@aws-sdk/client-sts 3.775.0 → 3.777.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist-types/commands/AssumeRoleCommand.d.ts +24 -24
- package/dist-types/commands/AssumeRoleWithSAMLCommand.d.ts +21 -21
- package/dist-types/commands/AssumeRoleWithWebIdentityCommand.d.ts +21 -21
- package/dist-types/commands/AssumeRootCommand.d.ts +13 -13
- package/dist-types/commands/DecodeAuthorizationMessageCommand.d.ts +5 -5
- package/dist-types/commands/GetAccessKeyInfoCommand.d.ts +1 -0
- package/dist-types/commands/GetCallerIdentityCommand.d.ts +17 -19
- package/dist-types/commands/GetFederationTokenCommand.d.ts +20 -20
- package/dist-types/commands/GetSessionTokenCommand.d.ts +11 -11
- package/package.json +2 -2
|
@@ -205,54 +205,54 @@ declare const AssumeRoleCommand_base: {
|
|
|
205
205
|
* @throws {@link STSServiceException}
|
|
206
206
|
* <p>Base exception class for all service exceptions from STS service.</p>
|
|
207
207
|
*
|
|
208
|
-
*
|
|
208
|
+
*
|
|
209
209
|
* @example To assume a role
|
|
210
210
|
* ```javascript
|
|
211
211
|
* //
|
|
212
212
|
* const input = {
|
|
213
|
-
*
|
|
214
|
-
*
|
|
215
|
-
*
|
|
216
|
-
*
|
|
217
|
-
*
|
|
213
|
+
* ExternalId: "123ABC",
|
|
214
|
+
* Policy: `{"Version":"2012-10-17","Statement":[{"Sid":"Stmt1","Effect":"Allow","Action":"s3:ListAllMyBuckets","Resource":"*"}]}`,
|
|
215
|
+
* RoleArn: "arn:aws:iam::123456789012:role/demo",
|
|
216
|
+
* RoleSessionName: "testAssumeRoleSession",
|
|
217
|
+
* Tags: [
|
|
218
218
|
* {
|
|
219
|
-
*
|
|
220
|
-
*
|
|
219
|
+
* Key: "Project",
|
|
220
|
+
* Value: "Unicorn"
|
|
221
221
|
* },
|
|
222
222
|
* {
|
|
223
|
-
*
|
|
224
|
-
*
|
|
223
|
+
* Key: "Team",
|
|
224
|
+
* Value: "Automation"
|
|
225
225
|
* },
|
|
226
226
|
* {
|
|
227
|
-
*
|
|
228
|
-
*
|
|
227
|
+
* Key: "Cost-Center",
|
|
228
|
+
* Value: "12345"
|
|
229
229
|
* }
|
|
230
230
|
* ],
|
|
231
|
-
*
|
|
231
|
+
* TransitiveTagKeys: [
|
|
232
232
|
* "Project",
|
|
233
233
|
* "Cost-Center"
|
|
234
234
|
* ]
|
|
235
235
|
* };
|
|
236
236
|
* const command = new AssumeRoleCommand(input);
|
|
237
237
|
* const response = await client.send(command);
|
|
238
|
-
* /* response
|
|
238
|
+
* /* response is
|
|
239
239
|
* {
|
|
240
|
-
*
|
|
241
|
-
*
|
|
242
|
-
*
|
|
240
|
+
* AssumedRoleUser: {
|
|
241
|
+
* Arn: "arn:aws:sts::123456789012:assumed-role/demo/Bob",
|
|
242
|
+
* AssumedRoleId: "ARO123EXAMPLE123:Bob"
|
|
243
243
|
* },
|
|
244
|
-
*
|
|
245
|
-
*
|
|
246
|
-
*
|
|
247
|
-
*
|
|
248
|
-
*
|
|
244
|
+
* Credentials: {
|
|
245
|
+
* AccessKeyId: "AKIAIOSFODNN7EXAMPLE",
|
|
246
|
+
* Expiration: "2011-07-15T23:28:33.359Z",
|
|
247
|
+
* SecretAccessKey: "wJalrXUtnFEMI/K7MDENG/bPxRfiCYzEXAMPLEKEY",
|
|
248
|
+
* SessionToken: "AQoDYXdzEPT//////////wEXAMPLEtc764bNrC9SAPBSM22wDOk4x4HIZ8j4FZTwdQWLWsKWHGBuFqwAeMicRXmxfpSPfIeoIYRqTflfKD8YUuwthAx7mSEI/qkPpKPi/kMcGdQrmGdeehM4IC1NtBmUpp2wUE8phUZampKsburEDy0KPkyQDYwT7WZ0wq5VSXDvp75YU9HFvlRd8Tx6q6fE8YQcHNVXAkiY9q6d+xo0rKwT38xVqr7ZD0u0iPPkUL64lIZbqBAz+scqKmlzm8FDrypNC9Yjc8fPOLn9FX9KSYvKTr4rvx3iSIlTJabIQwj2ICCR/oLxBA=="
|
|
249
249
|
* },
|
|
250
|
-
*
|
|
250
|
+
* PackedPolicySize: 8
|
|
251
251
|
* }
|
|
252
252
|
* *\/
|
|
253
|
-
* // example id: to-assume-a-role-1480532402212
|
|
254
253
|
* ```
|
|
255
254
|
*
|
|
255
|
+
* @public
|
|
256
256
|
*/
|
|
257
257
|
export declare class AssumeRoleCommand extends AssumeRoleCommand_base {
|
|
258
258
|
/** @internal type navigation helper, not in runtime. */
|
|
@@ -243,41 +243,41 @@ declare const AssumeRoleWithSAMLCommand_base: {
|
|
|
243
243
|
* @throws {@link STSServiceException}
|
|
244
244
|
* <p>Base exception class for all service exceptions from STS service.</p>
|
|
245
245
|
*
|
|
246
|
-
*
|
|
246
|
+
*
|
|
247
247
|
* @example To assume a role using a SAML assertion
|
|
248
248
|
* ```javascript
|
|
249
249
|
* //
|
|
250
250
|
* const input = {
|
|
251
|
-
*
|
|
252
|
-
*
|
|
253
|
-
*
|
|
254
|
-
*
|
|
251
|
+
* DurationSeconds: 3600,
|
|
252
|
+
* PrincipalArn: "arn:aws:iam::123456789012:saml-provider/SAML-test",
|
|
253
|
+
* RoleArn: "arn:aws:iam::123456789012:role/TestSaml",
|
|
254
|
+
* SAMLAssertion: "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"
|
|
255
255
|
* };
|
|
256
256
|
* const command = new AssumeRoleWithSAMLCommand(input);
|
|
257
257
|
* const response = await client.send(command);
|
|
258
|
-
* /* response
|
|
258
|
+
* /* response is
|
|
259
259
|
* {
|
|
260
|
-
*
|
|
261
|
-
*
|
|
262
|
-
*
|
|
260
|
+
* AssumedRoleUser: {
|
|
261
|
+
* Arn: "arn:aws:sts::123456789012:assumed-role/TestSaml",
|
|
262
|
+
* AssumedRoleId: "ARO456EXAMPLE789:TestSaml"
|
|
263
263
|
* },
|
|
264
|
-
*
|
|
265
|
-
*
|
|
266
|
-
*
|
|
267
|
-
*
|
|
268
|
-
*
|
|
269
|
-
*
|
|
264
|
+
* Audience: "https://signin.aws.amazon.com/saml",
|
|
265
|
+
* Credentials: {
|
|
266
|
+
* AccessKeyId: "ASIAV3ZUEFP6EXAMPLE",
|
|
267
|
+
* Expiration: "2019-11-01T20:26:47Z",
|
|
268
|
+
* SecretAccessKey: "8P+SQvWIuLnKhh8d++jpw0nNmQRBZvNEXAMPLEKEY",
|
|
269
|
+
* SessionToken: "IQoJb3JpZ2luX2VjEOz////////////////////wEXAMPLEtMSJHMEUCIDoKK3JH9uGQE1z0sINr5M4jk+Na8KHDcCYRVjJCZEvOAiEA3OvJGtw1EcViOleS2vhs8VdCKFJQWPQrmGdeehM4IC1NtBmUpp2wUE8phUZampKsburEDy0KPkyQDYwT7WZ0wq5VSXDvp75YU9HFvlRd8Tx6q6fE8YQcHNVXAkiY9q6d+xo0rKwT38xVqr7ZD0u0iPPkUL64lIZbqBAz+scqKmlzm8FDrypNC9Yjc8fPOLn9FX9KSYvKTr4rvx3iSIlTJabIQwj2ICCR/oLxBA=="
|
|
270
270
|
* },
|
|
271
|
-
*
|
|
272
|
-
*
|
|
273
|
-
*
|
|
274
|
-
*
|
|
275
|
-
*
|
|
271
|
+
* Issuer: "https://integ.example.com/idp/shibboleth",
|
|
272
|
+
* NameQualifier: "SbdGOnUkh1i4+EXAMPLExL/jEvs=",
|
|
273
|
+
* PackedPolicySize: 6,
|
|
274
|
+
* Subject: "SamlExample",
|
|
275
|
+
* SubjectType: "transient"
|
|
276
276
|
* }
|
|
277
277
|
* *\/
|
|
278
|
-
* // example id: to-assume-role-with-saml-14882749597814
|
|
279
278
|
* ```
|
|
280
279
|
*
|
|
280
|
+
* @public
|
|
281
281
|
*/
|
|
282
282
|
export declare class AssumeRoleWithSAMLCommand extends AssumeRoleWithSAMLCommand_base {
|
|
283
283
|
/** @internal type navigation helper, not in runtime. */
|
|
@@ -237,41 +237,41 @@ declare const AssumeRoleWithWebIdentityCommand_base: {
|
|
|
237
237
|
* @throws {@link STSServiceException}
|
|
238
238
|
* <p>Base exception class for all service exceptions from STS service.</p>
|
|
239
239
|
*
|
|
240
|
-
*
|
|
240
|
+
*
|
|
241
241
|
* @example To assume a role as an OpenID Connect-federated user
|
|
242
242
|
* ```javascript
|
|
243
243
|
* //
|
|
244
244
|
* const input = {
|
|
245
|
-
*
|
|
246
|
-
*
|
|
247
|
-
*
|
|
248
|
-
*
|
|
249
|
-
*
|
|
250
|
-
*
|
|
245
|
+
* DurationSeconds: 3600,
|
|
246
|
+
* Policy: `{"Version":"2012-10-17","Statement":[{"Sid":"Stmt1","Effect":"Allow","Action":"s3:ListAllMyBuckets","Resource":"*"}]}`,
|
|
247
|
+
* ProviderId: "www.amazon.com",
|
|
248
|
+
* RoleArn: "arn:aws:iam::123456789012:role/FederatedWebIdentityRole",
|
|
249
|
+
* RoleSessionName: "app1",
|
|
250
|
+
* WebIdentityToken: "Atza%7CIQEBLjAsAhRFiXuWpUXuRvQ9PZL3GMFcYevydwIUFAHZwXZXXXXXXXXJnrulxKDHwy87oGKPznh0D6bEQZTSCzyoCtL_8S07pLpr0zMbn6w1lfVZKNTBdDansFBmtGnIsIapjI6xKR02Yc_2bQ8LZbUXSGm6Ry6_BG7PrtLZtj_dfCTj92xNGed-CrKqjG7nPBjNIL016GGvuS5gSvPRUxWES3VYfm1wl7WTI7jn-Pcb6M-buCgHhFOzTQxod27L9CqnOLio7N3gZAGpsp6n1-AJBOCJckcyXe2c6uD0srOJeZlKUm2eTDVMf8IehDVI0r1QOnTV6KzzAI3OY87Vd_cVMQ"
|
|
251
251
|
* };
|
|
252
252
|
* const command = new AssumeRoleWithWebIdentityCommand(input);
|
|
253
253
|
* const response = await client.send(command);
|
|
254
|
-
* /* response
|
|
254
|
+
* /* response is
|
|
255
255
|
* {
|
|
256
|
-
*
|
|
257
|
-
*
|
|
258
|
-
*
|
|
256
|
+
* AssumedRoleUser: {
|
|
257
|
+
* Arn: "arn:aws:sts::123456789012:assumed-role/FederatedWebIdentityRole/app1",
|
|
258
|
+
* AssumedRoleId: "AROACLKWSDQRAOEXAMPLE:app1"
|
|
259
259
|
* },
|
|
260
|
-
*
|
|
261
|
-
*
|
|
262
|
-
*
|
|
263
|
-
*
|
|
264
|
-
*
|
|
265
|
-
*
|
|
260
|
+
* Audience: "client.5498841531868486423.1548@apps.example.com",
|
|
261
|
+
* Credentials: {
|
|
262
|
+
* AccessKeyId: "AKIAIOSFODNN7EXAMPLE",
|
|
263
|
+
* Expiration: "2014-10-24T23:00:23Z",
|
|
264
|
+
* SecretAccessKey: "wJalrXUtnFEMI/K7MDENG/bPxRfiCYzEXAMPLEKEY",
|
|
265
|
+
* SessionToken: "AQoDYXdzEE0a8ANXXXXXXXXNO1ewxE5TijQyp+IEXAMPLE"
|
|
266
266
|
* },
|
|
267
|
-
*
|
|
268
|
-
*
|
|
269
|
-
*
|
|
267
|
+
* PackedPolicySize: 123,
|
|
268
|
+
* Provider: "www.amazon.com",
|
|
269
|
+
* SubjectFromWebIdentityToken: "amzn1.account.AF6RHO7KZU5XRVQJGXK6HEXAMPLE"
|
|
270
270
|
* }
|
|
271
271
|
* *\/
|
|
272
|
-
* // example id: to-assume-a-role-as-an-openid-connect-federated-user-1480533445696
|
|
273
272
|
* ```
|
|
274
273
|
*
|
|
274
|
+
* @public
|
|
275
275
|
*/
|
|
276
276
|
export declare class AssumeRoleWithWebIdentityCommand extends AssumeRoleWithWebIdentityCommand_base {
|
|
277
277
|
/** @internal type navigation helper, not in runtime. */
|
|
@@ -86,33 +86,33 @@ declare const AssumeRootCommand_base: {
|
|
|
86
86
|
* @throws {@link STSServiceException}
|
|
87
87
|
* <p>Base exception class for all service exceptions from STS service.</p>
|
|
88
88
|
*
|
|
89
|
-
*
|
|
89
|
+
*
|
|
90
90
|
* @example To launch a privileged session
|
|
91
91
|
* ```javascript
|
|
92
92
|
* // The following command retrieves a set of short-term credentials you can use to unlock an S3 bucket for a member account by removing the bucket policy.
|
|
93
93
|
* const input = {
|
|
94
|
-
*
|
|
95
|
-
*
|
|
96
|
-
*
|
|
97
|
-
*
|
|
94
|
+
* DurationSeconds: 900,
|
|
95
|
+
* TargetPrincipal: "111122223333",
|
|
96
|
+
* TaskPolicyArn: {
|
|
97
|
+
* arn: "arn:aws:iam::aws:policy/root-task/S3UnlockBucketPolicy"
|
|
98
98
|
* }
|
|
99
99
|
* };
|
|
100
100
|
* const command = new AssumeRootCommand(input);
|
|
101
101
|
* const response = await client.send(command);
|
|
102
|
-
* /* response
|
|
102
|
+
* /* response is
|
|
103
103
|
* {
|
|
104
|
-
*
|
|
105
|
-
*
|
|
106
|
-
*
|
|
107
|
-
*
|
|
108
|
-
*
|
|
104
|
+
* Credentials: {
|
|
105
|
+
* AccessKeyId: "ASIAJEXAMPLEXEG2JICEA",
|
|
106
|
+
* Expiration: "2024-11-15T00:05:07Z",
|
|
107
|
+
* SecretAccessKey: "9drTJvcXLB89EXAMPLELB8923FB892xMFI",
|
|
108
|
+
* SessionToken: "AQoXdzELDDY//////////wEaoAK1wvxJY12r2IrDFT2IvAzTCn3zHoZ7YNtpiQLF0MqZye/qwjzP2iEXAMPLEbw/m3hsj8VBTkPORGvr9jM5sgP+w9IZWZnU+LWhmg+a5fDi2oTGUYcdg9uexQ4mtCHIHfi4citgqZTgco40Yqr4lIlo4V2b2Dyauk0eYFNebHtYlFVgAUj+7Indz3LU0aTWk1WKIjHmmMCIoTkyYp/k7kUG7moeEYKSitwQIi6Gjn+nyzM+PtoA3685ixzv0R7i5rjQi0YE0lf1oeie3bDiNHncmzosRM6SFiPzSvp6h/32xQuZsjcypmwsPSDtTPYcs0+YN/8BRi2/IcrxSpnWEXAMPLEXSDFTAQAM6Dl9zR0tXoybnlrZIwMLlMi1Kcgo5OytwU="
|
|
109
109
|
* },
|
|
110
|
-
*
|
|
110
|
+
* SourceIdentity: "Alice"
|
|
111
111
|
* }
|
|
112
112
|
* *\/
|
|
113
|
-
* // example id: to-launch-a-privileged-session-1731335424565
|
|
114
113
|
* ```
|
|
115
114
|
*
|
|
115
|
+
* @public
|
|
116
116
|
*/
|
|
117
117
|
export declare class AssumeRootCommand extends AssumeRootCommand_base {
|
|
118
118
|
/** @internal type navigation helper, not in runtime. */
|
|
@@ -94,23 +94,23 @@ declare const DecodeAuthorizationMessageCommand_base: {
|
|
|
94
94
|
* @throws {@link STSServiceException}
|
|
95
95
|
* <p>Base exception class for all service exceptions from STS service.</p>
|
|
96
96
|
*
|
|
97
|
-
*
|
|
97
|
+
*
|
|
98
98
|
* @example To decode information about an authorization status of a request
|
|
99
99
|
* ```javascript
|
|
100
100
|
* //
|
|
101
101
|
* const input = {
|
|
102
|
-
*
|
|
102
|
+
* EncodedMessage: "<encoded-message>"
|
|
103
103
|
* };
|
|
104
104
|
* const command = new DecodeAuthorizationMessageCommand(input);
|
|
105
105
|
* const response = await client.send(command);
|
|
106
|
-
* /* response
|
|
106
|
+
* /* response is
|
|
107
107
|
* {
|
|
108
|
-
*
|
|
108
|
+
* DecodedMessage: `{"allowed": "false","explicitDeny": "false","matchedStatements": "","failures": "","context": {"principal": {"id": "AIDACKCEVSQ6C2EXAMPLE","name": "Bob","arn": "arn:aws:iam::123456789012:user/Bob"},"action": "ec2:StopInstances","resource": "arn:aws:ec2:us-east-1:123456789012:instance/i-dd01c9bd","conditions": [{"item": {"key": "ec2:Tenancy","values": ["default"]},{"item": {"key": "ec2:ResourceTag/elasticbeanstalk:environment-name","values": ["Default-Environment"]}},(Additional items ...)]}}`
|
|
109
109
|
* }
|
|
110
110
|
* *\/
|
|
111
|
-
* // example id: to-decode-information-about-an-authorization-status-of-a-request-1480533854499
|
|
112
111
|
* ```
|
|
113
112
|
*
|
|
113
|
+
* @public
|
|
114
114
|
*/
|
|
115
115
|
export declare class DecodeAuthorizationMessageCommand extends DecodeAuthorizationMessageCommand_base {
|
|
116
116
|
/** @internal type navigation helper, not in runtime. */
|
|
@@ -70,6 +70,7 @@ declare const GetAccessKeyInfoCommand_base: {
|
|
|
70
70
|
* @throws {@link STSServiceException}
|
|
71
71
|
* <p>Base exception class for all service exceptions from STS service.</p>
|
|
72
72
|
*
|
|
73
|
+
*
|
|
73
74
|
* @public
|
|
74
75
|
*/
|
|
75
76
|
export declare class GetAccessKeyInfoCommand extends GetAccessKeyInfoCommand_base {
|
|
@@ -63,55 +63,53 @@ declare const GetCallerIdentityCommand_base: {
|
|
|
63
63
|
* @throws {@link STSServiceException}
|
|
64
64
|
* <p>Base exception class for all service exceptions from STS service.</p>
|
|
65
65
|
*
|
|
66
|
-
*
|
|
66
|
+
*
|
|
67
67
|
* @example To get details about a calling IAM user
|
|
68
68
|
* ```javascript
|
|
69
69
|
* // This example shows a request and response made with the credentials for a user named Alice in the AWS account 123456789012.
|
|
70
|
-
* const input = {};
|
|
70
|
+
* const input = { /* empty *\/ };
|
|
71
71
|
* const command = new GetCallerIdentityCommand(input);
|
|
72
72
|
* const response = await client.send(command);
|
|
73
|
-
* /* response
|
|
73
|
+
* /* response is
|
|
74
74
|
* {
|
|
75
|
-
*
|
|
76
|
-
*
|
|
77
|
-
*
|
|
75
|
+
* Account: "123456789012",
|
|
76
|
+
* Arn: "arn:aws:iam::123456789012:user/Alice",
|
|
77
|
+
* UserId: "AKIAI44QH8DHBEXAMPLE"
|
|
78
78
|
* }
|
|
79
79
|
* *\/
|
|
80
|
-
* // example id: to-get-details-about-a-calling-iam-user-1480540050376
|
|
81
80
|
* ```
|
|
82
81
|
*
|
|
83
82
|
* @example To get details about a calling user federated with AssumeRole
|
|
84
83
|
* ```javascript
|
|
85
84
|
* // This example shows a request and response made with temporary credentials created by AssumeRole. The name of the assumed role is my-role-name, and the RoleSessionName is set to my-role-session-name.
|
|
86
|
-
* const input = {};
|
|
85
|
+
* const input = { /* empty *\/ };
|
|
87
86
|
* const command = new GetCallerIdentityCommand(input);
|
|
88
87
|
* const response = await client.send(command);
|
|
89
|
-
* /* response
|
|
88
|
+
* /* response is
|
|
90
89
|
* {
|
|
91
|
-
*
|
|
92
|
-
*
|
|
93
|
-
*
|
|
90
|
+
* Account: "123456789012",
|
|
91
|
+
* Arn: "arn:aws:sts::123456789012:assumed-role/my-role-name/my-role-session-name",
|
|
92
|
+
* UserId: "AKIAI44QH8DHBEXAMPLE:my-role-session-name"
|
|
94
93
|
* }
|
|
95
94
|
* *\/
|
|
96
|
-
* // example id: to-get-details-about-a-calling-user-federated-with-assumerole-1480540158545
|
|
97
95
|
* ```
|
|
98
96
|
*
|
|
99
97
|
* @example To get details about a calling user federated with GetFederationToken
|
|
100
98
|
* ```javascript
|
|
101
99
|
* // This example shows a request and response made with temporary credentials created by using GetFederationToken. The Name parameter is set to my-federated-user-name.
|
|
102
|
-
* const input = {};
|
|
100
|
+
* const input = { /* empty *\/ };
|
|
103
101
|
* const command = new GetCallerIdentityCommand(input);
|
|
104
102
|
* const response = await client.send(command);
|
|
105
|
-
* /* response
|
|
103
|
+
* /* response is
|
|
106
104
|
* {
|
|
107
|
-
*
|
|
108
|
-
*
|
|
109
|
-
*
|
|
105
|
+
* Account: "123456789012",
|
|
106
|
+
* Arn: "arn:aws:sts::123456789012:federated-user/my-federated-user-name",
|
|
107
|
+
* UserId: "123456789012:my-federated-user-name"
|
|
110
108
|
* }
|
|
111
109
|
* *\/
|
|
112
|
-
* // example id: to-get-details-about-a-calling-user-federated-with-getfederationtoken-1480540231316
|
|
113
110
|
* ```
|
|
114
111
|
*
|
|
112
|
+
* @public
|
|
115
113
|
*/
|
|
116
114
|
export declare class GetCallerIdentityCommand extends GetCallerIdentityCommand_base {
|
|
117
115
|
/** @internal type navigation helper, not in runtime. */
|
|
@@ -187,45 +187,45 @@ declare const GetFederationTokenCommand_base: {
|
|
|
187
187
|
* @throws {@link STSServiceException}
|
|
188
188
|
* <p>Base exception class for all service exceptions from STS service.</p>
|
|
189
189
|
*
|
|
190
|
-
*
|
|
190
|
+
*
|
|
191
191
|
* @example To get temporary credentials for a role by using GetFederationToken
|
|
192
192
|
* ```javascript
|
|
193
193
|
* //
|
|
194
194
|
* const input = {
|
|
195
|
-
*
|
|
196
|
-
*
|
|
197
|
-
*
|
|
198
|
-
*
|
|
195
|
+
* DurationSeconds: 3600,
|
|
196
|
+
* Name: "testFedUserSession",
|
|
197
|
+
* Policy: `{"Version":"2012-10-17","Statement":[{"Sid":"Stmt1","Effect":"Allow","Action":"s3:ListAllMyBuckets","Resource":"*"}]}`,
|
|
198
|
+
* Tags: [
|
|
199
199
|
* {
|
|
200
|
-
*
|
|
201
|
-
*
|
|
200
|
+
* Key: "Project",
|
|
201
|
+
* Value: "Pegasus"
|
|
202
202
|
* },
|
|
203
203
|
* {
|
|
204
|
-
*
|
|
205
|
-
*
|
|
204
|
+
* Key: "Cost-Center",
|
|
205
|
+
* Value: "98765"
|
|
206
206
|
* }
|
|
207
207
|
* ]
|
|
208
208
|
* };
|
|
209
209
|
* const command = new GetFederationTokenCommand(input);
|
|
210
210
|
* const response = await client.send(command);
|
|
211
|
-
* /* response
|
|
211
|
+
* /* response is
|
|
212
212
|
* {
|
|
213
|
-
*
|
|
214
|
-
*
|
|
215
|
-
*
|
|
216
|
-
*
|
|
217
|
-
*
|
|
213
|
+
* Credentials: {
|
|
214
|
+
* AccessKeyId: "AKIAIOSFODNN7EXAMPLE",
|
|
215
|
+
* Expiration: "2011-07-15T23:28:33.359Z",
|
|
216
|
+
* SecretAccessKey: "wJalrXUtnFEMI/K7MDENG/bPxRfiCYzEXAMPLEKEY",
|
|
217
|
+
* SessionToken: "AQoDYXdzEPT//////////wEXAMPLEtc764bNrC9SAPBSM22wDOk4x4HIZ8j4FZTwdQWLWsKWHGBuFqwAeMicRXmxfpSPfIeoIYRqTflfKD8YUuwthAx7mSEI/qkPpKPi/kMcGdQrmGdeehM4IC1NtBmUpp2wUE8phUZampKsburEDy0KPkyQDYwT7WZ0wq5VSXDvp75YU9HFvlRd8Tx6q6fE8YQcHNVXAkiY9q6d+xo0rKwT38xVqr7ZD0u0iPPkUL64lIZbqBAz+scqKmlzm8FDrypNC9Yjc8fPOLn9FX9KSYvKTr4rvx3iSIlTJabIQwj2ICCR/oLxBA=="
|
|
218
218
|
* },
|
|
219
|
-
*
|
|
220
|
-
*
|
|
221
|
-
*
|
|
219
|
+
* FederatedUser: {
|
|
220
|
+
* Arn: "arn:aws:sts::123456789012:federated-user/Bob",
|
|
221
|
+
* FederatedUserId: "123456789012:Bob"
|
|
222
222
|
* },
|
|
223
|
-
*
|
|
223
|
+
* PackedPolicySize: 8
|
|
224
224
|
* }
|
|
225
225
|
* *\/
|
|
226
|
-
* // example id: to-get-temporary-credentials-for-a-role-by-using-getfederationtoken-1480540749900
|
|
227
226
|
* ```
|
|
228
227
|
*
|
|
228
|
+
* @public
|
|
229
229
|
*/
|
|
230
230
|
export declare class GetFederationTokenCommand extends GetFederationTokenCommand_base {
|
|
231
231
|
/** @internal type navigation helper, not in runtime. */
|
|
@@ -126,30 +126,30 @@ declare const GetSessionTokenCommand_base: {
|
|
|
126
126
|
* @throws {@link STSServiceException}
|
|
127
127
|
* <p>Base exception class for all service exceptions from STS service.</p>
|
|
128
128
|
*
|
|
129
|
-
*
|
|
129
|
+
*
|
|
130
130
|
* @example To get temporary credentials for an IAM user or an AWS account
|
|
131
131
|
* ```javascript
|
|
132
132
|
* //
|
|
133
133
|
* const input = {
|
|
134
|
-
*
|
|
135
|
-
*
|
|
136
|
-
*
|
|
134
|
+
* DurationSeconds: 3600,
|
|
135
|
+
* SerialNumber: "YourMFASerialNumber",
|
|
136
|
+
* TokenCode: "123456"
|
|
137
137
|
* };
|
|
138
138
|
* const command = new GetSessionTokenCommand(input);
|
|
139
139
|
* const response = await client.send(command);
|
|
140
|
-
* /* response
|
|
140
|
+
* /* response is
|
|
141
141
|
* {
|
|
142
|
-
*
|
|
143
|
-
*
|
|
144
|
-
*
|
|
145
|
-
*
|
|
146
|
-
*
|
|
142
|
+
* Credentials: {
|
|
143
|
+
* AccessKeyId: "AKIAIOSFODNN7EXAMPLE",
|
|
144
|
+
* Expiration: "2011-07-11T19:55:29.611Z",
|
|
145
|
+
* SecretAccessKey: "wJalrXUtnFEMI/K7MDENG/bPxRfiCYzEXAMPLEKEY",
|
|
146
|
+
* SessionToken: "AQoEXAMPLEH4aoAH0gNCAPyJxz4BlCFFxWNE1OPTgk5TthT+FvwqnKwRcOIfrRh3c/LTo6UDdyJwOOvEVPvLXCrrrUtdnniCEXAMPLE/IvU1dYUg2RVAJBanLiHb4IgRmpRV3zrkuWJOgQs8IZZaIv2BXIa2R4OlgkBN9bkUDNCJiBeb/AXlzBBko7b15fjrBs2+cTQtpZ3CYWFXG8C5zqx37wnOE49mRl/+OtkIKGO7fAE"
|
|
147
147
|
* }
|
|
148
148
|
* }
|
|
149
149
|
* *\/
|
|
150
|
-
* // example id: to-get-temporary-credentials-for-an-iam-user-or-an-aws-account-1480540814038
|
|
151
150
|
* ```
|
|
152
151
|
*
|
|
152
|
+
* @public
|
|
153
153
|
*/
|
|
154
154
|
export declare class GetSessionTokenCommand extends GetSessionTokenCommand_base {
|
|
155
155
|
/** @internal type navigation helper, not in runtime. */
|
package/package.json
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@aws-sdk/client-sts",
|
|
3
3
|
"description": "AWS SDK for JavaScript Sts Client for Node.js, Browser and React Native",
|
|
4
|
-
"version": "3.
|
|
4
|
+
"version": "3.777.0",
|
|
5
5
|
"scripts": {
|
|
6
6
|
"build": "concurrently 'yarn:build:cjs' 'yarn:build:es' 'yarn:build:types'",
|
|
7
7
|
"build:cjs": "node ../../scripts/compilation/inline client-sts",
|
|
@@ -23,7 +23,7 @@
|
|
|
23
23
|
"@aws-crypto/sha256-browser": "5.2.0",
|
|
24
24
|
"@aws-crypto/sha256-js": "5.2.0",
|
|
25
25
|
"@aws-sdk/core": "3.775.0",
|
|
26
|
-
"@aws-sdk/credential-provider-node": "3.
|
|
26
|
+
"@aws-sdk/credential-provider-node": "3.777.0",
|
|
27
27
|
"@aws-sdk/middleware-host-header": "3.775.0",
|
|
28
28
|
"@aws-sdk/middleware-logger": "3.775.0",
|
|
29
29
|
"@aws-sdk/middleware-recursion-detection": "3.775.0",
|