@cdk8s/awscdk-resolver 0.0.199 → 0.0.200

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (122) hide show
  1. package/.jsii +3 -3
  2. package/lib/resolve.js +1 -1
  3. package/node_modules/@aws-sdk/client-cloudformation/package.json +36 -36
  4. package/node_modules/@aws-sdk/client-sso/package.json +32 -32
  5. package/node_modules/@aws-sdk/client-sso-oidc/package.json +34 -34
  6. package/node_modules/@aws-sdk/client-sts/README.md +8 -0
  7. package/node_modules/@aws-sdk/client-sts/dist-cjs/index.js +89 -12
  8. package/node_modules/@aws-sdk/client-sts/dist-es/STS.js +2 -0
  9. package/node_modules/@aws-sdk/client-sts/dist-es/commands/AssumeRootCommand.js +23 -0
  10. package/node_modules/@aws-sdk/client-sts/dist-es/commands/index.js +1 -0
  11. package/node_modules/@aws-sdk/client-sts/dist-es/models/models_0.js +4 -0
  12. package/node_modules/@aws-sdk/client-sts/dist-es/protocols/Aws_query.js +53 -0
  13. package/node_modules/@aws-sdk/client-sts/dist-types/STS.d.ts +7 -0
  14. package/node_modules/@aws-sdk/client-sts/dist-types/STSClient.d.ts +3 -2
  15. package/node_modules/@aws-sdk/client-sts/dist-types/commands/AssumeRoleCommand.d.ts +13 -13
  16. package/node_modules/@aws-sdk/client-sts/dist-types/commands/AssumeRoleWithSAMLCommand.d.ts +8 -8
  17. package/node_modules/@aws-sdk/client-sts/dist-types/commands/AssumeRoleWithWebIdentityCommand.d.ts +15 -30
  18. package/node_modules/@aws-sdk/client-sts/dist-types/commands/AssumeRootCommand.d.ts +129 -0
  19. package/node_modules/@aws-sdk/client-sts/dist-types/commands/DecodeAuthorizationMessageCommand.d.ts +2 -2
  20. package/node_modules/@aws-sdk/client-sts/dist-types/commands/GetFederationTokenCommand.d.ts +8 -8
  21. package/node_modules/@aws-sdk/client-sts/dist-types/commands/GetSessionTokenCommand.d.ts +6 -6
  22. package/node_modules/@aws-sdk/client-sts/dist-types/commands/index.d.ts +1 -0
  23. package/node_modules/@aws-sdk/client-sts/dist-types/models/models_0.d.ts +146 -32
  24. package/node_modules/@aws-sdk/client-sts/dist-types/protocols/Aws_query.d.ts +9 -0
  25. package/node_modules/@aws-sdk/client-sts/dist-types/ts3.4/STS.d.ts +17 -0
  26. package/node_modules/@aws-sdk/client-sts/dist-types/ts3.4/STSClient.d.ts +6 -0
  27. package/node_modules/@aws-sdk/client-sts/dist-types/ts3.4/commands/AssumeRootCommand.d.ts +47 -0
  28. package/node_modules/@aws-sdk/client-sts/dist-types/ts3.4/commands/index.d.ts +1 -0
  29. package/node_modules/@aws-sdk/client-sts/dist-types/ts3.4/models/models_0.d.ts +12 -0
  30. package/node_modules/@aws-sdk/client-sts/dist-types/ts3.4/protocols/Aws_query.d.ts +12 -0
  31. package/node_modules/@aws-sdk/client-sts/package.json +36 -36
  32. package/node_modules/@aws-sdk/core/package.json +14 -14
  33. package/node_modules/@aws-sdk/credential-provider-env/package.json +7 -7
  34. package/node_modules/@aws-sdk/credential-provider-http/package.json +12 -12
  35. package/node_modules/@aws-sdk/credential-provider-ini/package.json +15 -15
  36. package/node_modules/@aws-sdk/credential-provider-node/package.json +14 -14
  37. package/node_modules/@aws-sdk/credential-provider-process/package.json +8 -8
  38. package/node_modules/@aws-sdk/credential-provider-sso/package.json +10 -10
  39. package/node_modules/@aws-sdk/credential-provider-web-identity/package.json +8 -8
  40. package/node_modules/@aws-sdk/middleware-host-header/package.json +8 -8
  41. package/node_modules/@aws-sdk/middleware-logger/package.json +7 -7
  42. package/node_modules/@aws-sdk/middleware-recursion-detection/package.json +8 -8
  43. package/node_modules/@aws-sdk/middleware-user-agent/package.json +11 -11
  44. package/node_modules/@aws-sdk/region-config-resolver/package.json +7 -7
  45. package/node_modules/@aws-sdk/token-providers/package.json +8 -8
  46. package/node_modules/@aws-sdk/types/package.json +2 -2
  47. package/node_modules/@aws-sdk/util-endpoints/package.json +8 -8
  48. package/node_modules/@aws-sdk/util-locate-window/package.json +3 -3
  49. package/node_modules/@aws-sdk/util-user-agent-browser/package.json +5 -5
  50. package/node_modules/@aws-sdk/util-user-agent-node/package.json +7 -7
  51. package/node_modules/@smithy/abort-controller/package.json +4 -3
  52. package/node_modules/@smithy/config-resolver/package.json +7 -6
  53. package/node_modules/@smithy/core/dist-cjs/submodules/protocols/index.js +21 -20
  54. package/node_modules/@smithy/core/dist-es/submodules/protocols/requestBuilder.js +1 -1
  55. package/node_modules/@smithy/core/package.json +10 -9
  56. package/node_modules/@smithy/credential-provider-imds/package.json +7 -7
  57. package/node_modules/@smithy/fetch-http-handler/dist-cjs/create-request.js +1 -0
  58. package/node_modules/@smithy/fetch-http-handler/dist-cjs/index.js +10 -3
  59. package/node_modules/@smithy/fetch-http-handler/dist-es/create-request.js +3 -0
  60. package/node_modules/@smithy/fetch-http-handler/dist-es/fetch-http-handler.js +3 -2
  61. package/node_modules/@smithy/fetch-http-handler/dist-es/stream-collector.js +1 -1
  62. package/node_modules/@smithy/fetch-http-handler/dist-types/create-request.d.ts +6 -0
  63. package/node_modules/@smithy/fetch-http-handler/dist-types/fetch-http-handler.d.ts +6 -0
  64. package/node_modules/@smithy/fetch-http-handler/dist-types/ts3.4/create-request.d.ts +6 -0
  65. package/node_modules/@smithy/fetch-http-handler/dist-types/ts3.4/fetch-http-handler.d.ts +6 -0
  66. package/node_modules/@smithy/fetch-http-handler/package.json +9 -6
  67. package/node_modules/@smithy/hash-node/package.json +4 -3
  68. package/node_modules/@smithy/invalid-dependency/package.json +4 -3
  69. package/node_modules/@smithy/middleware-content-length/package.json +5 -4
  70. package/node_modules/@smithy/middleware-endpoint/package.json +11 -10
  71. package/node_modules/@smithy/middleware-retry/package.json +12 -10
  72. package/node_modules/@smithy/middleware-serde/package.json +6 -4
  73. package/node_modules/@smithy/middleware-stack/package.json +4 -3
  74. package/node_modules/@smithy/node-config-provider/package.json +6 -5
  75. package/node_modules/@smithy/node-http-handler/dist-cjs/index.js +20 -14
  76. package/node_modules/@smithy/node-http-handler/dist-cjs/timing.js +1 -0
  77. package/node_modules/@smithy/node-http-handler/dist-es/node-http-handler.js +5 -4
  78. package/node_modules/@smithy/node-http-handler/dist-es/node-http2-connection-manager.js +1 -1
  79. package/node_modules/@smithy/node-http-handler/dist-es/server.mock.js +9 -2
  80. package/node_modules/@smithy/node-http-handler/dist-es/set-connection-timeout.js +5 -4
  81. package/node_modules/@smithy/node-http-handler/dist-es/set-socket-keep-alive.js +2 -1
  82. package/node_modules/@smithy/node-http-handler/dist-es/set-socket-timeout.js +2 -1
  83. package/node_modules/@smithy/node-http-handler/dist-es/timing.js +4 -0
  84. package/node_modules/@smithy/node-http-handler/dist-es/write-request-body.js +4 -3
  85. package/node_modules/@smithy/node-http-handler/dist-types/timing.d.ts +8 -0
  86. package/node_modules/@smithy/node-http-handler/dist-types/ts3.4/timing.d.ts +8 -0
  87. package/node_modules/@smithy/node-http-handler/package.json +7 -6
  88. package/node_modules/@smithy/property-provider/package.json +4 -3
  89. package/node_modules/@smithy/protocol-http/package.json +4 -3
  90. package/node_modules/@smithy/querystring-builder/package.json +2 -2
  91. package/node_modules/@smithy/querystring-parser/package.json +4 -3
  92. package/node_modules/@smithy/service-error-classification/package.json +4 -3
  93. package/node_modules/@smithy/shared-ini-file-loader/package.json +4 -3
  94. package/node_modules/@smithy/signature-v4/package.json +6 -5
  95. package/node_modules/@smithy/smithy-client/package.json +9 -8
  96. package/node_modules/@smithy/types/dist-types/http.d.ts +1 -0
  97. package/node_modules/@smithy/types/dist-types/transform/no-undefined.d.ts +3 -2
  98. package/node_modules/@smithy/types/dist-types/ts3.4/http.d.ts +1 -0
  99. package/node_modules/@smithy/types/dist-types/ts3.4/transform/no-undefined.d.ts +3 -2
  100. package/node_modules/@smithy/types/package.json +1 -1
  101. package/node_modules/@smithy/url-parser/package.json +5 -4
  102. package/node_modules/@smithy/util-defaults-mode-browser/package.json +6 -5
  103. package/node_modules/@smithy/util-defaults-mode-node/package.json +9 -8
  104. package/node_modules/@smithy/util-endpoints/package.json +7 -5
  105. package/node_modules/@smithy/util-middleware/package.json +4 -3
  106. package/node_modules/@smithy/util-retry/dist-cjs/index.js +5 -1
  107. package/node_modules/@smithy/util-retry/dist-es/DefaultRateLimiter.js +2 -1
  108. package/node_modules/@smithy/util-retry/dist-types/DefaultRateLimiter.d.ts +4 -0
  109. package/node_modules/@smithy/util-retry/dist-types/ts3.4/DefaultRateLimiter.d.ts +4 -0
  110. package/node_modules/@smithy/util-retry/package.json +5 -4
  111. package/node_modules/@smithy/util-stream/dist-cjs/index.js +1 -0
  112. package/node_modules/@smithy/util-stream/dist-cjs/sdk-stream-mixin.js +1 -2
  113. package/node_modules/@smithy/util-stream/dist-cjs/splitStream.js +1 -1
  114. package/node_modules/@smithy/util-stream/dist-cjs/stream-type-check.js +6 -1
  115. package/node_modules/@smithy/util-stream/dist-es/sdk-stream-mixin.js +0 -1
  116. package/node_modules/@smithy/util-stream/dist-es/splitStream.js +2 -2
  117. package/node_modules/@smithy/util-stream/dist-es/stream-type-check.js +3 -0
  118. package/node_modules/@smithy/util-stream/dist-types/stream-type-check.d.ts +4 -0
  119. package/node_modules/@smithy/util-stream/dist-types/ts3.4/stream-type-check.d.ts +4 -0
  120. package/node_modules/@smithy/util-stream/package.json +10 -6
  121. package/node_modules/@smithy/util-waiter/package.json +5 -4
  122. package/package.json +2 -2
@@ -33,6 +33,16 @@ export const se_AssumeRoleWithWebIdentityCommand = async (input, context) => {
33
33
  });
34
34
  return buildHttpRpcRequest(context, headers, "/", undefined, body);
35
35
  };
36
+ export const se_AssumeRootCommand = async (input, context) => {
37
+ const headers = SHARED_HEADERS;
38
+ let body;
39
+ body = buildFormUrlencodedString({
40
+ ...se_AssumeRootRequest(input, context),
41
+ [_A]: _ARs,
42
+ [_V]: _,
43
+ });
44
+ return buildHttpRpcRequest(context, headers, "/", undefined, body);
45
+ };
36
46
  export const se_DecodeAuthorizationMessageCommand = async (input, context) => {
37
47
  const headers = SHARED_HEADERS;
38
48
  let body;
@@ -122,6 +132,19 @@ export const de_AssumeRoleWithWebIdentityCommand = async (output, context) => {
122
132
  };
123
133
  return response;
124
134
  };
135
+ export const de_AssumeRootCommand = async (output, context) => {
136
+ if (output.statusCode >= 300) {
137
+ return de_CommandError(output, context);
138
+ }
139
+ const data = await parseBody(output.body, context);
140
+ let contents = {};
141
+ contents = de_AssumeRootResponse(data.AssumeRootResult, context);
142
+ const response = {
143
+ $metadata: deserializeMetadata(output),
144
+ ...contents,
145
+ };
146
+ return response;
147
+ };
125
148
  export const de_DecodeAuthorizationMessageCommand = async (output, context) => {
126
149
  if (output.statusCode >= 300) {
127
150
  return de_CommandError(output, context);
@@ -428,6 +451,23 @@ const se_AssumeRoleWithWebIdentityRequest = (input, context) => {
428
451
  }
429
452
  return entries;
430
453
  };
454
+ const se_AssumeRootRequest = (input, context) => {
455
+ const entries = {};
456
+ if (input[_TP] != null) {
457
+ entries[_TP] = input[_TP];
458
+ }
459
+ if (input[_TPA] != null) {
460
+ const memberEntries = se_PolicyDescriptorType(input[_TPA], context);
461
+ Object.entries(memberEntries).forEach(([key, value]) => {
462
+ const loc = `TaskPolicyArn.${key}`;
463
+ entries[loc] = value;
464
+ });
465
+ }
466
+ if (input[_DS] != null) {
467
+ entries[_DS] = input[_DS];
468
+ }
469
+ return entries;
470
+ };
431
471
  const se_DecodeAuthorizationMessageRequest = (input, context) => {
432
472
  const entries = {};
433
473
  if (input[_EM] != null) {
@@ -658,6 +698,16 @@ const de_AssumeRoleWithWebIdentityResponse = (output, context) => {
658
698
  }
659
699
  return contents;
660
700
  };
701
+ const de_AssumeRootResponse = (output, context) => {
702
+ const contents = {};
703
+ if (output[_C] != null) {
704
+ contents[_C] = de_Credentials(output[_C], context);
705
+ }
706
+ if (output[_SI] != null) {
707
+ contents[_SI] = __expectString(output[_SI]);
708
+ }
709
+ return contents;
710
+ };
661
711
  const de_Credentials = (output, context) => {
662
712
  const contents = {};
663
713
  if (output[_AKI] != null) {
@@ -824,6 +874,7 @@ const _ARI = "AssumedRoleId";
824
874
  const _ARU = "AssumedRoleUser";
825
875
  const _ARWSAML = "AssumeRoleWithSAML";
826
876
  const _ARWWI = "AssumeRoleWithWebIdentity";
877
+ const _ARs = "AssumeRoot";
827
878
  const _Ac = "Account";
828
879
  const _Ar = "Arn";
829
880
  const _Au = "Audience";
@@ -865,6 +916,8 @@ const _ST = "SubjectType";
865
916
  const _STe = "SessionToken";
866
917
  const _T = "Tags";
867
918
  const _TC = "TokenCode";
919
+ const _TP = "TargetPrincipal";
920
+ const _TPA = "TaskPolicyArn";
868
921
  const _TTK = "TransitiveTagKeys";
869
922
  const _UI = "UserId";
870
923
  const _V = "Version";
@@ -2,6 +2,7 @@ import { HttpHandlerOptions as __HttpHandlerOptions } from "@smithy/types";
2
2
  import { AssumeRoleCommandInput, AssumeRoleCommandOutput } from "./commands/AssumeRoleCommand";
3
3
  import { AssumeRoleWithSAMLCommandInput, AssumeRoleWithSAMLCommandOutput } from "./commands/AssumeRoleWithSAMLCommand";
4
4
  import { AssumeRoleWithWebIdentityCommandInput, AssumeRoleWithWebIdentityCommandOutput } from "./commands/AssumeRoleWithWebIdentityCommand";
5
+ import { AssumeRootCommandInput, AssumeRootCommandOutput } from "./commands/AssumeRootCommand";
5
6
  import { DecodeAuthorizationMessageCommandInput, DecodeAuthorizationMessageCommandOutput } from "./commands/DecodeAuthorizationMessageCommand";
6
7
  import { GetAccessKeyInfoCommandInput, GetAccessKeyInfoCommandOutput } from "./commands/GetAccessKeyInfoCommand";
7
8
  import { GetCallerIdentityCommandInput, GetCallerIdentityCommandOutput } from "./commands/GetCallerIdentityCommand";
@@ -27,6 +28,12 @@ export interface STS {
27
28
  assumeRoleWithWebIdentity(args: AssumeRoleWithWebIdentityCommandInput, options?: __HttpHandlerOptions): Promise<AssumeRoleWithWebIdentityCommandOutput>;
28
29
  assumeRoleWithWebIdentity(args: AssumeRoleWithWebIdentityCommandInput, cb: (err: any, data?: AssumeRoleWithWebIdentityCommandOutput) => void): void;
29
30
  assumeRoleWithWebIdentity(args: AssumeRoleWithWebIdentityCommandInput, options: __HttpHandlerOptions, cb: (err: any, data?: AssumeRoleWithWebIdentityCommandOutput) => void): void;
31
+ /**
32
+ * @see {@link AssumeRootCommand}
33
+ */
34
+ assumeRoot(args: AssumeRootCommandInput, options?: __HttpHandlerOptions): Promise<AssumeRootCommandOutput>;
35
+ assumeRoot(args: AssumeRootCommandInput, cb: (err: any, data?: AssumeRootCommandOutput) => void): void;
36
+ assumeRoot(args: AssumeRootCommandInput, options: __HttpHandlerOptions, cb: (err: any, data?: AssumeRootCommandOutput) => void): void;
30
37
  /**
31
38
  * @see {@link DecodeAuthorizationMessageCommand}
32
39
  */
@@ -10,6 +10,7 @@ import { HttpAuthSchemeInputConfig, HttpAuthSchemeResolvedConfig } from "./auth/
10
10
  import { AssumeRoleCommandInput, AssumeRoleCommandOutput } from "./commands/AssumeRoleCommand";
11
11
  import { AssumeRoleWithSAMLCommandInput, AssumeRoleWithSAMLCommandOutput } from "./commands/AssumeRoleWithSAMLCommand";
12
12
  import { AssumeRoleWithWebIdentityCommandInput, AssumeRoleWithWebIdentityCommandOutput } from "./commands/AssumeRoleWithWebIdentityCommand";
13
+ import { AssumeRootCommandInput, AssumeRootCommandOutput } from "./commands/AssumeRootCommand";
13
14
  import { DecodeAuthorizationMessageCommandInput, DecodeAuthorizationMessageCommandOutput } from "./commands/DecodeAuthorizationMessageCommand";
14
15
  import { GetAccessKeyInfoCommandInput, GetAccessKeyInfoCommandOutput } from "./commands/GetAccessKeyInfoCommand";
15
16
  import { GetCallerIdentityCommandInput, GetCallerIdentityCommandOutput } from "./commands/GetCallerIdentityCommand";
@@ -21,11 +22,11 @@ export { __Client };
21
22
  /**
22
23
  * @public
23
24
  */
24
- export type ServiceInputTypes = AssumeRoleCommandInput | AssumeRoleWithSAMLCommandInput | AssumeRoleWithWebIdentityCommandInput | DecodeAuthorizationMessageCommandInput | GetAccessKeyInfoCommandInput | GetCallerIdentityCommandInput | GetFederationTokenCommandInput | GetSessionTokenCommandInput;
25
+ export type ServiceInputTypes = AssumeRoleCommandInput | AssumeRoleWithSAMLCommandInput | AssumeRoleWithWebIdentityCommandInput | AssumeRootCommandInput | DecodeAuthorizationMessageCommandInput | GetAccessKeyInfoCommandInput | GetCallerIdentityCommandInput | GetFederationTokenCommandInput | GetSessionTokenCommandInput;
25
26
  /**
26
27
  * @public
27
28
  */
28
- export type ServiceOutputTypes = AssumeRoleCommandOutput | AssumeRoleWithSAMLCommandOutput | AssumeRoleWithWebIdentityCommandOutput | DecodeAuthorizationMessageCommandOutput | GetAccessKeyInfoCommandOutput | GetCallerIdentityCommandOutput | GetFederationTokenCommandOutput | GetSessionTokenCommandOutput;
29
+ export type ServiceOutputTypes = AssumeRoleCommandOutput | AssumeRoleWithSAMLCommandOutput | AssumeRoleWithWebIdentityCommandOutput | AssumeRootCommandOutput | DecodeAuthorizationMessageCommandOutput | GetAccessKeyInfoCommandOutput | GetCallerIdentityCommandOutput | GetFederationTokenCommandOutput | GetSessionTokenCommandOutput;
29
30
  /**
30
31
  * @public
31
32
  */
@@ -32,8 +32,8 @@ declare const AssumeRoleCommand_base: {
32
32
  * and a security token. Typically, you use <code>AssumeRole</code> within your account or for
33
33
  * cross-account access. For a comparison of <code>AssumeRole</code> with other API operations
34
34
  * that produce temporary credentials, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html">Requesting Temporary Security
35
- * Credentials</a> and <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#stsapi_comparison">Comparing the
36
- * Amazon Web Services STS API operations</a> in the <i>IAM User Guide</i>.</p>
35
+ * Credentials</a> and <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_sts-comparison.html">Compare STS
36
+ * credentials</a> in the <i>IAM User Guide</i>.</p>
37
37
  * <p>
38
38
  * <b>Permissions</b>
39
39
  * </p>
@@ -41,11 +41,11 @@ declare const AssumeRoleCommand_base: {
41
41
  * make API calls to any Amazon Web Services service with the following exception: You cannot call the
42
42
  * Amazon Web Services STS <code>GetFederationToken</code> or <code>GetSessionToken</code> API
43
43
  * operations.</p>
44
- * <p>(Optional) You can pass inline or managed <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session">session policies</a> to
45
- * this operation. You can pass a single JSON policy document to use as an inline session
46
- * policy. You can also specify up to 10 managed policy Amazon Resource Names (ARNs) to use as
47
- * managed session policies. The plaintext that you use for both inline and managed session
48
- * policies can't exceed 2,048 characters. Passing policies to this operation returns new
44
+ * <p>(Optional) You can pass inline or managed session policies to this operation. You can
45
+ * pass a single JSON policy document to use as an inline session policy. You can also specify
46
+ * up to 10 managed policy Amazon Resource Names (ARNs) to use as managed session policies.
47
+ * The plaintext that you use for both inline and managed session policies can't exceed 2,048
48
+ * characters. Passing policies to this operation returns new
49
49
  * temporary credentials. The resulting session's permissions are the intersection of the
50
50
  * role's identity-based policy and the session policies. You can use the role's temporary
51
51
  * credentials in subsequent Amazon Web Services API calls to access resources in the account that owns
@@ -192,15 +192,15 @@ declare const AssumeRoleCommand_base: {
192
192
  * tags are to the upper size limit. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html">Passing Session Tags in STS</a> in
193
193
  * the <i>IAM User Guide</i>.</p>
194
194
  * <p>You could receive this error even though you meet other defined session policy and
195
- * session tag limits. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-limits-entity-length">IAM and STS Entity
196
- * Character Limits</a> in the <i>IAM User Guide</i>.</p>
195
+ * session tag limits. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-limits-entity-length">IAM and STS Entity Character Limits</a> in the <i>IAM User
196
+ * Guide</i>.</p>
197
197
  *
198
198
  * @throws {@link RegionDisabledException} (client fault)
199
199
  * <p>STS is not activated in the requested region for the account that is being asked to
200
- * generate credentials. The account administrator must use the IAM console to activate STS
201
- * in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html">Activating and
202
- * Deactivating Amazon Web Services STS in an Amazon Web Services Region</a> in the <i>IAM User
203
- * Guide</i>.</p>
200
+ * generate credentials. The account administrator must use the IAM console to activate
201
+ * STS in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html">Activating and
202
+ * Deactivating STS in an Amazon Web Services Region</a> in the <i>IAM User
203
+ * Guide</i>.</p>
204
204
  *
205
205
  * @throws {@link STSServiceException}
206
206
  * <p>Base exception class for all service exceptions from STS service.</p>
@@ -32,8 +32,8 @@ declare const AssumeRoleWithSAMLCommand_base: {
32
32
  * enterprise identity store or directory to role-based Amazon Web Services access without user-specific
33
33
  * credentials or configuration. For a comparison of <code>AssumeRoleWithSAML</code> with the
34
34
  * other API operations that produce temporary credentials, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html">Requesting Temporary Security
35
- * Credentials</a> and <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#stsapi_comparison">Comparing the
36
- * Amazon Web Services STS API operations</a> in the <i>IAM User Guide</i>.</p>
35
+ * Credentials</a> and <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_sts-comparison.html">Compare STS
36
+ * credentials</a> in the <i>IAM User Guide</i>.</p>
37
37
  * <p>The temporary security credentials returned by this operation consist of an access key
38
38
  * ID, a secret access key, and a security token. Applications can use these temporary
39
39
  * security credentials to sign calls to Amazon Web Services services.</p>
@@ -230,15 +230,15 @@ declare const AssumeRoleWithSAMLCommand_base: {
230
230
  * tags are to the upper size limit. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html">Passing Session Tags in STS</a> in
231
231
  * the <i>IAM User Guide</i>.</p>
232
232
  * <p>You could receive this error even though you meet other defined session policy and
233
- * session tag limits. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-limits-entity-length">IAM and STS Entity
234
- * Character Limits</a> in the <i>IAM User Guide</i>.</p>
233
+ * session tag limits. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-limits-entity-length">IAM and STS Entity Character Limits</a> in the <i>IAM User
234
+ * Guide</i>.</p>
235
235
  *
236
236
  * @throws {@link RegionDisabledException} (client fault)
237
237
  * <p>STS is not activated in the requested region for the account that is being asked to
238
- * generate credentials. The account administrator must use the IAM console to activate STS
239
- * in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html">Activating and
240
- * Deactivating Amazon Web Services STS in an Amazon Web Services Region</a> in the <i>IAM User
241
- * Guide</i>.</p>
238
+ * generate credentials. The account administrator must use the IAM console to activate
239
+ * STS in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html">Activating and
240
+ * Deactivating STS in an Amazon Web Services Region</a> in the <i>IAM User
241
+ * Guide</i>.</p>
242
242
  *
243
243
  * @throws {@link STSServiceException}
244
244
  * <p>Base exception class for all service exceptions from STS service.</p>
@@ -47,8 +47,8 @@ declare const AssumeRoleWithWebIdentityCommand_base: {
47
47
  * using a token from the web identity provider. For a comparison of
48
48
  * <code>AssumeRoleWithWebIdentity</code> with the other API operations that produce
49
49
  * temporary credentials, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html">Requesting Temporary Security
50
- * Credentials</a> and <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#stsapi_comparison">Comparing the
51
- * Amazon Web Services STS API operations</a> in the <i>IAM User Guide</i>.</p>
50
+ * Credentials</a> and <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_sts-comparison.html">Compare STS
51
+ * credentials</a> in the <i>IAM User Guide</i>.</p>
52
52
  * <p>The temporary security credentials returned by this API consist of an access key ID, a
53
53
  * secret access key, and a security token. Applications can use these temporary security
54
54
  * credentials to sign calls to Amazon Web Services service API operations.</p>
@@ -60,8 +60,7 @@ declare const AssumeRoleWithWebIdentityCommand_base: {
60
60
  * optional <code>DurationSeconds</code> parameter to specify the duration of your session.
61
61
  * You can provide a value from 900 seconds (15 minutes) up to the maximum session duration
62
62
  * setting for the role. This setting can have a value from 1 hour to 12 hours. To learn how
63
- * to view the maximum value for your role, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html#id_roles_use_view-role-max-session">View the
64
- * Maximum Session Duration Setting for a Role</a> in the
63
+ * to view the maximum value for your role, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_update-role-settings.html#id_roles_update-session-duration">Update the maximum session duration for a role </a> in the
65
64
  * <i>IAM User Guide</i>. The maximum session duration limit applies when
66
65
  * you use the <code>AssumeRole*</code> API operations or the <code>assume-role*</code> CLI
67
66
  * commands. However the limit does not apply when you use those operations to create a
@@ -130,7 +129,7 @@ declare const AssumeRoleWithWebIdentityCommand_base: {
130
129
  * or a pairwise identifier, as <a href="http://openid.net/specs/openid-connect-core-1_0.html#SubjectIDTypes">suggested
131
130
  * in the OIDC specification</a>.</p>
132
131
  * </important>
133
- * <p>For more information about how to use web identity federation and the
132
+ * <p>For more information about how to use OIDC federation and the
134
133
  * <code>AssumeRoleWithWebIdentity</code> API, see the following resources: </p>
135
134
  * <ul>
136
135
  * <li>
@@ -139,25 +138,11 @@ declare const AssumeRoleWithWebIdentityCommand_base: {
139
138
  * </li>
140
139
  * <li>
141
140
  * <p>
142
- * <a href="https://aws.amazon.com/blogs/aws/the-aws-web-identity-federation-playground/"> Web Identity Federation Playground</a>. Walk through the process of
143
- * authenticating through Login with Amazon, Facebook, or Google, getting temporary
144
- * security credentials, and then using those credentials to make a request to Amazon Web Services.
145
- * </p>
146
- * </li>
147
- * <li>
148
- * <p>
149
141
  * <a href="http://aws.amazon.com/sdkforios/">Amazon Web Services SDK for iOS Developer Guide</a> and <a href="http://aws.amazon.com/sdkforandroid/">Amazon Web Services SDK for Android Developer Guide</a>. These toolkits
150
142
  * contain sample apps that show how to invoke the identity providers. The toolkits then
151
143
  * show how to use the information from these providers to get and use temporary
152
144
  * security credentials. </p>
153
145
  * </li>
154
- * <li>
155
- * <p>
156
- * <a href="http://aws.amazon.com/articles/web-identity-federation-with-mobile-applications">Web Identity
157
- * Federation with Mobile Applications</a>. This article discusses web identity
158
- * federation and shows an example of how to use web identity federation to get access
159
- * to content in Amazon S3. </p>
160
- * </li>
161
146
  * </ul>
162
147
  * @example
163
148
  * Use a bare-bones client and the command you need to make an API call.
@@ -211,11 +196,11 @@ declare const AssumeRoleWithWebIdentityCommand_base: {
211
196
  * token from the identity provider and then retry the request.</p>
212
197
  *
213
198
  * @throws {@link IDPCommunicationErrorException} (client fault)
214
- * <p>The request could not be fulfilled because the identity provider (IDP) that
215
- * was asked to verify the incoming identity token could not be reached. This is often a
216
- * transient error caused by network conditions. Retry the request a limited number of
217
- * times so that you don't exceed the request rate. If the error persists, the
218
- * identity provider might be down or not responding.</p>
199
+ * <p>The request could not be fulfilled because the identity provider (IDP) that was asked
200
+ * to verify the incoming identity token could not be reached. This is often a transient
201
+ * error caused by network conditions. Retry the request a limited number of times so that
202
+ * you don't exceed the request rate. If the error persists, the identity provider might be
203
+ * down or not responding.</p>
219
204
  *
220
205
  * @throws {@link IDPRejectedClaimException} (client fault)
221
206
  * <p>The identity provider (IdP) reported that authentication failed. This might be because
@@ -239,15 +224,15 @@ declare const AssumeRoleWithWebIdentityCommand_base: {
239
224
  * tags are to the upper size limit. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html">Passing Session Tags in STS</a> in
240
225
  * the <i>IAM User Guide</i>.</p>
241
226
  * <p>You could receive this error even though you meet other defined session policy and
242
- * session tag limits. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-limits-entity-length">IAM and STS Entity
243
- * Character Limits</a> in the <i>IAM User Guide</i>.</p>
227
+ * session tag limits. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-limits-entity-length">IAM and STS Entity Character Limits</a> in the <i>IAM User
228
+ * Guide</i>.</p>
244
229
  *
245
230
  * @throws {@link RegionDisabledException} (client fault)
246
231
  * <p>STS is not activated in the requested region for the account that is being asked to
247
- * generate credentials. The account administrator must use the IAM console to activate STS
248
- * in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html">Activating and
249
- * Deactivating Amazon Web Services STS in an Amazon Web Services Region</a> in the <i>IAM User
250
- * Guide</i>.</p>
232
+ * generate credentials. The account administrator must use the IAM console to activate
233
+ * STS in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html">Activating and
234
+ * Deactivating STS in an Amazon Web Services Region</a> in the <i>IAM User
235
+ * Guide</i>.</p>
251
236
  *
252
237
  * @throws {@link STSServiceException}
253
238
  * <p>Base exception class for all service exceptions from STS service.</p>
@@ -0,0 +1,129 @@
1
+ import { Command as $Command } from "@smithy/smithy-client";
2
+ import { MetadataBearer as __MetadataBearer } from "@smithy/types";
3
+ import { AssumeRootRequest, AssumeRootResponse } from "../models/models_0";
4
+ import { ServiceInputTypes, ServiceOutputTypes, STSClientResolvedConfig } from "../STSClient";
5
+ /**
6
+ * @public
7
+ */
8
+ export type { __MetadataBearer };
9
+ export { $Command };
10
+ /**
11
+ * @public
12
+ *
13
+ * The input for {@link AssumeRootCommand}.
14
+ */
15
+ export interface AssumeRootCommandInput extends AssumeRootRequest {
16
+ }
17
+ /**
18
+ * @public
19
+ *
20
+ * The output of {@link AssumeRootCommand}.
21
+ */
22
+ export interface AssumeRootCommandOutput extends AssumeRootResponse, __MetadataBearer {
23
+ }
24
+ declare const AssumeRootCommand_base: {
25
+ new (input: AssumeRootCommandInput): import("@smithy/smithy-client").CommandImpl<AssumeRootCommandInput, AssumeRootCommandOutput, STSClientResolvedConfig, ServiceInputTypes, ServiceOutputTypes>;
26
+ new (__0_0: AssumeRootCommandInput): import("@smithy/smithy-client").CommandImpl<AssumeRootCommandInput, AssumeRootCommandOutput, STSClientResolvedConfig, ServiceInputTypes, ServiceOutputTypes>;
27
+ getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
28
+ };
29
+ /**
30
+ * <p>Returns a set of short term credentials you can use to perform privileged tasks in a
31
+ * member account.</p>
32
+ * <p>Before you can launch a privileged session, you must have enabled centralized root
33
+ * access in your organization. For steps to enable this feature, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_root-enable-root-access.html">Centralize root access for member accounts</a> in the <i>IAM User
34
+ * Guide</i>.</p>
35
+ * <note>
36
+ * <p>The global endpoint is not supported for AssumeRoot. You must send this request to a
37
+ * Regional STS endpoint. For more information, see <a href="https://docs.aws.amazon.com/STS/latest/APIReference/welcome.html#sts-endpoints">Endpoints</a>.</p>
38
+ * </note>
39
+ * <p>You can track AssumeRoot in CloudTrail logs to determine what actions were performed in a
40
+ * session. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/cloudtrail-track-privileged-tasks.html">Track privileged tasks
41
+ * in CloudTrail</a> in the <i>IAM User Guide</i>.</p>
42
+ * @example
43
+ * Use a bare-bones client and the command you need to make an API call.
44
+ * ```javascript
45
+ * import { STSClient, AssumeRootCommand } from "@aws-sdk/client-sts"; // ES Modules import
46
+ * // const { STSClient, AssumeRootCommand } = require("@aws-sdk/client-sts"); // CommonJS import
47
+ * const client = new STSClient(config);
48
+ * const input = { // AssumeRootRequest
49
+ * TargetPrincipal: "STRING_VALUE", // required
50
+ * TaskPolicyArn: { // PolicyDescriptorType
51
+ * arn: "STRING_VALUE",
52
+ * },
53
+ * DurationSeconds: Number("int"),
54
+ * };
55
+ * const command = new AssumeRootCommand(input);
56
+ * const response = await client.send(command);
57
+ * // { // AssumeRootResponse
58
+ * // Credentials: { // Credentials
59
+ * // AccessKeyId: "STRING_VALUE", // required
60
+ * // SecretAccessKey: "STRING_VALUE", // required
61
+ * // SessionToken: "STRING_VALUE", // required
62
+ * // Expiration: new Date("TIMESTAMP"), // required
63
+ * // },
64
+ * // SourceIdentity: "STRING_VALUE",
65
+ * // };
66
+ *
67
+ * ```
68
+ *
69
+ * @param AssumeRootCommandInput - {@link AssumeRootCommandInput}
70
+ * @returns {@link AssumeRootCommandOutput}
71
+ * @see {@link AssumeRootCommandInput} for command's `input` shape.
72
+ * @see {@link AssumeRootCommandOutput} for command's `response` shape.
73
+ * @see {@link STSClientResolvedConfig | config} for STSClient's `config` shape.
74
+ *
75
+ * @throws {@link ExpiredTokenException} (client fault)
76
+ * <p>The web identity token that was passed is expired or is not valid. Get a new identity
77
+ * token from the identity provider and then retry the request.</p>
78
+ *
79
+ * @throws {@link RegionDisabledException} (client fault)
80
+ * <p>STS is not activated in the requested region for the account that is being asked to
81
+ * generate credentials. The account administrator must use the IAM console to activate
82
+ * STS in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html">Activating and
83
+ * Deactivating STS in an Amazon Web Services Region</a> in the <i>IAM User
84
+ * Guide</i>.</p>
85
+ *
86
+ * @throws {@link STSServiceException}
87
+ * <p>Base exception class for all service exceptions from STS service.</p>
88
+ *
89
+ * @public
90
+ * @example To launch a privileged session
91
+ * ```javascript
92
+ * // The following command retrieves a set of short-term credentials you can use to unlock an S3 bucket for a member account by removing the bucket policy.
93
+ * const input = {
94
+ * "DurationSeconds": 900,
95
+ * "TargetPrincipal": "111122223333",
96
+ * "TaskPolicyArn": {
97
+ * "arn": "arn:aws:iam::aws:policy/root-task/S3UnlockBucketPolicy"
98
+ * }
99
+ * };
100
+ * const command = new AssumeRootCommand(input);
101
+ * const response = await client.send(command);
102
+ * /* response ==
103
+ * {
104
+ * "Credentials": {
105
+ * "AccessKeyId": "ASIAJEXAMPLEXEG2JICEA",
106
+ * "Expiration": "2024-11-15T00:05:07Z",
107
+ * "SecretAccessKey": "9drTJvcXLB89EXAMPLELB8923FB892xMFI",
108
+ * "SessionToken": "AQoXdzELDDY//////////wEaoAK1wvxJY12r2IrDFT2IvAzTCn3zHoZ7YNtpiQLF0MqZye/qwjzP2iEXAMPLEbw/m3hsj8VBTkPORGvr9jM5sgP+w9IZWZnU+LWhmg+a5fDi2oTGUYcdg9uexQ4mtCHIHfi4citgqZTgco40Yqr4lIlo4V2b2Dyauk0eYFNebHtYlFVgAUj+7Indz3LU0aTWk1WKIjHmmMCIoTkyYp/k7kUG7moeEYKSitwQIi6Gjn+nyzM+PtoA3685ixzv0R7i5rjQi0YE0lf1oeie3bDiNHncmzosRM6SFiPzSvp6h/32xQuZsjcypmwsPSDtTPYcs0+YN/8BRi2/IcrxSpnWEXAMPLEXSDFTAQAM6Dl9zR0tXoybnlrZIwMLlMi1Kcgo5OytwU="
109
+ * },
110
+ * "SourceIdentity": "Alice"
111
+ * }
112
+ * *\/
113
+ * // example id: to-launch-a-privileged-session-1731335424565
114
+ * ```
115
+ *
116
+ */
117
+ export declare class AssumeRootCommand extends AssumeRootCommand_base {
118
+ /** @internal type navigation helper, not in runtime. */
119
+ protected static __types: {
120
+ api: {
121
+ input: AssumeRootRequest;
122
+ output: AssumeRootResponse;
123
+ };
124
+ sdk: {
125
+ input: AssumeRootCommandInput;
126
+ output: AssumeRootCommandOutput;
127
+ };
128
+ };
129
+ }
@@ -88,8 +88,8 @@ declare const DecodeAuthorizationMessageCommand_base: {
88
88
  *
89
89
  * @throws {@link InvalidAuthorizationMessageException} (client fault)
90
90
  * <p>The error returned if the message passed to <code>DecodeAuthorizationMessage</code>
91
- * was invalid. This can happen if the token contains invalid characters, such as
92
- * linebreaks. </p>
91
+ * was invalid. This can happen if the token contains invalid characters, such as line
92
+ * breaks, or if the message has expired.</p>
93
93
  *
94
94
  * @throws {@link STSServiceException}
95
95
  * <p>Base exception class for all service exceptions from STS service.</p>
@@ -36,8 +36,8 @@ declare const GetFederationTokenCommand_base: {
36
36
  * contexts where those credentials can be safeguarded, usually in a server-based application.
37
37
  * For a comparison of <code>GetFederationToken</code> with the other API operations that
38
38
  * produce temporary credentials, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html">Requesting Temporary Security
39
- * Credentials</a> and <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#stsapi_comparison">Comparing the
40
- * Amazon Web Services STS API operations</a> in the <i>IAM User Guide</i>.</p>
39
+ * Credentials</a> and <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_sts-comparison.html">Compare STS
40
+ * credentials</a> in the <i>IAM User Guide</i>.</p>
41
41
  * <p>Although it is possible to call <code>GetFederationToken</code> using the security
42
42
  * credentials of an Amazon Web Services account root user rather than an IAM user that you
43
43
  * create for the purpose of a proxy application, we do not recommend it. For more
@@ -174,15 +174,15 @@ declare const GetFederationTokenCommand_base: {
174
174
  * tags are to the upper size limit. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html">Passing Session Tags in STS</a> in
175
175
  * the <i>IAM User Guide</i>.</p>
176
176
  * <p>You could receive this error even though you meet other defined session policy and
177
- * session tag limits. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-limits-entity-length">IAM and STS Entity
178
- * Character Limits</a> in the <i>IAM User Guide</i>.</p>
177
+ * session tag limits. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-limits-entity-length">IAM and STS Entity Character Limits</a> in the <i>IAM User
178
+ * Guide</i>.</p>
179
179
  *
180
180
  * @throws {@link RegionDisabledException} (client fault)
181
181
  * <p>STS is not activated in the requested region for the account that is being asked to
182
- * generate credentials. The account administrator must use the IAM console to activate STS
183
- * in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html">Activating and
184
- * Deactivating Amazon Web Services STS in an Amazon Web Services Region</a> in the <i>IAM User
185
- * Guide</i>.</p>
182
+ * generate credentials. The account administrator must use the IAM console to activate
183
+ * STS in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html">Activating and
184
+ * Deactivating STS in an Amazon Web Services Region</a> in the <i>IAM User
185
+ * Guide</i>.</p>
186
186
  *
187
187
  * @throws {@link STSServiceException}
188
188
  * <p>Base exception class for all service exceptions from STS service.</p>
@@ -38,8 +38,8 @@ declare const GetSessionTokenCommand_base: {
38
38
  * calls to API operations that require MFA authentication. An incorrect MFA code causes the
39
39
  * API to return an access denied error. For a comparison of <code>GetSessionToken</code> with
40
40
  * the other API operations that produce temporary credentials, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html">Requesting
41
- * Temporary Security Credentials</a> and <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#stsapi_comparison">Comparing the
42
- * Amazon Web Services STS API operations</a> in the <i>IAM User Guide</i>.</p>
41
+ * Temporary Security Credentials</a> and <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_sts-comparison.html">Compare STS
42
+ * credentials</a> in the <i>IAM User Guide</i>.</p>
43
43
  * <note>
44
44
  * <p>No permissions are required for users to perform this operation. The purpose of the
45
45
  * <code>sts:GetSessionToken</code> operation is to authenticate the user using MFA. You
@@ -118,10 +118,10 @@ declare const GetSessionTokenCommand_base: {
118
118
  *
119
119
  * @throws {@link RegionDisabledException} (client fault)
120
120
  * <p>STS is not activated in the requested region for the account that is being asked to
121
- * generate credentials. The account administrator must use the IAM console to activate STS
122
- * in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html">Activating and
123
- * Deactivating Amazon Web Services STS in an Amazon Web Services Region</a> in the <i>IAM User
124
- * Guide</i>.</p>
121
+ * generate credentials. The account administrator must use the IAM console to activate
122
+ * STS in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html">Activating and
123
+ * Deactivating STS in an Amazon Web Services Region</a> in the <i>IAM User
124
+ * Guide</i>.</p>
125
125
  *
126
126
  * @throws {@link STSServiceException}
127
127
  * <p>Base exception class for all service exceptions from STS service.</p>
@@ -1,6 +1,7 @@
1
1
  export * from "./AssumeRoleCommand";
2
2
  export * from "./AssumeRoleWithSAMLCommand";
3
3
  export * from "./AssumeRoleWithWebIdentityCommand";
4
+ export * from "./AssumeRootCommand";
4
5
  export * from "./DecodeAuthorizationMessageCommand";
5
6
  export * from "./GetAccessKeyInfoCommand";
6
7
  export * from "./GetCallerIdentityCommand";