattened] ? '.' : '.entry.'
397
+ MetaUtils.extend_method(option, :separator) { separator }
398
+
396
399
  end
397
400
 
398
401
  def validate(value, context = nil)
@@ -413,7 +416,7 @@ module AWS
413
416
  values.inject([]) do |params, (key,value)|
414
417
 
415
418
  index = params.size / 2 + 1
416
- common_prefix = "#{prefixed_name(prefix)}.#{index}."
419
+ common_prefix = "#{prefixed_name(prefix)}#{separator}#{index}."
417
420
 
418
421
  key_name = common_prefix + key_option.param_name
419
422
  value_name = common_prefix + value_option.param_name
@@ -58,12 +58,13 @@ module AWS
58
58
  #
59
59
  # ec2.instances.create({
60
60
  # :image_id => "ami-8c1fece5",
61
- # :block_device_mappings => {
62
- # "/dev/sda2" => {
61
+ # :block_device_mappings => [{
62
+ # :device_name => "/dev/sda2",
63
+ # :ebs => {
63
64
  # :volume_size => 15, # 15 GiB
64
65
  # :delete_on_termination => true
65
66
  # }
66
- # }
67
+ # }]
67
68
  # })
68
69
  #
69
70
  # @example Launching in an Amazon VPC subnet
@@ -16,7 +16,13 @@ module AWS
16
16
 
17
17
  # @api private
18
18
  class Request < Core::Http::Request
19
- include Core::Signature::Version2
19
+
20
+ include Core::Signature::Version4
21
+
22
+ def service
23
+ 'rds'
24
+ end
25
+
20
26
  end
21
27
 
22
28
  end
@@ -41,15 +41,12 @@ module AWS
41
41
  # * `:role_session_name` - *required* - (String) An identifier for the
42
42
  # assumed role session. The session name is included as part of the
43
43
  # AssumedRoleUser.
44
- # * `:policy` - (String) A supplemental policy that can be associated
45
- # with the temporary security credentials. The caller can restrict
46
- # the permissions that are available on the role's temporary security
47
- # credentials to maintain the least amount of privileges. When a
48
- # service call is made with the temporary security credentials, both
49
- # the role's permission policy and supplemental policy are checked.
50
- # For more information about how permissions work in the context of
51
- # temporary credentials, see Controlling Permissions in Temporary
52
- # Credentials.
44
+ # * `:policy` - (String) A supplemental policy that is associated with
45
+ # the temporary security credentials from the AssumeRole call. The
46
+ # resulting permissions of the temporary security credentials are an
47
+ # intersection of this policy and the policy that is associated with
48
+ # the role. Use this policy to further restrict the permissions of
49
+ # the temporary security credentials.
53
50
  # * `:duration_seconds` - (Integer) The duration, in seconds, of the
54
51
  # role session. The value can range from 900 seconds (15 minutes) to
55
52
  # 3600 seconds (1 hour). By default, the value is set to 3600 seconds
@@ -77,18 +74,71 @@ module AWS
77
74
  # * `:arn` - (String)
78
75
  # * `:packed_policy_size` - (Integer)
79
76
 
77
+ # @!method assume_role_with_web_identity(options = {})
78
+ # Calls the AssumeRoleWithWebIdentity API operation.
79
+ # @param [Hash] options
80
+ # * `:role_arn` - *required* - (String) The Amazon Resource Name (ARN)
81
+ # of the role that the caller is assuming.
82
+ # * `:role_session_name` - *required* - (String) An identifier for the
83
+ # assumed role session. Typically, you pass the name or identifier
84
+ # that is associated with the user who is using your application.
85
+ # That way, the temporary security credentials that your application
86
+ # will use are associated with that user. This session name is
87
+ # included as part of the ARN and assumed role ID in the
88
+ # AssumedRoleUser response element.
89
+ # * `:web_identity_token` - *required* - (String) The OAuth 2.0 access
90
+ # token or OpenID Connect id token that is provided by the identity
91
+ # provider. Your application must get this token by authenticating
92
+ # the user who is using your application with a web identity provider
93
+ # before the application makes an AssumeRoleWithWebIdentity call.
94
+ # * `:provider_id` - (String) The fully-qualified host component of the
95
+ # domain name of the identity provider. Do not include URL schemes
96
+ # and port numbers. Specify this value only for OAuth access tokens.
97
+ # Currently, www.amazon.com and graph.facebook.com are supported. Do
98
+ # not specify this value for OpenID Connect id tokens, such as
99
+ # accounts.google.com.
100
+ # * `:policy` - (String) A supplemental policy that is associated with
101
+ # the temporary security credentials from the
102
+ # AssumeRoleWithWebIdentity call. The resulting permissions of the
103
+ # temporary security credentials are an intersection of this policy
104
+ # and the policy that is associated with the role. Use this policy to
105
+ # further restrict the permissions of the temporary security
106
+ # credentials.
107
+ # * `:duration_seconds` - (Integer) The duration, in seconds, of the
108
+ # role session. The value can range from 900 seconds (15 minutes) to
109
+ # 3600 seconds (1 hour). By default, the value is set to 3600 seconds
110
+ # (1 hour).
111
+ # @return [Core::Response]
112
+ # The #data method of the response object returns
113
+ # a hash with the following structure:
114
+ #
115
+ # * `:credentials` - (Hash)
116
+ # * `:access_key_id` - (String)
117
+ # * `:secret_access_key` - (String)
118
+ # * `:session_token` - (String)
119
+ # * `:expiration` - (Time)
120
+ # * `:subject_from_web_identity_token` - (String)
121
+ # * `:assumed_role_user` - (Hash)
122
+ # * `:assumed_role_id` - (String)
123
+ # * `:arn` - (String)
124
+ # * `:packed_policy_size` - (Integer)
125
+
80
126
  # @!method get_federation_token(options = {})
81
127
  # Calls the GetFederationToken API operation.
82
128
  # @param [Hash] options
83
- # * `:name` - *required* - (String) The name of the federated user
84
- # associated with the credentials. For information about limitations
85
- # on user names, go to Limitations on IAM Entities in Using IAM.
86
- # * `:policy` - (String) A policy specifying the permissions to
87
- # associate with the credentials. The caller can delegate their own
88
- # permissions by specifying a policy, and both policies will be
89
- # checked when a service call is made. For more information about how
90
- # permissions work in the context of temporary credentials, see
91
- # Controlling Permissions in Temporary Credentials in Using IAM.
129
+ # * `:name` - *required* - (String) The name of the federated user. The
130
+ # name is used as an identifier for the temporary security
131
+ # credentials (such as Bob). For example, you can reference the
132
+ # federated user name in a resource-based policy, such as in an
133
+ # Amazon S3 bucket policy.
134
+ # * `:policy` - (String) A policy that specifies the permissions that
135
+ # are granted to the federated user. By default, federated users have
136
+ # no permissions; they do not inherit any from the IAM user. When you
137
+ # specify a policy, the federated user's permissions are intersection
138
+ # of the specified policy and the IAM user's policy. If you don't
139
+ # specify a policy, federated users can only access AWS resources
140
+ # that explicitly allow those federated users in a resource policy,
141
+ # such as in an Amazon S3 bucket policy.
92
142
  # * `:duration_seconds` - (Integer) The duration, in seconds, that the
93
143
  # session should last. Acceptable durations for federation sessions
94
144
  # range from 900s (15 minutes) to 129600s (36 hours), with 43200s (12
@@ -121,26 +171,20 @@ module AWS
121
171
  # longer than one hour, the session for AWS account owners defaults
122
172
  # to one hour.
123
173
  # * `:serial_number` - (String) The identification number of the MFA
124
- # device for the user. If the IAM user has a policy requiring MFA
125
- # authentication (or is in a group requiring MFA authentication) to
126
- # access resources, provide the device value here.The value is in the
127
- # Security Credentials tab of the user's details pane in the IAM
128
- # console. If the IAM user has an active MFA device, the details pane
129
- # displays a Multi-Factor Authentication Device value. The value is
130
- # either for a virtual device, such as
131
- # arn:aws:iam::123456789012:mfa/user, or it is the device serial
132
- # number for a hardware device (usually the number from the back of
133
- # the device), such as GAHT12345678. For more information, see Using
134
- # Multi-Factor Authentication (MFA) Devices with AWS in Using IAM.
174
+ # device that is associated with the IAM user who is making the
175
+ # GetSessionToken call. Specify this value if the IAM user has a
176
+ # policy that requires MFA authentication. The value is either the
177
+ # serial number for a hardware device (such as GAHT12345678) or an
178
+ # Amazon Resource Name (ARN) for a virtual device (such as
179
+ # arn:aws:iam::123456789012:mfa/user). You can find the device for an
180
+ # IAM user by going to the AWS Management Console and viewing the
181
+ # user's security credentials.
135
182
  # * `:token_code` - (String) The value provided by the MFA device. If
136
- # the user has an access policy requiring an MFA code (or is in a
137
- # group requiring an MFA code), provide the value here to get
138
- # permission to resources as specified in the access policy. If MFA
139
- # authentication is required, and the user does not provide a code
140
- # when requesting a set of temporary security credentials, the user
141
- # will receive an "access denied" response when requesting resources
142
- # that require MFA authentication. For more information, see Using
143
- # Multi-Factor Authentication (MFA) Devices with AWS in Using IAM.
183
+ # any policy requires the IAM user to submit an MFA code, specify
184
+ # this value. If MFA authentication is required, and the user does
185
+ # not provide a code when requesting a set of temporary security
186
+ # credentials, the user will receive an "access denied" response when
187
+ # requesting resources that require MFA authentication.
144
188
  # @return [Core::Response]
145
189
  # The #data method of the response object returns
146
190
  # a hash with the following structure:
@@ -13,5 +13,5 @@
13
13
 
14
14
  module AWS
15
15
  # Current version of the AWS SDK for Ruby
16
- VERSION = '1.10.0'
16
+ VERSION = '1.11.0'
17
17
  end
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.10.0
4
+ version: 1.11.0
5
5
  prerelease:
6
6
  platform: ruby
7
7
  authors:
@@ -9,7 +9,7 @@ authors:
9
9
  autorequire:
10
10
  bindir: bin
11
11
  cert_chain: []
12
- date: 2013-05-15 00:00:00.000000000 Z
12
+ date: 2013-05-29 00:00:00.000000000 Z
13
13
  dependencies:
14
14
  - !ruby/object:Gem::Dependency
15
15
  name: uuidtools