aws-sdk 1.10.0 → 1.11.0
Sign up to get free protection for your applications and to get access to all the features.
- data/lib/aws/api_config/SQS-2012-11-05.yml +2 -0
- data/lib/aws/api_config/STS-2011-06-15.yml +29 -0
- data/lib/aws/core/option_grammar.rb +4 -1
- data/lib/aws/ec2/instance_collection.rb +4 -3
- data/lib/aws/rds/request.rb +7 -1
- data/lib/aws/sts/client.rb +81 -37
- data/lib/aws/version.rb +1 -1
- metadata +2 -2
@@ -100,6 +100,7 @@
|
|
100
100
|
- :string
|
101
101
|
:key_param: Name
|
102
102
|
:value_param: Value
|
103
|
+
:flattened: true
|
103
104
|
- :rename: attributes
|
104
105
|
:outputs:
|
105
106
|
:children:
|
@@ -309,6 +310,7 @@
|
|
309
310
|
- :string
|
310
311
|
:key_param: Name
|
311
312
|
:value_param: Value
|
313
|
+
:flattened: true
|
312
314
|
- :required
|
313
315
|
- :rename: attributes
|
314
316
|
:outputs:
|
@@ -40,6 +40,35 @@
|
|
40
40
|
:type: :time
|
41
41
|
PackedPolicySize:
|
42
42
|
:type: :integer
|
43
|
+
- :name: AssumeRoleWithWebIdentity
|
44
|
+
:method: :assume_role_with_web_identity
|
45
|
+
:inputs:
|
46
|
+
RoleArn:
|
47
|
+
- :string
|
48
|
+
- :required
|
49
|
+
RoleSessionName:
|
50
|
+
- :string
|
51
|
+
- :required
|
52
|
+
WebIdentityToken:
|
53
|
+
- :string
|
54
|
+
- :required
|
55
|
+
ProviderId:
|
56
|
+
- :string
|
57
|
+
Policy:
|
58
|
+
- :string
|
59
|
+
DurationSeconds:
|
60
|
+
- :integer
|
61
|
+
:outputs:
|
62
|
+
:children:
|
63
|
+
AssumeRoleWithWebIdentityResult:
|
64
|
+
:ignore: true
|
65
|
+
:children:
|
66
|
+
Credentials:
|
67
|
+
:children:
|
68
|
+
Expiration:
|
69
|
+
:type: :time
|
70
|
+
PackedPolicySize:
|
71
|
+
:type: :integer
|
43
72
|
- :name: GetFederationToken
|
44
73
|
:method: :get_federation_token
|
45
74
|
:inputs:
|
@@ -393,6 +393,9 @@ module AWS
|
|
393
393
|
key_option.param_name = members[:key_param] if members[:key_param]
|
394
394
|
value_option.param_name = members[:value_param] if members[:value_param]
|
395
395
|
|
396
|
+
separator = members[:flattened] ? '.' : '.entry.'
|
397
|
+
MetaUtils.extend_method(option, :separator) { separator }
|
398
|
+
|
396
399
|
end
|
397
400
|
|
398
401
|
def validate(value, context = nil)
|
@@ -413,7 +416,7 @@ module AWS
|
|
413
416
|
values.inject([]) do |params, (key,value)|
|
414
417
|
|
415
418
|
index = params.size / 2 + 1
|
416
|
-
common_prefix = "#{prefixed_name(prefix)}
|
419
|
+
common_prefix = "#{prefixed_name(prefix)}#{separator}#{index}."
|
417
420
|
|
418
421
|
key_name = common_prefix + key_option.param_name
|
419
422
|
value_name = common_prefix + value_option.param_name
|
@@ -58,12 +58,13 @@ module AWS
|
|
58
58
|
#
|
59
59
|
# ec2.instances.create({
|
60
60
|
# :image_id => "ami-8c1fece5",
|
61
|
-
# :block_device_mappings => {
|
62
|
-
# "/dev/sda2"
|
61
|
+
# :block_device_mappings => [{
|
62
|
+
# :device_name => "/dev/sda2",
|
63
|
+
# :ebs => {
|
63
64
|
# :volume_size => 15, # 15 GiB
|
64
65
|
# :delete_on_termination => true
|
65
66
|
# }
|
66
|
-
# }
|
67
|
+
# }]
|
67
68
|
# })
|
68
69
|
#
|
69
70
|
# @example Launching in an Amazon VPC subnet
|
data/lib/aws/rds/request.rb
CHANGED
data/lib/aws/sts/client.rb
CHANGED
@@ -41,15 +41,12 @@ module AWS
|
|
41
41
|
# * `:role_session_name` - *required* - (String) An identifier for the
|
42
42
|
# assumed role session. The session name is included as part of the
|
43
43
|
# AssumedRoleUser.
|
44
|
-
# * `:policy` - (String) A supplemental policy that
|
45
|
-
#
|
46
|
-
#
|
47
|
-
#
|
48
|
-
#
|
49
|
-
# the
|
50
|
-
# For more information about how permissions work in the context of
|
51
|
-
# temporary credentials, see Controlling Permissions in Temporary
|
52
|
-
# Credentials.
|
44
|
+
# * `:policy` - (String) A supplemental policy that is associated with
|
45
|
+
# the temporary security credentials from the AssumeRole call. The
|
46
|
+
# resulting permissions of the temporary security credentials are an
|
47
|
+
# intersection of this policy and the policy that is associated with
|
48
|
+
# the role. Use this policy to further restrict the permissions of
|
49
|
+
# the temporary security credentials.
|
53
50
|
# * `:duration_seconds` - (Integer) The duration, in seconds, of the
|
54
51
|
# role session. The value can range from 900 seconds (15 minutes) to
|
55
52
|
# 3600 seconds (1 hour). By default, the value is set to 3600 seconds
|
@@ -77,18 +74,71 @@ module AWS
|
|
77
74
|
# * `:arn` - (String)
|
78
75
|
# * `:packed_policy_size` - (Integer)
|
79
76
|
|
77
|
+
# @!method assume_role_with_web_identity(options = {})
|
78
|
+
# Calls the AssumeRoleWithWebIdentity API operation.
|
79
|
+
# @param [Hash] options
|
80
|
+
# * `:role_arn` - *required* - (String) The Amazon Resource Name (ARN)
|
81
|
+
# of the role that the caller is assuming.
|
82
|
+
# * `:role_session_name` - *required* - (String) An identifier for the
|
83
|
+
# assumed role session. Typically, you pass the name or identifier
|
84
|
+
# that is associated with the user who is using your application.
|
85
|
+
# That way, the temporary security credentials that your application
|
86
|
+
# will use are associated with that user. This session name is
|
87
|
+
# included as part of the ARN and assumed role ID in the
|
88
|
+
# AssumedRoleUser response element.
|
89
|
+
# * `:web_identity_token` - *required* - (String) The OAuth 2.0 access
|
90
|
+
# token or OpenID Connect id token that is provided by the identity
|
91
|
+
# provider. Your application must get this token by authenticating
|
92
|
+
# the user who is using your application with a web identity provider
|
93
|
+
# before the application makes an AssumeRoleWithWebIdentity call.
|
94
|
+
# * `:provider_id` - (String) The fully-qualified host component of the
|
95
|
+
# domain name of the identity provider. Do not include URL schemes
|
96
|
+
# and port numbers. Specify this value only for OAuth access tokens.
|
97
|
+
# Currently, www.amazon.com and graph.facebook.com are supported. Do
|
98
|
+
# not specify this value for OpenID Connect id tokens, such as
|
99
|
+
# accounts.google.com.
|
100
|
+
# * `:policy` - (String) A supplemental policy that is associated with
|
101
|
+
# the temporary security credentials from the
|
102
|
+
# AssumeRoleWithWebIdentity call. The resulting permissions of the
|
103
|
+
# temporary security credentials are an intersection of this policy
|
104
|
+
# and the policy that is associated with the role. Use this policy to
|
105
|
+
# further restrict the permissions of the temporary security
|
106
|
+
# credentials.
|
107
|
+
# * `:duration_seconds` - (Integer) The duration, in seconds, of the
|
108
|
+
# role session. The value can range from 900 seconds (15 minutes) to
|
109
|
+
# 3600 seconds (1 hour). By default, the value is set to 3600 seconds
|
110
|
+
# (1 hour).
|
111
|
+
# @return [Core::Response]
|
112
|
+
# The #data method of the response object returns
|
113
|
+
# a hash with the following structure:
|
114
|
+
#
|
115
|
+
# * `:credentials` - (Hash)
|
116
|
+
# * `:access_key_id` - (String)
|
117
|
+
# * `:secret_access_key` - (String)
|
118
|
+
# * `:session_token` - (String)
|
119
|
+
# * `:expiration` - (Time)
|
120
|
+
# * `:subject_from_web_identity_token` - (String)
|
121
|
+
# * `:assumed_role_user` - (Hash)
|
122
|
+
# * `:assumed_role_id` - (String)
|
123
|
+
# * `:arn` - (String)
|
124
|
+
# * `:packed_policy_size` - (Integer)
|
125
|
+
|
80
126
|
# @!method get_federation_token(options = {})
|
81
127
|
# Calls the GetFederationToken API operation.
|
82
128
|
# @param [Hash] options
|
83
|
-
# * `:name` - *required* - (String) The name of the federated user
|
84
|
-
#
|
85
|
-
#
|
86
|
-
#
|
87
|
-
#
|
88
|
-
#
|
89
|
-
#
|
90
|
-
# permissions
|
91
|
-
#
|
129
|
+
# * `:name` - *required* - (String) The name of the federated user. The
|
130
|
+
# name is used as an identifier for the temporary security
|
131
|
+
# credentials (such as Bob). For example, you can reference the
|
132
|
+
# federated user name in a resource-based policy, such as in an
|
133
|
+
# Amazon S3 bucket policy.
|
134
|
+
# * `:policy` - (String) A policy that specifies the permissions that
|
135
|
+
# are granted to the federated user. By default, federated users have
|
136
|
+
# no permissions; they do not inherit any from the IAM user. When you
|
137
|
+
# specify a policy, the federated user's permissions are intersection
|
138
|
+
# of the specified policy and the IAM user's policy. If you don't
|
139
|
+
# specify a policy, federated users can only access AWS resources
|
140
|
+
# that explicitly allow those federated users in a resource policy,
|
141
|
+
# such as in an Amazon S3 bucket policy.
|
92
142
|
# * `:duration_seconds` - (Integer) The duration, in seconds, that the
|
93
143
|
# session should last. Acceptable durations for federation sessions
|
94
144
|
# range from 900s (15 minutes) to 129600s (36 hours), with 43200s (12
|
@@ -121,26 +171,20 @@ module AWS
|
|
121
171
|
# longer than one hour, the session for AWS account owners defaults
|
122
172
|
# to one hour.
|
123
173
|
# * `:serial_number` - (String) The identification number of the MFA
|
124
|
-
# device
|
125
|
-
#
|
126
|
-
#
|
127
|
-
#
|
128
|
-
#
|
129
|
-
#
|
130
|
-
#
|
131
|
-
#
|
132
|
-
# number for a hardware device (usually the number from the back of
|
133
|
-
# the device), such as GAHT12345678. For more information, see Using
|
134
|
-
# Multi-Factor Authentication (MFA) Devices with AWS in Using IAM.
|
174
|
+
# device that is associated with the IAM user who is making the
|
175
|
+
# GetSessionToken call. Specify this value if the IAM user has a
|
176
|
+
# policy that requires MFA authentication. The value is either the
|
177
|
+
# serial number for a hardware device (such as GAHT12345678) or an
|
178
|
+
# Amazon Resource Name (ARN) for a virtual device (such as
|
179
|
+
# arn:aws:iam::123456789012:mfa/user). You can find the device for an
|
180
|
+
# IAM user by going to the AWS Management Console and viewing the
|
181
|
+
# user's security credentials.
|
135
182
|
# * `:token_code` - (String) The value provided by the MFA device. If
|
136
|
-
#
|
137
|
-
#
|
138
|
-
#
|
139
|
-
#
|
140
|
-
#
|
141
|
-
# will receive an "access denied" response when requesting resources
|
142
|
-
# that require MFA authentication. For more information, see Using
|
143
|
-
# Multi-Factor Authentication (MFA) Devices with AWS in Using IAM.
|
183
|
+
# any policy requires the IAM user to submit an MFA code, specify
|
184
|
+
# this value. If MFA authentication is required, and the user does
|
185
|
+
# not provide a code when requesting a set of temporary security
|
186
|
+
# credentials, the user will receive an "access denied" response when
|
187
|
+
# requesting resources that require MFA authentication.
|
144
188
|
# @return [Core::Response]
|
145
189
|
# The #data method of the response object returns
|
146
190
|
# a hash with the following structure:
|
data/lib/aws/version.rb
CHANGED
metadata
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: aws-sdk
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 1.
|
4
|
+
version: 1.11.0
|
5
5
|
prerelease:
|
6
6
|
platform: ruby
|
7
7
|
authors:
|
@@ -9,7 +9,7 @@ authors:
|
|
9
9
|
autorequire:
|
10
10
|
bindir: bin
|
11
11
|
cert_chain: []
|
12
|
-
date: 2013-05-
|
12
|
+
date: 2013-05-29 00:00:00.000000000 Z
|
13
13
|
dependencies:
|
14
14
|
- !ruby/object:Gem::Dependency
|
15
15
|
name: uuidtools
|