diff --git a/deps/metadata.json b/deps/metadata.json index 74a617e511..4db4928194 100644 --- a/deps/metadata.json +++ b/deps/metadata.json @@ -344,7 +344,7 @@ "version": "2017-10-12" }, "medialive-2017-10-14.normal.json": { - "sha": "9ef520461b5ce9346c0e7eb12b8f2f49c54e61e3", + "sha": "eb8aeb9ad2a57166c14e8b93b3b18d86182f4a31", "version": "2017-10-14" }, "mediaconvert-2017-08-29.normal.json": { @@ -744,7 +744,7 @@ "version": "2019-10-15" }, "codestar-connections-2019-12-01.normal.json": { - "sha": "6cdc0e9aca89ab566da11ce7210b1d13e7ac48f5", + "sha": "6492567b67aa0e7b81d4c4fd48c60c62f8d76d6a", "version": "2019-12-01" }, "codestar-2017-04-19.normal.json": { @@ -920,7 +920,7 @@ "version": "2019-12-20" }, "sso-admin-2020-07-20.normal.json": { - "sha": "7ed99283037bbd11e56ee238847252596f54aca4", + "sha": "b674e3389aa1f7769b5959ab278d56c6db1a0487", "version": "2020-07-20" } } diff --git a/src/services/codestar_connections.jl b/src/services/codestar_connections.jl index dacde90daa..8415bc2b11 100644 --- a/src/services/codestar_connections.jl +++ b/src/services/codestar_connections.jl @@ -1,7 +1,6 @@ # This file is auto-generated by AWSMetadata.jl using AWS using AWS.AWSServices: codestar_connections - using AWS.Compat using AWS.UUIDs """ diff --git a/src/services/medialive.jl b/src/services/medialive.jl index d3e6d2246b..d9d70924e1 100644 --- a/src/services/medialive.jl +++ b/src/services/medialive.jl @@ -3,6 +3,47 @@ using AWS using AWS.AWSServices: medialive using AWS.Compat using AWS.UUIDs +""" + BatchDelete() + +Starts delete of resources. + +# Optional Parameters +- `channelIds`: List of channel IDs +- `inputIds`: List of input IDs +- `inputSecurityGroupIds`: List of input security group IDs +- `multiplexIds`: List of multiplex IDs +""" + +batch_delete(; aws_config::AWSConfig=global_aws_config()) = medialive("POST", "/prod/batch/delete"; aws_config=aws_config) +batch_delete(args::AbstractDict{String, Any}; aws_config::AWSConfig=global_aws_config()) = medialive("POST", "/prod/batch/delete", args; aws_config=aws_config) + +""" + BatchStart() + +Starts existing resources + +# Optional Parameters +- `channelIds`: List of channel IDs +- `multiplexIds`: List of multiplex IDs +""" + +batch_start(; aws_config::AWSConfig=global_aws_config()) = medialive("POST", "/prod/batch/start"; aws_config=aws_config) +batch_start(args::AbstractDict{String, Any}; aws_config::AWSConfig=global_aws_config()) = medialive("POST", "/prod/batch/start", args; aws_config=aws_config) + +""" + BatchStop() + +Stops running resources + +# Optional Parameters +- `channelIds`: List of channel IDs +- `multiplexIds`: List of multiplex IDs +""" + +batch_stop(; aws_config::AWSConfig=global_aws_config()) = medialive("POST", "/prod/batch/stop"; aws_config=aws_config) +batch_stop(args::AbstractDict{String, Any}; aws_config::AWSConfig=global_aws_config()) = medialive("POST", "/prod/batch/stop", args; aws_config=aws_config) + """ BatchUpdateSchedule() diff --git a/src/services/sso_admin.jl b/src/services/sso_admin.jl index 6c9cb3b46a..c8055acacd 100644 --- a/src/services/sso_admin.jl +++ b/src/services/sso_admin.jl @@ -6,7 +6,7 @@ using AWS.UUIDs """ AttachManagedPolicyToPermissionSet() -Attaches an IAM managed policy ARN to a permission set. +Attaches an IAM managed policy ARN to a permission set. If the permission set is already referenced by one or more account assignments, you will need to call ProvisionPermissionSet after this action to apply the corresponding IAM policy updates to all assigned accounts. # Required Parameters - `InstanceArn`: The ARN of the SSO instance under which the operation will be executed. For more information about ARNs, see Amazon Resource Names (ARNs) and AWS Service Namespaces in the AWS General Reference. @@ -21,14 +21,14 @@ attach_managed_policy_to_permission_set(InstanceArn, ManagedPolicyArn, Permissio """ CreateAccountAssignment() -Assigns access to a principal for a specified AWS account using a specified permission set. The term principal here refers to a user or group that is defined in AWS SSO. +Assigns access to a principal for a specified AWS account using a specified permission set. The term principal here refers to a user or group that is defined in AWS SSO. As part of a successful CreateAccountAssignment call, the specified permission set will automatically be provisioned to the account in the form of an IAM policy attached to the SSO-created IAM role. If the permission set is subsequently updated, the corresponding IAM policies attached to roles in your accounts will not be updated automatically. In this case, you will need to call ProvisionPermissionSet to make these updates. # Required Parameters - `InstanceArn`: The ARN of the SSO instance under which the operation will be executed. For more information about ARNs, see Amazon Resource Names (ARNs) and AWS Service Namespaces in the AWS General Reference. - `PermissionSetArn`: The ARN of the permission set that the admin wants to grant the principal access to. -- `PrincipalId`: The identifier of the principal. +- `PrincipalId`: An identifier for an object in AWS SSO, such as a user or group. PrincipalIds are GUIDs (For example, f81d4fae-7dec-11d0-a765-00a0c91e6bf6). For more information about PrincipalIds in AWS SSO, see the AWS SSO Identity Store API Reference. - `PrincipalType`: The entity type for which the assignment will be created. -- `TargetId`: The identifier for the chosen target. +- `TargetId`: TargetID is an AWS account identifier, typically a 10-12 digit string (For example, 123456789012). - `TargetType`: The entity type for which the assignment will be created. """ @@ -39,7 +39,7 @@ create_account_assignment(InstanceArn, PermissionSetArn, PrincipalId, PrincipalT """ CreatePermissionSet() -Creates a permission set within a specified SSO instance. +Creates a permission set within a specified SSO instance. To grant users and groups access to AWS account resources, use CreateAccountAssignment . # Required Parameters - `InstanceArn`: The ARN of the SSO instance under which the operation will be executed. For more information about ARNs, see Amazon Resource Names (ARNs) and AWS Service Namespaces in the AWS General Reference. @@ -63,9 +63,9 @@ Deletes a principal's access from a specified AWS account using a specified perm # Required Parameters - `InstanceArn`: The ARN of the SSO instance under which the operation will be executed. For more information about ARNs, see Amazon Resource Names (ARNs) and AWS Service Namespaces in the AWS General Reference. - `PermissionSetArn`: The ARN of the permission set that will be used to remove access. -- `PrincipalId`: The identifier of the principal. +- `PrincipalId`: An identifier for an object in AWS SSO, such as a user or group. PrincipalIds are GUIDs (For example, f81d4fae-7dec-11d0-a765-00a0c91e6bf6). For more information about PrincipalIds in AWS SSO, see the AWS SSO Identity Store API Reference. - `PrincipalType`: The entity type for which the assignment will be deleted. -- `TargetId`: The identifier for the chosen target. +- `TargetId`: TargetID is an AWS account identifier, typically a 10-12 digit string (For example, 123456789012). - `TargetType`: The entity type for which the assignment will be deleted. """ @@ -364,7 +364,7 @@ The process by which a specified permission set is provisioned to the specified - `TargetType`: The entity type for which the assignment will be created. # Optional Parameters -- `TargetId`: The identifier for the chosen target. +- `TargetId`: TargetID is an AWS account identifier, typically a 10-12 digit string (For example, 123456789012). """ provision_permission_set(InstanceArn, PermissionSetArn, TargetType; aws_config::AWSConfig=global_aws_config()) = sso_admin("ProvisionPermissionSet", Dict{String, Any}("InstanceArn"=>InstanceArn, "PermissionSetArn"=>PermissionSetArn, "TargetType"=>TargetType); aws_config=aws_config) @@ -373,7 +373,7 @@ provision_permission_set(InstanceArn, PermissionSetArn, TargetType, args::Abstra """ PutInlinePolicyToPermissionSet() -Attaches an IAM inline policy to a permission set. +Attaches an IAM inline policy to a permission set. If the permission set is already referenced by one or more account assignments, you will need to call ProvisionPermissionSet after this action to apply the corresponding IAM policy updates to all assigned accounts. # Required Parameters - `InlinePolicy`: The IAM inline policy to attach to a PermissionSet.