Skip to content

Commit b2fefb3

Browse files
author
awstools
committed
feat(client-cognito-identity-provider): Added email MFA option to user pools with advanced security features.
1 parent 89e6e2f commit b2fefb3

23 files changed

+499
-209
lines changed

clients/client-cognito-identity-provider/src/commands/AdminCreateUserCommand.ts

+1-1
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ export interface AdminCreateUserCommandOutput extends AdminCreateUserResponse, _
4848
* Amazon Cognito uses the registered number automatically. Otherwise, Amazon Cognito users who must
4949
* receive SMS messages might not be able to sign up, activate their accounts, or sign
5050
* in.</p>
51-
* <p>If you have never used SMS text messages with Amazon Cognito or any other Amazon Web Services service,
51+
* <p>If you have never used SMS text messages with Amazon Cognito or any other Amazon Web Servicesservice,
5252
* Amazon Simple Notification Service might place your account in the SMS sandbox. In <i>
5353
* <a href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox
5454
* mode</a>

clients/client-cognito-identity-provider/src/commands/AdminInitiateAuthCommand.ts

+6-2
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ export interface AdminInitiateAuthCommandOutput extends AdminInitiateAuthRespons
4646
* Amazon Cognito uses the registered number automatically. Otherwise, Amazon Cognito users who must
4747
* receive SMS messages might not be able to sign up, activate their accounts, or sign
4848
* in.</p>
49-
* <p>If you have never used SMS text messages with Amazon Cognito or any other Amazon Web Services service,
49+
* <p>If you have never used SMS text messages with Amazon Cognito or any other Amazon Web Servicesservice,
5050
* Amazon Simple Notification Service might place your account in the SMS sandbox. In <i>
5151
* <a href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox
5252
* mode</a>
@@ -110,7 +110,7 @@ export interface AdminInitiateAuthCommandOutput extends AdminInitiateAuthRespons
110110
* const command = new AdminInitiateAuthCommand(input);
111111
* const response = await client.send(command);
112112
* // { // AdminInitiateAuthResponse
113-
* // ChallengeName: "SMS_MFA" || "SOFTWARE_TOKEN_MFA" || "SELECT_MFA_TYPE" || "MFA_SETUP" || "PASSWORD_VERIFIER" || "CUSTOM_CHALLENGE" || "DEVICE_SRP_AUTH" || "DEVICE_PASSWORD_VERIFIER" || "ADMIN_NO_SRP_AUTH" || "NEW_PASSWORD_REQUIRED",
113+
* // ChallengeName: "SMS_MFA" || "EMAIL_OTP" || "SOFTWARE_TOKEN_MFA" || "SELECT_MFA_TYPE" || "MFA_SETUP" || "PASSWORD_VERIFIER" || "CUSTOM_CHALLENGE" || "DEVICE_SRP_AUTH" || "DEVICE_PASSWORD_VERIFIER" || "ADMIN_NO_SRP_AUTH" || "NEW_PASSWORD_REQUIRED",
114114
* // Session: "STRING_VALUE",
115115
* // ChallengeParameters: { // ChallengeParametersType
116116
* // "<keys>": "STRING_VALUE",
@@ -139,6 +139,10 @@ export interface AdminInitiateAuthCommandOutput extends AdminInitiateAuthRespons
139139
* @throws {@link InternalErrorException} (server fault)
140140
* <p>This exception is thrown when Amazon Cognito encounters an internal error.</p>
141141
*
142+
* @throws {@link InvalidEmailRoleAccessPolicyException} (client fault)
143+
* <p>This exception is thrown when Amazon Cognito isn't allowed to use your email identity. HTTP
144+
* status code: 400.</p>
145+
*
142146
* @throws {@link InvalidLambdaResponseException} (client fault)
143147
* <p>This exception is thrown when Amazon Cognito encounters an invalid Lambda response.</p>
144148
*

clients/client-cognito-identity-provider/src/commands/AdminResetUserPasswordCommand.ts

+1-1
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ export interface AdminResetUserPasswordCommandOutput extends AdminResetUserPassw
4848
* Amazon Cognito uses the registered number automatically. Otherwise, Amazon Cognito users who must
4949
* receive SMS messages might not be able to sign up, activate their accounts, or sign
5050
* in.</p>
51-
* <p>If you have never used SMS text messages with Amazon Cognito or any other Amazon Web Services service,
51+
* <p>If you have never used SMS text messages with Amazon Cognito or any other Amazon Web Servicesservice,
5252
* Amazon Simple Notification Service might place your account in the SMS sandbox. In <i>
5353
* <a href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox
5454
* mode</a>

clients/client-cognito-identity-provider/src/commands/AdminRespondToAuthChallengeCommand.ts

+7-3
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,7 @@ export interface AdminRespondToAuthChallengeCommandOutput
5454
* Amazon Cognito uses the registered number automatically. Otherwise, Amazon Cognito users who must
5555
* receive SMS messages might not be able to sign up, activate their accounts, or sign
5656
* in.</p>
57-
* <p>If you have never used SMS text messages with Amazon Cognito or any other Amazon Web Services service,
57+
* <p>If you have never used SMS text messages with Amazon Cognito or any other Amazon Web Servicesservice,
5858
* Amazon Simple Notification Service might place your account in the SMS sandbox. In <i>
5959
* <a href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox
6060
* mode</a>
@@ -92,7 +92,7 @@ export interface AdminRespondToAuthChallengeCommandOutput
9292
* const input = { // AdminRespondToAuthChallengeRequest
9393
* UserPoolId: "STRING_VALUE", // required
9494
* ClientId: "STRING_VALUE", // required
95-
* ChallengeName: "SMS_MFA" || "SOFTWARE_TOKEN_MFA" || "SELECT_MFA_TYPE" || "MFA_SETUP" || "PASSWORD_VERIFIER" || "CUSTOM_CHALLENGE" || "DEVICE_SRP_AUTH" || "DEVICE_PASSWORD_VERIFIER" || "ADMIN_NO_SRP_AUTH" || "NEW_PASSWORD_REQUIRED", // required
95+
* ChallengeName: "SMS_MFA" || "EMAIL_OTP" || "SOFTWARE_TOKEN_MFA" || "SELECT_MFA_TYPE" || "MFA_SETUP" || "PASSWORD_VERIFIER" || "CUSTOM_CHALLENGE" || "DEVICE_SRP_AUTH" || "DEVICE_PASSWORD_VERIFIER" || "ADMIN_NO_SRP_AUTH" || "NEW_PASSWORD_REQUIRED", // required
9696
* ChallengeResponses: { // ChallengeResponsesType
9797
* "<keys>": "STRING_VALUE",
9898
* },
@@ -119,7 +119,7 @@ export interface AdminRespondToAuthChallengeCommandOutput
119119
* const command = new AdminRespondToAuthChallengeCommand(input);
120120
* const response = await client.send(command);
121121
* // { // AdminRespondToAuthChallengeResponse
122-
* // ChallengeName: "SMS_MFA" || "SOFTWARE_TOKEN_MFA" || "SELECT_MFA_TYPE" || "MFA_SETUP" || "PASSWORD_VERIFIER" || "CUSTOM_CHALLENGE" || "DEVICE_SRP_AUTH" || "DEVICE_PASSWORD_VERIFIER" || "ADMIN_NO_SRP_AUTH" || "NEW_PASSWORD_REQUIRED",
122+
* // ChallengeName: "SMS_MFA" || "EMAIL_OTP" || "SOFTWARE_TOKEN_MFA" || "SELECT_MFA_TYPE" || "MFA_SETUP" || "PASSWORD_VERIFIER" || "CUSTOM_CHALLENGE" || "DEVICE_SRP_AUTH" || "DEVICE_PASSWORD_VERIFIER" || "ADMIN_NO_SRP_AUTH" || "NEW_PASSWORD_REQUIRED",
123123
* // Session: "STRING_VALUE",
124124
* // ChallengeParameters: { // ChallengeParametersType
125125
* // "<keys>": "STRING_VALUE",
@@ -162,6 +162,10 @@ export interface AdminRespondToAuthChallengeCommandOutput
162162
* @throws {@link InternalErrorException} (server fault)
163163
* <p>This exception is thrown when Amazon Cognito encounters an internal error.</p>
164164
*
165+
* @throws {@link InvalidEmailRoleAccessPolicyException} (client fault)
166+
* <p>This exception is thrown when Amazon Cognito isn't allowed to use your email identity. HTTP
167+
* status code: 400.</p>
168+
*
165169
* @throws {@link InvalidLambdaResponseException} (client fault)
166170
* <p>This exception is thrown when Amazon Cognito encounters an invalid Lambda response.</p>
167171
*

clients/client-cognito-identity-provider/src/commands/AdminSetUserMFAPreferenceCommand.ts

+9-5
Original file line numberDiff line numberDiff line change
@@ -36,11 +36,11 @@ export interface AdminSetUserMFAPreferenceCommandInput extends AdminSetUserMFAPr
3636
export interface AdminSetUserMFAPreferenceCommandOutput extends AdminSetUserMFAPreferenceResponse, __MetadataBearer {}
3737

3838
/**
39-
* <p>The user's multi-factor authentication (MFA) preference, including which MFA options
40-
* are activated, and if any are preferred. Only one factor can be set as preferred. The
41-
* preferred MFA factor will be used to authenticate a user if multiple factors are
42-
* activated. If multiple options are activated and no preference is set, a challenge to
43-
* choose an MFA option will be returned during sign-in.</p>
39+
* <p>Sets the user's multi-factor authentication (MFA) preference, including which MFA
40+
* options are activated, and if any are preferred. Only one factor can be set as
41+
* preferred. The preferred MFA factor will be used to authenticate a user if multiple
42+
* factors are activated. If multiple options are activated and no preference is set, a
43+
* challenge to choose an MFA option will be returned during sign-in.</p>
4444
* <note>
4545
* <p>Amazon Cognito evaluates Identity and Access Management (IAM) policies in requests for this API operation. For
4646
* this operation, you must use IAM credentials to authorize requests, and you must
@@ -76,6 +76,10 @@ export interface AdminSetUserMFAPreferenceCommandOutput extends AdminSetUserMFAP
7676
* Enabled: true || false,
7777
* PreferredMfa: true || false,
7878
* },
79+
* EmailMfaSettings: { // EmailMfaSettingsType
80+
* Enabled: true || false,
81+
* PreferredMfa: true || false,
82+
* },
7983
* Username: "STRING_VALUE", // required
8084
* UserPoolId: "STRING_VALUE", // required
8185
* };

clients/client-cognito-identity-provider/src/commands/AdminUpdateUserAttributesCommand.ts

+1-1
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ export interface AdminUpdateUserAttributesCommandOutput extends AdminUpdateUserA
4444
* Amazon Cognito uses the registered number automatically. Otherwise, Amazon Cognito users who must
4545
* receive SMS messages might not be able to sign up, activate their accounts, or sign
4646
* in.</p>
47-
* <p>If you have never used SMS text messages with Amazon Cognito or any other Amazon Web Services service,
47+
* <p>If you have never used SMS text messages with Amazon Cognito or any other Amazon Web Servicesservice,
4848
* Amazon Simple Notification Service might place your account in the SMS sandbox. In <i>
4949
* <a href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox
5050
* mode</a>

clients/client-cognito-identity-provider/src/commands/CreateUserPoolCommand.ts

+1-1
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ export interface CreateUserPoolCommandOutput extends CreateUserPoolResponse, __M
4040
* Amazon Cognito uses the registered number automatically. Otherwise, Amazon Cognito users who must
4141
* receive SMS messages might not be able to sign up, activate their accounts, or sign
4242
* in.</p>
43-
* <p>If you have never used SMS text messages with Amazon Cognito or any other Amazon Web Services service,
43+
* <p>If you have never used SMS text messages with Amazon Cognito or any other Amazon Web Servicesservice,
4444
* Amazon Simple Notification Service might place your account in the SMS sandbox. In <i>
4545
* <a href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox
4646
* mode</a>

clients/client-cognito-identity-provider/src/commands/ForgotPasswordCommand.ts

+1-1
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@ export interface ForgotPasswordCommandOutput extends ForgotPasswordResponse, __M
6262
* Amazon Cognito uses the registered number automatically. Otherwise, Amazon Cognito users who must
6363
* receive SMS messages might not be able to sign up, activate their accounts, or sign
6464
* in.</p>
65-
* <p>If you have never used SMS text messages with Amazon Cognito or any other Amazon Web Services service,
65+
* <p>If you have never used SMS text messages with Amazon Cognito or any other Amazon Web Servicesservice,
6666
* Amazon Simple Notification Service might place your account in the SMS sandbox. In <i>
6767
* <a href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox
6868
* mode</a>

clients/client-cognito-identity-provider/src/commands/GetUserAttributeVerificationCodeCommand.ts

+1-1
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ export interface GetUserAttributeVerificationCodeCommandOutput
5959
* Amazon Cognito uses the registered number automatically. Otherwise, Amazon Cognito users who must
6060
* receive SMS messages might not be able to sign up, activate their accounts, or sign
6161
* in.</p>
62-
* <p>If you have never used SMS text messages with Amazon Cognito or any other Amazon Web Services service,
62+
* <p>If you have never used SMS text messages with Amazon Cognito or any other Amazon Web Servicesservice,
6363
* Amazon Simple Notification Service might place your account in the SMS sandbox. In <i>
6464
* <a href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox
6565
* mode</a>

clients/client-cognito-identity-provider/src/commands/GetUserPoolMfaConfigCommand.ts

+4
Original file line numberDiff line numberDiff line change
@@ -56,6 +56,10 @@ export interface GetUserPoolMfaConfigCommandOutput extends GetUserPoolMfaConfigR
5656
* // SoftwareTokenMfaConfiguration: { // SoftwareTokenMfaConfigType
5757
* // Enabled: true || false,
5858
* // },
59+
* // EmailMfaConfiguration: { // EmailMfaConfigType
60+
* // Message: "STRING_VALUE",
61+
* // Subject: "STRING_VALUE",
62+
* // },
5963
* // MfaConfiguration: "OFF" || "ON" || "OPTIONAL",
6064
* // };
6165
*

clients/client-cognito-identity-provider/src/commands/InitiateAuthCommand.ts

+6-2
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ export interface InitiateAuthCommandOutput extends InitiateAuthResponse, __Metad
5353
* Amazon Cognito uses the registered number automatically. Otherwise, Amazon Cognito users who must
5454
* receive SMS messages might not be able to sign up, activate their accounts, or sign
5555
* in.</p>
56-
* <p>If you have never used SMS text messages with Amazon Cognito or any other Amazon Web Services service,
56+
* <p>If you have never used SMS text messages with Amazon Cognito or any other Amazon Web Servicesservice,
5757
* Amazon Simple Notification Service might place your account in the SMS sandbox. In <i>
5858
* <a href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox
5959
* mode</a>
@@ -88,7 +88,7 @@ export interface InitiateAuthCommandOutput extends InitiateAuthResponse, __Metad
8888
* const command = new InitiateAuthCommand(input);
8989
* const response = await client.send(command);
9090
* // { // InitiateAuthResponse
91-
* // ChallengeName: "SMS_MFA" || "SOFTWARE_TOKEN_MFA" || "SELECT_MFA_TYPE" || "MFA_SETUP" || "PASSWORD_VERIFIER" || "CUSTOM_CHALLENGE" || "DEVICE_SRP_AUTH" || "DEVICE_PASSWORD_VERIFIER" || "ADMIN_NO_SRP_AUTH" || "NEW_PASSWORD_REQUIRED",
91+
* // ChallengeName: "SMS_MFA" || "EMAIL_OTP" || "SOFTWARE_TOKEN_MFA" || "SELECT_MFA_TYPE" || "MFA_SETUP" || "PASSWORD_VERIFIER" || "CUSTOM_CHALLENGE" || "DEVICE_SRP_AUTH" || "DEVICE_PASSWORD_VERIFIER" || "ADMIN_NO_SRP_AUTH" || "NEW_PASSWORD_REQUIRED",
9292
* // Session: "STRING_VALUE",
9393
* // ChallengeParameters: { // ChallengeParametersType
9494
* // "<keys>": "STRING_VALUE",
@@ -121,6 +121,10 @@ export interface InitiateAuthCommandOutput extends InitiateAuthResponse, __Metad
121121
* @throws {@link InternalErrorException} (server fault)
122122
* <p>This exception is thrown when Amazon Cognito encounters an internal error.</p>
123123
*
124+
* @throws {@link InvalidEmailRoleAccessPolicyException} (client fault)
125+
* <p>This exception is thrown when Amazon Cognito isn't allowed to use your email identity. HTTP
126+
* status code: 400.</p>
127+
*
124128
* @throws {@link InvalidLambdaResponseException} (client fault)
125129
* <p>This exception is thrown when Amazon Cognito encounters an invalid Lambda response.</p>
126130
*

clients/client-cognito-identity-provider/src/commands/ResendConfirmationCodeCommand.ts

+1-1
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ export interface ResendConfirmationCodeCommandOutput extends ResendConfirmationC
5252
* Amazon Cognito uses the registered number automatically. Otherwise, Amazon Cognito users who must
5353
* receive SMS messages might not be able to sign up, activate their accounts, or sign
5454
* in.</p>
55-
* <p>If you have never used SMS text messages with Amazon Cognito or any other Amazon Web Services service,
55+
* <p>If you have never used SMS text messages with Amazon Cognito or any other Amazon Web Servicesservice,
5656
* Amazon Simple Notification Service might place your account in the SMS sandbox. In <i>
5757
* <a href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox
5858
* mode</a>

clients/client-cognito-identity-provider/src/commands/RespondToAuthChallengeCommand.ts

+9-9
Original file line numberDiff line numberDiff line change
@@ -10,12 +10,8 @@ import {
1010
ServiceOutputTypes,
1111
} from "../CognitoIdentityProviderClient";
1212
import { commonParams } from "../endpoint/EndpointParameters";
13-
import {
14-
RespondToAuthChallengeRequest,
15-
RespondToAuthChallengeRequestFilterSensitiveLog,
16-
RespondToAuthChallengeResponse,
17-
RespondToAuthChallengeResponseFilterSensitiveLog,
18-
} from "../models/models_0";
13+
import { RespondToAuthChallengeRequest, RespondToAuthChallengeRequestFilterSensitiveLog } from "../models/models_0";
14+
import { RespondToAuthChallengeResponse, RespondToAuthChallengeResponseFilterSensitiveLog } from "../models/models_1";
1915
import { de_RespondToAuthChallengeCommand, se_RespondToAuthChallengeCommand } from "../protocols/Aws_json1_1";
2016

2117
/**
@@ -58,7 +54,7 @@ export interface RespondToAuthChallengeCommandOutput extends RespondToAuthChalle
5854
* Amazon Cognito uses the registered number automatically. Otherwise, Amazon Cognito users who must
5955
* receive SMS messages might not be able to sign up, activate their accounts, or sign
6056
* in.</p>
61-
* <p>If you have never used SMS text messages with Amazon Cognito or any other Amazon Web Services service,
57+
* <p>If you have never used SMS text messages with Amazon Cognito or any other Amazon Web Servicesservice,
6258
* Amazon Simple Notification Service might place your account in the SMS sandbox. In <i>
6359
* <a href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox
6460
* mode</a>
@@ -75,7 +71,7 @@ export interface RespondToAuthChallengeCommandOutput extends RespondToAuthChalle
7571
* const client = new CognitoIdentityProviderClient(config);
7672
* const input = { // RespondToAuthChallengeRequest
7773
* ClientId: "STRING_VALUE", // required
78-
* ChallengeName: "SMS_MFA" || "SOFTWARE_TOKEN_MFA" || "SELECT_MFA_TYPE" || "MFA_SETUP" || "PASSWORD_VERIFIER" || "CUSTOM_CHALLENGE" || "DEVICE_SRP_AUTH" || "DEVICE_PASSWORD_VERIFIER" || "ADMIN_NO_SRP_AUTH" || "NEW_PASSWORD_REQUIRED", // required
74+
* ChallengeName: "SMS_MFA" || "EMAIL_OTP" || "SOFTWARE_TOKEN_MFA" || "SELECT_MFA_TYPE" || "MFA_SETUP" || "PASSWORD_VERIFIER" || "CUSTOM_CHALLENGE" || "DEVICE_SRP_AUTH" || "DEVICE_PASSWORD_VERIFIER" || "ADMIN_NO_SRP_AUTH" || "NEW_PASSWORD_REQUIRED", // required
7975
* Session: "STRING_VALUE",
8076
* ChallengeResponses: { // ChallengeResponsesType
8177
* "<keys>": "STRING_VALUE",
@@ -94,7 +90,7 @@ export interface RespondToAuthChallengeCommandOutput extends RespondToAuthChalle
9490
* const command = new RespondToAuthChallengeCommand(input);
9591
* const response = await client.send(command);
9692
* // { // RespondToAuthChallengeResponse
97-
* // ChallengeName: "SMS_MFA" || "SOFTWARE_TOKEN_MFA" || "SELECT_MFA_TYPE" || "MFA_SETUP" || "PASSWORD_VERIFIER" || "CUSTOM_CHALLENGE" || "DEVICE_SRP_AUTH" || "DEVICE_PASSWORD_VERIFIER" || "ADMIN_NO_SRP_AUTH" || "NEW_PASSWORD_REQUIRED",
93+
* // ChallengeName: "SMS_MFA" || "EMAIL_OTP" || "SOFTWARE_TOKEN_MFA" || "SELECT_MFA_TYPE" || "MFA_SETUP" || "PASSWORD_VERIFIER" || "CUSTOM_CHALLENGE" || "DEVICE_SRP_AUTH" || "DEVICE_PASSWORD_VERIFIER" || "ADMIN_NO_SRP_AUTH" || "NEW_PASSWORD_REQUIRED",
9894
* // Session: "STRING_VALUE",
9995
* // ChallengeParameters: { // ChallengeParametersType
10096
* // "<keys>": "STRING_VALUE",
@@ -141,6 +137,10 @@ export interface RespondToAuthChallengeCommandOutput extends RespondToAuthChalle
141137
* @throws {@link InternalErrorException} (server fault)
142138
* <p>This exception is thrown when Amazon Cognito encounters an internal error.</p>
143139
*
140+
* @throws {@link InvalidEmailRoleAccessPolicyException} (client fault)
141+
* <p>This exception is thrown when Amazon Cognito isn't allowed to use your email identity. HTTP
142+
* status code: 400.</p>
143+
*
144144
* @throws {@link InvalidLambdaResponseException} (client fault)
145145
* <p>This exception is thrown when Amazon Cognito encounters an invalid Lambda response.</p>
146146
*

clients/client-cognito-identity-provider/src/commands/RevokeTokenCommand.ts

+1-2
Original file line numberDiff line numberDiff line change
@@ -10,8 +10,7 @@ import {
1010
ServiceOutputTypes,
1111
} from "../CognitoIdentityProviderClient";
1212
import { commonParams } from "../endpoint/EndpointParameters";
13-
import { RevokeTokenRequest, RevokeTokenRequestFilterSensitiveLog } from "../models/models_0";
14-
import { RevokeTokenResponse } from "../models/models_1";
13+
import { RevokeTokenRequest, RevokeTokenRequestFilterSensitiveLog, RevokeTokenResponse } from "../models/models_1";
1514
import { de_RevokeTokenCommand, se_RevokeTokenCommand } from "../protocols/Aws_json1_1";
1615

1716
/**

0 commit comments

Comments
 (0)