Skip to content

Commit 579e296

Browse files
committed
update generated code
1 parent 636870c commit 579e296

File tree

10 files changed

+86
-49
lines changed

10 files changed

+86
-49
lines changed

manifest.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
{
22
"variables": {
3-
"${LATEST}": "3.326.0"
3+
"${LATEST}": "3.327.1"
44
},
55
"endpoints": "https://raw.githubusercontent.com/aws/aws-sdk-php/${LATEST}/src/data/endpoints.json",
66
"services": {

src/Core/CHANGELOG.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,7 @@
1010

1111
- use strict comparison `null !==` instead of `!`
1212
- Fix CS
13+
- AWS enhancement: Documentation updates.
1314

1415
## 1.22.1
1516

src/Core/src/Sts/Exception/RegionDisabledException.php

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@
77
/**
88
* STS is not activated in the requested region for the account that is being asked to generate credentials. The account
99
* administrator must use the IAM console to activate STS in that region. For more information, see Activating and
10-
* Deactivating Amazon Web Services STS in an Amazon Web Services Region [^1] in the *IAM User Guide*.
10+
* Deactivating STS in an Amazon Web Services Region [^1] in the *IAM User Guide*.
1111
*
1212
* [^1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html
1313
*/

src/Core/src/Sts/Input/AssumeRoleRequest.php

Lines changed: 21 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -30,9 +30,16 @@ final class AssumeRoleRequest extends Input
3030
* subsequent cross-account API requests that use the temporary security credentials will expose the role session name
3131
* to the external account in their CloudTrail logs.
3232
*
33+
* For security purposes, administrators can view this field in CloudTrail logs [^1] to help identify who performed an
34+
* action in Amazon Web Services. Your administrator might require that you specify your user name as the session name
35+
* when you assume the role. For more information, see `sts:RoleSessionName` [^2].
36+
*
3337
* The regex used to validate this parameter is a string of characters consisting of upper- and lower-case alphanumeric
3438
* characters with no spaces. You can also include underscores or any of the following characters: =,.@-
3539
*
40+
* [^1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/cloudtrail-integration.html#cloudtrail-integration_signin-tempcreds
41+
* [^2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_iam-condition-keys.html#ck_rolesessionname
42+
*
3643
* @required
3744
*
3845
* @var string|null
@@ -83,7 +90,10 @@ final class AssumeRoleRequest extends Input
8390
* > plaintext meets the other requirements. The `PackedPolicySize` response element indicates by percentage how close
8491
* > the policies and tags for your request are to the upper size limit.
8592
*
93+
* For more information about role session permissions, see Session policies [^2].
94+
*
8695
* [^1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
96+
* [^2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
8797
*
8898
* @var string|null
8999
*/
@@ -101,7 +111,7 @@ final class AssumeRoleRequest extends Input
101111
* the `DurationSeconds` parameter. You can specify a parameter value of up to 43200 seconds (12 hours), depending on
102112
* the maximum session duration setting for your role. However, if you assume a role using role chaining and provide a
103113
* `DurationSeconds` parameter value greater than one hour, the operation fails. To learn how to view the maximum value
104-
* for your role, see View the Maximum Session Duration Setting for a Role [^1] in the *IAM User Guide*.
114+
* for your role, see Update the maximum session duration for a role [^1].
105115
*
106116
* By default, the value is set to `3600` seconds.
107117
*
@@ -110,7 +120,7 @@ final class AssumeRoleRequest extends Input
110120
* > parameter that specifies the maximum length of the console session. For more information, see Creating a URL that
111121
* > Enables Federated Users to Access the Amazon Web Services Management Console [^2] in the *IAM User Guide*.
112122
*
113-
* [^1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html#id_roles_use_view-role-max-session
123+
* [^1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_update-role-settings.html#id_roles_update-session-duration
114124
* [^2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_enable-console-custom-url.html
115125
*
116126
* @var int|null
@@ -156,8 +166,7 @@ final class AssumeRoleRequest extends Input
156166
* corresponding key and value passes to subsequent sessions in a role chain. For more information, see Chaining Roles
157167
* with Session Tags [^1] in the *IAM User Guide*.
158168
*
159-
* This parameter is optional. When you set session tags as transitive, the session policy and session tags packed
160-
* binary limit is not affected.
169+
* This parameter is optional. The transitive status of a session tag does not impact its packed binary size.
161170
*
162171
* If you choose not to specify a transitive tag key, then no tags are passed from this session to any subsequent
163172
* sessions.
@@ -211,19 +220,22 @@ final class AssumeRoleRequest extends Input
211220
private $tokenCode;
212221

213222
/**
214-
* The source identity specified by the principal that is calling the `AssumeRole` operation.
223+
* The source identity specified by the principal that is calling the `AssumeRole` operation. The source identity value
224+
* persists across chained role [^1] sessions.
215225
*
216226
* You can require users to specify a source identity when they assume a role. You do this by using the
217-
* `sts:SourceIdentity` condition key in a role trust policy. You can use source identity information in CloudTrail logs
218-
* to determine who took actions with a role. You can use the `aws:SourceIdentity` condition key to further control
227+
* `sts:SourceIdentity` [^2] condition key in a role trust policy. You can use source identity information in CloudTrail
228+
* logs to determine who took actions with a role. You can use the `aws:SourceIdentity` condition key to further control
219229
* access to Amazon Web Services resources based on the value of source identity. For more information about using
220-
* source identity, see Monitor and control actions taken with assumed roles [^1] in the *IAM User Guide*.
230+
* source identity, see Monitor and control actions taken with assumed roles [^3] in the *IAM User Guide*.
221231
*
222232
* The regex used to validate this parameter is a string of characters consisting of upper- and lower-case alphanumeric
223233
* characters with no spaces. You can also include underscores or any of the following characters: =,.@-. You cannot use
224234
* a value that begins with the text `aws:`. This prefix is reserved for Amazon Web Services internal use.
225235
*
226-
* [^1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_monitor.html
236+
* [^1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles.html#iam-term-role-chaining
237+
* [^2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html#condition-keys-sourceidentity
238+
* [^3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_monitor.html
227239
*
228240
* @var string|null
229241
*/

src/Core/src/Sts/Input/AssumeRoleWithWebIdentityRequest.php

Lines changed: 22 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,16 @@ final class AssumeRoleWithWebIdentityRequest extends Input
1313
/**
1414
* The Amazon Resource Name (ARN) of the role that the caller is assuming.
1515
*
16+
* > Additional considerations apply to Amazon Cognito identity pools that assume cross-account IAM roles [^1]. The
17+
* > trust policies of these roles must accept the `cognito-identity.amazonaws.com` service principal and must contain
18+
* > the `cognito-identity.amazonaws.com:aud` condition key to restrict role assumption to users from your intended
19+
* > identity pools. A policy that trusts Amazon Cognito identity pools without this condition creates a risk that a
20+
* > user from an unintended identity pool can assume the role. For more information, see Trust policies for IAM roles
21+
* > in Basic (Classic) authentication [^2] in the *Amazon Cognito Developer Guide*.
22+
*
23+
* [^1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies-cross-account-resource-access.html
24+
* [^2]: https://docs.aws.amazon.com/cognito/latest/developerguide/iam-roles.html#trust-policies
25+
*
1626
* @required
1727
*
1828
* @var string|null
@@ -25,9 +35,16 @@ final class AssumeRoleWithWebIdentityRequest extends Input
2535
* associated with that user. This session name is included as part of the ARN and assumed role ID in the
2636
* `AssumedRoleUser` response element.
2737
*
38+
* For security purposes, administrators can view this field in CloudTrail logs [^1] to help identify who performed an
39+
* action in Amazon Web Services. Your administrator might require that you specify your user name as the session name
40+
* when you assume the role. For more information, see `sts:RoleSessionName` [^2].
41+
*
2842
* The regex used to validate this parameter is a string of characters consisting of upper- and lower-case alphanumeric
2943
* characters with no spaces. You can also include underscores or any of the following characters: =,.@-
3044
*
45+
* [^1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/cloudtrail-integration.html#cloudtrail-integration_signin-tempcreds
46+
* [^2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_iam-condition-keys.html#ck_rolesessionname
47+
*
3148
* @required
3249
*
3350
* @var string|null
@@ -37,7 +54,8 @@ final class AssumeRoleWithWebIdentityRequest extends Input
3754
/**
3855
* The OAuth 2.0 access token or OpenID Connect ID token that is provided by the identity provider. Your application
3956
* must get this token by authenticating the user who is using your application with a web identity provider before the
40-
* application makes an `AssumeRoleWithWebIdentity` call. Only tokens with RSA algorithms (RS256) are supported.
57+
* application makes an `AssumeRoleWithWebIdentity` call. Timestamps in the token must be formatted as either an integer
58+
* or a long integer. Only tokens with RSA algorithms (RS256) are supported.
4159
*
4260
* @required
4361
*
@@ -97,12 +115,15 @@ final class AssumeRoleWithWebIdentityRequest extends Input
97115
* policy characters can be any ASCII character from the space character to the end of the valid character list (\u0020
98116
* through \u00FF). It can also include the tab (\u0009), linefeed (\u000A), and carriage return (\u000D) characters.
99117
*
118+
* For more information about role session permissions, see Session policies [^2].
119+
*
100120
* > An Amazon Web Services conversion compresses the passed inline session policy, managed policy ARNs, and session
101121
* > tags into a packed binary format that has a separate limit. Your request can fail for this limit even if your
102122
* > plaintext meets the other requirements. The `PackedPolicySize` response element indicates by percentage how close
103123
* > the policies and tags for your request are to the upper size limit.
104124
*
105125
* [^1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
126+
* [^2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
106127
*
107128
* @var string|null
108129
*/

src/Core/src/Sts/Result/AssumeRoleWithWebIdentityResponse.php

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -85,7 +85,7 @@ class AssumeRoleWithWebIdentityResponse extends Result
8585
* The regex used to validate this parameter is a string of characters consisting of upper- and lower-case alphanumeric
8686
* characters with no spaces. You can also include underscores or any of the following characters: =,.@-
8787
*
88-
* [^1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_terms-and-concepts#iam-term-role-chaining
88+
* [^1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles.html#id_roles_terms-and-concepts
8989
* [^2]: https://docs.aws.amazon.com/cognito/latest/developerguide/amazon-cognito-user-pools-using-tokens-with-identity-providers.html
9090
* [^3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_monitor.html
9191
*

0 commit comments

Comments
 (0)