@aws-sdk/client-sts 3.687.0 → 3.692.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +8 -0
- package/dist-cjs/index.js +89 -12
- package/dist-es/STS.js +2 -0
- package/dist-es/commands/AssumeRootCommand.js +23 -0
- package/dist-es/commands/index.js +1 -0
- package/dist-es/models/models_0.js +4 -0
- package/dist-es/protocols/Aws_query.js +53 -0
- package/dist-types/STS.d.ts +7 -0
- package/dist-types/STSClient.d.ts +3 -2
- package/dist-types/commands/AssumeRoleCommand.d.ts +13 -13
- package/dist-types/commands/AssumeRoleWithSAMLCommand.d.ts +8 -8
- package/dist-types/commands/AssumeRoleWithWebIdentityCommand.d.ts +15 -30
- package/dist-types/commands/AssumeRootCommand.d.ts +103 -0
- package/dist-types/commands/DecodeAuthorizationMessageCommand.d.ts +2 -2
- package/dist-types/commands/GetFederationTokenCommand.d.ts +8 -8
- package/dist-types/commands/GetSessionTokenCommand.d.ts +6 -6
- package/dist-types/commands/index.d.ts +1 -0
- package/dist-types/models/models_0.d.ts +202 -88
- package/dist-types/protocols/Aws_query.d.ts +9 -0
- package/dist-types/ts3.4/STS.d.ts +17 -0
- package/dist-types/ts3.4/STSClient.d.ts +6 -0
- package/dist-types/ts3.4/commands/AssumeRootCommand.d.ts +47 -0
- package/dist-types/ts3.4/commands/index.d.ts +1 -0
- package/dist-types/ts3.4/models/models_0.d.ts +68 -56
- package/dist-types/ts3.4/protocols/Aws_query.d.ts +12 -0
- package/package.json +34 -34
|
@@ -0,0 +1,103 @@
|
|
|
1
|
+
import { Command as $Command } from "@smithy/smithy-client";
|
|
2
|
+
import { MetadataBearer as __MetadataBearer } from "@smithy/types";
|
|
3
|
+
import { AssumeRootRequest, AssumeRootResponse } from "../models/models_0";
|
|
4
|
+
import { ServiceInputTypes, ServiceOutputTypes, STSClientResolvedConfig } from "../STSClient";
|
|
5
|
+
/**
|
|
6
|
+
* @public
|
|
7
|
+
*/
|
|
8
|
+
export type { __MetadataBearer };
|
|
9
|
+
export { $Command };
|
|
10
|
+
/**
|
|
11
|
+
* @public
|
|
12
|
+
*
|
|
13
|
+
* The input for {@link AssumeRootCommand}.
|
|
14
|
+
*/
|
|
15
|
+
export interface AssumeRootCommandInput extends AssumeRootRequest {
|
|
16
|
+
}
|
|
17
|
+
/**
|
|
18
|
+
* @public
|
|
19
|
+
*
|
|
20
|
+
* The output of {@link AssumeRootCommand}.
|
|
21
|
+
*/
|
|
22
|
+
export interface AssumeRootCommandOutput extends AssumeRootResponse, __MetadataBearer {
|
|
23
|
+
}
|
|
24
|
+
declare const AssumeRootCommand_base: {
|
|
25
|
+
new (input: AssumeRootCommandInput): import("@smithy/smithy-client").CommandImpl<AssumeRootCommandInput, AssumeRootCommandOutput, STSClientResolvedConfig, ServiceInputTypes, ServiceOutputTypes>;
|
|
26
|
+
new (__0_0: AssumeRootCommandInput): import("@smithy/smithy-client").CommandImpl<AssumeRootCommandInput, AssumeRootCommandOutput, STSClientResolvedConfig, ServiceInputTypes, ServiceOutputTypes>;
|
|
27
|
+
getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
|
|
28
|
+
};
|
|
29
|
+
/**
|
|
30
|
+
* <p>Returns a set of short term credentials you can use to perform privileged tasks in a
|
|
31
|
+
* member account.</p>
|
|
32
|
+
* <p>Before you can launch a privileged session, you must have enabled centralized root
|
|
33
|
+
* access in your organization. For steps to enable this feature, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_root-enable-root-access.html">Centralize root access for member accounts</a> in the <i>IAM User
|
|
34
|
+
* Guide</i>.</p>
|
|
35
|
+
* <note>
|
|
36
|
+
* <p>The global endpoint is not supported for AssumeRoot. You must send this request to a
|
|
37
|
+
* Regional STS endpoint. For more information, see <a href="https://docs.aws.amazon.com/STS/latest/APIReference/welcome.html#sts-endpoints">Endpoints</a>.</p>
|
|
38
|
+
* </note>
|
|
39
|
+
* <p>You can track AssumeRoot in CloudTrail logs to determine what actions were performed in a
|
|
40
|
+
* session. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/cloudtrail-track-privileged-tasks.html">Track privileged tasks
|
|
41
|
+
* in CloudTrail</a> in the <i>IAM User Guide</i>.</p>
|
|
42
|
+
* @example
|
|
43
|
+
* Use a bare-bones client and the command you need to make an API call.
|
|
44
|
+
* ```javascript
|
|
45
|
+
* import { STSClient, AssumeRootCommand } from "@aws-sdk/client-sts"; // ES Modules import
|
|
46
|
+
* // const { STSClient, AssumeRootCommand } = require("@aws-sdk/client-sts"); // CommonJS import
|
|
47
|
+
* const client = new STSClient(config);
|
|
48
|
+
* const input = { // AssumeRootRequest
|
|
49
|
+
* TargetPrincipal: "STRING_VALUE", // required
|
|
50
|
+
* TaskPolicyArn: { // PolicyDescriptorType
|
|
51
|
+
* arn: "STRING_VALUE",
|
|
52
|
+
* },
|
|
53
|
+
* DurationSeconds: Number("int"),
|
|
54
|
+
* };
|
|
55
|
+
* const command = new AssumeRootCommand(input);
|
|
56
|
+
* const response = await client.send(command);
|
|
57
|
+
* // { // AssumeRootResponse
|
|
58
|
+
* // Credentials: { // Credentials
|
|
59
|
+
* // AccessKeyId: "STRING_VALUE", // required
|
|
60
|
+
* // SecretAccessKey: "STRING_VALUE", // required
|
|
61
|
+
* // SessionToken: "STRING_VALUE", // required
|
|
62
|
+
* // Expiration: new Date("TIMESTAMP"), // required
|
|
63
|
+
* // },
|
|
64
|
+
* // SourceIdentity: "STRING_VALUE",
|
|
65
|
+
* // };
|
|
66
|
+
*
|
|
67
|
+
* ```
|
|
68
|
+
*
|
|
69
|
+
* @param AssumeRootCommandInput - {@link AssumeRootCommandInput}
|
|
70
|
+
* @returns {@link AssumeRootCommandOutput}
|
|
71
|
+
* @see {@link AssumeRootCommandInput} for command's `input` shape.
|
|
72
|
+
* @see {@link AssumeRootCommandOutput} for command's `response` shape.
|
|
73
|
+
* @see {@link STSClientResolvedConfig | config} for STSClient's `config` shape.
|
|
74
|
+
*
|
|
75
|
+
* @throws {@link ExpiredTokenException} (client fault)
|
|
76
|
+
* <p>The web identity token that was passed is expired or is not valid. Get a new identity
|
|
77
|
+
* token from the identity provider and then retry the request.</p>
|
|
78
|
+
*
|
|
79
|
+
* @throws {@link RegionDisabledException} (client fault)
|
|
80
|
+
* <p>STS is not activated in the requested region for the account that is being asked to
|
|
81
|
+
* generate credentials. The account administrator must use the IAM console to activate
|
|
82
|
+
* STS in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html">Activating and
|
|
83
|
+
* Deactivating STS in an Amazon Web Services Region</a> in the <i>IAM User
|
|
84
|
+
* Guide</i>.</p>
|
|
85
|
+
*
|
|
86
|
+
* @throws {@link STSServiceException}
|
|
87
|
+
* <p>Base exception class for all service exceptions from STS service.</p>
|
|
88
|
+
*
|
|
89
|
+
* @public
|
|
90
|
+
*/
|
|
91
|
+
export declare class AssumeRootCommand extends AssumeRootCommand_base {
|
|
92
|
+
/** @internal type navigation helper, not in runtime. */
|
|
93
|
+
protected static __types: {
|
|
94
|
+
api: {
|
|
95
|
+
input: AssumeRootRequest;
|
|
96
|
+
output: AssumeRootResponse;
|
|
97
|
+
};
|
|
98
|
+
sdk: {
|
|
99
|
+
input: AssumeRootCommandInput;
|
|
100
|
+
output: AssumeRootCommandOutput;
|
|
101
|
+
};
|
|
102
|
+
};
|
|
103
|
+
}
|
|
@@ -88,8 +88,8 @@ declare const DecodeAuthorizationMessageCommand_base: {
|
|
|
88
88
|
*
|
|
89
89
|
* @throws {@link InvalidAuthorizationMessageException} (client fault)
|
|
90
90
|
* <p>The error returned if the message passed to <code>DecodeAuthorizationMessage</code>
|
|
91
|
-
* was invalid. This can happen if the token contains invalid characters, such as
|
|
92
|
-
*
|
|
91
|
+
* was invalid. This can happen if the token contains invalid characters, such as line
|
|
92
|
+
* breaks, or if the message has expired.</p>
|
|
93
93
|
*
|
|
94
94
|
* @throws {@link STSServiceException}
|
|
95
95
|
* <p>Base exception class for all service exceptions from STS service.</p>
|
|
@@ -36,8 +36,8 @@ declare const GetFederationTokenCommand_base: {
|
|
|
36
36
|
* contexts where those credentials can be safeguarded, usually in a server-based application.
|
|
37
37
|
* For a comparison of <code>GetFederationToken</code> with the other API operations that
|
|
38
38
|
* produce temporary credentials, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html">Requesting Temporary Security
|
|
39
|
-
* Credentials</a> and <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
|
40
|
-
*
|
|
39
|
+
* Credentials</a> and <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_sts-comparison.html">Compare STS
|
|
40
|
+
* credentials</a> in the <i>IAM User Guide</i>.</p>
|
|
41
41
|
* <p>Although it is possible to call <code>GetFederationToken</code> using the security
|
|
42
42
|
* credentials of an Amazon Web Services account root user rather than an IAM user that you
|
|
43
43
|
* create for the purpose of a proxy application, we do not recommend it. For more
|
|
@@ -174,15 +174,15 @@ declare const GetFederationTokenCommand_base: {
|
|
|
174
174
|
* tags are to the upper size limit. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html">Passing Session Tags in STS</a> in
|
|
175
175
|
* the <i>IAM User Guide</i>.</p>
|
|
176
176
|
* <p>You could receive this error even though you meet other defined session policy and
|
|
177
|
-
* session tag limits. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-limits-entity-length">IAM and STS Entity
|
|
178
|
-
*
|
|
177
|
+
* session tag limits. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-limits-entity-length">IAM and STS Entity Character Limits</a> in the <i>IAM User
|
|
178
|
+
* Guide</i>.</p>
|
|
179
179
|
*
|
|
180
180
|
* @throws {@link RegionDisabledException} (client fault)
|
|
181
181
|
* <p>STS is not activated in the requested region for the account that is being asked to
|
|
182
|
-
* generate credentials. The account administrator must use the IAM console to activate
|
|
183
|
-
* in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html">Activating and
|
|
184
|
-
* Deactivating
|
|
185
|
-
*
|
|
182
|
+
* generate credentials. The account administrator must use the IAM console to activate
|
|
183
|
+
* STS in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html">Activating and
|
|
184
|
+
* Deactivating STS in an Amazon Web Services Region</a> in the <i>IAM User
|
|
185
|
+
* Guide</i>.</p>
|
|
186
186
|
*
|
|
187
187
|
* @throws {@link STSServiceException}
|
|
188
188
|
* <p>Base exception class for all service exceptions from STS service.</p>
|
|
@@ -38,8 +38,8 @@ declare const GetSessionTokenCommand_base: {
|
|
|
38
38
|
* calls to API operations that require MFA authentication. An incorrect MFA code causes the
|
|
39
39
|
* API to return an access denied error. For a comparison of <code>GetSessionToken</code> with
|
|
40
40
|
* the other API operations that produce temporary credentials, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html">Requesting
|
|
41
|
-
* Temporary Security Credentials</a> and <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
|
42
|
-
*
|
|
41
|
+
* Temporary Security Credentials</a> and <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_sts-comparison.html">Compare STS
|
|
42
|
+
* credentials</a> in the <i>IAM User Guide</i>.</p>
|
|
43
43
|
* <note>
|
|
44
44
|
* <p>No permissions are required for users to perform this operation. The purpose of the
|
|
45
45
|
* <code>sts:GetSessionToken</code> operation is to authenticate the user using MFA. You
|
|
@@ -118,10 +118,10 @@ declare const GetSessionTokenCommand_base: {
|
|
|
118
118
|
*
|
|
119
119
|
* @throws {@link RegionDisabledException} (client fault)
|
|
120
120
|
* <p>STS is not activated in the requested region for the account that is being asked to
|
|
121
|
-
* generate credentials. The account administrator must use the IAM console to activate
|
|
122
|
-
* in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html">Activating and
|
|
123
|
-
* Deactivating
|
|
124
|
-
*
|
|
121
|
+
* generate credentials. The account administrator must use the IAM console to activate
|
|
122
|
+
* STS in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html">Activating and
|
|
123
|
+
* Deactivating STS in an Amazon Web Services Region</a> in the <i>IAM User
|
|
124
|
+
* Guide</i>.</p>
|
|
125
125
|
*
|
|
126
126
|
* @throws {@link STSServiceException}
|
|
127
127
|
* <p>Base exception class for all service exceptions from STS service.</p>
|
|
@@ -1,6 +1,7 @@
|
|
|
1
1
|
export * from "./AssumeRoleCommand";
|
|
2
2
|
export * from "./AssumeRoleWithSAMLCommand";
|
|
3
3
|
export * from "./AssumeRoleWithWebIdentityCommand";
|
|
4
|
+
export * from "./AssumeRootCommand";
|
|
4
5
|
export * from "./DecodeAuthorizationMessageCommand";
|
|
5
6
|
export * from "./GetAccessKeyInfoCommand";
|
|
6
7
|
export * from "./GetCallerIdentityCommand";
|