All Downloads are FREE. Search and download functionalities are using the official Maven repository.

com.amazonaws.services.cognitoidp.model.UpdateUserPoolClientRequest Maven / Gradle / Ivy

/*
 * Copyright 2016-2021 Amazon.com, Inc. or its affiliates. All Rights Reserved.
 * 
 * Licensed under the Apache License, Version 2.0 (the "License"). You may not use this file except in compliance with
 * the License. A copy of the License is located at
 * 
 * http://aws.amazon.com/apache2.0
 * 
 * or in the "license" file accompanying this file. This file is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR
 * CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions
 * and limitations under the License.
 */
package com.amazonaws.services.cognitoidp.model;

import java.io.Serializable;
import javax.annotation.Generated;

import com.amazonaws.AmazonWebServiceRequest;

/**
 * 

* Represents the request to update the user pool client. *

* * @see AWS * API Documentation */ @Generated("com.amazonaws:aws-java-sdk-code-generator") public class UpdateUserPoolClientRequest extends com.amazonaws.AmazonWebServiceRequest implements Serializable, Cloneable { /** *

* The user pool ID for the user pool where you want to update the user pool client. *

*/ private String userPoolId; /** *

* The ID of the client associated with the user pool. *

*/ private String clientId; /** *

* The client name from the update user pool client request. *

*/ private String clientName; /** *

* The time limit, in days, after which the refresh token is no longer valid and cannot be used. *

*/ private Integer refreshTokenValidity; /** *

* The time limit, after which the access token is no longer valid and cannot be used. *

*/ private Integer accessTokenValidity; /** *

* The time limit, after which the ID token is no longer valid and cannot be used. *

*/ private Integer idTokenValidity; /** *

* The units in which the validity times are represented in. Default for RefreshToken is days, and default for ID * and access tokens are hours. *

*/ private TokenValidityUnitsType tokenValidityUnits; /** *

* The read-only attributes of the user pool. *

*/ private java.util.List readAttributes; /** *

* The writeable attributes of the user pool. *

*/ private java.util.List writeAttributes; /** *

* The authentication flows that are supported by the user pool clients. Flow names without the ALLOW_ * prefix are deprecated in favor of new names with the ALLOW_ prefix. Note that values with * ALLOW_ prefix cannot be used along with values without ALLOW_ prefix. *

*

* Valid values include: *

*
    *
  • *

    * ALLOW_ADMIN_USER_PASSWORD_AUTH: Enable admin based user password authentication flow * ADMIN_USER_PASSWORD_AUTH. This setting replaces the ADMIN_NO_SRP_AUTH setting. With * this authentication flow, Cognito receives the password in the request instead of using the SRP (Secure Remote * Password protocol) protocol to verify passwords. *

    *
  • *
  • *

    * ALLOW_CUSTOM_AUTH: Enable Lambda trigger based authentication. *

    *
  • *
  • *

    * ALLOW_USER_PASSWORD_AUTH: Enable user password-based authentication. In this flow, Cognito receives * the password in the request instead of using the SRP protocol to verify passwords. *

    *
  • *
  • *

    * ALLOW_USER_SRP_AUTH: Enable SRP based authentication. *

    *
  • *
  • *

    * ALLOW_REFRESH_TOKEN_AUTH: Enable authflow to refresh tokens. *

    *
  • *
*/ private java.util.List explicitAuthFlows; /** *

* A list of provider names for the identity providers that are supported on this client. *

*/ private java.util.List supportedIdentityProviders; /** *

* A list of allowed redirect (callback) URLs for the identity providers. *

*

* A redirect URI must: *

*
    *
  • *

    * Be an absolute URI. *

    *
  • *
  • *

    * Be registered with the authorization server. *

    *
  • *
  • *

    * Not include a fragment component. *

    *
  • *
*

* See OAuth 2.0 - Redirection Endpoint. *

*

* Amazon Cognito requires HTTPS over HTTP except for http://localhost for testing purposes only. *

*

* App callback URLs such as myapp://example are also supported. *

*/ private java.util.List callbackURLs; /** *

* A list of allowed logout URLs for the identity providers. *

*/ private java.util.List logoutURLs; /** *

* The default redirect URI. Must be in the CallbackURLs list. *

*

* A redirect URI must: *

*
    *
  • *

    * Be an absolute URI. *

    *
  • *
  • *

    * Be registered with the authorization server. *

    *
  • *
  • *

    * Not include a fragment component. *

    *
  • *
*

* See OAuth 2.0 - Redirection Endpoint. *

*

* Amazon Cognito requires HTTPS over HTTP except for http://localhost for testing purposes only. *

*

* App callback URLs such as myapp://example are also supported. *

*/ private String defaultRedirectURI; /** *

* The allowed OAuth flows. *

*

* Set to code to initiate a code grant flow, which provides an authorization code as the response. * This code can be exchanged for access tokens with the token endpoint. *

*

* Set to implicit to specify that the client should get the access token (and, optionally, ID token, * based on scopes) directly. *

*

* Set to client_credentials to specify that the client should get the access token (and, optionally, * ID token, based on scopes) from the token endpoint using a combination of client and client_secret. *

*/ private java.util.List allowedOAuthFlows; /** *

* The allowed OAuth scopes. Possible values provided by OAuth are: phone, email, * openid, and profile. Possible values provided by Amazon Web Services are: * aws.cognito.signin.user.admin. Custom scopes created in Resource Servers are also supported. *

*/ private java.util.List allowedOAuthScopes; /** *

* Set to true if the client is allowed to follow the OAuth protocol when interacting with Cognito user pools. *

*/ private Boolean allowedOAuthFlowsUserPoolClient; /** *

* The Amazon Pinpoint analytics configuration for collecting metrics for this user pool. *

* *

* In regions where Pinpoint is not available, Cognito User Pools only supports sending events to Amazon Pinpoint * projects in us-east-1. In regions where Pinpoint is available, Cognito User Pools will support sending events to * Amazon Pinpoint projects within that same region. *

*
*/ private AnalyticsConfigurationType analyticsConfiguration; /** *

* Use this setting to choose which errors and responses are returned by Cognito APIs during authentication, account * confirmation, and password recovery when the user does not exist in the user pool. When set to * ENABLED and the user does not exist, authentication returns an error indicating either the username * or password was incorrect, and account confirmation and password recovery return a response indicating a code was * sent to a simulated destination. When set to LEGACY, those APIs will return a * UserNotFoundException exception if the user does not exist in the user pool. *

*

* Valid values include: *

*
    *
  • *

    * ENABLED - This prevents user existence-related errors. *

    *
  • *
  • *

    * LEGACY - This represents the old behavior of Cognito where user existence related errors are not * prevented. *

    *
  • *
* *

* After February 15th 2020, the value of PreventUserExistenceErrors will default to * ENABLED for newly created user pool clients if no value is provided. *

*
*/ private String preventUserExistenceErrors; /** *

* Enables or disables token revocation. For more information about revoking tokens, see RevokeToken. *

*/ private Boolean enableTokenRevocation; /** *

* The user pool ID for the user pool where you want to update the user pool client. *

* * @param userPoolId * The user pool ID for the user pool where you want to update the user pool client. */ public void setUserPoolId(String userPoolId) { this.userPoolId = userPoolId; } /** *

* The user pool ID for the user pool where you want to update the user pool client. *

* * @return The user pool ID for the user pool where you want to update the user pool client. */ public String getUserPoolId() { return this.userPoolId; } /** *

* The user pool ID for the user pool where you want to update the user pool client. *

* * @param userPoolId * The user pool ID for the user pool where you want to update the user pool client. * @return Returns a reference to this object so that method calls can be chained together. */ public UpdateUserPoolClientRequest withUserPoolId(String userPoolId) { setUserPoolId(userPoolId); return this; } /** *

* The ID of the client associated with the user pool. *

* * @param clientId * The ID of the client associated with the user pool. */ public void setClientId(String clientId) { this.clientId = clientId; } /** *

* The ID of the client associated with the user pool. *

* * @return The ID of the client associated with the user pool. */ public String getClientId() { return this.clientId; } /** *

* The ID of the client associated with the user pool. *

* * @param clientId * The ID of the client associated with the user pool. * @return Returns a reference to this object so that method calls can be chained together. */ public UpdateUserPoolClientRequest withClientId(String clientId) { setClientId(clientId); return this; } /** *

* The client name from the update user pool client request. *

* * @param clientName * The client name from the update user pool client request. */ public void setClientName(String clientName) { this.clientName = clientName; } /** *

* The client name from the update user pool client request. *

* * @return The client name from the update user pool client request. */ public String getClientName() { return this.clientName; } /** *

* The client name from the update user pool client request. *

* * @param clientName * The client name from the update user pool client request. * @return Returns a reference to this object so that method calls can be chained together. */ public UpdateUserPoolClientRequest withClientName(String clientName) { setClientName(clientName); return this; } /** *

* The time limit, in days, after which the refresh token is no longer valid and cannot be used. *

* * @param refreshTokenValidity * The time limit, in days, after which the refresh token is no longer valid and cannot be used. */ public void setRefreshTokenValidity(Integer refreshTokenValidity) { this.refreshTokenValidity = refreshTokenValidity; } /** *

* The time limit, in days, after which the refresh token is no longer valid and cannot be used. *

* * @return The time limit, in days, after which the refresh token is no longer valid and cannot be used. */ public Integer getRefreshTokenValidity() { return this.refreshTokenValidity; } /** *

* The time limit, in days, after which the refresh token is no longer valid and cannot be used. *

* * @param refreshTokenValidity * The time limit, in days, after which the refresh token is no longer valid and cannot be used. * @return Returns a reference to this object so that method calls can be chained together. */ public UpdateUserPoolClientRequest withRefreshTokenValidity(Integer refreshTokenValidity) { setRefreshTokenValidity(refreshTokenValidity); return this; } /** *

* The time limit, after which the access token is no longer valid and cannot be used. *

* * @param accessTokenValidity * The time limit, after which the access token is no longer valid and cannot be used. */ public void setAccessTokenValidity(Integer accessTokenValidity) { this.accessTokenValidity = accessTokenValidity; } /** *

* The time limit, after which the access token is no longer valid and cannot be used. *

* * @return The time limit, after which the access token is no longer valid and cannot be used. */ public Integer getAccessTokenValidity() { return this.accessTokenValidity; } /** *

* The time limit, after which the access token is no longer valid and cannot be used. *

* * @param accessTokenValidity * The time limit, after which the access token is no longer valid and cannot be used. * @return Returns a reference to this object so that method calls can be chained together. */ public UpdateUserPoolClientRequest withAccessTokenValidity(Integer accessTokenValidity) { setAccessTokenValidity(accessTokenValidity); return this; } /** *

* The time limit, after which the ID token is no longer valid and cannot be used. *

* * @param idTokenValidity * The time limit, after which the ID token is no longer valid and cannot be used. */ public void setIdTokenValidity(Integer idTokenValidity) { this.idTokenValidity = idTokenValidity; } /** *

* The time limit, after which the ID token is no longer valid and cannot be used. *

* * @return The time limit, after which the ID token is no longer valid and cannot be used. */ public Integer getIdTokenValidity() { return this.idTokenValidity; } /** *

* The time limit, after which the ID token is no longer valid and cannot be used. *

* * @param idTokenValidity * The time limit, after which the ID token is no longer valid and cannot be used. * @return Returns a reference to this object so that method calls can be chained together. */ public UpdateUserPoolClientRequest withIdTokenValidity(Integer idTokenValidity) { setIdTokenValidity(idTokenValidity); return this; } /** *

* The units in which the validity times are represented in. Default for RefreshToken is days, and default for ID * and access tokens are hours. *

* * @param tokenValidityUnits * The units in which the validity times are represented in. Default for RefreshToken is days, and default * for ID and access tokens are hours. */ public void setTokenValidityUnits(TokenValidityUnitsType tokenValidityUnits) { this.tokenValidityUnits = tokenValidityUnits; } /** *

* The units in which the validity times are represented in. Default for RefreshToken is days, and default for ID * and access tokens are hours. *

* * @return The units in which the validity times are represented in. Default for RefreshToken is days, and default * for ID and access tokens are hours. */ public TokenValidityUnitsType getTokenValidityUnits() { return this.tokenValidityUnits; } /** *

* The units in which the validity times are represented in. Default for RefreshToken is days, and default for ID * and access tokens are hours. *

* * @param tokenValidityUnits * The units in which the validity times are represented in. Default for RefreshToken is days, and default * for ID and access tokens are hours. * @return Returns a reference to this object so that method calls can be chained together. */ public UpdateUserPoolClientRequest withTokenValidityUnits(TokenValidityUnitsType tokenValidityUnits) { setTokenValidityUnits(tokenValidityUnits); return this; } /** *

* The read-only attributes of the user pool. *

* * @return The read-only attributes of the user pool. */ public java.util.List getReadAttributes() { return readAttributes; } /** *

* The read-only attributes of the user pool. *

* * @param readAttributes * The read-only attributes of the user pool. */ public void setReadAttributes(java.util.Collection readAttributes) { if (readAttributes == null) { this.readAttributes = null; return; } this.readAttributes = new java.util.ArrayList(readAttributes); } /** *

* The read-only attributes of the user pool. *

*

* NOTE: This method appends the values to the existing list (if any). Use * {@link #setReadAttributes(java.util.Collection)} or {@link #withReadAttributes(java.util.Collection)} if you want * to override the existing values. *

* * @param readAttributes * The read-only attributes of the user pool. * @return Returns a reference to this object so that method calls can be chained together. */ public UpdateUserPoolClientRequest withReadAttributes(String... readAttributes) { if (this.readAttributes == null) { setReadAttributes(new java.util.ArrayList(readAttributes.length)); } for (String ele : readAttributes) { this.readAttributes.add(ele); } return this; } /** *

* The read-only attributes of the user pool. *

* * @param readAttributes * The read-only attributes of the user pool. * @return Returns a reference to this object so that method calls can be chained together. */ public UpdateUserPoolClientRequest withReadAttributes(java.util.Collection readAttributes) { setReadAttributes(readAttributes); return this; } /** *

* The writeable attributes of the user pool. *

* * @return The writeable attributes of the user pool. */ public java.util.List getWriteAttributes() { return writeAttributes; } /** *

* The writeable attributes of the user pool. *

* * @param writeAttributes * The writeable attributes of the user pool. */ public void setWriteAttributes(java.util.Collection writeAttributes) { if (writeAttributes == null) { this.writeAttributes = null; return; } this.writeAttributes = new java.util.ArrayList(writeAttributes); } /** *

* The writeable attributes of the user pool. *

*

* NOTE: This method appends the values to the existing list (if any). Use * {@link #setWriteAttributes(java.util.Collection)} or {@link #withWriteAttributes(java.util.Collection)} if you * want to override the existing values. *

* * @param writeAttributes * The writeable attributes of the user pool. * @return Returns a reference to this object so that method calls can be chained together. */ public UpdateUserPoolClientRequest withWriteAttributes(String... writeAttributes) { if (this.writeAttributes == null) { setWriteAttributes(new java.util.ArrayList(writeAttributes.length)); } for (String ele : writeAttributes) { this.writeAttributes.add(ele); } return this; } /** *

* The writeable attributes of the user pool. *

* * @param writeAttributes * The writeable attributes of the user pool. * @return Returns a reference to this object so that method calls can be chained together. */ public UpdateUserPoolClientRequest withWriteAttributes(java.util.Collection writeAttributes) { setWriteAttributes(writeAttributes); return this; } /** *

* The authentication flows that are supported by the user pool clients. Flow names without the ALLOW_ * prefix are deprecated in favor of new names with the ALLOW_ prefix. Note that values with * ALLOW_ prefix cannot be used along with values without ALLOW_ prefix. *

*

* Valid values include: *

*
    *
  • *

    * ALLOW_ADMIN_USER_PASSWORD_AUTH: Enable admin based user password authentication flow * ADMIN_USER_PASSWORD_AUTH. This setting replaces the ADMIN_NO_SRP_AUTH setting. With * this authentication flow, Cognito receives the password in the request instead of using the SRP (Secure Remote * Password protocol) protocol to verify passwords. *

    *
  • *
  • *

    * ALLOW_CUSTOM_AUTH: Enable Lambda trigger based authentication. *

    *
  • *
  • *

    * ALLOW_USER_PASSWORD_AUTH: Enable user password-based authentication. In this flow, Cognito receives * the password in the request instead of using the SRP protocol to verify passwords. *

    *
  • *
  • *

    * ALLOW_USER_SRP_AUTH: Enable SRP based authentication. *

    *
  • *
  • *

    * ALLOW_REFRESH_TOKEN_AUTH: Enable authflow to refresh tokens. *

    *
  • *
* * @return The authentication flows that are supported by the user pool clients. Flow names without the * ALLOW_ prefix are deprecated in favor of new names with the ALLOW_ prefix. Note * that values with ALLOW_ prefix cannot be used along with values without ALLOW_ * prefix.

*

* Valid values include: *

*
    *
  • *

    * ALLOW_ADMIN_USER_PASSWORD_AUTH: Enable admin based user password authentication flow * ADMIN_USER_PASSWORD_AUTH. This setting replaces the ADMIN_NO_SRP_AUTH setting. * With this authentication flow, Cognito receives the password in the request instead of using the SRP * (Secure Remote Password protocol) protocol to verify passwords. *

    *
  • *
  • *

    * ALLOW_CUSTOM_AUTH: Enable Lambda trigger based authentication. *

    *
  • *
  • *

    * ALLOW_USER_PASSWORD_AUTH: Enable user password-based authentication. In this flow, Cognito * receives the password in the request instead of using the SRP protocol to verify passwords. *

    *
  • *
  • *

    * ALLOW_USER_SRP_AUTH: Enable SRP based authentication. *

    *
  • *
  • *

    * ALLOW_REFRESH_TOKEN_AUTH: Enable authflow to refresh tokens. *

    *
  • * @see ExplicitAuthFlowsType */ public java.util.List getExplicitAuthFlows() { return explicitAuthFlows; } /** *

    * The authentication flows that are supported by the user pool clients. Flow names without the ALLOW_ * prefix are deprecated in favor of new names with the ALLOW_ prefix. Note that values with * ALLOW_ prefix cannot be used along with values without ALLOW_ prefix. *

    *

    * Valid values include: *

    *
      *
    • *

      * ALLOW_ADMIN_USER_PASSWORD_AUTH: Enable admin based user password authentication flow * ADMIN_USER_PASSWORD_AUTH. This setting replaces the ADMIN_NO_SRP_AUTH setting. With * this authentication flow, Cognito receives the password in the request instead of using the SRP (Secure Remote * Password protocol) protocol to verify passwords. *

      *
    • *
    • *

      * ALLOW_CUSTOM_AUTH: Enable Lambda trigger based authentication. *

      *
    • *
    • *

      * ALLOW_USER_PASSWORD_AUTH: Enable user password-based authentication. In this flow, Cognito receives * the password in the request instead of using the SRP protocol to verify passwords. *

      *
    • *
    • *

      * ALLOW_USER_SRP_AUTH: Enable SRP based authentication. *

      *
    • *
    • *

      * ALLOW_REFRESH_TOKEN_AUTH: Enable authflow to refresh tokens. *

      *
    • *
    * * @param explicitAuthFlows * The authentication flows that are supported by the user pool clients. Flow names without the * ALLOW_ prefix are deprecated in favor of new names with the ALLOW_ prefix. Note * that values with ALLOW_ prefix cannot be used along with values without ALLOW_ * prefix.

    *

    * Valid values include: *

    *
      *
    • *

      * ALLOW_ADMIN_USER_PASSWORD_AUTH: Enable admin based user password authentication flow * ADMIN_USER_PASSWORD_AUTH. This setting replaces the ADMIN_NO_SRP_AUTH setting. * With this authentication flow, Cognito receives the password in the request instead of using the SRP * (Secure Remote Password protocol) protocol to verify passwords. *

      *
    • *
    • *

      * ALLOW_CUSTOM_AUTH: Enable Lambda trigger based authentication. *

      *
    • *
    • *

      * ALLOW_USER_PASSWORD_AUTH: Enable user password-based authentication. In this flow, Cognito * receives the password in the request instead of using the SRP protocol to verify passwords. *

      *
    • *
    • *

      * ALLOW_USER_SRP_AUTH: Enable SRP based authentication. *

      *
    • *
    • *

      * ALLOW_REFRESH_TOKEN_AUTH: Enable authflow to refresh tokens. *

      *
    • * @see ExplicitAuthFlowsType */ public void setExplicitAuthFlows(java.util.Collection explicitAuthFlows) { if (explicitAuthFlows == null) { this.explicitAuthFlows = null; return; } this.explicitAuthFlows = new java.util.ArrayList(explicitAuthFlows); } /** *

      * The authentication flows that are supported by the user pool clients. Flow names without the ALLOW_ * prefix are deprecated in favor of new names with the ALLOW_ prefix. Note that values with * ALLOW_ prefix cannot be used along with values without ALLOW_ prefix. *

      *

      * Valid values include: *

      *
        *
      • *

        * ALLOW_ADMIN_USER_PASSWORD_AUTH: Enable admin based user password authentication flow * ADMIN_USER_PASSWORD_AUTH. This setting replaces the ADMIN_NO_SRP_AUTH setting. With * this authentication flow, Cognito receives the password in the request instead of using the SRP (Secure Remote * Password protocol) protocol to verify passwords. *

        *
      • *
      • *

        * ALLOW_CUSTOM_AUTH: Enable Lambda trigger based authentication. *

        *
      • *
      • *

        * ALLOW_USER_PASSWORD_AUTH: Enable user password-based authentication. In this flow, Cognito receives * the password in the request instead of using the SRP protocol to verify passwords. *

        *
      • *
      • *

        * ALLOW_USER_SRP_AUTH: Enable SRP based authentication. *

        *
      • *
      • *

        * ALLOW_REFRESH_TOKEN_AUTH: Enable authflow to refresh tokens. *

        *
      • *
      *

      * NOTE: This method appends the values to the existing list (if any). Use * {@link #setExplicitAuthFlows(java.util.Collection)} or {@link #withExplicitAuthFlows(java.util.Collection)} if * you want to override the existing values. *

      * * @param explicitAuthFlows * The authentication flows that are supported by the user pool clients. Flow names without the * ALLOW_ prefix are deprecated in favor of new names with the ALLOW_ prefix. Note * that values with ALLOW_ prefix cannot be used along with values without ALLOW_ * prefix.

      *

      * Valid values include: *

      *
        *
      • *

        * ALLOW_ADMIN_USER_PASSWORD_AUTH: Enable admin based user password authentication flow * ADMIN_USER_PASSWORD_AUTH. This setting replaces the ADMIN_NO_SRP_AUTH setting. * With this authentication flow, Cognito receives the password in the request instead of using the SRP * (Secure Remote Password protocol) protocol to verify passwords. *

        *
      • *
      • *

        * ALLOW_CUSTOM_AUTH: Enable Lambda trigger based authentication. *

        *
      • *
      • *

        * ALLOW_USER_PASSWORD_AUTH: Enable user password-based authentication. In this flow, Cognito * receives the password in the request instead of using the SRP protocol to verify passwords. *

        *
      • *
      • *

        * ALLOW_USER_SRP_AUTH: Enable SRP based authentication. *

        *
      • *
      • *

        * ALLOW_REFRESH_TOKEN_AUTH: Enable authflow to refresh tokens. *

        *
      • * @return Returns a reference to this object so that method calls can be chained together. * @see ExplicitAuthFlowsType */ public UpdateUserPoolClientRequest withExplicitAuthFlows(String... explicitAuthFlows) { if (this.explicitAuthFlows == null) { setExplicitAuthFlows(new java.util.ArrayList(explicitAuthFlows.length)); } for (String ele : explicitAuthFlows) { this.explicitAuthFlows.add(ele); } return this; } /** *

        * The authentication flows that are supported by the user pool clients. Flow names without the ALLOW_ * prefix are deprecated in favor of new names with the ALLOW_ prefix. Note that values with * ALLOW_ prefix cannot be used along with values without ALLOW_ prefix. *

        *

        * Valid values include: *

        *
          *
        • *

          * ALLOW_ADMIN_USER_PASSWORD_AUTH: Enable admin based user password authentication flow * ADMIN_USER_PASSWORD_AUTH. This setting replaces the ADMIN_NO_SRP_AUTH setting. With * this authentication flow, Cognito receives the password in the request instead of using the SRP (Secure Remote * Password protocol) protocol to verify passwords. *

          *
        • *
        • *

          * ALLOW_CUSTOM_AUTH: Enable Lambda trigger based authentication. *

          *
        • *
        • *

          * ALLOW_USER_PASSWORD_AUTH: Enable user password-based authentication. In this flow, Cognito receives * the password in the request instead of using the SRP protocol to verify passwords. *

          *
        • *
        • *

          * ALLOW_USER_SRP_AUTH: Enable SRP based authentication. *

          *
        • *
        • *

          * ALLOW_REFRESH_TOKEN_AUTH: Enable authflow to refresh tokens. *

          *
        • *
        * * @param explicitAuthFlows * The authentication flows that are supported by the user pool clients. Flow names without the * ALLOW_ prefix are deprecated in favor of new names with the ALLOW_ prefix. Note * that values with ALLOW_ prefix cannot be used along with values without ALLOW_ * prefix.

        *

        * Valid values include: *

        *
          *
        • *

          * ALLOW_ADMIN_USER_PASSWORD_AUTH: Enable admin based user password authentication flow * ADMIN_USER_PASSWORD_AUTH. This setting replaces the ADMIN_NO_SRP_AUTH setting. * With this authentication flow, Cognito receives the password in the request instead of using the SRP * (Secure Remote Password protocol) protocol to verify passwords. *

          *
        • *
        • *

          * ALLOW_CUSTOM_AUTH: Enable Lambda trigger based authentication. *

          *
        • *
        • *

          * ALLOW_USER_PASSWORD_AUTH: Enable user password-based authentication. In this flow, Cognito * receives the password in the request instead of using the SRP protocol to verify passwords. *

          *
        • *
        • *

          * ALLOW_USER_SRP_AUTH: Enable SRP based authentication. *

          *
        • *
        • *

          * ALLOW_REFRESH_TOKEN_AUTH: Enable authflow to refresh tokens. *

          *
        • * @return Returns a reference to this object so that method calls can be chained together. * @see ExplicitAuthFlowsType */ public UpdateUserPoolClientRequest withExplicitAuthFlows(java.util.Collection explicitAuthFlows) { setExplicitAuthFlows(explicitAuthFlows); return this; } /** *

          * The authentication flows that are supported by the user pool clients. Flow names without the ALLOW_ * prefix are deprecated in favor of new names with the ALLOW_ prefix. Note that values with * ALLOW_ prefix cannot be used along with values without ALLOW_ prefix. *

          *

          * Valid values include: *

          *
            *
          • *

            * ALLOW_ADMIN_USER_PASSWORD_AUTH: Enable admin based user password authentication flow * ADMIN_USER_PASSWORD_AUTH. This setting replaces the ADMIN_NO_SRP_AUTH setting. With * this authentication flow, Cognito receives the password in the request instead of using the SRP (Secure Remote * Password protocol) protocol to verify passwords. *

            *
          • *
          • *

            * ALLOW_CUSTOM_AUTH: Enable Lambda trigger based authentication. *

            *
          • *
          • *

            * ALLOW_USER_PASSWORD_AUTH: Enable user password-based authentication. In this flow, Cognito receives * the password in the request instead of using the SRP protocol to verify passwords. *

            *
          • *
          • *

            * ALLOW_USER_SRP_AUTH: Enable SRP based authentication. *

            *
          • *
          • *

            * ALLOW_REFRESH_TOKEN_AUTH: Enable authflow to refresh tokens. *

            *
          • *
          * * @param explicitAuthFlows * The authentication flows that are supported by the user pool clients. Flow names without the * ALLOW_ prefix are deprecated in favor of new names with the ALLOW_ prefix. Note * that values with ALLOW_ prefix cannot be used along with values without ALLOW_ * prefix.

          *

          * Valid values include: *

          *
            *
          • *

            * ALLOW_ADMIN_USER_PASSWORD_AUTH: Enable admin based user password authentication flow * ADMIN_USER_PASSWORD_AUTH. This setting replaces the ADMIN_NO_SRP_AUTH setting. * With this authentication flow, Cognito receives the password in the request instead of using the SRP * (Secure Remote Password protocol) protocol to verify passwords. *

            *
          • *
          • *

            * ALLOW_CUSTOM_AUTH: Enable Lambda trigger based authentication. *

            *
          • *
          • *

            * ALLOW_USER_PASSWORD_AUTH: Enable user password-based authentication. In this flow, Cognito * receives the password in the request instead of using the SRP protocol to verify passwords. *

            *
          • *
          • *

            * ALLOW_USER_SRP_AUTH: Enable SRP based authentication. *

            *
          • *
          • *

            * ALLOW_REFRESH_TOKEN_AUTH: Enable authflow to refresh tokens. *

            *
          • * @return Returns a reference to this object so that method calls can be chained together. * @see ExplicitAuthFlowsType */ public UpdateUserPoolClientRequest withExplicitAuthFlows(ExplicitAuthFlowsType... explicitAuthFlows) { java.util.ArrayList explicitAuthFlowsCopy = new java.util.ArrayList(explicitAuthFlows.length); for (ExplicitAuthFlowsType value : explicitAuthFlows) { explicitAuthFlowsCopy.add(value.toString()); } if (getExplicitAuthFlows() == null) { setExplicitAuthFlows(explicitAuthFlowsCopy); } else { getExplicitAuthFlows().addAll(explicitAuthFlowsCopy); } return this; } /** *

            * A list of provider names for the identity providers that are supported on this client. *

            * * @return A list of provider names for the identity providers that are supported on this client. */ public java.util.List getSupportedIdentityProviders() { return supportedIdentityProviders; } /** *

            * A list of provider names for the identity providers that are supported on this client. *

            * * @param supportedIdentityProviders * A list of provider names for the identity providers that are supported on this client. */ public void setSupportedIdentityProviders(java.util.Collection supportedIdentityProviders) { if (supportedIdentityProviders == null) { this.supportedIdentityProviders = null; return; } this.supportedIdentityProviders = new java.util.ArrayList(supportedIdentityProviders); } /** *

            * A list of provider names for the identity providers that are supported on this client. *

            *

            * NOTE: This method appends the values to the existing list (if any). Use * {@link #setSupportedIdentityProviders(java.util.Collection)} or * {@link #withSupportedIdentityProviders(java.util.Collection)} if you want to override the existing values. *

            * * @param supportedIdentityProviders * A list of provider names for the identity providers that are supported on this client. * @return Returns a reference to this object so that method calls can be chained together. */ public UpdateUserPoolClientRequest withSupportedIdentityProviders(String... supportedIdentityProviders) { if (this.supportedIdentityProviders == null) { setSupportedIdentityProviders(new java.util.ArrayList(supportedIdentityProviders.length)); } for (String ele : supportedIdentityProviders) { this.supportedIdentityProviders.add(ele); } return this; } /** *

            * A list of provider names for the identity providers that are supported on this client. *

            * * @param supportedIdentityProviders * A list of provider names for the identity providers that are supported on this client. * @return Returns a reference to this object so that method calls can be chained together. */ public UpdateUserPoolClientRequest withSupportedIdentityProviders(java.util.Collection supportedIdentityProviders) { setSupportedIdentityProviders(supportedIdentityProviders); return this; } /** *

            * A list of allowed redirect (callback) URLs for the identity providers. *

            *

            * A redirect URI must: *

            *
              *
            • *

              * Be an absolute URI. *

              *
            • *
            • *

              * Be registered with the authorization server. *

              *
            • *
            • *

              * Not include a fragment component. *

              *
            • *
            *

            * See OAuth 2.0 - Redirection Endpoint. *

            *

            * Amazon Cognito requires HTTPS over HTTP except for http://localhost for testing purposes only. *

            *

            * App callback URLs such as myapp://example are also supported. *

            * * @return A list of allowed redirect (callback) URLs for the identity providers.

            *

            * A redirect URI must: *

            *
              *
            • *

              * Be an absolute URI. *

              *
            • *
            • *

              * Be registered with the authorization server. *

              *
            • *
            • *

              * Not include a fragment component. *

              *
            • *
            *

            * See OAuth 2.0 - Redirection Endpoint. *

            *

            * Amazon Cognito requires HTTPS over HTTP except for http://localhost for testing purposes only. *

            *

            * App callback URLs such as myapp://example are also supported. */ public java.util.List getCallbackURLs() { return callbackURLs; } /** *

            * A list of allowed redirect (callback) URLs for the identity providers. *

            *

            * A redirect URI must: *

            *
              *
            • *

              * Be an absolute URI. *

              *
            • *
            • *

              * Be registered with the authorization server. *

              *
            • *
            • *

              * Not include a fragment component. *

              *
            • *
            *

            * See OAuth 2.0 - Redirection Endpoint. *

            *

            * Amazon Cognito requires HTTPS over HTTP except for http://localhost for testing purposes only. *

            *

            * App callback URLs such as myapp://example are also supported. *

            * * @param callbackURLs * A list of allowed redirect (callback) URLs for the identity providers.

            *

            * A redirect URI must: *

            *
              *
            • *

              * Be an absolute URI. *

              *
            • *
            • *

              * Be registered with the authorization server. *

              *
            • *
            • *

              * Not include a fragment component. *

              *
            • *
            *

            * See OAuth 2.0 - Redirection Endpoint. *

            *

            * Amazon Cognito requires HTTPS over HTTP except for http://localhost for testing purposes only. *

            *

            * App callback URLs such as myapp://example are also supported. */ public void setCallbackURLs(java.util.Collection callbackURLs) { if (callbackURLs == null) { this.callbackURLs = null; return; } this.callbackURLs = new java.util.ArrayList(callbackURLs); } /** *

            * A list of allowed redirect (callback) URLs for the identity providers. *

            *

            * A redirect URI must: *

            *
              *
            • *

              * Be an absolute URI. *

              *
            • *
            • *

              * Be registered with the authorization server. *

              *
            • *
            • *

              * Not include a fragment component. *

              *
            • *
            *

            * See OAuth 2.0 - Redirection Endpoint. *

            *

            * Amazon Cognito requires HTTPS over HTTP except for http://localhost for testing purposes only. *

            *

            * App callback URLs such as myapp://example are also supported. *

            *

            * NOTE: This method appends the values to the existing list (if any). Use * {@link #setCallbackURLs(java.util.Collection)} or {@link #withCallbackURLs(java.util.Collection)} if you want to * override the existing values. *

            * * @param callbackURLs * A list of allowed redirect (callback) URLs for the identity providers.

            *

            * A redirect URI must: *

            *
              *
            • *

              * Be an absolute URI. *

              *
            • *
            • *

              * Be registered with the authorization server. *

              *
            • *
            • *

              * Not include a fragment component. *

              *
            • *
            *

            * See OAuth 2.0 - Redirection Endpoint. *

            *

            * Amazon Cognito requires HTTPS over HTTP except for http://localhost for testing purposes only. *

            *

            * App callback URLs such as myapp://example are also supported. * @return Returns a reference to this object so that method calls can be chained together. */ public UpdateUserPoolClientRequest withCallbackURLs(String... callbackURLs) { if (this.callbackURLs == null) { setCallbackURLs(new java.util.ArrayList(callbackURLs.length)); } for (String ele : callbackURLs) { this.callbackURLs.add(ele); } return this; } /** *

            * A list of allowed redirect (callback) URLs for the identity providers. *

            *

            * A redirect URI must: *

            *
              *
            • *

              * Be an absolute URI. *

              *
            • *
            • *

              * Be registered with the authorization server. *

              *
            • *
            • *

              * Not include a fragment component. *

              *
            • *
            *

            * See OAuth 2.0 - Redirection Endpoint. *

            *

            * Amazon Cognito requires HTTPS over HTTP except for http://localhost for testing purposes only. *

            *

            * App callback URLs such as myapp://example are also supported. *

            * * @param callbackURLs * A list of allowed redirect (callback) URLs for the identity providers.

            *

            * A redirect URI must: *

            *
              *
            • *

              * Be an absolute URI. *

              *
            • *
            • *

              * Be registered with the authorization server. *

              *
            • *
            • *

              * Not include a fragment component. *

              *
            • *
            *

            * See OAuth 2.0 - Redirection Endpoint. *

            *

            * Amazon Cognito requires HTTPS over HTTP except for http://localhost for testing purposes only. *

            *

            * App callback URLs such as myapp://example are also supported. * @return Returns a reference to this object so that method calls can be chained together. */ public UpdateUserPoolClientRequest withCallbackURLs(java.util.Collection callbackURLs) { setCallbackURLs(callbackURLs); return this; } /** *

            * A list of allowed logout URLs for the identity providers. *

            * * @return A list of allowed logout URLs for the identity providers. */ public java.util.List getLogoutURLs() { return logoutURLs; } /** *

            * A list of allowed logout URLs for the identity providers. *

            * * @param logoutURLs * A list of allowed logout URLs for the identity providers. */ public void setLogoutURLs(java.util.Collection logoutURLs) { if (logoutURLs == null) { this.logoutURLs = null; return; } this.logoutURLs = new java.util.ArrayList(logoutURLs); } /** *

            * A list of allowed logout URLs for the identity providers. *

            *

            * NOTE: This method appends the values to the existing list (if any). Use * {@link #setLogoutURLs(java.util.Collection)} or {@link #withLogoutURLs(java.util.Collection)} if you want to * override the existing values. *

            * * @param logoutURLs * A list of allowed logout URLs for the identity providers. * @return Returns a reference to this object so that method calls can be chained together. */ public UpdateUserPoolClientRequest withLogoutURLs(String... logoutURLs) { if (this.logoutURLs == null) { setLogoutURLs(new java.util.ArrayList(logoutURLs.length)); } for (String ele : logoutURLs) { this.logoutURLs.add(ele); } return this; } /** *

            * A list of allowed logout URLs for the identity providers. *

            * * @param logoutURLs * A list of allowed logout URLs for the identity providers. * @return Returns a reference to this object so that method calls can be chained together. */ public UpdateUserPoolClientRequest withLogoutURLs(java.util.Collection logoutURLs) { setLogoutURLs(logoutURLs); return this; } /** *

            * The default redirect URI. Must be in the CallbackURLs list. *

            *

            * A redirect URI must: *

            *
              *
            • *

              * Be an absolute URI. *

              *
            • *
            • *

              * Be registered with the authorization server. *

              *
            • *
            • *

              * Not include a fragment component. *

              *
            • *
            *

            * See OAuth 2.0 - Redirection Endpoint. *

            *

            * Amazon Cognito requires HTTPS over HTTP except for http://localhost for testing purposes only. *

            *

            * App callback URLs such as myapp://example are also supported. *

            * * @param defaultRedirectURI * The default redirect URI. Must be in the CallbackURLs list.

            *

            * A redirect URI must: *

            *
              *
            • *

              * Be an absolute URI. *

              *
            • *
            • *

              * Be registered with the authorization server. *

              *
            • *
            • *

              * Not include a fragment component. *

              *
            • *
            *

            * See OAuth 2.0 - Redirection Endpoint. *

            *

            * Amazon Cognito requires HTTPS over HTTP except for http://localhost for testing purposes only. *

            *

            * App callback URLs such as myapp://example are also supported. */ public void setDefaultRedirectURI(String defaultRedirectURI) { this.defaultRedirectURI = defaultRedirectURI; } /** *

            * The default redirect URI. Must be in the CallbackURLs list. *

            *

            * A redirect URI must: *

            *
              *
            • *

              * Be an absolute URI. *

              *
            • *
            • *

              * Be registered with the authorization server. *

              *
            • *
            • *

              * Not include a fragment component. *

              *
            • *
            *

            * See OAuth 2.0 - Redirection Endpoint. *

            *

            * Amazon Cognito requires HTTPS over HTTP except for http://localhost for testing purposes only. *

            *

            * App callback URLs such as myapp://example are also supported. *

            * * @return The default redirect URI. Must be in the CallbackURLs list.

            *

            * A redirect URI must: *

            *
              *
            • *

              * Be an absolute URI. *

              *
            • *
            • *

              * Be registered with the authorization server. *

              *
            • *
            • *

              * Not include a fragment component. *

              *
            • *
            *

            * See OAuth 2.0 - Redirection Endpoint. *

            *

            * Amazon Cognito requires HTTPS over HTTP except for http://localhost for testing purposes only. *

            *

            * App callback URLs such as myapp://example are also supported. */ public String getDefaultRedirectURI() { return this.defaultRedirectURI; } /** *

            * The default redirect URI. Must be in the CallbackURLs list. *

            *

            * A redirect URI must: *

            *
              *
            • *

              * Be an absolute URI. *

              *
            • *
            • *

              * Be registered with the authorization server. *

              *
            • *
            • *

              * Not include a fragment component. *

              *
            • *
            *

            * See OAuth 2.0 - Redirection Endpoint. *

            *

            * Amazon Cognito requires HTTPS over HTTP except for http://localhost for testing purposes only. *

            *

            * App callback URLs such as myapp://example are also supported. *

            * * @param defaultRedirectURI * The default redirect URI. Must be in the CallbackURLs list.

            *

            * A redirect URI must: *

            *
              *
            • *

              * Be an absolute URI. *

              *
            • *
            • *

              * Be registered with the authorization server. *

              *
            • *
            • *

              * Not include a fragment component. *

              *
            • *
            *

            * See OAuth 2.0 - Redirection Endpoint. *

            *

            * Amazon Cognito requires HTTPS over HTTP except for http://localhost for testing purposes only. *

            *

            * App callback URLs such as myapp://example are also supported. * @return Returns a reference to this object so that method calls can be chained together. */ public UpdateUserPoolClientRequest withDefaultRedirectURI(String defaultRedirectURI) { setDefaultRedirectURI(defaultRedirectURI); return this; } /** *

            * The allowed OAuth flows. *

            *

            * Set to code to initiate a code grant flow, which provides an authorization code as the response. * This code can be exchanged for access tokens with the token endpoint. *

            *

            * Set to implicit to specify that the client should get the access token (and, optionally, ID token, * based on scopes) directly. *

            *

            * Set to client_credentials to specify that the client should get the access token (and, optionally, * ID token, based on scopes) from the token endpoint using a combination of client and client_secret. *

            * * @return The allowed OAuth flows.

            *

            * Set to code to initiate a code grant flow, which provides an authorization code as the * response. This code can be exchanged for access tokens with the token endpoint. *

            *

            * Set to implicit to specify that the client should get the access token (and, optionally, ID * token, based on scopes) directly. *

            *

            * Set to client_credentials to specify that the client should get the access token (and, * optionally, ID token, based on scopes) from the token endpoint using a combination of client and * client_secret. * @see OAuthFlowType */ public java.util.List getAllowedOAuthFlows() { return allowedOAuthFlows; } /** *

            * The allowed OAuth flows. *

            *

            * Set to code to initiate a code grant flow, which provides an authorization code as the response. * This code can be exchanged for access tokens with the token endpoint. *

            *

            * Set to implicit to specify that the client should get the access token (and, optionally, ID token, * based on scopes) directly. *

            *

            * Set to client_credentials to specify that the client should get the access token (and, optionally, * ID token, based on scopes) from the token endpoint using a combination of client and client_secret. *

            * * @param allowedOAuthFlows * The allowed OAuth flows.

            *

            * Set to code to initiate a code grant flow, which provides an authorization code as the * response. This code can be exchanged for access tokens with the token endpoint. *

            *

            * Set to implicit to specify that the client should get the access token (and, optionally, ID * token, based on scopes) directly. *

            *

            * Set to client_credentials to specify that the client should get the access token (and, * optionally, ID token, based on scopes) from the token endpoint using a combination of client and * client_secret. * @see OAuthFlowType */ public void setAllowedOAuthFlows(java.util.Collection allowedOAuthFlows) { if (allowedOAuthFlows == null) { this.allowedOAuthFlows = null; return; } this.allowedOAuthFlows = new java.util.ArrayList(allowedOAuthFlows); } /** *

            * The allowed OAuth flows. *

            *

            * Set to code to initiate a code grant flow, which provides an authorization code as the response. * This code can be exchanged for access tokens with the token endpoint. *

            *

            * Set to implicit to specify that the client should get the access token (and, optionally, ID token, * based on scopes) directly. *

            *

            * Set to client_credentials to specify that the client should get the access token (and, optionally, * ID token, based on scopes) from the token endpoint using a combination of client and client_secret. *

            *

            * NOTE: This method appends the values to the existing list (if any). Use * {@link #setAllowedOAuthFlows(java.util.Collection)} or {@link #withAllowedOAuthFlows(java.util.Collection)} if * you want to override the existing values. *

            * * @param allowedOAuthFlows * The allowed OAuth flows.

            *

            * Set to code to initiate a code grant flow, which provides an authorization code as the * response. This code can be exchanged for access tokens with the token endpoint. *

            *

            * Set to implicit to specify that the client should get the access token (and, optionally, ID * token, based on scopes) directly. *

            *

            * Set to client_credentials to specify that the client should get the access token (and, * optionally, ID token, based on scopes) from the token endpoint using a combination of client and * client_secret. * @return Returns a reference to this object so that method calls can be chained together. * @see OAuthFlowType */ public UpdateUserPoolClientRequest withAllowedOAuthFlows(String... allowedOAuthFlows) { if (this.allowedOAuthFlows == null) { setAllowedOAuthFlows(new java.util.ArrayList(allowedOAuthFlows.length)); } for (String ele : allowedOAuthFlows) { this.allowedOAuthFlows.add(ele); } return this; } /** *

            * The allowed OAuth flows. *

            *

            * Set to code to initiate a code grant flow, which provides an authorization code as the response. * This code can be exchanged for access tokens with the token endpoint. *

            *

            * Set to implicit to specify that the client should get the access token (and, optionally, ID token, * based on scopes) directly. *

            *

            * Set to client_credentials to specify that the client should get the access token (and, optionally, * ID token, based on scopes) from the token endpoint using a combination of client and client_secret. *

            * * @param allowedOAuthFlows * The allowed OAuth flows.

            *

            * Set to code to initiate a code grant flow, which provides an authorization code as the * response. This code can be exchanged for access tokens with the token endpoint. *

            *

            * Set to implicit to specify that the client should get the access token (and, optionally, ID * token, based on scopes) directly. *

            *

            * Set to client_credentials to specify that the client should get the access token (and, * optionally, ID token, based on scopes) from the token endpoint using a combination of client and * client_secret. * @return Returns a reference to this object so that method calls can be chained together. * @see OAuthFlowType */ public UpdateUserPoolClientRequest withAllowedOAuthFlows(java.util.Collection allowedOAuthFlows) { setAllowedOAuthFlows(allowedOAuthFlows); return this; } /** *

            * The allowed OAuth flows. *

            *

            * Set to code to initiate a code grant flow, which provides an authorization code as the response. * This code can be exchanged for access tokens with the token endpoint. *

            *

            * Set to implicit to specify that the client should get the access token (and, optionally, ID token, * based on scopes) directly. *

            *

            * Set to client_credentials to specify that the client should get the access token (and, optionally, * ID token, based on scopes) from the token endpoint using a combination of client and client_secret. *

            * * @param allowedOAuthFlows * The allowed OAuth flows.

            *

            * Set to code to initiate a code grant flow, which provides an authorization code as the * response. This code can be exchanged for access tokens with the token endpoint. *

            *

            * Set to implicit to specify that the client should get the access token (and, optionally, ID * token, based on scopes) directly. *

            *

            * Set to client_credentials to specify that the client should get the access token (and, * optionally, ID token, based on scopes) from the token endpoint using a combination of client and * client_secret. * @return Returns a reference to this object so that method calls can be chained together. * @see OAuthFlowType */ public UpdateUserPoolClientRequest withAllowedOAuthFlows(OAuthFlowType... allowedOAuthFlows) { java.util.ArrayList allowedOAuthFlowsCopy = new java.util.ArrayList(allowedOAuthFlows.length); for (OAuthFlowType value : allowedOAuthFlows) { allowedOAuthFlowsCopy.add(value.toString()); } if (getAllowedOAuthFlows() == null) { setAllowedOAuthFlows(allowedOAuthFlowsCopy); } else { getAllowedOAuthFlows().addAll(allowedOAuthFlowsCopy); } return this; } /** *

            * The allowed OAuth scopes. Possible values provided by OAuth are: phone, email, * openid, and profile. Possible values provided by Amazon Web Services are: * aws.cognito.signin.user.admin. Custom scopes created in Resource Servers are also supported. *

            * * @return The allowed OAuth scopes. Possible values provided by OAuth are: phone, email, * openid, and profile. Possible values provided by Amazon Web Services are: * aws.cognito.signin.user.admin. Custom scopes created in Resource Servers are also supported. */ public java.util.List getAllowedOAuthScopes() { return allowedOAuthScopes; } /** *

            * The allowed OAuth scopes. Possible values provided by OAuth are: phone, email, * openid, and profile. Possible values provided by Amazon Web Services are: * aws.cognito.signin.user.admin. Custom scopes created in Resource Servers are also supported. *

            * * @param allowedOAuthScopes * The allowed OAuth scopes. Possible values provided by OAuth are: phone, email, * openid, and profile. Possible values provided by Amazon Web Services are: * aws.cognito.signin.user.admin. Custom scopes created in Resource Servers are also supported. */ public void setAllowedOAuthScopes(java.util.Collection allowedOAuthScopes) { if (allowedOAuthScopes == null) { this.allowedOAuthScopes = null; return; } this.allowedOAuthScopes = new java.util.ArrayList(allowedOAuthScopes); } /** *

            * The allowed OAuth scopes. Possible values provided by OAuth are: phone, email, * openid, and profile. Possible values provided by Amazon Web Services are: * aws.cognito.signin.user.admin. Custom scopes created in Resource Servers are also supported. *

            *

            * NOTE: This method appends the values to the existing list (if any). Use * {@link #setAllowedOAuthScopes(java.util.Collection)} or {@link #withAllowedOAuthScopes(java.util.Collection)} if * you want to override the existing values. *

            * * @param allowedOAuthScopes * The allowed OAuth scopes. Possible values provided by OAuth are: phone, email, * openid, and profile. Possible values provided by Amazon Web Services are: * aws.cognito.signin.user.admin. Custom scopes created in Resource Servers are also supported. * @return Returns a reference to this object so that method calls can be chained together. */ public UpdateUserPoolClientRequest withAllowedOAuthScopes(String... allowedOAuthScopes) { if (this.allowedOAuthScopes == null) { setAllowedOAuthScopes(new java.util.ArrayList(allowedOAuthScopes.length)); } for (String ele : allowedOAuthScopes) { this.allowedOAuthScopes.add(ele); } return this; } /** *

            * The allowed OAuth scopes. Possible values provided by OAuth are: phone, email, * openid, and profile. Possible values provided by Amazon Web Services are: * aws.cognito.signin.user.admin. Custom scopes created in Resource Servers are also supported. *

            * * @param allowedOAuthScopes * The allowed OAuth scopes. Possible values provided by OAuth are: phone, email, * openid, and profile. Possible values provided by Amazon Web Services are: * aws.cognito.signin.user.admin. Custom scopes created in Resource Servers are also supported. * @return Returns a reference to this object so that method calls can be chained together. */ public UpdateUserPoolClientRequest withAllowedOAuthScopes(java.util.Collection allowedOAuthScopes) { setAllowedOAuthScopes(allowedOAuthScopes); return this; } /** *

            * Set to true if the client is allowed to follow the OAuth protocol when interacting with Cognito user pools. *

            * * @param allowedOAuthFlowsUserPoolClient * Set to true if the client is allowed to follow the OAuth protocol when interacting with Cognito user * pools. */ public void setAllowedOAuthFlowsUserPoolClient(Boolean allowedOAuthFlowsUserPoolClient) { this.allowedOAuthFlowsUserPoolClient = allowedOAuthFlowsUserPoolClient; } /** *

            * Set to true if the client is allowed to follow the OAuth protocol when interacting with Cognito user pools. *

            * * @return Set to true if the client is allowed to follow the OAuth protocol when interacting with Cognito user * pools. */ public Boolean getAllowedOAuthFlowsUserPoolClient() { return this.allowedOAuthFlowsUserPoolClient; } /** *

            * Set to true if the client is allowed to follow the OAuth protocol when interacting with Cognito user pools. *

            * * @param allowedOAuthFlowsUserPoolClient * Set to true if the client is allowed to follow the OAuth protocol when interacting with Cognito user * pools. * @return Returns a reference to this object so that method calls can be chained together. */ public UpdateUserPoolClientRequest withAllowedOAuthFlowsUserPoolClient(Boolean allowedOAuthFlowsUserPoolClient) { setAllowedOAuthFlowsUserPoolClient(allowedOAuthFlowsUserPoolClient); return this; } /** *

            * Set to true if the client is allowed to follow the OAuth protocol when interacting with Cognito user pools. *

            * * @return Set to true if the client is allowed to follow the OAuth protocol when interacting with Cognito user * pools. */ public Boolean isAllowedOAuthFlowsUserPoolClient() { return this.allowedOAuthFlowsUserPoolClient; } /** *

            * The Amazon Pinpoint analytics configuration for collecting metrics for this user pool. *

            * *

            * In regions where Pinpoint is not available, Cognito User Pools only supports sending events to Amazon Pinpoint * projects in us-east-1. In regions where Pinpoint is available, Cognito User Pools will support sending events to * Amazon Pinpoint projects within that same region. *

            *
            * * @param analyticsConfiguration * The Amazon Pinpoint analytics configuration for collecting metrics for this user pool.

            *

            * In regions where Pinpoint is not available, Cognito User Pools only supports sending events to Amazon * Pinpoint projects in us-east-1. In regions where Pinpoint is available, Cognito User Pools will support * sending events to Amazon Pinpoint projects within that same region. *

            */ public void setAnalyticsConfiguration(AnalyticsConfigurationType analyticsConfiguration) { this.analyticsConfiguration = analyticsConfiguration; } /** *

            * The Amazon Pinpoint analytics configuration for collecting metrics for this user pool. *

            * *

            * In regions where Pinpoint is not available, Cognito User Pools only supports sending events to Amazon Pinpoint * projects in us-east-1. In regions where Pinpoint is available, Cognito User Pools will support sending events to * Amazon Pinpoint projects within that same region. *

            *
            * * @return The Amazon Pinpoint analytics configuration for collecting metrics for this user pool.

            *

            * In regions where Pinpoint is not available, Cognito User Pools only supports sending events to Amazon * Pinpoint projects in us-east-1. In regions where Pinpoint is available, Cognito User Pools will support * sending events to Amazon Pinpoint projects within that same region. *

            */ public AnalyticsConfigurationType getAnalyticsConfiguration() { return this.analyticsConfiguration; } /** *

            * The Amazon Pinpoint analytics configuration for collecting metrics for this user pool. *

            * *

            * In regions where Pinpoint is not available, Cognito User Pools only supports sending events to Amazon Pinpoint * projects in us-east-1. In regions where Pinpoint is available, Cognito User Pools will support sending events to * Amazon Pinpoint projects within that same region. *

            *
            * * @param analyticsConfiguration * The Amazon Pinpoint analytics configuration for collecting metrics for this user pool.

            *

            * In regions where Pinpoint is not available, Cognito User Pools only supports sending events to Amazon * Pinpoint projects in us-east-1. In regions where Pinpoint is available, Cognito User Pools will support * sending events to Amazon Pinpoint projects within that same region. *

            * @return Returns a reference to this object so that method calls can be chained together. */ public UpdateUserPoolClientRequest withAnalyticsConfiguration(AnalyticsConfigurationType analyticsConfiguration) { setAnalyticsConfiguration(analyticsConfiguration); return this; } /** *

            * Use this setting to choose which errors and responses are returned by Cognito APIs during authentication, account * confirmation, and password recovery when the user does not exist in the user pool. When set to * ENABLED and the user does not exist, authentication returns an error indicating either the username * or password was incorrect, and account confirmation and password recovery return a response indicating a code was * sent to a simulated destination. When set to LEGACY, those APIs will return a * UserNotFoundException exception if the user does not exist in the user pool. *

            *

            * Valid values include: *

            *
              *
            • *

              * ENABLED - This prevents user existence-related errors. *

              *
            • *
            • *

              * LEGACY - This represents the old behavior of Cognito where user existence related errors are not * prevented. *

              *
            • *
            * *

            * After February 15th 2020, the value of PreventUserExistenceErrors will default to * ENABLED for newly created user pool clients if no value is provided. *

            *
            * * @param preventUserExistenceErrors * Use this setting to choose which errors and responses are returned by Cognito APIs during authentication, * account confirmation, and password recovery when the user does not exist in the user pool. When set to * ENABLED and the user does not exist, authentication returns an error indicating either the * username or password was incorrect, and account confirmation and password recovery return a response * indicating a code was sent to a simulated destination. When set to LEGACY, those APIs will * return a UserNotFoundException exception if the user does not exist in the user pool.

            *

            * Valid values include: *

            *
              *
            • *

              * ENABLED - This prevents user existence-related errors. *

              *
            • *
            • *

              * LEGACY - This represents the old behavior of Cognito where user existence related errors are * not prevented. *

              *
            • *
            * *

            * After February 15th 2020, the value of PreventUserExistenceErrors will default to * ENABLED for newly created user pool clients if no value is provided. *

            * @see PreventUserExistenceErrorTypes */ public void setPreventUserExistenceErrors(String preventUserExistenceErrors) { this.preventUserExistenceErrors = preventUserExistenceErrors; } /** *

            * Use this setting to choose which errors and responses are returned by Cognito APIs during authentication, account * confirmation, and password recovery when the user does not exist in the user pool. When set to * ENABLED and the user does not exist, authentication returns an error indicating either the username * or password was incorrect, and account confirmation and password recovery return a response indicating a code was * sent to a simulated destination. When set to LEGACY, those APIs will return a * UserNotFoundException exception if the user does not exist in the user pool. *

            *

            * Valid values include: *

            *
              *
            • *

              * ENABLED - This prevents user existence-related errors. *

              *
            • *
            • *

              * LEGACY - This represents the old behavior of Cognito where user existence related errors are not * prevented. *

              *
            • *
            * *

            * After February 15th 2020, the value of PreventUserExistenceErrors will default to * ENABLED for newly created user pool clients if no value is provided. *

            *
            * * @return Use this setting to choose which errors and responses are returned by Cognito APIs during authentication, * account confirmation, and password recovery when the user does not exist in the user pool. When set to * ENABLED and the user does not exist, authentication returns an error indicating either the * username or password was incorrect, and account confirmation and password recovery return a response * indicating a code was sent to a simulated destination. When set to LEGACY, those APIs will * return a UserNotFoundException exception if the user does not exist in the user pool.

            *

            * Valid values include: *

            *
              *
            • *

              * ENABLED - This prevents user existence-related errors. *

              *
            • *
            • *

              * LEGACY - This represents the old behavior of Cognito where user existence related errors are * not prevented. *

              *
            • *
            * *

            * After February 15th 2020, the value of PreventUserExistenceErrors will default to * ENABLED for newly created user pool clients if no value is provided. *

            * @see PreventUserExistenceErrorTypes */ public String getPreventUserExistenceErrors() { return this.preventUserExistenceErrors; } /** *

            * Use this setting to choose which errors and responses are returned by Cognito APIs during authentication, account * confirmation, and password recovery when the user does not exist in the user pool. When set to * ENABLED and the user does not exist, authentication returns an error indicating either the username * or password was incorrect, and account confirmation and password recovery return a response indicating a code was * sent to a simulated destination. When set to LEGACY, those APIs will return a * UserNotFoundException exception if the user does not exist in the user pool. *

            *

            * Valid values include: *

            *
              *
            • *

              * ENABLED - This prevents user existence-related errors. *

              *
            • *
            • *

              * LEGACY - This represents the old behavior of Cognito where user existence related errors are not * prevented. *

              *
            • *
            * *

            * After February 15th 2020, the value of PreventUserExistenceErrors will default to * ENABLED for newly created user pool clients if no value is provided. *

            *
            * * @param preventUserExistenceErrors * Use this setting to choose which errors and responses are returned by Cognito APIs during authentication, * account confirmation, and password recovery when the user does not exist in the user pool. When set to * ENABLED and the user does not exist, authentication returns an error indicating either the * username or password was incorrect, and account confirmation and password recovery return a response * indicating a code was sent to a simulated destination. When set to LEGACY, those APIs will * return a UserNotFoundException exception if the user does not exist in the user pool.

            *

            * Valid values include: *

            *
              *
            • *

              * ENABLED - This prevents user existence-related errors. *

              *
            • *
            • *

              * LEGACY - This represents the old behavior of Cognito where user existence related errors are * not prevented. *

              *
            • *
            * *

            * After February 15th 2020, the value of PreventUserExistenceErrors will default to * ENABLED for newly created user pool clients if no value is provided. *

            * @return Returns a reference to this object so that method calls can be chained together. * @see PreventUserExistenceErrorTypes */ public UpdateUserPoolClientRequest withPreventUserExistenceErrors(String preventUserExistenceErrors) { setPreventUserExistenceErrors(preventUserExistenceErrors); return this; } /** *

            * Use this setting to choose which errors and responses are returned by Cognito APIs during authentication, account * confirmation, and password recovery when the user does not exist in the user pool. When set to * ENABLED and the user does not exist, authentication returns an error indicating either the username * or password was incorrect, and account confirmation and password recovery return a response indicating a code was * sent to a simulated destination. When set to LEGACY, those APIs will return a * UserNotFoundException exception if the user does not exist in the user pool. *

            *

            * Valid values include: *

            *
              *
            • *

              * ENABLED - This prevents user existence-related errors. *

              *
            • *
            • *

              * LEGACY - This represents the old behavior of Cognito where user existence related errors are not * prevented. *

              *
            • *
            * *

            * After February 15th 2020, the value of PreventUserExistenceErrors will default to * ENABLED for newly created user pool clients if no value is provided. *

            *
            * * @param preventUserExistenceErrors * Use this setting to choose which errors and responses are returned by Cognito APIs during authentication, * account confirmation, and password recovery when the user does not exist in the user pool. When set to * ENABLED and the user does not exist, authentication returns an error indicating either the * username or password was incorrect, and account confirmation and password recovery return a response * indicating a code was sent to a simulated destination. When set to LEGACY, those APIs will * return a UserNotFoundException exception if the user does not exist in the user pool.

            *

            * Valid values include: *

            *
              *
            • *

              * ENABLED - This prevents user existence-related errors. *

              *
            • *
            • *

              * LEGACY - This represents the old behavior of Cognito where user existence related errors are * not prevented. *

              *
            • *
            * *

            * After February 15th 2020, the value of PreventUserExistenceErrors will default to * ENABLED for newly created user pool clients if no value is provided. *

            * @return Returns a reference to this object so that method calls can be chained together. * @see PreventUserExistenceErrorTypes */ public UpdateUserPoolClientRequest withPreventUserExistenceErrors(PreventUserExistenceErrorTypes preventUserExistenceErrors) { this.preventUserExistenceErrors = preventUserExistenceErrors.toString(); return this; } /** *

            * Enables or disables token revocation. For more information about revoking tokens, see RevokeToken. *

            * * @param enableTokenRevocation * Enables or disables token revocation. For more information about revoking tokens, see RevokeToken. */ public void setEnableTokenRevocation(Boolean enableTokenRevocation) { this.enableTokenRevocation = enableTokenRevocation; } /** *

            * Enables or disables token revocation. For more information about revoking tokens, see RevokeToken. *

            * * @return Enables or disables token revocation. For more information about revoking tokens, see RevokeToken. */ public Boolean getEnableTokenRevocation() { return this.enableTokenRevocation; } /** *

            * Enables or disables token revocation. For more information about revoking tokens, see RevokeToken. *

            * * @param enableTokenRevocation * Enables or disables token revocation. For more information about revoking tokens, see RevokeToken. * @return Returns a reference to this object so that method calls can be chained together. */ public UpdateUserPoolClientRequest withEnableTokenRevocation(Boolean enableTokenRevocation) { setEnableTokenRevocation(enableTokenRevocation); return this; } /** *

            * Enables or disables token revocation. For more information about revoking tokens, see RevokeToken. *

            * * @return Enables or disables token revocation. For more information about revoking tokens, see RevokeToken. */ public Boolean isEnableTokenRevocation() { return this.enableTokenRevocation; } /** * Returns a string representation of this object. This is useful for testing and debugging. Sensitive data will be * redacted from this string using a placeholder value. * * @return A string representation of this object. * * @see java.lang.Object#toString() */ @Override public String toString() { StringBuilder sb = new StringBuilder(); sb.append("{"); if (getUserPoolId() != null) sb.append("UserPoolId: ").append(getUserPoolId()).append(","); if (getClientId() != null) sb.append("ClientId: ").append("***Sensitive Data Redacted***").append(","); if (getClientName() != null) sb.append("ClientName: ").append(getClientName()).append(","); if (getRefreshTokenValidity() != null) sb.append("RefreshTokenValidity: ").append(getRefreshTokenValidity()).append(","); if (getAccessTokenValidity() != null) sb.append("AccessTokenValidity: ").append(getAccessTokenValidity()).append(","); if (getIdTokenValidity() != null) sb.append("IdTokenValidity: ").append(getIdTokenValidity()).append(","); if (getTokenValidityUnits() != null) sb.append("TokenValidityUnits: ").append(getTokenValidityUnits()).append(","); if (getReadAttributes() != null) sb.append("ReadAttributes: ").append(getReadAttributes()).append(","); if (getWriteAttributes() != null) sb.append("WriteAttributes: ").append(getWriteAttributes()).append(","); if (getExplicitAuthFlows() != null) sb.append("ExplicitAuthFlows: ").append(getExplicitAuthFlows()).append(","); if (getSupportedIdentityProviders() != null) sb.append("SupportedIdentityProviders: ").append(getSupportedIdentityProviders()).append(","); if (getCallbackURLs() != null) sb.append("CallbackURLs: ").append(getCallbackURLs()).append(","); if (getLogoutURLs() != null) sb.append("LogoutURLs: ").append(getLogoutURLs()).append(","); if (getDefaultRedirectURI() != null) sb.append("DefaultRedirectURI: ").append(getDefaultRedirectURI()).append(","); if (getAllowedOAuthFlows() != null) sb.append("AllowedOAuthFlows: ").append(getAllowedOAuthFlows()).append(","); if (getAllowedOAuthScopes() != null) sb.append("AllowedOAuthScopes: ").append(getAllowedOAuthScopes()).append(","); if (getAllowedOAuthFlowsUserPoolClient() != null) sb.append("AllowedOAuthFlowsUserPoolClient: ").append(getAllowedOAuthFlowsUserPoolClient()).append(","); if (getAnalyticsConfiguration() != null) sb.append("AnalyticsConfiguration: ").append(getAnalyticsConfiguration()).append(","); if (getPreventUserExistenceErrors() != null) sb.append("PreventUserExistenceErrors: ").append(getPreventUserExistenceErrors()).append(","); if (getEnableTokenRevocation() != null) sb.append("EnableTokenRevocation: ").append(getEnableTokenRevocation()); sb.append("}"); return sb.toString(); } @Override public boolean equals(Object obj) { if (this == obj) return true; if (obj == null) return false; if (obj instanceof UpdateUserPoolClientRequest == false) return false; UpdateUserPoolClientRequest other = (UpdateUserPoolClientRequest) obj; if (other.getUserPoolId() == null ^ this.getUserPoolId() == null) return false; if (other.getUserPoolId() != null && other.getUserPoolId().equals(this.getUserPoolId()) == false) return false; if (other.getClientId() == null ^ this.getClientId() == null) return false; if (other.getClientId() != null && other.getClientId().equals(this.getClientId()) == false) return false; if (other.getClientName() == null ^ this.getClientName() == null) return false; if (other.getClientName() != null && other.getClientName().equals(this.getClientName()) == false) return false; if (other.getRefreshTokenValidity() == null ^ this.getRefreshTokenValidity() == null) return false; if (other.getRefreshTokenValidity() != null && other.getRefreshTokenValidity().equals(this.getRefreshTokenValidity()) == false) return false; if (other.getAccessTokenValidity() == null ^ this.getAccessTokenValidity() == null) return false; if (other.getAccessTokenValidity() != null && other.getAccessTokenValidity().equals(this.getAccessTokenValidity()) == false) return false; if (other.getIdTokenValidity() == null ^ this.getIdTokenValidity() == null) return false; if (other.getIdTokenValidity() != null && other.getIdTokenValidity().equals(this.getIdTokenValidity()) == false) return false; if (other.getTokenValidityUnits() == null ^ this.getTokenValidityUnits() == null) return false; if (other.getTokenValidityUnits() != null && other.getTokenValidityUnits().equals(this.getTokenValidityUnits()) == false) return false; if (other.getReadAttributes() == null ^ this.getReadAttributes() == null) return false; if (other.getReadAttributes() != null && other.getReadAttributes().equals(this.getReadAttributes()) == false) return false; if (other.getWriteAttributes() == null ^ this.getWriteAttributes() == null) return false; if (other.getWriteAttributes() != null && other.getWriteAttributes().equals(this.getWriteAttributes()) == false) return false; if (other.getExplicitAuthFlows() == null ^ this.getExplicitAuthFlows() == null) return false; if (other.getExplicitAuthFlows() != null && other.getExplicitAuthFlows().equals(this.getExplicitAuthFlows()) == false) return false; if (other.getSupportedIdentityProviders() == null ^ this.getSupportedIdentityProviders() == null) return false; if (other.getSupportedIdentityProviders() != null && other.getSupportedIdentityProviders().equals(this.getSupportedIdentityProviders()) == false) return false; if (other.getCallbackURLs() == null ^ this.getCallbackURLs() == null) return false; if (other.getCallbackURLs() != null && other.getCallbackURLs().equals(this.getCallbackURLs()) == false) return false; if (other.getLogoutURLs() == null ^ this.getLogoutURLs() == null) return false; if (other.getLogoutURLs() != null && other.getLogoutURLs().equals(this.getLogoutURLs()) == false) return false; if (other.getDefaultRedirectURI() == null ^ this.getDefaultRedirectURI() == null) return false; if (other.getDefaultRedirectURI() != null && other.getDefaultRedirectURI().equals(this.getDefaultRedirectURI()) == false) return false; if (other.getAllowedOAuthFlows() == null ^ this.getAllowedOAuthFlows() == null) return false; if (other.getAllowedOAuthFlows() != null && other.getAllowedOAuthFlows().equals(this.getAllowedOAuthFlows()) == false) return false; if (other.getAllowedOAuthScopes() == null ^ this.getAllowedOAuthScopes() == null) return false; if (other.getAllowedOAuthScopes() != null && other.getAllowedOAuthScopes().equals(this.getAllowedOAuthScopes()) == false) return false; if (other.getAllowedOAuthFlowsUserPoolClient() == null ^ this.getAllowedOAuthFlowsUserPoolClient() == null) return false; if (other.getAllowedOAuthFlowsUserPoolClient() != null && other.getAllowedOAuthFlowsUserPoolClient().equals(this.getAllowedOAuthFlowsUserPoolClient()) == false) return false; if (other.getAnalyticsConfiguration() == null ^ this.getAnalyticsConfiguration() == null) return false; if (other.getAnalyticsConfiguration() != null && other.getAnalyticsConfiguration().equals(this.getAnalyticsConfiguration()) == false) return false; if (other.getPreventUserExistenceErrors() == null ^ this.getPreventUserExistenceErrors() == null) return false; if (other.getPreventUserExistenceErrors() != null && other.getPreventUserExistenceErrors().equals(this.getPreventUserExistenceErrors()) == false) return false; if (other.getEnableTokenRevocation() == null ^ this.getEnableTokenRevocation() == null) return false; if (other.getEnableTokenRevocation() != null && other.getEnableTokenRevocation().equals(this.getEnableTokenRevocation()) == false) return false; return true; } @Override public int hashCode() { final int prime = 31; int hashCode = 1; hashCode = prime * hashCode + ((getUserPoolId() == null) ? 0 : getUserPoolId().hashCode()); hashCode = prime * hashCode + ((getClientId() == null) ? 0 : getClientId().hashCode()); hashCode = prime * hashCode + ((getClientName() == null) ? 0 : getClientName().hashCode()); hashCode = prime * hashCode + ((getRefreshTokenValidity() == null) ? 0 : getRefreshTokenValidity().hashCode()); hashCode = prime * hashCode + ((getAccessTokenValidity() == null) ? 0 : getAccessTokenValidity().hashCode()); hashCode = prime * hashCode + ((getIdTokenValidity() == null) ? 0 : getIdTokenValidity().hashCode()); hashCode = prime * hashCode + ((getTokenValidityUnits() == null) ? 0 : getTokenValidityUnits().hashCode()); hashCode = prime * hashCode + ((getReadAttributes() == null) ? 0 : getReadAttributes().hashCode()); hashCode = prime * hashCode + ((getWriteAttributes() == null) ? 0 : getWriteAttributes().hashCode()); hashCode = prime * hashCode + ((getExplicitAuthFlows() == null) ? 0 : getExplicitAuthFlows().hashCode()); hashCode = prime * hashCode + ((getSupportedIdentityProviders() == null) ? 0 : getSupportedIdentityProviders().hashCode()); hashCode = prime * hashCode + ((getCallbackURLs() == null) ? 0 : getCallbackURLs().hashCode()); hashCode = prime * hashCode + ((getLogoutURLs() == null) ? 0 : getLogoutURLs().hashCode()); hashCode = prime * hashCode + ((getDefaultRedirectURI() == null) ? 0 : getDefaultRedirectURI().hashCode()); hashCode = prime * hashCode + ((getAllowedOAuthFlows() == null) ? 0 : getAllowedOAuthFlows().hashCode()); hashCode = prime * hashCode + ((getAllowedOAuthScopes() == null) ? 0 : getAllowedOAuthScopes().hashCode()); hashCode = prime * hashCode + ((getAllowedOAuthFlowsUserPoolClient() == null) ? 0 : getAllowedOAuthFlowsUserPoolClient().hashCode()); hashCode = prime * hashCode + ((getAnalyticsConfiguration() == null) ? 0 : getAnalyticsConfiguration().hashCode()); hashCode = prime * hashCode + ((getPreventUserExistenceErrors() == null) ? 0 : getPreventUserExistenceErrors().hashCode()); hashCode = prime * hashCode + ((getEnableTokenRevocation() == null) ? 0 : getEnableTokenRevocation().hashCode()); return hashCode; } @Override public UpdateUserPoolClientRequest clone() { return (UpdateUserPoolClientRequest) super.clone(); } }




© 2015 - 2025 Weber Informatics LLC | Privacy Policy