Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion manifest.json
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
{
"variables": {
"${LATEST}": "3.359.8"
"${LATEST}": "3.359.9"
},
"endpoints": "https://raw.githubusercontent.com/aws/aws-sdk-php/${LATEST}/src/data/endpoints.json",
"services": {
Expand Down
1 change: 1 addition & 0 deletions src/Core/CHANGELOG.md
Original file line number Diff line number Diff line change
Expand Up @@ -16,6 +16,7 @@
- Apply new CodingStandard from latest php-cs-fixer.
- Fix PHP 8.5 deprecation by avoiding using `null` as an array offset.
- Harden code against error cases
- AWS enhancement: Documentation updates.

### Fixed

Expand Down
2 changes: 1 addition & 1 deletion src/Core/src/Sts/Exception/RegionDisabledException.php
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@
* administrator must use the IAM console to activate STS in that region. For more information, see Activating and
* Deactivating STS in an Amazon Web Services Region [^1] in the *IAM User Guide*.
*
* [^1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html
* [^1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html#sts-regions-activate-deactivate
*/
final class RegionDisabledException extends ClientException
{
Expand Down
6 changes: 3 additions & 3 deletions src/Core/src/Sts/Input/AssumeRoleRequest.php
Original file line number Diff line number Diff line change
Expand Up @@ -35,7 +35,7 @@ final class AssumeRoleRequest extends Input
* when you assume the role. For more information, see `sts:RoleSessionName` [^2].
*
* The regex used to validate this parameter is a string of characters consisting of upper- and lower-case alphanumeric
* characters with no spaces. You can also include underscores or any of the following characters: =,.@-
* characters with no spaces. You can also include underscores or any of the following characters: +=,.@-
*
* [^1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/cloudtrail-integration.html#cloudtrail-integration_signin-tempcreds
* [^2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_iam-condition-keys.html#ck_rolesessionname
Expand Down Expand Up @@ -187,7 +187,7 @@ final class AssumeRoleRequest extends Input
* Access to Your Amazon Web Services Resources to a Third Party [^1] in the *IAM User Guide*.
*
* The regex used to validate this parameter is a string of characters consisting of upper- and lower-case alphanumeric
* characters with no spaces. You can also include underscores or any of the following characters: =,.@:/-
* characters with no spaces. You can also include underscores or any of the following characters: +=,.@:\/-
*
* [^1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_create_for-user_externalid.html
*
Expand All @@ -202,7 +202,7 @@ final class AssumeRoleRequest extends Input
* Resource Name (ARN) for a virtual device (such as `arn:aws:iam::123456789012:mfa/user`).
*
* The regex used to validate this parameter is a string of characters consisting of upper- and lower-case alphanumeric
* characters with no spaces. You can also include underscores or any of the following characters: =,.@-
* characters with no spaces. You can also include underscores or any of the following characters: +=/:,.@-
*
* @var string|null
*/
Expand Down
6 changes: 3 additions & 3 deletions src/Core/src/Sts/StsClient.php
Original file line number Diff line number Diff line change
Expand Up @@ -195,8 +195,8 @@ public function assumeRole($input): AssumeRoleResponse
* **Tags**
*
* (Optional) You can configure your IdP to pass attributes into your web identity token as session tags. Each session
* tag consists of a key name and an associated value. For more information about session tags, see Passing Session Tags
* in STS [^11] in the *IAM User Guide*.
* tag consists of a key name and an associated value. For more information about session tags, see Passing session tags
* using AssumeRoleWithWebIdentity [^11] in the *IAM User Guide*.
*
* You can pass up to 50 session tags. The plaintext session tag keys can’t exceed 128 characters and the values
* can’t exceed 256 characters. For these and additional limits, see IAM and STS Character Limits [^12] in the *IAM
Expand Down Expand Up @@ -248,7 +248,7 @@ public function assumeRole($input): AssumeRoleResponse
* [^8]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html
* [^9]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
* [^10]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#policies_session
* [^11]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html
* [^11]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html#id_session-tags_adding-assume-role-idp
* [^12]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-limits.html#reference_iam-limits-entity-length
* [^13]: https://docs.aws.amazon.com/IAM/latest/UserGuide/tutorial_attribute-based-access-control.html
* [^14]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html#id_session-tags_role-chaining
Expand Down