Skip to content

Commit d4e5d3e

Browse files
awsmobilesdkpalpatim
authored andcommitted
[aws-android-sdk-core-sts] Update models to latest (#1112)
1 parent 90e430b commit d4e5d3e

File tree

5 files changed

+116
-51
lines changed

5 files changed

+116
-51
lines changed

aws-android-sdk-core/src/main/java/com/amazonaws/services/securitytoken/AWSSecurityTokenService.java

Lines changed: 31 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -546,17 +546,17 @@ AssumeRoleWithWebIdentityResult assumeRoleWithWebIdentity(
546546
* temporary credentials that are created using STS operations. If the
547547
* account in the response belongs to you, you can sign in as the root user
548548
* and review your root user access keys. Then, you can pull a <a href=
549-
* "https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_getting-report"
549+
* "https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_getting-report.html"
550550
* >credentials report</a> to learn which IAM user owns the keys. To learn
551551
* who requested the temporary credentials for an <code>ASIA</code> access
552552
* key, view the STS events in your <a href=
553-
* "https://docs.aws.amazon.com/IAM/latest/UserGuide/cloudtrail-integration"
553+
* "https://docs.aws.amazon.com/IAM/latest/UserGuide/cloudtrail-integration.html"
554554
* >CloudTrail logs</a>.
555555
* </p>
556556
* <p>
557557
* This operation does not indicate the state of the access key. The key
558558
* might be active, inactive, or deleted. Active keys might not have
559-
* permissions to perform an operation. Providing a deleted keys might
559+
* permissions to perform an operation. Providing a deleted access key might
560560
* return an error that the key doesn't exist.
561561
* </p>
562562
*
@@ -576,9 +576,21 @@ GetAccessKeyInfoResult getAccessKeyInfo(GetAccessKeyInfoRequest getAccessKeyInfo
576576

577577
/**
578578
* <p>
579-
* Returns details about the IAM identity whose credentials are used to call
580-
* the API.
579+
* Returns details about the IAM user or role whose credentials are used to
580+
* call the operation.
581581
* </p>
582+
* <note>
583+
* <p>
584+
* No permissions are required to perform this operation. If an
585+
* administrator adds a policy to your IAM user or role that explicitly
586+
* denies access to the <code>sts:GetCallerIdentity</code> action, you can
587+
* still perform this operation. Permissions are not required because the
588+
* same information is returned when an IAM user or role is denied access.
589+
* To view an example response, see <a href=
590+
* "https://docs.aws.amazon.com/IAM/latest/UserGuide/troubleshoot_general.html#troubleshoot_general_access-denied-delete-mfa"
591+
* >I Am Not Authorized to Perform: iam:DeleteVirtualMFADevice</a>.
592+
* </p>
593+
* </note>
582594
*
583595
* @param getCallerIdentityRequest
584596
* @return getCallerIdentityResult The response from the GetCallerIdentity
@@ -889,9 +901,21 @@ GetSessionTokenResult getSessionToken(GetSessionTokenRequest getSessionTokenRequ
889901

890902
/**
891903
* <p>
892-
* Returns details about the IAM identity whose credentials are used to call
893-
* the API.
904+
* Returns details about the IAM user or role whose credentials are used to
905+
* call the operation.
894906
* </p>
907+
* <note>
908+
* <p>
909+
* No permissions are required to perform this operation. If an
910+
* administrator adds a policy to your IAM user or role that explicitly
911+
* denies access to the <code>sts:GetCallerIdentity</code> action, you can
912+
* still perform this operation. Permissions are not required because the
913+
* same information is returned when an IAM user or role is denied access.
914+
* To view an example response, see <a href=
915+
* "https://docs.aws.amazon.com/IAM/latest/UserGuide/troubleshoot_general.html#troubleshoot_general_access-denied-delete-mfa"
916+
* >I Am Not Authorized to Perform: iam:DeleteVirtualMFADevice</a>.
917+
* </p>
918+
* </note>
895919
*
896920
* @return getCallerIdentityResult The response from the GetCallerIdentity
897921
* service method, as returned by AWS Security Token Service.

aws-android-sdk-core/src/main/java/com/amazonaws/services/securitytoken/AWSSecurityTokenServiceClient.java

Lines changed: 31 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -856,17 +856,17 @@ public AssumeRoleWithWebIdentityResult assumeRoleWithWebIdentity(
856856
* temporary credentials that are created using STS operations. If the
857857
* account in the response belongs to you, you can sign in as the root user
858858
* and review your root user access keys. Then, you can pull a <a href=
859-
* "https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_getting-report"
859+
* "https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_getting-report.html"
860860
* >credentials report</a> to learn which IAM user owns the keys. To learn
861861
* who requested the temporary credentials for an <code>ASIA</code> access
862862
* key, view the STS events in your <a href=
863-
* "https://docs.aws.amazon.com/IAM/latest/UserGuide/cloudtrail-integration"
863+
* "https://docs.aws.amazon.com/IAM/latest/UserGuide/cloudtrail-integration.html"
864864
* >CloudTrail logs</a>.
865865
* </p>
866866
* <p>
867867
* This operation does not indicate the state of the access key. The key
868868
* might be active, inactive, or deleted. Active keys might not have
869-
* permissions to perform an operation. Providing a deleted keys might
869+
* permissions to perform an operation. Providing a deleted access key might
870870
* return an error that the key doesn't exist.
871871
* </p>
872872
*
@@ -903,9 +903,21 @@ public GetAccessKeyInfoResult getAccessKeyInfo(GetAccessKeyInfoRequest getAccess
903903

904904
/**
905905
* <p>
906-
* Returns details about the IAM identity whose credentials are used to call
907-
* the API.
906+
* Returns details about the IAM user or role whose credentials are used to
907+
* call the operation.
908908
* </p>
909+
* <note>
910+
* <p>
911+
* No permissions are required to perform this operation. If an
912+
* administrator adds a policy to your IAM user or role that explicitly
913+
* denies access to the <code>sts:GetCallerIdentity</code> action, you can
914+
* still perform this operation. Permissions are not required because the
915+
* same information is returned when an IAM user or role is denied access.
916+
* To view an example response, see <a href=
917+
* "https://docs.aws.amazon.com/IAM/latest/UserGuide/troubleshoot_general.html#troubleshoot_general_access-denied-delete-mfa"
918+
* >I Am Not Authorized to Perform: iam:DeleteVirtualMFADevice</a>.
919+
* </p>
920+
* </note>
909921
*
910922
* @param getCallerIdentityRequest
911923
* @return getCallerIdentityResult The response from the GetCallerIdentity
@@ -1273,9 +1285,21 @@ public GetSessionTokenResult getSessionToken()
12731285

12741286
/**
12751287
* <p>
1276-
* Returns details about the IAM identity whose credentials are used to call
1277-
* the API.
1288+
* Returns details about the IAM user or role whose credentials are used to
1289+
* call the operation.
12781290
* </p>
1291+
* <note>
1292+
* <p>
1293+
* No permissions are required to perform this operation. If an
1294+
* administrator adds a policy to your IAM user or role that explicitly
1295+
* denies access to the <code>sts:GetCallerIdentity</code> action, you can
1296+
* still perform this operation. Permissions are not required because the
1297+
* same information is returned when an IAM user or role is denied access.
1298+
* To view an example response, see <a href=
1299+
* "https://docs.aws.amazon.com/IAM/latest/UserGuide/troubleshoot_general.html#troubleshoot_general_access-denied-delete-mfa"
1300+
* >I Am Not Authorized to Perform: iam:DeleteVirtualMFADevice</a>.
1301+
* </p>
1302+
* </note>
12791303
*
12801304
* @return getCallerIdentityResult The response from the GetCallerIdentity
12811305
* service method, as returned by AWS Security Token Service.

aws-android-sdk-core/src/main/java/com/amazonaws/services/securitytoken/model/GetAccessKeyInfoRequest.java

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -39,18 +39,18 @@
3939
* temporary credentials that are created using STS operations. If the account
4040
* in the response belongs to you, you can sign in as the root user and review
4141
* your root user access keys. Then, you can pull a <a href=
42-
* "https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_getting-report"
42+
* "https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_getting-report.html"
4343
* >credentials report</a> to learn which IAM user owns the keys. To learn who
4444
* requested the temporary credentials for an <code>ASIA</code> access key, view
4545
* the STS events in your <a href=
46-
* "https://docs.aws.amazon.com/IAM/latest/UserGuide/cloudtrail-integration"
46+
* "https://docs.aws.amazon.com/IAM/latest/UserGuide/cloudtrail-integration.html"
4747
* >CloudTrail logs</a>.
4848
* </p>
4949
* <p>
5050
* This operation does not indicate the state of the access key. The key might
5151
* be active, inactive, or deleted. Active keys might not have permissions to
52-
* perform an operation. Providing a deleted keys might return an error that the
53-
* key doesn't exist.
52+
* perform an operation. Providing a deleted access key might return an error
53+
* that the key doesn't exist.
5454
* </p>
5555
*/
5656
public class GetAccessKeyInfoRequest extends AmazonWebServiceRequest implements Serializable {

aws-android-sdk-core/src/main/java/com/amazonaws/services/securitytoken/model/GetCallerIdentityRequest.java

Lines changed: 14 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -21,9 +21,21 @@
2121

2222
/**
2323
* <p>
24-
* Returns details about the IAM identity whose credentials are used to call the
25-
* API.
24+
* Returns details about the IAM user or role whose credentials are used to call
25+
* the operation.
2626
* </p>
27+
* <note>
28+
* <p>
29+
* No permissions are required to perform this operation. If an administrator
30+
* adds a policy to your IAM user or role that explicitly denies access to the
31+
* <code>sts:GetCallerIdentity</code> action, you can still perform this
32+
* operation. Permissions are not required because the same information is
33+
* returned when an IAM user or role is denied access. To view an example
34+
* response, see <a href=
35+
* "https://docs.aws.amazon.com/IAM/latest/UserGuide/troubleshoot_general.html#troubleshoot_general_access-denied-delete-mfa"
36+
* >I Am Not Authorized to Perform: iam:DeleteVirtualMFADevice</a>.
37+
* </p>
38+
* </note>
2739
*/
2840
public class GetCallerIdentityRequest extends AmazonWebServiceRequest implements Serializable {
2941
/**

aws-android-sdk-core/src/main/java/com/amazonaws/services/securitytoken/model/GetFederationTokenRequest.java

Lines changed: 36 additions & 31 deletions
Original file line numberDiff line numberDiff line change
@@ -200,9 +200,10 @@ public class GetFederationTokenRequest extends AmazonWebServiceRequest implement
200200
* 10 managed policies to use as managed session policies. The plain text
201201
* that you use for both inline and managed session policies shouldn't
202202
* exceed 2048 characters. You can provide up to 10 managed policy ARNs. For
203-
* more information about ARNs, see <a
204-
* href="general/latest/gr/aws-arns-and-namespaces.html">Amazon Resource
205-
* Names (ARNs) and AWS Service Namespaces</a> in the AWS General Reference.
203+
* more information about ARNs, see <a href=
204+
* "https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html"
205+
* >Amazon Resource Names (ARNs) and AWS Service Namespaces</a> in the AWS
206+
* General Reference.
206207
* </p>
207208
* <p>
208209
* This parameter is optional. However, if you do not pass any session
@@ -729,9 +730,10 @@ public GetFederationTokenRequest withPolicy(String policy) {
729730
* 10 managed policies to use as managed session policies. The plain text
730731
* that you use for both inline and managed session policies shouldn't
731732
* exceed 2048 characters. You can provide up to 10 managed policy ARNs. For
732-
* more information about ARNs, see <a
733-
* href="general/latest/gr/aws-arns-and-namespaces.html">Amazon Resource
734-
* Names (ARNs) and AWS Service Namespaces</a> in the AWS General Reference.
733+
* more information about ARNs, see <a href=
734+
* "https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html"
735+
* >Amazon Resource Names (ARNs) and AWS Service Namespaces</a> in the AWS
736+
* General Reference.
735737
* </p>
736738
* <p>
737739
* This parameter is optional. However, if you do not pass any session
@@ -776,10 +778,10 @@ public GetFederationTokenRequest withPolicy(String policy) {
776778
* policies. The plain text that you use for both inline and managed
777779
* session policies shouldn't exceed 2048 characters. You can
778780
* provide up to 10 managed policy ARNs. For more information about
779-
* ARNs, see <a
780-
* href="general/latest/gr/aws-arns-and-namespaces.html">Amazon
781-
* Resource Names (ARNs) and AWS Service Namespaces</a> in the AWS
782-
* General Reference.
781+
* ARNs, see <a href=
782+
* "https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html"
783+
* >Amazon Resource Names (ARNs) and AWS Service Namespaces</a> in
784+
* the AWS General Reference.
783785
* </p>
784786
* <p>
785787
* This parameter is optional. However, if you do not pass any
@@ -829,9 +831,10 @@ public java.util.List<PolicyDescriptorType> getPolicyArns() {
829831
* 10 managed policies to use as managed session policies. The plain text
830832
* that you use for both inline and managed session policies shouldn't
831833
* exceed 2048 characters. You can provide up to 10 managed policy ARNs. For
832-
* more information about ARNs, see <a
833-
* href="general/latest/gr/aws-arns-and-namespaces.html">Amazon Resource
834-
* Names (ARNs) and AWS Service Namespaces</a> in the AWS General Reference.
834+
* more information about ARNs, see <a href=
835+
* "https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html"
836+
* >Amazon Resource Names (ARNs) and AWS Service Namespaces</a> in the AWS
837+
* General Reference.
835838
* </p>
836839
* <p>
837840
* This parameter is optional. However, if you do not pass any session
@@ -876,10 +879,10 @@ public java.util.List<PolicyDescriptorType> getPolicyArns() {
876879
* session policies. The plain text that you use for both inline
877880
* and managed session policies shouldn't exceed 2048 characters.
878881
* You can provide up to 10 managed policy ARNs. For more
879-
* information about ARNs, see <a
880-
* href="general/latest/gr/aws-arns-and-namespaces.html">Amazon
881-
* Resource Names (ARNs) and AWS Service Namespaces</a> in the
882-
* AWS General Reference.
882+
* information about ARNs, see <a href=
883+
* "https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html"
884+
* >Amazon Resource Names (ARNs) and AWS Service Namespaces</a>
885+
* in the AWS General Reference.
883886
* </p>
884887
* <p>
885888
* This parameter is optional. However, if you do not pass any
@@ -934,9 +937,10 @@ public void setPolicyArns(java.util.Collection<PolicyDescriptorType> policyArns)
934937
* 10 managed policies to use as managed session policies. The plain text
935938
* that you use for both inline and managed session policies shouldn't
936939
* exceed 2048 characters. You can provide up to 10 managed policy ARNs. For
937-
* more information about ARNs, see <a
938-
* href="general/latest/gr/aws-arns-and-namespaces.html">Amazon Resource
939-
* Names (ARNs) and AWS Service Namespaces</a> in the AWS General Reference.
940+
* more information about ARNs, see <a href=
941+
* "https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html"
942+
* >Amazon Resource Names (ARNs) and AWS Service Namespaces</a> in the AWS
943+
* General Reference.
940944
* </p>
941945
* <p>
942946
* This parameter is optional. However, if you do not pass any session
@@ -984,10 +988,10 @@ public void setPolicyArns(java.util.Collection<PolicyDescriptorType> policyArns)
984988
* session policies. The plain text that you use for both inline
985989
* and managed session policies shouldn't exceed 2048 characters.
986990
* You can provide up to 10 managed policy ARNs. For more
987-
* information about ARNs, see <a
988-
* href="general/latest/gr/aws-arns-and-namespaces.html">Amazon
989-
* Resource Names (ARNs) and AWS Service Namespaces</a> in the
990-
* AWS General Reference.
991+
* information about ARNs, see <a href=
992+
* "https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html"
993+
* >Amazon Resource Names (ARNs) and AWS Service Namespaces</a>
994+
* in the AWS General Reference.
991995
* </p>
992996
* <p>
993997
* This parameter is optional. However, if you do not pass any
@@ -1045,9 +1049,10 @@ public GetFederationTokenRequest withPolicyArns(PolicyDescriptorType... policyAr
10451049
* 10 managed policies to use as managed session policies. The plain text
10461050
* that you use for both inline and managed session policies shouldn't
10471051
* exceed 2048 characters. You can provide up to 10 managed policy ARNs. For
1048-
* more information about ARNs, see <a
1049-
* href="general/latest/gr/aws-arns-and-namespaces.html">Amazon Resource
1050-
* Names (ARNs) and AWS Service Namespaces</a> in the AWS General Reference.
1052+
* more information about ARNs, see <a href=
1053+
* "https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html"
1054+
* >Amazon Resource Names (ARNs) and AWS Service Namespaces</a> in the AWS
1055+
* General Reference.
10511056
* </p>
10521057
* <p>
10531058
* This parameter is optional. However, if you do not pass any session
@@ -1095,10 +1100,10 @@ public GetFederationTokenRequest withPolicyArns(PolicyDescriptorType... policyAr
10951100
* session policies. The plain text that you use for both inline
10961101
* and managed session policies shouldn't exceed 2048 characters.
10971102
* You can provide up to 10 managed policy ARNs. For more
1098-
* information about ARNs, see <a
1099-
* href="general/latest/gr/aws-arns-and-namespaces.html">Amazon
1100-
* Resource Names (ARNs) and AWS Service Namespaces</a> in the
1101-
* AWS General Reference.
1103+
* information about ARNs, see <a href=
1104+
* "https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html"
1105+
* >Amazon Resource Names (ARNs) and AWS Service Namespaces</a>
1106+
* in the AWS General Reference.
11021107
* </p>
11031108
* <p>
11041109
* This parameter is optional. However, if you do not pass any

0 commit comments

Comments
 (0)