@aws-sdk/client-sts 3.687.0 → 3.692.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/README.md CHANGED
@@ -230,6 +230,14 @@ AssumeRoleWithWebIdentity
230
230
 
231
231
  [Command API Reference](https://docs.aws.amazon.com/AWSJavaScriptSDK/v3/latest/client/sts/command/AssumeRoleWithWebIdentityCommand/) / [Input](https://docs.aws.amazon.com/AWSJavaScriptSDK/v3/latest/Package/-aws-sdk-client-sts/Interface/AssumeRoleWithWebIdentityCommandInput/) / [Output](https://docs.aws.amazon.com/AWSJavaScriptSDK/v3/latest/Package/-aws-sdk-client-sts/Interface/AssumeRoleWithWebIdentityCommandOutput/)
232
232
 
233
+ </details>
234
+ <details>
235
+ <summary>
236
+ AssumeRoot
237
+ </summary>
238
+
239
+ [Command API Reference](https://docs.aws.amazon.com/AWSJavaScriptSDK/v3/latest/client/sts/command/AssumeRootCommand/) / [Input](https://docs.aws.amazon.com/AWSJavaScriptSDK/v3/latest/Package/-aws-sdk-client-sts/Interface/AssumeRootCommandInput/) / [Output](https://docs.aws.amazon.com/AWSJavaScriptSDK/v3/latest/Package/-aws-sdk-client-sts/Interface/AssumeRootCommandOutput/)
240
+
233
241
  </details>
234
242
  <details>
235
243
  <summary>
package/dist-cjs/index.js CHANGED
@@ -30,7 +30,9 @@ __export(src_exports, {
30
30
  AssumeRoleWithWebIdentityCommand: () => AssumeRoleWithWebIdentityCommand,
31
31
  AssumeRoleWithWebIdentityRequestFilterSensitiveLog: () => AssumeRoleWithWebIdentityRequestFilterSensitiveLog,
32
32
  AssumeRoleWithWebIdentityResponseFilterSensitiveLog: () => AssumeRoleWithWebIdentityResponseFilterSensitiveLog,
33
- ClientInputEndpointParameters: () => import_EndpointParameters9.ClientInputEndpointParameters,
33
+ AssumeRootCommand: () => AssumeRootCommand,
34
+ AssumeRootResponseFilterSensitiveLog: () => AssumeRootResponseFilterSensitiveLog,
35
+ ClientInputEndpointParameters: () => import_EndpointParameters10.ClientInputEndpointParameters,
34
36
  CredentialsFilterSensitiveLog: () => CredentialsFilterSensitiveLog,
35
37
  DecodeAuthorizationMessageCommand: () => DecodeAuthorizationMessageCommand,
36
38
  ExpiredTokenException: () => ExpiredTokenException,
@@ -243,6 +245,10 @@ var AssumeRoleWithWebIdentityResponseFilterSensitiveLog = /* @__PURE__ */ __name
243
245
  ...obj,
244
246
  ...obj.Credentials && { Credentials: CredentialsFilterSensitiveLog(obj.Credentials) }
245
247
  }), "AssumeRoleWithWebIdentityResponseFilterSensitiveLog");
248
+ var AssumeRootResponseFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({
249
+ ...obj,
250
+ ...obj.Credentials && { Credentials: CredentialsFilterSensitiveLog(obj.Credentials) }
251
+ }), "AssumeRootResponseFilterSensitiveLog");
246
252
  var GetFederationTokenResponseFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({
247
253
  ...obj,
248
254
  ...obj.Credentials && { Credentials: CredentialsFilterSensitiveLog(obj.Credentials) }
@@ -286,6 +292,16 @@ var se_AssumeRoleWithWebIdentityCommand = /* @__PURE__ */ __name(async (input, c
286
292
  });
287
293
  return buildHttpRpcRequest(context, headers, "/", void 0, body);
288
294
  }, "se_AssumeRoleWithWebIdentityCommand");
295
+ var se_AssumeRootCommand = /* @__PURE__ */ __name(async (input, context) => {
296
+ const headers = SHARED_HEADERS;
297
+ let body;
298
+ body = buildFormUrlencodedString({
299
+ ...se_AssumeRootRequest(input, context),
300
+ [_A]: _ARs,
301
+ [_V]: _
302
+ });
303
+ return buildHttpRpcRequest(context, headers, "/", void 0, body);
304
+ }, "se_AssumeRootCommand");
289
305
  var se_DecodeAuthorizationMessageCommand = /* @__PURE__ */ __name(async (input, context) => {
290
306
  const headers = SHARED_HEADERS;
291
307
  let body;
@@ -375,6 +391,19 @@ var de_AssumeRoleWithWebIdentityCommand = /* @__PURE__ */ __name(async (output,
375
391
  };
376
392
  return response;
377
393
  }, "de_AssumeRoleWithWebIdentityCommand");
394
+ var de_AssumeRootCommand = /* @__PURE__ */ __name(async (output, context) => {
395
+ if (output.statusCode >= 300) {
396
+ return de_CommandError(output, context);
397
+ }
398
+ const data = await (0, import_core.parseXmlBody)(output.body, context);
399
+ let contents = {};
400
+ contents = de_AssumeRootResponse(data.AssumeRootResult, context);
401
+ const response = {
402
+ $metadata: deserializeMetadata(output),
403
+ ...contents
404
+ };
405
+ return response;
406
+ }, "de_AssumeRootCommand");
378
407
  var de_DecodeAuthorizationMessageCommand = /* @__PURE__ */ __name(async (output, context) => {
379
408
  if (output.statusCode >= 300) {
380
409
  return de_CommandError(output, context);
@@ -684,6 +713,23 @@ var se_AssumeRoleWithWebIdentityRequest = /* @__PURE__ */ __name((input, context
684
713
  }
685
714
  return entries;
686
715
  }, "se_AssumeRoleWithWebIdentityRequest");
716
+ var se_AssumeRootRequest = /* @__PURE__ */ __name((input, context) => {
717
+ const entries = {};
718
+ if (input[_TP] != null) {
719
+ entries[_TP] = input[_TP];
720
+ }
721
+ if (input[_TPA] != null) {
722
+ const memberEntries = se_PolicyDescriptorType(input[_TPA], context);
723
+ Object.entries(memberEntries).forEach(([key, value]) => {
724
+ const loc = `TaskPolicyArn.${key}`;
725
+ entries[loc] = value;
726
+ });
727
+ }
728
+ if (input[_DS] != null) {
729
+ entries[_DS] = input[_DS];
730
+ }
731
+ return entries;
732
+ }, "se_AssumeRootRequest");
687
733
  var se_DecodeAuthorizationMessageRequest = /* @__PURE__ */ __name((input, context) => {
688
734
  const entries = {};
689
735
  if (input[_EM] != null) {
@@ -915,6 +961,16 @@ var de_AssumeRoleWithWebIdentityResponse = /* @__PURE__ */ __name((output, conte
915
961
  }
916
962
  return contents;
917
963
  }, "de_AssumeRoleWithWebIdentityResponse");
964
+ var de_AssumeRootResponse = /* @__PURE__ */ __name((output, context) => {
965
+ const contents = {};
966
+ if (output[_C] != null) {
967
+ contents[_C] = de_Credentials(output[_C], context);
968
+ }
969
+ if (output[_SI] != null) {
970
+ contents[_SI] = (0, import_smithy_client.expectString)(output[_SI]);
971
+ }
972
+ return contents;
973
+ }, "de_AssumeRootResponse");
918
974
  var de_Credentials = /* @__PURE__ */ __name((output, context) => {
919
975
  const contents = {};
920
976
  if (output[_AKI] != null) {
@@ -1080,6 +1136,7 @@ var _ARI = "AssumedRoleId";
1080
1136
  var _ARU = "AssumedRoleUser";
1081
1137
  var _ARWSAML = "AssumeRoleWithSAML";
1082
1138
  var _ARWWI = "AssumeRoleWithWebIdentity";
1139
+ var _ARs = "AssumeRoot";
1083
1140
  var _Ac = "Account";
1084
1141
  var _Ar = "Arn";
1085
1142
  var _Au = "Audience";
@@ -1121,6 +1178,8 @@ var _ST = "SubjectType";
1121
1178
  var _STe = "SessionToken";
1122
1179
  var _T = "Tags";
1123
1180
  var _TC = "TokenCode";
1181
+ var _TP = "TargetPrincipal";
1182
+ var _TPA = "TaskPolicyArn";
1124
1183
  var _TTK = "TransitiveTagKeys";
1125
1184
  var _UI = "UserId";
1126
1185
  var _V = "Version";
@@ -1180,12 +1239,27 @@ var _AssumeRoleWithWebIdentityCommand = class _AssumeRoleWithWebIdentityCommand
1180
1239
  __name(_AssumeRoleWithWebIdentityCommand, "AssumeRoleWithWebIdentityCommand");
1181
1240
  var AssumeRoleWithWebIdentityCommand = _AssumeRoleWithWebIdentityCommand;
1182
1241
 
1183
- // src/commands/DecodeAuthorizationMessageCommand.ts
1242
+ // src/commands/AssumeRootCommand.ts
1184
1243
 
1185
1244
 
1186
1245
 
1187
1246
  var import_EndpointParameters4 = require("./endpoint/EndpointParameters");
1188
- var _DecodeAuthorizationMessageCommand = class _DecodeAuthorizationMessageCommand extends import_smithy_client.Command.classBuilder().ep(import_EndpointParameters4.commonParams).m(function(Command, cs, config, o) {
1247
+ var _AssumeRootCommand = class _AssumeRootCommand extends import_smithy_client.Command.classBuilder().ep(import_EndpointParameters4.commonParams).m(function(Command, cs, config, o) {
1248
+ return [
1249
+ (0, import_middleware_serde.getSerdePlugin)(config, this.serialize, this.deserialize),
1250
+ (0, import_middleware_endpoint.getEndpointPlugin)(config, Command.getEndpointParameterInstructions())
1251
+ ];
1252
+ }).s("AWSSecurityTokenServiceV20110615", "AssumeRoot", {}).n("STSClient", "AssumeRootCommand").f(void 0, AssumeRootResponseFilterSensitiveLog).ser(se_AssumeRootCommand).de(de_AssumeRootCommand).build() {
1253
+ };
1254
+ __name(_AssumeRootCommand, "AssumeRootCommand");
1255
+ var AssumeRootCommand = _AssumeRootCommand;
1256
+
1257
+ // src/commands/DecodeAuthorizationMessageCommand.ts
1258
+
1259
+
1260
+
1261
+ var import_EndpointParameters5 = require("./endpoint/EndpointParameters");
1262
+ var _DecodeAuthorizationMessageCommand = class _DecodeAuthorizationMessageCommand extends import_smithy_client.Command.classBuilder().ep(import_EndpointParameters5.commonParams).m(function(Command, cs, config, o) {
1189
1263
  return [
1190
1264
  (0, import_middleware_serde.getSerdePlugin)(config, this.serialize, this.deserialize),
1191
1265
  (0, import_middleware_endpoint.getEndpointPlugin)(config, Command.getEndpointParameterInstructions())
@@ -1199,8 +1273,8 @@ var DecodeAuthorizationMessageCommand = _DecodeAuthorizationMessageCommand;
1199
1273
 
1200
1274
 
1201
1275
 
1202
- var import_EndpointParameters5 = require("./endpoint/EndpointParameters");
1203
- var _GetAccessKeyInfoCommand = class _GetAccessKeyInfoCommand extends import_smithy_client.Command.classBuilder().ep(import_EndpointParameters5.commonParams).m(function(Command, cs, config, o) {
1276
+ var import_EndpointParameters6 = require("./endpoint/EndpointParameters");
1277
+ var _GetAccessKeyInfoCommand = class _GetAccessKeyInfoCommand extends import_smithy_client.Command.classBuilder().ep(import_EndpointParameters6.commonParams).m(function(Command, cs, config, o) {
1204
1278
  return [
1205
1279
  (0, import_middleware_serde.getSerdePlugin)(config, this.serialize, this.deserialize),
1206
1280
  (0, import_middleware_endpoint.getEndpointPlugin)(config, Command.getEndpointParameterInstructions())
@@ -1214,8 +1288,8 @@ var GetAccessKeyInfoCommand = _GetAccessKeyInfoCommand;
1214
1288
 
1215
1289
 
1216
1290
 
1217
- var import_EndpointParameters6 = require("./endpoint/EndpointParameters");
1218
- var _GetCallerIdentityCommand = class _GetCallerIdentityCommand extends import_smithy_client.Command.classBuilder().ep(import_EndpointParameters6.commonParams).m(function(Command, cs, config, o) {
1291
+ var import_EndpointParameters7 = require("./endpoint/EndpointParameters");
1292
+ var _GetCallerIdentityCommand = class _GetCallerIdentityCommand extends import_smithy_client.Command.classBuilder().ep(import_EndpointParameters7.commonParams).m(function(Command, cs, config, o) {
1219
1293
  return [
1220
1294
  (0, import_middleware_serde.getSerdePlugin)(config, this.serialize, this.deserialize),
1221
1295
  (0, import_middleware_endpoint.getEndpointPlugin)(config, Command.getEndpointParameterInstructions())
@@ -1229,8 +1303,8 @@ var GetCallerIdentityCommand = _GetCallerIdentityCommand;
1229
1303
 
1230
1304
 
1231
1305
 
1232
- var import_EndpointParameters7 = require("./endpoint/EndpointParameters");
1233
- var _GetFederationTokenCommand = class _GetFederationTokenCommand extends import_smithy_client.Command.classBuilder().ep(import_EndpointParameters7.commonParams).m(function(Command, cs, config, o) {
1306
+ var import_EndpointParameters8 = require("./endpoint/EndpointParameters");
1307
+ var _GetFederationTokenCommand = class _GetFederationTokenCommand extends import_smithy_client.Command.classBuilder().ep(import_EndpointParameters8.commonParams).m(function(Command, cs, config, o) {
1234
1308
  return [
1235
1309
  (0, import_middleware_serde.getSerdePlugin)(config, this.serialize, this.deserialize),
1236
1310
  (0, import_middleware_endpoint.getEndpointPlugin)(config, Command.getEndpointParameterInstructions())
@@ -1244,8 +1318,8 @@ var GetFederationTokenCommand = _GetFederationTokenCommand;
1244
1318
 
1245
1319
 
1246
1320
 
1247
- var import_EndpointParameters8 = require("./endpoint/EndpointParameters");
1248
- var _GetSessionTokenCommand = class _GetSessionTokenCommand extends import_smithy_client.Command.classBuilder().ep(import_EndpointParameters8.commonParams).m(function(Command, cs, config, o) {
1321
+ var import_EndpointParameters9 = require("./endpoint/EndpointParameters");
1322
+ var _GetSessionTokenCommand = class _GetSessionTokenCommand extends import_smithy_client.Command.classBuilder().ep(import_EndpointParameters9.commonParams).m(function(Command, cs, config, o) {
1249
1323
  return [
1250
1324
  (0, import_middleware_serde.getSerdePlugin)(config, this.serialize, this.deserialize),
1251
1325
  (0, import_middleware_endpoint.getEndpointPlugin)(config, Command.getEndpointParameterInstructions())
@@ -1261,6 +1335,7 @@ var commands = {
1261
1335
  AssumeRoleCommand,
1262
1336
  AssumeRoleWithSAMLCommand,
1263
1337
  AssumeRoleWithWebIdentityCommand,
1338
+ AssumeRootCommand,
1264
1339
  DecodeAuthorizationMessageCommand,
1265
1340
  GetAccessKeyInfoCommand,
1266
1341
  GetCallerIdentityCommand,
@@ -1274,7 +1349,7 @@ var STS = _STS;
1274
1349
  (0, import_smithy_client.createAggregatedClient)(commands, STS);
1275
1350
 
1276
1351
  // src/index.ts
1277
- var import_EndpointParameters9 = require("./endpoint/EndpointParameters");
1352
+ var import_EndpointParameters10 = require("./endpoint/EndpointParameters");
1278
1353
 
1279
1354
  // src/defaultStsRoleAssumers.ts
1280
1355
  var import_client = require("@aws-sdk/core/client");
@@ -1430,6 +1505,7 @@ var decorateDefaultCredentialProvider = /* @__PURE__ */ __name((provider) => (in
1430
1505
  AssumeRoleCommand,
1431
1506
  AssumeRoleWithSAMLCommand,
1432
1507
  AssumeRoleWithWebIdentityCommand,
1508
+ AssumeRootCommand,
1433
1509
  DecodeAuthorizationMessageCommand,
1434
1510
  GetAccessKeyInfoCommand,
1435
1511
  GetCallerIdentityCommand,
@@ -1449,6 +1525,7 @@ var decorateDefaultCredentialProvider = /* @__PURE__ */ __name((provider) => (in
1449
1525
  AssumeRoleWithSAMLResponseFilterSensitiveLog,
1450
1526
  AssumeRoleWithWebIdentityRequestFilterSensitiveLog,
1451
1527
  AssumeRoleWithWebIdentityResponseFilterSensitiveLog,
1528
+ AssumeRootResponseFilterSensitiveLog,
1452
1529
  GetFederationTokenResponseFilterSensitiveLog,
1453
1530
  GetSessionTokenResponseFilterSensitiveLog,
1454
1531
  getDefaultRoleAssumer,
package/dist-es/STS.js CHANGED
@@ -2,6 +2,7 @@ import { createAggregatedClient } from "@smithy/smithy-client";
2
2
  import { AssumeRoleCommand } from "./commands/AssumeRoleCommand";
3
3
  import { AssumeRoleWithSAMLCommand, } from "./commands/AssumeRoleWithSAMLCommand";
4
4
  import { AssumeRoleWithWebIdentityCommand, } from "./commands/AssumeRoleWithWebIdentityCommand";
5
+ import { AssumeRootCommand } from "./commands/AssumeRootCommand";
5
6
  import { DecodeAuthorizationMessageCommand, } from "./commands/DecodeAuthorizationMessageCommand";
6
7
  import { GetAccessKeyInfoCommand, } from "./commands/GetAccessKeyInfoCommand";
7
8
  import { GetCallerIdentityCommand, } from "./commands/GetCallerIdentityCommand";
@@ -12,6 +13,7 @@ const commands = {
12
13
  AssumeRoleCommand,
13
14
  AssumeRoleWithSAMLCommand,
14
15
  AssumeRoleWithWebIdentityCommand,
16
+ AssumeRootCommand,
15
17
  DecodeAuthorizationMessageCommand,
16
18
  GetAccessKeyInfoCommand,
17
19
  GetCallerIdentityCommand,
@@ -0,0 +1,23 @@
1
+ import { getEndpointPlugin } from "@smithy/middleware-endpoint";
2
+ import { getSerdePlugin } from "@smithy/middleware-serde";
3
+ import { Command as $Command } from "@smithy/smithy-client";
4
+ import { commonParams } from "../endpoint/EndpointParameters";
5
+ import { AssumeRootResponseFilterSensitiveLog } from "../models/models_0";
6
+ import { de_AssumeRootCommand, se_AssumeRootCommand } from "../protocols/Aws_query";
7
+ export { $Command };
8
+ export class AssumeRootCommand extends $Command
9
+ .classBuilder()
10
+ .ep(commonParams)
11
+ .m(function (Command, cs, config, o) {
12
+ return [
13
+ getSerdePlugin(config, this.serialize, this.deserialize),
14
+ getEndpointPlugin(config, Command.getEndpointParameterInstructions()),
15
+ ];
16
+ })
17
+ .s("AWSSecurityTokenServiceV20110615", "AssumeRoot", {})
18
+ .n("STSClient", "AssumeRootCommand")
19
+ .f(void 0, AssumeRootResponseFilterSensitiveLog)
20
+ .ser(se_AssumeRootCommand)
21
+ .de(de_AssumeRootCommand)
22
+ .build() {
23
+ }
@@ -1,6 +1,7 @@
1
1
  export * from "./AssumeRoleCommand";
2
2
  export * from "./AssumeRoleWithSAMLCommand";
3
3
  export * from "./AssumeRoleWithWebIdentityCommand";
4
+ export * from "./AssumeRootCommand";
4
5
  export * from "./DecodeAuthorizationMessageCommand";
5
6
  export * from "./GetAccessKeyInfoCommand";
6
7
  export * from "./GetCallerIdentityCommand";
@@ -120,6 +120,10 @@ export const AssumeRoleWithWebIdentityResponseFilterSensitiveLog = (obj) => ({
120
120
  ...obj,
121
121
  ...(obj.Credentials && { Credentials: CredentialsFilterSensitiveLog(obj.Credentials) }),
122
122
  });
123
+ export const AssumeRootResponseFilterSensitiveLog = (obj) => ({
124
+ ...obj,
125
+ ...(obj.Credentials && { Credentials: CredentialsFilterSensitiveLog(obj.Credentials) }),
126
+ });
123
127
  export const GetFederationTokenResponseFilterSensitiveLog = (obj) => ({
124
128
  ...obj,
125
129
  ...(obj.Credentials && { Credentials: CredentialsFilterSensitiveLog(obj.Credentials) }),
@@ -33,6 +33,16 @@ export const se_AssumeRoleWithWebIdentityCommand = async (input, context) => {
33
33
  });
34
34
  return buildHttpRpcRequest(context, headers, "/", undefined, body);
35
35
  };
36
+ export const se_AssumeRootCommand = async (input, context) => {
37
+ const headers = SHARED_HEADERS;
38
+ let body;
39
+ body = buildFormUrlencodedString({
40
+ ...se_AssumeRootRequest(input, context),
41
+ [_A]: _ARs,
42
+ [_V]: _,
43
+ });
44
+ return buildHttpRpcRequest(context, headers, "/", undefined, body);
45
+ };
36
46
  export const se_DecodeAuthorizationMessageCommand = async (input, context) => {
37
47
  const headers = SHARED_HEADERS;
38
48
  let body;
@@ -122,6 +132,19 @@ export const de_AssumeRoleWithWebIdentityCommand = async (output, context) => {
122
132
  };
123
133
  return response;
124
134
  };
135
+ export const de_AssumeRootCommand = async (output, context) => {
136
+ if (output.statusCode >= 300) {
137
+ return de_CommandError(output, context);
138
+ }
139
+ const data = await parseBody(output.body, context);
140
+ let contents = {};
141
+ contents = de_AssumeRootResponse(data.AssumeRootResult, context);
142
+ const response = {
143
+ $metadata: deserializeMetadata(output),
144
+ ...contents,
145
+ };
146
+ return response;
147
+ };
125
148
  export const de_DecodeAuthorizationMessageCommand = async (output, context) => {
126
149
  if (output.statusCode >= 300) {
127
150
  return de_CommandError(output, context);
@@ -428,6 +451,23 @@ const se_AssumeRoleWithWebIdentityRequest = (input, context) => {
428
451
  }
429
452
  return entries;
430
453
  };
454
+ const se_AssumeRootRequest = (input, context) => {
455
+ const entries = {};
456
+ if (input[_TP] != null) {
457
+ entries[_TP] = input[_TP];
458
+ }
459
+ if (input[_TPA] != null) {
460
+ const memberEntries = se_PolicyDescriptorType(input[_TPA], context);
461
+ Object.entries(memberEntries).forEach(([key, value]) => {
462
+ const loc = `TaskPolicyArn.${key}`;
463
+ entries[loc] = value;
464
+ });
465
+ }
466
+ if (input[_DS] != null) {
467
+ entries[_DS] = input[_DS];
468
+ }
469
+ return entries;
470
+ };
431
471
  const se_DecodeAuthorizationMessageRequest = (input, context) => {
432
472
  const entries = {};
433
473
  if (input[_EM] != null) {
@@ -658,6 +698,16 @@ const de_AssumeRoleWithWebIdentityResponse = (output, context) => {
658
698
  }
659
699
  return contents;
660
700
  };
701
+ const de_AssumeRootResponse = (output, context) => {
702
+ const contents = {};
703
+ if (output[_C] != null) {
704
+ contents[_C] = de_Credentials(output[_C], context);
705
+ }
706
+ if (output[_SI] != null) {
707
+ contents[_SI] = __expectString(output[_SI]);
708
+ }
709
+ return contents;
710
+ };
661
711
  const de_Credentials = (output, context) => {
662
712
  const contents = {};
663
713
  if (output[_AKI] != null) {
@@ -824,6 +874,7 @@ const _ARI = "AssumedRoleId";
824
874
  const _ARU = "AssumedRoleUser";
825
875
  const _ARWSAML = "AssumeRoleWithSAML";
826
876
  const _ARWWI = "AssumeRoleWithWebIdentity";
877
+ const _ARs = "AssumeRoot";
827
878
  const _Ac = "Account";
828
879
  const _Ar = "Arn";
829
880
  const _Au = "Audience";
@@ -865,6 +916,8 @@ const _ST = "SubjectType";
865
916
  const _STe = "SessionToken";
866
917
  const _T = "Tags";
867
918
  const _TC = "TokenCode";
919
+ const _TP = "TargetPrincipal";
920
+ const _TPA = "TaskPolicyArn";
868
921
  const _TTK = "TransitiveTagKeys";
869
922
  const _UI = "UserId";
870
923
  const _V = "Version";
@@ -2,6 +2,7 @@ import { HttpHandlerOptions as __HttpHandlerOptions } from "@smithy/types";
2
2
  import { AssumeRoleCommandInput, AssumeRoleCommandOutput } from "./commands/AssumeRoleCommand";
3
3
  import { AssumeRoleWithSAMLCommandInput, AssumeRoleWithSAMLCommandOutput } from "./commands/AssumeRoleWithSAMLCommand";
4
4
  import { AssumeRoleWithWebIdentityCommandInput, AssumeRoleWithWebIdentityCommandOutput } from "./commands/AssumeRoleWithWebIdentityCommand";
5
+ import { AssumeRootCommandInput, AssumeRootCommandOutput } from "./commands/AssumeRootCommand";
5
6
  import { DecodeAuthorizationMessageCommandInput, DecodeAuthorizationMessageCommandOutput } from "./commands/DecodeAuthorizationMessageCommand";
6
7
  import { GetAccessKeyInfoCommandInput, GetAccessKeyInfoCommandOutput } from "./commands/GetAccessKeyInfoCommand";
7
8
  import { GetCallerIdentityCommandInput, GetCallerIdentityCommandOutput } from "./commands/GetCallerIdentityCommand";
@@ -27,6 +28,12 @@ export interface STS {
27
28
  assumeRoleWithWebIdentity(args: AssumeRoleWithWebIdentityCommandInput, options?: __HttpHandlerOptions): Promise<AssumeRoleWithWebIdentityCommandOutput>;
28
29
  assumeRoleWithWebIdentity(args: AssumeRoleWithWebIdentityCommandInput, cb: (err: any, data?: AssumeRoleWithWebIdentityCommandOutput) => void): void;
29
30
  assumeRoleWithWebIdentity(args: AssumeRoleWithWebIdentityCommandInput, options: __HttpHandlerOptions, cb: (err: any, data?: AssumeRoleWithWebIdentityCommandOutput) => void): void;
31
+ /**
32
+ * @see {@link AssumeRootCommand}
33
+ */
34
+ assumeRoot(args: AssumeRootCommandInput, options?: __HttpHandlerOptions): Promise<AssumeRootCommandOutput>;
35
+ assumeRoot(args: AssumeRootCommandInput, cb: (err: any, data?: AssumeRootCommandOutput) => void): void;
36
+ assumeRoot(args: AssumeRootCommandInput, options: __HttpHandlerOptions, cb: (err: any, data?: AssumeRootCommandOutput) => void): void;
30
37
  /**
31
38
  * @see {@link DecodeAuthorizationMessageCommand}
32
39
  */
@@ -10,6 +10,7 @@ import { HttpAuthSchemeInputConfig, HttpAuthSchemeResolvedConfig } from "./auth/
10
10
  import { AssumeRoleCommandInput, AssumeRoleCommandOutput } from "./commands/AssumeRoleCommand";
11
11
  import { AssumeRoleWithSAMLCommandInput, AssumeRoleWithSAMLCommandOutput } from "./commands/AssumeRoleWithSAMLCommand";
12
12
  import { AssumeRoleWithWebIdentityCommandInput, AssumeRoleWithWebIdentityCommandOutput } from "./commands/AssumeRoleWithWebIdentityCommand";
13
+ import { AssumeRootCommandInput, AssumeRootCommandOutput } from "./commands/AssumeRootCommand";
13
14
  import { DecodeAuthorizationMessageCommandInput, DecodeAuthorizationMessageCommandOutput } from "./commands/DecodeAuthorizationMessageCommand";
14
15
  import { GetAccessKeyInfoCommandInput, GetAccessKeyInfoCommandOutput } from "./commands/GetAccessKeyInfoCommand";
15
16
  import { GetCallerIdentityCommandInput, GetCallerIdentityCommandOutput } from "./commands/GetCallerIdentityCommand";
@@ -21,11 +22,11 @@ export { __Client };
21
22
  /**
22
23
  * @public
23
24
  */
24
- export type ServiceInputTypes = AssumeRoleCommandInput | AssumeRoleWithSAMLCommandInput | AssumeRoleWithWebIdentityCommandInput | DecodeAuthorizationMessageCommandInput | GetAccessKeyInfoCommandInput | GetCallerIdentityCommandInput | GetFederationTokenCommandInput | GetSessionTokenCommandInput;
25
+ export type ServiceInputTypes = AssumeRoleCommandInput | AssumeRoleWithSAMLCommandInput | AssumeRoleWithWebIdentityCommandInput | AssumeRootCommandInput | DecodeAuthorizationMessageCommandInput | GetAccessKeyInfoCommandInput | GetCallerIdentityCommandInput | GetFederationTokenCommandInput | GetSessionTokenCommandInput;
25
26
  /**
26
27
  * @public
27
28
  */
28
- export type ServiceOutputTypes = AssumeRoleCommandOutput | AssumeRoleWithSAMLCommandOutput | AssumeRoleWithWebIdentityCommandOutput | DecodeAuthorizationMessageCommandOutput | GetAccessKeyInfoCommandOutput | GetCallerIdentityCommandOutput | GetFederationTokenCommandOutput | GetSessionTokenCommandOutput;
29
+ export type ServiceOutputTypes = AssumeRoleCommandOutput | AssumeRoleWithSAMLCommandOutput | AssumeRoleWithWebIdentityCommandOutput | AssumeRootCommandOutput | DecodeAuthorizationMessageCommandOutput | GetAccessKeyInfoCommandOutput | GetCallerIdentityCommandOutput | GetFederationTokenCommandOutput | GetSessionTokenCommandOutput;
29
30
  /**
30
31
  * @public
31
32
  */
@@ -32,8 +32,8 @@ declare const AssumeRoleCommand_base: {
32
32
  * and a security token. Typically, you use <code>AssumeRole</code> within your account or for
33
33
  * cross-account access. For a comparison of <code>AssumeRole</code> with other API operations
34
34
  * that produce temporary credentials, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html">Requesting Temporary Security
35
- * Credentials</a> and <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#stsapi_comparison">Comparing the
36
- * Amazon Web Services STS API operations</a> in the <i>IAM User Guide</i>.</p>
35
+ * Credentials</a> and <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_sts-comparison.html">Compare STS
36
+ * credentials</a> in the <i>IAM User Guide</i>.</p>
37
37
  * <p>
38
38
  * <b>Permissions</b>
39
39
  * </p>
@@ -41,11 +41,11 @@ declare const AssumeRoleCommand_base: {
41
41
  * make API calls to any Amazon Web Services service with the following exception: You cannot call the
42
42
  * Amazon Web Services STS <code>GetFederationToken</code> or <code>GetSessionToken</code> API
43
43
  * operations.</p>
44
- * <p>(Optional) You can pass inline or managed <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session">session policies</a> to
45
- * this operation. You can pass a single JSON policy document to use as an inline session
46
- * policy. You can also specify up to 10 managed policy Amazon Resource Names (ARNs) to use as
47
- * managed session policies. The plaintext that you use for both inline and managed session
48
- * policies can't exceed 2,048 characters. Passing policies to this operation returns new
44
+ * <p>(Optional) You can pass inline or managed session policies to this operation. You can
45
+ * pass a single JSON policy document to use as an inline session policy. You can also specify
46
+ * up to 10 managed policy Amazon Resource Names (ARNs) to use as managed session policies.
47
+ * The plaintext that you use for both inline and managed session policies can't exceed 2,048
48
+ * characters. Passing policies to this operation returns new
49
49
  * temporary credentials. The resulting session's permissions are the intersection of the
50
50
  * role's identity-based policy and the session policies. You can use the role's temporary
51
51
  * credentials in subsequent Amazon Web Services API calls to access resources in the account that owns
@@ -192,15 +192,15 @@ declare const AssumeRoleCommand_base: {
192
192
  * tags are to the upper size limit. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html">Passing Session Tags in STS</a> in
193
193
  * the <i>IAM User Guide</i>.</p>
194
194
  * <p>You could receive this error even though you meet other defined session policy and
195
- * session tag limits. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-limits-entity-length">IAM and STS Entity
196
- * Character Limits</a> in the <i>IAM User Guide</i>.</p>
195
+ * session tag limits. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-limits-entity-length">IAM and STS Entity Character Limits</a> in the <i>IAM User
196
+ * Guide</i>.</p>
197
197
  *
198
198
  * @throws {@link RegionDisabledException} (client fault)
199
199
  * <p>STS is not activated in the requested region for the account that is being asked to
200
- * generate credentials. The account administrator must use the IAM console to activate STS
201
- * in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html">Activating and
202
- * Deactivating Amazon Web Services STS in an Amazon Web Services Region</a> in the <i>IAM User
203
- * Guide</i>.</p>
200
+ * generate credentials. The account administrator must use the IAM console to activate
201
+ * STS in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html">Activating and
202
+ * Deactivating STS in an Amazon Web Services Region</a> in the <i>IAM User
203
+ * Guide</i>.</p>
204
204
  *
205
205
  * @throws {@link STSServiceException}
206
206
  * <p>Base exception class for all service exceptions from STS service.</p>
@@ -32,8 +32,8 @@ declare const AssumeRoleWithSAMLCommand_base: {
32
32
  * enterprise identity store or directory to role-based Amazon Web Services access without user-specific
33
33
  * credentials or configuration. For a comparison of <code>AssumeRoleWithSAML</code> with the
34
34
  * other API operations that produce temporary credentials, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html">Requesting Temporary Security
35
- * Credentials</a> and <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#stsapi_comparison">Comparing the
36
- * Amazon Web Services STS API operations</a> in the <i>IAM User Guide</i>.</p>
35
+ * Credentials</a> and <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_sts-comparison.html">Compare STS
36
+ * credentials</a> in the <i>IAM User Guide</i>.</p>
37
37
  * <p>The temporary security credentials returned by this operation consist of an access key
38
38
  * ID, a secret access key, and a security token. Applications can use these temporary
39
39
  * security credentials to sign calls to Amazon Web Services services.</p>
@@ -230,15 +230,15 @@ declare const AssumeRoleWithSAMLCommand_base: {
230
230
  * tags are to the upper size limit. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html">Passing Session Tags in STS</a> in
231
231
  * the <i>IAM User Guide</i>.</p>
232
232
  * <p>You could receive this error even though you meet other defined session policy and
233
- * session tag limits. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-limits-entity-length">IAM and STS Entity
234
- * Character Limits</a> in the <i>IAM User Guide</i>.</p>
233
+ * session tag limits. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-limits-entity-length">IAM and STS Entity Character Limits</a> in the <i>IAM User
234
+ * Guide</i>.</p>
235
235
  *
236
236
  * @throws {@link RegionDisabledException} (client fault)
237
237
  * <p>STS is not activated in the requested region for the account that is being asked to
238
- * generate credentials. The account administrator must use the IAM console to activate STS
239
- * in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html">Activating and
240
- * Deactivating Amazon Web Services STS in an Amazon Web Services Region</a> in the <i>IAM User
241
- * Guide</i>.</p>
238
+ * generate credentials. The account administrator must use the IAM console to activate
239
+ * STS in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html">Activating and
240
+ * Deactivating STS in an Amazon Web Services Region</a> in the <i>IAM User
241
+ * Guide</i>.</p>
242
242
  *
243
243
  * @throws {@link STSServiceException}
244
244
  * <p>Base exception class for all service exceptions from STS service.</p>
@@ -47,8 +47,8 @@ declare const AssumeRoleWithWebIdentityCommand_base: {
47
47
  * using a token from the web identity provider. For a comparison of
48
48
  * <code>AssumeRoleWithWebIdentity</code> with the other API operations that produce
49
49
  * temporary credentials, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html">Requesting Temporary Security
50
- * Credentials</a> and <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#stsapi_comparison">Comparing the
51
- * Amazon Web Services STS API operations</a> in the <i>IAM User Guide</i>.</p>
50
+ * Credentials</a> and <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_sts-comparison.html">Compare STS
51
+ * credentials</a> in the <i>IAM User Guide</i>.</p>
52
52
  * <p>The temporary security credentials returned by this API consist of an access key ID, a
53
53
  * secret access key, and a security token. Applications can use these temporary security
54
54
  * credentials to sign calls to Amazon Web Services service API operations.</p>
@@ -60,8 +60,7 @@ declare const AssumeRoleWithWebIdentityCommand_base: {
60
60
  * optional <code>DurationSeconds</code> parameter to specify the duration of your session.
61
61
  * You can provide a value from 900 seconds (15 minutes) up to the maximum session duration
62
62
  * setting for the role. This setting can have a value from 1 hour to 12 hours. To learn how
63
- * to view the maximum value for your role, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html#id_roles_use_view-role-max-session">View the
64
- * Maximum Session Duration Setting for a Role</a> in the
63
+ * to view the maximum value for your role, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_update-role-settings.html#id_roles_update-session-duration">Update the maximum session duration for a role </a> in the
65
64
  * <i>IAM User Guide</i>. The maximum session duration limit applies when
66
65
  * you use the <code>AssumeRole*</code> API operations or the <code>assume-role*</code> CLI
67
66
  * commands. However the limit does not apply when you use those operations to create a
@@ -130,7 +129,7 @@ declare const AssumeRoleWithWebIdentityCommand_base: {
130
129
  * or a pairwise identifier, as <a href="http://openid.net/specs/openid-connect-core-1_0.html#SubjectIDTypes">suggested
131
130
  * in the OIDC specification</a>.</p>
132
131
  * </important>
133
- * <p>For more information about how to use web identity federation and the
132
+ * <p>For more information about how to use OIDC federation and the
134
133
  * <code>AssumeRoleWithWebIdentity</code> API, see the following resources: </p>
135
134
  * <ul>
136
135
  * <li>
@@ -139,25 +138,11 @@ declare const AssumeRoleWithWebIdentityCommand_base: {
139
138
  * </li>
140
139
  * <li>
141
140
  * <p>
142
- * <a href="https://aws.amazon.com/blogs/aws/the-aws-web-identity-federation-playground/"> Web Identity Federation Playground</a>. Walk through the process of
143
- * authenticating through Login with Amazon, Facebook, or Google, getting temporary
144
- * security credentials, and then using those credentials to make a request to Amazon Web Services.
145
- * </p>
146
- * </li>
147
- * <li>
148
- * <p>
149
141
  * <a href="http://aws.amazon.com/sdkforios/">Amazon Web Services SDK for iOS Developer Guide</a> and <a href="http://aws.amazon.com/sdkforandroid/">Amazon Web Services SDK for Android Developer Guide</a>. These toolkits
150
142
  * contain sample apps that show how to invoke the identity providers. The toolkits then
151
143
  * show how to use the information from these providers to get and use temporary
152
144
  * security credentials. </p>
153
145
  * </li>
154
- * <li>
155
- * <p>
156
- * <a href="http://aws.amazon.com/articles/web-identity-federation-with-mobile-applications">Web Identity
157
- * Federation with Mobile Applications</a>. This article discusses web identity
158
- * federation and shows an example of how to use web identity federation to get access
159
- * to content in Amazon S3. </p>
160
- * </li>
161
146
  * </ul>
162
147
  * @example
163
148
  * Use a bare-bones client and the command you need to make an API call.
@@ -211,11 +196,11 @@ declare const AssumeRoleWithWebIdentityCommand_base: {
211
196
  * token from the identity provider and then retry the request.</p>
212
197
  *
213
198
  * @throws {@link IDPCommunicationErrorException} (client fault)
214
- * <p>The request could not be fulfilled because the identity provider (IDP) that
215
- * was asked to verify the incoming identity token could not be reached. This is often a
216
- * transient error caused by network conditions. Retry the request a limited number of
217
- * times so that you don't exceed the request rate. If the error persists, the
218
- * identity provider might be down or not responding.</p>
199
+ * <p>The request could not be fulfilled because the identity provider (IDP) that was asked
200
+ * to verify the incoming identity token could not be reached. This is often a transient
201
+ * error caused by network conditions. Retry the request a limited number of times so that
202
+ * you don't exceed the request rate. If the error persists, the identity provider might be
203
+ * down or not responding.</p>
219
204
  *
220
205
  * @throws {@link IDPRejectedClaimException} (client fault)
221
206
  * <p>The identity provider (IdP) reported that authentication failed. This might be because
@@ -239,15 +224,15 @@ declare const AssumeRoleWithWebIdentityCommand_base: {
239
224
  * tags are to the upper size limit. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html">Passing Session Tags in STS</a> in
240
225
  * the <i>IAM User Guide</i>.</p>
241
226
  * <p>You could receive this error even though you meet other defined session policy and
242
- * session tag limits. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-limits-entity-length">IAM and STS Entity
243
- * Character Limits</a> in the <i>IAM User Guide</i>.</p>
227
+ * session tag limits. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-limits-entity-length">IAM and STS Entity Character Limits</a> in the <i>IAM User
228
+ * Guide</i>.</p>
244
229
  *
245
230
  * @throws {@link RegionDisabledException} (client fault)
246
231
  * <p>STS is not activated in the requested region for the account that is being asked to
247
- * generate credentials. The account administrator must use the IAM console to activate STS
248
- * in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html">Activating and
249
- * Deactivating Amazon Web Services STS in an Amazon Web Services Region</a> in the <i>IAM User
250
- * Guide</i>.</p>
232
+ * generate credentials. The account administrator must use the IAM console to activate
233
+ * STS in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html">Activating and
234
+ * Deactivating STS in an Amazon Web Services Region</a> in the <i>IAM User
235
+ * Guide</i>.</p>
251
236
  *
252
237
  * @throws {@link STSServiceException}
253
238
  * <p>Base exception class for all service exceptions from STS service.</p>