generated from hashicorp/terraform-provider-scaffolding
-
Notifications
You must be signed in to change notification settings - Fork 121
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge pull request #2146 from wellsiau-aws/doc-auto-2
docs: wave 2 - auto-generated by bedrock
- Loading branch information
Showing
669 changed files
with
32,237 additions
and
337 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,5 +1,5 @@ | ||
|
||
--- | ||
# generated by https://github.com/hashicorp/terraform-plugin-docs | ||
page_title: "awscc_cognito_user_pool_user_to_group_attachment Resource - terraform-provider-awscc" | ||
subcategory: "" | ||
description: |- | ||
|
@@ -10,7 +10,72 @@ description: |- | |
|
||
Resource Type definition for AWS::Cognito::UserPoolUserToGroupAttachment | ||
|
||
## Example Usage | ||
|
||
### Cognito User Group Membership | ||
|
||
To add a Cognito user to a user pool group, configure the user pool group attachment with the user pool ID, group name, and username of the target user. | ||
|
||
~> This example is generated by LLM using Amazon Bedrock and validated using terraform validate, apply and destroy. While we strive for accuracy and quality, please note that the information provided may not be entirely error-free or up-to-date. We recommend independently verifying the content. | ||
|
||
```terraform | ||
# Create a Cognito User Pool | ||
resource "aws_cognito_user_pool" "example" { | ||
name = "example-user-pool" | ||
auto_verified_attributes = ["email"] | ||
username_attributes = ["email"] | ||
password_policy { | ||
minimum_length = 8 | ||
require_lowercase = true | ||
require_numbers = true | ||
require_symbols = true | ||
require_uppercase = true | ||
} | ||
schema { | ||
attribute_data_type = "String" | ||
mutable = true | ||
name = "email" | ||
required = true | ||
string_attribute_constraints { | ||
max_length = "2048" | ||
min_length = "0" | ||
} | ||
} | ||
tags = { | ||
"Modified By" = "AWSCC" | ||
} | ||
} | ||
# Create a Cognito User Pool Group | ||
resource "aws_cognito_user_group" "example" { | ||
name = "example-group" | ||
user_pool_id = aws_cognito_user_pool.example.id | ||
description = "Example user pool group" | ||
} | ||
# Create a Cognito User | ||
resource "aws_cognito_user" "example" { | ||
user_pool_id = aws_cognito_user_pool.example.id | ||
username = "[email protected]" | ||
attributes = { | ||
email = "[email protected]" | ||
email_verified = "true" | ||
} | ||
} | ||
# Attach the user to the group | ||
resource "awscc_cognito_user_pool_user_to_group_attachment" "example" { | ||
group_name = aws_cognito_user_group.example.name | ||
user_pool_id = aws_cognito_user_pool.example.id | ||
username = aws_cognito_user.example.username | ||
} | ||
``` | ||
|
||
<!-- schema generated by tfplugindocs --> | ||
## Schema | ||
|
Oops, something went wrong.