aws-lambda-powertools 3.8.1a7__py3-none-any.whl → 3.8.1a8__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- aws_lambda_powertools/shared/version.py +1 -1
- aws_lambda_powertools/utilities/data_classes/cognito_user_pool_event.py +7 -54
- {aws_lambda_powertools-3.8.1a7.dist-info → aws_lambda_powertools-3.8.1a8.dist-info}/METADATA +1 -1
- {aws_lambda_powertools-3.8.1a7.dist-info → aws_lambda_powertools-3.8.1a8.dist-info}/RECORD +6 -6
- {aws_lambda_powertools-3.8.1a7.dist-info → aws_lambda_powertools-3.8.1a8.dist-info}/LICENSE +0 -0
- {aws_lambda_powertools-3.8.1a7.dist-info → aws_lambda_powertools-3.8.1a8.dist-info}/WHEEL +0 -0
@@ -495,7 +495,7 @@ class PreTokenGenerationTriggerV2EventRequest(PreTokenGenerationTriggerEventRequ
|
|
495
495
|
return self.get("scopes") or []
|
496
496
|
|
497
497
|
|
498
|
-
class
|
498
|
+
class ClaimsOverrideBase(DictWrapper):
|
499
499
|
@property
|
500
500
|
def claims_to_add_or_override(self) -> dict[str, str]:
|
501
501
|
return self.get("claimsToAddOrOverride") or {}
|
@@ -515,6 +515,8 @@ class ClaimsOverrideDetails(DictWrapper):
|
|
515
515
|
"""A list that contains claims to be suppressed from the identity token."""
|
516
516
|
self._data["claimsToSuppress"] = value
|
517
517
|
|
518
|
+
|
519
|
+
class GroupConfigurationBase(DictWrapper):
|
518
520
|
@property
|
519
521
|
def group_configuration(self) -> GroupOverrideDetails | None:
|
520
522
|
group_override_details = self.get("groupOverrideDetails")
|
@@ -549,26 +551,11 @@ class ClaimsOverrideDetails(DictWrapper):
|
|
549
551
|
self["groupOverrideDetails"]["preferredRole"] = value
|
550
552
|
|
551
553
|
|
552
|
-
class
|
553
|
-
|
554
|
-
def claims_to_add_or_override(self) -> dict[str, str]:
|
555
|
-
return self.get("claimsToAddOrOverride") or {}
|
556
|
-
|
557
|
-
@claims_to_add_or_override.setter
|
558
|
-
def claims_to_add_or_override(self, value: dict[str, str]):
|
559
|
-
"""A map of one or more key-value pairs of claims to add or override.
|
560
|
-
For group related claims, use groupOverrideDetails instead."""
|
561
|
-
self._data["claimsToAddOrOverride"] = value
|
562
|
-
|
563
|
-
@property
|
564
|
-
def claims_to_suppress(self) -> list[str]:
|
565
|
-
return self.get("claimsToSuppress") or []
|
554
|
+
class ClaimsOverrideDetails(ClaimsOverrideBase, GroupConfigurationBase):
|
555
|
+
pass
|
566
556
|
|
567
|
-
@claims_to_suppress.setter
|
568
|
-
def claims_to_suppress(self, value: list[str]):
|
569
|
-
"""A list that contains claims to be suppressed from the identity token."""
|
570
|
-
self._data["claimsToSuppress"] = value
|
571
557
|
|
558
|
+
class TokenClaimsAndScopeOverrideDetails(ClaimsOverrideBase):
|
572
559
|
@property
|
573
560
|
def scopes_to_add(self) -> list[str]:
|
574
561
|
return self.get("scopesToAdd") or []
|
@@ -586,8 +573,7 @@ class TokenClaimsAndScopeOverrideDetails(DictWrapper):
|
|
586
573
|
self._data["scopesToSuppress"] = value
|
587
574
|
|
588
575
|
|
589
|
-
class ClaimsAndScopeOverrideDetails(
|
590
|
-
|
576
|
+
class ClaimsAndScopeOverrideDetails(GroupConfigurationBase):
|
591
577
|
@property
|
592
578
|
def id_token_generation(self) -> TokenClaimsAndScopeOverrideDetails | None:
|
593
579
|
id_token_generation_details = self._data.get("idTokenGeneration")
|
@@ -632,39 +618,6 @@ class ClaimsAndScopeOverrideDetails(DictWrapper):
|
|
632
618
|
"""
|
633
619
|
self._data["accessTokenGeneration"] = value
|
634
620
|
|
635
|
-
@property
|
636
|
-
def group_configuration(self) -> GroupOverrideDetails | None:
|
637
|
-
group_override_details = self.get("groupOverrideDetails")
|
638
|
-
return None if group_override_details is None else GroupOverrideDetails(group_override_details)
|
639
|
-
|
640
|
-
@group_configuration.setter
|
641
|
-
def group_configuration(self, value: dict[str, Any]):
|
642
|
-
"""The output object containing the current group configuration.
|
643
|
-
|
644
|
-
It includes groupsToOverride, iamRolesToOverride, and preferredRole.
|
645
|
-
|
646
|
-
The groupOverrideDetails object is replaced with the one you provide. If you provide an empty or null
|
647
|
-
object in the response, then the groups are suppressed. To leave the existing group configuration
|
648
|
-
as is, copy the value of the request's groupConfiguration object to the groupOverrideDetails object
|
649
|
-
in the response, and pass it back to the service.
|
650
|
-
"""
|
651
|
-
self._data["groupOverrideDetails"] = value
|
652
|
-
|
653
|
-
def set_group_configuration_groups_to_override(self, value: list[str]):
|
654
|
-
"""A list of the group names that are associated with the user that the identity token is issued for."""
|
655
|
-
self._data.setdefault("groupOverrideDetails", {})
|
656
|
-
self["groupOverrideDetails"]["groupsToOverride"] = value
|
657
|
-
|
658
|
-
def set_group_configuration_iam_roles_to_override(self, value: list[str]):
|
659
|
-
"""A list of the current IAM roles associated with these groups."""
|
660
|
-
self._data.setdefault("groupOverrideDetails", {})
|
661
|
-
self["groupOverrideDetails"]["iamRolesToOverride"] = value
|
662
|
-
|
663
|
-
def set_group_configuration_preferred_role(self, value: str):
|
664
|
-
"""A string indicating the preferred IAM role."""
|
665
|
-
self._data.setdefault("groupOverrideDetails", {})
|
666
|
-
self["groupOverrideDetails"]["preferredRole"] = value
|
667
|
-
|
668
621
|
|
669
622
|
class PreTokenGenerationTriggerEventResponse(DictWrapper):
|
670
623
|
@property
|
{aws_lambda_powertools-3.8.1a7.dist-info → aws_lambda_powertools-3.8.1a8.dist-info}/METADATA
RENAMED
@@ -1,6 +1,6 @@
|
|
1
1
|
Metadata-Version: 2.3
|
2
2
|
Name: aws_lambda_powertools
|
3
|
-
Version: 3.8.
|
3
|
+
Version: 3.8.1a8
|
4
4
|
Summary: Powertools for AWS Lambda (Python) is a developer toolkit to implement Serverless best practices and increase developer velocity.
|
5
5
|
License: MIT
|
6
6
|
Keywords: aws_lambda_powertools,aws,tracing,logging,lambda,powertools,feature_flags,idempotency,middleware
|
@@ -88,7 +88,7 @@ aws_lambda_powertools/shared/json_encoder.py,sha256=JQeWNu-4M7_xI_hqYExrxsb3OcEH
|
|
88
88
|
aws_lambda_powertools/shared/lazy_import.py,sha256=TbXQm2bcwXdZrYdBaJJXIswyLlumM85RJ_A_0w-h-GU,2019
|
89
89
|
aws_lambda_powertools/shared/types.py,sha256=APkI38HbiTpSF19NSNii8Ydx73vmVUVotgEQ9jHruEI,124
|
90
90
|
aws_lambda_powertools/shared/user_agent.py,sha256=DrCMFQuT4a4iIrpcWpAIjY37EFqR9-QxlxDGD-Nn9Gg,7081
|
91
|
-
aws_lambda_powertools/shared/version.py,sha256=
|
91
|
+
aws_lambda_powertools/shared/version.py,sha256=SSgtsp2auE59X33zbcWlGDEsRk33c3zvTW4hazK4MRE,84
|
92
92
|
aws_lambda_powertools/tracing/__init__.py,sha256=f4bMThOPBPWTPVcYqcAIErAJPerMsf3H_Z4gCXCsK9I,141
|
93
93
|
aws_lambda_powertools/tracing/base.py,sha256=DbLD8OSK05KLdSV36oNA5wDSGv8KbcOD19qMUqoXh58,4513
|
94
94
|
aws_lambda_powertools/tracing/extensions.py,sha256=APOfXOq-hRBKaK5WyfIyrd_6M1_9SWJZ3zxLA9jDZzU,492
|
@@ -118,7 +118,7 @@ aws_lambda_powertools/utilities/data_classes/cloud_watch_logs_event.py,sha256=uu
|
|
118
118
|
aws_lambda_powertools/utilities/data_classes/cloudformation_custom_resource_event.py,sha256=EextMoBG9v_e5bS9Q1DlzVvzljGtIL1ddBszt5fgTeY,1191
|
119
119
|
aws_lambda_powertools/utilities/data_classes/code_deploy_lifecycle_hook_event.py,sha256=chJSwmEj7GcKNlqY3HyWHOuhQIQSjqvA4fUxs-PxovA,464
|
120
120
|
aws_lambda_powertools/utilities/data_classes/code_pipeline_job_event.py,sha256=Y5INxxycG87n55YvRq4h5TXMJNXXB3Ac38zvXg5f_h4,10530
|
121
|
-
aws_lambda_powertools/utilities/data_classes/cognito_user_pool_event.py,sha256=
|
121
|
+
aws_lambda_powertools/utilities/data_classes/cognito_user_pool_event.py,sha256=oHYYcFYeX5bQp7avtrLtwizWqSmJzLA3qqVvZ4ybj94,40540
|
122
122
|
aws_lambda_powertools/utilities/data_classes/common.py,sha256=PFQBhmGPvBtvdUtzk1wtEokFpatZkUl4s6C6x6lvCGU,19505
|
123
123
|
aws_lambda_powertools/utilities/data_classes/connect_contact_flow_event.py,sha256=4_L73ATO-M_2zUD3r0zS4c6I4zoLxTK9l8JQc-dATog,5468
|
124
124
|
aws_lambda_powertools/utilities/data_classes/dynamo_db_stream_event.py,sha256=BrgOyFREC9gjj_ULhKB3L_7EbQ6ptV-8Was1TulPeWE,6102
|
@@ -257,7 +257,7 @@ aws_lambda_powertools/utilities/validation/envelopes.py,sha256=YD5HOFx6IClQgii0n
|
|
257
257
|
aws_lambda_powertools/utilities/validation/exceptions.py,sha256=PKy_19zQMBJGCMMFl-sMkcm-cc0v3zZBn_bhGE4wKNo,2084
|
258
258
|
aws_lambda_powertools/utilities/validation/validator.py,sha256=x_1qpuKJBuWpgNU-zCD3Di-vXrZfyUu7oA5RmjZjr84,10034
|
259
259
|
aws_lambda_powertools/warnings/__init__.py,sha256=vqDVeZz8wGtD8WGYNSkQE7AHwqtIrPGRxuoJR_BBnSs,1193
|
260
|
-
aws_lambda_powertools-3.8.
|
261
|
-
aws_lambda_powertools-3.8.
|
262
|
-
aws_lambda_powertools-3.8.
|
263
|
-
aws_lambda_powertools-3.8.
|
260
|
+
aws_lambda_powertools-3.8.1a8.dist-info/LICENSE,sha256=vMHS2eBgmwPUIMPb7LQ4p7ib_FPVQXarVjAasflrTwo,951
|
261
|
+
aws_lambda_powertools-3.8.1a8.dist-info/METADATA,sha256=X1IJnwzufoCTbXFRt5yajKQea_bJbDSOl4ydMXB4O2w,11156
|
262
|
+
aws_lambda_powertools-3.8.1a8.dist-info/WHEEL,sha256=IYZQI976HJqqOpQU6PHkJ8fb3tMNBFjg-Cn-pwAbaFM,88
|
263
|
+
aws_lambda_powertools-3.8.1a8.dist-info/RECORD,,
|
File without changes
|
File without changes
|