Skip to content

Commit 240f303

Browse files
feat(aws-android-sdk-core): update models to latest (#2132)
Co-authored-by: Rafael Juliano <[email protected]>
1 parent b83791e commit 240f303

File tree

4 files changed

+19
-213
lines changed

4 files changed

+19
-213
lines changed

aws-android-sdk-core/src/main/java/com/amazonaws/services/securitytoken/AWSSecurityTokenService.java

Lines changed: 8 additions & 105 deletions
Original file line numberDiff line numberDiff line change
@@ -23,112 +23,14 @@
2323
* Interface for accessing AWS Security Token Service <fullname>AWS Security
2424
* Token Service</fullname>
2525
* <p>
26-
* The AWS Security Token Service (STS) is a web service that enables you to
27-
* request temporary, limited-privilege credentials for AWS Identity and Access
28-
* Management (IAM) users or for users that you authenticate (federated users).
29-
* This guide provides descriptions of the STS API. For more detailed
30-
* information about using this service, go to <a href=
26+
* AWS Security Token Service (STS) enables you to request temporary,
27+
* limited-privilege credentials for AWS Identity and Access Management (IAM)
28+
* users or for users that you authenticate (federated users). This guide
29+
* provides descriptions of the STS API. For more information about using this
30+
* service, see <a href=
3131
* "https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp.html"
3232
* >Temporary Security Credentials</a>.
3333
* </p>
34-
* <p>
35-
* For information about setting up signatures and authorization through the
36-
* API, go to <a href=
37-
* "https://docs.aws.amazon.com/general/latest/gr/signing_aws_api_requests.html"
38-
* >Signing AWS API Requests</a> in the <i>AWS General Reference</i>. For
39-
* general information about the Query API, go to <a href=
40-
* "https://docs.aws.amazon.com/IAM/latest/UserGuide/IAM_UsingQueryAPI.html"
41-
* >Making Query Requests</a> in <i>Using IAM</i>. For information about using
42-
* security tokens with other AWS products, go to <a href=
43-
* "https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_aws-services-that-work-with-iam.html"
44-
* >AWS Services That Work with IAM</a> in the <i>IAM User Guide</i>.
45-
* </p>
46-
* <p>
47-
* If you're new to AWS and need additional technical information about a
48-
* specific AWS product, you can find the product's technical documentation at
49-
* <a href="http://aws.amazon.com/documentation/">http://aws.amazon.com/
50-
* documentation/</a>.
51-
* </p>
52-
* <p>
53-
* <b>Endpoints</b>
54-
* </p>
55-
* <p>
56-
* By default, AWS Security Token Service (STS) is available as a global
57-
* service, and all AWS STS requests go to a single endpoint at
58-
* <code>https://sts.amazonaws.com</code>. Global requests map to the US East
59-
* (N. Virginia) region. AWS recommends using Regional AWS STS endpoints instead
60-
* of the global endpoint to reduce latency, build in redundancy, and increase
61-
* session token validity. For more information, see <a href=
62-
* "https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html"
63-
* >Managing AWS STS in an AWS Region</a> in the <i>IAM User Guide</i>.
64-
* </p>
65-
* <p>
66-
* Most AWS Regions are enabled for operations in all AWS services by default.
67-
* Those Regions are automatically activated for use with AWS STS. Some Regions,
68-
* such as Asia Pacific (Hong Kong), must be manually enabled. To learn more
69-
* about enabling and disabling AWS Regions, see <a
70-
* href="https://docs.aws.amazon.com/general/latest/gr/rande-manage.html"
71-
* >Managing AWS Regions</a> in the <i>AWS General Reference</i>. When you
72-
* enable these AWS Regions, they are automatically activated for use with AWS
73-
* STS. You cannot activate the STS endpoint for a Region that is disabled.
74-
* Tokens that are valid in all AWS Regions are longer than tokens that are
75-
* valid in Regions that are enabled by default. Changing this setting might
76-
* affect existing systems where you temporarily store tokens. For more
77-
* information, see <a href=
78-
* "https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html#sts-regions-manage-tokens"
79-
* >Managing Global Endpoint Session Tokens</a> in the <i>IAM User Guide</i>.
80-
* </p>
81-
* <p>
82-
* After you activate a Region for use with AWS STS, you can direct AWS STS API
83-
* calls to that Region. AWS STS recommends that you provide both the Region and
84-
* endpoint when you make calls to a Regional endpoint. You can provide the
85-
* Region alone for manually enabled Regions, such as Asia Pacific (Hong Kong).
86-
* In this case, the calls are directed to the STS Regional endpoint. However,
87-
* if you provide the Region alone for Regions enabled by default, the calls are
88-
* directed to the global endpoint of <code>https://sts.amazonaws.com</code>.
89-
* </p>
90-
* <p>
91-
* To view the list of AWS STS endpoints and whether they are active by default,
92-
* see <a href=
93-
* "https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html#id_credentials_temp_enable-regions_writing_code"
94-
* >Writing Code to Use AWS STS Regions</a> in the <i>IAM User Guide</i>.
95-
* </p>
96-
* <p>
97-
* <b>Recording API requests</b>
98-
* </p>
99-
* <p>
100-
* STS supports AWS CloudTrail, which is a service that records AWS calls for
101-
* your AWS account and delivers log files to an Amazon S3 bucket. By using
102-
* information collected by CloudTrail, you can determine what requests were
103-
* successfully made to STS, who made the request, when it was made, and so on.
104-
* </p>
105-
* <p>
106-
* If you activate AWS STS endpoints in Regions other than the default global
107-
* endpoint, then you must also turn on CloudTrail logging in those Regions.
108-
* This is necessary to record any AWS STS API calls that are made in those
109-
* Regions. For more information, see <a href=
110-
* "https://docs.aws.amazon.com/awscloudtrail/latest/userguide/aggregating_logs_regions_turn_on_ct.html"
111-
* >Turning On CloudTrail in Additional Regions</a> in the <i>AWS CloudTrail
112-
* User Guide</i>.
113-
* </p>
114-
* <p>
115-
* AWS Security Token Service (STS) is a global service with a single endpoint
116-
* at <code>https://sts.amazonaws.com</code>. Calls to this endpoint are logged
117-
* as calls to a global service. However, because this endpoint is physically
118-
* located in the US East (N. Virginia) Region, your logs list
119-
* <code>us-east-1</code> as the event Region. CloudTrail does not write these
120-
* logs to the US East (Ohio) Region unless you choose to include global service
121-
* logs in that Region. CloudTrail writes calls to all Regional endpoints to
122-
* their respective Regions. For example, calls to sts.us-east-2.amazonaws.com
123-
* are published to the US East (Ohio) Region and calls to
124-
* sts.eu-central-1.amazonaws.com are published to the EU (Frankfurt) Region.
125-
* </p>
126-
* <p>
127-
* To learn more about CloudTrail, including how to turn it on and find your log
128-
* files, see the <a href=
129-
* "https://docs.aws.amazon.com/awscloudtrail/latest/userguide/what_is_cloud_trail_top_level.html"
130-
* >AWS CloudTrail User Guide</a>.
131-
* </p>
13234
**/
13335
public interface AWSSecurityTokenService {
13436

@@ -365,6 +267,7 @@ public interface AWSSecurityTokenService {
365267
* @throws MalformedPolicyDocumentException
366268
* @throws PackedPolicyTooLargeException
367269
* @throws RegionDisabledException
270+
* @throws ExpiredTokenException
368271
* @throws AmazonClientException If any internal errors are encountered
369272
* inside the client while attempting to make the request or
370273
* handle the response. For example if a network connection is
@@ -762,8 +665,8 @@ AssumeRoleWithSAMLResult assumeRoleWithSAML(AssumeRoleWithSAMLRequest assumeRole
762665
* <li>
763666
* <p>
764667
* <a href=
765-
* "https://web-identity-federation-playground.s3.amazonaws.com/index.html">
766-
* Web Identity Federation Playground</a>. Walk through the process of
668+
* "https://aws.amazon.com/blogs/aws/the-aws-web-identity-federation-playground/"
669+
* > Web Identity Federation Playground</a>. Walk through the process of
767670
* authenticating through Login with Amazon, Facebook, or Google, getting
768671
* temporary security credentials, and then using those credentials to make
769672
* a request to AWS.

aws-android-sdk-core/src/main/java/com/amazonaws/services/securitytoken/AWSSecurityTokenServiceClient.java

Lines changed: 8 additions & 105 deletions
Original file line numberDiff line numberDiff line change
@@ -39,112 +39,14 @@
3939
* <p>
4040
* <fullname>AWS Security Token Service</fullname>
4141
* <p>
42-
* The AWS Security Token Service (STS) is a web service that enables you to
43-
* request temporary, limited-privilege credentials for AWS Identity and Access
44-
* Management (IAM) users or for users that you authenticate (federated users).
45-
* This guide provides descriptions of the STS API. For more detailed
46-
* information about using this service, go to <a href=
42+
* AWS Security Token Service (STS) enables you to request temporary,
43+
* limited-privilege credentials for AWS Identity and Access Management (IAM)
44+
* users or for users that you authenticate (federated users). This guide
45+
* provides descriptions of the STS API. For more information about using this
46+
* service, see <a href=
4747
* "https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp.html"
4848
* >Temporary Security Credentials</a>.
4949
* </p>
50-
* <p>
51-
* For information about setting up signatures and authorization through the
52-
* API, go to <a href=
53-
* "https://docs.aws.amazon.com/general/latest/gr/signing_aws_api_requests.html"
54-
* >Signing AWS API Requests</a> in the <i>AWS General Reference</i>. For
55-
* general information about the Query API, go to <a href=
56-
* "https://docs.aws.amazon.com/IAM/latest/UserGuide/IAM_UsingQueryAPI.html"
57-
* >Making Query Requests</a> in <i>Using IAM</i>. For information about using
58-
* security tokens with other AWS products, go to <a href=
59-
* "https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_aws-services-that-work-with-iam.html"
60-
* >AWS Services That Work with IAM</a> in the <i>IAM User Guide</i>.
61-
* </p>
62-
* <p>
63-
* If you're new to AWS and need additional technical information about a
64-
* specific AWS product, you can find the product's technical documentation at
65-
* <a href="http://aws.amazon.com/documentation/">http://aws.amazon.com/
66-
* documentation/</a>.
67-
* </p>
68-
* <p>
69-
* <b>Endpoints</b>
70-
* </p>
71-
* <p>
72-
* By default, AWS Security Token Service (STS) is available as a global
73-
* service, and all AWS STS requests go to a single endpoint at
74-
* <code>https://sts.amazonaws.com</code>. Global requests map to the US East
75-
* (N. Virginia) region. AWS recommends using Regional AWS STS endpoints instead
76-
* of the global endpoint to reduce latency, build in redundancy, and increase
77-
* session token validity. For more information, see <a href=
78-
* "https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html"
79-
* >Managing AWS STS in an AWS Region</a> in the <i>IAM User Guide</i>.
80-
* </p>
81-
* <p>
82-
* Most AWS Regions are enabled for operations in all AWS services by default.
83-
* Those Regions are automatically activated for use with AWS STS. Some Regions,
84-
* such as Asia Pacific (Hong Kong), must be manually enabled. To learn more
85-
* about enabling and disabling AWS Regions, see <a
86-
* href="https://docs.aws.amazon.com/general/latest/gr/rande-manage.html"
87-
* >Managing AWS Regions</a> in the <i>AWS General Reference</i>. When you
88-
* enable these AWS Regions, they are automatically activated for use with AWS
89-
* STS. You cannot activate the STS endpoint for a Region that is disabled.
90-
* Tokens that are valid in all AWS Regions are longer than tokens that are
91-
* valid in Regions that are enabled by default. Changing this setting might
92-
* affect existing systems where you temporarily store tokens. For more
93-
* information, see <a href=
94-
* "https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html#sts-regions-manage-tokens"
95-
* >Managing Global Endpoint Session Tokens</a> in the <i>IAM User Guide</i>.
96-
* </p>
97-
* <p>
98-
* After you activate a Region for use with AWS STS, you can direct AWS STS API
99-
* calls to that Region. AWS STS recommends that you provide both the Region and
100-
* endpoint when you make calls to a Regional endpoint. You can provide the
101-
* Region alone for manually enabled Regions, such as Asia Pacific (Hong Kong).
102-
* In this case, the calls are directed to the STS Regional endpoint. However,
103-
* if you provide the Region alone for Regions enabled by default, the calls are
104-
* directed to the global endpoint of <code>https://sts.amazonaws.com</code>.
105-
* </p>
106-
* <p>
107-
* To view the list of AWS STS endpoints and whether they are active by default,
108-
* see <a href=
109-
* "https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html#id_credentials_temp_enable-regions_writing_code"
110-
* >Writing Code to Use AWS STS Regions</a> in the <i>IAM User Guide</i>.
111-
* </p>
112-
* <p>
113-
* <b>Recording API requests</b>
114-
* </p>
115-
* <p>
116-
* STS supports AWS CloudTrail, which is a service that records AWS calls for
117-
* your AWS account and delivers log files to an Amazon S3 bucket. By using
118-
* information collected by CloudTrail, you can determine what requests were
119-
* successfully made to STS, who made the request, when it was made, and so on.
120-
* </p>
121-
* <p>
122-
* If you activate AWS STS endpoints in Regions other than the default global
123-
* endpoint, then you must also turn on CloudTrail logging in those Regions.
124-
* This is necessary to record any AWS STS API calls that are made in those
125-
* Regions. For more information, see <a href=
126-
* "https://docs.aws.amazon.com/awscloudtrail/latest/userguide/aggregating_logs_regions_turn_on_ct.html"
127-
* >Turning On CloudTrail in Additional Regions</a> in the <i>AWS CloudTrail
128-
* User Guide</i>.
129-
* </p>
130-
* <p>
131-
* AWS Security Token Service (STS) is a global service with a single endpoint
132-
* at <code>https://sts.amazonaws.com</code>. Calls to this endpoint are logged
133-
* as calls to a global service. However, because this endpoint is physically
134-
* located in the US East (N. Virginia) Region, your logs list
135-
* <code>us-east-1</code> as the event Region. CloudTrail does not write these
136-
* logs to the US East (Ohio) Region unless you choose to include global service
137-
* logs in that Region. CloudTrail writes calls to all Regional endpoints to
138-
* their respective Regions. For example, calls to sts.us-east-2.amazonaws.com
139-
* are published to the US East (Ohio) Region and calls to
140-
* sts.eu-central-1.amazonaws.com are published to the EU (Frankfurt) Region.
141-
* </p>
142-
* <p>
143-
* To learn more about CloudTrail, including how to turn it on and find your log
144-
* files, see the <a href=
145-
* "https://docs.aws.amazon.com/awscloudtrail/latest/userguide/what_is_cloud_trail_top_level.html"
146-
* >AWS CloudTrail User Guide</a>.
147-
* </p>
14850
*/
14951
public class AWSSecurityTokenServiceClient extends AmazonWebServiceClient implements
15052
AWSSecurityTokenService {
@@ -642,6 +544,7 @@ private static ClientConfiguration adjustClientConfiguration(ClientConfiguration
642544
* @throws MalformedPolicyDocumentException
643545
* @throws PackedPolicyTooLargeException
644546
* @throws RegionDisabledException
547+
* @throws ExpiredTokenException
645548
* @throws AmazonClientException If any internal errors are encountered
646549
* inside the client while attempting to make the request or
647550
* handle the response. For example if a network connection is
@@ -1073,8 +976,8 @@ public AssumeRoleWithSAMLResult assumeRoleWithSAML(
1073976
* <li>
1074977
* <p>
1075978
* <a href=
1076-
* "https://web-identity-federation-playground.s3.amazonaws.com/index.html">
1077-
* Web Identity Federation Playground</a>. Walk through the process of
979+
* "https://aws.amazon.com/blogs/aws/the-aws-web-identity-federation-playground/"
980+
* > Web Identity Federation Playground</a>. Walk through the process of
1078981
* authenticating through Login with Amazon, Facebook, or Google, getting
1079982
* temporary security credentials, and then using those credentials to make
1080983
* a request to AWS.

aws-android-sdk-core/src/main/java/com/amazonaws/services/securitytoken/model/AssumeRoleWithWebIdentityRequest.java

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -196,8 +196,8 @@
196196
* <li>
197197
* <p>
198198
* <a href=
199-
* "https://web-identity-federation-playground.s3.amazonaws.com/index.html"> Web
200-
* Identity Federation Playground</a>. Walk through the process of
199+
* "https://aws.amazon.com/blogs/aws/the-aws-web-identity-federation-playground/"
200+
* > Web Identity Federation Playground</a>. Walk through the process of
201201
* authenticating through Login with Amazon, Facebook, or Google, getting
202202
* temporary security credentials, and then using those credentials to make a
203203
* request to AWS.

0 commit comments

Comments
 (0)