p6-cdk-s3-protector 0.0.41 → 0.0.43

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (63) hide show
  1. package/.jsii +32 -6
  2. package/lib/p6cdks3protector.js +1 -1
  3. package/node_modules/@aws-sdk/client-s3/package.json +9 -9
  4. package/node_modules/@aws-sdk/client-s3-control/package.json +5 -5
  5. package/node_modules/@aws-sdk/client-sso/package.json +4 -4
  6. package/node_modules/@aws-sdk/client-sts/README.md +8 -0
  7. package/node_modules/@aws-sdk/client-sts/dist-cjs/index.js +107 -0
  8. package/node_modules/@aws-sdk/client-sts/dist-es/STS.js +2 -0
  9. package/node_modules/@aws-sdk/client-sts/dist-es/commands/GetDelegatedAccessTokenCommand.js +23 -0
  10. package/node_modules/@aws-sdk/client-sts/dist-es/commands/index.js +1 -0
  11. package/node_modules/@aws-sdk/client-sts/dist-es/models/models_0.js +20 -0
  12. package/node_modules/@aws-sdk/client-sts/dist-es/protocols/Aws_query.js +66 -1
  13. package/node_modules/@aws-sdk/client-sts/dist-types/STS.d.ts +7 -0
  14. package/node_modules/@aws-sdk/client-sts/dist-types/STSClient.d.ts +3 -2
  15. package/node_modules/@aws-sdk/client-sts/dist-types/commands/AssumeRoleCommand.d.ts +2 -2
  16. package/node_modules/@aws-sdk/client-sts/dist-types/commands/AssumeRoleWithSAMLCommand.d.ts +5 -1
  17. package/node_modules/@aws-sdk/client-sts/dist-types/commands/AssumeRoleWithWebIdentityCommand.d.ts +4 -3
  18. package/node_modules/@aws-sdk/client-sts/dist-types/commands/AssumeRootCommand.d.ts +9 -2
  19. package/node_modules/@aws-sdk/client-sts/dist-types/commands/GetDelegatedAccessTokenCommand.d.ts +91 -0
  20. package/node_modules/@aws-sdk/client-sts/dist-types/commands/GetFederationTokenCommand.d.ts +2 -2
  21. package/node_modules/@aws-sdk/client-sts/dist-types/commands/GetSessionTokenCommand.d.ts +1 -1
  22. package/node_modules/@aws-sdk/client-sts/dist-types/commands/index.d.ts +1 -0
  23. package/node_modules/@aws-sdk/client-sts/dist-types/models/models_0.d.ts +62 -10
  24. package/node_modules/@aws-sdk/client-sts/dist-types/protocols/Aws_query.d.ts +9 -0
  25. package/node_modules/@aws-sdk/client-sts/dist-types/ts3.4/STS.d.ts +17 -0
  26. package/node_modules/@aws-sdk/client-sts/dist-types/ts3.4/STSClient.d.ts +6 -0
  27. package/node_modules/@aws-sdk/client-sts/dist-types/ts3.4/commands/GetDelegatedAccessTokenCommand.d.ts +51 -0
  28. package/node_modules/@aws-sdk/client-sts/dist-types/ts3.4/commands/index.d.ts +1 -0
  29. package/node_modules/@aws-sdk/client-sts/dist-types/ts3.4/models/models_0.d.ts +21 -0
  30. package/node_modules/@aws-sdk/client-sts/dist-types/ts3.4/protocols/Aws_query.d.ts +12 -0
  31. package/node_modules/@aws-sdk/client-sts/package.json +5 -5
  32. package/node_modules/@aws-sdk/core/dist-types/submodules/protocols/cbor/AwsSmithyRpcV2CborProtocol.d.ts +1 -1
  33. package/node_modules/@aws-sdk/core/dist-types/submodules/protocols/json/AwsJson1_0Protocol.d.ts +1 -1
  34. package/node_modules/@aws-sdk/core/dist-types/submodules/protocols/json/AwsJson1_1Protocol.d.ts +1 -1
  35. package/node_modules/@aws-sdk/core/dist-types/submodules/protocols/json/AwsJsonRpcProtocol.d.ts +1 -1
  36. package/node_modules/@aws-sdk/core/dist-types/submodules/protocols/json/AwsRestJsonProtocol.d.ts +1 -1
  37. package/node_modules/@aws-sdk/core/dist-types/submodules/protocols/json/JsonCodec.d.ts +1 -1
  38. package/node_modules/@aws-sdk/core/dist-types/submodules/protocols/json/JsonShapeDeserializer.d.ts +1 -1
  39. package/node_modules/@aws-sdk/core/dist-types/submodules/protocols/json/JsonShapeSerializer.d.ts +1 -1
  40. package/node_modules/@aws-sdk/core/dist-types/submodules/protocols/json/jsonReviver.d.ts +1 -1
  41. package/node_modules/@aws-sdk/core/dist-types/submodules/protocols/query/AwsEc2QueryProtocol.d.ts +1 -1
  42. package/node_modules/@aws-sdk/core/dist-types/submodules/protocols/query/AwsQueryProtocol.d.ts +1 -1
  43. package/node_modules/@aws-sdk/core/dist-types/submodules/protocols/query/QueryShapeSerializer.d.ts +1 -1
  44. package/node_modules/@aws-sdk/core/dist-types/submodules/protocols/xml/AwsRestXmlProtocol.d.ts +1 -1
  45. package/node_modules/@aws-sdk/core/dist-types/submodules/protocols/xml/XmlShapeDeserializer.d.ts +1 -1
  46. package/node_modules/@aws-sdk/core/dist-types/submodules/protocols/xml/XmlShapeSerializer.d.ts +1 -1
  47. package/node_modules/@aws-sdk/core/package.json +1 -1
  48. package/node_modules/@aws-sdk/credential-provider-node/node_modules/@aws-sdk/credential-provider-env/package.json +2 -2
  49. package/node_modules/@aws-sdk/credential-provider-node/node_modules/@aws-sdk/credential-provider-http/package.json +2 -2
  50. package/node_modules/@aws-sdk/credential-provider-node/node_modules/@aws-sdk/credential-provider-ini/package.json +8 -8
  51. package/node_modules/@aws-sdk/credential-provider-node/node_modules/@aws-sdk/credential-provider-process/package.json +2 -2
  52. package/node_modules/@aws-sdk/credential-provider-node/node_modules/@aws-sdk/credential-provider-sso/package.json +4 -4
  53. package/node_modules/@aws-sdk/credential-provider-node/node_modules/@aws-sdk/credential-provider-web-identity/package.json +3 -3
  54. package/node_modules/@aws-sdk/credential-provider-node/node_modules/@aws-sdk/nested-clients/package.json +4 -4
  55. package/node_modules/@aws-sdk/credential-provider-node/package.json +7 -7
  56. package/node_modules/@aws-sdk/middleware-flexible-checksums/package.json +2 -2
  57. package/node_modules/@aws-sdk/middleware-sdk-s3/package.json +2 -2
  58. package/node_modules/@aws-sdk/middleware-user-agent/package.json +2 -2
  59. package/node_modules/@aws-sdk/signature-v4-multi-region/package.json +2 -2
  60. package/node_modules/@aws-sdk/token-providers/node_modules/@aws-sdk/nested-clients/package.json +4 -4
  61. package/node_modules/@aws-sdk/token-providers/package.json +3 -3
  62. package/node_modules/@aws-sdk/util-user-agent-node/package.json +2 -2
  63. package/package.json +14 -14
@@ -14,6 +14,7 @@ import { AssumeRootCommandInput, AssumeRootCommandOutput } from "./commands/Assu
14
14
  import { DecodeAuthorizationMessageCommandInput, DecodeAuthorizationMessageCommandOutput } from "./commands/DecodeAuthorizationMessageCommand";
15
15
  import { GetAccessKeyInfoCommandInput, GetAccessKeyInfoCommandOutput } from "./commands/GetAccessKeyInfoCommand";
16
16
  import { GetCallerIdentityCommandInput, GetCallerIdentityCommandOutput } from "./commands/GetCallerIdentityCommand";
17
+ import { GetDelegatedAccessTokenCommandInput, GetDelegatedAccessTokenCommandOutput } from "./commands/GetDelegatedAccessTokenCommand";
17
18
  import { GetFederationTokenCommandInput, GetFederationTokenCommandOutput } from "./commands/GetFederationTokenCommand";
18
19
  import { GetSessionTokenCommandInput, GetSessionTokenCommandOutput } from "./commands/GetSessionTokenCommand";
19
20
  import { ClientInputEndpointParameters, ClientResolvedEndpointParameters, EndpointParameters } from "./endpoint/EndpointParameters";
@@ -22,11 +23,11 @@ export { __Client };
22
23
  /**
23
24
  * @public
24
25
  */
25
- export type ServiceInputTypes = AssumeRoleCommandInput | AssumeRoleWithSAMLCommandInput | AssumeRoleWithWebIdentityCommandInput | AssumeRootCommandInput | DecodeAuthorizationMessageCommandInput | GetAccessKeyInfoCommandInput | GetCallerIdentityCommandInput | GetFederationTokenCommandInput | GetSessionTokenCommandInput;
26
+ export type ServiceInputTypes = AssumeRoleCommandInput | AssumeRoleWithSAMLCommandInput | AssumeRoleWithWebIdentityCommandInput | AssumeRootCommandInput | DecodeAuthorizationMessageCommandInput | GetAccessKeyInfoCommandInput | GetCallerIdentityCommandInput | GetDelegatedAccessTokenCommandInput | GetFederationTokenCommandInput | GetSessionTokenCommandInput;
26
27
  /**
27
28
  * @public
28
29
  */
29
- export type ServiceOutputTypes = AssumeRoleCommandOutput | AssumeRoleWithSAMLCommandOutput | AssumeRoleWithWebIdentityCommandOutput | AssumeRootCommandOutput | DecodeAuthorizationMessageCommandOutput | GetAccessKeyInfoCommandOutput | GetCallerIdentityCommandOutput | GetFederationTokenCommandOutput | GetSessionTokenCommandOutput;
30
+ export type ServiceOutputTypes = AssumeRoleCommandOutput | AssumeRoleWithSAMLCommandOutput | AssumeRoleWithWebIdentityCommandOutput | AssumeRootCommandOutput | DecodeAuthorizationMessageCommandOutput | GetAccessKeyInfoCommandOutput | GetCallerIdentityCommandOutput | GetDelegatedAccessTokenCommandOutput | GetFederationTokenCommandOutput | GetSessionTokenCommandOutput;
30
31
  /**
31
32
  * @public
32
33
  */
@@ -200,7 +200,7 @@ declare const AssumeRoleCommand_base: {
200
200
  * @throws {@link RegionDisabledException} (client fault)
201
201
  * <p>STS is not activated in the requested region for the account that is being asked to
202
202
  * generate credentials. The account administrator must use the IAM console to activate
203
- * STS in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html">Activating and
203
+ * STS in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html#sts-regions-activate-deactivate">Activating and
204
204
  * Deactivating STS in an Amazon Web Services Region</a> in the <i>IAM User
205
205
  * Guide</i>.</p>
206
206
  *
@@ -213,7 +213,7 @@ declare const AssumeRoleCommand_base: {
213
213
  * //
214
214
  * const input = {
215
215
  * ExternalId: "123ABC",
216
- * Policy: `{"Version":"2012-10-17","Statement":[{"Sid":"Stmt1","Effect":"Allow","Action":"s3:ListAllMyBuckets","Resource":"*"}]}`,
216
+ * Policy: "escaped-JSON-IAM-POLICY",
217
217
  * RoleArn: "arn:aws:iam::123456789012:role/demo",
218
218
  * RoleSessionName: "testAssumeRoleSession",
219
219
  * Tags: [
@@ -37,6 +37,10 @@ declare const AssumeRoleWithSAMLCommand_base: {
37
37
  * <p>The temporary security credentials returned by this operation consist of an access key
38
38
  * ID, a secret access key, and a security token. Applications can use these temporary
39
39
  * security credentials to sign calls to Amazon Web Services services.</p>
40
+ * <note>
41
+ * <p>AssumeRoleWithSAML will not work on IAM Identity Center managed roles. These roles' names start
42
+ * with <code>AWSReservedSSO_</code>.</p>
43
+ * </note>
40
44
  * <p>
41
45
  * <b>Session Duration</b>
42
46
  * </p>
@@ -238,7 +242,7 @@ declare const AssumeRoleWithSAMLCommand_base: {
238
242
  * @throws {@link RegionDisabledException} (client fault)
239
243
  * <p>STS is not activated in the requested region for the account that is being asked to
240
244
  * generate credentials. The account administrator must use the IAM console to activate
241
- * STS in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html">Activating and
245
+ * STS in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html#sts-regions-activate-deactivate">Activating and
242
246
  * Deactivating STS in an Amazon Web Services Region</a> in the <i>IAM User
243
247
  * Guide</i>.</p>
244
248
  *
@@ -90,7 +90,8 @@ declare const AssumeRoleWithWebIdentityCommand_base: {
90
90
  * </p>
91
91
  * <p>(Optional) You can configure your IdP to pass attributes into your web identity token as
92
92
  * session tags. Each session tag consists of a key name and an associated value. For more
93
- * information about session tags, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html">Passing Session Tags in STS</a> in the
93
+ * information about session tags, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html#id_session-tags_adding-assume-role-idp">Passing
94
+ * session tags using AssumeRoleWithWebIdentity</a> in the
94
95
  * <i>IAM User Guide</i>.</p>
95
96
  * <p>You can pass up to 50 session tags. The plaintext session tag keys can’t exceed 128
96
97
  * characters and the values can’t exceed 256 characters. For these and additional limits, see
@@ -232,7 +233,7 @@ declare const AssumeRoleWithWebIdentityCommand_base: {
232
233
  * @throws {@link RegionDisabledException} (client fault)
233
234
  * <p>STS is not activated in the requested region for the account that is being asked to
234
235
  * generate credentials. The account administrator must use the IAM console to activate
235
- * STS in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html">Activating and
236
+ * STS in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html#sts-regions-activate-deactivate">Activating and
236
237
  * Deactivating STS in an Amazon Web Services Region</a> in the <i>IAM User
237
238
  * Guide</i>.</p>
238
239
  *
@@ -245,7 +246,7 @@ declare const AssumeRoleWithWebIdentityCommand_base: {
245
246
  * //
246
247
  * const input = {
247
248
  * DurationSeconds: 3600,
248
- * Policy: `{"Version":"2012-10-17","Statement":[{"Sid":"Stmt1","Effect":"Allow","Action":"s3:ListAllMyBuckets","Resource":"*"}]}`,
249
+ * Policy: "escaped-JSON-IAM-POLICY",
249
250
  * ProviderId: "www.amazon.com",
250
251
  * RoleArn: "arn:aws:iam::123456789012:role/FederatedWebIdentityRole",
251
252
  * RoleSessionName: "app1",
@@ -28,7 +28,9 @@ declare const AssumeRootCommand_base: {
28
28
  };
29
29
  /**
30
30
  * <p>Returns a set of short term credentials you can use to perform privileged tasks on a
31
- * member account in your organization.</p>
31
+ * member account in your organization. You must use credentials from an Organizations management
32
+ * account or a delegated administrator account for IAM to call <code>AssumeRoot</code>. You
33
+ * cannot use root user credentials to make this call.</p>
32
34
  * <p>Before you can launch a privileged session, you must have centralized root access in
33
35
  * your organization. For steps to enable this feature, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_root-enable-root-access.html">Centralize root access for
34
36
  * member accounts</a> in the <i>IAM User Guide</i>.</p>
@@ -39,6 +41,11 @@ declare const AssumeRootCommand_base: {
39
41
  * <p>You can track AssumeRoot in CloudTrail logs to determine what actions were performed in a
40
42
  * session. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/cloudtrail-track-privileged-tasks.html">Track privileged tasks
41
43
  * in CloudTrail</a> in the <i>IAM User Guide</i>.</p>
44
+ * <p>When granting access to privileged tasks you should only grant the necessary permissions
45
+ * required to perform that task. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html">Security best practices in
46
+ * IAM</a>. In addition, you can use <a href="https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_policies_scps.html">service control
47
+ * policies</a> (SCPs) to manage and limit permissions in your organization. See <a href="https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_policies_scps_examples_general.html">General examples</a> in the <i>Organizations User
48
+ * Guide</i> for more information on SCPs.</p>
42
49
  * @example
43
50
  * Use a bare-bones client and the command you need to make an API call.
44
51
  * ```javascript
@@ -81,7 +88,7 @@ declare const AssumeRootCommand_base: {
81
88
  * @throws {@link RegionDisabledException} (client fault)
82
89
  * <p>STS is not activated in the requested region for the account that is being asked to
83
90
  * generate credentials. The account administrator must use the IAM console to activate
84
- * STS in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html">Activating and
91
+ * STS in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html#sts-regions-activate-deactivate">Activating and
85
92
  * Deactivating STS in an Amazon Web Services Region</a> in the <i>IAM User
86
93
  * Guide</i>.</p>
87
94
  *
@@ -0,0 +1,91 @@
1
+ import { Command as $Command } from "@smithy/smithy-client";
2
+ import { MetadataBearer as __MetadataBearer } from "@smithy/types";
3
+ import { GetDelegatedAccessTokenRequest, GetDelegatedAccessTokenResponse } from "../models/models_0";
4
+ import { ServiceInputTypes, ServiceOutputTypes, STSClientResolvedConfig } from "../STSClient";
5
+ /**
6
+ * @public
7
+ */
8
+ export type { __MetadataBearer };
9
+ export { $Command };
10
+ /**
11
+ * @public
12
+ *
13
+ * The input for {@link GetDelegatedAccessTokenCommand}.
14
+ */
15
+ export interface GetDelegatedAccessTokenCommandInput extends GetDelegatedAccessTokenRequest {
16
+ }
17
+ /**
18
+ * @public
19
+ *
20
+ * The output of {@link GetDelegatedAccessTokenCommand}.
21
+ */
22
+ export interface GetDelegatedAccessTokenCommandOutput extends GetDelegatedAccessTokenResponse, __MetadataBearer {
23
+ }
24
+ declare const GetDelegatedAccessTokenCommand_base: {
25
+ new (input: GetDelegatedAccessTokenCommandInput): import("@smithy/smithy-client").CommandImpl<GetDelegatedAccessTokenCommandInput, GetDelegatedAccessTokenCommandOutput, STSClientResolvedConfig, ServiceInputTypes, ServiceOutputTypes>;
26
+ new (input: GetDelegatedAccessTokenCommandInput): import("@smithy/smithy-client").CommandImpl<GetDelegatedAccessTokenCommandInput, GetDelegatedAccessTokenCommandOutput, STSClientResolvedConfig, ServiceInputTypes, ServiceOutputTypes>;
27
+ getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
28
+ };
29
+ /**
30
+ * <p>This API is currently unavailable for general use.</p>
31
+ * @example
32
+ * Use a bare-bones client and the command you need to make an API call.
33
+ * ```javascript
34
+ * import { STSClient, GetDelegatedAccessTokenCommand } from "@aws-sdk/client-sts"; // ES Modules import
35
+ * // const { STSClient, GetDelegatedAccessTokenCommand } = require("@aws-sdk/client-sts"); // CommonJS import
36
+ * // import type { STSClientConfig } from "@aws-sdk/client-sts";
37
+ * const config = {}; // type is STSClientConfig
38
+ * const client = new STSClient(config);
39
+ * const input = { // GetDelegatedAccessTokenRequest
40
+ * TradeInToken: "STRING_VALUE", // required
41
+ * };
42
+ * const command = new GetDelegatedAccessTokenCommand(input);
43
+ * const response = await client.send(command);
44
+ * // { // GetDelegatedAccessTokenResponse
45
+ * // Credentials: { // Credentials
46
+ * // AccessKeyId: "STRING_VALUE", // required
47
+ * // SecretAccessKey: "STRING_VALUE", // required
48
+ * // SessionToken: "STRING_VALUE", // required
49
+ * // Expiration: new Date("TIMESTAMP"), // required
50
+ * // },
51
+ * // PackedPolicySize: Number("int"),
52
+ * // AssumedPrincipal: "STRING_VALUE",
53
+ * // };
54
+ *
55
+ * ```
56
+ *
57
+ * @param GetDelegatedAccessTokenCommandInput - {@link GetDelegatedAccessTokenCommandInput}
58
+ * @returns {@link GetDelegatedAccessTokenCommandOutput}
59
+ * @see {@link GetDelegatedAccessTokenCommandInput} for command's `input` shape.
60
+ * @see {@link GetDelegatedAccessTokenCommandOutput} for command's `response` shape.
61
+ * @see {@link STSClientResolvedConfig | config} for STSClient's `config` shape.
62
+ *
63
+ * @throws {@link ExpiredTradeInTokenException} (client fault)
64
+ * <p></p>
65
+ *
66
+ * @throws {@link RegionDisabledException} (client fault)
67
+ * <p>STS is not activated in the requested region for the account that is being asked to
68
+ * generate credentials. The account administrator must use the IAM console to activate
69
+ * STS in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html#sts-regions-activate-deactivate">Activating and
70
+ * Deactivating STS in an Amazon Web Services Region</a> in the <i>IAM User
71
+ * Guide</i>.</p>
72
+ *
73
+ * @throws {@link STSServiceException}
74
+ * <p>Base exception class for all service exceptions from STS service.</p>
75
+ *
76
+ *
77
+ * @public
78
+ */
79
+ export declare class GetDelegatedAccessTokenCommand extends GetDelegatedAccessTokenCommand_base {
80
+ /** @internal type navigation helper, not in runtime. */
81
+ protected static __types: {
82
+ api: {
83
+ input: GetDelegatedAccessTokenRequest;
84
+ output: GetDelegatedAccessTokenResponse;
85
+ };
86
+ sdk: {
87
+ input: GetDelegatedAccessTokenCommandInput;
88
+ output: GetDelegatedAccessTokenCommandOutput;
89
+ };
90
+ };
91
+ }
@@ -182,7 +182,7 @@ declare const GetFederationTokenCommand_base: {
182
182
  * @throws {@link RegionDisabledException} (client fault)
183
183
  * <p>STS is not activated in the requested region for the account that is being asked to
184
184
  * generate credentials. The account administrator must use the IAM console to activate
185
- * STS in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html">Activating and
185
+ * STS in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html#sts-regions-activate-deactivate">Activating and
186
186
  * Deactivating STS in an Amazon Web Services Region</a> in the <i>IAM User
187
187
  * Guide</i>.</p>
188
188
  *
@@ -196,7 +196,7 @@ declare const GetFederationTokenCommand_base: {
196
196
  * const input = {
197
197
  * DurationSeconds: 3600,
198
198
  * Name: "testFedUserSession",
199
- * Policy: `{"Version":"2012-10-17","Statement":[{"Sid":"Stmt1","Effect":"Allow","Action":"s3:ListAllMyBuckets","Resource":"*"}]}`,
199
+ * Policy: "escaped-JSON-IAM-POLICY",
200
200
  * Tags: [
201
201
  * {
202
202
  * Key: "Project",
@@ -121,7 +121,7 @@ declare const GetSessionTokenCommand_base: {
121
121
  * @throws {@link RegionDisabledException} (client fault)
122
122
  * <p>STS is not activated in the requested region for the account that is being asked to
123
123
  * generate credentials. The account administrator must use the IAM console to activate
124
- * STS in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html">Activating and
124
+ * STS in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html#sts-regions-activate-deactivate">Activating and
125
125
  * Deactivating STS in an Amazon Web Services Region</a> in the <i>IAM User
126
126
  * Guide</i>.</p>
127
127
  *
@@ -5,5 +5,6 @@ export * from "./AssumeRootCommand";
5
5
  export * from "./DecodeAuthorizationMessageCommand";
6
6
  export * from "./GetAccessKeyInfoCommand";
7
7
  export * from "./GetCallerIdentityCommand";
8
+ export * from "./GetDelegatedAccessTokenCommand";
8
9
  export * from "./GetFederationTokenCommand";
9
10
  export * from "./GetSessionTokenCommand";
@@ -100,9 +100,9 @@ export interface AssumeRoleRequest {
100
100
  * assume the role. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_iam-condition-keys.html#ck_rolesessionname">
101
101
  * <code>sts:RoleSessionName</code>
102
102
  * </a>.</p>
103
- * <p>The regex used to validate this parameter is a string of characters
104
- * consisting of upper- and lower-case alphanumeric characters with no spaces. You can
105
- * also include underscores or any of the following characters: =,.@-</p>
103
+ * <p>The regex used to validate this parameter is a string of
104
+ * characters consisting of upper- and lower-case alphanumeric characters with no spaces.
105
+ * You can also include underscores or any of the following characters: +=,.@-</p>
106
106
  * @public
107
107
  */
108
108
  RoleSessionName: string | undefined;
@@ -241,7 +241,7 @@ export interface AssumeRoleRequest {
241
241
  * <i>IAM User Guide</i>.</p>
242
242
  * <p>The regex used to validate this parameter is a string of
243
243
  * characters consisting of upper- and lower-case alphanumeric characters with no spaces.
244
- * You can also include underscores or any of the following characters: =,.@:/-</p>
244
+ * You can also include underscores or any of the following characters: +=,.@:\/-</p>
245
245
  * @public
246
246
  */
247
247
  ExternalId?: string | undefined;
@@ -252,9 +252,9 @@ export interface AssumeRoleRequest {
252
252
  * the serial number for a hardware device (such as <code>GAHT12345678</code>) or an Amazon
253
253
  * Resource Name (ARN) for a virtual device (such as
254
254
  * <code>arn:aws:iam::123456789012:mfa/user</code>).</p>
255
- * <p>The regex used to validate this parameter is a string of characters
256
- * consisting of upper- and lower-case alphanumeric characters with no spaces. You can
257
- * also include underscores or any of the following characters: =,.@-</p>
255
+ * <p>The regex used to validate this parameter is a string of
256
+ * characters consisting of upper- and lower-case alphanumeric characters with no spaces.
257
+ * You can also include underscores or any of the following characters: +=/:,.@-</p>
258
258
  * @public
259
259
  */
260
260
  SerialNumber?: string | undefined;
@@ -427,7 +427,7 @@ export declare class PackedPolicyTooLargeException extends __BaseException {
427
427
  /**
428
428
  * <p>STS is not activated in the requested region for the account that is being asked to
429
429
  * generate credentials. The account administrator must use the IAM console to activate
430
- * STS in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html">Activating and
430
+ * STS in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html#sts-regions-activate-deactivate">Activating and
431
431
  * Deactivating STS in an Amazon Web Services Region</a> in the <i>IAM User
432
432
  * Guide</i>.</p>
433
433
  * @public
@@ -907,8 +907,10 @@ export interface AssumeRootRequest {
907
907
  TargetPrincipal: string | undefined;
908
908
  /**
909
909
  * <p>The identity based policy that scopes the session to the privileged tasks that can be
910
- * performed. You can use one of following Amazon Web Services managed policies to scope root session
911
- * actions.</p>
910
+ * performed. You must
911
+ *
912
+ * use one of following Amazon Web Services managed policies to scope root session
913
+ * actions:</p>
912
914
  * <ul>
913
915
  * <li>
914
916
  * <p>
@@ -1065,6 +1067,48 @@ export interface GetCallerIdentityResponse {
1065
1067
  */
1066
1068
  Arn?: string | undefined;
1067
1069
  }
1070
+ /**
1071
+ * <p></p>
1072
+ * @public
1073
+ */
1074
+ export declare class ExpiredTradeInTokenException extends __BaseException {
1075
+ readonly name: "ExpiredTradeInTokenException";
1076
+ readonly $fault: "client";
1077
+ /**
1078
+ * @internal
1079
+ */
1080
+ constructor(opts: __ExceptionOptionType<ExpiredTradeInTokenException, __BaseException>);
1081
+ }
1082
+ /**
1083
+ * @public
1084
+ */
1085
+ export interface GetDelegatedAccessTokenRequest {
1086
+ /**
1087
+ * <p></p>
1088
+ * @public
1089
+ */
1090
+ TradeInToken: string | undefined;
1091
+ }
1092
+ /**
1093
+ * @public
1094
+ */
1095
+ export interface GetDelegatedAccessTokenResponse {
1096
+ /**
1097
+ * <p>Amazon Web Services credentials for API authentication.</p>
1098
+ * @public
1099
+ */
1100
+ Credentials?: Credentials | undefined;
1101
+ /**
1102
+ * <p></p>
1103
+ * @public
1104
+ */
1105
+ PackedPolicySize?: number | undefined;
1106
+ /**
1107
+ * <p></p>
1108
+ * @public
1109
+ */
1110
+ AssumedPrincipal?: string | undefined;
1111
+ }
1068
1112
  /**
1069
1113
  * @public
1070
1114
  */
@@ -1316,6 +1360,14 @@ export declare const AssumeRoleWithWebIdentityResponseFilterSensitiveLog: (obj:
1316
1360
  * @internal
1317
1361
  */
1318
1362
  export declare const AssumeRootResponseFilterSensitiveLog: (obj: AssumeRootResponse) => any;
1363
+ /**
1364
+ * @internal
1365
+ */
1366
+ export declare const GetDelegatedAccessTokenRequestFilterSensitiveLog: (obj: GetDelegatedAccessTokenRequest) => any;
1367
+ /**
1368
+ * @internal
1369
+ */
1370
+ export declare const GetDelegatedAccessTokenResponseFilterSensitiveLog: (obj: GetDelegatedAccessTokenResponse) => any;
1319
1371
  /**
1320
1372
  * @internal
1321
1373
  */
@@ -7,6 +7,7 @@ import { AssumeRootCommandInput, AssumeRootCommandOutput } from "../commands/Ass
7
7
  import { DecodeAuthorizationMessageCommandInput, DecodeAuthorizationMessageCommandOutput } from "../commands/DecodeAuthorizationMessageCommand";
8
8
  import { GetAccessKeyInfoCommandInput, GetAccessKeyInfoCommandOutput } from "../commands/GetAccessKeyInfoCommand";
9
9
  import { GetCallerIdentityCommandInput, GetCallerIdentityCommandOutput } from "../commands/GetCallerIdentityCommand";
10
+ import { GetDelegatedAccessTokenCommandInput, GetDelegatedAccessTokenCommandOutput } from "../commands/GetDelegatedAccessTokenCommand";
10
11
  import { GetFederationTokenCommandInput, GetFederationTokenCommandOutput } from "../commands/GetFederationTokenCommand";
11
12
  import { GetSessionTokenCommandInput, GetSessionTokenCommandOutput } from "../commands/GetSessionTokenCommand";
12
13
  /**
@@ -37,6 +38,10 @@ export declare const se_GetAccessKeyInfoCommand: (input: GetAccessKeyInfoCommand
37
38
  * serializeAws_queryGetCallerIdentityCommand
38
39
  */
39
40
  export declare const se_GetCallerIdentityCommand: (input: GetCallerIdentityCommandInput, context: __SerdeContext) => Promise<__HttpRequest>;
41
+ /**
42
+ * serializeAws_queryGetDelegatedAccessTokenCommand
43
+ */
44
+ export declare const se_GetDelegatedAccessTokenCommand: (input: GetDelegatedAccessTokenCommandInput, context: __SerdeContext) => Promise<__HttpRequest>;
40
45
  /**
41
46
  * serializeAws_queryGetFederationTokenCommand
42
47
  */
@@ -73,6 +78,10 @@ export declare const de_GetAccessKeyInfoCommand: (output: __HttpResponse, contex
73
78
  * deserializeAws_queryGetCallerIdentityCommand
74
79
  */
75
80
  export declare const de_GetCallerIdentityCommand: (output: __HttpResponse, context: __SerdeContext) => Promise<GetCallerIdentityCommandOutput>;
81
+ /**
82
+ * deserializeAws_queryGetDelegatedAccessTokenCommand
83
+ */
84
+ export declare const de_GetDelegatedAccessTokenCommand: (output: __HttpResponse, context: __SerdeContext) => Promise<GetDelegatedAccessTokenCommandOutput>;
76
85
  /**
77
86
  * deserializeAws_queryGetFederationTokenCommand
78
87
  */
@@ -27,6 +27,10 @@ import {
27
27
  GetCallerIdentityCommandInput,
28
28
  GetCallerIdentityCommandOutput,
29
29
  } from "./commands/GetCallerIdentityCommand";
30
+ import {
31
+ GetDelegatedAccessTokenCommandInput,
32
+ GetDelegatedAccessTokenCommandOutput,
33
+ } from "./commands/GetDelegatedAccessTokenCommand";
30
34
  import {
31
35
  GetFederationTokenCommandInput,
32
36
  GetFederationTokenCommandOutput,
@@ -129,6 +133,19 @@ export interface STS {
129
133
  options: __HttpHandlerOptions,
130
134
  cb: (err: any, data?: GetCallerIdentityCommandOutput) => void
131
135
  ): void;
136
+ getDelegatedAccessToken(
137
+ args: GetDelegatedAccessTokenCommandInput,
138
+ options?: __HttpHandlerOptions
139
+ ): Promise<GetDelegatedAccessTokenCommandOutput>;
140
+ getDelegatedAccessToken(
141
+ args: GetDelegatedAccessTokenCommandInput,
142
+ cb: (err: any, data?: GetDelegatedAccessTokenCommandOutput) => void
143
+ ): void;
144
+ getDelegatedAccessToken(
145
+ args: GetDelegatedAccessTokenCommandInput,
146
+ options: __HttpHandlerOptions,
147
+ cb: (err: any, data?: GetDelegatedAccessTokenCommandOutput) => void
148
+ ): void;
132
149
  getFederationToken(
133
150
  args: GetFederationTokenCommandInput,
134
151
  options?: __HttpHandlerOptions
@@ -73,6 +73,10 @@ import {
73
73
  GetCallerIdentityCommandInput,
74
74
  GetCallerIdentityCommandOutput,
75
75
  } from "./commands/GetCallerIdentityCommand";
76
+ import {
77
+ GetDelegatedAccessTokenCommandInput,
78
+ GetDelegatedAccessTokenCommandOutput,
79
+ } from "./commands/GetDelegatedAccessTokenCommand";
76
80
  import {
77
81
  GetFederationTokenCommandInput,
78
82
  GetFederationTokenCommandOutput,
@@ -96,6 +100,7 @@ export type ServiceInputTypes =
96
100
  | DecodeAuthorizationMessageCommandInput
97
101
  | GetAccessKeyInfoCommandInput
98
102
  | GetCallerIdentityCommandInput
103
+ | GetDelegatedAccessTokenCommandInput
99
104
  | GetFederationTokenCommandInput
100
105
  | GetSessionTokenCommandInput;
101
106
  export type ServiceOutputTypes =
@@ -106,6 +111,7 @@ export type ServiceOutputTypes =
106
111
  | DecodeAuthorizationMessageCommandOutput
107
112
  | GetAccessKeyInfoCommandOutput
108
113
  | GetCallerIdentityCommandOutput
114
+ | GetDelegatedAccessTokenCommandOutput
109
115
  | GetFederationTokenCommandOutput
110
116
  | GetSessionTokenCommandOutput;
111
117
  export interface ClientDefaults
@@ -0,0 +1,51 @@
1
+ import { Command as $Command } from "@smithy/smithy-client";
2
+ import { MetadataBearer as __MetadataBearer } from "@smithy/types";
3
+ import {
4
+ GetDelegatedAccessTokenRequest,
5
+ GetDelegatedAccessTokenResponse,
6
+ } from "../models/models_0";
7
+ import {
8
+ ServiceInputTypes,
9
+ ServiceOutputTypes,
10
+ STSClientResolvedConfig,
11
+ } from "../STSClient";
12
+ export { __MetadataBearer };
13
+ export { $Command };
14
+ export interface GetDelegatedAccessTokenCommandInput
15
+ extends GetDelegatedAccessTokenRequest {}
16
+ export interface GetDelegatedAccessTokenCommandOutput
17
+ extends GetDelegatedAccessTokenResponse,
18
+ __MetadataBearer {}
19
+ declare const GetDelegatedAccessTokenCommand_base: {
20
+ new (
21
+ input: GetDelegatedAccessTokenCommandInput
22
+ ): import("@smithy/smithy-client").CommandImpl<
23
+ GetDelegatedAccessTokenCommandInput,
24
+ GetDelegatedAccessTokenCommandOutput,
25
+ STSClientResolvedConfig,
26
+ ServiceInputTypes,
27
+ ServiceOutputTypes
28
+ >;
29
+ new (
30
+ input: GetDelegatedAccessTokenCommandInput
31
+ ): import("@smithy/smithy-client").CommandImpl<
32
+ GetDelegatedAccessTokenCommandInput,
33
+ GetDelegatedAccessTokenCommandOutput,
34
+ STSClientResolvedConfig,
35
+ ServiceInputTypes,
36
+ ServiceOutputTypes
37
+ >;
38
+ getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
39
+ };
40
+ export declare class GetDelegatedAccessTokenCommand extends GetDelegatedAccessTokenCommand_base {
41
+ protected static __types: {
42
+ api: {
43
+ input: GetDelegatedAccessTokenRequest;
44
+ output: GetDelegatedAccessTokenResponse;
45
+ };
46
+ sdk: {
47
+ input: GetDelegatedAccessTokenCommandInput;
48
+ output: GetDelegatedAccessTokenCommandOutput;
49
+ };
50
+ };
51
+ }
@@ -5,5 +5,6 @@ export * from "./AssumeRootCommand";
5
5
  export * from "./DecodeAuthorizationMessageCommand";
6
6
  export * from "./GetAccessKeyInfoCommand";
7
7
  export * from "./GetCallerIdentityCommand";
8
+ export * from "./GetDelegatedAccessTokenCommand";
8
9
  export * from "./GetFederationTokenCommand";
9
10
  export * from "./GetSessionTokenCommand";
@@ -167,6 +167,21 @@ export interface GetCallerIdentityResponse {
167
167
  Account?: string | undefined;
168
168
  Arn?: string | undefined;
169
169
  }
170
+ export declare class ExpiredTradeInTokenException extends __BaseException {
171
+ readonly name: "ExpiredTradeInTokenException";
172
+ readonly $fault: "client";
173
+ constructor(
174
+ opts: __ExceptionOptionType<ExpiredTradeInTokenException, __BaseException>
175
+ );
176
+ }
177
+ export interface GetDelegatedAccessTokenRequest {
178
+ TradeInToken: string | undefined;
179
+ }
180
+ export interface GetDelegatedAccessTokenResponse {
181
+ Credentials?: Credentials | undefined;
182
+ PackedPolicySize?: number | undefined;
183
+ AssumedPrincipal?: string | undefined;
184
+ }
170
185
  export interface GetFederationTokenRequest {
171
186
  Name: string | undefined;
172
187
  Policy?: string | undefined;
@@ -210,6 +225,12 @@ export declare const AssumeRoleWithWebIdentityResponseFilterSensitiveLog: (
210
225
  export declare const AssumeRootResponseFilterSensitiveLog: (
211
226
  obj: AssumeRootResponse
212
227
  ) => any;
228
+ export declare const GetDelegatedAccessTokenRequestFilterSensitiveLog: (
229
+ obj: GetDelegatedAccessTokenRequest
230
+ ) => any;
231
+ export declare const GetDelegatedAccessTokenResponseFilterSensitiveLog: (
232
+ obj: GetDelegatedAccessTokenResponse
233
+ ) => any;
213
234
  export declare const GetFederationTokenResponseFilterSensitiveLog: (
214
235
  obj: GetFederationTokenResponse
215
236
  ) => any;
@@ -31,6 +31,10 @@ import {
31
31
  GetCallerIdentityCommandInput,
32
32
  GetCallerIdentityCommandOutput,
33
33
  } from "../commands/GetCallerIdentityCommand";
34
+ import {
35
+ GetDelegatedAccessTokenCommandInput,
36
+ GetDelegatedAccessTokenCommandOutput,
37
+ } from "../commands/GetDelegatedAccessTokenCommand";
34
38
  import {
35
39
  GetFederationTokenCommandInput,
36
40
  GetFederationTokenCommandOutput,
@@ -67,6 +71,10 @@ export declare const se_GetCallerIdentityCommand: (
67
71
  input: GetCallerIdentityCommandInput,
68
72
  context: __SerdeContext
69
73
  ) => Promise<__HttpRequest>;
74
+ export declare const se_GetDelegatedAccessTokenCommand: (
75
+ input: GetDelegatedAccessTokenCommandInput,
76
+ context: __SerdeContext
77
+ ) => Promise<__HttpRequest>;
70
78
  export declare const se_GetFederationTokenCommand: (
71
79
  input: GetFederationTokenCommandInput,
72
80
  context: __SerdeContext
@@ -103,6 +111,10 @@ export declare const de_GetCallerIdentityCommand: (
103
111
  output: __HttpResponse,
104
112
  context: __SerdeContext
105
113
  ) => Promise<GetCallerIdentityCommandOutput>;
114
+ export declare const de_GetDelegatedAccessTokenCommand: (
115
+ output: __HttpResponse,
116
+ context: __SerdeContext
117
+ ) => Promise<GetDelegatedAccessTokenCommandOutput>;
106
118
  export declare const de_GetFederationTokenCommand: (
107
119
  output: __HttpResponse,
108
120
  context: __SerdeContext
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "name": "@aws-sdk/client-sts",
3
3
  "description": "AWS SDK for JavaScript Sts Client for Node.js, Browser and React Native",
4
- "version": "3.927.0",
4
+ "version": "3.928.0",
5
5
  "scripts": {
6
6
  "build": "concurrently 'yarn:build:cjs' 'yarn:build:es' 'yarn:build:types'",
7
7
  "build:cjs": "node ../../scripts/compilation/inline client-sts",
@@ -22,17 +22,17 @@
22
22
  "dependencies": {
23
23
  "@aws-crypto/sha256-browser": "5.2.0",
24
24
  "@aws-crypto/sha256-js": "5.2.0",
25
- "@aws-sdk/core": "3.927.0",
26
- "@aws-sdk/credential-provider-node": "3.927.0",
25
+ "@aws-sdk/core": "3.928.0",
26
+ "@aws-sdk/credential-provider-node": "3.928.0",
27
27
  "@aws-sdk/middleware-host-header": "3.922.0",
28
28
  "@aws-sdk/middleware-logger": "3.922.0",
29
29
  "@aws-sdk/middleware-recursion-detection": "3.922.0",
30
- "@aws-sdk/middleware-user-agent": "3.927.0",
30
+ "@aws-sdk/middleware-user-agent": "3.928.0",
31
31
  "@aws-sdk/region-config-resolver": "3.925.0",
32
32
  "@aws-sdk/types": "3.922.0",
33
33
  "@aws-sdk/util-endpoints": "3.922.0",
34
34
  "@aws-sdk/util-user-agent-browser": "3.922.0",
35
- "@aws-sdk/util-user-agent-node": "3.927.0",
35
+ "@aws-sdk/util-user-agent-node": "3.928.0",
36
36
  "@smithy/config-resolver": "^4.4.2",
37
37
  "@smithy/core": "^3.17.2",
38
38
  "@smithy/fetch-http-handler": "^5.3.5",
@@ -3,7 +3,7 @@ import type { EndpointBearer, HandlerExecutionContext, HttpRequest, HttpResponse
3
3
  /**
4
4
  * Extends the Smithy implementation to add AwsQueryCompatibility support.
5
5
  *
6
- * @alpha
6
+ * @public
7
7
  */
8
8
  export declare class AwsSmithyRpcV2CborProtocol extends SmithyRpcV2CborProtocol {
9
9
  private readonly awsQueryCompatible;
@@ -1,6 +1,6 @@
1
1
  import { AwsJsonRpcProtocol } from "./AwsJsonRpcProtocol";
2
2
  /**
3
- * @alpha
3
+ * @public
4
4
  * @see https://smithy.io/2.0/aws/protocols/aws-json-1_1-protocol.html#differences-between-awsjson1-0-and-awsjson1-1
5
5
  */
6
6
  export declare class AwsJson1_0Protocol extends AwsJsonRpcProtocol {