Skip to content

Commit 1155064

Browse files
chore: Updates version to 1.5.56
1 parent 636af28 commit 1155064

File tree

424 files changed

+36094
-34974
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

424 files changed

+36094
-34974
lines changed

Package.swift

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ import PackageDescription
1515

1616
// MARK: - Dynamic Content
1717

18-
let clientRuntimeVersion: Version = "0.159.0"
18+
let clientRuntimeVersion: Version = "0.160.0"
1919
let crtVersion: Version = "0.54.0"
2020

2121
let excludeRuntimeUnitTests = false

Package.version

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
1.5.55
1+
1.5.56

Package.version.next

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
1.5.56
1+
1.5.57

Sources/Core/AWSSDKIdentity/InternalClients/InternalAWSCognitoIdentity/Sources/InternalAWSCognitoIdentity/CognitoIdentityClient.swift

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -66,7 +66,7 @@ import typealias SmithyHTTPAuthAPI.AuthSchemes
6666

6767
package class CognitoIdentityClient: ClientRuntime.Client {
6868
public static let clientName = "CognitoIdentityClient"
69-
public static let version = "1.5.55"
69+
public static let version = "1.5.56"
7070
let client: ClientRuntime.SdkHttpClient
7171
let config: CognitoIdentityClient.CognitoIdentityClientConfiguration
7272
let serviceName = "Cognito Identity"
@@ -372,9 +372,9 @@ extension CognitoIdentityClient {
372372
///
373373
/// Returns credentials for the provided identity ID. Any provided logins will be validated against supported login providers. If the token is for cognito-identity.amazonaws.com, it will be passed through to Security Token Service with the appropriate role for the token. This is a public API. You do not need any credentials to call this API.
374374
///
375-
/// - Parameter GetCredentialsForIdentityInput : Input to the GetCredentialsForIdentity action.
375+
/// - Parameter input: Input to the GetCredentialsForIdentity action. (Type: `GetCredentialsForIdentityInput`)
376376
///
377-
/// - Returns: `GetCredentialsForIdentityOutput` : Returned in response to a successful GetCredentialsForIdentity operation.
377+
/// - Returns: Returned in response to a successful GetCredentialsForIdentity operation. (Type: `GetCredentialsForIdentityOutput`)
378378
///
379379
/// - Throws: One of the exceptions listed below __Possible Exceptions__.
380380
///
@@ -445,9 +445,9 @@ extension CognitoIdentityClient {
445445
///
446446
/// Generates (or retrieves) IdentityID. Supplying multiple logins will create an implicit linked account. This is a public API. You do not need any credentials to call this API.
447447
///
448-
/// - Parameter GetIdInput : Input to the GetId action.
448+
/// - Parameter input: Input to the GetId action. (Type: `GetIdInput`)
449449
///
450-
/// - Returns: `GetIdOutput` : Returned in response to a GetId request.
450+
/// - Returns: Returned in response to a GetId request. (Type: `GetIdOutput`)
451451
///
452452
/// - Throws: One of the exceptions listed below __Possible Exceptions__.
453453
///

Sources/Core/AWSSDKIdentity/InternalClients/InternalAWSSSO/Sources/InternalAWSSSO/SSOClient.swift

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@ import typealias SmithyHTTPAuthAPI.AuthSchemes
6262

6363
package class SSOClient: ClientRuntime.Client {
6464
public static let clientName = "SSOClient"
65-
public static let version = "1.5.55"
65+
public static let version = "1.5.56"
6666
let client: ClientRuntime.SdkHttpClient
6767
let config: SSOClient.SSOClientConfiguration
6868
let serviceName = "SSO"
@@ -368,9 +368,9 @@ extension SSOClient {
368368
///
369369
/// Returns the STS short-term credentials for a given role name that is assigned to the user.
370370
///
371-
/// - Parameter GetRoleCredentialsInput : [no documentation found]
371+
/// - Parameter input: [no documentation found] (Type: `GetRoleCredentialsInput`)
372372
///
373-
/// - Returns: `GetRoleCredentialsOutput` : [no documentation found]
373+
/// - Returns: [no documentation found] (Type: `GetRoleCredentialsOutput`)
374374
///
375375
/// - Throws: One of the exceptions listed below __Possible Exceptions__.
376376
///

Sources/Core/AWSSDKIdentity/InternalClients/InternalAWSSSOOIDC/Sources/InternalAWSSSOOIDC/SSOOIDCClient.swift

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -65,7 +65,7 @@ import typealias SmithyHTTPAuthAPI.AuthSchemes
6565

6666
package class SSOOIDCClient: ClientRuntime.Client {
6767
public static let clientName = "SSOOIDCClient"
68-
public static let version = "1.5.55"
68+
public static let version = "1.5.56"
6969
let client: ClientRuntime.SdkHttpClient
7070
let config: SSOOIDCClient.SSOOIDCClientConfiguration
7171
let serviceName = "SSO OIDC"
@@ -371,9 +371,9 @@ extension SSOOIDCClient {
371371
///
372372
/// Creates and returns access and refresh tokens for clients that are authenticated using client secrets. The access token can be used to fetch short-lived credentials for the assigned AWS accounts or to access application APIs using bearer authentication.
373373
///
374-
/// - Parameter CreateTokenInput : [no documentation found]
374+
/// - Parameter input: [no documentation found] (Type: `CreateTokenInput`)
375375
///
376-
/// - Returns: `CreateTokenOutput` : [no documentation found]
376+
/// - Returns: [no documentation found] (Type: `CreateTokenOutput`)
377377
///
378378
/// - Throws: One of the exceptions listed below __Possible Exceptions__.
379379
///

Sources/Core/AWSSDKIdentity/InternalClients/InternalAWSSTS/Sources/InternalAWSSTS/STSClient.swift

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -65,7 +65,7 @@ import typealias SmithyHTTPAuthAPI.AuthSchemes
6565

6666
package class STSClient: ClientRuntime.Client {
6767
public static let clientName = "STSClient"
68-
public static let version = "1.5.55"
68+
public static let version = "1.5.56"
6969
let client: ClientRuntime.SdkHttpClient
7070
let config: STSClient.STSClientConfiguration
7171
let serviceName = "STS"
@@ -387,9 +387,9 @@ extension STSClient {
387387
///
388388
/// You can do either because the role’s trust policy acts as an IAM resource-based policy. When a resource-based policy grants access to a principal in the same account, no additional identity-based policy is required. For more information about trust policies and resource-based policies, see [IAM Policies](https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html) in the IAM User Guide. Tags (Optional) You can pass tag key-value pairs to your session. These tags are called session tags. For more information about session tags, see [Passing Session Tags in STS](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html) in the IAM User Guide. An administrator must grant you the permissions necessary to pass session tags. The administrator can also create granular permissions to allow you to pass only specific session tags. For more information, see [Tutorial: Using Tags for Attribute-Based Access Control](https://docs.aws.amazon.com/IAM/latest/UserGuide/tutorial_attribute-based-access-control.html) in the IAM User Guide. You can set the session tags as transitive. Transitive tags persist during role chaining. For more information, see [Chaining Roles with Session Tags](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html#id_session-tags_role-chaining) in the IAM User Guide. Using MFA with AssumeRole (Optional) You can include multi-factor authentication (MFA) information when you call AssumeRole. This is useful for cross-account scenarios to ensure that the user that assumes the role has been authenticated with an Amazon Web Services MFA device. In that scenario, the trust policy of the role being assumed includes a condition that tests for MFA authentication. If the caller does not include valid MFA information, the request to assume the role is denied. The condition in a trust policy that tests for MFA authentication might look like the following example. "Condition": {"Bool": {"aws:MultiFactorAuthPresent": true}} For more information, see [Configuring MFA-Protected API Access](https://docs.aws.amazon.com/IAM/latest/UserGuide/MFAProtectedAPI.html) in the IAM User Guide guide. To use MFA with AssumeRole, you pass values for the SerialNumber and TokenCode parameters. The SerialNumber value identifies the user's hardware or virtual MFA device. The TokenCode is the time-based one-time password (TOTP) that the MFA device produces.
389389
///
390-
/// - Parameter AssumeRoleInput : [no documentation found]
390+
/// - Parameter input: [no documentation found] (Type: `AssumeRoleInput`)
391391
///
392-
/// - Returns: `AssumeRoleOutput` : Contains the response to a successful [AssumeRole] request, including temporary Amazon Web Services credentials that can be used to make Amazon Web Services requests.
392+
/// - Returns: Contains the response to a successful [AssumeRole] request, including temporary Amazon Web Services credentials that can be used to make Amazon Web Services requests. (Type: `AssumeRoleOutput`)
393393
///
394394
/// - Throws: One of the exceptions listed below __Possible Exceptions__.
395395
///
@@ -461,9 +461,9 @@ extension STSClient {
461461
///
462462
/// * [Amazon Web Services SDK for iOS Developer Guide](http://aws.amazon.com/sdkforios/) and [Amazon Web Services SDK for Android Developer Guide](http://aws.amazon.com/sdkforandroid/). These toolkits contain sample apps that show how to invoke the identity providers. The toolkits then show how to use the information from these providers to get and use temporary security credentials.
463463
///
464-
/// - Parameter AssumeRoleWithWebIdentityInput : [no documentation found]
464+
/// - Parameter input: [no documentation found] (Type: `AssumeRoleWithWebIdentityInput`)
465465
///
466-
/// - Returns: `AssumeRoleWithWebIdentityOutput` : Contains the response to a successful [AssumeRoleWithWebIdentity] request, including temporary Amazon Web Services credentials that can be used to make Amazon Web Services requests.
466+
/// - Returns: Contains the response to a successful [AssumeRoleWithWebIdentity] request, including temporary Amazon Web Services credentials that can be used to make Amazon Web Services requests. (Type: `AssumeRoleWithWebIdentityOutput`)
467467
///
468468
/// - Throws: One of the exceptions listed below __Possible Exceptions__.
469469
///

0 commit comments

Comments
 (0)