awscli 1.36.25__py3-none-any.whl → 1.36.27__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of awscli might be problematic. Click here for more details.

Files changed (70) hide show
  1. awscli/__init__.py +1 -1
  2. awscli/examples/cloudfront/create-distribution.rst +118 -118
  3. awscli/examples/cloudfront/get-distribution-config.rst +6 -10
  4. awscli/examples/cloudfront/list-distributions.rst +29 -249
  5. awscli/examples/cloudfront/update-distribution.rst +16 -24
  6. awscli/examples/cognito-idp/admin-disable-provider-for-user.rst +9 -0
  7. awscli/examples/cognito-idp/admin-disable-user.rst +9 -0
  8. awscli/examples/cognito-idp/admin-enable-user.rst +9 -0
  9. awscli/examples/cognito-idp/admin-get-device.rst +51 -8
  10. awscli/examples/cognito-idp/admin-initiate-auth.rst +24 -25
  11. awscli/examples/cognito-idp/admin-link-provider-for-user.rst +10 -0
  12. awscli/examples/cognito-idp/admin-list-devices.rst +53 -7
  13. awscli/examples/cognito-idp/admin-list-user-auth-events.rst +40 -8
  14. awscli/examples/cognito-idp/admin-respond-to-auth-challenge.rst +29 -0
  15. awscli/examples/cognito-idp/admin-set-user-password.rst +13 -0
  16. awscli/examples/cognito-idp/admin-user-global-sign-out.rst +9 -0
  17. awscli/examples/cognito-idp/associate-software-token.rst +14 -0
  18. awscli/examples/cognito-idp/confirm-device.rst +16 -0
  19. awscli/examples/cognito-idp/create-identity-provider.rst +102 -0
  20. awscli/examples/cognito-idp/create-resource-server.rst +31 -0
  21. awscli/examples/cognito-idp/create-user-pool-client.rst +86 -18
  22. awscli/examples/cognito-idp/create-user-pool-domain.rst +23 -5
  23. awscli/examples/cognito-idp/delete-user-attributes.rst +8 -5
  24. awscli/examples/cognito-idp/describe-user-pool.rst +347 -238
  25. awscli/examples/cognito-idp/get-device.rst +50 -0
  26. awscli/examples/cognito-idp/get-group.rst +15 -12
  27. awscli/examples/cognito-idp/list-devices.rst +53 -0
  28. awscli/examples/ec2/describe-capacity-reservation-fleets.rst +3 -3
  29. awscli/examples/ec2/import-snapshot.rst +1 -1
  30. awscli/examples/ecr-public/batch-delete-image.rst +92 -0
  31. awscli/examples/ecr-public/create-repository.rst +3 -2
  32. awscli/examples/ecr-public/delete-repository-policy.rst +17 -0
  33. awscli/examples/ecr-public/delete-repository.rst +1 -1
  34. awscli/examples/ecr-public/describe-image-tags.rst +25 -0
  35. awscli/examples/ecr-public/describe-images.rst +82 -0
  36. awscli/examples/ecr-public/get-authorization-token.rst +32 -0
  37. awscli/examples/ecr-public/get-repository-policy.rst +17 -0
  38. awscli/examples/ecr-public/put-repository-catalog-data.rst +50 -0
  39. awscli/examples/ecr-public/set-repository-policy.rst +118 -0
  40. awscli/examples/ecs/capacity-provider-update.rst +33 -0
  41. awscli/examples/ecs/get-task-protection.rst +21 -0
  42. awscli/examples/ecs/update-cluster.rst +176 -0
  43. awscli/examples/ecs/update-task-protection.rst +46 -0
  44. awscli/examples/inspector2/associate-member.rst +14 -0
  45. awscli/examples/inspector2/disassociate-member.rst +14 -0
  46. awscli/examples/inspector2/get-member.rst +17 -0
  47. awscli/examples/inspector2/list-members.rst +83 -0
  48. awscli/examples/ivs-realtime/create-ingest-configuration.rst +25 -0
  49. awscli/examples/ivs-realtime/create-stage.rst +6 -2
  50. awscli/examples/ivs-realtime/delete-ingest-configuration.rst +22 -0
  51. awscli/examples/ivs-realtime/get-ingest-configuration.rst +24 -0
  52. awscli/examples/ivs-realtime/get-stage.rst +4 -2
  53. awscli/examples/ivs-realtime/list-ingest-configurations.rst +23 -0
  54. awscli/examples/ivs-realtime/update-ingest-configuration.rst +25 -0
  55. awscli/examples/ivs-realtime/update-stage.rst +3 -1
  56. awscli/examples/s3/sync.rst +1 -1
  57. awscli/examples/s3api/put-object.rst +15 -7
  58. awscli/examples/workmail/list-organizations.rst +1 -1
  59. {awscli-1.36.25.dist-info → awscli-1.36.27.dist-info}/METADATA +2 -2
  60. {awscli-1.36.25.dist-info → awscli-1.36.27.dist-info}/RECORD +68 -36
  61. awscli/examples/cognito-idp/admim-disable-user.rst +0 -8
  62. awscli/examples/cognito-idp/admim-enable-user.rst +0 -8
  63. {awscli-1.36.25.data → awscli-1.36.27.data}/scripts/aws +0 -0
  64. {awscli-1.36.25.data → awscli-1.36.27.data}/scripts/aws.cmd +0 -0
  65. {awscli-1.36.25.data → awscli-1.36.27.data}/scripts/aws_bash_completer +0 -0
  66. {awscli-1.36.25.data → awscli-1.36.27.data}/scripts/aws_completer +0 -0
  67. {awscli-1.36.25.data → awscli-1.36.27.data}/scripts/aws_zsh_completer.sh +0 -0
  68. {awscli-1.36.25.dist-info → awscli-1.36.27.dist-info}/LICENSE.txt +0 -0
  69. {awscli-1.36.25.dist-info → awscli-1.36.27.dist-info}/WHEEL +0 -0
  70. {awscli-1.36.25.dist-info → awscli-1.36.27.dist-info}/top_level.txt +0 -0
@@ -1,26 +1,94 @@
1
1
  **To create a user pool client**
2
2
 
3
- This example creates a new user pool client with two explicit authorization flows: USER_PASSWORD_AUTH and ADMIN_NO_SRP_AUTH.
3
+ The following ``create-user-pool-client`` example creates a new user pool client with a client secret, explicit read and write attributes, sign in with username-password and SRP flows, sign-in with three IdPs, access to a subset of OAuth scopes, PinPoint analytics, and an extended authentication session validity. ::
4
4
 
5
- Command::
5
+ aws cognito-idp create-user-pool-client \
6
+ --user-pool-id us-west-2_EXAMPLE \
7
+ --client-name MyTestClient \
8
+ --generate-secret \
9
+ --refresh-token-validity 10 \
10
+ --access-token-validity 60 \
11
+ --id-token-validity 60 \
12
+ --token-validity-units AccessToken=minutes,IdToken=minutes,RefreshToken=days \
13
+ --read-attributes email phone_number email_verified phone_number_verified \
14
+ --write-attributes email phone_number \
15
+ --explicit-auth-flows ALLOW_USER_PASSWORD_AUTH ALLOW_USER_SRP_AUTH ALLOW_REFRESH_TOKEN_AUTH \
16
+ --supported-identity-providers Google Facebook MyOIDC \
17
+ --callback-urls https://www.amazon.com https://example.com http://localhost:8001 myapp://example \
18
+ --allowed-o-auth-flows code implicit \
19
+ --allowed-o-auth-scopes openid profile aws.cognito.signin.user.admin solar-system-data/asteroids.add \
20
+ --allowed-o-auth-flows-user-pool-client \
21
+ --analytics-configuration ApplicationArn=arn:aws:mobiletargeting:us-west-2:767671399759:apps/thisisanexamplepinpointapplicationid,UserDataShared=TRUE \
22
+ --prevent-user-existence-errors ENABLED \
23
+ --enable-token-revocation \
24
+ --enable-propagate-additional-user-context-data \
25
+ --auth-session-validity 4
6
26
 
7
- aws cognito-idp create-user-pool-client --user-pool-id us-west-2_aaaaaaaaa --client-name MyNewClient --no-generate-secret --explicit-auth-flows "USER_PASSWORD_AUTH" "ADMIN_NO_SRP_AUTH"
8
-
9
27
  Output::
10
28
 
11
- {
12
- "UserPoolClient": {
13
- "UserPoolId": "us-west-2_aaaaaaaaa",
14
- "ClientName": "MyNewClient",
15
- "ClientId": "6p3bs000no6a4ue1idruvd05ad",
16
- "LastModifiedDate": 1548697449.497,
17
- "CreationDate": 1548697449.497,
18
- "RefreshTokenValidity": 30,
19
- "ExplicitAuthFlows": [
20
- "USER_PASSWORD_AUTH",
21
- "ADMIN_NO_SRP_AUTH"
22
- ],
23
- "AllowedOAuthFlowsUserPoolClient": false
29
+ {
30
+ "UserPoolClient": {
31
+ "UserPoolId": "us-west-2_EXAMPLE",
32
+ "ClientName": "MyTestClient",
33
+ "ClientId": "123abc456defEXAMPLE",
34
+ "ClientSecret": "this1234is5678my91011example1213client1415secret",
35
+ "LastModifiedDate": 1726788459.464,
36
+ "CreationDate": 1726788459.464,
37
+ "RefreshTokenValidity": 10,
38
+ "AccessTokenValidity": 60,
39
+ "IdTokenValidity": 60,
40
+ "TokenValidityUnits": {
41
+ "AccessToken": "minutes",
42
+ "IdToken": "minutes",
43
+ "RefreshToken": "days"
44
+ },
45
+ "ReadAttributes": [
46
+ "email_verified",
47
+ "phone_number_verified",
48
+ "phone_number",
49
+ "email"
50
+ ],
51
+ "WriteAttributes": [
52
+ "phone_number",
53
+ "email"
54
+ ],
55
+ "ExplicitAuthFlows": [
56
+ "ALLOW_USER_PASSWORD_AUTH",
57
+ "ALLOW_USER_SRP_AUTH",
58
+ "ALLOW_REFRESH_TOKEN_AUTH"
59
+ ],
60
+ "SupportedIdentityProviders": [
61
+ "Google",
62
+ "MyOIDC",
63
+ "Facebook"
64
+ ],
65
+ "CallbackURLs": [
66
+ "https://example.com",
67
+ "https://www.amazon.com",
68
+ "myapp://example",
69
+ "http://localhost:8001"
70
+ ],
71
+ "AllowedOAuthFlows": [
72
+ "implicit",
73
+ "code"
74
+ ],
75
+ "AllowedOAuthScopes": [
76
+ "aws.cognito.signin.user.admin",
77
+ "openid",
78
+ "profile",
79
+ "solar-system-data/asteroids.add"
80
+ ],
81
+ "AllowedOAuthFlowsUserPoolClient": true,
82
+ "AnalyticsConfiguration": {
83
+ "ApplicationArn": "arn:aws:mobiletargeting:us-west-2:123456789012:apps/thisisanexamplepinpointapplicationid",
84
+ "RoleArn": "arn:aws:iam::123456789012:role/aws-service-role/cognito-idp.amazonaws.com/AWSServiceRoleForAmazonCognitoIdp",
85
+ "UserDataShared": true
86
+ },
87
+ "PreventUserExistenceErrors": "ENABLED",
88
+ "EnableTokenRevocation": true,
89
+ "EnablePropagateAdditionalUserContextData": true,
90
+ "AuthSessionValidity": 4
91
+ }
24
92
  }
25
- }
26
93
 
94
+ For more information, see `Application-specific settings with app clients <https://docs.aws.amazon.com/cognito/latest/developerguide/user-pool-settings-client-apps.html>`__ in the *Amazon Cognito Developer Guide*.
@@ -1,8 +1,26 @@
1
- **To create a user pool domain**
1
+ **Example 1: To create a user pool domain**
2
2
 
3
- This example creates a new user pool domain. with two explicit authorization flows: USER_PASSWORD_AUTH and ADMIN_NO_SRP_AUTH.
3
+ The following ``create-user-pool-domain`` example creates a new custom domain. ::
4
4
 
5
- Command::
5
+ aws cognito-idp create-user-pool-domain \
6
+ --user-pool-id us-west-2_EXAMPLE \
7
+ --domain auth.example.com \
8
+ --custom-domain-config CertificateArn=arn:aws:acm:us-east-1:123456789012:certificate/a1b2c3d4-5678-90ab-cdef-EXAMPLE22222
6
9
 
7
- aws cognito-idp create-user-pool-domain --user-pool-id us-west-2_aaaaaaaaa --domain my-new-domain
8
-
10
+ Output::
11
+
12
+ {
13
+ "CloudFrontDomain": "example1domain.cloudfront.net"
14
+ }
15
+
16
+ For more information, see `Configuring a user pool domain <https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pools-assign-domain.html>`__ in the *Amazon Cognito Developer Guide*.
17
+
18
+ **Example 2: To create a user pool domain**
19
+
20
+ The following ``create-user-pool-domain`` example creates a new domain with a service-owned prefix. ::
21
+
22
+ aws cognito-idp create-user-pool-domain \
23
+ --user-pool-id us-west-2_EXAMPLE2 \
24
+ --domain mydomainprefix
25
+
26
+ For more information, see `Configuring a user pool domain <https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pools-assign-domain.html>`__ in the *Amazon Cognito Developer Guide*.
@@ -1,8 +1,11 @@
1
- **To delete user attributes**
1
+ **To delete a user attribute**
2
2
 
3
- This example deletes the user attribute "FAVORITE_ANIMAL".
3
+ The following ``delete-user-attributes`` example deletes the custom attribute "custom:attribute" from the currently signed-in user. ::
4
4
 
5
- Command::
5
+ aws cognito-idp delete-user-attributes \
6
+ --access-token ACCESS_TOKEN \
7
+ --user-attribute-names "custom:department"
6
8
 
7
- aws cognito-idp delete-user-attributes --access-token ACCESS_TOKEN --user-attribute-names "FAVORITE_ANIMAL"
8
-
9
+ This command produces no output.
10
+
11
+ For more information, see `Working with user attributes <https://docs.aws.amazon.com/cognito/latest/developerguide/user-pool-settings-attributes.html>`__ in the *Amazon Cognito Developer Guide*.