You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/docs/aws/services/cognito.mdx
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -237,7 +237,7 @@ Cognito offers a variety of lifecycle hooks called Cognito Lambda triggers, whic
237
237
To illustrate, suppose you wish to define a _user migration_ Lambda trigger in order to migrate users from your existing user directory into Amazon Cognito user pools at sign-in.
238
238
In this case, you can start by creating a Lambda function, let's say named `"migrate_users"`, responsible for performing the migration by creating a new file `index.js` with the following code:
You can retrieve the token from your application using the specified endpoint: `http://cognito-idp.localhost.localstack.cloud:4566/_aws/cognito-idp/oauth2/token`.
381
381
382
-
```javascript
382
+
```javascript showLineNumbers
383
383
require('dotenv').config();
384
384
const axios = require('axios');
385
385
@@ -419,7 +419,7 @@ Furthermore, you have the option to combine Cognito and LocalStack seamlessly wi
419
419
420
420
For instance, consider this snippet from a `serverless.yml` configuration:
Containers within tasks are defined by a task definition that is managed outside of the context of a cluster.
62
62
To create a task definition that runs an `ubuntu` container forever (by running an infinite loop printing "Running" on startup), create the following file as `task_definition.json`:
Copy file name to clipboardExpand all lines: src/content/docs/aws/services/eks.mdx
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -307,7 +307,7 @@ To enable HTTPS for your endpoints, you can configure Kubernetes to use SSL/TLS
307
307
308
308
The local EKS cluster comes pre-configured with a secret named `ls-secret-tls`, which can be conveniently utilized to define the `tls` section in the ingress configuration:
309
309
310
-
```yaml
310
+
```yaml showLineNumbers
311
311
apiVersion: networking.k8s.io/v1
312
312
kind: Ingress
313
313
metadata:
@@ -425,7 +425,7 @@ In such cases, path-based routing may not be ideal if you need the services to b
425
425
426
426
To address this requirement, we recommend utilizing host-based routing rules, as demonstrated in the example below:
427
427
428
-
```bash
428
+
```bash showLineNumbers
429
429
cat <<EOF | kubectl apply -f -
430
430
apiVersion: networking.k8s.io/v1
431
431
kind: Ingress
@@ -532,7 +532,7 @@ As a result, the tag name `__k3d_volume_mount__` is considered deprecated and wi
532
532
After creating your cluster with the `_volume_mount_` tag, you can create your path with volume mounts as usual.
533
533
The configuration for the volume mounts can be set up similar to this:
0 commit comments