aws-sdk-cognitoidentityprovider 1.108.0 → 1.109.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: c171f3e9e80ad5f52b04997c2329265cefb59f8f531873aa81873fc8b64da168
4
- data.tar.gz: a22ff8246c7897825980f35f0c0e8b454689fb8b1764c57308b53ee5722f243d
3
+ metadata.gz: f9219bd9e0d4b3cccc14db211e04547e06c1710a33829f4fe39e9485f12196fd
4
+ data.tar.gz: 395602c1db8f0a0df2a95a8c20d75d2d00389e8a0a5e9e2d6bdc9cfc977851ed
5
5
  SHA512:
6
- metadata.gz: a20e6919f67e8b6a502eb7349863c5408c3dbd94e83d713f44abdb6ae73ab8f64fe1f5edcc5083c61fbd864f2c08014e1a16f3ab86d2a7c0dbfde565d028e399
7
- data.tar.gz: cbd3ffdb36d003c6ac6221937b1fe7ed3366af9cdf4eefe8dae332d097c81b27a956611b9294f9dfc7e2cdfb5909dbd607eef4e794a06c5c7bcebc8d46677670
6
+ metadata.gz: 0edda0c85a0df2f0bbb42ae4bd842f7616ce1dc16b040b484b44a2811dc61bee158cf3de6b6156765a79986c411ddf74aee7bdea9ee6fe2bf244f95bf48c4b91
7
+ data.tar.gz: 425626d0aaa6869ac6dd0be73de0bda9bfc3f15f8264d2927202ea2a14540f4f86b641b00975c18bf9a72624d7e1ce4e95aa8cf4c7d6e4aefe4d0460a253622b
data/CHANGELOG.md CHANGED
@@ -1,6 +1,11 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.109.0 (2024-11-06)
5
+ ------------------
6
+
7
+ * Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
8
+
4
9
  1.108.0 (2024-10-18)
5
10
  ------------------
6
11
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.108.0
1
+ 1.109.0
@@ -2326,13 +2326,13 @@ module Aws::CognitoIdentityProvider
2326
2326
  #
2327
2327
  # SMS\_MFA
2328
2328
  #
2329
- # : `"ChallengeName": "SMS_MFA", "ChallengeResponses": \{"SMS_MFA_CODE":
2330
- # "[code]", "USERNAME": "[username]"\}`
2329
+ # : `"ChallengeName": "SMS_MFA", "ChallengeResponses": {"SMS_MFA_CODE":
2330
+ # "[code]", "USERNAME": "[username]"}`
2331
2331
  #
2332
2332
  # EMAIL\_OTP
2333
2333
  #
2334
2334
  # : `"ChallengeName": "EMAIL_OTP", "ChallengeResponses":
2335
- # \{"EMAIL_OTP_CODE": "[code]", "USERNAME": "[username]"\}`
2335
+ # {"EMAIL_OTP_CODE": "[code]", "USERNAME": "[username]"}`
2336
2336
  #
2337
2337
  # PASSWORD\_VERIFIER
2338
2338
  #
@@ -2342,23 +2342,23 @@ module Aws::CognitoIdentityProvider
2342
2342
  # pool returns a `NotAuthorizedException` error.
2343
2343
  #
2344
2344
  # `"ChallengeName": "PASSWORD_VERIFIER", "ChallengeResponses":
2345
- # \{"PASSWORD_CLAIM_SIGNATURE": "[claim_signature]",
2345
+ # {"PASSWORD_CLAIM_SIGNATURE": "[claim_signature]",
2346
2346
  # "PASSWORD_CLAIM_SECRET_BLOCK": "[secret_block]", "TIMESTAMP":
2347
- # [timestamp], "USERNAME": "[username]"\}`
2347
+ # [timestamp], "USERNAME": "[username]"}`
2348
2348
  #
2349
2349
  # Add `"DEVICE_KEY"` when you sign in with a remembered device.
2350
2350
  #
2351
2351
  # CUSTOM\_CHALLENGE
2352
2352
  #
2353
2353
  # : `"ChallengeName": "CUSTOM_CHALLENGE", "ChallengeResponses":
2354
- # \{"USERNAME": "[username]", "ANSWER": "[challenge_answer]"\}`
2354
+ # {"USERNAME": "[username]", "ANSWER": "[challenge_answer]"}`
2355
2355
  #
2356
2356
  # Add `"DEVICE_KEY"` when you sign in with a remembered device.
2357
2357
  #
2358
2358
  # NEW\_PASSWORD\_REQUIRED
2359
2359
  #
2360
2360
  # : `"ChallengeName": "NEW_PASSWORD_REQUIRED", "ChallengeResponses":
2361
- # \{"NEW_PASSWORD": "[new_password]", "USERNAME": "[username]"\}`
2361
+ # {"NEW_PASSWORD": "[new_password]", "USERNAME": "[username]"}`
2362
2362
  #
2363
2363
  # To set any required attributes that `InitiateAuth` returned in an
2364
2364
  # `requiredAttributes` parameter, add
@@ -2378,33 +2378,33 @@ module Aws::CognitoIdentityProvider
2378
2378
  # SOFTWARE\_TOKEN\_MFA
2379
2379
  #
2380
2380
  # : `"ChallengeName": "SOFTWARE_TOKEN_MFA", "ChallengeResponses":
2381
- # \{"USERNAME": "[username]", "SOFTWARE_TOKEN_MFA_CODE":
2382
- # [authenticator_code]\}`
2381
+ # {"USERNAME": "[username]", "SOFTWARE_TOKEN_MFA_CODE":
2382
+ # [authenticator_code]}`
2383
2383
  #
2384
2384
  # DEVICE\_SRP\_AUTH
2385
2385
  #
2386
2386
  # : `"ChallengeName": "DEVICE_SRP_AUTH", "ChallengeResponses":
2387
- # \{"USERNAME": "[username]", "DEVICE_KEY": "[device_key]", "SRP_A":
2388
- # "[srp_a]"\}`
2387
+ # {"USERNAME": "[username]", "DEVICE_KEY": "[device_key]", "SRP_A":
2388
+ # "[srp_a]"}`
2389
2389
  #
2390
2390
  # DEVICE\_PASSWORD\_VERIFIER
2391
2391
  #
2392
2392
  # : `"ChallengeName": "DEVICE_PASSWORD_VERIFIER", "ChallengeResponses":
2393
- # \{"DEVICE_KEY": "[device_key]", "PASSWORD_CLAIM_SIGNATURE":
2393
+ # {"DEVICE_KEY": "[device_key]", "PASSWORD_CLAIM_SIGNATURE":
2394
2394
  # "[claim_signature]", "PASSWORD_CLAIM_SECRET_BLOCK":
2395
2395
  # "[secret_block]", "TIMESTAMP": [timestamp], "USERNAME":
2396
- # "[username]"\}`
2396
+ # "[username]"}`
2397
2397
  #
2398
2398
  # MFA\_SETUP
2399
2399
  #
2400
- # : `"ChallengeName": "MFA_SETUP", "ChallengeResponses": \{"USERNAME":
2401
- # "[username]"\}, "SESSION": "[Session ID from VerifySoftwareToken]"`
2400
+ # : `"ChallengeName": "MFA_SETUP", "ChallengeResponses": {"USERNAME":
2401
+ # "[username]"}, "SESSION": "[Session ID from VerifySoftwareToken]"`
2402
2402
  #
2403
2403
  # SELECT\_MFA\_TYPE
2404
2404
  #
2405
2405
  # : `"ChallengeName": "SELECT_MFA_TYPE", "ChallengeResponses":
2406
- # \{"USERNAME": "[username]", "ANSWER": "[SMS_MFA or
2407
- # SOFTWARE_TOKEN_MFA]"\}`
2406
+ # {"USERNAME": "[username]", "ANSWER": "[SMS_MFA or
2407
+ # SOFTWARE_TOKEN_MFA]"}`
2408
2408
  #
2409
2409
  # For more information about `SECRET_HASH`, see [Computing secret hash
2410
2410
  # values][1]. For information about `DEVICE_KEY`, see [Working with user
@@ -3692,7 +3692,7 @@ module Aws::CognitoIdentityProvider
3692
3692
  # discover endpoint URLs from `oidc_issuer`: `attributes_url`,
3693
3693
  # `authorize_url`, `jwks_uri`, `token_url`.
3694
3694
  #
3695
- # Create or update request: `"ProviderDetails": \{
3695
+ # Create or update request: `"ProviderDetails": {
3696
3696
  # "attributes_request_method": "GET", "attributes_url":
3697
3697
  # "https://auth.example.com/userInfo", "authorize_scopes": "openid
3698
3698
  # profile email", "authorize_url":
@@ -3700,9 +3700,9 @@ module Aws::CognitoIdentityProvider
3700
3700
  # "1example23456789", "client_secret": "provider-app-client-secret",
3701
3701
  # "jwks_uri": "https://auth.example.com/.well-known/jwks.json",
3702
3702
  # "oidc_issuer": "https://auth.example.com", "token_url":
3703
- # "https://example.com/token" \}`
3703
+ # "https://example.com/token" }`
3704
3704
  #
3705
- # Describe response: `"ProviderDetails": \{
3705
+ # Describe response: `"ProviderDetails": {
3706
3706
  # "attributes_request_method": "GET", "attributes_url":
3707
3707
  # "https://auth.example.com/userInfo",
3708
3708
  # "attributes_url_add_attributes": "false", "authorize_scopes":
@@ -3711,55 +3711,55 @@ module Aws::CognitoIdentityProvider
3711
3711
  # "1example23456789", "client_secret": "provider-app-client-secret",
3712
3712
  # "jwks_uri": "https://auth.example.com/.well-known/jwks.json",
3713
3713
  # "oidc_issuer": "https://auth.example.com", "token_url":
3714
- # "https://example.com/token" \}`
3714
+ # "https://example.com/token" }`
3715
3715
  #
3716
3716
  # SAML
3717
3717
  #
3718
- # : Create or update request with Metadata URL: `"ProviderDetails": \{
3718
+ # : Create or update request with Metadata URL: `"ProviderDetails": {
3719
3719
  # "IDPInit": "true", "IDPSignout": "true", "EncryptedResponses" :
3720
3720
  # "true", "MetadataURL": "https://auth.example.com/sso/saml/metadata",
3721
- # "RequestSigningAlgorithm": "rsa-sha256" \}`
3721
+ # "RequestSigningAlgorithm": "rsa-sha256" }`
3722
3722
  #
3723
- # Create or update request with Metadata file: `"ProviderDetails": \{
3723
+ # Create or update request with Metadata file: `"ProviderDetails": {
3724
3724
  # "IDPInit": "true", "IDPSignout": "true", "EncryptedResponses" :
3725
3725
  # "true", "MetadataFile": "[metadata XML]", "RequestSigningAlgorithm":
3726
- # "rsa-sha256" \}`
3726
+ # "rsa-sha256" }`
3727
3727
  #
3728
3728
  # The value of `MetadataFile` must be the plaintext metadata document
3729
3729
  # with all quote (") characters escaped by backslashes.
3730
3730
  #
3731
- # Describe response: `"ProviderDetails": \{ "IDPInit": "true",
3731
+ # Describe response: `"ProviderDetails": { "IDPInit": "true",
3732
3732
  # "IDPSignout": "true", "EncryptedResponses" : "true",
3733
3733
  # "ActiveEncryptionCertificate": "[certificate]", "MetadataURL":
3734
3734
  # "https://auth.example.com/sso/saml/metadata",
3735
3735
  # "RequestSigningAlgorithm": "rsa-sha256", "SLORedirectBindingURI":
3736
3736
  # "https://auth.example.com/slo/saml", "SSORedirectBindingURI":
3737
- # "https://auth.example.com/sso/saml" \}`
3737
+ # "https://auth.example.com/sso/saml" }`
3738
3738
  #
3739
3739
  # LoginWithAmazon
3740
3740
  #
3741
- # : Create or update request: `"ProviderDetails": \{ "authorize_scopes":
3741
+ # : Create or update request: `"ProviderDetails": { "authorize_scopes":
3742
3742
  # "profile postal_code", "client_id":
3743
3743
  # "amzn1.application-oa2-client.1example23456789", "client_secret":
3744
3744
  # "provider-app-client-secret"`
3745
3745
  #
3746
- # Describe response: `"ProviderDetails": \{ "attributes_url":
3746
+ # Describe response: `"ProviderDetails": { "attributes_url":
3747
3747
  # "https://api.amazon.com/user/profile",
3748
3748
  # "attributes_url_add_attributes": "false", "authorize_scopes":
3749
3749
  # "profile postal_code", "authorize_url":
3750
3750
  # "https://www.amazon.com/ap/oa", "client_id":
3751
3751
  # "amzn1.application-oa2-client.1example23456789", "client_secret":
3752
3752
  # "provider-app-client-secret", "token_request_method": "POST",
3753
- # "token_url": "https://api.amazon.com/auth/o2/token" \}`
3753
+ # "token_url": "https://api.amazon.com/auth/o2/token" }`
3754
3754
  #
3755
3755
  # Google
3756
3756
  #
3757
- # : Create or update request: `"ProviderDetails": \{ "authorize_scopes":
3757
+ # : Create or update request: `"ProviderDetails": { "authorize_scopes":
3758
3758
  # "email profile openid", "client_id":
3759
3759
  # "1example23456789.apps.googleusercontent.com", "client_secret":
3760
- # "provider-app-client-secret" \}`
3760
+ # "provider-app-client-secret" }`
3761
3761
  #
3762
- # Describe response: `"ProviderDetails": \{ "attributes_url":
3762
+ # Describe response: `"ProviderDetails": { "attributes_url":
3763
3763
  # "https://people.googleapis.com/v1/people/me?personFields=",
3764
3764
  # "attributes_url_add_attributes": "true", "authorize_scopes": "email
3765
3765
  # profile openid", "authorize_url":
@@ -3767,37 +3767,36 @@ module Aws::CognitoIdentityProvider
3767
3767
  # "1example23456789.apps.googleusercontent.com", "client_secret":
3768
3768
  # "provider-app-client-secret", "oidc_issuer":
3769
3769
  # "https://accounts.google.com", "token_request_method": "POST",
3770
- # "token_url": "https://www.googleapis.com/oauth2/v4/token" \}`
3770
+ # "token_url": "https://www.googleapis.com/oauth2/v4/token" }`
3771
3771
  #
3772
3772
  # SignInWithApple
3773
3773
  #
3774
- # : Create or update request: `"ProviderDetails": \{ "authorize_scopes":
3774
+ # : Create or update request: `"ProviderDetails": { "authorize_scopes":
3775
3775
  # "email name", "client_id": "com.example.cognito", "private_key":
3776
- # "1EXAMPLE", "key_id": "2EXAMPLE", "team_id": "3EXAMPLE" \}`
3776
+ # "1EXAMPLE", "key_id": "2EXAMPLE", "team_id": "3EXAMPLE" }`
3777
3777
  #
3778
- # Describe response: `"ProviderDetails": \{
3778
+ # Describe response: `"ProviderDetails": {
3779
3779
  # "attributes_url_add_attributes": "false", "authorize_scopes": "email
3780
3780
  # name", "authorize_url": "https://appleid.apple.com/auth/authorize",
3781
3781
  # "client_id": "com.example.cognito", "key_id": "1EXAMPLE",
3782
3782
  # "oidc_issuer": "https://appleid.apple.com", "team_id": "2EXAMPLE",
3783
3783
  # "token_request_method": "POST", "token_url":
3784
- # "https://appleid.apple.com/auth/token" \}`
3784
+ # "https://appleid.apple.com/auth/token" }`
3785
3785
  #
3786
3786
  # Facebook
3787
3787
  #
3788
- # : Create or update request: `"ProviderDetails": \{ "api_version":
3788
+ # : Create or update request: `"ProviderDetails": { "api_version":
3789
3789
  # "v17.0", "authorize_scopes": "public_profile, email", "client_id":
3790
- # "1example23456789", "client_secret": "provider-app-client-secret"
3791
- # \}`
3790
+ # "1example23456789", "client_secret": "provider-app-client-secret" }`
3792
3791
  #
3793
- # Describe response: `"ProviderDetails": \{ "api_version": "v17.0",
3792
+ # Describe response: `"ProviderDetails": { "api_version": "v17.0",
3794
3793
  # "attributes_url": "https://graph.facebook.com/v17.0/me?fields=",
3795
3794
  # "attributes_url_add_attributes": "true", "authorize_scopes":
3796
3795
  # "public_profile, email", "authorize_url":
3797
3796
  # "https://www.facebook.com/v17.0/dialog/oauth", "client_id":
3798
3797
  # "1example23456789", "client_secret": "provider-app-client-secret",
3799
3798
  # "token_request_method": "GET", "token_url":
3800
- # "https://graph.facebook.com/v17.0/oauth/access_token" \}`
3799
+ # "https://graph.facebook.com/v17.0/oauth/access_token" }`
3801
3800
  #
3802
3801
  # @option params [Hash<String,String>] :attribute_mapping
3803
3802
  # A mapping of IdP attributes to standard and custom user pool
@@ -8303,13 +8302,13 @@ module Aws::CognitoIdentityProvider
8303
8302
  #
8304
8303
  # SMS\_MFA
8305
8304
  #
8306
- # : `"ChallengeName": "SMS_MFA", "ChallengeResponses": \{"SMS_MFA_CODE":
8307
- # "[code]", "USERNAME": "[username]"\}`
8305
+ # : `"ChallengeName": "SMS_MFA", "ChallengeResponses": {"SMS_MFA_CODE":
8306
+ # "[code]", "USERNAME": "[username]"}`
8308
8307
  #
8309
8308
  # EMAIL\_OTP
8310
8309
  #
8311
8310
  # : `"ChallengeName": "EMAIL_OTP", "ChallengeResponses":
8312
- # \{"EMAIL_OTP_CODE": "[code]", "USERNAME": "[username]"\}`
8311
+ # {"EMAIL_OTP_CODE": "[code]", "USERNAME": "[username]"}`
8313
8312
  #
8314
8313
  # PASSWORD\_VERIFIER
8315
8314
  #
@@ -8319,23 +8318,23 @@ module Aws::CognitoIdentityProvider
8319
8318
  # pool returns a `NotAuthorizedException` error.
8320
8319
  #
8321
8320
  # `"ChallengeName": "PASSWORD_VERIFIER", "ChallengeResponses":
8322
- # \{"PASSWORD_CLAIM_SIGNATURE": "[claim_signature]",
8321
+ # {"PASSWORD_CLAIM_SIGNATURE": "[claim_signature]",
8323
8322
  # "PASSWORD_CLAIM_SECRET_BLOCK": "[secret_block]", "TIMESTAMP":
8324
- # [timestamp], "USERNAME": "[username]"\}`
8323
+ # [timestamp], "USERNAME": "[username]"}`
8325
8324
  #
8326
8325
  # Add `"DEVICE_KEY"` when you sign in with a remembered device.
8327
8326
  #
8328
8327
  # CUSTOM\_CHALLENGE
8329
8328
  #
8330
8329
  # : `"ChallengeName": "CUSTOM_CHALLENGE", "ChallengeResponses":
8331
- # \{"USERNAME": "[username]", "ANSWER": "[challenge_answer]"\}`
8330
+ # {"USERNAME": "[username]", "ANSWER": "[challenge_answer]"}`
8332
8331
  #
8333
8332
  # Add `"DEVICE_KEY"` when you sign in with a remembered device.
8334
8333
  #
8335
8334
  # NEW\_PASSWORD\_REQUIRED
8336
8335
  #
8337
8336
  # : `"ChallengeName": "NEW_PASSWORD_REQUIRED", "ChallengeResponses":
8338
- # \{"NEW_PASSWORD": "[new_password]", "USERNAME": "[username]"\}`
8337
+ # {"NEW_PASSWORD": "[new_password]", "USERNAME": "[username]"}`
8339
8338
  #
8340
8339
  # To set any required attributes that `InitiateAuth` returned in an
8341
8340
  # `requiredAttributes` parameter, add
@@ -8355,33 +8354,33 @@ module Aws::CognitoIdentityProvider
8355
8354
  # SOFTWARE\_TOKEN\_MFA
8356
8355
  #
8357
8356
  # : `"ChallengeName": "SOFTWARE_TOKEN_MFA", "ChallengeResponses":
8358
- # \{"USERNAME": "[username]", "SOFTWARE_TOKEN_MFA_CODE":
8359
- # [authenticator_code]\}`
8357
+ # {"USERNAME": "[username]", "SOFTWARE_TOKEN_MFA_CODE":
8358
+ # [authenticator_code]}`
8360
8359
  #
8361
8360
  # DEVICE\_SRP\_AUTH
8362
8361
  #
8363
8362
  # : `"ChallengeName": "DEVICE_SRP_AUTH", "ChallengeResponses":
8364
- # \{"USERNAME": "[username]", "DEVICE_KEY": "[device_key]", "SRP_A":
8365
- # "[srp_a]"\}`
8363
+ # {"USERNAME": "[username]", "DEVICE_KEY": "[device_key]", "SRP_A":
8364
+ # "[srp_a]"}`
8366
8365
  #
8367
8366
  # DEVICE\_PASSWORD\_VERIFIER
8368
8367
  #
8369
8368
  # : `"ChallengeName": "DEVICE_PASSWORD_VERIFIER", "ChallengeResponses":
8370
- # \{"DEVICE_KEY": "[device_key]", "PASSWORD_CLAIM_SIGNATURE":
8369
+ # {"DEVICE_KEY": "[device_key]", "PASSWORD_CLAIM_SIGNATURE":
8371
8370
  # "[claim_signature]", "PASSWORD_CLAIM_SECRET_BLOCK":
8372
8371
  # "[secret_block]", "TIMESTAMP": [timestamp], "USERNAME":
8373
- # "[username]"\}`
8372
+ # "[username]"}`
8374
8373
  #
8375
8374
  # MFA\_SETUP
8376
8375
  #
8377
- # : `"ChallengeName": "MFA_SETUP", "ChallengeResponses": \{"USERNAME":
8378
- # "[username]"\}, "SESSION": "[Session ID from VerifySoftwareToken]"`
8376
+ # : `"ChallengeName": "MFA_SETUP", "ChallengeResponses": {"USERNAME":
8377
+ # "[username]"}, "SESSION": "[Session ID from VerifySoftwareToken]"`
8379
8378
  #
8380
8379
  # SELECT\_MFA\_TYPE
8381
8380
  #
8382
8381
  # : `"ChallengeName": "SELECT_MFA_TYPE", "ChallengeResponses":
8383
- # \{"USERNAME": "[username]", "ANSWER": "[SMS_MFA or
8384
- # SOFTWARE_TOKEN_MFA]"\}`
8382
+ # {"USERNAME": "[username]", "ANSWER": "[SMS_MFA or
8383
+ # SOFTWARE_TOKEN_MFA]"}`
8385
8384
  #
8386
8385
  # For more information about `SECRET_HASH`, see [Computing secret hash
8387
8386
  # values][1]. For information about `DEVICE_KEY`, see [Working with user
@@ -9600,7 +9599,7 @@ module Aws::CognitoIdentityProvider
9600
9599
  # discover endpoint URLs from `oidc_issuer`: `attributes_url`,
9601
9600
  # `authorize_url`, `jwks_uri`, `token_url`.
9602
9601
  #
9603
- # Create or update request: `"ProviderDetails": \{
9602
+ # Create or update request: `"ProviderDetails": {
9604
9603
  # "attributes_request_method": "GET", "attributes_url":
9605
9604
  # "https://auth.example.com/userInfo", "authorize_scopes": "openid
9606
9605
  # profile email", "authorize_url":
@@ -9608,9 +9607,9 @@ module Aws::CognitoIdentityProvider
9608
9607
  # "1example23456789", "client_secret": "provider-app-client-secret",
9609
9608
  # "jwks_uri": "https://auth.example.com/.well-known/jwks.json",
9610
9609
  # "oidc_issuer": "https://auth.example.com", "token_url":
9611
- # "https://example.com/token" \}`
9610
+ # "https://example.com/token" }`
9612
9611
  #
9613
- # Describe response: `"ProviderDetails": \{
9612
+ # Describe response: `"ProviderDetails": {
9614
9613
  # "attributes_request_method": "GET", "attributes_url":
9615
9614
  # "https://auth.example.com/userInfo",
9616
9615
  # "attributes_url_add_attributes": "false", "authorize_scopes":
@@ -9619,55 +9618,55 @@ module Aws::CognitoIdentityProvider
9619
9618
  # "1example23456789", "client_secret": "provider-app-client-secret",
9620
9619
  # "jwks_uri": "https://auth.example.com/.well-known/jwks.json",
9621
9620
  # "oidc_issuer": "https://auth.example.com", "token_url":
9622
- # "https://example.com/token" \}`
9621
+ # "https://example.com/token" }`
9623
9622
  #
9624
9623
  # SAML
9625
9624
  #
9626
- # : Create or update request with Metadata URL: `"ProviderDetails": \{
9625
+ # : Create or update request with Metadata URL: `"ProviderDetails": {
9627
9626
  # "IDPInit": "true", "IDPSignout": "true", "EncryptedResponses" :
9628
9627
  # "true", "MetadataURL": "https://auth.example.com/sso/saml/metadata",
9629
- # "RequestSigningAlgorithm": "rsa-sha256" \}`
9628
+ # "RequestSigningAlgorithm": "rsa-sha256" }`
9630
9629
  #
9631
- # Create or update request with Metadata file: `"ProviderDetails": \{
9630
+ # Create or update request with Metadata file: `"ProviderDetails": {
9632
9631
  # "IDPInit": "true", "IDPSignout": "true", "EncryptedResponses" :
9633
9632
  # "true", "MetadataFile": "[metadata XML]", "RequestSigningAlgorithm":
9634
- # "rsa-sha256" \}`
9633
+ # "rsa-sha256" }`
9635
9634
  #
9636
9635
  # The value of `MetadataFile` must be the plaintext metadata document
9637
9636
  # with all quote (") characters escaped by backslashes.
9638
9637
  #
9639
- # Describe response: `"ProviderDetails": \{ "IDPInit": "true",
9638
+ # Describe response: `"ProviderDetails": { "IDPInit": "true",
9640
9639
  # "IDPSignout": "true", "EncryptedResponses" : "true",
9641
9640
  # "ActiveEncryptionCertificate": "[certificate]", "MetadataURL":
9642
9641
  # "https://auth.example.com/sso/saml/metadata",
9643
9642
  # "RequestSigningAlgorithm": "rsa-sha256", "SLORedirectBindingURI":
9644
9643
  # "https://auth.example.com/slo/saml", "SSORedirectBindingURI":
9645
- # "https://auth.example.com/sso/saml" \}`
9644
+ # "https://auth.example.com/sso/saml" }`
9646
9645
  #
9647
9646
  # LoginWithAmazon
9648
9647
  #
9649
- # : Create or update request: `"ProviderDetails": \{ "authorize_scopes":
9648
+ # : Create or update request: `"ProviderDetails": { "authorize_scopes":
9650
9649
  # "profile postal_code", "client_id":
9651
9650
  # "amzn1.application-oa2-client.1example23456789", "client_secret":
9652
9651
  # "provider-app-client-secret"`
9653
9652
  #
9654
- # Describe response: `"ProviderDetails": \{ "attributes_url":
9653
+ # Describe response: `"ProviderDetails": { "attributes_url":
9655
9654
  # "https://api.amazon.com/user/profile",
9656
9655
  # "attributes_url_add_attributes": "false", "authorize_scopes":
9657
9656
  # "profile postal_code", "authorize_url":
9658
9657
  # "https://www.amazon.com/ap/oa", "client_id":
9659
9658
  # "amzn1.application-oa2-client.1example23456789", "client_secret":
9660
9659
  # "provider-app-client-secret", "token_request_method": "POST",
9661
- # "token_url": "https://api.amazon.com/auth/o2/token" \}`
9660
+ # "token_url": "https://api.amazon.com/auth/o2/token" }`
9662
9661
  #
9663
9662
  # Google
9664
9663
  #
9665
- # : Create or update request: `"ProviderDetails": \{ "authorize_scopes":
9664
+ # : Create or update request: `"ProviderDetails": { "authorize_scopes":
9666
9665
  # "email profile openid", "client_id":
9667
9666
  # "1example23456789.apps.googleusercontent.com", "client_secret":
9668
- # "provider-app-client-secret" \}`
9667
+ # "provider-app-client-secret" }`
9669
9668
  #
9670
- # Describe response: `"ProviderDetails": \{ "attributes_url":
9669
+ # Describe response: `"ProviderDetails": { "attributes_url":
9671
9670
  # "https://people.googleapis.com/v1/people/me?personFields=",
9672
9671
  # "attributes_url_add_attributes": "true", "authorize_scopes": "email
9673
9672
  # profile openid", "authorize_url":
@@ -9675,37 +9674,36 @@ module Aws::CognitoIdentityProvider
9675
9674
  # "1example23456789.apps.googleusercontent.com", "client_secret":
9676
9675
  # "provider-app-client-secret", "oidc_issuer":
9677
9676
  # "https://accounts.google.com", "token_request_method": "POST",
9678
- # "token_url": "https://www.googleapis.com/oauth2/v4/token" \}`
9677
+ # "token_url": "https://www.googleapis.com/oauth2/v4/token" }`
9679
9678
  #
9680
9679
  # SignInWithApple
9681
9680
  #
9682
- # : Create or update request: `"ProviderDetails": \{ "authorize_scopes":
9681
+ # : Create or update request: `"ProviderDetails": { "authorize_scopes":
9683
9682
  # "email name", "client_id": "com.example.cognito", "private_key":
9684
- # "1EXAMPLE", "key_id": "2EXAMPLE", "team_id": "3EXAMPLE" \}`
9683
+ # "1EXAMPLE", "key_id": "2EXAMPLE", "team_id": "3EXAMPLE" }`
9685
9684
  #
9686
- # Describe response: `"ProviderDetails": \{
9685
+ # Describe response: `"ProviderDetails": {
9687
9686
  # "attributes_url_add_attributes": "false", "authorize_scopes": "email
9688
9687
  # name", "authorize_url": "https://appleid.apple.com/auth/authorize",
9689
9688
  # "client_id": "com.example.cognito", "key_id": "1EXAMPLE",
9690
9689
  # "oidc_issuer": "https://appleid.apple.com", "team_id": "2EXAMPLE",
9691
9690
  # "token_request_method": "POST", "token_url":
9692
- # "https://appleid.apple.com/auth/token" \}`
9691
+ # "https://appleid.apple.com/auth/token" }`
9693
9692
  #
9694
9693
  # Facebook
9695
9694
  #
9696
- # : Create or update request: `"ProviderDetails": \{ "api_version":
9695
+ # : Create or update request: `"ProviderDetails": { "api_version":
9697
9696
  # "v17.0", "authorize_scopes": "public_profile, email", "client_id":
9698
- # "1example23456789", "client_secret": "provider-app-client-secret"
9699
- # \}`
9697
+ # "1example23456789", "client_secret": "provider-app-client-secret" }`
9700
9698
  #
9701
- # Describe response: `"ProviderDetails": \{ "api_version": "v17.0",
9699
+ # Describe response: `"ProviderDetails": { "api_version": "v17.0",
9702
9700
  # "attributes_url": "https://graph.facebook.com/v17.0/me?fields=",
9703
9701
  # "attributes_url_add_attributes": "true", "authorize_scopes":
9704
9702
  # "public_profile, email", "authorize_url":
9705
9703
  # "https://www.facebook.com/v17.0/dialog/oauth", "client_id":
9706
9704
  # "1example23456789", "client_secret": "provider-app-client-secret",
9707
9705
  # "token_request_method": "GET", "token_url":
9708
- # "https://graph.facebook.com/v17.0/oauth/access_token" \}`
9706
+ # "https://graph.facebook.com/v17.0/oauth/access_token" }`
9709
9707
  #
9710
9708
  # @option params [Hash<String,String>] :attribute_mapping
9711
9709
  # The IdP attribute mapping to be changed.
@@ -10937,7 +10935,7 @@ module Aws::CognitoIdentityProvider
10937
10935
  tracer: tracer
10938
10936
  )
10939
10937
  context[:gem_name] = 'aws-sdk-cognitoidentityprovider'
10940
- context[:gem_version] = '1.108.0'
10938
+ context[:gem_version] = '1.109.0'
10941
10939
  Seahorse::Client::Request.new(handlers, context)
10942
10940
  end
10943
10941
 
@@ -1434,12 +1434,12 @@ module Aws::CognitoIdentityProvider
1434
1434
  # SMS\_MFA
1435
1435
  #
1436
1436
  # : `"ChallengeName": "SMS_MFA", "ChallengeResponses":
1437
- # \{"SMS_MFA_CODE": "[code]", "USERNAME": "[username]"\}`
1437
+ # {"SMS_MFA_CODE": "[code]", "USERNAME": "[username]"}`
1438
1438
  #
1439
1439
  # EMAIL\_OTP
1440
1440
  #
1441
1441
  # : `"ChallengeName": "EMAIL_OTP", "ChallengeResponses":
1442
- # \{"EMAIL_OTP_CODE": "[code]", "USERNAME": "[username]"\}`
1442
+ # {"EMAIL_OTP_CODE": "[code]", "USERNAME": "[username]"}`
1443
1443
  #
1444
1444
  # PASSWORD\_VERIFIER
1445
1445
  #
@@ -1449,23 +1449,23 @@ module Aws::CognitoIdentityProvider
1449
1449
  # pool returns a `NotAuthorizedException` error.
1450
1450
  #
1451
1451
  # `"ChallengeName": "PASSWORD_VERIFIER", "ChallengeResponses":
1452
- # \{"PASSWORD_CLAIM_SIGNATURE": "[claim_signature]",
1452
+ # {"PASSWORD_CLAIM_SIGNATURE": "[claim_signature]",
1453
1453
  # "PASSWORD_CLAIM_SECRET_BLOCK": "[secret_block]", "TIMESTAMP":
1454
- # [timestamp], "USERNAME": "[username]"\}`
1454
+ # [timestamp], "USERNAME": "[username]"}`
1455
1455
  #
1456
1456
  # Add `"DEVICE_KEY"` when you sign in with a remembered device.
1457
1457
  #
1458
1458
  # CUSTOM\_CHALLENGE
1459
1459
  #
1460
1460
  # : `"ChallengeName": "CUSTOM_CHALLENGE", "ChallengeResponses":
1461
- # \{"USERNAME": "[username]", "ANSWER": "[challenge_answer]"\}`
1461
+ # {"USERNAME": "[username]", "ANSWER": "[challenge_answer]"}`
1462
1462
  #
1463
1463
  # Add `"DEVICE_KEY"` when you sign in with a remembered device.
1464
1464
  #
1465
1465
  # NEW\_PASSWORD\_REQUIRED
1466
1466
  #
1467
1467
  # : `"ChallengeName": "NEW_PASSWORD_REQUIRED", "ChallengeResponses":
1468
- # \{"NEW_PASSWORD": "[new_password]", "USERNAME": "[username]"\}`
1468
+ # {"NEW_PASSWORD": "[new_password]", "USERNAME": "[username]"}`
1469
1469
  #
1470
1470
  # To set any required attributes that `InitiateAuth` returned in an
1471
1471
  # `requiredAttributes` parameter, add
@@ -1485,34 +1485,33 @@ module Aws::CognitoIdentityProvider
1485
1485
  # SOFTWARE\_TOKEN\_MFA
1486
1486
  #
1487
1487
  # : `"ChallengeName": "SOFTWARE_TOKEN_MFA", "ChallengeResponses":
1488
- # \{"USERNAME": "[username]", "SOFTWARE_TOKEN_MFA_CODE":
1489
- # [authenticator_code]\}`
1488
+ # {"USERNAME": "[username]", "SOFTWARE_TOKEN_MFA_CODE":
1489
+ # [authenticator_code]}`
1490
1490
  #
1491
1491
  # DEVICE\_SRP\_AUTH
1492
1492
  #
1493
1493
  # : `"ChallengeName": "DEVICE_SRP_AUTH", "ChallengeResponses":
1494
- # \{"USERNAME": "[username]", "DEVICE_KEY": "[device_key]", "SRP_A":
1495
- # "[srp_a]"\}`
1494
+ # {"USERNAME": "[username]", "DEVICE_KEY": "[device_key]", "SRP_A":
1495
+ # "[srp_a]"}`
1496
1496
  #
1497
1497
  # DEVICE\_PASSWORD\_VERIFIER
1498
1498
  #
1499
1499
  # : `"ChallengeName": "DEVICE_PASSWORD_VERIFIER",
1500
- # "ChallengeResponses": \{"DEVICE_KEY": "[device_key]",
1500
+ # "ChallengeResponses": {"DEVICE_KEY": "[device_key]",
1501
1501
  # "PASSWORD_CLAIM_SIGNATURE": "[claim_signature]",
1502
1502
  # "PASSWORD_CLAIM_SECRET_BLOCK": "[secret_block]", "TIMESTAMP":
1503
- # [timestamp], "USERNAME": "[username]"\}`
1503
+ # [timestamp], "USERNAME": "[username]"}`
1504
1504
  #
1505
1505
  # MFA\_SETUP
1506
1506
  #
1507
- # : `"ChallengeName": "MFA_SETUP", "ChallengeResponses": \{"USERNAME":
1508
- # "[username]"\}, "SESSION": "[Session ID from
1509
- # VerifySoftwareToken]"`
1507
+ # : `"ChallengeName": "MFA_SETUP", "ChallengeResponses": {"USERNAME":
1508
+ # "[username]"}, "SESSION": "[Session ID from VerifySoftwareToken]"`
1510
1509
  #
1511
1510
  # SELECT\_MFA\_TYPE
1512
1511
  #
1513
1512
  # : `"ChallengeName": "SELECT_MFA_TYPE", "ChallengeResponses":
1514
- # \{"USERNAME": "[username]", "ANSWER": "[SMS_MFA or
1515
- # SOFTWARE_TOKEN_MFA]"\}`
1513
+ # {"USERNAME": "[username]", "ANSWER": "[SMS_MFA or
1514
+ # SOFTWARE_TOKEN_MFA]"}`
1516
1515
  #
1517
1516
  # For more information about `SECRET_HASH`, see [Computing secret hash
1518
1517
  # values][1]. For information about `DEVICE_KEY`, see [Working with
@@ -2836,7 +2835,7 @@ module Aws::CognitoIdentityProvider
2836
2835
  # discover endpoint URLs from `oidc_issuer`: `attributes_url`,
2837
2836
  # `authorize_url`, `jwks_uri`, `token_url`.
2838
2837
  #
2839
- # Create or update request: `"ProviderDetails": \{
2838
+ # Create or update request: `"ProviderDetails": {
2840
2839
  # "attributes_request_method": "GET", "attributes_url":
2841
2840
  # "https://auth.example.com/userInfo", "authorize_scopes": "openid
2842
2841
  # profile email", "authorize_url":
@@ -2844,9 +2843,9 @@ module Aws::CognitoIdentityProvider
2844
2843
  # "1example23456789", "client_secret": "provider-app-client-secret",
2845
2844
  # "jwks_uri": "https://auth.example.com/.well-known/jwks.json",
2846
2845
  # "oidc_issuer": "https://auth.example.com", "token_url":
2847
- # "https://example.com/token" \}`
2846
+ # "https://example.com/token" }`
2848
2847
  #
2849
- # Describe response: `"ProviderDetails": \{
2848
+ # Describe response: `"ProviderDetails": {
2850
2849
  # "attributes_request_method": "GET", "attributes_url":
2851
2850
  # "https://auth.example.com/userInfo",
2852
2851
  # "attributes_url_add_attributes": "false", "authorize_scopes":
@@ -2855,56 +2854,56 @@ module Aws::CognitoIdentityProvider
2855
2854
  # "1example23456789", "client_secret": "provider-app-client-secret",
2856
2855
  # "jwks_uri": "https://auth.example.com/.well-known/jwks.json",
2857
2856
  # "oidc_issuer": "https://auth.example.com", "token_url":
2858
- # "https://example.com/token" \}`
2857
+ # "https://example.com/token" }`
2859
2858
  #
2860
2859
  # SAML
2861
2860
  #
2862
- # : Create or update request with Metadata URL: `"ProviderDetails": \{
2861
+ # : Create or update request with Metadata URL: `"ProviderDetails": {
2863
2862
  # "IDPInit": "true", "IDPSignout": "true", "EncryptedResponses" :
2864
2863
  # "true", "MetadataURL":
2865
2864
  # "https://auth.example.com/sso/saml/metadata",
2866
- # "RequestSigningAlgorithm": "rsa-sha256" \}`
2865
+ # "RequestSigningAlgorithm": "rsa-sha256" }`
2867
2866
  #
2868
- # Create or update request with Metadata file: `"ProviderDetails":
2869
- # \{ "IDPInit": "true", "IDPSignout": "true", "EncryptedResponses" :
2867
+ # Create or update request with Metadata file: `"ProviderDetails": {
2868
+ # "IDPInit": "true", "IDPSignout": "true", "EncryptedResponses" :
2870
2869
  # "true", "MetadataFile": "[metadata XML]",
2871
- # "RequestSigningAlgorithm": "rsa-sha256" \}`
2870
+ # "RequestSigningAlgorithm": "rsa-sha256" }`
2872
2871
  #
2873
2872
  # The value of `MetadataFile` must be the plaintext metadata
2874
2873
  # document with all quote (") characters escaped by backslashes.
2875
2874
  #
2876
- # Describe response: `"ProviderDetails": \{ "IDPInit": "true",
2875
+ # Describe response: `"ProviderDetails": { "IDPInit": "true",
2877
2876
  # "IDPSignout": "true", "EncryptedResponses" : "true",
2878
2877
  # "ActiveEncryptionCertificate": "[certificate]", "MetadataURL":
2879
2878
  # "https://auth.example.com/sso/saml/metadata",
2880
2879
  # "RequestSigningAlgorithm": "rsa-sha256", "SLORedirectBindingURI":
2881
2880
  # "https://auth.example.com/slo/saml", "SSORedirectBindingURI":
2882
- # "https://auth.example.com/sso/saml" \}`
2881
+ # "https://auth.example.com/sso/saml" }`
2883
2882
  #
2884
2883
  # LoginWithAmazon
2885
2884
  #
2886
- # : Create or update request: `"ProviderDetails": \{
2885
+ # : Create or update request: `"ProviderDetails": {
2887
2886
  # "authorize_scopes": "profile postal_code", "client_id":
2888
2887
  # "amzn1.application-oa2-client.1example23456789", "client_secret":
2889
2888
  # "provider-app-client-secret"`
2890
2889
  #
2891
- # Describe response: `"ProviderDetails": \{ "attributes_url":
2890
+ # Describe response: `"ProviderDetails": { "attributes_url":
2892
2891
  # "https://api.amazon.com/user/profile",
2893
2892
  # "attributes_url_add_attributes": "false", "authorize_scopes":
2894
2893
  # "profile postal_code", "authorize_url":
2895
2894
  # "https://www.amazon.com/ap/oa", "client_id":
2896
2895
  # "amzn1.application-oa2-client.1example23456789", "client_secret":
2897
2896
  # "provider-app-client-secret", "token_request_method": "POST",
2898
- # "token_url": "https://api.amazon.com/auth/o2/token" \}`
2897
+ # "token_url": "https://api.amazon.com/auth/o2/token" }`
2899
2898
  #
2900
2899
  # Google
2901
2900
  #
2902
- # : Create or update request: `"ProviderDetails": \{
2901
+ # : Create or update request: `"ProviderDetails": {
2903
2902
  # "authorize_scopes": "email profile openid", "client_id":
2904
2903
  # "1example23456789.apps.googleusercontent.com", "client_secret":
2905
- # "provider-app-client-secret" \}`
2904
+ # "provider-app-client-secret" }`
2906
2905
  #
2907
- # Describe response: `"ProviderDetails": \{ "attributes_url":
2906
+ # Describe response: `"ProviderDetails": { "attributes_url":
2908
2907
  # "https://people.googleapis.com/v1/people/me?personFields=",
2909
2908
  # "attributes_url_add_attributes": "true", "authorize_scopes":
2910
2909
  # "email profile openid", "authorize_url":
@@ -2912,39 +2911,39 @@ module Aws::CognitoIdentityProvider
2912
2911
  # "1example23456789.apps.googleusercontent.com", "client_secret":
2913
2912
  # "provider-app-client-secret", "oidc_issuer":
2914
2913
  # "https://accounts.google.com", "token_request_method": "POST",
2915
- # "token_url": "https://www.googleapis.com/oauth2/v4/token" \}`
2914
+ # "token_url": "https://www.googleapis.com/oauth2/v4/token" }`
2916
2915
  #
2917
2916
  # SignInWithApple
2918
2917
  #
2919
- # : Create or update request: `"ProviderDetails": \{
2918
+ # : Create or update request: `"ProviderDetails": {
2920
2919
  # "authorize_scopes": "email name", "client_id":
2921
2920
  # "com.example.cognito", "private_key": "1EXAMPLE", "key_id":
2922
- # "2EXAMPLE", "team_id": "3EXAMPLE" \}`
2921
+ # "2EXAMPLE", "team_id": "3EXAMPLE" }`
2923
2922
  #
2924
- # Describe response: `"ProviderDetails": \{
2923
+ # Describe response: `"ProviderDetails": {
2925
2924
  # "attributes_url_add_attributes": "false", "authorize_scopes":
2926
2925
  # "email name", "authorize_url":
2927
2926
  # "https://appleid.apple.com/auth/authorize", "client_id":
2928
2927
  # "com.example.cognito", "key_id": "1EXAMPLE", "oidc_issuer":
2929
2928
  # "https://appleid.apple.com", "team_id": "2EXAMPLE",
2930
2929
  # "token_request_method": "POST", "token_url":
2931
- # "https://appleid.apple.com/auth/token" \}`
2930
+ # "https://appleid.apple.com/auth/token" }`
2932
2931
  #
2933
2932
  # Facebook
2934
2933
  #
2935
- # : Create or update request: `"ProviderDetails": \{ "api_version":
2934
+ # : Create or update request: `"ProviderDetails": { "api_version":
2936
2935
  # "v17.0", "authorize_scopes": "public_profile, email", "client_id":
2937
2936
  # "1example23456789", "client_secret": "provider-app-client-secret"
2938
- # \}`
2937
+ # }`
2939
2938
  #
2940
- # Describe response: `"ProviderDetails": \{ "api_version": "v17.0",
2939
+ # Describe response: `"ProviderDetails": { "api_version": "v17.0",
2941
2940
  # "attributes_url": "https://graph.facebook.com/v17.0/me?fields=",
2942
2941
  # "attributes_url_add_attributes": "true", "authorize_scopes":
2943
2942
  # "public_profile, email", "authorize_url":
2944
2943
  # "https://www.facebook.com/v17.0/dialog/oauth", "client_id":
2945
2944
  # "1example23456789", "client_secret": "provider-app-client-secret",
2946
2945
  # "token_request_method": "GET", "token_url":
2947
- # "https://graph.facebook.com/v17.0/oauth/access_token" \}`
2946
+ # "https://graph.facebook.com/v17.0/oauth/access_token" }`
2948
2947
  # @return [Hash<String,String>]
2949
2948
  #
2950
2949
  # @!attribute [rw] attribute_mapping
@@ -4546,7 +4545,7 @@ module Aws::CognitoIdentityProvider
4546
4545
  #
4547
4546
  # @!attribute [rw] message
4548
4547
  # The template for the email message that your user pool sends to
4549
- # users with an MFA code. The message must contain the `\{####\}`
4548
+ # users with an MFA code. The message must contain the `{####}`
4550
4549
  # placeholder. In the message, Amazon Cognito replaces this
4551
4550
  # placeholder with the code. If you don't provide this parameter,
4552
4551
  # Amazon Cognito sends messages in the default format.
@@ -5415,7 +5414,7 @@ module Aws::CognitoIdentityProvider
5415
5414
  # discover endpoint URLs from `oidc_issuer`: `attributes_url`,
5416
5415
  # `authorize_url`, `jwks_uri`, `token_url`.
5417
5416
  #
5418
- # Create or update request: `"ProviderDetails": \{
5417
+ # Create or update request: `"ProviderDetails": {
5419
5418
  # "attributes_request_method": "GET", "attributes_url":
5420
5419
  # "https://auth.example.com/userInfo", "authorize_scopes": "openid
5421
5420
  # profile email", "authorize_url":
@@ -5423,9 +5422,9 @@ module Aws::CognitoIdentityProvider
5423
5422
  # "1example23456789", "client_secret": "provider-app-client-secret",
5424
5423
  # "jwks_uri": "https://auth.example.com/.well-known/jwks.json",
5425
5424
  # "oidc_issuer": "https://auth.example.com", "token_url":
5426
- # "https://example.com/token" \}`
5425
+ # "https://example.com/token" }`
5427
5426
  #
5428
- # Describe response: `"ProviderDetails": \{
5427
+ # Describe response: `"ProviderDetails": {
5429
5428
  # "attributes_request_method": "GET", "attributes_url":
5430
5429
  # "https://auth.example.com/userInfo",
5431
5430
  # "attributes_url_add_attributes": "false", "authorize_scopes":
@@ -5434,56 +5433,56 @@ module Aws::CognitoIdentityProvider
5434
5433
  # "1example23456789", "client_secret": "provider-app-client-secret",
5435
5434
  # "jwks_uri": "https://auth.example.com/.well-known/jwks.json",
5436
5435
  # "oidc_issuer": "https://auth.example.com", "token_url":
5437
- # "https://example.com/token" \}`
5436
+ # "https://example.com/token" }`
5438
5437
  #
5439
5438
  # SAML
5440
5439
  #
5441
- # : Create or update request with Metadata URL: `"ProviderDetails": \{
5440
+ # : Create or update request with Metadata URL: `"ProviderDetails": {
5442
5441
  # "IDPInit": "true", "IDPSignout": "true", "EncryptedResponses" :
5443
5442
  # "true", "MetadataURL":
5444
5443
  # "https://auth.example.com/sso/saml/metadata",
5445
- # "RequestSigningAlgorithm": "rsa-sha256" \}`
5444
+ # "RequestSigningAlgorithm": "rsa-sha256" }`
5446
5445
  #
5447
- # Create or update request with Metadata file: `"ProviderDetails":
5448
- # \{ "IDPInit": "true", "IDPSignout": "true", "EncryptedResponses" :
5446
+ # Create or update request with Metadata file: `"ProviderDetails": {
5447
+ # "IDPInit": "true", "IDPSignout": "true", "EncryptedResponses" :
5449
5448
  # "true", "MetadataFile": "[metadata XML]",
5450
- # "RequestSigningAlgorithm": "rsa-sha256" \}`
5449
+ # "RequestSigningAlgorithm": "rsa-sha256" }`
5451
5450
  #
5452
5451
  # The value of `MetadataFile` must be the plaintext metadata
5453
5452
  # document with all quote (") characters escaped by backslashes.
5454
5453
  #
5455
- # Describe response: `"ProviderDetails": \{ "IDPInit": "true",
5454
+ # Describe response: `"ProviderDetails": { "IDPInit": "true",
5456
5455
  # "IDPSignout": "true", "EncryptedResponses" : "true",
5457
5456
  # "ActiveEncryptionCertificate": "[certificate]", "MetadataURL":
5458
5457
  # "https://auth.example.com/sso/saml/metadata",
5459
5458
  # "RequestSigningAlgorithm": "rsa-sha256", "SLORedirectBindingURI":
5460
5459
  # "https://auth.example.com/slo/saml", "SSORedirectBindingURI":
5461
- # "https://auth.example.com/sso/saml" \}`
5460
+ # "https://auth.example.com/sso/saml" }`
5462
5461
  #
5463
5462
  # LoginWithAmazon
5464
5463
  #
5465
- # : Create or update request: `"ProviderDetails": \{
5464
+ # : Create or update request: `"ProviderDetails": {
5466
5465
  # "authorize_scopes": "profile postal_code", "client_id":
5467
5466
  # "amzn1.application-oa2-client.1example23456789", "client_secret":
5468
5467
  # "provider-app-client-secret"`
5469
5468
  #
5470
- # Describe response: `"ProviderDetails": \{ "attributes_url":
5469
+ # Describe response: `"ProviderDetails": { "attributes_url":
5471
5470
  # "https://api.amazon.com/user/profile",
5472
5471
  # "attributes_url_add_attributes": "false", "authorize_scopes":
5473
5472
  # "profile postal_code", "authorize_url":
5474
5473
  # "https://www.amazon.com/ap/oa", "client_id":
5475
5474
  # "amzn1.application-oa2-client.1example23456789", "client_secret":
5476
5475
  # "provider-app-client-secret", "token_request_method": "POST",
5477
- # "token_url": "https://api.amazon.com/auth/o2/token" \}`
5476
+ # "token_url": "https://api.amazon.com/auth/o2/token" }`
5478
5477
  #
5479
5478
  # Google
5480
5479
  #
5481
- # : Create or update request: `"ProviderDetails": \{
5480
+ # : Create or update request: `"ProviderDetails": {
5482
5481
  # "authorize_scopes": "email profile openid", "client_id":
5483
5482
  # "1example23456789.apps.googleusercontent.com", "client_secret":
5484
- # "provider-app-client-secret" \}`
5483
+ # "provider-app-client-secret" }`
5485
5484
  #
5486
- # Describe response: `"ProviderDetails": \{ "attributes_url":
5485
+ # Describe response: `"ProviderDetails": { "attributes_url":
5487
5486
  # "https://people.googleapis.com/v1/people/me?personFields=",
5488
5487
  # "attributes_url_add_attributes": "true", "authorize_scopes":
5489
5488
  # "email profile openid", "authorize_url":
@@ -5491,39 +5490,39 @@ module Aws::CognitoIdentityProvider
5491
5490
  # "1example23456789.apps.googleusercontent.com", "client_secret":
5492
5491
  # "provider-app-client-secret", "oidc_issuer":
5493
5492
  # "https://accounts.google.com", "token_request_method": "POST",
5494
- # "token_url": "https://www.googleapis.com/oauth2/v4/token" \}`
5493
+ # "token_url": "https://www.googleapis.com/oauth2/v4/token" }`
5495
5494
  #
5496
5495
  # SignInWithApple
5497
5496
  #
5498
- # : Create or update request: `"ProviderDetails": \{
5497
+ # : Create or update request: `"ProviderDetails": {
5499
5498
  # "authorize_scopes": "email name", "client_id":
5500
5499
  # "com.example.cognito", "private_key": "1EXAMPLE", "key_id":
5501
- # "2EXAMPLE", "team_id": "3EXAMPLE" \}`
5500
+ # "2EXAMPLE", "team_id": "3EXAMPLE" }`
5502
5501
  #
5503
- # Describe response: `"ProviderDetails": \{
5502
+ # Describe response: `"ProviderDetails": {
5504
5503
  # "attributes_url_add_attributes": "false", "authorize_scopes":
5505
5504
  # "email name", "authorize_url":
5506
5505
  # "https://appleid.apple.com/auth/authorize", "client_id":
5507
5506
  # "com.example.cognito", "key_id": "1EXAMPLE", "oidc_issuer":
5508
5507
  # "https://appleid.apple.com", "team_id": "2EXAMPLE",
5509
5508
  # "token_request_method": "POST", "token_url":
5510
- # "https://appleid.apple.com/auth/token" \}`
5509
+ # "https://appleid.apple.com/auth/token" }`
5511
5510
  #
5512
5511
  # Facebook
5513
5512
  #
5514
- # : Create or update request: `"ProviderDetails": \{ "api_version":
5513
+ # : Create or update request: `"ProviderDetails": { "api_version":
5515
5514
  # "v17.0", "authorize_scopes": "public_profile, email", "client_id":
5516
5515
  # "1example23456789", "client_secret": "provider-app-client-secret"
5517
- # \}`
5516
+ # }`
5518
5517
  #
5519
- # Describe response: `"ProviderDetails": \{ "api_version": "v17.0",
5518
+ # Describe response: `"ProviderDetails": { "api_version": "v17.0",
5520
5519
  # "attributes_url": "https://graph.facebook.com/v17.0/me?fields=",
5521
5520
  # "attributes_url_add_attributes": "true", "authorize_scopes":
5522
5521
  # "public_profile, email", "authorize_url":
5523
5522
  # "https://www.facebook.com/v17.0/dialog/oauth", "client_id":
5524
5523
  # "1example23456789", "client_secret": "provider-app-client-secret",
5525
5524
  # "token_request_method": "GET", "token_url":
5526
- # "https://graph.facebook.com/v17.0/oauth/access_token" \}`
5525
+ # "https://graph.facebook.com/v17.0/oauth/access_token" }`
5527
5526
  # @return [Hash<String,String>]
5528
5527
  #
5529
5528
  # @!attribute [rw] attribute_mapping
@@ -7340,12 +7339,12 @@ module Aws::CognitoIdentityProvider
7340
7339
  # SMS\_MFA
7341
7340
  #
7342
7341
  # : `"ChallengeName": "SMS_MFA", "ChallengeResponses":
7343
- # \{"SMS_MFA_CODE": "[code]", "USERNAME": "[username]"\}`
7342
+ # {"SMS_MFA_CODE": "[code]", "USERNAME": "[username]"}`
7344
7343
  #
7345
7344
  # EMAIL\_OTP
7346
7345
  #
7347
7346
  # : `"ChallengeName": "EMAIL_OTP", "ChallengeResponses":
7348
- # \{"EMAIL_OTP_CODE": "[code]", "USERNAME": "[username]"\}`
7347
+ # {"EMAIL_OTP_CODE": "[code]", "USERNAME": "[username]"}`
7349
7348
  #
7350
7349
  # PASSWORD\_VERIFIER
7351
7350
  #
@@ -7355,23 +7354,23 @@ module Aws::CognitoIdentityProvider
7355
7354
  # pool returns a `NotAuthorizedException` error.
7356
7355
  #
7357
7356
  # `"ChallengeName": "PASSWORD_VERIFIER", "ChallengeResponses":
7358
- # \{"PASSWORD_CLAIM_SIGNATURE": "[claim_signature]",
7357
+ # {"PASSWORD_CLAIM_SIGNATURE": "[claim_signature]",
7359
7358
  # "PASSWORD_CLAIM_SECRET_BLOCK": "[secret_block]", "TIMESTAMP":
7360
- # [timestamp], "USERNAME": "[username]"\}`
7359
+ # [timestamp], "USERNAME": "[username]"}`
7361
7360
  #
7362
7361
  # Add `"DEVICE_KEY"` when you sign in with a remembered device.
7363
7362
  #
7364
7363
  # CUSTOM\_CHALLENGE
7365
7364
  #
7366
7365
  # : `"ChallengeName": "CUSTOM_CHALLENGE", "ChallengeResponses":
7367
- # \{"USERNAME": "[username]", "ANSWER": "[challenge_answer]"\}`
7366
+ # {"USERNAME": "[username]", "ANSWER": "[challenge_answer]"}`
7368
7367
  #
7369
7368
  # Add `"DEVICE_KEY"` when you sign in with a remembered device.
7370
7369
  #
7371
7370
  # NEW\_PASSWORD\_REQUIRED
7372
7371
  #
7373
7372
  # : `"ChallengeName": "NEW_PASSWORD_REQUIRED", "ChallengeResponses":
7374
- # \{"NEW_PASSWORD": "[new_password]", "USERNAME": "[username]"\}`
7373
+ # {"NEW_PASSWORD": "[new_password]", "USERNAME": "[username]"}`
7375
7374
  #
7376
7375
  # To set any required attributes that `InitiateAuth` returned in an
7377
7376
  # `requiredAttributes` parameter, add
@@ -7391,34 +7390,33 @@ module Aws::CognitoIdentityProvider
7391
7390
  # SOFTWARE\_TOKEN\_MFA
7392
7391
  #
7393
7392
  # : `"ChallengeName": "SOFTWARE_TOKEN_MFA", "ChallengeResponses":
7394
- # \{"USERNAME": "[username]", "SOFTWARE_TOKEN_MFA_CODE":
7395
- # [authenticator_code]\}`
7393
+ # {"USERNAME": "[username]", "SOFTWARE_TOKEN_MFA_CODE":
7394
+ # [authenticator_code]}`
7396
7395
  #
7397
7396
  # DEVICE\_SRP\_AUTH
7398
7397
  #
7399
7398
  # : `"ChallengeName": "DEVICE_SRP_AUTH", "ChallengeResponses":
7400
- # \{"USERNAME": "[username]", "DEVICE_KEY": "[device_key]", "SRP_A":
7401
- # "[srp_a]"\}`
7399
+ # {"USERNAME": "[username]", "DEVICE_KEY": "[device_key]", "SRP_A":
7400
+ # "[srp_a]"}`
7402
7401
  #
7403
7402
  # DEVICE\_PASSWORD\_VERIFIER
7404
7403
  #
7405
7404
  # : `"ChallengeName": "DEVICE_PASSWORD_VERIFIER",
7406
- # "ChallengeResponses": \{"DEVICE_KEY": "[device_key]",
7405
+ # "ChallengeResponses": {"DEVICE_KEY": "[device_key]",
7407
7406
  # "PASSWORD_CLAIM_SIGNATURE": "[claim_signature]",
7408
7407
  # "PASSWORD_CLAIM_SECRET_BLOCK": "[secret_block]", "TIMESTAMP":
7409
- # [timestamp], "USERNAME": "[username]"\}`
7408
+ # [timestamp], "USERNAME": "[username]"}`
7410
7409
  #
7411
7410
  # MFA\_SETUP
7412
7411
  #
7413
- # : `"ChallengeName": "MFA_SETUP", "ChallengeResponses": \{"USERNAME":
7414
- # "[username]"\}, "SESSION": "[Session ID from
7415
- # VerifySoftwareToken]"`
7412
+ # : `"ChallengeName": "MFA_SETUP", "ChallengeResponses": {"USERNAME":
7413
+ # "[username]"}, "SESSION": "[Session ID from VerifySoftwareToken]"`
7416
7414
  #
7417
7415
  # SELECT\_MFA\_TYPE
7418
7416
  #
7419
7417
  # : `"ChallengeName": "SELECT_MFA_TYPE", "ChallengeResponses":
7420
- # \{"USERNAME": "[username]", "ANSWER": "[SMS_MFA or
7421
- # SOFTWARE_TOKEN_MFA]"\}`
7418
+ # {"USERNAME": "[username]", "ANSWER": "[SMS_MFA or
7419
+ # SOFTWARE_TOKEN_MFA]"}`
7422
7420
  #
7423
7421
  # For more information about `SECRET_HASH`, see [Computing secret hash
7424
7422
  # values][1]. For information about `DEVICE_KEY`, see [Working with
@@ -8292,7 +8290,7 @@ module Aws::CognitoIdentityProvider
8292
8290
  #
8293
8291
  # @!attribute [rw] sms_authentication_message
8294
8292
  # The SMS message that your user pool sends to users with an MFA code.
8295
- # The message must contain the `\{####\}` placeholder. In the message,
8293
+ # The message must contain the `{####}` placeholder. In the message,
8296
8294
  # Amazon Cognito replaces this placeholder with the code. If you
8297
8295
  # don't provide this parameter, Amazon Cognito sends messages in the
8298
8296
  # default format.
@@ -8862,7 +8860,7 @@ module Aws::CognitoIdentityProvider
8862
8860
  # discover endpoint URLs from `oidc_issuer`: `attributes_url`,
8863
8861
  # `authorize_url`, `jwks_uri`, `token_url`.
8864
8862
  #
8865
- # Create or update request: `"ProviderDetails": \{
8863
+ # Create or update request: `"ProviderDetails": {
8866
8864
  # "attributes_request_method": "GET", "attributes_url":
8867
8865
  # "https://auth.example.com/userInfo", "authorize_scopes": "openid
8868
8866
  # profile email", "authorize_url":
@@ -8870,9 +8868,9 @@ module Aws::CognitoIdentityProvider
8870
8868
  # "1example23456789", "client_secret": "provider-app-client-secret",
8871
8869
  # "jwks_uri": "https://auth.example.com/.well-known/jwks.json",
8872
8870
  # "oidc_issuer": "https://auth.example.com", "token_url":
8873
- # "https://example.com/token" \}`
8871
+ # "https://example.com/token" }`
8874
8872
  #
8875
- # Describe response: `"ProviderDetails": \{
8873
+ # Describe response: `"ProviderDetails": {
8876
8874
  # "attributes_request_method": "GET", "attributes_url":
8877
8875
  # "https://auth.example.com/userInfo",
8878
8876
  # "attributes_url_add_attributes": "false", "authorize_scopes":
@@ -8881,56 +8879,56 @@ module Aws::CognitoIdentityProvider
8881
8879
  # "1example23456789", "client_secret": "provider-app-client-secret",
8882
8880
  # "jwks_uri": "https://auth.example.com/.well-known/jwks.json",
8883
8881
  # "oidc_issuer": "https://auth.example.com", "token_url":
8884
- # "https://example.com/token" \}`
8882
+ # "https://example.com/token" }`
8885
8883
  #
8886
8884
  # SAML
8887
8885
  #
8888
- # : Create or update request with Metadata URL: `"ProviderDetails": \{
8886
+ # : Create or update request with Metadata URL: `"ProviderDetails": {
8889
8887
  # "IDPInit": "true", "IDPSignout": "true", "EncryptedResponses" :
8890
8888
  # "true", "MetadataURL":
8891
8889
  # "https://auth.example.com/sso/saml/metadata",
8892
- # "RequestSigningAlgorithm": "rsa-sha256" \}`
8890
+ # "RequestSigningAlgorithm": "rsa-sha256" }`
8893
8891
  #
8894
- # Create or update request with Metadata file: `"ProviderDetails":
8895
- # \{ "IDPInit": "true", "IDPSignout": "true", "EncryptedResponses" :
8892
+ # Create or update request with Metadata file: `"ProviderDetails": {
8893
+ # "IDPInit": "true", "IDPSignout": "true", "EncryptedResponses" :
8896
8894
  # "true", "MetadataFile": "[metadata XML]",
8897
- # "RequestSigningAlgorithm": "rsa-sha256" \}`
8895
+ # "RequestSigningAlgorithm": "rsa-sha256" }`
8898
8896
  #
8899
8897
  # The value of `MetadataFile` must be the plaintext metadata
8900
8898
  # document with all quote (") characters escaped by backslashes.
8901
8899
  #
8902
- # Describe response: `"ProviderDetails": \{ "IDPInit": "true",
8900
+ # Describe response: `"ProviderDetails": { "IDPInit": "true",
8903
8901
  # "IDPSignout": "true", "EncryptedResponses" : "true",
8904
8902
  # "ActiveEncryptionCertificate": "[certificate]", "MetadataURL":
8905
8903
  # "https://auth.example.com/sso/saml/metadata",
8906
8904
  # "RequestSigningAlgorithm": "rsa-sha256", "SLORedirectBindingURI":
8907
8905
  # "https://auth.example.com/slo/saml", "SSORedirectBindingURI":
8908
- # "https://auth.example.com/sso/saml" \}`
8906
+ # "https://auth.example.com/sso/saml" }`
8909
8907
  #
8910
8908
  # LoginWithAmazon
8911
8909
  #
8912
- # : Create or update request: `"ProviderDetails": \{
8910
+ # : Create or update request: `"ProviderDetails": {
8913
8911
  # "authorize_scopes": "profile postal_code", "client_id":
8914
8912
  # "amzn1.application-oa2-client.1example23456789", "client_secret":
8915
8913
  # "provider-app-client-secret"`
8916
8914
  #
8917
- # Describe response: `"ProviderDetails": \{ "attributes_url":
8915
+ # Describe response: `"ProviderDetails": { "attributes_url":
8918
8916
  # "https://api.amazon.com/user/profile",
8919
8917
  # "attributes_url_add_attributes": "false", "authorize_scopes":
8920
8918
  # "profile postal_code", "authorize_url":
8921
8919
  # "https://www.amazon.com/ap/oa", "client_id":
8922
8920
  # "amzn1.application-oa2-client.1example23456789", "client_secret":
8923
8921
  # "provider-app-client-secret", "token_request_method": "POST",
8924
- # "token_url": "https://api.amazon.com/auth/o2/token" \}`
8922
+ # "token_url": "https://api.amazon.com/auth/o2/token" }`
8925
8923
  #
8926
8924
  # Google
8927
8925
  #
8928
- # : Create or update request: `"ProviderDetails": \{
8926
+ # : Create or update request: `"ProviderDetails": {
8929
8927
  # "authorize_scopes": "email profile openid", "client_id":
8930
8928
  # "1example23456789.apps.googleusercontent.com", "client_secret":
8931
- # "provider-app-client-secret" \}`
8929
+ # "provider-app-client-secret" }`
8932
8930
  #
8933
- # Describe response: `"ProviderDetails": \{ "attributes_url":
8931
+ # Describe response: `"ProviderDetails": { "attributes_url":
8934
8932
  # "https://people.googleapis.com/v1/people/me?personFields=",
8935
8933
  # "attributes_url_add_attributes": "true", "authorize_scopes":
8936
8934
  # "email profile openid", "authorize_url":
@@ -8938,39 +8936,39 @@ module Aws::CognitoIdentityProvider
8938
8936
  # "1example23456789.apps.googleusercontent.com", "client_secret":
8939
8937
  # "provider-app-client-secret", "oidc_issuer":
8940
8938
  # "https://accounts.google.com", "token_request_method": "POST",
8941
- # "token_url": "https://www.googleapis.com/oauth2/v4/token" \}`
8939
+ # "token_url": "https://www.googleapis.com/oauth2/v4/token" }`
8942
8940
  #
8943
8941
  # SignInWithApple
8944
8942
  #
8945
- # : Create or update request: `"ProviderDetails": \{
8943
+ # : Create or update request: `"ProviderDetails": {
8946
8944
  # "authorize_scopes": "email name", "client_id":
8947
8945
  # "com.example.cognito", "private_key": "1EXAMPLE", "key_id":
8948
- # "2EXAMPLE", "team_id": "3EXAMPLE" \}`
8946
+ # "2EXAMPLE", "team_id": "3EXAMPLE" }`
8949
8947
  #
8950
- # Describe response: `"ProviderDetails": \{
8948
+ # Describe response: `"ProviderDetails": {
8951
8949
  # "attributes_url_add_attributes": "false", "authorize_scopes":
8952
8950
  # "email name", "authorize_url":
8953
8951
  # "https://appleid.apple.com/auth/authorize", "client_id":
8954
8952
  # "com.example.cognito", "key_id": "1EXAMPLE", "oidc_issuer":
8955
8953
  # "https://appleid.apple.com", "team_id": "2EXAMPLE",
8956
8954
  # "token_request_method": "POST", "token_url":
8957
- # "https://appleid.apple.com/auth/token" \}`
8955
+ # "https://appleid.apple.com/auth/token" }`
8958
8956
  #
8959
8957
  # Facebook
8960
8958
  #
8961
- # : Create or update request: `"ProviderDetails": \{ "api_version":
8959
+ # : Create or update request: `"ProviderDetails": { "api_version":
8962
8960
  # "v17.0", "authorize_scopes": "public_profile, email", "client_id":
8963
8961
  # "1example23456789", "client_secret": "provider-app-client-secret"
8964
- # \}`
8962
+ # }`
8965
8963
  #
8966
- # Describe response: `"ProviderDetails": \{ "api_version": "v17.0",
8964
+ # Describe response: `"ProviderDetails": { "api_version": "v17.0",
8967
8965
  # "attributes_url": "https://graph.facebook.com/v17.0/me?fields=",
8968
8966
  # "attributes_url_add_attributes": "true", "authorize_scopes":
8969
8967
  # "public_profile, email", "authorize_url":
8970
8968
  # "https://www.facebook.com/v17.0/dialog/oauth", "client_id":
8971
8969
  # "1example23456789", "client_secret": "provider-app-client-secret",
8972
8970
  # "token_request_method": "GET", "token_url":
8973
- # "https://graph.facebook.com/v17.0/oauth/access_token" \}`
8971
+ # "https://graph.facebook.com/v17.0/oauth/access_token" }`
8974
8972
  # @return [Hash<String,String>]
8975
8973
  #
8976
8974
  # @!attribute [rw] attribute_mapping
@@ -54,7 +54,7 @@ module Aws::CognitoIdentityProvider
54
54
  autoload :EndpointProvider, 'aws-sdk-cognitoidentityprovider/endpoint_provider'
55
55
  autoload :Endpoints, 'aws-sdk-cognitoidentityprovider/endpoints'
56
56
 
57
- GEM_VERSION = '1.108.0'
57
+ GEM_VERSION = '1.109.0'
58
58
 
59
59
  end
60
60
 
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-cognitoidentityprovider
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.108.0
4
+ version: 1.109.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2024-10-18 00:00:00.000000000 Z
11
+ date: 2024-11-06 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core