You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: clients/client-sts/src/STS.ts
+7-12Lines changed: 7 additions & 12 deletions
Original file line number
Diff line number
Diff line change
@@ -49,11 +49,10 @@ import { STSClient } from "./STSClient";
49
49
exportclassSTSextendsSTSClient{
50
50
/**
51
51
* <p>Returns a set of temporary security credentials that you can use to access Amazon Web Services
52
-
* resources that you might not normally have access to. These temporary credentials consist
53
-
* of an access key ID, a secret access key, and a security token. Typically, you use
54
-
* <code>AssumeRole</code> within your account or for cross-account access. For a
55
-
* comparison of <code>AssumeRole</code> with other API operations that produce temporary
56
-
* credentials, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html">Requesting Temporary Security
52
+
* resources. These temporary credentials consist of an access key ID, a secret access key,
53
+
* and a security token. Typically, you use <code>AssumeRole</code> within your account or for
54
+
* cross-account access. For a comparison of <code>AssumeRole</code> with other API operations
55
+
* that produce temporary credentials, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html">Requesting Temporary Security
57
56
* Credentials</a> and <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#stsapi_comparison">Comparing the
58
57
* Amazon Web Services STS API operations</a> in the <i>IAM User Guide</i>.</p>
59
58
* <p>
@@ -103,7 +102,6 @@ export class STS extends STSClient {
103
102
* additional identity-based policy is required. For more information about trust policies and
104
103
* resource-based policies, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html">IAM Policies</a> in the
105
104
* <i>IAM User Guide</i>.</p>
106
-
*
107
105
* <p>
108
106
* <b>Tags</b>
109
107
* </p>
@@ -242,15 +240,13 @@ export class STS extends STSClient {
242
240
* characters and the values can’t exceed 256 characters. For these and additional limits, see
* and STS Character Limits</a> in the <i>IAM User Guide</i>.</p>
399
-
*
400
395
* <note>
401
396
* <p>An Amazon Web Services conversion compresses the passed inline session policy, managed policy ARNs,
402
397
* and session tags into a packed binary format that has a separate limit. Your request can
403
398
* fail for this limit even if your plaintext meets the other requirements. The
404
399
* <code>PackedPolicySize</code> response element indicates by percentage how close the
405
400
* policies and tags for your request are to the upper size limit.</p>
406
401
* </note>
407
-
*
408
402
* <p>You can pass a session tag with the same key as a tag that is attached to the role. When
409
403
* you do, the session tag overrides the role tag with the same key.</p>
410
404
* <p>An administrator must grant you the permissions necessary to pass session tags. The
@@ -682,15 +676,16 @@ export class STS extends STSClient {
682
676
* <b>Permissions</b>
683
677
* </p>
684
678
* <p>You can use the temporary credentials created by <code>GetFederationToken</code> in any
685
-
* Amazon Web Services service except the following:</p>
679
+
* Amazon Web Services service with the following exceptions:</p>
686
680
* <ul>
687
681
* <li>
688
-
* <p>You cannot call any IAM operations using the CLI or the Amazon Web Services API. </p>
682
+
* <p>You cannot call any IAM operations using the CLI or the Amazon Web Services API. This limitation does not apply to console sessions.</p>
689
683
* </li>
690
684
* <li>
691
685
* <p>You cannot call any STS operations except <code>GetCallerIdentity</code>.</p>
692
686
* </li>
693
687
* </ul>
688
+
* <p>You can use temporary credentials for single sign-on (SSO) to the console.</p>
694
689
* <p>You must pass an inline or managed <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session">session policy</a> to
695
690
* this operation. You can pass a single JSON policy document to use as an inline session
696
691
* policy. You can also specify up to 10 managed policy Amazon Resource Names (ARNs) to use as
* <p>Returns a set of temporary security credentials that you can use to access Amazon Web Services
31
-
* resources that you might not normally have access to. These temporary credentials consist
32
-
* of an access key ID, a secret access key, and a security token. Typically, you use
33
-
* <code>AssumeRole</code> within your account or for cross-account access. For a
34
-
* comparison of <code>AssumeRole</code> with other API operations that produce temporary
35
-
* credentials, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html">Requesting Temporary Security
31
+
* resources. These temporary credentials consist of an access key ID, a secret access key,
32
+
* and a security token. Typically, you use <code>AssumeRole</code> within your account or for
33
+
* cross-account access. For a comparison of <code>AssumeRole</code> with other API operations
34
+
* that produce temporary credentials, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html">Requesting Temporary Security
36
35
* Credentials</a> and <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#stsapi_comparison">Comparing the
37
36
* Amazon Web Services STS API operations</a> in the <i>IAM User Guide</i>.</p>
* <p>You can use the temporary credentials created by <code>GetFederationToken</code> in any
67
-
* Amazon Web Services service except the following:</p>
67
+
* Amazon Web Services service with the following exceptions:</p>
68
68
* <ul>
69
69
* <li>
70
-
* <p>You cannot call any IAM operations using the CLI or the Amazon Web Services API. </p>
70
+
* <p>You cannot call any IAM operations using the CLI or the Amazon Web Services API. This limitation does not apply to console sessions.</p>
71
71
* </li>
72
72
* <li>
73
73
* <p>You cannot call any STS operations except <code>GetCallerIdentity</code>.</p>
74
74
* </li>
75
75
* </ul>
76
+
* <p>You can use temporary credentials for single sign-on (SSO) to the console.</p>
76
77
* <p>You must pass an inline or managed <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session">session policy</a> to
77
78
* this operation. You can pass a single JSON policy document to use as an inline session
78
79
* policy. You can also specify up to 10 managed policy Amazon Resource Names (ARNs) to use as
const_data={version:"1.0",parameters:{Region:o,UseDualStack:p,UseFIPS:p,Endpoint:o,UseGlobalEndpoint:p},rules:[{conditions:[{[I]:"aws.partition",[J]:[q],assign:c}],type:d,rules:[{conditions:[{[I]:e,[J]:[{[K]:"UseGlobalEndpoint"},b]},{[I]:e,[J]:[r,a]},{[I]:e,[J]:[s,a]},{[I]:"not",[J]:[t]}],type:d,rules:[{conditions:[{[I]:f,[J]:[q,"ap-northeast-1"]}],endpoint:v,type:k},{conditions:[{[I]:f,[J]:[q,"ap-south-1"]}],endpoint:v,type:k},{conditions:[{[I]:f,[J]:[q,"ap-southeast-1"]}],endpoint:v,type:k},{conditions:[{[I]:f,[J]:[q,"ap-southeast-2"]}],endpoint:v,type:k},{conditions:E,endpoint:v,type:k},{conditions:[{[I]:f,[J]:[q,"ca-central-1"]}],endpoint:v,type:k},{conditions:[{[I]:f,[J]:[q,"eu-central-1"]}],endpoint:v,type:k},{conditions:[{[I]:f,[J]:[q,"eu-north-1"]}],endpoint:v,type:k},{conditions:[{[I]:f,[J]:[q,"eu-west-1"]}],endpoint:v,type:k},{conditions:[{[I]:f,[J]:[q,"eu-west-2"]}],endpoint:v,type:k},{conditions:[{[I]:f,[J]:[q,"eu-west-3"]}],endpoint:v,type:k},{conditions:[{[I]:f,[J]:[q,"sa-east-1"]}],endpoint:v,type:k},{conditions:[{[I]:f,[J]:[q,j]}],endpoint:v,type:k},{conditions:[{[I]:f,[J]:[q,"us-east-2"]}],endpoint:v,type:k},{conditions:[{[I]:f,[J]:[q,"us-west-1"]}],endpoint:v,type:k},{conditions:[{[I]:f,[J]:[q,"us-west-2"]}],endpoint:v,type:k},{endpoint:{url:l,[L]:{authSchemes:[{name:h,signingName:i,signingRegion:"{Region}"}]},[M]:w},type:k}]},{conditions:[t,{[I]:"parseURL",[J]:D,assign:"url"}],type:d,rules:[{conditions:F,error:"Invalid Configuration: FIPS and custom endpoint are not supported",type:m},{type:d,rules:[{conditions:G,error:"Invalid Configuration: Dualstack and custom endpoint are not supported",type:m},{endpoint:{url:u,[L]:w,[M]:w},type:k}]}]},{conditions:[x,y],type:d,rules:[{conditions:[z,B],type:d,rules:[{endpoint:{url:"https://sts-fips.{Region}.{PartitionResult#dualStackDnsSuffix}",[L]:w,[M]:w},type:k}]},{error:"FIPS and DualStack are enabled, but this partition does not support one or both",type:m}]},{conditions:F,type:d,rules:[{conditions:[z],type:d,rules:[{type:d,rules:[{conditions:[{[I]:f,[J]:["aws-us-gov",{[I]:n,[J]:[A,"name"]}]}],endpoint:C,type:k},{endpoint:{url:"https://sts-fips.{Region}.{PartitionResult#dnsSuffix}",[L]:w,[M]:w},type:k}]}]},{error:"FIPS is enabled but this partition does not support FIPS",type:m}]},{conditions:G,type:d,rules:[{conditions:[B],type:d,rules:[{endpoint:{url:"https://sts.{Region}.{PartitionResult#dualStackDnsSuffix}",[L]:w,[M]:w},type:k}]},{error:"DualStack is enabled but this partition does not support DualStack",type:m}]},{type:d,rules:[{conditions:E,endpoint:{url:g,[L]:{authSchemes:[{name:h,signingRegion:j,signingName:i}]},[M]:w},type:k},{endpoint:C,type:k}]}]}]};
const_data={version:"1.0",parameters:{Region:n,UseDualStack:o,UseFIPS:o,Endpoint:n,UseGlobalEndpoint:o},rules:[{conditions:[{[I]:"aws.partition",[J]:[p],assign:c}],[H]:d,rules:[{conditions:[{[I]:e,[J]:[{[K]:"UseGlobalEndpoint"},b]},{[I]:e,[J]:[q,a]},{[I]:e,[J]:[r,a]},{[I]:"not",[J]:[s]}],[H]:d,rules:[{conditions:[{[I]:f,[J]:[p,"ap-northeast-1"]}],endpoint:u,[H]:j},{conditions:[{[I]:f,[J]:[p,"ap-south-1"]}],endpoint:u,[H]:j},{conditions:[{[I]:f,[J]:[p,"ap-southeast-1"]}],endpoint:u,[H]:j},{conditions:[{[I]:f,[J]:[p,"ap-southeast-2"]}],endpoint:u,[H]:j},w,{conditions:[{[I]:f,[J]:[p,"ca-central-1"]}],endpoint:u,[H]:j},{conditions:[{[I]:f,[J]:[p,"eu-central-1"]}],endpoint:u,[H]:j},{conditions:[{[I]:f,[J]:[p,"eu-north-1"]}],endpoint:u,[H]:j},{conditions:[{[I]:f,[J]:[p,"eu-west-1"]}],endpoint:u,[H]:j},{conditions:[{[I]:f,[J]:[p,"eu-west-2"]}],endpoint:u,[H]:j},{conditions:[{[I]:f,[J]:[p,"eu-west-3"]}],endpoint:u,[H]:j},{conditions:[{[I]:f,[J]:[p,"sa-east-1"]}],endpoint:u,[H]:j},{conditions:[{[I]:f,[J]:[p,h]}],endpoint:u,[H]:j},{conditions:[{[I]:f,[J]:[p,"us-east-2"]}],endpoint:u,[H]:j},{conditions:[{[I]:f,[J]:[p,"us-west-1"]}],endpoint:u,[H]:j},{conditions:[{[I]:f,[J]:[p,"us-west-2"]}],endpoint:u,[H]:j},{endpoint:{url:k,[L]:{authSchemes:[{name:g,signingRegion:"{Region}",signingName:i}]},[M]:v},[H]:j}]},{conditions:[s,{[I]:"parseURL",[J]:D,assign:"url"}],[H]:d,rules:[{conditions:E,error:"Invalid Configuration: FIPS and custom endpoint are not supported",[H]:l},{[H]:d,rules:[{conditions:F,error:"Invalid Configuration: Dualstack and custom endpoint are not supported",[H]:l},{endpoint:{url:t,[L]:v,[M]:v},[H]:j}]}]},{conditions:[x,y],[H]:d,rules:[{conditions:[z,B],[H]:d,rules:[{endpoint:{url:"https://sts-fips.{Region}.{PartitionResult#dualStackDnsSuffix}",[L]:v,[M]:v},[H]:j}]},{error:"FIPS and DualStack are enabled, but this partition does not support one or both",[H]:l}]},{conditions:E,[H]:d,rules:[{conditions:[z],[H]:d,rules:[{[H]:d,rules:[{conditions:[{[I]:f,[J]:["aws-us-gov",{[I]:m,[J]:[A,"name"]}]}],endpoint:C,[H]:j},{endpoint:{url:"https://sts-fips.{Region}.{PartitionResult#dnsSuffix}",[L]:v,[M]:v},[H]:j}]}]},{error:"FIPS is enabled but this partition does not support FIPS",[H]:l}]},{conditions:F,[H]:d,rules:[{conditions:[B],[H]:d,rules:[{endpoint:{url:"https://sts.{Region}.{PartitionResult#dualStackDnsSuffix}",[L]:v,[M]:v},[H]:j}]},{error:"DualStack is enabled but this partition does not support DualStack",[H]:l}]},{[H]:d,rules:[w,{endpoint:C,[H]:j}]}]}]};
0 commit comments