aws-sdk 1.10.0 → 1.11.0

Sign up to get free protection for your applications and to get access to all the features.
@@ -100,6 +100,7 @@
100
100
  - :string
101
101
  :key_param: Name
102
102
  :value_param: Value
103
+ :flattened: true
103
104
  - :rename: attributes
104
105
  :outputs:
105
106
  :children:
@@ -309,6 +310,7 @@
309
310
  - :string
310
311
  :key_param: Name
311
312
  :value_param: Value
313
+ :flattened: true
312
314
  - :required
313
315
  - :rename: attributes
314
316
  :outputs:
@@ -40,6 +40,35 @@
40
40
  :type: :time
41
41
  PackedPolicySize:
42
42
  :type: :integer
43
+ - :name: AssumeRoleWithWebIdentity
44
+ :method: :assume_role_with_web_identity
45
+ :inputs:
46
+ RoleArn:
47
+ - :string
48
+ - :required
49
+ RoleSessionName:
50
+ - :string
51
+ - :required
52
+ WebIdentityToken:
53
+ - :string
54
+ - :required
55
+ ProviderId:
56
+ - :string
57
+ Policy:
58
+ - :string
59
+ DurationSeconds:
60
+ - :integer
61
+ :outputs:
62
+ :children:
63
+ AssumeRoleWithWebIdentityResult:
64
+ :ignore: true
65
+ :children:
66
+ Credentials:
67
+ :children:
68
+ Expiration:
69
+ :type: :time
70
+ PackedPolicySize:
71
+ :type: :integer
43
72
  - :name: GetFederationToken
44
73
  :method: :get_federation_token
45
74
  :inputs:
@@ -393,6 +393,9 @@ module AWS
393
393
  key_option.param_name = members[:key_param] if members[:key_param]
394
394
  value_option.param_name = members[:value_param] if members[:value_param]
395
395
 
396
+ separator = members[:flattened] ? '.' : '.entry.'
397
+ MetaUtils.extend_method(option, :separator) { separator }
398
+
396
399
  end
397
400
 
398
401
  def validate(value, context = nil)
@@ -413,7 +416,7 @@ module AWS
413
416
  values.inject([]) do |params, (key,value)|
414
417
 
415
418
  index = params.size / 2 + 1
416
- common_prefix = "#{prefixed_name(prefix)}.#{index}."
419
+ common_prefix = "#{prefixed_name(prefix)}#{separator}#{index}."
417
420
 
418
421
  key_name = common_prefix + key_option.param_name
419
422
  value_name = common_prefix + value_option.param_name
@@ -58,12 +58,13 @@ module AWS
58
58
  #
59
59
  # ec2.instances.create({
60
60
  # :image_id => "ami-8c1fece5",
61
- # :block_device_mappings => {
62
- # "/dev/sda2" => {
61
+ # :block_device_mappings => [{
62
+ # :device_name => "/dev/sda2",
63
+ # :ebs => {
63
64
  # :volume_size => 15, # 15 GiB
64
65
  # :delete_on_termination => true
65
66
  # }
66
- # }
67
+ # }]
67
68
  # })
68
69
  #
69
70
  # @example Launching in an Amazon VPC subnet
@@ -16,7 +16,13 @@ module AWS
16
16
 
17
17
  # @api private
18
18
  class Request < Core::Http::Request
19
- include Core::Signature::Version2
19
+
20
+ include Core::Signature::Version4
21
+
22
+ def service
23
+ 'rds'
24
+ end
25
+
20
26
  end
21
27
 
22
28
  end
@@ -41,15 +41,12 @@ module AWS
41
41
  # * `:role_session_name` - *required* - (String) An identifier for the
42
42
  # assumed role session. The session name is included as part of the
43
43
  # AssumedRoleUser.
44
- # * `:policy` - (String) A supplemental policy that can be associated
45
- # with the temporary security credentials. The caller can restrict
46
- # the permissions that are available on the role's temporary security
47
- # credentials to maintain the least amount of privileges. When a
48
- # service call is made with the temporary security credentials, both
49
- # the role's permission policy and supplemental policy are checked.
50
- # For more information about how permissions work in the context of
51
- # temporary credentials, see Controlling Permissions in Temporary
52
- # Credentials.
44
+ # * `:policy` - (String) A supplemental policy that is associated with
45
+ # the temporary security credentials from the AssumeRole call. The
46
+ # resulting permissions of the temporary security credentials are an
47
+ # intersection of this policy and the policy that is associated with
48
+ # the role. Use this policy to further restrict the permissions of
49
+ # the temporary security credentials.
53
50
  # * `:duration_seconds` - (Integer) The duration, in seconds, of the
54
51
  # role session. The value can range from 900 seconds (15 minutes) to
55
52
  # 3600 seconds (1 hour). By default, the value is set to 3600 seconds
@@ -77,18 +74,71 @@ module AWS
77
74
  # * `:arn` - (String)
78
75
  # * `:packed_policy_size` - (Integer)
79
76
 
77
+ # @!method assume_role_with_web_identity(options = {})
78
+ # Calls the AssumeRoleWithWebIdentity API operation.
79
+ # @param [Hash] options
80
+ # * `:role_arn` - *required* - (String) The Amazon Resource Name (ARN)
81
+ # of the role that the caller is assuming.
82
+ # * `:role_session_name` - *required* - (String) An identifier for the
83
+ # assumed role session. Typically, you pass the name or identifier
84
+ # that is associated with the user who is using your application.
85
+ # That way, the temporary security credentials that your application
86
+ # will use are associated with that user. This session name is
87
+ # included as part of the ARN and assumed role ID in the
88
+ # AssumedRoleUser response element.
89
+ # * `:web_identity_token` - *required* - (String) The OAuth 2.0 access
90
+ # token or OpenID Connect id token that is provided by the identity
91
+ # provider. Your application must get this token by authenticating
92
+ # the user who is using your application with a web identity provider
93
+ # before the application makes an AssumeRoleWithWebIdentity call.
94
+ # * `:provider_id` - (String) The fully-qualified host component of the
95
+ # domain name of the identity provider. Do not include URL schemes
96
+ # and port numbers. Specify this value only for OAuth access tokens.
97
+ # Currently, www.amazon.com and graph.facebook.com are supported. Do
98
+ # not specify this value for OpenID Connect id tokens, such as
99
+ # accounts.google.com.
100
+ # * `:policy` - (String) A supplemental policy that is associated with
101
+ # the temporary security credentials from the
102
+ # AssumeRoleWithWebIdentity call. The resulting permissions of the
103
+ # temporary security credentials are an intersection of this policy
104
+ # and the policy that is associated with the role. Use this policy to
105
+ # further restrict the permissions of the temporary security
106
+ # credentials.
107
+ # * `:duration_seconds` - (Integer) The duration, in seconds, of the
108
+ # role session. The value can range from 900 seconds (15 minutes) to
109
+ # 3600 seconds (1 hour). By default, the value is set to 3600 seconds
110
+ # (1 hour).
111
+ # @return [Core::Response]
112
+ # The #data method of the response object returns
113
+ # a hash with the following structure:
114
+ #
115
+ # * `:credentials` - (Hash)
116
+ # * `:access_key_id` - (String)
117
+ # * `:secret_access_key` - (String)
118
+ # * `:session_token` - (String)
119
+ # * `:expiration` - (Time)
120
+ # * `:subject_from_web_identity_token` - (String)
121
+ # * `:assumed_role_user` - (Hash)
122
+ # * `:assumed_role_id` - (String)
123
+ # * `:arn` - (String)
124
+ # * `:packed_policy_size` - (Integer)
125
+
80
126
  # @!method get_federation_token(options = {})
81
127
  # Calls the GetFederationToken API operation.
82
128
  # @param [Hash] options
83
- # * `:name` - *required* - (String) The name of the federated user
84
- # associated with the credentials. For information about limitations
85
- # on user names, go to Limitations on IAM Entities in Using IAM.
86
- # * `:policy` - (String) A policy specifying the permissions to
87
- # associate with the credentials. The caller can delegate their own
88
- # permissions by specifying a policy, and both policies will be
89
- # checked when a service call is made. For more information about how
90
- # permissions work in the context of temporary credentials, see
91
- # Controlling Permissions in Temporary Credentials in Using IAM.
129
+ # * `:name` - *required* - (String) The name of the federated user. The
130
+ # name is used as an identifier for the temporary security
131
+ # credentials (such as Bob). For example, you can reference the
132
+ # federated user name in a resource-based policy, such as in an
133
+ # Amazon S3 bucket policy.
134
+ # * `:policy` - (String) A policy that specifies the permissions that
135
+ # are granted to the federated user. By default, federated users have
136
+ # no permissions; they do not inherit any from the IAM user. When you
137
+ # specify a policy, the federated user's permissions are intersection
138
+ # of the specified policy and the IAM user's policy. If you don't
139
+ # specify a policy, federated users can only access AWS resources
140
+ # that explicitly allow those federated users in a resource policy,
141
+ # such as in an Amazon S3 bucket policy.
92
142
  # * `:duration_seconds` - (Integer) The duration, in seconds, that the
93
143
  # session should last. Acceptable durations for federation sessions
94
144
  # range from 900s (15 minutes) to 129600s (36 hours), with 43200s (12
@@ -121,26 +171,20 @@ module AWS
121
171
  # longer than one hour, the session for AWS account owners defaults
122
172
  # to one hour.
123
173
  # * `:serial_number` - (String) The identification number of the MFA
124
- # device for the user. If the IAM user has a policy requiring MFA
125
- # authentication (or is in a group requiring MFA authentication) to
126
- # access resources, provide the device value here.The value is in the
127
- # Security Credentials tab of the user's details pane in the IAM
128
- # console. If the IAM user has an active MFA device, the details pane
129
- # displays a Multi-Factor Authentication Device value. The value is
130
- # either for a virtual device, such as
131
- # arn:aws:iam::123456789012:mfa/user, or it is the device serial
132
- # number for a hardware device (usually the number from the back of
133
- # the device), such as GAHT12345678. For more information, see Using
134
- # Multi-Factor Authentication (MFA) Devices with AWS in Using IAM.
174
+ # device that is associated with the IAM user who is making the
175
+ # GetSessionToken call. Specify this value if the IAM user has a
176
+ # policy that requires MFA authentication. The value is either the
177
+ # serial number for a hardware device (such as GAHT12345678) or an
178
+ # Amazon Resource Name (ARN) for a virtual device (such as
179
+ # arn:aws:iam::123456789012:mfa/user). You can find the device for an
180
+ # IAM user by going to the AWS Management Console and viewing the
181
+ # user's security credentials.
135
182
  # * `:token_code` - (String) The value provided by the MFA device. If
136
- # the user has an access policy requiring an MFA code (or is in a
137
- # group requiring an MFA code), provide the value here to get
138
- # permission to resources as specified in the access policy. If MFA
139
- # authentication is required, and the user does not provide a code
140
- # when requesting a set of temporary security credentials, the user
141
- # will receive an "access denied" response when requesting resources
142
- # that require MFA authentication. For more information, see Using
143
- # Multi-Factor Authentication (MFA) Devices with AWS in Using IAM.
183
+ # any policy requires the IAM user to submit an MFA code, specify
184
+ # this value. If MFA authentication is required, and the user does
185
+ # not provide a code when requesting a set of temporary security
186
+ # credentials, the user will receive an "access denied" response when
187
+ # requesting resources that require MFA authentication.
144
188
  # @return [Core::Response]
145
189
  # The #data method of the response object returns
146
190
  # a hash with the following structure:
@@ -13,5 +13,5 @@
13
13
 
14
14
  module AWS
15
15
  # Current version of the AWS SDK for Ruby
16
- VERSION = '1.10.0'
16
+ VERSION = '1.11.0'
17
17
  end
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.10.0
4
+ version: 1.11.0
5
5
  prerelease:
6
6
  platform: ruby
7
7
  authors:
@@ -9,7 +9,7 @@ authors:
9
9
  autorequire:
10
10
  bindir: bin
11
11
  cert_chain: []
12
- date: 2013-05-15 00:00:00.000000000 Z
12
+ date: 2013-05-29 00:00:00.000000000 Z
13
13
  dependencies:
14
14
  - !ruby/object:Gem::Dependency
15
15
  name: uuidtools