Huge News!Announcing our $40M Series B led by Abstract Ventures.Learn More
Socket
Sign inDemoInstall
Socket

@aws-sdk/client-sts

Package Overview
Dependencies
Maintainers
5
Versions
405
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

@aws-sdk/client-sts - npm Package Compare versions

Comparing version 3.691.0 to 3.692.0

dist-es/commands/AssumeRootCommand.js

101

dist-cjs/index.js

@@ -33,3 +33,5 @@ "use strict";

AssumeRoleWithWebIdentityResponseFilterSensitiveLog: () => AssumeRoleWithWebIdentityResponseFilterSensitiveLog,
ClientInputEndpointParameters: () => import_EndpointParameters9.ClientInputEndpointParameters,
AssumeRootCommand: () => AssumeRootCommand,
AssumeRootResponseFilterSensitiveLog: () => AssumeRootResponseFilterSensitiveLog,
ClientInputEndpointParameters: () => import_EndpointParameters10.ClientInputEndpointParameters,
CredentialsFilterSensitiveLog: () => CredentialsFilterSensitiveLog,

@@ -247,2 +249,6 @@ DecodeAuthorizationMessageCommand: () => DecodeAuthorizationMessageCommand,

}), "AssumeRoleWithWebIdentityResponseFilterSensitiveLog");
var AssumeRootResponseFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({
...obj,
...obj.Credentials && { Credentials: CredentialsFilterSensitiveLog(obj.Credentials) }
}), "AssumeRootResponseFilterSensitiveLog");
var GetFederationTokenResponseFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({

@@ -291,2 +297,12 @@ ...obj,

}, "se_AssumeRoleWithWebIdentityCommand");
var se_AssumeRootCommand = /* @__PURE__ */ __name(async (input, context) => {
const headers = SHARED_HEADERS;
let body;
body = buildFormUrlencodedString({
...se_AssumeRootRequest(input, context),
[_A]: _ARs,
[_V]: _
});
return buildHttpRpcRequest(context, headers, "/", void 0, body);
}, "se_AssumeRootCommand");
var se_DecodeAuthorizationMessageCommand = /* @__PURE__ */ __name(async (input, context) => {

@@ -381,2 +397,15 @@ const headers = SHARED_HEADERS;

}, "de_AssumeRoleWithWebIdentityCommand");
var de_AssumeRootCommand = /* @__PURE__ */ __name(async (output, context) => {
if (output.statusCode >= 300) {
return de_CommandError(output, context);
}
const data = await (0, import_core.parseXmlBody)(output.body, context);
let contents = {};
contents = de_AssumeRootResponse(data.AssumeRootResult, context);
const response = {
$metadata: deserializeMetadata(output),
...contents
};
return response;
}, "de_AssumeRootCommand");
var de_DecodeAuthorizationMessageCommand = /* @__PURE__ */ __name(async (output, context) => {

@@ -691,2 +720,19 @@ if (output.statusCode >= 300) {

}, "se_AssumeRoleWithWebIdentityRequest");
var se_AssumeRootRequest = /* @__PURE__ */ __name((input, context) => {
const entries = {};
if (input[_TP] != null) {
entries[_TP] = input[_TP];
}
if (input[_TPA] != null) {
const memberEntries = se_PolicyDescriptorType(input[_TPA], context);
Object.entries(memberEntries).forEach(([key, value]) => {
const loc = `TaskPolicyArn.${key}`;
entries[loc] = value;
});
}
if (input[_DS] != null) {
entries[_DS] = input[_DS];
}
return entries;
}, "se_AssumeRootRequest");
var se_DecodeAuthorizationMessageRequest = /* @__PURE__ */ __name((input, context) => {

@@ -923,2 +969,12 @@ const entries = {};

}, "de_AssumeRoleWithWebIdentityResponse");
var de_AssumeRootResponse = /* @__PURE__ */ __name((output, context) => {
const contents = {};
if (output[_C] != null) {
contents[_C] = de_Credentials(output[_C], context);
}
if (output[_SI] != null) {
contents[_SI] = (0, import_smithy_client.expectString)(output[_SI]);
}
return contents;
}, "de_AssumeRootResponse");
var de_Credentials = /* @__PURE__ */ __name((output, context) => {

@@ -1089,2 +1145,3 @@ const contents = {};

var _ARWWI = "AssumeRoleWithWebIdentity";
var _ARs = "AssumeRoot";
var _Ac = "Account";

@@ -1131,2 +1188,4 @@ var _Ar = "Arn";

var _TC = "TokenCode";
var _TP = "TargetPrincipal";
var _TPA = "TaskPolicyArn";
var _TTK = "TransitiveTagKeys";

@@ -1191,3 +1250,3 @@ var _UI = "UserId";

// src/commands/DecodeAuthorizationMessageCommand.ts
// src/commands/AssumeRootCommand.ts

@@ -1197,3 +1256,3 @@

var import_EndpointParameters4 = require("./endpoint/EndpointParameters");
var _DecodeAuthorizationMessageCommand = class _DecodeAuthorizationMessageCommand extends import_smithy_client.Command.classBuilder().ep(import_EndpointParameters4.commonParams).m(function(Command, cs, config, o) {
var _AssumeRootCommand = class _AssumeRootCommand extends import_smithy_client.Command.classBuilder().ep(import_EndpointParameters4.commonParams).m(function(Command, cs, config, o) {
return [

@@ -1203,2 +1262,17 @@ (0, import_middleware_serde.getSerdePlugin)(config, this.serialize, this.deserialize),

];
}).s("AWSSecurityTokenServiceV20110615", "AssumeRoot", {}).n("STSClient", "AssumeRootCommand").f(void 0, AssumeRootResponseFilterSensitiveLog).ser(se_AssumeRootCommand).de(de_AssumeRootCommand).build() {
};
__name(_AssumeRootCommand, "AssumeRootCommand");
var AssumeRootCommand = _AssumeRootCommand;
// src/commands/DecodeAuthorizationMessageCommand.ts
var import_EndpointParameters5 = require("./endpoint/EndpointParameters");
var _DecodeAuthorizationMessageCommand = class _DecodeAuthorizationMessageCommand extends import_smithy_client.Command.classBuilder().ep(import_EndpointParameters5.commonParams).m(function(Command, cs, config, o) {
return [
(0, import_middleware_serde.getSerdePlugin)(config, this.serialize, this.deserialize),
(0, import_middleware_endpoint.getEndpointPlugin)(config, Command.getEndpointParameterInstructions())
];
}).s("AWSSecurityTokenServiceV20110615", "DecodeAuthorizationMessage", {}).n("STSClient", "DecodeAuthorizationMessageCommand").f(void 0, void 0).ser(se_DecodeAuthorizationMessageCommand).de(de_DecodeAuthorizationMessageCommand).build() {

@@ -1213,4 +1287,4 @@ };

var import_EndpointParameters5 = require("./endpoint/EndpointParameters");
var _GetAccessKeyInfoCommand = class _GetAccessKeyInfoCommand extends import_smithy_client.Command.classBuilder().ep(import_EndpointParameters5.commonParams).m(function(Command, cs, config, o) {
var import_EndpointParameters6 = require("./endpoint/EndpointParameters");
var _GetAccessKeyInfoCommand = class _GetAccessKeyInfoCommand extends import_smithy_client.Command.classBuilder().ep(import_EndpointParameters6.commonParams).m(function(Command, cs, config, o) {
return [

@@ -1229,4 +1303,4 @@ (0, import_middleware_serde.getSerdePlugin)(config, this.serialize, this.deserialize),

var import_EndpointParameters6 = require("./endpoint/EndpointParameters");
var _GetCallerIdentityCommand = class _GetCallerIdentityCommand extends import_smithy_client.Command.classBuilder().ep(import_EndpointParameters6.commonParams).m(function(Command, cs, config, o) {
var import_EndpointParameters7 = require("./endpoint/EndpointParameters");
var _GetCallerIdentityCommand = class _GetCallerIdentityCommand extends import_smithy_client.Command.classBuilder().ep(import_EndpointParameters7.commonParams).m(function(Command, cs, config, o) {
return [

@@ -1245,4 +1319,4 @@ (0, import_middleware_serde.getSerdePlugin)(config, this.serialize, this.deserialize),

var import_EndpointParameters7 = require("./endpoint/EndpointParameters");
var _GetFederationTokenCommand = class _GetFederationTokenCommand extends import_smithy_client.Command.classBuilder().ep(import_EndpointParameters7.commonParams).m(function(Command, cs, config, o) {
var import_EndpointParameters8 = require("./endpoint/EndpointParameters");
var _GetFederationTokenCommand = class _GetFederationTokenCommand extends import_smithy_client.Command.classBuilder().ep(import_EndpointParameters8.commonParams).m(function(Command, cs, config, o) {
return [

@@ -1261,4 +1335,4 @@ (0, import_middleware_serde.getSerdePlugin)(config, this.serialize, this.deserialize),

var import_EndpointParameters8 = require("./endpoint/EndpointParameters");
var _GetSessionTokenCommand = class _GetSessionTokenCommand extends import_smithy_client.Command.classBuilder().ep(import_EndpointParameters8.commonParams).m(function(Command, cs, config, o) {
var import_EndpointParameters9 = require("./endpoint/EndpointParameters");
var _GetSessionTokenCommand = class _GetSessionTokenCommand extends import_smithy_client.Command.classBuilder().ep(import_EndpointParameters9.commonParams).m(function(Command, cs, config, o) {
return [

@@ -1279,2 +1353,3 @@ (0, import_middleware_serde.getSerdePlugin)(config, this.serialize, this.deserialize),

AssumeRoleWithWebIdentityCommand,
AssumeRootCommand,
DecodeAuthorizationMessageCommand,

@@ -1293,3 +1368,3 @@ GetAccessKeyInfoCommand,

// src/index.ts
var import_EndpointParameters9 = require("./endpoint/EndpointParameters");
var import_EndpointParameters10 = require("./endpoint/EndpointParameters");

@@ -1450,2 +1525,3 @@ // src/defaultStsRoleAssumers.ts

AssumeRoleWithWebIdentityCommand,
AssumeRootCommand,
DecodeAuthorizationMessageCommand,

@@ -1470,2 +1546,3 @@ GetAccessKeyInfoCommand,

AssumeRoleWithWebIdentityResponseFilterSensitiveLog,
AssumeRootResponseFilterSensitiveLog,
GetFederationTokenResponseFilterSensitiveLog,

@@ -1472,0 +1549,0 @@ GetSessionTokenResponseFilterSensitiveLog,

export * from "./AssumeRoleCommand";
export * from "./AssumeRoleWithSAMLCommand";
export * from "./AssumeRoleWithWebIdentityCommand";
export * from "./AssumeRootCommand";
export * from "./DecodeAuthorizationMessageCommand";

@@ -5,0 +6,0 @@ export * from "./GetAccessKeyInfoCommand";

@@ -123,2 +123,6 @@ import { SENSITIVE_STRING } from "@smithy/smithy-client";

});
export const AssumeRootResponseFilterSensitiveLog = (obj) => ({
...obj,
...(obj.Credentials && { Credentials: CredentialsFilterSensitiveLog(obj.Credentials) }),
});
export const GetFederationTokenResponseFilterSensitiveLog = (obj) => ({

@@ -125,0 +129,0 @@ ...obj,

@@ -36,2 +36,12 @@ import { parseXmlBody as parseBody, parseXmlErrorBody as parseErrorBody } from "@aws-sdk/core";

};
export const se_AssumeRootCommand = async (input, context) => {
const headers = SHARED_HEADERS;
let body;
body = buildFormUrlencodedString({
...se_AssumeRootRequest(input, context),
[_A]: _ARs,
[_V]: _,
});
return buildHttpRpcRequest(context, headers, "/", undefined, body);
};
export const se_DecodeAuthorizationMessageCommand = async (input, context) => {

@@ -126,2 +136,15 @@ const headers = SHARED_HEADERS;

};
export const de_AssumeRootCommand = async (output, context) => {
if (output.statusCode >= 300) {
return de_CommandError(output, context);
}
const data = await parseBody(output.body, context);
let contents = {};
contents = de_AssumeRootResponse(data.AssumeRootResult, context);
const response = {
$metadata: deserializeMetadata(output),
...contents,
};
return response;
};
export const de_DecodeAuthorizationMessageCommand = async (output, context) => {

@@ -433,2 +456,19 @@ if (output.statusCode >= 300) {

};
const se_AssumeRootRequest = (input, context) => {
const entries = {};
if (input[_TP] != null) {
entries[_TP] = input[_TP];
}
if (input[_TPA] != null) {
const memberEntries = se_PolicyDescriptorType(input[_TPA], context);
Object.entries(memberEntries).forEach(([key, value]) => {
const loc = `TaskPolicyArn.${key}`;
entries[loc] = value;
});
}
if (input[_DS] != null) {
entries[_DS] = input[_DS];
}
return entries;
};
const se_DecodeAuthorizationMessageRequest = (input, context) => {

@@ -664,2 +704,12 @@ const entries = {};

};
const de_AssumeRootResponse = (output, context) => {
const contents = {};
if (output[_C] != null) {
contents[_C] = de_Credentials(output[_C], context);
}
if (output[_SI] != null) {
contents[_SI] = __expectString(output[_SI]);
}
return contents;
};
const de_Credentials = (output, context) => {

@@ -831,2 +881,3 @@ const contents = {};

const _ARWWI = "AssumeRoleWithWebIdentity";
const _ARs = "AssumeRoot";
const _Ac = "Account";

@@ -873,2 +924,4 @@ const _Ar = "Arn";

const _TC = "TokenCode";
const _TP = "TargetPrincipal";
const _TPA = "TaskPolicyArn";
const _TTK = "TransitiveTagKeys";

@@ -875,0 +928,0 @@ const _UI = "UserId";

@@ -5,2 +5,3 @@ import { createAggregatedClient } from "@smithy/smithy-client";

import { AssumeRoleWithWebIdentityCommand, } from "./commands/AssumeRoleWithWebIdentityCommand";
import { AssumeRootCommand } from "./commands/AssumeRootCommand";
import { DecodeAuthorizationMessageCommand, } from "./commands/DecodeAuthorizationMessageCommand";

@@ -16,2 +17,3 @@ import { GetAccessKeyInfoCommand, } from "./commands/GetAccessKeyInfoCommand";

AssumeRoleWithWebIdentityCommand,
AssumeRootCommand,
DecodeAuthorizationMessageCommand,

@@ -18,0 +20,0 @@ GetAccessKeyInfoCommand,

26

dist-types/commands/AssumeRoleCommand.d.ts

@@ -35,4 +35,4 @@ import { Command as $Command } from "@smithy/smithy-client";

* that produce temporary credentials, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html">Requesting Temporary Security
* Credentials</a> and <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#stsapi_comparison">Comparing the
* Amazon Web Services STS API operations</a> in the <i>IAM User Guide</i>.</p>
* Credentials</a> and <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_sts-comparison.html">Compare STS
* credentials</a> in the <i>IAM User Guide</i>.</p>
* <p>

@@ -45,7 +45,7 @@ * <b>Permissions</b>

* operations.</p>
* <p>(Optional) You can pass inline or managed <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session">session policies</a> to
* this operation. You can pass a single JSON policy document to use as an inline session
* policy. You can also specify up to 10 managed policy Amazon Resource Names (ARNs) to use as
* managed session policies. The plaintext that you use for both inline and managed session
* policies can't exceed 2,048 characters. Passing policies to this operation returns new
* <p>(Optional) You can pass inline or managed session policies to this operation. You can
* pass a single JSON policy document to use as an inline session policy. You can also specify
* up to 10 managed policy Amazon Resource Names (ARNs) to use as managed session policies.
* The plaintext that you use for both inline and managed session policies can't exceed 2,048
* characters. Passing policies to this operation returns new
* temporary credentials. The resulting session's permissions are the intersection of the

@@ -197,11 +197,11 @@ * role's identity-based policy and the session policies. You can use the role's temporary

* <p>You could receive this error even though you meet other defined session policy and
* session tag limits. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-limits-entity-length">IAM and STS Entity
* Character Limits</a> in the <i>IAM User Guide</i>.</p>
* session tag limits. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-limits-entity-length">IAM and STS Entity Character Limits</a> in the <i>IAM User
* Guide</i>.</p>
*
* @throws {@link RegionDisabledException} (client fault)
* <p>STS is not activated in the requested region for the account that is being asked to
* generate credentials. The account administrator must use the IAM console to activate STS
* in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html">Activating and
* Deactivating Amazon Web Services STS in an Amazon Web Services Region</a> in the <i>IAM User
* Guide</i>.</p>
* generate credentials. The account administrator must use the IAM console to activate
* STS in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html">Activating and
* Deactivating STS in an Amazon Web Services Region</a> in the <i>IAM User
* Guide</i>.</p>
*

@@ -208,0 +208,0 @@ * @throws {@link STSServiceException}

@@ -35,4 +35,4 @@ import { Command as $Command } from "@smithy/smithy-client";

* other API operations that produce temporary credentials, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html">Requesting Temporary Security
* Credentials</a> and <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#stsapi_comparison">Comparing the
* Amazon Web Services STS API operations</a> in the <i>IAM User Guide</i>.</p>
* Credentials</a> and <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_sts-comparison.html">Compare STS
* credentials</a> in the <i>IAM User Guide</i>.</p>
* <p>The temporary security credentials returned by this operation consist of an access key

@@ -234,11 +234,11 @@ * ID, a secret access key, and a security token. Applications can use these temporary

* <p>You could receive this error even though you meet other defined session policy and
* session tag limits. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-limits-entity-length">IAM and STS Entity
* Character Limits</a> in the <i>IAM User Guide</i>.</p>
* session tag limits. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-limits-entity-length">IAM and STS Entity Character Limits</a> in the <i>IAM User
* Guide</i>.</p>
*
* @throws {@link RegionDisabledException} (client fault)
* <p>STS is not activated in the requested region for the account that is being asked to
* generate credentials. The account administrator must use the IAM console to activate STS
* in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html">Activating and
* Deactivating Amazon Web Services STS in an Amazon Web Services Region</a> in the <i>IAM User
* Guide</i>.</p>
* generate credentials. The account administrator must use the IAM console to activate
* STS in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html">Activating and
* Deactivating STS in an Amazon Web Services Region</a> in the <i>IAM User
* Guide</i>.</p>
*

@@ -245,0 +245,0 @@ * @throws {@link STSServiceException}

@@ -50,4 +50,4 @@ import { Command as $Command } from "@smithy/smithy-client";

* temporary credentials, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html">Requesting Temporary Security
* Credentials</a> and <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#stsapi_comparison">Comparing the
* Amazon Web Services STS API operations</a> in the <i>IAM User Guide</i>.</p>
* Credentials</a> and <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_sts-comparison.html">Compare STS
* credentials</a> in the <i>IAM User Guide</i>.</p>
* <p>The temporary security credentials returned by this API consist of an access key ID, a

@@ -64,4 +64,3 @@ * secret access key, and a security token. Applications can use these temporary security

* setting for the role. This setting can have a value from 1 hour to 12 hours. To learn how
* to view the maximum value for your role, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html#id_roles_use_view-role-max-session">View the
* Maximum Session Duration Setting for a Role</a> in the
* to view the maximum value for your role, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_update-role-settings.html#id_roles_update-session-duration">Update the maximum session duration for a role </a> in the
* <i>IAM User Guide</i>. The maximum session duration limit applies when

@@ -135,3 +134,3 @@ * you use the <code>AssumeRole*</code> API operations or the <code>assume-role*</code> CLI

* </important>
* <p>For more information about how to use web identity federation and the
* <p>For more information about how to use OIDC federation and the
* <code>AssumeRoleWithWebIdentity</code> API, see the following resources: </p>

@@ -145,9 +144,2 @@ * <ul>

* <p>
* <a href="https://aws.amazon.com/blogs/aws/the-aws-web-identity-federation-playground/"> Web Identity Federation Playground</a>. Walk through the process of
* authenticating through Login with Amazon, Facebook, or Google, getting temporary
* security credentials, and then using those credentials to make a request to Amazon Web Services.
* </p>
* </li>
* <li>
* <p>
* <a href="http://aws.amazon.com/sdkforios/">Amazon Web Services SDK for iOS Developer Guide</a> and <a href="http://aws.amazon.com/sdkforandroid/">Amazon Web Services SDK for Android Developer Guide</a>. These toolkits

@@ -158,9 +150,2 @@ * contain sample apps that show how to invoke the identity providers. The toolkits then

* </li>
* <li>
* <p>
* <a href="http://aws.amazon.com/articles/web-identity-federation-with-mobile-applications">Web Identity
* Federation with Mobile Applications</a>. This article discusses web identity
* federation and shows an example of how to use web identity federation to get access
* to content in Amazon S3. </p>
* </li>
* </ul>

@@ -219,7 +204,7 @@ * @example

* @throws {@link IDPCommunicationErrorException} (client fault)
* <p>The request could not be fulfilled because the identity provider (IDP) that
* was asked to verify the incoming identity token could not be reached. This is often a
* transient error caused by network conditions. Retry the request a limited number of
* times so that you don't exceed the request rate. If the error persists, the
* identity provider might be down or not responding.</p>
* <p>The request could not be fulfilled because the identity provider (IDP) that was asked
* to verify the incoming identity token could not be reached. This is often a transient
* error caused by network conditions. Retry the request a limited number of times so that
* you don't exceed the request rate. If the error persists, the identity provider might be
* down or not responding.</p>
*

@@ -248,11 +233,11 @@ * @throws {@link IDPRejectedClaimException} (client fault)

* <p>You could receive this error even though you meet other defined session policy and
* session tag limits. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-limits-entity-length">IAM and STS Entity
* Character Limits</a> in the <i>IAM User Guide</i>.</p>
* session tag limits. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-limits-entity-length">IAM and STS Entity Character Limits</a> in the <i>IAM User
* Guide</i>.</p>
*
* @throws {@link RegionDisabledException} (client fault)
* <p>STS is not activated in the requested region for the account that is being asked to
* generate credentials. The account administrator must use the IAM console to activate STS
* in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html">Activating and
* Deactivating Amazon Web Services STS in an Amazon Web Services Region</a> in the <i>IAM User
* Guide</i>.</p>
* generate credentials. The account administrator must use the IAM console to activate
* STS in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html">Activating and
* Deactivating STS in an Amazon Web Services Region</a> in the <i>IAM User
* Guide</i>.</p>
*

@@ -259,0 +244,0 @@ * @throws {@link STSServiceException}

@@ -91,4 +91,4 @@ import { Command as $Command } from "@smithy/smithy-client";

* <p>The error returned if the message passed to <code>DecodeAuthorizationMessage</code>
* was invalid. This can happen if the token contains invalid characters, such as
* linebreaks. </p>
* was invalid. This can happen if the token contains invalid characters, such as line
* breaks, or if the message has expired.</p>
*

@@ -95,0 +95,0 @@ * @throws {@link STSServiceException}

@@ -39,4 +39,4 @@ import { Command as $Command } from "@smithy/smithy-client";

* produce temporary credentials, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html">Requesting Temporary Security
* Credentials</a> and <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#stsapi_comparison">Comparing the
* Amazon Web Services STS API operations</a> in the <i>IAM User Guide</i>.</p>
* Credentials</a> and <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_sts-comparison.html">Compare STS
* credentials</a> in the <i>IAM User Guide</i>.</p>
* <p>Although it is possible to call <code>GetFederationToken</code> using the security

@@ -178,11 +178,11 @@ * credentials of an Amazon Web Services account root user rather than an IAM user that you

* <p>You could receive this error even though you meet other defined session policy and
* session tag limits. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-limits-entity-length">IAM and STS Entity
* Character Limits</a> in the <i>IAM User Guide</i>.</p>
* session tag limits. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html#reference_iam-limits-entity-length">IAM and STS Entity Character Limits</a> in the <i>IAM User
* Guide</i>.</p>
*
* @throws {@link RegionDisabledException} (client fault)
* <p>STS is not activated in the requested region for the account that is being asked to
* generate credentials. The account administrator must use the IAM console to activate STS
* in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html">Activating and
* Deactivating Amazon Web Services STS in an Amazon Web Services Region</a> in the <i>IAM User
* Guide</i>.</p>
* generate credentials. The account administrator must use the IAM console to activate
* STS in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html">Activating and
* Deactivating STS in an Amazon Web Services Region</a> in the <i>IAM User
* Guide</i>.</p>
*

@@ -189,0 +189,0 @@ * @throws {@link STSServiceException}

@@ -41,4 +41,4 @@ import { Command as $Command } from "@smithy/smithy-client";

* the other API operations that produce temporary credentials, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html">Requesting
* Temporary Security Credentials</a> and <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#stsapi_comparison">Comparing the
* Amazon Web Services STS API operations</a> in the <i>IAM User Guide</i>.</p>
* Temporary Security Credentials</a> and <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_sts-comparison.html">Compare STS
* credentials</a> in the <i>IAM User Guide</i>.</p>
* <note>

@@ -122,6 +122,6 @@ * <p>No permissions are required for users to perform this operation. The purpose of the

* <p>STS is not activated in the requested region for the account that is being asked to
* generate credentials. The account administrator must use the IAM console to activate STS
* in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html">Activating and
* Deactivating Amazon Web Services STS in an Amazon Web Services Region</a> in the <i>IAM User
* Guide</i>.</p>
* generate credentials. The account administrator must use the IAM console to activate
* STS in that region. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html">Activating and
* Deactivating STS in an Amazon Web Services Region</a> in the <i>IAM User
* Guide</i>.</p>
*

@@ -128,0 +128,0 @@ * @throws {@link STSServiceException}

export * from "./AssumeRoleCommand";
export * from "./AssumeRoleWithSAMLCommand";
export * from "./AssumeRoleWithWebIdentityCommand";
export * from "./AssumeRootCommand";
export * from "./DecodeAuthorizationMessageCommand";

@@ -5,0 +6,0 @@ export * from "./GetAccessKeyInfoCommand";

@@ -6,2 +6,3 @@ import { HttpRequest as __HttpRequest, HttpResponse as __HttpResponse } from "@smithy/protocol-http";

import { AssumeRoleWithWebIdentityCommandInput, AssumeRoleWithWebIdentityCommandOutput } from "../commands/AssumeRoleWithWebIdentityCommand";
import { AssumeRootCommandInput, AssumeRootCommandOutput } from "../commands/AssumeRootCommand";
import { DecodeAuthorizationMessageCommandInput, DecodeAuthorizationMessageCommandOutput } from "../commands/DecodeAuthorizationMessageCommand";

@@ -25,2 +26,6 @@ import { GetAccessKeyInfoCommandInput, GetAccessKeyInfoCommandOutput } from "../commands/GetAccessKeyInfoCommand";

/**
* serializeAws_queryAssumeRootCommand
*/
export declare const se_AssumeRootCommand: (input: AssumeRootCommandInput, context: __SerdeContext) => Promise<__HttpRequest>;
/**
* serializeAws_queryDecodeAuthorizationMessageCommand

@@ -58,2 +63,6 @@ */

/**
* deserializeAws_queryAssumeRootCommand
*/
export declare const de_AssumeRootCommand: (output: __HttpResponse, context: __SerdeContext) => Promise<AssumeRootCommandOutput>;
/**
* deserializeAws_queryDecodeAuthorizationMessageCommand

@@ -60,0 +69,0 @@ */

@@ -5,2 +5,3 @@ import { HttpHandlerOptions as __HttpHandlerOptions } from "@smithy/types";

import { AssumeRoleWithWebIdentityCommandInput, AssumeRoleWithWebIdentityCommandOutput } from "./commands/AssumeRoleWithWebIdentityCommand";
import { AssumeRootCommandInput, AssumeRootCommandOutput } from "./commands/AssumeRootCommand";
import { DecodeAuthorizationMessageCommandInput, DecodeAuthorizationMessageCommandOutput } from "./commands/DecodeAuthorizationMessageCommand";

@@ -32,2 +33,8 @@ import { GetAccessKeyInfoCommandInput, GetAccessKeyInfoCommandOutput } from "./commands/GetAccessKeyInfoCommand";

/**
* @see {@link AssumeRootCommand}
*/
assumeRoot(args: AssumeRootCommandInput, options?: __HttpHandlerOptions): Promise<AssumeRootCommandOutput>;
assumeRoot(args: AssumeRootCommandInput, cb: (err: any, data?: AssumeRootCommandOutput) => void): void;
assumeRoot(args: AssumeRootCommandInput, options: __HttpHandlerOptions, cb: (err: any, data?: AssumeRootCommandOutput) => void): void;
/**
* @see {@link DecodeAuthorizationMessageCommand}

@@ -34,0 +41,0 @@ */

@@ -13,2 +13,3 @@ import { HostHeaderInputConfig, HostHeaderResolvedConfig } from "@aws-sdk/middleware-host-header";

import { AssumeRoleWithWebIdentityCommandInput, AssumeRoleWithWebIdentityCommandOutput } from "./commands/AssumeRoleWithWebIdentityCommand";
import { AssumeRootCommandInput, AssumeRootCommandOutput } from "./commands/AssumeRootCommand";
import { DecodeAuthorizationMessageCommandInput, DecodeAuthorizationMessageCommandOutput } from "./commands/DecodeAuthorizationMessageCommand";

@@ -25,7 +26,7 @@ import { GetAccessKeyInfoCommandInput, GetAccessKeyInfoCommandOutput } from "./commands/GetAccessKeyInfoCommand";

*/
export type ServiceInputTypes = AssumeRoleCommandInput | AssumeRoleWithSAMLCommandInput | AssumeRoleWithWebIdentityCommandInput | DecodeAuthorizationMessageCommandInput | GetAccessKeyInfoCommandInput | GetCallerIdentityCommandInput | GetFederationTokenCommandInput | GetSessionTokenCommandInput;
export type ServiceInputTypes = AssumeRoleCommandInput | AssumeRoleWithSAMLCommandInput | AssumeRoleWithWebIdentityCommandInput | AssumeRootCommandInput | DecodeAuthorizationMessageCommandInput | GetAccessKeyInfoCommandInput | GetCallerIdentityCommandInput | GetFederationTokenCommandInput | GetSessionTokenCommandInput;
/**
* @public
*/
export type ServiceOutputTypes = AssumeRoleCommandOutput | AssumeRoleWithSAMLCommandOutput | AssumeRoleWithWebIdentityCommandOutput | DecodeAuthorizationMessageCommandOutput | GetAccessKeyInfoCommandOutput | GetCallerIdentityCommandOutput | GetFederationTokenCommandOutput | GetSessionTokenCommandOutput;
export type ServiceOutputTypes = AssumeRoleCommandOutput | AssumeRoleWithSAMLCommandOutput | AssumeRoleWithWebIdentityCommandOutput | AssumeRootCommandOutput | DecodeAuthorizationMessageCommandOutput | GetAccessKeyInfoCommandOutput | GetCallerIdentityCommandOutput | GetFederationTokenCommandOutput | GetSessionTokenCommandOutput;
/**

@@ -32,0 +33,0 @@ * @public

export * from "./AssumeRoleCommand";
export * from "./AssumeRoleWithSAMLCommand";
export * from "./AssumeRoleWithWebIdentityCommand";
export * from "./AssumeRootCommand";
export * from "./DecodeAuthorizationMessageCommand";

@@ -5,0 +6,0 @@ export * from "./GetAccessKeyInfoCommand";

@@ -133,2 +133,11 @@ import { ExceptionOptionType as __ExceptionOptionType } from "@smithy/smithy-client";

}
export interface AssumeRootRequest {
TargetPrincipal: string | undefined;
TaskPolicyArn: PolicyDescriptorType | undefined;
DurationSeconds?: number | undefined;
}
export interface AssumeRootResponse {
Credentials?: Credentials | undefined;
SourceIdentity?: string | undefined;
}
export interface DecodeAuthorizationMessageRequest {

@@ -202,2 +211,5 @@ EncodedMessage: string | undefined;

) => any;
export declare const AssumeRootResponseFilterSensitiveLog: (
obj: AssumeRootResponse
) => any;
export declare const GetFederationTokenResponseFilterSensitiveLog: (

@@ -204,0 +216,0 @@ obj: GetFederationTokenResponse

@@ -19,2 +19,6 @@ import {

import {
AssumeRootCommandInput,
AssumeRootCommandOutput,
} from "../commands/AssumeRootCommand";
import {
DecodeAuthorizationMessageCommandInput,

@@ -51,2 +55,6 @@ DecodeAuthorizationMessageCommandOutput,

) => Promise<__HttpRequest>;
export declare const se_AssumeRootCommand: (
input: AssumeRootCommandInput,
context: __SerdeContext
) => Promise<__HttpRequest>;
export declare const se_DecodeAuthorizationMessageCommand: (

@@ -84,2 +92,6 @@ input: DecodeAuthorizationMessageCommandInput,

) => Promise<AssumeRoleWithWebIdentityCommandOutput>;
export declare const de_AssumeRootCommand: (
output: __HttpResponse,
context: __SerdeContext
) => Promise<AssumeRootCommandOutput>;
export declare const de_DecodeAuthorizationMessageCommand: (

@@ -86,0 +98,0 @@ output: __HttpResponse,

@@ -15,2 +15,6 @@ import { HttpHandlerOptions as __HttpHandlerOptions } from "@smithy/types";

import {
AssumeRootCommandInput,
AssumeRootCommandOutput,
} from "./commands/AssumeRootCommand";
import {
DecodeAuthorizationMessageCommandInput,

@@ -76,2 +80,15 @@ DecodeAuthorizationMessageCommandOutput,

): void;
assumeRoot(
args: AssumeRootCommandInput,
options?: __HttpHandlerOptions
): Promise<AssumeRootCommandOutput>;
assumeRoot(
args: AssumeRootCommandInput,
cb: (err: any, data?: AssumeRootCommandOutput) => void
): void;
assumeRoot(
args: AssumeRootCommandInput,
options: __HttpHandlerOptions,
cb: (err: any, data?: AssumeRootCommandOutput) => void
): void;
decodeAuthorizationMessage(

@@ -78,0 +95,0 @@ args: DecodeAuthorizationMessageCommandInput,

@@ -61,2 +61,6 @@ import {

import {
AssumeRootCommandInput,
AssumeRootCommandOutput,
} from "./commands/AssumeRootCommand";
import {
DecodeAuthorizationMessageCommandInput,

@@ -92,2 +96,3 @@ DecodeAuthorizationMessageCommandOutput,

| AssumeRoleWithWebIdentityCommandInput
| AssumeRootCommandInput
| DecodeAuthorizationMessageCommandInput

@@ -102,2 +107,3 @@ | GetAccessKeyInfoCommandInput

| AssumeRoleWithWebIdentityCommandOutput
| AssumeRootCommandOutput
| DecodeAuthorizationMessageCommandOutput

@@ -104,0 +110,0 @@ | GetAccessKeyInfoCommandOutput

{
"name": "@aws-sdk/client-sts",
"description": "AWS SDK for JavaScript Sts Client for Node.js, Browser and React Native",
"version": "3.691.0",
"version": "3.692.0",
"scripts": {

@@ -25,38 +25,38 @@ "build": "concurrently 'yarn:build:cjs' 'yarn:build:es' 'yarn:build:types'",

"@aws-crypto/sha256-js": "5.2.0",
"@aws-sdk/client-sso-oidc": "3.691.0",
"@aws-sdk/core": "3.691.0",
"@aws-sdk/credential-provider-node": "3.691.0",
"@aws-sdk/middleware-host-header": "3.686.0",
"@aws-sdk/middleware-logger": "3.686.0",
"@aws-sdk/middleware-recursion-detection": "3.686.0",
"@aws-sdk/middleware-user-agent": "3.691.0",
"@aws-sdk/region-config-resolver": "3.686.0",
"@aws-sdk/types": "3.686.0",
"@aws-sdk/util-endpoints": "3.686.0",
"@aws-sdk/util-user-agent-browser": "3.686.0",
"@aws-sdk/util-user-agent-node": "3.691.0",
"@smithy/config-resolver": "^3.0.10",
"@smithy/core": "^2.5.1",
"@smithy/fetch-http-handler": "^4.0.0",
"@smithy/hash-node": "^3.0.8",
"@smithy/invalid-dependency": "^3.0.8",
"@smithy/middleware-content-length": "^3.0.10",
"@smithy/middleware-endpoint": "^3.2.1",
"@smithy/middleware-retry": "^3.0.25",
"@smithy/middleware-serde": "^3.0.8",
"@smithy/middleware-stack": "^3.0.8",
"@smithy/node-config-provider": "^3.1.9",
"@smithy/node-http-handler": "^3.2.5",
"@smithy/protocol-http": "^4.1.5",
"@smithy/smithy-client": "^3.4.2",
"@smithy/types": "^3.6.0",
"@smithy/url-parser": "^3.0.8",
"@aws-sdk/client-sso-oidc": "3.692.0",
"@aws-sdk/core": "3.692.0",
"@aws-sdk/credential-provider-node": "3.692.0",
"@aws-sdk/middleware-host-header": "3.692.0",
"@aws-sdk/middleware-logger": "3.692.0",
"@aws-sdk/middleware-recursion-detection": "3.692.0",
"@aws-sdk/middleware-user-agent": "3.692.0",
"@aws-sdk/region-config-resolver": "3.692.0",
"@aws-sdk/types": "3.692.0",
"@aws-sdk/util-endpoints": "3.692.0",
"@aws-sdk/util-user-agent-browser": "3.692.0",
"@aws-sdk/util-user-agent-node": "3.692.0",
"@smithy/config-resolver": "^3.0.11",
"@smithy/core": "^2.5.2",
"@smithy/fetch-http-handler": "^4.1.0",
"@smithy/hash-node": "^3.0.9",
"@smithy/invalid-dependency": "^3.0.9",
"@smithy/middleware-content-length": "^3.0.11",
"@smithy/middleware-endpoint": "^3.2.2",
"@smithy/middleware-retry": "^3.0.26",
"@smithy/middleware-serde": "^3.0.9",
"@smithy/middleware-stack": "^3.0.9",
"@smithy/node-config-provider": "^3.1.10",
"@smithy/node-http-handler": "^3.3.0",
"@smithy/protocol-http": "^4.1.6",
"@smithy/smithy-client": "^3.4.3",
"@smithy/types": "^3.7.0",
"@smithy/url-parser": "^3.0.9",
"@smithy/util-base64": "^3.0.0",
"@smithy/util-body-length-browser": "^3.0.0",
"@smithy/util-body-length-node": "^3.0.0",
"@smithy/util-defaults-mode-browser": "^3.0.25",
"@smithy/util-defaults-mode-node": "^3.0.25",
"@smithy/util-endpoints": "^2.1.4",
"@smithy/util-middleware": "^3.0.8",
"@smithy/util-retry": "^3.0.8",
"@smithy/util-defaults-mode-browser": "^3.0.26",
"@smithy/util-defaults-mode-node": "^3.0.26",
"@smithy/util-endpoints": "^2.1.5",
"@smithy/util-middleware": "^3.0.9",
"@smithy/util-retry": "^3.0.9",
"@smithy/util-utf8": "^3.0.0",

@@ -63,0 +63,0 @@ "tslib": "^2.6.2"

@@ -236,2 +236,10 @@ <!-- generated file, do not edit directly -->

<summary>
AssumeRoot
</summary>
[Command API Reference](https://docs.aws.amazon.com/AWSJavaScriptSDK/v3/latest/client/sts/command/AssumeRootCommand/) / [Input](https://docs.aws.amazon.com/AWSJavaScriptSDK/v3/latest/Package/-aws-sdk-client-sts/Interface/AssumeRootCommandInput/) / [Output](https://docs.aws.amazon.com/AWSJavaScriptSDK/v3/latest/Package/-aws-sdk-client-sts/Interface/AssumeRootCommandOutput/)
</details>
<details>
<summary>
DecodeAuthorizationMessage

@@ -238,0 +246,0 @@ </summary>

Sorry, the diff of this file is too big to display

SocketSocket SOC 2 Logo

Product

  • Package Alerts
  • Integrations
  • Docs
  • Pricing
  • FAQ
  • Roadmap
  • Changelog

Packages

npm

Stay in touch

Get open source security insights delivered straight into your inbox.


  • Terms
  • Privacy
  • Security

Made with ⚡️ by Socket Inc