Huge News!Announcing our $40M Series B led by Abstract Ventures.Learn More
Socket
Sign inDemoInstall
Socket

@aws-amplify/data-schema

Package Overview
Dependencies
Maintainers
10
Versions
172
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

@aws-amplify/data-schema - npm Package Compare versions

Comparing version 0.12.2 to 0.12.3

18

lib-esm/src/Authorization.d.ts

@@ -140,6 +140,6 @@ import type { UnionToIntersection } from '@aws-amplify/data-schema-types';

* By default, `.specificGroup()` uses an Amazon Cognito user pool based authorization. You can additionally
* use `.specificGroup("oidc")` to use OIDC based authentication to designate the user group.
* use `.specificGroup("group-name", "oidc")` to use OIDC based authentication to designate the user group.
*
* To change the specific claim that should be used as the user group identifier, chain the
* `.groupClaim(...)` method.
* `.withClaimIn(...)` method.
* @param group the name of the group to authorize

@@ -157,6 +157,6 @@ * @param provider the authentication provider - supports "userPools" or "oidc"

* By default, `.specificGroups()` uses an Amazon Cognito user pool based authorization. You can additionally
* use `.specificGroups("oidc")` to use OIDC based authentication to designate the user group.
* use `.specificGroups(["group-a", "group-b"], "oidc")` to use OIDC based authentication to designate the user group.
*
* To change the specific claim that should be used as the user group identifier, chain the
* `.groupClaim(...)` method.
* `.withClaimIn(...)` method.
* @param groups the names of the group to authorize defined as an array

@@ -174,6 +174,6 @@ * @param provider the authentication provider - supports "userPools" or "oidc"

* By default, `.groupDefinedIn()` uses an Amazon Cognito user pool based authorization. You can additionally
* use `.groupDefinedIn("oidc")` to use OIDC based authentication to designate the user group.
* use `.groupDefinedIn("field-name", "oidc")` to use OIDC based authentication to designate the user group.
*
* To change the specific claim that should be used as the user group identifier within the groups field, chain the
* `.groupClaim(...)` method.
* `.withClaimIn(...)` method.
* @param groupsField the field that should store the authorized user group information

@@ -185,2 +185,3 @@ * @param provider the authentication provider - supports "userPools" or "oidc"

to: typeof to;
withClaimIn: typeof withClaimIn;
};

@@ -191,6 +192,6 @@ /**

* By default, `.groupsDefinedIn()` uses an Amazon Cognito user pool based authorization. You can additionally
* use `.groupsDefinedIn("oidc")` to use OIDC based authentication to designate the user group.
* use `.groupsDefinedIn("field-name", "oidc")` to use OIDC based authentication to designate the user group.
*
* To change the specific claim that should be used as the user group identifier within the groups field, chain the
* `.groupClaim(...)` method.
* `.withClaimIn(...)` method.
* @param groupsField the field that should store the list of authorized user groups

@@ -202,2 +203,3 @@ * @param provider the authentication provider - supports "userPools" or "oidc"

to: typeof to;
withClaimIn: typeof withClaimIn;
};

@@ -204,0 +206,0 @@ readonly custom: (provider?: CustomProvider) => Authorization<"custom", undefined, false> & {

@@ -212,6 +212,6 @@ "use strict";

* By default, `.specificGroup()` uses an Amazon Cognito user pool based authorization. You can additionally
* use `.specificGroup("oidc")` to use OIDC based authentication to designate the user group.
* use `.specificGroup("group-name", "oidc")` to use OIDC based authentication to designate the user group.
*
* To change the specific claim that should be used as the user group identifier, chain the
* `.groupClaim(...)` method.
* `.withClaimIn(...)` method.
* @param group the name of the group to authorize

@@ -235,6 +235,6 @@ * @param provider the authentication provider - supports "userPools" or "oidc"

* By default, `.specificGroups()` uses an Amazon Cognito user pool based authorization. You can additionally
* use `.specificGroups("oidc")` to use OIDC based authentication to designate the user group.
* use `.specificGroups(["group-a", "group-b"], "oidc")` to use OIDC based authentication to designate the user group.
*
* To change the specific claim that should be used as the user group identifier, chain the
* `.groupClaim(...)` method.
* `.withClaimIn(...)` method.
* @param groups the names of the group to authorize defined as an array

@@ -258,6 +258,6 @@ * @param provider the authentication provider - supports "userPools" or "oidc"

* By default, `.groupDefinedIn()` uses an Amazon Cognito user pool based authorization. You can additionally
* use `.groupDefinedIn("oidc")` to use OIDC based authentication to designate the user group.
* use `.groupDefinedIn("field-name", "oidc")` to use OIDC based authentication to designate the user group.
*
* To change the specific claim that should be used as the user group identifier within the groups field, chain the
* `.groupClaim(...)` method.
* `.withClaimIn(...)` method.
* @param groupsField the field that should store the authorized user group information

@@ -274,2 +274,3 @@ * @param provider the authentication provider - supports "userPools" or "oidc"

to,
withClaimIn,
});

@@ -281,6 +282,6 @@ },

* By default, `.groupsDefinedIn()` uses an Amazon Cognito user pool based authorization. You can additionally
* use `.groupsDefinedIn("oidc")` to use OIDC based authentication to designate the user group.
* use `.groupsDefinedIn("field-name", "oidc")` to use OIDC based authentication to designate the user group.
*
* To change the specific claim that should be used as the user group identifier within the groups field, chain the
* `.groupClaim(...)` method.
* `.withClaimIn(...)` method.
* @param groupsField the field that should store the list of authorized user groups

@@ -298,2 +299,3 @@ * @param provider the authentication provider - supports "userPools" or "oidc"

to,
withClaimIn,
});

@@ -300,0 +302,0 @@ },

{
"name": "@aws-amplify/data-schema",
"version": "0.12.2",
"version": "0.12.3",
"license": "Apache-2.0",

@@ -5,0 +5,0 @@ "repository": {

Sorry, the diff of this file is not supported yet

SocketSocket SOC 2 Logo

Product

  • Package Alerts
  • Integrations
  • Docs
  • Pricing
  • FAQ
  • Roadmap
  • Changelog

Packages

npm

Stay in touch

Get open source security insights delivered straight into your inbox.


  • Terms
  • Privacy
  • Security

Made with ⚡️ by Socket Inc