awscli 1.36.36__py3-none-any.whl → 1.36.38__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of awscli might be problematic. Click here for more details.

Files changed (31) hide show
  1. awscli/__init__.py +1 -1
  2. awscli/examples/apigateway/create-domain-name-access-association.rst +19 -0
  3. awscli/examples/apigateway/create-domain-name.rst +87 -3
  4. awscli/examples/apigateway/delete-domain-name-access-association.rst +10 -0
  5. awscli/examples/apigateway/get-domain-name-access-associations.rst +42 -0
  6. awscli/examples/apigateway/get-domain-name.rst +40 -9
  7. awscli/examples/apigateway/get-domain-names.rst +81 -13
  8. awscli/examples/apigateway/reject-domain-name-access-association.rst +11 -0
  9. awscli/examples/guardduty/accept-invitation.rst +2 -2
  10. awscli/examples/guardduty/archive-findings.rst +3 -3
  11. awscli/examples/guardduty/create-filter.rst +22 -5
  12. awscli/examples/guardduty/create-ip-set.rst +7 -7
  13. awscli/examples/guardduty/create-publishing-destination.rst +3 -3
  14. awscli/examples/guardduty/create-threat-intel-set.rst +5 -5
  15. awscli/examples/guardduty/disassociate-from-master-account.rst +3 -3
  16. awscli/examples/guardduty/get-ip-set.rst +3 -3
  17. awscli/examples/guardduty/get-master-account.rst +2 -2
  18. awscli/examples/guardduty/list-members.rst +34 -7
  19. awscli/examples/guardduty/update-ip-set.rst +1 -1
  20. awscli/examples/ssm/deregister-managed-instance.rst +3 -3
  21. awscli/examples/verifiedpermissions/create-policy-template.rst +3 -3
  22. {awscli-1.36.36.dist-info → awscli-1.36.38.dist-info}/METADATA +2 -2
  23. {awscli-1.36.36.dist-info → awscli-1.36.38.dist-info}/RECORD +31 -27
  24. {awscli-1.36.36.data → awscli-1.36.38.data}/scripts/aws +0 -0
  25. {awscli-1.36.36.data → awscli-1.36.38.data}/scripts/aws.cmd +0 -0
  26. {awscli-1.36.36.data → awscli-1.36.38.data}/scripts/aws_bash_completer +0 -0
  27. {awscli-1.36.36.data → awscli-1.36.38.data}/scripts/aws_completer +0 -0
  28. {awscli-1.36.36.data → awscli-1.36.38.data}/scripts/aws_zsh_completer.sh +0 -0
  29. {awscli-1.36.36.dist-info → awscli-1.36.38.dist-info}/LICENSE.txt +0 -0
  30. {awscli-1.36.36.dist-info → awscli-1.36.38.dist-info}/WHEEL +0 -0
  31. {awscli-1.36.36.dist-info → awscli-1.36.38.dist-info}/top_level.txt +0 -0
awscli/__init__.py CHANGED
@@ -18,7 +18,7 @@ A Universal Command Line Environment for Amazon Web Services.
18
18
 
19
19
  import os
20
20
 
21
- __version__ = '1.36.36'
21
+ __version__ = '1.36.38'
22
22
 
23
23
  #
24
24
  # Get our data path to be added to botocore's search path
@@ -0,0 +1,19 @@
1
+ **To create a domain name access association**
2
+
3
+ The following ``create-domain-name-access-association`` example creates a domain name access association between a private custom domain name and VPC endpoint. ::
4
+
5
+ aws apigateway create-domain-name-access-association \
6
+ --domain-name-arn arn:aws:apigateway:us-west-2:111122223333:/domainnames/my.private.domain.tld+abcd1234 \
7
+ --access-association-source vpce-abcd1234efg \
8
+ --access-association-source-type VPCE
9
+
10
+ Output::
11
+
12
+ {
13
+ "domainNameAccessAssociationArn": "arn:aws:apigateway:us-west-2:012345678910:/domainnameaccessassociations/domainname/my.private.domain.tld/vpcesource/vpce-abcd1234efg
14
+ "accessAssociationSource": "vpce-abcd1234efg",
15
+ "accessAssociationSourceType": "VPCE",
16
+ "domainNameArn" : "arn:aws:apigateway:us-west-2:111122223333:/domainnames/private.example.com+abcd1234"
17
+ }
18
+
19
+ For more information, see `Custom domain names for private APIs in API Gateway <https://docs.aws.amazon.com/apigateway/latest/developerguide/apigateway-private-custom-domains.html>`__ in the *Amazon API Gateway Developer Guide*.
@@ -1,5 +1,89 @@
1
- **To create the custom domain name**
1
+ **Example 1: To create a public custom domain name**
2
2
 
3
- Command::
3
+ The following ``create-domain-name`` example creates a public custom domain name. ::
4
4
 
5
- aws apigateway create-domain-name --domain-name 'my.domain.tld' --certificate-name 'my.domain.tld cert' --certificate-arn 'arn:aws:acm:us-east-1:012345678910:certificate/fb1b9770-a305-495d-aefb-27e5e101ff3'
5
+ aws apigateway create-domain-name \
6
+ --domain-name 'my.domain.tld' \
7
+ --certificate-name 'my.domain.tld cert'\
8
+ --certificate-arn 'arn:aws:acm:us-east-1:012345678910:certificate/fb1b9770-a305-495d-aefb-27e5e101ff3'
9
+
10
+ Output::
11
+
12
+ {
13
+ "domainName": "my.domain.tld",
14
+ "certificateName": "my.domain.tld cert",
15
+ "certificateArn": "arn:aws:acm:us-east-1:012345678910:certificate/fb1b9770-a305-495d-aefb-27e5e101ff3",
16
+ "certificateUploadDate": "2024-10-08T11:29:49-07:00",
17
+ "distributionDomainName": "abcd1234.cloudfront.net",
18
+ "distributionHostedZoneId": "Z2FDTNDATAQYW2",
19
+ "endpointConfiguration": {
20
+ "types": [
21
+ "EDGE"
22
+ ]
23
+ },
24
+ "domainNameStatus": "AVAILABLE",
25
+ "securityPolicy": "TLS_1_2"
26
+ }
27
+
28
+ For more information, see `Custom domain name for public REST APIs in API Gateway <https://docs.aws.amazon.com/apigateway/latest/developerguide/how-to-custom-domains.html>`__ in the *Amazon API Gateway Developer Guide*.
29
+
30
+ **Example 2: To create a private custom domain name**
31
+
32
+ The following ``create-domain-name`` example creates a private custom domain name. ::
33
+
34
+ aws apigateway create-domain-name \
35
+ --domain-name 'my.private.domain.tld' \
36
+ --certificate-name 'my.domain.tld cert' \
37
+ --certificate-arn 'arn:aws:acm:us-east-1:012345678910:certificate/fb1b9770-a305-495d-aefb-27e5e101ff3' \
38
+ --endpoint-configuration '{"types": ["PRIVATE"]}' \
39
+ --security-policy 'TLS_1_2' \
40
+ --policy file://policy.json
41
+
42
+ Contents of ``policy.json``::
43
+
44
+ {
45
+ "Version": "2012-10-17",
46
+ "Statement": [
47
+ {
48
+ "Effect": "Allow",
49
+ "Principal": "*",
50
+ "Action": "execute-api:Invoke",
51
+ "Resource": [
52
+ "execute-api:/*"
53
+ ]
54
+ },
55
+ {
56
+ "Effect": "Deny",
57
+ "Principal": "*",
58
+ "Action": "execute-api:Invoke",
59
+ "Resource": [
60
+ "execute-api:/*"
61
+ ],
62
+ "Condition" : {
63
+ "StringNotEquals": {
64
+ "aws:SourceVpce": "vpce-abcd1234efg"
65
+ }
66
+ }
67
+ }
68
+ ]
69
+ }
70
+
71
+ Output::
72
+
73
+ {
74
+ "domainName": "my.private.domain.tld",
75
+ "domainNameId": "abcd1234",
76
+ "domainNameArn": "arn:aws:apigateway:us-east-1:012345678910:/domainnames/my.private.domain.tld+abcd1234",
77
+ "certificateArn": "arn:aws:acm:us-east-1:012345678910:certificate/fb1b9770-a305-495d-aefb-27e5e101ff3",
78
+ "certificateUploadDate": "2024-09-10T10:31:20-07:00",
79
+ "endpointConfiguration": {
80
+ "types": [
81
+ "PRIVATE"
82
+ ]
83
+ },
84
+ "domainNameStatus": "AVAILABLE",
85
+ "securityPolicy": "TLS_1_2",
86
+ "policy": "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Effect\":\"Allow\",\"Principal\":\"*\",\"Action\":\"execute-api:Invoke\",\"Resource\":\"arn:aws:execute-api:us-east-1:012345678910:/domainnames/my.private.domain.tld+abcd1234\"},{\"Effect\":\"Deny\",\"Principal\":\"*\",\"Action\":\"execute-api:Invoke\",\"Resource\":\"arn:aws:execute-api:us-east-1:012345678910:/domainnames/my.private.domain.tld+abcd1234\",\"Condition\":{\"StringNotEquals\":{\"aws:SourceVpc\":\"vpc-1a2b3c4d\"}}}]}"
87
+ }
88
+
89
+ For more information, see `Custom domain name for public REST APIs in API Gateway <https://docs.aws.amazon.com/apigateway/latest/developerguide/how-to-custom-domains.html>`__ in the *Amazon API Gateway Developer Guide*.
@@ -0,0 +1,10 @@
1
+ **To delete a domain name access association**
2
+
3
+ The following ``delete-domain-name-access-association`` example deletes a domain name access association between a private custom domain name and VPC endpoint. ::
4
+
5
+ aws apigateway delete-domain-name-access-association \
6
+ --domain-name-access-association-arn arn:aws:apigateway:us-west-2:012345678910:/domainnameaccessassociations/domainname/my.private.domain.tld/vpcesource/vpce-abcd1234efg
7
+
8
+ This command produces no output.
9
+
10
+ For more information, see `Custom domain names for private APIs in API Gateway <https://docs.aws.amazon.com/apigateway/latest/developerguide/apigateway-private-custom-domains.html>`__ in the *Amazon API Gateway Developer Guide*.
@@ -0,0 +1,42 @@
1
+ **Example 1: To list all domain name access associations**
2
+
3
+ The following ``get-domain-name-access-associations`` example lists all domain name access associations. ::
4
+
5
+ aws apigateway get-domain-name-access-associations
6
+
7
+ Output::
8
+
9
+ {
10
+ "items": [
11
+ {
12
+ "domainNameAccessAssociationArn": "arn:aws:apigateway:us-west-2:012345678910:/domainnameaccessassociations/domainname/my.private.domain.tld/vpcesource/vpce-abcd1234efg
13
+ "accessAssociationSource": "vpce-abcd1234efg",
14
+ "accessAssociationSourceType": "VPCE",
15
+ "domainNameArn" : "arn:aws:apigateway:us-west-2:111122223333:/domainnames/private.example.com+abcd1234"
16
+ }
17
+ ]
18
+ }
19
+
20
+ For more information, see `Custom domain names for private APIs in API Gateway <https://docs.aws.amazon.com/apigateway/latest/developerguide/apigateway-private-custom-domains.html>`__ in the *Amazon API Gateway Developer Guide*.
21
+
22
+ **Example 2: To list all domain name access associations owned by this AWS account**
23
+
24
+ The following ``get-domain-name-access-associations`` example lists all the domain name access associations owned by the current AWS account. ::
25
+
26
+ aws apigateway get-domain-name-access-associations \
27
+ --resource-owner SELF
28
+
29
+ Output::
30
+
31
+ {
32
+ "items": [
33
+ {
34
+ "domainNameAccessAssociationArn": "arn:aws:apigateway:us-west-2:012345678910:/domainnameaccessassociations/domainname/my.private.domain.tld/vpcesource/vpce-abcd1234efg
35
+ "accessAssociationSource": "vpce-abcd1234efg",
36
+ "accessAssociationSourceType": "VPCE",
37
+ "domainNameArn" : "arn:aws:apigateway:us-west-2:111122223333:/domainnames/private.example.com+abcd1234"
38
+ }
39
+ ]
40
+ }
41
+
42
+ For more information, see `Custom domain names for private APIs in API Gateway <https://docs.aws.amazon.com/apigateway/latest/developerguide/apigateway-private-custom-domains.html>`__ in the *Amazon API Gateway Developer Guide*.
@@ -1,14 +1,45 @@
1
- **To get information about a custom domain name**
1
+ **Example 1: To get information about a public custom domain name**
2
2
 
3
- Command::
3
+ The following ``get-domain-name`` example gets information about a public custom domain name. ::
4
4
 
5
- aws apigateway get-domain-name --domain-name api.domain.tld
5
+ aws apigateway get-domain-name \
6
+ --domain-name api.domain.tld
6
7
 
7
8
  Output::
8
9
 
9
- {
10
- "domainName": "api.domain.tld",
11
- "distributionDomainName": "d1a2f3a4c5o6d.cloudfront.net",
12
- "certificateName": "uploadedCertificate",
13
- "certificateUploadDate": 1462565487
14
- }
10
+ {
11
+ "domainName": "api.domain.tld",
12
+ "distributionDomainName": "d1a2f3a4c5o6d.cloudfront.net",
13
+ "certificateName": "uploadedCertificate",
14
+ "certificateUploadDate": 1462565487
15
+ }
16
+
17
+ For more information, see `Custom domain name for public REST APIs in API Gateway <https://docs.aws.amazon.com/apigateway/latest/developerguide/how-to-custom-domains.html>`__ in the *Amazon API Gateway Developer Guide*.
18
+
19
+ **Example 2: To get information about a private custom domain name**
20
+
21
+ The following ``get-domain-name`` example gets information about a private custom domain name. ::
22
+
23
+ aws apigateway get-domain-name \
24
+ --domain-name api.private.domain.tld \
25
+ --domain-name-id abcd1234
26
+
27
+ Output::
28
+
29
+ {
30
+ "domainName": "my.private.domain.tld",
31
+ "domainNameId": "abcd1234",
32
+ "domainNameArn": "arn:aws:apigateway:us-east-1:012345678910:/domainnames/my.private.domain.tld+abcd1234",
33
+ "certificateArn": "arn:aws:acm:us-east-1:012345678910:certificate/fb1b9770-a305-495d-aefb-27e5e101ff3",
34
+ "certificateUploadDate": "2024-09-10T10:31:20-07:00",
35
+ "endpointConfiguration": {
36
+ "types": [
37
+ "PRIVATE"
38
+ ]
39
+ },
40
+ "domainNameStatus": "AVAILABLE",
41
+ "securityPolicy": "TLS_1_2",
42
+ "policy": "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Effect\":\"Allow\",\"Principal\":\"*\",\"Action\":\"execute-api:Invoke\",\"Resource\":\"arn:aws:execute-api:us-east-1:012345678910:/domainnames/my.private.domain.tld+abcd1234\"},{\"Effect\":\"Deny\",\"Principal\":\"*\",\"Action\":\"execute-api:Invoke\",\"Resource\":\"arn:aws:execute-api:us-east-1:012345678910:/domainnames/my.private.domain.tld+abcd1234\",\"Condition\":{\"StringNotEquals\":{\"aws:SourceVpc\":\"vpc-1a2b3c4d\"}}}]}"
43
+ }
44
+
45
+ For more information, see `Custom domain name for public REST APIs in API Gateway <https://docs.aws.amazon.com/apigateway/latest/developerguide/how-to-custom-domains.html>`__ in the *Amazon API Gateway Developer Guide*.
@@ -1,18 +1,86 @@
1
- **To get a list of custom domain names**
1
+ **Example 1: To get a list of custom domain names**
2
2
 
3
- Command::
3
+ The following ``get-domain-names`` command gets a list of domain names. ::
4
4
 
5
- aws apigateway get-domain-names
5
+ aws apigateway get-domain-names
6
6
 
7
7
  Output::
8
8
 
9
- {
10
- "items": [
11
- {
12
- "distributionDomainName": "d9511k3l09bkd.cloudfront.net",
13
- "certificateUploadDate": 1452812505,
14
- "certificateName": "my_custom_domain-certificate",
15
- "domainName": "subdomain.domain.tld"
16
- }
17
- ]
18
- }
9
+ {
10
+ "items": [
11
+ {
12
+ "distributionDomainName": "d9511k3l09bkd.cloudfront.net",
13
+ "certificateUploadDate": 1452812505,
14
+ "certificateName": "my_custom_domain-certificate",
15
+ "domainName": "subdomain.domain.tld"
16
+ }
17
+ ]
18
+ }
19
+
20
+ For more information, see `Custom domain names for private APIs in API Gateway <https://docs.aws.amazon.com/apigateway/latest/developerguide/apigateway-private-custom-domains.html>`__ in the *Amazon API Gateway Developer Guide*.
21
+
22
+ **Example 2: To get a list of custom domain names owned by this AWS account**
23
+
24
+ The following ``get-domain-names`` command gets a list of domain names owned by this AWS account. ::
25
+
26
+ aws apigateway get-domain-names \
27
+ --resource-owner SELF
28
+
29
+ Output::
30
+
31
+ {
32
+ "items": [
33
+ {
34
+ "domainName": "my.domain.tld",
35
+ "domainNameArn": "arn:aws:apigateway:us-east-1::/domainnames/my.private.domain.tld",
36
+ "certificateUploadDate": "2024-08-15T17:02:55-07:00",
37
+ "regionalDomainName": "d-abcd1234.execute-api.us-east-1.amazonaws.com",
38
+ "regionalHostedZoneId": "Z1UJRXOUMOOFQ8",
39
+ "regionalCertificateArn": "arn:aws:acm:us-east-1:012345678910:certificate/fb1b9770-a305-495d-aefb-27e5e101ff3",
40
+ "endpointConfiguration": {
41
+ "types": [
42
+ "REGIONAL"
43
+ ]
44
+ },
45
+ "domainNameStatus": "AVAILABLE",
46
+ "securityPolicy": "TLS_1_2"
47
+ },
48
+ {
49
+ "domainName": "my.private.domain.tld",
50
+ "domainNameId": "abcd1234",
51
+ "domainNameArn": "arn:aws:apigateway:us-east-1:012345678910:/domainnames/my.private.domain.tld+abcd1234",
52
+ "certificateArn": "arn:aws:acm:us-east-1:012345678910:certificate/fb1b9770-a305-495d-aefb-27e5e101ff3",
53
+ "certificateUploadDate": "2024-11-26T11:44:40-08:00",
54
+ "endpointConfiguration": {
55
+ "types": [
56
+ "PRIVATE"
57
+ ]
58
+ },
59
+ "domainNameStatus": "AVAILABLE",
60
+ "securityPolicy": "TLS_1_2"
61
+ }
62
+ ]
63
+ }
64
+
65
+ For more information, see `Custom domain names for private APIs in API Gateway <https://docs.aws.amazon.com/apigateway/latest/developerguide/apigateway-private-custom-domains.html>`__ in the *Amazon API Gateway Developer Guide*.
66
+
67
+ **Example 3: To get a list of custom domain names owned by other AWS accounts that you can create a domain name access association with.**
68
+
69
+ The following ``get-domain-names`` command gets a list of domain names owned by other AWS accounts that you have access to create a domain name access association with. ::
70
+
71
+ aws apigateway get-domain-names \
72
+ --resource-owner OTHER_ACCOUNTS
73
+
74
+ Output::
75
+
76
+ {
77
+ "items": [
78
+ {
79
+ "domainName": "my.private.domain.tld",
80
+ "domainNameId": "abcd1234",
81
+ "domainNameArn": "arn:aws:apigateway:us-east-1:012345678910:/domainnames/my.private.domain.tld+abcd1234"
82
+ }
83
+ ]
84
+ }
85
+
86
+ For more information, see `Custom domain names for private APIs in API Gateway <https://docs.aws.amazon.com/apigateway/latest/developerguide/apigateway-private-custom-domains.html>`__ in the *Amazon API Gateway Developer Guide*.
@@ -0,0 +1,11 @@
1
+ **To reject a domain name access association**
2
+
3
+ The following ``reject-domain-name-access-association`` example rejects a domain name access association between a private custom domain name and VPC endpoint. ::
4
+
5
+ aws apigateway reject-domain-name-access-association \
6
+ --domain-name-access-association-arn arn:aws:apigateway:us-west-2:012345678910:/domainnameaccessassociations/domainname/my.private.domain.tld/vpcesource/vpce-abcd1234efg \
7
+ --domain-name-arn arn:aws:apigateway:us-east-1:012345678910:/domainnames/my.private.domain.tld+abcd1234
8
+
9
+ This command produces no output.
10
+
11
+ For more information, see `Custom domain names for private APIs in API Gateway <https://docs.aws.amazon.com/apigateway/latest/developerguide/apigateway-private-custom-domains.html>`__ in the *Amazon API Gateway Developer Guide*.
@@ -6,7 +6,7 @@ The following ``accept-invitation`` example shows how to accept an invitation to
6
6
  --detector-id 12abc34d567e8fa901bc2d34eexample \
7
7
  --master-id 123456789111 \
8
8
  --invitation-id d6b94fb03a66ff665f7db8764example
9
-
9
+
10
10
  This command produces no output.
11
11
 
12
- For more information, see `Managing GuardDuty Accounts by Invitation <https://docs.aws.amazon.com/guardduty/latest/ug/guardduty_invitations.html>`__ in the GuardDuty User Guide.
12
+ For more information, see `Managing GuardDuty accounts by invitation <https://docs.aws.amazon.com/guardduty/latest/ug/guardduty_invitations.html>`__ in the GuardDuty User Guide.
@@ -1,11 +1,11 @@
1
1
  **To archive findings in the current region**
2
2
 
3
- This example shows how to archive findings in the current region. ::
3
+ This ``archive-findings`` example shows how to archive findings in the current region. ::
4
4
 
5
5
  aws guardduty archive-findings \
6
6
  --detector-id 12abc34d567e8fa901bc2d34eexample \
7
7
  --finding-ids d6b94fb03a66ff665f7db8764example 3eb970e0de00c16ec14e6910fexample
8
8
 
9
- This command produces no output.
9
+ This command produces no output.
10
10
 
11
- For more information, see `Managing GuardDuty Accounts by Invitation <https://docs.aws.amazon.com/guardduty/latest/ug/guardduty_findings.html#guardduty_working-with-findings>`__ in the *GuardDuty User Guide*.
11
+ For more information, see `Creating suppression rules <https://docs.aws.amazon.com/guardduty/latest/ug/findings_suppression-rules-console.html>`__ in the *GuardDuty User Guide*.
@@ -1,17 +1,34 @@
1
- **To create a new filter for the current region**
1
+ **Example 1: To create a new filter in the current region**
2
2
 
3
- This example creates a filter that matches all portscan findings for instance created from a specific image.::
3
+ The following ``create-filter`` example creates a filter that matches all Portscan findings for instance created from a specific image. This does not suppress those findings. ::
4
+
5
+ aws guardduty create-filter \
6
+ --detector-id b6b992d6d2f48e64bc59180bfexample \
7
+ --name myFilterExample \
8
+ --finding-criteria '{"Criterion": {"type": {"Eq": ["Recon:EC2/Portscan"]},"resource.instanceDetails.imageId": {"Eq": ["ami-0a7a207083example"]}}}'
9
+
10
+ Output::
11
+
12
+ {
13
+ "Name": "myFilterExample"
14
+ }
15
+
16
+ For more information, see `Filtering GuardDuty findings <https://docs.aws.amazon.com/guardduty/latest/ug/guardduty_filter-findings.html>`__ in the *GuardDuty User Guide*.
17
+
18
+ **Example 2: To create a new filter and suppress findings in the current region**
19
+
20
+ The following ``create-filter`` example creates a filter that matches all Portscan findings for instance created from a specific image. This filter archives those findings so that they do not appear in your current findings. ::
4
21
 
5
22
  aws guardduty create-filter \
6
23
  --detector-id b6b992d6d2f48e64bc59180bfexample \
7
24
  --action ARCHIVE \
8
- --name myFilter \
25
+ --name myFilterSecondExample \
9
26
  --finding-criteria '{"Criterion": {"type": {"Eq": ["Recon:EC2/Portscan"]},"resource.instanceDetails.imageId": {"Eq": ["ami-0a7a207083example"]}}}'
10
27
 
11
28
  Output::
12
29
 
13
30
  {
14
- "Name": "myFilter"
31
+ "Name": "myFilterSecondExample"
15
32
  }
16
33
 
17
- For more information, see `Filtering findings <https://docs.aws.amazon.com/guardduty/latest/ug/guardduty_filter-findings.html>`__ in the *GuardDuty User Guide*.
34
+ For more information, see `Filtering GuardDuty findings <https://docs.aws.amazon.com/guardduty/latest/ug/guardduty_filter-findings.html>`__ in the *GuardDuty User Guide*.
@@ -1,18 +1,18 @@
1
- **To create a trusted IP set**
1
+ **To create and activate a trusted IP set**
2
2
 
3
- The following ``create-ip-set`` example creates and activates a trusted IP set in the current region. ::
3
+ The following ``create-ip-set`` example creates and activates a trusted IP set in the current Region. ::
4
4
 
5
5
  aws guardduty create-ip-set \
6
6
  --detector-id 12abc34d567e8fa901bc2d34eexample \
7
- --name new-ip-set \
8
- --format TXT
9
- --location s3://amzn-s3-demo-bucket/customtrustlist.csv
7
+ --name new-ip-set-example \
8
+ --format TXT \
9
+ --location s3://amzn-s3-demo-bucket/customtrustlist.csv \
10
10
  --activate
11
11
 
12
12
  Output::
13
-
13
+
14
14
  {
15
15
  "IpSetId": "d4b94fc952d6912b8f3060768example"
16
16
  }
17
17
 
18
- For more information, see `Working with Trusted IP Lists and Threat Lists <https://docs.aws.amazon.com/guardduty/latest/ug/guardduty_upload_lists.html>`__ in the GuardDuty User Guide.
18
+ For more information, see `Working with Trusted IP Lists and Threat Lists <https://docs.aws.amazon.com/guardduty/latest/ug/guardduty_upload_lists.html>`__ in the *GuardDuty User Guide*.
@@ -1,11 +1,11 @@
1
1
  **To create a publishing destination to export GuardDuty findings in the current region to.**
2
2
 
3
- This example shows how to create a publishing destination for GuardDuty findings. ::
3
+ The following ``create-publishing-destination`` example shows how to set up a publishing destination to export current (not archived) GuardDuty findings to keep track of historical findings data. ::
4
4
 
5
5
  aws guardduty create-publishing-destination \
6
6
  --detector-id b6b992d6d2f48e64bc59180bfexample \
7
7
  --destination-type S3 \
8
- --destination-properties DestinationArn=arn:aws:s3:::yourbucket,KmsKeyArn=arn:aws:kms:us-west-1:111122223333:key/84cee9c5-dea1-401a-ab6d-e1de7example
8
+ --destination-properties 'DestinationArn=arn:aws:s3:::amzn-s3-demo-bucket,KmsKeyArn=arn:aws:kms:us-west-1:111122223333:key/84cee9c5-dea1-401a-ab6d-e1de7example'
9
9
 
10
10
  Output::
11
11
 
@@ -13,4 +13,4 @@ Output::
13
13
  "DestinationId": "46b99823849e1bbc242dfbe3cexample"
14
14
  }
15
15
 
16
- For more information, see `Exporting findings <https://docs.aws.amazon.com/guardduty/latest/ug/guardduty_exportfindings.html>`__ in the *GuardDuty User Guide*.
16
+ For more information, see `Exporting generated GuardDuty findings to Amazon S3 buckets <https://docs.aws.amazon.com/guardduty/latest/ug/guardduty_exportfindings.html>`__ in the *GuardDuty User Guide*.
@@ -1,12 +1,12 @@
1
- **To create a new threat intel set in the current region.**
1
+ **To create and activate a new threat intel set**
2
2
 
3
- This example shows how to upload a threat intel set to GuardDuty and activate it immediately. ::
3
+ The following ``create-threat-intel-set`` example creates and activates a threat intel set in the current Region. ::
4
4
 
5
5
  aws guardduty create-threat-intel-set \
6
6
  --detector-id b6b992d6d2f48e64bc59180bfexample \
7
- --name myThreatSet \
7
+ --name myThreatSet-example \
8
8
  --format TXT \
9
- --location s3://EXAMPLEBUCKET/threatlist.csv \
9
+ --location s3://amzn-s3-demo-bucket/threatlist.csv \
10
10
  --activate
11
11
 
12
12
  Output::
@@ -15,4 +15,4 @@ Output::
15
15
  "ThreatIntelSetId": "20b9a4691aeb33506b808878cexample"
16
16
  }
17
17
 
18
- For more information, see `Trusted IP and threat lists <https://docs.aws.amazon.com/guardduty/latest/ug/guardduty_upload_lists.html>`__ in the *GuardDuty User Guide*.
18
+ For more information, see `Working with Trusted IP Lists and Threat Lists <https://docs.aws.amazon.com/guardduty/latest/ug/guardduty_upload_lists.html>`__ in the *GuardDuty User Guide*.
@@ -1,10 +1,10 @@
1
- **To disassociate from your current master account in the current region**
1
+ **To disassociate from your current administrator account in the current region**
2
2
 
3
- The following ``disassociate-from-master-account`` example dissassociates your account from the current GuardDuty master account in the current AWS region. ::
3
+ The following ``disassociate-from-master-account`` example dissassociates your account from the current GuardDuty administrator account in the current AWS region. ::
4
4
 
5
5
  aws guardduty disassociate-from-master-account \
6
6
  --detector-id d4b040365221be2b54a6264dcexample
7
7
 
8
8
  This command produces no output.
9
9
 
10
- For more information, see `Understanding the Relationship between GuardDuty Master and Member Accounts <https://docs.aws.amazon.com/guardduty/latest/ug/guardduty_accounts.html#master_member_relationships>`__ in the GuardDuty User Guide.
10
+ For more information, see `Understanding the relationship between GuardDuty administrator account and member accounts <https://docs.aws.amazon.com/guardduty/latest/ug/administrator_member_relationships.html>`__ in the *GuardDuty User Guide*.
@@ -1,6 +1,6 @@
1
1
  **To list get details on a specified trusted IP set**
2
2
 
3
- The following ``get-ip-set`` example shows the status and details of the specififed trusted IP set. ::
3
+ The following ``get-ip-set`` example shows the status and details of the specified trusted IP set. ::
4
4
 
5
5
  aws guardduty get-ip-set \
6
6
  --detector-id 12abc34d567e8fa901bc2d34eexample \
@@ -13,7 +13,7 @@ Output::
13
13
  "Location": "s3://amzn-s3-demo-bucket.s3-us-west-2.amazonaws.com/customlist.csv",
14
14
  "Tags": {},
15
15
  "Format": "TXT",
16
- "Name": "test-ip-set"
16
+ "Name": "test-ip-set-example"
17
17
  }
18
18
 
19
- For more information, see `Working with Trusted IP Lists and Threat Lists <https://docs.aws.amazon.com/guardduty/latest/ug/guardduty_upload_lists.html>`__ in the GuardDuty User Guide.
19
+ For more information, see `Working with Trusted IP Lists and Threat Lists <https://docs.aws.amazon.com/guardduty/latest/ug/guardduty_upload_lists.html>`__ in the *GuardDuty User Guide*.
@@ -12,8 +12,8 @@ Output::
12
12
  "InvitationId": "04b94d9704854a73f94e061e8example",
13
13
  "InvitedAt": "2020-06-09T22:23:04.970Z",
14
14
  "RelationshipStatus": "Enabled",
15
- "AccountId": "123456789111"
15
+ "AccountId": "111122223333"
16
16
  }
17
17
  }
18
18
 
19
- For more information, see `Understanding the Relationship between GuardDuty Master and Member Accounts <https://docs.aws.amazon.com/guardduty/latest/ug/guardduty_accounts.html#master_member_relationships>`__ in the GuardDuty User Guide.
19
+ For more information, see `Understanding the relationship between GuardDuty administrator account and member account <https://docs.aws.amazon.com/guardduty/latest/ug/administrator_member_relationships.html>`__ in the *GuardDuty User Guide*.
@@ -1,24 +1,51 @@
1
- **To list all members in the current region**
1
+ **Example 1: To list only current members in the current Region**
2
2
 
3
- The following ``list-members`` example lists all member accounts and their details for the current region. ::
3
+ The following ``list-members`` example lists and provides details of only current member accounts associated with the GuardDuty administrator account, in the current region. ::
4
4
 
5
5
  aws guardduty list-members \
6
- --detector-id 12abc34d567e8fa901bc2d34eexample
6
+ --detector-id 12abc34d567e8fa901bc2d34eexample \
7
+ --only-associated="true"
7
8
 
8
9
  Output::
9
-
10
+
10
11
  {
11
12
  "Members": [
12
13
  {
13
14
  "RelationshipStatus": "Enabled",
14
15
  "InvitedAt": "2020-06-09T22:49:00.910Z",
15
- "MasterId": "123456789111",
16
+ "MasterId": "111122223333",
16
17
  "DetectorId": "7ab8b2f61b256c87f793f6a86example",
17
18
  "UpdatedAt": "2020-06-09T23:08:22.512Z",
18
19
  "Email": "your+member@example.com",
19
- "AccountId": "123456789222"
20
+ "AccountId": "123456789012"
21
+ }
22
+ ]
23
+ }
24
+
25
+ For more information, see `Understanding the relationship between GuardDuty administrator account and member accounts <https://docs.aws.amazon.com/guardduty/latest/ug/administrator_member_relationships.html>`__ in the *GuardDuty User Guide*.
26
+
27
+ **Example 2: To list all the members in the current Region**
28
+
29
+ The following ``list-members`` example lists and provides details of all the member accounts, including those who have been disassociated or have not yet accepted the invite from the GuardDuty administrator, in the current region. ::
30
+
31
+ aws guardduty list-members \
32
+ --detector-id 12abc34d567e8fa901bc2d34eexample \
33
+ --only-associated="false"
34
+
35
+ Output::
36
+
37
+ {
38
+ "Members": [
39
+ {
40
+ "RelationshipStatus": "Enabled",
41
+ "InvitedAt": "2020-06-09T22:49:00.910Z",
42
+ "MasterId": "111122223333",
43
+ "DetectorId": "7ab8b2f61b256c87f793f6a86example",
44
+ "UpdatedAt": "2020-06-09T23:08:22.512Z",
45
+ "Email": "your+other+member@example.com",
46
+ "AccountId": "555555555555"
20
47
  }
21
48
  ]
22
49
  }
23
50
 
24
- For more information, see `Understanding the Relationship between GuardDuty Master and Member Accounts <https://docs.aws.amazon.com/guardduty/latest/ug/guardduty_accounts.html#master_member_relationships>`__ in the GuardDuty User Guide.
51
+ For more information, see `Understanding the relationship between GuardDuty administrator account and member accounts <https://docs.aws.amazon.com/guardduty/latest/ug/administrator_member_relationships.html>`__ in the *GuardDuty User Guide*.
@@ -9,4 +9,4 @@ The following ``update-ip-set`` example shows how to update the details of a tru
9
9
 
10
10
  This command produces no output.
11
11
 
12
- For more information, see `Working with Trusted IP Lists and Threat Lists <https://docs.aws.amazon.com/guardduty/latest/ug/guardduty_upload_lists.html>`__ in the GuardDuty User Guide.
12
+ For more information, see `Working with Trusted IP Lists and Threat Lists <https://docs.aws.amazon.com/guardduty/latest/ug/guardduty_upload_lists.html>`__ in the *GuardDuty User Guide*.
@@ -2,9 +2,9 @@
2
2
 
3
3
  The following ``deregister-managed-instance`` example deregisters the specified managed instance. ::
4
4
 
5
- aws ssm deregister-managed-instance
6
- --instance-id "mi-08ab247cdfEXAMPLE"
5
+ aws ssm deregister-managed-instance \
6
+ --instance-id 'mi-08ab247cdfEXAMPLE'
7
7
 
8
8
  This command produces no output.
9
9
 
10
- For more information, see `Deregistering Managed Instances in a Hybrid Environment <https://docs.aws.amazon.com/systems-manager/latest/userguide/systems-manager-managed-instances-advanced-deregister.html>`__ in the *AWS Systems Manager User Guide*.
10
+ For more information, see `Deregistering managed nodes in a hybrid and multicloud environment <https://docs.aws.amazon.com/systems-manager/latest/userguide/fleet-manager-deregister-hybrid-nodes.html>`__ in the *AWS Systems Manager User Guide*.
@@ -1,12 +1,12 @@
1
- **Example 1: To create a policy template**
1
+ **To create a policy template**
2
2
 
3
3
  The following ``create-policy-template`` example creates a policy template with a statement that contains a placeholder for the principal. ::
4
4
 
5
5
  aws verifiedpermissions create-policy-template \
6
- --definition file://template1.txt \
6
+ --statement file://template1.txt \
7
7
  --policy-store-id PSEXAMPLEabcdefg111111
8
8
 
9
- Contents of file ``template1.txt``::
9
+ Contents of ``template1.txt``::
10
10
 
11
11
  permit(
12
12
  principal in ?principal,
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.1
2
2
  Name: awscli
3
- Version: 1.36.36
3
+ Version: 1.36.38
4
4
  Summary: Universal Command Line Environment for AWS.
5
5
  Home-page: http://aws.amazon.com/cli/
6
6
  Author: Amazon Web Services
@@ -23,7 +23,7 @@ Classifier: Programming Language :: Python :: 3.11
23
23
  Classifier: Programming Language :: Python :: 3.12
24
24
  Requires-Python: >= 3.8
25
25
  License-File: LICENSE.txt
26
- Requires-Dist: botocore (==1.35.95)
26
+ Requires-Dist: botocore (==1.35.97)
27
27
  Requires-Dist: docutils (<0.17,>=0.10)
28
28
  Requires-Dist: s3transfer (<0.11.0,>=0.10.0)
29
29
  Requires-Dist: PyYAML (<6.1,>=3.10)
@@ -1,4 +1,4 @@
1
- awscli/__init__.py,sha256=3byB56FJsp6fZvQbRc96HcsK_uQnmHiE-ag8MIrhOS4,1534
1
+ awscli/__init__.py,sha256=mKzuFllD7SJBACIeO75bB9OQSiPw8iPq7U_iwQf4E5I,1534
2
2
  awscli/__main__.py,sha256=iBjOg0tBxNlhzTi_tyc1G0SMGBvHMVvBJzX3JqYaooY,662
3
3
  awscli/alias.py,sha256=Us9pvP8Zplbr1W4N3rE5gxicWLqlRG3l_9VPskxafgs,11313
4
4
  awscli/argparser.py,sha256=3Pxx-vWytdV985Y6MIl9DeutUXyehIvACIs_PDby8GI,7650
@@ -283,7 +283,8 @@ awscli/examples/apigateway/create-api-key.rst,sha256=631sPtUi7lgga18sFdvoUk-f6dS
283
283
  awscli/examples/apigateway/create-authorizer.rst,sha256=VfiVCYl9nHM3XK1LCXMv_7Pd8XKyV0wN7qXQoFbBnnM,2961
284
284
  awscli/examples/apigateway/create-base-path-mapping.rst,sha256=-kIRisT9ZpLGq3uDVcA4gFJ1_inCsLt2RygiGz6vVE4,203
285
285
  awscli/examples/apigateway/create-deployment.rst,sha256=dBI2w2yTB4xvnnNMCPFBIgk_uPj2SEwElgeSTsAp1Vk,724
286
- awscli/examples/apigateway/create-domain-name.rst,sha256=e3F0H75iyDs7o2OY585U4n9flrmbkMKhHq0QnChMo04,259
286
+ awscli/examples/apigateway/create-domain-name-access-association.rst,sha256=PzMiD8RhHRabPihOgbefpcPOrM8MIBGe78IfY_0U4s0,1129
287
+ awscli/examples/apigateway/create-domain-name.rst,sha256=umiIlXFXZdHID2cbTq_q5vtKrnnMBFLb-gyteez0rYc,3758
287
288
  awscli/examples/apigateway/create-model.rst,sha256=YdySmCiq4jBTLTQn40GfttR10RXNb0IOpTUXv_Vy7uI,804
288
289
  awscli/examples/apigateway/create-resource.rst,sha256=PqxSPtwKQjp2UeKl-7Tuide8HSoaVKMdByaeyw-vZVo,151
289
290
  awscli/examples/apigateway/create-rest-api.rst,sha256=nmzAIZWf0h9pYpTYTkpMO9fxOB50WSfQp5FPSD90Guo,323
@@ -295,6 +296,7 @@ awscli/examples/apigateway/delete-authorizer.rst,sha256=rRnhQpPcBFRQquYh3veihLnk
295
296
  awscli/examples/apigateway/delete-base-path-mapping.rst,sha256=BwX-C_3gicZswKc_iL2mXiF86Xe_BFaEkvSR1SIfkVQ,162
296
297
  awscli/examples/apigateway/delete-client-certificate.rst,sha256=xaqSCQAgV_LkVOHD2PxoKp_0BOl99HMjvLtyh3RQItI,121
297
298
  awscli/examples/apigateway/delete-deployment.rst,sha256=p18PJ5pGWkFYeOjlwfLZ2KTNuAIB9xKjZPsaWZYiYrc,132
299
+ awscli/examples/apigateway/delete-domain-name-access-association.rst,sha256=YpKKKRAYSu2VmJIJbMSCzzVTnUoCJSoVd56feSaCRzQ,713
298
300
  awscli/examples/apigateway/delete-domain-name.rst,sha256=zsSM-UwTbN_cbpxNo1aJb9S3o6RdkzT-FZvxx31vXH0,114
299
301
  awscli/examples/apigateway/delete-integration-response.rst,sha256=nq71k0va3X0OMHZKejXoMzBerfWx_waqOYQY2P3YiEE,233
300
302
  awscli/examples/apigateway/delete-integration.rst,sha256=d7jjFudpuWKiobH-o3jO-4RqvVEj3-uZ6-1vZC0t7fk,183
@@ -320,8 +322,9 @@ awscli/examples/apigateway/get-client-certificate.rst,sha256=vDTA_vsIDDXDz4ZhQKK
320
322
  awscli/examples/apigateway/get-client-certificates.rst,sha256=tXvCkw9U0vojVgicn37IfTIK4wxPtFIpf3casFjd6J0,470
321
323
  awscli/examples/apigateway/get-deployment.rst,sha256=V7p0C7wGkLe3zOvgOWcfGbHYwbeYXwime6a94-9NECQ,244
322
324
  awscli/examples/apigateway/get-deployments.rst,sha256=613M91R_Q-Pq9hkhpmAiZ3eesGpYdnRKDm7KHZzEgrY,326
323
- awscli/examples/apigateway/get-domain-name.rst,sha256=vjepcVI7Vex4A3QzFxVSZj4-nADyFhZ6qPRVrYIctp8,338
324
- awscli/examples/apigateway/get-domain-names.rst,sha256=H1rz_W-LPQU9GlxaHVh0FkQWGRJGiVsuot8WGKW94x4,397
325
+ awscli/examples/apigateway/get-domain-name-access-associations.rst,sha256=L6lEzlEdQW2hyBFn3RZa0F7tIqjydKzr-eJINY_56HQ,1976
326
+ awscli/examples/apigateway/get-domain-name.rst,sha256=1N2xJbtpx-kAMm3lY8lbk1gxHaJIdkWsMss-gsF_SC0,2277
327
+ awscli/examples/apigateway/get-domain-names.rst,sha256=313XPVJslT-NdC4IWZGkGgT-HN2Ll_b1VbwJxd1h8O8,3623
325
328
  awscli/examples/apigateway/get-export.rst,sha256=y17CLlXEoUzSPOFc0fU6KfxzFAmNsNjHS88wxxqSKGs,650
326
329
  awscli/examples/apigateway/get-integration-response.rst,sha256=1nwegleU3yXr3F0gjESHTV8SwxAPD5ZEL5TITcViPGc,360
327
330
  awscli/examples/apigateway/get-integration.rst,sha256=4Y2-VXhWCAJHBia-FSKdFyYHu2ahRAoX7fel6O5Ozqg,696
@@ -348,6 +351,7 @@ awscli/examples/apigateway/put-integration.rst,sha256=XDuryx2rir4gSQAtp6m1lfdzBE
348
351
  awscli/examples/apigateway/put-method-response.rst,sha256=G9ABN6h89ARvT3mnfXTmTQijgMOM7NQrpfQbt3qBee0,299
349
352
  awscli/examples/apigateway/put-method.rst,sha256=RFhgMBN0u5_hZy069HXeQUkASdDNJ0V8iOfoQnNQ29M,337
350
353
  awscli/examples/apigateway/put-rest-api.rst,sha256=2XsaktctKvjdMu9FJan6UI5WASpvYRC0YgD6RW-t8dU,380
354
+ awscli/examples/apigateway/reject-domain-name-access-association.rst,sha256=_gv-oxPGHqZtQuEhJTR-rFfUhw44JnpHnHO2GtrjKNE,827
351
355
  awscli/examples/apigateway/test-invoke-authorizer.rst,sha256=ZzPohdJUR0yHs7QaMyChSZXBKxYDRiWcXV28hZRPfe0,224
352
356
  awscli/examples/apigateway/test-invoke-method.rst,sha256=WPS8b6WN9mLJMrAZxfBJFwmJLZDY3EV9I278gNSY3fU,470
353
357
  awscli/examples/apigateway/update-account.rst,sha256=Lq8ycj0aOfPAN0nH6T1EK44LMaxtz2j4dKrlD7NIjys,435
@@ -2963,30 +2967,30 @@ awscli/examples/greengrassv2/list-tags-for-resource.rst,sha256=Cb0WcS5-fldaZXSOY
2963
2967
  awscli/examples/greengrassv2/tag-resource.rst,sha256=MFQElQfZudpjXRXLz85lOxPMBV__bV7XFxxjyKi1sIQ,595
2964
2968
  awscli/examples/greengrassv2/untag-resource.rst,sha256=XpP-G2Xq-p-tFEE90ppzc8LnTwiAlGG6mfYrsLcx8vo,520
2965
2969
  awscli/examples/greengrassv2/update-connectivity-info.rst,sha256=SkVizTEVaP5IDoWm8kbcjoNIdTPB1AK45uCFnrPJywY,1006
2966
- awscli/examples/guardduty/accept-invitation.rst,sha256=gMjaDx9uB8Sn-gRNhA2Zufcn2Pz8eQYatdME-gOVwuE,650
2967
- awscli/examples/guardduty/archive-findings.rst,sha256=4gBuhLGgrS5yTGjNua0dvd8FJwsntM-Oa3KhTVxrRGo,553
2970
+ awscli/examples/guardduty/accept-invitation.rst,sha256=SXdXbzBI4koqMayn1eZhp_XIIyQkB_aEbfOdc0cMV3Q,644
2971
+ awscli/examples/guardduty/archive-findings.rst,sha256=g2K6NAHLQv32MJlOXVOONN5wch-BMdoeuu1-se_s2so,544
2968
2972
  awscli/examples/guardduty/create-detector.rst,sha256=avBHR6_EUrvA3_wmbSxLqEntT_-wk5Jgws1mBOIbVhQ,474
2969
- awscli/examples/guardduty/create-filter.rst,sha256=mfrhq91cZxcNpx9xL63_-Sx4CXyDrOgs8ZRn8xTk6Pc,692
2970
- awscli/examples/guardduty/create-ip-set.rst,sha256=KE48su1zNtGK_yHXJ1QPZo4o20YrkYgV_PmghAOw2Lc,644
2973
+ awscli/examples/guardduty/create-filter.rst,sha256=HqHZO6K1sTup1o8OUqO2AXdIjMz-RLl3CDCtgbQcx0w,1644
2974
+ awscli/examples/guardduty/create-ip-set.rst,sha256=T0Dxi5C1YOHqvGc-I_v9N5bphtnPdrGfzziIE3Qy6H8,667
2971
2975
  awscli/examples/guardduty/create-members.rst,sha256=P8zGKPP5wRq1SVnv1XC7vHAiKtR-6wa32zCJdwPgPEg,664
2972
- awscli/examples/guardduty/create-publishing-destination.rst,sha256=4vkQC2ylbGHkqG9S0iuNehVDD8tIcu6HiSL-t-_fXVA,736
2976
+ awscli/examples/guardduty/create-publishing-destination.rst,sha256=E6NZrgijSlr0oLUcXXanKNy_I2dxiMo1Y4DQH3OT_Gs,902
2973
2977
  awscli/examples/guardduty/create-sample-findings.rst,sha256=tHNU78Uo29CE0XFp6KorMQN9IrvrfbhiToK2h6QuaoI,522
2974
- awscli/examples/guardduty/create-threat-intel-set.rst,sha256=aeTeZgrSLw3HqQyvbCe5MwefT2EBVcHa1eTbnQ4mKQ8,658
2978
+ awscli/examples/guardduty/create-threat-intel-set.rst,sha256=Potsm2HdCab1OoQnPL0AsXU-0JYQPsbzi7oO8b6lu-g,702
2975
2979
  awscli/examples/guardduty/decline-invitations.rst,sha256=HVilJaU0XdnMRKHuyOuSKhc6-bzPxeBWBF9JlGj5KYU,485
2976
2980
  awscli/examples/guardduty/delete-detector.rst,sha256=FGU6oTZYCQrq3TUB-IJLRMNa9UOeC9Eg5FRsKB8RBic,520
2977
2981
  awscli/examples/guardduty/delete-filter.rst,sha256=xMix3FPFn4l-phwi5zq1_BfLH2VN09KDaOS8VgUq9LM,440
2978
2982
  awscli/examples/guardduty/disable-organization-admin-account.rst,sha256=uucqE1J3IeKg5FJhRloUM5J2QrnySGIgwwfg6LDfcXI,509
2979
- awscli/examples/guardduty/disassociate-from-master-account.rst,sha256=Mom3_wJeEPKd5sJq4UpEmqon83oUHWQLZa1BgR_TIxk,625
2983
+ awscli/examples/guardduty/disassociate-from-master-account.rst,sha256=Q9Kt5iqpeVRzg-6AptKfK6eL2U1PdruteP1MNQtnRyc,646
2980
2984
  awscli/examples/guardduty/get-detector.rst,sha256=0z0TEdRaxhz5_86dzXU8LXcaKFqrNsE2Sl9d3fm6Ajw,773
2981
2985
  awscli/examples/guardduty/get-findings.rst,sha256=cYCDtX9lfqYH6SdedR6gqL3nYBjXlHgaaKjSPyLIkMU,3582
2982
- awscli/examples/guardduty/get-ip-set.rst,sha256=JrIK-ayTWqg1uXb05Jngf-EIdL4WUwyLnw3nvpvFjpQ,722
2983
- awscli/examples/guardduty/get-master-account.rst,sha256=5gK2BWNV3VLo2jmXG0mFgQHeYClmmBX15QqSavDyXts,835
2986
+ awscli/examples/guardduty/get-ip-set.rst,sha256=YLIJe5ZLTccxtxLANLqJyjh_6r60JfYqJTFcEEj95Wk,733
2987
+ awscli/examples/guardduty/get-master-account.rst,sha256=P0djfO2mlY3Dn3lX2F5K2Dp7_0qzKlUNBNdJ8_lbzDI,839
2984
2988
  awscli/examples/guardduty/list-detectors.rst,sha256=mS_LlpWnMBUY1Z8549tlJvYm6IcVEVk0WySRZEljC3U,475
2985
2989
  awscli/examples/guardduty/list-findings.rst,sha256=yu5uxPGSgetbYBelRSpdn8McwjVGd5XHF8t9H-wDIvA,2753
2986
2990
  awscli/examples/guardduty/list-invitations.rst,sha256=GpX4-DIf2p58TABjsBtWb1Xjx5BOYRyZ4MyUsdlkqK4,785
2987
2991
  awscli/examples/guardduty/list-ip-sets.rst,sha256=HkL1ZEeOM_szNmk8V5ZEiWBsX6Zp18UFbO69rHo6X4k,542
2988
- awscli/examples/guardduty/list-members.rst,sha256=iWqumfK0ajwEH5Bf7qsHnboY3FEBTm9TPjjwN_jW3-o,962
2989
- awscli/examples/guardduty/update-ip-set.rst,sha256=IHNjYGPhEfs8TeMyvEPFmfo8yw1T0U051OKFToLTJvs,599
2992
+ awscli/examples/guardduty/list-members.rst,sha256=JjQ75i7EdPEFzqaneD5Oo0Pk7u91Sa8G4bWpJwmgm4g,2236
2993
+ awscli/examples/guardduty/update-ip-set.rst,sha256=_AlsG9W6mBgPCQDP8D1GBwd92IwkzvNf_HsWNeSKC0I,603
2990
2994
  awscli/examples/health/describe-affected-entities.rst,sha256=rBj9YxiiMS0Osum6MFLORoOOddWZEN0Wjh7OHJxKhpU,1140
2991
2995
  awscli/examples/health/describe-event-details.rst,sha256=d83e2wiNidiOqdzkt-nCp6o4KIqLCU7J2S2UvVFR20c,1692
2992
2996
  awscli/examples/health/describe-events.rst,sha256=ubZzwAjHmWMmkl1FEYgFOfUf55a3_LbcudOe0s7sQsI,8598
@@ -5519,7 +5523,7 @@ awscli/examples/ssm/delete-parameter.rst,sha256=PIxDfSVg3W_wIWUF6hgPLnobU1LmhxHm
5519
5523
  awscli/examples/ssm/delete-parameters.rst,sha256=V3w9f4m16PsNVwwm8c49KJ79E0Dr38nyrrvRmc6QL1o,655
5520
5524
  awscli/examples/ssm/delete-patch-baseline.rst,sha256=jI_UytRkDTFvGMsuCTu_wW4e_kpQJ_ucCkq-R5ZCQ2c,501
5521
5525
  awscli/examples/ssm/delete-resource-data-sync.rst,sha256=_evf5S4D72r5KaxlrRVhg6zNh4iqRHZm6Q2n_unbe0U,208
5522
- awscli/examples/ssm/deregister-managed-instance.rst,sha256=HXBxlaRoPUpa8uk8M7g4I_mlA4uhgKpF3m6lGqhSNZo,522
5526
+ awscli/examples/ssm/deregister-managed-instance.rst,sha256=f3RDfInIIZwqlFDBx2v-Di-iXksZhbhONxedoO45_M8,516
5523
5527
  awscli/examples/ssm/deregister-patch-baseline-for-patch-group.rst,sha256=wCsoDnI59ZG2j13jekM2Ixnho6HI7Q1TURII_E4ZMTE,662
5524
5528
  awscli/examples/ssm/deregister-target-from-maintenance-window.rst,sha256=hlakJmAitCaiGVtwGCt-YzXe5zdrqFYoC4ghZyLeF8A,720
5525
5529
  awscli/examples/ssm/deregister-task-from-maintenance-window.rst,sha256=yAaRgyFh_4rPx6X1_7PUb6inpuJ91elNIvd3MzVAl0M,715
@@ -5766,7 +5770,7 @@ awscli/examples/trustedadvisor/update-organization-recommendation-lifecycle.rst,
5766
5770
  awscli/examples/trustedadvisor/update-recommendation-lifecycle.rst,sha256=MU-6cscJB2b6lSminNIMtX2ybuxd30NI4xfbn61HPr4,680
5767
5771
  awscli/examples/verifiedpermissions/create-identity-source.rst,sha256=FnVKwJK-4OE0icElySSycc-CIdke0qtlfW195pa5zWw,1223
5768
5772
  awscli/examples/verifiedpermissions/create-policy-store.rst,sha256=LEZn-xrZ16_m_ZVtUyWmXgJVXdHqvynw3shOf3dtqOU,742
5769
- awscli/examples/verifiedpermissions/create-policy-template.rst,sha256=zIcA9dvoLHycVgTJXggl_vK2NRkACjoW3oyRymK4K34,992
5773
+ awscli/examples/verifiedpermissions/create-policy-template.rst,sha256=lOx8FlpibgyvJFS8IdGeJNqSpJ8-MZabkIFkYNG50go,975
5770
5774
  awscli/examples/verifiedpermissions/create-policy.rst,sha256=m7ynEiQaaiL3uezo4gWMUDm_Hi9Y1w4k0rg0-LEna-k,3502
5771
5775
  awscli/examples/verifiedpermissions/delete-identity-source.rst,sha256=nQh2Xh1cnpv8hfYIlwGwkp9e2Vrso5gmkpLEdlUyFao,583
5772
5776
  awscli/examples/verifiedpermissions/delete-policy-store.rst,sha256=bUjKWUE2_wvzRYhpq1wadJJKcKtWJRHcZ5BekJVS9yU,492
@@ -5992,13 +5996,13 @@ awscli/topics/return-codes.rst,sha256=d9lpNFZwD75IiYcDEADQzu-4QiR8P28UPHkrNwPV5J
5992
5996
  awscli/topics/s3-config.rst,sha256=FwwCczTylrSLwELuDQ-VA8sCI7ruwV9PEJJrqxjUeG0,11502
5993
5997
  awscli/topics/s3-faq.rst,sha256=sS5jKHF_7X5eiGwpUg7aTqQt2zCRN-m_xXOcE0Bme0Q,1899
5994
5998
  awscli/topics/topic-tags.json,sha256=6lUSrs3FKCZNRSQMnjcXNgWyRNGjZIeur1988a4IO5o,1577
5995
- awscli-1.36.36.data/scripts/aws,sha256=r24FExgs0-JjILTQ3XZAqXBYE4SV6UMTtALkLGAj86g,805
5996
- awscli-1.36.36.data/scripts/aws.cmd,sha256=s46DkC6LNgX63CIkzxxbPnFMJ6DRDBkvc88GnWa8Pvg,1432
5997
- awscli-1.36.36.data/scripts/aws_bash_completer,sha256=RRpoEGJRagRzyHZKZZOwpltuVYv2EoiZsdXhmyWPZ54,204
5998
- awscli-1.36.36.data/scripts/aws_completer,sha256=oC9kuMDlWE47dWk_4xjPde2PQvN-M0vND0J4YSLabVQ,1126
5999
- awscli-1.36.36.data/scripts/aws_zsh_completer.sh,sha256=Qm6Z8ejNAMzpJjaT0pzqxbSDT2zxdmzVe5haRA7qLoc,1808
6000
- awscli-1.36.36.dist-info/LICENSE.txt,sha256=o5XhFlwu0OK_BBrijlKCRa7dQAm36UrUB3gCV_cEr8E,549
6001
- awscli-1.36.36.dist-info/METADATA,sha256=2M4no2zKNQaLlEh7A6YPw_5aPUV9JWhAWrq9fHV6IOA,11331
6002
- awscli-1.36.36.dist-info/WHEEL,sha256=GV9aMThwP_4oNCtvEC2ec3qUYutgWeAzklro_0m4WJQ,91
6003
- awscli-1.36.36.dist-info/top_level.txt,sha256=vt9wXFr1_nGYK6abhJgt6zY3fULe4JSZedm_5XOM9S0,7
6004
- awscli-1.36.36.dist-info/RECORD,,
5999
+ awscli-1.36.38.data/scripts/aws,sha256=r24FExgs0-JjILTQ3XZAqXBYE4SV6UMTtALkLGAj86g,805
6000
+ awscli-1.36.38.data/scripts/aws.cmd,sha256=s46DkC6LNgX63CIkzxxbPnFMJ6DRDBkvc88GnWa8Pvg,1432
6001
+ awscli-1.36.38.data/scripts/aws_bash_completer,sha256=RRpoEGJRagRzyHZKZZOwpltuVYv2EoiZsdXhmyWPZ54,204
6002
+ awscli-1.36.38.data/scripts/aws_completer,sha256=oC9kuMDlWE47dWk_4xjPde2PQvN-M0vND0J4YSLabVQ,1126
6003
+ awscli-1.36.38.data/scripts/aws_zsh_completer.sh,sha256=Qm6Z8ejNAMzpJjaT0pzqxbSDT2zxdmzVe5haRA7qLoc,1808
6004
+ awscli-1.36.38.dist-info/LICENSE.txt,sha256=o5XhFlwu0OK_BBrijlKCRa7dQAm36UrUB3gCV_cEr8E,549
6005
+ awscli-1.36.38.dist-info/METADATA,sha256=1YtVTtrUnwjHHKWTmgIwMZ1DepvliUJQwO_3kPRkDuA,11331
6006
+ awscli-1.36.38.dist-info/WHEEL,sha256=GV9aMThwP_4oNCtvEC2ec3qUYutgWeAzklro_0m4WJQ,91
6007
+ awscli-1.36.38.dist-info/top_level.txt,sha256=vt9wXFr1_nGYK6abhJgt6zY3fULe4JSZedm_5XOM9S0,7
6008
+ awscli-1.36.38.dist-info/RECORD,,
File without changes