@cdk8s/awscdk-resolver 0.0.198 → 0.0.200
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.jsii +4 -4
- package/lib/resolve.js +1 -1
- package/node_modules/@aws-sdk/client-cloudformation/package.json +36 -36
- package/node_modules/@aws-sdk/client-sso/package.json +32 -32
- package/node_modules/@aws-sdk/client-sso-oidc/package.json +34 -34
- package/node_modules/@aws-sdk/client-sts/README.md +8 -0
- package/node_modules/@aws-sdk/client-sts/dist-cjs/index.js +89 -12
- package/node_modules/@aws-sdk/client-sts/dist-es/STS.js +2 -0
- package/node_modules/@aws-sdk/client-sts/dist-es/commands/AssumeRootCommand.js +23 -0
- package/node_modules/@aws-sdk/client-sts/dist-es/commands/index.js +1 -0
- package/node_modules/@aws-sdk/client-sts/dist-es/models/models_0.js +4 -0
- package/node_modules/@aws-sdk/client-sts/dist-es/protocols/Aws_query.js +53 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/STS.d.ts +7 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/STSClient.d.ts +3 -2
- package/node_modules/@aws-sdk/client-sts/dist-types/commands/AssumeRoleCommand.d.ts +13 -13
- package/node_modules/@aws-sdk/client-sts/dist-types/commands/AssumeRoleWithSAMLCommand.d.ts +8 -8
- package/node_modules/@aws-sdk/client-sts/dist-types/commands/AssumeRoleWithWebIdentityCommand.d.ts +15 -30
- package/node_modules/@aws-sdk/client-sts/dist-types/commands/AssumeRootCommand.d.ts +129 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/commands/DecodeAuthorizationMessageCommand.d.ts +2 -2
- package/node_modules/@aws-sdk/client-sts/dist-types/commands/GetFederationTokenCommand.d.ts +8 -8
- package/node_modules/@aws-sdk/client-sts/dist-types/commands/GetSessionTokenCommand.d.ts +6 -6
- package/node_modules/@aws-sdk/client-sts/dist-types/commands/index.d.ts +1 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/models/models_0.d.ts +146 -32
- package/node_modules/@aws-sdk/client-sts/dist-types/protocols/Aws_query.d.ts +9 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/ts3.4/STS.d.ts +17 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/ts3.4/STSClient.d.ts +6 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/ts3.4/commands/AssumeRootCommand.d.ts +47 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/ts3.4/commands/index.d.ts +1 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/ts3.4/models/models_0.d.ts +12 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/ts3.4/protocols/Aws_query.d.ts +12 -0
- package/node_modules/@aws-sdk/client-sts/package.json +36 -36
- package/node_modules/@aws-sdk/core/package.json +14 -14
- package/node_modules/@aws-sdk/credential-provider-env/package.json +7 -7
- package/node_modules/@aws-sdk/credential-provider-http/package.json +12 -12
- package/node_modules/@aws-sdk/credential-provider-ini/package.json +15 -15
- package/node_modules/@aws-sdk/credential-provider-node/package.json +14 -14
- package/node_modules/@aws-sdk/credential-provider-process/package.json +8 -8
- package/node_modules/@aws-sdk/credential-provider-sso/package.json +10 -10
- package/node_modules/@aws-sdk/credential-provider-web-identity/package.json +8 -8
- package/node_modules/@aws-sdk/middleware-host-header/package.json +8 -8
- package/node_modules/@aws-sdk/middleware-logger/package.json +7 -7
- package/node_modules/@aws-sdk/middleware-recursion-detection/package.json +8 -8
- package/node_modules/@aws-sdk/middleware-user-agent/package.json +11 -11
- package/node_modules/@aws-sdk/region-config-resolver/package.json +7 -7
- package/node_modules/@aws-sdk/token-providers/package.json +8 -8
- package/node_modules/@aws-sdk/types/package.json +2 -2
- package/node_modules/@aws-sdk/util-endpoints/package.json +8 -8
- package/node_modules/@aws-sdk/util-locate-window/package.json +3 -3
- package/node_modules/@aws-sdk/util-user-agent-browser/package.json +5 -5
- package/node_modules/@aws-sdk/util-user-agent-node/package.json +7 -7
- package/node_modules/@smithy/abort-controller/package.json +4 -3
- package/node_modules/@smithy/config-resolver/package.json +7 -6
- package/node_modules/@smithy/core/dist-cjs/submodules/protocols/index.js +21 -20
- package/node_modules/@smithy/core/dist-es/submodules/protocols/requestBuilder.js +1 -1
- package/node_modules/@smithy/core/package.json +10 -9
- package/node_modules/@smithy/credential-provider-imds/package.json +7 -7
- package/node_modules/@smithy/fetch-http-handler/dist-cjs/create-request.js +1 -0
- package/node_modules/@smithy/fetch-http-handler/dist-cjs/index.js +10 -3
- package/node_modules/@smithy/fetch-http-handler/dist-es/create-request.js +3 -0
- package/node_modules/@smithy/fetch-http-handler/dist-es/fetch-http-handler.js +3 -2
- package/node_modules/@smithy/fetch-http-handler/dist-es/stream-collector.js +1 -1
- package/node_modules/@smithy/fetch-http-handler/dist-types/create-request.d.ts +6 -0
- package/node_modules/@smithy/fetch-http-handler/dist-types/fetch-http-handler.d.ts +6 -0
- package/node_modules/@smithy/fetch-http-handler/dist-types/ts3.4/create-request.d.ts +6 -0
- package/node_modules/@smithy/fetch-http-handler/dist-types/ts3.4/fetch-http-handler.d.ts +6 -0
- package/node_modules/@smithy/fetch-http-handler/package.json +9 -6
- package/node_modules/@smithy/hash-node/package.json +4 -3
- package/node_modules/@smithy/invalid-dependency/package.json +4 -3
- package/node_modules/@smithy/middleware-content-length/package.json +5 -4
- package/node_modules/@smithy/middleware-endpoint/package.json +11 -10
- package/node_modules/@smithy/middleware-retry/package.json +12 -10
- package/node_modules/@smithy/middleware-serde/package.json +6 -4
- package/node_modules/@smithy/middleware-stack/package.json +4 -3
- package/node_modules/@smithy/node-config-provider/package.json +6 -5
- package/node_modules/@smithy/node-http-handler/dist-cjs/index.js +20 -14
- package/node_modules/@smithy/node-http-handler/dist-cjs/timing.js +1 -0
- package/node_modules/@smithy/node-http-handler/dist-es/node-http-handler.js +5 -4
- package/node_modules/@smithy/node-http-handler/dist-es/node-http2-connection-manager.js +1 -1
- package/node_modules/@smithy/node-http-handler/dist-es/server.mock.js +9 -2
- package/node_modules/@smithy/node-http-handler/dist-es/set-connection-timeout.js +5 -4
- package/node_modules/@smithy/node-http-handler/dist-es/set-socket-keep-alive.js +2 -1
- package/node_modules/@smithy/node-http-handler/dist-es/set-socket-timeout.js +2 -1
- package/node_modules/@smithy/node-http-handler/dist-es/timing.js +4 -0
- package/node_modules/@smithy/node-http-handler/dist-es/write-request-body.js +4 -3
- package/node_modules/@smithy/node-http-handler/dist-types/timing.d.ts +8 -0
- package/node_modules/@smithy/node-http-handler/dist-types/ts3.4/timing.d.ts +8 -0
- package/node_modules/@smithy/node-http-handler/package.json +7 -6
- package/node_modules/@smithy/property-provider/package.json +4 -3
- package/node_modules/@smithy/protocol-http/package.json +4 -3
- package/node_modules/@smithy/querystring-builder/package.json +2 -2
- package/node_modules/@smithy/querystring-parser/package.json +4 -3
- package/node_modules/@smithy/service-error-classification/package.json +4 -3
- package/node_modules/@smithy/shared-ini-file-loader/package.json +4 -3
- package/node_modules/@smithy/signature-v4/package.json +6 -5
- package/node_modules/@smithy/smithy-client/package.json +9 -8
- package/node_modules/@smithy/types/dist-types/http.d.ts +1 -0
- package/node_modules/@smithy/types/dist-types/transform/no-undefined.d.ts +3 -2
- package/node_modules/@smithy/types/dist-types/ts3.4/http.d.ts +1 -0
- package/node_modules/@smithy/types/dist-types/ts3.4/transform/no-undefined.d.ts +3 -2
- package/node_modules/@smithy/types/package.json +1 -1
- package/node_modules/@smithy/url-parser/package.json +5 -4
- package/node_modules/@smithy/util-defaults-mode-browser/package.json +6 -5
- package/node_modules/@smithy/util-defaults-mode-node/package.json +9 -8
- package/node_modules/@smithy/util-endpoints/package.json +7 -5
- package/node_modules/@smithy/util-middleware/package.json +4 -3
- package/node_modules/@smithy/util-retry/dist-cjs/index.js +5 -1
- package/node_modules/@smithy/util-retry/dist-es/DefaultRateLimiter.js +2 -1
- package/node_modules/@smithy/util-retry/dist-types/DefaultRateLimiter.d.ts +4 -0
- package/node_modules/@smithy/util-retry/dist-types/ts3.4/DefaultRateLimiter.d.ts +4 -0
- package/node_modules/@smithy/util-retry/package.json +5 -4
- package/node_modules/@smithy/util-stream/dist-cjs/index.js +1 -0
- package/node_modules/@smithy/util-stream/dist-cjs/sdk-stream-mixin.js +1 -2
- package/node_modules/@smithy/util-stream/dist-cjs/splitStream.js +1 -1
- package/node_modules/@smithy/util-stream/dist-cjs/stream-type-check.js +6 -1
- package/node_modules/@smithy/util-stream/dist-es/sdk-stream-mixin.js +0 -1
- package/node_modules/@smithy/util-stream/dist-es/splitStream.js +2 -2
- package/node_modules/@smithy/util-stream/dist-es/stream-type-check.js +3 -0
- package/node_modules/@smithy/util-stream/dist-types/stream-type-check.d.ts +4 -0
- package/node_modules/@smithy/util-stream/dist-types/ts3.4/stream-type-check.d.ts +4 -0
- package/node_modules/@smithy/util-stream/package.json +10 -6
- package/node_modules/@smithy/util-waiter/package.json +5 -4
- package/package.json +4 -4
@@ -33,6 +33,16 @@ export const se_AssumeRoleWithWebIdentityCommand = async (input, context) => {
|
|
33
33
|
});
|
34
34
|
return buildHttpRpcRequest(context, headers, "/", undefined, body);
|
35
35
|
};
|
36
|
+
export const se_AssumeRootCommand = async (input, context) => {
|
37
|
+
const headers = SHARED_HEADERS;
|
38
|
+
let body;
|
39
|
+
body = buildFormUrlencodedString({
|
40
|
+
...se_AssumeRootRequest(input, context),
|
41
|
+
[_A]: _ARs,
|
42
|
+
[_V]: _,
|
43
|
+
});
|
44
|
+
return buildHttpRpcRequest(context, headers, "/", undefined, body);
|
45
|
+
};
|
36
46
|
export const se_DecodeAuthorizationMessageCommand = async (input, context) => {
|
37
47
|
const headers = SHARED_HEADERS;
|
38
48
|
let body;
|
@@ -122,6 +132,19 @@ export const de_AssumeRoleWithWebIdentityCommand = async (output, context) => {
|
|
122
132
|
};
|
123
133
|
return response;
|
124
134
|
};
|
135
|
+
export const de_AssumeRootCommand = async (output, context) => {
|
136
|
+
if (output.statusCode >= 300) {
|
137
|
+
return de_CommandError(output, context);
|
138
|
+
}
|
139
|
+
const data = await parseBody(output.body, context);
|
140
|
+
let contents = {};
|
141
|
+
contents = de_AssumeRootResponse(data.AssumeRootResult, context);
|
142
|
+
const response = {
|
143
|
+
$metadata: deserializeMetadata(output),
|
144
|
+
...contents,
|
145
|
+
};
|
146
|
+
return response;
|
147
|
+
};
|
125
148
|
export const de_DecodeAuthorizationMessageCommand = async (output, context) => {
|
126
149
|
if (output.statusCode >= 300) {
|
127
150
|
return de_CommandError(output, context);
|
@@ -428,6 +451,23 @@ const se_AssumeRoleWithWebIdentityRequest = (input, context) => {
|
|
428
451
|
}
|
429
452
|
return entries;
|
430
453
|
};
|
454
|
+
const se_AssumeRootRequest = (input, context) => {
|
455
|
+
const entries = {};
|
456
|
+
if (input[_TP] != null) {
|
457
|
+
entries[_TP] = input[_TP];
|
458
|
+
}
|
459
|
+
if (input[_TPA] != null) {
|
460
|
+
const memberEntries = se_PolicyDescriptorType(input[_TPA], context);
|
461
|
+
Object.entries(memberEntries).forEach(([key, value]) => {
|
462
|
+
const loc = `TaskPolicyArn.${key}`;
|
463
|
+
entries[loc] = value;
|
464
|
+
});
|
465
|
+
}
|
466
|
+
if (input[_DS] != null) {
|
467
|
+
entries[_DS] = input[_DS];
|
468
|
+
}
|
469
|
+
return entries;
|
470
|
+
};
|
431
471
|
const se_DecodeAuthorizationMessageRequest = (input, context) => {
|
432
472
|
const entries = {};
|
433
473
|
if (input[_EM] != null) {
|
@@ -658,6 +698,16 @@ const de_AssumeRoleWithWebIdentityResponse = (output, context) => {
|
|
658
698
|
}
|
659
699
|
return contents;
|
660
700
|
};
|
701
|
+
const de_AssumeRootResponse = (output, context) => {
|
702
|
+
const contents = {};
|
703
|
+
if (output[_C] != null) {
|
704
|
+
contents[_C] = de_Credentials(output[_C], context);
|
705
|
+
}
|
706
|
+
if (output[_SI] != null) {
|
707
|
+
contents[_SI] = __expectString(output[_SI]);
|
708
|
+
}
|
709
|
+
return contents;
|
710
|
+
};
|
661
711
|
const de_Credentials = (output, context) => {
|
662
712
|
const contents = {};
|
663
713
|
if (output[_AKI] != null) {
|
@@ -824,6 +874,7 @@ const _ARI = "AssumedRoleId";
|
|
824
874
|
const _ARU = "AssumedRoleUser";
|
825
875
|
const _ARWSAML = "AssumeRoleWithSAML";
|
826
876
|
const _ARWWI = "AssumeRoleWithWebIdentity";
|
877
|
+
const _ARs = "AssumeRoot";
|
827
878
|
const _Ac = "Account";
|
828
879
|
const _Ar = "Arn";
|
829
880
|
const _Au = "Audience";
|
@@ -865,6 +916,8 @@ const _ST = "SubjectType";
|
|
865
916
|
const _STe = "SessionToken";
|
866
917
|
const _T = "Tags";
|
867
918
|
const _TC = "TokenCode";
|
919
|
+
const _TP = "TargetPrincipal";
|
920
|
+
const _TPA = "TaskPolicyArn";
|
868
921
|
const _TTK = "TransitiveTagKeys";
|
869
922
|
const _UI = "UserId";
|
870
923
|
const _V = "Version";
|
@@ -2,6 +2,7 @@ import { HttpHandlerOptions as __HttpHandlerOptions } from "@smithy/types";
|
|
2
2
|
import { AssumeRoleCommandInput, AssumeRoleCommandOutput } from "./commands/AssumeRoleCommand";
|
3
3
|
import { AssumeRoleWithSAMLCommandInput, AssumeRoleWithSAMLCommandOutput } from "./commands/AssumeRoleWithSAMLCommand";
|
4
4
|
import { AssumeRoleWithWebIdentityCommandInput, AssumeRoleWithWebIdentityCommandOutput } from "./commands/AssumeRoleWithWebIdentityCommand";
|
5
|
+
import { AssumeRootCommandInput, AssumeRootCommandOutput } from "./commands/AssumeRootCommand";
|
5
6
|
import { DecodeAuthorizationMessageCommandInput, DecodeAuthorizationMessageCommandOutput } from "./commands/DecodeAuthorizationMessageCommand";
|
6
7
|
import { GetAccessKeyInfoCommandInput, GetAccessKeyInfoCommandOutput } from "./commands/GetAccessKeyInfoCommand";
|
7
8
|
import { GetCallerIdentityCommandInput, GetCallerIdentityCommandOutput } from "./commands/GetCallerIdentityCommand";
|
@@ -27,6 +28,12 @@ export interface STS {
|
|
27
28
|
assumeRoleWithWebIdentity(args: AssumeRoleWithWebIdentityCommandInput, options?: __HttpHandlerOptions): Promise<AssumeRoleWithWebIdentityCommandOutput>;
|
28
29
|
assumeRoleWithWebIdentity(args: AssumeRoleWithWebIdentityCommandInput, cb: (err: any, data?: AssumeRoleWithWebIdentityCommandOutput) => void): void;
|
29
30
|
assumeRoleWithWebIdentity(args: AssumeRoleWithWebIdentityCommandInput, options: __HttpHandlerOptions, cb: (err: any, data?: AssumeRoleWithWebIdentityCommandOutput) => void): void;
|
31
|
+
/**
|
32
|
+
* @see {@link AssumeRootCommand}
|
33
|
+
*/
|
34
|
+
assumeRoot(args: AssumeRootCommandInput, options?: __HttpHandlerOptions): Promise<AssumeRootCommandOutput>;
|
35
|
+
assumeRoot(args: AssumeRootCommandInput, cb: (err: any, data?: AssumeRootCommandOutput) => void): void;
|
36
|
+
assumeRoot(args: AssumeRootCommandInput, options: __HttpHandlerOptions, cb: (err: any, data?: AssumeRootCommandOutput) => void): void;
|
30
37
|
/**
|
31
38
|
* @see {@link DecodeAuthorizationMessageCommand}
|
32
39
|
*/
|
@@ -10,6 +10,7 @@ import { HttpAuthSchemeInputConfig, HttpAuthSchemeResolvedConfig } from "./auth/
|
|
10
10
|
import { AssumeRoleCommandInput, AssumeRoleCommandOutput } from "./commands/AssumeRoleCommand";
|
11
11
|
import { AssumeRoleWithSAMLCommandInput, AssumeRoleWithSAMLCommandOutput } from "./commands/AssumeRoleWithSAMLCommand";
|
12
12
|
import { AssumeRoleWithWebIdentityCommandInput, AssumeRoleWithWebIdentityCommandOutput } from "./commands/AssumeRoleWithWebIdentityCommand";
|
13
|
+
import { AssumeRootCommandInput, AssumeRootCommandOutput } from "./commands/AssumeRootCommand";
|
13
14
|
import { DecodeAuthorizationMessageCommandInput, DecodeAuthorizationMessageCommandOutput } from "./commands/DecodeAuthorizationMessageCommand";
|
14
15
|
import { GetAccessKeyInfoCommandInput, GetAccessKeyInfoCommandOutput } from "./commands/GetAccessKeyInfoCommand";
|
15
16
|
import { GetCallerIdentityCommandInput, GetCallerIdentityCommandOutput } from "./commands/GetCallerIdentityCommand";
|
@@ -21,11 +22,11 @@ export { __Client };
|
|
21
22
|
/**
|
22
23
|
* @public
|
23
24
|
*/
|
24
|
-
export type ServiceInputTypes = AssumeRoleCommandInput | AssumeRoleWithSAMLCommandInput | AssumeRoleWithWebIdentityCommandInput | DecodeAuthorizationMessageCommandInput | GetAccessKeyInfoCommandInput | GetCallerIdentityCommandInput | GetFederationTokenCommandInput | GetSessionTokenCommandInput;
|
25
|
+
export type ServiceInputTypes = AssumeRoleCommandInput | AssumeRoleWithSAMLCommandInput | AssumeRoleWithWebIdentityCommandInput | AssumeRootCommandInput | DecodeAuthorizationMessageCommandInput | GetAccessKeyInfoCommandInput | GetCallerIdentityCommandInput | GetFederationTokenCommandInput | GetSessionTokenCommandInput;
|
25
26
|
/**
|
26
27
|
* @public
|
27
28
|
*/
|
28
|
-
export type ServiceOutputTypes = AssumeRoleCommandOutput | AssumeRoleWithSAMLCommandOutput | AssumeRoleWithWebIdentityCommandOutput | DecodeAuthorizationMessageCommandOutput | GetAccessKeyInfoCommandOutput | GetCallerIdentityCommandOutput | GetFederationTokenCommandOutput | GetSessionTokenCommandOutput;
|
29
|
+
export type ServiceOutputTypes = AssumeRoleCommandOutput | AssumeRoleWithSAMLCommandOutput | AssumeRoleWithWebIdentityCommandOutput | AssumeRootCommandOutput | DecodeAuthorizationMessageCommandOutput | GetAccessKeyInfoCommandOutput | GetCallerIdentityCommandOutput | GetFederationTokenCommandOutput | GetSessionTokenCommandOutput;
|
29
30
|
/**
|
30
31
|
* @public
|
31
32
|
*/
|
@@ -32,8 +32,8 @@ declare const AssumeRoleCommand_base: {
|
|
32
32
|
* and a security token. Typically, you use <code>AssumeRole</code> within your account or for
|
33
33
|
* cross-account access. For a comparison of <code>AssumeRole</code> with other API operations
|
34
34
|
* that produce temporary credentials, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html">Requesting Temporary Security
|
35
|
-
* Credentials</a> and <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
36
|
-
*
|
35
|
+
* Credentials</a> and <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_sts-comparison.html">Compare STS
|
36
|
+
* credentials</a> in the <i>IAM User Guide</i>.</p>
|
37
37
|
* <p>
|
38
38
|
* <b>Permissions</b>
|
39
39
|
* </p>
|
@@ -41,11 +41,11 @@ declare const AssumeRoleCommand_base: {
|
|
41
41
|
* make API calls to any Amazon Web Services service with the following exception: You cannot call the
|
42
42
|
* Amazon Web Services STS <code>GetFederationToken</code> or <code>GetSessionToken</code> API
|
43
43
|
* operations.</p>
|
44
|
-
* <p>(Optional) You can pass inline or managed
|
45
|
-
*
|
46
|
-
*
|
47
|
-
*
|
48
|
-
*
|
44
|
+
* <p>(Optional) You can pass inline or managed session policies to this operation. You can
|
45
|
+
* pass a single JSON policy document to use as an inline session policy. You can also specify
|
46
|
+
* up to 10 managed policy Amazon Resource Names (ARNs) to use as managed session policies.
|
47
|
+
* The plaintext that you use for both inline and managed session policies can't exceed 2,048
|
48
|
+
* characters. Passing policies to this operation returns new
|
49
49
|
* temporary credentials. The resulting session's permissions are the intersection of the
|
50
50
|
* role's identity-based policy and the session policies. You can use the role's temporary
|
51
51
|
* credentials in subsequent Amazon Web Services API calls to access resources in the account that owns
|
@@ -192,15 +192,15 @@ declare const AssumeRoleCommand_base: {
|
|
192
192
|
* tags are to the upper size limit. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html">Passing Session Tags in STS</a> in
|
193
193
|
* the <i>IAM User Guide</i>.</p>
|
194
194
|
* <p>You could receive this error even though you meet other defined session policy and
|
195
|
-
* session tag limits. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-limits-entity-length">IAM and STS Entity
|
196
|
-
*
|
195
|
+
* session tag limits. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-limits-entity-length">IAM and STS Entity Character Limits</a> in the <i>IAM User
|
196
|
+
* Guide</i>.</p>
|
197
197
|
*
|
198
198
|
* @throws {@link RegionDisabledException} (client fault)
|
199
199
|
* <p>STS is not activated in the requested region for the account that is being asked to
|
200
|
-
* generate credentials. The account administrator must use the IAM console to activate
|
201
|
-
* in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html">Activating and
|
202
|
-
* Deactivating
|
203
|
-
*
|
200
|
+
* generate credentials. The account administrator must use the IAM console to activate
|
201
|
+
* STS in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html">Activating and
|
202
|
+
* Deactivating STS in an Amazon Web Services Region</a> in the <i>IAM User
|
203
|
+
* Guide</i>.</p>
|
204
204
|
*
|
205
205
|
* @throws {@link STSServiceException}
|
206
206
|
* <p>Base exception class for all service exceptions from STS service.</p>
|
@@ -32,8 +32,8 @@ declare const AssumeRoleWithSAMLCommand_base: {
|
|
32
32
|
* enterprise identity store or directory to role-based Amazon Web Services access without user-specific
|
33
33
|
* credentials or configuration. For a comparison of <code>AssumeRoleWithSAML</code> with the
|
34
34
|
* other API operations that produce temporary credentials, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html">Requesting Temporary Security
|
35
|
-
* Credentials</a> and <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
36
|
-
*
|
35
|
+
* Credentials</a> and <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_sts-comparison.html">Compare STS
|
36
|
+
* credentials</a> in the <i>IAM User Guide</i>.</p>
|
37
37
|
* <p>The temporary security credentials returned by this operation consist of an access key
|
38
38
|
* ID, a secret access key, and a security token. Applications can use these temporary
|
39
39
|
* security credentials to sign calls to Amazon Web Services services.</p>
|
@@ -230,15 +230,15 @@ declare const AssumeRoleWithSAMLCommand_base: {
|
|
230
230
|
* tags are to the upper size limit. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html">Passing Session Tags in STS</a> in
|
231
231
|
* the <i>IAM User Guide</i>.</p>
|
232
232
|
* <p>You could receive this error even though you meet other defined session policy and
|
233
|
-
* session tag limits. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-limits-entity-length">IAM and STS Entity
|
234
|
-
*
|
233
|
+
* session tag limits. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-limits-entity-length">IAM and STS Entity Character Limits</a> in the <i>IAM User
|
234
|
+
* Guide</i>.</p>
|
235
235
|
*
|
236
236
|
* @throws {@link RegionDisabledException} (client fault)
|
237
237
|
* <p>STS is not activated in the requested region for the account that is being asked to
|
238
|
-
* generate credentials. The account administrator must use the IAM console to activate
|
239
|
-
* in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html">Activating and
|
240
|
-
* Deactivating
|
241
|
-
*
|
238
|
+
* generate credentials. The account administrator must use the IAM console to activate
|
239
|
+
* STS in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html">Activating and
|
240
|
+
* Deactivating STS in an Amazon Web Services Region</a> in the <i>IAM User
|
241
|
+
* Guide</i>.</p>
|
242
242
|
*
|
243
243
|
* @throws {@link STSServiceException}
|
244
244
|
* <p>Base exception class for all service exceptions from STS service.</p>
|
package/node_modules/@aws-sdk/client-sts/dist-types/commands/AssumeRoleWithWebIdentityCommand.d.ts
CHANGED
@@ -47,8 +47,8 @@ declare const AssumeRoleWithWebIdentityCommand_base: {
|
|
47
47
|
* using a token from the web identity provider. For a comparison of
|
48
48
|
* <code>AssumeRoleWithWebIdentity</code> with the other API operations that produce
|
49
49
|
* temporary credentials, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html">Requesting Temporary Security
|
50
|
-
* Credentials</a> and <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
51
|
-
*
|
50
|
+
* Credentials</a> and <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_sts-comparison.html">Compare STS
|
51
|
+
* credentials</a> in the <i>IAM User Guide</i>.</p>
|
52
52
|
* <p>The temporary security credentials returned by this API consist of an access key ID, a
|
53
53
|
* secret access key, and a security token. Applications can use these temporary security
|
54
54
|
* credentials to sign calls to Amazon Web Services service API operations.</p>
|
@@ -60,8 +60,7 @@ declare const AssumeRoleWithWebIdentityCommand_base: {
|
|
60
60
|
* optional <code>DurationSeconds</code> parameter to specify the duration of your session.
|
61
61
|
* You can provide a value from 900 seconds (15 minutes) up to the maximum session duration
|
62
62
|
* setting for the role. This setting can have a value from 1 hour to 12 hours. To learn how
|
63
|
-
* to view the maximum value for your role, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
64
|
-
* Maximum Session Duration Setting for a Role</a> in the
|
63
|
+
* to view the maximum value for your role, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_update-role-settings.html#id_roles_update-session-duration">Update the maximum session duration for a role </a> in the
|
65
64
|
* <i>IAM User Guide</i>. The maximum session duration limit applies when
|
66
65
|
* you use the <code>AssumeRole*</code> API operations or the <code>assume-role*</code> CLI
|
67
66
|
* commands. However the limit does not apply when you use those operations to create a
|
@@ -130,7 +129,7 @@ declare const AssumeRoleWithWebIdentityCommand_base: {
|
|
130
129
|
* or a pairwise identifier, as <a href="http://openid.net/specs/openid-connect-core-1_0.html#SubjectIDTypes">suggested
|
131
130
|
* in the OIDC specification</a>.</p>
|
132
131
|
* </important>
|
133
|
-
* <p>For more information about how to use
|
132
|
+
* <p>For more information about how to use OIDC federation and the
|
134
133
|
* <code>AssumeRoleWithWebIdentity</code> API, see the following resources: </p>
|
135
134
|
* <ul>
|
136
135
|
* <li>
|
@@ -139,25 +138,11 @@ declare const AssumeRoleWithWebIdentityCommand_base: {
|
|
139
138
|
* </li>
|
140
139
|
* <li>
|
141
140
|
* <p>
|
142
|
-
* <a href="https://aws.amazon.com/blogs/aws/the-aws-web-identity-federation-playground/"> Web Identity Federation Playground</a>. Walk through the process of
|
143
|
-
* authenticating through Login with Amazon, Facebook, or Google, getting temporary
|
144
|
-
* security credentials, and then using those credentials to make a request to Amazon Web Services.
|
145
|
-
* </p>
|
146
|
-
* </li>
|
147
|
-
* <li>
|
148
|
-
* <p>
|
149
141
|
* <a href="http://aws.amazon.com/sdkforios/">Amazon Web Services SDK for iOS Developer Guide</a> and <a href="http://aws.amazon.com/sdkforandroid/">Amazon Web Services SDK for Android Developer Guide</a>. These toolkits
|
150
142
|
* contain sample apps that show how to invoke the identity providers. The toolkits then
|
151
143
|
* show how to use the information from these providers to get and use temporary
|
152
144
|
* security credentials. </p>
|
153
145
|
* </li>
|
154
|
-
* <li>
|
155
|
-
* <p>
|
156
|
-
* <a href="http://aws.amazon.com/articles/web-identity-federation-with-mobile-applications">Web Identity
|
157
|
-
* Federation with Mobile Applications</a>. This article discusses web identity
|
158
|
-
* federation and shows an example of how to use web identity federation to get access
|
159
|
-
* to content in Amazon S3. </p>
|
160
|
-
* </li>
|
161
146
|
* </ul>
|
162
147
|
* @example
|
163
148
|
* Use a bare-bones client and the command you need to make an API call.
|
@@ -211,11 +196,11 @@ declare const AssumeRoleWithWebIdentityCommand_base: {
|
|
211
196
|
* token from the identity provider and then retry the request.</p>
|
212
197
|
*
|
213
198
|
* @throws {@link IDPCommunicationErrorException} (client fault)
|
214
|
-
* <p>The request could not be fulfilled because the identity provider (IDP) that
|
215
|
-
*
|
216
|
-
*
|
217
|
-
*
|
218
|
-
*
|
199
|
+
* <p>The request could not be fulfilled because the identity provider (IDP) that was asked
|
200
|
+
* to verify the incoming identity token could not be reached. This is often a transient
|
201
|
+
* error caused by network conditions. Retry the request a limited number of times so that
|
202
|
+
* you don't exceed the request rate. If the error persists, the identity provider might be
|
203
|
+
* down or not responding.</p>
|
219
204
|
*
|
220
205
|
* @throws {@link IDPRejectedClaimException} (client fault)
|
221
206
|
* <p>The identity provider (IdP) reported that authentication failed. This might be because
|
@@ -239,15 +224,15 @@ declare const AssumeRoleWithWebIdentityCommand_base: {
|
|
239
224
|
* tags are to the upper size limit. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html">Passing Session Tags in STS</a> in
|
240
225
|
* the <i>IAM User Guide</i>.</p>
|
241
226
|
* <p>You could receive this error even though you meet other defined session policy and
|
242
|
-
* session tag limits. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-limits-entity-length">IAM and STS Entity
|
243
|
-
*
|
227
|
+
* session tag limits. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-limits-entity-length">IAM and STS Entity Character Limits</a> in the <i>IAM User
|
228
|
+
* Guide</i>.</p>
|
244
229
|
*
|
245
230
|
* @throws {@link RegionDisabledException} (client fault)
|
246
231
|
* <p>STS is not activated in the requested region for the account that is being asked to
|
247
|
-
* generate credentials. The account administrator must use the IAM console to activate
|
248
|
-
* in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html">Activating and
|
249
|
-
* Deactivating
|
250
|
-
*
|
232
|
+
* generate credentials. The account administrator must use the IAM console to activate
|
233
|
+
* STS in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html">Activating and
|
234
|
+
* Deactivating STS in an Amazon Web Services Region</a> in the <i>IAM User
|
235
|
+
* Guide</i>.</p>
|
251
236
|
*
|
252
237
|
* @throws {@link STSServiceException}
|
253
238
|
* <p>Base exception class for all service exceptions from STS service.</p>
|
@@ -0,0 +1,129 @@
|
|
1
|
+
import { Command as $Command } from "@smithy/smithy-client";
|
2
|
+
import { MetadataBearer as __MetadataBearer } from "@smithy/types";
|
3
|
+
import { AssumeRootRequest, AssumeRootResponse } from "../models/models_0";
|
4
|
+
import { ServiceInputTypes, ServiceOutputTypes, STSClientResolvedConfig } from "../STSClient";
|
5
|
+
/**
|
6
|
+
* @public
|
7
|
+
*/
|
8
|
+
export type { __MetadataBearer };
|
9
|
+
export { $Command };
|
10
|
+
/**
|
11
|
+
* @public
|
12
|
+
*
|
13
|
+
* The input for {@link AssumeRootCommand}.
|
14
|
+
*/
|
15
|
+
export interface AssumeRootCommandInput extends AssumeRootRequest {
|
16
|
+
}
|
17
|
+
/**
|
18
|
+
* @public
|
19
|
+
*
|
20
|
+
* The output of {@link AssumeRootCommand}.
|
21
|
+
*/
|
22
|
+
export interface AssumeRootCommandOutput extends AssumeRootResponse, __MetadataBearer {
|
23
|
+
}
|
24
|
+
declare const AssumeRootCommand_base: {
|
25
|
+
new (input: AssumeRootCommandInput): import("@smithy/smithy-client").CommandImpl<AssumeRootCommandInput, AssumeRootCommandOutput, STSClientResolvedConfig, ServiceInputTypes, ServiceOutputTypes>;
|
26
|
+
new (__0_0: AssumeRootCommandInput): import("@smithy/smithy-client").CommandImpl<AssumeRootCommandInput, AssumeRootCommandOutput, STSClientResolvedConfig, ServiceInputTypes, ServiceOutputTypes>;
|
27
|
+
getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
|
28
|
+
};
|
29
|
+
/**
|
30
|
+
* <p>Returns a set of short term credentials you can use to perform privileged tasks in a
|
31
|
+
* member account.</p>
|
32
|
+
* <p>Before you can launch a privileged session, you must have enabled centralized root
|
33
|
+
* access in your organization. For steps to enable this feature, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_root-enable-root-access.html">Centralize root access for member accounts</a> in the <i>IAM User
|
34
|
+
* Guide</i>.</p>
|
35
|
+
* <note>
|
36
|
+
* <p>The global endpoint is not supported for AssumeRoot. You must send this request to a
|
37
|
+
* Regional STS endpoint. For more information, see <a href="https://docs.aws.amazon.com/STS/latest/APIReference/welcome.html#sts-endpoints">Endpoints</a>.</p>
|
38
|
+
* </note>
|
39
|
+
* <p>You can track AssumeRoot in CloudTrail logs to determine what actions were performed in a
|
40
|
+
* session. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/cloudtrail-track-privileged-tasks.html">Track privileged tasks
|
41
|
+
* in CloudTrail</a> in the <i>IAM User Guide</i>.</p>
|
42
|
+
* @example
|
43
|
+
* Use a bare-bones client and the command you need to make an API call.
|
44
|
+
* ```javascript
|
45
|
+
* import { STSClient, AssumeRootCommand } from "@aws-sdk/client-sts"; // ES Modules import
|
46
|
+
* // const { STSClient, AssumeRootCommand } = require("@aws-sdk/client-sts"); // CommonJS import
|
47
|
+
* const client = new STSClient(config);
|
48
|
+
* const input = { // AssumeRootRequest
|
49
|
+
* TargetPrincipal: "STRING_VALUE", // required
|
50
|
+
* TaskPolicyArn: { // PolicyDescriptorType
|
51
|
+
* arn: "STRING_VALUE",
|
52
|
+
* },
|
53
|
+
* DurationSeconds: Number("int"),
|
54
|
+
* };
|
55
|
+
* const command = new AssumeRootCommand(input);
|
56
|
+
* const response = await client.send(command);
|
57
|
+
* // { // AssumeRootResponse
|
58
|
+
* // Credentials: { // Credentials
|
59
|
+
* // AccessKeyId: "STRING_VALUE", // required
|
60
|
+
* // SecretAccessKey: "STRING_VALUE", // required
|
61
|
+
* // SessionToken: "STRING_VALUE", // required
|
62
|
+
* // Expiration: new Date("TIMESTAMP"), // required
|
63
|
+
* // },
|
64
|
+
* // SourceIdentity: "STRING_VALUE",
|
65
|
+
* // };
|
66
|
+
*
|
67
|
+
* ```
|
68
|
+
*
|
69
|
+
* @param AssumeRootCommandInput - {@link AssumeRootCommandInput}
|
70
|
+
* @returns {@link AssumeRootCommandOutput}
|
71
|
+
* @see {@link AssumeRootCommandInput} for command's `input` shape.
|
72
|
+
* @see {@link AssumeRootCommandOutput} for command's `response` shape.
|
73
|
+
* @see {@link STSClientResolvedConfig | config} for STSClient's `config` shape.
|
74
|
+
*
|
75
|
+
* @throws {@link ExpiredTokenException} (client fault)
|
76
|
+
* <p>The web identity token that was passed is expired or is not valid. Get a new identity
|
77
|
+
* token from the identity provider and then retry the request.</p>
|
78
|
+
*
|
79
|
+
* @throws {@link RegionDisabledException} (client fault)
|
80
|
+
* <p>STS is not activated in the requested region for the account that is being asked to
|
81
|
+
* generate credentials. The account administrator must use the IAM console to activate
|
82
|
+
* STS in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html">Activating and
|
83
|
+
* Deactivating STS in an Amazon Web Services Region</a> in the <i>IAM User
|
84
|
+
* Guide</i>.</p>
|
85
|
+
*
|
86
|
+
* @throws {@link STSServiceException}
|
87
|
+
* <p>Base exception class for all service exceptions from STS service.</p>
|
88
|
+
*
|
89
|
+
* @public
|
90
|
+
* @example To launch a privileged session
|
91
|
+
* ```javascript
|
92
|
+
* // The following command retrieves a set of short-term credentials you can use to unlock an S3 bucket for a member account by removing the bucket policy.
|
93
|
+
* const input = {
|
94
|
+
* "DurationSeconds": 900,
|
95
|
+
* "TargetPrincipal": "111122223333",
|
96
|
+
* "TaskPolicyArn": {
|
97
|
+
* "arn": "arn:aws:iam::aws:policy/root-task/S3UnlockBucketPolicy"
|
98
|
+
* }
|
99
|
+
* };
|
100
|
+
* const command = new AssumeRootCommand(input);
|
101
|
+
* const response = await client.send(command);
|
102
|
+
* /* response ==
|
103
|
+
* {
|
104
|
+
* "Credentials": {
|
105
|
+
* "AccessKeyId": "ASIAJEXAMPLEXEG2JICEA",
|
106
|
+
* "Expiration": "2024-11-15T00:05:07Z",
|
107
|
+
* "SecretAccessKey": "9drTJvcXLB89EXAMPLELB8923FB892xMFI",
|
108
|
+
* "SessionToken": "AQoXdzELDDY//////////wEaoAK1wvxJY12r2IrDFT2IvAzTCn3zHoZ7YNtpiQLF0MqZye/qwjzP2iEXAMPLEbw/m3hsj8VBTkPORGvr9jM5sgP+w9IZWZnU+LWhmg+a5fDi2oTGUYcdg9uexQ4mtCHIHfi4citgqZTgco40Yqr4lIlo4V2b2Dyauk0eYFNebHtYlFVgAUj+7Indz3LU0aTWk1WKIjHmmMCIoTkyYp/k7kUG7moeEYKSitwQIi6Gjn+nyzM+PtoA3685ixzv0R7i5rjQi0YE0lf1oeie3bDiNHncmzosRM6SFiPzSvp6h/32xQuZsjcypmwsPSDtTPYcs0+YN/8BRi2/IcrxSpnWEXAMPLEXSDFTAQAM6Dl9zR0tXoybnlrZIwMLlMi1Kcgo5OytwU="
|
109
|
+
* },
|
110
|
+
* "SourceIdentity": "Alice"
|
111
|
+
* }
|
112
|
+
* *\/
|
113
|
+
* // example id: to-launch-a-privileged-session-1731335424565
|
114
|
+
* ```
|
115
|
+
*
|
116
|
+
*/
|
117
|
+
export declare class AssumeRootCommand extends AssumeRootCommand_base {
|
118
|
+
/** @internal type navigation helper, not in runtime. */
|
119
|
+
protected static __types: {
|
120
|
+
api: {
|
121
|
+
input: AssumeRootRequest;
|
122
|
+
output: AssumeRootResponse;
|
123
|
+
};
|
124
|
+
sdk: {
|
125
|
+
input: AssumeRootCommandInput;
|
126
|
+
output: AssumeRootCommandOutput;
|
127
|
+
};
|
128
|
+
};
|
129
|
+
}
|
package/node_modules/@aws-sdk/client-sts/dist-types/commands/DecodeAuthorizationMessageCommand.d.ts
CHANGED
@@ -88,8 +88,8 @@ declare const DecodeAuthorizationMessageCommand_base: {
|
|
88
88
|
*
|
89
89
|
* @throws {@link InvalidAuthorizationMessageException} (client fault)
|
90
90
|
* <p>The error returned if the message passed to <code>DecodeAuthorizationMessage</code>
|
91
|
-
* was invalid. This can happen if the token contains invalid characters, such as
|
92
|
-
*
|
91
|
+
* was invalid. This can happen if the token contains invalid characters, such as line
|
92
|
+
* breaks, or if the message has expired.</p>
|
93
93
|
*
|
94
94
|
* @throws {@link STSServiceException}
|
95
95
|
* <p>Base exception class for all service exceptions from STS service.</p>
|
@@ -36,8 +36,8 @@ declare const GetFederationTokenCommand_base: {
|
|
36
36
|
* contexts where those credentials can be safeguarded, usually in a server-based application.
|
37
37
|
* For a comparison of <code>GetFederationToken</code> with the other API operations that
|
38
38
|
* produce temporary credentials, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html">Requesting Temporary Security
|
39
|
-
* Credentials</a> and <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
40
|
-
*
|
39
|
+
* Credentials</a> and <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_sts-comparison.html">Compare STS
|
40
|
+
* credentials</a> in the <i>IAM User Guide</i>.</p>
|
41
41
|
* <p>Although it is possible to call <code>GetFederationToken</code> using the security
|
42
42
|
* credentials of an Amazon Web Services account root user rather than an IAM user that you
|
43
43
|
* create for the purpose of a proxy application, we do not recommend it. For more
|
@@ -174,15 +174,15 @@ declare const GetFederationTokenCommand_base: {
|
|
174
174
|
* tags are to the upper size limit. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html">Passing Session Tags in STS</a> in
|
175
175
|
* the <i>IAM User Guide</i>.</p>
|
176
176
|
* <p>You could receive this error even though you meet other defined session policy and
|
177
|
-
* session tag limits. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-limits-entity-length">IAM and STS Entity
|
178
|
-
*
|
177
|
+
* session tag limits. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-limits-entity-length">IAM and STS Entity Character Limits</a> in the <i>IAM User
|
178
|
+
* Guide</i>.</p>
|
179
179
|
*
|
180
180
|
* @throws {@link RegionDisabledException} (client fault)
|
181
181
|
* <p>STS is not activated in the requested region for the account that is being asked to
|
182
|
-
* generate credentials. The account administrator must use the IAM console to activate
|
183
|
-
* in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html">Activating and
|
184
|
-
* Deactivating
|
185
|
-
*
|
182
|
+
* generate credentials. The account administrator must use the IAM console to activate
|
183
|
+
* STS in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html">Activating and
|
184
|
+
* Deactivating STS in an Amazon Web Services Region</a> in the <i>IAM User
|
185
|
+
* Guide</i>.</p>
|
186
186
|
*
|
187
187
|
* @throws {@link STSServiceException}
|
188
188
|
* <p>Base exception class for all service exceptions from STS service.</p>
|
@@ -38,8 +38,8 @@ declare const GetSessionTokenCommand_base: {
|
|
38
38
|
* calls to API operations that require MFA authentication. An incorrect MFA code causes the
|
39
39
|
* API to return an access denied error. For a comparison of <code>GetSessionToken</code> with
|
40
40
|
* the other API operations that produce temporary credentials, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html">Requesting
|
41
|
-
* Temporary Security Credentials</a> and <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
42
|
-
*
|
41
|
+
* Temporary Security Credentials</a> and <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_sts-comparison.html">Compare STS
|
42
|
+
* credentials</a> in the <i>IAM User Guide</i>.</p>
|
43
43
|
* <note>
|
44
44
|
* <p>No permissions are required for users to perform this operation. The purpose of the
|
45
45
|
* <code>sts:GetSessionToken</code> operation is to authenticate the user using MFA. You
|
@@ -118,10 +118,10 @@ declare const GetSessionTokenCommand_base: {
|
|
118
118
|
*
|
119
119
|
* @throws {@link RegionDisabledException} (client fault)
|
120
120
|
* <p>STS is not activated in the requested region for the account that is being asked to
|
121
|
-
* generate credentials. The account administrator must use the IAM console to activate
|
122
|
-
* in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html">Activating and
|
123
|
-
* Deactivating
|
124
|
-
*
|
121
|
+
* generate credentials. The account administrator must use the IAM console to activate
|
122
|
+
* STS in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html">Activating and
|
123
|
+
* Deactivating STS in an Amazon Web Services Region</a> in the <i>IAM User
|
124
|
+
* Guide</i>.</p>
|
125
125
|
*
|
126
126
|
* @throws {@link STSServiceException}
|
127
127
|
* <p>Base exception class for all service exceptions from STS service.</p>
|
@@ -1,6 +1,7 @@
|
|
1
1
|
export * from "./AssumeRoleCommand";
|
2
2
|
export * from "./AssumeRoleWithSAMLCommand";
|
3
3
|
export * from "./AssumeRoleWithWebIdentityCommand";
|
4
|
+
export * from "./AssumeRootCommand";
|
4
5
|
export * from "./DecodeAuthorizationMessageCommand";
|
5
6
|
export * from "./GetAccessKeyInfoCommand";
|
6
7
|
export * from "./GetCallerIdentityCommand";
|