awscli 1.38.11__py3-none-any.whl → 1.38.13__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of awscli might be problematic. Click here for more details.

Files changed (37) hide show
  1. awscli/__init__.py +1 -1
  2. awscli/customizations/globalargs.py +5 -13
  3. awscli/examples/cognito-idp/tag-resource.rst +11 -0
  4. awscli/examples/cognito-idp/untag-resource.rst +11 -0
  5. awscli/examples/cognito-idp/update-identity-provider.rst +71 -0
  6. awscli/examples/cognito-idp/update-managed-login-branding.rst +949 -0
  7. awscli/examples/cognito-idp/update-user-pool-client.rst +121 -24
  8. awscli/examples/cognito-idp/update-user-pool-domain.rst +18 -0
  9. awscli/examples/cognito-idp/verify-software-token.rst +15 -0
  10. awscli/examples/cognito-idp/verify-user-attribute.rst +10 -0
  11. awscli/examples/ec2/associate-security-group-vpc.rst +15 -0
  12. awscli/examples/ec2/create-vpc-endpoint.rst +196 -118
  13. awscli/examples/ec2/describe-security-group-vpc-associations.rst +21 -0
  14. awscli/examples/ec2/describe-vpc-endpoint-associations.rst +24 -0
  15. awscli/examples/ec2/disable-image-deregistration-protection.rst +14 -0
  16. awscli/examples/ec2/disassociate-security-group-vpc.rst +15 -0
  17. awscli/examples/ec2/enable-image-deregistration-protection.rst +14 -0
  18. awscli/examples/vpc-lattice/create-resource-configuration.rst +32 -0
  19. awscli/examples/vpc-lattice/create-resource-gateway.rst +27 -0
  20. awscli/examples/vpc-lattice/delete-resource-configuration.rst +10 -0
  21. awscli/examples/vpc-lattice/delete-resource-gateway.rst +17 -0
  22. awscli/examples/vpc-lattice/get-resource-configuration.rst +32 -0
  23. awscli/examples/vpc-lattice/get-resource-gateway.rst +27 -0
  24. awscli/examples/vpc-lattice/list-resource-configurations.rst +25 -0
  25. awscli/examples/vpc-lattice/list-resource-endpoint-associations.rst +24 -0
  26. awscli/examples/vpc-lattice/list-resource-gateways.rst +30 -0
  27. awscli/examples/vpc-lattice/list-service-network-vpc-endpoint-associations.rst +22 -0
  28. {awscli-1.38.11.dist-info → awscli-1.38.13.dist-info}/METADATA +2 -2
  29. {awscli-1.38.11.dist-info → awscli-1.38.13.dist-info}/RECORD +37 -14
  30. {awscli-1.38.11.data → awscli-1.38.13.data}/scripts/aws +0 -0
  31. {awscli-1.38.11.data → awscli-1.38.13.data}/scripts/aws.cmd +0 -0
  32. {awscli-1.38.11.data → awscli-1.38.13.data}/scripts/aws_bash_completer +0 -0
  33. {awscli-1.38.11.data → awscli-1.38.13.data}/scripts/aws_completer +0 -0
  34. {awscli-1.38.11.data → awscli-1.38.13.data}/scripts/aws_zsh_completer.sh +0 -0
  35. {awscli-1.38.11.dist-info → awscli-1.38.13.dist-info}/LICENSE.txt +0 -0
  36. {awscli-1.38.11.dist-info → awscli-1.38.13.dist-info}/WHEEL +0 -0
  37. {awscli-1.38.11.dist-info → awscli-1.38.13.dist-info}/top_level.txt +0 -0
awscli/__init__.py CHANGED
@@ -18,7 +18,7 @@ A Universal Command Line Environment for Amazon Web Services.
18
18
 
19
19
  import os
20
20
 
21
- __version__ = '1.38.11'
21
+ __version__ = '1.38.13'
22
22
 
23
23
  #
24
24
  # Get our data path to be added to botocore's search path
@@ -12,15 +12,13 @@
12
12
  # language governing permissions and limitations under the License.
13
13
  import sys
14
14
  import os
15
-
16
15
  from botocore.client import Config
16
+ from botocore import UNSIGNED
17
17
  from botocore.endpoint import DEFAULT_TIMEOUT
18
- from botocore.handlers import disable_signing
19
18
  import jmespath
20
19
 
21
20
  from awscli.compat import urlparse
22
21
 
23
-
24
22
  def register_parse_global_args(cli):
25
23
  cli.register('top-level-args-parsed', resolve_types,
26
24
  unique_id='resolve-types')
@@ -81,17 +79,12 @@ def resolve_verify_ssl(parsed_args, session, **kwargs):
81
79
  verify = getattr(parsed_args, 'ca_bundle', None)
82
80
  setattr(parsed_args, arg_name, verify)
83
81
 
84
-
85
82
  def no_sign_request(parsed_args, session, **kwargs):
86
83
  if not parsed_args.sign_request:
87
- # In order to make signing disabled for all requests
88
- # we need to use botocore's ``disable_signing()`` handler.
89
- # Register this first to override other handlers.
90
- emitter = session.get_component('event_emitter')
91
- emitter.register_first(
92
- 'choose-signer', disable_signing, unique_id='disable-signing',
93
- )
94
-
84
+ # Disable request signing by setting the signature version to UNSIGNED
85
+ # in the default client configuration. This ensures all new clients
86
+ # will be created with signing disabled.
87
+ _update_default_client_config(session, 'signature_version', UNSIGNED)
95
88
 
96
89
  def resolve_cli_connect_timeout(parsed_args, session, **kwargs):
97
90
  arg_name = 'connect_timeout'
@@ -102,7 +95,6 @@ def resolve_cli_read_timeout(parsed_args, session, **kwargs):
102
95
  arg_name = 'read_timeout'
103
96
  _resolve_timeout(session, parsed_args, arg_name)
104
97
 
105
-
106
98
  def _resolve_timeout(session, parsed_args, arg_name):
107
99
  arg_value = getattr(parsed_args, arg_name, None)
108
100
  if arg_value is None:
@@ -0,0 +1,11 @@
1
+ **To tag a user pool**
2
+
3
+ The following ``tag-resource`` example applies ``administrator`` and ``department`` tags to the requested user pool. ::
4
+
5
+ aws cognito-idp tag-resource \
6
+ --resource-arn arn:aws:cognito-idp:us-west-2:123456789012:userpool/us-west-2_EXAMPLE \
7
+ --tags administrator=Jie,tenant=ExampleCorp
8
+
9
+ This command produces no output.
10
+
11
+ For more information, see `Tagging Amazon Cognito resources <https://docs.aws.amazon.com/cognito/latest/developerguide/tagging.html>`__ in the *Amazon Cognito Developer Guide*.
@@ -0,0 +1,11 @@
1
+ **To remove tags from a user pool**
2
+
3
+ The following ``untag-resource`` example removes ``administrator`` and ``department`` tags from the requested user pool. ::
4
+
5
+ aws cognito-idp untag-resource \
6
+ --resource-arn arn:aws:cognito-idp:us-west-2:767671399759:userpool/us-west-2_l5cxwdm2K \
7
+ --tag-keys administrator tenant
8
+
9
+ This command produces no output.
10
+
11
+ For more information, see `Tagging Amazon Cognito resources <https://docs.aws.amazon.com/cognito/latest/developerguide/tagging.html>`__ in the *Amazon Cognito Developer Guide*.
@@ -0,0 +1,71 @@
1
+ **To update a user pool identity provider**
2
+
3
+ The following ``update-identity-provider`` example updates the OIDC provider "MyOIDCIdP" in the requested user pool. ::
4
+
5
+ aws cognito-idp update-identity-provider \
6
+ --cli-input-json file://update-identity-provider.json
7
+
8
+ Contents of ``update-identity-provider.json``::
9
+
10
+ {
11
+ "AttributeMapping": {
12
+ "email": "idp_email",
13
+ "email_verified": "idp_email_verified",
14
+ "username": "sub"
15
+ },
16
+ "CreationDate": 1.701129701653E9,
17
+ "IdpIdentifiers": [
18
+ "corp",
19
+ "dev"
20
+ ],
21
+ "LastModifiedDate": 1.701129701653E9,
22
+ "ProviderDetails": {
23
+ "attributes_request_method": "GET",
24
+ "attributes_url": "https://example.com/userInfo",
25
+ "attributes_url_add_attributes": "false",
26
+ "authorize_scopes": "openid profile",
27
+ "authorize_url": "https://example.com/authorize",
28
+ "client_id": "idpexampleclient123",
29
+ "client_secret": "idpexamplesecret456",
30
+ "jwks_uri": "https://example.com/.well-known/jwks.json",
31
+ "oidc_issuer": "https://example.com",
32
+ "token_url": "https://example.com/token"
33
+ },
34
+ "ProviderName": "MyOIDCIdP",
35
+ "UserPoolId": "us-west-2_EXAMPLE"
36
+ }
37
+
38
+ Output::
39
+
40
+ {
41
+ "IdentityProvider": {
42
+ "AttributeMapping": {
43
+ "email": "idp_email",
44
+ "email_verified": "idp_email_verified",
45
+ "username": "sub"
46
+ },
47
+ "CreationDate": 1701129701.653,
48
+ "IdpIdentifiers": [
49
+ "corp",
50
+ "dev"
51
+ ],
52
+ "LastModifiedDate": 1736444278.211,
53
+ "ProviderDetails": {
54
+ "attributes_request_method": "GET",
55
+ "attributes_url": "https://example.com/userInfo",
56
+ "attributes_url_add_attributes": "false",
57
+ "authorize_scopes": "openid profile",
58
+ "authorize_url": "https://example.com/authorize",
59
+ "client_id": "idpexampleclient123",
60
+ "client_secret": "idpexamplesecret456",
61
+ "jwks_uri": "https://example.com/.well-known/jwks.json",
62
+ "oidc_issuer": "https://example.com",
63
+ "token_url": "https://example.com/token"
64
+ },
65
+ "ProviderName": "MyOIDCIdP",
66
+ "ProviderType": "OIDC",
67
+ "UserPoolId": "us-west-2_EXAMPLE"
68
+ }
69
+ }
70
+
71
+ For more information, see `Configuring a domain <https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pools-assign-domain.html>`__ in the *Amazon Cognito Developer Guide*.