Skip to content

Commit 0dc8c51

Browse files
authored
feat(aws-android-sdk-core): update models to latest (#2537)
1 parent bfe64c7 commit 0dc8c51

25 files changed

+1620
-1527
lines changed

aws-android-sdk-core/src/main/java/com/amazonaws/services/securitytoken/AWSSecurityTokenService.java

Lines changed: 218 additions & 199 deletions
Large diffs are not rendered by default.

aws-android-sdk-core/src/main/java/com/amazonaws/services/securitytoken/AWSSecurityTokenServiceClient.java

Lines changed: 217 additions & 198 deletions
Large diffs are not rendered by default.

aws-android-sdk-core/src/main/java/com/amazonaws/services/securitytoken/model/AssumeRoleRequest.java

Lines changed: 338 additions & 325 deletions
Large diffs are not rendered by default.

aws-android-sdk-core/src/main/java/com/amazonaws/services/securitytoken/model/AssumeRoleResult.java

Lines changed: 34 additions & 32 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,8 @@
2020
/**
2121
* <p>
2222
* Contains the response to a successful <a>AssumeRole</a> request, including
23-
* temporary AWS credentials that can be used to make AWS requests.
23+
* temporary Amazon Web Services credentials that can be used to make Amazon Web
24+
* Services requests.
2425
* </p>
2526
*/
2627
public class AssumeRoleResult implements Serializable {
@@ -73,10 +74,10 @@ public class AssumeRoleResult implements Serializable {
7374
* You can require users to specify a source identity when they assume a
7475
* role. You do this by using the <code>sts:SourceIdentity</code> condition
7576
* key in a role trust policy. You can use source identity information in
76-
* AWS CloudTrail logs to determine who took actions with a role. You can
77-
* use the <code>aws:SourceIdentity</code> condition key to further control
78-
* access to AWS resources based on the value of source identity. For more
79-
* information about using source identity, see <a href=
77+
* CloudTrail logs to determine who took actions with a role. You can use
78+
* the <code>aws:SourceIdentity</code> condition key to further control
79+
* access to Amazon Web Services resources based on the value of source
80+
* identity. For more information about using source identity, see <a href=
8081
* "https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_monitor.html"
8182
* >Monitor and control actions taken with assumed roles</a> in the <i>IAM
8283
* User Guide</i>.
@@ -350,10 +351,10 @@ public AssumeRoleResult withPackedPolicySize(Integer packedPolicySize) {
350351
* You can require users to specify a source identity when they assume a
351352
* role. You do this by using the <code>sts:SourceIdentity</code> condition
352353
* key in a role trust policy. You can use source identity information in
353-
* AWS CloudTrail logs to determine who took actions with a role. You can
354-
* use the <code>aws:SourceIdentity</code> condition key to further control
355-
* access to AWS resources based on the value of source identity. For more
356-
* information about using source identity, see <a href=
354+
* CloudTrail logs to determine who took actions with a role. You can use
355+
* the <code>aws:SourceIdentity</code> condition key to further control
356+
* access to Amazon Web Services resources based on the value of source
357+
* identity. For more information about using source identity, see <a href=
357358
* "https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_monitor.html"
358359
* >Monitor and control actions taken with assumed roles</a> in the <i>IAM
359360
* User Guide</i>.
@@ -377,11 +378,12 @@ public AssumeRoleResult withPackedPolicySize(Integer packedPolicySize) {
377378
* You can require users to specify a source identity when they
378379
* assume a role. You do this by using the
379380
* <code>sts:SourceIdentity</code> condition key in a role trust
380-
* policy. You can use source identity information in AWS CloudTrail
381+
* policy. You can use source identity information in CloudTrail
381382
* logs to determine who took actions with a role. You can use the
382383
* <code>aws:SourceIdentity</code> condition key to further control
383-
* access to AWS resources based on the value of source identity.
384-
* For more information about using source identity, see <a href=
384+
* access to Amazon Web Services resources based on the value of
385+
* source identity. For more information about using source
386+
* identity, see <a href=
385387
* "https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_monitor.html"
386388
* >Monitor and control actions taken with assumed roles</a> in the
387389
* <i>IAM User Guide</i>.
@@ -406,10 +408,10 @@ public String getSourceIdentity() {
406408
* You can require users to specify a source identity when they assume a
407409
* role. You do this by using the <code>sts:SourceIdentity</code> condition
408410
* key in a role trust policy. You can use source identity information in
409-
* AWS CloudTrail logs to determine who took actions with a role. You can
410-
* use the <code>aws:SourceIdentity</code> condition key to further control
411-
* access to AWS resources based on the value of source identity. For more
412-
* information about using source identity, see <a href=
411+
* CloudTrail logs to determine who took actions with a role. You can use
412+
* the <code>aws:SourceIdentity</code> condition key to further control
413+
* access to Amazon Web Services resources based on the value of source
414+
* identity. For more information about using source identity, see <a href=
413415
* "https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_monitor.html"
414416
* >Monitor and control actions taken with assumed roles</a> in the <i>IAM
415417
* User Guide</i>.
@@ -433,12 +435,12 @@ public String getSourceIdentity() {
433435
* You can require users to specify a source identity when they
434436
* assume a role. You do this by using the
435437
* <code>sts:SourceIdentity</code> condition key in a role trust
436-
* policy. You can use source identity information in AWS
437-
* CloudTrail logs to determine who took actions with a role. You
438-
* can use the <code>aws:SourceIdentity</code> condition key to
439-
* further control access to AWS resources based on the value of
440-
* source identity. For more information about using source
441-
* identity, see <a href=
438+
* policy. You can use source identity information in CloudTrail
439+
* logs to determine who took actions with a role. You can use
440+
* the <code>aws:SourceIdentity</code> condition key to further
441+
* control access to Amazon Web Services resources based on the
442+
* value of source identity. For more information about using
443+
* source identity, see <a href=
442444
* "https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_monitor.html"
443445
* >Monitor and control actions taken with assumed roles</a> in
444446
* the <i>IAM User Guide</i>.
@@ -463,10 +465,10 @@ public void setSourceIdentity(String sourceIdentity) {
463465
* You can require users to specify a source identity when they assume a
464466
* role. You do this by using the <code>sts:SourceIdentity</code> condition
465467
* key in a role trust policy. You can use source identity information in
466-
* AWS CloudTrail logs to determine who took actions with a role. You can
467-
* use the <code>aws:SourceIdentity</code> condition key to further control
468-
* access to AWS resources based on the value of source identity. For more
469-
* information about using source identity, see <a href=
468+
* CloudTrail logs to determine who took actions with a role. You can use
469+
* the <code>aws:SourceIdentity</code> condition key to further control
470+
* access to Amazon Web Services resources based on the value of source
471+
* identity. For more information about using source identity, see <a href=
470472
* "https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_monitor.html"
471473
* >Monitor and control actions taken with assumed roles</a> in the <i>IAM
472474
* User Guide</i>.
@@ -493,12 +495,12 @@ public void setSourceIdentity(String sourceIdentity) {
493495
* You can require users to specify a source identity when they
494496
* assume a role. You do this by using the
495497
* <code>sts:SourceIdentity</code> condition key in a role trust
496-
* policy. You can use source identity information in AWS
497-
* CloudTrail logs to determine who took actions with a role. You
498-
* can use the <code>aws:SourceIdentity</code> condition key to
499-
* further control access to AWS resources based on the value of
500-
* source identity. For more information about using source
501-
* identity, see <a href=
498+
* policy. You can use source identity information in CloudTrail
499+
* logs to determine who took actions with a role. You can use
500+
* the <code>aws:SourceIdentity</code> condition key to further
501+
* control access to Amazon Web Services resources based on the
502+
* value of source identity. For more information about using
503+
* source identity, see <a href=
502504
* "https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_monitor.html"
503505
* >Monitor and control actions taken with assumed roles</a> in
504506
* the <i>IAM User Guide</i>.

0 commit comments

Comments
 (0)