/*******************************************************************************
* Copyright 2012-2019 Amazon.com, Inc. or its affiliates. All Rights Reserved.
* Licensed under the Apache License, Version 2.0 (the "License"). You may not use
* this file except in compliance with the License. A copy of the License is located at
*
* http://aws.amazon.com/apache2.0
*
* or in the "license" file accompanying this file.
* This file is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR
* CONDITIONS OF ANY KIND, either express or implied. See the License for the
* specific language governing permissions and limitations under the License.
* *****************************************************************************
*
* AWS Tools for Windows (TM) PowerShell (TM)
*
*/
using System;
using System.Collections.Generic;
using System.Linq;
using System.Management.Automation;
using System.Text;
using Amazon.PowerShell.Common;
using Amazon.Runtime;
using Amazon.SecurityToken;
using Amazon.SecurityToken.Model;
namespace Amazon.PowerShell.Cmdlets.STS
{
///
/// Returns a set of temporary security credentials (consisting of an access key ID, a
/// secret access key, and a security token) for a user. A typical use is in a proxy application
/// that gets temporary security credentials on behalf of distributed applications inside
/// a corporate network.
///
///
///
/// You must call the GetFederationToken
operation using the long-term security
/// credentials of an IAM user. As a result, this call is appropriate in contexts where
/// those credentials can be safeguarded, usually in a server-based application. For a
/// comparison of GetFederationToken
with the other API operations that produce
/// temporary credentials, see Requesting
/// Temporary Security Credentials and Comparing
/// the Amazon Web Services STS API operations in the IAM User Guide.
///
/// Although it is possible to call GetFederationToken
using the security
/// credentials of an Amazon Web Services account root user rather than an IAM user that
/// you create for the purpose of a proxy application, we do not recommend it. For more
/// information, see Safeguard
/// your root user credentials and don't use them for everyday tasks in the IAM
/// User Guide.
///
/// You can create a mobile-based or browser-based app that can authenticate users using
/// a web identity provider like Login with Amazon, Facebook, Google, or an OpenID Connect-compatible
/// identity provider. In this case, we recommend that you use Amazon
/// Cognito or AssumeRoleWithWebIdentity
. For more information, see Federation
/// Through a Web-based Identity Provider in the IAM User Guide.
/// Session duration
/// The temporary credentials are valid for the specified duration, from 900 seconds (15
/// minutes) up to a maximum of 129,600 seconds (36 hours). The default session duration
/// is 43,200 seconds (12 hours). Temporary credentials obtained by using the root user
/// credentials have a maximum duration of 3,600 seconds (1 hour).
/// Permissions
/// You can use the temporary credentials created by GetFederationToken
in
/// any Amazon Web Services service with the following exceptions:
/// -
/// You cannot call any IAM operations using the CLI or the Amazon Web Services API. This
/// limitation does not apply to console sessions.
///
-
/// You cannot call any STS operations except
GetCallerIdentity
.
///
/// You can use temporary credentials for single sign-on (SSO) to the console.
///
/// You must pass an inline or managed session
/// policy to this operation. You can pass a single JSON policy document to use as
/// an inline session policy. You can also specify up to 10 managed policy Amazon Resource
/// Names (ARNs) to use as managed session policies. The plaintext that you use for both
/// inline and managed session policies can't exceed 2,048 characters.
///
/// Though the session policy parameters are optional, if you do not pass a policy, then
/// the resulting federated user session has no permissions. When you pass session policies,
/// the session permissions are the intersection of the IAM user policies and the session
/// policies that you pass. This gives you a way to further restrict the permissions for
/// a federated user. You cannot use session policies to grant more permissions than those
/// that are defined in the permissions policy of the IAM user. For more information,
/// see Session
/// Policies in the IAM User Guide. For information about using GetFederationToken
/// to create temporary security credentials, see GetFederationToken—Federation
/// Through a Custom Identity Broker.
///
/// You can use the credentials to access a resource that has a resource-based policy.
/// If that policy specifically references the federated user session in the Principal
/// element of the policy, the session has the permissions allowed by the policy. These
/// permissions are granted in addition to the permissions granted by the session policies.
/// Tags
/// (Optional) You can pass tag key-value pairs to your session. These are called session
/// tags. For more information about session tags, see Passing
/// Session Tags in STS in the IAM User Guide.
///
/// You can create a mobile-based or browser-based app that can authenticate users using
/// a web identity provider like Login with Amazon, Facebook, Google, or an OpenID Connect-compatible
/// identity provider. In this case, we recommend that you use Amazon
/// Cognito or AssumeRoleWithWebIdentity
. For more information, see Federation
/// Through a Web-based Identity Provider in the IAM User Guide.
///
/// An administrator must grant you the permissions necessary to pass session tags. The
/// administrator can also create granular permissions to allow you to pass only specific
/// session tags. For more information, see Tutorial:
/// Using Tags for Attribute-Based Access Control in the IAM User Guide.
///
/// Tag key–value pairs are not case sensitive, but case is preserved. This means that
/// you cannot have separate Department
and department
tag keys.
/// Assume that the user that you are federating has the Department
=Marketing
/// tag and you pass the department
=engineering
session tag.
/// Department
and department
are not saved as separate tags,
/// and the session tag passed in the request takes precedence over the user tag.
///
///
[Cmdlet("Get", "STSFederationToken")]
[OutputType("Amazon.SecurityToken.Model.GetFederationTokenResponse")]
[AWSCmdlet("Calls the AWS Security Token Service (STS) GetFederationToken API operation.", Operation = new[] {"GetFederationToken"}, SelectReturnType = typeof(Amazon.SecurityToken.Model.GetFederationTokenResponse))]
[AWSCmdletOutput("Amazon.SecurityToken.Model.GetFederationTokenResponse",
"This cmdlet returns an Amazon.SecurityToken.Model.GetFederationTokenResponse object containing multiple properties. The object can also be referenced from properties attached to the cmdlet entry in the $AWSHistory stack."
)]
public partial class GetSTSFederationTokenCmdlet : AmazonSecurityTokenServiceClientCmdlet, IExecutor
{
protected override bool IsSensitiveResponse { get; set; } = true;
#region Parameter DurationInSeconds
///
///
/// The duration, in seconds, that the session should last. Acceptable durations for federation
/// sessions range from 900 seconds (15 minutes) to 129,600 seconds (36 hours), with 43,200
/// seconds (12 hours) as the default. Sessions obtained using root user credentials are
/// restricted to a maximum of 3,600 seconds (one hour). If the specified duration is
/// longer than one hour, the session obtained by using root user credentials defaults
/// to one hour.
///
///
[System.Management.Automation.Parameter(Position = 2, ValueFromPipelineByPropertyName = true)]
[Alias("DurationSeconds")]
public System.Int32? DurationInSeconds { get; set; }
#endregion
#region Parameter Name
///
///
/// The name of the federated user. The name is used as an identifier for the temporary
/// security credentials (such as Bob
). For example, you can reference the
/// federated user name in a resource-based policy, such as in an Amazon S3 bucket policy.The regex used to validate this parameter is a string of characters consisting of
/// upper- and lower-case alphanumeric characters with no spaces. You can also include
/// underscores or any of the following characters: =,.@-
///
///
#if !MODULAR
[System.Management.Automation.Parameter(Position = 0, ValueFromPipelineByPropertyName = true, ValueFromPipeline = true)]
#else
[System.Management.Automation.Parameter(Position = 0, ValueFromPipelineByPropertyName = true, ValueFromPipeline = true, Mandatory = true)]
[System.Management.Automation.AllowEmptyString]
[System.Management.Automation.AllowNull]
#endif
[Amazon.PowerShell.Common.AWSRequiredParameter]
public System.String Name { get; set; }
#endregion
#region Parameter Policy
///
///
/// An IAM policy in JSON format that you want to use as an inline session policy.You must pass an inline or managed session
/// policy to this operation. You can pass a single JSON policy document to use as
/// an inline session policy. You can also specify up to 10 managed policy Amazon Resource
/// Names (ARNs) to use as managed session policies.This parameter is optional. However, if you do not pass any session policies, then
/// the resulting federated user session has no permissions.When you pass session policies, the session permissions are the intersection of the
/// IAM user policies and the session policies that you pass. This gives you a way to
/// further restrict the permissions for a federated user. You cannot use session policies
/// to grant more permissions than those that are defined in the permissions policy of
/// the IAM user. For more information, see Session
/// Policies in the IAM User Guide.The resulting credentials can be used to access a resource that has a resource-based
/// policy. If that policy specifically references the federated user session in the Principal
/// element of the policy, the session has the permissions allowed by the policy. These
/// permissions are granted in addition to the permissions that are granted by the session
/// policies.The plaintext that you use for both inline and managed session policies can't exceed
/// 2,048 characters. The JSON policy characters can be any ASCII character from the space
/// character to the end of the valid character list (\u0020 through \u00FF). It can also
/// include the tab (\u0009), linefeed (\u000A), and carriage return (\u000D) characters.An Amazon Web Services conversion compresses the passed inline session policy, managed
/// policy ARNs, and session tags into a packed binary format that has a separate limit.
/// Your request can fail for this limit even if your plaintext meets the other requirements.
/// The PackedPolicySize
response element indicates by percentage how close
/// the policies and tags for your request are to the upper size limit.
///
///
[System.Management.Automation.Parameter(Position = 1, ValueFromPipelineByPropertyName = true)]
public System.String Policy { get; set; }
#endregion
#region Parameter PolicyArn
///
///
/// The Amazon Resource Names (ARNs) of the IAM managed policies that you want to use
/// as a managed session policy. The policies must exist in the same account as the IAM
/// user that is requesting federated access.You must pass an inline or managed session
/// policy to this operation. You can pass a single JSON policy document to use as
/// an inline session policy. You can also specify up to 10 managed policy Amazon Resource
/// Names (ARNs) to use as managed session policies. The plaintext that you use for both
/// inline and managed session policies can't exceed 2,048 characters. You can provide
/// up to 10 managed policy ARNs. For more information about ARNs, see Amazon
/// Resource Names (ARNs) and Amazon Web Services Service Namespaces in the Amazon
/// Web Services General Reference.This parameter is optional. However, if you do not pass any session policies, then
/// the resulting federated user session has no permissions.When you pass session policies, the session permissions are the intersection of the
/// IAM user policies and the session policies that you pass. This gives you a way to
/// further restrict the permissions for a federated user. You cannot use session policies
/// to grant more permissions than those that are defined in the permissions policy of
/// the IAM user. For more information, see Session
/// Policies in the IAM User Guide.The resulting credentials can be used to access a resource that has a resource-based
/// policy. If that policy specifically references the federated user session in the Principal
/// element of the policy, the session has the permissions allowed by the policy. These
/// permissions are granted in addition to the permissions that are granted by the session
/// policies.An Amazon Web Services conversion compresses the passed inline session policy, managed
/// policy ARNs, and session tags into a packed binary format that has a separate limit.
/// Your request can fail for this limit even if your plaintext meets the other requirements.
/// The PackedPolicySize
response element indicates by percentage how close
/// the policies and tags for your request are to the upper size limit.
///
///
[System.Management.Automation.Parameter(ValueFromPipelineByPropertyName = true)]
[Alias("PolicyArns")]
public Amazon.SecurityToken.Model.PolicyDescriptorType[] PolicyArn { get; set; }
#endregion
#region Parameter Tag
///
///
/// A list of session tags. Each session tag consists of a key name and an associated
/// value. For more information about session tags, see Passing
/// Session Tags in STS in the IAM User Guide.This parameter is optional. You can pass up to 50 session tags. The plaintext session
/// tag keys can’t exceed 128 characters and the values can’t exceed 256 characters. For
/// these and additional limits, see IAM
/// and STS Character Limits in the IAM User Guide.An Amazon Web Services conversion compresses the passed inline session policy, managed
/// policy ARNs, and session tags into a packed binary format that has a separate limit.
/// Your request can fail for this limit even if your plaintext meets the other requirements.
/// The PackedPolicySize
response element indicates by percentage how close
/// the policies and tags for your request are to the upper size limit.You can pass a session tag with the same key as a tag that is already attached to
/// the user you are federating. When you do, session tags override a user tag with the
/// same key. Tag key–value pairs are not case sensitive, but case is preserved. This means that
/// you cannot have separate Department
and department
tag keys.
/// Assume that the role has the Department
=Marketing
tag and
/// you pass the department
=engineering
session tag. Department
/// and department
are not saved as separate tags, and the session tag passed
/// in the request takes precedence over the role tag.
///
///
[System.Management.Automation.Parameter(ValueFromPipelineByPropertyName = true)]
[Alias("Tags")]
public Amazon.SecurityToken.Model.Tag[] Tag { get; set; }
#endregion
#region Parameter Select
///
/// Use the -Select parameter to control the cmdlet output. The default value is '*'.
/// Specifying -Select '*' will result in the cmdlet returning the whole service response (Amazon.SecurityToken.Model.GetFederationTokenResponse).
/// Specifying the name of a property of type Amazon.SecurityToken.Model.GetFederationTokenResponse will result in that property being returned.
/// Specifying -Select '^ParameterName' will result in the cmdlet returning the selected cmdlet parameter value.
///
[System.Management.Automation.Parameter(ValueFromPipelineByPropertyName = true)]
public string Select { get; set; } = "*";
#endregion
#region Parameter PassThru
///
/// Changes the cmdlet behavior to return the value passed to the Name parameter.
/// The -PassThru parameter is deprecated, use -Select '^Name' instead. This parameter will be removed in a future version.
///
[System.Obsolete("The -PassThru parameter is deprecated, use -Select '^Name' instead. This parameter will be removed in a future version.")]
[System.Management.Automation.Parameter(ValueFromPipelineByPropertyName = true)]
public SwitchParameter PassThru { get; set; }
#endregion
protected override void ProcessRecord()
{
this._AWSSignerType = "v4";
base.ProcessRecord();
var context = new CmdletContext();
// allow for manipulation of parameters prior to loading into context
PreExecutionContextLoad(context);
#pragma warning disable CS0618, CS0612 //A class member was marked with the Obsolete attribute
if (ParameterWasBound(nameof(this.Select)))
{
context.Select = CreateSelectDelegate(Select) ??
throw new System.ArgumentException("Invalid value for -Select parameter.", nameof(this.Select));
if (this.PassThru.IsPresent)
{
throw new System.ArgumentException("-PassThru cannot be used when -Select is specified.", nameof(this.Select));
}
}
else if (this.PassThru.IsPresent)
{
context.Select = (response, cmdlet) => this.Name;
}
#pragma warning restore CS0618, CS0612 //A class member was marked with the Obsolete attribute
context.DurationInSeconds = this.DurationInSeconds;
context.Name = this.Name;
#if MODULAR
if (this.Name == null && ParameterWasBound(nameof(this.Name)))
{
WriteWarning("You are passing $null as a value for parameter Name which is marked as required. In case you believe this parameter was incorrectly marked as required, report this by opening an issue at https://github.com/aws/aws-tools-for-powershell/issues.");
}
#endif
context.Policy = this.Policy;
if (this.PolicyArn != null)
{
context.PolicyArn = new List(this.PolicyArn);
}
if (this.Tag != null)
{
context.Tag = new List(this.Tag);
}
// allow further manipulation of loaded context prior to processing
PostExecutionContextLoad(context);
var output = Execute(context) as CmdletOutput;
ProcessOutput(output);
}
#region IExecutor Members
public object Execute(ExecutorContext context)
{
var cmdletContext = context as CmdletContext;
// create request
var request = new Amazon.SecurityToken.Model.GetFederationTokenRequest();
if (cmdletContext.DurationInSeconds != null)
{
request.DurationSeconds = cmdletContext.DurationInSeconds.Value;
}
if (cmdletContext.Name != null)
{
request.Name = cmdletContext.Name;
}
if (cmdletContext.Policy != null)
{
request.Policy = cmdletContext.Policy;
}
if (cmdletContext.PolicyArn != null)
{
request.PolicyArns = cmdletContext.PolicyArn;
}
if (cmdletContext.Tag != null)
{
request.Tags = cmdletContext.Tag;
}
CmdletOutput output;
// issue call
var client = Client ?? CreateClient(_CurrentCredentials, _RegionEndpoint);
try
{
var response = CallAWSServiceOperation(client, request);
object pipelineOutput = null;
pipelineOutput = cmdletContext.Select(response, this);
output = new CmdletOutput
{
PipelineOutput = pipelineOutput,
ServiceResponse = response
};
}
catch (Exception e)
{
output = new CmdletOutput { ErrorResponse = e };
}
return output;
}
public ExecutorContext CreateContext()
{
return new CmdletContext();
}
#endregion
#region AWS Service Operation Call
private Amazon.SecurityToken.Model.GetFederationTokenResponse CallAWSServiceOperation(IAmazonSecurityTokenService client, Amazon.SecurityToken.Model.GetFederationTokenRequest request)
{
Utils.Common.WriteVerboseEndpointMessage(this, client.Config, "AWS Security Token Service (STS)", "GetFederationToken");
try
{
#if DESKTOP
return client.GetFederationToken(request);
#elif CORECLR
return client.GetFederationTokenAsync(request).GetAwaiter().GetResult();
#else
#error "Unknown build edition"
#endif
}
catch (AmazonServiceException exc)
{
var webException = exc.InnerException as System.Net.WebException;
if (webException != null)
{
throw new Exception(Utils.Common.FormatNameResolutionFailureMessage(client.Config, webException.Message), webException);
}
throw;
}
}
#endregion
internal partial class CmdletContext : ExecutorContext
{
public System.Int32? DurationInSeconds { get; set; }
public System.String Name { get; set; }
public System.String Policy { get; set; }
public List PolicyArn { get; set; }
public List Tag { get; set; }
public System.Func Select { get; set; } =
(response, cmdlet) => response;
}
}
}