Skip to content

Commit

Permalink
Update services based on v1.44.290 of AWS Go SDK
Browse files Browse the repository at this point in the history
  • Loading branch information
web-flow committed Jun 27, 2023
1 parent b90be1f commit 5762c53
Show file tree
Hide file tree
Showing 4 changed files with 102 additions and 19 deletions.
2 changes: 1 addition & 1 deletion .latest-tag-aws-sdk-go
Original file line number Diff line number Diff line change
@@ -1 +1 @@
v1.44.289
v1.44.290
57 changes: 57 additions & 0 deletions lib/aws/generated/connect.ex
Original file line number Diff line number Diff line change
Expand Up @@ -306,6 +306,23 @@ defmodule AWS.Connect do
API to verify the status of a previous
[ClaimPhoneNumber](https://docs.aws.amazon.com/connect/latest/APIReference/API_ClaimPhoneNumber.html)
operation.
If you plan to claim and release numbers frequently during a 30 day period,
contact us for a service quota exception. Otherwise, it is possible you will be
blocked from claiming and releasing any more numbers until 30 days past the
oldest number released has expired.
By default you can claim and release up to 200% of your maximum number of active
phone numbers during any 30 day period. If you claim and release phone numbers
using the UI or API during a rolling 30 day cycle that exceeds 200% of your
phone number service level quota, you will be blocked from claiming any more
numbers until 30 days past the oldest number released has expired.
For example, if you already have 99 claimed numbers and a service level quota of
99 phone numbers, and in any 30 day period you release 99, claim 99, and then
release 99, you will have exceeded the 200% limit. At that point you are blocked
from claiming any more numbers until you open an Amazon Web Services support
ticket.
"""
def claim_phone_number(%Client{} = client, input, options \\ []) do
url_path = "/phone-number/claim"
Expand Down Expand Up @@ -3576,6 +3593,23 @@ defmodule AWS.Connect do
of 30 days. It cannot be searched for or claimed again until the period has
ended. If you accidentally release a phone number, contact Amazon Web Services
Support.
If you plan to claim and release numbers frequently during a 30 day period,
contact us for a service quota exception. Otherwise, it is possible you will be
blocked from claiming and releasing any more numbers until 30 days past the
oldest number released has expired.
By default you can claim and release up to 200% of your maximum number of active
phone numbers during any 30 day period. If you claim and release phone numbers
using the UI or API during a rolling 30 day cycle that exceeds 200% of your
phone number service level quota, you will be blocked from claiming any more
numbers until 30 days past the oldest number released has expired.
For example, if you already have 99 claimed numbers and a service level quota of
99 phone numbers, and in any 30 day period you release 99, claim 99, and then
release 99, you will have exceeded the 200% limit. At that point you are blocked
from claiming any more numbers until you open an Amazon Web Services support
ticket.
"""
def release_phone_number(%Client{} = client, phone_number_id, input, options \\ []) do
url_path = "/phone-number/#{AWS.Util.encode_uri(phone_number_id)}"
Expand Down Expand Up @@ -3779,6 +3813,29 @@ defmodule AWS.Connect do
)
end

@doc """
Searches tags used in an Amazon Connect instance using optional search criteria.
"""
def search_resource_tags(%Client{} = client, input, options \\ []) do
url_path = "/search-resource-tags"
headers = []
query_params = []

meta = metadata()

Request.request_rest(
client,
meta,
:post,
url_path,
query_params,
headers,
input,
options,
nil
)
end

@doc """
This API is in preview release for Amazon Connect and is subject to change.
Expand Down
6 changes: 3 additions & 3 deletions lib/aws/generated/guard_duty.ex
Original file line number Diff line number Diff line change
Expand Up @@ -1432,9 +1432,9 @@ defmodule AWS.GuardDuty do
@doc """
Lists tags for a resource.
Tagging is currently supported for detectors, finding filters, IP sets, and
threat intel sets, with a limit of 50 tags per resource. When invoked, this
operation returns all assigned tags for a given resource.
Tagging is currently supported for detectors, finding filters, IP sets, threat
intel sets, publishing destination, with a limit of 50 tags per resource. When
invoked, this operation returns all assigned tags for a given resource.
"""
def list_tags_for_resource(%Client{} = client, resource_arn, options \\ []) do
url_path = "/tags/#{AWS.Util.encode_uri(resource_arn)}"
Expand Down
56 changes: 41 additions & 15 deletions lib/aws/generated/iam.ex
Original file line number Diff line number Diff line change
Expand Up @@ -82,7 +82,8 @@ defmodule AWS.IAM do
Attaches the specified managed policy to the specified IAM group.
You use this operation to attach a managed policy to a group. To embed an inline
policy in a group, use `PutGroupPolicy`.
policy in a group, use [ `PutGroupPolicy`
](https://docs.aws.amazon.com/IAM/latest/APIReference/API_PutGroupPolicy.html).
As a best practice, you can validate your IAM policies. To learn more, see
[Validating IAM policies](https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_policy-validator.html)
Expand All @@ -104,12 +105,15 @@ defmodule AWS.IAM do
the role's permission (access) policy.
You cannot use a managed policy as the role's trust policy. The role's trust
policy is created at the same time as the role, using `CreateRole`. You can
update a role's trust policy using `UpdateAssumeRolePolicy`.
policy is created at the same time as the role, using [ `CreateRole`
](https://docs.aws.amazon.com/IAM/latest/APIReference/API_CreateRole.html). You
can update a role's trust policy using [ `UpdateAssumerolePolicy`
](https://docs.aws.amazon.com/IAM/latest/APIReference/API_UpdateAssumeRolePolicy.html).
Use this operation to attach a *managed* policy to a role. To embed an inline
policy in a role, use `PutRolePolicy`. For more information about policies, see
[Managed policies and inline policies](https://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html)
policy in a role, use [ `PutRolePolicy`
](https://docs.aws.amazon.com/IAM/latest/APIReference/API_PutRolePolicy.html).
For more information about policies, see [Managed policies and inline policies](https://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html)
in the *IAM User Guide*.
As a best practice, you can validate your IAM policies. To learn more, see
Expand All @@ -126,7 +130,8 @@ defmodule AWS.IAM do
Attaches the specified managed policy to the specified user.
You use this operation to attach a *managed* policy to a user. To embed an
inline policy in a user, use `PutUserPolicy`.
inline policy in a user, use [ `PutUserPolicy`
](https://docs.aws.amazon.com/IAM/latest/APIReference/API_PutUserPolicy.html).
As a best practice, you can validate your IAM policies. To learn more, see
[Validating IAM policies](https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_policy-validator.html)
Expand Down Expand Up @@ -1326,6 +1331,15 @@ defmodule AWS.IAM do
Request.request_post(client, meta, "GetLoginProfile", input, options)
end

@doc """
Retrieves information about an MFA device for a specified user.
"""
def get_mfa_device(%Client{} = client, input, options \\ []) do
meta = metadata()

Request.request_post(client, meta, "GetMFADevice", input, options)
end

@doc """
Returns information about the specified OpenID Connect (OIDC) provider resource
object in IAM.
Expand Down Expand Up @@ -2282,8 +2296,11 @@ defmodule AWS.IAM do
group.
A user can also have managed policies attached to it. To attach a managed policy
to a group, use `AttachGroupPolicy`. To create a new managed policy, use
`CreatePolicy`. For information about policies, see [Managed policies and inline policies](https://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html)
to a group, use [ `AttachGroupPolicy`
](https://docs.aws.amazon.com/IAM/latest/APIReference/API_AttachGroupPolicy.html).
To create a new managed policy, use [ `CreatePolicy`
](https://docs.aws.amazon.com/IAM/latest/APIReference/API_CreatePolicy.html).
For information about policies, see [Managed policies and inline policies](https://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html)
in the *IAM User Guide*.
For information about the maximum number of inline policies that you can embed
Expand Down Expand Up @@ -2329,13 +2346,19 @@ defmodule AWS.IAM do
When you embed an inline policy in a role, the inline policy is used as part of
the role's access (permissions) policy. The role's trust policy is created at
the same time as the role, using `CreateRole`. You can update a role's trust
policy using `UpdateAssumeRolePolicy`. For more information about IAM roles, see
[Using roles to delegate permissions and federate identities](https://docs.aws.amazon.com/IAM/latest/UserGuide/roles-toplevel.html).
the same time as the role, using [ `CreateRole`
](https://docs.aws.amazon.com/IAM/latest/APIReference/API_CreateRole.html). You
can update a role's trust policy using [ `UpdateAssumerolePolicy`
](https://docs.aws.amazon.com/IAM/latest/APIReference/API_UpdateAssumeRolePolicy.html).
For more information about IAM roles, see [Using roles to delegate permissions and federate
identities](https://docs.aws.amazon.com/IAM/latest/UserGuide/roles-toplevel.html).
A role can also have a managed policy attached to it. To attach a managed policy
to a role, use `AttachRolePolicy`. To create a new managed policy, use
`CreatePolicy`. For information about policies, see [Managed policies and inline policies](https://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html)
to a role, use [ `AttachRolePolicy`
](https://docs.aws.amazon.com/IAM/latest/APIReference/API_AttachRolePolicy.html).
To create a new managed policy, use [ `CreatePolicy`
](https://docs.aws.amazon.com/IAM/latest/APIReference/API_CreatePolicy.html).
For information about policies, see [Managed policies and inline policies](https://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html)
in the *IAM User Guide*.
For information about the maximum number of inline policies that you can embed
Expand Down Expand Up @@ -2378,8 +2401,11 @@ defmodule AWS.IAM do
user.
An IAM user can also have a managed policy attached to it. To attach a managed
policy to a user, use `AttachUserPolicy`. To create a new managed policy, use
`CreatePolicy`. For information about policies, see [Managed policies and inline policies](https://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html)
policy to a user, use [ `AttachUserPolicy`
](https://docs.aws.amazon.com/IAM/latest/APIReference/API_AttachUserPolicy.html).
To create a new managed policy, use [ `CreatePolicy`
](https://docs.aws.amazon.com/IAM/latest/APIReference/API_CreatePolicy.html).
For information about policies, see [Managed policies and inline policies](https://docs.aws.amazon.com/IAM/latest/UserGuide/policies-managed-vs-inline.html)
in the *IAM User Guide*.
For information about the maximum number of inline policies that you can embed
Expand Down

0 comments on commit 5762c53

Please sign in to comment.