@cdklabs/cdk-ecs-codedeploy 0.0.345 → 0.0.347
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.jsii +3 -3
- package/.jsii.tabl.json +1 -1
- package/lib/api-canary/index.js +1 -1
- package/lib/ecs-appspec/index.js +1 -1
- package/lib/ecs-deployment/index.js +1 -1
- package/lib/ecs-patterns/application-load-balanced-codedeployed-fargate-service.js +1 -1
- package/node_modules/@aws-sdk/client-codedeploy/dist-types/models/models_0.d.ts +376 -376
- package/node_modules/@aws-sdk/client-codedeploy/dist-types/ts3.4/models/models_0.d.ts +386 -376
- package/node_modules/@aws-sdk/client-codedeploy/package.json +36 -36
- package/node_modules/@aws-sdk/client-sso/dist-types/models/models_0.d.ts +18 -18
- package/node_modules/@aws-sdk/client-sso/dist-types/ts3.4/models/models_0.d.ts +18 -18
- package/node_modules/@aws-sdk/client-sso/package.json +32 -32
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/models/models_0.d.ts +74 -74
- package/node_modules/@aws-sdk/client-sso-oidc/dist-types/ts3.4/models/models_0.d.ts +74 -74
- package/node_modules/@aws-sdk/client-sso-oidc/package.json +34 -34
- package/node_modules/@aws-sdk/client-sts/README.md +8 -0
- package/node_modules/@aws-sdk/client-sts/dist-cjs/index.js +89 -12
- package/node_modules/@aws-sdk/client-sts/dist-es/STS.js +2 -0
- package/node_modules/@aws-sdk/client-sts/dist-es/commands/AssumeRootCommand.js +23 -0
- package/node_modules/@aws-sdk/client-sts/dist-es/commands/index.js +1 -0
- package/node_modules/@aws-sdk/client-sts/dist-es/models/models_0.js +4 -0
- package/node_modules/@aws-sdk/client-sts/dist-es/protocols/Aws_query.js +53 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/STS.d.ts +7 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/STSClient.d.ts +3 -2
- package/node_modules/@aws-sdk/client-sts/dist-types/commands/AssumeRoleCommand.d.ts +13 -13
- package/node_modules/@aws-sdk/client-sts/dist-types/commands/AssumeRoleWithSAMLCommand.d.ts +8 -8
- package/node_modules/@aws-sdk/client-sts/dist-types/commands/AssumeRoleWithWebIdentityCommand.d.ts +15 -30
- package/node_modules/@aws-sdk/client-sts/dist-types/commands/AssumeRootCommand.d.ts +129 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/commands/DecodeAuthorizationMessageCommand.d.ts +2 -2
- package/node_modules/@aws-sdk/client-sts/dist-types/commands/GetFederationTokenCommand.d.ts +8 -8
- package/node_modules/@aws-sdk/client-sts/dist-types/commands/GetSessionTokenCommand.d.ts +6 -6
- package/node_modules/@aws-sdk/client-sts/dist-types/commands/index.d.ts +1 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/models/models_0.d.ts +202 -88
- package/node_modules/@aws-sdk/client-sts/dist-types/protocols/Aws_query.d.ts +9 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/ts3.4/STS.d.ts +17 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/ts3.4/STSClient.d.ts +6 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/ts3.4/commands/AssumeRootCommand.d.ts +47 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/ts3.4/commands/index.d.ts +1 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/ts3.4/models/models_0.d.ts +68 -56
- package/node_modules/@aws-sdk/client-sts/dist-types/ts3.4/protocols/Aws_query.d.ts +12 -0
- package/node_modules/@aws-sdk/client-sts/package.json +36 -36
- package/node_modules/@aws-sdk/core/package.json +14 -14
- package/node_modules/@aws-sdk/credential-provider-env/package.json +7 -7
- package/node_modules/@aws-sdk/credential-provider-http/package.json +12 -12
- package/node_modules/@aws-sdk/credential-provider-ini/package.json +15 -15
- package/node_modules/@aws-sdk/credential-provider-node/package.json +14 -14
- package/node_modules/@aws-sdk/credential-provider-process/package.json +8 -8
- package/node_modules/@aws-sdk/credential-provider-sso/package.json +10 -10
- package/node_modules/@aws-sdk/credential-provider-web-identity/package.json +10 -10
- package/node_modules/@aws-sdk/middleware-host-header/package.json +8 -8
- package/node_modules/@aws-sdk/middleware-logger/package.json +7 -7
- package/node_modules/@aws-sdk/middleware-recursion-detection/package.json +8 -8
- package/node_modules/@aws-sdk/middleware-user-agent/package.json +11 -11
- package/node_modules/@aws-sdk/region-config-resolver/package.json +7 -7
- package/node_modules/@aws-sdk/token-providers/package.json +8 -8
- package/node_modules/@aws-sdk/types/package.json +2 -2
- package/node_modules/@aws-sdk/util-endpoints/package.json +8 -8
- package/node_modules/@aws-sdk/util-locate-window/package.json +3 -3
- package/node_modules/@aws-sdk/util-user-agent-browser/package.json +5 -5
- package/node_modules/@aws-sdk/util-user-agent-node/package.json +7 -7
- package/node_modules/@smithy/abort-controller/package.json +4 -3
- package/node_modules/@smithy/config-resolver/package.json +7 -6
- package/node_modules/@smithy/core/dist-cjs/submodules/protocols/index.js +21 -20
- package/node_modules/@smithy/core/dist-es/submodules/protocols/requestBuilder.js +1 -1
- package/node_modules/@smithy/core/package.json +10 -9
- package/node_modules/@smithy/credential-provider-imds/package.json +7 -7
- package/node_modules/@smithy/fetch-http-handler/dist-cjs/create-request.js +1 -0
- package/node_modules/@smithy/fetch-http-handler/dist-cjs/index.js +10 -3
- package/node_modules/@smithy/fetch-http-handler/dist-es/create-request.js +3 -0
- package/node_modules/@smithy/fetch-http-handler/dist-es/fetch-http-handler.js +3 -2
- package/node_modules/@smithy/fetch-http-handler/dist-es/stream-collector.js +1 -1
- package/node_modules/@smithy/fetch-http-handler/dist-types/create-request.d.ts +6 -0
- package/node_modules/@smithy/fetch-http-handler/dist-types/fetch-http-handler.d.ts +6 -0
- package/node_modules/@smithy/fetch-http-handler/dist-types/ts3.4/create-request.d.ts +6 -0
- package/node_modules/@smithy/fetch-http-handler/dist-types/ts3.4/fetch-http-handler.d.ts +6 -0
- package/node_modules/@smithy/fetch-http-handler/package.json +9 -6
- package/node_modules/@smithy/hash-node/package.json +4 -3
- package/node_modules/@smithy/invalid-dependency/package.json +4 -3
- package/node_modules/@smithy/middleware-content-length/package.json +5 -4
- package/node_modules/@smithy/middleware-endpoint/package.json +11 -10
- package/node_modules/@smithy/middleware-retry/package.json +12 -10
- package/node_modules/@smithy/middleware-serde/package.json +6 -4
- package/node_modules/@smithy/middleware-stack/package.json +4 -3
- package/node_modules/@smithy/node-config-provider/package.json +6 -5
- package/node_modules/@smithy/node-http-handler/dist-cjs/index.js +20 -14
- package/node_modules/@smithy/node-http-handler/dist-cjs/timing.js +1 -0
- package/node_modules/@smithy/node-http-handler/dist-es/node-http-handler.js +5 -4
- package/node_modules/@smithy/node-http-handler/dist-es/node-http2-connection-manager.js +1 -1
- package/node_modules/@smithy/node-http-handler/dist-es/server.mock.js +9 -2
- package/node_modules/@smithy/node-http-handler/dist-es/set-connection-timeout.js +5 -4
- package/node_modules/@smithy/node-http-handler/dist-es/set-socket-keep-alive.js +2 -1
- package/node_modules/@smithy/node-http-handler/dist-es/set-socket-timeout.js +2 -1
- package/node_modules/@smithy/node-http-handler/dist-es/timing.js +4 -0
- package/node_modules/@smithy/node-http-handler/dist-es/write-request-body.js +4 -3
- package/node_modules/@smithy/node-http-handler/dist-types/timing.d.ts +8 -0
- package/node_modules/@smithy/node-http-handler/dist-types/ts3.4/timing.d.ts +8 -0
- package/node_modules/@smithy/node-http-handler/package.json +7 -6
- package/node_modules/@smithy/property-provider/package.json +4 -3
- package/node_modules/@smithy/protocol-http/package.json +4 -3
- package/node_modules/@smithy/querystring-builder/package.json +2 -2
- package/node_modules/@smithy/querystring-parser/package.json +4 -3
- package/node_modules/@smithy/service-error-classification/package.json +4 -3
- package/node_modules/@smithy/shared-ini-file-loader/package.json +4 -3
- package/node_modules/@smithy/signature-v4/package.json +6 -5
- package/node_modules/@smithy/smithy-client/package.json +9 -8
- package/node_modules/@smithy/types/dist-types/http.d.ts +1 -0
- package/node_modules/@smithy/types/dist-types/transform/no-undefined.d.ts +3 -2
- package/node_modules/@smithy/types/dist-types/ts3.4/http.d.ts +1 -0
- package/node_modules/@smithy/types/dist-types/ts3.4/transform/no-undefined.d.ts +3 -2
- package/node_modules/@smithy/types/package.json +1 -1
- package/node_modules/@smithy/url-parser/package.json +5 -4
- package/node_modules/@smithy/util-defaults-mode-browser/package.json +6 -5
- package/node_modules/@smithy/util-defaults-mode-node/package.json +9 -8
- package/node_modules/@smithy/util-endpoints/package.json +7 -5
- package/node_modules/@smithy/util-middleware/package.json +4 -3
- package/node_modules/@smithy/util-retry/dist-cjs/index.js +5 -1
- package/node_modules/@smithy/util-retry/dist-es/DefaultRateLimiter.js +2 -1
- package/node_modules/@smithy/util-retry/dist-types/DefaultRateLimiter.d.ts +4 -0
- package/node_modules/@smithy/util-retry/dist-types/ts3.4/DefaultRateLimiter.d.ts +4 -0
- package/node_modules/@smithy/util-retry/package.json +5 -4
- package/node_modules/@smithy/util-stream/dist-cjs/index.js +1 -0
- package/node_modules/@smithy/util-stream/dist-cjs/sdk-stream-mixin.js +1 -2
- package/node_modules/@smithy/util-stream/dist-cjs/splitStream.js +1 -1
- package/node_modules/@smithy/util-stream/dist-cjs/stream-type-check.js +6 -1
- package/node_modules/@smithy/util-stream/dist-es/sdk-stream-mixin.js +0 -1
- package/node_modules/@smithy/util-stream/dist-es/splitStream.js +2 -2
- package/node_modules/@smithy/util-stream/dist-es/stream-type-check.js +3 -0
- package/node_modules/@smithy/util-stream/dist-types/stream-type-check.d.ts +4 -0
- package/node_modules/@smithy/util-stream/dist-types/ts3.4/stream-type-check.d.ts +4 -0
- package/node_modules/@smithy/util-stream/package.json +10 -6
- package/node_modules/@smithy/util-waiter/package.json +5 -4
- package/package.json +6 -6
|
@@ -32,7 +32,7 @@ export interface PolicyDescriptorType {
|
|
|
32
32
|
* Service Namespaces</a> in the <i>Amazon Web Services General Reference</i>.</p>
|
|
33
33
|
* @public
|
|
34
34
|
*/
|
|
35
|
-
arn?: string;
|
|
35
|
+
arn?: string | undefined;
|
|
36
36
|
}
|
|
37
37
|
/**
|
|
38
38
|
* <p>Contains information about the provided context. This includes the signed and encrypted
|
|
@@ -45,13 +45,13 @@ export interface ProvidedContext {
|
|
|
45
45
|
* <p>The context provider ARN from which the trusted context assertion was generated.</p>
|
|
46
46
|
* @public
|
|
47
47
|
*/
|
|
48
|
-
ProviderArn?: string;
|
|
48
|
+
ProviderArn?: string | undefined;
|
|
49
49
|
/**
|
|
50
50
|
* <p>The signed and encrypted trusted context assertion generated by the context provider.
|
|
51
51
|
* The trusted context assertion is signed and encrypted by Amazon Web Services STS.</p>
|
|
52
52
|
* @public
|
|
53
53
|
*/
|
|
54
|
-
ContextAssertion?: string;
|
|
54
|
+
ContextAssertion?: string | undefined;
|
|
55
55
|
}
|
|
56
56
|
/**
|
|
57
57
|
* <p>You can pass custom key-value pair attributes when you assume a role or federate a user.
|
|
@@ -95,6 +95,11 @@ export interface AssumeRoleRequest {
|
|
|
95
95
|
* session name is also used in the ARN of the assumed role principal. This means that
|
|
96
96
|
* subsequent cross-account API requests that use the temporary security credentials will
|
|
97
97
|
* expose the role session name to the external account in their CloudTrail logs.</p>
|
|
98
|
+
* <p>For security purposes, administrators can view this field in <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/cloudtrail-integration.html#cloudtrail-integration_signin-tempcreds">CloudTrail logs</a> to help identify who performed an action in Amazon Web Services. Your
|
|
99
|
+
* administrator might require that you specify your user name as the session name when you
|
|
100
|
+
* assume the role. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_iam-condition-keys.html#ck_rolesessionname">
|
|
101
|
+
* <code>sts:RoleSessionName</code>
|
|
102
|
+
* </a>.</p>
|
|
98
103
|
* <p>The regex used to validate this parameter is a string of characters
|
|
99
104
|
* consisting of upper- and lower-case alphanumeric characters with no spaces. You can
|
|
100
105
|
* also include underscores or any of the following characters: =,.@-</p>
|
|
@@ -125,7 +130,7 @@ export interface AssumeRoleRequest {
|
|
|
125
130
|
* Policies</a> in the <i>IAM User Guide</i>.</p>
|
|
126
131
|
* @public
|
|
127
132
|
*/
|
|
128
|
-
PolicyArns?: PolicyDescriptorType[];
|
|
133
|
+
PolicyArns?: PolicyDescriptorType[] | undefined;
|
|
129
134
|
/**
|
|
130
135
|
* <p>An IAM policy in JSON format that you want to use as an inline session policy.</p>
|
|
131
136
|
* <p>This parameter is optional. Passing policies to this operation returns new
|
|
@@ -148,9 +153,11 @@ export interface AssumeRoleRequest {
|
|
|
148
153
|
* <code>PackedPolicySize</code> response element indicates by percentage how close the
|
|
149
154
|
* policies and tags for your request are to the upper size limit.</p>
|
|
150
155
|
* </note>
|
|
156
|
+
* <p>For more information about role session permissions, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session">Session
|
|
157
|
+
* policies</a>.</p>
|
|
151
158
|
* @public
|
|
152
159
|
*/
|
|
153
|
-
Policy?: string;
|
|
160
|
+
Policy?: string | undefined;
|
|
154
161
|
/**
|
|
155
162
|
* <p>The duration, in seconds, of the role session. The value specified can range from 900
|
|
156
163
|
* seconds (15 minutes) up to the maximum session duration set for the role. The maximum
|
|
@@ -164,9 +171,7 @@ export interface AssumeRoleRequest {
|
|
|
164
171
|
* specify a parameter value of up to 43200 seconds (12 hours), depending on the maximum
|
|
165
172
|
* session duration setting for your role. However, if you assume a role using role chaining
|
|
166
173
|
* and provide a <code>DurationSeconds</code> parameter value greater than one hour, the
|
|
167
|
-
* operation fails. To learn how to view the maximum value for your role, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
|
168
|
-
* Maximum Session Duration Setting for a Role</a> in the
|
|
169
|
-
* <i>IAM User Guide</i>.</p>
|
|
174
|
+
* operation fails. To learn how to view the maximum value for your role, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_update-role-settings.html#id_roles_update-session-duration">Update the maximum session duration for a role</a>.</p>
|
|
170
175
|
* <p>By default, the value is set to <code>3600</code> seconds. </p>
|
|
171
176
|
* <note>
|
|
172
177
|
* <p>The <code>DurationSeconds</code> parameter is separate from the duration of a console
|
|
@@ -179,7 +184,7 @@ export interface AssumeRoleRequest {
|
|
|
179
184
|
* </note>
|
|
180
185
|
* @public
|
|
181
186
|
*/
|
|
182
|
-
DurationSeconds?: number;
|
|
187
|
+
DurationSeconds?: number | undefined;
|
|
183
188
|
/**
|
|
184
189
|
* <p>A list of session tags that you want to pass. Each session tag consists of a key name
|
|
185
190
|
* and an associated value. For more information about session tags, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html">Tagging Amazon Web Services STS
|
|
@@ -210,19 +215,19 @@ export interface AssumeRoleRequest {
|
|
|
210
215
|
* <i>IAM User Guide</i>.</p>
|
|
211
216
|
* @public
|
|
212
217
|
*/
|
|
213
|
-
Tags?: Tag[];
|
|
218
|
+
Tags?: Tag[] | undefined;
|
|
214
219
|
/**
|
|
215
220
|
* <p>A list of keys for session tags that you want to set as transitive. If you set a tag key
|
|
216
221
|
* as transitive, the corresponding key and value passes to subsequent sessions in a role
|
|
217
222
|
* chain. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html#id_session-tags_role-chaining">Chaining Roles
|
|
218
223
|
* with Session Tags</a> in the <i>IAM User Guide</i>.</p>
|
|
219
|
-
* <p>This parameter is optional.
|
|
220
|
-
*
|
|
224
|
+
* <p>This parameter is optional. The transitive status of a session tag does not impact its
|
|
225
|
+
* packed binary size.</p>
|
|
221
226
|
* <p>If you choose not to specify a transitive tag key, then no tags are passed from this
|
|
222
227
|
* session to any subsequent sessions.</p>
|
|
223
228
|
* @public
|
|
224
229
|
*/
|
|
225
|
-
TransitiveTagKeys?: string[];
|
|
230
|
+
TransitiveTagKeys?: string[] | undefined;
|
|
226
231
|
/**
|
|
227
232
|
* <p>A unique identifier that might be required when you assume a role in another account. If
|
|
228
233
|
* the administrator of the account to which the role belongs provided you with an external
|
|
@@ -239,7 +244,7 @@ export interface AssumeRoleRequest {
|
|
|
239
244
|
* You can also include underscores or any of the following characters: =,.@:/-</p>
|
|
240
245
|
* @public
|
|
241
246
|
*/
|
|
242
|
-
ExternalId?: string;
|
|
247
|
+
ExternalId?: string | undefined;
|
|
243
248
|
/**
|
|
244
249
|
* <p>The identification number of the MFA device that is associated with the user who is
|
|
245
250
|
* making the <code>AssumeRole</code> call. Specify this value if the trust policy of the role
|
|
@@ -252,7 +257,7 @@ export interface AssumeRoleRequest {
|
|
|
252
257
|
* also include underscores or any of the following characters: =,.@-</p>
|
|
253
258
|
* @public
|
|
254
259
|
*/
|
|
255
|
-
SerialNumber?: string;
|
|
260
|
+
SerialNumber?: string | undefined;
|
|
256
261
|
/**
|
|
257
262
|
* <p>The value provided by the MFA device, if the trust policy of the role being assumed
|
|
258
263
|
* requires MFA. (In other words, if the policy includes a condition that tests for MFA). If
|
|
@@ -262,16 +267,18 @@ export interface AssumeRoleRequest {
|
|
|
262
267
|
* numeric digits.</p>
|
|
263
268
|
* @public
|
|
264
269
|
*/
|
|
265
|
-
TokenCode?: string;
|
|
270
|
+
TokenCode?: string | undefined;
|
|
266
271
|
/**
|
|
267
272
|
* <p>The source identity specified by the principal that is calling the
|
|
268
|
-
* <code>AssumeRole</code> operation.</p>
|
|
273
|
+
* <code>AssumeRole</code> operation. The source identity value persists across <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles.html#iam-term-role-chaining">chained role</a> sessions.</p>
|
|
269
274
|
* <p>You can require users to specify a source identity when they assume a role. You do this
|
|
270
|
-
* by using the <
|
|
271
|
-
*
|
|
272
|
-
*
|
|
273
|
-
*
|
|
274
|
-
*
|
|
275
|
+
* by using the <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html#condition-keys-sourceidentity">
|
|
276
|
+
* <code>sts:SourceIdentity</code>
|
|
277
|
+
* </a> condition key in a role trust policy. You
|
|
278
|
+
* can use source identity information in CloudTrail logs to determine who took actions with a
|
|
279
|
+
* role. You can use the <code>aws:SourceIdentity</code> condition key to further control
|
|
280
|
+
* access to Amazon Web Services resources based on the value of source identity. For more information about
|
|
281
|
+
* using source identity, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_monitor.html">Monitor and control
|
|
275
282
|
* actions taken with assumed roles</a> in the
|
|
276
283
|
* <i>IAM User Guide</i>.</p>
|
|
277
284
|
* <p>The regex used to validate this parameter is a string of characters consisting of upper-
|
|
@@ -280,7 +287,7 @@ export interface AssumeRoleRequest {
|
|
|
280
287
|
* <code>aws:</code>. This prefix is reserved for Amazon Web Services internal use.</p>
|
|
281
288
|
* @public
|
|
282
289
|
*/
|
|
283
|
-
SourceIdentity?: string;
|
|
290
|
+
SourceIdentity?: string | undefined;
|
|
284
291
|
/**
|
|
285
292
|
* <p>A list of previously acquired trusted context assertions in the format of a JSON array.
|
|
286
293
|
* The trusted context assertion is signed and encrypted by Amazon Web Services STS.</p>
|
|
@@ -292,7 +299,7 @@ export interface AssumeRoleRequest {
|
|
|
292
299
|
* </p>
|
|
293
300
|
* @public
|
|
294
301
|
*/
|
|
295
|
-
ProvidedContexts?: ProvidedContext[];
|
|
302
|
+
ProvidedContexts?: ProvidedContext[] | undefined;
|
|
296
303
|
}
|
|
297
304
|
/**
|
|
298
305
|
* <p>Amazon Web Services credentials for API authentication.</p>
|
|
@@ -336,7 +343,7 @@ export interface AssumeRoleResponse {
|
|
|
336
343
|
* </note>
|
|
337
344
|
* @public
|
|
338
345
|
*/
|
|
339
|
-
Credentials?: Credentials;
|
|
346
|
+
Credentials?: Credentials | undefined;
|
|
340
347
|
/**
|
|
341
348
|
* <p>The Amazon Resource Name (ARN) and the assumed role ID, which are identifiers that you
|
|
342
349
|
* can use to refer to the resulting temporary security credentials. For example, you can
|
|
@@ -345,14 +352,14 @@ export interface AssumeRoleResponse {
|
|
|
345
352
|
* when you called <code>AssumeRole</code>. </p>
|
|
346
353
|
* @public
|
|
347
354
|
*/
|
|
348
|
-
AssumedRoleUser?: AssumedRoleUser;
|
|
355
|
+
AssumedRoleUser?: AssumedRoleUser | undefined;
|
|
349
356
|
/**
|
|
350
357
|
* <p>A percentage value that indicates the packed size of the session policies and session
|
|
351
358
|
* tags combined passed in the request. The request fails if the packed size is greater than 100 percent,
|
|
352
359
|
* which means the policies and tags exceeded the allowed space.</p>
|
|
353
360
|
* @public
|
|
354
361
|
*/
|
|
355
|
-
PackedPolicySize?: number;
|
|
362
|
+
PackedPolicySize?: number | undefined;
|
|
356
363
|
/**
|
|
357
364
|
* <p>The source identity specified by the principal that is calling the
|
|
358
365
|
* <code>AssumeRole</code> operation.</p>
|
|
@@ -369,7 +376,7 @@ export interface AssumeRoleResponse {
|
|
|
369
376
|
* any of the following characters: =,.@-</p>
|
|
370
377
|
* @public
|
|
371
378
|
*/
|
|
372
|
-
SourceIdentity?: string;
|
|
379
|
+
SourceIdentity?: string | undefined;
|
|
373
380
|
}
|
|
374
381
|
/**
|
|
375
382
|
* <p>The web identity token that was passed is expired or is not valid. Get a new identity
|
|
@@ -405,8 +412,8 @@ export declare class MalformedPolicyDocumentException extends __BaseException {
|
|
|
405
412
|
* tags are to the upper size limit. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html">Passing Session Tags in STS</a> in
|
|
406
413
|
* the <i>IAM User Guide</i>.</p>
|
|
407
414
|
* <p>You could receive this error even though you meet other defined session policy and
|
|
408
|
-
* session tag limits. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-limits-entity-length">IAM and STS Entity
|
|
409
|
-
*
|
|
415
|
+
* session tag limits. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-limits-entity-length">IAM and STS Entity Character Limits</a> in the <i>IAM User
|
|
416
|
+
* Guide</i>.</p>
|
|
410
417
|
* @public
|
|
411
418
|
*/
|
|
412
419
|
export declare class PackedPolicyTooLargeException extends __BaseException {
|
|
@@ -419,10 +426,10 @@ export declare class PackedPolicyTooLargeException extends __BaseException {
|
|
|
419
426
|
}
|
|
420
427
|
/**
|
|
421
428
|
* <p>STS is not activated in the requested region for the account that is being asked to
|
|
422
|
-
* generate credentials. The account administrator must use the IAM console to activate
|
|
423
|
-
* in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html">Activating and
|
|
424
|
-
* Deactivating
|
|
425
|
-
*
|
|
429
|
+
* generate credentials. The account administrator must use the IAM console to activate
|
|
430
|
+
* STS in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html">Activating and
|
|
431
|
+
* Deactivating STS in an Amazon Web Services Region</a> in the <i>IAM User
|
|
432
|
+
* Guide</i>.</p>
|
|
426
433
|
* @public
|
|
427
434
|
*/
|
|
428
435
|
export declare class RegionDisabledException extends __BaseException {
|
|
@@ -479,7 +486,7 @@ export interface AssumeRoleWithSAMLRequest {
|
|
|
479
486
|
* Policies</a> in the <i>IAM User Guide</i>.</p>
|
|
480
487
|
* @public
|
|
481
488
|
*/
|
|
482
|
-
PolicyArns?: PolicyDescriptorType[];
|
|
489
|
+
PolicyArns?: PolicyDescriptorType[] | undefined;
|
|
483
490
|
/**
|
|
484
491
|
* <p>An IAM policy in JSON format that you want to use as an inline session policy.</p>
|
|
485
492
|
* <p>This parameter is optional. Passing policies to this operation returns new
|
|
@@ -495,6 +502,8 @@ export interface AssumeRoleWithSAMLRequest {
|
|
|
495
502
|
* character to the end of the valid character list (\u0020 through \u00FF). It can also
|
|
496
503
|
* include the tab (\u0009), linefeed (\u000A), and carriage return (\u000D)
|
|
497
504
|
* characters.</p>
|
|
505
|
+
* <p>For more information about role session permissions, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session">Session
|
|
506
|
+
* policies</a>.</p>
|
|
498
507
|
* <note>
|
|
499
508
|
* <p>An Amazon Web Services conversion compresses the passed inline session policy, managed policy ARNs,
|
|
500
509
|
* and session tags into a packed binary format that has a separate limit. Your request can
|
|
@@ -504,7 +513,7 @@ export interface AssumeRoleWithSAMLRequest {
|
|
|
504
513
|
* </note>
|
|
505
514
|
* @public
|
|
506
515
|
*/
|
|
507
|
-
Policy?: string;
|
|
516
|
+
Policy?: string | undefined;
|
|
508
517
|
/**
|
|
509
518
|
* <p>The duration, in seconds, of the role session. Your role session lasts for the duration
|
|
510
519
|
* that you specify for the <code>DurationSeconds</code> parameter, or until the time
|
|
@@ -529,7 +538,7 @@ export interface AssumeRoleWithSAMLRequest {
|
|
|
529
538
|
* </note>
|
|
530
539
|
* @public
|
|
531
540
|
*/
|
|
532
|
-
DurationSeconds?: number;
|
|
541
|
+
DurationSeconds?: number | undefined;
|
|
533
542
|
}
|
|
534
543
|
/**
|
|
535
544
|
* <p>Contains the response to a successful <a>AssumeRoleWithSAML</a> request,
|
|
@@ -546,26 +555,26 @@ export interface AssumeRoleWithSAMLResponse {
|
|
|
546
555
|
* </note>
|
|
547
556
|
* @public
|
|
548
557
|
*/
|
|
549
|
-
Credentials?: Credentials;
|
|
558
|
+
Credentials?: Credentials | undefined;
|
|
550
559
|
/**
|
|
551
560
|
* <p>The identifiers for the temporary security credentials that the operation
|
|
552
561
|
* returns.</p>
|
|
553
562
|
* @public
|
|
554
563
|
*/
|
|
555
|
-
AssumedRoleUser?: AssumedRoleUser;
|
|
564
|
+
AssumedRoleUser?: AssumedRoleUser | undefined;
|
|
556
565
|
/**
|
|
557
566
|
* <p>A percentage value that indicates the packed size of the session policies and session
|
|
558
567
|
* tags combined passed in the request. The request fails if the packed size is greater than 100 percent,
|
|
559
568
|
* which means the policies and tags exceeded the allowed space.</p>
|
|
560
569
|
* @public
|
|
561
570
|
*/
|
|
562
|
-
PackedPolicySize?: number;
|
|
571
|
+
PackedPolicySize?: number | undefined;
|
|
563
572
|
/**
|
|
564
573
|
* <p>The value of the <code>NameID</code> element in the <code>Subject</code> element of the
|
|
565
574
|
* SAML assertion.</p>
|
|
566
575
|
* @public
|
|
567
576
|
*/
|
|
568
|
-
Subject?: string;
|
|
577
|
+
Subject?: string | undefined;
|
|
569
578
|
/**
|
|
570
579
|
* <p> The format of the name ID, as defined by the <code>Format</code> attribute in the
|
|
571
580
|
* <code>NameID</code> element of the SAML assertion. Typical examples of the format are
|
|
@@ -577,18 +586,18 @@ export interface AssumeRoleWithSAMLResponse {
|
|
|
577
586
|
* with no modifications.</p>
|
|
578
587
|
* @public
|
|
579
588
|
*/
|
|
580
|
-
SubjectType?: string;
|
|
589
|
+
SubjectType?: string | undefined;
|
|
581
590
|
/**
|
|
582
591
|
* <p>The value of the <code>Issuer</code> element of the SAML assertion.</p>
|
|
583
592
|
* @public
|
|
584
593
|
*/
|
|
585
|
-
Issuer?: string;
|
|
594
|
+
Issuer?: string | undefined;
|
|
586
595
|
/**
|
|
587
596
|
* <p> The value of the <code>Recipient</code> attribute of the
|
|
588
597
|
* <code>SubjectConfirmationData</code> element of the SAML assertion. </p>
|
|
589
598
|
* @public
|
|
590
599
|
*/
|
|
591
|
-
Audience?: string;
|
|
600
|
+
Audience?: string | undefined;
|
|
592
601
|
/**
|
|
593
602
|
* <p>A hash value based on the concatenation of the following:</p>
|
|
594
603
|
* <ul>
|
|
@@ -610,16 +619,18 @@ export interface AssumeRoleWithSAMLResponse {
|
|
|
610
619
|
* </p>
|
|
611
620
|
* @public
|
|
612
621
|
*/
|
|
613
|
-
NameQualifier?: string;
|
|
622
|
+
NameQualifier?: string | undefined;
|
|
614
623
|
/**
|
|
615
|
-
* <p>The value in the <code>SourceIdentity</code> attribute in the SAML assertion.
|
|
624
|
+
* <p>The value in the <code>SourceIdentity</code> attribute in the SAML assertion. The source
|
|
625
|
+
* identity value persists across <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles.html#iam-term-role-chaining">chained role</a>
|
|
626
|
+
* sessions.</p>
|
|
616
627
|
* <p>You can require users to set a source identity value when they assume a role. You do
|
|
617
628
|
* this by using the <code>sts:SourceIdentity</code> condition key in a role trust policy.
|
|
618
629
|
* That way, actions that are taken with the role are associated with that user. After the
|
|
619
630
|
* source identity is set, the value cannot be changed. It is present in the request for all
|
|
620
|
-
* actions that are taken by the role and persists across <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_terms-and-concepts
|
|
621
|
-
*
|
|
622
|
-
*
|
|
631
|
+
* actions that are taken by the role and persists across <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles.html#id_roles_terms-and-concepts">chained role</a>
|
|
632
|
+
* sessions. You can configure your SAML identity provider to use an attribute associated with
|
|
633
|
+
* your users, like user name or email, as the source identity when calling
|
|
623
634
|
* <code>AssumeRoleWithSAML</code>. You do this by adding an attribute to the SAML
|
|
624
635
|
* assertion. For more information about using source identity, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_monitor.html">Monitor and control
|
|
625
636
|
* actions taken with assumed roles</a> in the
|
|
@@ -629,7 +640,7 @@ export interface AssumeRoleWithSAMLResponse {
|
|
|
629
640
|
* also include underscores or any of the following characters: =,.@-</p>
|
|
630
641
|
* @public
|
|
631
642
|
*/
|
|
632
|
-
SourceIdentity?: string;
|
|
643
|
+
SourceIdentity?: string | undefined;
|
|
633
644
|
}
|
|
634
645
|
/**
|
|
635
646
|
* <p>The identity provider (IdP) reported that authentication failed. This might be because
|
|
@@ -665,6 +676,16 @@ export declare class InvalidIdentityTokenException extends __BaseException {
|
|
|
665
676
|
export interface AssumeRoleWithWebIdentityRequest {
|
|
666
677
|
/**
|
|
667
678
|
* <p>The Amazon Resource Name (ARN) of the role that the caller is assuming.</p>
|
|
679
|
+
* <note>
|
|
680
|
+
* <p>Additional considerations apply to Amazon Cognito identity pools that assume <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies-cross-account-resource-access.html">cross-account IAM roles</a>. The trust policies of these roles must accept the
|
|
681
|
+
* <code>cognito-identity.amazonaws.com</code> service principal and must contain the
|
|
682
|
+
* <code>cognito-identity.amazonaws.com:aud</code> condition key to restrict role
|
|
683
|
+
* assumption to users from your intended identity pools. A policy that trusts Amazon Cognito
|
|
684
|
+
* identity pools without this condition creates a risk that a user from an unintended
|
|
685
|
+
* identity pool can assume the role. For more information, see <a href="https://docs.aws.amazon.com/cognito/latest/developerguide/iam-roles.html#trust-policies"> Trust policies for
|
|
686
|
+
* IAM roles in Basic (Classic) authentication </a> in the <i>Amazon Cognito
|
|
687
|
+
* Developer Guide</i>.</p>
|
|
688
|
+
* </note>
|
|
668
689
|
* @public
|
|
669
690
|
*/
|
|
670
691
|
RoleArn: string | undefined;
|
|
@@ -674,6 +695,11 @@ export interface AssumeRoleWithWebIdentityRequest {
|
|
|
674
695
|
* security credentials that your application will use are associated with that user. This
|
|
675
696
|
* session name is included as part of the ARN and assumed role ID in the
|
|
676
697
|
* <code>AssumedRoleUser</code> response element.</p>
|
|
698
|
+
* <p>For security purposes, administrators can view this field in <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/cloudtrail-integration.html#cloudtrail-integration_signin-tempcreds">CloudTrail logs</a> to help identify who performed an action in Amazon Web Services. Your
|
|
699
|
+
* administrator might require that you specify your user name as the session name when you
|
|
700
|
+
* assume the role. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_iam-condition-keys.html#ck_rolesessionname">
|
|
701
|
+
* <code>sts:RoleSessionName</code>
|
|
702
|
+
* </a>.</p>
|
|
677
703
|
* <p>The regex used to validate this parameter is a string of characters
|
|
678
704
|
* consisting of upper- and lower-case alphanumeric characters with no spaces. You can
|
|
679
705
|
* also include underscores or any of the following characters: =,.@-</p>
|
|
@@ -684,7 +710,8 @@ export interface AssumeRoleWithWebIdentityRequest {
|
|
|
684
710
|
* <p>The OAuth 2.0 access token or OpenID Connect ID token that is provided by the identity
|
|
685
711
|
* provider. Your application must get this token by authenticating the user who is using your
|
|
686
712
|
* application with a web identity provider before the application makes an
|
|
687
|
-
* <code>AssumeRoleWithWebIdentity</code> call.
|
|
713
|
+
* <code>AssumeRoleWithWebIdentity</code> call. Timestamps in the token must be formatted
|
|
714
|
+
* as either an integer or a long integer. Only tokens with RSA algorithms (RS256) are
|
|
688
715
|
* supported.</p>
|
|
689
716
|
* @public
|
|
690
717
|
*/
|
|
@@ -698,7 +725,7 @@ export interface AssumeRoleWithWebIdentityRequest {
|
|
|
698
725
|
* <p>Do not specify this value for OpenID Connect ID tokens.</p>
|
|
699
726
|
* @public
|
|
700
727
|
*/
|
|
701
|
-
ProviderId?: string;
|
|
728
|
+
ProviderId?: string | undefined;
|
|
702
729
|
/**
|
|
703
730
|
* <p>The Amazon Resource Names (ARNs) of the IAM managed policies that you want to use as
|
|
704
731
|
* managed session policies. The policies must exist in the same account as the role.</p>
|
|
@@ -723,7 +750,7 @@ export interface AssumeRoleWithWebIdentityRequest {
|
|
|
723
750
|
* Policies</a> in the <i>IAM User Guide</i>.</p>
|
|
724
751
|
* @public
|
|
725
752
|
*/
|
|
726
|
-
PolicyArns?: PolicyDescriptorType[];
|
|
753
|
+
PolicyArns?: PolicyDescriptorType[] | undefined;
|
|
727
754
|
/**
|
|
728
755
|
* <p>An IAM policy in JSON format that you want to use as an inline session policy.</p>
|
|
729
756
|
* <p>This parameter is optional. Passing policies to this operation returns new
|
|
@@ -739,6 +766,8 @@ export interface AssumeRoleWithWebIdentityRequest {
|
|
|
739
766
|
* character to the end of the valid character list (\u0020 through \u00FF). It can also
|
|
740
767
|
* include the tab (\u0009), linefeed (\u000A), and carriage return (\u000D)
|
|
741
768
|
* characters.</p>
|
|
769
|
+
* <p>For more information about role session permissions, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session">Session
|
|
770
|
+
* policies</a>.</p>
|
|
742
771
|
* <note>
|
|
743
772
|
* <p>An Amazon Web Services conversion compresses the passed inline session policy, managed policy ARNs,
|
|
744
773
|
* and session tags into a packed binary format that has a separate limit. Your request can
|
|
@@ -748,7 +777,7 @@ export interface AssumeRoleWithWebIdentityRequest {
|
|
|
748
777
|
* </note>
|
|
749
778
|
* @public
|
|
750
779
|
*/
|
|
751
|
-
Policy?: string;
|
|
780
|
+
Policy?: string | undefined;
|
|
752
781
|
/**
|
|
753
782
|
* <p>The duration, in seconds, of the role session. The value can range from 900 seconds (15
|
|
754
783
|
* minutes) up to the maximum session duration setting for the role. This setting can have a
|
|
@@ -770,7 +799,7 @@ export interface AssumeRoleWithWebIdentityRequest {
|
|
|
770
799
|
* </note>
|
|
771
800
|
* @public
|
|
772
801
|
*/
|
|
773
|
-
DurationSeconds?: number;
|
|
802
|
+
DurationSeconds?: number | undefined;
|
|
774
803
|
}
|
|
775
804
|
/**
|
|
776
805
|
* <p>Contains the response to a successful <a>AssumeRoleWithWebIdentity</a>
|
|
@@ -787,7 +816,7 @@ export interface AssumeRoleWithWebIdentityResponse {
|
|
|
787
816
|
* </note>
|
|
788
817
|
* @public
|
|
789
818
|
*/
|
|
790
|
-
Credentials?: Credentials;
|
|
819
|
+
Credentials?: Credentials | undefined;
|
|
791
820
|
/**
|
|
792
821
|
* <p>The unique user identifier that is returned by the identity provider. This identifier is
|
|
793
822
|
* associated with the <code>WebIdentityToken</code> that was submitted with the
|
|
@@ -797,7 +826,7 @@ export interface AssumeRoleWithWebIdentityResponse {
|
|
|
797
826
|
* identity provider as the token's <code>sub</code> (Subject) claim. </p>
|
|
798
827
|
* @public
|
|
799
828
|
*/
|
|
800
|
-
SubjectFromWebIdentityToken?: string;
|
|
829
|
+
SubjectFromWebIdentityToken?: string | undefined;
|
|
801
830
|
/**
|
|
802
831
|
* <p>The Amazon Resource Name (ARN) and the assumed role ID, which are identifiers that you
|
|
803
832
|
* can use to refer to the resulting temporary security credentials. For example, you can
|
|
@@ -806,14 +835,14 @@ export interface AssumeRoleWithWebIdentityResponse {
|
|
|
806
835
|
* when you called <code>AssumeRole</code>. </p>
|
|
807
836
|
* @public
|
|
808
837
|
*/
|
|
809
|
-
AssumedRoleUser?: AssumedRoleUser;
|
|
838
|
+
AssumedRoleUser?: AssumedRoleUser | undefined;
|
|
810
839
|
/**
|
|
811
840
|
* <p>A percentage value that indicates the packed size of the session policies and session
|
|
812
841
|
* tags combined passed in the request. The request fails if the packed size is greater than 100 percent,
|
|
813
842
|
* which means the policies and tags exceeded the allowed space.</p>
|
|
814
843
|
* @public
|
|
815
844
|
*/
|
|
816
|
-
PackedPolicySize?: number;
|
|
845
|
+
PackedPolicySize?: number | undefined;
|
|
817
846
|
/**
|
|
818
847
|
* <p> The issuing authority of the web identity token presented. For OpenID Connect ID
|
|
819
848
|
* tokens, this contains the value of the <code>iss</code> field. For OAuth 2.0 access tokens,
|
|
@@ -821,14 +850,14 @@ export interface AssumeRoleWithWebIdentityResponse {
|
|
|
821
850
|
* <code>AssumeRoleWithWebIdentity</code> request.</p>
|
|
822
851
|
* @public
|
|
823
852
|
*/
|
|
824
|
-
Provider?: string;
|
|
853
|
+
Provider?: string | undefined;
|
|
825
854
|
/**
|
|
826
855
|
* <p>The intended audience (also known as client ID) of the web identity token. This is
|
|
827
856
|
* traditionally the client identifier issued to the application that requested the web
|
|
828
857
|
* identity token.</p>
|
|
829
858
|
* @public
|
|
830
859
|
*/
|
|
831
|
-
Audience?: string;
|
|
860
|
+
Audience?: string | undefined;
|
|
832
861
|
/**
|
|
833
862
|
* <p>The value of the source identity that is returned in the JSON web token (JWT) from the
|
|
834
863
|
* identity provider.</p>
|
|
@@ -836,9 +865,9 @@ export interface AssumeRoleWithWebIdentityResponse {
|
|
|
836
865
|
* this by using the <code>sts:SourceIdentity</code> condition key in a role trust policy.
|
|
837
866
|
* That way, actions that are taken with the role are associated with that user. After the
|
|
838
867
|
* source identity is set, the value cannot be changed. It is present in the request for all
|
|
839
|
-
* actions that are taken by the role and persists across <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_terms-and-concepts
|
|
840
|
-
*
|
|
841
|
-
*
|
|
868
|
+
* actions that are taken by the role and persists across <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles.html#id_roles_terms-and-concepts">chained role</a>
|
|
869
|
+
* sessions. You can configure your identity provider to use an attribute associated with your
|
|
870
|
+
* users, like user name or email, as the source identity when calling
|
|
842
871
|
* <code>AssumeRoleWithWebIdentity</code>. You do this by adding a claim to the JSON web
|
|
843
872
|
* token. To learn more about OIDC tokens and claims, see <a href="https://docs.aws.amazon.com/cognito/latest/developerguide/amazon-cognito-user-pools-using-tokens-with-identity-providers.html">Using Tokens with User Pools</a> in the <i>Amazon Cognito Developer Guide</i>.
|
|
844
873
|
* For more information about using source identity, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_monitor.html">Monitor and control
|
|
@@ -849,14 +878,14 @@ export interface AssumeRoleWithWebIdentityResponse {
|
|
|
849
878
|
* also include underscores or any of the following characters: =,.@-</p>
|
|
850
879
|
* @public
|
|
851
880
|
*/
|
|
852
|
-
SourceIdentity?: string;
|
|
881
|
+
SourceIdentity?: string | undefined;
|
|
853
882
|
}
|
|
854
883
|
/**
|
|
855
|
-
* <p>The request could not be fulfilled because the identity provider (IDP) that
|
|
856
|
-
*
|
|
857
|
-
*
|
|
858
|
-
*
|
|
859
|
-
*
|
|
884
|
+
* <p>The request could not be fulfilled because the identity provider (IDP) that was asked
|
|
885
|
+
* to verify the incoming identity token could not be reached. This is often a transient
|
|
886
|
+
* error caused by network conditions. Retry the request a limited number of times so that
|
|
887
|
+
* you don't exceed the request rate. If the error persists, the identity provider might be
|
|
888
|
+
* down or not responding.</p>
|
|
860
889
|
* @public
|
|
861
890
|
*/
|
|
862
891
|
export declare class IDPCommunicationErrorException extends __BaseException {
|
|
@@ -867,6 +896,87 @@ export declare class IDPCommunicationErrorException extends __BaseException {
|
|
|
867
896
|
*/
|
|
868
897
|
constructor(opts: __ExceptionOptionType<IDPCommunicationErrorException, __BaseException>);
|
|
869
898
|
}
|
|
899
|
+
/**
|
|
900
|
+
* @public
|
|
901
|
+
*/
|
|
902
|
+
export interface AssumeRootRequest {
|
|
903
|
+
/**
|
|
904
|
+
* <p>The member account principal ARN or account ID.</p>
|
|
905
|
+
* @public
|
|
906
|
+
*/
|
|
907
|
+
TargetPrincipal: string | undefined;
|
|
908
|
+
/**
|
|
909
|
+
* <p>The identity based policy that scopes the session to the privileged tasks that can be
|
|
910
|
+
* performed. You can use one of following Amazon Web Services managed policies to scope
|
|
911
|
+
* root session actions. You can add additional customer managed policies to further limit the
|
|
912
|
+
* permissions for the root session.</p>
|
|
913
|
+
* <ul>
|
|
914
|
+
* <li>
|
|
915
|
+
* <p>
|
|
916
|
+
* <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/security-iam-awsmanpol.html#security-iam-awsmanpol-IAMAuditRootUserCredentials">IAMAuditRootUserCredentials</a>
|
|
917
|
+
* </p>
|
|
918
|
+
* </li>
|
|
919
|
+
* <li>
|
|
920
|
+
* <p>
|
|
921
|
+
* <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/security-iam-awsmanpol.html#security-iam-awsmanpol-IAMCreateRootUserPassword">IAMCreateRootUserPassword</a>
|
|
922
|
+
* </p>
|
|
923
|
+
* </li>
|
|
924
|
+
* <li>
|
|
925
|
+
* <p>
|
|
926
|
+
* <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/security-iam-awsmanpol.html#security-iam-awsmanpol-IAMDeleteRootUserCredentials">IAMDeleteRootUserCredentials</a>
|
|
927
|
+
* </p>
|
|
928
|
+
* </li>
|
|
929
|
+
* <li>
|
|
930
|
+
* <p>
|
|
931
|
+
* <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/security-iam-awsmanpol.html#security-iam-awsmanpol-S3UnlockBucketPolicy">S3UnlockBucketPolicy</a>
|
|
932
|
+
* </p>
|
|
933
|
+
* </li>
|
|
934
|
+
* <li>
|
|
935
|
+
* <p>
|
|
936
|
+
* <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/security-iam-awsmanpol.html#security-iam-awsmanpol-SQSUnlockQueuePolicy">SQSUnlockQueuePolicy</a>
|
|
937
|
+
* </p>
|
|
938
|
+
* </li>
|
|
939
|
+
* </ul>
|
|
940
|
+
* @public
|
|
941
|
+
*/
|
|
942
|
+
TaskPolicyArn: PolicyDescriptorType | undefined;
|
|
943
|
+
/**
|
|
944
|
+
* <p>The duration, in seconds, of the privileged session. The value can range from 0 seconds
|
|
945
|
+
* up to the maximum session duration of 900 seconds (15 minutes). If you specify a value
|
|
946
|
+
* higher than this setting, the operation fails.</p>
|
|
947
|
+
* <p>By default, the value is set to <code>900</code> seconds.</p>
|
|
948
|
+
* @public
|
|
949
|
+
*/
|
|
950
|
+
DurationSeconds?: number | undefined;
|
|
951
|
+
}
|
|
952
|
+
/**
|
|
953
|
+
* @public
|
|
954
|
+
*/
|
|
955
|
+
export interface AssumeRootResponse {
|
|
956
|
+
/**
|
|
957
|
+
* <p>The temporary security credentials, which include an access key ID, a secret access key,
|
|
958
|
+
* and a security token.</p>
|
|
959
|
+
* <note>
|
|
960
|
+
* <p>The size of the security token that STS API operations return is not fixed. We
|
|
961
|
+
* strongly recommend that you make no assumptions about the maximum size.</p>
|
|
962
|
+
* </note>
|
|
963
|
+
* @public
|
|
964
|
+
*/
|
|
965
|
+
Credentials?: Credentials | undefined;
|
|
966
|
+
/**
|
|
967
|
+
* <p>The source identity specified by the principal that is calling the
|
|
968
|
+
* <code>AssumeRoot</code> operation.</p>
|
|
969
|
+
* <p>You can use the <code>aws:SourceIdentity</code> condition key to control access based on
|
|
970
|
+
* the value of source identity. For more information about using source identity, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_monitor.html">Monitor and control
|
|
971
|
+
* actions taken with assumed roles</a> in the
|
|
972
|
+
* <i>IAM User Guide</i>.</p>
|
|
973
|
+
* <p>The regex used to validate this parameter is a string of characters consisting of upper-
|
|
974
|
+
* and lower-case alphanumeric characters with no spaces. You can also include underscores or
|
|
975
|
+
* any of the following characters: =,.@-</p>
|
|
976
|
+
* @public
|
|
977
|
+
*/
|
|
978
|
+
SourceIdentity?: string | undefined;
|
|
979
|
+
}
|
|
870
980
|
/**
|
|
871
981
|
* @public
|
|
872
982
|
*/
|
|
@@ -887,12 +997,12 @@ export interface DecodeAuthorizationMessageResponse {
|
|
|
887
997
|
* <p>The API returns a response with the decoded message.</p>
|
|
888
998
|
* @public
|
|
889
999
|
*/
|
|
890
|
-
DecodedMessage?: string;
|
|
1000
|
+
DecodedMessage?: string | undefined;
|
|
891
1001
|
}
|
|
892
1002
|
/**
|
|
893
1003
|
* <p>The error returned if the message passed to <code>DecodeAuthorizationMessage</code>
|
|
894
|
-
* was invalid. This can happen if the token contains invalid characters, such as
|
|
895
|
-
*
|
|
1004
|
+
* was invalid. This can happen if the token contains invalid characters, such as line
|
|
1005
|
+
* breaks, or if the message has expired.</p>
|
|
896
1006
|
* @public
|
|
897
1007
|
*/
|
|
898
1008
|
export declare class InvalidAuthorizationMessageException extends __BaseException {
|
|
@@ -923,7 +1033,7 @@ export interface GetAccessKeyInfoResponse {
|
|
|
923
1033
|
* <p>The number used to identify the Amazon Web Services account.</p>
|
|
924
1034
|
* @public
|
|
925
1035
|
*/
|
|
926
|
-
Account?: string;
|
|
1036
|
+
Account?: string | undefined;
|
|
927
1037
|
}
|
|
928
1038
|
/**
|
|
929
1039
|
* @public
|
|
@@ -943,18 +1053,18 @@ export interface GetCallerIdentityResponse {
|
|
|
943
1053
|
* page in the <i>IAM User Guide</i>.</p>
|
|
944
1054
|
* @public
|
|
945
1055
|
*/
|
|
946
|
-
UserId?: string;
|
|
1056
|
+
UserId?: string | undefined;
|
|
947
1057
|
/**
|
|
948
1058
|
* <p>The Amazon Web Services account ID number of the account that owns or contains the calling
|
|
949
1059
|
* entity.</p>
|
|
950
1060
|
* @public
|
|
951
1061
|
*/
|
|
952
|
-
Account?: string;
|
|
1062
|
+
Account?: string | undefined;
|
|
953
1063
|
/**
|
|
954
1064
|
* <p>The Amazon Web Services ARN associated with the calling entity.</p>
|
|
955
1065
|
* @public
|
|
956
1066
|
*/
|
|
957
|
-
Arn?: string;
|
|
1067
|
+
Arn?: string | undefined;
|
|
958
1068
|
}
|
|
959
1069
|
/**
|
|
960
1070
|
* @public
|
|
@@ -1003,7 +1113,7 @@ export interface GetFederationTokenRequest {
|
|
|
1003
1113
|
* </note>
|
|
1004
1114
|
* @public
|
|
1005
1115
|
*/
|
|
1006
|
-
Policy?: string;
|
|
1116
|
+
Policy?: string | undefined;
|
|
1007
1117
|
/**
|
|
1008
1118
|
* <p>The Amazon Resource Names (ARNs) of the IAM managed policies that you want to use as a
|
|
1009
1119
|
* managed session policy. The policies must exist in the same account as the IAM user that is requesting federated access.</p>
|
|
@@ -1036,7 +1146,7 @@ export interface GetFederationTokenRequest {
|
|
|
1036
1146
|
* </note>
|
|
1037
1147
|
* @public
|
|
1038
1148
|
*/
|
|
1039
|
-
PolicyArns?: PolicyDescriptorType[];
|
|
1149
|
+
PolicyArns?: PolicyDescriptorType[] | undefined;
|
|
1040
1150
|
/**
|
|
1041
1151
|
* <p>The duration, in seconds, that the session should last. Acceptable durations for
|
|
1042
1152
|
* federation sessions range from 900 seconds (15 minutes) to 129,600 seconds (36 hours), with
|
|
@@ -1046,7 +1156,7 @@ export interface GetFederationTokenRequest {
|
|
|
1046
1156
|
* credentials defaults to one hour.</p>
|
|
1047
1157
|
* @public
|
|
1048
1158
|
*/
|
|
1049
|
-
DurationSeconds?: number;
|
|
1159
|
+
DurationSeconds?: number | undefined;
|
|
1050
1160
|
/**
|
|
1051
1161
|
* <p>A list of session tags. Each session tag consists of a key name and an associated value.
|
|
1052
1162
|
* For more information about session tags, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html">Passing Session Tags in STS</a> in the
|
|
@@ -1072,7 +1182,7 @@ export interface GetFederationTokenRequest {
|
|
|
1072
1182
|
* the request takes precedence over the role tag.</p>
|
|
1073
1183
|
* @public
|
|
1074
1184
|
*/
|
|
1075
|
-
Tags?: Tag[];
|
|
1185
|
+
Tags?: Tag[] | undefined;
|
|
1076
1186
|
}
|
|
1077
1187
|
/**
|
|
1078
1188
|
* <p>Identifiers for the federated user that is associated with the credentials.</p>
|
|
@@ -1108,7 +1218,7 @@ export interface GetFederationTokenResponse {
|
|
|
1108
1218
|
* </note>
|
|
1109
1219
|
* @public
|
|
1110
1220
|
*/
|
|
1111
|
-
Credentials?: Credentials;
|
|
1221
|
+
Credentials?: Credentials | undefined;
|
|
1112
1222
|
/**
|
|
1113
1223
|
* <p>Identifiers for the federated user associated with the credentials (such as
|
|
1114
1224
|
* <code>arn:aws:sts::123456789012:federated-user/Bob</code> or
|
|
@@ -1116,14 +1226,14 @@ export interface GetFederationTokenResponse {
|
|
|
1116
1226
|
* resource-based policies, such as an Amazon S3 bucket policy. </p>
|
|
1117
1227
|
* @public
|
|
1118
1228
|
*/
|
|
1119
|
-
FederatedUser?: FederatedUser;
|
|
1229
|
+
FederatedUser?: FederatedUser | undefined;
|
|
1120
1230
|
/**
|
|
1121
1231
|
* <p>A percentage value that indicates the packed size of the session policies and session
|
|
1122
1232
|
* tags combined passed in the request. The request fails if the packed size is greater than 100 percent,
|
|
1123
1233
|
* which means the policies and tags exceeded the allowed space.</p>
|
|
1124
1234
|
* @public
|
|
1125
1235
|
*/
|
|
1126
|
-
PackedPolicySize?: number;
|
|
1236
|
+
PackedPolicySize?: number | undefined;
|
|
1127
1237
|
}
|
|
1128
1238
|
/**
|
|
1129
1239
|
* @public
|
|
@@ -1137,7 +1247,7 @@ export interface GetSessionTokenRequest {
|
|
|
1137
1247
|
* than one hour, the session for Amazon Web Services account owners defaults to one hour.</p>
|
|
1138
1248
|
* @public
|
|
1139
1249
|
*/
|
|
1140
|
-
DurationSeconds?: number;
|
|
1250
|
+
DurationSeconds?: number | undefined;
|
|
1141
1251
|
/**
|
|
1142
1252
|
* <p>The identification number of the MFA device that is associated with the IAM user who is making the <code>GetSessionToken</code> call. Specify this value
|
|
1143
1253
|
* if the IAM user has a policy that requires MFA authentication. The value is
|
|
@@ -1149,7 +1259,7 @@ export interface GetSessionTokenRequest {
|
|
|
1149
1259
|
* You can also include underscores or any of the following characters: =,.@:/-</p>
|
|
1150
1260
|
* @public
|
|
1151
1261
|
*/
|
|
1152
|
-
SerialNumber?: string;
|
|
1262
|
+
SerialNumber?: string | undefined;
|
|
1153
1263
|
/**
|
|
1154
1264
|
* <p>The value provided by the MFA device, if MFA is required. If any policy requires the
|
|
1155
1265
|
* IAM user to submit an MFA code, specify this value. If MFA authentication
|
|
@@ -1160,7 +1270,7 @@ export interface GetSessionTokenRequest {
|
|
|
1160
1270
|
* numeric digits.</p>
|
|
1161
1271
|
* @public
|
|
1162
1272
|
*/
|
|
1163
|
-
TokenCode?: string;
|
|
1273
|
+
TokenCode?: string | undefined;
|
|
1164
1274
|
}
|
|
1165
1275
|
/**
|
|
1166
1276
|
* <p>Contains the response to a successful <a>GetSessionToken</a> request,
|
|
@@ -1177,7 +1287,7 @@ export interface GetSessionTokenResponse {
|
|
|
1177
1287
|
* </note>
|
|
1178
1288
|
* @public
|
|
1179
1289
|
*/
|
|
1180
|
-
Credentials?: Credentials;
|
|
1290
|
+
Credentials?: Credentials | undefined;
|
|
1181
1291
|
}
|
|
1182
1292
|
/**
|
|
1183
1293
|
* @internal
|
|
@@ -1203,6 +1313,10 @@ export declare const AssumeRoleWithWebIdentityRequestFilterSensitiveLog: (obj: A
|
|
|
1203
1313
|
* @internal
|
|
1204
1314
|
*/
|
|
1205
1315
|
export declare const AssumeRoleWithWebIdentityResponseFilterSensitiveLog: (obj: AssumeRoleWithWebIdentityResponse) => any;
|
|
1316
|
+
/**
|
|
1317
|
+
* @internal
|
|
1318
|
+
*/
|
|
1319
|
+
export declare const AssumeRootResponseFilterSensitiveLog: (obj: AssumeRootResponse) => any;
|
|
1206
1320
|
/**
|
|
1207
1321
|
* @internal
|
|
1208
1322
|
*/
|