Huge News!Announcing our $40M Series B led by Abstract Ventures.Learn More
Socket
Sign inDemoInstall
Socket

@aws-sdk/client-cognito-identity-provider

Package Overview
Dependencies
Maintainers
5
Versions
445
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

@aws-sdk/client-cognito-identity-provider - npm Package Compare versions

Comparing version 3.650.0 to 3.651.0

3

dist-es/commands/RespondToAuthChallengeCommand.js

@@ -5,3 +5,4 @@ import { getEndpointPlugin } from "@smithy/middleware-endpoint";

import { commonParams } from "../endpoint/EndpointParameters";
import { RespondToAuthChallengeRequestFilterSensitiveLog, RespondToAuthChallengeResponseFilterSensitiveLog, } from "../models/models_0";
import { RespondToAuthChallengeRequestFilterSensitiveLog } from "../models/models_0";
import { RespondToAuthChallengeResponseFilterSensitiveLog } from "../models/models_1";
import { de_RespondToAuthChallengeCommand, se_RespondToAuthChallengeCommand } from "../protocols/Aws_json1_1";

@@ -8,0 +9,0 @@ export { $Command };

@@ -5,3 +5,3 @@ import { getEndpointPlugin } from "@smithy/middleware-endpoint";

import { commonParams } from "../endpoint/EndpointParameters";
import { RevokeTokenRequestFilterSensitiveLog } from "../models/models_0";
import { RevokeTokenRequestFilterSensitiveLog } from "../models/models_1";
import { de_RevokeTokenCommand, se_RevokeTokenCommand } from "../protocols/Aws_json1_1";

@@ -8,0 +8,0 @@ export { $Command };

@@ -304,2 +304,3 @@ import { SENSITIVE_STRING } from "@smithy/smithy-client";

DEVICE_SRP_AUTH: "DEVICE_SRP_AUTH",
EMAIL_OTP: "EMAIL_OTP",
MFA_SETUP: "MFA_SETUP",

@@ -312,2 +313,14 @@ NEW_PASSWORD_REQUIRED: "NEW_PASSWORD_REQUIRED",

};
export class InvalidEmailRoleAccessPolicyException extends __BaseException {
constructor(opts) {
super({
name: "InvalidEmailRoleAccessPolicyException",
$fault: "client",
...opts,
});
this.name = "InvalidEmailRoleAccessPolicyException";
this.$fault = "client";
Object.setPrototypeOf(this, InvalidEmailRoleAccessPolicyException.prototype);
}
}
export class MFAMethodNotFoundException extends __BaseException {

@@ -395,14 +408,2 @@ constructor(opts) {

}
export class InvalidEmailRoleAccessPolicyException extends __BaseException {
constructor(opts) {
super({
name: "InvalidEmailRoleAccessPolicyException",
$fault: "client",
...opts,
});
this.name = "InvalidEmailRoleAccessPolicyException";
this.$fault = "client";
Object.setPrototypeOf(this, InvalidEmailRoleAccessPolicyException.prototype);
}
}
export class CodeMismatchException extends __BaseException {

@@ -1020,14 +1021,1 @@ constructor(opts) {

});
export const RespondToAuthChallengeResponseFilterSensitiveLog = (obj) => ({
...obj,
...(obj.Session && { Session: SENSITIVE_STRING }),
...(obj.AuthenticationResult && {
AuthenticationResult: AuthenticationResultTypeFilterSensitiveLog(obj.AuthenticationResult),
}),
});
export const RevokeTokenRequestFilterSensitiveLog = (obj) => ({
...obj,
...(obj.Token && { Token: SENSITIVE_STRING }),
...(obj.ClientId && { ClientId: SENSITIVE_STRING }),
...(obj.ClientSecret && { ClientSecret: SENSITIVE_STRING }),
});
import { SENSITIVE_STRING } from "@smithy/smithy-client";
import { CognitoIdentityProviderServiceException as __BaseException } from "./CognitoIdentityProviderServiceException";
import { AttributeTypeFilterSensitiveLog, RiskConfigurationTypeFilterSensitiveLog, UICustomizationTypeFilterSensitiveLog, UserPoolClientTypeFilterSensitiveLog, } from "./models_0";
import { AttributeTypeFilterSensitiveLog, AuthenticationResultTypeFilterSensitiveLog, RiskConfigurationTypeFilterSensitiveLog, UICustomizationTypeFilterSensitiveLog, UserPoolClientTypeFilterSensitiveLog, } from "./models_0";
export class UnauthorizedException extends __BaseException {

@@ -56,2 +56,15 @@ constructor(opts) {

};
export const RespondToAuthChallengeResponseFilterSensitiveLog = (obj) => ({
...obj,
...(obj.Session && { Session: SENSITIVE_STRING }),
...(obj.AuthenticationResult && {
AuthenticationResult: AuthenticationResultTypeFilterSensitiveLog(obj.AuthenticationResult),
}),
});
export const RevokeTokenRequestFilterSensitiveLog = (obj) => ({
...obj,
...(obj.Token && { Token: SENSITIVE_STRING }),
...(obj.ClientId && { ClientId: SENSITIVE_STRING }),
...(obj.ClientSecret && { ClientSecret: SENSITIVE_STRING }),
});
export const SetRiskConfigurationRequestFilterSensitiveLog = (obj) => ({

@@ -58,0 +71,0 @@ ...obj,

@@ -41,3 +41,3 @@ import { Command as $Command } from "@smithy/smithy-client";

* in.</p>
* <p>If you have never used SMS text messages with Amazon Cognito or any other Amazon Web Services service,
* <p>If you have never used SMS text messages with Amazon Cognito or any other Amazon Web Servicesservice,
* Amazon Simple Notification Service might place your account in the SMS sandbox. In <i>

@@ -44,0 +44,0 @@ * <a href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox

@@ -39,3 +39,3 @@ import { Command as $Command } from "@smithy/smithy-client";

* in.</p>
* <p>If you have never used SMS text messages with Amazon Cognito or any other Amazon Web Services service,
* <p>If you have never used SMS text messages with Amazon Cognito or any other Amazon Web Servicesservice,
* Amazon Simple Notification Service might place your account in the SMS sandbox. In <i>

@@ -104,3 +104,3 @@ * <a href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox

* // { // AdminInitiateAuthResponse
* // ChallengeName: "SMS_MFA" || "SOFTWARE_TOKEN_MFA" || "SELECT_MFA_TYPE" || "MFA_SETUP" || "PASSWORD_VERIFIER" || "CUSTOM_CHALLENGE" || "DEVICE_SRP_AUTH" || "DEVICE_PASSWORD_VERIFIER" || "ADMIN_NO_SRP_AUTH" || "NEW_PASSWORD_REQUIRED",
* // ChallengeName: "SMS_MFA" || "EMAIL_OTP" || "SOFTWARE_TOKEN_MFA" || "SELECT_MFA_TYPE" || "MFA_SETUP" || "PASSWORD_VERIFIER" || "CUSTOM_CHALLENGE" || "DEVICE_SRP_AUTH" || "DEVICE_PASSWORD_VERIFIER" || "ADMIN_NO_SRP_AUTH" || "NEW_PASSWORD_REQUIRED",
* // Session: "STRING_VALUE",

@@ -134,2 +134,6 @@ * // ChallengeParameters: { // ChallengeParametersType

*
* @throws {@link InvalidEmailRoleAccessPolicyException} (client fault)
* <p>This exception is thrown when Amazon Cognito isn't allowed to use your email identity. HTTP
* status code: 400.</p>
*
* @throws {@link InvalidLambdaResponseException} (client fault)

@@ -136,0 +140,0 @@ * <p>This exception is thrown when Amazon Cognito encounters an invalid Lambda response.</p>

@@ -42,3 +42,3 @@ import { Command as $Command } from "@smithy/smithy-client";

* in.</p>
* <p>If you have never used SMS text messages with Amazon Cognito or any other Amazon Web Services service,
* <p>If you have never used SMS text messages with Amazon Cognito or any other Amazon Web Servicesservice,
* Amazon Simple Notification Service might place your account in the SMS sandbox. In <i>

@@ -45,0 +45,0 @@ * <a href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox

@@ -45,3 +45,3 @@ import { Command as $Command } from "@smithy/smithy-client";

* in.</p>
* <p>If you have never used SMS text messages with Amazon Cognito or any other Amazon Web Services service,
* <p>If you have never used SMS text messages with Amazon Cognito or any other Amazon Web Servicesservice,
* Amazon Simple Notification Service might place your account in the SMS sandbox. In <i>

@@ -84,3 +84,3 @@ * <a href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox

* ClientId: "STRING_VALUE", // required
* ChallengeName: "SMS_MFA" || "SOFTWARE_TOKEN_MFA" || "SELECT_MFA_TYPE" || "MFA_SETUP" || "PASSWORD_VERIFIER" || "CUSTOM_CHALLENGE" || "DEVICE_SRP_AUTH" || "DEVICE_PASSWORD_VERIFIER" || "ADMIN_NO_SRP_AUTH" || "NEW_PASSWORD_REQUIRED", // required
* ChallengeName: "SMS_MFA" || "EMAIL_OTP" || "SOFTWARE_TOKEN_MFA" || "SELECT_MFA_TYPE" || "MFA_SETUP" || "PASSWORD_VERIFIER" || "CUSTOM_CHALLENGE" || "DEVICE_SRP_AUTH" || "DEVICE_PASSWORD_VERIFIER" || "ADMIN_NO_SRP_AUTH" || "NEW_PASSWORD_REQUIRED", // required
* ChallengeResponses: { // ChallengeResponsesType

@@ -112,3 +112,3 @@ * "<keys>": "STRING_VALUE",

* // { // AdminRespondToAuthChallengeResponse
* // ChallengeName: "SMS_MFA" || "SOFTWARE_TOKEN_MFA" || "SELECT_MFA_TYPE" || "MFA_SETUP" || "PASSWORD_VERIFIER" || "CUSTOM_CHALLENGE" || "DEVICE_SRP_AUTH" || "DEVICE_PASSWORD_VERIFIER" || "ADMIN_NO_SRP_AUTH" || "NEW_PASSWORD_REQUIRED",
* // ChallengeName: "SMS_MFA" || "EMAIL_OTP" || "SOFTWARE_TOKEN_MFA" || "SELECT_MFA_TYPE" || "MFA_SETUP" || "PASSWORD_VERIFIER" || "CUSTOM_CHALLENGE" || "DEVICE_SRP_AUTH" || "DEVICE_PASSWORD_VERIFIER" || "ADMIN_NO_SRP_AUTH" || "NEW_PASSWORD_REQUIRED",
* // Session: "STRING_VALUE",

@@ -156,2 +156,6 @@ * // ChallengeParameters: { // ChallengeParametersType

*
* @throws {@link InvalidEmailRoleAccessPolicyException} (client fault)
* <p>This exception is thrown when Amazon Cognito isn't allowed to use your email identity. HTTP
* status code: 400.</p>
*
* @throws {@link InvalidLambdaResponseException} (client fault)

@@ -158,0 +162,0 @@ * <p>This exception is thrown when Amazon Cognito encounters an invalid Lambda response.</p>

@@ -30,7 +30,7 @@ import { Command as $Command } from "@smithy/smithy-client";

/**
* <p>The user's multi-factor authentication (MFA) preference, including which MFA options
* are activated, and if any are preferred. Only one factor can be set as preferred. The
* preferred MFA factor will be used to authenticate a user if multiple factors are
* activated. If multiple options are activated and no preference is set, a challenge to
* choose an MFA option will be returned during sign-in.</p>
* <p>Sets the user's multi-factor authentication (MFA) preference, including which MFA
* options are activated, and if any are preferred. Only one factor can be set as
* preferred. The preferred MFA factor will be used to authenticate a user if multiple
* factors are activated. If multiple options are activated and no preference is set, a
* challenge to choose an MFA option will be returned during sign-in.</p>
* <note>

@@ -71,2 +71,6 @@ * <p>Amazon Cognito evaluates Identity and Access Management (IAM) policies in requests for this API operation. For

* },
* EmailMfaSettings: { // EmailMfaSettingsType
* Enabled: true || false,
* PreferredMfa: true || false,
* },
* Username: "STRING_VALUE", // required

@@ -73,0 +77,0 @@ * UserPoolId: "STRING_VALUE", // required

@@ -38,3 +38,3 @@ import { Command as $Command } from "@smithy/smithy-client";

* in.</p>
* <p>If you have never used SMS text messages with Amazon Cognito or any other Amazon Web Services service,
* <p>If you have never used SMS text messages with Amazon Cognito or any other Amazon Web Servicesservice,
* Amazon Simple Notification Service might place your account in the SMS sandbox. In <i>

@@ -41,0 +41,0 @@ * <a href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox

@@ -38,3 +38,3 @@ import { Command as $Command } from "@smithy/smithy-client";

* in.</p>
* <p>If you have never used SMS text messages with Amazon Cognito or any other Amazon Web Services service,
* <p>If you have never used SMS text messages with Amazon Cognito or any other Amazon Web Servicesservice,
* Amazon Simple Notification Service might place your account in the SMS sandbox. In <i>

@@ -41,0 +41,0 @@ * <a href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox

@@ -56,3 +56,3 @@ import { Command as $Command } from "@smithy/smithy-client";

* in.</p>
* <p>If you have never used SMS text messages with Amazon Cognito or any other Amazon Web Services service,
* <p>If you have never used SMS text messages with Amazon Cognito or any other Amazon Web Servicesservice,
* Amazon Simple Notification Service might place your account in the SMS sandbox. In <i>

@@ -59,0 +59,0 @@ * <a href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox

@@ -48,3 +48,3 @@ import { Command as $Command } from "@smithy/smithy-client";

* in.</p>
* <p>If you have never used SMS text messages with Amazon Cognito or any other Amazon Web Services service,
* <p>If you have never used SMS text messages with Amazon Cognito or any other Amazon Web Servicesservice,
* Amazon Simple Notification Service might place your account in the SMS sandbox. In <i>

@@ -51,0 +51,0 @@ * <a href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox

@@ -54,2 +54,6 @@ import { Command as $Command } from "@smithy/smithy-client";

* // },
* // EmailMfaConfiguration: { // EmailMfaConfigType
* // Message: "STRING_VALUE",
* // Subject: "STRING_VALUE",
* // },
* // MfaConfiguration: "OFF" || "ON" || "OPTIONAL",

@@ -56,0 +60,0 @@ * // };

@@ -46,3 +46,3 @@ import { Command as $Command } from "@smithy/smithy-client";

* in.</p>
* <p>If you have never used SMS text messages with Amazon Cognito or any other Amazon Web Services service,
* <p>If you have never used SMS text messages with Amazon Cognito or any other Amazon Web Servicesservice,
* Amazon Simple Notification Service might place your account in the SMS sandbox. In <i>

@@ -82,3 +82,3 @@ * <a href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox

* // { // InitiateAuthResponse
* // ChallengeName: "SMS_MFA" || "SOFTWARE_TOKEN_MFA" || "SELECT_MFA_TYPE" || "MFA_SETUP" || "PASSWORD_VERIFIER" || "CUSTOM_CHALLENGE" || "DEVICE_SRP_AUTH" || "DEVICE_PASSWORD_VERIFIER" || "ADMIN_NO_SRP_AUTH" || "NEW_PASSWORD_REQUIRED",
* // ChallengeName: "SMS_MFA" || "EMAIL_OTP" || "SOFTWARE_TOKEN_MFA" || "SELECT_MFA_TYPE" || "MFA_SETUP" || "PASSWORD_VERIFIER" || "CUSTOM_CHALLENGE" || "DEVICE_SRP_AUTH" || "DEVICE_PASSWORD_VERIFIER" || "ADMIN_NO_SRP_AUTH" || "NEW_PASSWORD_REQUIRED",
* // Session: "STRING_VALUE",

@@ -116,2 +116,6 @@ * // ChallengeParameters: { // ChallengeParametersType

*
* @throws {@link InvalidEmailRoleAccessPolicyException} (client fault)
* <p>This exception is thrown when Amazon Cognito isn't allowed to use your email identity. HTTP
* status code: 400.</p>
*
* @throws {@link InvalidLambdaResponseException} (client fault)

@@ -118,0 +122,0 @@ * <p>This exception is thrown when Amazon Cognito encounters an invalid Lambda response.</p>

@@ -46,3 +46,3 @@ import { Command as $Command } from "@smithy/smithy-client";

* in.</p>
* <p>If you have never used SMS text messages with Amazon Cognito or any other Amazon Web Services service,
* <p>If you have never used SMS text messages with Amazon Cognito or any other Amazon Web Servicesservice,
* Amazon Simple Notification Service might place your account in the SMS sandbox. In <i>

@@ -49,0 +49,0 @@ * <a href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox

import { Command as $Command } from "@smithy/smithy-client";
import { MetadataBearer as __MetadataBearer } from "@smithy/types";
import { CognitoIdentityProviderClientResolvedConfig, ServiceInputTypes, ServiceOutputTypes } from "../CognitoIdentityProviderClient";
import { RespondToAuthChallengeRequest, RespondToAuthChallengeResponse } from "../models/models_0";
import { RespondToAuthChallengeRequest } from "../models/models_0";
import { RespondToAuthChallengeResponse } from "../models/models_1";
/**

@@ -51,3 +52,3 @@ * @public

* in.</p>
* <p>If you have never used SMS text messages with Amazon Cognito or any other Amazon Web Services service,
* <p>If you have never used SMS text messages with Amazon Cognito or any other Amazon Web Servicesservice,
* Amazon Simple Notification Service might place your account in the SMS sandbox. In <i>

@@ -69,3 +70,3 @@ * <a href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox

* ClientId: "STRING_VALUE", // required
* ChallengeName: "SMS_MFA" || "SOFTWARE_TOKEN_MFA" || "SELECT_MFA_TYPE" || "MFA_SETUP" || "PASSWORD_VERIFIER" || "CUSTOM_CHALLENGE" || "DEVICE_SRP_AUTH" || "DEVICE_PASSWORD_VERIFIER" || "ADMIN_NO_SRP_AUTH" || "NEW_PASSWORD_REQUIRED", // required
* ChallengeName: "SMS_MFA" || "EMAIL_OTP" || "SOFTWARE_TOKEN_MFA" || "SELECT_MFA_TYPE" || "MFA_SETUP" || "PASSWORD_VERIFIER" || "CUSTOM_CHALLENGE" || "DEVICE_SRP_AUTH" || "DEVICE_PASSWORD_VERIFIER" || "ADMIN_NO_SRP_AUTH" || "NEW_PASSWORD_REQUIRED", // required
* Session: "STRING_VALUE",

@@ -89,3 +90,3 @@ * ChallengeResponses: { // ChallengeResponsesType

* // { // RespondToAuthChallengeResponse
* // ChallengeName: "SMS_MFA" || "SOFTWARE_TOKEN_MFA" || "SELECT_MFA_TYPE" || "MFA_SETUP" || "PASSWORD_VERIFIER" || "CUSTOM_CHALLENGE" || "DEVICE_SRP_AUTH" || "DEVICE_PASSWORD_VERIFIER" || "ADMIN_NO_SRP_AUTH" || "NEW_PASSWORD_REQUIRED",
* // ChallengeName: "SMS_MFA" || "EMAIL_OTP" || "SOFTWARE_TOKEN_MFA" || "SELECT_MFA_TYPE" || "MFA_SETUP" || "PASSWORD_VERIFIER" || "CUSTOM_CHALLENGE" || "DEVICE_SRP_AUTH" || "DEVICE_PASSWORD_VERIFIER" || "ADMIN_NO_SRP_AUTH" || "NEW_PASSWORD_REQUIRED",
* // Session: "STRING_VALUE",

@@ -137,2 +138,6 @@ * // ChallengeParameters: { // ChallengeParametersType

*
* @throws {@link InvalidEmailRoleAccessPolicyException} (client fault)
* <p>This exception is thrown when Amazon Cognito isn't allowed to use your email identity. HTTP
* status code: 400.</p>
*
* @throws {@link InvalidLambdaResponseException} (client fault)

@@ -139,0 +144,0 @@ * <p>This exception is thrown when Amazon Cognito encounters an invalid Lambda response.</p>

import { Command as $Command } from "@smithy/smithy-client";
import { MetadataBearer as __MetadataBearer } from "@smithy/types";
import { CognitoIdentityProviderClientResolvedConfig, ServiceInputTypes, ServiceOutputTypes } from "../CognitoIdentityProviderClient";
import { RevokeTokenRequest } from "../models/models_0";
import { RevokeTokenResponse } from "../models/models_1";
import { RevokeTokenRequest, RevokeTokenResponse } from "../models/models_1";
/**

@@ -7,0 +6,0 @@ * @public

@@ -61,2 +61,6 @@ import { Command as $Command } from "@smithy/smithy-client";

* },
* EmailMfaSettings: { // EmailMfaSettingsType
* Enabled: true || false,
* PreferredMfa: true || false,
* },
* AccessToken: "STRING_VALUE", // required

@@ -63,0 +67,0 @@ * };

@@ -39,3 +39,3 @@ import { Command as $Command } from "@smithy/smithy-client";

* in.</p>
* <p>If you have never used SMS text messages with Amazon Cognito or any other Amazon Web Services service,
* <p>If you have never used SMS text messages with Amazon Cognito or any other Amazon Web Servicesservice,
* Amazon Simple Notification Service might place your account in the SMS sandbox. In <i>

@@ -68,2 +68,6 @@ * <a href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox

* },
* EmailMfaConfiguration: { // EmailMfaConfigType
* Message: "STRING_VALUE",
* Subject: "STRING_VALUE",
* },
* MfaConfiguration: "OFF" || "ON" || "OPTIONAL",

@@ -85,2 +89,6 @@ * };

* // },
* // EmailMfaConfiguration: { // EmailMfaConfigType
* // Message: "STRING_VALUE",
* // Subject: "STRING_VALUE",
* // },
* // MfaConfiguration: "OFF" || "ON" || "OPTIONAL",

@@ -87,0 +95,0 @@ * // };

@@ -46,3 +46,3 @@ import { Command as $Command } from "@smithy/smithy-client";

* in.</p>
* <p>If you have never used SMS text messages with Amazon Cognito or any other Amazon Web Services service,
* <p>If you have never used SMS text messages with Amazon Cognito or any other Amazon Web Servicesservice,
* Amazon Simple Notification Service might place your account in the SMS sandbox. In <i>

@@ -49,0 +49,0 @@ * <a href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox

@@ -50,3 +50,3 @@ import { Command as $Command } from "@smithy/smithy-client";

* in.</p>
* <p>If you have never used SMS text messages with Amazon Cognito or any other Amazon Web Services service,
* <p>If you have never used SMS text messages with Amazon Cognito or any other Amazon Web Servicesservice,
* Amazon Simple Notification Service might place your account in the SMS sandbox. In <i>

@@ -53,0 +53,0 @@ * <a href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox

@@ -38,3 +38,3 @@ import { Command as $Command } from "@smithy/smithy-client";

* in.</p>
* <p>If you have never used SMS text messages with Amazon Cognito or any other Amazon Web Services service,
* <p>If you have never used SMS text messages with Amazon Cognito or any other Amazon Web Servicesservice,
* Amazon Simple Notification Service might place your account in the SMS sandbox. In <i>

@@ -41,0 +41,0 @@ * <a href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox

@@ -8,6 +8,4 @@ import { Command as $Command } from "@smithy/smithy-client";

} from "../CognitoIdentityProviderClient";
import {
RespondToAuthChallengeRequest,
RespondToAuthChallengeResponse,
} from "../models/models_0";
import { RespondToAuthChallengeRequest } from "../models/models_0";
import { RespondToAuthChallengeResponse } from "../models/models_1";
export { __MetadataBearer };

@@ -14,0 +12,0 @@ export { $Command };

@@ -8,4 +8,3 @@ import { Command as $Command } from "@smithy/smithy-client";

} from "../CognitoIdentityProviderClient";
import { RevokeTokenRequest } from "../models/models_0";
import { RevokeTokenResponse } from "../models/models_1";
import { RevokeTokenRequest, RevokeTokenResponse } from "../models/models_1";
export { __MetadataBearer };

@@ -12,0 +11,0 @@ export { $Command };

@@ -428,2 +428,3 @@ import { ExceptionOptionType as __ExceptionOptionType } from "@smithy/smithy-client";

readonly DEVICE_SRP_AUTH: "DEVICE_SRP_AUTH";
readonly EMAIL_OTP: "EMAIL_OTP";
readonly MFA_SETUP: "MFA_SETUP";

@@ -444,2 +445,12 @@ readonly NEW_PASSWORD_REQUIRED: "NEW_PASSWORD_REQUIRED";

}
export declare class InvalidEmailRoleAccessPolicyException extends __BaseException {
readonly name: "InvalidEmailRoleAccessPolicyException";
readonly $fault: "client";
constructor(
opts: __ExceptionOptionType<
InvalidEmailRoleAccessPolicyException,
__BaseException
>
);
}
export declare class MFAMethodNotFoundException extends __BaseException {

@@ -608,12 +619,2 @@ readonly name: "MFAMethodNotFoundException";

export interface AdminResetUserPasswordResponse {}
export declare class InvalidEmailRoleAccessPolicyException extends __BaseException {
readonly name: "InvalidEmailRoleAccessPolicyException";
readonly $fault: "client";
constructor(
opts: __ExceptionOptionType<
InvalidEmailRoleAccessPolicyException,
__BaseException
>
);
}
export interface AdminRespondToAuthChallengeRequest {

@@ -669,2 +670,6 @@ UserPoolId: string | undefined;

}
export interface EmailMfaSettingsType {
Enabled?: boolean;
PreferredMfa?: boolean;
}
export interface SMSMfaSettingsType {

@@ -681,2 +686,3 @@ Enabled?: boolean;

SoftwareTokenMfaSettings?: SoftwareTokenMfaSettingsType;
EmailMfaSettings?: EmailMfaSettingsType;
Username: string | undefined;

@@ -1523,2 +1529,6 @@ UserPoolId: string | undefined;

}
export interface EmailMfaConfigType {
Message?: string;
Subject?: string;
}
export interface SmsMfaConfigType {

@@ -1534,2 +1544,3 @@ SmsAuthenticationMessage?: string;

SoftwareTokenMfaConfiguration?: SoftwareTokenMfaConfigType;
EmailMfaConfiguration?: EmailMfaConfigType;
MfaConfiguration?: UserPoolMfaType;

@@ -1683,13 +1694,2 @@ }

}
export interface RespondToAuthChallengeResponse {
ChallengeName?: ChallengeNameType;
Session?: string;
ChallengeParameters?: Record<string, string>;
AuthenticationResult?: AuthenticationResultType;
}
export interface RevokeTokenRequest {
Token: string | undefined;
ClientId: string | undefined;
ClientSecret?: string;
}
export declare const AdminAddUserToGroupRequestFilterSensitiveLog: (

@@ -1907,7 +1907,1 @@ obj: AdminAddUserToGroupRequest

) => any;
export declare const RespondToAuthChallengeResponseFilterSensitiveLog: (
obj: RespondToAuthChallengeResponse
) => any;
export declare const RevokeTokenRequestFilterSensitiveLog: (
obj: RevokeTokenRequest
) => any;

@@ -10,2 +10,4 @@ import { ExceptionOptionType as __ExceptionOptionType } from "@smithy/smithy-client";

AttributeType,
AuthenticationResultType,
ChallengeNameType,
CodeDeliveryDetailsType,

@@ -18,2 +20,4 @@ CompromisedCredentialsRiskConfigurationType,

EmailConfigurationType,
EmailMfaConfigType,
EmailMfaSettingsType,
ExplicitAuthFlowsType,

@@ -50,2 +54,13 @@ FeedbackValueType,

} from "./models_0";
export interface RespondToAuthChallengeResponse {
ChallengeName?: ChallengeNameType;
Session?: string;
ChallengeParameters?: Record<string, string>;
AuthenticationResult?: AuthenticationResultType;
}
export interface RevokeTokenRequest {
Token: string | undefined;
ClientId: string | undefined;
ClientSecret?: string;
}
export interface RevokeTokenResponse {}

@@ -102,2 +117,3 @@ export declare class UnauthorizedException extends __BaseException {

SoftwareTokenMfaSettings?: SoftwareTokenMfaSettingsType;
EmailMfaSettings?: EmailMfaSettingsType;
AccessToken: string | undefined;

@@ -110,2 +126,3 @@ }

SoftwareTokenMfaConfiguration?: SoftwareTokenMfaConfigType;
EmailMfaConfiguration?: EmailMfaConfigType;
MfaConfiguration?: UserPoolMfaType;

@@ -116,2 +133,3 @@ }

SoftwareTokenMfaConfiguration?: SoftwareTokenMfaConfigType;
EmailMfaConfiguration?: EmailMfaConfigType;
MfaConfiguration?: UserPoolMfaType;

@@ -304,2 +322,8 @@ }

export interface VerifyUserAttributeResponse {}
export declare const RespondToAuthChallengeResponseFilterSensitiveLog: (
obj: RespondToAuthChallengeResponse
) => any;
export declare const RevokeTokenRequestFilterSensitiveLog: (
obj: RevokeTokenRequest
) => any;
export declare const SetRiskConfigurationRequestFilterSensitiveLog: (

@@ -306,0 +330,0 @@ obj: SetRiskConfigurationRequest

{
"name": "@aws-sdk/client-cognito-identity-provider",
"description": "AWS SDK for JavaScript Cognito Identity Provider Client for Node.js, Browser and React Native",
"version": "3.650.0",
"version": "3.651.0",
"scripts": {

@@ -6,0 +6,0 @@ "build": "concurrently 'yarn:build:cjs' 'yarn:build:es' 'yarn:build:types'",

Sorry, the diff of this file is too big to display

Sorry, the diff of this file is too big to display

Sorry, the diff of this file is too big to display

Sorry, the diff of this file is too big to display

SocketSocket SOC 2 Logo

Product

  • Package Alerts
  • Integrations
  • Docs
  • Pricing
  • FAQ
  • Roadmap
  • Changelog

Packages

npm

Stay in touch

Get open source security insights delivered straight into your inbox.


  • Terms
  • Privacy
  • Security

Made with ⚡️ by Socket Inc