@cdklabs/cdk-ecs-codedeploy 0.0.345 → 0.0.347

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (132) hide show
  1. package/.jsii +3 -3
  2. package/.jsii.tabl.json +1 -1
  3. package/lib/api-canary/index.js +1 -1
  4. package/lib/ecs-appspec/index.js +1 -1
  5. package/lib/ecs-deployment/index.js +1 -1
  6. package/lib/ecs-patterns/application-load-balanced-codedeployed-fargate-service.js +1 -1
  7. package/node_modules/@aws-sdk/client-codedeploy/dist-types/models/models_0.d.ts +376 -376
  8. package/node_modules/@aws-sdk/client-codedeploy/dist-types/ts3.4/models/models_0.d.ts +386 -376
  9. package/node_modules/@aws-sdk/client-codedeploy/package.json +36 -36
  10. package/node_modules/@aws-sdk/client-sso/dist-types/models/models_0.d.ts +18 -18
  11. package/node_modules/@aws-sdk/client-sso/dist-types/ts3.4/models/models_0.d.ts +18 -18
  12. package/node_modules/@aws-sdk/client-sso/package.json +32 -32
  13. package/node_modules/@aws-sdk/client-sso-oidc/dist-types/models/models_0.d.ts +74 -74
  14. package/node_modules/@aws-sdk/client-sso-oidc/dist-types/ts3.4/models/models_0.d.ts +74 -74
  15. package/node_modules/@aws-sdk/client-sso-oidc/package.json +34 -34
  16. package/node_modules/@aws-sdk/client-sts/README.md +8 -0
  17. package/node_modules/@aws-sdk/client-sts/dist-cjs/index.js +89 -12
  18. package/node_modules/@aws-sdk/client-sts/dist-es/STS.js +2 -0
  19. package/node_modules/@aws-sdk/client-sts/dist-es/commands/AssumeRootCommand.js +23 -0
  20. package/node_modules/@aws-sdk/client-sts/dist-es/commands/index.js +1 -0
  21. package/node_modules/@aws-sdk/client-sts/dist-es/models/models_0.js +4 -0
  22. package/node_modules/@aws-sdk/client-sts/dist-es/protocols/Aws_query.js +53 -0
  23. package/node_modules/@aws-sdk/client-sts/dist-types/STS.d.ts +7 -0
  24. package/node_modules/@aws-sdk/client-sts/dist-types/STSClient.d.ts +3 -2
  25. package/node_modules/@aws-sdk/client-sts/dist-types/commands/AssumeRoleCommand.d.ts +13 -13
  26. package/node_modules/@aws-sdk/client-sts/dist-types/commands/AssumeRoleWithSAMLCommand.d.ts +8 -8
  27. package/node_modules/@aws-sdk/client-sts/dist-types/commands/AssumeRoleWithWebIdentityCommand.d.ts +15 -30
  28. package/node_modules/@aws-sdk/client-sts/dist-types/commands/AssumeRootCommand.d.ts +129 -0
  29. package/node_modules/@aws-sdk/client-sts/dist-types/commands/DecodeAuthorizationMessageCommand.d.ts +2 -2
  30. package/node_modules/@aws-sdk/client-sts/dist-types/commands/GetFederationTokenCommand.d.ts +8 -8
  31. package/node_modules/@aws-sdk/client-sts/dist-types/commands/GetSessionTokenCommand.d.ts +6 -6
  32. package/node_modules/@aws-sdk/client-sts/dist-types/commands/index.d.ts +1 -0
  33. package/node_modules/@aws-sdk/client-sts/dist-types/models/models_0.d.ts +202 -88
  34. package/node_modules/@aws-sdk/client-sts/dist-types/protocols/Aws_query.d.ts +9 -0
  35. package/node_modules/@aws-sdk/client-sts/dist-types/ts3.4/STS.d.ts +17 -0
  36. package/node_modules/@aws-sdk/client-sts/dist-types/ts3.4/STSClient.d.ts +6 -0
  37. package/node_modules/@aws-sdk/client-sts/dist-types/ts3.4/commands/AssumeRootCommand.d.ts +47 -0
  38. package/node_modules/@aws-sdk/client-sts/dist-types/ts3.4/commands/index.d.ts +1 -0
  39. package/node_modules/@aws-sdk/client-sts/dist-types/ts3.4/models/models_0.d.ts +68 -56
  40. package/node_modules/@aws-sdk/client-sts/dist-types/ts3.4/protocols/Aws_query.d.ts +12 -0
  41. package/node_modules/@aws-sdk/client-sts/package.json +36 -36
  42. package/node_modules/@aws-sdk/core/package.json +14 -14
  43. package/node_modules/@aws-sdk/credential-provider-env/package.json +7 -7
  44. package/node_modules/@aws-sdk/credential-provider-http/package.json +12 -12
  45. package/node_modules/@aws-sdk/credential-provider-ini/package.json +15 -15
  46. package/node_modules/@aws-sdk/credential-provider-node/package.json +14 -14
  47. package/node_modules/@aws-sdk/credential-provider-process/package.json +8 -8
  48. package/node_modules/@aws-sdk/credential-provider-sso/package.json +10 -10
  49. package/node_modules/@aws-sdk/credential-provider-web-identity/package.json +10 -10
  50. package/node_modules/@aws-sdk/middleware-host-header/package.json +8 -8
  51. package/node_modules/@aws-sdk/middleware-logger/package.json +7 -7
  52. package/node_modules/@aws-sdk/middleware-recursion-detection/package.json +8 -8
  53. package/node_modules/@aws-sdk/middleware-user-agent/package.json +11 -11
  54. package/node_modules/@aws-sdk/region-config-resolver/package.json +7 -7
  55. package/node_modules/@aws-sdk/token-providers/package.json +8 -8
  56. package/node_modules/@aws-sdk/types/package.json +2 -2
  57. package/node_modules/@aws-sdk/util-endpoints/package.json +8 -8
  58. package/node_modules/@aws-sdk/util-locate-window/package.json +3 -3
  59. package/node_modules/@aws-sdk/util-user-agent-browser/package.json +5 -5
  60. package/node_modules/@aws-sdk/util-user-agent-node/package.json +7 -7
  61. package/node_modules/@smithy/abort-controller/package.json +4 -3
  62. package/node_modules/@smithy/config-resolver/package.json +7 -6
  63. package/node_modules/@smithy/core/dist-cjs/submodules/protocols/index.js +21 -20
  64. package/node_modules/@smithy/core/dist-es/submodules/protocols/requestBuilder.js +1 -1
  65. package/node_modules/@smithy/core/package.json +10 -9
  66. package/node_modules/@smithy/credential-provider-imds/package.json +7 -7
  67. package/node_modules/@smithy/fetch-http-handler/dist-cjs/create-request.js +1 -0
  68. package/node_modules/@smithy/fetch-http-handler/dist-cjs/index.js +10 -3
  69. package/node_modules/@smithy/fetch-http-handler/dist-es/create-request.js +3 -0
  70. package/node_modules/@smithy/fetch-http-handler/dist-es/fetch-http-handler.js +3 -2
  71. package/node_modules/@smithy/fetch-http-handler/dist-es/stream-collector.js +1 -1
  72. package/node_modules/@smithy/fetch-http-handler/dist-types/create-request.d.ts +6 -0
  73. package/node_modules/@smithy/fetch-http-handler/dist-types/fetch-http-handler.d.ts +6 -0
  74. package/node_modules/@smithy/fetch-http-handler/dist-types/ts3.4/create-request.d.ts +6 -0
  75. package/node_modules/@smithy/fetch-http-handler/dist-types/ts3.4/fetch-http-handler.d.ts +6 -0
  76. package/node_modules/@smithy/fetch-http-handler/package.json +9 -6
  77. package/node_modules/@smithy/hash-node/package.json +4 -3
  78. package/node_modules/@smithy/invalid-dependency/package.json +4 -3
  79. package/node_modules/@smithy/middleware-content-length/package.json +5 -4
  80. package/node_modules/@smithy/middleware-endpoint/package.json +11 -10
  81. package/node_modules/@smithy/middleware-retry/package.json +12 -10
  82. package/node_modules/@smithy/middleware-serde/package.json +6 -4
  83. package/node_modules/@smithy/middleware-stack/package.json +4 -3
  84. package/node_modules/@smithy/node-config-provider/package.json +6 -5
  85. package/node_modules/@smithy/node-http-handler/dist-cjs/index.js +20 -14
  86. package/node_modules/@smithy/node-http-handler/dist-cjs/timing.js +1 -0
  87. package/node_modules/@smithy/node-http-handler/dist-es/node-http-handler.js +5 -4
  88. package/node_modules/@smithy/node-http-handler/dist-es/node-http2-connection-manager.js +1 -1
  89. package/node_modules/@smithy/node-http-handler/dist-es/server.mock.js +9 -2
  90. package/node_modules/@smithy/node-http-handler/dist-es/set-connection-timeout.js +5 -4
  91. package/node_modules/@smithy/node-http-handler/dist-es/set-socket-keep-alive.js +2 -1
  92. package/node_modules/@smithy/node-http-handler/dist-es/set-socket-timeout.js +2 -1
  93. package/node_modules/@smithy/node-http-handler/dist-es/timing.js +4 -0
  94. package/node_modules/@smithy/node-http-handler/dist-es/write-request-body.js +4 -3
  95. package/node_modules/@smithy/node-http-handler/dist-types/timing.d.ts +8 -0
  96. package/node_modules/@smithy/node-http-handler/dist-types/ts3.4/timing.d.ts +8 -0
  97. package/node_modules/@smithy/node-http-handler/package.json +7 -6
  98. package/node_modules/@smithy/property-provider/package.json +4 -3
  99. package/node_modules/@smithy/protocol-http/package.json +4 -3
  100. package/node_modules/@smithy/querystring-builder/package.json +2 -2
  101. package/node_modules/@smithy/querystring-parser/package.json +4 -3
  102. package/node_modules/@smithy/service-error-classification/package.json +4 -3
  103. package/node_modules/@smithy/shared-ini-file-loader/package.json +4 -3
  104. package/node_modules/@smithy/signature-v4/package.json +6 -5
  105. package/node_modules/@smithy/smithy-client/package.json +9 -8
  106. package/node_modules/@smithy/types/dist-types/http.d.ts +1 -0
  107. package/node_modules/@smithy/types/dist-types/transform/no-undefined.d.ts +3 -2
  108. package/node_modules/@smithy/types/dist-types/ts3.4/http.d.ts +1 -0
  109. package/node_modules/@smithy/types/dist-types/ts3.4/transform/no-undefined.d.ts +3 -2
  110. package/node_modules/@smithy/types/package.json +1 -1
  111. package/node_modules/@smithy/url-parser/package.json +5 -4
  112. package/node_modules/@smithy/util-defaults-mode-browser/package.json +6 -5
  113. package/node_modules/@smithy/util-defaults-mode-node/package.json +9 -8
  114. package/node_modules/@smithy/util-endpoints/package.json +7 -5
  115. package/node_modules/@smithy/util-middleware/package.json +4 -3
  116. package/node_modules/@smithy/util-retry/dist-cjs/index.js +5 -1
  117. package/node_modules/@smithy/util-retry/dist-es/DefaultRateLimiter.js +2 -1
  118. package/node_modules/@smithy/util-retry/dist-types/DefaultRateLimiter.d.ts +4 -0
  119. package/node_modules/@smithy/util-retry/dist-types/ts3.4/DefaultRateLimiter.d.ts +4 -0
  120. package/node_modules/@smithy/util-retry/package.json +5 -4
  121. package/node_modules/@smithy/util-stream/dist-cjs/index.js +1 -0
  122. package/node_modules/@smithy/util-stream/dist-cjs/sdk-stream-mixin.js +1 -2
  123. package/node_modules/@smithy/util-stream/dist-cjs/splitStream.js +1 -1
  124. package/node_modules/@smithy/util-stream/dist-cjs/stream-type-check.js +6 -1
  125. package/node_modules/@smithy/util-stream/dist-es/sdk-stream-mixin.js +0 -1
  126. package/node_modules/@smithy/util-stream/dist-es/splitStream.js +2 -2
  127. package/node_modules/@smithy/util-stream/dist-es/stream-type-check.js +3 -0
  128. package/node_modules/@smithy/util-stream/dist-types/stream-type-check.d.ts +4 -0
  129. package/node_modules/@smithy/util-stream/dist-types/ts3.4/stream-type-check.d.ts +4 -0
  130. package/node_modules/@smithy/util-stream/package.json +10 -6
  131. package/node_modules/@smithy/util-waiter/package.json +5 -4
  132. package/package.json +6 -6
@@ -32,7 +32,7 @@ export interface PolicyDescriptorType {
32
32
  * Service Namespaces</a> in the <i>Amazon Web Services General Reference</i>.</p>
33
33
  * @public
34
34
  */
35
- arn?: string;
35
+ arn?: string | undefined;
36
36
  }
37
37
  /**
38
38
  * <p>Contains information about the provided context. This includes the signed and encrypted
@@ -45,13 +45,13 @@ export interface ProvidedContext {
45
45
  * <p>The context provider ARN from which the trusted context assertion was generated.</p>
46
46
  * @public
47
47
  */
48
- ProviderArn?: string;
48
+ ProviderArn?: string | undefined;
49
49
  /**
50
50
  * <p>The signed and encrypted trusted context assertion generated by the context provider.
51
51
  * The trusted context assertion is signed and encrypted by Amazon Web Services STS.</p>
52
52
  * @public
53
53
  */
54
- ContextAssertion?: string;
54
+ ContextAssertion?: string | undefined;
55
55
  }
56
56
  /**
57
57
  * <p>You can pass custom key-value pair attributes when you assume a role or federate a user.
@@ -95,6 +95,11 @@ export interface AssumeRoleRequest {
95
95
  * session name is also used in the ARN of the assumed role principal. This means that
96
96
  * subsequent cross-account API requests that use the temporary security credentials will
97
97
  * expose the role session name to the external account in their CloudTrail logs.</p>
98
+ * <p>For security purposes, administrators can view this field in <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/cloudtrail-integration.html#cloudtrail-integration_signin-tempcreds">CloudTrail logs</a> to help identify who performed an action in Amazon Web Services. Your
99
+ * administrator might require that you specify your user name as the session name when you
100
+ * assume the role. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_iam-condition-keys.html#ck_rolesessionname">
101
+ * <code>sts:RoleSessionName</code>
102
+ * </a>.</p>
98
103
  * <p>The regex used to validate this parameter is a string of characters
99
104
  * consisting of upper- and lower-case alphanumeric characters with no spaces. You can
100
105
  * also include underscores or any of the following characters: =,.@-</p>
@@ -125,7 +130,7 @@ export interface AssumeRoleRequest {
125
130
  * Policies</a> in the <i>IAM User Guide</i>.</p>
126
131
  * @public
127
132
  */
128
- PolicyArns?: PolicyDescriptorType[];
133
+ PolicyArns?: PolicyDescriptorType[] | undefined;
129
134
  /**
130
135
  * <p>An IAM policy in JSON format that you want to use as an inline session policy.</p>
131
136
  * <p>This parameter is optional. Passing policies to this operation returns new
@@ -148,9 +153,11 @@ export interface AssumeRoleRequest {
148
153
  * <code>PackedPolicySize</code> response element indicates by percentage how close the
149
154
  * policies and tags for your request are to the upper size limit.</p>
150
155
  * </note>
156
+ * <p>For more information about role session permissions, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session">Session
157
+ * policies</a>.</p>
151
158
  * @public
152
159
  */
153
- Policy?: string;
160
+ Policy?: string | undefined;
154
161
  /**
155
162
  * <p>The duration, in seconds, of the role session. The value specified can range from 900
156
163
  * seconds (15 minutes) up to the maximum session duration set for the role. The maximum
@@ -164,9 +171,7 @@ export interface AssumeRoleRequest {
164
171
  * specify a parameter value of up to 43200 seconds (12 hours), depending on the maximum
165
172
  * session duration setting for your role. However, if you assume a role using role chaining
166
173
  * and provide a <code>DurationSeconds</code> parameter value greater than one hour, the
167
- * operation fails. To learn how to view the maximum value for your role, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html#id_roles_use_view-role-max-session">View the
168
- * Maximum Session Duration Setting for a Role</a> in the
169
- * <i>IAM User Guide</i>.</p>
174
+ * operation fails. To learn how to view the maximum value for your role, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_update-role-settings.html#id_roles_update-session-duration">Update the maximum session duration for a role</a>.</p>
170
175
  * <p>By default, the value is set to <code>3600</code> seconds. </p>
171
176
  * <note>
172
177
  * <p>The <code>DurationSeconds</code> parameter is separate from the duration of a console
@@ -179,7 +184,7 @@ export interface AssumeRoleRequest {
179
184
  * </note>
180
185
  * @public
181
186
  */
182
- DurationSeconds?: number;
187
+ DurationSeconds?: number | undefined;
183
188
  /**
184
189
  * <p>A list of session tags that you want to pass. Each session tag consists of a key name
185
190
  * and an associated value. For more information about session tags, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html">Tagging Amazon Web Services STS
@@ -210,19 +215,19 @@ export interface AssumeRoleRequest {
210
215
  * <i>IAM User Guide</i>.</p>
211
216
  * @public
212
217
  */
213
- Tags?: Tag[];
218
+ Tags?: Tag[] | undefined;
214
219
  /**
215
220
  * <p>A list of keys for session tags that you want to set as transitive. If you set a tag key
216
221
  * as transitive, the corresponding key and value passes to subsequent sessions in a role
217
222
  * chain. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html#id_session-tags_role-chaining">Chaining Roles
218
223
  * with Session Tags</a> in the <i>IAM User Guide</i>.</p>
219
- * <p>This parameter is optional. When you set session tags as transitive, the session policy
220
- * and session tags packed binary limit is not affected.</p>
224
+ * <p>This parameter is optional. The transitive status of a session tag does not impact its
225
+ * packed binary size.</p>
221
226
  * <p>If you choose not to specify a transitive tag key, then no tags are passed from this
222
227
  * session to any subsequent sessions.</p>
223
228
  * @public
224
229
  */
225
- TransitiveTagKeys?: string[];
230
+ TransitiveTagKeys?: string[] | undefined;
226
231
  /**
227
232
  * <p>A unique identifier that might be required when you assume a role in another account. If
228
233
  * the administrator of the account to which the role belongs provided you with an external
@@ -239,7 +244,7 @@ export interface AssumeRoleRequest {
239
244
  * You can also include underscores or any of the following characters: =,.@:/-</p>
240
245
  * @public
241
246
  */
242
- ExternalId?: string;
247
+ ExternalId?: string | undefined;
243
248
  /**
244
249
  * <p>The identification number of the MFA device that is associated with the user who is
245
250
  * making the <code>AssumeRole</code> call. Specify this value if the trust policy of the role
@@ -252,7 +257,7 @@ export interface AssumeRoleRequest {
252
257
  * also include underscores or any of the following characters: =,.@-</p>
253
258
  * @public
254
259
  */
255
- SerialNumber?: string;
260
+ SerialNumber?: string | undefined;
256
261
  /**
257
262
  * <p>The value provided by the MFA device, if the trust policy of the role being assumed
258
263
  * requires MFA. (In other words, if the policy includes a condition that tests for MFA). If
@@ -262,16 +267,18 @@ export interface AssumeRoleRequest {
262
267
  * numeric digits.</p>
263
268
  * @public
264
269
  */
265
- TokenCode?: string;
270
+ TokenCode?: string | undefined;
266
271
  /**
267
272
  * <p>The source identity specified by the principal that is calling the
268
- * <code>AssumeRole</code> operation.</p>
273
+ * <code>AssumeRole</code> operation. The source identity value persists across <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles.html#iam-term-role-chaining">chained role</a> sessions.</p>
269
274
  * <p>You can require users to specify a source identity when they assume a role. You do this
270
- * by using the <code>sts:SourceIdentity</code> condition key in a role trust policy. You can
271
- * use source identity information in CloudTrail logs to determine who took actions with a role.
272
- * You can use the <code>aws:SourceIdentity</code> condition key to further control access to
273
- * Amazon Web Services resources based on the value of source identity. For more information about using
274
- * source identity, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_monitor.html">Monitor and control
275
+ * by using the <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html#condition-keys-sourceidentity">
276
+ * <code>sts:SourceIdentity</code>
277
+ * </a> condition key in a role trust policy. You
278
+ * can use source identity information in CloudTrail logs to determine who took actions with a
279
+ * role. You can use the <code>aws:SourceIdentity</code> condition key to further control
280
+ * access to Amazon Web Services resources based on the value of source identity. For more information about
281
+ * using source identity, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_monitor.html">Monitor and control
275
282
  * actions taken with assumed roles</a> in the
276
283
  * <i>IAM User Guide</i>.</p>
277
284
  * <p>The regex used to validate this parameter is a string of characters consisting of upper-
@@ -280,7 +287,7 @@ export interface AssumeRoleRequest {
280
287
  * <code>aws:</code>. This prefix is reserved for Amazon Web Services internal use.</p>
281
288
  * @public
282
289
  */
283
- SourceIdentity?: string;
290
+ SourceIdentity?: string | undefined;
284
291
  /**
285
292
  * <p>A list of previously acquired trusted context assertions in the format of a JSON array.
286
293
  * The trusted context assertion is signed and encrypted by Amazon Web Services STS.</p>
@@ -292,7 +299,7 @@ export interface AssumeRoleRequest {
292
299
  * </p>
293
300
  * @public
294
301
  */
295
- ProvidedContexts?: ProvidedContext[];
302
+ ProvidedContexts?: ProvidedContext[] | undefined;
296
303
  }
297
304
  /**
298
305
  * <p>Amazon Web Services credentials for API authentication.</p>
@@ -336,7 +343,7 @@ export interface AssumeRoleResponse {
336
343
  * </note>
337
344
  * @public
338
345
  */
339
- Credentials?: Credentials;
346
+ Credentials?: Credentials | undefined;
340
347
  /**
341
348
  * <p>The Amazon Resource Name (ARN) and the assumed role ID, which are identifiers that you
342
349
  * can use to refer to the resulting temporary security credentials. For example, you can
@@ -345,14 +352,14 @@ export interface AssumeRoleResponse {
345
352
  * when you called <code>AssumeRole</code>. </p>
346
353
  * @public
347
354
  */
348
- AssumedRoleUser?: AssumedRoleUser;
355
+ AssumedRoleUser?: AssumedRoleUser | undefined;
349
356
  /**
350
357
  * <p>A percentage value that indicates the packed size of the session policies and session
351
358
  * tags combined passed in the request. The request fails if the packed size is greater than 100 percent,
352
359
  * which means the policies and tags exceeded the allowed space.</p>
353
360
  * @public
354
361
  */
355
- PackedPolicySize?: number;
362
+ PackedPolicySize?: number | undefined;
356
363
  /**
357
364
  * <p>The source identity specified by the principal that is calling the
358
365
  * <code>AssumeRole</code> operation.</p>
@@ -369,7 +376,7 @@ export interface AssumeRoleResponse {
369
376
  * any of the following characters: =,.@-</p>
370
377
  * @public
371
378
  */
372
- SourceIdentity?: string;
379
+ SourceIdentity?: string | undefined;
373
380
  }
374
381
  /**
375
382
  * <p>The web identity token that was passed is expired or is not valid. Get a new identity
@@ -405,8 +412,8 @@ export declare class MalformedPolicyDocumentException extends __BaseException {
405
412
  * tags are to the upper size limit. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html">Passing Session Tags in STS</a> in
406
413
  * the <i>IAM User Guide</i>.</p>
407
414
  * <p>You could receive this error even though you meet other defined session policy and
408
- * session tag limits. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-limits-entity-length">IAM and STS Entity
409
- * Character Limits</a> in the <i>IAM User Guide</i>.</p>
415
+ * session tag limits. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-limits-entity-length">IAM and STS Entity Character Limits</a> in the <i>IAM User
416
+ * Guide</i>.</p>
410
417
  * @public
411
418
  */
412
419
  export declare class PackedPolicyTooLargeException extends __BaseException {
@@ -419,10 +426,10 @@ export declare class PackedPolicyTooLargeException extends __BaseException {
419
426
  }
420
427
  /**
421
428
  * <p>STS is not activated in the requested region for the account that is being asked to
422
- * generate credentials. The account administrator must use the IAM console to activate STS
423
- * in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html">Activating and
424
- * Deactivating Amazon Web Services STS in an Amazon Web Services Region</a> in the <i>IAM User
425
- * Guide</i>.</p>
429
+ * generate credentials. The account administrator must use the IAM console to activate
430
+ * STS in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html">Activating and
431
+ * Deactivating STS in an Amazon Web Services Region</a> in the <i>IAM User
432
+ * Guide</i>.</p>
426
433
  * @public
427
434
  */
428
435
  export declare class RegionDisabledException extends __BaseException {
@@ -479,7 +486,7 @@ export interface AssumeRoleWithSAMLRequest {
479
486
  * Policies</a> in the <i>IAM User Guide</i>.</p>
480
487
  * @public
481
488
  */
482
- PolicyArns?: PolicyDescriptorType[];
489
+ PolicyArns?: PolicyDescriptorType[] | undefined;
483
490
  /**
484
491
  * <p>An IAM policy in JSON format that you want to use as an inline session policy.</p>
485
492
  * <p>This parameter is optional. Passing policies to this operation returns new
@@ -495,6 +502,8 @@ export interface AssumeRoleWithSAMLRequest {
495
502
  * character to the end of the valid character list (\u0020 through \u00FF). It can also
496
503
  * include the tab (\u0009), linefeed (\u000A), and carriage return (\u000D)
497
504
  * characters.</p>
505
+ * <p>For more information about role session permissions, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session">Session
506
+ * policies</a>.</p>
498
507
  * <note>
499
508
  * <p>An Amazon Web Services conversion compresses the passed inline session policy, managed policy ARNs,
500
509
  * and session tags into a packed binary format that has a separate limit. Your request can
@@ -504,7 +513,7 @@ export interface AssumeRoleWithSAMLRequest {
504
513
  * </note>
505
514
  * @public
506
515
  */
507
- Policy?: string;
516
+ Policy?: string | undefined;
508
517
  /**
509
518
  * <p>The duration, in seconds, of the role session. Your role session lasts for the duration
510
519
  * that you specify for the <code>DurationSeconds</code> parameter, or until the time
@@ -529,7 +538,7 @@ export interface AssumeRoleWithSAMLRequest {
529
538
  * </note>
530
539
  * @public
531
540
  */
532
- DurationSeconds?: number;
541
+ DurationSeconds?: number | undefined;
533
542
  }
534
543
  /**
535
544
  * <p>Contains the response to a successful <a>AssumeRoleWithSAML</a> request,
@@ -546,26 +555,26 @@ export interface AssumeRoleWithSAMLResponse {
546
555
  * </note>
547
556
  * @public
548
557
  */
549
- Credentials?: Credentials;
558
+ Credentials?: Credentials | undefined;
550
559
  /**
551
560
  * <p>The identifiers for the temporary security credentials that the operation
552
561
  * returns.</p>
553
562
  * @public
554
563
  */
555
- AssumedRoleUser?: AssumedRoleUser;
564
+ AssumedRoleUser?: AssumedRoleUser | undefined;
556
565
  /**
557
566
  * <p>A percentage value that indicates the packed size of the session policies and session
558
567
  * tags combined passed in the request. The request fails if the packed size is greater than 100 percent,
559
568
  * which means the policies and tags exceeded the allowed space.</p>
560
569
  * @public
561
570
  */
562
- PackedPolicySize?: number;
571
+ PackedPolicySize?: number | undefined;
563
572
  /**
564
573
  * <p>The value of the <code>NameID</code> element in the <code>Subject</code> element of the
565
574
  * SAML assertion.</p>
566
575
  * @public
567
576
  */
568
- Subject?: string;
577
+ Subject?: string | undefined;
569
578
  /**
570
579
  * <p> The format of the name ID, as defined by the <code>Format</code> attribute in the
571
580
  * <code>NameID</code> element of the SAML assertion. Typical examples of the format are
@@ -577,18 +586,18 @@ export interface AssumeRoleWithSAMLResponse {
577
586
  * with no modifications.</p>
578
587
  * @public
579
588
  */
580
- SubjectType?: string;
589
+ SubjectType?: string | undefined;
581
590
  /**
582
591
  * <p>The value of the <code>Issuer</code> element of the SAML assertion.</p>
583
592
  * @public
584
593
  */
585
- Issuer?: string;
594
+ Issuer?: string | undefined;
586
595
  /**
587
596
  * <p> The value of the <code>Recipient</code> attribute of the
588
597
  * <code>SubjectConfirmationData</code> element of the SAML assertion. </p>
589
598
  * @public
590
599
  */
591
- Audience?: string;
600
+ Audience?: string | undefined;
592
601
  /**
593
602
  * <p>A hash value based on the concatenation of the following:</p>
594
603
  * <ul>
@@ -610,16 +619,18 @@ export interface AssumeRoleWithSAMLResponse {
610
619
  * </p>
611
620
  * @public
612
621
  */
613
- NameQualifier?: string;
622
+ NameQualifier?: string | undefined;
614
623
  /**
615
- * <p>The value in the <code>SourceIdentity</code> attribute in the SAML assertion. </p>
624
+ * <p>The value in the <code>SourceIdentity</code> attribute in the SAML assertion. The source
625
+ * identity value persists across <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles.html#iam-term-role-chaining">chained role</a>
626
+ * sessions.</p>
616
627
  * <p>You can require users to set a source identity value when they assume a role. You do
617
628
  * this by using the <code>sts:SourceIdentity</code> condition key in a role trust policy.
618
629
  * That way, actions that are taken with the role are associated with that user. After the
619
630
  * source identity is set, the value cannot be changed. It is present in the request for all
620
- * actions that are taken by the role and persists across <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_terms-and-concepts#iam-term-role-chaining">chained
621
- * role</a> sessions. You can configure your SAML identity provider to use an attribute
622
- * associated with your users, like user name or email, as the source identity when calling
631
+ * actions that are taken by the role and persists across <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles.html#id_roles_terms-and-concepts">chained role</a>
632
+ * sessions. You can configure your SAML identity provider to use an attribute associated with
633
+ * your users, like user name or email, as the source identity when calling
623
634
  * <code>AssumeRoleWithSAML</code>. You do this by adding an attribute to the SAML
624
635
  * assertion. For more information about using source identity, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_monitor.html">Monitor and control
625
636
  * actions taken with assumed roles</a> in the
@@ -629,7 +640,7 @@ export interface AssumeRoleWithSAMLResponse {
629
640
  * also include underscores or any of the following characters: =,.@-</p>
630
641
  * @public
631
642
  */
632
- SourceIdentity?: string;
643
+ SourceIdentity?: string | undefined;
633
644
  }
634
645
  /**
635
646
  * <p>The identity provider (IdP) reported that authentication failed. This might be because
@@ -665,6 +676,16 @@ export declare class InvalidIdentityTokenException extends __BaseException {
665
676
  export interface AssumeRoleWithWebIdentityRequest {
666
677
  /**
667
678
  * <p>The Amazon Resource Name (ARN) of the role that the caller is assuming.</p>
679
+ * <note>
680
+ * <p>Additional considerations apply to Amazon Cognito identity pools that assume <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies-cross-account-resource-access.html">cross-account IAM roles</a>. The trust policies of these roles must accept the
681
+ * <code>cognito-identity.amazonaws.com</code> service principal and must contain the
682
+ * <code>cognito-identity.amazonaws.com:aud</code> condition key to restrict role
683
+ * assumption to users from your intended identity pools. A policy that trusts Amazon Cognito
684
+ * identity pools without this condition creates a risk that a user from an unintended
685
+ * identity pool can assume the role. For more information, see <a href="https://docs.aws.amazon.com/cognito/latest/developerguide/iam-roles.html#trust-policies"> Trust policies for
686
+ * IAM roles in Basic (Classic) authentication </a> in the <i>Amazon Cognito
687
+ * Developer Guide</i>.</p>
688
+ * </note>
668
689
  * @public
669
690
  */
670
691
  RoleArn: string | undefined;
@@ -674,6 +695,11 @@ export interface AssumeRoleWithWebIdentityRequest {
674
695
  * security credentials that your application will use are associated with that user. This
675
696
  * session name is included as part of the ARN and assumed role ID in the
676
697
  * <code>AssumedRoleUser</code> response element.</p>
698
+ * <p>For security purposes, administrators can view this field in <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/cloudtrail-integration.html#cloudtrail-integration_signin-tempcreds">CloudTrail logs</a> to help identify who performed an action in Amazon Web Services. Your
699
+ * administrator might require that you specify your user name as the session name when you
700
+ * assume the role. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_iam-condition-keys.html#ck_rolesessionname">
701
+ * <code>sts:RoleSessionName</code>
702
+ * </a>.</p>
677
703
  * <p>The regex used to validate this parameter is a string of characters
678
704
  * consisting of upper- and lower-case alphanumeric characters with no spaces. You can
679
705
  * also include underscores or any of the following characters: =,.@-</p>
@@ -684,7 +710,8 @@ export interface AssumeRoleWithWebIdentityRequest {
684
710
  * <p>The OAuth 2.0 access token or OpenID Connect ID token that is provided by the identity
685
711
  * provider. Your application must get this token by authenticating the user who is using your
686
712
  * application with a web identity provider before the application makes an
687
- * <code>AssumeRoleWithWebIdentity</code> call. Only tokens with RSA algorithms (RS256) are
713
+ * <code>AssumeRoleWithWebIdentity</code> call. Timestamps in the token must be formatted
714
+ * as either an integer or a long integer. Only tokens with RSA algorithms (RS256) are
688
715
  * supported.</p>
689
716
  * @public
690
717
  */
@@ -698,7 +725,7 @@ export interface AssumeRoleWithWebIdentityRequest {
698
725
  * <p>Do not specify this value for OpenID Connect ID tokens.</p>
699
726
  * @public
700
727
  */
701
- ProviderId?: string;
728
+ ProviderId?: string | undefined;
702
729
  /**
703
730
  * <p>The Amazon Resource Names (ARNs) of the IAM managed policies that you want to use as
704
731
  * managed session policies. The policies must exist in the same account as the role.</p>
@@ -723,7 +750,7 @@ export interface AssumeRoleWithWebIdentityRequest {
723
750
  * Policies</a> in the <i>IAM User Guide</i>.</p>
724
751
  * @public
725
752
  */
726
- PolicyArns?: PolicyDescriptorType[];
753
+ PolicyArns?: PolicyDescriptorType[] | undefined;
727
754
  /**
728
755
  * <p>An IAM policy in JSON format that you want to use as an inline session policy.</p>
729
756
  * <p>This parameter is optional. Passing policies to this operation returns new
@@ -739,6 +766,8 @@ export interface AssumeRoleWithWebIdentityRequest {
739
766
  * character to the end of the valid character list (\u0020 through \u00FF). It can also
740
767
  * include the tab (\u0009), linefeed (\u000A), and carriage return (\u000D)
741
768
  * characters.</p>
769
+ * <p>For more information about role session permissions, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session">Session
770
+ * policies</a>.</p>
742
771
  * <note>
743
772
  * <p>An Amazon Web Services conversion compresses the passed inline session policy, managed policy ARNs,
744
773
  * and session tags into a packed binary format that has a separate limit. Your request can
@@ -748,7 +777,7 @@ export interface AssumeRoleWithWebIdentityRequest {
748
777
  * </note>
749
778
  * @public
750
779
  */
751
- Policy?: string;
780
+ Policy?: string | undefined;
752
781
  /**
753
782
  * <p>The duration, in seconds, of the role session. The value can range from 900 seconds (15
754
783
  * minutes) up to the maximum session duration setting for the role. This setting can have a
@@ -770,7 +799,7 @@ export interface AssumeRoleWithWebIdentityRequest {
770
799
  * </note>
771
800
  * @public
772
801
  */
773
- DurationSeconds?: number;
802
+ DurationSeconds?: number | undefined;
774
803
  }
775
804
  /**
776
805
  * <p>Contains the response to a successful <a>AssumeRoleWithWebIdentity</a>
@@ -787,7 +816,7 @@ export interface AssumeRoleWithWebIdentityResponse {
787
816
  * </note>
788
817
  * @public
789
818
  */
790
- Credentials?: Credentials;
819
+ Credentials?: Credentials | undefined;
791
820
  /**
792
821
  * <p>The unique user identifier that is returned by the identity provider. This identifier is
793
822
  * associated with the <code>WebIdentityToken</code> that was submitted with the
@@ -797,7 +826,7 @@ export interface AssumeRoleWithWebIdentityResponse {
797
826
  * identity provider as the token's <code>sub</code> (Subject) claim. </p>
798
827
  * @public
799
828
  */
800
- SubjectFromWebIdentityToken?: string;
829
+ SubjectFromWebIdentityToken?: string | undefined;
801
830
  /**
802
831
  * <p>The Amazon Resource Name (ARN) and the assumed role ID, which are identifiers that you
803
832
  * can use to refer to the resulting temporary security credentials. For example, you can
@@ -806,14 +835,14 @@ export interface AssumeRoleWithWebIdentityResponse {
806
835
  * when you called <code>AssumeRole</code>. </p>
807
836
  * @public
808
837
  */
809
- AssumedRoleUser?: AssumedRoleUser;
838
+ AssumedRoleUser?: AssumedRoleUser | undefined;
810
839
  /**
811
840
  * <p>A percentage value that indicates the packed size of the session policies and session
812
841
  * tags combined passed in the request. The request fails if the packed size is greater than 100 percent,
813
842
  * which means the policies and tags exceeded the allowed space.</p>
814
843
  * @public
815
844
  */
816
- PackedPolicySize?: number;
845
+ PackedPolicySize?: number | undefined;
817
846
  /**
818
847
  * <p> The issuing authority of the web identity token presented. For OpenID Connect ID
819
848
  * tokens, this contains the value of the <code>iss</code> field. For OAuth 2.0 access tokens,
@@ -821,14 +850,14 @@ export interface AssumeRoleWithWebIdentityResponse {
821
850
  * <code>AssumeRoleWithWebIdentity</code> request.</p>
822
851
  * @public
823
852
  */
824
- Provider?: string;
853
+ Provider?: string | undefined;
825
854
  /**
826
855
  * <p>The intended audience (also known as client ID) of the web identity token. This is
827
856
  * traditionally the client identifier issued to the application that requested the web
828
857
  * identity token.</p>
829
858
  * @public
830
859
  */
831
- Audience?: string;
860
+ Audience?: string | undefined;
832
861
  /**
833
862
  * <p>The value of the source identity that is returned in the JSON web token (JWT) from the
834
863
  * identity provider.</p>
@@ -836,9 +865,9 @@ export interface AssumeRoleWithWebIdentityResponse {
836
865
  * this by using the <code>sts:SourceIdentity</code> condition key in a role trust policy.
837
866
  * That way, actions that are taken with the role are associated with that user. After the
838
867
  * source identity is set, the value cannot be changed. It is present in the request for all
839
- * actions that are taken by the role and persists across <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_terms-and-concepts#iam-term-role-chaining">chained
840
- * role</a> sessions. You can configure your identity provider to use an attribute
841
- * associated with your users, like user name or email, as the source identity when calling
868
+ * actions that are taken by the role and persists across <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles.html#id_roles_terms-and-concepts">chained role</a>
869
+ * sessions. You can configure your identity provider to use an attribute associated with your
870
+ * users, like user name or email, as the source identity when calling
842
871
  * <code>AssumeRoleWithWebIdentity</code>. You do this by adding a claim to the JSON web
843
872
  * token. To learn more about OIDC tokens and claims, see <a href="https://docs.aws.amazon.com/cognito/latest/developerguide/amazon-cognito-user-pools-using-tokens-with-identity-providers.html">Using Tokens with User Pools</a> in the <i>Amazon Cognito Developer Guide</i>.
844
873
  * For more information about using source identity, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_monitor.html">Monitor and control
@@ -849,14 +878,14 @@ export interface AssumeRoleWithWebIdentityResponse {
849
878
  * also include underscores or any of the following characters: =,.@-</p>
850
879
  * @public
851
880
  */
852
- SourceIdentity?: string;
881
+ SourceIdentity?: string | undefined;
853
882
  }
854
883
  /**
855
- * <p>The request could not be fulfilled because the identity provider (IDP) that
856
- * was asked to verify the incoming identity token could not be reached. This is often a
857
- * transient error caused by network conditions. Retry the request a limited number of
858
- * times so that you don't exceed the request rate. If the error persists, the
859
- * identity provider might be down or not responding.</p>
884
+ * <p>The request could not be fulfilled because the identity provider (IDP) that was asked
885
+ * to verify the incoming identity token could not be reached. This is often a transient
886
+ * error caused by network conditions. Retry the request a limited number of times so that
887
+ * you don't exceed the request rate. If the error persists, the identity provider might be
888
+ * down or not responding.</p>
860
889
  * @public
861
890
  */
862
891
  export declare class IDPCommunicationErrorException extends __BaseException {
@@ -867,6 +896,87 @@ export declare class IDPCommunicationErrorException extends __BaseException {
867
896
  */
868
897
  constructor(opts: __ExceptionOptionType<IDPCommunicationErrorException, __BaseException>);
869
898
  }
899
+ /**
900
+ * @public
901
+ */
902
+ export interface AssumeRootRequest {
903
+ /**
904
+ * <p>The member account principal ARN or account ID.</p>
905
+ * @public
906
+ */
907
+ TargetPrincipal: string | undefined;
908
+ /**
909
+ * <p>The identity based policy that scopes the session to the privileged tasks that can be
910
+ * performed. You can use one of following Amazon Web Services managed policies to scope
911
+ * root session actions. You can add additional customer managed policies to further limit the
912
+ * permissions for the root session.</p>
913
+ * <ul>
914
+ * <li>
915
+ * <p>
916
+ * <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/security-iam-awsmanpol.html#security-iam-awsmanpol-IAMAuditRootUserCredentials">IAMAuditRootUserCredentials</a>
917
+ * </p>
918
+ * </li>
919
+ * <li>
920
+ * <p>
921
+ * <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/security-iam-awsmanpol.html#security-iam-awsmanpol-IAMCreateRootUserPassword">IAMCreateRootUserPassword</a>
922
+ * </p>
923
+ * </li>
924
+ * <li>
925
+ * <p>
926
+ * <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/security-iam-awsmanpol.html#security-iam-awsmanpol-IAMDeleteRootUserCredentials">IAMDeleteRootUserCredentials</a>
927
+ * </p>
928
+ * </li>
929
+ * <li>
930
+ * <p>
931
+ * <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/security-iam-awsmanpol.html#security-iam-awsmanpol-S3UnlockBucketPolicy">S3UnlockBucketPolicy</a>
932
+ * </p>
933
+ * </li>
934
+ * <li>
935
+ * <p>
936
+ * <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/security-iam-awsmanpol.html#security-iam-awsmanpol-SQSUnlockQueuePolicy">SQSUnlockQueuePolicy</a>
937
+ * </p>
938
+ * </li>
939
+ * </ul>
940
+ * @public
941
+ */
942
+ TaskPolicyArn: PolicyDescriptorType | undefined;
943
+ /**
944
+ * <p>The duration, in seconds, of the privileged session. The value can range from 0 seconds
945
+ * up to the maximum session duration of 900 seconds (15 minutes). If you specify a value
946
+ * higher than this setting, the operation fails.</p>
947
+ * <p>By default, the value is set to <code>900</code> seconds.</p>
948
+ * @public
949
+ */
950
+ DurationSeconds?: number | undefined;
951
+ }
952
+ /**
953
+ * @public
954
+ */
955
+ export interface AssumeRootResponse {
956
+ /**
957
+ * <p>The temporary security credentials, which include an access key ID, a secret access key,
958
+ * and a security token.</p>
959
+ * <note>
960
+ * <p>The size of the security token that STS API operations return is not fixed. We
961
+ * strongly recommend that you make no assumptions about the maximum size.</p>
962
+ * </note>
963
+ * @public
964
+ */
965
+ Credentials?: Credentials | undefined;
966
+ /**
967
+ * <p>The source identity specified by the principal that is calling the
968
+ * <code>AssumeRoot</code> operation.</p>
969
+ * <p>You can use the <code>aws:SourceIdentity</code> condition key to control access based on
970
+ * the value of source identity. For more information about using source identity, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_monitor.html">Monitor and control
971
+ * actions taken with assumed roles</a> in the
972
+ * <i>IAM User Guide</i>.</p>
973
+ * <p>The regex used to validate this parameter is a string of characters consisting of upper-
974
+ * and lower-case alphanumeric characters with no spaces. You can also include underscores or
975
+ * any of the following characters: =,.@-</p>
976
+ * @public
977
+ */
978
+ SourceIdentity?: string | undefined;
979
+ }
870
980
  /**
871
981
  * @public
872
982
  */
@@ -887,12 +997,12 @@ export interface DecodeAuthorizationMessageResponse {
887
997
  * <p>The API returns a response with the decoded message.</p>
888
998
  * @public
889
999
  */
890
- DecodedMessage?: string;
1000
+ DecodedMessage?: string | undefined;
891
1001
  }
892
1002
  /**
893
1003
  * <p>The error returned if the message passed to <code>DecodeAuthorizationMessage</code>
894
- * was invalid. This can happen if the token contains invalid characters, such as
895
- * linebreaks. </p>
1004
+ * was invalid. This can happen if the token contains invalid characters, such as line
1005
+ * breaks, or if the message has expired.</p>
896
1006
  * @public
897
1007
  */
898
1008
  export declare class InvalidAuthorizationMessageException extends __BaseException {
@@ -923,7 +1033,7 @@ export interface GetAccessKeyInfoResponse {
923
1033
  * <p>The number used to identify the Amazon Web Services account.</p>
924
1034
  * @public
925
1035
  */
926
- Account?: string;
1036
+ Account?: string | undefined;
927
1037
  }
928
1038
  /**
929
1039
  * @public
@@ -943,18 +1053,18 @@ export interface GetCallerIdentityResponse {
943
1053
  * page in the <i>IAM User Guide</i>.</p>
944
1054
  * @public
945
1055
  */
946
- UserId?: string;
1056
+ UserId?: string | undefined;
947
1057
  /**
948
1058
  * <p>The Amazon Web Services account ID number of the account that owns or contains the calling
949
1059
  * entity.</p>
950
1060
  * @public
951
1061
  */
952
- Account?: string;
1062
+ Account?: string | undefined;
953
1063
  /**
954
1064
  * <p>The Amazon Web Services ARN associated with the calling entity.</p>
955
1065
  * @public
956
1066
  */
957
- Arn?: string;
1067
+ Arn?: string | undefined;
958
1068
  }
959
1069
  /**
960
1070
  * @public
@@ -1003,7 +1113,7 @@ export interface GetFederationTokenRequest {
1003
1113
  * </note>
1004
1114
  * @public
1005
1115
  */
1006
- Policy?: string;
1116
+ Policy?: string | undefined;
1007
1117
  /**
1008
1118
  * <p>The Amazon Resource Names (ARNs) of the IAM managed policies that you want to use as a
1009
1119
  * managed session policy. The policies must exist in the same account as the IAM user that is requesting federated access.</p>
@@ -1036,7 +1146,7 @@ export interface GetFederationTokenRequest {
1036
1146
  * </note>
1037
1147
  * @public
1038
1148
  */
1039
- PolicyArns?: PolicyDescriptorType[];
1149
+ PolicyArns?: PolicyDescriptorType[] | undefined;
1040
1150
  /**
1041
1151
  * <p>The duration, in seconds, that the session should last. Acceptable durations for
1042
1152
  * federation sessions range from 900 seconds (15 minutes) to 129,600 seconds (36 hours), with
@@ -1046,7 +1156,7 @@ export interface GetFederationTokenRequest {
1046
1156
  * credentials defaults to one hour.</p>
1047
1157
  * @public
1048
1158
  */
1049
- DurationSeconds?: number;
1159
+ DurationSeconds?: number | undefined;
1050
1160
  /**
1051
1161
  * <p>A list of session tags. Each session tag consists of a key name and an associated value.
1052
1162
  * For more information about session tags, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html">Passing Session Tags in STS</a> in the
@@ -1072,7 +1182,7 @@ export interface GetFederationTokenRequest {
1072
1182
  * the request takes precedence over the role tag.</p>
1073
1183
  * @public
1074
1184
  */
1075
- Tags?: Tag[];
1185
+ Tags?: Tag[] | undefined;
1076
1186
  }
1077
1187
  /**
1078
1188
  * <p>Identifiers for the federated user that is associated with the credentials.</p>
@@ -1108,7 +1218,7 @@ export interface GetFederationTokenResponse {
1108
1218
  * </note>
1109
1219
  * @public
1110
1220
  */
1111
- Credentials?: Credentials;
1221
+ Credentials?: Credentials | undefined;
1112
1222
  /**
1113
1223
  * <p>Identifiers for the federated user associated with the credentials (such as
1114
1224
  * <code>arn:aws:sts::123456789012:federated-user/Bob</code> or
@@ -1116,14 +1226,14 @@ export interface GetFederationTokenResponse {
1116
1226
  * resource-based policies, such as an Amazon S3 bucket policy. </p>
1117
1227
  * @public
1118
1228
  */
1119
- FederatedUser?: FederatedUser;
1229
+ FederatedUser?: FederatedUser | undefined;
1120
1230
  /**
1121
1231
  * <p>A percentage value that indicates the packed size of the session policies and session
1122
1232
  * tags combined passed in the request. The request fails if the packed size is greater than 100 percent,
1123
1233
  * which means the policies and tags exceeded the allowed space.</p>
1124
1234
  * @public
1125
1235
  */
1126
- PackedPolicySize?: number;
1236
+ PackedPolicySize?: number | undefined;
1127
1237
  }
1128
1238
  /**
1129
1239
  * @public
@@ -1137,7 +1247,7 @@ export interface GetSessionTokenRequest {
1137
1247
  * than one hour, the session for Amazon Web Services account owners defaults to one hour.</p>
1138
1248
  * @public
1139
1249
  */
1140
- DurationSeconds?: number;
1250
+ DurationSeconds?: number | undefined;
1141
1251
  /**
1142
1252
  * <p>The identification number of the MFA device that is associated with the IAM user who is making the <code>GetSessionToken</code> call. Specify this value
1143
1253
  * if the IAM user has a policy that requires MFA authentication. The value is
@@ -1149,7 +1259,7 @@ export interface GetSessionTokenRequest {
1149
1259
  * You can also include underscores or any of the following characters: =,.@:/-</p>
1150
1260
  * @public
1151
1261
  */
1152
- SerialNumber?: string;
1262
+ SerialNumber?: string | undefined;
1153
1263
  /**
1154
1264
  * <p>The value provided by the MFA device, if MFA is required. If any policy requires the
1155
1265
  * IAM user to submit an MFA code, specify this value. If MFA authentication
@@ -1160,7 +1270,7 @@ export interface GetSessionTokenRequest {
1160
1270
  * numeric digits.</p>
1161
1271
  * @public
1162
1272
  */
1163
- TokenCode?: string;
1273
+ TokenCode?: string | undefined;
1164
1274
  }
1165
1275
  /**
1166
1276
  * <p>Contains the response to a successful <a>GetSessionToken</a> request,
@@ -1177,7 +1287,7 @@ export interface GetSessionTokenResponse {
1177
1287
  * </note>
1178
1288
  * @public
1179
1289
  */
1180
- Credentials?: Credentials;
1290
+ Credentials?: Credentials | undefined;
1181
1291
  }
1182
1292
  /**
1183
1293
  * @internal
@@ -1203,6 +1313,10 @@ export declare const AssumeRoleWithWebIdentityRequestFilterSensitiveLog: (obj: A
1203
1313
  * @internal
1204
1314
  */
1205
1315
  export declare const AssumeRoleWithWebIdentityResponseFilterSensitiveLog: (obj: AssumeRoleWithWebIdentityResponse) => any;
1316
+ /**
1317
+ * @internal
1318
+ */
1319
+ export declare const AssumeRootResponseFilterSensitiveLog: (obj: AssumeRootResponse) => any;
1206
1320
  /**
1207
1321
  * @internal
1208
1322
  */