@cdklabs/cdk-ecs-codedeploy 0.0.346 → 0.0.347

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (87) hide show
  1. package/.jsii +3 -3
  2. package/lib/api-canary/index.js +1 -1
  3. package/lib/ecs-appspec/index.js +1 -1
  4. package/lib/ecs-deployment/index.js +1 -1
  5. package/lib/ecs-patterns/application-load-balanced-codedeployed-fargate-service.js +1 -1
  6. package/node_modules/@aws-sdk/client-codedeploy/package.json +36 -36
  7. package/node_modules/@aws-sdk/client-sso/package.json +32 -32
  8. package/node_modules/@aws-sdk/client-sso-oidc/package.json +34 -34
  9. package/node_modules/@aws-sdk/client-sts/README.md +8 -0
  10. package/node_modules/@aws-sdk/client-sts/dist-cjs/index.js +89 -12
  11. package/node_modules/@aws-sdk/client-sts/dist-es/STS.js +2 -0
  12. package/node_modules/@aws-sdk/client-sts/dist-es/commands/AssumeRootCommand.js +23 -0
  13. package/node_modules/@aws-sdk/client-sts/dist-es/commands/index.js +1 -0
  14. package/node_modules/@aws-sdk/client-sts/dist-es/models/models_0.js +4 -0
  15. package/node_modules/@aws-sdk/client-sts/dist-es/protocols/Aws_query.js +53 -0
  16. package/node_modules/@aws-sdk/client-sts/dist-types/STS.d.ts +7 -0
  17. package/node_modules/@aws-sdk/client-sts/dist-types/STSClient.d.ts +3 -2
  18. package/node_modules/@aws-sdk/client-sts/dist-types/commands/AssumeRoleCommand.d.ts +13 -13
  19. package/node_modules/@aws-sdk/client-sts/dist-types/commands/AssumeRoleWithSAMLCommand.d.ts +8 -8
  20. package/node_modules/@aws-sdk/client-sts/dist-types/commands/AssumeRoleWithWebIdentityCommand.d.ts +15 -30
  21. package/node_modules/@aws-sdk/client-sts/dist-types/commands/AssumeRootCommand.d.ts +129 -0
  22. package/node_modules/@aws-sdk/client-sts/dist-types/commands/DecodeAuthorizationMessageCommand.d.ts +2 -2
  23. package/node_modules/@aws-sdk/client-sts/dist-types/commands/GetFederationTokenCommand.d.ts +8 -8
  24. package/node_modules/@aws-sdk/client-sts/dist-types/commands/GetSessionTokenCommand.d.ts +6 -6
  25. package/node_modules/@aws-sdk/client-sts/dist-types/commands/index.d.ts +1 -0
  26. package/node_modules/@aws-sdk/client-sts/dist-types/models/models_0.d.ts +146 -32
  27. package/node_modules/@aws-sdk/client-sts/dist-types/protocols/Aws_query.d.ts +9 -0
  28. package/node_modules/@aws-sdk/client-sts/dist-types/ts3.4/STS.d.ts +17 -0
  29. package/node_modules/@aws-sdk/client-sts/dist-types/ts3.4/STSClient.d.ts +6 -0
  30. package/node_modules/@aws-sdk/client-sts/dist-types/ts3.4/commands/AssumeRootCommand.d.ts +47 -0
  31. package/node_modules/@aws-sdk/client-sts/dist-types/ts3.4/commands/index.d.ts +1 -0
  32. package/node_modules/@aws-sdk/client-sts/dist-types/ts3.4/models/models_0.d.ts +12 -0
  33. package/node_modules/@aws-sdk/client-sts/dist-types/ts3.4/protocols/Aws_query.d.ts +12 -0
  34. package/node_modules/@aws-sdk/client-sts/package.json +36 -36
  35. package/node_modules/@aws-sdk/core/package.json +14 -14
  36. package/node_modules/@aws-sdk/credential-provider-env/package.json +7 -7
  37. package/node_modules/@aws-sdk/credential-provider-http/package.json +12 -12
  38. package/node_modules/@aws-sdk/credential-provider-ini/package.json +15 -15
  39. package/node_modules/@aws-sdk/credential-provider-node/package.json +14 -14
  40. package/node_modules/@aws-sdk/credential-provider-process/package.json +8 -8
  41. package/node_modules/@aws-sdk/credential-provider-sso/package.json +10 -10
  42. package/node_modules/@aws-sdk/credential-provider-web-identity/package.json +8 -8
  43. package/node_modules/@aws-sdk/middleware-host-header/package.json +8 -8
  44. package/node_modules/@aws-sdk/middleware-logger/package.json +7 -7
  45. package/node_modules/@aws-sdk/middleware-recursion-detection/package.json +8 -8
  46. package/node_modules/@aws-sdk/middleware-user-agent/package.json +11 -11
  47. package/node_modules/@aws-sdk/region-config-resolver/package.json +7 -7
  48. package/node_modules/@aws-sdk/token-providers/package.json +8 -8
  49. package/node_modules/@aws-sdk/types/package.json +2 -2
  50. package/node_modules/@aws-sdk/util-endpoints/package.json +8 -8
  51. package/node_modules/@aws-sdk/util-locate-window/package.json +3 -3
  52. package/node_modules/@aws-sdk/util-user-agent-browser/package.json +5 -5
  53. package/node_modules/@aws-sdk/util-user-agent-node/package.json +7 -7
  54. package/node_modules/@smithy/abort-controller/package.json +2 -2
  55. package/node_modules/@smithy/config-resolver/package.json +4 -4
  56. package/node_modules/@smithy/core/package.json +6 -6
  57. package/node_modules/@smithy/credential-provider-imds/package.json +5 -5
  58. package/node_modules/@smithy/fetch-http-handler/package.json +5 -5
  59. package/node_modules/@smithy/hash-node/package.json +2 -2
  60. package/node_modules/@smithy/invalid-dependency/package.json +2 -2
  61. package/node_modules/@smithy/middleware-content-length/package.json +3 -3
  62. package/node_modules/@smithy/middleware-endpoint/package.json +8 -8
  63. package/node_modules/@smithy/middleware-retry/package.json +8 -8
  64. package/node_modules/@smithy/middleware-serde/package.json +2 -2
  65. package/node_modules/@smithy/middleware-stack/package.json +2 -2
  66. package/node_modules/@smithy/node-config-provider/package.json +4 -4
  67. package/node_modules/@smithy/node-http-handler/package.json +5 -5
  68. package/node_modules/@smithy/property-provider/package.json +2 -2
  69. package/node_modules/@smithy/protocol-http/package.json +2 -2
  70. package/node_modules/@smithy/querystring-builder/package.json +2 -2
  71. package/node_modules/@smithy/querystring-parser/package.json +2 -2
  72. package/node_modules/@smithy/service-error-classification/package.json +2 -2
  73. package/node_modules/@smithy/shared-ini-file-loader/package.json +2 -2
  74. package/node_modules/@smithy/signature-v4/package.json +4 -4
  75. package/node_modules/@smithy/smithy-client/package.json +7 -7
  76. package/node_modules/@smithy/types/dist-types/transform/no-undefined.d.ts +3 -2
  77. package/node_modules/@smithy/types/dist-types/ts3.4/transform/no-undefined.d.ts +3 -2
  78. package/node_modules/@smithy/types/package.json +1 -1
  79. package/node_modules/@smithy/url-parser/package.json +3 -3
  80. package/node_modules/@smithy/util-defaults-mode-browser/package.json +4 -4
  81. package/node_modules/@smithy/util-defaults-mode-node/package.json +7 -7
  82. package/node_modules/@smithy/util-endpoints/package.json +3 -3
  83. package/node_modules/@smithy/util-middleware/package.json +2 -2
  84. package/node_modules/@smithy/util-retry/package.json +3 -3
  85. package/node_modules/@smithy/util-stream/package.json +4 -4
  86. package/node_modules/@smithy/util-waiter/package.json +3 -3
  87. package/package.json +5 -5
@@ -0,0 +1,129 @@
1
+ import { Command as $Command } from "@smithy/smithy-client";
2
+ import { MetadataBearer as __MetadataBearer } from "@smithy/types";
3
+ import { AssumeRootRequest, AssumeRootResponse } from "../models/models_0";
4
+ import { ServiceInputTypes, ServiceOutputTypes, STSClientResolvedConfig } from "../STSClient";
5
+ /**
6
+ * @public
7
+ */
8
+ export type { __MetadataBearer };
9
+ export { $Command };
10
+ /**
11
+ * @public
12
+ *
13
+ * The input for {@link AssumeRootCommand}.
14
+ */
15
+ export interface AssumeRootCommandInput extends AssumeRootRequest {
16
+ }
17
+ /**
18
+ * @public
19
+ *
20
+ * The output of {@link AssumeRootCommand}.
21
+ */
22
+ export interface AssumeRootCommandOutput extends AssumeRootResponse, __MetadataBearer {
23
+ }
24
+ declare const AssumeRootCommand_base: {
25
+ new (input: AssumeRootCommandInput): import("@smithy/smithy-client").CommandImpl<AssumeRootCommandInput, AssumeRootCommandOutput, STSClientResolvedConfig, ServiceInputTypes, ServiceOutputTypes>;
26
+ new (__0_0: AssumeRootCommandInput): import("@smithy/smithy-client").CommandImpl<AssumeRootCommandInput, AssumeRootCommandOutput, STSClientResolvedConfig, ServiceInputTypes, ServiceOutputTypes>;
27
+ getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
28
+ };
29
+ /**
30
+ * <p>Returns a set of short term credentials you can use to perform privileged tasks in a
31
+ * member account.</p>
32
+ * <p>Before you can launch a privileged session, you must have enabled centralized root
33
+ * access in your organization. For steps to enable this feature, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_root-enable-root-access.html">Centralize root access for member accounts</a> in the <i>IAM User
34
+ * Guide</i>.</p>
35
+ * <note>
36
+ * <p>The global endpoint is not supported for AssumeRoot. You must send this request to a
37
+ * Regional STS endpoint. For more information, see <a href="https://docs.aws.amazon.com/STS/latest/APIReference/welcome.html#sts-endpoints">Endpoints</a>.</p>
38
+ * </note>
39
+ * <p>You can track AssumeRoot in CloudTrail logs to determine what actions were performed in a
40
+ * session. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/cloudtrail-track-privileged-tasks.html">Track privileged tasks
41
+ * in CloudTrail</a> in the <i>IAM User Guide</i>.</p>
42
+ * @example
43
+ * Use a bare-bones client and the command you need to make an API call.
44
+ * ```javascript
45
+ * import { STSClient, AssumeRootCommand } from "@aws-sdk/client-sts"; // ES Modules import
46
+ * // const { STSClient, AssumeRootCommand } = require("@aws-sdk/client-sts"); // CommonJS import
47
+ * const client = new STSClient(config);
48
+ * const input = { // AssumeRootRequest
49
+ * TargetPrincipal: "STRING_VALUE", // required
50
+ * TaskPolicyArn: { // PolicyDescriptorType
51
+ * arn: "STRING_VALUE",
52
+ * },
53
+ * DurationSeconds: Number("int"),
54
+ * };
55
+ * const command = new AssumeRootCommand(input);
56
+ * const response = await client.send(command);
57
+ * // { // AssumeRootResponse
58
+ * // Credentials: { // Credentials
59
+ * // AccessKeyId: "STRING_VALUE", // required
60
+ * // SecretAccessKey: "STRING_VALUE", // required
61
+ * // SessionToken: "STRING_VALUE", // required
62
+ * // Expiration: new Date("TIMESTAMP"), // required
63
+ * // },
64
+ * // SourceIdentity: "STRING_VALUE",
65
+ * // };
66
+ *
67
+ * ```
68
+ *
69
+ * @param AssumeRootCommandInput - {@link AssumeRootCommandInput}
70
+ * @returns {@link AssumeRootCommandOutput}
71
+ * @see {@link AssumeRootCommandInput} for command's `input` shape.
72
+ * @see {@link AssumeRootCommandOutput} for command's `response` shape.
73
+ * @see {@link STSClientResolvedConfig | config} for STSClient's `config` shape.
74
+ *
75
+ * @throws {@link ExpiredTokenException} (client fault)
76
+ * <p>The web identity token that was passed is expired or is not valid. Get a new identity
77
+ * token from the identity provider and then retry the request.</p>
78
+ *
79
+ * @throws {@link RegionDisabledException} (client fault)
80
+ * <p>STS is not activated in the requested region for the account that is being asked to
81
+ * generate credentials. The account administrator must use the IAM console to activate
82
+ * STS in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html">Activating and
83
+ * Deactivating STS in an Amazon Web Services Region</a> in the <i>IAM User
84
+ * Guide</i>.</p>
85
+ *
86
+ * @throws {@link STSServiceException}
87
+ * <p>Base exception class for all service exceptions from STS service.</p>
88
+ *
89
+ * @public
90
+ * @example To launch a privileged session
91
+ * ```javascript
92
+ * // The following command retrieves a set of short-term credentials you can use to unlock an S3 bucket for a member account by removing the bucket policy.
93
+ * const input = {
94
+ * "DurationSeconds": 900,
95
+ * "TargetPrincipal": "111122223333",
96
+ * "TaskPolicyArn": {
97
+ * "arn": "arn:aws:iam::aws:policy/root-task/S3UnlockBucketPolicy"
98
+ * }
99
+ * };
100
+ * const command = new AssumeRootCommand(input);
101
+ * const response = await client.send(command);
102
+ * /* response ==
103
+ * {
104
+ * "Credentials": {
105
+ * "AccessKeyId": "ASIAJEXAMPLEXEG2JICEA",
106
+ * "Expiration": "2024-11-15T00:05:07Z",
107
+ * "SecretAccessKey": "9drTJvcXLB89EXAMPLELB8923FB892xMFI",
108
+ * "SessionToken": "AQoXdzELDDY//////////wEaoAK1wvxJY12r2IrDFT2IvAzTCn3zHoZ7YNtpiQLF0MqZye/qwjzP2iEXAMPLEbw/m3hsj8VBTkPORGvr9jM5sgP+w9IZWZnU+LWhmg+a5fDi2oTGUYcdg9uexQ4mtCHIHfi4citgqZTgco40Yqr4lIlo4V2b2Dyauk0eYFNebHtYlFVgAUj+7Indz3LU0aTWk1WKIjHmmMCIoTkyYp/k7kUG7moeEYKSitwQIi6Gjn+nyzM+PtoA3685ixzv0R7i5rjQi0YE0lf1oeie3bDiNHncmzosRM6SFiPzSvp6h/32xQuZsjcypmwsPSDtTPYcs0+YN/8BRi2/IcrxSpnWEXAMPLEXSDFTAQAM6Dl9zR0tXoybnlrZIwMLlMi1Kcgo5OytwU="
109
+ * },
110
+ * "SourceIdentity": "Alice"
111
+ * }
112
+ * *\/
113
+ * // example id: to-launch-a-privileged-session-1731335424565
114
+ * ```
115
+ *
116
+ */
117
+ export declare class AssumeRootCommand extends AssumeRootCommand_base {
118
+ /** @internal type navigation helper, not in runtime. */
119
+ protected static __types: {
120
+ api: {
121
+ input: AssumeRootRequest;
122
+ output: AssumeRootResponse;
123
+ };
124
+ sdk: {
125
+ input: AssumeRootCommandInput;
126
+ output: AssumeRootCommandOutput;
127
+ };
128
+ };
129
+ }
@@ -88,8 +88,8 @@ declare const DecodeAuthorizationMessageCommand_base: {
88
88
  *
89
89
  * @throws {@link InvalidAuthorizationMessageException} (client fault)
90
90
  * <p>The error returned if the message passed to <code>DecodeAuthorizationMessage</code>
91
- * was invalid. This can happen if the token contains invalid characters, such as
92
- * linebreaks. </p>
91
+ * was invalid. This can happen if the token contains invalid characters, such as line
92
+ * breaks, or if the message has expired.</p>
93
93
  *
94
94
  * @throws {@link STSServiceException}
95
95
  * <p>Base exception class for all service exceptions from STS service.</p>
@@ -36,8 +36,8 @@ declare const GetFederationTokenCommand_base: {
36
36
  * contexts where those credentials can be safeguarded, usually in a server-based application.
37
37
  * For a comparison of <code>GetFederationToken</code> with the other API operations that
38
38
  * produce temporary credentials, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html">Requesting Temporary Security
39
- * Credentials</a> and <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#stsapi_comparison">Comparing the
40
- * Amazon Web Services STS API operations</a> in the <i>IAM User Guide</i>.</p>
39
+ * Credentials</a> and <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_sts-comparison.html">Compare STS
40
+ * credentials</a> in the <i>IAM User Guide</i>.</p>
41
41
  * <p>Although it is possible to call <code>GetFederationToken</code> using the security
42
42
  * credentials of an Amazon Web Services account root user rather than an IAM user that you
43
43
  * create for the purpose of a proxy application, we do not recommend it. For more
@@ -174,15 +174,15 @@ declare const GetFederationTokenCommand_base: {
174
174
  * tags are to the upper size limit. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html">Passing Session Tags in STS</a> in
175
175
  * the <i>IAM User Guide</i>.</p>
176
176
  * <p>You could receive this error even though you meet other defined session policy and
177
- * session tag limits. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-limits-entity-length">IAM and STS Entity
178
- * Character Limits</a> in the <i>IAM User Guide</i>.</p>
177
+ * session tag limits. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-limits-entity-length">IAM and STS Entity Character Limits</a> in the <i>IAM User
178
+ * Guide</i>.</p>
179
179
  *
180
180
  * @throws {@link RegionDisabledException} (client fault)
181
181
  * <p>STS is not activated in the requested region for the account that is being asked to
182
- * generate credentials. The account administrator must use the IAM console to activate STS
183
- * in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html">Activating and
184
- * Deactivating Amazon Web Services STS in an Amazon Web Services Region</a> in the <i>IAM User
185
- * Guide</i>.</p>
182
+ * generate credentials. The account administrator must use the IAM console to activate
183
+ * STS in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html">Activating and
184
+ * Deactivating STS in an Amazon Web Services Region</a> in the <i>IAM User
185
+ * Guide</i>.</p>
186
186
  *
187
187
  * @throws {@link STSServiceException}
188
188
  * <p>Base exception class for all service exceptions from STS service.</p>
@@ -38,8 +38,8 @@ declare const GetSessionTokenCommand_base: {
38
38
  * calls to API operations that require MFA authentication. An incorrect MFA code causes the
39
39
  * API to return an access denied error. For a comparison of <code>GetSessionToken</code> with
40
40
  * the other API operations that produce temporary credentials, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html">Requesting
41
- * Temporary Security Credentials</a> and <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#stsapi_comparison">Comparing the
42
- * Amazon Web Services STS API operations</a> in the <i>IAM User Guide</i>.</p>
41
+ * Temporary Security Credentials</a> and <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_sts-comparison.html">Compare STS
42
+ * credentials</a> in the <i>IAM User Guide</i>.</p>
43
43
  * <note>
44
44
  * <p>No permissions are required for users to perform this operation. The purpose of the
45
45
  * <code>sts:GetSessionToken</code> operation is to authenticate the user using MFA. You
@@ -118,10 +118,10 @@ declare const GetSessionTokenCommand_base: {
118
118
  *
119
119
  * @throws {@link RegionDisabledException} (client fault)
120
120
  * <p>STS is not activated in the requested region for the account that is being asked to
121
- * generate credentials. The account administrator must use the IAM console to activate STS
122
- * in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html">Activating and
123
- * Deactivating Amazon Web Services STS in an Amazon Web Services Region</a> in the <i>IAM User
124
- * Guide</i>.</p>
121
+ * generate credentials. The account administrator must use the IAM console to activate
122
+ * STS in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html">Activating and
123
+ * Deactivating STS in an Amazon Web Services Region</a> in the <i>IAM User
124
+ * Guide</i>.</p>
125
125
  *
126
126
  * @throws {@link STSServiceException}
127
127
  * <p>Base exception class for all service exceptions from STS service.</p>
@@ -1,6 +1,7 @@
1
1
  export * from "./AssumeRoleCommand";
2
2
  export * from "./AssumeRoleWithSAMLCommand";
3
3
  export * from "./AssumeRoleWithWebIdentityCommand";
4
+ export * from "./AssumeRootCommand";
4
5
  export * from "./DecodeAuthorizationMessageCommand";
5
6
  export * from "./GetAccessKeyInfoCommand";
6
7
  export * from "./GetCallerIdentityCommand";
@@ -95,6 +95,11 @@ export interface AssumeRoleRequest {
95
95
  * session name is also used in the ARN of the assumed role principal. This means that
96
96
  * subsequent cross-account API requests that use the temporary security credentials will
97
97
  * expose the role session name to the external account in their CloudTrail logs.</p>
98
+ * <p>For security purposes, administrators can view this field in <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/cloudtrail-integration.html#cloudtrail-integration_signin-tempcreds">CloudTrail logs</a> to help identify who performed an action in Amazon Web Services. Your
99
+ * administrator might require that you specify your user name as the session name when you
100
+ * assume the role. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_iam-condition-keys.html#ck_rolesessionname">
101
+ * <code>sts:RoleSessionName</code>
102
+ * </a>.</p>
98
103
  * <p>The regex used to validate this parameter is a string of characters
99
104
  * consisting of upper- and lower-case alphanumeric characters with no spaces. You can
100
105
  * also include underscores or any of the following characters: =,.@-</p>
@@ -148,6 +153,8 @@ export interface AssumeRoleRequest {
148
153
  * <code>PackedPolicySize</code> response element indicates by percentage how close the
149
154
  * policies and tags for your request are to the upper size limit.</p>
150
155
  * </note>
156
+ * <p>For more information about role session permissions, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session">Session
157
+ * policies</a>.</p>
151
158
  * @public
152
159
  */
153
160
  Policy?: string | undefined;
@@ -164,9 +171,7 @@ export interface AssumeRoleRequest {
164
171
  * specify a parameter value of up to 43200 seconds (12 hours), depending on the maximum
165
172
  * session duration setting for your role. However, if you assume a role using role chaining
166
173
  * and provide a <code>DurationSeconds</code> parameter value greater than one hour, the
167
- * operation fails. To learn how to view the maximum value for your role, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html#id_roles_use_view-role-max-session">View the
168
- * Maximum Session Duration Setting for a Role</a> in the
169
- * <i>IAM User Guide</i>.</p>
174
+ * operation fails. To learn how to view the maximum value for your role, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_update-role-settings.html#id_roles_update-session-duration">Update the maximum session duration for a role</a>.</p>
170
175
  * <p>By default, the value is set to <code>3600</code> seconds. </p>
171
176
  * <note>
172
177
  * <p>The <code>DurationSeconds</code> parameter is separate from the duration of a console
@@ -216,8 +221,8 @@ export interface AssumeRoleRequest {
216
221
  * as transitive, the corresponding key and value passes to subsequent sessions in a role
217
222
  * chain. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html#id_session-tags_role-chaining">Chaining Roles
218
223
  * with Session Tags</a> in the <i>IAM User Guide</i>.</p>
219
- * <p>This parameter is optional. When you set session tags as transitive, the session policy
220
- * and session tags packed binary limit is not affected.</p>
224
+ * <p>This parameter is optional. The transitive status of a session tag does not impact its
225
+ * packed binary size.</p>
221
226
  * <p>If you choose not to specify a transitive tag key, then no tags are passed from this
222
227
  * session to any subsequent sessions.</p>
223
228
  * @public
@@ -265,13 +270,15 @@ export interface AssumeRoleRequest {
265
270
  TokenCode?: string | undefined;
266
271
  /**
267
272
  * <p>The source identity specified by the principal that is calling the
268
- * <code>AssumeRole</code> operation.</p>
273
+ * <code>AssumeRole</code> operation. The source identity value persists across <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles.html#iam-term-role-chaining">chained role</a> sessions.</p>
269
274
  * <p>You can require users to specify a source identity when they assume a role. You do this
270
- * by using the <code>sts:SourceIdentity</code> condition key in a role trust policy. You can
271
- * use source identity information in CloudTrail logs to determine who took actions with a role.
272
- * You can use the <code>aws:SourceIdentity</code> condition key to further control access to
273
- * Amazon Web Services resources based on the value of source identity. For more information about using
274
- * source identity, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_monitor.html">Monitor and control
275
+ * by using the <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html#condition-keys-sourceidentity">
276
+ * <code>sts:SourceIdentity</code>
277
+ * </a> condition key in a role trust policy. You
278
+ * can use source identity information in CloudTrail logs to determine who took actions with a
279
+ * role. You can use the <code>aws:SourceIdentity</code> condition key to further control
280
+ * access to Amazon Web Services resources based on the value of source identity. For more information about
281
+ * using source identity, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_monitor.html">Monitor and control
275
282
  * actions taken with assumed roles</a> in the
276
283
  * <i>IAM User Guide</i>.</p>
277
284
  * <p>The regex used to validate this parameter is a string of characters consisting of upper-
@@ -405,8 +412,8 @@ export declare class MalformedPolicyDocumentException extends __BaseException {
405
412
  * tags are to the upper size limit. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html">Passing Session Tags in STS</a> in
406
413
  * the <i>IAM User Guide</i>.</p>
407
414
  * <p>You could receive this error even though you meet other defined session policy and
408
- * session tag limits. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-limits-entity-length">IAM and STS Entity
409
- * Character Limits</a> in the <i>IAM User Guide</i>.</p>
415
+ * session tag limits. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-limits-entity-length">IAM and STS Entity Character Limits</a> in the <i>IAM User
416
+ * Guide</i>.</p>
410
417
  * @public
411
418
  */
412
419
  export declare class PackedPolicyTooLargeException extends __BaseException {
@@ -419,10 +426,10 @@ export declare class PackedPolicyTooLargeException extends __BaseException {
419
426
  }
420
427
  /**
421
428
  * <p>STS is not activated in the requested region for the account that is being asked to
422
- * generate credentials. The account administrator must use the IAM console to activate STS
423
- * in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html">Activating and
424
- * Deactivating Amazon Web Services STS in an Amazon Web Services Region</a> in the <i>IAM User
425
- * Guide</i>.</p>
429
+ * generate credentials. The account administrator must use the IAM console to activate
430
+ * STS in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html">Activating and
431
+ * Deactivating STS in an Amazon Web Services Region</a> in the <i>IAM User
432
+ * Guide</i>.</p>
426
433
  * @public
427
434
  */
428
435
  export declare class RegionDisabledException extends __BaseException {
@@ -495,6 +502,8 @@ export interface AssumeRoleWithSAMLRequest {
495
502
  * character to the end of the valid character list (\u0020 through \u00FF). It can also
496
503
  * include the tab (\u0009), linefeed (\u000A), and carriage return (\u000D)
497
504
  * characters.</p>
505
+ * <p>For more information about role session permissions, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session">Session
506
+ * policies</a>.</p>
498
507
  * <note>
499
508
  * <p>An Amazon Web Services conversion compresses the passed inline session policy, managed policy ARNs,
500
509
  * and session tags into a packed binary format that has a separate limit. Your request can
@@ -612,14 +621,16 @@ export interface AssumeRoleWithSAMLResponse {
612
621
  */
613
622
  NameQualifier?: string | undefined;
614
623
  /**
615
- * <p>The value in the <code>SourceIdentity</code> attribute in the SAML assertion. </p>
624
+ * <p>The value in the <code>SourceIdentity</code> attribute in the SAML assertion. The source
625
+ * identity value persists across <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles.html#iam-term-role-chaining">chained role</a>
626
+ * sessions.</p>
616
627
  * <p>You can require users to set a source identity value when they assume a role. You do
617
628
  * this by using the <code>sts:SourceIdentity</code> condition key in a role trust policy.
618
629
  * That way, actions that are taken with the role are associated with that user. After the
619
630
  * source identity is set, the value cannot be changed. It is present in the request for all
620
- * actions that are taken by the role and persists across <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_terms-and-concepts#iam-term-role-chaining">chained
621
- * role</a> sessions. You can configure your SAML identity provider to use an attribute
622
- * associated with your users, like user name or email, as the source identity when calling
631
+ * actions that are taken by the role and persists across <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles.html#id_roles_terms-and-concepts">chained role</a>
632
+ * sessions. You can configure your SAML identity provider to use an attribute associated with
633
+ * your users, like user name or email, as the source identity when calling
623
634
  * <code>AssumeRoleWithSAML</code>. You do this by adding an attribute to the SAML
624
635
  * assertion. For more information about using source identity, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_monitor.html">Monitor and control
625
636
  * actions taken with assumed roles</a> in the
@@ -665,6 +676,16 @@ export declare class InvalidIdentityTokenException extends __BaseException {
665
676
  export interface AssumeRoleWithWebIdentityRequest {
666
677
  /**
667
678
  * <p>The Amazon Resource Name (ARN) of the role that the caller is assuming.</p>
679
+ * <note>
680
+ * <p>Additional considerations apply to Amazon Cognito identity pools that assume <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies-cross-account-resource-access.html">cross-account IAM roles</a>. The trust policies of these roles must accept the
681
+ * <code>cognito-identity.amazonaws.com</code> service principal and must contain the
682
+ * <code>cognito-identity.amazonaws.com:aud</code> condition key to restrict role
683
+ * assumption to users from your intended identity pools. A policy that trusts Amazon Cognito
684
+ * identity pools without this condition creates a risk that a user from an unintended
685
+ * identity pool can assume the role. For more information, see <a href="https://docs.aws.amazon.com/cognito/latest/developerguide/iam-roles.html#trust-policies"> Trust policies for
686
+ * IAM roles in Basic (Classic) authentication </a> in the <i>Amazon Cognito
687
+ * Developer Guide</i>.</p>
688
+ * </note>
668
689
  * @public
669
690
  */
670
691
  RoleArn: string | undefined;
@@ -674,6 +695,11 @@ export interface AssumeRoleWithWebIdentityRequest {
674
695
  * security credentials that your application will use are associated with that user. This
675
696
  * session name is included as part of the ARN and assumed role ID in the
676
697
  * <code>AssumedRoleUser</code> response element.</p>
698
+ * <p>For security purposes, administrators can view this field in <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/cloudtrail-integration.html#cloudtrail-integration_signin-tempcreds">CloudTrail logs</a> to help identify who performed an action in Amazon Web Services. Your
699
+ * administrator might require that you specify your user name as the session name when you
700
+ * assume the role. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_iam-condition-keys.html#ck_rolesessionname">
701
+ * <code>sts:RoleSessionName</code>
702
+ * </a>.</p>
677
703
  * <p>The regex used to validate this parameter is a string of characters
678
704
  * consisting of upper- and lower-case alphanumeric characters with no spaces. You can
679
705
  * also include underscores or any of the following characters: =,.@-</p>
@@ -684,7 +710,8 @@ export interface AssumeRoleWithWebIdentityRequest {
684
710
  * <p>The OAuth 2.0 access token or OpenID Connect ID token that is provided by the identity
685
711
  * provider. Your application must get this token by authenticating the user who is using your
686
712
  * application with a web identity provider before the application makes an
687
- * <code>AssumeRoleWithWebIdentity</code> call. Only tokens with RSA algorithms (RS256) are
713
+ * <code>AssumeRoleWithWebIdentity</code> call. Timestamps in the token must be formatted
714
+ * as either an integer or a long integer. Only tokens with RSA algorithms (RS256) are
688
715
  * supported.</p>
689
716
  * @public
690
717
  */
@@ -739,6 +766,8 @@ export interface AssumeRoleWithWebIdentityRequest {
739
766
  * character to the end of the valid character list (\u0020 through \u00FF). It can also
740
767
  * include the tab (\u0009), linefeed (\u000A), and carriage return (\u000D)
741
768
  * characters.</p>
769
+ * <p>For more information about role session permissions, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session">Session
770
+ * policies</a>.</p>
742
771
  * <note>
743
772
  * <p>An Amazon Web Services conversion compresses the passed inline session policy, managed policy ARNs,
744
773
  * and session tags into a packed binary format that has a separate limit. Your request can
@@ -836,9 +865,9 @@ export interface AssumeRoleWithWebIdentityResponse {
836
865
  * this by using the <code>sts:SourceIdentity</code> condition key in a role trust policy.
837
866
  * That way, actions that are taken with the role are associated with that user. After the
838
867
  * source identity is set, the value cannot be changed. It is present in the request for all
839
- * actions that are taken by the role and persists across <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_terms-and-concepts#iam-term-role-chaining">chained
840
- * role</a> sessions. You can configure your identity provider to use an attribute
841
- * associated with your users, like user name or email, as the source identity when calling
868
+ * actions that are taken by the role and persists across <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles.html#id_roles_terms-and-concepts">chained role</a>
869
+ * sessions. You can configure your identity provider to use an attribute associated with your
870
+ * users, like user name or email, as the source identity when calling
842
871
  * <code>AssumeRoleWithWebIdentity</code>. You do this by adding a claim to the JSON web
843
872
  * token. To learn more about OIDC tokens and claims, see <a href="https://docs.aws.amazon.com/cognito/latest/developerguide/amazon-cognito-user-pools-using-tokens-with-identity-providers.html">Using Tokens with User Pools</a> in the <i>Amazon Cognito Developer Guide</i>.
844
873
  * For more information about using source identity, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_monitor.html">Monitor and control
@@ -852,11 +881,11 @@ export interface AssumeRoleWithWebIdentityResponse {
852
881
  SourceIdentity?: string | undefined;
853
882
  }
854
883
  /**
855
- * <p>The request could not be fulfilled because the identity provider (IDP) that
856
- * was asked to verify the incoming identity token could not be reached. This is often a
857
- * transient error caused by network conditions. Retry the request a limited number of
858
- * times so that you don't exceed the request rate. If the error persists, the
859
- * identity provider might be down or not responding.</p>
884
+ * <p>The request could not be fulfilled because the identity provider (IDP) that was asked
885
+ * to verify the incoming identity token could not be reached. This is often a transient
886
+ * error caused by network conditions. Retry the request a limited number of times so that
887
+ * you don't exceed the request rate. If the error persists, the identity provider might be
888
+ * down or not responding.</p>
860
889
  * @public
861
890
  */
862
891
  export declare class IDPCommunicationErrorException extends __BaseException {
@@ -867,6 +896,87 @@ export declare class IDPCommunicationErrorException extends __BaseException {
867
896
  */
868
897
  constructor(opts: __ExceptionOptionType<IDPCommunicationErrorException, __BaseException>);
869
898
  }
899
+ /**
900
+ * @public
901
+ */
902
+ export interface AssumeRootRequest {
903
+ /**
904
+ * <p>The member account principal ARN or account ID.</p>
905
+ * @public
906
+ */
907
+ TargetPrincipal: string | undefined;
908
+ /**
909
+ * <p>The identity based policy that scopes the session to the privileged tasks that can be
910
+ * performed. You can use one of following Amazon Web Services managed policies to scope
911
+ * root session actions. You can add additional customer managed policies to further limit the
912
+ * permissions for the root session.</p>
913
+ * <ul>
914
+ * <li>
915
+ * <p>
916
+ * <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/security-iam-awsmanpol.html#security-iam-awsmanpol-IAMAuditRootUserCredentials">IAMAuditRootUserCredentials</a>
917
+ * </p>
918
+ * </li>
919
+ * <li>
920
+ * <p>
921
+ * <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/security-iam-awsmanpol.html#security-iam-awsmanpol-IAMCreateRootUserPassword">IAMCreateRootUserPassword</a>
922
+ * </p>
923
+ * </li>
924
+ * <li>
925
+ * <p>
926
+ * <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/security-iam-awsmanpol.html#security-iam-awsmanpol-IAMDeleteRootUserCredentials">IAMDeleteRootUserCredentials</a>
927
+ * </p>
928
+ * </li>
929
+ * <li>
930
+ * <p>
931
+ * <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/security-iam-awsmanpol.html#security-iam-awsmanpol-S3UnlockBucketPolicy">S3UnlockBucketPolicy</a>
932
+ * </p>
933
+ * </li>
934
+ * <li>
935
+ * <p>
936
+ * <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/security-iam-awsmanpol.html#security-iam-awsmanpol-SQSUnlockQueuePolicy">SQSUnlockQueuePolicy</a>
937
+ * </p>
938
+ * </li>
939
+ * </ul>
940
+ * @public
941
+ */
942
+ TaskPolicyArn: PolicyDescriptorType | undefined;
943
+ /**
944
+ * <p>The duration, in seconds, of the privileged session. The value can range from 0 seconds
945
+ * up to the maximum session duration of 900 seconds (15 minutes). If you specify a value
946
+ * higher than this setting, the operation fails.</p>
947
+ * <p>By default, the value is set to <code>900</code> seconds.</p>
948
+ * @public
949
+ */
950
+ DurationSeconds?: number | undefined;
951
+ }
952
+ /**
953
+ * @public
954
+ */
955
+ export interface AssumeRootResponse {
956
+ /**
957
+ * <p>The temporary security credentials, which include an access key ID, a secret access key,
958
+ * and a security token.</p>
959
+ * <note>
960
+ * <p>The size of the security token that STS API operations return is not fixed. We
961
+ * strongly recommend that you make no assumptions about the maximum size.</p>
962
+ * </note>
963
+ * @public
964
+ */
965
+ Credentials?: Credentials | undefined;
966
+ /**
967
+ * <p>The source identity specified by the principal that is calling the
968
+ * <code>AssumeRoot</code> operation.</p>
969
+ * <p>You can use the <code>aws:SourceIdentity</code> condition key to control access based on
970
+ * the value of source identity. For more information about using source identity, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_monitor.html">Monitor and control
971
+ * actions taken with assumed roles</a> in the
972
+ * <i>IAM User Guide</i>.</p>
973
+ * <p>The regex used to validate this parameter is a string of characters consisting of upper-
974
+ * and lower-case alphanumeric characters with no spaces. You can also include underscores or
975
+ * any of the following characters: =,.@-</p>
976
+ * @public
977
+ */
978
+ SourceIdentity?: string | undefined;
979
+ }
870
980
  /**
871
981
  * @public
872
982
  */
@@ -891,8 +1001,8 @@ export interface DecodeAuthorizationMessageResponse {
891
1001
  }
892
1002
  /**
893
1003
  * <p>The error returned if the message passed to <code>DecodeAuthorizationMessage</code>
894
- * was invalid. This can happen if the token contains invalid characters, such as
895
- * linebreaks. </p>
1004
+ * was invalid. This can happen if the token contains invalid characters, such as line
1005
+ * breaks, or if the message has expired.</p>
896
1006
  * @public
897
1007
  */
898
1008
  export declare class InvalidAuthorizationMessageException extends __BaseException {
@@ -1203,6 +1313,10 @@ export declare const AssumeRoleWithWebIdentityRequestFilterSensitiveLog: (obj: A
1203
1313
  * @internal
1204
1314
  */
1205
1315
  export declare const AssumeRoleWithWebIdentityResponseFilterSensitiveLog: (obj: AssumeRoleWithWebIdentityResponse) => any;
1316
+ /**
1317
+ * @internal
1318
+ */
1319
+ export declare const AssumeRootResponseFilterSensitiveLog: (obj: AssumeRootResponse) => any;
1206
1320
  /**
1207
1321
  * @internal
1208
1322
  */
@@ -3,6 +3,7 @@ import { SerdeContext as __SerdeContext } from "@smithy/types";
3
3
  import { AssumeRoleCommandInput, AssumeRoleCommandOutput } from "../commands/AssumeRoleCommand";
4
4
  import { AssumeRoleWithSAMLCommandInput, AssumeRoleWithSAMLCommandOutput } from "../commands/AssumeRoleWithSAMLCommand";
5
5
  import { AssumeRoleWithWebIdentityCommandInput, AssumeRoleWithWebIdentityCommandOutput } from "../commands/AssumeRoleWithWebIdentityCommand";
6
+ import { AssumeRootCommandInput, AssumeRootCommandOutput } from "../commands/AssumeRootCommand";
6
7
  import { DecodeAuthorizationMessageCommandInput, DecodeAuthorizationMessageCommandOutput } from "../commands/DecodeAuthorizationMessageCommand";
7
8
  import { GetAccessKeyInfoCommandInput, GetAccessKeyInfoCommandOutput } from "../commands/GetAccessKeyInfoCommand";
8
9
  import { GetCallerIdentityCommandInput, GetCallerIdentityCommandOutput } from "../commands/GetCallerIdentityCommand";
@@ -20,6 +21,10 @@ export declare const se_AssumeRoleWithSAMLCommand: (input: AssumeRoleWithSAMLCom
20
21
  * serializeAws_queryAssumeRoleWithWebIdentityCommand
21
22
  */
22
23
  export declare const se_AssumeRoleWithWebIdentityCommand: (input: AssumeRoleWithWebIdentityCommandInput, context: __SerdeContext) => Promise<__HttpRequest>;
24
+ /**
25
+ * serializeAws_queryAssumeRootCommand
26
+ */
27
+ export declare const se_AssumeRootCommand: (input: AssumeRootCommandInput, context: __SerdeContext) => Promise<__HttpRequest>;
23
28
  /**
24
29
  * serializeAws_queryDecodeAuthorizationMessageCommand
25
30
  */
@@ -52,6 +57,10 @@ export declare const de_AssumeRoleWithSAMLCommand: (output: __HttpResponse, cont
52
57
  * deserializeAws_queryAssumeRoleWithWebIdentityCommand
53
58
  */
54
59
  export declare const de_AssumeRoleWithWebIdentityCommand: (output: __HttpResponse, context: __SerdeContext) => Promise<AssumeRoleWithWebIdentityCommandOutput>;
60
+ /**
61
+ * deserializeAws_queryAssumeRootCommand
62
+ */
63
+ export declare const de_AssumeRootCommand: (output: __HttpResponse, context: __SerdeContext) => Promise<AssumeRootCommandOutput>;
55
64
  /**
56
65
  * deserializeAws_queryDecodeAuthorizationMessageCommand
57
66
  */
@@ -11,6 +11,10 @@ import {
11
11
  AssumeRoleWithWebIdentityCommandInput,
12
12
  AssumeRoleWithWebIdentityCommandOutput,
13
13
  } from "./commands/AssumeRoleWithWebIdentityCommand";
14
+ import {
15
+ AssumeRootCommandInput,
16
+ AssumeRootCommandOutput,
17
+ } from "./commands/AssumeRootCommand";
14
18
  import {
15
19
  DecodeAuthorizationMessageCommandInput,
16
20
  DecodeAuthorizationMessageCommandOutput,
@@ -72,6 +76,19 @@ export interface STS {
72
76
  options: __HttpHandlerOptions,
73
77
  cb: (err: any, data?: AssumeRoleWithWebIdentityCommandOutput) => void
74
78
  ): void;
79
+ assumeRoot(
80
+ args: AssumeRootCommandInput,
81
+ options?: __HttpHandlerOptions
82
+ ): Promise<AssumeRootCommandOutput>;
83
+ assumeRoot(
84
+ args: AssumeRootCommandInput,
85
+ cb: (err: any, data?: AssumeRootCommandOutput) => void
86
+ ): void;
87
+ assumeRoot(
88
+ args: AssumeRootCommandInput,
89
+ options: __HttpHandlerOptions,
90
+ cb: (err: any, data?: AssumeRootCommandOutput) => void
91
+ ): void;
75
92
  decodeAuthorizationMessage(
76
93
  args: DecodeAuthorizationMessageCommandInput,
77
94
  options?: __HttpHandlerOptions
@@ -57,6 +57,10 @@ import {
57
57
  AssumeRoleWithWebIdentityCommandInput,
58
58
  AssumeRoleWithWebIdentityCommandOutput,
59
59
  } from "./commands/AssumeRoleWithWebIdentityCommand";
60
+ import {
61
+ AssumeRootCommandInput,
62
+ AssumeRootCommandOutput,
63
+ } from "./commands/AssumeRootCommand";
60
64
  import {
61
65
  DecodeAuthorizationMessageCommandInput,
62
66
  DecodeAuthorizationMessageCommandOutput,
@@ -88,6 +92,7 @@ export type ServiceInputTypes =
88
92
  | AssumeRoleCommandInput
89
93
  | AssumeRoleWithSAMLCommandInput
90
94
  | AssumeRoleWithWebIdentityCommandInput
95
+ | AssumeRootCommandInput
91
96
  | DecodeAuthorizationMessageCommandInput
92
97
  | GetAccessKeyInfoCommandInput
93
98
  | GetCallerIdentityCommandInput
@@ -97,6 +102,7 @@ export type ServiceOutputTypes =
97
102
  | AssumeRoleCommandOutput
98
103
  | AssumeRoleWithSAMLCommandOutput
99
104
  | AssumeRoleWithWebIdentityCommandOutput
105
+ | AssumeRootCommandOutput
100
106
  | DecodeAuthorizationMessageCommandOutput
101
107
  | GetAccessKeyInfoCommandOutput
102
108
  | GetCallerIdentityCommandOutput