awscli 1.36.25__py3-none-any.whl → 1.36.27__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of awscli might be problematic. Click here for more details.
- awscli/__init__.py +1 -1
- awscli/examples/cloudfront/create-distribution.rst +118 -118
- awscli/examples/cloudfront/get-distribution-config.rst +6 -10
- awscli/examples/cloudfront/list-distributions.rst +29 -249
- awscli/examples/cloudfront/update-distribution.rst +16 -24
- awscli/examples/cognito-idp/admin-disable-provider-for-user.rst +9 -0
- awscli/examples/cognito-idp/admin-disable-user.rst +9 -0
- awscli/examples/cognito-idp/admin-enable-user.rst +9 -0
- awscli/examples/cognito-idp/admin-get-device.rst +51 -8
- awscli/examples/cognito-idp/admin-initiate-auth.rst +24 -25
- awscli/examples/cognito-idp/admin-link-provider-for-user.rst +10 -0
- awscli/examples/cognito-idp/admin-list-devices.rst +53 -7
- awscli/examples/cognito-idp/admin-list-user-auth-events.rst +40 -8
- awscli/examples/cognito-idp/admin-respond-to-auth-challenge.rst +29 -0
- awscli/examples/cognito-idp/admin-set-user-password.rst +13 -0
- awscli/examples/cognito-idp/admin-user-global-sign-out.rst +9 -0
- awscli/examples/cognito-idp/associate-software-token.rst +14 -0
- awscli/examples/cognito-idp/confirm-device.rst +16 -0
- awscli/examples/cognito-idp/create-identity-provider.rst +102 -0
- awscli/examples/cognito-idp/create-resource-server.rst +31 -0
- awscli/examples/cognito-idp/create-user-pool-client.rst +86 -18
- awscli/examples/cognito-idp/create-user-pool-domain.rst +23 -5
- awscli/examples/cognito-idp/delete-user-attributes.rst +8 -5
- awscli/examples/cognito-idp/describe-user-pool.rst +347 -238
- awscli/examples/cognito-idp/get-device.rst +50 -0
- awscli/examples/cognito-idp/get-group.rst +15 -12
- awscli/examples/cognito-idp/list-devices.rst +53 -0
- awscli/examples/ec2/describe-capacity-reservation-fleets.rst +3 -3
- awscli/examples/ec2/import-snapshot.rst +1 -1
- awscli/examples/ecr-public/batch-delete-image.rst +92 -0
- awscli/examples/ecr-public/create-repository.rst +3 -2
- awscli/examples/ecr-public/delete-repository-policy.rst +17 -0
- awscli/examples/ecr-public/delete-repository.rst +1 -1
- awscli/examples/ecr-public/describe-image-tags.rst +25 -0
- awscli/examples/ecr-public/describe-images.rst +82 -0
- awscli/examples/ecr-public/get-authorization-token.rst +32 -0
- awscli/examples/ecr-public/get-repository-policy.rst +17 -0
- awscli/examples/ecr-public/put-repository-catalog-data.rst +50 -0
- awscli/examples/ecr-public/set-repository-policy.rst +118 -0
- awscli/examples/ecs/capacity-provider-update.rst +33 -0
- awscli/examples/ecs/get-task-protection.rst +21 -0
- awscli/examples/ecs/update-cluster.rst +176 -0
- awscli/examples/ecs/update-task-protection.rst +46 -0
- awscli/examples/inspector2/associate-member.rst +14 -0
- awscli/examples/inspector2/disassociate-member.rst +14 -0
- awscli/examples/inspector2/get-member.rst +17 -0
- awscli/examples/inspector2/list-members.rst +83 -0
- awscli/examples/ivs-realtime/create-ingest-configuration.rst +25 -0
- awscli/examples/ivs-realtime/create-stage.rst +6 -2
- awscli/examples/ivs-realtime/delete-ingest-configuration.rst +22 -0
- awscli/examples/ivs-realtime/get-ingest-configuration.rst +24 -0
- awscli/examples/ivs-realtime/get-stage.rst +4 -2
- awscli/examples/ivs-realtime/list-ingest-configurations.rst +23 -0
- awscli/examples/ivs-realtime/update-ingest-configuration.rst +25 -0
- awscli/examples/ivs-realtime/update-stage.rst +3 -1
- awscli/examples/s3/sync.rst +1 -1
- awscli/examples/s3api/put-object.rst +15 -7
- awscli/examples/workmail/list-organizations.rst +1 -1
- {awscli-1.36.25.dist-info → awscli-1.36.27.dist-info}/METADATA +2 -2
- {awscli-1.36.25.dist-info → awscli-1.36.27.dist-info}/RECORD +68 -36
- awscli/examples/cognito-idp/admim-disable-user.rst +0 -8
- awscli/examples/cognito-idp/admim-enable-user.rst +0 -8
- {awscli-1.36.25.data → awscli-1.36.27.data}/scripts/aws +0 -0
- {awscli-1.36.25.data → awscli-1.36.27.data}/scripts/aws.cmd +0 -0
- {awscli-1.36.25.data → awscli-1.36.27.data}/scripts/aws_bash_completer +0 -0
- {awscli-1.36.25.data → awscli-1.36.27.data}/scripts/aws_completer +0 -0
- {awscli-1.36.25.data → awscli-1.36.27.data}/scripts/aws_zsh_completer.sh +0 -0
- {awscli-1.36.25.dist-info → awscli-1.36.27.dist-info}/LICENSE.txt +0 -0
- {awscli-1.36.25.dist-info → awscli-1.36.27.dist-info}/WHEEL +0 -0
- {awscli-1.36.25.dist-info → awscli-1.36.27.dist-info}/top_level.txt +0 -0
|
@@ -1,26 +1,94 @@
|
|
|
1
1
|
**To create a user pool client**
|
|
2
2
|
|
|
3
|
-
|
|
3
|
+
The following ``create-user-pool-client`` example creates a new user pool client with a client secret, explicit read and write attributes, sign in with username-password and SRP flows, sign-in with three IdPs, access to a subset of OAuth scopes, PinPoint analytics, and an extended authentication session validity. ::
|
|
4
4
|
|
|
5
|
-
|
|
5
|
+
aws cognito-idp create-user-pool-client \
|
|
6
|
+
--user-pool-id us-west-2_EXAMPLE \
|
|
7
|
+
--client-name MyTestClient \
|
|
8
|
+
--generate-secret \
|
|
9
|
+
--refresh-token-validity 10 \
|
|
10
|
+
--access-token-validity 60 \
|
|
11
|
+
--id-token-validity 60 \
|
|
12
|
+
--token-validity-units AccessToken=minutes,IdToken=minutes,RefreshToken=days \
|
|
13
|
+
--read-attributes email phone_number email_verified phone_number_verified \
|
|
14
|
+
--write-attributes email phone_number \
|
|
15
|
+
--explicit-auth-flows ALLOW_USER_PASSWORD_AUTH ALLOW_USER_SRP_AUTH ALLOW_REFRESH_TOKEN_AUTH \
|
|
16
|
+
--supported-identity-providers Google Facebook MyOIDC \
|
|
17
|
+
--callback-urls https://www.amazon.com https://example.com http://localhost:8001 myapp://example \
|
|
18
|
+
--allowed-o-auth-flows code implicit \
|
|
19
|
+
--allowed-o-auth-scopes openid profile aws.cognito.signin.user.admin solar-system-data/asteroids.add \
|
|
20
|
+
--allowed-o-auth-flows-user-pool-client \
|
|
21
|
+
--analytics-configuration ApplicationArn=arn:aws:mobiletargeting:us-west-2:767671399759:apps/thisisanexamplepinpointapplicationid,UserDataShared=TRUE \
|
|
22
|
+
--prevent-user-existence-errors ENABLED \
|
|
23
|
+
--enable-token-revocation \
|
|
24
|
+
--enable-propagate-additional-user-context-data \
|
|
25
|
+
--auth-session-validity 4
|
|
6
26
|
|
|
7
|
-
aws cognito-idp create-user-pool-client --user-pool-id us-west-2_aaaaaaaaa --client-name MyNewClient --no-generate-secret --explicit-auth-flows "USER_PASSWORD_AUTH" "ADMIN_NO_SRP_AUTH"
|
|
8
|
-
|
|
9
27
|
Output::
|
|
10
28
|
|
|
11
|
-
|
|
12
|
-
|
|
13
|
-
|
|
14
|
-
|
|
15
|
-
|
|
16
|
-
|
|
17
|
-
|
|
18
|
-
|
|
19
|
-
|
|
20
|
-
"
|
|
21
|
-
"
|
|
22
|
-
|
|
23
|
-
|
|
29
|
+
{
|
|
30
|
+
"UserPoolClient": {
|
|
31
|
+
"UserPoolId": "us-west-2_EXAMPLE",
|
|
32
|
+
"ClientName": "MyTestClient",
|
|
33
|
+
"ClientId": "123abc456defEXAMPLE",
|
|
34
|
+
"ClientSecret": "this1234is5678my91011example1213client1415secret",
|
|
35
|
+
"LastModifiedDate": 1726788459.464,
|
|
36
|
+
"CreationDate": 1726788459.464,
|
|
37
|
+
"RefreshTokenValidity": 10,
|
|
38
|
+
"AccessTokenValidity": 60,
|
|
39
|
+
"IdTokenValidity": 60,
|
|
40
|
+
"TokenValidityUnits": {
|
|
41
|
+
"AccessToken": "minutes",
|
|
42
|
+
"IdToken": "minutes",
|
|
43
|
+
"RefreshToken": "days"
|
|
44
|
+
},
|
|
45
|
+
"ReadAttributes": [
|
|
46
|
+
"email_verified",
|
|
47
|
+
"phone_number_verified",
|
|
48
|
+
"phone_number",
|
|
49
|
+
"email"
|
|
50
|
+
],
|
|
51
|
+
"WriteAttributes": [
|
|
52
|
+
"phone_number",
|
|
53
|
+
"email"
|
|
54
|
+
],
|
|
55
|
+
"ExplicitAuthFlows": [
|
|
56
|
+
"ALLOW_USER_PASSWORD_AUTH",
|
|
57
|
+
"ALLOW_USER_SRP_AUTH",
|
|
58
|
+
"ALLOW_REFRESH_TOKEN_AUTH"
|
|
59
|
+
],
|
|
60
|
+
"SupportedIdentityProviders": [
|
|
61
|
+
"Google",
|
|
62
|
+
"MyOIDC",
|
|
63
|
+
"Facebook"
|
|
64
|
+
],
|
|
65
|
+
"CallbackURLs": [
|
|
66
|
+
"https://example.com",
|
|
67
|
+
"https://www.amazon.com",
|
|
68
|
+
"myapp://example",
|
|
69
|
+
"http://localhost:8001"
|
|
70
|
+
],
|
|
71
|
+
"AllowedOAuthFlows": [
|
|
72
|
+
"implicit",
|
|
73
|
+
"code"
|
|
74
|
+
],
|
|
75
|
+
"AllowedOAuthScopes": [
|
|
76
|
+
"aws.cognito.signin.user.admin",
|
|
77
|
+
"openid",
|
|
78
|
+
"profile",
|
|
79
|
+
"solar-system-data/asteroids.add"
|
|
80
|
+
],
|
|
81
|
+
"AllowedOAuthFlowsUserPoolClient": true,
|
|
82
|
+
"AnalyticsConfiguration": {
|
|
83
|
+
"ApplicationArn": "arn:aws:mobiletargeting:us-west-2:123456789012:apps/thisisanexamplepinpointapplicationid",
|
|
84
|
+
"RoleArn": "arn:aws:iam::123456789012:role/aws-service-role/cognito-idp.amazonaws.com/AWSServiceRoleForAmazonCognitoIdp",
|
|
85
|
+
"UserDataShared": true
|
|
86
|
+
},
|
|
87
|
+
"PreventUserExistenceErrors": "ENABLED",
|
|
88
|
+
"EnableTokenRevocation": true,
|
|
89
|
+
"EnablePropagateAdditionalUserContextData": true,
|
|
90
|
+
"AuthSessionValidity": 4
|
|
91
|
+
}
|
|
24
92
|
}
|
|
25
|
-
}
|
|
26
93
|
|
|
94
|
+
For more information, see `Application-specific settings with app clients <https://docs.aws.amazon.com/cognito/latest/developerguide/user-pool-settings-client-apps.html>`__ in the *Amazon Cognito Developer Guide*.
|
|
@@ -1,8 +1,26 @@
|
|
|
1
|
-
**To create a user pool domain**
|
|
1
|
+
**Example 1: To create a user pool domain**
|
|
2
2
|
|
|
3
|
-
|
|
3
|
+
The following ``create-user-pool-domain`` example creates a new custom domain. ::
|
|
4
4
|
|
|
5
|
-
|
|
5
|
+
aws cognito-idp create-user-pool-domain \
|
|
6
|
+
--user-pool-id us-west-2_EXAMPLE \
|
|
7
|
+
--domain auth.example.com \
|
|
8
|
+
--custom-domain-config CertificateArn=arn:aws:acm:us-east-1:123456789012:certificate/a1b2c3d4-5678-90ab-cdef-EXAMPLE22222
|
|
6
9
|
|
|
7
|
-
|
|
8
|
-
|
|
10
|
+
Output::
|
|
11
|
+
|
|
12
|
+
{
|
|
13
|
+
"CloudFrontDomain": "example1domain.cloudfront.net"
|
|
14
|
+
}
|
|
15
|
+
|
|
16
|
+
For more information, see `Configuring a user pool domain <https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pools-assign-domain.html>`__ in the *Amazon Cognito Developer Guide*.
|
|
17
|
+
|
|
18
|
+
**Example 2: To create a user pool domain**
|
|
19
|
+
|
|
20
|
+
The following ``create-user-pool-domain`` example creates a new domain with a service-owned prefix. ::
|
|
21
|
+
|
|
22
|
+
aws cognito-idp create-user-pool-domain \
|
|
23
|
+
--user-pool-id us-west-2_EXAMPLE2 \
|
|
24
|
+
--domain mydomainprefix
|
|
25
|
+
|
|
26
|
+
For more information, see `Configuring a user pool domain <https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pools-assign-domain.html>`__ in the *Amazon Cognito Developer Guide*.
|
|
@@ -1,8 +1,11 @@
|
|
|
1
|
-
**To delete user
|
|
1
|
+
**To delete a user attribute**
|
|
2
2
|
|
|
3
|
-
|
|
3
|
+
The following ``delete-user-attributes`` example deletes the custom attribute "custom:attribute" from the currently signed-in user. ::
|
|
4
4
|
|
|
5
|
-
|
|
5
|
+
aws cognito-idp delete-user-attributes \
|
|
6
|
+
--access-token ACCESS_TOKEN \
|
|
7
|
+
--user-attribute-names "custom:department"
|
|
6
8
|
|
|
7
|
-
|
|
8
|
-
|
|
9
|
+
This command produces no output.
|
|
10
|
+
|
|
11
|
+
For more information, see `Working with user attributes <https://docs.aws.amazon.com/cognito/latest/developerguide/user-pool-settings-attributes.html>`__ in the *Amazon Cognito Developer Guide*.
|