@aws-sdk/client-sts 3.328.0 → 3.332.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +1 -5
- package/dist-cjs/endpoint/ruleset.js +3 -3
- package/dist-es/endpoint/ruleset.js +3 -3
- package/dist-types/STS.d.ts +1 -2
- package/dist-types/STSClient.d.ts +1 -2
- package/dist-types/commands/AssumeRoleCommand.d.ts +4 -4
- package/dist-types/commands/AssumeRoleWithWebIdentityCommand.d.ts +2 -3
- package/dist-types/commands/GetCallerIdentityCommand.d.ts +4 -6
- package/dist-types/commands/GetFederationTokenCommand.d.ts +8 -11
- package/dist-types/commands/GetSessionTokenCommand.d.ts +15 -17
- package/dist-types/models/models_0.d.ts +2 -2
- package/package.json +29 -29
package/README.md
CHANGED
|
@@ -2,9 +2,6 @@
|
|
|
2
2
|
|
|
3
3
|
# @aws-sdk/client-sts
|
|
4
4
|
|
|
5
|
-
[](https://www.npmjs.com/package/@aws-sdk/client-sts)
|
|
6
|
-
[](https://www.npmjs.com/package/@aws-sdk/client-sts)
|
|
7
|
-
|
|
8
5
|
## Description
|
|
9
6
|
|
|
10
7
|
AWS SDK for JavaScript STS Client for Node.js, Browser and React Native.
|
|
@@ -12,8 +9,7 @@ AWS SDK for JavaScript STS Client for Node.js, Browser and React Native.
|
|
|
12
9
|
<fullname>Security Token Service</fullname>
|
|
13
10
|
|
|
14
11
|
<p>Security Token Service (STS) enables you to request temporary, limited-privilege
|
|
15
|
-
credentials for
|
|
16
|
-
authenticate (federated users). This guide provides descriptions of the STS API. For
|
|
12
|
+
credentials for users. This guide provides descriptions of the STS API. For
|
|
17
13
|
more information about using this service, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp.html">Temporary Security Credentials</a>.</p>
|
|
18
14
|
|
|
19
15
|
## Installing
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
"use strict";
|
|
2
2
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
3
|
exports.ruleSet = void 0;
|
|
4
|
-
const
|
|
5
|
-
const a = false, b = true, c = "
|
|
6
|
-
const _data = { version: "1.0", parameters: { Region:
|
|
4
|
+
const F = "required", G = "type", H = "fn", I = "argv", J = "ref";
|
|
5
|
+
const a = false, b = true, c = "booleanEquals", d = "tree", e = "stringEquals", f = "sigv4", g = "sts", h = "us-east-1", i = "endpoint", j = "https://sts.{Region}.{PartitionResult#dnsSuffix}", k = "error", l = "getAttr", m = { [F]: false, [G]: "String" }, n = { [F]: true, "default": false, [G]: "Boolean" }, o = { [J]: "Endpoint" }, p = { [H]: "isSet", [I]: [{ [J]: "Region" }] }, q = { [J]: "Region" }, r = { [H]: "aws.partition", [I]: [q], "assign": "PartitionResult" }, s = { [J]: "UseFIPS" }, t = { [J]: "UseDualStack" }, u = { "url": "https://sts.amazonaws.com", "properties": { "authSchemes": [{ "name": f, "signingName": g, "signingRegion": h }] }, "headers": {} }, v = {}, w = { "conditions": [{ [H]: e, [I]: [q, "aws-global"] }], [i]: u, [G]: i }, x = { [H]: c, [I]: [s, true] }, y = { [H]: c, [I]: [t, true] }, z = { [H]: c, [I]: [true, { [H]: l, [I]: [{ [J]: "PartitionResult" }, "supportsFIPS"] }] }, A = { [J]: "PartitionResult" }, B = { [H]: c, [I]: [true, { [H]: l, [I]: [A, "supportsDualStack"] }] }, C = [{ [H]: "isSet", [I]: [o] }], D = [x], E = [y];
|
|
6
|
+
const _data = { version: "1.0", parameters: { Region: m, UseDualStack: n, UseFIPS: n, Endpoint: m, UseGlobalEndpoint: n }, rules: [{ conditions: [{ [H]: c, [I]: [{ [J]: "UseGlobalEndpoint" }, b] }, { [H]: "not", [I]: C }, p, r, { [H]: c, [I]: [s, a] }, { [H]: c, [I]: [t, a] }], [G]: d, rules: [{ conditions: [{ [H]: e, [I]: [q, "ap-northeast-1"] }], endpoint: u, [G]: i }, { conditions: [{ [H]: e, [I]: [q, "ap-south-1"] }], endpoint: u, [G]: i }, { conditions: [{ [H]: e, [I]: [q, "ap-southeast-1"] }], endpoint: u, [G]: i }, { conditions: [{ [H]: e, [I]: [q, "ap-southeast-2"] }], endpoint: u, [G]: i }, w, { conditions: [{ [H]: e, [I]: [q, "ca-central-1"] }], endpoint: u, [G]: i }, { conditions: [{ [H]: e, [I]: [q, "eu-central-1"] }], endpoint: u, [G]: i }, { conditions: [{ [H]: e, [I]: [q, "eu-north-1"] }], endpoint: u, [G]: i }, { conditions: [{ [H]: e, [I]: [q, "eu-west-1"] }], endpoint: u, [G]: i }, { conditions: [{ [H]: e, [I]: [q, "eu-west-2"] }], endpoint: u, [G]: i }, { conditions: [{ [H]: e, [I]: [q, "eu-west-3"] }], endpoint: u, [G]: i }, { conditions: [{ [H]: e, [I]: [q, "sa-east-1"] }], endpoint: u, [G]: i }, { conditions: [{ [H]: e, [I]: [q, h] }], endpoint: u, [G]: i }, { conditions: [{ [H]: e, [I]: [q, "us-east-2"] }], endpoint: u, [G]: i }, { conditions: [{ [H]: e, [I]: [q, "us-west-1"] }], endpoint: u, [G]: i }, { conditions: [{ [H]: e, [I]: [q, "us-west-2"] }], endpoint: u, [G]: i }, { endpoint: { url: j, properties: { authSchemes: [{ name: f, signingName: g, signingRegion: "{Region}" }] }, headers: v }, [G]: i }] }, { conditions: C, [G]: d, rules: [{ conditions: D, error: "Invalid Configuration: FIPS and custom endpoint are not supported", [G]: k }, { [G]: d, rules: [{ conditions: E, error: "Invalid Configuration: Dualstack and custom endpoint are not supported", [G]: k }, { endpoint: { url: o, properties: v, headers: v }, [G]: i }] }] }, { [G]: d, rules: [{ conditions: [p], [G]: d, rules: [{ conditions: [r], [G]: d, rules: [{ conditions: [x, y], [G]: d, rules: [{ conditions: [z, B], [G]: d, rules: [{ [G]: d, rules: [{ endpoint: { url: "https://sts-fips.{Region}.{PartitionResult#dualStackDnsSuffix}", properties: v, headers: v }, [G]: i }] }] }, { error: "FIPS and DualStack are enabled, but this partition does not support one or both", [G]: k }] }, { conditions: D, [G]: d, rules: [{ conditions: [z], [G]: d, rules: [{ [G]: d, rules: [{ conditions: [{ [H]: e, [I]: ["aws-us-gov", { [H]: l, [I]: [A, "name"] }] }], endpoint: { url: "https://sts.{Region}.amazonaws.com", properties: v, headers: v }, [G]: i }, { endpoint: { url: "https://sts-fips.{Region}.{PartitionResult#dnsSuffix}", properties: v, headers: v }, [G]: i }] }] }, { error: "FIPS is enabled but this partition does not support FIPS", [G]: k }] }, { conditions: E, [G]: d, rules: [{ conditions: [B], [G]: d, rules: [{ [G]: d, rules: [{ endpoint: { url: "https://sts.{Region}.{PartitionResult#dualStackDnsSuffix}", properties: v, headers: v }, [G]: i }] }] }, { error: "DualStack is enabled but this partition does not support DualStack", [G]: k }] }, { [G]: d, rules: [w, { endpoint: { url: j, properties: v, headers: v }, [G]: i }] }] }] }, { error: "Invalid Configuration: Missing Region", [G]: k }] }] };
|
|
7
7
|
exports.ruleSet = _data;
|
|
@@ -1,4 +1,4 @@
|
|
|
1
|
-
const
|
|
2
|
-
const a = false, b = true, c = "
|
|
3
|
-
const _data = { version: "1.0", parameters: { Region:
|
|
1
|
+
const F = "required", G = "type", H = "fn", I = "argv", J = "ref";
|
|
2
|
+
const a = false, b = true, c = "booleanEquals", d = "tree", e = "stringEquals", f = "sigv4", g = "sts", h = "us-east-1", i = "endpoint", j = "https://sts.{Region}.{PartitionResult#dnsSuffix}", k = "error", l = "getAttr", m = { [F]: false, [G]: "String" }, n = { [F]: true, "default": false, [G]: "Boolean" }, o = { [J]: "Endpoint" }, p = { [H]: "isSet", [I]: [{ [J]: "Region" }] }, q = { [J]: "Region" }, r = { [H]: "aws.partition", [I]: [q], "assign": "PartitionResult" }, s = { [J]: "UseFIPS" }, t = { [J]: "UseDualStack" }, u = { "url": "https://sts.amazonaws.com", "properties": { "authSchemes": [{ "name": f, "signingName": g, "signingRegion": h }] }, "headers": {} }, v = {}, w = { "conditions": [{ [H]: e, [I]: [q, "aws-global"] }], [i]: u, [G]: i }, x = { [H]: c, [I]: [s, true] }, y = { [H]: c, [I]: [t, true] }, z = { [H]: c, [I]: [true, { [H]: l, [I]: [{ [J]: "PartitionResult" }, "supportsFIPS"] }] }, A = { [J]: "PartitionResult" }, B = { [H]: c, [I]: [true, { [H]: l, [I]: [A, "supportsDualStack"] }] }, C = [{ [H]: "isSet", [I]: [o] }], D = [x], E = [y];
|
|
3
|
+
const _data = { version: "1.0", parameters: { Region: m, UseDualStack: n, UseFIPS: n, Endpoint: m, UseGlobalEndpoint: n }, rules: [{ conditions: [{ [H]: c, [I]: [{ [J]: "UseGlobalEndpoint" }, b] }, { [H]: "not", [I]: C }, p, r, { [H]: c, [I]: [s, a] }, { [H]: c, [I]: [t, a] }], [G]: d, rules: [{ conditions: [{ [H]: e, [I]: [q, "ap-northeast-1"] }], endpoint: u, [G]: i }, { conditions: [{ [H]: e, [I]: [q, "ap-south-1"] }], endpoint: u, [G]: i }, { conditions: [{ [H]: e, [I]: [q, "ap-southeast-1"] }], endpoint: u, [G]: i }, { conditions: [{ [H]: e, [I]: [q, "ap-southeast-2"] }], endpoint: u, [G]: i }, w, { conditions: [{ [H]: e, [I]: [q, "ca-central-1"] }], endpoint: u, [G]: i }, { conditions: [{ [H]: e, [I]: [q, "eu-central-1"] }], endpoint: u, [G]: i }, { conditions: [{ [H]: e, [I]: [q, "eu-north-1"] }], endpoint: u, [G]: i }, { conditions: [{ [H]: e, [I]: [q, "eu-west-1"] }], endpoint: u, [G]: i }, { conditions: [{ [H]: e, [I]: [q, "eu-west-2"] }], endpoint: u, [G]: i }, { conditions: [{ [H]: e, [I]: [q, "eu-west-3"] }], endpoint: u, [G]: i }, { conditions: [{ [H]: e, [I]: [q, "sa-east-1"] }], endpoint: u, [G]: i }, { conditions: [{ [H]: e, [I]: [q, h] }], endpoint: u, [G]: i }, { conditions: [{ [H]: e, [I]: [q, "us-east-2"] }], endpoint: u, [G]: i }, { conditions: [{ [H]: e, [I]: [q, "us-west-1"] }], endpoint: u, [G]: i }, { conditions: [{ [H]: e, [I]: [q, "us-west-2"] }], endpoint: u, [G]: i }, { endpoint: { url: j, properties: { authSchemes: [{ name: f, signingName: g, signingRegion: "{Region}" }] }, headers: v }, [G]: i }] }, { conditions: C, [G]: d, rules: [{ conditions: D, error: "Invalid Configuration: FIPS and custom endpoint are not supported", [G]: k }, { [G]: d, rules: [{ conditions: E, error: "Invalid Configuration: Dualstack and custom endpoint are not supported", [G]: k }, { endpoint: { url: o, properties: v, headers: v }, [G]: i }] }] }, { [G]: d, rules: [{ conditions: [p], [G]: d, rules: [{ conditions: [r], [G]: d, rules: [{ conditions: [x, y], [G]: d, rules: [{ conditions: [z, B], [G]: d, rules: [{ [G]: d, rules: [{ endpoint: { url: "https://sts-fips.{Region}.{PartitionResult#dualStackDnsSuffix}", properties: v, headers: v }, [G]: i }] }] }, { error: "FIPS and DualStack are enabled, but this partition does not support one or both", [G]: k }] }, { conditions: D, [G]: d, rules: [{ conditions: [z], [G]: d, rules: [{ [G]: d, rules: [{ conditions: [{ [H]: e, [I]: ["aws-us-gov", { [H]: l, [I]: [A, "name"] }] }], endpoint: { url: "https://sts.{Region}.amazonaws.com", properties: v, headers: v }, [G]: i }, { endpoint: { url: "https://sts-fips.{Region}.{PartitionResult#dnsSuffix}", properties: v, headers: v }, [G]: i }] }] }, { error: "FIPS is enabled but this partition does not support FIPS", [G]: k }] }, { conditions: E, [G]: d, rules: [{ conditions: [B], [G]: d, rules: [{ [G]: d, rules: [{ endpoint: { url: "https://sts.{Region}.{PartitionResult#dualStackDnsSuffix}", properties: v, headers: v }, [G]: i }] }] }, { error: "DualStack is enabled but this partition does not support DualStack", [G]: k }] }, { [G]: d, rules: [w, { endpoint: { url: j, properties: v, headers: v }, [G]: i }] }] }] }, { error: "Invalid Configuration: Missing Region", [G]: k }] }] };
|
|
4
4
|
export const ruleSet = _data;
|
package/dist-types/STS.d.ts
CHANGED
|
@@ -62,8 +62,7 @@ export interface STS {
|
|
|
62
62
|
* @public
|
|
63
63
|
* <fullname>Security Token Service</fullname>
|
|
64
64
|
* <p>Security Token Service (STS) enables you to request temporary, limited-privilege
|
|
65
|
-
* credentials for
|
|
66
|
-
* authenticate (federated users). This guide provides descriptions of the STS API. For
|
|
65
|
+
* credentials for users. This guide provides descriptions of the STS API. For
|
|
67
66
|
* more information about using this service, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp.html">Temporary Security Credentials</a>.</p>
|
|
68
67
|
*/
|
|
69
68
|
export declare class STS extends STSClient implements STS {
|
|
@@ -153,8 +153,7 @@ export interface STSClientResolvedConfig extends STSClientResolvedConfigType {
|
|
|
153
153
|
* @public
|
|
154
154
|
* <fullname>Security Token Service</fullname>
|
|
155
155
|
* <p>Security Token Service (STS) enables you to request temporary, limited-privilege
|
|
156
|
-
* credentials for
|
|
157
|
-
* authenticate (federated users). This guide provides descriptions of the STS API. For
|
|
156
|
+
* credentials for users. This guide provides descriptions of the STS API. For
|
|
158
157
|
* more information about using this service, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp.html">Temporary Security Credentials</a>.</p>
|
|
159
158
|
*/
|
|
160
159
|
export declare class STSClient extends __Client<__HttpHandlerOptions, ServiceInputTypes, ServiceOutputTypes, STSClientResolvedConfig> {
|
|
@@ -45,16 +45,16 @@ export interface AssumeRoleCommandOutput extends AssumeRoleResponse, __MetadataB
|
|
|
45
45
|
* by the identity-based policy of the role that is being assumed. For more information, see
|
|
46
46
|
* <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session">Session
|
|
47
47
|
* Policies</a> in the <i>IAM User Guide</i>.</p>
|
|
48
|
-
* <p>When you create a role, you create two policies:
|
|
49
|
-
* <i>who</i> can assume the role and a permissions policy that specifies
|
|
48
|
+
* <p>When you create a role, you create two policies: a role trust policy that specifies
|
|
49
|
+
* <i>who</i> can assume the role, and a permissions policy that specifies
|
|
50
50
|
* <i>what</i> can be done with the role. You specify the trusted principal
|
|
51
|
-
*
|
|
51
|
+
* that is allowed to assume the role in the role trust policy.</p>
|
|
52
52
|
* <p>To assume a role from a different account, your Amazon Web Services account must be trusted by the
|
|
53
53
|
* role. The trust relationship is defined in the role's trust policy when the role is
|
|
54
54
|
* created. That trust policy states which accounts are allowed to delegate that access to
|
|
55
55
|
* users in the account. </p>
|
|
56
56
|
* <p>A user who wants to access a role in a different account must also have permissions that
|
|
57
|
-
* are delegated from the
|
|
57
|
+
* are delegated from the account administrator. The administrator must attach a policy
|
|
58
58
|
* that allows the user to call <code>AssumeRole</code> for the ARN of the role in the other
|
|
59
59
|
* account.</p>
|
|
60
60
|
* <p>To allow a user to assume a role in the same account, you can do either of the
|
|
@@ -28,9 +28,8 @@ export interface AssumeRoleWithWebIdentityCommandOutput extends AssumeRoleWithWe
|
|
|
28
28
|
* <a href="http://aws.amazon.com/sdkforios/">Amazon Web Services SDK for iOS Developer Guide</a> and the <a href="http://aws.amazon.com/sdkforandroid/">Amazon Web Services SDK for Android Developer Guide</a> to uniquely
|
|
29
29
|
* identify a user. You can also supply the user with a consistent identity throughout the
|
|
30
30
|
* lifetime of an application.</p>
|
|
31
|
-
* <p>To learn more about Amazon Cognito, see <a href="https://docs.aws.amazon.com/
|
|
32
|
-
*
|
|
33
|
-
* <i>Amazon Web Services SDK for iOS Developer Guide</i>.</p>
|
|
31
|
+
* <p>To learn more about Amazon Cognito, see <a href="https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-identity.html">Amazon Cognito identity pools</a> in
|
|
32
|
+
* <i>Amazon Cognito Developer Guide</i>.</p>
|
|
34
33
|
* </note>
|
|
35
34
|
* <p>Calling <code>AssumeRoleWithWebIdentity</code> does not require the use of Amazon Web Services
|
|
36
35
|
* security credentials. Therefore, you can distribute an application (for example, on mobile
|
|
@@ -19,14 +19,12 @@ export interface GetCallerIdentityCommandOutput extends GetCallerIdentityRespons
|
|
|
19
19
|
}
|
|
20
20
|
/**
|
|
21
21
|
* @public
|
|
22
|
-
* <p>Returns details about the IAM user or role whose credentials are used to call the
|
|
23
|
-
* operation.</p>
|
|
22
|
+
* <p>Returns details about the IAM user or role whose credentials are used to call the operation.</p>
|
|
24
23
|
* <note>
|
|
25
|
-
* <p>No permissions are required to perform this operation. If an administrator
|
|
26
|
-
*
|
|
24
|
+
* <p>No permissions are required to perform this operation. If an administrator
|
|
25
|
+
* attaches a policy to your identity that explicitly denies access to the
|
|
27
26
|
* <code>sts:GetCallerIdentity</code> action, you can still perform this operation.
|
|
28
|
-
* Permissions are not required because the same information is returned when an IAM
|
|
29
|
-
* or role is denied access. To view an example response, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/troubleshoot_general.html#troubleshoot_general_access-denied-delete-mfa">I Am Not Authorized to Perform: iam:DeleteVirtualMFADevice</a> in the
|
|
27
|
+
* Permissions are not required because the same information is returned when access is denied. To view an example response, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/troubleshoot_general.html#troubleshoot_general_access-denied-delete-mfa">I Am Not Authorized to Perform: iam:DeleteVirtualMFADevice</a> in the
|
|
30
28
|
* <i>IAM User Guide</i>.</p>
|
|
31
29
|
* </note>
|
|
32
30
|
* @example
|
|
@@ -20,15 +20,19 @@ export interface GetFederationTokenCommandOutput extends GetFederationTokenRespo
|
|
|
20
20
|
/**
|
|
21
21
|
* @public
|
|
22
22
|
* <p>Returns a set of temporary security credentials (consisting of an access key ID, a
|
|
23
|
-
* secret access key, and a security token) for a
|
|
23
|
+
* secret access key, and a security token) for a user. A typical use is in a proxy
|
|
24
24
|
* application that gets temporary security credentials on behalf of distributed applications
|
|
25
|
-
* inside a corporate network
|
|
25
|
+
* inside a corporate network.</p>
|
|
26
|
+
* <p>You must call the <code>GetFederationToken</code> operation
|
|
26
27
|
* using the long-term security credentials of an IAM user. As a result, this call is
|
|
27
|
-
* appropriate in contexts where those credentials can be
|
|
28
|
+
* appropriate in contexts where those credentials can be safeguarded, usually in a
|
|
28
29
|
* server-based application. For a comparison of <code>GetFederationToken</code> with the
|
|
29
30
|
* other API operations that produce temporary credentials, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html">Requesting Temporary Security
|
|
30
31
|
* Credentials</a> and <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#stsapi_comparison">Comparing the
|
|
31
32
|
* Amazon Web Services STS API operations</a> in the <i>IAM User Guide</i>.</p>
|
|
33
|
+
* <p>Although it is possible to call <code>GetFederationToken</code> using the security credentials of an
|
|
34
|
+
* Amazon Web Services account root user rather than an IAM user that you create for the purpose of a proxy application, we do not recommend it. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html#lock-away-credentials">Safeguard your root user credentials and don't use them for everyday tasks</a> in the
|
|
35
|
+
* <i>IAM User Guide</i>. </p>
|
|
32
36
|
* <note>
|
|
33
37
|
* <p>You can create a mobile-based or browser-based app that can authenticate users using
|
|
34
38
|
* a web identity provider like Login with Amazon, Facebook, Google, or an OpenID
|
|
@@ -36,19 +40,12 @@ export interface GetFederationTokenCommandOutput extends GetFederationTokenRespo
|
|
|
36
40
|
* <code>AssumeRoleWithWebIdentity</code>. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#api_assumerolewithwebidentity">Federation Through a Web-based Identity Provider</a> in the
|
|
37
41
|
* <i>IAM User Guide</i>.</p>
|
|
38
42
|
* </note>
|
|
39
|
-
* <p>You can also call <code>GetFederationToken</code> using the security credentials of an
|
|
40
|
-
* Amazon Web Services account root user, but we do not recommend it. Instead, we recommend that you create
|
|
41
|
-
* an IAM user for the purpose of the proxy application. Then attach a policy to the IAM
|
|
42
|
-
* user that limits federated users to only the actions and resources that they need to
|
|
43
|
-
* access. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html">IAM Best Practices</a> in the
|
|
44
|
-
* <i>IAM User Guide</i>. </p>
|
|
45
43
|
* <p>
|
|
46
44
|
* <b>Session duration</b>
|
|
47
45
|
* </p>
|
|
48
46
|
* <p>The temporary credentials are valid for the specified duration, from 900 seconds (15
|
|
49
47
|
* minutes) up to a maximum of 129,600 seconds (36 hours). The default session duration is
|
|
50
|
-
* 43,200 seconds (12 hours). Temporary credentials obtained by using the
|
|
51
|
-
* user credentials have a maximum duration of 3,600 seconds (1 hour).</p>
|
|
48
|
+
* 43,200 seconds (12 hours). Temporary credentials obtained by using the root user credentials have a maximum duration of 3,600 seconds (1 hour).</p>
|
|
52
49
|
* <p>
|
|
53
50
|
* <b>Permissions</b>
|
|
54
51
|
* </p>
|
|
@@ -22,12 +22,11 @@ export interface GetSessionTokenCommandOutput extends GetSessionTokenResponse, _
|
|
|
22
22
|
* <p>Returns a set of temporary credentials for an Amazon Web Services account or IAM user. The
|
|
23
23
|
* credentials consist of an access key ID, a secret access key, and a security token.
|
|
24
24
|
* Typically, you use <code>GetSessionToken</code> if you want to use MFA to protect
|
|
25
|
-
* programmatic calls to specific Amazon Web Services API operations like Amazon EC2 <code>StopInstances</code
|
|
26
|
-
* MFA-enabled IAM users
|
|
25
|
+
* programmatic calls to specific Amazon Web Services API operations like Amazon EC2 <code>StopInstances</code>.</p>
|
|
26
|
+
* <p>MFA-enabled IAM users must call <code>GetSessionToken</code> and submit an MFA
|
|
27
27
|
* code that is associated with their MFA device. Using the temporary security credentials
|
|
28
|
-
* that
|
|
29
|
-
* operations that require MFA authentication.
|
|
30
|
-
* the API returns an access denied error. For a comparison of <code>GetSessionToken</code>
|
|
28
|
+
* that the call returns, IAM users can then make programmatic calls to API
|
|
29
|
+
* operations that require MFA authentication. An incorrect MFA code causes the API to return an access denied error. For a comparison of <code>GetSessionToken</code>
|
|
31
30
|
* with the other API operations that produce temporary credentials, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html">Requesting
|
|
32
31
|
* Temporary Security Credentials</a> and <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#stsapi_comparison">Comparing the
|
|
33
32
|
* Amazon Web Services STS API operations</a> in the <i>IAM User Guide</i>.</p>
|
|
@@ -42,7 +41,7 @@ export interface GetSessionTokenCommandOutput extends GetSessionTokenResponse, _
|
|
|
42
41
|
* <b>Session Duration</b>
|
|
43
42
|
* </p>
|
|
44
43
|
* <p>The <code>GetSessionToken</code> operation must be called by using the long-term Amazon Web Services
|
|
45
|
-
* security credentials of
|
|
44
|
+
* security credentials of an IAM user. Credentials that are
|
|
46
45
|
* created by IAM users are valid for the duration that you specify. This duration can range
|
|
47
46
|
* from 900 seconds (15 minutes) up to a maximum of 129,600 seconds (36 hours), with a default
|
|
48
47
|
* of 43,200 seconds (12 hours). Credentials based on account credentials can range from 900
|
|
@@ -62,20 +61,19 @@ export interface GetSessionTokenCommandOutput extends GetSessionTokenResponse, _
|
|
|
62
61
|
* <code>AssumeRole</code> or <code>GetCallerIdentity</code>.</p>
|
|
63
62
|
* </li>
|
|
64
63
|
* </ul>
|
|
64
|
+
* <p>The credentials that <code>GetSessionToken</code> returns are based on
|
|
65
|
+
* permissions associated with the IAM user whose credentials were used to call the operation. The
|
|
66
|
+
* temporary credentials have the same permissions as the IAM user.</p>
|
|
65
67
|
* <note>
|
|
66
|
-
* <p>
|
|
67
|
-
* root user
|
|
68
|
-
*
|
|
69
|
-
*
|
|
68
|
+
* <p>Although it is possible to call <code>GetSessionToken</code> using the security credentials of an
|
|
69
|
+
* Amazon Web Services account root user rather than an IAM user, we do not recommend it. If
|
|
70
|
+
* <code>GetSessionToken</code> is called using root user credentials, the
|
|
71
|
+
* temporary credentials have root user permissions. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html#lock-away-credentials">Safeguard your root user credentials and don't use them for everyday tasks</a> in the
|
|
72
|
+
* <i>IAM User Guide</i>
|
|
73
|
+
* </p>
|
|
70
74
|
* </note>
|
|
71
|
-
* <p>The credentials that are returned by <code>GetSessionToken</code> are based on
|
|
72
|
-
* permissions associated with the user whose credentials were used to call the operation. If
|
|
73
|
-
* <code>GetSessionToken</code> is called using Amazon Web Services account root user credentials, the
|
|
74
|
-
* temporary credentials have root user permissions. Similarly, if
|
|
75
|
-
* <code>GetSessionToken</code> is called using the credentials of an IAM user, the
|
|
76
|
-
* temporary credentials have the same permissions as the IAM user. </p>
|
|
77
75
|
* <p>For more information about using <code>GetSessionToken</code> to create temporary
|
|
78
|
-
* credentials,
|
|
76
|
+
* credentials, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#api_getsessiontoken">Temporary
|
|
79
77
|
* Credentials for Users in Untrusted Environments</a> in the
|
|
80
78
|
* <i>IAM User Guide</i>. </p>
|
|
81
79
|
* @example
|
|
@@ -535,7 +535,7 @@ export interface AssumeRoleWithSAMLResponse {
|
|
|
535
535
|
* </li>
|
|
536
536
|
* </ul>
|
|
537
537
|
* <p>The combination of <code>NameQualifier</code> and <code>Subject</code> can be used to
|
|
538
|
-
* uniquely identify a
|
|
538
|
+
* uniquely identify a user.</p>
|
|
539
539
|
* <p>The following pseudocode shows how the hash value is calculated:</p>
|
|
540
540
|
* <p>
|
|
541
541
|
* <code>BASE64 ( SHA1 ( "https://example.com/saml" + "123456789012" + "/MySAMLIdP" ) )</code>
|
|
@@ -946,7 +946,7 @@ export interface GetFederationTokenRequest {
|
|
|
946
946
|
/**
|
|
947
947
|
* <p>The duration, in seconds, that the session should last. Acceptable durations for
|
|
948
948
|
* federation sessions range from 900 seconds (15 minutes) to 129,600 seconds (36 hours), with
|
|
949
|
-
* 43,200 seconds (12 hours) as the default. Sessions obtained using
|
|
949
|
+
* 43,200 seconds (12 hours) as the default. Sessions obtained using root user
|
|
950
950
|
* credentials are restricted to a maximum of 3,600 seconds (one hour). If the specified
|
|
951
951
|
* duration is longer than one hour, the session obtained by using root user credentials
|
|
952
952
|
* defaults to one hour.</p>
|
package/package.json
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@aws-sdk/client-sts",
|
|
3
3
|
"description": "AWS SDK for JavaScript Sts Client for Node.js, Browser and React Native",
|
|
4
|
-
"version": "3.
|
|
4
|
+
"version": "3.332.0",
|
|
5
5
|
"scripts": {
|
|
6
6
|
"build": "concurrently 'yarn:build:cjs' 'yarn:build:es' 'yarn:build:types'",
|
|
7
7
|
"build:cjs": "tsc -p tsconfig.cjs.json",
|
|
@@ -23,37 +23,37 @@
|
|
|
23
23
|
"dependencies": {
|
|
24
24
|
"@aws-crypto/sha256-browser": "3.0.0",
|
|
25
25
|
"@aws-crypto/sha256-js": "3.0.0",
|
|
26
|
-
"@aws-sdk/config-resolver": "3.
|
|
27
|
-
"@aws-sdk/credential-provider-node": "3.
|
|
28
|
-
"@aws-sdk/fetch-http-handler": "3.
|
|
29
|
-
"@aws-sdk/hash-node": "3.
|
|
30
|
-
"@aws-sdk/invalid-dependency": "3.
|
|
31
|
-
"@aws-sdk/middleware-content-length": "3.
|
|
32
|
-
"@aws-sdk/middleware-endpoint": "3.
|
|
33
|
-
"@aws-sdk/middleware-host-header": "3.
|
|
34
|
-
"@aws-sdk/middleware-logger": "3.
|
|
35
|
-
"@aws-sdk/middleware-recursion-detection": "3.
|
|
36
|
-
"@aws-sdk/middleware-retry": "3.
|
|
37
|
-
"@aws-sdk/middleware-sdk-sts": "3.
|
|
38
|
-
"@aws-sdk/middleware-serde": "3.
|
|
39
|
-
"@aws-sdk/middleware-signing": "3.
|
|
40
|
-
"@aws-sdk/middleware-stack": "3.
|
|
41
|
-
"@aws-sdk/middleware-user-agent": "3.
|
|
42
|
-
"@aws-sdk/node-config-provider": "3.
|
|
43
|
-
"@aws-sdk/node-http-handler": "3.
|
|
44
|
-
"@aws-sdk/protocol-http": "3.
|
|
45
|
-
"@aws-sdk/smithy-client": "3.
|
|
46
|
-
"@aws-sdk/types": "3.
|
|
47
|
-
"@aws-sdk/url-parser": "3.
|
|
26
|
+
"@aws-sdk/config-resolver": "3.329.0",
|
|
27
|
+
"@aws-sdk/credential-provider-node": "3.332.0",
|
|
28
|
+
"@aws-sdk/fetch-http-handler": "3.329.0",
|
|
29
|
+
"@aws-sdk/hash-node": "3.329.0",
|
|
30
|
+
"@aws-sdk/invalid-dependency": "3.329.0",
|
|
31
|
+
"@aws-sdk/middleware-content-length": "3.329.0",
|
|
32
|
+
"@aws-sdk/middleware-endpoint": "3.329.0",
|
|
33
|
+
"@aws-sdk/middleware-host-header": "3.329.0",
|
|
34
|
+
"@aws-sdk/middleware-logger": "3.329.0",
|
|
35
|
+
"@aws-sdk/middleware-recursion-detection": "3.329.0",
|
|
36
|
+
"@aws-sdk/middleware-retry": "3.329.0",
|
|
37
|
+
"@aws-sdk/middleware-sdk-sts": "3.329.0",
|
|
38
|
+
"@aws-sdk/middleware-serde": "3.329.0",
|
|
39
|
+
"@aws-sdk/middleware-signing": "3.329.0",
|
|
40
|
+
"@aws-sdk/middleware-stack": "3.329.0",
|
|
41
|
+
"@aws-sdk/middleware-user-agent": "3.332.0",
|
|
42
|
+
"@aws-sdk/node-config-provider": "3.329.0",
|
|
43
|
+
"@aws-sdk/node-http-handler": "3.329.0",
|
|
44
|
+
"@aws-sdk/protocol-http": "3.329.0",
|
|
45
|
+
"@aws-sdk/smithy-client": "3.329.0",
|
|
46
|
+
"@aws-sdk/types": "3.329.0",
|
|
47
|
+
"@aws-sdk/url-parser": "3.329.0",
|
|
48
48
|
"@aws-sdk/util-base64": "3.310.0",
|
|
49
49
|
"@aws-sdk/util-body-length-browser": "3.310.0",
|
|
50
50
|
"@aws-sdk/util-body-length-node": "3.310.0",
|
|
51
|
-
"@aws-sdk/util-defaults-mode-browser": "3.
|
|
52
|
-
"@aws-sdk/util-defaults-mode-node": "3.
|
|
53
|
-
"@aws-sdk/util-endpoints": "3.
|
|
54
|
-
"@aws-sdk/util-retry": "3.
|
|
55
|
-
"@aws-sdk/util-user-agent-browser": "3.
|
|
56
|
-
"@aws-sdk/util-user-agent-node": "3.
|
|
51
|
+
"@aws-sdk/util-defaults-mode-browser": "3.329.0",
|
|
52
|
+
"@aws-sdk/util-defaults-mode-node": "3.329.0",
|
|
53
|
+
"@aws-sdk/util-endpoints": "3.332.0",
|
|
54
|
+
"@aws-sdk/util-retry": "3.329.0",
|
|
55
|
+
"@aws-sdk/util-user-agent-browser": "3.329.0",
|
|
56
|
+
"@aws-sdk/util-user-agent-node": "3.329.0",
|
|
57
57
|
"@aws-sdk/util-utf8": "3.310.0",
|
|
58
58
|
"fast-xml-parser": "4.1.2",
|
|
59
59
|
"tslib": "^2.5.0"
|