@@ -10,12 +10,8 @@ import {
10
10
ServiceOutputTypes ,
11
11
} from "../CognitoIdentityProviderClient" ;
12
12
import { commonParams } from "../endpoint/EndpointParameters" ;
13
- import {
14
- RespondToAuthChallengeRequest ,
15
- RespondToAuthChallengeRequestFilterSensitiveLog ,
16
- RespondToAuthChallengeResponse ,
17
- RespondToAuthChallengeResponseFilterSensitiveLog ,
18
- } from "../models/models_0" ;
13
+ import { RespondToAuthChallengeRequest , RespondToAuthChallengeRequestFilterSensitiveLog } from "../models/models_0" ;
14
+ import { RespondToAuthChallengeResponse , RespondToAuthChallengeResponseFilterSensitiveLog } from "../models/models_1" ;
19
15
import { de_RespondToAuthChallengeCommand , se_RespondToAuthChallengeCommand } from "../protocols/Aws_json1_1" ;
20
16
21
17
/**
@@ -58,7 +54,7 @@ export interface RespondToAuthChallengeCommandOutput extends RespondToAuthChalle
58
54
* Amazon Cognito uses the registered number automatically. Otherwise, Amazon Cognito users who must
59
55
* receive SMS messages might not be able to sign up, activate their accounts, or sign
60
56
* in.</p>
61
- * <p>If you have never used SMS text messages with Amazon Cognito or any other Amazon Web Services service ,
57
+ * <p>If you have never used SMS text messages with Amazon Cognito or any other Amazon Web Servicesservice ,
62
58
* Amazon Simple Notification Service might place your account in the SMS sandbox. In <i>
63
59
* <a href="https://docs.aws.amazon.com/sns/latest/dg/sns-sms-sandbox.html">sandbox
64
60
* mode</a>
@@ -75,7 +71,7 @@ export interface RespondToAuthChallengeCommandOutput extends RespondToAuthChalle
75
71
* const client = new CognitoIdentityProviderClient(config);
76
72
* const input = { // RespondToAuthChallengeRequest
77
73
* ClientId: "STRING_VALUE", // required
78
- * ChallengeName: "SMS_MFA" || "SOFTWARE_TOKEN_MFA" || "SELECT_MFA_TYPE" || "MFA_SETUP" || "PASSWORD_VERIFIER" || "CUSTOM_CHALLENGE" || "DEVICE_SRP_AUTH" || "DEVICE_PASSWORD_VERIFIER" || "ADMIN_NO_SRP_AUTH" || "NEW_PASSWORD_REQUIRED", // required
74
+ * ChallengeName: "SMS_MFA" || "EMAIL_OTP" || " SOFTWARE_TOKEN_MFA" || "SELECT_MFA_TYPE" || "MFA_SETUP" || "PASSWORD_VERIFIER" || "CUSTOM_CHALLENGE" || "DEVICE_SRP_AUTH" || "DEVICE_PASSWORD_VERIFIER" || "ADMIN_NO_SRP_AUTH" || "NEW_PASSWORD_REQUIRED", // required
79
75
* Session: "STRING_VALUE",
80
76
* ChallengeResponses: { // ChallengeResponsesType
81
77
* "<keys>": "STRING_VALUE",
@@ -94,7 +90,7 @@ export interface RespondToAuthChallengeCommandOutput extends RespondToAuthChalle
94
90
* const command = new RespondToAuthChallengeCommand(input);
95
91
* const response = await client.send(command);
96
92
* // { // RespondToAuthChallengeResponse
97
- * // ChallengeName: "SMS_MFA" || "SOFTWARE_TOKEN_MFA" || "SELECT_MFA_TYPE" || "MFA_SETUP" || "PASSWORD_VERIFIER" || "CUSTOM_CHALLENGE" || "DEVICE_SRP_AUTH" || "DEVICE_PASSWORD_VERIFIER" || "ADMIN_NO_SRP_AUTH" || "NEW_PASSWORD_REQUIRED",
93
+ * // ChallengeName: "SMS_MFA" || "EMAIL_OTP" || " SOFTWARE_TOKEN_MFA" || "SELECT_MFA_TYPE" || "MFA_SETUP" || "PASSWORD_VERIFIER" || "CUSTOM_CHALLENGE" || "DEVICE_SRP_AUTH" || "DEVICE_PASSWORD_VERIFIER" || "ADMIN_NO_SRP_AUTH" || "NEW_PASSWORD_REQUIRED",
98
94
* // Session: "STRING_VALUE",
99
95
* // ChallengeParameters: { // ChallengeParametersType
100
96
* // "<keys>": "STRING_VALUE",
@@ -141,6 +137,10 @@ export interface RespondToAuthChallengeCommandOutput extends RespondToAuthChalle
141
137
* @throws {@link InternalErrorException } (server fault)
142
138
* <p>This exception is thrown when Amazon Cognito encounters an internal error.</p>
143
139
*
140
+ * @throws {@link InvalidEmailRoleAccessPolicyException } (client fault)
141
+ * <p>This exception is thrown when Amazon Cognito isn't allowed to use your email identity. HTTP
142
+ * status code: 400.</p>
143
+ *
144
144
* @throws {@link InvalidLambdaResponseException } (client fault)
145
145
* <p>This exception is thrown when Amazon Cognito encounters an invalid Lambda response.</p>
146
146
*
0 commit comments