@cdklabs/cdk-ecs-codedeploy 0.0.346 → 0.0.347
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.jsii +3 -3
- package/lib/api-canary/index.js +1 -1
- package/lib/ecs-appspec/index.js +1 -1
- package/lib/ecs-deployment/index.js +1 -1
- package/lib/ecs-patterns/application-load-balanced-codedeployed-fargate-service.js +1 -1
- package/node_modules/@aws-sdk/client-codedeploy/package.json +36 -36
- package/node_modules/@aws-sdk/client-sso/package.json +32 -32
- package/node_modules/@aws-sdk/client-sso-oidc/package.json +34 -34
- package/node_modules/@aws-sdk/client-sts/README.md +8 -0
- package/node_modules/@aws-sdk/client-sts/dist-cjs/index.js +89 -12
- package/node_modules/@aws-sdk/client-sts/dist-es/STS.js +2 -0
- package/node_modules/@aws-sdk/client-sts/dist-es/commands/AssumeRootCommand.js +23 -0
- package/node_modules/@aws-sdk/client-sts/dist-es/commands/index.js +1 -0
- package/node_modules/@aws-sdk/client-sts/dist-es/models/models_0.js +4 -0
- package/node_modules/@aws-sdk/client-sts/dist-es/protocols/Aws_query.js +53 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/STS.d.ts +7 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/STSClient.d.ts +3 -2
- package/node_modules/@aws-sdk/client-sts/dist-types/commands/AssumeRoleCommand.d.ts +13 -13
- package/node_modules/@aws-sdk/client-sts/dist-types/commands/AssumeRoleWithSAMLCommand.d.ts +8 -8
- package/node_modules/@aws-sdk/client-sts/dist-types/commands/AssumeRoleWithWebIdentityCommand.d.ts +15 -30
- package/node_modules/@aws-sdk/client-sts/dist-types/commands/AssumeRootCommand.d.ts +129 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/commands/DecodeAuthorizationMessageCommand.d.ts +2 -2
- package/node_modules/@aws-sdk/client-sts/dist-types/commands/GetFederationTokenCommand.d.ts +8 -8
- package/node_modules/@aws-sdk/client-sts/dist-types/commands/GetSessionTokenCommand.d.ts +6 -6
- package/node_modules/@aws-sdk/client-sts/dist-types/commands/index.d.ts +1 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/models/models_0.d.ts +146 -32
- package/node_modules/@aws-sdk/client-sts/dist-types/protocols/Aws_query.d.ts +9 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/ts3.4/STS.d.ts +17 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/ts3.4/STSClient.d.ts +6 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/ts3.4/commands/AssumeRootCommand.d.ts +47 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/ts3.4/commands/index.d.ts +1 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/ts3.4/models/models_0.d.ts +12 -0
- package/node_modules/@aws-sdk/client-sts/dist-types/ts3.4/protocols/Aws_query.d.ts +12 -0
- package/node_modules/@aws-sdk/client-sts/package.json +36 -36
- package/node_modules/@aws-sdk/core/package.json +14 -14
- package/node_modules/@aws-sdk/credential-provider-env/package.json +7 -7
- package/node_modules/@aws-sdk/credential-provider-http/package.json +12 -12
- package/node_modules/@aws-sdk/credential-provider-ini/package.json +15 -15
- package/node_modules/@aws-sdk/credential-provider-node/package.json +14 -14
- package/node_modules/@aws-sdk/credential-provider-process/package.json +8 -8
- package/node_modules/@aws-sdk/credential-provider-sso/package.json +10 -10
- package/node_modules/@aws-sdk/credential-provider-web-identity/package.json +8 -8
- package/node_modules/@aws-sdk/middleware-host-header/package.json +8 -8
- package/node_modules/@aws-sdk/middleware-logger/package.json +7 -7
- package/node_modules/@aws-sdk/middleware-recursion-detection/package.json +8 -8
- package/node_modules/@aws-sdk/middleware-user-agent/package.json +11 -11
- package/node_modules/@aws-sdk/region-config-resolver/package.json +7 -7
- package/node_modules/@aws-sdk/token-providers/package.json +8 -8
- package/node_modules/@aws-sdk/types/package.json +2 -2
- package/node_modules/@aws-sdk/util-endpoints/package.json +8 -8
- package/node_modules/@aws-sdk/util-locate-window/package.json +3 -3
- package/node_modules/@aws-sdk/util-user-agent-browser/package.json +5 -5
- package/node_modules/@aws-sdk/util-user-agent-node/package.json +7 -7
- package/node_modules/@smithy/abort-controller/package.json +2 -2
- package/node_modules/@smithy/config-resolver/package.json +4 -4
- package/node_modules/@smithy/core/package.json +6 -6
- package/node_modules/@smithy/credential-provider-imds/package.json +5 -5
- package/node_modules/@smithy/fetch-http-handler/package.json +5 -5
- package/node_modules/@smithy/hash-node/package.json +2 -2
- package/node_modules/@smithy/invalid-dependency/package.json +2 -2
- package/node_modules/@smithy/middleware-content-length/package.json +3 -3
- package/node_modules/@smithy/middleware-endpoint/package.json +8 -8
- package/node_modules/@smithy/middleware-retry/package.json +8 -8
- package/node_modules/@smithy/middleware-serde/package.json +2 -2
- package/node_modules/@smithy/middleware-stack/package.json +2 -2
- package/node_modules/@smithy/node-config-provider/package.json +4 -4
- package/node_modules/@smithy/node-http-handler/package.json +5 -5
- package/node_modules/@smithy/property-provider/package.json +2 -2
- package/node_modules/@smithy/protocol-http/package.json +2 -2
- package/node_modules/@smithy/querystring-builder/package.json +2 -2
- package/node_modules/@smithy/querystring-parser/package.json +2 -2
- package/node_modules/@smithy/service-error-classification/package.json +2 -2
- package/node_modules/@smithy/shared-ini-file-loader/package.json +2 -2
- package/node_modules/@smithy/signature-v4/package.json +4 -4
- package/node_modules/@smithy/smithy-client/package.json +7 -7
- package/node_modules/@smithy/types/dist-types/transform/no-undefined.d.ts +3 -2
- package/node_modules/@smithy/types/dist-types/ts3.4/transform/no-undefined.d.ts +3 -2
- package/node_modules/@smithy/types/package.json +1 -1
- package/node_modules/@smithy/url-parser/package.json +3 -3
- package/node_modules/@smithy/util-defaults-mode-browser/package.json +4 -4
- package/node_modules/@smithy/util-defaults-mode-node/package.json +7 -7
- package/node_modules/@smithy/util-endpoints/package.json +3 -3
- package/node_modules/@smithy/util-middleware/package.json +2 -2
- package/node_modules/@smithy/util-retry/package.json +3 -3
- package/node_modules/@smithy/util-stream/package.json +4 -4
- package/node_modules/@smithy/util-waiter/package.json +3 -3
- package/package.json +5 -5
|
@@ -30,7 +30,9 @@ __export(src_exports, {
|
|
|
30
30
|
AssumeRoleWithWebIdentityCommand: () => AssumeRoleWithWebIdentityCommand,
|
|
31
31
|
AssumeRoleWithWebIdentityRequestFilterSensitiveLog: () => AssumeRoleWithWebIdentityRequestFilterSensitiveLog,
|
|
32
32
|
AssumeRoleWithWebIdentityResponseFilterSensitiveLog: () => AssumeRoleWithWebIdentityResponseFilterSensitiveLog,
|
|
33
|
-
|
|
33
|
+
AssumeRootCommand: () => AssumeRootCommand,
|
|
34
|
+
AssumeRootResponseFilterSensitiveLog: () => AssumeRootResponseFilterSensitiveLog,
|
|
35
|
+
ClientInputEndpointParameters: () => import_EndpointParameters10.ClientInputEndpointParameters,
|
|
34
36
|
CredentialsFilterSensitiveLog: () => CredentialsFilterSensitiveLog,
|
|
35
37
|
DecodeAuthorizationMessageCommand: () => DecodeAuthorizationMessageCommand,
|
|
36
38
|
ExpiredTokenException: () => ExpiredTokenException,
|
|
@@ -243,6 +245,10 @@ var AssumeRoleWithWebIdentityResponseFilterSensitiveLog = /* @__PURE__ */ __name
|
|
|
243
245
|
...obj,
|
|
244
246
|
...obj.Credentials && { Credentials: CredentialsFilterSensitiveLog(obj.Credentials) }
|
|
245
247
|
}), "AssumeRoleWithWebIdentityResponseFilterSensitiveLog");
|
|
248
|
+
var AssumeRootResponseFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({
|
|
249
|
+
...obj,
|
|
250
|
+
...obj.Credentials && { Credentials: CredentialsFilterSensitiveLog(obj.Credentials) }
|
|
251
|
+
}), "AssumeRootResponseFilterSensitiveLog");
|
|
246
252
|
var GetFederationTokenResponseFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({
|
|
247
253
|
...obj,
|
|
248
254
|
...obj.Credentials && { Credentials: CredentialsFilterSensitiveLog(obj.Credentials) }
|
|
@@ -286,6 +292,16 @@ var se_AssumeRoleWithWebIdentityCommand = /* @__PURE__ */ __name(async (input, c
|
|
|
286
292
|
});
|
|
287
293
|
return buildHttpRpcRequest(context, headers, "/", void 0, body);
|
|
288
294
|
}, "se_AssumeRoleWithWebIdentityCommand");
|
|
295
|
+
var se_AssumeRootCommand = /* @__PURE__ */ __name(async (input, context) => {
|
|
296
|
+
const headers = SHARED_HEADERS;
|
|
297
|
+
let body;
|
|
298
|
+
body = buildFormUrlencodedString({
|
|
299
|
+
...se_AssumeRootRequest(input, context),
|
|
300
|
+
[_A]: _ARs,
|
|
301
|
+
[_V]: _
|
|
302
|
+
});
|
|
303
|
+
return buildHttpRpcRequest(context, headers, "/", void 0, body);
|
|
304
|
+
}, "se_AssumeRootCommand");
|
|
289
305
|
var se_DecodeAuthorizationMessageCommand = /* @__PURE__ */ __name(async (input, context) => {
|
|
290
306
|
const headers = SHARED_HEADERS;
|
|
291
307
|
let body;
|
|
@@ -375,6 +391,19 @@ var de_AssumeRoleWithWebIdentityCommand = /* @__PURE__ */ __name(async (output,
|
|
|
375
391
|
};
|
|
376
392
|
return response;
|
|
377
393
|
}, "de_AssumeRoleWithWebIdentityCommand");
|
|
394
|
+
var de_AssumeRootCommand = /* @__PURE__ */ __name(async (output, context) => {
|
|
395
|
+
if (output.statusCode >= 300) {
|
|
396
|
+
return de_CommandError(output, context);
|
|
397
|
+
}
|
|
398
|
+
const data = await (0, import_core.parseXmlBody)(output.body, context);
|
|
399
|
+
let contents = {};
|
|
400
|
+
contents = de_AssumeRootResponse(data.AssumeRootResult, context);
|
|
401
|
+
const response = {
|
|
402
|
+
$metadata: deserializeMetadata(output),
|
|
403
|
+
...contents
|
|
404
|
+
};
|
|
405
|
+
return response;
|
|
406
|
+
}, "de_AssumeRootCommand");
|
|
378
407
|
var de_DecodeAuthorizationMessageCommand = /* @__PURE__ */ __name(async (output, context) => {
|
|
379
408
|
if (output.statusCode >= 300) {
|
|
380
409
|
return de_CommandError(output, context);
|
|
@@ -684,6 +713,23 @@ var se_AssumeRoleWithWebIdentityRequest = /* @__PURE__ */ __name((input, context
|
|
|
684
713
|
}
|
|
685
714
|
return entries;
|
|
686
715
|
}, "se_AssumeRoleWithWebIdentityRequest");
|
|
716
|
+
var se_AssumeRootRequest = /* @__PURE__ */ __name((input, context) => {
|
|
717
|
+
const entries = {};
|
|
718
|
+
if (input[_TP] != null) {
|
|
719
|
+
entries[_TP] = input[_TP];
|
|
720
|
+
}
|
|
721
|
+
if (input[_TPA] != null) {
|
|
722
|
+
const memberEntries = se_PolicyDescriptorType(input[_TPA], context);
|
|
723
|
+
Object.entries(memberEntries).forEach(([key, value]) => {
|
|
724
|
+
const loc = `TaskPolicyArn.${key}`;
|
|
725
|
+
entries[loc] = value;
|
|
726
|
+
});
|
|
727
|
+
}
|
|
728
|
+
if (input[_DS] != null) {
|
|
729
|
+
entries[_DS] = input[_DS];
|
|
730
|
+
}
|
|
731
|
+
return entries;
|
|
732
|
+
}, "se_AssumeRootRequest");
|
|
687
733
|
var se_DecodeAuthorizationMessageRequest = /* @__PURE__ */ __name((input, context) => {
|
|
688
734
|
const entries = {};
|
|
689
735
|
if (input[_EM] != null) {
|
|
@@ -915,6 +961,16 @@ var de_AssumeRoleWithWebIdentityResponse = /* @__PURE__ */ __name((output, conte
|
|
|
915
961
|
}
|
|
916
962
|
return contents;
|
|
917
963
|
}, "de_AssumeRoleWithWebIdentityResponse");
|
|
964
|
+
var de_AssumeRootResponse = /* @__PURE__ */ __name((output, context) => {
|
|
965
|
+
const contents = {};
|
|
966
|
+
if (output[_C] != null) {
|
|
967
|
+
contents[_C] = de_Credentials(output[_C], context);
|
|
968
|
+
}
|
|
969
|
+
if (output[_SI] != null) {
|
|
970
|
+
contents[_SI] = (0, import_smithy_client.expectString)(output[_SI]);
|
|
971
|
+
}
|
|
972
|
+
return contents;
|
|
973
|
+
}, "de_AssumeRootResponse");
|
|
918
974
|
var de_Credentials = /* @__PURE__ */ __name((output, context) => {
|
|
919
975
|
const contents = {};
|
|
920
976
|
if (output[_AKI] != null) {
|
|
@@ -1080,6 +1136,7 @@ var _ARI = "AssumedRoleId";
|
|
|
1080
1136
|
var _ARU = "AssumedRoleUser";
|
|
1081
1137
|
var _ARWSAML = "AssumeRoleWithSAML";
|
|
1082
1138
|
var _ARWWI = "AssumeRoleWithWebIdentity";
|
|
1139
|
+
var _ARs = "AssumeRoot";
|
|
1083
1140
|
var _Ac = "Account";
|
|
1084
1141
|
var _Ar = "Arn";
|
|
1085
1142
|
var _Au = "Audience";
|
|
@@ -1121,6 +1178,8 @@ var _ST = "SubjectType";
|
|
|
1121
1178
|
var _STe = "SessionToken";
|
|
1122
1179
|
var _T = "Tags";
|
|
1123
1180
|
var _TC = "TokenCode";
|
|
1181
|
+
var _TP = "TargetPrincipal";
|
|
1182
|
+
var _TPA = "TaskPolicyArn";
|
|
1124
1183
|
var _TTK = "TransitiveTagKeys";
|
|
1125
1184
|
var _UI = "UserId";
|
|
1126
1185
|
var _V = "Version";
|
|
@@ -1180,12 +1239,27 @@ var _AssumeRoleWithWebIdentityCommand = class _AssumeRoleWithWebIdentityCommand
|
|
|
1180
1239
|
__name(_AssumeRoleWithWebIdentityCommand, "AssumeRoleWithWebIdentityCommand");
|
|
1181
1240
|
var AssumeRoleWithWebIdentityCommand = _AssumeRoleWithWebIdentityCommand;
|
|
1182
1241
|
|
|
1183
|
-
// src/commands/
|
|
1242
|
+
// src/commands/AssumeRootCommand.ts
|
|
1184
1243
|
|
|
1185
1244
|
|
|
1186
1245
|
|
|
1187
1246
|
var import_EndpointParameters4 = require("./endpoint/EndpointParameters");
|
|
1188
|
-
var
|
|
1247
|
+
var _AssumeRootCommand = class _AssumeRootCommand extends import_smithy_client.Command.classBuilder().ep(import_EndpointParameters4.commonParams).m(function(Command, cs, config, o) {
|
|
1248
|
+
return [
|
|
1249
|
+
(0, import_middleware_serde.getSerdePlugin)(config, this.serialize, this.deserialize),
|
|
1250
|
+
(0, import_middleware_endpoint.getEndpointPlugin)(config, Command.getEndpointParameterInstructions())
|
|
1251
|
+
];
|
|
1252
|
+
}).s("AWSSecurityTokenServiceV20110615", "AssumeRoot", {}).n("STSClient", "AssumeRootCommand").f(void 0, AssumeRootResponseFilterSensitiveLog).ser(se_AssumeRootCommand).de(de_AssumeRootCommand).build() {
|
|
1253
|
+
};
|
|
1254
|
+
__name(_AssumeRootCommand, "AssumeRootCommand");
|
|
1255
|
+
var AssumeRootCommand = _AssumeRootCommand;
|
|
1256
|
+
|
|
1257
|
+
// src/commands/DecodeAuthorizationMessageCommand.ts
|
|
1258
|
+
|
|
1259
|
+
|
|
1260
|
+
|
|
1261
|
+
var import_EndpointParameters5 = require("./endpoint/EndpointParameters");
|
|
1262
|
+
var _DecodeAuthorizationMessageCommand = class _DecodeAuthorizationMessageCommand extends import_smithy_client.Command.classBuilder().ep(import_EndpointParameters5.commonParams).m(function(Command, cs, config, o) {
|
|
1189
1263
|
return [
|
|
1190
1264
|
(0, import_middleware_serde.getSerdePlugin)(config, this.serialize, this.deserialize),
|
|
1191
1265
|
(0, import_middleware_endpoint.getEndpointPlugin)(config, Command.getEndpointParameterInstructions())
|
|
@@ -1199,8 +1273,8 @@ var DecodeAuthorizationMessageCommand = _DecodeAuthorizationMessageCommand;
|
|
|
1199
1273
|
|
|
1200
1274
|
|
|
1201
1275
|
|
|
1202
|
-
var
|
|
1203
|
-
var _GetAccessKeyInfoCommand = class _GetAccessKeyInfoCommand extends import_smithy_client.Command.classBuilder().ep(
|
|
1276
|
+
var import_EndpointParameters6 = require("./endpoint/EndpointParameters");
|
|
1277
|
+
var _GetAccessKeyInfoCommand = class _GetAccessKeyInfoCommand extends import_smithy_client.Command.classBuilder().ep(import_EndpointParameters6.commonParams).m(function(Command, cs, config, o) {
|
|
1204
1278
|
return [
|
|
1205
1279
|
(0, import_middleware_serde.getSerdePlugin)(config, this.serialize, this.deserialize),
|
|
1206
1280
|
(0, import_middleware_endpoint.getEndpointPlugin)(config, Command.getEndpointParameterInstructions())
|
|
@@ -1214,8 +1288,8 @@ var GetAccessKeyInfoCommand = _GetAccessKeyInfoCommand;
|
|
|
1214
1288
|
|
|
1215
1289
|
|
|
1216
1290
|
|
|
1217
|
-
var
|
|
1218
|
-
var _GetCallerIdentityCommand = class _GetCallerIdentityCommand extends import_smithy_client.Command.classBuilder().ep(
|
|
1291
|
+
var import_EndpointParameters7 = require("./endpoint/EndpointParameters");
|
|
1292
|
+
var _GetCallerIdentityCommand = class _GetCallerIdentityCommand extends import_smithy_client.Command.classBuilder().ep(import_EndpointParameters7.commonParams).m(function(Command, cs, config, o) {
|
|
1219
1293
|
return [
|
|
1220
1294
|
(0, import_middleware_serde.getSerdePlugin)(config, this.serialize, this.deserialize),
|
|
1221
1295
|
(0, import_middleware_endpoint.getEndpointPlugin)(config, Command.getEndpointParameterInstructions())
|
|
@@ -1229,8 +1303,8 @@ var GetCallerIdentityCommand = _GetCallerIdentityCommand;
|
|
|
1229
1303
|
|
|
1230
1304
|
|
|
1231
1305
|
|
|
1232
|
-
var
|
|
1233
|
-
var _GetFederationTokenCommand = class _GetFederationTokenCommand extends import_smithy_client.Command.classBuilder().ep(
|
|
1306
|
+
var import_EndpointParameters8 = require("./endpoint/EndpointParameters");
|
|
1307
|
+
var _GetFederationTokenCommand = class _GetFederationTokenCommand extends import_smithy_client.Command.classBuilder().ep(import_EndpointParameters8.commonParams).m(function(Command, cs, config, o) {
|
|
1234
1308
|
return [
|
|
1235
1309
|
(0, import_middleware_serde.getSerdePlugin)(config, this.serialize, this.deserialize),
|
|
1236
1310
|
(0, import_middleware_endpoint.getEndpointPlugin)(config, Command.getEndpointParameterInstructions())
|
|
@@ -1244,8 +1318,8 @@ var GetFederationTokenCommand = _GetFederationTokenCommand;
|
|
|
1244
1318
|
|
|
1245
1319
|
|
|
1246
1320
|
|
|
1247
|
-
var
|
|
1248
|
-
var _GetSessionTokenCommand = class _GetSessionTokenCommand extends import_smithy_client.Command.classBuilder().ep(
|
|
1321
|
+
var import_EndpointParameters9 = require("./endpoint/EndpointParameters");
|
|
1322
|
+
var _GetSessionTokenCommand = class _GetSessionTokenCommand extends import_smithy_client.Command.classBuilder().ep(import_EndpointParameters9.commonParams).m(function(Command, cs, config, o) {
|
|
1249
1323
|
return [
|
|
1250
1324
|
(0, import_middleware_serde.getSerdePlugin)(config, this.serialize, this.deserialize),
|
|
1251
1325
|
(0, import_middleware_endpoint.getEndpointPlugin)(config, Command.getEndpointParameterInstructions())
|
|
@@ -1261,6 +1335,7 @@ var commands = {
|
|
|
1261
1335
|
AssumeRoleCommand,
|
|
1262
1336
|
AssumeRoleWithSAMLCommand,
|
|
1263
1337
|
AssumeRoleWithWebIdentityCommand,
|
|
1338
|
+
AssumeRootCommand,
|
|
1264
1339
|
DecodeAuthorizationMessageCommand,
|
|
1265
1340
|
GetAccessKeyInfoCommand,
|
|
1266
1341
|
GetCallerIdentityCommand,
|
|
@@ -1274,7 +1349,7 @@ var STS = _STS;
|
|
|
1274
1349
|
(0, import_smithy_client.createAggregatedClient)(commands, STS);
|
|
1275
1350
|
|
|
1276
1351
|
// src/index.ts
|
|
1277
|
-
var
|
|
1352
|
+
var import_EndpointParameters10 = require("./endpoint/EndpointParameters");
|
|
1278
1353
|
|
|
1279
1354
|
// src/defaultStsRoleAssumers.ts
|
|
1280
1355
|
var import_client = require("@aws-sdk/core/client");
|
|
@@ -1430,6 +1505,7 @@ var decorateDefaultCredentialProvider = /* @__PURE__ */ __name((provider) => (in
|
|
|
1430
1505
|
AssumeRoleCommand,
|
|
1431
1506
|
AssumeRoleWithSAMLCommand,
|
|
1432
1507
|
AssumeRoleWithWebIdentityCommand,
|
|
1508
|
+
AssumeRootCommand,
|
|
1433
1509
|
DecodeAuthorizationMessageCommand,
|
|
1434
1510
|
GetAccessKeyInfoCommand,
|
|
1435
1511
|
GetCallerIdentityCommand,
|
|
@@ -1449,6 +1525,7 @@ var decorateDefaultCredentialProvider = /* @__PURE__ */ __name((provider) => (in
|
|
|
1449
1525
|
AssumeRoleWithSAMLResponseFilterSensitiveLog,
|
|
1450
1526
|
AssumeRoleWithWebIdentityRequestFilterSensitiveLog,
|
|
1451
1527
|
AssumeRoleWithWebIdentityResponseFilterSensitiveLog,
|
|
1528
|
+
AssumeRootResponseFilterSensitiveLog,
|
|
1452
1529
|
GetFederationTokenResponseFilterSensitiveLog,
|
|
1453
1530
|
GetSessionTokenResponseFilterSensitiveLog,
|
|
1454
1531
|
getDefaultRoleAssumer,
|
|
@@ -2,6 +2,7 @@ import { createAggregatedClient } from "@smithy/smithy-client";
|
|
|
2
2
|
import { AssumeRoleCommand } from "./commands/AssumeRoleCommand";
|
|
3
3
|
import { AssumeRoleWithSAMLCommand, } from "./commands/AssumeRoleWithSAMLCommand";
|
|
4
4
|
import { AssumeRoleWithWebIdentityCommand, } from "./commands/AssumeRoleWithWebIdentityCommand";
|
|
5
|
+
import { AssumeRootCommand } from "./commands/AssumeRootCommand";
|
|
5
6
|
import { DecodeAuthorizationMessageCommand, } from "./commands/DecodeAuthorizationMessageCommand";
|
|
6
7
|
import { GetAccessKeyInfoCommand, } from "./commands/GetAccessKeyInfoCommand";
|
|
7
8
|
import { GetCallerIdentityCommand, } from "./commands/GetCallerIdentityCommand";
|
|
@@ -12,6 +13,7 @@ const commands = {
|
|
|
12
13
|
AssumeRoleCommand,
|
|
13
14
|
AssumeRoleWithSAMLCommand,
|
|
14
15
|
AssumeRoleWithWebIdentityCommand,
|
|
16
|
+
AssumeRootCommand,
|
|
15
17
|
DecodeAuthorizationMessageCommand,
|
|
16
18
|
GetAccessKeyInfoCommand,
|
|
17
19
|
GetCallerIdentityCommand,
|
|
@@ -0,0 +1,23 @@
|
|
|
1
|
+
import { getEndpointPlugin } from "@smithy/middleware-endpoint";
|
|
2
|
+
import { getSerdePlugin } from "@smithy/middleware-serde";
|
|
3
|
+
import { Command as $Command } from "@smithy/smithy-client";
|
|
4
|
+
import { commonParams } from "../endpoint/EndpointParameters";
|
|
5
|
+
import { AssumeRootResponseFilterSensitiveLog } from "../models/models_0";
|
|
6
|
+
import { de_AssumeRootCommand, se_AssumeRootCommand } from "../protocols/Aws_query";
|
|
7
|
+
export { $Command };
|
|
8
|
+
export class AssumeRootCommand extends $Command
|
|
9
|
+
.classBuilder()
|
|
10
|
+
.ep(commonParams)
|
|
11
|
+
.m(function (Command, cs, config, o) {
|
|
12
|
+
return [
|
|
13
|
+
getSerdePlugin(config, this.serialize, this.deserialize),
|
|
14
|
+
getEndpointPlugin(config, Command.getEndpointParameterInstructions()),
|
|
15
|
+
];
|
|
16
|
+
})
|
|
17
|
+
.s("AWSSecurityTokenServiceV20110615", "AssumeRoot", {})
|
|
18
|
+
.n("STSClient", "AssumeRootCommand")
|
|
19
|
+
.f(void 0, AssumeRootResponseFilterSensitiveLog)
|
|
20
|
+
.ser(se_AssumeRootCommand)
|
|
21
|
+
.de(de_AssumeRootCommand)
|
|
22
|
+
.build() {
|
|
23
|
+
}
|
|
@@ -1,6 +1,7 @@
|
|
|
1
1
|
export * from "./AssumeRoleCommand";
|
|
2
2
|
export * from "./AssumeRoleWithSAMLCommand";
|
|
3
3
|
export * from "./AssumeRoleWithWebIdentityCommand";
|
|
4
|
+
export * from "./AssumeRootCommand";
|
|
4
5
|
export * from "./DecodeAuthorizationMessageCommand";
|
|
5
6
|
export * from "./GetAccessKeyInfoCommand";
|
|
6
7
|
export * from "./GetCallerIdentityCommand";
|
|
@@ -120,6 +120,10 @@ export const AssumeRoleWithWebIdentityResponseFilterSensitiveLog = (obj) => ({
|
|
|
120
120
|
...obj,
|
|
121
121
|
...(obj.Credentials && { Credentials: CredentialsFilterSensitiveLog(obj.Credentials) }),
|
|
122
122
|
});
|
|
123
|
+
export const AssumeRootResponseFilterSensitiveLog = (obj) => ({
|
|
124
|
+
...obj,
|
|
125
|
+
...(obj.Credentials && { Credentials: CredentialsFilterSensitiveLog(obj.Credentials) }),
|
|
126
|
+
});
|
|
123
127
|
export const GetFederationTokenResponseFilterSensitiveLog = (obj) => ({
|
|
124
128
|
...obj,
|
|
125
129
|
...(obj.Credentials && { Credentials: CredentialsFilterSensitiveLog(obj.Credentials) }),
|
|
@@ -33,6 +33,16 @@ export const se_AssumeRoleWithWebIdentityCommand = async (input, context) => {
|
|
|
33
33
|
});
|
|
34
34
|
return buildHttpRpcRequest(context, headers, "/", undefined, body);
|
|
35
35
|
};
|
|
36
|
+
export const se_AssumeRootCommand = async (input, context) => {
|
|
37
|
+
const headers = SHARED_HEADERS;
|
|
38
|
+
let body;
|
|
39
|
+
body = buildFormUrlencodedString({
|
|
40
|
+
...se_AssumeRootRequest(input, context),
|
|
41
|
+
[_A]: _ARs,
|
|
42
|
+
[_V]: _,
|
|
43
|
+
});
|
|
44
|
+
return buildHttpRpcRequest(context, headers, "/", undefined, body);
|
|
45
|
+
};
|
|
36
46
|
export const se_DecodeAuthorizationMessageCommand = async (input, context) => {
|
|
37
47
|
const headers = SHARED_HEADERS;
|
|
38
48
|
let body;
|
|
@@ -122,6 +132,19 @@ export const de_AssumeRoleWithWebIdentityCommand = async (output, context) => {
|
|
|
122
132
|
};
|
|
123
133
|
return response;
|
|
124
134
|
};
|
|
135
|
+
export const de_AssumeRootCommand = async (output, context) => {
|
|
136
|
+
if (output.statusCode >= 300) {
|
|
137
|
+
return de_CommandError(output, context);
|
|
138
|
+
}
|
|
139
|
+
const data = await parseBody(output.body, context);
|
|
140
|
+
let contents = {};
|
|
141
|
+
contents = de_AssumeRootResponse(data.AssumeRootResult, context);
|
|
142
|
+
const response = {
|
|
143
|
+
$metadata: deserializeMetadata(output),
|
|
144
|
+
...contents,
|
|
145
|
+
};
|
|
146
|
+
return response;
|
|
147
|
+
};
|
|
125
148
|
export const de_DecodeAuthorizationMessageCommand = async (output, context) => {
|
|
126
149
|
if (output.statusCode >= 300) {
|
|
127
150
|
return de_CommandError(output, context);
|
|
@@ -428,6 +451,23 @@ const se_AssumeRoleWithWebIdentityRequest = (input, context) => {
|
|
|
428
451
|
}
|
|
429
452
|
return entries;
|
|
430
453
|
};
|
|
454
|
+
const se_AssumeRootRequest = (input, context) => {
|
|
455
|
+
const entries = {};
|
|
456
|
+
if (input[_TP] != null) {
|
|
457
|
+
entries[_TP] = input[_TP];
|
|
458
|
+
}
|
|
459
|
+
if (input[_TPA] != null) {
|
|
460
|
+
const memberEntries = se_PolicyDescriptorType(input[_TPA], context);
|
|
461
|
+
Object.entries(memberEntries).forEach(([key, value]) => {
|
|
462
|
+
const loc = `TaskPolicyArn.${key}`;
|
|
463
|
+
entries[loc] = value;
|
|
464
|
+
});
|
|
465
|
+
}
|
|
466
|
+
if (input[_DS] != null) {
|
|
467
|
+
entries[_DS] = input[_DS];
|
|
468
|
+
}
|
|
469
|
+
return entries;
|
|
470
|
+
};
|
|
431
471
|
const se_DecodeAuthorizationMessageRequest = (input, context) => {
|
|
432
472
|
const entries = {};
|
|
433
473
|
if (input[_EM] != null) {
|
|
@@ -658,6 +698,16 @@ const de_AssumeRoleWithWebIdentityResponse = (output, context) => {
|
|
|
658
698
|
}
|
|
659
699
|
return contents;
|
|
660
700
|
};
|
|
701
|
+
const de_AssumeRootResponse = (output, context) => {
|
|
702
|
+
const contents = {};
|
|
703
|
+
if (output[_C] != null) {
|
|
704
|
+
contents[_C] = de_Credentials(output[_C], context);
|
|
705
|
+
}
|
|
706
|
+
if (output[_SI] != null) {
|
|
707
|
+
contents[_SI] = __expectString(output[_SI]);
|
|
708
|
+
}
|
|
709
|
+
return contents;
|
|
710
|
+
};
|
|
661
711
|
const de_Credentials = (output, context) => {
|
|
662
712
|
const contents = {};
|
|
663
713
|
if (output[_AKI] != null) {
|
|
@@ -824,6 +874,7 @@ const _ARI = "AssumedRoleId";
|
|
|
824
874
|
const _ARU = "AssumedRoleUser";
|
|
825
875
|
const _ARWSAML = "AssumeRoleWithSAML";
|
|
826
876
|
const _ARWWI = "AssumeRoleWithWebIdentity";
|
|
877
|
+
const _ARs = "AssumeRoot";
|
|
827
878
|
const _Ac = "Account";
|
|
828
879
|
const _Ar = "Arn";
|
|
829
880
|
const _Au = "Audience";
|
|
@@ -865,6 +916,8 @@ const _ST = "SubjectType";
|
|
|
865
916
|
const _STe = "SessionToken";
|
|
866
917
|
const _T = "Tags";
|
|
867
918
|
const _TC = "TokenCode";
|
|
919
|
+
const _TP = "TargetPrincipal";
|
|
920
|
+
const _TPA = "TaskPolicyArn";
|
|
868
921
|
const _TTK = "TransitiveTagKeys";
|
|
869
922
|
const _UI = "UserId";
|
|
870
923
|
const _V = "Version";
|
|
@@ -2,6 +2,7 @@ import { HttpHandlerOptions as __HttpHandlerOptions } from "@smithy/types";
|
|
|
2
2
|
import { AssumeRoleCommandInput, AssumeRoleCommandOutput } from "./commands/AssumeRoleCommand";
|
|
3
3
|
import { AssumeRoleWithSAMLCommandInput, AssumeRoleWithSAMLCommandOutput } from "./commands/AssumeRoleWithSAMLCommand";
|
|
4
4
|
import { AssumeRoleWithWebIdentityCommandInput, AssumeRoleWithWebIdentityCommandOutput } from "./commands/AssumeRoleWithWebIdentityCommand";
|
|
5
|
+
import { AssumeRootCommandInput, AssumeRootCommandOutput } from "./commands/AssumeRootCommand";
|
|
5
6
|
import { DecodeAuthorizationMessageCommandInput, DecodeAuthorizationMessageCommandOutput } from "./commands/DecodeAuthorizationMessageCommand";
|
|
6
7
|
import { GetAccessKeyInfoCommandInput, GetAccessKeyInfoCommandOutput } from "./commands/GetAccessKeyInfoCommand";
|
|
7
8
|
import { GetCallerIdentityCommandInput, GetCallerIdentityCommandOutput } from "./commands/GetCallerIdentityCommand";
|
|
@@ -27,6 +28,12 @@ export interface STS {
|
|
|
27
28
|
assumeRoleWithWebIdentity(args: AssumeRoleWithWebIdentityCommandInput, options?: __HttpHandlerOptions): Promise<AssumeRoleWithWebIdentityCommandOutput>;
|
|
28
29
|
assumeRoleWithWebIdentity(args: AssumeRoleWithWebIdentityCommandInput, cb: (err: any, data?: AssumeRoleWithWebIdentityCommandOutput) => void): void;
|
|
29
30
|
assumeRoleWithWebIdentity(args: AssumeRoleWithWebIdentityCommandInput, options: __HttpHandlerOptions, cb: (err: any, data?: AssumeRoleWithWebIdentityCommandOutput) => void): void;
|
|
31
|
+
/**
|
|
32
|
+
* @see {@link AssumeRootCommand}
|
|
33
|
+
*/
|
|
34
|
+
assumeRoot(args: AssumeRootCommandInput, options?: __HttpHandlerOptions): Promise<AssumeRootCommandOutput>;
|
|
35
|
+
assumeRoot(args: AssumeRootCommandInput, cb: (err: any, data?: AssumeRootCommandOutput) => void): void;
|
|
36
|
+
assumeRoot(args: AssumeRootCommandInput, options: __HttpHandlerOptions, cb: (err: any, data?: AssumeRootCommandOutput) => void): void;
|
|
30
37
|
/**
|
|
31
38
|
* @see {@link DecodeAuthorizationMessageCommand}
|
|
32
39
|
*/
|
|
@@ -10,6 +10,7 @@ import { HttpAuthSchemeInputConfig, HttpAuthSchemeResolvedConfig } from "./auth/
|
|
|
10
10
|
import { AssumeRoleCommandInput, AssumeRoleCommandOutput } from "./commands/AssumeRoleCommand";
|
|
11
11
|
import { AssumeRoleWithSAMLCommandInput, AssumeRoleWithSAMLCommandOutput } from "./commands/AssumeRoleWithSAMLCommand";
|
|
12
12
|
import { AssumeRoleWithWebIdentityCommandInput, AssumeRoleWithWebIdentityCommandOutput } from "./commands/AssumeRoleWithWebIdentityCommand";
|
|
13
|
+
import { AssumeRootCommandInput, AssumeRootCommandOutput } from "./commands/AssumeRootCommand";
|
|
13
14
|
import { DecodeAuthorizationMessageCommandInput, DecodeAuthorizationMessageCommandOutput } from "./commands/DecodeAuthorizationMessageCommand";
|
|
14
15
|
import { GetAccessKeyInfoCommandInput, GetAccessKeyInfoCommandOutput } from "./commands/GetAccessKeyInfoCommand";
|
|
15
16
|
import { GetCallerIdentityCommandInput, GetCallerIdentityCommandOutput } from "./commands/GetCallerIdentityCommand";
|
|
@@ -21,11 +22,11 @@ export { __Client };
|
|
|
21
22
|
/**
|
|
22
23
|
* @public
|
|
23
24
|
*/
|
|
24
|
-
export type ServiceInputTypes = AssumeRoleCommandInput | AssumeRoleWithSAMLCommandInput | AssumeRoleWithWebIdentityCommandInput | DecodeAuthorizationMessageCommandInput | GetAccessKeyInfoCommandInput | GetCallerIdentityCommandInput | GetFederationTokenCommandInput | GetSessionTokenCommandInput;
|
|
25
|
+
export type ServiceInputTypes = AssumeRoleCommandInput | AssumeRoleWithSAMLCommandInput | AssumeRoleWithWebIdentityCommandInput | AssumeRootCommandInput | DecodeAuthorizationMessageCommandInput | GetAccessKeyInfoCommandInput | GetCallerIdentityCommandInput | GetFederationTokenCommandInput | GetSessionTokenCommandInput;
|
|
25
26
|
/**
|
|
26
27
|
* @public
|
|
27
28
|
*/
|
|
28
|
-
export type ServiceOutputTypes = AssumeRoleCommandOutput | AssumeRoleWithSAMLCommandOutput | AssumeRoleWithWebIdentityCommandOutput | DecodeAuthorizationMessageCommandOutput | GetAccessKeyInfoCommandOutput | GetCallerIdentityCommandOutput | GetFederationTokenCommandOutput | GetSessionTokenCommandOutput;
|
|
29
|
+
export type ServiceOutputTypes = AssumeRoleCommandOutput | AssumeRoleWithSAMLCommandOutput | AssumeRoleWithWebIdentityCommandOutput | AssumeRootCommandOutput | DecodeAuthorizationMessageCommandOutput | GetAccessKeyInfoCommandOutput | GetCallerIdentityCommandOutput | GetFederationTokenCommandOutput | GetSessionTokenCommandOutput;
|
|
29
30
|
/**
|
|
30
31
|
* @public
|
|
31
32
|
*/
|
|
@@ -32,8 +32,8 @@ declare const AssumeRoleCommand_base: {
|
|
|
32
32
|
* and a security token. Typically, you use <code>AssumeRole</code> within your account or for
|
|
33
33
|
* cross-account access. For a comparison of <code>AssumeRole</code> with other API operations
|
|
34
34
|
* that produce temporary credentials, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html">Requesting Temporary Security
|
|
35
|
-
* Credentials</a> and <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
|
36
|
-
*
|
|
35
|
+
* Credentials</a> and <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_sts-comparison.html">Compare STS
|
|
36
|
+
* credentials</a> in the <i>IAM User Guide</i>.</p>
|
|
37
37
|
* <p>
|
|
38
38
|
* <b>Permissions</b>
|
|
39
39
|
* </p>
|
|
@@ -41,11 +41,11 @@ declare const AssumeRoleCommand_base: {
|
|
|
41
41
|
* make API calls to any Amazon Web Services service with the following exception: You cannot call the
|
|
42
42
|
* Amazon Web Services STS <code>GetFederationToken</code> or <code>GetSessionToken</code> API
|
|
43
43
|
* operations.</p>
|
|
44
|
-
* <p>(Optional) You can pass inline or managed
|
|
45
|
-
*
|
|
46
|
-
*
|
|
47
|
-
*
|
|
48
|
-
*
|
|
44
|
+
* <p>(Optional) You can pass inline or managed session policies to this operation. You can
|
|
45
|
+
* pass a single JSON policy document to use as an inline session policy. You can also specify
|
|
46
|
+
* up to 10 managed policy Amazon Resource Names (ARNs) to use as managed session policies.
|
|
47
|
+
* The plaintext that you use for both inline and managed session policies can't exceed 2,048
|
|
48
|
+
* characters. Passing policies to this operation returns new
|
|
49
49
|
* temporary credentials. The resulting session's permissions are the intersection of the
|
|
50
50
|
* role's identity-based policy and the session policies. You can use the role's temporary
|
|
51
51
|
* credentials in subsequent Amazon Web Services API calls to access resources in the account that owns
|
|
@@ -192,15 +192,15 @@ declare const AssumeRoleCommand_base: {
|
|
|
192
192
|
* tags are to the upper size limit. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html">Passing Session Tags in STS</a> in
|
|
193
193
|
* the <i>IAM User Guide</i>.</p>
|
|
194
194
|
* <p>You could receive this error even though you meet other defined session policy and
|
|
195
|
-
* session tag limits. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-limits-entity-length">IAM and STS Entity
|
|
196
|
-
*
|
|
195
|
+
* session tag limits. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-limits-entity-length">IAM and STS Entity Character Limits</a> in the <i>IAM User
|
|
196
|
+
* Guide</i>.</p>
|
|
197
197
|
*
|
|
198
198
|
* @throws {@link RegionDisabledException} (client fault)
|
|
199
199
|
* <p>STS is not activated in the requested region for the account that is being asked to
|
|
200
|
-
* generate credentials. The account administrator must use the IAM console to activate
|
|
201
|
-
* in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html">Activating and
|
|
202
|
-
* Deactivating
|
|
203
|
-
*
|
|
200
|
+
* generate credentials. The account administrator must use the IAM console to activate
|
|
201
|
+
* STS in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html">Activating and
|
|
202
|
+
* Deactivating STS in an Amazon Web Services Region</a> in the <i>IAM User
|
|
203
|
+
* Guide</i>.</p>
|
|
204
204
|
*
|
|
205
205
|
* @throws {@link STSServiceException}
|
|
206
206
|
* <p>Base exception class for all service exceptions from STS service.</p>
|
|
@@ -32,8 +32,8 @@ declare const AssumeRoleWithSAMLCommand_base: {
|
|
|
32
32
|
* enterprise identity store or directory to role-based Amazon Web Services access without user-specific
|
|
33
33
|
* credentials or configuration. For a comparison of <code>AssumeRoleWithSAML</code> with the
|
|
34
34
|
* other API operations that produce temporary credentials, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html">Requesting Temporary Security
|
|
35
|
-
* Credentials</a> and <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
|
36
|
-
*
|
|
35
|
+
* Credentials</a> and <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_sts-comparison.html">Compare STS
|
|
36
|
+
* credentials</a> in the <i>IAM User Guide</i>.</p>
|
|
37
37
|
* <p>The temporary security credentials returned by this operation consist of an access key
|
|
38
38
|
* ID, a secret access key, and a security token. Applications can use these temporary
|
|
39
39
|
* security credentials to sign calls to Amazon Web Services services.</p>
|
|
@@ -230,15 +230,15 @@ declare const AssumeRoleWithSAMLCommand_base: {
|
|
|
230
230
|
* tags are to the upper size limit. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html">Passing Session Tags in STS</a> in
|
|
231
231
|
* the <i>IAM User Guide</i>.</p>
|
|
232
232
|
* <p>You could receive this error even though you meet other defined session policy and
|
|
233
|
-
* session tag limits. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-limits-entity-length">IAM and STS Entity
|
|
234
|
-
*
|
|
233
|
+
* session tag limits. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-limits-entity-length">IAM and STS Entity Character Limits</a> in the <i>IAM User
|
|
234
|
+
* Guide</i>.</p>
|
|
235
235
|
*
|
|
236
236
|
* @throws {@link RegionDisabledException} (client fault)
|
|
237
237
|
* <p>STS is not activated in the requested region for the account that is being asked to
|
|
238
|
-
* generate credentials. The account administrator must use the IAM console to activate
|
|
239
|
-
* in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html">Activating and
|
|
240
|
-
* Deactivating
|
|
241
|
-
*
|
|
238
|
+
* generate credentials. The account administrator must use the IAM console to activate
|
|
239
|
+
* STS in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html">Activating and
|
|
240
|
+
* Deactivating STS in an Amazon Web Services Region</a> in the <i>IAM User
|
|
241
|
+
* Guide</i>.</p>
|
|
242
242
|
*
|
|
243
243
|
* @throws {@link STSServiceException}
|
|
244
244
|
* <p>Base exception class for all service exceptions from STS service.</p>
|
package/node_modules/@aws-sdk/client-sts/dist-types/commands/AssumeRoleWithWebIdentityCommand.d.ts
CHANGED
|
@@ -47,8 +47,8 @@ declare const AssumeRoleWithWebIdentityCommand_base: {
|
|
|
47
47
|
* using a token from the web identity provider. For a comparison of
|
|
48
48
|
* <code>AssumeRoleWithWebIdentity</code> with the other API operations that produce
|
|
49
49
|
* temporary credentials, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html">Requesting Temporary Security
|
|
50
|
-
* Credentials</a> and <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
|
51
|
-
*
|
|
50
|
+
* Credentials</a> and <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_sts-comparison.html">Compare STS
|
|
51
|
+
* credentials</a> in the <i>IAM User Guide</i>.</p>
|
|
52
52
|
* <p>The temporary security credentials returned by this API consist of an access key ID, a
|
|
53
53
|
* secret access key, and a security token. Applications can use these temporary security
|
|
54
54
|
* credentials to sign calls to Amazon Web Services service API operations.</p>
|
|
@@ -60,8 +60,7 @@ declare const AssumeRoleWithWebIdentityCommand_base: {
|
|
|
60
60
|
* optional <code>DurationSeconds</code> parameter to specify the duration of your session.
|
|
61
61
|
* You can provide a value from 900 seconds (15 minutes) up to the maximum session duration
|
|
62
62
|
* setting for the role. This setting can have a value from 1 hour to 12 hours. To learn how
|
|
63
|
-
* to view the maximum value for your role, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/
|
|
64
|
-
* Maximum Session Duration Setting for a Role</a> in the
|
|
63
|
+
* to view the maximum value for your role, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_update-role-settings.html#id_roles_update-session-duration">Update the maximum session duration for a role </a> in the
|
|
65
64
|
* <i>IAM User Guide</i>. The maximum session duration limit applies when
|
|
66
65
|
* you use the <code>AssumeRole*</code> API operations or the <code>assume-role*</code> CLI
|
|
67
66
|
* commands. However the limit does not apply when you use those operations to create a
|
|
@@ -130,7 +129,7 @@ declare const AssumeRoleWithWebIdentityCommand_base: {
|
|
|
130
129
|
* or a pairwise identifier, as <a href="http://openid.net/specs/openid-connect-core-1_0.html#SubjectIDTypes">suggested
|
|
131
130
|
* in the OIDC specification</a>.</p>
|
|
132
131
|
* </important>
|
|
133
|
-
* <p>For more information about how to use
|
|
132
|
+
* <p>For more information about how to use OIDC federation and the
|
|
134
133
|
* <code>AssumeRoleWithWebIdentity</code> API, see the following resources: </p>
|
|
135
134
|
* <ul>
|
|
136
135
|
* <li>
|
|
@@ -139,25 +138,11 @@ declare const AssumeRoleWithWebIdentityCommand_base: {
|
|
|
139
138
|
* </li>
|
|
140
139
|
* <li>
|
|
141
140
|
* <p>
|
|
142
|
-
* <a href="https://aws.amazon.com/blogs/aws/the-aws-web-identity-federation-playground/"> Web Identity Federation Playground</a>. Walk through the process of
|
|
143
|
-
* authenticating through Login with Amazon, Facebook, or Google, getting temporary
|
|
144
|
-
* security credentials, and then using those credentials to make a request to Amazon Web Services.
|
|
145
|
-
* </p>
|
|
146
|
-
* </li>
|
|
147
|
-
* <li>
|
|
148
|
-
* <p>
|
|
149
141
|
* <a href="http://aws.amazon.com/sdkforios/">Amazon Web Services SDK for iOS Developer Guide</a> and <a href="http://aws.amazon.com/sdkforandroid/">Amazon Web Services SDK for Android Developer Guide</a>. These toolkits
|
|
150
142
|
* contain sample apps that show how to invoke the identity providers. The toolkits then
|
|
151
143
|
* show how to use the information from these providers to get and use temporary
|
|
152
144
|
* security credentials. </p>
|
|
153
145
|
* </li>
|
|
154
|
-
* <li>
|
|
155
|
-
* <p>
|
|
156
|
-
* <a href="http://aws.amazon.com/articles/web-identity-federation-with-mobile-applications">Web Identity
|
|
157
|
-
* Federation with Mobile Applications</a>. This article discusses web identity
|
|
158
|
-
* federation and shows an example of how to use web identity federation to get access
|
|
159
|
-
* to content in Amazon S3. </p>
|
|
160
|
-
* </li>
|
|
161
146
|
* </ul>
|
|
162
147
|
* @example
|
|
163
148
|
* Use a bare-bones client and the command you need to make an API call.
|
|
@@ -211,11 +196,11 @@ declare const AssumeRoleWithWebIdentityCommand_base: {
|
|
|
211
196
|
* token from the identity provider and then retry the request.</p>
|
|
212
197
|
*
|
|
213
198
|
* @throws {@link IDPCommunicationErrorException} (client fault)
|
|
214
|
-
* <p>The request could not be fulfilled because the identity provider (IDP) that
|
|
215
|
-
*
|
|
216
|
-
*
|
|
217
|
-
*
|
|
218
|
-
*
|
|
199
|
+
* <p>The request could not be fulfilled because the identity provider (IDP) that was asked
|
|
200
|
+
* to verify the incoming identity token could not be reached. This is often a transient
|
|
201
|
+
* error caused by network conditions. Retry the request a limited number of times so that
|
|
202
|
+
* you don't exceed the request rate. If the error persists, the identity provider might be
|
|
203
|
+
* down or not responding.</p>
|
|
219
204
|
*
|
|
220
205
|
* @throws {@link IDPRejectedClaimException} (client fault)
|
|
221
206
|
* <p>The identity provider (IdP) reported that authentication failed. This might be because
|
|
@@ -239,15 +224,15 @@ declare const AssumeRoleWithWebIdentityCommand_base: {
|
|
|
239
224
|
* tags are to the upper size limit. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html">Passing Session Tags in STS</a> in
|
|
240
225
|
* the <i>IAM User Guide</i>.</p>
|
|
241
226
|
* <p>You could receive this error even though you meet other defined session policy and
|
|
242
|
-
* session tag limits. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-limits-entity-length">IAM and STS Entity
|
|
243
|
-
*
|
|
227
|
+
* session tag limits. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-limits-entity-length">IAM and STS Entity Character Limits</a> in the <i>IAM User
|
|
228
|
+
* Guide</i>.</p>
|
|
244
229
|
*
|
|
245
230
|
* @throws {@link RegionDisabledException} (client fault)
|
|
246
231
|
* <p>STS is not activated in the requested region for the account that is being asked to
|
|
247
|
-
* generate credentials. The account administrator must use the IAM console to activate
|
|
248
|
-
* in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html">Activating and
|
|
249
|
-
* Deactivating
|
|
250
|
-
*
|
|
232
|
+
* generate credentials. The account administrator must use the IAM console to activate
|
|
233
|
+
* STS in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html">Activating and
|
|
234
|
+
* Deactivating STS in an Amazon Web Services Region</a> in the <i>IAM User
|
|
235
|
+
* Guide</i>.</p>
|
|
251
236
|
*
|
|
252
237
|
* @throws {@link STSServiceException}
|
|
253
238
|
* <p>Base exception class for all service exceptions from STS service.</p>
|