Skip to content

Commit c3a9b01

Browse files
Update generated code (#1828)
update generated code
1 parent 3c62fe4 commit c3a9b01

File tree

3 files changed

+8
-3
lines changed

3 files changed

+8
-3
lines changed

CHANGELOG.md

+4
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,10 @@
22

33
## NOT RELEASED
44

5+
### Changed
6+
7+
- AWS enhancement: Documentation updates.
8+
59
## 1.23.0
610

711
### Added

src/Sts/Input/AssumeRoleRequest.php

+2-2
Original file line numberDiff line numberDiff line change
@@ -230,8 +230,8 @@ final class AssumeRoleRequest extends Input
230230
* source identity, see Monitor and control actions taken with assumed roles [^3] in the *IAM User Guide*.
231231
*
232232
* The regex used to validate this parameter is a string of characters consisting of upper- and lower-case alphanumeric
233-
* characters with no spaces. You can also include underscores or any of the following characters: =,.@-. You cannot use
234-
* a value that begins with the text `aws:`. This prefix is reserved for Amazon Web Services internal use.
233+
* characters with no spaces. You can also include underscores or any of the following characters: +=,.@-. You cannot
234+
* use a value that begins with the text `aws:`. This prefix is reserved for Amazon Web Services internal use.
235235
*
236236
* [^1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles.html#iam-term-role-chaining
237237
* [^2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html#condition-keys-sourceidentity

src/Sts/Input/AssumeRoleWithWebIdentityRequest.php

+2-1
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,8 @@ final class AssumeRoleWithWebIdentityRequest extends Input
5555
* The OAuth 2.0 access token or OpenID Connect ID token that is provided by the identity provider. Your application
5656
* must get this token by authenticating the user who is using your application with a web identity provider before the
5757
* application makes an `AssumeRoleWithWebIdentity` call. Timestamps in the token must be formatted as either an integer
58-
* or a long integer. Only tokens with RSA algorithms (RS256) are supported.
58+
* or a long integer. Tokens must be signed using either RSA keys (RS256, RS384, or RS512) or ECDSA keys (ES256, ES384,
59+
* or ES512).
5960
*
6061
* @required
6162
*

0 commit comments

Comments
 (0)