@aws-sdk/client-sts 3.328.0 → 3.329.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/README.md CHANGED
@@ -2,9 +2,6 @@
2
2
 
3
3
  # @aws-sdk/client-sts
4
4
 
5
- [![NPM version](https://img.shields.io/npm/v/@aws-sdk/client-sts/latest.svg)](https://www.npmjs.com/package/@aws-sdk/client-sts)
6
- [![NPM downloads](https://img.shields.io/npm/dm/@aws-sdk/client-sts.svg)](https://www.npmjs.com/package/@aws-sdk/client-sts)
7
-
8
5
  ## Description
9
6
 
10
7
  AWS SDK for JavaScript STS Client for Node.js, Browser and React Native.
@@ -12,8 +9,7 @@ AWS SDK for JavaScript STS Client for Node.js, Browser and React Native.
12
9
  <fullname>Security Token Service</fullname>
13
10
 
14
11
  <p>Security Token Service (STS) enables you to request temporary, limited-privilege
15
- credentials for Identity and Access Management (IAM) users or for users that you
16
- authenticate (federated users). This guide provides descriptions of the STS API. For
12
+ credentials for users. This guide provides descriptions of the STS API. For
17
13
  more information about using this service, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp.html">Temporary Security Credentials</a>.</p>
18
14
 
19
15
  ## Installing
@@ -1,7 +1,7 @@
1
1
  "use strict";
2
2
  Object.defineProperty(exports, "__esModule", { value: true });
3
3
  exports.ruleSet = void 0;
4
- const G = "required", H = "type", I = "fn", J = "argv", K = "ref", L = "properties", M = "headers";
5
- const a = false, b = true, c = "PartitionResult", d = "tree", e = "booleanEquals", f = "stringEquals", g = "sigv4", h = "us-east-1", i = "sts", j = "endpoint", k = "https://sts.{Region}.{PartitionResult#dnsSuffix}", l = "error", m = "getAttr", n = { [G]: false, [H]: "String" }, o = { [G]: true, "default": false, [H]: "Boolean" }, p = { [K]: "Region" }, q = { [K]: "UseFIPS" }, r = { [K]: "UseDualStack" }, s = { [I]: "isSet", [J]: [{ [K]: "Endpoint" }] }, t = { [K]: "Endpoint" }, u = { "url": "https://sts.amazonaws.com", [L]: { "authSchemes": [{ "name": g, "signingRegion": h, "signingName": i }] }, [M]: {} }, v = {}, w = { "conditions": [{ [I]: f, [J]: [p, "aws-global"] }], [j]: u, [H]: j }, x = { [I]: e, [J]: [q, true] }, y = { [I]: e, [J]: [r, true] }, z = { [I]: e, [J]: [true, { [I]: m, [J]: [{ [K]: c }, "supportsFIPS"] }] }, A = { [K]: c }, B = { [I]: e, [J]: [true, { [I]: m, [J]: [A, "supportsDualStack"] }] }, C = { "url": k, [L]: {}, [M]: {} }, D = [t], E = [x], F = [y];
6
- const _data = { version: "1.0", parameters: { Region: n, UseDualStack: o, UseFIPS: o, Endpoint: n, UseGlobalEndpoint: o }, rules: [{ conditions: [{ [I]: "aws.partition", [J]: [p], assign: c }], [H]: d, rules: [{ conditions: [{ [I]: e, [J]: [{ [K]: "UseGlobalEndpoint" }, b] }, { [I]: e, [J]: [q, a] }, { [I]: e, [J]: [r, a] }, { [I]: "not", [J]: [s] }], [H]: d, rules: [{ conditions: [{ [I]: f, [J]: [p, "ap-northeast-1"] }], endpoint: u, [H]: j }, { conditions: [{ [I]: f, [J]: [p, "ap-south-1"] }], endpoint: u, [H]: j }, { conditions: [{ [I]: f, [J]: [p, "ap-southeast-1"] }], endpoint: u, [H]: j }, { conditions: [{ [I]: f, [J]: [p, "ap-southeast-2"] }], endpoint: u, [H]: j }, w, { conditions: [{ [I]: f, [J]: [p, "ca-central-1"] }], endpoint: u, [H]: j }, { conditions: [{ [I]: f, [J]: [p, "eu-central-1"] }], endpoint: u, [H]: j }, { conditions: [{ [I]: f, [J]: [p, "eu-north-1"] }], endpoint: u, [H]: j }, { conditions: [{ [I]: f, [J]: [p, "eu-west-1"] }], endpoint: u, [H]: j }, { conditions: [{ [I]: f, [J]: [p, "eu-west-2"] }], endpoint: u, [H]: j }, { conditions: [{ [I]: f, [J]: [p, "eu-west-3"] }], endpoint: u, [H]: j }, { conditions: [{ [I]: f, [J]: [p, "sa-east-1"] }], endpoint: u, [H]: j }, { conditions: [{ [I]: f, [J]: [p, h] }], endpoint: u, [H]: j }, { conditions: [{ [I]: f, [J]: [p, "us-east-2"] }], endpoint: u, [H]: j }, { conditions: [{ [I]: f, [J]: [p, "us-west-1"] }], endpoint: u, [H]: j }, { conditions: [{ [I]: f, [J]: [p, "us-west-2"] }], endpoint: u, [H]: j }, { endpoint: { url: k, [L]: { authSchemes: [{ name: g, signingRegion: "{Region}", signingName: i }] }, [M]: v }, [H]: j }] }, { conditions: [s, { [I]: "parseURL", [J]: D, assign: "url" }], [H]: d, rules: [{ conditions: E, error: "Invalid Configuration: FIPS and custom endpoint are not supported", [H]: l }, { [H]: d, rules: [{ conditions: F, error: "Invalid Configuration: Dualstack and custom endpoint are not supported", [H]: l }, { endpoint: { url: t, [L]: v, [M]: v }, [H]: j }] }] }, { conditions: [x, y], [H]: d, rules: [{ conditions: [z, B], [H]: d, rules: [{ endpoint: { url: "https://sts-fips.{Region}.{PartitionResult#dualStackDnsSuffix}", [L]: v, [M]: v }, [H]: j }] }, { error: "FIPS and DualStack are enabled, but this partition does not support one or both", [H]: l }] }, { conditions: E, [H]: d, rules: [{ conditions: [z], [H]: d, rules: [{ [H]: d, rules: [{ conditions: [{ [I]: f, [J]: ["aws-us-gov", { [I]: m, [J]: [A, "name"] }] }], endpoint: C, [H]: j }, { endpoint: { url: "https://sts-fips.{Region}.{PartitionResult#dnsSuffix}", [L]: v, [M]: v }, [H]: j }] }] }, { error: "FIPS is enabled but this partition does not support FIPS", [H]: l }] }, { conditions: F, [H]: d, rules: [{ conditions: [B], [H]: d, rules: [{ endpoint: { url: "https://sts.{Region}.{PartitionResult#dualStackDnsSuffix}", [L]: v, [M]: v }, [H]: j }] }, { error: "DualStack is enabled but this partition does not support DualStack", [H]: l }] }, { [H]: d, rules: [w, { endpoint: C, [H]: j }] }] }] };
4
+ const F = "required", G = "type", H = "fn", I = "argv", J = "ref";
5
+ const a = false, b = true, c = "booleanEquals", d = "tree", e = "stringEquals", f = "sigv4", g = "sts", h = "us-east-1", i = "endpoint", j = "https://sts.{Region}.{PartitionResult#dnsSuffix}", k = "error", l = "getAttr", m = { [F]: false, [G]: "String" }, n = { [F]: true, "default": false, [G]: "Boolean" }, o = { [J]: "Endpoint" }, p = { [H]: "isSet", [I]: [{ [J]: "Region" }] }, q = { [J]: "Region" }, r = { [H]: "aws.partition", [I]: [q], "assign": "PartitionResult" }, s = { [J]: "UseFIPS" }, t = { [J]: "UseDualStack" }, u = { "url": "https://sts.amazonaws.com", "properties": { "authSchemes": [{ "name": f, "signingName": g, "signingRegion": h }] }, "headers": {} }, v = {}, w = { "conditions": [{ [H]: e, [I]: [q, "aws-global"] }], [i]: u, [G]: i }, x = { [H]: c, [I]: [s, true] }, y = { [H]: c, [I]: [t, true] }, z = { [H]: c, [I]: [true, { [H]: l, [I]: [{ [J]: "PartitionResult" }, "supportsFIPS"] }] }, A = { [J]: "PartitionResult" }, B = { [H]: c, [I]: [true, { [H]: l, [I]: [A, "supportsDualStack"] }] }, C = [{ [H]: "isSet", [I]: [o] }], D = [x], E = [y];
6
+ const _data = { version: "1.0", parameters: { Region: m, UseDualStack: n, UseFIPS: n, Endpoint: m, UseGlobalEndpoint: n }, rules: [{ conditions: [{ [H]: c, [I]: [{ [J]: "UseGlobalEndpoint" }, b] }, { [H]: "not", [I]: C }, p, r, { [H]: c, [I]: [s, a] }, { [H]: c, [I]: [t, a] }], [G]: d, rules: [{ conditions: [{ [H]: e, [I]: [q, "ap-northeast-1"] }], endpoint: u, [G]: i }, { conditions: [{ [H]: e, [I]: [q, "ap-south-1"] }], endpoint: u, [G]: i }, { conditions: [{ [H]: e, [I]: [q, "ap-southeast-1"] }], endpoint: u, [G]: i }, { conditions: [{ [H]: e, [I]: [q, "ap-southeast-2"] }], endpoint: u, [G]: i }, w, { conditions: [{ [H]: e, [I]: [q, "ca-central-1"] }], endpoint: u, [G]: i }, { conditions: [{ [H]: e, [I]: [q, "eu-central-1"] }], endpoint: u, [G]: i }, { conditions: [{ [H]: e, [I]: [q, "eu-north-1"] }], endpoint: u, [G]: i }, { conditions: [{ [H]: e, [I]: [q, "eu-west-1"] }], endpoint: u, [G]: i }, { conditions: [{ [H]: e, [I]: [q, "eu-west-2"] }], endpoint: u, [G]: i }, { conditions: [{ [H]: e, [I]: [q, "eu-west-3"] }], endpoint: u, [G]: i }, { conditions: [{ [H]: e, [I]: [q, "sa-east-1"] }], endpoint: u, [G]: i }, { conditions: [{ [H]: e, [I]: [q, h] }], endpoint: u, [G]: i }, { conditions: [{ [H]: e, [I]: [q, "us-east-2"] }], endpoint: u, [G]: i }, { conditions: [{ [H]: e, [I]: [q, "us-west-1"] }], endpoint: u, [G]: i }, { conditions: [{ [H]: e, [I]: [q, "us-west-2"] }], endpoint: u, [G]: i }, { endpoint: { url: j, properties: { authSchemes: [{ name: f, signingName: g, signingRegion: "{Region}" }] }, headers: v }, [G]: i }] }, { conditions: C, [G]: d, rules: [{ conditions: D, error: "Invalid Configuration: FIPS and custom endpoint are not supported", [G]: k }, { [G]: d, rules: [{ conditions: E, error: "Invalid Configuration: Dualstack and custom endpoint are not supported", [G]: k }, { endpoint: { url: o, properties: v, headers: v }, [G]: i }] }] }, { [G]: d, rules: [{ conditions: [p], [G]: d, rules: [{ conditions: [r], [G]: d, rules: [{ conditions: [x, y], [G]: d, rules: [{ conditions: [z, B], [G]: d, rules: [{ [G]: d, rules: [{ endpoint: { url: "https://sts-fips.{Region}.{PartitionResult#dualStackDnsSuffix}", properties: v, headers: v }, [G]: i }] }] }, { error: "FIPS and DualStack are enabled, but this partition does not support one or both", [G]: k }] }, { conditions: D, [G]: d, rules: [{ conditions: [z], [G]: d, rules: [{ [G]: d, rules: [{ conditions: [{ [H]: e, [I]: ["aws-us-gov", { [H]: l, [I]: [A, "name"] }] }], endpoint: { url: "https://sts.{Region}.amazonaws.com", properties: v, headers: v }, [G]: i }, { endpoint: { url: "https://sts-fips.{Region}.{PartitionResult#dnsSuffix}", properties: v, headers: v }, [G]: i }] }] }, { error: "FIPS is enabled but this partition does not support FIPS", [G]: k }] }, { conditions: E, [G]: d, rules: [{ conditions: [B], [G]: d, rules: [{ [G]: d, rules: [{ endpoint: { url: "https://sts.{Region}.{PartitionResult#dualStackDnsSuffix}", properties: v, headers: v }, [G]: i }] }] }, { error: "DualStack is enabled but this partition does not support DualStack", [G]: k }] }, { [G]: d, rules: [w, { endpoint: { url: j, properties: v, headers: v }, [G]: i }] }] }] }, { error: "Invalid Configuration: Missing Region", [G]: k }] }] };
7
7
  exports.ruleSet = _data;
@@ -1,4 +1,4 @@
1
- const G = "required", H = "type", I = "fn", J = "argv", K = "ref", L = "properties", M = "headers";
2
- const a = false, b = true, c = "PartitionResult", d = "tree", e = "booleanEquals", f = "stringEquals", g = "sigv4", h = "us-east-1", i = "sts", j = "endpoint", k = "https://sts.{Region}.{PartitionResult#dnsSuffix}", l = "error", m = "getAttr", n = { [G]: false, [H]: "String" }, o = { [G]: true, "default": false, [H]: "Boolean" }, p = { [K]: "Region" }, q = { [K]: "UseFIPS" }, r = { [K]: "UseDualStack" }, s = { [I]: "isSet", [J]: [{ [K]: "Endpoint" }] }, t = { [K]: "Endpoint" }, u = { "url": "https://sts.amazonaws.com", [L]: { "authSchemes": [{ "name": g, "signingRegion": h, "signingName": i }] }, [M]: {} }, v = {}, w = { "conditions": [{ [I]: f, [J]: [p, "aws-global"] }], [j]: u, [H]: j }, x = { [I]: e, [J]: [q, true] }, y = { [I]: e, [J]: [r, true] }, z = { [I]: e, [J]: [true, { [I]: m, [J]: [{ [K]: c }, "supportsFIPS"] }] }, A = { [K]: c }, B = { [I]: e, [J]: [true, { [I]: m, [J]: [A, "supportsDualStack"] }] }, C = { "url": k, [L]: {}, [M]: {} }, D = [t], E = [x], F = [y];
3
- const _data = { version: "1.0", parameters: { Region: n, UseDualStack: o, UseFIPS: o, Endpoint: n, UseGlobalEndpoint: o }, rules: [{ conditions: [{ [I]: "aws.partition", [J]: [p], assign: c }], [H]: d, rules: [{ conditions: [{ [I]: e, [J]: [{ [K]: "UseGlobalEndpoint" }, b] }, { [I]: e, [J]: [q, a] }, { [I]: e, [J]: [r, a] }, { [I]: "not", [J]: [s] }], [H]: d, rules: [{ conditions: [{ [I]: f, [J]: [p, "ap-northeast-1"] }], endpoint: u, [H]: j }, { conditions: [{ [I]: f, [J]: [p, "ap-south-1"] }], endpoint: u, [H]: j }, { conditions: [{ [I]: f, [J]: [p, "ap-southeast-1"] }], endpoint: u, [H]: j }, { conditions: [{ [I]: f, [J]: [p, "ap-southeast-2"] }], endpoint: u, [H]: j }, w, { conditions: [{ [I]: f, [J]: [p, "ca-central-1"] }], endpoint: u, [H]: j }, { conditions: [{ [I]: f, [J]: [p, "eu-central-1"] }], endpoint: u, [H]: j }, { conditions: [{ [I]: f, [J]: [p, "eu-north-1"] }], endpoint: u, [H]: j }, { conditions: [{ [I]: f, [J]: [p, "eu-west-1"] }], endpoint: u, [H]: j }, { conditions: [{ [I]: f, [J]: [p, "eu-west-2"] }], endpoint: u, [H]: j }, { conditions: [{ [I]: f, [J]: [p, "eu-west-3"] }], endpoint: u, [H]: j }, { conditions: [{ [I]: f, [J]: [p, "sa-east-1"] }], endpoint: u, [H]: j }, { conditions: [{ [I]: f, [J]: [p, h] }], endpoint: u, [H]: j }, { conditions: [{ [I]: f, [J]: [p, "us-east-2"] }], endpoint: u, [H]: j }, { conditions: [{ [I]: f, [J]: [p, "us-west-1"] }], endpoint: u, [H]: j }, { conditions: [{ [I]: f, [J]: [p, "us-west-2"] }], endpoint: u, [H]: j }, { endpoint: { url: k, [L]: { authSchemes: [{ name: g, signingRegion: "{Region}", signingName: i }] }, [M]: v }, [H]: j }] }, { conditions: [s, { [I]: "parseURL", [J]: D, assign: "url" }], [H]: d, rules: [{ conditions: E, error: "Invalid Configuration: FIPS and custom endpoint are not supported", [H]: l }, { [H]: d, rules: [{ conditions: F, error: "Invalid Configuration: Dualstack and custom endpoint are not supported", [H]: l }, { endpoint: { url: t, [L]: v, [M]: v }, [H]: j }] }] }, { conditions: [x, y], [H]: d, rules: [{ conditions: [z, B], [H]: d, rules: [{ endpoint: { url: "https://sts-fips.{Region}.{PartitionResult#dualStackDnsSuffix}", [L]: v, [M]: v }, [H]: j }] }, { error: "FIPS and DualStack are enabled, but this partition does not support one or both", [H]: l }] }, { conditions: E, [H]: d, rules: [{ conditions: [z], [H]: d, rules: [{ [H]: d, rules: [{ conditions: [{ [I]: f, [J]: ["aws-us-gov", { [I]: m, [J]: [A, "name"] }] }], endpoint: C, [H]: j }, { endpoint: { url: "https://sts-fips.{Region}.{PartitionResult#dnsSuffix}", [L]: v, [M]: v }, [H]: j }] }] }, { error: "FIPS is enabled but this partition does not support FIPS", [H]: l }] }, { conditions: F, [H]: d, rules: [{ conditions: [B], [H]: d, rules: [{ endpoint: { url: "https://sts.{Region}.{PartitionResult#dualStackDnsSuffix}", [L]: v, [M]: v }, [H]: j }] }, { error: "DualStack is enabled but this partition does not support DualStack", [H]: l }] }, { [H]: d, rules: [w, { endpoint: C, [H]: j }] }] }] };
1
+ const F = "required", G = "type", H = "fn", I = "argv", J = "ref";
2
+ const a = false, b = true, c = "booleanEquals", d = "tree", e = "stringEquals", f = "sigv4", g = "sts", h = "us-east-1", i = "endpoint", j = "https://sts.{Region}.{PartitionResult#dnsSuffix}", k = "error", l = "getAttr", m = { [F]: false, [G]: "String" }, n = { [F]: true, "default": false, [G]: "Boolean" }, o = { [J]: "Endpoint" }, p = { [H]: "isSet", [I]: [{ [J]: "Region" }] }, q = { [J]: "Region" }, r = { [H]: "aws.partition", [I]: [q], "assign": "PartitionResult" }, s = { [J]: "UseFIPS" }, t = { [J]: "UseDualStack" }, u = { "url": "https://sts.amazonaws.com", "properties": { "authSchemes": [{ "name": f, "signingName": g, "signingRegion": h }] }, "headers": {} }, v = {}, w = { "conditions": [{ [H]: e, [I]: [q, "aws-global"] }], [i]: u, [G]: i }, x = { [H]: c, [I]: [s, true] }, y = { [H]: c, [I]: [t, true] }, z = { [H]: c, [I]: [true, { [H]: l, [I]: [{ [J]: "PartitionResult" }, "supportsFIPS"] }] }, A = { [J]: "PartitionResult" }, B = { [H]: c, [I]: [true, { [H]: l, [I]: [A, "supportsDualStack"] }] }, C = [{ [H]: "isSet", [I]: [o] }], D = [x], E = [y];
3
+ const _data = { version: "1.0", parameters: { Region: m, UseDualStack: n, UseFIPS: n, Endpoint: m, UseGlobalEndpoint: n }, rules: [{ conditions: [{ [H]: c, [I]: [{ [J]: "UseGlobalEndpoint" }, b] }, { [H]: "not", [I]: C }, p, r, { [H]: c, [I]: [s, a] }, { [H]: c, [I]: [t, a] }], [G]: d, rules: [{ conditions: [{ [H]: e, [I]: [q, "ap-northeast-1"] }], endpoint: u, [G]: i }, { conditions: [{ [H]: e, [I]: [q, "ap-south-1"] }], endpoint: u, [G]: i }, { conditions: [{ [H]: e, [I]: [q, "ap-southeast-1"] }], endpoint: u, [G]: i }, { conditions: [{ [H]: e, [I]: [q, "ap-southeast-2"] }], endpoint: u, [G]: i }, w, { conditions: [{ [H]: e, [I]: [q, "ca-central-1"] }], endpoint: u, [G]: i }, { conditions: [{ [H]: e, [I]: [q, "eu-central-1"] }], endpoint: u, [G]: i }, { conditions: [{ [H]: e, [I]: [q, "eu-north-1"] }], endpoint: u, [G]: i }, { conditions: [{ [H]: e, [I]: [q, "eu-west-1"] }], endpoint: u, [G]: i }, { conditions: [{ [H]: e, [I]: [q, "eu-west-2"] }], endpoint: u, [G]: i }, { conditions: [{ [H]: e, [I]: [q, "eu-west-3"] }], endpoint: u, [G]: i }, { conditions: [{ [H]: e, [I]: [q, "sa-east-1"] }], endpoint: u, [G]: i }, { conditions: [{ [H]: e, [I]: [q, h] }], endpoint: u, [G]: i }, { conditions: [{ [H]: e, [I]: [q, "us-east-2"] }], endpoint: u, [G]: i }, { conditions: [{ [H]: e, [I]: [q, "us-west-1"] }], endpoint: u, [G]: i }, { conditions: [{ [H]: e, [I]: [q, "us-west-2"] }], endpoint: u, [G]: i }, { endpoint: { url: j, properties: { authSchemes: [{ name: f, signingName: g, signingRegion: "{Region}" }] }, headers: v }, [G]: i }] }, { conditions: C, [G]: d, rules: [{ conditions: D, error: "Invalid Configuration: FIPS and custom endpoint are not supported", [G]: k }, { [G]: d, rules: [{ conditions: E, error: "Invalid Configuration: Dualstack and custom endpoint are not supported", [G]: k }, { endpoint: { url: o, properties: v, headers: v }, [G]: i }] }] }, { [G]: d, rules: [{ conditions: [p], [G]: d, rules: [{ conditions: [r], [G]: d, rules: [{ conditions: [x, y], [G]: d, rules: [{ conditions: [z, B], [G]: d, rules: [{ [G]: d, rules: [{ endpoint: { url: "https://sts-fips.{Region}.{PartitionResult#dualStackDnsSuffix}", properties: v, headers: v }, [G]: i }] }] }, { error: "FIPS and DualStack are enabled, but this partition does not support one or both", [G]: k }] }, { conditions: D, [G]: d, rules: [{ conditions: [z], [G]: d, rules: [{ [G]: d, rules: [{ conditions: [{ [H]: e, [I]: ["aws-us-gov", { [H]: l, [I]: [A, "name"] }] }], endpoint: { url: "https://sts.{Region}.amazonaws.com", properties: v, headers: v }, [G]: i }, { endpoint: { url: "https://sts-fips.{Region}.{PartitionResult#dnsSuffix}", properties: v, headers: v }, [G]: i }] }] }, { error: "FIPS is enabled but this partition does not support FIPS", [G]: k }] }, { conditions: E, [G]: d, rules: [{ conditions: [B], [G]: d, rules: [{ [G]: d, rules: [{ endpoint: { url: "https://sts.{Region}.{PartitionResult#dualStackDnsSuffix}", properties: v, headers: v }, [G]: i }] }] }, { error: "DualStack is enabled but this partition does not support DualStack", [G]: k }] }, { [G]: d, rules: [w, { endpoint: { url: j, properties: v, headers: v }, [G]: i }] }] }] }, { error: "Invalid Configuration: Missing Region", [G]: k }] }] };
4
4
  export const ruleSet = _data;
@@ -62,8 +62,7 @@ export interface STS {
62
62
  * @public
63
63
  * <fullname>Security Token Service</fullname>
64
64
  * <p>Security Token Service (STS) enables you to request temporary, limited-privilege
65
- * credentials for Identity and Access Management (IAM) users or for users that you
66
- * authenticate (federated users). This guide provides descriptions of the STS API. For
65
+ * credentials for users. This guide provides descriptions of the STS API. For
67
66
  * more information about using this service, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp.html">Temporary Security Credentials</a>.</p>
68
67
  */
69
68
  export declare class STS extends STSClient implements STS {
@@ -153,8 +153,7 @@ export interface STSClientResolvedConfig extends STSClientResolvedConfigType {
153
153
  * @public
154
154
  * <fullname>Security Token Service</fullname>
155
155
  * <p>Security Token Service (STS) enables you to request temporary, limited-privilege
156
- * credentials for Identity and Access Management (IAM) users or for users that you
157
- * authenticate (federated users). This guide provides descriptions of the STS API. For
156
+ * credentials for users. This guide provides descriptions of the STS API. For
158
157
  * more information about using this service, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp.html">Temporary Security Credentials</a>.</p>
159
158
  */
160
159
  export declare class STSClient extends __Client<__HttpHandlerOptions, ServiceInputTypes, ServiceOutputTypes, STSClientResolvedConfig> {
@@ -45,16 +45,16 @@ export interface AssumeRoleCommandOutput extends AssumeRoleResponse, __MetadataB
45
45
  * by the identity-based policy of the role that is being assumed. For more information, see
46
46
  * <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session">Session
47
47
  * Policies</a> in the <i>IAM User Guide</i>.</p>
48
- * <p>When you create a role, you create two policies: A role trust policy that specifies
49
- * <i>who</i> can assume the role and a permissions policy that specifies
48
+ * <p>When you create a role, you create two policies: a role trust policy that specifies
49
+ * <i>who</i> can assume the role, and a permissions policy that specifies
50
50
  * <i>what</i> can be done with the role. You specify the trusted principal
51
- * who is allowed to assume the role in the role trust policy.</p>
51
+ * that is allowed to assume the role in the role trust policy.</p>
52
52
  * <p>To assume a role from a different account, your Amazon Web Services account must be trusted by the
53
53
  * role. The trust relationship is defined in the role's trust policy when the role is
54
54
  * created. That trust policy states which accounts are allowed to delegate that access to
55
55
  * users in the account. </p>
56
56
  * <p>A user who wants to access a role in a different account must also have permissions that
57
- * are delegated from the user account administrator. The administrator must attach a policy
57
+ * are delegated from the account administrator. The administrator must attach a policy
58
58
  * that allows the user to call <code>AssumeRole</code> for the ARN of the role in the other
59
59
  * account.</p>
60
60
  * <p>To allow a user to assume a role in the same account, you can do either of the
@@ -28,9 +28,8 @@ export interface AssumeRoleWithWebIdentityCommandOutput extends AssumeRoleWithWe
28
28
  * <a href="http://aws.amazon.com/sdkforios/">Amazon Web Services SDK for iOS Developer Guide</a> and the <a href="http://aws.amazon.com/sdkforandroid/">Amazon Web Services SDK for Android Developer Guide</a> to uniquely
29
29
  * identify a user. You can also supply the user with a consistent identity throughout the
30
30
  * lifetime of an application.</p>
31
- * <p>To learn more about Amazon Cognito, see <a href="https://docs.aws.amazon.com/mobile/sdkforandroid/developerguide/cognito-auth.html#d0e840">Amazon Cognito Overview</a> in
32
- * <i>Amazon Web Services SDK for Android Developer Guide</i> and <a href="https://docs.aws.amazon.com/mobile/sdkforios/developerguide/cognito-auth.html#d0e664">Amazon Cognito Overview</a> in the
33
- * <i>Amazon Web Services SDK for iOS Developer Guide</i>.</p>
31
+ * <p>To learn more about Amazon Cognito, see <a href="https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-identity.html">Amazon Cognito identity pools</a> in
32
+ * <i>Amazon Cognito Developer Guide</i>.</p>
34
33
  * </note>
35
34
  * <p>Calling <code>AssumeRoleWithWebIdentity</code> does not require the use of Amazon Web Services
36
35
  * security credentials. Therefore, you can distribute an application (for example, on mobile
@@ -19,14 +19,12 @@ export interface GetCallerIdentityCommandOutput extends GetCallerIdentityRespons
19
19
  }
20
20
  /**
21
21
  * @public
22
- * <p>Returns details about the IAM user or role whose credentials are used to call the
23
- * operation.</p>
22
+ * <p>Returns details about the IAM user or role whose credentials are used to call the operation.</p>
24
23
  * <note>
25
- * <p>No permissions are required to perform this operation. If an administrator adds a
26
- * policy to your IAM user or role that explicitly denies access to the
24
+ * <p>No permissions are required to perform this operation. If an administrator
25
+ * attaches a policy to your identity that explicitly denies access to the
27
26
  * <code>sts:GetCallerIdentity</code> action, you can still perform this operation.
28
- * Permissions are not required because the same information is returned when an IAM user
29
- * or role is denied access. To view an example response, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/troubleshoot_general.html#troubleshoot_general_access-denied-delete-mfa">I Am Not Authorized to Perform: iam:DeleteVirtualMFADevice</a> in the
27
+ * Permissions are not required because the same information is returned when access is denied. To view an example response, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/troubleshoot_general.html#troubleshoot_general_access-denied-delete-mfa">I Am Not Authorized to Perform: iam:DeleteVirtualMFADevice</a> in the
30
28
  * <i>IAM User Guide</i>.</p>
31
29
  * </note>
32
30
  * @example
@@ -20,15 +20,19 @@ export interface GetFederationTokenCommandOutput extends GetFederationTokenRespo
20
20
  /**
21
21
  * @public
22
22
  * <p>Returns a set of temporary security credentials (consisting of an access key ID, a
23
- * secret access key, and a security token) for a federated user. A typical use is in a proxy
23
+ * secret access key, and a security token) for a user. A typical use is in a proxy
24
24
  * application that gets temporary security credentials on behalf of distributed applications
25
- * inside a corporate network. You must call the <code>GetFederationToken</code> operation
25
+ * inside a corporate network.</p>
26
+ * <p>You must call the <code>GetFederationToken</code> operation
26
27
  * using the long-term security credentials of an IAM user. As a result, this call is
27
- * appropriate in contexts where those credentials can be safely stored, usually in a
28
+ * appropriate in contexts where those credentials can be safeguarded, usually in a
28
29
  * server-based application. For a comparison of <code>GetFederationToken</code> with the
29
30
  * other API operations that produce temporary credentials, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html">Requesting Temporary Security
30
31
  * Credentials</a> and <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#stsapi_comparison">Comparing the
31
32
  * Amazon Web Services STS API operations</a> in the <i>IAM User Guide</i>.</p>
33
+ * <p>Although it is possible to call <code>GetFederationToken</code> using the security credentials of an
34
+ * Amazon Web Services account root user rather than an IAM user that you create for the purpose of a proxy application, we do not recommend it. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html#lock-away-credentials">Safeguard your root user credentials and don't use them for everyday tasks</a> in the
35
+ * <i>IAM User Guide</i>. </p>
32
36
  * <note>
33
37
  * <p>You can create a mobile-based or browser-based app that can authenticate users using
34
38
  * a web identity provider like Login with Amazon, Facebook, Google, or an OpenID
@@ -36,19 +40,12 @@ export interface GetFederationTokenCommandOutput extends GetFederationTokenRespo
36
40
  * <code>AssumeRoleWithWebIdentity</code>. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#api_assumerolewithwebidentity">Federation Through a Web-based Identity Provider</a> in the
37
41
  * <i>IAM User Guide</i>.</p>
38
42
  * </note>
39
- * <p>You can also call <code>GetFederationToken</code> using the security credentials of an
40
- * Amazon Web Services account root user, but we do not recommend it. Instead, we recommend that you create
41
- * an IAM user for the purpose of the proxy application. Then attach a policy to the IAM
42
- * user that limits federated users to only the actions and resources that they need to
43
- * access. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html">IAM Best Practices</a> in the
44
- * <i>IAM User Guide</i>. </p>
45
43
  * <p>
46
44
  * <b>Session duration</b>
47
45
  * </p>
48
46
  * <p>The temporary credentials are valid for the specified duration, from 900 seconds (15
49
47
  * minutes) up to a maximum of 129,600 seconds (36 hours). The default session duration is
50
- * 43,200 seconds (12 hours). Temporary credentials obtained by using the Amazon Web Services account root
51
- * user credentials have a maximum duration of 3,600 seconds (1 hour).</p>
48
+ * 43,200 seconds (12 hours). Temporary credentials obtained by using the root user credentials have a maximum duration of 3,600 seconds (1 hour).</p>
52
49
  * <p>
53
50
  * <b>Permissions</b>
54
51
  * </p>
@@ -22,12 +22,11 @@ export interface GetSessionTokenCommandOutput extends GetSessionTokenResponse, _
22
22
  * <p>Returns a set of temporary credentials for an Amazon Web Services account or IAM user. The
23
23
  * credentials consist of an access key ID, a secret access key, and a security token.
24
24
  * Typically, you use <code>GetSessionToken</code> if you want to use MFA to protect
25
- * programmatic calls to specific Amazon Web Services API operations like Amazon EC2 <code>StopInstances</code>.
26
- * MFA-enabled IAM users would need to call <code>GetSessionToken</code> and submit an MFA
25
+ * programmatic calls to specific Amazon Web Services API operations like Amazon EC2 <code>StopInstances</code>.</p>
26
+ * <p>MFA-enabled IAM users must call <code>GetSessionToken</code> and submit an MFA
27
27
  * code that is associated with their MFA device. Using the temporary security credentials
28
- * that are returned from the call, IAM users can then make programmatic calls to API
29
- * operations that require MFA authentication. If you do not supply a correct MFA code, then
30
- * the API returns an access denied error. For a comparison of <code>GetSessionToken</code>
28
+ * that the call returns, IAM users can then make programmatic calls to API
29
+ * operations that require MFA authentication. An incorrect MFA code causes the API to return an access denied error. For a comparison of <code>GetSessionToken</code>
31
30
  * with the other API operations that produce temporary credentials, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html">Requesting
32
31
  * Temporary Security Credentials</a> and <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#stsapi_comparison">Comparing the
33
32
  * Amazon Web Services STS API operations</a> in the <i>IAM User Guide</i>.</p>
@@ -42,7 +41,7 @@ export interface GetSessionTokenCommandOutput extends GetSessionTokenResponse, _
42
41
  * <b>Session Duration</b>
43
42
  * </p>
44
43
  * <p>The <code>GetSessionToken</code> operation must be called by using the long-term Amazon Web Services
45
- * security credentials of the Amazon Web Services account root user or an IAM user. Credentials that are
44
+ * security credentials of an IAM user. Credentials that are
46
45
  * created by IAM users are valid for the duration that you specify. This duration can range
47
46
  * from 900 seconds (15 minutes) up to a maximum of 129,600 seconds (36 hours), with a default
48
47
  * of 43,200 seconds (12 hours). Credentials based on account credentials can range from 900
@@ -62,20 +61,19 @@ export interface GetSessionTokenCommandOutput extends GetSessionTokenResponse, _
62
61
  * <code>AssumeRole</code> or <code>GetCallerIdentity</code>.</p>
63
62
  * </li>
64
63
  * </ul>
64
+ * <p>The credentials that <code>GetSessionToken</code> returns are based on
65
+ * permissions associated with the IAM user whose credentials were used to call the operation. The
66
+ * temporary credentials have the same permissions as the IAM user.</p>
65
67
  * <note>
66
- * <p>We recommend that you do not call <code>GetSessionToken</code> with Amazon Web Services account
67
- * root user credentials. Instead, follow our <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html#create-iam-users">best practices</a> by
68
- * creating one or more IAM users, giving them the necessary permissions, and using IAM
69
- * users for everyday interaction with Amazon Web Services. </p>
68
+ * <p>Although it is possible to call <code>GetSessionToken</code> using the security credentials of an
69
+ * Amazon Web Services account root user rather than an IAM user, we do not recommend it. If
70
+ * <code>GetSessionToken</code> is called using root user credentials, the
71
+ * temporary credentials have root user permissions. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html#lock-away-credentials">Safeguard your root user credentials and don't use them for everyday tasks</a> in the
72
+ * <i>IAM User Guide</i>
73
+ * </p>
70
74
  * </note>
71
- * <p>The credentials that are returned by <code>GetSessionToken</code> are based on
72
- * permissions associated with the user whose credentials were used to call the operation. If
73
- * <code>GetSessionToken</code> is called using Amazon Web Services account root user credentials, the
74
- * temporary credentials have root user permissions. Similarly, if
75
- * <code>GetSessionToken</code> is called using the credentials of an IAM user, the
76
- * temporary credentials have the same permissions as the IAM user. </p>
77
75
  * <p>For more information about using <code>GetSessionToken</code> to create temporary
78
- * credentials, go to <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#api_getsessiontoken">Temporary
76
+ * credentials, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#api_getsessiontoken">Temporary
79
77
  * Credentials for Users in Untrusted Environments</a> in the
80
78
  * <i>IAM User Guide</i>. </p>
81
79
  * @example
@@ -535,7 +535,7 @@ export interface AssumeRoleWithSAMLResponse {
535
535
  * </li>
536
536
  * </ul>
537
537
  * <p>The combination of <code>NameQualifier</code> and <code>Subject</code> can be used to
538
- * uniquely identify a federated user.</p>
538
+ * uniquely identify a user.</p>
539
539
  * <p>The following pseudocode shows how the hash value is calculated:</p>
540
540
  * <p>
541
541
  * <code>BASE64 ( SHA1 ( "https://example.com/saml" + "123456789012" + "/MySAMLIdP" ) )</code>
@@ -946,7 +946,7 @@ export interface GetFederationTokenRequest {
946
946
  /**
947
947
  * <p>The duration, in seconds, that the session should last. Acceptable durations for
948
948
  * federation sessions range from 900 seconds (15 minutes) to 129,600 seconds (36 hours), with
949
- * 43,200 seconds (12 hours) as the default. Sessions obtained using Amazon Web Services account root user
949
+ * 43,200 seconds (12 hours) as the default. Sessions obtained using root user
950
950
  * credentials are restricted to a maximum of 3,600 seconds (one hour). If the specified
951
951
  * duration is longer than one hour, the session obtained by using root user credentials
952
952
  * defaults to one hour.</p>
package/package.json CHANGED
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "name": "@aws-sdk/client-sts",
3
3
  "description": "AWS SDK for JavaScript Sts Client for Node.js, Browser and React Native",
4
- "version": "3.328.0",
4
+ "version": "3.329.0",
5
5
  "scripts": {
6
6
  "build": "concurrently 'yarn:build:cjs' 'yarn:build:es' 'yarn:build:types'",
7
7
  "build:cjs": "tsc -p tsconfig.cjs.json",
@@ -23,37 +23,37 @@
23
23
  "dependencies": {
24
24
  "@aws-crypto/sha256-browser": "3.0.0",
25
25
  "@aws-crypto/sha256-js": "3.0.0",
26
- "@aws-sdk/config-resolver": "3.310.0",
27
- "@aws-sdk/credential-provider-node": "3.328.0",
28
- "@aws-sdk/fetch-http-handler": "3.310.0",
29
- "@aws-sdk/hash-node": "3.310.0",
30
- "@aws-sdk/invalid-dependency": "3.310.0",
31
- "@aws-sdk/middleware-content-length": "3.325.0",
32
- "@aws-sdk/middleware-endpoint": "3.325.0",
33
- "@aws-sdk/middleware-host-header": "3.325.0",
34
- "@aws-sdk/middleware-logger": "3.325.0",
35
- "@aws-sdk/middleware-recursion-detection": "3.325.0",
36
- "@aws-sdk/middleware-retry": "3.327.0",
37
- "@aws-sdk/middleware-sdk-sts": "3.326.0",
38
- "@aws-sdk/middleware-serde": "3.325.0",
39
- "@aws-sdk/middleware-signing": "3.325.0",
40
- "@aws-sdk/middleware-stack": "3.325.0",
41
- "@aws-sdk/middleware-user-agent": "3.327.0",
42
- "@aws-sdk/node-config-provider": "3.310.0",
43
- "@aws-sdk/node-http-handler": "3.328.0",
44
- "@aws-sdk/protocol-http": "3.310.0",
45
- "@aws-sdk/smithy-client": "3.325.0",
46
- "@aws-sdk/types": "3.310.0",
47
- "@aws-sdk/url-parser": "3.310.0",
26
+ "@aws-sdk/config-resolver": "3.329.0",
27
+ "@aws-sdk/credential-provider-node": "3.329.0",
28
+ "@aws-sdk/fetch-http-handler": "3.329.0",
29
+ "@aws-sdk/hash-node": "3.329.0",
30
+ "@aws-sdk/invalid-dependency": "3.329.0",
31
+ "@aws-sdk/middleware-content-length": "3.329.0",
32
+ "@aws-sdk/middleware-endpoint": "3.329.0",
33
+ "@aws-sdk/middleware-host-header": "3.329.0",
34
+ "@aws-sdk/middleware-logger": "3.329.0",
35
+ "@aws-sdk/middleware-recursion-detection": "3.329.0",
36
+ "@aws-sdk/middleware-retry": "3.329.0",
37
+ "@aws-sdk/middleware-sdk-sts": "3.329.0",
38
+ "@aws-sdk/middleware-serde": "3.329.0",
39
+ "@aws-sdk/middleware-signing": "3.329.0",
40
+ "@aws-sdk/middleware-stack": "3.329.0",
41
+ "@aws-sdk/middleware-user-agent": "3.329.0",
42
+ "@aws-sdk/node-config-provider": "3.329.0",
43
+ "@aws-sdk/node-http-handler": "3.329.0",
44
+ "@aws-sdk/protocol-http": "3.329.0",
45
+ "@aws-sdk/smithy-client": "3.329.0",
46
+ "@aws-sdk/types": "3.329.0",
47
+ "@aws-sdk/url-parser": "3.329.0",
48
48
  "@aws-sdk/util-base64": "3.310.0",
49
49
  "@aws-sdk/util-body-length-browser": "3.310.0",
50
50
  "@aws-sdk/util-body-length-node": "3.310.0",
51
- "@aws-sdk/util-defaults-mode-browser": "3.325.0",
52
- "@aws-sdk/util-defaults-mode-node": "3.325.0",
53
- "@aws-sdk/util-endpoints": "3.327.0",
54
- "@aws-sdk/util-retry": "3.327.0",
55
- "@aws-sdk/util-user-agent-browser": "3.310.0",
56
- "@aws-sdk/util-user-agent-node": "3.310.0",
51
+ "@aws-sdk/util-defaults-mode-browser": "3.329.0",
52
+ "@aws-sdk/util-defaults-mode-node": "3.329.0",
53
+ "@aws-sdk/util-endpoints": "3.329.0",
54
+ "@aws-sdk/util-retry": "3.329.0",
55
+ "@aws-sdk/util-user-agent-browser": "3.329.0",
56
+ "@aws-sdk/util-user-agent-node": "3.329.0",
57
57
  "@aws-sdk/util-utf8": "3.310.0",
58
58
  "fast-xml-parser": "4.1.2",
59
59
  "tslib": "^2.5.0"