awscli 1.38.11__py3-none-any.whl → 1.38.13__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of awscli might be problematic. Click here for more details.
- awscli/__init__.py +1 -1
- awscli/customizations/globalargs.py +5 -13
- awscli/examples/cognito-idp/tag-resource.rst +11 -0
- awscli/examples/cognito-idp/untag-resource.rst +11 -0
- awscli/examples/cognito-idp/update-identity-provider.rst +71 -0
- awscli/examples/cognito-idp/update-managed-login-branding.rst +949 -0
- awscli/examples/cognito-idp/update-user-pool-client.rst +121 -24
- awscli/examples/cognito-idp/update-user-pool-domain.rst +18 -0
- awscli/examples/cognito-idp/verify-software-token.rst +15 -0
- awscli/examples/cognito-idp/verify-user-attribute.rst +10 -0
- awscli/examples/ec2/associate-security-group-vpc.rst +15 -0
- awscli/examples/ec2/create-vpc-endpoint.rst +196 -118
- awscli/examples/ec2/describe-security-group-vpc-associations.rst +21 -0
- awscli/examples/ec2/describe-vpc-endpoint-associations.rst +24 -0
- awscli/examples/ec2/disable-image-deregistration-protection.rst +14 -0
- awscli/examples/ec2/disassociate-security-group-vpc.rst +15 -0
- awscli/examples/ec2/enable-image-deregistration-protection.rst +14 -0
- awscli/examples/vpc-lattice/create-resource-configuration.rst +32 -0
- awscli/examples/vpc-lattice/create-resource-gateway.rst +27 -0
- awscli/examples/vpc-lattice/delete-resource-configuration.rst +10 -0
- awscli/examples/vpc-lattice/delete-resource-gateway.rst +17 -0
- awscli/examples/vpc-lattice/get-resource-configuration.rst +32 -0
- awscli/examples/vpc-lattice/get-resource-gateway.rst +27 -0
- awscli/examples/vpc-lattice/list-resource-configurations.rst +25 -0
- awscli/examples/vpc-lattice/list-resource-endpoint-associations.rst +24 -0
- awscli/examples/vpc-lattice/list-resource-gateways.rst +30 -0
- awscli/examples/vpc-lattice/list-service-network-vpc-endpoint-associations.rst +22 -0
- {awscli-1.38.11.dist-info → awscli-1.38.13.dist-info}/METADATA +2 -2
- {awscli-1.38.11.dist-info → awscli-1.38.13.dist-info}/RECORD +37 -14
- {awscli-1.38.11.data → awscli-1.38.13.data}/scripts/aws +0 -0
- {awscli-1.38.11.data → awscli-1.38.13.data}/scripts/aws.cmd +0 -0
- {awscli-1.38.11.data → awscli-1.38.13.data}/scripts/aws_bash_completer +0 -0
- {awscli-1.38.11.data → awscli-1.38.13.data}/scripts/aws_completer +0 -0
- {awscli-1.38.11.data → awscli-1.38.13.data}/scripts/aws_zsh_completer.sh +0 -0
- {awscli-1.38.11.dist-info → awscli-1.38.13.dist-info}/LICENSE.txt +0 -0
- {awscli-1.38.11.dist-info → awscli-1.38.13.dist-info}/WHEEL +0 -0
- {awscli-1.38.11.dist-info → awscli-1.38.13.dist-info}/top_level.txt +0 -0
awscli/__init__.py
CHANGED
|
@@ -12,15 +12,13 @@
|
|
|
12
12
|
# language governing permissions and limitations under the License.
|
|
13
13
|
import sys
|
|
14
14
|
import os
|
|
15
|
-
|
|
16
15
|
from botocore.client import Config
|
|
16
|
+
from botocore import UNSIGNED
|
|
17
17
|
from botocore.endpoint import DEFAULT_TIMEOUT
|
|
18
|
-
from botocore.handlers import disable_signing
|
|
19
18
|
import jmespath
|
|
20
19
|
|
|
21
20
|
from awscli.compat import urlparse
|
|
22
21
|
|
|
23
|
-
|
|
24
22
|
def register_parse_global_args(cli):
|
|
25
23
|
cli.register('top-level-args-parsed', resolve_types,
|
|
26
24
|
unique_id='resolve-types')
|
|
@@ -81,17 +79,12 @@ def resolve_verify_ssl(parsed_args, session, **kwargs):
|
|
|
81
79
|
verify = getattr(parsed_args, 'ca_bundle', None)
|
|
82
80
|
setattr(parsed_args, arg_name, verify)
|
|
83
81
|
|
|
84
|
-
|
|
85
82
|
def no_sign_request(parsed_args, session, **kwargs):
|
|
86
83
|
if not parsed_args.sign_request:
|
|
87
|
-
#
|
|
88
|
-
#
|
|
89
|
-
#
|
|
90
|
-
|
|
91
|
-
emitter.register_first(
|
|
92
|
-
'choose-signer', disable_signing, unique_id='disable-signing',
|
|
93
|
-
)
|
|
94
|
-
|
|
84
|
+
# Disable request signing by setting the signature version to UNSIGNED
|
|
85
|
+
# in the default client configuration. This ensures all new clients
|
|
86
|
+
# will be created with signing disabled.
|
|
87
|
+
_update_default_client_config(session, 'signature_version', UNSIGNED)
|
|
95
88
|
|
|
96
89
|
def resolve_cli_connect_timeout(parsed_args, session, **kwargs):
|
|
97
90
|
arg_name = 'connect_timeout'
|
|
@@ -102,7 +95,6 @@ def resolve_cli_read_timeout(parsed_args, session, **kwargs):
|
|
|
102
95
|
arg_name = 'read_timeout'
|
|
103
96
|
_resolve_timeout(session, parsed_args, arg_name)
|
|
104
97
|
|
|
105
|
-
|
|
106
98
|
def _resolve_timeout(session, parsed_args, arg_name):
|
|
107
99
|
arg_value = getattr(parsed_args, arg_name, None)
|
|
108
100
|
if arg_value is None:
|
|
@@ -0,0 +1,11 @@
|
|
|
1
|
+
**To tag a user pool**
|
|
2
|
+
|
|
3
|
+
The following ``tag-resource`` example applies ``administrator`` and ``department`` tags to the requested user pool. ::
|
|
4
|
+
|
|
5
|
+
aws cognito-idp tag-resource \
|
|
6
|
+
--resource-arn arn:aws:cognito-idp:us-west-2:123456789012:userpool/us-west-2_EXAMPLE \
|
|
7
|
+
--tags administrator=Jie,tenant=ExampleCorp
|
|
8
|
+
|
|
9
|
+
This command produces no output.
|
|
10
|
+
|
|
11
|
+
For more information, see `Tagging Amazon Cognito resources <https://docs.aws.amazon.com/cognito/latest/developerguide/tagging.html>`__ in the *Amazon Cognito Developer Guide*.
|
|
@@ -0,0 +1,11 @@
|
|
|
1
|
+
**To remove tags from a user pool**
|
|
2
|
+
|
|
3
|
+
The following ``untag-resource`` example removes ``administrator`` and ``department`` tags from the requested user pool. ::
|
|
4
|
+
|
|
5
|
+
aws cognito-idp untag-resource \
|
|
6
|
+
--resource-arn arn:aws:cognito-idp:us-west-2:767671399759:userpool/us-west-2_l5cxwdm2K \
|
|
7
|
+
--tag-keys administrator tenant
|
|
8
|
+
|
|
9
|
+
This command produces no output.
|
|
10
|
+
|
|
11
|
+
For more information, see `Tagging Amazon Cognito resources <https://docs.aws.amazon.com/cognito/latest/developerguide/tagging.html>`__ in the *Amazon Cognito Developer Guide*.
|
|
@@ -0,0 +1,71 @@
|
|
|
1
|
+
**To update a user pool identity provider**
|
|
2
|
+
|
|
3
|
+
The following ``update-identity-provider`` example updates the OIDC provider "MyOIDCIdP" in the requested user pool. ::
|
|
4
|
+
|
|
5
|
+
aws cognito-idp update-identity-provider \
|
|
6
|
+
--cli-input-json file://update-identity-provider.json
|
|
7
|
+
|
|
8
|
+
Contents of ``update-identity-provider.json``::
|
|
9
|
+
|
|
10
|
+
{
|
|
11
|
+
"AttributeMapping": {
|
|
12
|
+
"email": "idp_email",
|
|
13
|
+
"email_verified": "idp_email_verified",
|
|
14
|
+
"username": "sub"
|
|
15
|
+
},
|
|
16
|
+
"CreationDate": 1.701129701653E9,
|
|
17
|
+
"IdpIdentifiers": [
|
|
18
|
+
"corp",
|
|
19
|
+
"dev"
|
|
20
|
+
],
|
|
21
|
+
"LastModifiedDate": 1.701129701653E9,
|
|
22
|
+
"ProviderDetails": {
|
|
23
|
+
"attributes_request_method": "GET",
|
|
24
|
+
"attributes_url": "https://example.com/userInfo",
|
|
25
|
+
"attributes_url_add_attributes": "false",
|
|
26
|
+
"authorize_scopes": "openid profile",
|
|
27
|
+
"authorize_url": "https://example.com/authorize",
|
|
28
|
+
"client_id": "idpexampleclient123",
|
|
29
|
+
"client_secret": "idpexamplesecret456",
|
|
30
|
+
"jwks_uri": "https://example.com/.well-known/jwks.json",
|
|
31
|
+
"oidc_issuer": "https://example.com",
|
|
32
|
+
"token_url": "https://example.com/token"
|
|
33
|
+
},
|
|
34
|
+
"ProviderName": "MyOIDCIdP",
|
|
35
|
+
"UserPoolId": "us-west-2_EXAMPLE"
|
|
36
|
+
}
|
|
37
|
+
|
|
38
|
+
Output::
|
|
39
|
+
|
|
40
|
+
{
|
|
41
|
+
"IdentityProvider": {
|
|
42
|
+
"AttributeMapping": {
|
|
43
|
+
"email": "idp_email",
|
|
44
|
+
"email_verified": "idp_email_verified",
|
|
45
|
+
"username": "sub"
|
|
46
|
+
},
|
|
47
|
+
"CreationDate": 1701129701.653,
|
|
48
|
+
"IdpIdentifiers": [
|
|
49
|
+
"corp",
|
|
50
|
+
"dev"
|
|
51
|
+
],
|
|
52
|
+
"LastModifiedDate": 1736444278.211,
|
|
53
|
+
"ProviderDetails": {
|
|
54
|
+
"attributes_request_method": "GET",
|
|
55
|
+
"attributes_url": "https://example.com/userInfo",
|
|
56
|
+
"attributes_url_add_attributes": "false",
|
|
57
|
+
"authorize_scopes": "openid profile",
|
|
58
|
+
"authorize_url": "https://example.com/authorize",
|
|
59
|
+
"client_id": "idpexampleclient123",
|
|
60
|
+
"client_secret": "idpexamplesecret456",
|
|
61
|
+
"jwks_uri": "https://example.com/.well-known/jwks.json",
|
|
62
|
+
"oidc_issuer": "https://example.com",
|
|
63
|
+
"token_url": "https://example.com/token"
|
|
64
|
+
},
|
|
65
|
+
"ProviderName": "MyOIDCIdP",
|
|
66
|
+
"ProviderType": "OIDC",
|
|
67
|
+
"UserPoolId": "us-west-2_EXAMPLE"
|
|
68
|
+
}
|
|
69
|
+
}
|
|
70
|
+
|
|
71
|
+
For more information, see `Configuring a domain <https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pools-assign-domain.html>`__ in the *Amazon Cognito Developer Guide*.
|