@aws-sdk/client-sts 3.40.0 → 3.45.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -43,7 +43,7 @@ export declare namespace PolicyDescriptorType {
43
43
  /**
44
44
  * <p>You can pass custom key-value pair attributes when you assume a role or federate a user.
45
45
  * These are called session tags. You can then use the session tags to control access to
46
- * resources. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html">Tagging STS Sessions</a> in the
46
+ * resources. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html">Tagging Amazon Web Services STS Sessions</a> in the
47
47
  * <i>IAM User Guide</i>.</p>
48
48
  */
49
49
  export interface Tag {
@@ -93,6 +93,7 @@ export interface AssumeRoleRequest {
93
93
  * plaintext that you use for both inline and managed session policies can't exceed 2,048
94
94
  * characters. For more information about ARNs, see <a href="https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html">Amazon Resource Names (ARNs) and Amazon Web Services
95
95
  * Service Namespaces</a> in the Amazon Web Services General Reference.</p>
96
+ *
96
97
  * <note>
97
98
  * <p>An Amazon Web Services conversion compresses the passed session policies and session tags into a
98
99
  * packed binary format that has a separate limit. Your request can fail for this limit
@@ -127,6 +128,7 @@ export interface AssumeRoleRequest {
127
128
  * character to the end of the valid character list (\u0020 through \u00FF). It can also
128
129
  * include the tab (\u0009), linefeed (\u000A), and carriage return (\u000D)
129
130
  * characters.</p>
131
+ *
130
132
  * <note>
131
133
  * <p>An Amazon Web Services conversion compresses the passed session policies and session tags into a
132
134
  * packed binary format that has a separate limit. Your request can fail for this limit
@@ -138,13 +140,19 @@ export interface AssumeRoleRequest {
138
140
  */
139
141
  Policy?: string;
140
142
  /**
141
- * <p>The duration, in seconds, of the role session. The value specified can can range from
142
- * 900 seconds (15 minutes) up to the maximum session duration that is set for the role. The
143
- * maximum session duration setting can have a value from 1 hour to 12 hours. If you specify a
144
- * value higher than this setting or the administrator setting (whichever is lower), the
145
- * operation fails. For example, if you specify a session duration of 12 hours, but your
146
- * administrator set the maximum session duration to 6 hours, your operation fails. To learn
147
- * how to view the maximum value for your role, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html#id_roles_use_view-role-max-session">View the
143
+ * <p>The duration, in seconds, of the role session. The value specified can range from 900
144
+ * seconds (15 minutes) up to the maximum session duration set for the role. The maximum
145
+ * session duration setting can have a value from 1 hour to 12 hours. If you specify a value
146
+ * higher than this setting or the administrator setting (whichever is lower), the operation
147
+ * fails. For example, if you specify a session duration of 12 hours, but your administrator
148
+ * set the maximum session duration to 6 hours, your operation fails. </p>
149
+ * <p>Role chaining limits your Amazon Web Services CLI or Amazon Web Services API role session to a maximum of one hour.
150
+ * When you use the <code>AssumeRole</code> API operation to assume a role, you can specify
151
+ * the duration of your role session with the <code>DurationSeconds</code> parameter. You can
152
+ * specify a parameter value of up to 43200 seconds (12 hours), depending on the maximum
153
+ * session duration setting for your role. However, if you assume a role using role chaining
154
+ * and provide a <code>DurationSeconds</code> parameter value greater than one hour, the
155
+ * operation fails. To learn how to view the maximum value for your role, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html#id_roles_use_view-role-max-session">View the
148
156
  * Maximum Session Duration Setting for a Role</a> in the
149
157
  * <i>IAM User Guide</i>.</p>
150
158
  * <p>By default, the value is set to <code>3600</code> seconds. </p>
@@ -154,14 +162,14 @@ export interface AssumeRoleRequest {
154
162
  * federation endpoint for a console sign-in token takes a <code>SessionDuration</code>
155
163
  * parameter that specifies the maximum length of the console session. For more
156
164
  * information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_enable-console-custom-url.html">Creating a URL
157
- * that Enables Federated Users to Access the Management Console</a> in the
165
+ * that Enables Federated Users to Access the Amazon Web Services Management Console</a> in the
158
166
  * <i>IAM User Guide</i>.</p>
159
167
  * </note>
160
168
  */
161
169
  DurationSeconds?: number;
162
170
  /**
163
171
  * <p>A list of session tags that you want to pass. Each session tag consists of a key name
164
- * and an associated value. For more information about session tags, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html">Tagging STS
172
+ * and an associated value. For more information about session tags, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html">Tagging Amazon Web Services STS
165
173
  * Sessions</a> in the <i>IAM User Guide</i>.</p>
166
174
  * <p>This parameter is optional. You can pass up to 50 session tags. The plaintext session
167
175
  * tag keys can’t exceed 128 characters, and the values can’t exceed 256 characters. For these
@@ -176,8 +184,9 @@ export interface AssumeRoleRequest {
176
184
  * request are to the upper size limit.
177
185
  * </p>
178
186
  * </note>
179
- * <p>You can pass a session tag with the same key as a tag that is already
180
- * attached to the role. When you do, session tags override a role tag with the same key. </p>
187
+ *
188
+ * <p>You can pass a session tag with the same key as a tag that is already attached to the
189
+ * role. When you do, session tags override a role tag with the same key. </p>
181
190
  * <p>Tag key–value pairs are not case sensitive, but case is preserved. This means that you
182
191
  * cannot have separate <code>Department</code> and <code>department</code> tag keys. Assume
183
192
  * that the role has the <code>Department</code>=<code>Marketing</code> tag and you pass the
@@ -253,8 +262,7 @@ export interface AssumeRoleRequest {
253
262
  * <p>The regex used to validate this parameter is a string of characters consisting of upper-
254
263
  * and lower-case alphanumeric characters with no spaces. You can also include underscores or
255
264
  * any of the following characters: =,.@-. You cannot use a value that begins with the text
256
- * <code>aws:</code>. This prefix is reserved for Amazon Web Services internal
257
- * use.</p>
265
+ * <code>aws:</code>. This prefix is reserved for Amazon Web Services internal use.</p>
258
266
  */
259
267
  SourceIdentity?: string;
260
268
  }
@@ -300,6 +308,7 @@ export interface AssumeRoleResponse {
300
308
  /**
301
309
  * <p>The temporary security credentials, which include an access key ID, a secret access key,
302
310
  * and a security (or session) token.</p>
311
+ *
303
312
  * <note>
304
313
  * <p>The size of the security token that STS API operations return is not fixed. We
305
314
  * strongly recommend that you make no assumptions about the maximum size.</p>
@@ -381,7 +390,7 @@ export declare namespace MalformedPolicyDocumentException {
381
390
  * tags are to the upper size limit. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html">Passing Session Tags in STS</a> in
382
391
  * the <i>IAM User Guide</i>.</p>
383
392
  * <p>You could receive this error even though you meet other defined session policy and
384
- * session tag limits. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html">IAM and STS Entity
393
+ * session tag limits. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-limits-entity-length">IAM and STS Entity
385
394
  * Character Limits</a> in the <i>IAM User Guide</i>.</p>
386
395
  */
387
396
  export interface PackedPolicyTooLargeException extends __SmithyException, $MetadataBearer {
@@ -436,6 +445,7 @@ export interface AssumeRoleWithSAMLRequest {
436
445
  * plaintext that you use for both inline and managed session policies can't exceed 2,048
437
446
  * characters. For more information about ARNs, see <a href="https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html">Amazon Resource Names (ARNs) and Amazon Web Services
438
447
  * Service Namespaces</a> in the Amazon Web Services General Reference.</p>
448
+ *
439
449
  * <note>
440
450
  * <p>An Amazon Web Services conversion compresses the passed session policies and session tags into a
441
451
  * packed binary format that has a separate limit. Your request can fail for this limit
@@ -470,6 +480,7 @@ export interface AssumeRoleWithSAMLRequest {
470
480
  * character to the end of the valid character list (\u0020 through \u00FF). It can also
471
481
  * include the tab (\u0009), linefeed (\u000A), and carriage return (\u000D)
472
482
  * characters.</p>
483
+ *
473
484
  * <note>
474
485
  * <p>An Amazon Web Services conversion compresses the passed session policies and session tags into a
475
486
  * packed binary format that has a separate limit. Your request can fail for this limit
@@ -499,7 +510,7 @@ export interface AssumeRoleWithSAMLRequest {
499
510
  * federation endpoint for a console sign-in token takes a <code>SessionDuration</code>
500
511
  * parameter that specifies the maximum length of the console session. For more
501
512
  * information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_enable-console-custom-url.html">Creating a URL
502
- * that Enables Federated Users to Access the Management Console</a> in the
513
+ * that Enables Federated Users to Access the Amazon Web Services Management Console</a> in the
503
514
  * <i>IAM User Guide</i>.</p>
504
515
  * </note>
505
516
  */
@@ -519,6 +530,7 @@ export interface AssumeRoleWithSAMLResponse {
519
530
  /**
520
531
  * <p>The temporary security credentials, which include an access key ID, a secret access key,
521
532
  * and a security (or session) token.</p>
533
+ *
522
534
  * <note>
523
535
  * <p>The size of the security token that STS API operations return is not fixed. We
524
536
  * strongly recommend that you make no assumptions about the maximum size.</p>
@@ -678,6 +690,7 @@ export interface AssumeRoleWithWebIdentityRequest {
678
690
  * plaintext that you use for both inline and managed session policies can't exceed 2,048
679
691
  * characters. For more information about ARNs, see <a href="https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html">Amazon Resource Names (ARNs) and Amazon Web Services
680
692
  * Service Namespaces</a> in the Amazon Web Services General Reference.</p>
693
+ *
681
694
  * <note>
682
695
  * <p>An Amazon Web Services conversion compresses the passed session policies and session tags into a
683
696
  * packed binary format that has a separate limit. Your request can fail for this limit
@@ -712,6 +725,7 @@ export interface AssumeRoleWithWebIdentityRequest {
712
725
  * character to the end of the valid character list (\u0020 through \u00FF). It can also
713
726
  * include the tab (\u0009), linefeed (\u000A), and carriage return (\u000D)
714
727
  * characters.</p>
728
+ *
715
729
  * <note>
716
730
  * <p>An Amazon Web Services conversion compresses the passed session policies and session tags into a
717
731
  * packed binary format that has a separate limit. Your request can fail for this limit
@@ -738,7 +752,7 @@ export interface AssumeRoleWithWebIdentityRequest {
738
752
  * federation endpoint for a console sign-in token takes a <code>SessionDuration</code>
739
753
  * parameter that specifies the maximum length of the console session. For more
740
754
  * information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_enable-console-custom-url.html">Creating a URL
741
- * that Enables Federated Users to Access the Management Console</a> in the
755
+ * that Enables Federated Users to Access the Amazon Web Services Management Console</a> in the
742
756
  * <i>IAM User Guide</i>.</p>
743
757
  * </note>
744
758
  */
@@ -758,6 +772,7 @@ export interface AssumeRoleWithWebIdentityResponse {
758
772
  /**
759
773
  * <p>The temporary security credentials, which include an access key ID, a secret access key,
760
774
  * and a security token.</p>
775
+ *
761
776
  * <note>
762
777
  * <p>The size of the security token that STS API operations return is not fixed. We
763
778
  * strongly recommend that you make no assumptions about the maximum size.</p>
@@ -863,7 +878,7 @@ export declare namespace DecodeAuthorizationMessageRequest {
863
878
  */
864
879
  export interface DecodeAuthorizationMessageResponse {
865
880
  /**
866
- * <p>An XML document that contains the decoded message.</p>
881
+ * <p>The API returns a response with the decoded message.</p>
867
882
  */
868
883
  DecodedMessage?: string;
869
884
  }
@@ -892,8 +907,8 @@ export declare namespace InvalidAuthorizationMessageException {
892
907
  export interface GetAccessKeyInfoRequest {
893
908
  /**
894
909
  * <p>The identifier of an access key.</p>
895
- * <p>This parameter allows (through its regex pattern) a string of characters that can
896
- * consist of any upper- or lowercase letter or digit.</p>
910
+ * <p>This parameter allows (through its regex pattern) a string of characters that can
911
+ * consist of any upper- or lowercase letter or digit.</p>
897
912
  */
898
913
  AccessKeyId: string | undefined;
899
914
  }
@@ -985,6 +1000,7 @@ export interface GetFederationTokenRequest {
985
1000
  * character to the end of the valid character list (\u0020 through \u00FF). It can also
986
1001
  * include the tab (\u0009), linefeed (\u000A), and carriage return (\u000D)
987
1002
  * characters.</p>
1003
+ *
988
1004
  * <note>
989
1005
  * <p>An Amazon Web Services conversion compresses the passed session policies and session tags into a
990
1006
  * packed binary format that has a separate limit. Your request can fail for this limit
@@ -1005,7 +1021,8 @@ export interface GetFederationTokenRequest {
1005
1021
  * The plaintext that you use for both inline and managed session policies can't exceed 2,048
1006
1022
  * characters. You can provide up to 10 managed policy ARNs. For more information about ARNs,
1007
1023
  * see <a href="https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html">Amazon
1008
- * Resource Names (ARNs) and Amazon Web Services Service Namespaces</a> in the Amazon Web Services General Reference.</p>
1024
+ * Resource Names (ARNs) and Amazon Web Services Service Namespaces</a> in the
1025
+ * Amazon Web Services General Reference.</p>
1009
1026
  * <p>This parameter is optional. However, if you do not pass any session policies, then the
1010
1027
  * resulting federated user session has no permissions.</p>
1011
1028
  * <p>When you pass session policies, the session permissions are the intersection of the
@@ -1019,6 +1036,7 @@ export interface GetFederationTokenRequest {
1019
1036
  * <code>Principal</code> element of the policy, the session has the permissions allowed by
1020
1037
  * the policy. These permissions are granted in addition to the permissions that are granted
1021
1038
  * by the session policies.</p>
1039
+ *
1022
1040
  * <note>
1023
1041
  * <p>An Amazon Web Services conversion compresses the passed session policies and session tags into a
1024
1042
  * packed binary format that has a separate limit. Your request can fail for this limit
@@ -1055,9 +1073,9 @@ export interface GetFederationTokenRequest {
1055
1073
  * request are to the upper size limit.
1056
1074
  * </p>
1057
1075
  * </note>
1058
- * <p>You can pass a session tag with the same key as a tag that is already
1059
- * attached to the user you are federating. When you do, session tags override a user tag with
1060
- * the same key. </p>
1076
+ *
1077
+ * <p>You can pass a session tag with the same key as a tag that is already attached to the
1078
+ * user you are federating. When you do, session tags override a user tag with the same key. </p>
1061
1079
  * <p>Tag key–value pairs are not case sensitive, but case is preserved. This means that you
1062
1080
  * cannot have separate <code>Department</code> and <code>department</code> tag keys. Assume
1063
1081
  * that the role has the <code>Department</code>=<code>Marketing</code> tag and you pass the
@@ -1103,6 +1121,7 @@ export interface GetFederationTokenResponse {
1103
1121
  /**
1104
1122
  * <p>The temporary security credentials, which include an access key ID, a secret access key,
1105
1123
  * and a security (or session) token.</p>
1124
+ *
1106
1125
  * <note>
1107
1126
  * <p>The size of the security token that STS API operations return is not fixed. We
1108
1127
  * strongly recommend that you make no assumptions about the maximum size.</p>
@@ -1131,34 +1150,34 @@ export declare namespace GetFederationTokenResponse {
1131
1150
  }
1132
1151
  export interface GetSessionTokenRequest {
1133
1152
  /**
1134
- * <p>The duration, in seconds, that the credentials should remain valid. Acceptable
1135
- * durations for IAM user sessions range from 900 seconds (15 minutes) to 129,600 seconds
1136
- * (36 hours), with 43,200 seconds (12 hours) as the default. Sessions for Amazon Web Services account
1137
- * owners are restricted to a maximum of 3,600 seconds (one hour). If the duration is
1138
- * longer than one hour, the session for Amazon Web Services account owners defaults to one hour.</p>
1153
+ * <p>The duration, in seconds, that the credentials should remain valid. Acceptable durations
1154
+ * for IAM user sessions range from 900 seconds (15 minutes) to 129,600 seconds (36 hours),
1155
+ * with 43,200 seconds (12 hours) as the default. Sessions for Amazon Web Services account owners are
1156
+ * restricted to a maximum of 3,600 seconds (one hour). If the duration is longer than one
1157
+ * hour, the session for Amazon Web Services account owners defaults to one hour.</p>
1139
1158
  */
1140
1159
  DurationSeconds?: number;
1141
1160
  /**
1142
1161
  * <p>The identification number of the MFA device that is associated with the IAM user who
1143
- * is making the <code>GetSessionToken</code> call. Specify this value if the IAM user
1144
- * has a policy that requires MFA authentication. The value is either the serial number for
1145
- * a hardware device (such as <code>GAHT12345678</code>) or an Amazon Resource Name (ARN)
1146
- * for a virtual device (such as <code>arn:aws:iam::123456789012:mfa/user</code>). You can
1147
- * find the device for an IAM user by going to the Management Console and viewing the user's
1148
- * security credentials. </p>
1149
- * <p>The regex used to validate this parameter is a string of
1162
+ * is making the <code>GetSessionToken</code> call. Specify this value if the IAM user has a
1163
+ * policy that requires MFA authentication. The value is either the serial number for a
1164
+ * hardware device (such as <code>GAHT12345678</code>) or an Amazon Resource Name (ARN) for a
1165
+ * virtual device (such as <code>arn:aws:iam::123456789012:mfa/user</code>). You can find the
1166
+ * device for an IAM user by going to the Amazon Web Services Management Console and viewing the user's security
1167
+ * credentials. </p>
1168
+ * <p>The regex used to validate this parameter is a string of
1150
1169
  * characters consisting of upper- and lower-case alphanumeric characters with no spaces.
1151
1170
  * You can also include underscores or any of the following characters: =,.@:/-</p>
1152
1171
  */
1153
1172
  SerialNumber?: string;
1154
1173
  /**
1155
1174
  * <p>The value provided by the MFA device, if MFA is required. If any policy requires the
1156
- * IAM user to submit an MFA code, specify this value. If MFA authentication is required,
1157
- * the user must provide a code when requesting a set of temporary security credentials. A
1158
- * user who fails to provide the code receives an "access denied" response when requesting
1159
- * resources that require MFA authentication.</p>
1160
- * <p>The format for this parameter, as described by its regex pattern, is a sequence of six
1161
- * numeric digits.</p>
1175
+ * IAM user to submit an MFA code, specify this value. If MFA authentication is required,
1176
+ * the user must provide a code when requesting a set of temporary security credentials. A
1177
+ * user who fails to provide the code receives an "access denied" response when requesting
1178
+ * resources that require MFA authentication.</p>
1179
+ * <p>The format for this parameter, as described by its regex pattern, is a sequence of six
1180
+ * numeric digits.</p>
1162
1181
  */
1163
1182
  TokenCode?: string;
1164
1183
  }
@@ -1174,8 +1193,8 @@ export declare namespace GetSessionTokenRequest {
1174
1193
  */
1175
1194
  export interface GetSessionTokenResponse {
1176
1195
  /**
1177
- * <p>The temporary security credentials, which include an access key ID, a secret access
1178
- * key, and a security (or session) token.</p>
1196
+ * <p>The temporary security credentials, which include an access key ID, a secret access key,
1197
+ * and a security (or session) token.</p>
1179
1198
  *
1180
1199
  * <note>
1181
1200
  * <p>The size of the security token that STS API operations return is not fixed. We
package/package.json CHANGED
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "name": "@aws-sdk/client-sts",
3
3
  "description": "AWS SDK for JavaScript Sts Client for Node.js, Browser and React Native",
4
- "version": "3.40.0",
4
+ "version": "3.45.0",
5
5
  "scripts": {
6
6
  "build": "yarn build:cjs && yarn build:es && yarn build:types",
7
7
  "build:cjs": "tsc -p tsconfig.json",
@@ -21,8 +21,8 @@
21
21
  "dependencies": {
22
22
  "@aws-crypto/sha256-browser": "2.0.0",
23
23
  "@aws-crypto/sha256-js": "2.0.0",
24
- "@aws-sdk/config-resolver": "3.40.0",
25
- "@aws-sdk/credential-provider-node": "3.40.0",
24
+ "@aws-sdk/config-resolver": "3.45.0",
25
+ "@aws-sdk/credential-provider-node": "3.45.0",
26
26
  "@aws-sdk/fetch-http-handler": "3.40.0",
27
27
  "@aws-sdk/hash-node": "3.40.0",
28
28
  "@aws-sdk/invalid-dependency": "3.40.0",
@@ -30,15 +30,15 @@
30
30
  "@aws-sdk/middleware-host-header": "3.40.0",
31
31
  "@aws-sdk/middleware-logger": "3.40.0",
32
32
  "@aws-sdk/middleware-retry": "3.40.0",
33
- "@aws-sdk/middleware-sdk-sts": "3.40.0",
33
+ "@aws-sdk/middleware-sdk-sts": "3.45.0",
34
34
  "@aws-sdk/middleware-serde": "3.40.0",
35
- "@aws-sdk/middleware-signing": "3.40.0",
35
+ "@aws-sdk/middleware-signing": "3.45.0",
36
36
  "@aws-sdk/middleware-stack": "3.40.0",
37
37
  "@aws-sdk/middleware-user-agent": "3.40.0",
38
38
  "@aws-sdk/node-config-provider": "3.40.0",
39
39
  "@aws-sdk/node-http-handler": "3.40.0",
40
40
  "@aws-sdk/protocol-http": "3.40.0",
41
- "@aws-sdk/smithy-client": "3.40.0",
41
+ "@aws-sdk/smithy-client": "3.41.0",
42
42
  "@aws-sdk/types": "3.40.0",
43
43
  "@aws-sdk/url-parser": "3.40.0",
44
44
  "@aws-sdk/util-base64-browser": "3.37.0",