awscli 1.36.37__py3-none-any.whl → 1.36.38__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of awscli might be problematic. Click here for more details.
- awscli/__init__.py +1 -1
- awscli/examples/apigateway/create-domain-name-access-association.rst +19 -0
- awscli/examples/apigateway/create-domain-name.rst +87 -3
- awscli/examples/apigateway/delete-domain-name-access-association.rst +10 -0
- awscli/examples/apigateway/get-domain-name-access-associations.rst +42 -0
- awscli/examples/apigateway/get-domain-name.rst +40 -9
- awscli/examples/apigateway/get-domain-names.rst +81 -13
- awscli/examples/apigateway/reject-domain-name-access-association.rst +11 -0
- awscli/examples/guardduty/accept-invitation.rst +2 -2
- awscli/examples/guardduty/archive-findings.rst +3 -3
- awscli/examples/guardduty/create-filter.rst +22 -5
- awscli/examples/guardduty/create-ip-set.rst +7 -7
- awscli/examples/guardduty/create-publishing-destination.rst +3 -3
- awscli/examples/guardduty/create-threat-intel-set.rst +5 -5
- awscli/examples/guardduty/disassociate-from-master-account.rst +3 -3
- awscli/examples/guardduty/get-ip-set.rst +3 -3
- awscli/examples/guardduty/get-master-account.rst +2 -2
- awscli/examples/guardduty/list-members.rst +34 -7
- awscli/examples/guardduty/update-ip-set.rst +1 -1
- awscli/examples/ssm/deregister-managed-instance.rst +3 -3
- awscli/examples/verifiedpermissions/create-policy-template.rst +3 -3
- {awscli-1.36.37.dist-info → awscli-1.36.38.dist-info}/METADATA +2 -2
- {awscli-1.36.37.dist-info → awscli-1.36.38.dist-info}/RECORD +31 -27
- {awscli-1.36.37.data → awscli-1.36.38.data}/scripts/aws +0 -0
- {awscli-1.36.37.data → awscli-1.36.38.data}/scripts/aws.cmd +0 -0
- {awscli-1.36.37.data → awscli-1.36.38.data}/scripts/aws_bash_completer +0 -0
- {awscli-1.36.37.data → awscli-1.36.38.data}/scripts/aws_completer +0 -0
- {awscli-1.36.37.data → awscli-1.36.38.data}/scripts/aws_zsh_completer.sh +0 -0
- {awscli-1.36.37.dist-info → awscli-1.36.38.dist-info}/LICENSE.txt +0 -0
- {awscli-1.36.37.dist-info → awscli-1.36.38.dist-info}/WHEEL +0 -0
- {awscli-1.36.37.dist-info → awscli-1.36.38.dist-info}/top_level.txt +0 -0
awscli/__init__.py
CHANGED
|
@@ -0,0 +1,19 @@
|
|
|
1
|
+
**To create a domain name access association**
|
|
2
|
+
|
|
3
|
+
The following ``create-domain-name-access-association`` example creates a domain name access association between a private custom domain name and VPC endpoint. ::
|
|
4
|
+
|
|
5
|
+
aws apigateway create-domain-name-access-association \
|
|
6
|
+
--domain-name-arn arn:aws:apigateway:us-west-2:111122223333:/domainnames/my.private.domain.tld+abcd1234 \
|
|
7
|
+
--access-association-source vpce-abcd1234efg \
|
|
8
|
+
--access-association-source-type VPCE
|
|
9
|
+
|
|
10
|
+
Output::
|
|
11
|
+
|
|
12
|
+
{
|
|
13
|
+
"domainNameAccessAssociationArn": "arn:aws:apigateway:us-west-2:012345678910:/domainnameaccessassociations/domainname/my.private.domain.tld/vpcesource/vpce-abcd1234efg
|
|
14
|
+
"accessAssociationSource": "vpce-abcd1234efg",
|
|
15
|
+
"accessAssociationSourceType": "VPCE",
|
|
16
|
+
"domainNameArn" : "arn:aws:apigateway:us-west-2:111122223333:/domainnames/private.example.com+abcd1234"
|
|
17
|
+
}
|
|
18
|
+
|
|
19
|
+
For more information, see `Custom domain names for private APIs in API Gateway <https://docs.aws.amazon.com/apigateway/latest/developerguide/apigateway-private-custom-domains.html>`__ in the *Amazon API Gateway Developer Guide*.
|
|
@@ -1,5 +1,89 @@
|
|
|
1
|
-
**To create
|
|
1
|
+
**Example 1: To create a public custom domain name**
|
|
2
2
|
|
|
3
|
-
|
|
3
|
+
The following ``create-domain-name`` example creates a public custom domain name. ::
|
|
4
4
|
|
|
5
|
-
|
|
5
|
+
aws apigateway create-domain-name \
|
|
6
|
+
--domain-name 'my.domain.tld' \
|
|
7
|
+
--certificate-name 'my.domain.tld cert'\
|
|
8
|
+
--certificate-arn 'arn:aws:acm:us-east-1:012345678910:certificate/fb1b9770-a305-495d-aefb-27e5e101ff3'
|
|
9
|
+
|
|
10
|
+
Output::
|
|
11
|
+
|
|
12
|
+
{
|
|
13
|
+
"domainName": "my.domain.tld",
|
|
14
|
+
"certificateName": "my.domain.tld cert",
|
|
15
|
+
"certificateArn": "arn:aws:acm:us-east-1:012345678910:certificate/fb1b9770-a305-495d-aefb-27e5e101ff3",
|
|
16
|
+
"certificateUploadDate": "2024-10-08T11:29:49-07:00",
|
|
17
|
+
"distributionDomainName": "abcd1234.cloudfront.net",
|
|
18
|
+
"distributionHostedZoneId": "Z2FDTNDATAQYW2",
|
|
19
|
+
"endpointConfiguration": {
|
|
20
|
+
"types": [
|
|
21
|
+
"EDGE"
|
|
22
|
+
]
|
|
23
|
+
},
|
|
24
|
+
"domainNameStatus": "AVAILABLE",
|
|
25
|
+
"securityPolicy": "TLS_1_2"
|
|
26
|
+
}
|
|
27
|
+
|
|
28
|
+
For more information, see `Custom domain name for public REST APIs in API Gateway <https://docs.aws.amazon.com/apigateway/latest/developerguide/how-to-custom-domains.html>`__ in the *Amazon API Gateway Developer Guide*.
|
|
29
|
+
|
|
30
|
+
**Example 2: To create a private custom domain name**
|
|
31
|
+
|
|
32
|
+
The following ``create-domain-name`` example creates a private custom domain name. ::
|
|
33
|
+
|
|
34
|
+
aws apigateway create-domain-name \
|
|
35
|
+
--domain-name 'my.private.domain.tld' \
|
|
36
|
+
--certificate-name 'my.domain.tld cert' \
|
|
37
|
+
--certificate-arn 'arn:aws:acm:us-east-1:012345678910:certificate/fb1b9770-a305-495d-aefb-27e5e101ff3' \
|
|
38
|
+
--endpoint-configuration '{"types": ["PRIVATE"]}' \
|
|
39
|
+
--security-policy 'TLS_1_2' \
|
|
40
|
+
--policy file://policy.json
|
|
41
|
+
|
|
42
|
+
Contents of ``policy.json``::
|
|
43
|
+
|
|
44
|
+
{
|
|
45
|
+
"Version": "2012-10-17",
|
|
46
|
+
"Statement": [
|
|
47
|
+
{
|
|
48
|
+
"Effect": "Allow",
|
|
49
|
+
"Principal": "*",
|
|
50
|
+
"Action": "execute-api:Invoke",
|
|
51
|
+
"Resource": [
|
|
52
|
+
"execute-api:/*"
|
|
53
|
+
]
|
|
54
|
+
},
|
|
55
|
+
{
|
|
56
|
+
"Effect": "Deny",
|
|
57
|
+
"Principal": "*",
|
|
58
|
+
"Action": "execute-api:Invoke",
|
|
59
|
+
"Resource": [
|
|
60
|
+
"execute-api:/*"
|
|
61
|
+
],
|
|
62
|
+
"Condition" : {
|
|
63
|
+
"StringNotEquals": {
|
|
64
|
+
"aws:SourceVpce": "vpce-abcd1234efg"
|
|
65
|
+
}
|
|
66
|
+
}
|
|
67
|
+
}
|
|
68
|
+
]
|
|
69
|
+
}
|
|
70
|
+
|
|
71
|
+
Output::
|
|
72
|
+
|
|
73
|
+
{
|
|
74
|
+
"domainName": "my.private.domain.tld",
|
|
75
|
+
"domainNameId": "abcd1234",
|
|
76
|
+
"domainNameArn": "arn:aws:apigateway:us-east-1:012345678910:/domainnames/my.private.domain.tld+abcd1234",
|
|
77
|
+
"certificateArn": "arn:aws:acm:us-east-1:012345678910:certificate/fb1b9770-a305-495d-aefb-27e5e101ff3",
|
|
78
|
+
"certificateUploadDate": "2024-09-10T10:31:20-07:00",
|
|
79
|
+
"endpointConfiguration": {
|
|
80
|
+
"types": [
|
|
81
|
+
"PRIVATE"
|
|
82
|
+
]
|
|
83
|
+
},
|
|
84
|
+
"domainNameStatus": "AVAILABLE",
|
|
85
|
+
"securityPolicy": "TLS_1_2",
|
|
86
|
+
"policy": "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Effect\":\"Allow\",\"Principal\":\"*\",\"Action\":\"execute-api:Invoke\",\"Resource\":\"arn:aws:execute-api:us-east-1:012345678910:/domainnames/my.private.domain.tld+abcd1234\"},{\"Effect\":\"Deny\",\"Principal\":\"*\",\"Action\":\"execute-api:Invoke\",\"Resource\":\"arn:aws:execute-api:us-east-1:012345678910:/domainnames/my.private.domain.tld+abcd1234\",\"Condition\":{\"StringNotEquals\":{\"aws:SourceVpc\":\"vpc-1a2b3c4d\"}}}]}"
|
|
87
|
+
}
|
|
88
|
+
|
|
89
|
+
For more information, see `Custom domain name for public REST APIs in API Gateway <https://docs.aws.amazon.com/apigateway/latest/developerguide/how-to-custom-domains.html>`__ in the *Amazon API Gateway Developer Guide*.
|
|
@@ -0,0 +1,10 @@
|
|
|
1
|
+
**To delete a domain name access association**
|
|
2
|
+
|
|
3
|
+
The following ``delete-domain-name-access-association`` example deletes a domain name access association between a private custom domain name and VPC endpoint. ::
|
|
4
|
+
|
|
5
|
+
aws apigateway delete-domain-name-access-association \
|
|
6
|
+
--domain-name-access-association-arn arn:aws:apigateway:us-west-2:012345678910:/domainnameaccessassociations/domainname/my.private.domain.tld/vpcesource/vpce-abcd1234efg
|
|
7
|
+
|
|
8
|
+
This command produces no output.
|
|
9
|
+
|
|
10
|
+
For more information, see `Custom domain names for private APIs in API Gateway <https://docs.aws.amazon.com/apigateway/latest/developerguide/apigateway-private-custom-domains.html>`__ in the *Amazon API Gateway Developer Guide*.
|
|
@@ -0,0 +1,42 @@
|
|
|
1
|
+
**Example 1: To list all domain name access associations**
|
|
2
|
+
|
|
3
|
+
The following ``get-domain-name-access-associations`` example lists all domain name access associations. ::
|
|
4
|
+
|
|
5
|
+
aws apigateway get-domain-name-access-associations
|
|
6
|
+
|
|
7
|
+
Output::
|
|
8
|
+
|
|
9
|
+
{
|
|
10
|
+
"items": [
|
|
11
|
+
{
|
|
12
|
+
"domainNameAccessAssociationArn": "arn:aws:apigateway:us-west-2:012345678910:/domainnameaccessassociations/domainname/my.private.domain.tld/vpcesource/vpce-abcd1234efg
|
|
13
|
+
"accessAssociationSource": "vpce-abcd1234efg",
|
|
14
|
+
"accessAssociationSourceType": "VPCE",
|
|
15
|
+
"domainNameArn" : "arn:aws:apigateway:us-west-2:111122223333:/domainnames/private.example.com+abcd1234"
|
|
16
|
+
}
|
|
17
|
+
]
|
|
18
|
+
}
|
|
19
|
+
|
|
20
|
+
For more information, see `Custom domain names for private APIs in API Gateway <https://docs.aws.amazon.com/apigateway/latest/developerguide/apigateway-private-custom-domains.html>`__ in the *Amazon API Gateway Developer Guide*.
|
|
21
|
+
|
|
22
|
+
**Example 2: To list all domain name access associations owned by this AWS account**
|
|
23
|
+
|
|
24
|
+
The following ``get-domain-name-access-associations`` example lists all the domain name access associations owned by the current AWS account. ::
|
|
25
|
+
|
|
26
|
+
aws apigateway get-domain-name-access-associations \
|
|
27
|
+
--resource-owner SELF
|
|
28
|
+
|
|
29
|
+
Output::
|
|
30
|
+
|
|
31
|
+
{
|
|
32
|
+
"items": [
|
|
33
|
+
{
|
|
34
|
+
"domainNameAccessAssociationArn": "arn:aws:apigateway:us-west-2:012345678910:/domainnameaccessassociations/domainname/my.private.domain.tld/vpcesource/vpce-abcd1234efg
|
|
35
|
+
"accessAssociationSource": "vpce-abcd1234efg",
|
|
36
|
+
"accessAssociationSourceType": "VPCE",
|
|
37
|
+
"domainNameArn" : "arn:aws:apigateway:us-west-2:111122223333:/domainnames/private.example.com+abcd1234"
|
|
38
|
+
}
|
|
39
|
+
]
|
|
40
|
+
}
|
|
41
|
+
|
|
42
|
+
For more information, see `Custom domain names for private APIs in API Gateway <https://docs.aws.amazon.com/apigateway/latest/developerguide/apigateway-private-custom-domains.html>`__ in the *Amazon API Gateway Developer Guide*.
|
|
@@ -1,14 +1,45 @@
|
|
|
1
|
-
**To get information about a custom domain name**
|
|
1
|
+
**Example 1: To get information about a public custom domain name**
|
|
2
2
|
|
|
3
|
-
|
|
3
|
+
The following ``get-domain-name`` example gets information about a public custom domain name. ::
|
|
4
4
|
|
|
5
|
-
|
|
5
|
+
aws apigateway get-domain-name \
|
|
6
|
+
--domain-name api.domain.tld
|
|
6
7
|
|
|
7
8
|
Output::
|
|
8
9
|
|
|
9
|
-
|
|
10
|
-
|
|
11
|
-
|
|
12
|
-
|
|
13
|
-
|
|
14
|
-
|
|
10
|
+
{
|
|
11
|
+
"domainName": "api.domain.tld",
|
|
12
|
+
"distributionDomainName": "d1a2f3a4c5o6d.cloudfront.net",
|
|
13
|
+
"certificateName": "uploadedCertificate",
|
|
14
|
+
"certificateUploadDate": 1462565487
|
|
15
|
+
}
|
|
16
|
+
|
|
17
|
+
For more information, see `Custom domain name for public REST APIs in API Gateway <https://docs.aws.amazon.com/apigateway/latest/developerguide/how-to-custom-domains.html>`__ in the *Amazon API Gateway Developer Guide*.
|
|
18
|
+
|
|
19
|
+
**Example 2: To get information about a private custom domain name**
|
|
20
|
+
|
|
21
|
+
The following ``get-domain-name`` example gets information about a private custom domain name. ::
|
|
22
|
+
|
|
23
|
+
aws apigateway get-domain-name \
|
|
24
|
+
--domain-name api.private.domain.tld \
|
|
25
|
+
--domain-name-id abcd1234
|
|
26
|
+
|
|
27
|
+
Output::
|
|
28
|
+
|
|
29
|
+
{
|
|
30
|
+
"domainName": "my.private.domain.tld",
|
|
31
|
+
"domainNameId": "abcd1234",
|
|
32
|
+
"domainNameArn": "arn:aws:apigateway:us-east-1:012345678910:/domainnames/my.private.domain.tld+abcd1234",
|
|
33
|
+
"certificateArn": "arn:aws:acm:us-east-1:012345678910:certificate/fb1b9770-a305-495d-aefb-27e5e101ff3",
|
|
34
|
+
"certificateUploadDate": "2024-09-10T10:31:20-07:00",
|
|
35
|
+
"endpointConfiguration": {
|
|
36
|
+
"types": [
|
|
37
|
+
"PRIVATE"
|
|
38
|
+
]
|
|
39
|
+
},
|
|
40
|
+
"domainNameStatus": "AVAILABLE",
|
|
41
|
+
"securityPolicy": "TLS_1_2",
|
|
42
|
+
"policy": "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Effect\":\"Allow\",\"Principal\":\"*\",\"Action\":\"execute-api:Invoke\",\"Resource\":\"arn:aws:execute-api:us-east-1:012345678910:/domainnames/my.private.domain.tld+abcd1234\"},{\"Effect\":\"Deny\",\"Principal\":\"*\",\"Action\":\"execute-api:Invoke\",\"Resource\":\"arn:aws:execute-api:us-east-1:012345678910:/domainnames/my.private.domain.tld+abcd1234\",\"Condition\":{\"StringNotEquals\":{\"aws:SourceVpc\":\"vpc-1a2b3c4d\"}}}]}"
|
|
43
|
+
}
|
|
44
|
+
|
|
45
|
+
For more information, see `Custom domain name for public REST APIs in API Gateway <https://docs.aws.amazon.com/apigateway/latest/developerguide/how-to-custom-domains.html>`__ in the *Amazon API Gateway Developer Guide*.
|
|
@@ -1,18 +1,86 @@
|
|
|
1
|
-
**To get a list of custom domain names**
|
|
1
|
+
**Example 1: To get a list of custom domain names**
|
|
2
2
|
|
|
3
|
-
|
|
3
|
+
The following ``get-domain-names`` command gets a list of domain names. ::
|
|
4
4
|
|
|
5
|
-
|
|
5
|
+
aws apigateway get-domain-names
|
|
6
6
|
|
|
7
7
|
Output::
|
|
8
8
|
|
|
9
|
-
|
|
10
|
-
|
|
11
|
-
|
|
12
|
-
|
|
13
|
-
|
|
14
|
-
|
|
15
|
-
|
|
16
|
-
|
|
17
|
-
|
|
18
|
-
|
|
9
|
+
{
|
|
10
|
+
"items": [
|
|
11
|
+
{
|
|
12
|
+
"distributionDomainName": "d9511k3l09bkd.cloudfront.net",
|
|
13
|
+
"certificateUploadDate": 1452812505,
|
|
14
|
+
"certificateName": "my_custom_domain-certificate",
|
|
15
|
+
"domainName": "subdomain.domain.tld"
|
|
16
|
+
}
|
|
17
|
+
]
|
|
18
|
+
}
|
|
19
|
+
|
|
20
|
+
For more information, see `Custom domain names for private APIs in API Gateway <https://docs.aws.amazon.com/apigateway/latest/developerguide/apigateway-private-custom-domains.html>`__ in the *Amazon API Gateway Developer Guide*.
|
|
21
|
+
|
|
22
|
+
**Example 2: To get a list of custom domain names owned by this AWS account**
|
|
23
|
+
|
|
24
|
+
The following ``get-domain-names`` command gets a list of domain names owned by this AWS account. ::
|
|
25
|
+
|
|
26
|
+
aws apigateway get-domain-names \
|
|
27
|
+
--resource-owner SELF
|
|
28
|
+
|
|
29
|
+
Output::
|
|
30
|
+
|
|
31
|
+
{
|
|
32
|
+
"items": [
|
|
33
|
+
{
|
|
34
|
+
"domainName": "my.domain.tld",
|
|
35
|
+
"domainNameArn": "arn:aws:apigateway:us-east-1::/domainnames/my.private.domain.tld",
|
|
36
|
+
"certificateUploadDate": "2024-08-15T17:02:55-07:00",
|
|
37
|
+
"regionalDomainName": "d-abcd1234.execute-api.us-east-1.amazonaws.com",
|
|
38
|
+
"regionalHostedZoneId": "Z1UJRXOUMOOFQ8",
|
|
39
|
+
"regionalCertificateArn": "arn:aws:acm:us-east-1:012345678910:certificate/fb1b9770-a305-495d-aefb-27e5e101ff3",
|
|
40
|
+
"endpointConfiguration": {
|
|
41
|
+
"types": [
|
|
42
|
+
"REGIONAL"
|
|
43
|
+
]
|
|
44
|
+
},
|
|
45
|
+
"domainNameStatus": "AVAILABLE",
|
|
46
|
+
"securityPolicy": "TLS_1_2"
|
|
47
|
+
},
|
|
48
|
+
{
|
|
49
|
+
"domainName": "my.private.domain.tld",
|
|
50
|
+
"domainNameId": "abcd1234",
|
|
51
|
+
"domainNameArn": "arn:aws:apigateway:us-east-1:012345678910:/domainnames/my.private.domain.tld+abcd1234",
|
|
52
|
+
"certificateArn": "arn:aws:acm:us-east-1:012345678910:certificate/fb1b9770-a305-495d-aefb-27e5e101ff3",
|
|
53
|
+
"certificateUploadDate": "2024-11-26T11:44:40-08:00",
|
|
54
|
+
"endpointConfiguration": {
|
|
55
|
+
"types": [
|
|
56
|
+
"PRIVATE"
|
|
57
|
+
]
|
|
58
|
+
},
|
|
59
|
+
"domainNameStatus": "AVAILABLE",
|
|
60
|
+
"securityPolicy": "TLS_1_2"
|
|
61
|
+
}
|
|
62
|
+
]
|
|
63
|
+
}
|
|
64
|
+
|
|
65
|
+
For more information, see `Custom domain names for private APIs in API Gateway <https://docs.aws.amazon.com/apigateway/latest/developerguide/apigateway-private-custom-domains.html>`__ in the *Amazon API Gateway Developer Guide*.
|
|
66
|
+
|
|
67
|
+
**Example 3: To get a list of custom domain names owned by other AWS accounts that you can create a domain name access association with.**
|
|
68
|
+
|
|
69
|
+
The following ``get-domain-names`` command gets a list of domain names owned by other AWS accounts that you have access to create a domain name access association with. ::
|
|
70
|
+
|
|
71
|
+
aws apigateway get-domain-names \
|
|
72
|
+
--resource-owner OTHER_ACCOUNTS
|
|
73
|
+
|
|
74
|
+
Output::
|
|
75
|
+
|
|
76
|
+
{
|
|
77
|
+
"items": [
|
|
78
|
+
{
|
|
79
|
+
"domainName": "my.private.domain.tld",
|
|
80
|
+
"domainNameId": "abcd1234",
|
|
81
|
+
"domainNameArn": "arn:aws:apigateway:us-east-1:012345678910:/domainnames/my.private.domain.tld+abcd1234"
|
|
82
|
+
}
|
|
83
|
+
]
|
|
84
|
+
}
|
|
85
|
+
|
|
86
|
+
For more information, see `Custom domain names for private APIs in API Gateway <https://docs.aws.amazon.com/apigateway/latest/developerguide/apigateway-private-custom-domains.html>`__ in the *Amazon API Gateway Developer Guide*.
|
|
@@ -0,0 +1,11 @@
|
|
|
1
|
+
**To reject a domain name access association**
|
|
2
|
+
|
|
3
|
+
The following ``reject-domain-name-access-association`` example rejects a domain name access association between a private custom domain name and VPC endpoint. ::
|
|
4
|
+
|
|
5
|
+
aws apigateway reject-domain-name-access-association \
|
|
6
|
+
--domain-name-access-association-arn arn:aws:apigateway:us-west-2:012345678910:/domainnameaccessassociations/domainname/my.private.domain.tld/vpcesource/vpce-abcd1234efg \
|
|
7
|
+
--domain-name-arn arn:aws:apigateway:us-east-1:012345678910:/domainnames/my.private.domain.tld+abcd1234
|
|
8
|
+
|
|
9
|
+
This command produces no output.
|
|
10
|
+
|
|
11
|
+
For more information, see `Custom domain names for private APIs in API Gateway <https://docs.aws.amazon.com/apigateway/latest/developerguide/apigateway-private-custom-domains.html>`__ in the *Amazon API Gateway Developer Guide*.
|
|
@@ -6,7 +6,7 @@ The following ``accept-invitation`` example shows how to accept an invitation to
|
|
|
6
6
|
--detector-id 12abc34d567e8fa901bc2d34eexample \
|
|
7
7
|
--master-id 123456789111 \
|
|
8
8
|
--invitation-id d6b94fb03a66ff665f7db8764example
|
|
9
|
-
|
|
9
|
+
|
|
10
10
|
This command produces no output.
|
|
11
11
|
|
|
12
|
-
For more information, see `Managing GuardDuty
|
|
12
|
+
For more information, see `Managing GuardDuty accounts by invitation <https://docs.aws.amazon.com/guardduty/latest/ug/guardduty_invitations.html>`__ in the GuardDuty User Guide.
|
|
@@ -1,11 +1,11 @@
|
|
|
1
1
|
**To archive findings in the current region**
|
|
2
2
|
|
|
3
|
-
This example shows how to archive findings in the current region. ::
|
|
3
|
+
This ``archive-findings`` example shows how to archive findings in the current region. ::
|
|
4
4
|
|
|
5
5
|
aws guardduty archive-findings \
|
|
6
6
|
--detector-id 12abc34d567e8fa901bc2d34eexample \
|
|
7
7
|
--finding-ids d6b94fb03a66ff665f7db8764example 3eb970e0de00c16ec14e6910fexample
|
|
8
8
|
|
|
9
|
-
This command produces no output.
|
|
9
|
+
This command produces no output.
|
|
10
10
|
|
|
11
|
-
For more information, see `
|
|
11
|
+
For more information, see `Creating suppression rules <https://docs.aws.amazon.com/guardduty/latest/ug/findings_suppression-rules-console.html>`__ in the *GuardDuty User Guide*.
|
|
@@ -1,17 +1,34 @@
|
|
|
1
|
-
**To create a new filter
|
|
1
|
+
**Example 1: To create a new filter in the current region**
|
|
2
2
|
|
|
3
|
-
|
|
3
|
+
The following ``create-filter`` example creates a filter that matches all Portscan findings for instance created from a specific image. This does not suppress those findings. ::
|
|
4
|
+
|
|
5
|
+
aws guardduty create-filter \
|
|
6
|
+
--detector-id b6b992d6d2f48e64bc59180bfexample \
|
|
7
|
+
--name myFilterExample \
|
|
8
|
+
--finding-criteria '{"Criterion": {"type": {"Eq": ["Recon:EC2/Portscan"]},"resource.instanceDetails.imageId": {"Eq": ["ami-0a7a207083example"]}}}'
|
|
9
|
+
|
|
10
|
+
Output::
|
|
11
|
+
|
|
12
|
+
{
|
|
13
|
+
"Name": "myFilterExample"
|
|
14
|
+
}
|
|
15
|
+
|
|
16
|
+
For more information, see `Filtering GuardDuty findings <https://docs.aws.amazon.com/guardduty/latest/ug/guardduty_filter-findings.html>`__ in the *GuardDuty User Guide*.
|
|
17
|
+
|
|
18
|
+
**Example 2: To create a new filter and suppress findings in the current region**
|
|
19
|
+
|
|
20
|
+
The following ``create-filter`` example creates a filter that matches all Portscan findings for instance created from a specific image. This filter archives those findings so that they do not appear in your current findings. ::
|
|
4
21
|
|
|
5
22
|
aws guardduty create-filter \
|
|
6
23
|
--detector-id b6b992d6d2f48e64bc59180bfexample \
|
|
7
24
|
--action ARCHIVE \
|
|
8
|
-
--name
|
|
25
|
+
--name myFilterSecondExample \
|
|
9
26
|
--finding-criteria '{"Criterion": {"type": {"Eq": ["Recon:EC2/Portscan"]},"resource.instanceDetails.imageId": {"Eq": ["ami-0a7a207083example"]}}}'
|
|
10
27
|
|
|
11
28
|
Output::
|
|
12
29
|
|
|
13
30
|
{
|
|
14
|
-
"Name": "
|
|
31
|
+
"Name": "myFilterSecondExample"
|
|
15
32
|
}
|
|
16
33
|
|
|
17
|
-
For more information, see `Filtering findings <https://docs.aws.amazon.com/guardduty/latest/ug/guardduty_filter-findings.html>`__ in the *GuardDuty User Guide*.
|
|
34
|
+
For more information, see `Filtering GuardDuty findings <https://docs.aws.amazon.com/guardduty/latest/ug/guardduty_filter-findings.html>`__ in the *GuardDuty User Guide*.
|
|
@@ -1,18 +1,18 @@
|
|
|
1
|
-
**To create a trusted IP set**
|
|
1
|
+
**To create and activate a trusted IP set**
|
|
2
2
|
|
|
3
|
-
The following ``create-ip-set`` example creates and activates a trusted IP set in the current
|
|
3
|
+
The following ``create-ip-set`` example creates and activates a trusted IP set in the current Region. ::
|
|
4
4
|
|
|
5
5
|
aws guardduty create-ip-set \
|
|
6
6
|
--detector-id 12abc34d567e8fa901bc2d34eexample \
|
|
7
|
-
--name new-ip-set \
|
|
8
|
-
--format TXT
|
|
9
|
-
--location s3://amzn-s3-demo-bucket/customtrustlist.csv
|
|
7
|
+
--name new-ip-set-example \
|
|
8
|
+
--format TXT \
|
|
9
|
+
--location s3://amzn-s3-demo-bucket/customtrustlist.csv \
|
|
10
10
|
--activate
|
|
11
11
|
|
|
12
12
|
Output::
|
|
13
|
-
|
|
13
|
+
|
|
14
14
|
{
|
|
15
15
|
"IpSetId": "d4b94fc952d6912b8f3060768example"
|
|
16
16
|
}
|
|
17
17
|
|
|
18
|
-
For more information, see `Working with Trusted IP Lists and Threat Lists <https://docs.aws.amazon.com/guardduty/latest/ug/guardduty_upload_lists.html>`__ in the GuardDuty User Guide
|
|
18
|
+
For more information, see `Working with Trusted IP Lists and Threat Lists <https://docs.aws.amazon.com/guardduty/latest/ug/guardduty_upload_lists.html>`__ in the *GuardDuty User Guide*.
|
|
@@ -1,11 +1,11 @@
|
|
|
1
1
|
**To create a publishing destination to export GuardDuty findings in the current region to.**
|
|
2
2
|
|
|
3
|
-
|
|
3
|
+
The following ``create-publishing-destination`` example shows how to set up a publishing destination to export current (not archived) GuardDuty findings to keep track of historical findings data. ::
|
|
4
4
|
|
|
5
5
|
aws guardduty create-publishing-destination \
|
|
6
6
|
--detector-id b6b992d6d2f48e64bc59180bfexample \
|
|
7
7
|
--destination-type S3 \
|
|
8
|
-
--destination-properties DestinationArn=arn:aws:s3:::
|
|
8
|
+
--destination-properties 'DestinationArn=arn:aws:s3:::amzn-s3-demo-bucket,KmsKeyArn=arn:aws:kms:us-west-1:111122223333:key/84cee9c5-dea1-401a-ab6d-e1de7example'
|
|
9
9
|
|
|
10
10
|
Output::
|
|
11
11
|
|
|
@@ -13,4 +13,4 @@ Output::
|
|
|
13
13
|
"DestinationId": "46b99823849e1bbc242dfbe3cexample"
|
|
14
14
|
}
|
|
15
15
|
|
|
16
|
-
For more information, see `Exporting findings <https://docs.aws.amazon.com/guardduty/latest/ug/guardduty_exportfindings.html>`__ in the *GuardDuty User Guide*.
|
|
16
|
+
For more information, see `Exporting generated GuardDuty findings to Amazon S3 buckets <https://docs.aws.amazon.com/guardduty/latest/ug/guardduty_exportfindings.html>`__ in the *GuardDuty User Guide*.
|
|
@@ -1,12 +1,12 @@
|
|
|
1
|
-
**To create a new threat intel set
|
|
1
|
+
**To create and activate a new threat intel set**
|
|
2
2
|
|
|
3
|
-
|
|
3
|
+
The following ``create-threat-intel-set`` example creates and activates a threat intel set in the current Region. ::
|
|
4
4
|
|
|
5
5
|
aws guardduty create-threat-intel-set \
|
|
6
6
|
--detector-id b6b992d6d2f48e64bc59180bfexample \
|
|
7
|
-
--name myThreatSet \
|
|
7
|
+
--name myThreatSet-example \
|
|
8
8
|
--format TXT \
|
|
9
|
-
--location s3://
|
|
9
|
+
--location s3://amzn-s3-demo-bucket/threatlist.csv \
|
|
10
10
|
--activate
|
|
11
11
|
|
|
12
12
|
Output::
|
|
@@ -15,4 +15,4 @@ Output::
|
|
|
15
15
|
"ThreatIntelSetId": "20b9a4691aeb33506b808878cexample"
|
|
16
16
|
}
|
|
17
17
|
|
|
18
|
-
For more information, see `Trusted IP and
|
|
18
|
+
For more information, see `Working with Trusted IP Lists and Threat Lists <https://docs.aws.amazon.com/guardduty/latest/ug/guardduty_upload_lists.html>`__ in the *GuardDuty User Guide*.
|
|
@@ -1,10 +1,10 @@
|
|
|
1
|
-
**To disassociate from your current
|
|
1
|
+
**To disassociate from your current administrator account in the current region**
|
|
2
2
|
|
|
3
|
-
The following ``disassociate-from-master-account`` example dissassociates your account from the current GuardDuty
|
|
3
|
+
The following ``disassociate-from-master-account`` example dissassociates your account from the current GuardDuty administrator account in the current AWS region. ::
|
|
4
4
|
|
|
5
5
|
aws guardduty disassociate-from-master-account \
|
|
6
6
|
--detector-id d4b040365221be2b54a6264dcexample
|
|
7
7
|
|
|
8
8
|
This command produces no output.
|
|
9
9
|
|
|
10
|
-
For more information, see `Understanding the
|
|
10
|
+
For more information, see `Understanding the relationship between GuardDuty administrator account and member accounts <https://docs.aws.amazon.com/guardduty/latest/ug/administrator_member_relationships.html>`__ in the *GuardDuty User Guide*.
|
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
**To list get details on a specified trusted IP set**
|
|
2
2
|
|
|
3
|
-
The following ``get-ip-set`` example shows the status and details of the
|
|
3
|
+
The following ``get-ip-set`` example shows the status and details of the specified trusted IP set. ::
|
|
4
4
|
|
|
5
5
|
aws guardduty get-ip-set \
|
|
6
6
|
--detector-id 12abc34d567e8fa901bc2d34eexample \
|
|
@@ -13,7 +13,7 @@ Output::
|
|
|
13
13
|
"Location": "s3://amzn-s3-demo-bucket.s3-us-west-2.amazonaws.com/customlist.csv",
|
|
14
14
|
"Tags": {},
|
|
15
15
|
"Format": "TXT",
|
|
16
|
-
"Name": "test-ip-set"
|
|
16
|
+
"Name": "test-ip-set-example"
|
|
17
17
|
}
|
|
18
18
|
|
|
19
|
-
For more information, see `Working with Trusted IP Lists and Threat Lists <https://docs.aws.amazon.com/guardduty/latest/ug/guardduty_upload_lists.html>`__ in the GuardDuty User Guide
|
|
19
|
+
For more information, see `Working with Trusted IP Lists and Threat Lists <https://docs.aws.amazon.com/guardduty/latest/ug/guardduty_upload_lists.html>`__ in the *GuardDuty User Guide*.
|
|
@@ -12,8 +12,8 @@ Output::
|
|
|
12
12
|
"InvitationId": "04b94d9704854a73f94e061e8example",
|
|
13
13
|
"InvitedAt": "2020-06-09T22:23:04.970Z",
|
|
14
14
|
"RelationshipStatus": "Enabled",
|
|
15
|
-
"AccountId": "
|
|
15
|
+
"AccountId": "111122223333"
|
|
16
16
|
}
|
|
17
17
|
}
|
|
18
18
|
|
|
19
|
-
For more information, see `Understanding the
|
|
19
|
+
For more information, see `Understanding the relationship between GuardDuty administrator account and member account <https://docs.aws.amazon.com/guardduty/latest/ug/administrator_member_relationships.html>`__ in the *GuardDuty User Guide*.
|
|
@@ -1,24 +1,51 @@
|
|
|
1
|
-
**To list
|
|
1
|
+
**Example 1: To list only current members in the current Region**
|
|
2
2
|
|
|
3
|
-
The following ``list-members`` example lists
|
|
3
|
+
The following ``list-members`` example lists and provides details of only current member accounts associated with the GuardDuty administrator account, in the current region. ::
|
|
4
4
|
|
|
5
5
|
aws guardduty list-members \
|
|
6
|
-
--detector-id 12abc34d567e8fa901bc2d34eexample
|
|
6
|
+
--detector-id 12abc34d567e8fa901bc2d34eexample \
|
|
7
|
+
--only-associated="true"
|
|
7
8
|
|
|
8
9
|
Output::
|
|
9
|
-
|
|
10
|
+
|
|
10
11
|
{
|
|
11
12
|
"Members": [
|
|
12
13
|
{
|
|
13
14
|
"RelationshipStatus": "Enabled",
|
|
14
15
|
"InvitedAt": "2020-06-09T22:49:00.910Z",
|
|
15
|
-
"MasterId": "
|
|
16
|
+
"MasterId": "111122223333",
|
|
16
17
|
"DetectorId": "7ab8b2f61b256c87f793f6a86example",
|
|
17
18
|
"UpdatedAt": "2020-06-09T23:08:22.512Z",
|
|
18
19
|
"Email": "your+member@example.com",
|
|
19
|
-
"AccountId": "
|
|
20
|
+
"AccountId": "123456789012"
|
|
21
|
+
}
|
|
22
|
+
]
|
|
23
|
+
}
|
|
24
|
+
|
|
25
|
+
For more information, see `Understanding the relationship between GuardDuty administrator account and member accounts <https://docs.aws.amazon.com/guardduty/latest/ug/administrator_member_relationships.html>`__ in the *GuardDuty User Guide*.
|
|
26
|
+
|
|
27
|
+
**Example 2: To list all the members in the current Region**
|
|
28
|
+
|
|
29
|
+
The following ``list-members`` example lists and provides details of all the member accounts, including those who have been disassociated or have not yet accepted the invite from the GuardDuty administrator, in the current region. ::
|
|
30
|
+
|
|
31
|
+
aws guardduty list-members \
|
|
32
|
+
--detector-id 12abc34d567e8fa901bc2d34eexample \
|
|
33
|
+
--only-associated="false"
|
|
34
|
+
|
|
35
|
+
Output::
|
|
36
|
+
|
|
37
|
+
{
|
|
38
|
+
"Members": [
|
|
39
|
+
{
|
|
40
|
+
"RelationshipStatus": "Enabled",
|
|
41
|
+
"InvitedAt": "2020-06-09T22:49:00.910Z",
|
|
42
|
+
"MasterId": "111122223333",
|
|
43
|
+
"DetectorId": "7ab8b2f61b256c87f793f6a86example",
|
|
44
|
+
"UpdatedAt": "2020-06-09T23:08:22.512Z",
|
|
45
|
+
"Email": "your+other+member@example.com",
|
|
46
|
+
"AccountId": "555555555555"
|
|
20
47
|
}
|
|
21
48
|
]
|
|
22
49
|
}
|
|
23
50
|
|
|
24
|
-
For more information, see `Understanding the
|
|
51
|
+
For more information, see `Understanding the relationship between GuardDuty administrator account and member accounts <https://docs.aws.amazon.com/guardduty/latest/ug/administrator_member_relationships.html>`__ in the *GuardDuty User Guide*.
|
|
@@ -9,4 +9,4 @@ The following ``update-ip-set`` example shows how to update the details of a tru
|
|
|
9
9
|
|
|
10
10
|
This command produces no output.
|
|
11
11
|
|
|
12
|
-
For more information, see `Working with Trusted IP Lists and Threat Lists <https://docs.aws.amazon.com/guardduty/latest/ug/guardduty_upload_lists.html>`__ in the GuardDuty User Guide
|
|
12
|
+
For more information, see `Working with Trusted IP Lists and Threat Lists <https://docs.aws.amazon.com/guardduty/latest/ug/guardduty_upload_lists.html>`__ in the *GuardDuty User Guide*.
|
|
@@ -2,9 +2,9 @@
|
|
|
2
2
|
|
|
3
3
|
The following ``deregister-managed-instance`` example deregisters the specified managed instance. ::
|
|
4
4
|
|
|
5
|
-
aws ssm deregister-managed-instance
|
|
6
|
-
--instance-id
|
|
5
|
+
aws ssm deregister-managed-instance \
|
|
6
|
+
--instance-id 'mi-08ab247cdfEXAMPLE'
|
|
7
7
|
|
|
8
8
|
This command produces no output.
|
|
9
9
|
|
|
10
|
-
For more information, see `Deregistering
|
|
10
|
+
For more information, see `Deregistering managed nodes in a hybrid and multicloud environment <https://docs.aws.amazon.com/systems-manager/latest/userguide/fleet-manager-deregister-hybrid-nodes.html>`__ in the *AWS Systems Manager User Guide*.
|
|
@@ -1,12 +1,12 @@
|
|
|
1
|
-
**
|
|
1
|
+
**To create a policy template**
|
|
2
2
|
|
|
3
3
|
The following ``create-policy-template`` example creates a policy template with a statement that contains a placeholder for the principal. ::
|
|
4
4
|
|
|
5
5
|
aws verifiedpermissions create-policy-template \
|
|
6
|
-
--
|
|
6
|
+
--statement file://template1.txt \
|
|
7
7
|
--policy-store-id PSEXAMPLEabcdefg111111
|
|
8
8
|
|
|
9
|
-
Contents of
|
|
9
|
+
Contents of ``template1.txt``::
|
|
10
10
|
|
|
11
11
|
permit(
|
|
12
12
|
principal in ?principal,
|
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
Metadata-Version: 2.1
|
|
2
2
|
Name: awscli
|
|
3
|
-
Version: 1.36.
|
|
3
|
+
Version: 1.36.38
|
|
4
4
|
Summary: Universal Command Line Environment for AWS.
|
|
5
5
|
Home-page: http://aws.amazon.com/cli/
|
|
6
6
|
Author: Amazon Web Services
|
|
@@ -23,7 +23,7 @@ Classifier: Programming Language :: Python :: 3.11
|
|
|
23
23
|
Classifier: Programming Language :: Python :: 3.12
|
|
24
24
|
Requires-Python: >= 3.8
|
|
25
25
|
License-File: LICENSE.txt
|
|
26
|
-
Requires-Dist: botocore (==1.35.
|
|
26
|
+
Requires-Dist: botocore (==1.35.97)
|
|
27
27
|
Requires-Dist: docutils (<0.17,>=0.10)
|
|
28
28
|
Requires-Dist: s3transfer (<0.11.0,>=0.10.0)
|
|
29
29
|
Requires-Dist: PyYAML (<6.1,>=3.10)
|
|
@@ -1,4 +1,4 @@
|
|
|
1
|
-
awscli/__init__.py,sha256=
|
|
1
|
+
awscli/__init__.py,sha256=mKzuFllD7SJBACIeO75bB9OQSiPw8iPq7U_iwQf4E5I,1534
|
|
2
2
|
awscli/__main__.py,sha256=iBjOg0tBxNlhzTi_tyc1G0SMGBvHMVvBJzX3JqYaooY,662
|
|
3
3
|
awscli/alias.py,sha256=Us9pvP8Zplbr1W4N3rE5gxicWLqlRG3l_9VPskxafgs,11313
|
|
4
4
|
awscli/argparser.py,sha256=3Pxx-vWytdV985Y6MIl9DeutUXyehIvACIs_PDby8GI,7650
|
|
@@ -283,7 +283,8 @@ awscli/examples/apigateway/create-api-key.rst,sha256=631sPtUi7lgga18sFdvoUk-f6dS
|
|
|
283
283
|
awscli/examples/apigateway/create-authorizer.rst,sha256=VfiVCYl9nHM3XK1LCXMv_7Pd8XKyV0wN7qXQoFbBnnM,2961
|
|
284
284
|
awscli/examples/apigateway/create-base-path-mapping.rst,sha256=-kIRisT9ZpLGq3uDVcA4gFJ1_inCsLt2RygiGz6vVE4,203
|
|
285
285
|
awscli/examples/apigateway/create-deployment.rst,sha256=dBI2w2yTB4xvnnNMCPFBIgk_uPj2SEwElgeSTsAp1Vk,724
|
|
286
|
-
awscli/examples/apigateway/create-domain-name.rst,sha256=
|
|
286
|
+
awscli/examples/apigateway/create-domain-name-access-association.rst,sha256=PzMiD8RhHRabPihOgbefpcPOrM8MIBGe78IfY_0U4s0,1129
|
|
287
|
+
awscli/examples/apigateway/create-domain-name.rst,sha256=umiIlXFXZdHID2cbTq_q5vtKrnnMBFLb-gyteez0rYc,3758
|
|
287
288
|
awscli/examples/apigateway/create-model.rst,sha256=YdySmCiq4jBTLTQn40GfttR10RXNb0IOpTUXv_Vy7uI,804
|
|
288
289
|
awscli/examples/apigateway/create-resource.rst,sha256=PqxSPtwKQjp2UeKl-7Tuide8HSoaVKMdByaeyw-vZVo,151
|
|
289
290
|
awscli/examples/apigateway/create-rest-api.rst,sha256=nmzAIZWf0h9pYpTYTkpMO9fxOB50WSfQp5FPSD90Guo,323
|
|
@@ -295,6 +296,7 @@ awscli/examples/apigateway/delete-authorizer.rst,sha256=rRnhQpPcBFRQquYh3veihLnk
|
|
|
295
296
|
awscli/examples/apigateway/delete-base-path-mapping.rst,sha256=BwX-C_3gicZswKc_iL2mXiF86Xe_BFaEkvSR1SIfkVQ,162
|
|
296
297
|
awscli/examples/apigateway/delete-client-certificate.rst,sha256=xaqSCQAgV_LkVOHD2PxoKp_0BOl99HMjvLtyh3RQItI,121
|
|
297
298
|
awscli/examples/apigateway/delete-deployment.rst,sha256=p18PJ5pGWkFYeOjlwfLZ2KTNuAIB9xKjZPsaWZYiYrc,132
|
|
299
|
+
awscli/examples/apigateway/delete-domain-name-access-association.rst,sha256=YpKKKRAYSu2VmJIJbMSCzzVTnUoCJSoVd56feSaCRzQ,713
|
|
298
300
|
awscli/examples/apigateway/delete-domain-name.rst,sha256=zsSM-UwTbN_cbpxNo1aJb9S3o6RdkzT-FZvxx31vXH0,114
|
|
299
301
|
awscli/examples/apigateway/delete-integration-response.rst,sha256=nq71k0va3X0OMHZKejXoMzBerfWx_waqOYQY2P3YiEE,233
|
|
300
302
|
awscli/examples/apigateway/delete-integration.rst,sha256=d7jjFudpuWKiobH-o3jO-4RqvVEj3-uZ6-1vZC0t7fk,183
|
|
@@ -320,8 +322,9 @@ awscli/examples/apigateway/get-client-certificate.rst,sha256=vDTA_vsIDDXDz4ZhQKK
|
|
|
320
322
|
awscli/examples/apigateway/get-client-certificates.rst,sha256=tXvCkw9U0vojVgicn37IfTIK4wxPtFIpf3casFjd6J0,470
|
|
321
323
|
awscli/examples/apigateway/get-deployment.rst,sha256=V7p0C7wGkLe3zOvgOWcfGbHYwbeYXwime6a94-9NECQ,244
|
|
322
324
|
awscli/examples/apigateway/get-deployments.rst,sha256=613M91R_Q-Pq9hkhpmAiZ3eesGpYdnRKDm7KHZzEgrY,326
|
|
323
|
-
awscli/examples/apigateway/get-domain-name.rst,sha256=
|
|
324
|
-
awscli/examples/apigateway/get-domain-
|
|
325
|
+
awscli/examples/apigateway/get-domain-name-access-associations.rst,sha256=L6lEzlEdQW2hyBFn3RZa0F7tIqjydKzr-eJINY_56HQ,1976
|
|
326
|
+
awscli/examples/apigateway/get-domain-name.rst,sha256=1N2xJbtpx-kAMm3lY8lbk1gxHaJIdkWsMss-gsF_SC0,2277
|
|
327
|
+
awscli/examples/apigateway/get-domain-names.rst,sha256=313XPVJslT-NdC4IWZGkGgT-HN2Ll_b1VbwJxd1h8O8,3623
|
|
325
328
|
awscli/examples/apigateway/get-export.rst,sha256=y17CLlXEoUzSPOFc0fU6KfxzFAmNsNjHS88wxxqSKGs,650
|
|
326
329
|
awscli/examples/apigateway/get-integration-response.rst,sha256=1nwegleU3yXr3F0gjESHTV8SwxAPD5ZEL5TITcViPGc,360
|
|
327
330
|
awscli/examples/apigateway/get-integration.rst,sha256=4Y2-VXhWCAJHBia-FSKdFyYHu2ahRAoX7fel6O5Ozqg,696
|
|
@@ -348,6 +351,7 @@ awscli/examples/apigateway/put-integration.rst,sha256=XDuryx2rir4gSQAtp6m1lfdzBE
|
|
|
348
351
|
awscli/examples/apigateway/put-method-response.rst,sha256=G9ABN6h89ARvT3mnfXTmTQijgMOM7NQrpfQbt3qBee0,299
|
|
349
352
|
awscli/examples/apigateway/put-method.rst,sha256=RFhgMBN0u5_hZy069HXeQUkASdDNJ0V8iOfoQnNQ29M,337
|
|
350
353
|
awscli/examples/apigateway/put-rest-api.rst,sha256=2XsaktctKvjdMu9FJan6UI5WASpvYRC0YgD6RW-t8dU,380
|
|
354
|
+
awscli/examples/apigateway/reject-domain-name-access-association.rst,sha256=_gv-oxPGHqZtQuEhJTR-rFfUhw44JnpHnHO2GtrjKNE,827
|
|
351
355
|
awscli/examples/apigateway/test-invoke-authorizer.rst,sha256=ZzPohdJUR0yHs7QaMyChSZXBKxYDRiWcXV28hZRPfe0,224
|
|
352
356
|
awscli/examples/apigateway/test-invoke-method.rst,sha256=WPS8b6WN9mLJMrAZxfBJFwmJLZDY3EV9I278gNSY3fU,470
|
|
353
357
|
awscli/examples/apigateway/update-account.rst,sha256=Lq8ycj0aOfPAN0nH6T1EK44LMaxtz2j4dKrlD7NIjys,435
|
|
@@ -2963,30 +2967,30 @@ awscli/examples/greengrassv2/list-tags-for-resource.rst,sha256=Cb0WcS5-fldaZXSOY
|
|
|
2963
2967
|
awscli/examples/greengrassv2/tag-resource.rst,sha256=MFQElQfZudpjXRXLz85lOxPMBV__bV7XFxxjyKi1sIQ,595
|
|
2964
2968
|
awscli/examples/greengrassv2/untag-resource.rst,sha256=XpP-G2Xq-p-tFEE90ppzc8LnTwiAlGG6mfYrsLcx8vo,520
|
|
2965
2969
|
awscli/examples/greengrassv2/update-connectivity-info.rst,sha256=SkVizTEVaP5IDoWm8kbcjoNIdTPB1AK45uCFnrPJywY,1006
|
|
2966
|
-
awscli/examples/guardduty/accept-invitation.rst,sha256=
|
|
2967
|
-
awscli/examples/guardduty/archive-findings.rst,sha256=
|
|
2970
|
+
awscli/examples/guardduty/accept-invitation.rst,sha256=SXdXbzBI4koqMayn1eZhp_XIIyQkB_aEbfOdc0cMV3Q,644
|
|
2971
|
+
awscli/examples/guardduty/archive-findings.rst,sha256=g2K6NAHLQv32MJlOXVOONN5wch-BMdoeuu1-se_s2so,544
|
|
2968
2972
|
awscli/examples/guardduty/create-detector.rst,sha256=avBHR6_EUrvA3_wmbSxLqEntT_-wk5Jgws1mBOIbVhQ,474
|
|
2969
|
-
awscli/examples/guardduty/create-filter.rst,sha256=
|
|
2970
|
-
awscli/examples/guardduty/create-ip-set.rst,sha256=
|
|
2973
|
+
awscli/examples/guardduty/create-filter.rst,sha256=HqHZO6K1sTup1o8OUqO2AXdIjMz-RLl3CDCtgbQcx0w,1644
|
|
2974
|
+
awscli/examples/guardduty/create-ip-set.rst,sha256=T0Dxi5C1YOHqvGc-I_v9N5bphtnPdrGfzziIE3Qy6H8,667
|
|
2971
2975
|
awscli/examples/guardduty/create-members.rst,sha256=P8zGKPP5wRq1SVnv1XC7vHAiKtR-6wa32zCJdwPgPEg,664
|
|
2972
|
-
awscli/examples/guardduty/create-publishing-destination.rst,sha256=
|
|
2976
|
+
awscli/examples/guardduty/create-publishing-destination.rst,sha256=E6NZrgijSlr0oLUcXXanKNy_I2dxiMo1Y4DQH3OT_Gs,902
|
|
2973
2977
|
awscli/examples/guardduty/create-sample-findings.rst,sha256=tHNU78Uo29CE0XFp6KorMQN9IrvrfbhiToK2h6QuaoI,522
|
|
2974
|
-
awscli/examples/guardduty/create-threat-intel-set.rst,sha256=
|
|
2978
|
+
awscli/examples/guardduty/create-threat-intel-set.rst,sha256=Potsm2HdCab1OoQnPL0AsXU-0JYQPsbzi7oO8b6lu-g,702
|
|
2975
2979
|
awscli/examples/guardduty/decline-invitations.rst,sha256=HVilJaU0XdnMRKHuyOuSKhc6-bzPxeBWBF9JlGj5KYU,485
|
|
2976
2980
|
awscli/examples/guardduty/delete-detector.rst,sha256=FGU6oTZYCQrq3TUB-IJLRMNa9UOeC9Eg5FRsKB8RBic,520
|
|
2977
2981
|
awscli/examples/guardduty/delete-filter.rst,sha256=xMix3FPFn4l-phwi5zq1_BfLH2VN09KDaOS8VgUq9LM,440
|
|
2978
2982
|
awscli/examples/guardduty/disable-organization-admin-account.rst,sha256=uucqE1J3IeKg5FJhRloUM5J2QrnySGIgwwfg6LDfcXI,509
|
|
2979
|
-
awscli/examples/guardduty/disassociate-from-master-account.rst,sha256=
|
|
2983
|
+
awscli/examples/guardduty/disassociate-from-master-account.rst,sha256=Q9Kt5iqpeVRzg-6AptKfK6eL2U1PdruteP1MNQtnRyc,646
|
|
2980
2984
|
awscli/examples/guardduty/get-detector.rst,sha256=0z0TEdRaxhz5_86dzXU8LXcaKFqrNsE2Sl9d3fm6Ajw,773
|
|
2981
2985
|
awscli/examples/guardduty/get-findings.rst,sha256=cYCDtX9lfqYH6SdedR6gqL3nYBjXlHgaaKjSPyLIkMU,3582
|
|
2982
|
-
awscli/examples/guardduty/get-ip-set.rst,sha256=
|
|
2983
|
-
awscli/examples/guardduty/get-master-account.rst,sha256=
|
|
2986
|
+
awscli/examples/guardduty/get-ip-set.rst,sha256=YLIJe5ZLTccxtxLANLqJyjh_6r60JfYqJTFcEEj95Wk,733
|
|
2987
|
+
awscli/examples/guardduty/get-master-account.rst,sha256=P0djfO2mlY3Dn3lX2F5K2Dp7_0qzKlUNBNdJ8_lbzDI,839
|
|
2984
2988
|
awscli/examples/guardduty/list-detectors.rst,sha256=mS_LlpWnMBUY1Z8549tlJvYm6IcVEVk0WySRZEljC3U,475
|
|
2985
2989
|
awscli/examples/guardduty/list-findings.rst,sha256=yu5uxPGSgetbYBelRSpdn8McwjVGd5XHF8t9H-wDIvA,2753
|
|
2986
2990
|
awscli/examples/guardduty/list-invitations.rst,sha256=GpX4-DIf2p58TABjsBtWb1Xjx5BOYRyZ4MyUsdlkqK4,785
|
|
2987
2991
|
awscli/examples/guardduty/list-ip-sets.rst,sha256=HkL1ZEeOM_szNmk8V5ZEiWBsX6Zp18UFbO69rHo6X4k,542
|
|
2988
|
-
awscli/examples/guardduty/list-members.rst,sha256=
|
|
2989
|
-
awscli/examples/guardduty/update-ip-set.rst,sha256=
|
|
2992
|
+
awscli/examples/guardduty/list-members.rst,sha256=JjQ75i7EdPEFzqaneD5Oo0Pk7u91Sa8G4bWpJwmgm4g,2236
|
|
2993
|
+
awscli/examples/guardduty/update-ip-set.rst,sha256=_AlsG9W6mBgPCQDP8D1GBwd92IwkzvNf_HsWNeSKC0I,603
|
|
2990
2994
|
awscli/examples/health/describe-affected-entities.rst,sha256=rBj9YxiiMS0Osum6MFLORoOOddWZEN0Wjh7OHJxKhpU,1140
|
|
2991
2995
|
awscli/examples/health/describe-event-details.rst,sha256=d83e2wiNidiOqdzkt-nCp6o4KIqLCU7J2S2UvVFR20c,1692
|
|
2992
2996
|
awscli/examples/health/describe-events.rst,sha256=ubZzwAjHmWMmkl1FEYgFOfUf55a3_LbcudOe0s7sQsI,8598
|
|
@@ -5519,7 +5523,7 @@ awscli/examples/ssm/delete-parameter.rst,sha256=PIxDfSVg3W_wIWUF6hgPLnobU1LmhxHm
|
|
|
5519
5523
|
awscli/examples/ssm/delete-parameters.rst,sha256=V3w9f4m16PsNVwwm8c49KJ79E0Dr38nyrrvRmc6QL1o,655
|
|
5520
5524
|
awscli/examples/ssm/delete-patch-baseline.rst,sha256=jI_UytRkDTFvGMsuCTu_wW4e_kpQJ_ucCkq-R5ZCQ2c,501
|
|
5521
5525
|
awscli/examples/ssm/delete-resource-data-sync.rst,sha256=_evf5S4D72r5KaxlrRVhg6zNh4iqRHZm6Q2n_unbe0U,208
|
|
5522
|
-
awscli/examples/ssm/deregister-managed-instance.rst,sha256=
|
|
5526
|
+
awscli/examples/ssm/deregister-managed-instance.rst,sha256=f3RDfInIIZwqlFDBx2v-Di-iXksZhbhONxedoO45_M8,516
|
|
5523
5527
|
awscli/examples/ssm/deregister-patch-baseline-for-patch-group.rst,sha256=wCsoDnI59ZG2j13jekM2Ixnho6HI7Q1TURII_E4ZMTE,662
|
|
5524
5528
|
awscli/examples/ssm/deregister-target-from-maintenance-window.rst,sha256=hlakJmAitCaiGVtwGCt-YzXe5zdrqFYoC4ghZyLeF8A,720
|
|
5525
5529
|
awscli/examples/ssm/deregister-task-from-maintenance-window.rst,sha256=yAaRgyFh_4rPx6X1_7PUb6inpuJ91elNIvd3MzVAl0M,715
|
|
@@ -5766,7 +5770,7 @@ awscli/examples/trustedadvisor/update-organization-recommendation-lifecycle.rst,
|
|
|
5766
5770
|
awscli/examples/trustedadvisor/update-recommendation-lifecycle.rst,sha256=MU-6cscJB2b6lSminNIMtX2ybuxd30NI4xfbn61HPr4,680
|
|
5767
5771
|
awscli/examples/verifiedpermissions/create-identity-source.rst,sha256=FnVKwJK-4OE0icElySSycc-CIdke0qtlfW195pa5zWw,1223
|
|
5768
5772
|
awscli/examples/verifiedpermissions/create-policy-store.rst,sha256=LEZn-xrZ16_m_ZVtUyWmXgJVXdHqvynw3shOf3dtqOU,742
|
|
5769
|
-
awscli/examples/verifiedpermissions/create-policy-template.rst,sha256=
|
|
5773
|
+
awscli/examples/verifiedpermissions/create-policy-template.rst,sha256=lOx8FlpibgyvJFS8IdGeJNqSpJ8-MZabkIFkYNG50go,975
|
|
5770
5774
|
awscli/examples/verifiedpermissions/create-policy.rst,sha256=m7ynEiQaaiL3uezo4gWMUDm_Hi9Y1w4k0rg0-LEna-k,3502
|
|
5771
5775
|
awscli/examples/verifiedpermissions/delete-identity-source.rst,sha256=nQh2Xh1cnpv8hfYIlwGwkp9e2Vrso5gmkpLEdlUyFao,583
|
|
5772
5776
|
awscli/examples/verifiedpermissions/delete-policy-store.rst,sha256=bUjKWUE2_wvzRYhpq1wadJJKcKtWJRHcZ5BekJVS9yU,492
|
|
@@ -5992,13 +5996,13 @@ awscli/topics/return-codes.rst,sha256=d9lpNFZwD75IiYcDEADQzu-4QiR8P28UPHkrNwPV5J
|
|
|
5992
5996
|
awscli/topics/s3-config.rst,sha256=FwwCczTylrSLwELuDQ-VA8sCI7ruwV9PEJJrqxjUeG0,11502
|
|
5993
5997
|
awscli/topics/s3-faq.rst,sha256=sS5jKHF_7X5eiGwpUg7aTqQt2zCRN-m_xXOcE0Bme0Q,1899
|
|
5994
5998
|
awscli/topics/topic-tags.json,sha256=6lUSrs3FKCZNRSQMnjcXNgWyRNGjZIeur1988a4IO5o,1577
|
|
5995
|
-
awscli-1.36.
|
|
5996
|
-
awscli-1.36.
|
|
5997
|
-
awscli-1.36.
|
|
5998
|
-
awscli-1.36.
|
|
5999
|
-
awscli-1.36.
|
|
6000
|
-
awscli-1.36.
|
|
6001
|
-
awscli-1.36.
|
|
6002
|
-
awscli-1.36.
|
|
6003
|
-
awscli-1.36.
|
|
6004
|
-
awscli-1.36.
|
|
5999
|
+
awscli-1.36.38.data/scripts/aws,sha256=r24FExgs0-JjILTQ3XZAqXBYE4SV6UMTtALkLGAj86g,805
|
|
6000
|
+
awscli-1.36.38.data/scripts/aws.cmd,sha256=s46DkC6LNgX63CIkzxxbPnFMJ6DRDBkvc88GnWa8Pvg,1432
|
|
6001
|
+
awscli-1.36.38.data/scripts/aws_bash_completer,sha256=RRpoEGJRagRzyHZKZZOwpltuVYv2EoiZsdXhmyWPZ54,204
|
|
6002
|
+
awscli-1.36.38.data/scripts/aws_completer,sha256=oC9kuMDlWE47dWk_4xjPde2PQvN-M0vND0J4YSLabVQ,1126
|
|
6003
|
+
awscli-1.36.38.data/scripts/aws_zsh_completer.sh,sha256=Qm6Z8ejNAMzpJjaT0pzqxbSDT2zxdmzVe5haRA7qLoc,1808
|
|
6004
|
+
awscli-1.36.38.dist-info/LICENSE.txt,sha256=o5XhFlwu0OK_BBrijlKCRa7dQAm36UrUB3gCV_cEr8E,549
|
|
6005
|
+
awscli-1.36.38.dist-info/METADATA,sha256=1YtVTtrUnwjHHKWTmgIwMZ1DepvliUJQwO_3kPRkDuA,11331
|
|
6006
|
+
awscli-1.36.38.dist-info/WHEEL,sha256=GV9aMThwP_4oNCtvEC2ec3qUYutgWeAzklro_0m4WJQ,91
|
|
6007
|
+
awscli-1.36.38.dist-info/top_level.txt,sha256=vt9wXFr1_nGYK6abhJgt6zY3fULe4JSZedm_5XOM9S0,7
|
|
6008
|
+
awscli-1.36.38.dist-info/RECORD,,
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|