/** * Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. * SPDX-License-Identifier: Apache-2.0. */ #pragma once #include #include #include #include #include namespace Aws { namespace CognitoIdentityProvider { namespace Model { /** *

Represents the request to get user attribute verification.

See * Also:

AWS * API Reference

*/ class GetUserAttributeVerificationCodeRequest : public CognitoIdentityProviderRequest { public: AWS_COGNITOIDENTITYPROVIDER_API GetUserAttributeVerificationCodeRequest(); // Service request name is the Operation name which will send this request out, // each operation should has unique request name, so that we can get operation's name from this request. // Note: this is not true for response, multiple operations may have the same response name, // so we can not get operation's name from response. inline virtual const char* GetServiceRequestName() const override { return "GetUserAttributeVerificationCode"; } AWS_COGNITOIDENTITYPROVIDER_API Aws::String SerializePayload() const override; AWS_COGNITOIDENTITYPROVIDER_API Aws::Http::HeaderValueCollection GetRequestSpecificHeaders() const override; /** *

A non-expired access token for the user whose attribute verification code you * want to generate.

*/ inline const Aws::String& GetAccessToken() const{ return m_accessToken; } /** *

A non-expired access token for the user whose attribute verification code you * want to generate.

*/ inline bool AccessTokenHasBeenSet() const { return m_accessTokenHasBeenSet; } /** *

A non-expired access token for the user whose attribute verification code you * want to generate.

*/ inline void SetAccessToken(const Aws::String& value) { m_accessTokenHasBeenSet = true; m_accessToken = value; } /** *

A non-expired access token for the user whose attribute verification code you * want to generate.

*/ inline void SetAccessToken(Aws::String&& value) { m_accessTokenHasBeenSet = true; m_accessToken = std::move(value); } /** *

A non-expired access token for the user whose attribute verification code you * want to generate.

*/ inline void SetAccessToken(const char* value) { m_accessTokenHasBeenSet = true; m_accessToken.assign(value); } /** *

A non-expired access token for the user whose attribute verification code you * want to generate.

*/ inline GetUserAttributeVerificationCodeRequest& WithAccessToken(const Aws::String& value) { SetAccessToken(value); return *this;} /** *

A non-expired access token for the user whose attribute verification code you * want to generate.

*/ inline GetUserAttributeVerificationCodeRequest& WithAccessToken(Aws::String&& value) { SetAccessToken(std::move(value)); return *this;} /** *

A non-expired access token for the user whose attribute verification code you * want to generate.

*/ inline GetUserAttributeVerificationCodeRequest& WithAccessToken(const char* value) { SetAccessToken(value); return *this;} /** *

The attribute name returned by the server response to get the user attribute * verification code.

*/ inline const Aws::String& GetAttributeName() const{ return m_attributeName; } /** *

The attribute name returned by the server response to get the user attribute * verification code.

*/ inline bool AttributeNameHasBeenSet() const { return m_attributeNameHasBeenSet; } /** *

The attribute name returned by the server response to get the user attribute * verification code.

*/ inline void SetAttributeName(const Aws::String& value) { m_attributeNameHasBeenSet = true; m_attributeName = value; } /** *

The attribute name returned by the server response to get the user attribute * verification code.

*/ inline void SetAttributeName(Aws::String&& value) { m_attributeNameHasBeenSet = true; m_attributeName = std::move(value); } /** *

The attribute name returned by the server response to get the user attribute * verification code.

*/ inline void SetAttributeName(const char* value) { m_attributeNameHasBeenSet = true; m_attributeName.assign(value); } /** *

The attribute name returned by the server response to get the user attribute * verification code.

*/ inline GetUserAttributeVerificationCodeRequest& WithAttributeName(const Aws::String& value) { SetAttributeName(value); return *this;} /** *

The attribute name returned by the server response to get the user attribute * verification code.

*/ inline GetUserAttributeVerificationCodeRequest& WithAttributeName(Aws::String&& value) { SetAttributeName(std::move(value)); return *this;} /** *

The attribute name returned by the server response to get the user attribute * verification code.

*/ inline GetUserAttributeVerificationCodeRequest& WithAttributeName(const char* value) { SetAttributeName(value); return *this;} /** *

A map of custom key-value pairs that you can provide as input for any custom * workflows that this action triggers.

You create custom workflows by * assigning Lambda functions to user pool triggers. When you use the * GetUserAttributeVerificationCode API action, Amazon Cognito invokes the function * that is assigned to the custom message trigger. When Amazon Cognito * invokes this function, it passes a JSON payload, which the function receives as * input. This payload contains a clientMetadata attribute, which * provides the data that you assigned to the ClientMetadata parameter in your * GetUserAttributeVerificationCode request. In your function code in Lambda, you * can process the clientMetadata value to enhance your workflow for * your specific needs.

For more information, see * Customizing user pool Workflows with Lambda Triggers in the Amazon * Cognito Developer Guide.

When you use the ClientMetadata * parameter, remember that Amazon Cognito won't do the following:

  • *

    Store the ClientMetadata value. This data is available only to Lambda * triggers that are assigned to a user pool to support custom workflows. If your * user pool configuration doesn't include triggers, the ClientMetadata parameter * serves no purpose.

  • Validate the ClientMetadata value.

    *
  • Encrypt the ClientMetadata value. Don't use Amazon Cognito to * provide sensitive information.

*/ inline const Aws::Map& GetClientMetadata() const{ return m_clientMetadata; } /** *

A map of custom key-value pairs that you can provide as input for any custom * workflows that this action triggers.

You create custom workflows by * assigning Lambda functions to user pool triggers. When you use the * GetUserAttributeVerificationCode API action, Amazon Cognito invokes the function * that is assigned to the custom message trigger. When Amazon Cognito * invokes this function, it passes a JSON payload, which the function receives as * input. This payload contains a clientMetadata attribute, which * provides the data that you assigned to the ClientMetadata parameter in your * GetUserAttributeVerificationCode request. In your function code in Lambda, you * can process the clientMetadata value to enhance your workflow for * your specific needs.

For more information, see * Customizing user pool Workflows with Lambda Triggers in the Amazon * Cognito Developer Guide.

When you use the ClientMetadata * parameter, remember that Amazon Cognito won't do the following:

  • *

    Store the ClientMetadata value. This data is available only to Lambda * triggers that are assigned to a user pool to support custom workflows. If your * user pool configuration doesn't include triggers, the ClientMetadata parameter * serves no purpose.

  • Validate the ClientMetadata value.

    *
  • Encrypt the ClientMetadata value. Don't use Amazon Cognito to * provide sensitive information.

*/ inline bool ClientMetadataHasBeenSet() const { return m_clientMetadataHasBeenSet; } /** *

A map of custom key-value pairs that you can provide as input for any custom * workflows that this action triggers.

You create custom workflows by * assigning Lambda functions to user pool triggers. When you use the * GetUserAttributeVerificationCode API action, Amazon Cognito invokes the function * that is assigned to the custom message trigger. When Amazon Cognito * invokes this function, it passes a JSON payload, which the function receives as * input. This payload contains a clientMetadata attribute, which * provides the data that you assigned to the ClientMetadata parameter in your * GetUserAttributeVerificationCode request. In your function code in Lambda, you * can process the clientMetadata value to enhance your workflow for * your specific needs.

For more information, see * Customizing user pool Workflows with Lambda Triggers in the Amazon * Cognito Developer Guide.

When you use the ClientMetadata * parameter, remember that Amazon Cognito won't do the following:

  • *

    Store the ClientMetadata value. This data is available only to Lambda * triggers that are assigned to a user pool to support custom workflows. If your * user pool configuration doesn't include triggers, the ClientMetadata parameter * serves no purpose.

  • Validate the ClientMetadata value.

    *
  • Encrypt the ClientMetadata value. Don't use Amazon Cognito to * provide sensitive information.

*/ inline void SetClientMetadata(const Aws::Map& value) { m_clientMetadataHasBeenSet = true; m_clientMetadata = value; } /** *

A map of custom key-value pairs that you can provide as input for any custom * workflows that this action triggers.

You create custom workflows by * assigning Lambda functions to user pool triggers. When you use the * GetUserAttributeVerificationCode API action, Amazon Cognito invokes the function * that is assigned to the custom message trigger. When Amazon Cognito * invokes this function, it passes a JSON payload, which the function receives as * input. This payload contains a clientMetadata attribute, which * provides the data that you assigned to the ClientMetadata parameter in your * GetUserAttributeVerificationCode request. In your function code in Lambda, you * can process the clientMetadata value to enhance your workflow for * your specific needs.

For more information, see * Customizing user pool Workflows with Lambda Triggers in the Amazon * Cognito Developer Guide.

When you use the ClientMetadata * parameter, remember that Amazon Cognito won't do the following:

  • *

    Store the ClientMetadata value. This data is available only to Lambda * triggers that are assigned to a user pool to support custom workflows. If your * user pool configuration doesn't include triggers, the ClientMetadata parameter * serves no purpose.

  • Validate the ClientMetadata value.

    *
  • Encrypt the ClientMetadata value. Don't use Amazon Cognito to * provide sensitive information.

*/ inline void SetClientMetadata(Aws::Map&& value) { m_clientMetadataHasBeenSet = true; m_clientMetadata = std::move(value); } /** *

A map of custom key-value pairs that you can provide as input for any custom * workflows that this action triggers.

You create custom workflows by * assigning Lambda functions to user pool triggers. When you use the * GetUserAttributeVerificationCode API action, Amazon Cognito invokes the function * that is assigned to the custom message trigger. When Amazon Cognito * invokes this function, it passes a JSON payload, which the function receives as * input. This payload contains a clientMetadata attribute, which * provides the data that you assigned to the ClientMetadata parameter in your * GetUserAttributeVerificationCode request. In your function code in Lambda, you * can process the clientMetadata value to enhance your workflow for * your specific needs.

For more information, see * Customizing user pool Workflows with Lambda Triggers in the Amazon * Cognito Developer Guide.

When you use the ClientMetadata * parameter, remember that Amazon Cognito won't do the following:

  • *

    Store the ClientMetadata value. This data is available only to Lambda * triggers that are assigned to a user pool to support custom workflows. If your * user pool configuration doesn't include triggers, the ClientMetadata parameter * serves no purpose.

  • Validate the ClientMetadata value.

    *
  • Encrypt the ClientMetadata value. Don't use Amazon Cognito to * provide sensitive information.

*/ inline GetUserAttributeVerificationCodeRequest& WithClientMetadata(const Aws::Map& value) { SetClientMetadata(value); return *this;} /** *

A map of custom key-value pairs that you can provide as input for any custom * workflows that this action triggers.

You create custom workflows by * assigning Lambda functions to user pool triggers. When you use the * GetUserAttributeVerificationCode API action, Amazon Cognito invokes the function * that is assigned to the custom message trigger. When Amazon Cognito * invokes this function, it passes a JSON payload, which the function receives as * input. This payload contains a clientMetadata attribute, which * provides the data that you assigned to the ClientMetadata parameter in your * GetUserAttributeVerificationCode request. In your function code in Lambda, you * can process the clientMetadata value to enhance your workflow for * your specific needs.

For more information, see * Customizing user pool Workflows with Lambda Triggers in the Amazon * Cognito Developer Guide.

When you use the ClientMetadata * parameter, remember that Amazon Cognito won't do the following:

  • *

    Store the ClientMetadata value. This data is available only to Lambda * triggers that are assigned to a user pool to support custom workflows. If your * user pool configuration doesn't include triggers, the ClientMetadata parameter * serves no purpose.

  • Validate the ClientMetadata value.

    *
  • Encrypt the ClientMetadata value. Don't use Amazon Cognito to * provide sensitive information.

*/ inline GetUserAttributeVerificationCodeRequest& WithClientMetadata(Aws::Map&& value) { SetClientMetadata(std::move(value)); return *this;} /** *

A map of custom key-value pairs that you can provide as input for any custom * workflows that this action triggers.

You create custom workflows by * assigning Lambda functions to user pool triggers. When you use the * GetUserAttributeVerificationCode API action, Amazon Cognito invokes the function * that is assigned to the custom message trigger. When Amazon Cognito * invokes this function, it passes a JSON payload, which the function receives as * input. This payload contains a clientMetadata attribute, which * provides the data that you assigned to the ClientMetadata parameter in your * GetUserAttributeVerificationCode request. In your function code in Lambda, you * can process the clientMetadata value to enhance your workflow for * your specific needs.

For more information, see * Customizing user pool Workflows with Lambda Triggers in the Amazon * Cognito Developer Guide.

When you use the ClientMetadata * parameter, remember that Amazon Cognito won't do the following:

  • *

    Store the ClientMetadata value. This data is available only to Lambda * triggers that are assigned to a user pool to support custom workflows. If your * user pool configuration doesn't include triggers, the ClientMetadata parameter * serves no purpose.

  • Validate the ClientMetadata value.

    *
  • Encrypt the ClientMetadata value. Don't use Amazon Cognito to * provide sensitive information.

*/ inline GetUserAttributeVerificationCodeRequest& AddClientMetadata(const Aws::String& key, const Aws::String& value) { m_clientMetadataHasBeenSet = true; m_clientMetadata.emplace(key, value); return *this; } /** *

A map of custom key-value pairs that you can provide as input for any custom * workflows that this action triggers.

You create custom workflows by * assigning Lambda functions to user pool triggers. When you use the * GetUserAttributeVerificationCode API action, Amazon Cognito invokes the function * that is assigned to the custom message trigger. When Amazon Cognito * invokes this function, it passes a JSON payload, which the function receives as * input. This payload contains a clientMetadata attribute, which * provides the data that you assigned to the ClientMetadata parameter in your * GetUserAttributeVerificationCode request. In your function code in Lambda, you * can process the clientMetadata value to enhance your workflow for * your specific needs.

For more information, see * Customizing user pool Workflows with Lambda Triggers in the Amazon * Cognito Developer Guide.

When you use the ClientMetadata * parameter, remember that Amazon Cognito won't do the following:

  • *

    Store the ClientMetadata value. This data is available only to Lambda * triggers that are assigned to a user pool to support custom workflows. If your * user pool configuration doesn't include triggers, the ClientMetadata parameter * serves no purpose.

  • Validate the ClientMetadata value.

    *
  • Encrypt the ClientMetadata value. Don't use Amazon Cognito to * provide sensitive information.

*/ inline GetUserAttributeVerificationCodeRequest& AddClientMetadata(Aws::String&& key, const Aws::String& value) { m_clientMetadataHasBeenSet = true; m_clientMetadata.emplace(std::move(key), value); return *this; } /** *

A map of custom key-value pairs that you can provide as input for any custom * workflows that this action triggers.

You create custom workflows by * assigning Lambda functions to user pool triggers. When you use the * GetUserAttributeVerificationCode API action, Amazon Cognito invokes the function * that is assigned to the custom message trigger. When Amazon Cognito * invokes this function, it passes a JSON payload, which the function receives as * input. This payload contains a clientMetadata attribute, which * provides the data that you assigned to the ClientMetadata parameter in your * GetUserAttributeVerificationCode request. In your function code in Lambda, you * can process the clientMetadata value to enhance your workflow for * your specific needs.

For more information, see * Customizing user pool Workflows with Lambda Triggers in the Amazon * Cognito Developer Guide.

When you use the ClientMetadata * parameter, remember that Amazon Cognito won't do the following:

  • *

    Store the ClientMetadata value. This data is available only to Lambda * triggers that are assigned to a user pool to support custom workflows. If your * user pool configuration doesn't include triggers, the ClientMetadata parameter * serves no purpose.

  • Validate the ClientMetadata value.

    *
  • Encrypt the ClientMetadata value. Don't use Amazon Cognito to * provide sensitive information.

*/ inline GetUserAttributeVerificationCodeRequest& AddClientMetadata(const Aws::String& key, Aws::String&& value) { m_clientMetadataHasBeenSet = true; m_clientMetadata.emplace(key, std::move(value)); return *this; } /** *

A map of custom key-value pairs that you can provide as input for any custom * workflows that this action triggers.

You create custom workflows by * assigning Lambda functions to user pool triggers. When you use the * GetUserAttributeVerificationCode API action, Amazon Cognito invokes the function * that is assigned to the custom message trigger. When Amazon Cognito * invokes this function, it passes a JSON payload, which the function receives as * input. This payload contains a clientMetadata attribute, which * provides the data that you assigned to the ClientMetadata parameter in your * GetUserAttributeVerificationCode request. In your function code in Lambda, you * can process the clientMetadata value to enhance your workflow for * your specific needs.

For more information, see * Customizing user pool Workflows with Lambda Triggers in the Amazon * Cognito Developer Guide.

When you use the ClientMetadata * parameter, remember that Amazon Cognito won't do the following:

  • *

    Store the ClientMetadata value. This data is available only to Lambda * triggers that are assigned to a user pool to support custom workflows. If your * user pool configuration doesn't include triggers, the ClientMetadata parameter * serves no purpose.

  • Validate the ClientMetadata value.

    *
  • Encrypt the ClientMetadata value. Don't use Amazon Cognito to * provide sensitive information.

*/ inline GetUserAttributeVerificationCodeRequest& AddClientMetadata(Aws::String&& key, Aws::String&& value) { m_clientMetadataHasBeenSet = true; m_clientMetadata.emplace(std::move(key), std::move(value)); return *this; } /** *

A map of custom key-value pairs that you can provide as input for any custom * workflows that this action triggers.

You create custom workflows by * assigning Lambda functions to user pool triggers. When you use the * GetUserAttributeVerificationCode API action, Amazon Cognito invokes the function * that is assigned to the custom message trigger. When Amazon Cognito * invokes this function, it passes a JSON payload, which the function receives as * input. This payload contains a clientMetadata attribute, which * provides the data that you assigned to the ClientMetadata parameter in your * GetUserAttributeVerificationCode request. In your function code in Lambda, you * can process the clientMetadata value to enhance your workflow for * your specific needs.

For more information, see * Customizing user pool Workflows with Lambda Triggers in the Amazon * Cognito Developer Guide.

When you use the ClientMetadata * parameter, remember that Amazon Cognito won't do the following:

  • *

    Store the ClientMetadata value. This data is available only to Lambda * triggers that are assigned to a user pool to support custom workflows. If your * user pool configuration doesn't include triggers, the ClientMetadata parameter * serves no purpose.

  • Validate the ClientMetadata value.

    *
  • Encrypt the ClientMetadata value. Don't use Amazon Cognito to * provide sensitive information.

*/ inline GetUserAttributeVerificationCodeRequest& AddClientMetadata(const char* key, Aws::String&& value) { m_clientMetadataHasBeenSet = true; m_clientMetadata.emplace(key, std::move(value)); return *this; } /** *

A map of custom key-value pairs that you can provide as input for any custom * workflows that this action triggers.

You create custom workflows by * assigning Lambda functions to user pool triggers. When you use the * GetUserAttributeVerificationCode API action, Amazon Cognito invokes the function * that is assigned to the custom message trigger. When Amazon Cognito * invokes this function, it passes a JSON payload, which the function receives as * input. This payload contains a clientMetadata attribute, which * provides the data that you assigned to the ClientMetadata parameter in your * GetUserAttributeVerificationCode request. In your function code in Lambda, you * can process the clientMetadata value to enhance your workflow for * your specific needs.

For more information, see * Customizing user pool Workflows with Lambda Triggers in the Amazon * Cognito Developer Guide.

When you use the ClientMetadata * parameter, remember that Amazon Cognito won't do the following:

  • *

    Store the ClientMetadata value. This data is available only to Lambda * triggers that are assigned to a user pool to support custom workflows. If your * user pool configuration doesn't include triggers, the ClientMetadata parameter * serves no purpose.

  • Validate the ClientMetadata value.

    *
  • Encrypt the ClientMetadata value. Don't use Amazon Cognito to * provide sensitive information.

*/ inline GetUserAttributeVerificationCodeRequest& AddClientMetadata(Aws::String&& key, const char* value) { m_clientMetadataHasBeenSet = true; m_clientMetadata.emplace(std::move(key), value); return *this; } /** *

A map of custom key-value pairs that you can provide as input for any custom * workflows that this action triggers.

You create custom workflows by * assigning Lambda functions to user pool triggers. When you use the * GetUserAttributeVerificationCode API action, Amazon Cognito invokes the function * that is assigned to the custom message trigger. When Amazon Cognito * invokes this function, it passes a JSON payload, which the function receives as * input. This payload contains a clientMetadata attribute, which * provides the data that you assigned to the ClientMetadata parameter in your * GetUserAttributeVerificationCode request. In your function code in Lambda, you * can process the clientMetadata value to enhance your workflow for * your specific needs.

For more information, see * Customizing user pool Workflows with Lambda Triggers in the Amazon * Cognito Developer Guide.

When you use the ClientMetadata * parameter, remember that Amazon Cognito won't do the following:

  • *

    Store the ClientMetadata value. This data is available only to Lambda * triggers that are assigned to a user pool to support custom workflows. If your * user pool configuration doesn't include triggers, the ClientMetadata parameter * serves no purpose.

  • Validate the ClientMetadata value.

    *
  • Encrypt the ClientMetadata value. Don't use Amazon Cognito to * provide sensitive information.

*/ inline GetUserAttributeVerificationCodeRequest& AddClientMetadata(const char* key, const char* value) { m_clientMetadataHasBeenSet = true; m_clientMetadata.emplace(key, value); return *this; } private: Aws::String m_accessToken; bool m_accessTokenHasBeenSet = false; Aws::String m_attributeName; bool m_attributeNameHasBeenSet = false; Aws::Map m_clientMetadata; bool m_clientMetadataHasBeenSet = false; }; } // namespace Model } // namespace CognitoIdentityProvider } // namespace Aws