diff options
Diffstat (limited to 'vendor/github.com/aws/aws-sdk-go/service/sts/errors.go')
-rw-r--r-- | vendor/github.com/aws/aws-sdk-go/service/sts/errors.go | 73 |
1 files changed, 73 insertions, 0 deletions
diff --git a/vendor/github.com/aws/aws-sdk-go/service/sts/errors.go b/vendor/github.com/aws/aws-sdk-go/service/sts/errors.go new file mode 100644 index 0000000..e24884e --- /dev/null +++ b/vendor/github.com/aws/aws-sdk-go/service/sts/errors.go | |||
@@ -0,0 +1,73 @@ | |||
1 | // Code generated by private/model/cli/gen-api/main.go. DO NOT EDIT. | ||
2 | |||
3 | package sts | ||
4 | |||
5 | const ( | ||
6 | |||
7 | // ErrCodeExpiredTokenException for service response error code | ||
8 | // "ExpiredTokenException". | ||
9 | // | ||
10 | // The web identity token that was passed is expired or is not valid. Get a | ||
11 | // new identity token from the identity provider and then retry the request. | ||
12 | ErrCodeExpiredTokenException = "ExpiredTokenException" | ||
13 | |||
14 | // ErrCodeIDPCommunicationErrorException for service response error code | ||
15 | // "IDPCommunicationError". | ||
16 | // | ||
17 | // The request could not be fulfilled because the non-AWS identity provider | ||
18 | // (IDP) that was asked to verify the incoming identity token could not be reached. | ||
19 | // This is often a transient error caused by network conditions. Retry the request | ||
20 | // a limited number of times so that you don't exceed the request rate. If the | ||
21 | // error persists, the non-AWS identity provider might be down or not responding. | ||
22 | ErrCodeIDPCommunicationErrorException = "IDPCommunicationError" | ||
23 | |||
24 | // ErrCodeIDPRejectedClaimException for service response error code | ||
25 | // "IDPRejectedClaim". | ||
26 | // | ||
27 | // The identity provider (IdP) reported that authentication failed. This might | ||
28 | // be because the claim is invalid. | ||
29 | // | ||
30 | // If this error is returned for the AssumeRoleWithWebIdentity operation, it | ||
31 | // can also mean that the claim has expired or has been explicitly revoked. | ||
32 | ErrCodeIDPRejectedClaimException = "IDPRejectedClaim" | ||
33 | |||
34 | // ErrCodeInvalidAuthorizationMessageException for service response error code | ||
35 | // "InvalidAuthorizationMessageException". | ||
36 | // | ||
37 | // The error returned if the message passed to DecodeAuthorizationMessage was | ||
38 | // invalid. This can happen if the token contains invalid characters, such as | ||
39 | // linebreaks. | ||
40 | ErrCodeInvalidAuthorizationMessageException = "InvalidAuthorizationMessageException" | ||
41 | |||
42 | // ErrCodeInvalidIdentityTokenException for service response error code | ||
43 | // "InvalidIdentityToken". | ||
44 | // | ||
45 | // The web identity token that was passed could not be validated by AWS. Get | ||
46 | // a new identity token from the identity provider and then retry the request. | ||
47 | ErrCodeInvalidIdentityTokenException = "InvalidIdentityToken" | ||
48 | |||
49 | // ErrCodeMalformedPolicyDocumentException for service response error code | ||
50 | // "MalformedPolicyDocument". | ||
51 | // | ||
52 | // The request was rejected because the policy document was malformed. The error | ||
53 | // message describes the specific error. | ||
54 | ErrCodeMalformedPolicyDocumentException = "MalformedPolicyDocument" | ||
55 | |||
56 | // ErrCodePackedPolicyTooLargeException for service response error code | ||
57 | // "PackedPolicyTooLarge". | ||
58 | // | ||
59 | // The request was rejected because the policy document was too large. The error | ||
60 | // message describes how big the policy document is, in packed form, as a percentage | ||
61 | // of what the API allows. | ||
62 | ErrCodePackedPolicyTooLargeException = "PackedPolicyTooLarge" | ||
63 | |||
64 | // ErrCodeRegionDisabledException for service response error code | ||
65 | // "RegionDisabledException". | ||
66 | // | ||
67 | // STS is not activated in the requested region for the account that is being | ||
68 | // asked to generate credentials. The account administrator must use the IAM | ||
69 | // console to activate STS in that region. For more information, see Activating | ||
70 | // and Deactivating AWS STS in an AWS Region (http://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html) | ||
71 | // in the IAM User Guide. | ||
72 | ErrCodeRegionDisabledException = "RegionDisabledException" | ||
73 | ) | ||