@aws-sdk/client-sts 3.775.0 → 3.777.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -205,54 +205,54 @@ declare const AssumeRoleCommand_base: {
205
205
  * @throws {@link STSServiceException}
206
206
  * <p>Base exception class for all service exceptions from STS service.</p>
207
207
  *
208
- * @public
208
+ *
209
209
  * @example To assume a role
210
210
  * ```javascript
211
211
  * //
212
212
  * const input = {
213
- * "ExternalId": "123ABC",
214
- * "Policy": "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Sid\":\"Stmt1\",\"Effect\":\"Allow\",\"Action\":\"s3:ListAllMyBuckets\",\"Resource\":\"*\"}]}",
215
- * "RoleArn": "arn:aws:iam::123456789012:role/demo",
216
- * "RoleSessionName": "testAssumeRoleSession",
217
- * "Tags": [
213
+ * ExternalId: "123ABC",
214
+ * Policy: `{"Version":"2012-10-17","Statement":[{"Sid":"Stmt1","Effect":"Allow","Action":"s3:ListAllMyBuckets","Resource":"*"}]}`,
215
+ * RoleArn: "arn:aws:iam::123456789012:role/demo",
216
+ * RoleSessionName: "testAssumeRoleSession",
217
+ * Tags: [
218
218
  * {
219
- * "Key": "Project",
220
- * "Value": "Unicorn"
219
+ * Key: "Project",
220
+ * Value: "Unicorn"
221
221
  * },
222
222
  * {
223
- * "Key": "Team",
224
- * "Value": "Automation"
223
+ * Key: "Team",
224
+ * Value: "Automation"
225
225
  * },
226
226
  * {
227
- * "Key": "Cost-Center",
228
- * "Value": "12345"
227
+ * Key: "Cost-Center",
228
+ * Value: "12345"
229
229
  * }
230
230
  * ],
231
- * "TransitiveTagKeys": [
231
+ * TransitiveTagKeys: [
232
232
  * "Project",
233
233
  * "Cost-Center"
234
234
  * ]
235
235
  * };
236
236
  * const command = new AssumeRoleCommand(input);
237
237
  * const response = await client.send(command);
238
- * /* response ==
238
+ * /* response is
239
239
  * {
240
- * "AssumedRoleUser": {
241
- * "Arn": "arn:aws:sts::123456789012:assumed-role/demo/Bob",
242
- * "AssumedRoleId": "ARO123EXAMPLE123:Bob"
240
+ * AssumedRoleUser: {
241
+ * Arn: "arn:aws:sts::123456789012:assumed-role/demo/Bob",
242
+ * AssumedRoleId: "ARO123EXAMPLE123:Bob"
243
243
  * },
244
- * "Credentials": {
245
- * "AccessKeyId": "AKIAIOSFODNN7EXAMPLE",
246
- * "Expiration": "2011-07-15T23:28:33.359Z",
247
- * "SecretAccessKey": "wJalrXUtnFEMI/K7MDENG/bPxRfiCYzEXAMPLEKEY",
248
- * "SessionToken": "AQoDYXdzEPT//////////wEXAMPLEtc764bNrC9SAPBSM22wDOk4x4HIZ8j4FZTwdQWLWsKWHGBuFqwAeMicRXmxfpSPfIeoIYRqTflfKD8YUuwthAx7mSEI/qkPpKPi/kMcGdQrmGdeehM4IC1NtBmUpp2wUE8phUZampKsburEDy0KPkyQDYwT7WZ0wq5VSXDvp75YU9HFvlRd8Tx6q6fE8YQcHNVXAkiY9q6d+xo0rKwT38xVqr7ZD0u0iPPkUL64lIZbqBAz+scqKmlzm8FDrypNC9Yjc8fPOLn9FX9KSYvKTr4rvx3iSIlTJabIQwj2ICCR/oLxBA=="
244
+ * Credentials: {
245
+ * AccessKeyId: "AKIAIOSFODNN7EXAMPLE",
246
+ * Expiration: "2011-07-15T23:28:33.359Z",
247
+ * SecretAccessKey: "wJalrXUtnFEMI/K7MDENG/bPxRfiCYzEXAMPLEKEY",
248
+ * SessionToken: "AQoDYXdzEPT//////////wEXAMPLEtc764bNrC9SAPBSM22wDOk4x4HIZ8j4FZTwdQWLWsKWHGBuFqwAeMicRXmxfpSPfIeoIYRqTflfKD8YUuwthAx7mSEI/qkPpKPi/kMcGdQrmGdeehM4IC1NtBmUpp2wUE8phUZampKsburEDy0KPkyQDYwT7WZ0wq5VSXDvp75YU9HFvlRd8Tx6q6fE8YQcHNVXAkiY9q6d+xo0rKwT38xVqr7ZD0u0iPPkUL64lIZbqBAz+scqKmlzm8FDrypNC9Yjc8fPOLn9FX9KSYvKTr4rvx3iSIlTJabIQwj2ICCR/oLxBA=="
249
249
  * },
250
- * "PackedPolicySize": 8
250
+ * PackedPolicySize: 8
251
251
  * }
252
252
  * *\/
253
- * // example id: to-assume-a-role-1480532402212
254
253
  * ```
255
254
  *
255
+ * @public
256
256
  */
257
257
  export declare class AssumeRoleCommand extends AssumeRoleCommand_base {
258
258
  /** @internal type navigation helper, not in runtime. */
@@ -243,41 +243,41 @@ declare const AssumeRoleWithSAMLCommand_base: {
243
243
  * @throws {@link STSServiceException}
244
244
  * <p>Base exception class for all service exceptions from STS service.</p>
245
245
  *
246
- * @public
246
+ *
247
247
  * @example To assume a role using a SAML assertion
248
248
  * ```javascript
249
249
  * //
250
250
  * const input = {
251
- * "DurationSeconds": 3600,
252
- * "PrincipalArn": "arn:aws:iam::123456789012:saml-provider/SAML-test",
253
- * "RoleArn": "arn:aws:iam::123456789012:role/TestSaml",
254
- * "SAMLAssertion": "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"
251
+ * DurationSeconds: 3600,
252
+ * PrincipalArn: "arn:aws:iam::123456789012:saml-provider/SAML-test",
253
+ * RoleArn: "arn:aws:iam::123456789012:role/TestSaml",
254
+ * SAMLAssertion: "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"
255
255
  * };
256
256
  * const command = new AssumeRoleWithSAMLCommand(input);
257
257
  * const response = await client.send(command);
258
- * /* response ==
258
+ * /* response is
259
259
  * {
260
- * "AssumedRoleUser": {
261
- * "Arn": "arn:aws:sts::123456789012:assumed-role/TestSaml",
262
- * "AssumedRoleId": "ARO456EXAMPLE789:TestSaml"
260
+ * AssumedRoleUser: {
261
+ * Arn: "arn:aws:sts::123456789012:assumed-role/TestSaml",
262
+ * AssumedRoleId: "ARO456EXAMPLE789:TestSaml"
263
263
  * },
264
- * "Audience": "https://signin.aws.amazon.com/saml",
265
- * "Credentials": {
266
- * "AccessKeyId": "ASIAV3ZUEFP6EXAMPLE",
267
- * "Expiration": "2019-11-01T20:26:47Z",
268
- * "SecretAccessKey": "8P+SQvWIuLnKhh8d++jpw0nNmQRBZvNEXAMPLEKEY",
269
- * "SessionToken": "IQoJb3JpZ2luX2VjEOz////////////////////wEXAMPLEtMSJHMEUCIDoKK3JH9uGQE1z0sINr5M4jk+Na8KHDcCYRVjJCZEvOAiEA3OvJGtw1EcViOleS2vhs8VdCKFJQWPQrmGdeehM4IC1NtBmUpp2wUE8phUZampKsburEDy0KPkyQDYwT7WZ0wq5VSXDvp75YU9HFvlRd8Tx6q6fE8YQcHNVXAkiY9q6d+xo0rKwT38xVqr7ZD0u0iPPkUL64lIZbqBAz+scqKmlzm8FDrypNC9Yjc8fPOLn9FX9KSYvKTr4rvx3iSIlTJabIQwj2ICCR/oLxBA=="
264
+ * Audience: "https://signin.aws.amazon.com/saml",
265
+ * Credentials: {
266
+ * AccessKeyId: "ASIAV3ZUEFP6EXAMPLE",
267
+ * Expiration: "2019-11-01T20:26:47Z",
268
+ * SecretAccessKey: "8P+SQvWIuLnKhh8d++jpw0nNmQRBZvNEXAMPLEKEY",
269
+ * SessionToken: "IQoJb3JpZ2luX2VjEOz////////////////////wEXAMPLEtMSJHMEUCIDoKK3JH9uGQE1z0sINr5M4jk+Na8KHDcCYRVjJCZEvOAiEA3OvJGtw1EcViOleS2vhs8VdCKFJQWPQrmGdeehM4IC1NtBmUpp2wUE8phUZampKsburEDy0KPkyQDYwT7WZ0wq5VSXDvp75YU9HFvlRd8Tx6q6fE8YQcHNVXAkiY9q6d+xo0rKwT38xVqr7ZD0u0iPPkUL64lIZbqBAz+scqKmlzm8FDrypNC9Yjc8fPOLn9FX9KSYvKTr4rvx3iSIlTJabIQwj2ICCR/oLxBA=="
270
270
  * },
271
- * "Issuer": "https://integ.example.com/idp/shibboleth",
272
- * "NameQualifier": "SbdGOnUkh1i4+EXAMPLExL/jEvs=",
273
- * "PackedPolicySize": 6,
274
- * "Subject": "SamlExample",
275
- * "SubjectType": "transient"
271
+ * Issuer: "https://integ.example.com/idp/shibboleth",
272
+ * NameQualifier: "SbdGOnUkh1i4+EXAMPLExL/jEvs=",
273
+ * PackedPolicySize: 6,
274
+ * Subject: "SamlExample",
275
+ * SubjectType: "transient"
276
276
  * }
277
277
  * *\/
278
- * // example id: to-assume-role-with-saml-14882749597814
279
278
  * ```
280
279
  *
280
+ * @public
281
281
  */
282
282
  export declare class AssumeRoleWithSAMLCommand extends AssumeRoleWithSAMLCommand_base {
283
283
  /** @internal type navigation helper, not in runtime. */
@@ -237,41 +237,41 @@ declare const AssumeRoleWithWebIdentityCommand_base: {
237
237
  * @throws {@link STSServiceException}
238
238
  * <p>Base exception class for all service exceptions from STS service.</p>
239
239
  *
240
- * @public
240
+ *
241
241
  * @example To assume a role as an OpenID Connect-federated user
242
242
  * ```javascript
243
243
  * //
244
244
  * const input = {
245
- * "DurationSeconds": 3600,
246
- * "Policy": "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Sid\":\"Stmt1\",\"Effect\":\"Allow\",\"Action\":\"s3:ListAllMyBuckets\",\"Resource\":\"*\"}]}",
247
- * "ProviderId": "www.amazon.com",
248
- * "RoleArn": "arn:aws:iam::123456789012:role/FederatedWebIdentityRole",
249
- * "RoleSessionName": "app1",
250
- * "WebIdentityToken": "Atza%7CIQEBLjAsAhRFiXuWpUXuRvQ9PZL3GMFcYevydwIUFAHZwXZXXXXXXXXJnrulxKDHwy87oGKPznh0D6bEQZTSCzyoCtL_8S07pLpr0zMbn6w1lfVZKNTBdDansFBmtGnIsIapjI6xKR02Yc_2bQ8LZbUXSGm6Ry6_BG7PrtLZtj_dfCTj92xNGed-CrKqjG7nPBjNIL016GGvuS5gSvPRUxWES3VYfm1wl7WTI7jn-Pcb6M-buCgHhFOzTQxod27L9CqnOLio7N3gZAGpsp6n1-AJBOCJckcyXe2c6uD0srOJeZlKUm2eTDVMf8IehDVI0r1QOnTV6KzzAI3OY87Vd_cVMQ"
245
+ * DurationSeconds: 3600,
246
+ * Policy: `{"Version":"2012-10-17","Statement":[{"Sid":"Stmt1","Effect":"Allow","Action":"s3:ListAllMyBuckets","Resource":"*"}]}`,
247
+ * ProviderId: "www.amazon.com",
248
+ * RoleArn: "arn:aws:iam::123456789012:role/FederatedWebIdentityRole",
249
+ * RoleSessionName: "app1",
250
+ * WebIdentityToken: "Atza%7CIQEBLjAsAhRFiXuWpUXuRvQ9PZL3GMFcYevydwIUFAHZwXZXXXXXXXXJnrulxKDHwy87oGKPznh0D6bEQZTSCzyoCtL_8S07pLpr0zMbn6w1lfVZKNTBdDansFBmtGnIsIapjI6xKR02Yc_2bQ8LZbUXSGm6Ry6_BG7PrtLZtj_dfCTj92xNGed-CrKqjG7nPBjNIL016GGvuS5gSvPRUxWES3VYfm1wl7WTI7jn-Pcb6M-buCgHhFOzTQxod27L9CqnOLio7N3gZAGpsp6n1-AJBOCJckcyXe2c6uD0srOJeZlKUm2eTDVMf8IehDVI0r1QOnTV6KzzAI3OY87Vd_cVMQ"
251
251
  * };
252
252
  * const command = new AssumeRoleWithWebIdentityCommand(input);
253
253
  * const response = await client.send(command);
254
- * /* response ==
254
+ * /* response is
255
255
  * {
256
- * "AssumedRoleUser": {
257
- * "Arn": "arn:aws:sts::123456789012:assumed-role/FederatedWebIdentityRole/app1",
258
- * "AssumedRoleId": "AROACLKWSDQRAOEXAMPLE:app1"
256
+ * AssumedRoleUser: {
257
+ * Arn: "arn:aws:sts::123456789012:assumed-role/FederatedWebIdentityRole/app1",
258
+ * AssumedRoleId: "AROACLKWSDQRAOEXAMPLE:app1"
259
259
  * },
260
- * "Audience": "client.5498841531868486423.1548@apps.example.com",
261
- * "Credentials": {
262
- * "AccessKeyId": "AKIAIOSFODNN7EXAMPLE",
263
- * "Expiration": "2014-10-24T23:00:23Z",
264
- * "SecretAccessKey": "wJalrXUtnFEMI/K7MDENG/bPxRfiCYzEXAMPLEKEY",
265
- * "SessionToken": "AQoDYXdzEE0a8ANXXXXXXXXNO1ewxE5TijQyp+IEXAMPLE"
260
+ * Audience: "client.5498841531868486423.1548@apps.example.com",
261
+ * Credentials: {
262
+ * AccessKeyId: "AKIAIOSFODNN7EXAMPLE",
263
+ * Expiration: "2014-10-24T23:00:23Z",
264
+ * SecretAccessKey: "wJalrXUtnFEMI/K7MDENG/bPxRfiCYzEXAMPLEKEY",
265
+ * SessionToken: "AQoDYXdzEE0a8ANXXXXXXXXNO1ewxE5TijQyp+IEXAMPLE"
266
266
  * },
267
- * "PackedPolicySize": 123,
268
- * "Provider": "www.amazon.com",
269
- * "SubjectFromWebIdentityToken": "amzn1.account.AF6RHO7KZU5XRVQJGXK6HEXAMPLE"
267
+ * PackedPolicySize: 123,
268
+ * Provider: "www.amazon.com",
269
+ * SubjectFromWebIdentityToken: "amzn1.account.AF6RHO7KZU5XRVQJGXK6HEXAMPLE"
270
270
  * }
271
271
  * *\/
272
- * // example id: to-assume-a-role-as-an-openid-connect-federated-user-1480533445696
273
272
  * ```
274
273
  *
274
+ * @public
275
275
  */
276
276
  export declare class AssumeRoleWithWebIdentityCommand extends AssumeRoleWithWebIdentityCommand_base {
277
277
  /** @internal type navigation helper, not in runtime. */
@@ -86,33 +86,33 @@ declare const AssumeRootCommand_base: {
86
86
  * @throws {@link STSServiceException}
87
87
  * <p>Base exception class for all service exceptions from STS service.</p>
88
88
  *
89
- * @public
89
+ *
90
90
  * @example To launch a privileged session
91
91
  * ```javascript
92
92
  * // The following command retrieves a set of short-term credentials you can use to unlock an S3 bucket for a member account by removing the bucket policy.
93
93
  * const input = {
94
- * "DurationSeconds": 900,
95
- * "TargetPrincipal": "111122223333",
96
- * "TaskPolicyArn": {
97
- * "arn": "arn:aws:iam::aws:policy/root-task/S3UnlockBucketPolicy"
94
+ * DurationSeconds: 900,
95
+ * TargetPrincipal: "111122223333",
96
+ * TaskPolicyArn: {
97
+ * arn: "arn:aws:iam::aws:policy/root-task/S3UnlockBucketPolicy"
98
98
  * }
99
99
  * };
100
100
  * const command = new AssumeRootCommand(input);
101
101
  * const response = await client.send(command);
102
- * /* response ==
102
+ * /* response is
103
103
  * {
104
- * "Credentials": {
105
- * "AccessKeyId": "ASIAJEXAMPLEXEG2JICEA",
106
- * "Expiration": "2024-11-15T00:05:07Z",
107
- * "SecretAccessKey": "9drTJvcXLB89EXAMPLELB8923FB892xMFI",
108
- * "SessionToken": "AQoXdzELDDY//////////wEaoAK1wvxJY12r2IrDFT2IvAzTCn3zHoZ7YNtpiQLF0MqZye/qwjzP2iEXAMPLEbw/m3hsj8VBTkPORGvr9jM5sgP+w9IZWZnU+LWhmg+a5fDi2oTGUYcdg9uexQ4mtCHIHfi4citgqZTgco40Yqr4lIlo4V2b2Dyauk0eYFNebHtYlFVgAUj+7Indz3LU0aTWk1WKIjHmmMCIoTkyYp/k7kUG7moeEYKSitwQIi6Gjn+nyzM+PtoA3685ixzv0R7i5rjQi0YE0lf1oeie3bDiNHncmzosRM6SFiPzSvp6h/32xQuZsjcypmwsPSDtTPYcs0+YN/8BRi2/IcrxSpnWEXAMPLEXSDFTAQAM6Dl9zR0tXoybnlrZIwMLlMi1Kcgo5OytwU="
104
+ * Credentials: {
105
+ * AccessKeyId: "ASIAJEXAMPLEXEG2JICEA",
106
+ * Expiration: "2024-11-15T00:05:07Z",
107
+ * SecretAccessKey: "9drTJvcXLB89EXAMPLELB8923FB892xMFI",
108
+ * SessionToken: "AQoXdzELDDY//////////wEaoAK1wvxJY12r2IrDFT2IvAzTCn3zHoZ7YNtpiQLF0MqZye/qwjzP2iEXAMPLEbw/m3hsj8VBTkPORGvr9jM5sgP+w9IZWZnU+LWhmg+a5fDi2oTGUYcdg9uexQ4mtCHIHfi4citgqZTgco40Yqr4lIlo4V2b2Dyauk0eYFNebHtYlFVgAUj+7Indz3LU0aTWk1WKIjHmmMCIoTkyYp/k7kUG7moeEYKSitwQIi6Gjn+nyzM+PtoA3685ixzv0R7i5rjQi0YE0lf1oeie3bDiNHncmzosRM6SFiPzSvp6h/32xQuZsjcypmwsPSDtTPYcs0+YN/8BRi2/IcrxSpnWEXAMPLEXSDFTAQAM6Dl9zR0tXoybnlrZIwMLlMi1Kcgo5OytwU="
109
109
  * },
110
- * "SourceIdentity": "Alice"
110
+ * SourceIdentity: "Alice"
111
111
  * }
112
112
  * *\/
113
- * // example id: to-launch-a-privileged-session-1731335424565
114
113
  * ```
115
114
  *
115
+ * @public
116
116
  */
117
117
  export declare class AssumeRootCommand extends AssumeRootCommand_base {
118
118
  /** @internal type navigation helper, not in runtime. */
@@ -94,23 +94,23 @@ declare const DecodeAuthorizationMessageCommand_base: {
94
94
  * @throws {@link STSServiceException}
95
95
  * <p>Base exception class for all service exceptions from STS service.</p>
96
96
  *
97
- * @public
97
+ *
98
98
  * @example To decode information about an authorization status of a request
99
99
  * ```javascript
100
100
  * //
101
101
  * const input = {
102
- * "EncodedMessage": "<encoded-message>"
102
+ * EncodedMessage: "<encoded-message>"
103
103
  * };
104
104
  * const command = new DecodeAuthorizationMessageCommand(input);
105
105
  * const response = await client.send(command);
106
- * /* response ==
106
+ * /* response is
107
107
  * {
108
- * "DecodedMessage": "{\"allowed\": \"false\",\"explicitDeny\": \"false\",\"matchedStatements\": \"\",\"failures\": \"\",\"context\": {\"principal\": {\"id\": \"AIDACKCEVSQ6C2EXAMPLE\",\"name\": \"Bob\",\"arn\": \"arn:aws:iam::123456789012:user/Bob\"},\"action\": \"ec2:StopInstances\",\"resource\": \"arn:aws:ec2:us-east-1:123456789012:instance/i-dd01c9bd\",\"conditions\": [{\"item\": {\"key\": \"ec2:Tenancy\",\"values\": [\"default\"]},{\"item\": {\"key\": \"ec2:ResourceTag/elasticbeanstalk:environment-name\",\"values\": [\"Default-Environment\"]}},(Additional items ...)]}}"
108
+ * DecodedMessage: `{"allowed": "false","explicitDeny": "false","matchedStatements": "","failures": "","context": {"principal": {"id": "AIDACKCEVSQ6C2EXAMPLE","name": "Bob","arn": "arn:aws:iam::123456789012:user/Bob"},"action": "ec2:StopInstances","resource": "arn:aws:ec2:us-east-1:123456789012:instance/i-dd01c9bd","conditions": [{"item": {"key": "ec2:Tenancy","values": ["default"]},{"item": {"key": "ec2:ResourceTag/elasticbeanstalk:environment-name","values": ["Default-Environment"]}},(Additional items ...)]}}`
109
109
  * }
110
110
  * *\/
111
- * // example id: to-decode-information-about-an-authorization-status-of-a-request-1480533854499
112
111
  * ```
113
112
  *
113
+ * @public
114
114
  */
115
115
  export declare class DecodeAuthorizationMessageCommand extends DecodeAuthorizationMessageCommand_base {
116
116
  /** @internal type navigation helper, not in runtime. */
@@ -70,6 +70,7 @@ declare const GetAccessKeyInfoCommand_base: {
70
70
  * @throws {@link STSServiceException}
71
71
  * <p>Base exception class for all service exceptions from STS service.</p>
72
72
  *
73
+ *
73
74
  * @public
74
75
  */
75
76
  export declare class GetAccessKeyInfoCommand extends GetAccessKeyInfoCommand_base {
@@ -63,55 +63,53 @@ declare const GetCallerIdentityCommand_base: {
63
63
  * @throws {@link STSServiceException}
64
64
  * <p>Base exception class for all service exceptions from STS service.</p>
65
65
  *
66
- * @public
66
+ *
67
67
  * @example To get details about a calling IAM user
68
68
  * ```javascript
69
69
  * // This example shows a request and response made with the credentials for a user named Alice in the AWS account 123456789012.
70
- * const input = {};
70
+ * const input = { /* empty *\/ };
71
71
  * const command = new GetCallerIdentityCommand(input);
72
72
  * const response = await client.send(command);
73
- * /* response ==
73
+ * /* response is
74
74
  * {
75
- * "Account": "123456789012",
76
- * "Arn": "arn:aws:iam::123456789012:user/Alice",
77
- * "UserId": "AKIAI44QH8DHBEXAMPLE"
75
+ * Account: "123456789012",
76
+ * Arn: "arn:aws:iam::123456789012:user/Alice",
77
+ * UserId: "AKIAI44QH8DHBEXAMPLE"
78
78
  * }
79
79
  * *\/
80
- * // example id: to-get-details-about-a-calling-iam-user-1480540050376
81
80
  * ```
82
81
  *
83
82
  * @example To get details about a calling user federated with AssumeRole
84
83
  * ```javascript
85
84
  * // This example shows a request and response made with temporary credentials created by AssumeRole. The name of the assumed role is my-role-name, and the RoleSessionName is set to my-role-session-name.
86
- * const input = {};
85
+ * const input = { /* empty *\/ };
87
86
  * const command = new GetCallerIdentityCommand(input);
88
87
  * const response = await client.send(command);
89
- * /* response ==
88
+ * /* response is
90
89
  * {
91
- * "Account": "123456789012",
92
- * "Arn": "arn:aws:sts::123456789012:assumed-role/my-role-name/my-role-session-name",
93
- * "UserId": "AKIAI44QH8DHBEXAMPLE:my-role-session-name"
90
+ * Account: "123456789012",
91
+ * Arn: "arn:aws:sts::123456789012:assumed-role/my-role-name/my-role-session-name",
92
+ * UserId: "AKIAI44QH8DHBEXAMPLE:my-role-session-name"
94
93
  * }
95
94
  * *\/
96
- * // example id: to-get-details-about-a-calling-user-federated-with-assumerole-1480540158545
97
95
  * ```
98
96
  *
99
97
  * @example To get details about a calling user federated with GetFederationToken
100
98
  * ```javascript
101
99
  * // This example shows a request and response made with temporary credentials created by using GetFederationToken. The Name parameter is set to my-federated-user-name.
102
- * const input = {};
100
+ * const input = { /* empty *\/ };
103
101
  * const command = new GetCallerIdentityCommand(input);
104
102
  * const response = await client.send(command);
105
- * /* response ==
103
+ * /* response is
106
104
  * {
107
- * "Account": "123456789012",
108
- * "Arn": "arn:aws:sts::123456789012:federated-user/my-federated-user-name",
109
- * "UserId": "123456789012:my-federated-user-name"
105
+ * Account: "123456789012",
106
+ * Arn: "arn:aws:sts::123456789012:federated-user/my-federated-user-name",
107
+ * UserId: "123456789012:my-federated-user-name"
110
108
  * }
111
109
  * *\/
112
- * // example id: to-get-details-about-a-calling-user-federated-with-getfederationtoken-1480540231316
113
110
  * ```
114
111
  *
112
+ * @public
115
113
  */
116
114
  export declare class GetCallerIdentityCommand extends GetCallerIdentityCommand_base {
117
115
  /** @internal type navigation helper, not in runtime. */
@@ -187,45 +187,45 @@ declare const GetFederationTokenCommand_base: {
187
187
  * @throws {@link STSServiceException}
188
188
  * <p>Base exception class for all service exceptions from STS service.</p>
189
189
  *
190
- * @public
190
+ *
191
191
  * @example To get temporary credentials for a role by using GetFederationToken
192
192
  * ```javascript
193
193
  * //
194
194
  * const input = {
195
- * "DurationSeconds": 3600,
196
- * "Name": "testFedUserSession",
197
- * "Policy": "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Sid\":\"Stmt1\",\"Effect\":\"Allow\",\"Action\":\"s3:ListAllMyBuckets\",\"Resource\":\"*\"}]}",
198
- * "Tags": [
195
+ * DurationSeconds: 3600,
196
+ * Name: "testFedUserSession",
197
+ * Policy: `{"Version":"2012-10-17","Statement":[{"Sid":"Stmt1","Effect":"Allow","Action":"s3:ListAllMyBuckets","Resource":"*"}]}`,
198
+ * Tags: [
199
199
  * {
200
- * "Key": "Project",
201
- * "Value": "Pegasus"
200
+ * Key: "Project",
201
+ * Value: "Pegasus"
202
202
  * },
203
203
  * {
204
- * "Key": "Cost-Center",
205
- * "Value": "98765"
204
+ * Key: "Cost-Center",
205
+ * Value: "98765"
206
206
  * }
207
207
  * ]
208
208
  * };
209
209
  * const command = new GetFederationTokenCommand(input);
210
210
  * const response = await client.send(command);
211
- * /* response ==
211
+ * /* response is
212
212
  * {
213
- * "Credentials": {
214
- * "AccessKeyId": "AKIAIOSFODNN7EXAMPLE",
215
- * "Expiration": "2011-07-15T23:28:33.359Z",
216
- * "SecretAccessKey": "wJalrXUtnFEMI/K7MDENG/bPxRfiCYzEXAMPLEKEY",
217
- * "SessionToken": "AQoDYXdzEPT//////////wEXAMPLEtc764bNrC9SAPBSM22wDOk4x4HIZ8j4FZTwdQWLWsKWHGBuFqwAeMicRXmxfpSPfIeoIYRqTflfKD8YUuwthAx7mSEI/qkPpKPi/kMcGdQrmGdeehM4IC1NtBmUpp2wUE8phUZampKsburEDy0KPkyQDYwT7WZ0wq5VSXDvp75YU9HFvlRd8Tx6q6fE8YQcHNVXAkiY9q6d+xo0rKwT38xVqr7ZD0u0iPPkUL64lIZbqBAz+scqKmlzm8FDrypNC9Yjc8fPOLn9FX9KSYvKTr4rvx3iSIlTJabIQwj2ICCR/oLxBA=="
213
+ * Credentials: {
214
+ * AccessKeyId: "AKIAIOSFODNN7EXAMPLE",
215
+ * Expiration: "2011-07-15T23:28:33.359Z",
216
+ * SecretAccessKey: "wJalrXUtnFEMI/K7MDENG/bPxRfiCYzEXAMPLEKEY",
217
+ * SessionToken: "AQoDYXdzEPT//////////wEXAMPLEtc764bNrC9SAPBSM22wDOk4x4HIZ8j4FZTwdQWLWsKWHGBuFqwAeMicRXmxfpSPfIeoIYRqTflfKD8YUuwthAx7mSEI/qkPpKPi/kMcGdQrmGdeehM4IC1NtBmUpp2wUE8phUZampKsburEDy0KPkyQDYwT7WZ0wq5VSXDvp75YU9HFvlRd8Tx6q6fE8YQcHNVXAkiY9q6d+xo0rKwT38xVqr7ZD0u0iPPkUL64lIZbqBAz+scqKmlzm8FDrypNC9Yjc8fPOLn9FX9KSYvKTr4rvx3iSIlTJabIQwj2ICCR/oLxBA=="
218
218
  * },
219
- * "FederatedUser": {
220
- * "Arn": "arn:aws:sts::123456789012:federated-user/Bob",
221
- * "FederatedUserId": "123456789012:Bob"
219
+ * FederatedUser: {
220
+ * Arn: "arn:aws:sts::123456789012:federated-user/Bob",
221
+ * FederatedUserId: "123456789012:Bob"
222
222
  * },
223
- * "PackedPolicySize": 8
223
+ * PackedPolicySize: 8
224
224
  * }
225
225
  * *\/
226
- * // example id: to-get-temporary-credentials-for-a-role-by-using-getfederationtoken-1480540749900
227
226
  * ```
228
227
  *
228
+ * @public
229
229
  */
230
230
  export declare class GetFederationTokenCommand extends GetFederationTokenCommand_base {
231
231
  /** @internal type navigation helper, not in runtime. */
@@ -126,30 +126,30 @@ declare const GetSessionTokenCommand_base: {
126
126
  * @throws {@link STSServiceException}
127
127
  * <p>Base exception class for all service exceptions from STS service.</p>
128
128
  *
129
- * @public
129
+ *
130
130
  * @example To get temporary credentials for an IAM user or an AWS account
131
131
  * ```javascript
132
132
  * //
133
133
  * const input = {
134
- * "DurationSeconds": 3600,
135
- * "SerialNumber": "YourMFASerialNumber",
136
- * "TokenCode": "123456"
134
+ * DurationSeconds: 3600,
135
+ * SerialNumber: "YourMFASerialNumber",
136
+ * TokenCode: "123456"
137
137
  * };
138
138
  * const command = new GetSessionTokenCommand(input);
139
139
  * const response = await client.send(command);
140
- * /* response ==
140
+ * /* response is
141
141
  * {
142
- * "Credentials": {
143
- * "AccessKeyId": "AKIAIOSFODNN7EXAMPLE",
144
- * "Expiration": "2011-07-11T19:55:29.611Z",
145
- * "SecretAccessKey": "wJalrXUtnFEMI/K7MDENG/bPxRfiCYzEXAMPLEKEY",
146
- * "SessionToken": "AQoEXAMPLEH4aoAH0gNCAPyJxz4BlCFFxWNE1OPTgk5TthT+FvwqnKwRcOIfrRh3c/LTo6UDdyJwOOvEVPvLXCrrrUtdnniCEXAMPLE/IvU1dYUg2RVAJBanLiHb4IgRmpRV3zrkuWJOgQs8IZZaIv2BXIa2R4OlgkBN9bkUDNCJiBeb/AXlzBBko7b15fjrBs2+cTQtpZ3CYWFXG8C5zqx37wnOE49mRl/+OtkIKGO7fAE"
142
+ * Credentials: {
143
+ * AccessKeyId: "AKIAIOSFODNN7EXAMPLE",
144
+ * Expiration: "2011-07-11T19:55:29.611Z",
145
+ * SecretAccessKey: "wJalrXUtnFEMI/K7MDENG/bPxRfiCYzEXAMPLEKEY",
146
+ * SessionToken: "AQoEXAMPLEH4aoAH0gNCAPyJxz4BlCFFxWNE1OPTgk5TthT+FvwqnKwRcOIfrRh3c/LTo6UDdyJwOOvEVPvLXCrrrUtdnniCEXAMPLE/IvU1dYUg2RVAJBanLiHb4IgRmpRV3zrkuWJOgQs8IZZaIv2BXIa2R4OlgkBN9bkUDNCJiBeb/AXlzBBko7b15fjrBs2+cTQtpZ3CYWFXG8C5zqx37wnOE49mRl/+OtkIKGO7fAE"
147
147
  * }
148
148
  * }
149
149
  * *\/
150
- * // example id: to-get-temporary-credentials-for-an-iam-user-or-an-aws-account-1480540814038
151
150
  * ```
152
151
  *
152
+ * @public
153
153
  */
154
154
  export declare class GetSessionTokenCommand extends GetSessionTokenCommand_base {
155
155
  /** @internal type navigation helper, not in runtime. */
package/package.json CHANGED
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "name": "@aws-sdk/client-sts",
3
3
  "description": "AWS SDK for JavaScript Sts Client for Node.js, Browser and React Native",
4
- "version": "3.775.0",
4
+ "version": "3.777.0",
5
5
  "scripts": {
6
6
  "build": "concurrently 'yarn:build:cjs' 'yarn:build:es' 'yarn:build:types'",
7
7
  "build:cjs": "node ../../scripts/compilation/inline client-sts",
@@ -23,7 +23,7 @@
23
23
  "@aws-crypto/sha256-browser": "5.2.0",
24
24
  "@aws-crypto/sha256-js": "5.2.0",
25
25
  "@aws-sdk/core": "3.775.0",
26
- "@aws-sdk/credential-provider-node": "3.775.0",
26
+ "@aws-sdk/credential-provider-node": "3.777.0",
27
27
  "@aws-sdk/middleware-host-header": "3.775.0",
28
28
  "@aws-sdk/middleware-logger": "3.775.0",
29
29
  "@aws-sdk/middleware-recursion-detection": "3.775.0",