Skip to content

Commit d69f59e

Browse files
Update generated code (#1042)
* update generated code * Update src/Service/Lambda/CHANGELOG.md Co-authored-by: Jérémy Derussé <[email protected]>
1 parent b85111f commit d69f59e

12 files changed

+25
-22
lines changed

CHANGELOG.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@
44

55
### Added
66

7+
- AWS enhancement: Documentation updates for AWS Security Token Service.
78

89
## 1.10.0
910

src/Sts/Exception/InvalidIdentityTokenException.php

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,8 +6,8 @@
66
use Symfony\Contracts\HttpClient\ResponseInterface;
77

88
/**
9-
* The web identity token that was passed could not be validated by AWS. Get a new identity token from the identity
10-
* provider and then retry the request.
9+
* The web identity token that was passed could not be validated by Amazon Web Services. Get a new identity token from
10+
* the identity provider and then retry the request.
1111
*/
1212
final class InvalidIdentityTokenException extends ClientException
1313
{

src/Sts/Exception/PackedPolicyTooLargeException.php

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,9 +7,10 @@
77

88
/**
99
* The request was rejected because the total packed size of the session policies and session tags combined was too
10-
* large. An AWS conversion compresses the session policy document, session policy ARNs, and session tags into a packed
11-
* binary format that has a separate limit. The error message indicates by percentage how close the policies and tags
12-
* are to the upper size limit. For more information, see Passing Session Tags in STS in the *IAM User Guide*.
10+
* large. An Amazon Web Services conversion compresses the session policy document, session policy ARNs, and session
11+
* tags into a packed binary format that has a separate limit. The error message indicates by percentage how close the
12+
* policies and tags are to the upper size limit. For more information, see Passing Session Tags in STS in the *IAM User
13+
* Guide*.
1314
* You could receive this error even though you meet other defined session policy and session tag limits. For more
1415
* information, see IAM and STS Entity Character Limits in the *IAM User Guide*.
1516
*

src/Sts/Exception/RegionDisabledException.php

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@
88
/**
99
* STS is not activated in the requested region for the account that is being asked to generate credentials. The account
1010
* administrator must use the IAM console to activate STS in that region. For more information, see Activating and
11-
* Deactivating AWS STS in an AWS Region in the *IAM User Guide*.
11+
* Deactivating Amazon Web Services STS in an Amazon Web Services Region in the *IAM User Guide*.
1212
*
1313
* @see https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html
1414
*/

src/Sts/Input/AssumeRoleRequest.php

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,7 @@ final class AssumeRoleRequest extends Input
6060

6161
/**
6262
* A list of session tags that you want to pass. Each session tag consists of a key name and an associated value. For
63-
* more information about session tags, see Tagging AWS STS Sessions in the *IAM User Guide*.
63+
* more information about session tags, see Tagging STS Sessions in the *IAM User Guide*.
6464
*
6565
* @see https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html
6666
*
@@ -86,7 +86,7 @@ final class AssumeRoleRequest extends Input
8686
* up to trust everyone in an account. Therefore, the administrator of the trusting account might send an external ID to
8787
* the administrator of the trusted account. That way, only someone with the ID can assume the role, rather than
8888
* everyone in the account. For more information about the external ID, see How to Use an External ID When Granting
89-
* Access to Your AWS Resources to a Third Party in the *IAM User Guide*.
89+
* Access to Your Amazon Web Services Resources to a Third Party in the *IAM User Guide*.
9090
*
9191
* @see https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_create_for-user_externalid.html
9292
*

src/Sts/Result/AssumeRoleResponse.php

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,8 +8,8 @@
88
use AsyncAws\Core\Sts\ValueObject\Credentials;
99

1010
/**
11-
* Contains the response to a successful AssumeRole request, including temporary AWS credentials that can be used to
12-
* make AWS requests.
11+
* Contains the response to a successful AssumeRole request, including temporary Amazon Web Services credentials that
12+
* can be used to make Amazon Web Services requests.
1313
*/
1414
class AssumeRoleResponse extends Result
1515
{

src/Sts/Result/AssumeRoleWithWebIdentityResponse.php

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,8 +8,8 @@
88
use AsyncAws\Core\Sts\ValueObject\Credentials;
99

1010
/**
11-
* Contains the response to a successful AssumeRoleWithWebIdentity request, including temporary AWS credentials that can
12-
* be used to make AWS requests.
11+
* Contains the response to a successful AssumeRoleWithWebIdentity request, including temporary Amazon Web Services
12+
* credentials that can be used to make Amazon Web Services requests.
1313
*/
1414
class AssumeRoleWithWebIdentityResponse extends Result
1515
{

src/Sts/Result/GetCallerIdentityResponse.php

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -21,12 +21,12 @@ class GetCallerIdentityResponse extends Result
2121
private $userId;
2222

2323
/**
24-
* The AWS account ID number of the account that owns or contains the calling entity.
24+
* The Amazon Web Services account ID number of the account that owns or contains the calling entity.
2525
*/
2626
private $account;
2727

2828
/**
29-
* The AWS ARN associated with the calling entity.
29+
* The Amazon Web Services ARN associated with the calling entity.
3030
*/
3131
private $arn;
3232

src/Sts/StsClient.php

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -25,11 +25,11 @@
2525
class StsClient extends AbstractApi
2626
{
2727
/**
28-
* Returns a set of temporary security credentials that you can use to access AWS resources that you might not normally
29-
* have access to. These temporary credentials consist of an access key ID, a secret access key, and a security token.
30-
* Typically, you use `AssumeRole` within your account or for cross-account access. For a comparison of `AssumeRole`
31-
* with other API operations that produce temporary credentials, see Requesting Temporary Security Credentials and
32-
* Comparing the AWS STS API operations in the *IAM User Guide*.
28+
* Returns a set of temporary security credentials that you can use to access Amazon Web Services resources that you
29+
* might not normally have access to. These temporary credentials consist of an access key ID, a secret access key, and
30+
* a security token. Typically, you use `AssumeRole` within your account or for cross-account access. For a comparison
31+
* of `AssumeRole` with other API operations that produce temporary credentials, see Requesting Temporary Security
32+
* Credentials and Comparing the STS API operations in the *IAM User Guide*.
3333
*
3434
* @see https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html
3535
* @see https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#stsapi_comparison

src/Sts/ValueObject/AssumedRoleUser.php

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ final class AssumedRoleUser
1212
{
1313
/**
1414
* A unique identifier that contains the role ID and the role session name of the role that is being assumed. The role
15-
* ID is generated by AWS when the role is created.
15+
* ID is generated by Amazon Web Services when the role is created.
1616
*/
1717
private $assumedRoleId;
1818

0 commit comments

Comments
 (0)