@aws-sdk/client-sts 3.687.0 → 3.692.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -0,0 +1,103 @@
1
+ import { Command as $Command } from "@smithy/smithy-client";
2
+ import { MetadataBearer as __MetadataBearer } from "@smithy/types";
3
+ import { AssumeRootRequest, AssumeRootResponse } from "../models/models_0";
4
+ import { ServiceInputTypes, ServiceOutputTypes, STSClientResolvedConfig } from "../STSClient";
5
+ /**
6
+ * @public
7
+ */
8
+ export type { __MetadataBearer };
9
+ export { $Command };
10
+ /**
11
+ * @public
12
+ *
13
+ * The input for {@link AssumeRootCommand}.
14
+ */
15
+ export interface AssumeRootCommandInput extends AssumeRootRequest {
16
+ }
17
+ /**
18
+ * @public
19
+ *
20
+ * The output of {@link AssumeRootCommand}.
21
+ */
22
+ export interface AssumeRootCommandOutput extends AssumeRootResponse, __MetadataBearer {
23
+ }
24
+ declare const AssumeRootCommand_base: {
25
+ new (input: AssumeRootCommandInput): import("@smithy/smithy-client").CommandImpl<AssumeRootCommandInput, AssumeRootCommandOutput, STSClientResolvedConfig, ServiceInputTypes, ServiceOutputTypes>;
26
+ new (__0_0: AssumeRootCommandInput): import("@smithy/smithy-client").CommandImpl<AssumeRootCommandInput, AssumeRootCommandOutput, STSClientResolvedConfig, ServiceInputTypes, ServiceOutputTypes>;
27
+ getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
28
+ };
29
+ /**
30
+ * <p>Returns a set of short term credentials you can use to perform privileged tasks in a
31
+ * member account.</p>
32
+ * <p>Before you can launch a privileged session, you must have enabled centralized root
33
+ * access in your organization. For steps to enable this feature, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_root-enable-root-access.html">Centralize root access for member accounts</a> in the <i>IAM User
34
+ * Guide</i>.</p>
35
+ * <note>
36
+ * <p>The global endpoint is not supported for AssumeRoot. You must send this request to a
37
+ * Regional STS endpoint. For more information, see <a href="https://docs.aws.amazon.com/STS/latest/APIReference/welcome.html#sts-endpoints">Endpoints</a>.</p>
38
+ * </note>
39
+ * <p>You can track AssumeRoot in CloudTrail logs to determine what actions were performed in a
40
+ * session. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/cloudtrail-track-privileged-tasks.html">Track privileged tasks
41
+ * in CloudTrail</a> in the <i>IAM User Guide</i>.</p>
42
+ * @example
43
+ * Use a bare-bones client and the command you need to make an API call.
44
+ * ```javascript
45
+ * import { STSClient, AssumeRootCommand } from "@aws-sdk/client-sts"; // ES Modules import
46
+ * // const { STSClient, AssumeRootCommand } = require("@aws-sdk/client-sts"); // CommonJS import
47
+ * const client = new STSClient(config);
48
+ * const input = { // AssumeRootRequest
49
+ * TargetPrincipal: "STRING_VALUE", // required
50
+ * TaskPolicyArn: { // PolicyDescriptorType
51
+ * arn: "STRING_VALUE",
52
+ * },
53
+ * DurationSeconds: Number("int"),
54
+ * };
55
+ * const command = new AssumeRootCommand(input);
56
+ * const response = await client.send(command);
57
+ * // { // AssumeRootResponse
58
+ * // Credentials: { // Credentials
59
+ * // AccessKeyId: "STRING_VALUE", // required
60
+ * // SecretAccessKey: "STRING_VALUE", // required
61
+ * // SessionToken: "STRING_VALUE", // required
62
+ * // Expiration: new Date("TIMESTAMP"), // required
63
+ * // },
64
+ * // SourceIdentity: "STRING_VALUE",
65
+ * // };
66
+ *
67
+ * ```
68
+ *
69
+ * @param AssumeRootCommandInput - {@link AssumeRootCommandInput}
70
+ * @returns {@link AssumeRootCommandOutput}
71
+ * @see {@link AssumeRootCommandInput} for command's `input` shape.
72
+ * @see {@link AssumeRootCommandOutput} for command's `response` shape.
73
+ * @see {@link STSClientResolvedConfig | config} for STSClient's `config` shape.
74
+ *
75
+ * @throws {@link ExpiredTokenException} (client fault)
76
+ * <p>The web identity token that was passed is expired or is not valid. Get a new identity
77
+ * token from the identity provider and then retry the request.</p>
78
+ *
79
+ * @throws {@link RegionDisabledException} (client fault)
80
+ * <p>STS is not activated in the requested region for the account that is being asked to
81
+ * generate credentials. The account administrator must use the IAM console to activate
82
+ * STS in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html">Activating and
83
+ * Deactivating STS in an Amazon Web Services Region</a> in the <i>IAM User
84
+ * Guide</i>.</p>
85
+ *
86
+ * @throws {@link STSServiceException}
87
+ * <p>Base exception class for all service exceptions from STS service.</p>
88
+ *
89
+ * @public
90
+ */
91
+ export declare class AssumeRootCommand extends AssumeRootCommand_base {
92
+ /** @internal type navigation helper, not in runtime. */
93
+ protected static __types: {
94
+ api: {
95
+ input: AssumeRootRequest;
96
+ output: AssumeRootResponse;
97
+ };
98
+ sdk: {
99
+ input: AssumeRootCommandInput;
100
+ output: AssumeRootCommandOutput;
101
+ };
102
+ };
103
+ }
@@ -88,8 +88,8 @@ declare const DecodeAuthorizationMessageCommand_base: {
88
88
  *
89
89
  * @throws {@link InvalidAuthorizationMessageException} (client fault)
90
90
  * <p>The error returned if the message passed to <code>DecodeAuthorizationMessage</code>
91
- * was invalid. This can happen if the token contains invalid characters, such as
92
- * linebreaks. </p>
91
+ * was invalid. This can happen if the token contains invalid characters, such as line
92
+ * breaks, or if the message has expired.</p>
93
93
  *
94
94
  * @throws {@link STSServiceException}
95
95
  * <p>Base exception class for all service exceptions from STS service.</p>
@@ -36,8 +36,8 @@ declare const GetFederationTokenCommand_base: {
36
36
  * contexts where those credentials can be safeguarded, usually in a server-based application.
37
37
  * For a comparison of <code>GetFederationToken</code> with the other API operations that
38
38
  * produce temporary credentials, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html">Requesting Temporary Security
39
- * Credentials</a> and <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#stsapi_comparison">Comparing the
40
- * Amazon Web Services STS API operations</a> in the <i>IAM User Guide</i>.</p>
39
+ * Credentials</a> and <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_sts-comparison.html">Compare STS
40
+ * credentials</a> in the <i>IAM User Guide</i>.</p>
41
41
  * <p>Although it is possible to call <code>GetFederationToken</code> using the security
42
42
  * credentials of an Amazon Web Services account root user rather than an IAM user that you
43
43
  * create for the purpose of a proxy application, we do not recommend it. For more
@@ -174,15 +174,15 @@ declare const GetFederationTokenCommand_base: {
174
174
  * tags are to the upper size limit. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html">Passing Session Tags in STS</a> in
175
175
  * the <i>IAM User Guide</i>.</p>
176
176
  * <p>You could receive this error even though you meet other defined session policy and
177
- * session tag limits. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-limits-entity-length">IAM and STS Entity
178
- * Character Limits</a> in the <i>IAM User Guide</i>.</p>
177
+ * session tag limits. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-limits-entity-length">IAM and STS Entity Character Limits</a> in the <i>IAM User
178
+ * Guide</i>.</p>
179
179
  *
180
180
  * @throws {@link RegionDisabledException} (client fault)
181
181
  * <p>STS is not activated in the requested region for the account that is being asked to
182
- * generate credentials. The account administrator must use the IAM console to activate STS
183
- * in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html">Activating and
184
- * Deactivating Amazon Web Services STS in an Amazon Web Services Region</a> in the <i>IAM User
185
- * Guide</i>.</p>
182
+ * generate credentials. The account administrator must use the IAM console to activate
183
+ * STS in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html">Activating and
184
+ * Deactivating STS in an Amazon Web Services Region</a> in the <i>IAM User
185
+ * Guide</i>.</p>
186
186
  *
187
187
  * @throws {@link STSServiceException}
188
188
  * <p>Base exception class for all service exceptions from STS service.</p>
@@ -38,8 +38,8 @@ declare const GetSessionTokenCommand_base: {
38
38
  * calls to API operations that require MFA authentication. An incorrect MFA code causes the
39
39
  * API to return an access denied error. For a comparison of <code>GetSessionToken</code> with
40
40
  * the other API operations that produce temporary credentials, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html">Requesting
41
- * Temporary Security Credentials</a> and <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#stsapi_comparison">Comparing the
42
- * Amazon Web Services STS API operations</a> in the <i>IAM User Guide</i>.</p>
41
+ * Temporary Security Credentials</a> and <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_sts-comparison.html">Compare STS
42
+ * credentials</a> in the <i>IAM User Guide</i>.</p>
43
43
  * <note>
44
44
  * <p>No permissions are required for users to perform this operation. The purpose of the
45
45
  * <code>sts:GetSessionToken</code> operation is to authenticate the user using MFA. You
@@ -118,10 +118,10 @@ declare const GetSessionTokenCommand_base: {
118
118
  *
119
119
  * @throws {@link RegionDisabledException} (client fault)
120
120
  * <p>STS is not activated in the requested region for the account that is being asked to
121
- * generate credentials. The account administrator must use the IAM console to activate STS
122
- * in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html">Activating and
123
- * Deactivating Amazon Web Services STS in an Amazon Web Services Region</a> in the <i>IAM User
124
- * Guide</i>.</p>
121
+ * generate credentials. The account administrator must use the IAM console to activate
122
+ * STS in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html">Activating and
123
+ * Deactivating STS in an Amazon Web Services Region</a> in the <i>IAM User
124
+ * Guide</i>.</p>
125
125
  *
126
126
  * @throws {@link STSServiceException}
127
127
  * <p>Base exception class for all service exceptions from STS service.</p>
@@ -1,6 +1,7 @@
1
1
  export * from "./AssumeRoleCommand";
2
2
  export * from "./AssumeRoleWithSAMLCommand";
3
3
  export * from "./AssumeRoleWithWebIdentityCommand";
4
+ export * from "./AssumeRootCommand";
4
5
  export * from "./DecodeAuthorizationMessageCommand";
5
6
  export * from "./GetAccessKeyInfoCommand";
6
7
  export * from "./GetCallerIdentityCommand";