diff env/lib/python3.7/site-packages/boto/sts/connection.py @ 5:9b1c78e6ba9c draft default tip

"planemo upload commit 6c0a8142489327ece472c84e558c47da711a9142"
author shellac
date Mon, 01 Jun 2020 08:59:25 -0400
parents 79f47841a781
children
line wrap: on
line diff
--- a/env/lib/python3.7/site-packages/boto/sts/connection.py	Thu May 14 16:47:39 2020 -0400
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,652 +0,0 @@
-# Copyright (c) 2011 Mitch Garnaat http://garnaat.org/
-# Copyright (c) 2011, Eucalyptus Systems, Inc.
-# Copyright (c) 2013 Amazon.com, Inc. or its affiliates.  All Rights Reserved
-#
-# Permission is hereby granted, free of charge, to any person obtaining a
-# copy of this software and associated documentation files (the
-# "Software"), to deal in the Software without restriction, including
-# without limitation the rights to use, copy, modify, merge, publish, dis-
-# tribute, sublicense, and/or sell copies of the Software, and to permit
-# persons to whom the Software is furnished to do so, subject to the fol-
-# lowing conditions:
-#
-# The above copyright notice and this permission notice shall be included
-# in all copies or substantial portions of the Software.
-#
-# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
-# OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABIL-
-# ITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT
-# SHALL THE AUTHOR BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY,
-# WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
-# OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
-# IN THE SOFTWARE.
-
-from boto.connection import AWSQueryConnection
-from boto.provider import Provider, NO_CREDENTIALS_PROVIDED
-from boto.regioninfo import RegionInfo
-from boto.sts.credentials import Credentials, FederationToken, AssumedRole
-from boto.sts.credentials import DecodeAuthorizationMessage
-import boto
-import boto.utils
-import datetime
-import threading
-
-_session_token_cache = {}
-
-
-class STSConnection(AWSQueryConnection):
-    """
-    AWS Security Token Service
-    The AWS Security Token Service is a web service that enables you
-    to request temporary, limited-privilege credentials for AWS
-    Identity and Access Management (IAM) users or for users that you
-    authenticate (federated users). This guide provides descriptions
-    of the AWS Security Token Service API.
-
-    For more detailed information about using this service, go to
-    `Using Temporary Security Credentials`_.
-
-    For information about setting up signatures and authorization
-    through the API, go to `Signing AWS API Requests`_ in the AWS
-    General Reference . For general information about the Query API,
-    go to `Making Query Requests`_ in Using IAM . For information
-    about using security tokens with other AWS products, go to `Using
-    Temporary Security Credentials to Access AWS`_ in Using Temporary
-    Security Credentials .
-
-    If you're new to AWS and need additional technical information
-    about a specific AWS product, you can find the product's technical
-    documentation at `http://aws.amazon.com/documentation/`_.
-
-    We will refer to Amazon Identity and Access Management using the
-    abbreviated form IAM. All copyrights and legal protections still
-    apply.
-    """
-    DefaultRegionName = 'us-east-1'
-    DefaultRegionEndpoint = 'sts.amazonaws.com'
-    APIVersion = '2011-06-15'
-
-    def __init__(self, aws_access_key_id=None, aws_secret_access_key=None,
-                 is_secure=True, port=None, proxy=None, proxy_port=None,
-                 proxy_user=None, proxy_pass=None, debug=0,
-                 https_connection_factory=None, region=None, path='/',
-                 converter=None, validate_certs=True, anon=False,
-                 security_token=None, profile_name=None):
-        """
-        :type anon: boolean
-        :param anon: If this parameter is True, the ``STSConnection`` object
-            will make anonymous requests, and it will not use AWS
-            Credentials or even search for AWS Credentials to make these
-            requests.
-        """
-        if not region:
-            region = RegionInfo(self, self.DefaultRegionName,
-                                self.DefaultRegionEndpoint,
-                                connection_cls=STSConnection)
-        self.region = region
-        self.anon = anon
-        self._mutex = threading.Semaphore()
-        provider = 'aws'
-        # If an anonymous request is sent, do not try to look for credentials.
-        # So we pass in dummy values for the access key id, secret access
-        # key, and session token. It does not matter that they are
-        # not actual values because the request is anonymous.
-        if self.anon:
-            provider = Provider('aws', NO_CREDENTIALS_PROVIDED,
-                                NO_CREDENTIALS_PROVIDED,
-                                NO_CREDENTIALS_PROVIDED)
-        super(STSConnection, self).__init__(aws_access_key_id,
-                                    aws_secret_access_key,
-                                    is_secure, port, proxy, proxy_port,
-                                    proxy_user, proxy_pass,
-                                    self.region.endpoint, debug,
-                                    https_connection_factory, path,
-                                    validate_certs=validate_certs,
-                                    security_token=security_token,
-                                    profile_name=profile_name,
-                                    provider=provider)
-
-    def _required_auth_capability(self):
-        if self.anon:
-            return ['sts-anon']
-        else:
-            return ['hmac-v4']
-
-    def _check_token_cache(self, token_key, duration=None, window_seconds=60):
-        token = _session_token_cache.get(token_key, None)
-        if token:
-            now = datetime.datetime.utcnow()
-            expires = boto.utils.parse_ts(token.expiration)
-            delta = expires - now
-            if delta < datetime.timedelta(seconds=window_seconds):
-                msg = 'Cached session token %s is expired' % token_key
-                boto.log.debug(msg)
-                token = None
-        return token
-
-    def _get_session_token(self, duration=None,
-                           mfa_serial_number=None, mfa_token=None):
-        params = {}
-        if duration:
-            params['DurationSeconds'] = duration
-        if mfa_serial_number:
-            params['SerialNumber'] = mfa_serial_number
-        if mfa_token:
-            params['TokenCode'] = mfa_token
-        return self.get_object('GetSessionToken', params,
-                                Credentials, verb='POST')
-
-    def get_session_token(self, duration=None, force_new=False,
-                          mfa_serial_number=None, mfa_token=None):
-        """
-        Return a valid session token.  Because retrieving new tokens
-        from the Secure Token Service is a fairly heavyweight operation
-        this module caches previously retrieved tokens and returns
-        them when appropriate.  Each token is cached with a key
-        consisting of the region name of the STS endpoint
-        concatenated with the requesting user's access id.  If there
-        is a token in the cache meeting with this key, the session
-        expiration is checked to make sure it is still valid and if
-        so, the cached token is returned.  Otherwise, a new session
-        token is requested from STS and it is placed into the cache
-        and returned.
-
-        :type duration: int
-        :param duration: The number of seconds the credentials should
-            remain valid.
-
-        :type force_new: bool
-        :param force_new: If this parameter is True, a new session token
-            will be retrieved from the Secure Token Service regardless
-            of whether there is a valid cached token or not.
-
-        :type mfa_serial_number: str
-        :param mfa_serial_number: The serial number of an MFA device.
-            If this is provided and if the mfa_passcode provided is
-            valid, the temporary session token will be authorized with
-            to perform operations requiring the MFA device authentication.
-
-        :type mfa_token: str
-        :param mfa_token: The 6 digit token associated with the
-            MFA device.
-        """
-        token_key = '%s:%s' % (self.region.name, self.provider.access_key)
-        token = self._check_token_cache(token_key, duration)
-        if force_new or not token:
-            boto.log.debug('fetching a new token for %s' % token_key)
-            try:
-                self._mutex.acquire()
-                token = self._get_session_token(duration,
-                                                mfa_serial_number,
-                                                mfa_token)
-                _session_token_cache[token_key] = token
-            finally:
-                self._mutex.release()
-        return token
-
-    def get_federation_token(self, name, duration=None, policy=None):
-        """
-        Returns a set of temporary security credentials (consisting of
-        an access key ID, a secret access key, and a security token)
-        for a federated user. A typical use is in a proxy application
-        that is getting temporary security credentials on behalf of
-        distributed applications inside a corporate network. Because
-        you must call the `GetFederationToken` action using the long-
-        term security credentials of an IAM user, this call is
-        appropriate in contexts where those credentials can be safely
-        stored, usually in a server-based application.
-
-        **Note:** Do not use this call in mobile applications or
-        client-based web applications that directly get temporary
-        security credentials. For those types of applications, use
-        `AssumeRoleWithWebIdentity`.
-
-        The `GetFederationToken` action must be called by using the
-        long-term AWS security credentials of the AWS account or an
-        IAM user. Credentials that are created by IAM users are valid
-        for the specified duration, between 900 seconds (15 minutes)
-        and 129600 seconds (36 hours); credentials that are created by
-        using account credentials have a maximum duration of 3600
-        seconds (1 hour).
-
-        The permissions that are granted to the federated user are the
-        intersection of the policy that is passed with the
-        `GetFederationToken` request and policies that are associated
-        with of the entity making the `GetFederationToken` call.
-
-        For more information about how permissions work, see
-        `Controlling Permissions in Temporary Credentials`_ in Using
-        Temporary Security Credentials . For information about using
-        `GetFederationToken` to create temporary security credentials,
-        see `Creating Temporary Credentials to Enable Access for
-        Federated Users`_ in Using Temporary Security Credentials .
-
-        :type name: string
-        :param name: The name of the federated user. The name is used as an
-            identifier for the temporary security credentials (such as `Bob`).
-            For example, you can reference the federated user name in a
-            resource-based policy, such as in an Amazon S3 bucket policy.
-
-        :type policy: string
-        :param policy: A policy that specifies the permissions that are granted
-            to the federated user. By default, federated users have no
-            permissions; they do not inherit any from the IAM user. When you
-            specify a policy, the federated user's permissions are intersection
-            of the specified policy and the IAM user's policy. If you don't
-            specify a policy, federated users can only access AWS resources
-            that explicitly allow those federated users in a resource policy,
-            such as in an Amazon S3 bucket policy.
-
-        :type duration: integer
-        :param duration: The duration, in seconds, that the session
-            should last. Acceptable durations for federation sessions range
-            from 900 seconds (15 minutes) to 129600 seconds (36 hours), with
-            43200 seconds (12 hours) as the default. Sessions for AWS account
-            owners are restricted to a maximum of 3600 seconds (one hour). If
-            the duration is longer than one hour, the session for AWS account
-            owners defaults to one hour.
-
-        """
-        params = {'Name': name}
-        if duration:
-            params['DurationSeconds'] = duration
-        if policy:
-            params['Policy'] = policy
-        return self.get_object('GetFederationToken', params,
-                                FederationToken, verb='POST')
-
-    def assume_role(self, role_arn, role_session_name, policy=None,
-                    duration_seconds=None, external_id=None,
-                    mfa_serial_number=None,
-                    mfa_token=None):
-        """
-        Returns a set of temporary security credentials (consisting of
-        an access key ID, a secret access key, and a security token)
-        that you can use to access AWS resources that you might not
-        normally have access to. Typically, you use `AssumeRole` for
-        cross-account access or federation.
-
-        For cross-account access, imagine that you own multiple
-        accounts and need to access resources in each account. You
-        could create long-term credentials in each account to access
-        those resources. However, managing all those credentials and
-        remembering which one can access which account can be time
-        consuming. Instead, you can create one set of long-term
-        credentials in one account and then use temporary security
-        credentials to access all the other accounts by assuming roles
-        in those accounts. For more information about roles, see
-        `Roles`_ in Using IAM .
-
-        For federation, you can, for example, grant single sign-on
-        access to the AWS Management Console. If you already have an
-        identity and authentication system in your corporate network,
-        you don't have to recreate user identities in AWS in order to
-        grant those user identities access to AWS. Instead, after a
-        user has been authenticated, you call `AssumeRole` (and
-        specify the role with the appropriate permissions) to get
-        temporary security credentials for that user. With those
-        temporary security credentials, you construct a sign-in URL
-        that users can use to access the console. For more
-        information, see `Scenarios for Granting Temporary Access`_ in
-        AWS Security Token Service .
-
-        The temporary security credentials are valid for the duration
-        that you specified when calling `AssumeRole`, which can be
-        from 900 seconds (15 minutes) to 3600 seconds (1 hour). The
-        default is 1 hour.
-
-        The temporary security credentials that are returned from the
-        `AssumeRoleWithWebIdentity` response have the permissions that
-        are associated with the access policy of the role being
-        assumed and any policies that are associated with the AWS
-        resource being accessed. You can further restrict the
-        permissions of the temporary security credentials by passing a
-        policy in the request. The resulting permissions are an
-        intersection of the role's access policy and the policy that
-        you passed. These policies and any applicable resource-based
-        policies are evaluated when calls to AWS service APIs are made
-        using the temporary security credentials.
-
-        To assume a role, your AWS account must be trusted by the
-        role. The trust relationship is defined in the role's trust
-        policy when the IAM role is created. You must also have a
-        policy that allows you to call `sts:AssumeRole`.
-
-        **Important:** You cannot call `Assumerole` by using AWS
-        account credentials; access will be denied. You must use IAM
-        user credentials to call `AssumeRole`.
-
-        :type role_arn: string
-        :param role_arn: The Amazon Resource Name (ARN) of the role that the
-            caller is assuming.
-
-        :type role_session_name: string
-        :param role_session_name: An identifier for the assumed role session.
-            The session name is included as part of the `AssumedRoleUser`.
-
-        :type policy: string
-        :param policy: A supplemental policy that is associated with the
-            temporary security credentials from the `AssumeRole` call. The
-            resulting permissions of the temporary security credentials are an
-            intersection of this policy and the access policy that is
-            associated with the role. Use this policy to further restrict the
-            permissions of the temporary security credentials.
-
-        :type duration_seconds: integer
-        :param duration_seconds: The duration, in seconds, of the role session.
-            The value can range from 900 seconds (15 minutes) to 3600 seconds
-            (1 hour). By default, the value is set to 3600 seconds.
-
-        :type external_id: string
-        :param external_id: A unique identifier that is used by third parties
-            to assume a role in their customers' accounts. For each role that
-            the third party can assume, they should instruct their customers to
-            create a role with the external ID that the third party generated.
-            Each time the third party assumes the role, they must pass the
-            customer's external ID. The external ID is useful in order to help
-            third parties bind a role to the customer who created it. For more
-            information about the external ID, see `About the External ID`_ in
-            Using Temporary Security Credentials .
-
-        :type mfa_serial_number: string
-        :param mfa_serial_number: The identification number of the MFA device that
-            is associated with the user who is making the AssumeRole call.
-            Specify this value if the trust policy of the role being assumed
-            includes a condition that requires MFA authentication. The value is
-            either the serial number for a hardware device (such as
-            GAHT12345678) or an Amazon Resource Name (ARN) for a virtual device
-            (such as arn:aws:iam::123456789012:mfa/user). Minimum length of 9.
-            Maximum length of 256.
-
-        :type mfa_token: string
-        :param mfa_token: The value provided by the MFA device, if the trust
-            policy of the role being assumed requires MFA (that is, if the
-            policy includes a condition that tests for MFA). If the role being
-            assumed requires MFA and if the TokenCode value is missing or
-            expired, the AssumeRole call returns an "access denied" errror.
-            Minimum length of 6. Maximum length of 6.
-
-        """
-        params = {
-            'RoleArn': role_arn,
-            'RoleSessionName': role_session_name
-        }
-        if policy is not None:
-            params['Policy'] = policy
-        if duration_seconds is not None:
-            params['DurationSeconds'] = duration_seconds
-        if external_id is not None:
-            params['ExternalId'] = external_id
-        if mfa_serial_number is not None:
-            params['SerialNumber'] = mfa_serial_number
-        if mfa_token is not None:
-            params['TokenCode'] = mfa_token
-        return self.get_object('AssumeRole', params, AssumedRole, verb='POST')
-
-    def assume_role_with_saml(self, role_arn, principal_arn, saml_assertion,
-                              policy=None, duration_seconds=None):
-        """
-        Returns a set of temporary security credentials for users who
-        have been authenticated via a SAML authentication response.
-        This operation provides a mechanism for tying an enterprise
-        identity store or directory to role-based AWS access without
-        user-specific credentials or configuration.
-
-        The temporary security credentials returned by this operation
-        consist of an access key ID, a secret access key, and a
-        security token. Applications can use these temporary security
-        credentials to sign calls to AWS services. The credentials are
-        valid for the duration that you specified when calling
-        `AssumeRoleWithSAML`, which can be up to 3600 seconds (1 hour)
-        or until the time specified in the SAML authentication
-        response's `NotOnOrAfter` value, whichever is shorter.
-
-        The maximum duration for a session is 1 hour, and the minimum
-        duration is 15 minutes, even if values outside this range are
-        specified.
-
-        Optionally, you can pass an AWS IAM access policy to this
-        operation. The temporary security credentials that are
-        returned by the operation have the permissions that are
-        associated with the access policy of the role being assumed,
-        except for any permissions explicitly denied by the policy you
-        pass. This gives you a way to further restrict the permissions
-        for the federated user. These policies and any applicable
-        resource-based policies are evaluated when calls to AWS are
-        made using the temporary security credentials.
-
-        Before your application can call `AssumeRoleWithSAML`, you
-        must configure your SAML identity provider (IdP) to issue the
-        claims required by AWS. Additionally, you must use AWS
-        Identity and Access Management (AWS IAM) to create a SAML
-        provider entity in your AWS account that represents your
-        identity provider, and create an AWS IAM role that specifies
-        this SAML provider in its trust policy.
-
-        Calling `AssumeRoleWithSAML` does not require the use of AWS
-        security credentials. The identity of the caller is validated
-        by using keys in the metadata document that is uploaded for
-        the SAML provider entity for your identity provider.
-
-        For more information, see the following resources:
-
-
-        + `Creating Temporary Security Credentials for SAML
-          Federation`_ in the Using Temporary Security Credentials
-          guide.
-        + `SAML Providers`_ in the Using IAM guide.
-        + `Configuring a Relying Party and Claims in the Using IAM
-          guide. `_
-        + `Creating a Role for SAML-Based Federation`_ in the Using
-          IAM guide.
-
-        :type role_arn: string
-        :param role_arn: The Amazon Resource Name (ARN) of the role that the
-            caller is assuming.
-
-        :type principal_arn: string
-        :param principal_arn: The Amazon Resource Name (ARN) of the SAML
-            provider in AWS IAM that describes the IdP.
-
-        :type saml_assertion: string
-        :param saml_assertion: The base-64 encoded SAML authentication response
-            provided by the IdP.
-        For more information, see `Configuring a Relying Party and Adding
-            Claims`_ in the Using IAM guide.
-
-        :type policy: string
-        :param policy:
-        An AWS IAM policy in JSON format.
-
-        The temporary security credentials that are returned by this operation
-            have the permissions that are associated with the access policy of
-            the role being assumed, except for any permissions explicitly
-            denied by the policy you pass. These policies and any applicable
-            resource-based policies are evaluated when calls to AWS are made
-            using the temporary security credentials.
-
-        The policy must be 2048 bytes or shorter, and its packed size must be
-            less than 450 bytes.
-
-        :type duration_seconds: integer
-        :param duration_seconds:
-        The duration, in seconds, of the role session. The value can range from
-            900 seconds (15 minutes) to 3600 seconds (1 hour). By default, the
-            value is set to 3600 seconds. An expiration can also be specified
-            in the SAML authentication response's `NotOnOrAfter` value. The
-            actual expiration time is whichever value is shorter.
-
-        The maximum duration for a session is 1 hour, and the minimum duration
-            is 15 minutes, even if values outside this range are specified.
-
-        """
-        params = {
-            'RoleArn': role_arn,
-            'PrincipalArn': principal_arn,
-            'SAMLAssertion': saml_assertion,
-        }
-        if policy is not None:
-            params['Policy'] = policy
-        if duration_seconds is not None:
-            params['DurationSeconds'] = duration_seconds
-        return self.get_object('AssumeRoleWithSAML', params, AssumedRole,
-                               verb='POST')
-
-    def assume_role_with_web_identity(self, role_arn, role_session_name,
-                                      web_identity_token, provider_id=None,
-                                      policy=None, duration_seconds=None):
-        """
-        Returns a set of temporary security credentials for users who
-        have been authenticated in a mobile or web application with a
-        web identity provider, such as Login with Amazon, Facebook, or
-        Google. `AssumeRoleWithWebIdentity` is an API call that does
-        not require the use of AWS security credentials. Therefore,
-        you can distribute an application (for example, on mobile
-        devices) that requests temporary security credentials without
-        including long-term AWS credentials in the application or by
-        deploying server-based proxy services that use long-term AWS
-        credentials. For more information, see `Creating a Mobile
-        Application with Third-Party Sign-In`_ in AWS Security Token
-        Service .
-
-        The temporary security credentials consist of an access key
-        ID, a secret access key, and a security token. Applications
-        can use these temporary security credentials to sign calls to
-        AWS service APIs. The credentials are valid for the duration
-        that you specified when calling `AssumeRoleWithWebIdentity`,
-        which can be from 900 seconds (15 minutes) to 3600 seconds (1
-        hour). By default, the temporary security credentials are
-        valid for 1 hour.
-
-        The temporary security credentials that are returned from the
-        `AssumeRoleWithWebIdentity` response have the permissions that
-        are associated with the access policy of the role being
-        assumed. You can further restrict the permissions of the
-        temporary security credentials by passing a policy in the
-        request. The resulting permissions are an intersection of the
-        role's access policy and the policy that you passed. These
-        policies and any applicable resource-based policies are
-        evaluated when calls to AWS service APIs are made using the
-        temporary security credentials.
-
-        Before your application can call `AssumeRoleWithWebIdentity`,
-        you must have an identity token from a supported identity
-        provider and create a role that the application can assume.
-        The role that your application assumes must trust the identity
-        provider that is associated with the identity token. In other
-        words, the identity provider must be specified in the role's
-        trust policy. For more information, see ` Creating Temporary
-        Security Credentials for Mobile Apps Using Third-Party
-        Identity Providers`_.
-
-        :type role_arn: string
-        :param role_arn: The Amazon Resource Name (ARN) of the role that the
-            caller is assuming.
-
-        :type role_session_name: string
-        :param role_session_name: An identifier for the assumed role session.
-            Typically, you pass the name or identifier that is associated with
-            the user who is using your application. That way, the temporary
-            security credentials that your application will use are associated
-            with that user. This session name is included as part of the ARN
-            and assumed role ID in the `AssumedRoleUser` response element.
-
-        :type web_identity_token: string
-        :param web_identity_token: The OAuth 2.0 access token or OpenID Connect
-            ID token that is provided by the identity provider. Your
-            application must get this token by authenticating the user who is
-            using your application with a web identity provider before the
-            application makes an `AssumeRoleWithWebIdentity` call.
-
-        :type provider_id: string
-        :param provider_id: Specify this value only for OAuth access tokens. Do
-            not specify this value for OpenID Connect ID tokens, such as
-            `accounts.google.com`. This is the fully-qualified host component
-            of the domain name of the identity provider. Do not include URL
-            schemes and port numbers. Currently, `www.amazon.com` and
-            `graph.facebook.com` are supported.
-
-        :type policy: string
-        :param policy: A supplemental policy that is associated with the
-            temporary security credentials from the `AssumeRoleWithWebIdentity`
-            call. The resulting permissions of the temporary security
-            credentials are an intersection of this policy and the access
-            policy that is associated with the role. Use this policy to further
-            restrict the permissions of the temporary security credentials.
-
-        :type duration_seconds: integer
-        :param duration_seconds: The duration, in seconds, of the role session.
-            The value can range from 900 seconds (15 minutes) to 3600 seconds
-            (1 hour). By default, the value is set to 3600 seconds.
-
-        """
-        params = {
-            'RoleArn': role_arn,
-            'RoleSessionName': role_session_name,
-            'WebIdentityToken': web_identity_token,
-        }
-        if provider_id is not None:
-            params['ProviderId'] = provider_id
-        if policy is not None:
-            params['Policy'] = policy
-        if duration_seconds is not None:
-            params['DurationSeconds'] = duration_seconds
-        return self.get_object(
-            'AssumeRoleWithWebIdentity',
-            params,
-            AssumedRole,
-            verb='POST'
-        )
-
-    def decode_authorization_message(self, encoded_message):
-        """
-        Decodes additional information about the authorization status
-        of a request from an encoded message returned in response to
-        an AWS request.
-
-        For example, if a user is not authorized to perform an action
-        that he or she has requested, the request returns a
-        `Client.UnauthorizedOperation` response (an HTTP 403
-        response). Some AWS actions additionally return an encoded
-        message that can provide details about this authorization
-        failure.
-        Only certain AWS actions return an encoded authorization
-        message. The documentation for an individual action indicates
-        whether that action returns an encoded message in addition to
-        returning an HTTP code.
-        The message is encoded because the details of the
-        authorization status can constitute privileged information
-        that the user who requested the action should not see. To
-        decode an authorization status message, a user must be granted
-        permissions via an IAM policy to request the
-        `DecodeAuthorizationMessage` (
-        `sts:DecodeAuthorizationMessage`) action.
-
-        The decoded message includes the following type of
-        information:
-
-
-        + Whether the request was denied due to an explicit deny or
-          due to the absence of an explicit allow. For more information,
-          see `Determining Whether a Request is Allowed or Denied`_ in
-          Using IAM .
-        + The principal who made the request.
-        + The requested action.
-        + The requested resource.
-        + The values of condition keys in the context of the user's
-          request.
-
-        :type encoded_message: string
-        :param encoded_message: The encoded message that was returned with the
-            response.
-
-        """
-        params = {
-            'EncodedMessage': encoded_message,
-        }
-        return self.get_object(
-            'DecodeAuthorizationMessage',
-            params,
-            DecodeAuthorizationMessage,
-            verb='POST'
-        )