From 60cdf69cf3f92fc8f80b232f763b0ada4150576c Mon Sep 17 00:00:00 2001 From: AWS SDK for Ruby Date: Mon, 28 Mar 2022 18:05:23 +0000 Subject: [PATCH] Updated API models and rebuilt service gems. --- apis/acm-pca/2017-08-22/docs-2.json | 70 ++++---- apis/medialive/2017-10-14/api-2.json | 107 +++++++++++ apis/medialive/2017-10-14/docs-2.json | 48 ++++- gems/aws-partitions/CHANGELOG.md | 5 + gems/aws-partitions/VERSION | 2 +- gems/aws-partitions/partitions.json | 7 + gems/aws-sdk-acmpca/CHANGELOG.md | 5 + gems/aws-sdk-acmpca/VERSION | 2 +- gems/aws-sdk-acmpca/lib/aws-sdk-acmpca.rb | 2 +- .../lib/aws-sdk-acmpca/client.rb | 169 +++++++++--------- .../lib/aws-sdk-acmpca/types.rb | 151 ++++++++-------- gems/aws-sdk-medialive/CHANGELOG.md | 5 + gems/aws-sdk-medialive/VERSION | 2 +- .../lib/aws-sdk-medialive.rb | 2 +- .../lib/aws-sdk-medialive/client.rb | 51 +++++- .../lib/aws-sdk-medialive/client_api.rb | 30 ++++ .../lib/aws-sdk-medialive/types.rb | 161 +++++++++++++++-- 17 files changed, 596 insertions(+), 223 deletions(-) diff --git a/apis/acm-pca/2017-08-22/docs-2.json b/apis/acm-pca/2017-08-22/docs-2.json index 8f079530c9e..e0a9b8a6096 100644 --- a/apis/acm-pca/2017-08-22/docs-2.json +++ b/apis/acm-pca/2017-08-22/docs-2.json @@ -1,27 +1,27 @@ { "version": "2.0", - "service": "

This is the Amazon Web Services Private Certificate Authority API Reference. It provides descriptions, syntax, and usage examples for each of the actions and data types involved in creating and managing a private certificate authority (CA) for your organization.

The documentation for each action shows the API request parameters and the JSON response. Alternatively, you can use one of the Amazon Web Services SDKs to access an API that is tailored to the programming language or platform that you prefer. For more information, see Amazon Web Services SDKs.

Each Amazon Web Services Private CA API operation has a quota that determines the number of times the operation can be called per second. Amazon Web Services Private CA throttles API requests at different rates depending on the operation. Throttling means that Amazon Web Services Private CA rejects an otherwise valid request because the request exceeds the operation's quota for the number of requests per second. When a request is throttled, Amazon Web Services Private CA returns a ThrottlingException error. Amazon Web Services Private CA does not guarantee a minimum request rate for APIs.

To see an up-to-date list of your Amazon Web Services Private CA quotas, or to request a quota increase, log into your Amazon Web Services account and visit the Service Quotas console.

", + "service": "

This is the Certificate Manager Private Certificate Authority (PCA) API Reference. It provides descriptions, syntax, and usage examples for each of the actions and data types involved in creating and managing a private certificate authority (CA) for your organization.

The documentation for each action shows the API request parameters and the JSON response. Alternatively, you can use one of the Amazon Web Services SDKs to access an API that is tailored to the programming language or platform that you prefer. For more information, see Amazon Web Services SDKs.

Each ACM Private CA API operation has a quota that determines the number of times the operation can be called per second. ACM Private CA throttles API requests at different rates depending on the operation. Throttling means that ACM Private CA rejects an otherwise valid request because the request exceeds the operation's quota for the number of requests per second. When a request is throttled, ACM Private CA returns a ThrottlingException error. ACM Private CA does not guarantee a minimum request rate for APIs.

To see an up-to-date list of your ACM Private CA quotas, or to request a quota increase, log into your Amazon Web Services account and visit the Service Quotas console.

", "operations": { - "CreateCertificateAuthority": "

Creates a root or subordinate private certificate authority (CA). You must specify the CA configuration, an optional configuration for Online Certificate Status Protocol (OCSP) and/or a certificate revocation list (CRL), the CA type, and an optional idempotency token to avoid accidental creation of multiple CAs. The CA configuration specifies the name of the algorithm and key size to be used to create the CA private key, the type of signing algorithm that the CA uses, and X.500 subject information. The OCSP configuration can optionally specify a custom URL for the OCSP responder. The CRL configuration specifies the CRL expiration period in days (the validity period of the CRL), the Amazon S3 bucket that will contain the CRL, and a CNAME alias for the S3 bucket that is included in certificates issued by the CA. If successful, this action returns the Amazon Resource Name (ARN) of the CA.

Amazon Web Services Private CA assets that are stored in Amazon S3 can be protected with encryption. For more information, see Encrypting Your CRLs.

Both PCA and the IAM principal must have permission to write to the S3 bucket that you specify. If the IAM principal making the call does not have permission to write to the bucket, then an exception is thrown. For more information, see Access policies for CRLs in Amazon S3.

", - "CreateCertificateAuthorityAuditReport": "

Creates an audit report that lists every time that your CA private key is used. The report is saved in the Amazon S3 bucket that you specify on input. The IssueCertificate and RevokeCertificate actions use the private key.

Both PCA and the IAM principal must have permission to write to the S3 bucket that you specify. If the IAM principal making the call does not have permission to write to the bucket, then an exception is thrown. For more information, see Access policies for CRLs in Amazon S3.

Amazon Web Services Private CA assets that are stored in Amazon S3 can be protected with encryption. For more information, see Encrypting Your Audit Reports.

You can generate a maximum of one report every 30 minutes.

", - "CreatePermission": "

Grants one or more permissions on a private CA to the Certificate Manager (ACM) service principal (acm.amazonaws.com). These permissions allow ACM to issue and renew ACM certificates that reside in the same Amazon Web Services account as the CA.

You can list current permissions with the ListPermissions action and revoke them with the DeletePermission action.

About Permissions

", - "DeleteCertificateAuthority": "

Deletes a private certificate authority (CA). You must provide the Amazon Resource Name (ARN) of the private CA that you want to delete. You can find the ARN by calling the ListCertificateAuthorities action.

Deleting a CA will invalidate other CAs and certificates below it in your CA hierarchy.

Before you can delete a CA that you have created and activated, you must disable it. To do this, call the UpdateCertificateAuthority action and set the CertificateAuthorityStatus parameter to DISABLED.

Additionally, you can delete a CA if you are waiting for it to be created (that is, the status of the CA is CREATING). You can also delete it if the CA has been created but you haven't yet imported the signed certificate into Amazon Web Services Private CA (that is, the status of the CA is PENDING_CERTIFICATE).

When you successfully call DeleteCertificateAuthority, the CA's status changes to DELETED. However, the CA won't be permanently deleted until the restoration period has passed. By default, if you do not set the PermanentDeletionTimeInDays parameter, the CA remains restorable for 30 days. You can set the parameter from 7 to 30 days. The DescribeCertificateAuthority action returns the time remaining in the restoration window of a private CA in the DELETED state. To restore an eligible CA, call the RestoreCertificateAuthority action.

", - "DeletePermission": "

Revokes permissions on a private CA granted to the Certificate Manager (ACM) service principal (acm.amazonaws.com).

These permissions allow ACM to issue and renew ACM certificates that reside in the same Amazon Web Services account as the CA. If you revoke these permissions, ACM will no longer renew the affected certificates automatically.

Permissions can be granted with the CreatePermission action and listed with the ListPermissions action.

About Permissions

", - "DeletePolicy": "

Deletes the resource-based policy attached to a private CA. Deletion will remove any access that the policy has granted. If there is no policy attached to the private CA, this action will return successful.

If you delete a policy that was applied through Amazon Web Services Resource Access Manager (RAM), the CA will be removed from all shares in which it was included.

The Certificate Manager Service Linked Role that the policy supports is not affected when you delete the policy.

The current policy can be shown with GetPolicy and updated with PutPolicy.

About Policies

", - "DescribeCertificateAuthority": "

Lists information about your private certificate authority (CA) or one that has been shared with you. You specify the private CA on input by its ARN (Amazon Resource Name). The output contains the status of your CA. This can be any of the following:

", + "CreateCertificateAuthority": "

Creates a root or subordinate private certificate authority (CA). You must specify the CA configuration, an optional configuration for Online Certificate Status Protocol (OCSP) and/or a certificate revocation list (CRL), the CA type, and an optional idempotency token to avoid accidental creation of multiple CAs. The CA configuration specifies the name of the algorithm and key size to be used to create the CA private key, the type of signing algorithm that the CA uses, and X.500 subject information. The OCSP configuration can optionally specify a custom URL for the OCSP responder. The CRL configuration specifies the CRL expiration period in days (the validity period of the CRL), the Amazon S3 bucket that will contain the CRL, and a CNAME alias for the S3 bucket that is included in certificates issued by the CA. If successful, this action returns the Amazon Resource Name (ARN) of the CA.

ACM Private CA assets that are stored in Amazon S3 can be protected with encryption. For more information, see Encrypting Your CRLs.

Both PCA and the IAM principal must have permission to write to the S3 bucket that you specify. If the IAM principal making the call does not have permission to write to the bucket, then an exception is thrown. For more information, see Access policies for CRLs in Amazon S3.

", + "CreateCertificateAuthorityAuditReport": "

Creates an audit report that lists every time that your CA private key is used. The report is saved in the Amazon S3 bucket that you specify on input. The IssueCertificate and RevokeCertificate actions use the private key.

Both PCA and the IAM principal must have permission to write to the S3 bucket that you specify. If the IAM principal making the call does not have permission to write to the bucket, then an exception is thrown. For more information, see Access policies for CRLs in Amazon S3.

ACM Private CA assets that are stored in Amazon S3 can be protected with encryption. For more information, see Encrypting Your Audit Reports.

You can generate a maximum of one report every 30 minutes.

", + "CreatePermission": "

Grants one or more permissions on a private CA to the Certificate Manager (ACM) service principal (acm.amazonaws.com). These permissions allow ACM to issue and renew ACM certificates that reside in the same Amazon Web Services account as the CA.

You can list current permissions with the ListPermissions action and revoke them with the DeletePermission action.

About Permissions

", + "DeleteCertificateAuthority": "

Deletes a private certificate authority (CA). You must provide the Amazon Resource Name (ARN) of the private CA that you want to delete. You can find the ARN by calling the ListCertificateAuthorities action.

Deleting a CA will invalidate other CAs and certificates below it in your CA hierarchy.

Before you can delete a CA that you have created and activated, you must disable it. To do this, call the UpdateCertificateAuthority action and set the CertificateAuthorityStatus parameter to DISABLED.

Additionally, you can delete a CA if you are waiting for it to be created (that is, the status of the CA is CREATING). You can also delete it if the CA has been created but you haven't yet imported the signed certificate into ACM Private CA (that is, the status of the CA is PENDING_CERTIFICATE).

When you successfully call DeleteCertificateAuthority, the CA's status changes to DELETED. However, the CA won't be permanently deleted until the restoration period has passed. By default, if you do not set the PermanentDeletionTimeInDays parameter, the CA remains restorable for 30 days. You can set the parameter from 7 to 30 days. The DescribeCertificateAuthority action returns the time remaining in the restoration window of a private CA in the DELETED state. To restore an eligible CA, call the RestoreCertificateAuthority action.

", + "DeletePermission": "

Revokes permissions on a private CA granted to the Certificate Manager (ACM) service principal (acm.amazonaws.com).

These permissions allow ACM to issue and renew ACM certificates that reside in the same Amazon Web Services account as the CA. If you revoke these permissions, ACM will no longer renew the affected certificates automatically.

Permissions can be granted with the CreatePermission action and listed with the ListPermissions action.

About Permissions

", + "DeletePolicy": "

Deletes the resource-based policy attached to a private CA. Deletion will remove any access that the policy has granted. If there is no policy attached to the private CA, this action will return successful.

If you delete a policy that was applied through Amazon Web Services Resource Access Manager (RAM), the CA will be removed from all shares in which it was included.

The Certificate Manager Service Linked Role that the policy supports is not affected when you delete the policy.

The current policy can be shown with GetPolicy and updated with PutPolicy.

About Policies

", + "DescribeCertificateAuthority": "

Lists information about your private certificate authority (CA) or one that has been shared with you. You specify the private CA on input by its ARN (Amazon Resource Name). The output contains the status of your CA. This can be any of the following:

", "DescribeCertificateAuthorityAuditReport": "

Lists information about a specific audit report created by calling the CreateCertificateAuthorityAuditReport action. Audit information is created every time the certificate authority (CA) private key is used. The private key is used when you call the IssueCertificate action or the RevokeCertificate action.

", "GetCertificate": "

Retrieves a certificate from your private CA or one that has been shared with you. The ARN of the certificate is returned when you call the IssueCertificate action. You must specify both the ARN of your private CA and the ARN of the issued certificate when calling the GetCertificate action. You can retrieve the certificate if it is in the ISSUED state. You can call the CreateCertificateAuthorityAuditReport action to create a report that contains information about all of the certificates issued and revoked by your private CA.

", "GetCertificateAuthorityCertificate": "

Retrieves the certificate and certificate chain for your private certificate authority (CA) or one that has been shared with you. Both the certificate and the chain are base64 PEM-encoded. The chain does not include the CA certificate. Each certificate in the chain signs the one before it.

", - "GetCertificateAuthorityCsr": "

Retrieves the certificate signing request (CSR) for your private certificate authority (CA). The CSR is created when you call the CreateCertificateAuthority action. Sign the CSR with your Amazon Web Services Private CA-hosted or on-premises root or subordinate CA. Then import the signed certificate back into Amazon Web Services Private CA by calling the ImportCertificateAuthorityCertificate action. The CSR is returned as a base64 PEM-encoded string.

", - "GetPolicy": "

Retrieves the resource-based policy attached to a private CA. If either the private CA resource or the policy cannot be found, this action returns a ResourceNotFoundException.

The policy can be attached or updated with PutPolicy and removed with DeletePolicy.

About Policies

", - "ImportCertificateAuthorityCertificate": "

Imports a signed private CA certificate into Amazon Web Services Private CA. This action is used when you are using a chain of trust whose root is located outside Amazon Web Services Private CA. Before you can call this action, the following preparations must in place:

  1. In Amazon Web Services Private CA, call the CreateCertificateAuthority action to create the private CA that you plan to back with the imported certificate.

  2. Call the GetCertificateAuthorityCsr action to generate a certificate signing request (CSR).

  3. Sign the CSR using a root or intermediate CA hosted by either an on-premises PKI hierarchy or by a commercial CA.

  4. Create a certificate chain and copy the signed certificate and the certificate chain to your working directory.

Amazon Web Services Private CA supports three scenarios for installing a CA certificate:

The following additional requirements apply when you import a CA certificate.

Enforcement of Critical Constraints

Amazon Web Services Private CA allows the following extensions to be marked critical in the imported CA certificate or chain.

Amazon Web Services Private CA rejects the following extensions when they are marked critical in an imported CA certificate or chain.

", - "IssueCertificate": "

Uses your private certificate authority (CA), or one that has been shared with you, to issue a client certificate. This action returns the Amazon Resource Name (ARN) of the certificate. You can retrieve the certificate by calling the GetCertificate action and specifying the ARN.

You cannot use the ACM ListCertificateAuthorities action to retrieve the ARNs of the certificates that you issue by using Amazon Web Services Private CA.

", + "GetCertificateAuthorityCsr": "

Retrieves the certificate signing request (CSR) for your private certificate authority (CA). The CSR is created when you call the CreateCertificateAuthority action. Sign the CSR with your ACM Private CA-hosted or on-premises root or subordinate CA. Then import the signed certificate back into ACM Private CA by calling the ImportCertificateAuthorityCertificate action. The CSR is returned as a base64 PEM-encoded string.

", + "GetPolicy": "

Retrieves the resource-based policy attached to a private CA. If either the private CA resource or the policy cannot be found, this action returns a ResourceNotFoundException.

The policy can be attached or updated with PutPolicy and removed with DeletePolicy.

About Policies

", + "ImportCertificateAuthorityCertificate": "

Imports a signed private CA certificate into ACM Private CA. This action is used when you are using a chain of trust whose root is located outside ACM Private CA. Before you can call this action, the following preparations must in place:

  1. In ACM Private CA, call the CreateCertificateAuthority action to create the private CA that you plan to back with the imported certificate.

  2. Call the GetCertificateAuthorityCsr action to generate a certificate signing request (CSR).

  3. Sign the CSR using a root or intermediate CA hosted by either an on-premises PKI hierarchy or by a commercial CA.

  4. Create a certificate chain and copy the signed certificate and the certificate chain to your working directory.

ACM Private CA supports three scenarios for installing a CA certificate:

The following additional requirements apply when you import a CA certificate.

Enforcement of Critical Constraints

ACM Private CA allows the following extensions to be marked critical in the imported CA certificate or chain.

ACM Private CA rejects the following extensions when they are marked critical in an imported CA certificate or chain.

", + "IssueCertificate": "

Uses your private certificate authority (CA), or one that has been shared with you, to issue a client certificate. This action returns the Amazon Resource Name (ARN) of the certificate. You can retrieve the certificate by calling the GetCertificate action and specifying the ARN.

You cannot use the ACM ListCertificateAuthorities action to retrieve the ARNs of the certificates that you issue by using ACM Private CA.

", "ListCertificateAuthorities": "

Lists the private certificate authorities that you created by using the CreateCertificateAuthority action.

", - "ListPermissions": "

List all permissions on a private CA, if any, granted to the Certificate Manager (ACM) service principal (acm.amazonaws.com).

These permissions allow ACM to issue and renew ACM certificates that reside in the same Amazon Web Services account as the CA.

Permissions can be granted with the CreatePermission action and revoked with the DeletePermission action.

About Permissions

", + "ListPermissions": "

List all permissions on a private CA, if any, granted to the Certificate Manager (ACM) service principal (acm.amazonaws.com).

These permissions allow ACM to issue and renew ACM certificates that reside in the same Amazon Web Services account as the CA.

Permissions can be granted with the CreatePermission action and revoked with the DeletePermission action.

About Permissions

", "ListTags": "

Lists the tags, if any, that are associated with your private CA or one that has been shared with you. Tags are labels that you can use to identify and organize your CAs. Each tag consists of a key and an optional value. Call the TagCertificateAuthority action to add one or more tags to your CA. Call the UntagCertificateAuthority action to remove tags.

", - "PutPolicy": "

Attaches a resource-based policy to a private CA.

A policy can also be applied by sharing a private CA through Amazon Web Services Resource Access Manager (RAM). For more information, see Attach a Policy for Cross-Account Access.

The policy can be displayed with GetPolicy and removed with DeletePolicy.

About Policies

", + "PutPolicy": "

Attaches a resource-based policy to a private CA.

A policy can also be applied by sharing a private CA through Amazon Web Services Resource Access Manager (RAM). For more information, see Attach a Policy for Cross-Account Access.

The policy can be displayed with GetPolicy and removed with DeletePolicy.

About Policies

", "RestoreCertificateAuthority": "

Restores a certificate authority (CA) that is in the DELETED state. You can restore a CA during the period that you defined in the PermanentDeletionTimeInDays parameter of the DeleteCertificateAuthority action. Currently, you can specify 7 to 30 days. If you did not specify a PermanentDeletionTimeInDays value, by default you can restore the CA at any time in a 30 day period. You can check the time remaining in the restoration period of a private CA in the DELETED state by calling the DescribeCertificateAuthority or ListCertificateAuthorities actions. The status of a restored CA is set to its pre-deletion status when the RestoreCertificateAuthority action returns. To change its status to ACTIVE, call the UpdateCertificateAuthority action. If the private CA was in the PENDING_CERTIFICATE state at deletion, you must use the ImportCertificateAuthorityCertificate action to import a certificate authority into the private CA before it can be activated. You cannot restore a CA after the restoration period has ended.

", - "RevokeCertificate": "

Revokes a certificate that was issued inside Amazon Web Services Private CA. If you enable a certificate revocation list (CRL) when you create or update your private CA, information about the revoked certificates will be included in the CRL. Amazon Web Services Private CA writes the CRL to an S3 bucket that you specify. A CRL is typically updated approximately 30 minutes after a certificate is revoked. If for any reason the CRL update fails, Amazon Web Services Private CA attempts makes further attempts every 15 minutes. With Amazon CloudWatch, you can create alarms for the metrics CRLGenerated and MisconfiguredCRLBucket. For more information, see Supported CloudWatch Metrics.

Both PCA and the IAM principal must have permission to write to the S3 bucket that you specify. If the IAM principal making the call does not have permission to write to the bucket, then an exception is thrown. For more information, see Access policies for CRLs in Amazon S3.

Amazon Web Services Private CA also writes revocation information to the audit report. For more information, see CreateCertificateAuthorityAuditReport.

You cannot revoke a root CA self-signed certificate.

", + "RevokeCertificate": "

Revokes a certificate that was issued inside ACM Private CA. If you enable a certificate revocation list (CRL) when you create or update your private CA, information about the revoked certificates will be included in the CRL. ACM Private CA writes the CRL to an S3 bucket that you specify. A CRL is typically updated approximately 30 minutes after a certificate is revoked. If for any reason the CRL update fails, ACM Private CA attempts makes further attempts every 15 minutes. With Amazon CloudWatch, you can create alarms for the metrics CRLGenerated and MisconfiguredCRLBucket. For more information, see Supported CloudWatch Metrics.

Both PCA and the IAM principal must have permission to write to the S3 bucket that you specify. If the IAM principal making the call does not have permission to write to the bucket, then an exception is thrown. For more information, see Access policies for CRLs in Amazon S3.

ACM Private CA also writes revocation information to the audit report. For more information, see CreateCertificateAuthorityAuditReport.

You cannot revoke a root CA self-signed certificate.

", "TagCertificateAuthority": "

Adds one or more tags to your private CA. Tags are labels that you can use to identify and organize your Amazon Web Services resources. Each tag consists of a key and an optional value. You specify the private CA on input by its Amazon Resource Name (ARN). You specify the tag by using a key-value pair. You can apply a tag to just one private CA if you want to identify a specific characteristic of that CA, or you can apply the same tag to multiple private CAs if you want to filter for a common relationship among those CAs. To remove one or more tags, use the UntagCertificateAuthority action. Call the ListTags action to see what tags are associated with your CA.

", "UntagCertificateAuthority": "

Remove one or more tags from your private CA. A tag consists of a key-value pair. If you do not specify the value portion of the tag when calling this action, the tag will be removed regardless of value. If you specify a value, the tag is removed only if it is associated with the specified value. To add tags to a private CA, use the TagCertificateAuthority. Call the ListTags action to see what tags are associated with your CA.

", "UpdateCertificateAuthority": "

Updates the status or configuration of a private certificate authority (CA). Your private CA must be in the ACTIVE or DISABLED state before you can update it. You can disable a private CA that is in the ACTIVE state or make a CA that is in the DISABLED state active again.

Both PCA and the IAM principal must have permission to write to the S3 bucket that you specify. If the IAM principal making the call does not have permission to write to the bucket, then an exception is thrown. For more information, see Access policies for CRLs in Amazon S3.

" @@ -97,9 +97,9 @@ } }, "ApiPassthrough": { - "base": "

Contains X.509 certificate information to be placed in an issued certificate. An APIPassthrough or APICSRPassthrough template variant must be selected, or else this parameter is ignored.

If conflicting or duplicate certificate information is supplied from other sources, Amazon Web Services Private CA applies order of operation rules to determine what information is used.

", + "base": "

Contains X.509 certificate information to be placed in an issued certificate. An APIPassthrough or APICSRPassthrough template variant must be selected, or else this parameter is ignored.

If conflicting or duplicate certificate information is supplied from other sources, ACM Private CA applies order of operation rules to determine what information is used.

", "refs": { - "IssueCertificateRequest$ApiPassthrough": "

Specifies X.509 certificate information to be included in the issued certificate. An APIPassthrough or APICSRPassthrough template variant must be selected, or else this parameter is ignored. For more information about using these templates, see Understanding Certificate Templates.

If conflicting or duplicate certificate information is supplied during certificate issuance, Amazon Web Services Private CA applies order of operation rules to determine what information is used.

" + "IssueCertificateRequest$ApiPassthrough": "

Specifies X.509 certificate information to be included in the issued certificate. An APIPassthrough or APICSRPassthrough template variant must be selected, or else this parameter is ignored. For more information about using these templates, see Understanding Certificate Templates.

If conflicting or duplicate certificate information is supplied during certificate issuance, ACM Private CA applies order of operation rules to determine what information is used.

" } }, "Arn": { @@ -121,7 +121,7 @@ "GetPolicyRequest$ResourceArn": "

The Amazon Resource Number (ARN) of the private CA that will have its policy retrieved. You can find the CA's ARN by calling the ListCertificateAuthorities action.

", "ImportCertificateAuthorityCertificateRequest$CertificateAuthorityArn": "

The Amazon Resource Name (ARN) that was returned when you called CreateCertificateAuthority. This must be of the form:

arn:aws:acm-pca:region:account:certificate-authority/12345678-1234-1234-1234-123456789012

", "IssueCertificateRequest$CertificateAuthorityArn": "

The Amazon Resource Name (ARN) that was returned when you called CreateCertificateAuthority. This must be of the form:

arn:aws:acm-pca:region:account:certificate-authority/12345678-1234-1234-1234-123456789012

", - "IssueCertificateRequest$TemplateArn": "

Specifies a custom configuration template to use when issuing a certificate. If this parameter is not provided, Amazon Web Services Private CA defaults to the EndEntityCertificate/V1 template. For CA certificates, you should choose the shortest path length that meets your needs. The path length is indicated by the PathLenN portion of the ARN, where N is the CA depth.

Note: The CA depth configured on a subordinate CA certificate must not exceed the limit set by its parents in the CA hierarchy.

For a list of TemplateArn values supported by Amazon Web Services Private CA, see Understanding Certificate Templates.

", + "IssueCertificateRequest$TemplateArn": "

Specifies a custom configuration template to use when issuing a certificate. If this parameter is not provided, ACM Private CA defaults to the EndEntityCertificate/V1 template. For CA certificates, you should choose the shortest path length that meets your needs. The path length is indicated by the PathLenN portion of the ARN, where N is the CA depth.

Note: The CA depth configured on a subordinate CA certificate must not exceed the limit set by its parents in the CA hierarchy.

For a list of TemplateArn values supported by ACM Private CA, see Understanding Certificate Templates.

", "IssueCertificateResponse$CertificateArn": "

The Amazon Resource Name (ARN) of the issued certificate and the certificate serial number. This is of the form:

arn:aws:acm-pca:region:account:certificate-authority/12345678-1234-1234-1234-123456789012/certificate/286535153982981100925020015808220737245

", "ListPermissionsRequest$CertificateAuthorityArn": "

The Amazon Resource Number (ARN) of the private CA to inspect. You can find the ARN by calling the ListCertificateAuthorities action. This must be of the form: arn:aws:acm-pca:region:account:certificate-authority/12345678-1234-1234-1234-123456789012 You can get a private CA's ARN by running the ListCertificateAuthorities action.

", "ListTagsRequest$CertificateAuthorityArn": "

The Amazon Resource Name (ARN) that was returned when you called the CreateCertificateAuthority action. This must be of the form:

arn:aws:acm-pca:region:account:certificate-authority/12345678-1234-1234-1234-123456789012

", @@ -183,7 +183,7 @@ } }, "CertificateAuthority": { - "base": "

Contains information about your private certificate authority (CA). Your private CA can issue and revoke X.509 digital certificates. Digital certificates verify that the entity named in the certificate Subject field owns or controls the public key contained in the Subject Public Key Info field. Call the CreateCertificateAuthority action to create your private CA. You must then call the GetCertificateAuthorityCertificate action to retrieve a private CA certificate signing request (CSR). Sign the CSR with your Amazon Web Services Private CA-hosted or on-premises root or subordinate CA certificate. Call the ImportCertificateAuthorityCertificate action to import the signed certificate into Certificate Manager (ACM).

", + "base": "

Contains information about your private certificate authority (CA). Your private CA can issue and revoke X.509 digital certificates. Digital certificates verify that the entity named in the certificate Subject field owns or controls the public key contained in the Subject Public Key Info field. Call the CreateCertificateAuthority action to create your private CA. You must then call the GetCertificateAuthorityCertificate action to retrieve a private CA certificate signing request (CSR). Sign the CSR with your ACM Private CA-hosted or on-premises root or subordinate CA certificate. Call the ImportCertificateAuthorityCertificate action to import the signed certificate into Certificate Manager (ACM).

", "refs": { "CertificateAuthorities$member": null, "DescribeCertificateAuthorityResponse$CertificateAuthority": "

A CertificateAuthority structure that contains information about your private CA.

" @@ -233,7 +233,7 @@ "CertificateChainBlob": { "base": null, "refs": { - "ImportCertificateAuthorityCertificateRequest$CertificateChain": "

A PEM-encoded file that contains all of your certificates, other than the certificate you're importing, chaining up to your root CA. Your Amazon Web Services Private CA-hosted or on-premises root certificate is the last in the chain, and each certificate in the chain signs the one preceding.

This parameter must be supplied when you import a subordinate CA. When you import a root CA, there is no chain.

" + "ImportCertificateAuthorityCertificateRequest$CertificateChain": "

A PEM-encoded file that contains all of your certificates, other than the certificate you're importing, chaining up to your root CA. Your ACM Private CA-hosted or on-premises root certificate is the last in the chain, and each certificate in the chain signs the one preceding.

This parameter must be supplied when you import a subordinate CA. When you import a root CA, there is no chain.

" } }, "CertificateMismatchException": { @@ -284,9 +284,9 @@ } }, "CrlConfiguration": { - "base": "

Contains configuration information for a certificate revocation list (CRL). Your private certificate authority (CA) creates base CRLs. Delta CRLs are not supported. You can enable CRLs for your new or an existing private CA by setting the Enabled parameter to true. Your private CA writes CRLs to an S3 bucket that you specify in the S3BucketName parameter. You can hide the name of your bucket by specifying a value for the CustomCname parameter. Your private CA copies the CNAME or the S3 bucket name to the CRL Distribution Points extension of each certificate it issues. Your S3 bucket policy must give write permission to Amazon Web Services Private CA.

Amazon Web Services Private CA assets that are stored in Amazon S3 can be protected with encryption. For more information, see Encrypting Your CRLs.

Your private CA uses the value in the ExpirationInDays parameter to calculate the nextUpdate field in the CRL. The CRL is refreshed prior to a certificate's expiration date or when a certificate is revoked. When a certificate is revoked, it appears in the CRL until the certificate expires, and then in one additional CRL after expiration, and it always appears in the audit report.

A CRL is typically updated approximately 30 minutes after a certificate is revoked. If for any reason a CRL update fails, Amazon Web Services Private CA makes further attempts every 15 minutes.

CRLs contain the following fields:

Certificate revocation lists created by Amazon Web Services Private CA are DER-encoded. You can use the following OpenSSL command to list a CRL.

openssl crl -inform DER -text -in crl_path -noout

For more information, see Planning a certificate revocation list (CRL) in the Amazon Web Services Private Certificate Authority User Guide

", + "base": "

Contains configuration information for a certificate revocation list (CRL). Your private certificate authority (CA) creates base CRLs. Delta CRLs are not supported. You can enable CRLs for your new or an existing private CA by setting the Enabled parameter to true. Your private CA writes CRLs to an S3 bucket that you specify in the S3BucketName parameter. You can hide the name of your bucket by specifying a value for the CustomCname parameter. Your private CA copies the CNAME or the S3 bucket name to the CRL Distribution Points extension of each certificate it issues. Your S3 bucket policy must give write permission to ACM Private CA.

ACM Private CA assets that are stored in Amazon S3 can be protected with encryption. For more information, see Encrypting Your CRLs.

Your private CA uses the value in the ExpirationInDays parameter to calculate the nextUpdate field in the CRL. The CRL is refreshed prior to a certificate's expiration date or when a certificate is revoked. When a certificate is revoked, it appears in the CRL until the certificate expires, and then in one additional CRL after expiration, and it always appears in the audit report.

A CRL is typically updated approximately 30 minutes after a certificate is revoked. If for any reason a CRL update fails, ACM Private CA makes further attempts every 15 minutes.

CRLs contain the following fields:

Certificate revocation lists created by ACM Private CA are DER-encoded. You can use the following OpenSSL command to list a CRL.

openssl crl -inform DER -text -in crl_path -noout

For more information, see Planning a certificate revocation list (CRL) in the Certificate Manager Private Certificate Authority (PCA) User Guide

", "refs": { - "RevocationConfiguration$CrlConfiguration": "

Configuration of the certificate revocation list (CRL), if any, maintained by your private CA. A CRL is typically updated approximately 30 minutes after a certificate is revoked. If for any reason a CRL update fails, Amazon Web Services Private CA makes further attempts every 15 minutes.

" + "RevocationConfiguration$CrlConfiguration": "

Configuration of the certificate revocation list (CRL), if any, maintained by your private CA. A CRL is typically updated approximately 30 minutes after a certificate is revoked. If for any reason a CRL update fails, ACM Private CA makes further attempts every 15 minutes.

" } }, "CsrBlob": { @@ -470,8 +470,8 @@ "IdempotencyToken": { "base": null, "refs": { - "CreateCertificateAuthorityRequest$IdempotencyToken": "

Custom string that can be used to distinguish between calls to the CreateCertificateAuthority action. Idempotency tokens for CreateCertificateAuthority time out after five minutes. Therefore, if you call CreateCertificateAuthority multiple times with the same idempotency token within five minutes, Amazon Web Services Private CA recognizes that you are requesting only certificate authority and will issue only one. If you change the idempotency token for each call, PCA recognizes that you are requesting multiple certificate authorities.

", - "IssueCertificateRequest$IdempotencyToken": "

Alphanumeric string that can be used to distinguish between calls to the IssueCertificate action. Idempotency tokens for IssueCertificate time out after one minute. Therefore, if you call IssueCertificate multiple times with the same idempotency token within one minute, Amazon Web Services Private CA recognizes that you are requesting only one certificate and will issue only one. If you change the idempotency token for each call, PCA recognizes that you are requesting multiple certificates.

" + "CreateCertificateAuthorityRequest$IdempotencyToken": "

Custom string that can be used to distinguish between calls to the CreateCertificateAuthority action. Idempotency tokens for CreateCertificateAuthority time out after five minutes. Therefore, if you call CreateCertificateAuthority multiple times with the same idempotency token within five minutes, ACM Private CA recognizes that you are requesting only certificate authority and will issue only one. If you change the idempotency token for each call, PCA recognizes that you are requesting multiple certificate authorities.

", + "IssueCertificateRequest$IdempotencyToken": "

Alphanumeric string that can be used to distinguish between calls to the IssueCertificate action. Idempotency tokens for IssueCertificate time out after one minute. Therefore, if you call IssueCertificate multiple times with the same idempotency token within one minute, ACM Private CA recognizes that you are requesting only one certificate and will issue only one. If you change the idempotency token for each call, PCA recognizes that you are requesting multiple certificates.

" } }, "ImportCertificateAuthorityCertificateRequest": { @@ -551,7 +551,7 @@ } }, "LimitExceededException": { - "base": "

An Amazon Web Services Private CA quota has been exceeded. See the exception message returned to determine the quota that was exceeded.

", + "base": "

An ACM Private CA quota has been exceeded. See the exception message returned to determine the quota that was exceeded.

", "refs": { } }, @@ -667,7 +667,7 @@ } }, "PolicyQualifierInfo": { - "base": "

Modifies the CertPolicyId of a PolicyInformation object with a qualifier. Amazon Web Services Private CA supports the certification practice statement (CPS) qualifier.

", + "base": "

Modifies the CertPolicyId of a PolicyInformation object with a qualifier. ACM Private CA supports the certification practice statement (CPS) qualifier.

", "refs": { "PolicyQualifierInfoList$member": null } @@ -675,7 +675,7 @@ "PolicyQualifierInfoList": { "base": null, "refs": { - "PolicyInformation$PolicyQualifiers": "

Modifies the given CertPolicyId with a qualifier. Amazon Web Services Private CA supports the certification practice statement (CPS) qualifier.

" + "PolicyInformation$PolicyQualifiers": "

Modifies the given CertPolicyId with a qualifier. ACM Private CA supports the certification practice statement (CPS) qualifier.

" } }, "PositiveLong": { @@ -698,9 +698,9 @@ } }, "Qualifier": { - "base": "

Defines a PolicyInformation qualifier. Amazon Web Services Private CA supports the certification practice statement (CPS) qualifier defined in RFC 5280.

", + "base": "

Defines a PolicyInformation qualifier. ACM Private CA supports the certification practice statement (CPS) qualifier defined in RFC 5280.

", "refs": { - "PolicyQualifierInfo$Qualifier": "

Defines the qualifier type. Amazon Web Services Private CA supports the use of a URI for a CPS qualifier in this field.

" + "PolicyQualifierInfo$Qualifier": "

Defines the qualifier type. ACM Private CA supports the use of a URI for a CPS qualifier in this field.

" } }, "RequestAlreadyProcessedException": { @@ -735,7 +735,7 @@ } }, "RevocationConfiguration": { - "base": "

Certificate revocation information used by the CreateCertificateAuthority and UpdateCertificateAuthority actions. Your private certificate authority (CA) can configure Online Certificate Status Protocol (OCSP) support and/or maintain a certificate revocation list (CRL). OCSP returns validation information about certificates as requested by clients, and a CRL contains an updated list of certificates revoked by your CA. For more information, see RevokeCertificate and Setting up a certificate revocation method in the Amazon Web Services Private Certificate Authority User Guide.

", + "base": "

Certificate revocation information used by the CreateCertificateAuthority and UpdateCertificateAuthority actions. Your private certificate authority (CA) can configure Online Certificate Status Protocol (OCSP) support and/or maintain a certificate revocation list (CRL). OCSP returns validation information about certificates as requested by clients, and a CRL contains an updated list of certificates revoked by your CA. For more information, see RevokeCertificate and Setting up a certificate revocation method in the Certificate Manager Private Certificate Authority (PCA) User Guide.

", "refs": { "CertificateAuthority$RevocationConfiguration": "

Information about the Online Certificate Status Protocol (OCSP) configuration or certificate revocation list (CRL) created and maintained by your private CA.

", "CreateCertificateAuthorityRequest$RevocationConfiguration": "

Contains information to enable Online Certificate Status Protocol (OCSP) support, to enable a certificate revocation list (CRL), to enable both, or to enable neither. The default is for both certificate validation mechanisms to be disabled. For more information, see the OcspConfiguration and CrlConfiguration types.

", @@ -832,7 +832,7 @@ "CrlConfiguration$CustomCname": "

Name inserted into the certificate CRL Distribution Points extension that enables the use of an alias for the CRL distribution point. Use this value if you don't want the name of your S3 bucket to be public.

", "GeneralName$DnsName": "

Represents GeneralName as a DNS name.

", "GeneralName$UniformResourceIdentifier": "

Represents GeneralName as a URI.

", - "OcspConfiguration$OcspCustomCname": "

By default, Amazon Web Services Private CA injects an Amazon Web Services domain into certificates being validated by the Online Certificate Status Protocol (OCSP). A customer can alternatively use this object to define a CNAME specifying a customized OCSP domain.

Note: The value of the CNAME must not include a protocol prefix such as \"http://\" or \"https://\".

For more information, see Customizing Online Certificate Status Protocol (OCSP) in the Amazon Web Services Private Certificate Authority User Guide.

" + "OcspConfiguration$OcspCustomCname": "

By default, ACM Private CA injects an Amazon Web Services domain into certificates being validated by the Online Certificate Status Protocol (OCSP). A customer can alternatively use this object to define a CNAME specifying a customized OCSP domain.

Note: The value of the CNAME must not include a protocol prefix such as \"http://\" or \"https://\".

For more information, see Customizing Online Certificate Status Protocol (OCSP) in the Certificate Manager Private Certificate Authority (PCA) User Guide.

" } }, "String256": { @@ -860,7 +860,7 @@ "String3To255": { "base": null, "refs": { - "CrlConfiguration$S3BucketName": "

Name of the S3 bucket that contains the CRL. If you do not provide a value for the CustomCname argument, the name of your S3 bucket is placed into the CRL Distribution Points extension of the issued certificate. You can change the name of your bucket by calling the UpdateCertificateAuthority operation. You must specify a bucket policy that allows Amazon Web Services Private CA to write the CRL to your bucket.

" + "CrlConfiguration$S3BucketName": "

Name of the S3 bucket that contains the CRL. If you do not provide a value for the CustomCname argument, the name of your S3 bucket is placed into the CRL Distribution Points extension of the issued certificate. You can change the name of your bucket by calling the UpdateCertificateAuthority operation. You must specify a bucket policy that allows ACM Private CA to write the CRL to your bucket.

" } }, "String40": { @@ -944,16 +944,16 @@ } }, "Validity": { - "base": "

Validity specifies the period of time during which a certificate is valid. Validity can be expressed as an explicit date and time when the validity of a certificate starts or expires, or as a span of time after issuance, stated in days, months, or years. For more information, see Validity in RFC 5280.

Amazon Web Services Private CA API consumes the Validity data type differently in two distinct parameters of the IssueCertificate action. The required parameter IssueCertificate:Validity specifies the end of a certificate's validity period. The optional parameter IssueCertificate:ValidityNotBefore specifies a customized starting time for the validity period.

", + "base": "

Validity specifies the period of time during which a certificate is valid. Validity can be expressed as an explicit date and time when the validity of a certificate starts or expires, or as a span of time after issuance, stated in days, months, or years. For more information, see Validity in RFC 5280.

ACM Private CA API consumes the Validity data type differently in two distinct parameters of the IssueCertificate action. The required parameter IssueCertificate:Validity specifies the end of a certificate's validity period. The optional parameter IssueCertificate:ValidityNotBefore specifies a customized starting time for the validity period.

", "refs": { "IssueCertificateRequest$Validity": "

Information describing the end of the validity period of the certificate. This parameter sets the “Not After” date for the certificate.

Certificate validity is the period of time during which a certificate is valid. Validity can be expressed as an explicit date and time when the certificate expires, or as a span of time after issuance, stated in days, months, or years. For more information, see Validity in RFC 5280.

This value is unaffected when ValidityNotBefore is also specified. For example, if Validity is set to 20 days in the future, the certificate will expire 20 days from issuance time regardless of the ValidityNotBefore value.

The end of the validity period configured on a certificate must not exceed the limit set on its parents in the CA hierarchy.

", - "IssueCertificateRequest$ValidityNotBefore": "

Information describing the start of the validity period of the certificate. This parameter sets the “Not Before\" date for the certificate.

By default, when issuing a certificate, Amazon Web Services Private CA sets the \"Not Before\" date to the issuance time minus 60 minutes. This compensates for clock inconsistencies across computer systems. The ValidityNotBefore parameter can be used to customize the “Not Before” value.

Unlike the Validity parameter, the ValidityNotBefore parameter is optional.

The ValidityNotBefore value is expressed as an explicit date and time, using the Validity type value ABSOLUTE. For more information, see Validity in this API reference and Validity in RFC 5280.

" + "IssueCertificateRequest$ValidityNotBefore": "

Information describing the start of the validity period of the certificate. This parameter sets the “Not Before\" date for the certificate.

By default, when issuing a certificate, ACM Private CA sets the \"Not Before\" date to the issuance time minus 60 minutes. This compensates for clock inconsistencies across computer systems. The ValidityNotBefore parameter can be used to customize the “Not Before” value.

Unlike the Validity parameter, the ValidityNotBefore parameter is optional.

The ValidityNotBefore value is expressed as an explicit date and time, using the Validity type value ABSOLUTE. For more information, see Validity in this API reference and Validity in RFC 5280.

" } }, "ValidityPeriodType": { "base": null, "refs": { - "Validity$Type": "

Determines how Amazon Web Services Private CA interprets the Value parameter, an integer. Supported validity types include those listed below. Type definitions with values include a sample input value and the resulting output.

END_DATE: The specific date and time when the certificate will expire, expressed using UTCTime (YYMMDDHHMMSS) or GeneralizedTime (YYYYMMDDHHMMSS) format. When UTCTime is used, if the year field (YY) is greater than or equal to 50, the year is interpreted as 19YY. If the year field is less than 50, the year is interpreted as 20YY.

ABSOLUTE: The specific date and time when the validity of a certificate will start or expire, expressed in seconds since the Unix Epoch.

DAYS, MONTHS, YEARS: The relative time from the moment of issuance until the certificate will expire, expressed in days, months, or years.

Example if DAYS, issued on 10/12/2020 at 12:34:54 UTC:

The minimum validity duration for a certificate using relative time (DAYS) is one day. The minimum validity for a certificate using absolute time (ABSOLUTE or END_DATE) is one second.

" + "Validity$Type": "

Determines how ACM Private CA interprets the Value parameter, an integer. Supported validity types include those listed below. Type definitions with values include a sample input value and the resulting output.

END_DATE: The specific date and time when the certificate will expire, expressed using UTCTime (YYMMDDHHMMSS) or GeneralizedTime (YYYYMMDDHHMMSS) format. When UTCTime is used, if the year field (YY) is greater than or equal to 50, the year is interpreted as 19YY. If the year field is less than 50, the year is interpreted as 20YY.

ABSOLUTE: The specific date and time when the validity of a certificate will start or expire, expressed in seconds since the Unix Epoch.

DAYS, MONTHS, YEARS: The relative time from the moment of issuance until the certificate will expire, expressed in days, months, or years.

Example if DAYS, issued on 10/12/2020 at 12:34:54 UTC:

The minimum validity duration for a certificate using relative time (DAYS) is one day. The minimum validity for a certificate using absolute time (ABSOLUTE or END_DATE) is one second.

" } } } diff --git a/apis/medialive/2017-10-14/api-2.json b/apis/medialive/2017-10-14/api-2.json index a5fc2c8d761..4de281cf527 100644 --- a/apis/medialive/2017-10-14/api-2.json +++ b/apis/medialive/2017-10-14/api-2.json @@ -3623,6 +3623,10 @@ "shape": "LogLevel", "locationName": "logLevel" }, + "Maintenance": { + "shape": "MaintenanceStatus", + "locationName": "maintenance" + }, "Name": { "shape": "__string", "locationName": "name" @@ -3737,6 +3741,10 @@ "shape": "LogLevel", "locationName": "logLevel" }, + "Maintenance": { + "shape": "MaintenanceStatus", + "locationName": "maintenance" + }, "Name": { "shape": "__string", "locationName": "name" @@ -3826,6 +3834,10 @@ "shape": "LogLevel", "locationName": "logLevel" }, + "Maintenance": { + "shape": "MaintenanceCreateSettings", + "locationName": "maintenance" + }, "Name": { "shape": "__string", "locationName": "name" @@ -3885,6 +3897,10 @@ "shape": "LogLevel", "locationName": "logLevel" }, + "Maintenance": { + "shape": "MaintenanceCreateSettings", + "locationName": "maintenance" + }, "Name": { "shape": "__string", "locationName": "name" @@ -4359,6 +4375,10 @@ "shape": "LogLevel", "locationName": "logLevel" }, + "Maintenance": { + "shape": "MaintenanceStatus", + "locationName": "maintenance" + }, "Name": { "shape": "__string", "locationName": "name" @@ -4710,6 +4730,10 @@ "shape": "LogLevel", "locationName": "logLevel" }, + "Maintenance": { + "shape": "MaintenanceStatus", + "locationName": "maintenance" + }, "Name": { "shape": "__string", "locationName": "name" @@ -9305,6 +9329,69 @@ "PASSTHROUGH" ] }, + "MaintenanceCreateSettings": { + "type": "structure", + "members": { + "MaintenanceDay": { + "shape": "MaintenanceDay", + "locationName": "maintenanceDay" + }, + "MaintenanceStartTime": { + "shape": "__stringPattern010920300", + "locationName": "maintenanceStartTime" + } + } + }, + "MaintenanceDay": { + "type": "string", + "enum": [ + "MONDAY", + "TUESDAY", + "WEDNESDAY", + "THURSDAY", + "FRIDAY", + "SATURDAY", + "SUNDAY" + ] + }, + "MaintenanceStatus": { + "type": "structure", + "members": { + "MaintenanceDay": { + "shape": "MaintenanceDay", + "locationName": "maintenanceDay" + }, + "MaintenanceDeadline": { + "shape": "__string", + "locationName": "maintenanceDeadline" + }, + "MaintenanceScheduledDate": { + "shape": "__string", + "locationName": "maintenanceScheduledDate" + }, + "MaintenanceStartTime": { + "shape": "__string", + "locationName": "maintenanceStartTime" + } + } + }, + "MaintenanceUpdateSettings": { + "type": "structure", + "members": { + "MaintenanceDay": { + "shape": "MaintenanceDay", + "locationName": "maintenanceDay" + }, + "MaintenanceScheduledDate": { + "shape": "__string", + "locationName": "maintenanceScheduledDate" + }, + "MaintenanceStartTime": { + "shape": "__stringPattern010920300", + "locationName": "maintenanceStartTime" + } + } + }, "MaxResults": { "type": "integer", "min": 1, @@ -11466,6 +11553,10 @@ "shape": "LogLevel", "locationName": "logLevel" }, + "Maintenance": { + "shape": "MaintenanceStatus", + "locationName": "maintenance" + }, "Name": { "shape": "__string", "locationName": "name" @@ -11696,6 +11787,10 @@ "shape": "LogLevel", "locationName": "logLevel" }, + "Maintenance": { + "shape": "MaintenanceStatus", + "locationName": "maintenance" + }, "Name": { "shape": "__string", "locationName": "name" @@ -12109,6 +12204,10 @@ "shape": "LogLevel", "locationName": "logLevel" }, + "Maintenance": { + "shape": "MaintenanceUpdateSettings", + "locationName": "maintenance" + }, "Name": { "shape": "__string", "locationName": "name" @@ -12198,6 +12297,10 @@ "shape": "LogLevel", "locationName": "logLevel" }, + "Maintenance": { + "shape": "MaintenanceUpdateSettings", + "locationName": "maintenance" + }, "Name": { "shape": "__string", "locationName": "name" @@ -13517,6 +13620,10 @@ "min": 6, "max": 6 }, + "__stringPattern010920300": { + "type": "string", + "pattern": "^([0,1]?[0-9]|2[0-3]):00$" + }, "__timestampIso8601": { "type": "timestamp", "timestampFormat": "iso8601" diff --git a/apis/medialive/2017-10-14/docs-2.json b/apis/medialive/2017-10-14/docs-2.json index ddce0ad49c3..a98a876fa8f 100644 --- a/apis/medialive/2017-10-14/docs-2.json +++ b/apis/medialive/2017-10-14/docs-2.json @@ -2211,6 +2211,33 @@ "M3u8Settings$TimedMetadataBehavior": "When set to passthrough, timed metadata is passed through from input to output." } }, + "MaintenanceCreateSettings": { + "base": null, + "refs": { + "CreateChannel$Maintenance": "Maintenance settings for this channel." + } + }, + "MaintenanceDay": { + "base": "The currently selected maintenance day.", + "refs": { + "MaintenanceCreateSettings$MaintenanceDay": "Choose one day of the week for maintenance. The chosen day is used for all future maintenance windows.", + "MaintenanceStatus$MaintenanceDay": "The currently selected maintenance day.", + "MaintenanceUpdateSettings$MaintenanceDay": "Choose one day of the week for maintenance. The chosen day is used for all future maintenance windows." + } + }, + "MaintenanceStatus": { + "base": null, + "refs": { + "Channel$Maintenance": "Maintenance settings for this channel.", + "ChannelSummary$Maintenance": "Maintenance settings for this channel." + } + }, + "MaintenanceUpdateSettings": { + "base": null, + "refs": { + "UpdateChannel$Maintenance": "Maintenance settings for this channel." + } + }, "MediaConnectFlow": { "base": "The settings for a MediaConnect Flow.", "refs": { @@ -3170,7 +3197,7 @@ "TtmlDestinationStyleControl": { "base": "Ttml Destination Style Control", "refs": { - "TtmlDestinationSettings$StyleControl": "When set to passthrough, passes through style and position information from a TTML-like input source (TTML, SMPTE-TT, CFF-TT) to the CFF-TT output or TTML output." + "TtmlDestinationSettings$StyleControl": "This field is not currently supported and will not affect the output styling. Leave the default value." } }, "UdpContainerSettings": { @@ -4294,7 +4321,6 @@ "ArchiveOutputSettings$Extension": "Output file extension. If excluded, this will be auto-selected from the container type.", "ArchiveOutputSettings$NameModifier": "String concatenated to the end of the destination filename. Required for multiple outputs of the same type.", "AudioDescription$AudioSelectorName": "The name of the AudioSelector used as the source for this AudioDescription.", - "AudioDescription$Name": "The name of this AudioDescription. Outputs will use this name to uniquely identify this AudioDescription. Description names should be unique within this Live Event.", "AudioDescription$StreamName": "Used for MS Smooth and Apple HLS outputs. Indicates the name displayed by the player (eg. English, or Director Commentary).", "AudioLanguageSelection$LanguageCode": "Selects a specific three-letter language code from within an audio source.", "AudioOnlyHlsSettings$AudioGroupId": "Specifies the group to which the audio Rendition belongs.", @@ -4316,12 +4342,14 @@ "CaptionSelector$LanguageCode": "When specified this field indicates the three letter language code of the caption track to extract from the source.", "Channel$Arn": "The unique arn of the channel.", "Channel$Id": "The unique id of the channel.", + "Channel$MaintenanceStatus": "The time in milliseconds by when the PVRE restart must occur.", "Channel$Name": "The name of the channel. (user-mutable)", "Channel$RoleArn": "The Amazon Resource Name (ARN) of the role assumed when running the Channel.", "ChannelConfigurationValidationError$Message": null, "ChannelEgressEndpoint$SourceIp": "Public IP of where a channel's output comes from", "ChannelSummary$Arn": "The unique arn of the channel.", "ChannelSummary$Id": "The unique id of the channel.", + "ChannelSummary$MaintenanceStatus": "The time in milliseconds when the PVRE maintenance must occur by.", "ChannelSummary$Name": "The name of the channel. (user-mutable)", "ChannelSummary$RoleArn": "The Amazon Resource Name (ARN) of the role assumed when running the Channel.", "ClaimDeviceRequest$Id": "The id of the device you want to claim.", @@ -4337,6 +4365,7 @@ "CreateMultiplexProgram$ProgramName": "Name of multiplex program.", "CreateMultiplexProgram$RequestId": "Unique request ID. This prevents retries from creating multiple\nresources.\n", "CreatePartnerInput$RequestId": "Unique identifier of the request to ensure the request is handled\nexactly once in case of retries.\n", + "DescribeAnywhereSettings$ClusterName": "The name of the cluster that is the instance provider for the channel", "DvbSubDestinationSettings$FontSize": "When set to auto fontSize will scale depending on the size of the output. Giving a positive integer will specify the exact font size in points. All burn-in and DVB-Sub font settings must match.", "EbuTtDDestinationSettings$FontFamily": "Specifies the font family to include in the font data attached to the EBU-TT captions. Valid only if styleControl is set to include. If you leave this field empty, the font family is set to \"monospaced\". (If styleControl is set to exclude, the font family is always set to \"monospaced\".)\n\nYou specify only the font family. All other style information (color, bold, position and so on) is copied from the input captions. The size is always set to 100% to allow the downstream player to choose the size.\n\n- Enter a list of font families, as a comma-separated list of font names, in order of preference. The name can be a font family (such as \u201cArial\u201d), or a generic font family (such as \u201cserif\u201d), or \u201cdefault\u201d (to let the downstream player choose the font).\n- Leave blank to set the family to \u201cmonospace\u201d.", "FixedModeScheduleActionStartSettings$Time": "Start time for the action to start in the channel. (Not the time for the action to be added to the schedule: actions are always added to the schedule immediately.) UTC format: yyyy-mm-ddThh:mm:ss.nnnZ. All the letters are digits (for example, mm might be 01) except for the two constants \"T\" for time and \"Z\" for \"UTC format\".", @@ -4431,6 +4460,10 @@ "M3u8Settings$Scte35Pid": "Packet Identifier (PID) of the SCTE-35 stream in the transport stream. Can be entered as a decimal or hexadecimal value.", "M3u8Settings$TimedMetadataPid": "Packet Identifier (PID) of the timed metadata stream in the transport stream. Can be entered as a decimal or hexadecimal value. Valid values are 32 (or 0x20)..8182 (or 0x1ff6).", "M3u8Settings$VideoPid": "Packet Identifier (PID) of the elementary video stream in the transport stream. Can be entered as a decimal or hexadecimal value.", + "MaintenanceStatus$MaintenanceDeadline": "Maintenance is required by the displayed date and time. Date and time is in ISO.", + "MaintenanceStatus$MaintenanceScheduledDate": "The currently scheduled maintenance date and time. Date and time is in ISO.", + "MaintenanceStatus$MaintenanceStartTime": "The currently selected maintenance start time. Time is in UTC.", + "MaintenanceUpdateSettings$MaintenanceScheduledDate": "Choose a specific date for maintenance to occur. The chosen date is used for the next maintenance window only.", "MediaConnectFlow$FlowArn": "The unique ARN of the MediaConnect Flow being used as a source.", "MediaConnectFlowRequest$FlowArn": "The ARN of the MediaConnect Flow that you want to use as a source.", "MotionGraphicsActivateScheduleActionSettings$PasswordParam": "Key used to extract the password from EC2 Parameter store", @@ -4516,7 +4549,7 @@ "__stringMax1000": { "base": null, "refs": { - "EbuTtDDestinationSettings$CopyrightHolder": "Applies only if you plan to convert these source captions to EBU-TT-D or TTML in an output. Complete this field if you want to include the name of the copyright holder in the copyright metadata tag in the TTML" + "EbuTtDDestinationSettings$CopyrightHolder": "Complete this field if you want to include the name of the copyright holder in the copyright tag in the captions metadata." } }, "__stringMax256": { @@ -4529,7 +4562,7 @@ "__stringMax32": { "base": null, "refs": { - "OutputGroup$Name": "Custom output group name optionally defined by the user. Only letters, numbers, and the underscore character allowed; only 32 characters allowed." + "OutputGroup$Name": "Custom output group name optionally defined by the user." } }, "__stringMin1": { @@ -4604,6 +4637,13 @@ "refs": { "InputLossBehavior$InputLossImageColor": "When input loss image type is \"color\" this field specifies the color to use. Value: 6 hex characters representing the values of RGB." } + }, + "__stringPattern010920300": { + "base": null, + "refs": { + "MaintenanceCreateSettings$MaintenanceStartTime": "Choose the hour that maintenance will start. The chosen time is used for all future maintenance windows.", + "MaintenanceUpdateSettings$MaintenanceStartTime": "Choose the hour that maintenance will start. The chosen time is used for all future maintenance windows." + } } } } diff --git a/gems/aws-partitions/CHANGELOG.md b/gems/aws-partitions/CHANGELOG.md index 735774eea90..f83657c222a 100644 --- a/gems/aws-partitions/CHANGELOG.md +++ b/gems/aws-partitions/CHANGELOG.md @@ -1,6 +1,11 @@ Unreleased Changes ------------------ +1.571.0 (2022-03-28) +------------------ + +* Feature - Updated the partitions source data the determines the AWS service regions and endpoints. + 1.570.0 (2022-03-24) ------------------ diff --git a/gems/aws-partitions/VERSION b/gems/aws-partitions/VERSION index 5aec0422bde..4d65c69e0f2 100644 --- a/gems/aws-partitions/VERSION +++ b/gems/aws-partitions/VERSION @@ -1 +1 @@ -1.570.0 +1.571.0 diff --git a/gems/aws-partitions/partitions.json b/gems/aws-partitions/partitions.json index 8004871c266..67e514269d7 100644 --- a/gems/aws-partitions/partitions.json +++ b/gems/aws-partitions/partitions.json @@ -8851,7 +8851,9 @@ }, "profile" : { "endpoints" : { + "af-south-1" : { }, "ap-northeast-1" : { }, + "ap-northeast-2" : { }, "ap-southeast-1" : { }, "ap-southeast-2" : { }, "ca-central-1" : { }, @@ -17962,6 +17964,11 @@ "us-iso-east-1" : { } } }, + "tagging" : { + "endpoints" : { + "us-iso-east-1" : { } + } + }, "transcribe" : { "defaults" : { "protocols" : [ "https" ] diff --git a/gems/aws-sdk-acmpca/CHANGELOG.md b/gems/aws-sdk-acmpca/CHANGELOG.md index 293763e2288..e0c9d99f02a 100644 --- a/gems/aws-sdk-acmpca/CHANGELOG.md +++ b/gems/aws-sdk-acmpca/CHANGELOG.md @@ -1,6 +1,11 @@ Unreleased Changes ------------------ +1.48.0 (2022-03-28) +------------------ + +* Feature - Updating service name entities + 1.47.0 (2022-03-16) ------------------ diff --git a/gems/aws-sdk-acmpca/VERSION b/gems/aws-sdk-acmpca/VERSION index 21998d3c2d9..9db5ea12f52 100644 --- a/gems/aws-sdk-acmpca/VERSION +++ b/gems/aws-sdk-acmpca/VERSION @@ -1 +1 @@ -1.47.0 +1.48.0 diff --git a/gems/aws-sdk-acmpca/lib/aws-sdk-acmpca.rb b/gems/aws-sdk-acmpca/lib/aws-sdk-acmpca.rb index ae2e41d0a77..cfa1fed0009 100644 --- a/gems/aws-sdk-acmpca/lib/aws-sdk-acmpca.rb +++ b/gems/aws-sdk-acmpca/lib/aws-sdk-acmpca.rb @@ -49,6 +49,6 @@ # @!group service module Aws::ACMPCA - GEM_VERSION = '1.47.0' + GEM_VERSION = '1.48.0' end diff --git a/gems/aws-sdk-acmpca/lib/aws-sdk-acmpca/client.rb b/gems/aws-sdk-acmpca/lib/aws-sdk-acmpca/client.rb index a2572ca82f3..4df4065b25c 100644 --- a/gems/aws-sdk-acmpca/lib/aws-sdk-acmpca/client.rb +++ b/gems/aws-sdk-acmpca/lib/aws-sdk-acmpca/client.rb @@ -376,9 +376,8 @@ def initialize(*args) # CA. If successful, this action returns the Amazon Resource Name (ARN) # of the CA. # - # Amazon Web Services Private CA assets that are stored in Amazon S3 can - # be protected with encryption. For more information, see [Encrypting - # Your CRLs][1]. + # ACM Private CA assets that are stored in Amazon S3 can be protected + # with encryption. For more information, see [Encrypting Your CRLs][1]. # # Both PCA and the IAM principal must have permission to write to the S3 # bucket that you specify. If the IAM principal making the call does not @@ -416,11 +415,10 @@ def initialize(*args) # **CreateCertificateAuthority** action. Idempotency tokens for # **CreateCertificateAuthority** time out after five minutes. Therefore, # if you call **CreateCertificateAuthority** multiple times with the - # same idempotency token within five minutes, Amazon Web Services - # Private CA recognizes that you are requesting only certificate - # authority and will issue only one. If you change the idempotency token - # for each call, PCA recognizes that you are requesting multiple - # certificate authorities. + # same idempotency token within five minutes, ACM Private CA recognizes + # that you are requesting only certificate authority and will issue only + # one. If you change the idempotency token for each call, PCA recognizes + # that you are requesting multiple certificate authorities. # # @option params [String] :key_storage_security_standard # Specifies a cryptographic key management compliance standard used for @@ -586,9 +584,9 @@ def create_certificate_authority(params = {}, options = {}) # # # - # Amazon Web Services Private CA assets that are stored in Amazon S3 can - # be protected with encryption. For more information, see [Encrypting - # Your Audit Reports][4]. + # ACM Private CA assets that are stored in Amazon S3 can be protected + # with encryption. For more information, see [Encrypting Your Audit + # Reports][4]. # # You can generate a maximum of one report every 30 minutes. # @@ -664,8 +662,8 @@ def create_certificate_authority_audit_report(params = {}, options = {}) # accounts, then permissions cannot be used to enable automatic # renewals. Instead, the ACM certificate owner must set up a # resource-based policy to enable cross-account issuance and renewals. - # For more information, see [Using a Resource Based Policy with Amazon - # Web Services Private CA][3]. + # For more information, see [Using a Resource Based Policy with ACM + # Private CA][3]. # # # @@ -736,8 +734,8 @@ def create_permission(params = {}, options = {}) # Additionally, you can delete a CA if you are waiting for it to be # created (that is, the status of the CA is `CREATING`). You can also # delete it if the CA has been created but you haven't yet imported the - # signed certificate into Amazon Web Services Private CA (that is, the - # status of the CA is `PENDING_CERTIFICATE`). + # signed certificate into ACM Private CA (that is, the status of the CA + # is `PENDING_CERTIFICATE`). # # When you successfully call [DeleteCertificateAuthority][3], the CA's # status changes to `DELETED`. However, the CA won't be permanently @@ -815,8 +813,8 @@ def delete_certificate_authority(params = {}, options = {}) # accounts, then permissions cannot be used to enable automatic # renewals. Instead, the ACM certificate owner must set up a # resource-based policy to enable cross-account issuance and renewals. - # For more information, see [Using a Resource Based Policy with Amazon - # Web Services Private CA][3]. + # For more information, see [Using a Resource Based Policy with ACM + # Private CA][3]. # # # @@ -884,7 +882,7 @@ def delete_permission(params = {}, options = {}) # customer account, to Amazon Web Services Organizations, or to an # Amazon Web Services Organizations unit. Policies are under the # control of a CA administrator. For more information, see [Using a - # Resource Based Policy with Amazon Web Services Private CA][3]. + # Resource Based Policy with ACM Private CA][3]. # # * A policy permits a user of Certificate Manager (ACM) to issue ACM # certificates signed by a CA in another account. @@ -892,8 +890,8 @@ def delete_permission(params = {}, options = {}) # * For ACM to manage automatic renewal of these certificates, the ACM # user must configure a Service Linked Role (SLR). The SLR allows the # ACM service to assume the identity of the user, subject to - # confirmation against the Amazon Web Services Private CA policy. For - # more information, see [Using a Service Linked Role with ACM][4]. + # confirmation against the ACM Private CA policy. For more + # information, see [Using a Service Linked Role with ACM][4]. # # * Updates made in Amazon Web Services Resource Manager (RAM) are # reflected in policies. For more information, see [Attach a Policy @@ -940,13 +938,12 @@ def delete_policy(params = {}, options = {}) # its ARN (Amazon Resource Name). The output contains the status of your # CA. This can be any of the following: # - # * `CREATING` - Amazon Web Services Private CA is creating your private - # certificate authority. + # * `CREATING` - ACM Private CA is creating your private certificate + # authority. # # * `PENDING_CERTIFICATE` - The certificate is pending. You must use - # your Amazon Web Services Private CA-hosted or on-premises root or - # subordinate CA to sign your private CA CSR and then import it into - # PCA. + # your ACM Private CA-hosted or on-premises root or subordinate CA to + # sign your private CA CSR and then import it into PCA. # # * `ACTIVE` - Your private CA is active. # @@ -1238,11 +1235,11 @@ def get_certificate_authority_certificate(params = {}, options = {}) # Retrieves the certificate signing request (CSR) for your private # certificate authority (CA). The CSR is created when you call the - # [CreateCertificateAuthority][1] action. Sign the CSR with your Amazon - # Web Services Private CA-hosted or on-premises root or subordinate CA. - # Then import the signed certificate back into Amazon Web Services - # Private CA by calling the [ImportCertificateAuthorityCertificate][2] - # action. The CSR is returned as a base64 PEM-encoded string. + # [CreateCertificateAuthority][1] action. Sign the CSR with your ACM + # Private CA-hosted or on-premises root or subordinate CA. Then import + # the signed certificate back into ACM Private CA by calling the + # [ImportCertificateAuthorityCertificate][2] action. The CSR is returned + # as a base64 PEM-encoded string. # # # @@ -1301,7 +1298,7 @@ def get_certificate_authority_csr(params = {}, options = {}) # customer account, to Amazon Web Services Organizations, or to an # Amazon Web Services Organizations unit. Policies are under the # control of a CA administrator. For more information, see [Using a - # Resource Based Policy with Amazon Web Services Private CA][3]. + # Resource Based Policy with ACM Private CA][3]. # # * A policy permits a user of Certificate Manager (ACM) to issue ACM # certificates signed by a CA in another account. @@ -1309,8 +1306,8 @@ def get_certificate_authority_csr(params = {}, options = {}) # * For ACM to manage automatic renewal of these certificates, the ACM # user must configure a Service Linked Role (SLR). The SLR allows the # ACM service to assume the identity of the user, subject to - # confirmation against the Amazon Web Services Private CA policy. For - # more information, see [Using a Service Linked Role with ACM][4]. + # confirmation against the ACM Private CA policy. For more + # information, see [Using a Service Linked Role with ACM][4]. # # * Updates made in Amazon Web Services Resource Manager (RAM) are # reflected in policies. For more information, see [Attach a Policy @@ -1352,14 +1349,14 @@ def get_policy(params = {}, options = {}) req.send_request(options) end - # Imports a signed private CA certificate into Amazon Web Services - # Private CA. This action is used when you are using a chain of trust - # whose root is located outside Amazon Web Services Private CA. Before - # you can call this action, the following preparations must in place: + # Imports a signed private CA certificate into ACM Private CA. This + # action is used when you are using a chain of trust whose root is + # located outside ACM Private CA. Before you can call this action, the + # following preparations must in place: # - # 1. In Amazon Web Services Private CA, call the - # [CreateCertificateAuthority][1] action to create the private CA - # that you plan to back with the imported certificate. + # 1. In ACM Private CA, call the [CreateCertificateAuthority][1] action + # to create the private CA that you plan to back with the imported + # certificate. # # 2. Call the [GetCertificateAuthorityCsr][2] action to generate a # certificate signing request (CSR). @@ -1370,14 +1367,13 @@ def get_policy(params = {}, options = {}) # 4. Create a certificate chain and copy the signed certificate and the # certificate chain to your working directory. # - # Amazon Web Services Private CA supports three scenarios for installing - # a CA certificate: + # ACM Private CA supports three scenarios for installing a CA + # certificate: # - # * Installing a certificate for a root CA hosted by Amazon Web Services - # Private CA. + # * Installing a certificate for a root CA hosted by ACM Private CA. # # * Installing a subordinate CA certificate whose parent authority is - # hosted by Amazon Web Services Private CA. + # hosted by ACM Private CA. # # * Installing a subordinate CA certificate whose parent authority is # externally hosted. @@ -1405,8 +1401,8 @@ def get_policy(params = {}, options = {}) # # *Enforcement of Critical Constraints* # - # Amazon Web Services Private CA allows the following extensions to be - # marked critical in the imported CA certificate or chain. + # ACM Private CA allows the following extensions to be marked critical + # in the imported CA certificate or chain. # # * Basic constraints (*must* be marked critical) # @@ -1432,8 +1428,8 @@ def get_policy(params = {}, options = {}) # # * Inhibit anyPolicy # - # Amazon Web Services Private CA rejects the following extensions when - # they are marked critical in an imported CA certificate or chain. + # ACM Private CA rejects the following extensions when they are marked + # critical in an imported CA certificate or chain. # # * Name constraints # @@ -1471,9 +1467,8 @@ def get_policy(params = {}, options = {}) # @option params [String, StringIO, File] :certificate_chain # A PEM-encoded file that contains all of your certificates, other than # the certificate you're importing, chaining up to your root CA. Your - # Amazon Web Services Private CA-hosted or on-premises root certificate - # is the last in the chain, and each certificate in the chain signs the - # one preceding. + # ACM Private CA-hosted or on-premises root certificate is the last in + # the chain, and each certificate in the chain signs the one preceding. # # This parameter must be supplied when you import a subordinate CA. When # you import a root CA, there is no chain. @@ -1504,8 +1499,8 @@ def import_certificate_authority_certificate(params = {}, options = {}) # specifying the ARN. # # You cannot use the ACM **ListCertificateAuthorities** action to - # retrieve the ARNs of the certificates that you issue by using Amazon - # Web Services Private CA. + # retrieve the ARNs of the certificates that you issue by using ACM + # Private CA. # # # @@ -1521,8 +1516,8 @@ def import_certificate_authority_certificate(params = {}, options = {}) # Certificate Templates][1]. # # If conflicting or duplicate certificate information is supplied during - # certificate issuance, Amazon Web Services Private CA applies [order of - # operation rules][2] to determine what information is used. + # certificate issuance, ACM Private CA applies [order of operation + # rules][2] to determine what information is used. # # # @@ -1574,8 +1569,8 @@ def import_certificate_authority_certificate(params = {}, options = {}) # # @option params [String] :template_arn # Specifies a custom configuration template to use when issuing a - # certificate. If this parameter is not provided, Amazon Web Services - # Private CA defaults to the `EndEntityCertificate/V1` template. For CA + # certificate. If this parameter is not provided, ACM Private CA + # defaults to the `EndEntityCertificate/V1` template. For CA # certificates, you should choose the shortest path length that meets # your needs. The path length is indicated by the PathLen*N* portion of # the ARN, where *N* is the [CA depth][1]. @@ -1583,8 +1578,8 @@ def import_certificate_authority_certificate(params = {}, options = {}) # Note: The CA depth configured on a subordinate CA certificate must not # exceed the limit set by its parents in the CA hierarchy. # - # For a list of `TemplateArn` values supported by Amazon Web Services - # Private CA, see [Understanding Certificate Templates][2]. + # For a list of `TemplateArn` values supported by ACM Private CA, see + # [Understanding Certificate Templates][2]. # # # @@ -1619,10 +1614,10 @@ def import_certificate_authority_certificate(params = {}, options = {}) # certificate. This parameter sets the “Not Before" date for the # certificate. # - # By default, when issuing a certificate, Amazon Web Services Private CA - # sets the "Not Before" date to the issuance time minus 60 minutes. - # This compensates for clock inconsistencies across computer systems. - # The `ValidityNotBefore` parameter can be used to customize the “Not + # By default, when issuing a certificate, ACM Private CA sets the "Not + # Before" date to the issuance time minus 60 minutes. This compensates + # for clock inconsistencies across computer systems. The + # `ValidityNotBefore` parameter can be used to customize the “Not # Before” value. # # Unlike the `Validity` parameter, the `ValidityNotBefore` parameter is @@ -1643,10 +1638,10 @@ def import_certificate_authority_certificate(params = {}, options = {}) # the **IssueCertificate** action. Idempotency tokens for # **IssueCertificate** time out after one minute. Therefore, if you call # **IssueCertificate** multiple times with the same idempotency token - # within one minute, Amazon Web Services Private CA recognizes that you - # are requesting only one certificate and will issue only one. If you - # change the idempotency token for each call, PCA recognizes that you - # are requesting multiple certificates. + # within one minute, ACM Private CA recognizes that you are requesting + # only one certificate and will issue only one. If you change the + # idempotency token for each call, PCA recognizes that you are + # requesting multiple certificates. # # @return [Types::IssueCertificateResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods: # @@ -1937,8 +1932,8 @@ def list_certificate_authorities(params = {}, options = {}) # accounts, then permissions cannot be used to enable automatic # renewals. Instead, the ACM certificate owner must set up a # resource-based policy to enable cross-account issuance and renewals. - # For more information, see [Using a Resource Based Policy with Amazon - # Web Services Private CA][3]. + # For more information, see [Using a Resource Based Policy with ACM + # Private CA][3]. # # # @@ -2087,7 +2082,7 @@ def list_tags(params = {}, options = {}) # customer account, to Amazon Web Services Organizations, or to an # Amazon Web Services Organizations unit. Policies are under the # control of a CA administrator. For more information, see [Using a - # Resource Based Policy with Amazon Web Services Private CA][4]. + # Resource Based Policy with ACM Private CA][4]. # # * A policy permits a user of Certificate Manager (ACM) to issue ACM # certificates signed by a CA in another account. @@ -2095,8 +2090,8 @@ def list_tags(params = {}, options = {}) # * For ACM to manage automatic renewal of these certificates, the ACM # user must configure a Service Linked Role (SLR). The SLR allows the # ACM service to assume the identity of the user, subject to - # confirmation against the Amazon Web Services Private CA policy. For - # more information, see [Using a Service Linked Role with ACM][5]. + # confirmation against the ACM Private CA policy. For more + # information, see [Using a Service Linked Role with ACM][5]. # # * Updates made in Amazon Web Services Resource Manager (RAM) are # reflected in policies. For more information, see [Attach a Policy @@ -2205,17 +2200,16 @@ def restore_certificate_authority(params = {}, options = {}) req.send_request(options) end - # Revokes a certificate that was issued inside Amazon Web Services - # Private CA. If you enable a certificate revocation list (CRL) when you - # create or update your private CA, information about the revoked - # certificates will be included in the CRL. Amazon Web Services Private - # CA writes the CRL to an S3 bucket that you specify. A CRL is typically - # updated approximately 30 minutes after a certificate is revoked. If - # for any reason the CRL update fails, Amazon Web Services Private CA - # attempts makes further attempts every 15 minutes. With Amazon - # CloudWatch, you can create alarms for the metrics `CRLGenerated` and - # `MisconfiguredCRLBucket`. For more information, see [Supported - # CloudWatch Metrics][1]. + # Revokes a certificate that was issued inside ACM Private CA. If you + # enable a certificate revocation list (CRL) when you create or update + # your private CA, information about the revoked certificates will be + # included in the CRL. ACM Private CA writes the CRL to an S3 bucket + # that you specify. A CRL is typically updated approximately 30 minutes + # after a certificate is revoked. If for any reason the CRL update + # fails, ACM Private CA attempts makes further attempts every 15 + # minutes. With Amazon CloudWatch, you can create alarms for the metrics + # `CRLGenerated` and `MisconfiguredCRLBucket`. For more information, see + # [Supported CloudWatch Metrics][1]. # # Both PCA and the IAM principal must have permission to write to the S3 # bucket that you specify. If the IAM principal making the call does not @@ -2224,9 +2218,8 @@ def restore_certificate_authority(params = {}, options = {}) # # # - # Amazon Web Services Private CA also writes revocation information to - # the audit report. For more information, see - # [CreateCertificateAuthorityAuditReport][3]. + # ACM Private CA also writes revocation information to the audit report. + # For more information, see [CreateCertificateAuthorityAuditReport][3]. # # You cannot revoke a root CA self-signed certificate. # @@ -2473,7 +2466,7 @@ def build_request(operation_name, params = {}) params: params, config: config) context[:gem_name] = 'aws-sdk-acmpca' - context[:gem_version] = '1.47.0' + context[:gem_version] = '1.48.0' Seahorse::Client::Request.new(handlers, context) end diff --git a/gems/aws-sdk-acmpca/lib/aws-sdk-acmpca/types.rb b/gems/aws-sdk-acmpca/lib/aws-sdk-acmpca/types.rb index 21876a0ff3e..34ce1964ea8 100644 --- a/gems/aws-sdk-acmpca/lib/aws-sdk-acmpca/types.rb +++ b/gems/aws-sdk-acmpca/lib/aws-sdk-acmpca/types.rb @@ -265,8 +265,8 @@ class AccessMethod < Struct.new( # variant must be selected, or else this parameter is ignored. # # If conflicting or duplicate certificate information is supplied from - # other sources, Amazon Web Services Private CA applies [order of - # operation rules][1] to determine what information is used. + # other sources, ACM Private CA applies [order of operation rules][1] to + # determine what information is used. # # # @@ -409,10 +409,10 @@ class ApiPassthrough < Struct.new( # [CreateCertificateAuthority][1] action to create your private CA. You # must then call the [GetCertificateAuthorityCertificate][2] action to # retrieve a private CA certificate signing request (CSR). Sign the CSR - # with your Amazon Web Services Private CA-hosted or on-premises root or - # subordinate CA certificate. Call the - # [ImportCertificateAuthorityCertificate][3] action to import the signed - # certificate into Certificate Manager (ACM). + # with your ACM Private CA-hosted or on-premises root or subordinate CA + # certificate. Call the [ImportCertificateAuthorityCertificate][3] + # action to import the signed certificate into Certificate Manager + # (ACM). # # # @@ -874,11 +874,11 @@ class CreateCertificateAuthorityAuditReportResponse < Struct.new( # **CreateCertificateAuthority** action. Idempotency tokens for # **CreateCertificateAuthority** time out after five minutes. # Therefore, if you call **CreateCertificateAuthority** multiple times - # with the same idempotency token within five minutes, Amazon Web - # Services Private CA recognizes that you are requesting only - # certificate authority and will issue only one. If you change the - # idempotency token for each call, PCA recognizes that you are - # requesting multiple certificate authorities. + # with the same idempotency token within five minutes, ACM Private CA + # recognizes that you are requesting only certificate authority and + # will issue only one. If you change the idempotency token for each + # call, PCA recognizes that you are requesting multiple certificate + # authorities. # @return [String] # # @!attribute [rw] key_storage_security_standard @@ -996,11 +996,10 @@ class CreatePermissionRequest < Struct.new( # specifying a value for the **CustomCname** parameter. Your private CA # copies the CNAME or the S3 bucket name to the **CRL Distribution # Points** extension of each certificate it issues. Your S3 bucket - # policy must give write permission to Amazon Web Services Private CA. + # policy must give write permission to ACM Private CA. # - # Amazon Web Services Private CA assets that are stored in Amazon S3 can - # be protected with encryption. For more information, see [Encrypting - # Your CRLs][1]. + # ACM Private CA assets that are stored in Amazon S3 can be protected + # with encryption. For more information, see [Encrypting Your CRLs][1]. # # Your private CA uses the value in the **ExpirationInDays** parameter # to calculate the **nextUpdate** field in the CRL. The CRL is refreshed @@ -1010,8 +1009,8 @@ class CreatePermissionRequest < Struct.new( # expiration, and it always appears in the audit report. # # A CRL is typically updated approximately 30 minutes after a - # certificate is revoked. If for any reason a CRL update fails, Amazon - # Web Services Private CA makes further attempts every 15 minutes. + # certificate is revoked. If for any reason a CRL update fails, ACM + # Private CA makes further attempts every 15 minutes. # # CRLs contain the following fields: # @@ -1055,15 +1054,14 @@ class CreatePermissionRequest < Struct.new( # # * **Signature Value**\: Signature computed over the CRL. # - # Certificate revocation lists created by Amazon Web Services Private CA - # are DER-encoded. You can use the following OpenSSL command to list a - # CRL. + # Certificate revocation lists created by ACM Private CA are + # DER-encoded. You can use the following OpenSSL command to list a CRL. # # `openssl crl -inform DER -text -in crl_path -noout` # # For more information, see [Planning a certificate revocation list - # (CRL)][2] in the *Amazon Web Services Private Certificate Authority - # User Guide* + # (CRL)][2] in the *Certificate Manager Private Certificate Authority + # (PCA) User Guide* # # # @@ -1111,8 +1109,8 @@ class CreatePermissionRequest < Struct.new( # is placed into the **CRL Distribution Points** extension of the # issued certificate. You can change the name of your bucket by # calling the [UpdateCertificateAuthority][1] operation. You must - # specify a [bucket policy][2] that allows Amazon Web Services Private - # CA to write the CRL to your bucket. + # specify a [bucket policy][2] that allows ACM Private CA to write the + # CRL to your bucket. # # # @@ -2054,9 +2052,9 @@ class GetPolicyResponse < Struct.new( # @!attribute [rw] certificate_chain # A PEM-encoded file that contains all of your certificates, other # than the certificate you're importing, chaining up to your root CA. - # Your Amazon Web Services Private CA-hosted or on-premises root - # certificate is the last in the chain, and each certificate in the - # chain signs the one preceding. + # Your ACM Private CA-hosted or on-premises root certificate is the + # last in the chain, and each certificate in the chain signs the one + # preceding. # # This parameter must be supplied when you import a subordinate CA. # When you import a root CA, there is no chain. @@ -2306,8 +2304,8 @@ class InvalidTagException < Struct.new( # Certificate Templates][1]. # # If conflicting or duplicate certificate information is supplied - # during certificate issuance, Amazon Web Services Private CA applies - # [order of operation rules][2] to determine what information is used. + # during certificate issuance, ACM Private CA applies [order of + # operation rules][2] to determine what information is used. # # # @@ -2363,17 +2361,17 @@ class InvalidTagException < Struct.new( # # @!attribute [rw] template_arn # Specifies a custom configuration template to use when issuing a - # certificate. If this parameter is not provided, Amazon Web Services - # Private CA defaults to the `EndEntityCertificate/V1` template. For - # CA certificates, you should choose the shortest path length that - # meets your needs. The path length is indicated by the PathLen*N* - # portion of the ARN, where *N* is the [CA depth][1]. + # certificate. If this parameter is not provided, ACM Private CA + # defaults to the `EndEntityCertificate/V1` template. For CA + # certificates, you should choose the shortest path length that meets + # your needs. The path length is indicated by the PathLen*N* portion + # of the ARN, where *N* is the [CA depth][1]. # # Note: The CA depth configured on a subordinate CA certificate must # not exceed the limit set by its parents in the CA hierarchy. # - # For a list of `TemplateArn` values supported by Amazon Web Services - # Private CA, see [Understanding Certificate Templates][2]. + # For a list of `TemplateArn` values supported by ACM Private CA, see + # [Understanding Certificate Templates][2]. # # # @@ -2410,11 +2408,11 @@ class InvalidTagException < Struct.new( # certificate. This parameter sets the “Not Before" date for the # certificate. # - # By default, when issuing a certificate, Amazon Web Services Private - # CA sets the "Not Before" date to the issuance time minus 60 - # minutes. This compensates for clock inconsistencies across computer - # systems. The `ValidityNotBefore` parameter can be used to customize - # the “Not Before” value. + # By default, when issuing a certificate, ACM Private CA sets the + # "Not Before" date to the issuance time minus 60 minutes. This + # compensates for clock inconsistencies across computer systems. The + # `ValidityNotBefore` parameter can be used to customize the “Not + # Before” value. # # Unlike the `Validity` parameter, the `ValidityNotBefore` parameter # is optional. @@ -2435,10 +2433,10 @@ class InvalidTagException < Struct.new( # the **IssueCertificate** action. Idempotency tokens for # **IssueCertificate** time out after one minute. Therefore, if you # call **IssueCertificate** multiple times with the same idempotency - # token within one minute, Amazon Web Services Private CA recognizes - # that you are requesting only one certificate and will issue only - # one. If you change the idempotency token for each call, PCA - # recognizes that you are requesting multiple certificates. + # token within one minute, ACM Private CA recognizes that you are + # requesting only one certificate and will issue only one. If you + # change the idempotency token for each call, PCA recognizes that you + # are requesting multiple certificates. # @return [String] # # @see http://docs.aws.amazon.com/goto/WebAPI/acm-pca-2017-08-22/IssueCertificateRequest AWS API Documentation @@ -2542,8 +2540,8 @@ class KeyUsage < Struct.new( include Aws::Structure end - # An Amazon Web Services Private CA quota has been exceeded. See the - # exception message returned to determine the quota that was exceeded. + # An ACM Private CA quota has been exceeded. See the exception message + # returned to determine the quota that was exceeded. # # @!attribute [rw] message # @return [String] @@ -2805,17 +2803,17 @@ class MalformedCertificateException < Struct.new( # @return [Boolean] # # @!attribute [rw] ocsp_custom_cname - # By default, Amazon Web Services Private CA injects an Amazon Web - # Services domain into certificates being validated by the Online - # Certificate Status Protocol (OCSP). A customer can alternatively use - # this object to define a CNAME specifying a customized OCSP domain. + # By default, ACM Private CA injects an Amazon Web Services domain + # into certificates being validated by the Online Certificate Status + # Protocol (OCSP). A customer can alternatively use this object to + # define a CNAME specifying a customized OCSP domain. # # Note: The value of the CNAME must not include a protocol prefix such # as "http://" or "https://". # # For more information, see [Customizing Online Certificate Status - # Protocol (OCSP) ][1] in the *Amazon Web Services Private Certificate - # Authority User Guide*. + # Protocol (OCSP) ][1] in the *Certificate Manager Private Certificate + # Authority (PCA) User Guide*. # # # @@ -2961,9 +2959,8 @@ class PermissionAlreadyExistsException < Struct.new( # @return [String] # # @!attribute [rw] policy_qualifiers - # Modifies the given `CertPolicyId` with a qualifier. Amazon Web - # Services Private CA supports the certification practice statement - # (CPS) qualifier. + # Modifies the given `CertPolicyId` with a qualifier. ACM Private CA + # supports the certification practice statement (CPS) qualifier. # @return [Array] # # @see http://docs.aws.amazon.com/goto/WebAPI/acm-pca-2017-08-22/PolicyInformation AWS API Documentation @@ -2976,8 +2973,8 @@ class PolicyInformation < Struct.new( end # Modifies the `CertPolicyId` of a `PolicyInformation` object with a - # qualifier. Amazon Web Services Private CA supports the certification - # practice statement (CPS) qualifier. + # qualifier. ACM Private CA supports the certification practice + # statement (CPS) qualifier. # # @note When making an API call, you may pass PolicyQualifierInfo # data as a hash: @@ -2994,8 +2991,8 @@ class PolicyInformation < Struct.new( # @return [String] # # @!attribute [rw] qualifier - # Defines the qualifier type. Amazon Web Services Private CA supports - # the use of a URI for a CPS qualifier in this field. + # Defines the qualifier type. ACM Private CA supports the use of a URI + # for a CPS qualifier in this field. # @return [Types::Qualifier] # # @see http://docs.aws.amazon.com/goto/WebAPI/acm-pca-2017-08-22/PolicyQualifierInfo AWS API Documentation @@ -3049,9 +3046,9 @@ class PutPolicyRequest < Struct.new( include Aws::Structure end - # Defines a `PolicyInformation` qualifier. Amazon Web Services Private - # CA supports the [certification practice statement (CPS) qualifier][1] - # defined in RFC 5280. + # Defines a `PolicyInformation` qualifier. ACM Private CA supports the + # [certification practice statement (CPS) qualifier][1] defined in RFC + # 5280. # # # @@ -3165,8 +3162,8 @@ class RestoreCertificateAuthorityRequest < Struct.new( # about certificates as requested by clients, and a CRL contains an # updated list of certificates revoked by your CA. For more information, # see [RevokeCertificate][3] and [Setting up a certificate revocation - # method][4] in the *Amazon Web Services Private Certificate Authority - # User Guide*. + # method][4] in the *Certificate Manager Private Certificate Authority + # (PCA) User Guide*. # # # @@ -3196,8 +3193,8 @@ class RestoreCertificateAuthorityRequest < Struct.new( # Configuration of the certificate revocation list (CRL), if any, # maintained by your private CA. A CRL is typically updated # approximately 30 minutes after a certificate is revoked. If for any - # reason a CRL update fails, Amazon Web Services Private CA makes - # further attempts every 15 minutes. + # reason a CRL update fails, ACM Private CA makes further attempts + # every 15 minutes. # @return [Types::CrlConfiguration] # # @!attribute [rw] ocsp_configuration @@ -3457,12 +3454,12 @@ class UpdateCertificateAuthorityRequest < Struct.new( # after issuance, stated in days, months, or years. For more # information, see [Validity][1] in RFC 5280. # - # Amazon Web Services Private CA API consumes the `Validity` data type - # differently in two distinct parameters of the `IssueCertificate` - # action. The required parameter `IssueCertificate`\:`Validity` - # specifies the end of a certificate's validity period. The optional - # parameter `IssueCertificate`\:`ValidityNotBefore` specifies a - # customized starting time for the validity period. + # ACM Private CA API consumes the `Validity` data type differently in + # two distinct parameters of the `IssueCertificate` action. The required + # parameter `IssueCertificate`\:`Validity` specifies the end of a + # certificate's validity period. The optional parameter + # `IssueCertificate`\:`ValidityNotBefore` specifies a customized + # starting time for the validity period. # # # @@ -3481,10 +3478,10 @@ class UpdateCertificateAuthorityRequest < Struct.new( # @return [Integer] # # @!attribute [rw] type - # Determines how *Amazon Web Services Private CA* interprets the - # `Value` parameter, an integer. Supported validity types include - # those listed below. Type definitions with values include a sample - # input value and the resulting output. + # Determines how *ACM Private CA* interprets the `Value` parameter, an + # integer. Supported validity types include those listed below. Type + # definitions with values include a sample input value and the + # resulting output. # # `END_DATE`\: The specific date and time when the certificate will # expire, expressed using UTCTime (YYMMDDHHMMSS) or GeneralizedTime diff --git a/gems/aws-sdk-medialive/CHANGELOG.md b/gems/aws-sdk-medialive/CHANGELOG.md index 046ad6421c1..1af56d6626b 100644 --- a/gems/aws-sdk-medialive/CHANGELOG.md +++ b/gems/aws-sdk-medialive/CHANGELOG.md @@ -1,6 +1,11 @@ Unreleased Changes ------------------ +1.86.0 (2022-03-28) +------------------ + +* Feature - This release adds support for selecting a maintenance window. + 1.85.0 (2022-02-24) ------------------ diff --git a/gems/aws-sdk-medialive/VERSION b/gems/aws-sdk-medialive/VERSION index f288d11142d..b7844a6ffdc 100644 --- a/gems/aws-sdk-medialive/VERSION +++ b/gems/aws-sdk-medialive/VERSION @@ -1 +1 @@ -1.85.0 +1.86.0 diff --git a/gems/aws-sdk-medialive/lib/aws-sdk-medialive.rb b/gems/aws-sdk-medialive/lib/aws-sdk-medialive.rb index a10e30d9147..f758247044a 100644 --- a/gems/aws-sdk-medialive/lib/aws-sdk-medialive.rb +++ b/gems/aws-sdk-medialive/lib/aws-sdk-medialive.rb @@ -49,6 +49,6 @@ # @!group service module Aws::MediaLive - GEM_VERSION = '1.85.0' + GEM_VERSION = '1.86.0' end diff --git a/gems/aws-sdk-medialive/lib/aws-sdk-medialive/client.rb b/gems/aws-sdk-medialive/lib/aws-sdk-medialive/client.rb index e686e242172..f6e4d6f7a73 100644 --- a/gems/aws-sdk-medialive/lib/aws-sdk-medialive/client.rb +++ b/gems/aws-sdk-medialive/lib/aws-sdk-medialive/client.rb @@ -837,6 +837,8 @@ def claim_device(params = {}, options = {}) # @option params [String] :log_level # The log level the user wants for their channel. # + # @option params [Types::MaintenanceCreateSettings] :maintenance + # # @option params [String] :name # # @option params [String] :request_id @@ -1810,6 +1812,10 @@ def claim_device(params = {}, options = {}) # resolution: "SD", # accepts SD, HD, UHD # }, # log_level: "ERROR", # accepts ERROR, WARNING, INFO, DEBUG, DISABLED + # maintenance: { + # maintenance_day: "MONDAY", # accepts MONDAY, TUESDAY, WEDNESDAY, THURSDAY, FRIDAY, SATURDAY, SUNDAY + # maintenance_start_time: "__stringPattern010920300", + # }, # name: "__string", # request_id: "__string", # reserved: "__string", @@ -2421,6 +2427,10 @@ def claim_device(params = {}, options = {}) # resp.channel.input_specification.maximum_bitrate #=> String, one of "MAX_10_MBPS", "MAX_20_MBPS", "MAX_50_MBPS" # resp.channel.input_specification.resolution #=> String, one of "SD", "HD", "UHD" # resp.channel.log_level #=> String, one of "ERROR", "WARNING", "INFO", "DEBUG", "DISABLED" + # resp.channel.maintenance.maintenance_day #=> String, one of "MONDAY", "TUESDAY", "WEDNESDAY", "THURSDAY", "FRIDAY", "SATURDAY", "SUNDAY" + # resp.channel.maintenance.maintenance_deadline #=> String + # resp.channel.maintenance.maintenance_scheduled_date #=> String + # resp.channel.maintenance.maintenance_start_time #=> String # resp.channel.name #=> String # resp.channel.pipeline_details #=> Array # resp.channel.pipeline_details[0].active_input_attachment_name #=> String @@ -2867,6 +2877,7 @@ def create_tags(params = {}, options = {}) # * {Types::DeleteChannelResponse#input_attachments #input_attachments} => Array<Types::InputAttachment> # * {Types::DeleteChannelResponse#input_specification #input_specification} => Types::InputSpecification # * {Types::DeleteChannelResponse#log_level #log_level} => String + # * {Types::DeleteChannelResponse#maintenance #maintenance} => Types::MaintenanceStatus # * {Types::DeleteChannelResponse#name #name} => String # * {Types::DeleteChannelResponse#pipeline_details #pipeline_details} => Array<Types::PipelineDetail> # * {Types::DeleteChannelResponse#pipelines_running_count #pipelines_running_count} => Integer @@ -3478,6 +3489,10 @@ def create_tags(params = {}, options = {}) # resp.input_specification.maximum_bitrate #=> String, one of "MAX_10_MBPS", "MAX_20_MBPS", "MAX_50_MBPS" # resp.input_specification.resolution #=> String, one of "SD", "HD", "UHD" # resp.log_level #=> String, one of "ERROR", "WARNING", "INFO", "DEBUG", "DISABLED" + # resp.maintenance.maintenance_day #=> String, one of "MONDAY", "TUESDAY", "WEDNESDAY", "THURSDAY", "FRIDAY", "SATURDAY", "SUNDAY" + # resp.maintenance.maintenance_deadline #=> String + # resp.maintenance.maintenance_scheduled_date #=> String + # resp.maintenance.maintenance_start_time #=> String # resp.name #=> String # resp.pipeline_details #=> Array # resp.pipeline_details[0].active_input_attachment_name #=> String @@ -3794,6 +3809,7 @@ def delete_tags(params = {}, options = {}) # * {Types::DescribeChannelResponse#input_attachments #input_attachments} => Array<Types::InputAttachment> # * {Types::DescribeChannelResponse#input_specification #input_specification} => Types::InputSpecification # * {Types::DescribeChannelResponse#log_level #log_level} => String + # * {Types::DescribeChannelResponse#maintenance #maintenance} => Types::MaintenanceStatus # * {Types::DescribeChannelResponse#name #name} => String # * {Types::DescribeChannelResponse#pipeline_details #pipeline_details} => Array<Types::PipelineDetail> # * {Types::DescribeChannelResponse#pipelines_running_count #pipelines_running_count} => Integer @@ -4405,6 +4421,10 @@ def delete_tags(params = {}, options = {}) # resp.input_specification.maximum_bitrate #=> String, one of "MAX_10_MBPS", "MAX_20_MBPS", "MAX_50_MBPS" # resp.input_specification.resolution #=> String, one of "SD", "HD", "UHD" # resp.log_level #=> String, one of "ERROR", "WARNING", "INFO", "DEBUG", "DISABLED" + # resp.maintenance.maintenance_day #=> String, one of "MONDAY", "TUESDAY", "WEDNESDAY", "THURSDAY", "FRIDAY", "SATURDAY", "SUNDAY" + # resp.maintenance.maintenance_deadline #=> String + # resp.maintenance.maintenance_scheduled_date #=> String + # resp.maintenance.maintenance_start_time #=> String # resp.name #=> String # resp.pipeline_details #=> Array # resp.pipeline_details[0].active_input_attachment_name #=> String @@ -5110,6 +5130,10 @@ def describe_schedule(params = {}, options = {}) # resp.channels[0].input_specification.maximum_bitrate #=> String, one of "MAX_10_MBPS", "MAX_20_MBPS", "MAX_50_MBPS" # resp.channels[0].input_specification.resolution #=> String, one of "SD", "HD", "UHD" # resp.channels[0].log_level #=> String, one of "ERROR", "WARNING", "INFO", "DEBUG", "DISABLED" + # resp.channels[0].maintenance.maintenance_day #=> String, one of "MONDAY", "TUESDAY", "WEDNESDAY", "THURSDAY", "FRIDAY", "SATURDAY", "SUNDAY" + # resp.channels[0].maintenance.maintenance_deadline #=> String + # resp.channels[0].maintenance.maintenance_scheduled_date #=> String + # resp.channels[0].maintenance.maintenance_start_time #=> String # resp.channels[0].name #=> String # resp.channels[0].pipelines_running_count #=> Integer # resp.channels[0].role_arn #=> String @@ -5736,6 +5760,7 @@ def reject_input_device_transfer(params = {}, options = {}) # * {Types::StartChannelResponse#input_attachments #input_attachments} => Array<Types::InputAttachment> # * {Types::StartChannelResponse#input_specification #input_specification} => Types::InputSpecification # * {Types::StartChannelResponse#log_level #log_level} => String + # * {Types::StartChannelResponse#maintenance #maintenance} => Types::MaintenanceStatus # * {Types::StartChannelResponse#name #name} => String # * {Types::StartChannelResponse#pipeline_details #pipeline_details} => Array<Types::PipelineDetail> # * {Types::StartChannelResponse#pipelines_running_count #pipelines_running_count} => Integer @@ -6347,6 +6372,10 @@ def reject_input_device_transfer(params = {}, options = {}) # resp.input_specification.maximum_bitrate #=> String, one of "MAX_10_MBPS", "MAX_20_MBPS", "MAX_50_MBPS" # resp.input_specification.resolution #=> String, one of "SD", "HD", "UHD" # resp.log_level #=> String, one of "ERROR", "WARNING", "INFO", "DEBUG", "DISABLED" + # resp.maintenance.maintenance_day #=> String, one of "MONDAY", "TUESDAY", "WEDNESDAY", "THURSDAY", "FRIDAY", "SATURDAY", "SUNDAY" + # resp.maintenance.maintenance_deadline #=> String + # resp.maintenance.maintenance_scheduled_date #=> String + # resp.maintenance.maintenance_start_time #=> String # resp.name #=> String # resp.pipeline_details #=> Array # resp.pipeline_details[0].active_input_attachment_name #=> String @@ -6445,6 +6474,7 @@ def start_multiplex(params = {}, options = {}) # * {Types::StopChannelResponse#input_attachments #input_attachments} => Array<Types::InputAttachment> # * {Types::StopChannelResponse#input_specification #input_specification} => Types::InputSpecification # * {Types::StopChannelResponse#log_level #log_level} => String + # * {Types::StopChannelResponse#maintenance #maintenance} => Types::MaintenanceStatus # * {Types::StopChannelResponse#name #name} => String # * {Types::StopChannelResponse#pipeline_details #pipeline_details} => Array<Types::PipelineDetail> # * {Types::StopChannelResponse#pipelines_running_count #pipelines_running_count} => Integer @@ -7056,6 +7086,10 @@ def start_multiplex(params = {}, options = {}) # resp.input_specification.maximum_bitrate #=> String, one of "MAX_10_MBPS", "MAX_20_MBPS", "MAX_50_MBPS" # resp.input_specification.resolution #=> String, one of "SD", "HD", "UHD" # resp.log_level #=> String, one of "ERROR", "WARNING", "INFO", "DEBUG", "DISABLED" + # resp.maintenance.maintenance_day #=> String, one of "MONDAY", "TUESDAY", "WEDNESDAY", "THURSDAY", "FRIDAY", "SATURDAY", "SUNDAY" + # resp.maintenance.maintenance_deadline #=> String + # resp.maintenance.maintenance_scheduled_date #=> String + # resp.maintenance.maintenance_start_time #=> String # resp.name #=> String # resp.pipeline_details #=> Array # resp.pipeline_details[0].active_input_attachment_name #=> String @@ -7187,6 +7221,8 @@ def transfer_input_device(params = {}, options = {}) # @option params [String] :log_level # The log level the user wants for their channel. # + # @option params [Types::MaintenanceUpdateSettings] :maintenance + # # @option params [String] :name # # @option params [String] :role_arn @@ -8147,6 +8183,11 @@ def transfer_input_device(params = {}, options = {}) # resolution: "SD", # accepts SD, HD, UHD # }, # log_level: "ERROR", # accepts ERROR, WARNING, INFO, DEBUG, DISABLED + # maintenance: { + # maintenance_day: "MONDAY", # accepts MONDAY, TUESDAY, WEDNESDAY, THURSDAY, FRIDAY, SATURDAY, SUNDAY + # maintenance_scheduled_date: "__string", + # maintenance_start_time: "__stringPattern010920300", + # }, # name: "__string", # role_arn: "__string", # }) @@ -8748,6 +8789,10 @@ def transfer_input_device(params = {}, options = {}) # resp.channel.input_specification.maximum_bitrate #=> String, one of "MAX_10_MBPS", "MAX_20_MBPS", "MAX_50_MBPS" # resp.channel.input_specification.resolution #=> String, one of "SD", "HD", "UHD" # resp.channel.log_level #=> String, one of "ERROR", "WARNING", "INFO", "DEBUG", "DISABLED" + # resp.channel.maintenance.maintenance_day #=> String, one of "MONDAY", "TUESDAY", "WEDNESDAY", "THURSDAY", "FRIDAY", "SATURDAY", "SUNDAY" + # resp.channel.maintenance.maintenance_deadline #=> String + # resp.channel.maintenance.maintenance_scheduled_date #=> String + # resp.channel.maintenance.maintenance_start_time #=> String # resp.channel.name #=> String # resp.channel.pipeline_details #=> Array # resp.channel.pipeline_details[0].active_input_attachment_name #=> String @@ -9418,6 +9463,10 @@ def update_channel(params = {}, options = {}) # resp.channel.input_specification.maximum_bitrate #=> String, one of "MAX_10_MBPS", "MAX_20_MBPS", "MAX_50_MBPS" # resp.channel.input_specification.resolution #=> String, one of "SD", "HD", "UHD" # resp.channel.log_level #=> String, one of "ERROR", "WARNING", "INFO", "DEBUG", "DISABLED" + # resp.channel.maintenance.maintenance_day #=> String, one of "MONDAY", "TUESDAY", "WEDNESDAY", "THURSDAY", "FRIDAY", "SATURDAY", "SUNDAY" + # resp.channel.maintenance.maintenance_deadline #=> String + # resp.channel.maintenance.maintenance_scheduled_date #=> String + # resp.channel.maintenance.maintenance_start_time #=> String # resp.channel.name #=> String # resp.channel.pipeline_details #=> Array # resp.channel.pipeline_details[0].active_input_attachment_name #=> String @@ -9875,7 +9924,7 @@ def build_request(operation_name, params = {}) params: params, config: config) context[:gem_name] = 'aws-sdk-medialive' - context[:gem_version] = '1.85.0' + context[:gem_version] = '1.86.0' Seahorse::Client::Request.new(handlers, context) end diff --git a/gems/aws-sdk-medialive/lib/aws-sdk-medialive/client_api.rb b/gems/aws-sdk-medialive/lib/aws-sdk-medialive/client_api.rb index f10df29772f..926c47a7565 100644 --- a/gems/aws-sdk-medialive/lib/aws-sdk-medialive/client_api.rb +++ b/gems/aws-sdk-medialive/lib/aws-sdk-medialive/client_api.rb @@ -453,6 +453,10 @@ module ClientApi M3u8Scte35Behavior = Shapes::StringShape.new(name: 'M3u8Scte35Behavior') M3u8Settings = Shapes::StructureShape.new(name: 'M3u8Settings') M3u8TimedMetadataBehavior = Shapes::StringShape.new(name: 'M3u8TimedMetadataBehavior') + MaintenanceCreateSettings = Shapes::StructureShape.new(name: 'MaintenanceCreateSettings') + MaintenanceDay = Shapes::StringShape.new(name: 'MaintenanceDay') + MaintenanceStatus = Shapes::StructureShape.new(name: 'MaintenanceStatus') + MaintenanceUpdateSettings = Shapes::StructureShape.new(name: 'MaintenanceUpdateSettings') MaxResults = Shapes::IntegerShape.new(name: 'MaxResults') MediaConnectFlow = Shapes::StructureShape.new(name: 'MediaConnectFlow') MediaConnectFlowRequest = Shapes::StructureShape.new(name: 'MediaConnectFlowRequest') @@ -805,6 +809,7 @@ module ClientApi __stringMin34Max34 = Shapes::StringShape.new(name: '__stringMin34Max34') __stringMin3Max3 = Shapes::StringShape.new(name: '__stringMin3Max3') __stringMin6Max6 = Shapes::StringShape.new(name: '__stringMin6Max6') + __stringPattern010920300 = Shapes::StringShape.new(name: '__stringPattern010920300') __timestamp = Shapes::TimestampShape.new(name: '__timestamp') __timestampIso8601 = Shapes::TimestampShape.new(name: '__timestampIso8601', timestampFormat: "iso8601") __timestampUnix = Shapes::TimestampShape.new(name: '__timestampUnix', timestampFormat: "unixTimestamp") @@ -1136,6 +1141,7 @@ module ClientApi Channel.add_member(:input_attachments, Shapes::ShapeRef.new(shape: __listOfInputAttachment, location_name: "inputAttachments")) Channel.add_member(:input_specification, Shapes::ShapeRef.new(shape: InputSpecification, location_name: "inputSpecification")) Channel.add_member(:log_level, Shapes::ShapeRef.new(shape: LogLevel, location_name: "logLevel")) + Channel.add_member(:maintenance, Shapes::ShapeRef.new(shape: MaintenanceStatus, location_name: "maintenance")) Channel.add_member(:name, Shapes::ShapeRef.new(shape: __string, location_name: "name")) Channel.add_member(:pipeline_details, Shapes::ShapeRef.new(shape: __listOfPipelineDetail, location_name: "pipelineDetails")) Channel.add_member(:pipelines_running_count, Shapes::ShapeRef.new(shape: __integer, location_name: "pipelinesRunningCount")) @@ -1161,6 +1167,7 @@ module ClientApi ChannelSummary.add_member(:input_attachments, Shapes::ShapeRef.new(shape: __listOfInputAttachment, location_name: "inputAttachments")) ChannelSummary.add_member(:input_specification, Shapes::ShapeRef.new(shape: InputSpecification, location_name: "inputSpecification")) ChannelSummary.add_member(:log_level, Shapes::ShapeRef.new(shape: LogLevel, location_name: "logLevel")) + ChannelSummary.add_member(:maintenance, Shapes::ShapeRef.new(shape: MaintenanceStatus, location_name: "maintenance")) ChannelSummary.add_member(:name, Shapes::ShapeRef.new(shape: __string, location_name: "name")) ChannelSummary.add_member(:pipelines_running_count, Shapes::ShapeRef.new(shape: __integer, location_name: "pipelinesRunningCount")) ChannelSummary.add_member(:role_arn, Shapes::ShapeRef.new(shape: __string, location_name: "roleArn")) @@ -1186,6 +1193,7 @@ module ClientApi CreateChannel.add_member(:input_attachments, Shapes::ShapeRef.new(shape: __listOfInputAttachment, location_name: "inputAttachments")) CreateChannel.add_member(:input_specification, Shapes::ShapeRef.new(shape: InputSpecification, location_name: "inputSpecification")) CreateChannel.add_member(:log_level, Shapes::ShapeRef.new(shape: LogLevel, location_name: "logLevel")) + CreateChannel.add_member(:maintenance, Shapes::ShapeRef.new(shape: MaintenanceCreateSettings, location_name: "maintenance")) CreateChannel.add_member(:name, Shapes::ShapeRef.new(shape: __string, location_name: "name")) CreateChannel.add_member(:request_id, Shapes::ShapeRef.new(shape: __string, location_name: "requestId", metadata: {"idempotencyToken"=>true})) CreateChannel.add_member(:reserved, Shapes::ShapeRef.new(shape: __string, deprecated: true, location_name: "reserved")) @@ -1201,6 +1209,7 @@ module ClientApi CreateChannelRequest.add_member(:input_attachments, Shapes::ShapeRef.new(shape: __listOfInputAttachment, location_name: "inputAttachments")) CreateChannelRequest.add_member(:input_specification, Shapes::ShapeRef.new(shape: InputSpecification, location_name: "inputSpecification")) CreateChannelRequest.add_member(:log_level, Shapes::ShapeRef.new(shape: LogLevel, location_name: "logLevel")) + CreateChannelRequest.add_member(:maintenance, Shapes::ShapeRef.new(shape: MaintenanceCreateSettings, location_name: "maintenance")) CreateChannelRequest.add_member(:name, Shapes::ShapeRef.new(shape: __string, location_name: "name")) CreateChannelRequest.add_member(:request_id, Shapes::ShapeRef.new(shape: __string, location_name: "requestId", metadata: {"idempotencyToken"=>true})) CreateChannelRequest.add_member(:reserved, Shapes::ShapeRef.new(shape: __string, deprecated: true, location_name: "reserved")) @@ -1326,6 +1335,7 @@ module ClientApi DeleteChannelResponse.add_member(:input_attachments, Shapes::ShapeRef.new(shape: __listOfInputAttachment, location_name: "inputAttachments")) DeleteChannelResponse.add_member(:input_specification, Shapes::ShapeRef.new(shape: InputSpecification, location_name: "inputSpecification")) DeleteChannelResponse.add_member(:log_level, Shapes::ShapeRef.new(shape: LogLevel, location_name: "logLevel")) + DeleteChannelResponse.add_member(:maintenance, Shapes::ShapeRef.new(shape: MaintenanceStatus, location_name: "maintenance")) DeleteChannelResponse.add_member(:name, Shapes::ShapeRef.new(shape: __string, location_name: "name")) DeleteChannelResponse.add_member(:pipeline_details, Shapes::ShapeRef.new(shape: __listOfPipelineDetail, location_name: "pipelineDetails")) DeleteChannelResponse.add_member(:pipelines_running_count, Shapes::ShapeRef.new(shape: __integer, location_name: "pipelinesRunningCount")) @@ -1416,6 +1426,7 @@ module ClientApi DescribeChannelResponse.add_member(:input_attachments, Shapes::ShapeRef.new(shape: __listOfInputAttachment, location_name: "inputAttachments")) DescribeChannelResponse.add_member(:input_specification, Shapes::ShapeRef.new(shape: InputSpecification, location_name: "inputSpecification")) DescribeChannelResponse.add_member(:log_level, Shapes::ShapeRef.new(shape: LogLevel, location_name: "logLevel")) + DescribeChannelResponse.add_member(:maintenance, Shapes::ShapeRef.new(shape: MaintenanceStatus, location_name: "maintenance")) DescribeChannelResponse.add_member(:name, Shapes::ShapeRef.new(shape: __string, location_name: "name")) DescribeChannelResponse.add_member(:pipeline_details, Shapes::ShapeRef.new(shape: __listOfPipelineDetail, location_name: "pipelineDetails")) DescribeChannelResponse.add_member(:pipelines_running_count, Shapes::ShapeRef.new(shape: __integer, location_name: "pipelinesRunningCount")) @@ -2328,6 +2339,21 @@ module ClientApi M3u8Settings.add_member(:video_pid, Shapes::ShapeRef.new(shape: __string, location_name: "videoPid")) M3u8Settings.struct_class = Types::M3u8Settings + MaintenanceCreateSettings.add_member(:maintenance_day, Shapes::ShapeRef.new(shape: MaintenanceDay, location_name: "maintenanceDay")) + MaintenanceCreateSettings.add_member(:maintenance_start_time, Shapes::ShapeRef.new(shape: __stringPattern010920300, location_name: "maintenanceStartTime")) + MaintenanceCreateSettings.struct_class = Types::MaintenanceCreateSettings + + MaintenanceStatus.add_member(:maintenance_day, Shapes::ShapeRef.new(shape: MaintenanceDay, location_name: "maintenanceDay")) + MaintenanceStatus.add_member(:maintenance_deadline, Shapes::ShapeRef.new(shape: __string, location_name: "maintenanceDeadline")) + MaintenanceStatus.add_member(:maintenance_scheduled_date, Shapes::ShapeRef.new(shape: __string, location_name: "maintenanceScheduledDate")) + MaintenanceStatus.add_member(:maintenance_start_time, Shapes::ShapeRef.new(shape: __string, location_name: "maintenanceStartTime")) + MaintenanceStatus.struct_class = Types::MaintenanceStatus + + MaintenanceUpdateSettings.add_member(:maintenance_day, Shapes::ShapeRef.new(shape: MaintenanceDay, location_name: "maintenanceDay")) + MaintenanceUpdateSettings.add_member(:maintenance_scheduled_date, Shapes::ShapeRef.new(shape: __string, location_name: "maintenanceScheduledDate")) + MaintenanceUpdateSettings.add_member(:maintenance_start_time, Shapes::ShapeRef.new(shape: __stringPattern010920300, location_name: "maintenanceStartTime")) + MaintenanceUpdateSettings.struct_class = Types::MaintenanceUpdateSettings + MediaConnectFlow.add_member(:flow_arn, Shapes::ShapeRef.new(shape: __string, location_name: "flowArn")) MediaConnectFlow.struct_class = Types::MediaConnectFlow @@ -2804,6 +2830,7 @@ module ClientApi StartChannelResponse.add_member(:input_attachments, Shapes::ShapeRef.new(shape: __listOfInputAttachment, location_name: "inputAttachments")) StartChannelResponse.add_member(:input_specification, Shapes::ShapeRef.new(shape: InputSpecification, location_name: "inputSpecification")) StartChannelResponse.add_member(:log_level, Shapes::ShapeRef.new(shape: LogLevel, location_name: "logLevel")) + StartChannelResponse.add_member(:maintenance, Shapes::ShapeRef.new(shape: MaintenanceStatus, location_name: "maintenance")) StartChannelResponse.add_member(:name, Shapes::ShapeRef.new(shape: __string, location_name: "name")) StartChannelResponse.add_member(:pipeline_details, Shapes::ShapeRef.new(shape: __listOfPipelineDetail, location_name: "pipelineDetails")) StartChannelResponse.add_member(:pipelines_running_count, Shapes::ShapeRef.new(shape: __integer, location_name: "pipelinesRunningCount")) @@ -2864,6 +2891,7 @@ module ClientApi StopChannelResponse.add_member(:input_attachments, Shapes::ShapeRef.new(shape: __listOfInputAttachment, location_name: "inputAttachments")) StopChannelResponse.add_member(:input_specification, Shapes::ShapeRef.new(shape: InputSpecification, location_name: "inputSpecification")) StopChannelResponse.add_member(:log_level, Shapes::ShapeRef.new(shape: LogLevel, location_name: "logLevel")) + StopChannelResponse.add_member(:maintenance, Shapes::ShapeRef.new(shape: MaintenanceStatus, location_name: "maintenance")) StopChannelResponse.add_member(:name, Shapes::ShapeRef.new(shape: __string, location_name: "name")) StopChannelResponse.add_member(:pipeline_details, Shapes::ShapeRef.new(shape: __listOfPipelineDetail, location_name: "pipelineDetails")) StopChannelResponse.add_member(:pipelines_running_count, Shapes::ShapeRef.new(shape: __integer, location_name: "pipelinesRunningCount")) @@ -2964,6 +2992,7 @@ module ClientApi UpdateChannel.add_member(:input_attachments, Shapes::ShapeRef.new(shape: __listOfInputAttachment, location_name: "inputAttachments")) UpdateChannel.add_member(:input_specification, Shapes::ShapeRef.new(shape: InputSpecification, location_name: "inputSpecification")) UpdateChannel.add_member(:log_level, Shapes::ShapeRef.new(shape: LogLevel, location_name: "logLevel")) + UpdateChannel.add_member(:maintenance, Shapes::ShapeRef.new(shape: MaintenanceUpdateSettings, location_name: "maintenance")) UpdateChannel.add_member(:name, Shapes::ShapeRef.new(shape: __string, location_name: "name")) UpdateChannel.add_member(:role_arn, Shapes::ShapeRef.new(shape: __string, location_name: "roleArn")) UpdateChannel.struct_class = Types::UpdateChannel @@ -2987,6 +3016,7 @@ module ClientApi UpdateChannelRequest.add_member(:input_attachments, Shapes::ShapeRef.new(shape: __listOfInputAttachment, location_name: "inputAttachments")) UpdateChannelRequest.add_member(:input_specification, Shapes::ShapeRef.new(shape: InputSpecification, location_name: "inputSpecification")) UpdateChannelRequest.add_member(:log_level, Shapes::ShapeRef.new(shape: LogLevel, location_name: "logLevel")) + UpdateChannelRequest.add_member(:maintenance, Shapes::ShapeRef.new(shape: MaintenanceUpdateSettings, location_name: "maintenance")) UpdateChannelRequest.add_member(:name, Shapes::ShapeRef.new(shape: __string, location_name: "name")) UpdateChannelRequest.add_member(:role_arn, Shapes::ShapeRef.new(shape: __string, location_name: "roleArn")) UpdateChannelRequest.struct_class = Types::UpdateChannelRequest diff --git a/gems/aws-sdk-medialive/lib/aws-sdk-medialive/types.rb b/gems/aws-sdk-medialive/lib/aws-sdk-medialive/types.rb index 0c37a379729..09e5f8858bc 100644 --- a/gems/aws-sdk-medialive/lib/aws-sdk-medialive/types.rb +++ b/gems/aws-sdk-medialive/lib/aws-sdk-medialive/types.rb @@ -788,9 +788,6 @@ class AudioCodecSettings < Struct.new( # @return [String] # # @!attribute [rw] name - # The name of this AudioDescription. Outputs will use this name to - # uniquely identify this AudioDescription. Description names should be - # unique within this Live Event. # @return [String] # # @!attribute [rw] remix_settings @@ -2935,6 +2932,10 @@ class CdiInputSpecification < Struct.new( # The log level being written to CloudWatch Logs. # @return [String] # + # @!attribute [rw] maintenance + # Maintenance settings for this channel. + # @return [Types::MaintenanceStatus] + # # @!attribute [rw] name # The name of the channel. (user-mutable) # @return [String] @@ -2976,6 +2977,7 @@ class Channel < Struct.new( :input_attachments, :input_specification, :log_level, + :maintenance, :name, :pipeline_details, :pipelines_running_count, @@ -3054,6 +3056,10 @@ class ChannelEgressEndpoint < Struct.new( # The log level being written to CloudWatch Logs. # @return [String] # + # @!attribute [rw] maintenance + # Maintenance settings for this channel. + # @return [Types::MaintenanceStatus] + # # @!attribute [rw] name # The name of the channel. (user-mutable) # @return [String] @@ -3090,6 +3096,7 @@ class ChannelSummary < Struct.new( :input_attachments, :input_specification, :log_level, + :maintenance, :name, :pipelines_running_count, :role_arn, @@ -3173,6 +3180,10 @@ class ConflictException < Struct.new( # The log level to write to CloudWatch Logs. # @return [String] # + # @!attribute [rw] maintenance + # Maintenance settings for this channel. + # @return [Types::MaintenanceCreateSettings] + # # @!attribute [rw] name # Name of channel. # @return [String] @@ -3209,6 +3220,7 @@ class CreateChannel < Struct.new( :input_attachments, :input_specification, :log_level, + :maintenance, :name, :request_id, :reserved, @@ -4172,6 +4184,10 @@ class CreateChannel < Struct.new( # resolution: "SD", # accepts SD, HD, UHD # }, # log_level: "ERROR", # accepts ERROR, WARNING, INFO, DEBUG, DISABLED + # maintenance: { + # maintenance_day: "MONDAY", # accepts MONDAY, TUESDAY, WEDNESDAY, THURSDAY, FRIDAY, SATURDAY, SUNDAY + # maintenance_start_time: "__stringPattern010920300", + # }, # name: "__string", # request_id: "__string", # reserved: "__string", @@ -4211,6 +4227,9 @@ class CreateChannel < Struct.new( # The log level the user wants for their channel. # @return [String] # + # @!attribute [rw] maintenance + # @return [Types::MaintenanceCreateSettings] + # # @!attribute [rw] name # @return [String] # @@ -4244,6 +4263,7 @@ class CreateChannelRequest < Struct.new( :input_attachments, :input_specification, :log_level, + :maintenance, :name, :request_id, :reserved, @@ -4877,6 +4897,9 @@ class DeleteChannelRequest < Struct.new( # The log level the user wants for their channel. # @return [String] # + # @!attribute [rw] maintenance + # @return [Types::MaintenanceStatus] + # # @!attribute [rw] name # @return [String] # @@ -4912,6 +4935,7 @@ class DeleteChannelResponse < Struct.new( :input_attachments, :input_specification, :log_level, + :maintenance, :name, :pipeline_details, :pipelines_running_count, @@ -5284,6 +5308,9 @@ class DescribeChannelRequest < Struct.new( # The log level the user wants for their channel. # @return [String] # + # @!attribute [rw] maintenance + # @return [Types::MaintenanceStatus] + # # @!attribute [rw] name # @return [String] # @@ -5319,6 +5346,7 @@ class DescribeChannelResponse < Struct.new( :input_attachments, :input_specification, :log_level, + :maintenance, :name, :pipeline_details, :pipelines_running_count, @@ -6433,10 +6461,8 @@ class Eac3Settings < Struct.new( # } # # @!attribute [rw] copyright_holder - # Applies only if you plan to convert these source captions to - # EBU-TT-D or TTML in an output. Complete this field if you want to - # include the name of the copyright holder in the copyright metadata - # tag in the TTML + # Complete this field if you want to include the name of the copyright + # holder in the copyright tag in the captions metadata. # @return [String] # # @!attribute [rw] fill_line_gap @@ -12373,6 +12399,96 @@ class M3u8Settings < Struct.new( include Aws::Structure end + # @note When making an API call, you may pass MaintenanceCreateSettings + # data as a hash: + # + # { + # maintenance_day: "MONDAY", # accepts MONDAY, TUESDAY, WEDNESDAY, THURSDAY, FRIDAY, SATURDAY, SUNDAY + # maintenance_start_time: "__stringPattern010920300", + # } + # + # @!attribute [rw] maintenance_day + # Choose one day of the week for maintenance. The chosen day is used + # for all future maintenance windows. + # @return [String] + # + # @!attribute [rw] maintenance_start_time + # Choose the hour that maintenance will start. The chosen time is used + # for all future maintenance windows. + # @return [String] + # + # @see http://docs.aws.amazon.com/goto/WebAPI/medialive-2017-10-14/MaintenanceCreateSettings AWS API Documentation + # + class MaintenanceCreateSettings < Struct.new( + :maintenance_day, + :maintenance_start_time) + SENSITIVE = [] + include Aws::Structure + end + + # @!attribute [rw] maintenance_day + # The currently selected maintenance day. + # @return [String] + # + # @!attribute [rw] maintenance_deadline + # Maintenance is required by the displayed date and time. Date and + # time is in ISO. + # @return [String] + # + # @!attribute [rw] maintenance_scheduled_date + # The currently scheduled maintenance date and time. Date and time is + # in ISO. + # @return [String] + # + # @!attribute [rw] maintenance_start_time + # The currently selected maintenance start time. Time is in UTC. + # @return [String] + # + # @see http://docs.aws.amazon.com/goto/WebAPI/medialive-2017-10-14/MaintenanceStatus AWS API Documentation + # + class MaintenanceStatus < Struct.new( + :maintenance_day, + :maintenance_deadline, + :maintenance_scheduled_date, + :maintenance_start_time) + SENSITIVE = [] + include Aws::Structure + end + + # @note When making an API call, you may pass MaintenanceUpdateSettings + # data as a hash: + # + # { + # maintenance_day: "MONDAY", # accepts MONDAY, TUESDAY, WEDNESDAY, THURSDAY, FRIDAY, SATURDAY, SUNDAY + # maintenance_scheduled_date: "__string", + # maintenance_start_time: "__stringPattern010920300", + # } + # + # @!attribute [rw] maintenance_day + # Choose one day of the week for maintenance. The chosen day is used + # for all future maintenance windows. + # @return [String] + # + # @!attribute [rw] maintenance_scheduled_date + # Choose a specific date for maintenance to occur. The chosen date is + # used for the next maintenance window only. + # @return [String] + # + # @!attribute [rw] maintenance_start_time + # Choose the hour that maintenance will start. The chosen time is used + # for all future maintenance windows. + # @return [String] + # + # @see http://docs.aws.amazon.com/goto/WebAPI/medialive-2017-10-14/MaintenanceUpdateSettings AWS API Documentation + # + class MaintenanceUpdateSettings < Struct.new( + :maintenance_day, + :maintenance_scheduled_date, + :maintenance_start_time) + SENSITIVE = [] + include Aws::Structure + end + # The settings for a MediaConnect Flow. # # @!attribute [rw] flow_arn @@ -14537,9 +14653,7 @@ class OutputDestinationSettings < Struct.new( # } # # @!attribute [rw] name - # Custom output group name optionally defined by the user. Only - # letters, numbers, and the underscore character allowed; only 32 - # characters allowed. + # Custom output group name optionally defined by the user. # @return [String] # # @!attribute [rw] output_group_settings @@ -16645,6 +16759,9 @@ class StartChannelRequest < Struct.new( # The log level the user wants for their channel. # @return [String] # + # @!attribute [rw] maintenance + # @return [Types::MaintenanceStatus] + # # @!attribute [rw] name # @return [String] # @@ -16680,6 +16797,7 @@ class StartChannelResponse < Struct.new( :input_attachments, :input_specification, :log_level, + :maintenance, :name, :pipeline_details, :pipelines_running_count, @@ -16996,6 +17114,9 @@ class StopChannelRequest < Struct.new( # The log level the user wants for their channel. # @return [String] # + # @!attribute [rw] maintenance + # @return [Types::MaintenanceStatus] + # # @!attribute [rw] name # @return [String] # @@ -17031,6 +17152,7 @@ class StopChannelResponse < Struct.new( :input_attachments, :input_specification, :log_level, + :maintenance, :name, :pipeline_details, :pipelines_running_count, @@ -17392,9 +17514,8 @@ class TransferringInputDeviceSummary < Struct.new( # } # # @!attribute [rw] style_control - # When set to passthrough, passes through style and position - # information from a TTML-like input source (TTML, SMPTE-TT, CFF-TT) - # to the CFF-TT output or TTML output. + # This field is not currently supported and will not affect the output + # styling. Leave the default value. # @return [String] # # @see http://docs.aws.amazon.com/goto/WebAPI/medialive-2017-10-14/TtmlDestinationSettings AWS API Documentation @@ -17676,6 +17797,10 @@ class UnprocessableEntityException < Struct.new( # The log level to write to CloudWatch Logs. # @return [String] # + # @!attribute [rw] maintenance + # Maintenance settings for this channel. + # @return [Types::MaintenanceUpdateSettings] + # # @!attribute [rw] name # The name of the channel. # @return [String] @@ -17695,6 +17820,7 @@ class UpdateChannel < Struct.new( :input_attachments, :input_specification, :log_level, + :maintenance, :name, :role_arn) SENSITIVE = [] @@ -18733,6 +18859,11 @@ class UpdateChannelClassResponse < Struct.new( # resolution: "SD", # accepts SD, HD, UHD # }, # log_level: "ERROR", # accepts ERROR, WARNING, INFO, DEBUG, DISABLED + # maintenance: { + # maintenance_day: "MONDAY", # accepts MONDAY, TUESDAY, WEDNESDAY, THURSDAY, FRIDAY, SATURDAY, SUNDAY + # maintenance_scheduled_date: "__string", + # maintenance_start_time: "__stringPattern010920300", + # }, # name: "__string", # role_arn: "__string", # } @@ -18760,6 +18891,9 @@ class UpdateChannelClassResponse < Struct.new( # The log level the user wants for their channel. # @return [String] # + # @!attribute [rw] maintenance + # @return [Types::MaintenanceUpdateSettings] + # # @!attribute [rw] name # @return [String] # @@ -18776,6 +18910,7 @@ class UpdateChannelRequest < Struct.new( :input_attachments, :input_specification, :log_level, + :maintenance, :name, :role_arn) SENSITIVE = []