aws-sdk-cognitoidentityprovider 1.70.0 → 1.72.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +10 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-cognitoidentityprovider/client.rb +136 -51
- data/lib/aws-sdk-cognitoidentityprovider/client_api.rb +7 -0
- data/lib/aws-sdk-cognitoidentityprovider/endpoint_parameters.rb +66 -0
- data/lib/aws-sdk-cognitoidentityprovider/endpoint_provider.rb +112 -0
- data/lib/aws-sdk-cognitoidentityprovider/endpoints.rb +1429 -0
- data/lib/aws-sdk-cognitoidentityprovider/plugins/endpoints.rb +270 -0
- data/lib/aws-sdk-cognitoidentityprovider/types.rb +155 -57
- data/lib/aws-sdk-cognitoidentityprovider.rb +5 -1
- metadata +8 -4
@@ -1480,7 +1480,9 @@ module Aws::CognitoIdentityProvider
|
|
1480
1480
|
# @return [String]
|
1481
1481
|
#
|
1482
1482
|
# @!attribute [rw] max_results
|
1483
|
-
# The maximum number of authentication events to return.
|
1483
|
+
# The maximum number of authentication events to return. Returns 60
|
1484
|
+
# events if you set `MaxResults` to 0, or if you don't include a
|
1485
|
+
# `MaxResults` parameter.
|
1484
1486
|
# @return [Integer]
|
1485
1487
|
#
|
1486
1488
|
# @!attribute [rw] next_token
|
@@ -3432,6 +3434,9 @@ module Aws::CognitoIdentityProvider
|
|
3432
3434
|
# is days. You can't set `RefreshTokenValidity` to 0. If you do,
|
3433
3435
|
# Amazon Cognito overrides the value with the default value of 30
|
3434
3436
|
# days. *Valid range* is displayed below in seconds.
|
3437
|
+
#
|
3438
|
+
# If you don't specify otherwise in the configuration of your app
|
3439
|
+
# client, your refresh tokens are valid for 30 days.
|
3435
3440
|
# @return [Integer]
|
3436
3441
|
#
|
3437
3442
|
# @!attribute [rw] access_token_validity
|
@@ -3446,6 +3451,9 @@ module Aws::CognitoIdentityProvider
|
|
3446
3451
|
#
|
3447
3452
|
# The default time unit for `AccessTokenValidity` in an API request is
|
3448
3453
|
# hours. *Valid range* is displayed below in seconds.
|
3454
|
+
#
|
3455
|
+
# If you don't specify otherwise in the configuration of your app
|
3456
|
+
# client, your access tokens are valid for one hour.
|
3449
3457
|
# @return [Integer]
|
3450
3458
|
#
|
3451
3459
|
# @!attribute [rw] id_token_validity
|
@@ -3460,6 +3468,9 @@ module Aws::CognitoIdentityProvider
|
|
3460
3468
|
#
|
3461
3469
|
# The default time unit for `AccessTokenValidity` in an API request is
|
3462
3470
|
# hours. *Valid range* is displayed below in seconds.
|
3471
|
+
#
|
3472
|
+
# If you don't specify otherwise in the configuration of your app
|
3473
|
+
# client, your ID tokens are valid for one hour.
|
3463
3474
|
# @return [Integer]
|
3464
3475
|
#
|
3465
3476
|
# @!attribute [rw] token_validity_units
|
@@ -3489,45 +3500,44 @@ module Aws::CognitoIdentityProvider
|
|
3489
3500
|
# @return [Array<String>]
|
3490
3501
|
#
|
3491
3502
|
# @!attribute [rw] explicit_auth_flows
|
3492
|
-
# The authentication flows that
|
3493
|
-
#
|
3494
|
-
#
|
3503
|
+
# The authentication flows that you want your user pool client to
|
3504
|
+
# support. For each app client in your user pool, you can sign in your
|
3505
|
+
# users with any combination of one or more flows, including with a
|
3506
|
+
# user name and Secure Remote Password (SRP), a user name and
|
3507
|
+
# password, or a custom authentication process that you define with
|
3508
|
+
# Lambda functions.
|
3495
3509
|
#
|
3496
|
-
# <note markdown="1">
|
3497
|
-
# `
|
3510
|
+
# <note markdown="1"> If you don't specify a value for `ExplicitAuthFlows`, your user
|
3511
|
+
# client supports `ALLOW_REFRESH_TOKEN_AUTH`, `ALLOW_USER_SRP_AUTH`,
|
3512
|
+
# and `ALLOW_CUSTOM_AUTH`.
|
3498
3513
|
#
|
3499
3514
|
# </note>
|
3500
3515
|
#
|
3501
3516
|
# Valid values include:
|
3502
3517
|
#
|
3503
|
-
#
|
3504
|
-
#
|
3505
|
-
#
|
3506
|
-
#
|
3507
|
-
#
|
3508
|
-
#
|
3509
|
-
# Secure Remote Password (SRP) protocol to verify passwords.
|
3510
|
-
#
|
3511
|
-
# ALLOW\_CUSTOM\_AUTH
|
3512
|
-
#
|
3513
|
-
# : Enable Lambda trigger based authentication.
|
3514
|
-
#
|
3515
|
-
# ALLOW\_USER\_PASSWORD\_AUTH
|
3516
|
-
#
|
3517
|
-
# : Enable user password-based authentication. In this flow, Amazon
|
3518
|
-
# Cognito receives the password in the request instead of using the
|
3519
|
-
# SRP protocol to verify passwords.
|
3518
|
+
# * `ALLOW_ADMIN_USER_PASSWORD_AUTH`\: Enable admin based user
|
3519
|
+
# password authentication flow `ADMIN_USER_PASSWORD_AUTH`. This
|
3520
|
+
# setting replaces the `ADMIN_NO_SRP_AUTH` setting. With this
|
3521
|
+
# authentication flow, your app passes a user name and password to
|
3522
|
+
# Amazon Cognito in the request, instead of using the Secure Remote
|
3523
|
+
# Password (SRP) protocol to securely transmit the password.
|
3520
3524
|
#
|
3521
|
-
#
|
3525
|
+
# * `ALLOW_CUSTOM_AUTH`\: Enable Lambda trigger based authentication.
|
3522
3526
|
#
|
3523
|
-
#
|
3527
|
+
# * `ALLOW_USER_PASSWORD_AUTH`\: Enable user password-based
|
3528
|
+
# authentication. In this flow, Amazon Cognito receives the password
|
3529
|
+
# in the request instead of using the SRP protocol to verify
|
3530
|
+
# passwords.
|
3524
3531
|
#
|
3525
|
-
#
|
3532
|
+
# * `ALLOW_USER_SRP_AUTH`\: Enable SRP-based authentication.
|
3526
3533
|
#
|
3527
|
-
#
|
3534
|
+
# * `ALLOW_REFRESH_TOKEN_AUTH`\: Enable authflow to refresh tokens.
|
3528
3535
|
#
|
3529
|
-
#
|
3530
|
-
#
|
3536
|
+
# In some environments, you will see the values `ADMIN_NO_SRP_AUTH`,
|
3537
|
+
# `CUSTOM_AUTH_FLOW_ONLY`, or `USER_PASSWORD_AUTH`. You can't assign
|
3538
|
+
# these legacy `ExplicitAuthFlows` values to user pool clients at the
|
3539
|
+
# same time as values that begin with `ALLOW_`, like
|
3540
|
+
# `ALLOW_USER_SRP_AUTH`.
|
3531
3541
|
# @return [Array<String>]
|
3532
3542
|
#
|
3533
3543
|
# @!attribute [rw] supported_identity_providers
|
@@ -3806,6 +3816,7 @@ module Aws::CognitoIdentityProvider
|
|
3806
3816
|
# temporary_password_validity_days: 1,
|
3807
3817
|
# },
|
3808
3818
|
# },
|
3819
|
+
# deletion_protection: "ACTIVE", # accepts ACTIVE, INACTIVE
|
3809
3820
|
# lambda_config: {
|
3810
3821
|
# pre_sign_up: "ArnType",
|
3811
3822
|
# custom_message: "ArnType",
|
@@ -3915,6 +3926,18 @@ module Aws::CognitoIdentityProvider
|
|
3915
3926
|
# The policies associated with the new user pool.
|
3916
3927
|
# @return [Types::UserPoolPolicyType]
|
3917
3928
|
#
|
3929
|
+
# @!attribute [rw] deletion_protection
|
3930
|
+
# When active, `DeletionProtection` prevents accidental deletion of
|
3931
|
+
# your user pool. Before you can delete a user pool that you have
|
3932
|
+
# protected against deletion, you must deactivate this feature.
|
3933
|
+
#
|
3934
|
+
# When you try to delete a protected user pool in a `DeleteUserPool`
|
3935
|
+
# API request, Amazon Cognito returns an `InvalidParameterException`
|
3936
|
+
# error. To delete a protected user pool, send a new `DeleteUserPool`
|
3937
|
+
# request after you deactivate deletion protection in an
|
3938
|
+
# `UpdateUserPool` API request.
|
3939
|
+
# @return [String]
|
3940
|
+
#
|
3918
3941
|
# @!attribute [rw] lambda_config
|
3919
3942
|
# The Lambda trigger configuration information for the new user pool.
|
3920
3943
|
#
|
@@ -4080,6 +4103,7 @@ module Aws::CognitoIdentityProvider
|
|
4080
4103
|
class CreateUserPoolRequest < Struct.new(
|
4081
4104
|
:pool_name,
|
4082
4105
|
:policies,
|
4106
|
+
:deletion_protection,
|
4083
4107
|
:lambda_config,
|
4084
4108
|
:auto_verified_attributes,
|
4085
4109
|
:alias_attributes,
|
@@ -4444,7 +4468,7 @@ module Aws::CognitoIdentityProvider
|
|
4444
4468
|
end
|
4445
4469
|
|
4446
4470
|
# @!attribute [rw] identity_provider
|
4447
|
-
# The
|
4471
|
+
# The identity provider details.
|
4448
4472
|
# @return [Types::IdentityProviderType]
|
4449
4473
|
#
|
4450
4474
|
# @see http://docs.aws.amazon.com/goto/WebAPI/cognito-idp-2016-04-18/DescribeIdentityProviderResponse AWS API Documentation
|
@@ -4963,7 +4987,7 @@ module Aws::CognitoIdentityProvider
|
|
4963
4987
|
# configuration.
|
4964
4988
|
#
|
4965
4989
|
# To look up the email delivery limit for the default option, see
|
4966
|
-
# [Limits
|
4990
|
+
# [Limits][1] in the *Amazon Cognito Developer Guide*.
|
4967
4991
|
#
|
4968
4992
|
# The default FROM address is `no-reply@verificationemail.com`. To
|
4969
4993
|
# customize the FROM address, provide the Amazon Resource Name (ARN)
|
@@ -4985,12 +5009,12 @@ module Aws::CognitoIdentityProvider
|
|
4985
5009
|
# Before Amazon Cognito can email your users, it requires additional
|
4986
5010
|
# permissions to call Amazon SES on your behalf. When you update
|
4987
5011
|
# your user pool with this option, Amazon Cognito creates a
|
4988
|
-
# *service-linked role*, which is a type of role
|
4989
|
-
# Services account. This role contains the permissions that allow
|
4990
|
-
# access Amazon SES and send email messages
|
4991
|
-
# more information about the service-linked role that
|
4992
|
-
# creates, see [Using Service-Linked Roles for Amazon
|
4993
|
-
# the *Amazon Cognito Developer Guide*.
|
5012
|
+
# *service-linked role*, which is a type of role in your Amazon Web
|
5013
|
+
# Services account. This role contains the permissions that allow
|
5014
|
+
# you to access Amazon SES and send email messages from your email
|
5015
|
+
# address. For more information about the service-linked role that
|
5016
|
+
# Amazon Cognito creates, see [Using Service-Linked Roles for Amazon
|
5017
|
+
# Cognito][2] in the *Amazon Cognito Developer Guide*.
|
4994
5018
|
#
|
4995
5019
|
#
|
4996
5020
|
#
|
@@ -5463,7 +5487,7 @@ module Aws::CognitoIdentityProvider
|
|
5463
5487
|
end
|
5464
5488
|
|
5465
5489
|
# @!attribute [rw] identity_provider
|
5466
|
-
# The
|
5490
|
+
# The identity provider details.
|
5467
5491
|
# @return [Types::IdentityProviderType]
|
5468
5492
|
#
|
5469
5493
|
# @see http://docs.aws.amazon.com/goto/WebAPI/cognito-idp-2016-04-18/GetIdentityProviderByIdentifierResponse AWS API Documentation
|
@@ -8442,8 +8466,7 @@ module Aws::CognitoIdentityProvider
|
|
8442
8466
|
# The MFA configuration. If you set the MfaConfiguration value to
|
8443
8467
|
# ‘ON’, only users who have set up an MFA factor can sign in. To learn
|
8444
8468
|
# more, see [Adding Multi-Factor Authentication (MFA) to a user
|
8445
|
-
# pool]
|
8446
|
-
# Valid values include:
|
8469
|
+
# pool][1]. Valid values include:
|
8447
8470
|
#
|
8448
8471
|
# * `OFF` MFA won't be used for any users.
|
8449
8472
|
#
|
@@ -8451,6 +8474,10 @@ module Aws::CognitoIdentityProvider
|
|
8451
8474
|
#
|
8452
8475
|
# * `OPTIONAL` MFA will be required only for individual users who have
|
8453
8476
|
# an MFA factor activated.
|
8477
|
+
#
|
8478
|
+
#
|
8479
|
+
#
|
8480
|
+
# [1]: https://docs.aws.amazon.com/cognito/latest/developerguide/user-pool-settings-mfa.html
|
8454
8481
|
# @return [String]
|
8455
8482
|
#
|
8456
8483
|
# @see http://docs.aws.amazon.com/goto/WebAPI/cognito-idp-2016-04-18/SetUserPoolMfaConfigRequest AWS API Documentation
|
@@ -9450,7 +9477,7 @@ module Aws::CognitoIdentityProvider
|
|
9450
9477
|
end
|
9451
9478
|
|
9452
9479
|
# @!attribute [rw] identity_provider
|
9453
|
-
# The
|
9480
|
+
# The identity provider details.
|
9454
9481
|
# @return [Types::IdentityProviderType]
|
9455
9482
|
#
|
9456
9483
|
# @see http://docs.aws.amazon.com/goto/WebAPI/cognito-idp-2016-04-18/UpdateIdentityProviderResponse AWS API Documentation
|
@@ -9684,6 +9711,9 @@ module Aws::CognitoIdentityProvider
|
|
9684
9711
|
# is days. You can't set `RefreshTokenValidity` to 0. If you do,
|
9685
9712
|
# Amazon Cognito overrides the value with the default value of 30
|
9686
9713
|
# days. *Valid range* is displayed below in seconds.
|
9714
|
+
#
|
9715
|
+
# If you don't specify otherwise in the configuration of your app
|
9716
|
+
# client, your refresh tokens are valid for 30 days.
|
9687
9717
|
# @return [Integer]
|
9688
9718
|
#
|
9689
9719
|
# @!attribute [rw] access_token_validity
|
@@ -9698,6 +9728,9 @@ module Aws::CognitoIdentityProvider
|
|
9698
9728
|
#
|
9699
9729
|
# The default time unit for `AccessTokenValidity` in an API request is
|
9700
9730
|
# hours. *Valid range* is displayed below in seconds.
|
9731
|
+
#
|
9732
|
+
# If you don't specify otherwise in the configuration of your app
|
9733
|
+
# client, your access tokens are valid for one hour.
|
9701
9734
|
# @return [Integer]
|
9702
9735
|
#
|
9703
9736
|
# @!attribute [rw] id_token_validity
|
@@ -9712,6 +9745,9 @@ module Aws::CognitoIdentityProvider
|
|
9712
9745
|
#
|
9713
9746
|
# The default time unit for `AccessTokenValidity` in an API request is
|
9714
9747
|
# hours. *Valid range* is displayed below in seconds.
|
9748
|
+
#
|
9749
|
+
# If you don't specify otherwise in the configuration of your app
|
9750
|
+
# client, your ID tokens are valid for one hour.
|
9715
9751
|
# @return [Integer]
|
9716
9752
|
#
|
9717
9753
|
# @!attribute [rw] token_validity_units
|
@@ -9729,20 +9765,27 @@ module Aws::CognitoIdentityProvider
|
|
9729
9765
|
# @return [Array<String>]
|
9730
9766
|
#
|
9731
9767
|
# @!attribute [rw] explicit_auth_flows
|
9732
|
-
# The authentication flows that
|
9733
|
-
#
|
9734
|
-
#
|
9735
|
-
#
|
9736
|
-
#
|
9768
|
+
# The authentication flows that you want your user pool client to
|
9769
|
+
# support. For each app client in your user pool, you can sign in your
|
9770
|
+
# users with any combination of one or more flows, including with a
|
9771
|
+
# user name and Secure Remote Password (SRP), a user name and
|
9772
|
+
# password, or a custom authentication process that you define with
|
9773
|
+
# Lambda functions.
|
9774
|
+
#
|
9775
|
+
# <note markdown="1"> If you don't specify a value for `ExplicitAuthFlows`, your user
|
9776
|
+
# client supports `ALLOW_REFRESH_TOKEN_AUTH`, `ALLOW_USER_SRP_AUTH`,
|
9777
|
+
# and `ALLOW_CUSTOM_AUTH`.
|
9778
|
+
#
|
9779
|
+
# </note>
|
9737
9780
|
#
|
9738
9781
|
# Valid values include:
|
9739
9782
|
#
|
9740
9783
|
# * `ALLOW_ADMIN_USER_PASSWORD_AUTH`\: Enable admin based user
|
9741
9784
|
# password authentication flow `ADMIN_USER_PASSWORD_AUTH`. This
|
9742
9785
|
# setting replaces the `ADMIN_NO_SRP_AUTH` setting. With this
|
9743
|
-
# authentication flow,
|
9744
|
-
# request instead of using the Secure Remote
|
9745
|
-
# to
|
9786
|
+
# authentication flow, your app passes a user name and password to
|
9787
|
+
# Amazon Cognito in the request, instead of using the Secure Remote
|
9788
|
+
# Password (SRP) protocol to securely transmit the password.
|
9746
9789
|
#
|
9747
9790
|
# * `ALLOW_CUSTOM_AUTH`\: Enable Lambda trigger based authentication.
|
9748
9791
|
#
|
@@ -9754,6 +9797,12 @@ module Aws::CognitoIdentityProvider
|
|
9754
9797
|
# * `ALLOW_USER_SRP_AUTH`\: Enable SRP-based authentication.
|
9755
9798
|
#
|
9756
9799
|
# * `ALLOW_REFRESH_TOKEN_AUTH`\: Enable authflow to refresh tokens.
|
9800
|
+
#
|
9801
|
+
# In some environments, you will see the values `ADMIN_NO_SRP_AUTH`,
|
9802
|
+
# `CUSTOM_AUTH_FLOW_ONLY`, or `USER_PASSWORD_AUTH`. You can't assign
|
9803
|
+
# these legacy `ExplicitAuthFlows` values to user pool clients at the
|
9804
|
+
# same time as values that begin with `ALLOW_`, like
|
9805
|
+
# `ALLOW_USER_SRP_AUTH`.
|
9757
9806
|
# @return [Array<String>]
|
9758
9807
|
#
|
9759
9808
|
# @!attribute [rw] supported_identity_providers
|
@@ -10029,6 +10078,7 @@ module Aws::CognitoIdentityProvider
|
|
10029
10078
|
# temporary_password_validity_days: 1,
|
10030
10079
|
# },
|
10031
10080
|
# },
|
10081
|
+
# deletion_protection: "ACTIVE", # accepts ACTIVE, INACTIVE
|
10032
10082
|
# lambda_config: {
|
10033
10083
|
# pre_sign_up: "ArnType",
|
10034
10084
|
# custom_message: "ArnType",
|
@@ -10116,6 +10166,18 @@ module Aws::CognitoIdentityProvider
|
|
10116
10166
|
# A container with the policies you want to update in a user pool.
|
10117
10167
|
# @return [Types::UserPoolPolicyType]
|
10118
10168
|
#
|
10169
|
+
# @!attribute [rw] deletion_protection
|
10170
|
+
# When active, `DeletionProtection` prevents accidental deletion of
|
10171
|
+
# your user pool. Before you can delete a user pool that you have
|
10172
|
+
# protected against deletion, you must deactivate this feature.
|
10173
|
+
#
|
10174
|
+
# When you try to delete a protected user pool in a `DeleteUserPool`
|
10175
|
+
# API request, Amazon Cognito returns an `InvalidParameterException`
|
10176
|
+
# error. To delete a protected user pool, send a new `DeleteUserPool`
|
10177
|
+
# request after you deactivate deletion protection in an
|
10178
|
+
# `UpdateUserPool` API request.
|
10179
|
+
# @return [String]
|
10180
|
+
#
|
10119
10181
|
# @!attribute [rw] lambda_config
|
10120
10182
|
# The Lambda configuration information from the request to update the
|
10121
10183
|
# user pool.
|
@@ -10251,6 +10313,7 @@ module Aws::CognitoIdentityProvider
|
|
10251
10313
|
class UpdateUserPoolRequest < Struct.new(
|
10252
10314
|
:user_pool_id,
|
10253
10315
|
:policies,
|
10316
|
+
:deletion_protection,
|
10254
10317
|
:lambda_config,
|
10255
10318
|
:auto_verified_attributes,
|
10256
10319
|
:sms_verification_message,
|
@@ -10625,6 +10688,9 @@ module Aws::CognitoIdentityProvider
|
|
10625
10688
|
# is days. You can't set `RefreshTokenValidity` to 0. If you do,
|
10626
10689
|
# Amazon Cognito overrides the value with the default value of 30
|
10627
10690
|
# days. *Valid range* is displayed below in seconds.
|
10691
|
+
#
|
10692
|
+
# If you don't specify otherwise in the configuration of your app
|
10693
|
+
# client, your refresh tokens are valid for 30 days.
|
10628
10694
|
# @return [Integer]
|
10629
10695
|
#
|
10630
10696
|
# @!attribute [rw] access_token_validity
|
@@ -10639,6 +10705,9 @@ module Aws::CognitoIdentityProvider
|
|
10639
10705
|
#
|
10640
10706
|
# The default time unit for `AccessTokenValidity` in an API request is
|
10641
10707
|
# hours. *Valid range* is displayed below in seconds.
|
10708
|
+
#
|
10709
|
+
# If you don't specify otherwise in the configuration of your app
|
10710
|
+
# client, your access tokens are valid for one hour.
|
10642
10711
|
# @return [Integer]
|
10643
10712
|
#
|
10644
10713
|
# @!attribute [rw] id_token_validity
|
@@ -10653,6 +10722,9 @@ module Aws::CognitoIdentityProvider
|
|
10653
10722
|
#
|
10654
10723
|
# The default time unit for `AccessTokenValidity` in an API request is
|
10655
10724
|
# hours. *Valid range* is displayed below in seconds.
|
10725
|
+
#
|
10726
|
+
# If you don't specify otherwise in the configuration of your app
|
10727
|
+
# client, your ID tokens are valid for one hour.
|
10656
10728
|
# @return [Integer]
|
10657
10729
|
#
|
10658
10730
|
# @!attribute [rw] token_validity_units
|
@@ -10669,20 +10741,27 @@ module Aws::CognitoIdentityProvider
|
|
10669
10741
|
# @return [Array<String>]
|
10670
10742
|
#
|
10671
10743
|
# @!attribute [rw] explicit_auth_flows
|
10672
|
-
# The authentication flows that
|
10673
|
-
#
|
10674
|
-
#
|
10675
|
-
#
|
10676
|
-
#
|
10744
|
+
# The authentication flows that you want your user pool client to
|
10745
|
+
# support. For each app client in your user pool, you can sign in your
|
10746
|
+
# users with any combination of one or more flows, including with a
|
10747
|
+
# user name and Secure Remote Password (SRP), a user name and
|
10748
|
+
# password, or a custom authentication process that you define with
|
10749
|
+
# Lambda functions.
|
10750
|
+
#
|
10751
|
+
# <note markdown="1"> If you don't specify a value for `ExplicitAuthFlows`, your user
|
10752
|
+
# client supports `ALLOW_REFRESH_TOKEN_AUTH`, `ALLOW_USER_SRP_AUTH`,
|
10753
|
+
# and `ALLOW_CUSTOM_AUTH`.
|
10754
|
+
#
|
10755
|
+
# </note>
|
10677
10756
|
#
|
10678
10757
|
# Valid values include:
|
10679
10758
|
#
|
10680
10759
|
# * `ALLOW_ADMIN_USER_PASSWORD_AUTH`\: Enable admin based user
|
10681
10760
|
# password authentication flow `ADMIN_USER_PASSWORD_AUTH`. This
|
10682
10761
|
# setting replaces the `ADMIN_NO_SRP_AUTH` setting. With this
|
10683
|
-
# authentication flow,
|
10684
|
-
# request instead of using the Secure Remote
|
10685
|
-
# to
|
10762
|
+
# authentication flow, your app passes a user name and password to
|
10763
|
+
# Amazon Cognito in the request, instead of using the Secure Remote
|
10764
|
+
# Password (SRP) protocol to securely transmit the password.
|
10686
10765
|
#
|
10687
10766
|
# * `ALLOW_CUSTOM_AUTH`\: Enable Lambda trigger based authentication.
|
10688
10767
|
#
|
@@ -10694,6 +10773,12 @@ module Aws::CognitoIdentityProvider
|
|
10694
10773
|
# * `ALLOW_USER_SRP_AUTH`\: Enable SRP-based authentication.
|
10695
10774
|
#
|
10696
10775
|
# * `ALLOW_REFRESH_TOKEN_AUTH`\: Enable authflow to refresh tokens.
|
10776
|
+
#
|
10777
|
+
# In some environments, you will see the values `ADMIN_NO_SRP_AUTH`,
|
10778
|
+
# `CUSTOM_AUTH_FLOW_ONLY`, or `USER_PASSWORD_AUTH`. You can't assign
|
10779
|
+
# these legacy `ExplicitAuthFlows` values to user pool clients at the
|
10780
|
+
# same time as values that begin with `ALLOW_`, like
|
10781
|
+
# `ALLOW_USER_SRP_AUTH`.
|
10697
10782
|
# @return [Array<String>]
|
10698
10783
|
#
|
10699
10784
|
# @!attribute [rw] supported_identity_providers
|
@@ -10989,6 +11074,18 @@ module Aws::CognitoIdentityProvider
|
|
10989
11074
|
# The policies associated with the user pool.
|
10990
11075
|
# @return [Types::UserPoolPolicyType]
|
10991
11076
|
#
|
11077
|
+
# @!attribute [rw] deletion_protection
|
11078
|
+
# When active, `DeletionProtection` prevents accidental deletion of
|
11079
|
+
# your user pool. Before you can delete a user pool that you have
|
11080
|
+
# protected against deletion, you must deactivate this feature.
|
11081
|
+
#
|
11082
|
+
# When you try to delete a protected user pool in a `DeleteUserPool`
|
11083
|
+
# API request, Amazon Cognito returns an `InvalidParameterException`
|
11084
|
+
# error. To delete a protected user pool, send a new `DeleteUserPool`
|
11085
|
+
# request after you deactivate deletion protection in an
|
11086
|
+
# `UpdateUserPool` API request.
|
11087
|
+
# @return [String]
|
11088
|
+
#
|
10992
11089
|
# @!attribute [rw] lambda_config
|
10993
11090
|
# The Lambda triggers associated with the user pool.
|
10994
11091
|
# @return [Types::LambdaConfigType]
|
@@ -11213,6 +11310,7 @@ module Aws::CognitoIdentityProvider
|
|
11213
11310
|
:id,
|
11214
11311
|
:name,
|
11215
11312
|
:policies,
|
11313
|
+
:deletion_protection,
|
11216
11314
|
:lambda_config,
|
11217
11315
|
:status,
|
11218
11316
|
:last_modified_date,
|
@@ -13,9 +13,13 @@ require 'aws-sigv4'
|
|
13
13
|
|
14
14
|
require_relative 'aws-sdk-cognitoidentityprovider/types'
|
15
15
|
require_relative 'aws-sdk-cognitoidentityprovider/client_api'
|
16
|
+
require_relative 'aws-sdk-cognitoidentityprovider/plugins/endpoints.rb'
|
16
17
|
require_relative 'aws-sdk-cognitoidentityprovider/client'
|
17
18
|
require_relative 'aws-sdk-cognitoidentityprovider/errors'
|
18
19
|
require_relative 'aws-sdk-cognitoidentityprovider/resource'
|
20
|
+
require_relative 'aws-sdk-cognitoidentityprovider/endpoint_parameters'
|
21
|
+
require_relative 'aws-sdk-cognitoidentityprovider/endpoint_provider'
|
22
|
+
require_relative 'aws-sdk-cognitoidentityprovider/endpoints'
|
19
23
|
require_relative 'aws-sdk-cognitoidentityprovider/customizations'
|
20
24
|
|
21
25
|
# This module provides support for Amazon Cognito Identity Provider. This module is available in the
|
@@ -48,6 +52,6 @@ require_relative 'aws-sdk-cognitoidentityprovider/customizations'
|
|
48
52
|
# @!group service
|
49
53
|
module Aws::CognitoIdentityProvider
|
50
54
|
|
51
|
-
GEM_VERSION = '1.
|
55
|
+
GEM_VERSION = '1.72.0'
|
52
56
|
|
53
57
|
end
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: aws-sdk-cognitoidentityprovider
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 1.
|
4
|
+
version: 1.72.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Amazon Web Services
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2022-
|
11
|
+
date: 2022-10-25 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: aws-sdk-core
|
@@ -19,7 +19,7 @@ dependencies:
|
|
19
19
|
version: '3'
|
20
20
|
- - ">="
|
21
21
|
- !ruby/object:Gem::Version
|
22
|
-
version: 3.
|
22
|
+
version: 3.165.0
|
23
23
|
type: :runtime
|
24
24
|
prerelease: false
|
25
25
|
version_requirements: !ruby/object:Gem::Requirement
|
@@ -29,7 +29,7 @@ dependencies:
|
|
29
29
|
version: '3'
|
30
30
|
- - ">="
|
31
31
|
- !ruby/object:Gem::Version
|
32
|
-
version: 3.
|
32
|
+
version: 3.165.0
|
33
33
|
- !ruby/object:Gem::Dependency
|
34
34
|
name: aws-sigv4
|
35
35
|
requirement: !ruby/object:Gem::Requirement
|
@@ -59,7 +59,11 @@ files:
|
|
59
59
|
- lib/aws-sdk-cognitoidentityprovider/client.rb
|
60
60
|
- lib/aws-sdk-cognitoidentityprovider/client_api.rb
|
61
61
|
- lib/aws-sdk-cognitoidentityprovider/customizations.rb
|
62
|
+
- lib/aws-sdk-cognitoidentityprovider/endpoint_parameters.rb
|
63
|
+
- lib/aws-sdk-cognitoidentityprovider/endpoint_provider.rb
|
64
|
+
- lib/aws-sdk-cognitoidentityprovider/endpoints.rb
|
62
65
|
- lib/aws-sdk-cognitoidentityprovider/errors.rb
|
66
|
+
- lib/aws-sdk-cognitoidentityprovider/plugins/endpoints.rb
|
63
67
|
- lib/aws-sdk-cognitoidentityprovider/resource.rb
|
64
68
|
- lib/aws-sdk-cognitoidentityprovider/types.rb
|
65
69
|
homepage: https://github.com/aws/aws-sdk-ruby
|