aws-sdk-cognitoidentityprovider 1.2.0 → 1.3.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA1:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 5f579a85f5d766bcfd202bd81b7ced97576281c8
|
4
|
+
data.tar.gz: 4629c957130d09436555bde1e07a31588a018b4b
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 4f1098817c331f5ec5e94b63465612cc03e2d097a0638c96763dd072cf60ff82a2e304f801904b3d2c641a1296594691c6abc1f30bfc9b4b2ecaf51f8cbd9dbe
|
7
|
+
data.tar.gz: 687ae24c147637a9aed5c0182f7bc9f8014c14e8ccc071fc079574a401f9fac3ac91ff3ad24160f6cdee978a3e77369bfa79a2010286dd3828bcd7bd43a29240
|
@@ -763,6 +763,9 @@ module Aws::CognitoIdentityProvider
|
|
763
763
|
# * `USER_SRP_AUTH` will take in `USERNAME` and `SRP_A` and return the
|
764
764
|
# SRP variables to be used for next challenge execution.
|
765
765
|
#
|
766
|
+
# * `USER_PASSWORD_AUTH` will take in `USERNAME` and `PASSWORD` and
|
767
|
+
# return the next challenge or tokens.
|
768
|
+
#
|
766
769
|
# Valid values include:
|
767
770
|
#
|
768
771
|
# * `USER_SRP_AUTH`\: Authentication flow for the Secure Remote Password
|
@@ -778,6 +781,11 @@ module Aws::CognitoIdentityProvider
|
|
778
781
|
# the USERNAME and PASSWORD directly if the flow is enabled for
|
779
782
|
# calling the app client.
|
780
783
|
#
|
784
|
+
# * `USER_PASSWORD_AUTH`\: Non-SRP authentication flow; USERNAME and
|
785
|
+
# PASSWORD are passed directly. If a user migration Lambda trigger is
|
786
|
+
# set, this flow will invoke the user migration Lambda if the USERNAME
|
787
|
+
# is not found in the user pool.
|
788
|
+
#
|
781
789
|
# @option params [Hash<String,String>] :auth_parameters
|
782
790
|
# The authentication parameters. These are inputs corresponding to the
|
783
791
|
# `AuthFlow` that you are invoking. The required values depend on the
|
@@ -787,9 +795,9 @@ module Aws::CognitoIdentityProvider
|
|
787
795
|
# `SECRET_HASH` (required if the app client is configured with a
|
788
796
|
# client secret), `DEVICE_KEY`
|
789
797
|
#
|
790
|
-
# * For `REFRESH_TOKEN_AUTH/REFRESH_TOKEN`\: `
|
798
|
+
# * For `REFRESH_TOKEN_AUTH/REFRESH_TOKEN`\: `REFRESH_TOKEN` (required),
|
791
799
|
# `SECRET_HASH` (required if the app client is configured with a
|
792
|
-
# client secret), `
|
800
|
+
# client secret), `DEVICE_KEY`
|
793
801
|
#
|
794
802
|
# * For `ADMIN_NO_SRP_AUTH`\: `USERNAME` (required), `SECRET_HASH` (if
|
795
803
|
# app client is configured with client secret), `PASSWORD` (required),
|
@@ -824,7 +832,7 @@ module Aws::CognitoIdentityProvider
|
|
824
832
|
# resp = client.admin_initiate_auth({
|
825
833
|
# user_pool_id: "UserPoolIdType", # required
|
826
834
|
# client_id: "ClientIdType", # required
|
827
|
-
# auth_flow: "USER_SRP_AUTH", # required, accepts USER_SRP_AUTH, REFRESH_TOKEN_AUTH, REFRESH_TOKEN, CUSTOM_AUTH, ADMIN_NO_SRP_AUTH
|
835
|
+
# auth_flow: "USER_SRP_AUTH", # required, accepts USER_SRP_AUTH, REFRESH_TOKEN_AUTH, REFRESH_TOKEN, CUSTOM_AUTH, ADMIN_NO_SRP_AUTH, USER_PASSWORD_AUTH
|
828
836
|
# auth_parameters: {
|
829
837
|
# "StringType" => "StringType",
|
830
838
|
# },
|
@@ -1077,7 +1085,7 @@ module Aws::CognitoIdentityProvider
|
|
1077
1085
|
# The user pool ID.
|
1078
1086
|
#
|
1079
1087
|
# @option params [required, String] :username
|
1080
|
-
# The user pool username.
|
1088
|
+
# The user pool username or an alias.
|
1081
1089
|
#
|
1082
1090
|
# @option params [Integer] :max_results
|
1083
1091
|
# The maximum number of authentication events to return.
|
@@ -1323,7 +1331,7 @@ module Aws::CognitoIdentityProvider
|
|
1323
1331
|
# The time-based one-time password software token MFA settings.
|
1324
1332
|
#
|
1325
1333
|
# @option params [required, String] :username
|
1326
|
-
# The user pool username.
|
1334
|
+
# The user pool username or alias.
|
1327
1335
|
#
|
1328
1336
|
# @option params [required, String] :user_pool_id
|
1329
1337
|
# The user pool ID.
|
@@ -2024,6 +2032,25 @@ module Aws::CognitoIdentityProvider
|
|
2024
2032
|
# @option params [Types::LambdaConfigType] :lambda_config
|
2025
2033
|
# The Lambda trigger configuration information for the new user pool.
|
2026
2034
|
#
|
2035
|
+
# <note markdown="1"> In a push model, event sources (such as Amazon S3 and custom
|
2036
|
+
# applications) need permission to invoke a function. So you will need
|
2037
|
+
# to make an extra call to add permission for these event sources to
|
2038
|
+
# invoke your Lambda function.
|
2039
|
+
#
|
2040
|
+
#
|
2041
|
+
#
|
2042
|
+
# For more information on using the Lambda API to add permission, see [
|
2043
|
+
# AddPermission ][1].
|
2044
|
+
#
|
2045
|
+
# For adding permission using the AWS CLI, see [ add-permission ][2].
|
2046
|
+
#
|
2047
|
+
# </note>
|
2048
|
+
#
|
2049
|
+
#
|
2050
|
+
#
|
2051
|
+
# [1]: https://docs.aws.amazon.com/lambda/latest/dg/API_AddPermission.html
|
2052
|
+
# [2]: https://docs.aws.amazon.com/cli/latest/reference/lambda/add-permission.html
|
2053
|
+
#
|
2027
2054
|
# @option params [Array<String>] :auto_verified_attributes
|
2028
2055
|
# The attributes to be auto-verified. Possible values: **email**,
|
2029
2056
|
# **phone\_number**.
|
@@ -2110,6 +2137,7 @@ module Aws::CognitoIdentityProvider
|
|
2110
2137
|
# create_auth_challenge: "ArnType",
|
2111
2138
|
# verify_auth_challenge_response: "ArnType",
|
2112
2139
|
# pre_token_generation: "ArnType",
|
2140
|
+
# user_migration: "ArnType",
|
2113
2141
|
# },
|
2114
2142
|
# auto_verified_attributes: ["phone_number"], # accepts phone_number, email
|
2115
2143
|
# alias_attributes: ["phone_number"], # accepts phone_number, email, preferred_username
|
@@ -2191,6 +2219,7 @@ module Aws::CognitoIdentityProvider
|
|
2191
2219
|
# resp.user_pool.lambda_config.create_auth_challenge #=> String
|
2192
2220
|
# resp.user_pool.lambda_config.verify_auth_challenge_response #=> String
|
2193
2221
|
# resp.user_pool.lambda_config.pre_token_generation #=> String
|
2222
|
+
# resp.user_pool.lambda_config.user_migration #=> String
|
2194
2223
|
# resp.user_pool.status #=> String, one of "Enabled", "Disabled"
|
2195
2224
|
# resp.user_pool.last_modified_date #=> Time
|
2196
2225
|
# resp.user_pool.creation_date #=> Time
|
@@ -2321,7 +2350,7 @@ module Aws::CognitoIdentityProvider
|
|
2321
2350
|
# refresh_token_validity: 1,
|
2322
2351
|
# read_attributes: ["ClientPermissionType"],
|
2323
2352
|
# write_attributes: ["ClientPermissionType"],
|
2324
|
-
# explicit_auth_flows: ["ADMIN_NO_SRP_AUTH"], # accepts ADMIN_NO_SRP_AUTH, CUSTOM_AUTH_FLOW_ONLY
|
2353
|
+
# explicit_auth_flows: ["ADMIN_NO_SRP_AUTH"], # accepts ADMIN_NO_SRP_AUTH, CUSTOM_AUTH_FLOW_ONLY, USER_PASSWORD_AUTH
|
2325
2354
|
# supported_identity_providers: ["ProviderNameType"],
|
2326
2355
|
# callback_urls: ["RedirectUrlType"],
|
2327
2356
|
# logout_urls: ["RedirectUrlType"],
|
@@ -2351,7 +2380,7 @@ module Aws::CognitoIdentityProvider
|
|
2351
2380
|
# resp.user_pool_client.write_attributes #=> Array
|
2352
2381
|
# resp.user_pool_client.write_attributes[0] #=> String
|
2353
2382
|
# resp.user_pool_client.explicit_auth_flows #=> Array
|
2354
|
-
# resp.user_pool_client.explicit_auth_flows[0] #=> String, one of "ADMIN_NO_SRP_AUTH", "CUSTOM_AUTH_FLOW_ONLY"
|
2383
|
+
# resp.user_pool_client.explicit_auth_flows[0] #=> String, one of "ADMIN_NO_SRP_AUTH", "CUSTOM_AUTH_FLOW_ONLY", "USER_PASSWORD_AUTH"
|
2355
2384
|
# resp.user_pool_client.supported_identity_providers #=> Array
|
2356
2385
|
# resp.user_pool_client.supported_identity_providers[0] #=> String
|
2357
2386
|
# resp.user_pool_client.callback_urls #=> Array
|
@@ -2828,6 +2857,7 @@ module Aws::CognitoIdentityProvider
|
|
2828
2857
|
# resp.user_pool.lambda_config.create_auth_challenge #=> String
|
2829
2858
|
# resp.user_pool.lambda_config.verify_auth_challenge_response #=> String
|
2830
2859
|
# resp.user_pool.lambda_config.pre_token_generation #=> String
|
2860
|
+
# resp.user_pool.lambda_config.user_migration #=> String
|
2831
2861
|
# resp.user_pool.status #=> String, one of "Enabled", "Disabled"
|
2832
2862
|
# resp.user_pool.last_modified_date #=> Time
|
2833
2863
|
# resp.user_pool.creation_date #=> Time
|
@@ -2920,7 +2950,7 @@ module Aws::CognitoIdentityProvider
|
|
2920
2950
|
# resp.user_pool_client.write_attributes #=> Array
|
2921
2951
|
# resp.user_pool_client.write_attributes[0] #=> String
|
2922
2952
|
# resp.user_pool_client.explicit_auth_flows #=> Array
|
2923
|
-
# resp.user_pool_client.explicit_auth_flows[0] #=> String, one of "ADMIN_NO_SRP_AUTH", "CUSTOM_AUTH_FLOW_ONLY"
|
2953
|
+
# resp.user_pool_client.explicit_auth_flows[0] #=> String, one of "ADMIN_NO_SRP_AUTH", "CUSTOM_AUTH_FLOW_ONLY", "USER_PASSWORD_AUTH"
|
2924
2954
|
# resp.user_pool_client.supported_identity_providers #=> Array
|
2925
2955
|
# resp.user_pool_client.supported_identity_providers[0] #=> String
|
2926
2956
|
# resp.user_pool_client.callback_urls #=> Array
|
@@ -3224,6 +3254,34 @@ module Aws::CognitoIdentityProvider
|
|
3224
3254
|
req.send_request(options)
|
3225
3255
|
end
|
3226
3256
|
|
3257
|
+
# This method takes a user pool ID, and returns the signing certificate.
|
3258
|
+
#
|
3259
|
+
# @option params [required, String] :user_pool_id
|
3260
|
+
# The user pool ID.
|
3261
|
+
#
|
3262
|
+
# @return [Types::GetSigningCertificateResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
3263
|
+
#
|
3264
|
+
# * {Types::GetSigningCertificateResponse#certificate #certificate} => String
|
3265
|
+
#
|
3266
|
+
# @example Request syntax with placeholder values
|
3267
|
+
#
|
3268
|
+
# resp = client.get_signing_certificate({
|
3269
|
+
# user_pool_id: "UserPoolIdType", # required
|
3270
|
+
# })
|
3271
|
+
#
|
3272
|
+
# @example Response structure
|
3273
|
+
#
|
3274
|
+
# resp.certificate #=> String
|
3275
|
+
#
|
3276
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/cognito-idp-2016-04-18/GetSigningCertificate AWS API Documentation
|
3277
|
+
#
|
3278
|
+
# @overload get_signing_certificate(params = {})
|
3279
|
+
# @param [Hash] params ({})
|
3280
|
+
def get_signing_certificate(params = {}, options = {})
|
3281
|
+
req = build_request(:get_signing_certificate, params)
|
3282
|
+
req.send_request(options)
|
3283
|
+
end
|
3284
|
+
|
3227
3285
|
# Gets the UI Customization information for a particular app client's
|
3228
3286
|
# app UI, if there is something set. If nothing is set for the
|
3229
3287
|
# particular client, but there is an existing pool level customization
|
@@ -3413,6 +3471,9 @@ module Aws::CognitoIdentityProvider
|
|
3413
3471
|
# * `USER_SRP_AUTH` will take in `USERNAME` and `SRP_A` and return the
|
3414
3472
|
# SRP variables to be used for next challenge execution.
|
3415
3473
|
#
|
3474
|
+
# * `USER_PASSWORD_AUTH` will take in `USERNAME` and `PASSWORD` and
|
3475
|
+
# return the next challenge or tokens.
|
3476
|
+
#
|
3416
3477
|
# Valid values include:
|
3417
3478
|
#
|
3418
3479
|
# * `USER_SRP_AUTH`\: Authentication flow for the Secure Remote Password
|
@@ -3424,6 +3485,11 @@ module Aws::CognitoIdentityProvider
|
|
3424
3485
|
#
|
3425
3486
|
# * `CUSTOM_AUTH`\: Custom authentication flow.
|
3426
3487
|
#
|
3488
|
+
# * `USER_PASSWORD_AUTH`\: Non-SRP authentication flow; USERNAME and
|
3489
|
+
# PASSWORD are passed directly. If a user migration Lambda trigger is
|
3490
|
+
# set, this flow will invoke the user migration Lambda if the USERNAME
|
3491
|
+
# is not found in the user pool.
|
3492
|
+
#
|
3427
3493
|
# `ADMIN_NO_SRP_AUTH` is not a valid value.
|
3428
3494
|
#
|
3429
3495
|
# @option params [Hash<String,String>] :auth_parameters
|
@@ -3435,9 +3501,9 @@ module Aws::CognitoIdentityProvider
|
|
3435
3501
|
# `SECRET_HASH` (required if the app client is configured with a
|
3436
3502
|
# client secret), `DEVICE_KEY`
|
3437
3503
|
#
|
3438
|
-
# * For `REFRESH_TOKEN_AUTH/REFRESH_TOKEN`\: `
|
3504
|
+
# * For `REFRESH_TOKEN_AUTH/REFRESH_TOKEN`\: `REFRESH_TOKEN` (required),
|
3439
3505
|
# `SECRET_HASH` (required if the app client is configured with a
|
3440
|
-
# client secret), `
|
3506
|
+
# client secret), `DEVICE_KEY`
|
3441
3507
|
#
|
3442
3508
|
# * For `CUSTOM_AUTH`\: `USERNAME` (required), `SECRET_HASH` (if app
|
3443
3509
|
# client is configured with client secret), `DEVICE_KEY`
|
@@ -3469,7 +3535,7 @@ module Aws::CognitoIdentityProvider
|
|
3469
3535
|
# @example Request syntax with placeholder values
|
3470
3536
|
#
|
3471
3537
|
# resp = client.initiate_auth({
|
3472
|
-
# auth_flow: "USER_SRP_AUTH", # required, accepts USER_SRP_AUTH, REFRESH_TOKEN_AUTH, REFRESH_TOKEN, CUSTOM_AUTH, ADMIN_NO_SRP_AUTH
|
3538
|
+
# auth_flow: "USER_SRP_AUTH", # required, accepts USER_SRP_AUTH, REFRESH_TOKEN_AUTH, REFRESH_TOKEN, CUSTOM_AUTH, ADMIN_NO_SRP_AUTH, USER_PASSWORD_AUTH
|
3473
3539
|
# auth_parameters: {
|
3474
3540
|
# "StringType" => "StringType",
|
3475
3541
|
# },
|
@@ -3824,6 +3890,7 @@ module Aws::CognitoIdentityProvider
|
|
3824
3890
|
# resp.user_pools[0].lambda_config.create_auth_challenge #=> String
|
3825
3891
|
# resp.user_pools[0].lambda_config.verify_auth_challenge_response #=> String
|
3826
3892
|
# resp.user_pools[0].lambda_config.pre_token_generation #=> String
|
3893
|
+
# resp.user_pools[0].lambda_config.user_migration #=> String
|
3827
3894
|
# resp.user_pools[0].status #=> String, one of "Enabled", "Disabled"
|
3828
3895
|
# resp.user_pools[0].last_modified_date #=> Time
|
3829
3896
|
# resp.user_pools[0].creation_date #=> Time
|
@@ -5009,6 +5076,7 @@ module Aws::CognitoIdentityProvider
|
|
5009
5076
|
# create_auth_challenge: "ArnType",
|
5010
5077
|
# verify_auth_challenge_response: "ArnType",
|
5011
5078
|
# pre_token_generation: "ArnType",
|
5079
|
+
# user_migration: "ArnType",
|
5012
5080
|
# },
|
5013
5081
|
# auto_verified_attributes: ["phone_number"], # accepts phone_number, email
|
5014
5082
|
# sms_verification_message: "SmsVerificationMessageType",
|
@@ -5134,7 +5202,7 @@ module Aws::CognitoIdentityProvider
|
|
5134
5202
|
# refresh_token_validity: 1,
|
5135
5203
|
# read_attributes: ["ClientPermissionType"],
|
5136
5204
|
# write_attributes: ["ClientPermissionType"],
|
5137
|
-
# explicit_auth_flows: ["ADMIN_NO_SRP_AUTH"], # accepts ADMIN_NO_SRP_AUTH, CUSTOM_AUTH_FLOW_ONLY
|
5205
|
+
# explicit_auth_flows: ["ADMIN_NO_SRP_AUTH"], # accepts ADMIN_NO_SRP_AUTH, CUSTOM_AUTH_FLOW_ONLY, USER_PASSWORD_AUTH
|
5138
5206
|
# supported_identity_providers: ["ProviderNameType"],
|
5139
5207
|
# callback_urls: ["RedirectUrlType"],
|
5140
5208
|
# logout_urls: ["RedirectUrlType"],
|
@@ -5164,7 +5232,7 @@ module Aws::CognitoIdentityProvider
|
|
5164
5232
|
# resp.user_pool_client.write_attributes #=> Array
|
5165
5233
|
# resp.user_pool_client.write_attributes[0] #=> String
|
5166
5234
|
# resp.user_pool_client.explicit_auth_flows #=> Array
|
5167
|
-
# resp.user_pool_client.explicit_auth_flows[0] #=> String, one of "ADMIN_NO_SRP_AUTH", "CUSTOM_AUTH_FLOW_ONLY"
|
5235
|
+
# resp.user_pool_client.explicit_auth_flows[0] #=> String, one of "ADMIN_NO_SRP_AUTH", "CUSTOM_AUTH_FLOW_ONLY", "USER_PASSWORD_AUTH"
|
5168
5236
|
# resp.user_pool_client.supported_identity_providers #=> Array
|
5169
5237
|
# resp.user_pool_client.supported_identity_providers[0] #=> String
|
5170
5238
|
# resp.user_pool_client.callback_urls #=> Array
|
@@ -5278,7 +5346,7 @@ module Aws::CognitoIdentityProvider
|
|
5278
5346
|
params: params,
|
5279
5347
|
config: config)
|
5280
5348
|
context[:gem_name] = 'aws-sdk-cognitoidentityprovider'
|
5281
|
-
context[:gem_version] = '1.
|
5349
|
+
context[:gem_version] = '1.3.0'
|
5282
5350
|
Seahorse::Client::Request.new(handlers, context)
|
5283
5351
|
end
|
5284
5352
|
|
@@ -217,6 +217,8 @@ module Aws::CognitoIdentityProvider
|
|
217
217
|
GetGroupResponse = Shapes::StructureShape.new(name: 'GetGroupResponse')
|
218
218
|
GetIdentityProviderByIdentifierRequest = Shapes::StructureShape.new(name: 'GetIdentityProviderByIdentifierRequest')
|
219
219
|
GetIdentityProviderByIdentifierResponse = Shapes::StructureShape.new(name: 'GetIdentityProviderByIdentifierResponse')
|
220
|
+
GetSigningCertificateRequest = Shapes::StructureShape.new(name: 'GetSigningCertificateRequest')
|
221
|
+
GetSigningCertificateResponse = Shapes::StructureShape.new(name: 'GetSigningCertificateResponse')
|
220
222
|
GetUICustomizationRequest = Shapes::StructureShape.new(name: 'GetUICustomizationRequest')
|
221
223
|
GetUICustomizationResponse = Shapes::StructureShape.new(name: 'GetUICustomizationResponse')
|
222
224
|
GetUserAttributeVerificationCodeRequest = Shapes::StructureShape.new(name: 'GetUserAttributeVerificationCodeRequest')
|
@@ -1057,6 +1059,12 @@ module Aws::CognitoIdentityProvider
|
|
1057
1059
|
GetIdentityProviderByIdentifierResponse.add_member(:identity_provider, Shapes::ShapeRef.new(shape: IdentityProviderType, required: true, location_name: "IdentityProvider"))
|
1058
1060
|
GetIdentityProviderByIdentifierResponse.struct_class = Types::GetIdentityProviderByIdentifierResponse
|
1059
1061
|
|
1062
|
+
GetSigningCertificateRequest.add_member(:user_pool_id, Shapes::ShapeRef.new(shape: UserPoolIdType, required: true, location_name: "UserPoolId"))
|
1063
|
+
GetSigningCertificateRequest.struct_class = Types::GetSigningCertificateRequest
|
1064
|
+
|
1065
|
+
GetSigningCertificateResponse.add_member(:certificate, Shapes::ShapeRef.new(shape: StringType, location_name: "Certificate"))
|
1066
|
+
GetSigningCertificateResponse.struct_class = Types::GetSigningCertificateResponse
|
1067
|
+
|
1060
1068
|
GetUICustomizationRequest.add_member(:user_pool_id, Shapes::ShapeRef.new(shape: UserPoolIdType, required: true, location_name: "UserPoolId"))
|
1061
1069
|
GetUICustomizationRequest.add_member(:client_id, Shapes::ShapeRef.new(shape: ClientIdType, location_name: "ClientId"))
|
1062
1070
|
GetUICustomizationRequest.struct_class = Types::GetUICustomizationRequest
|
@@ -1146,6 +1154,7 @@ module Aws::CognitoIdentityProvider
|
|
1146
1154
|
LambdaConfigType.add_member(:create_auth_challenge, Shapes::ShapeRef.new(shape: ArnType, location_name: "CreateAuthChallenge"))
|
1147
1155
|
LambdaConfigType.add_member(:verify_auth_challenge_response, Shapes::ShapeRef.new(shape: ArnType, location_name: "VerifyAuthChallengeResponse"))
|
1148
1156
|
LambdaConfigType.add_member(:pre_token_generation, Shapes::ShapeRef.new(shape: ArnType, location_name: "PreTokenGeneration"))
|
1157
|
+
LambdaConfigType.add_member(:user_migration, Shapes::ShapeRef.new(shape: ArnType, location_name: "UserMigration"))
|
1149
1158
|
LambdaConfigType.struct_class = Types::LambdaConfigType
|
1150
1159
|
|
1151
1160
|
ListDevicesRequest.add_member(:access_token, Shapes::ShapeRef.new(shape: TokenModelType, required: true, location_name: "AccessToken"))
|
@@ -2633,6 +2642,16 @@ module Aws::CognitoIdentityProvider
|
|
2633
2642
|
o.errors << Shapes::ShapeRef.new(shape: InternalErrorException)
|
2634
2643
|
end)
|
2635
2644
|
|
2645
|
+
api.add_operation(:get_signing_certificate, Seahorse::Model::Operation.new.tap do |o|
|
2646
|
+
o.name = "GetSigningCertificate"
|
2647
|
+
o.http_method = "POST"
|
2648
|
+
o.http_request_uri = "/"
|
2649
|
+
o.input = Shapes::ShapeRef.new(shape: GetSigningCertificateRequest)
|
2650
|
+
o.output = Shapes::ShapeRef.new(shape: GetSigningCertificateResponse)
|
2651
|
+
o.errors << Shapes::ShapeRef.new(shape: InternalErrorException)
|
2652
|
+
o.errors << Shapes::ShapeRef.new(shape: ResourceNotFoundException)
|
2653
|
+
end)
|
2654
|
+
|
2636
2655
|
api.add_operation(:get_ui_customization, Seahorse::Model::Operation.new.tap do |o|
|
2637
2656
|
o.name = "GetUICustomization"
|
2638
2657
|
o.http_method = "POST"
|
@@ -812,7 +812,7 @@ module Aws::CognitoIdentityProvider
|
|
812
812
|
# {
|
813
813
|
# user_pool_id: "UserPoolIdType", # required
|
814
814
|
# client_id: "ClientIdType", # required
|
815
|
-
# auth_flow: "USER_SRP_AUTH", # required, accepts USER_SRP_AUTH, REFRESH_TOKEN_AUTH, REFRESH_TOKEN, CUSTOM_AUTH, ADMIN_NO_SRP_AUTH
|
815
|
+
# auth_flow: "USER_SRP_AUTH", # required, accepts USER_SRP_AUTH, REFRESH_TOKEN_AUTH, REFRESH_TOKEN, CUSTOM_AUTH, ADMIN_NO_SRP_AUTH, USER_PASSWORD_AUTH
|
816
816
|
# auth_parameters: {
|
817
817
|
# "StringType" => "StringType",
|
818
818
|
# },
|
@@ -854,6 +854,9 @@ module Aws::CognitoIdentityProvider
|
|
854
854
|
# * `USER_SRP_AUTH` will take in `USERNAME` and `SRP_A` and return the
|
855
855
|
# SRP variables to be used for next challenge execution.
|
856
856
|
#
|
857
|
+
# * `USER_PASSWORD_AUTH` will take in `USERNAME` and `PASSWORD` and
|
858
|
+
# return the next challenge or tokens.
|
859
|
+
#
|
857
860
|
# Valid values include:
|
858
861
|
#
|
859
862
|
# * `USER_SRP_AUTH`\: Authentication flow for the Secure Remote
|
@@ -868,6 +871,11 @@ module Aws::CognitoIdentityProvider
|
|
868
871
|
# * `ADMIN_NO_SRP_AUTH`\: Non-SRP authentication flow; you can pass in
|
869
872
|
# the USERNAME and PASSWORD directly if the flow is enabled for
|
870
873
|
# calling the app client.
|
874
|
+
#
|
875
|
+
# * `USER_PASSWORD_AUTH`\: Non-SRP authentication flow; USERNAME and
|
876
|
+
# PASSWORD are passed directly. If a user migration Lambda trigger
|
877
|
+
# is set, this flow will invoke the user migration Lambda if the
|
878
|
+
# USERNAME is not found in the user pool.
|
871
879
|
# @return [String]
|
872
880
|
#
|
873
881
|
# @!attribute [rw] auth_parameters
|
@@ -879,9 +887,9 @@ module Aws::CognitoIdentityProvider
|
|
879
887
|
# `SECRET_HASH` (required if the app client is configured with a
|
880
888
|
# client secret), `DEVICE_KEY`
|
881
889
|
#
|
882
|
-
# * For `REFRESH_TOKEN_AUTH/REFRESH_TOKEN`\: `
|
883
|
-
# `SECRET_HASH` (required if the app client is
|
884
|
-
# client secret), `
|
890
|
+
# * For `REFRESH_TOKEN_AUTH/REFRESH_TOKEN`\: `REFRESH_TOKEN`
|
891
|
+
# (required), `SECRET_HASH` (required if the app client is
|
892
|
+
# configured with a client secret), `DEVICE_KEY`
|
885
893
|
#
|
886
894
|
# * For `ADMIN_NO_SRP_AUTH`\: `USERNAME` (required), `SECRET_HASH` (if
|
887
895
|
# app client is configured with client secret), `PASSWORD`
|
@@ -974,7 +982,7 @@ module Aws::CognitoIdentityProvider
|
|
974
982
|
#
|
975
983
|
# All challenges require `USERNAME` and `SECRET_HASH` (if applicable).
|
976
984
|
#
|
977
|
-
# The value of the `
|
985
|
+
# The value of the `USER_ID_FOR_SRP` attribute will be the user's
|
978
986
|
# actual username, not an alias (such as email address or phone
|
979
987
|
# number), even if you specified an alias in your call to
|
980
988
|
# `AdminInitiateAuth`. This is because, in the
|
@@ -1206,7 +1214,7 @@ module Aws::CognitoIdentityProvider
|
|
1206
1214
|
# @return [String]
|
1207
1215
|
#
|
1208
1216
|
# @!attribute [rw] username
|
1209
|
-
# The user pool username.
|
1217
|
+
# The user pool username or an alias.
|
1210
1218
|
# @return [String]
|
1211
1219
|
#
|
1212
1220
|
# @!attribute [rw] max_results
|
@@ -1468,7 +1476,7 @@ module Aws::CognitoIdentityProvider
|
|
1468
1476
|
# @return [Types::SoftwareTokenMfaSettingsType]
|
1469
1477
|
#
|
1470
1478
|
# @!attribute [rw] username
|
1471
|
-
# The user pool username.
|
1479
|
+
# The user pool username or alias.
|
1472
1480
|
# @return [String]
|
1473
1481
|
#
|
1474
1482
|
# @!attribute [rw] user_pool_id
|
@@ -2562,7 +2570,7 @@ module Aws::CognitoIdentityProvider
|
|
2562
2570
|
# refresh_token_validity: 1,
|
2563
2571
|
# read_attributes: ["ClientPermissionType"],
|
2564
2572
|
# write_attributes: ["ClientPermissionType"],
|
2565
|
-
# explicit_auth_flows: ["ADMIN_NO_SRP_AUTH"], # accepts ADMIN_NO_SRP_AUTH, CUSTOM_AUTH_FLOW_ONLY
|
2573
|
+
# explicit_auth_flows: ["ADMIN_NO_SRP_AUTH"], # accepts ADMIN_NO_SRP_AUTH, CUSTOM_AUTH_FLOW_ONLY, USER_PASSWORD_AUTH
|
2566
2574
|
# supported_identity_providers: ["ProviderNameType"],
|
2567
2575
|
# callback_urls: ["RedirectUrlType"],
|
2568
2576
|
# logout_urls: ["RedirectUrlType"],
|
@@ -2738,6 +2746,7 @@ module Aws::CognitoIdentityProvider
|
|
2738
2746
|
# create_auth_challenge: "ArnType",
|
2739
2747
|
# verify_auth_challenge_response: "ArnType",
|
2740
2748
|
# pre_token_generation: "ArnType",
|
2749
|
+
# user_migration: "ArnType",
|
2741
2750
|
# },
|
2742
2751
|
# auto_verified_attributes: ["phone_number"], # accepts phone_number, email
|
2743
2752
|
# alias_attributes: ["phone_number"], # accepts phone_number, email, preferred_username
|
@@ -2811,6 +2820,25 @@ module Aws::CognitoIdentityProvider
|
|
2811
2820
|
#
|
2812
2821
|
# @!attribute [rw] lambda_config
|
2813
2822
|
# The Lambda trigger configuration information for the new user pool.
|
2823
|
+
#
|
2824
|
+
# <note markdown="1"> In a push model, event sources (such as Amazon S3 and custom
|
2825
|
+
# applications) need permission to invoke a function. So you will need
|
2826
|
+
# to make an extra call to add permission for these event sources to
|
2827
|
+
# invoke your Lambda function.
|
2828
|
+
#
|
2829
|
+
#
|
2830
|
+
#
|
2831
|
+
# For more information on using the Lambda API to add permission, see
|
2832
|
+
# [ AddPermission ][1].
|
2833
|
+
#
|
2834
|
+
# For adding permission using the AWS CLI, see [ add-permission ][2].
|
2835
|
+
#
|
2836
|
+
# </note>
|
2837
|
+
#
|
2838
|
+
#
|
2839
|
+
#
|
2840
|
+
# [1]: https://docs.aws.amazon.com/lambda/latest/dg/API_AddPermission.html
|
2841
|
+
# [2]: https://docs.aws.amazon.com/cli/latest/reference/lambda/add-permission.html
|
2814
2842
|
# @return [Types::LambdaConfigType]
|
2815
2843
|
#
|
2816
2844
|
# @!attribute [rw] auto_verified_attributes
|
@@ -3856,6 +3884,39 @@ module Aws::CognitoIdentityProvider
|
|
3856
3884
|
include Aws::Structure
|
3857
3885
|
end
|
3858
3886
|
|
3887
|
+
# Request to get a signing certificate from Cognito.
|
3888
|
+
#
|
3889
|
+
# @note When making an API call, you may pass GetSigningCertificateRequest
|
3890
|
+
# data as a hash:
|
3891
|
+
#
|
3892
|
+
# {
|
3893
|
+
# user_pool_id: "UserPoolIdType", # required
|
3894
|
+
# }
|
3895
|
+
#
|
3896
|
+
# @!attribute [rw] user_pool_id
|
3897
|
+
# The user pool ID.
|
3898
|
+
# @return [String]
|
3899
|
+
#
|
3900
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/cognito-idp-2016-04-18/GetSigningCertificateRequest AWS API Documentation
|
3901
|
+
#
|
3902
|
+
class GetSigningCertificateRequest < Struct.new(
|
3903
|
+
:user_pool_id)
|
3904
|
+
include Aws::Structure
|
3905
|
+
end
|
3906
|
+
|
3907
|
+
# Response from Cognito for a signing certificate request.
|
3908
|
+
#
|
3909
|
+
# @!attribute [rw] certificate
|
3910
|
+
# The signing certificate.
|
3911
|
+
# @return [String]
|
3912
|
+
#
|
3913
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/cognito-idp-2016-04-18/GetSigningCertificateResponse AWS API Documentation
|
3914
|
+
#
|
3915
|
+
class GetSigningCertificateResponse < Struct.new(
|
3916
|
+
:certificate)
|
3917
|
+
include Aws::Structure
|
3918
|
+
end
|
3919
|
+
|
3859
3920
|
# @note When making an API call, you may pass GetUICustomizationRequest
|
3860
3921
|
# data as a hash:
|
3861
3922
|
#
|
@@ -4199,7 +4260,7 @@ module Aws::CognitoIdentityProvider
|
|
4199
4260
|
# data as a hash:
|
4200
4261
|
#
|
4201
4262
|
# {
|
4202
|
-
# auth_flow: "USER_SRP_AUTH", # required, accepts USER_SRP_AUTH, REFRESH_TOKEN_AUTH, REFRESH_TOKEN, CUSTOM_AUTH, ADMIN_NO_SRP_AUTH
|
4263
|
+
# auth_flow: "USER_SRP_AUTH", # required, accepts USER_SRP_AUTH, REFRESH_TOKEN_AUTH, REFRESH_TOKEN, CUSTOM_AUTH, ADMIN_NO_SRP_AUTH, USER_PASSWORD_AUTH
|
4203
4264
|
# auth_parameters: {
|
4204
4265
|
# "StringType" => "StringType",
|
4205
4266
|
# },
|
@@ -4225,6 +4286,9 @@ module Aws::CognitoIdentityProvider
|
|
4225
4286
|
# * `USER_SRP_AUTH` will take in `USERNAME` and `SRP_A` and return the
|
4226
4287
|
# SRP variables to be used for next challenge execution.
|
4227
4288
|
#
|
4289
|
+
# * `USER_PASSWORD_AUTH` will take in `USERNAME` and `PASSWORD` and
|
4290
|
+
# return the next challenge or tokens.
|
4291
|
+
#
|
4228
4292
|
# Valid values include:
|
4229
4293
|
#
|
4230
4294
|
# * `USER_SRP_AUTH`\: Authentication flow for the Secure Remote
|
@@ -4236,6 +4300,11 @@ module Aws::CognitoIdentityProvider
|
|
4236
4300
|
#
|
4237
4301
|
# * `CUSTOM_AUTH`\: Custom authentication flow.
|
4238
4302
|
#
|
4303
|
+
# * `USER_PASSWORD_AUTH`\: Non-SRP authentication flow; USERNAME and
|
4304
|
+
# PASSWORD are passed directly. If a user migration Lambda trigger
|
4305
|
+
# is set, this flow will invoke the user migration Lambda if the
|
4306
|
+
# USERNAME is not found in the user pool.
|
4307
|
+
#
|
4239
4308
|
# `ADMIN_NO_SRP_AUTH` is not a valid value.
|
4240
4309
|
# @return [String]
|
4241
4310
|
#
|
@@ -4248,9 +4317,9 @@ module Aws::CognitoIdentityProvider
|
|
4248
4317
|
# `SECRET_HASH` (required if the app client is configured with a
|
4249
4318
|
# client secret), `DEVICE_KEY`
|
4250
4319
|
#
|
4251
|
-
# * For `REFRESH_TOKEN_AUTH/REFRESH_TOKEN`\: `
|
4252
|
-
# `SECRET_HASH` (required if the app client is
|
4253
|
-
# client secret), `
|
4320
|
+
# * For `REFRESH_TOKEN_AUTH/REFRESH_TOKEN`\: `REFRESH_TOKEN`
|
4321
|
+
# (required), `SECRET_HASH` (required if the app client is
|
4322
|
+
# configured with a client secret), `DEVICE_KEY`
|
4254
4323
|
#
|
4255
4324
|
# * For `CUSTOM_AUTH`\: `USERNAME` (required), `SECRET_HASH` (if app
|
4256
4325
|
# client is configured with client secret), `DEVICE_KEY`
|
@@ -4374,6 +4443,7 @@ module Aws::CognitoIdentityProvider
|
|
4374
4443
|
# create_auth_challenge: "ArnType",
|
4375
4444
|
# verify_auth_challenge_response: "ArnType",
|
4376
4445
|
# pre_token_generation: "ArnType",
|
4446
|
+
# user_migration: "ArnType",
|
4377
4447
|
# }
|
4378
4448
|
#
|
4379
4449
|
# @!attribute [rw] pre_sign_up
|
@@ -4412,6 +4482,10 @@ module Aws::CognitoIdentityProvider
|
|
4412
4482
|
# A Lambda trigger that is invoked before token generation.
|
4413
4483
|
# @return [String]
|
4414
4484
|
#
|
4485
|
+
# @!attribute [rw] user_migration
|
4486
|
+
# The user migration Lambda config type.
|
4487
|
+
# @return [String]
|
4488
|
+
#
|
4415
4489
|
# @see http://docs.aws.amazon.com/goto/WebAPI/cognito-idp-2016-04-18/LambdaConfigType AWS API Documentation
|
4416
4490
|
#
|
4417
4491
|
class LambdaConfigType < Struct.new(
|
@@ -4423,7 +4497,8 @@ module Aws::CognitoIdentityProvider
|
|
4423
4497
|
:define_auth_challenge,
|
4424
4498
|
:create_auth_challenge,
|
4425
4499
|
:verify_auth_challenge_response,
|
4426
|
-
:pre_token_generation
|
4500
|
+
:pre_token_generation,
|
4501
|
+
:user_migration)
|
4427
4502
|
include Aws::Structure
|
4428
4503
|
end
|
4429
4504
|
|
@@ -6635,7 +6710,7 @@ module Aws::CognitoIdentityProvider
|
|
6635
6710
|
# refresh_token_validity: 1,
|
6636
6711
|
# read_attributes: ["ClientPermissionType"],
|
6637
6712
|
# write_attributes: ["ClientPermissionType"],
|
6638
|
-
# explicit_auth_flows: ["ADMIN_NO_SRP_AUTH"], # accepts ADMIN_NO_SRP_AUTH, CUSTOM_AUTH_FLOW_ONLY
|
6713
|
+
# explicit_auth_flows: ["ADMIN_NO_SRP_AUTH"], # accepts ADMIN_NO_SRP_AUTH, CUSTOM_AUTH_FLOW_ONLY, USER_PASSWORD_AUTH
|
6639
6714
|
# supported_identity_providers: ["ProviderNameType"],
|
6640
6715
|
# callback_urls: ["RedirectUrlType"],
|
6641
6716
|
# logout_urls: ["RedirectUrlType"],
|
@@ -6784,6 +6859,7 @@ module Aws::CognitoIdentityProvider
|
|
6784
6859
|
# create_auth_challenge: "ArnType",
|
6785
6860
|
# verify_auth_challenge_response: "ArnType",
|
6786
6861
|
# pre_token_generation: "ArnType",
|
6862
|
+
# user_migration: "ArnType",
|
6787
6863
|
# },
|
6788
6864
|
# auto_verified_attributes: ["phone_number"], # accepts phone_number, email
|
6789
6865
|
# sms_verification_message: "SmsVerificationMessageType",
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: aws-sdk-cognitoidentityprovider
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 1.
|
4
|
+
version: 1.3.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Amazon Web Services
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date:
|
11
|
+
date: 2018-02-12 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: aws-sdk-core
|