Skip to content

Commit f0e84c0

Browse files
committed
Merge branch 'feature/master/a1a78346-2a82-43fa-baba-807d38332305' of github.com:aws/PRIVATE-aws-java-sdk-v2-staging into feature/master/a1a78346-2a82-43fa-baba-807d38332305
2 parents 2fa5605 + 202c35e commit f0e84c0

File tree

2 files changed

+8
-6
lines changed

2 files changed

+8
-6
lines changed

feature.metadata

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
{"trebuchetFeatureArn":"arn:aws:trebuchet:::feature:v2:a1a78346-2a82-43fa-baba-807d38332305","c2jModelsRevision":53,"messageId":9,"serviceId":"Signin","serviceModule":"signin","isNewService":false}
1+
{"trebuchetFeatureArn":"arn:aws:trebuchet:::feature:v2:a1a78346-2a82-43fa-baba-807d38332305","c2jModelsRevision":56,"messageId":1,"serviceId":"Signin","serviceModule":"signin","isNewService":false}

services/signin/src/main/resources/codegen-resources/service-2.json

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@
66
"endpointPrefix":"signin",
77
"protocol":"rest-json",
88
"protocols":["rest-json"],
9-
"serviceFullName":"AWS Sign-In Data Plane",
9+
"serviceFullName":"AWS Sign-In Service",
1010
"serviceId":"Signin",
1111
"signatureVersion":"v4",
1212
"signingName":"signin",
@@ -28,7 +28,9 @@
2828
{"shape":"ValidationException"},
2929
{"shape":"AccessDeniedException"}
3030
],
31-
"documentation":"<p>CreateOAuth2Token API</p> <p>Path: /v1/token Request Method: POST Content-Type: application/json or application/x-www-form-urlencoded</p> <p>This API implements OAuth 2.0 flows for AWS Sign-In CLI clients, supporting both:</p> <ol> <li>Authorization code redemption (grant_type=authorization_code) - NOT idempotent</li> <li>Token refresh (grant_type=refresh_token) - Idempotent within token validity window</li> </ol> <p>The operation behavior is determined by the grant_type parameter in the request body:</p> <p><strong>Authorization Code Flow (NOT Idempotent):</strong></p> <ul> <li>JSON or form-encoded body with client_id, grant_type=authorization_code, code, redirect_uri, code_verifier</li> <li>Returns access_token, token_type, expires_in, refresh_token, and id_token</li> <li>Each authorization code can only be used ONCE for security (prevents replay attacks)</li> </ul> <p><strong>Token Refresh Flow (Idempotent):</strong></p> <ul> <li>JSON or form-encoded body with client_id, grant_type=refresh_token, refresh_token</li> <li>Returns access_token, token_type, expires_in, and refresh_token (no id_token)</li> <li>Multiple calls with same refresh_token return consistent results within validity window</li> </ul> <p>Authentication and authorization:</p> <ul> <li>Confidential clients: sigv4 signing required with signin:ExchangeToken permissions</li> <li>CLI clients (public): authn/authz skipped based on client_id &amp; grant_type</li> </ul> <p>Note: This operation cannot be marked as @idempotent because it handles both idempotent (token refresh) and non-idempotent (auth code redemption) flows in a single endpoint.</p>"
31+
"documentation":"<p>CreateOAuth2Token API</p> <p>Path: /v1/token Request Method: POST Content-Type: application/json or application/x-www-form-urlencoded</p> <p>This API implements OAuth 2.0 flows for AWS Sign-In CLI clients, supporting both:</p> <ol> <li>Authorization code redemption (grant_type=authorization_code) - NOT idempotent</li> <li>Token refresh (grant_type=refresh_token) - Idempotent within token validity window</li> </ol> <p>The operation behavior is determined by the grant_type parameter in the request body:</p> <p><strong>Authorization Code Flow (NOT Idempotent):</strong></p> <ul> <li>JSON or form-encoded body with client_id, grant_type=authorization_code, code, redirect_uri, code_verifier</li> <li>Returns access_token, token_type, expires_in, refresh_token, and id_token</li> <li>Each authorization code can only be used ONCE for security (prevents replay attacks)</li> </ul> <p><strong>Token Refresh Flow (Idempotent):</strong></p> <ul> <li>JSON or form-encoded body with client_id, grant_type=refresh_token, refresh_token</li> <li>Returns access_token, token_type, expires_in, and refresh_token (no id_token)</li> <li>Multiple calls with same refresh_token return consistent results within validity window</li> </ul> <p>Authentication and authorization:</p> <ul> <li>Confidential clients: sigv4 signing required with signin:ExchangeToken permissions</li> <li>CLI clients (public): authn/authz skipped based on client_id &amp; grant_type</li> </ul> <p>Note: This operation cannot be marked as @idempotent because it handles both idempotent (token refresh) and non-idempotent (auth code redemption) flows in a single endpoint.</p>",
32+
"auth":["smithy.api#noAuth"],
33+
"authtype":"none"
3234
}
3335
},
3436
"shapes":{
@@ -86,8 +88,8 @@
8688
},
8789
"ClientId":{
8890
"type":"string",
89-
"documentation":"<p>Client identifier pattern for AWS Sign-In CLI clients</p> <p>The ARN used by client as part of Sign-In onboarding. Expected values:</p> <ul> <li>aws:signin:::cli/same-device (for CLI login on same device)</li> <li>aws:signin:::cli/cross-device (for cross-device CLI login)</li> <li>aws:signin:::cli/in-band (for in-band CLI login)</li> <li>aws:signin:::cli/out-of-band (for out-of-band CLI login)</li> </ul> <p>This will be finalized after consulting with UX as this is visible to end customer.</p>",
90-
"pattern":"aws:signin:::cli/(same-device|cross-device|in-band|out-of-band)"
91+
"documentation":"<p>Client identifier pattern for AWS Sign-In devtools clients</p> <p>The ARN used by client as part of Sign-In onboarding. Expected values:</p> <ul> <li>arn:aws:signin:::devtools/cross-device (for cross-device devtools login)</li> <li>arn:aws:signin:::devtools/same-device (for same-device devtools login)</li> </ul> <p>This will be finalized after consulting with UX as this is visible to end customer.</p>",
92+
"pattern":"arn:aws:signin:::devtools/(cross-device|same-device)"
9193
},
9294
"CodeVerifier":{
9395
"type":"string",
@@ -313,5 +315,5 @@
313315
"exception":true
314316
}
315317
},
316-
"documentation":"<p>AWS Sign-In Data Plane Service</p> <p>This service implements OAuth 2.0 flows for AWS CLI authentication, providing secure token exchange and refresh capabilities.</p>"
318+
"documentation":"<p>AWS Sign-In manages authentication for AWS services. This service provides secure authentication flows for accessing AWS resources from the console and developer tools.</p>"
317319
}

0 commit comments

Comments
 (0)