mypy-boto3-sso-admin 1.40.0__tar.gz → 1.40.37__tar.gz

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (24) hide show
  1. {mypy_boto3_sso_admin-1.40.0 → mypy_boto3_sso_admin-1.40.37}/PKG-INFO +4 -4
  2. {mypy_boto3_sso_admin-1.40.0 → mypy_boto3_sso_admin-1.40.37}/README.md +2 -2
  3. {mypy_boto3_sso_admin-1.40.0 → mypy_boto3_sso_admin-1.40.37}/mypy_boto3_sso_admin/__main__.py +3 -3
  4. mypy_boto3_sso_admin-1.40.0/mypy_boto3_sso_admin/client.pyi → mypy_boto3_sso_admin-1.40.37/mypy_boto3_sso_admin/client.py +26 -0
  5. mypy_boto3_sso_admin-1.40.0/mypy_boto3_sso_admin/client.py → mypy_boto3_sso_admin-1.40.37/mypy_boto3_sso_admin/client.pyi +23 -3
  6. {mypy_boto3_sso_admin-1.40.0 → mypy_boto3_sso_admin-1.40.37}/mypy_boto3_sso_admin/literals.py +11 -14
  7. {mypy_boto3_sso_admin-1.40.0 → mypy_boto3_sso_admin-1.40.37}/mypy_boto3_sso_admin/literals.pyi +11 -14
  8. mypy_boto3_sso_admin-1.40.0/mypy_boto3_sso_admin/type_defs.pyi → mypy_boto3_sso_admin-1.40.37/mypy_boto3_sso_admin/type_defs.py +244 -11
  9. mypy_boto3_sso_admin-1.40.0/mypy_boto3_sso_admin/type_defs.py → mypy_boto3_sso_admin-1.40.37/mypy_boto3_sso_admin/type_defs.pyi +39 -201
  10. {mypy_boto3_sso_admin-1.40.0 → mypy_boto3_sso_admin-1.40.37}/mypy_boto3_sso_admin/version.py +1 -1
  11. {mypy_boto3_sso_admin-1.40.0 → mypy_boto3_sso_admin-1.40.37}/mypy_boto3_sso_admin.egg-info/PKG-INFO +4 -4
  12. {mypy_boto3_sso_admin-1.40.0 → mypy_boto3_sso_admin-1.40.37}/setup.py +2 -2
  13. {mypy_boto3_sso_admin-1.40.0 → mypy_boto3_sso_admin-1.40.37}/LICENSE +0 -0
  14. {mypy_boto3_sso_admin-1.40.0 → mypy_boto3_sso_admin-1.40.37}/mypy_boto3_sso_admin/__init__.py +0 -0
  15. {mypy_boto3_sso_admin-1.40.0 → mypy_boto3_sso_admin-1.40.37}/mypy_boto3_sso_admin/__init__.pyi +0 -0
  16. {mypy_boto3_sso_admin-1.40.0 → mypy_boto3_sso_admin-1.40.37}/mypy_boto3_sso_admin/paginator.py +0 -0
  17. {mypy_boto3_sso_admin-1.40.0 → mypy_boto3_sso_admin-1.40.37}/mypy_boto3_sso_admin/paginator.pyi +0 -0
  18. {mypy_boto3_sso_admin-1.40.0 → mypy_boto3_sso_admin-1.40.37}/mypy_boto3_sso_admin/py.typed +0 -0
  19. {mypy_boto3_sso_admin-1.40.0 → mypy_boto3_sso_admin-1.40.37}/mypy_boto3_sso_admin.egg-info/SOURCES.txt +0 -0
  20. {mypy_boto3_sso_admin-1.40.0 → mypy_boto3_sso_admin-1.40.37}/mypy_boto3_sso_admin.egg-info/dependency_links.txt +0 -0
  21. {mypy_boto3_sso_admin-1.40.0 → mypy_boto3_sso_admin-1.40.37}/mypy_boto3_sso_admin.egg-info/not-zip-safe +0 -0
  22. {mypy_boto3_sso_admin-1.40.0 → mypy_boto3_sso_admin-1.40.37}/mypy_boto3_sso_admin.egg-info/requires.txt +0 -0
  23. {mypy_boto3_sso_admin-1.40.0 → mypy_boto3_sso_admin-1.40.37}/mypy_boto3_sso_admin.egg-info/top_level.txt +0 -0
  24. {mypy_boto3_sso_admin-1.40.0 → mypy_boto3_sso_admin-1.40.37}/setup.cfg +0 -0
@@ -1,7 +1,7 @@
1
1
  Metadata-Version: 2.4
2
2
  Name: mypy-boto3-sso-admin
3
- Version: 1.40.0
4
- Summary: Type annotations for boto3 SSOAdmin 1.40.0 service generated with mypy-boto3-builder 8.11.0
3
+ Version: 1.40.37
4
+ Summary: Type annotations for boto3 SSOAdmin 1.40.37 service generated with mypy-boto3-builder 8.11.0
5
5
  Home-page: https://github.com/youtype/mypy_boto3_builder
6
6
  Author: Vlad Emelianov
7
7
  Author-email: vlad.emelianov.nz@gmail.com
@@ -56,7 +56,7 @@ Dynamic: summary
56
56
 
57
57
  ![boto3.typed](https://github.com/youtype/mypy_boto3_builder/raw/main/logo.png)
58
58
 
59
- Type annotations for [boto3 SSOAdmin 1.40.0](https://pypi.org/project/boto3/)
59
+ Type annotations for [boto3 SSOAdmin 1.40.37](https://pypi.org/project/boto3/)
60
60
  compatible with [VSCode](https://code.visualstudio.com/),
61
61
  [PyCharm](https://www.jetbrains.com/pycharm/),
62
62
  [Emacs](https://www.gnu.org/software/emacs/),
@@ -118,7 +118,7 @@ You can generate type annotations for `boto3` package locally with
118
118
  isolation.
119
119
 
120
120
  1. Run mypy-boto3-builder in your package root directory:
121
- `uvx --with 'boto3==1.40.0' mypy-boto3-builder`
121
+ `uvx --with 'boto3==1.40.37' mypy-boto3-builder`
122
122
  2. Select `boto3-stubs` AWS SDK.
123
123
  3. Add `SSOAdmin` service.
124
124
  4. Use provided commands to install generated packages.
@@ -9,7 +9,7 @@
9
9
 
10
10
  ![boto3.typed](https://github.com/youtype/mypy_boto3_builder/raw/main/logo.png)
11
11
 
12
- Type annotations for [boto3 SSOAdmin 1.40.0](https://pypi.org/project/boto3/)
12
+ Type annotations for [boto3 SSOAdmin 1.40.37](https://pypi.org/project/boto3/)
13
13
  compatible with [VSCode](https://code.visualstudio.com/),
14
14
  [PyCharm](https://www.jetbrains.com/pycharm/),
15
15
  [Emacs](https://www.gnu.org/software/emacs/),
@@ -71,7 +71,7 @@ You can generate type annotations for `boto3` package locally with
71
71
  isolation.
72
72
 
73
73
  1. Run mypy-boto3-builder in your package root directory:
74
- `uvx --with 'boto3==1.40.0' mypy-boto3-builder`
74
+ `uvx --with 'boto3==1.40.37' mypy-boto3-builder`
75
75
  2. Select `boto3-stubs` AWS SDK.
76
76
  3. Add `SSOAdmin` service.
77
77
  4. Use provided commands to install generated packages.
@@ -12,8 +12,8 @@ def print_info() -> None:
12
12
  Print package info to stdout.
13
13
  """
14
14
  sys.stdout.write(
15
- "Type annotations for boto3 SSOAdmin 1.40.0\n"
16
- "Version: 1.40.0\n"
15
+ "Type annotations for boto3 SSOAdmin 1.40.37\n"
16
+ "Version: 1.40.37\n"
17
17
  "Builder version: 8.11.0\n"
18
18
  "Docs: https://youtype.github.io/boto3_stubs_docs/mypy_boto3_sso_admin//\n"
19
19
  "Boto3 docs: https://boto3.amazonaws.com/v1/documentation/api/latest/reference/services/sso-admin.html#ssoadmin\n"
@@ -26,7 +26,7 @@ def print_version() -> None:
26
26
  """
27
27
  Print package version to stdout.
28
28
  """
29
- sys.stdout.write("1.40.0\n")
29
+ sys.stdout.write("1.40.37\n")
30
30
 
31
31
 
32
32
  def main() -> None:
@@ -106,6 +106,8 @@ from .type_defs import (
106
106
  GetApplicationAuthenticationMethodResponseTypeDef,
107
107
  GetApplicationGrantRequestTypeDef,
108
108
  GetApplicationGrantResponseTypeDef,
109
+ GetApplicationSessionConfigurationRequestTypeDef,
110
+ GetApplicationSessionConfigurationResponseTypeDef,
109
111
  GetInlinePolicyForPermissionSetRequestTypeDef,
110
112
  GetInlinePolicyForPermissionSetResponseTypeDef,
111
113
  GetPermissionsBoundaryForPermissionSetRequestTypeDef,
@@ -156,6 +158,7 @@ from .type_defs import (
156
158
  PutApplicationAssignmentConfigurationRequestTypeDef,
157
159
  PutApplicationAuthenticationMethodRequestTypeDef,
158
160
  PutApplicationGrantRequestTypeDef,
161
+ PutApplicationSessionConfigurationRequestTypeDef,
159
162
  PutInlinePolicyToPermissionSetRequestTypeDef,
160
163
  PutPermissionsBoundaryToPermissionSetRequestTypeDef,
161
164
  TagResourceRequestTypeDef,
@@ -178,8 +181,10 @@ if sys.version_info >= (3, 12):
178
181
  else:
179
182
  from typing_extensions import Literal, Unpack
180
183
 
184
+
181
185
  __all__ = ("SSOAdminClient",)
182
186
 
187
+
183
188
  class Exceptions(BaseClientExceptions):
184
189
  AccessDeniedException: Type[BotocoreClientError]
185
190
  ClientError: Type[BotocoreClientError]
@@ -190,6 +195,7 @@ class Exceptions(BaseClientExceptions):
190
195
  ThrottlingException: Type[BotocoreClientError]
191
196
  ValidationException: Type[BotocoreClientError]
192
197
 
198
+
193
199
  class SSOAdminClient(BaseClient):
194
200
  """
195
201
  [Show boto3 documentation](https://boto3.amazonaws.com/v1/documentation/api/latest/reference/services/sso-admin.html#SSOAdmin.Client)
@@ -614,6 +620,16 @@ class SSOAdminClient(BaseClient):
614
620
  [Show boto3-stubs documentation](https://youtype.github.io/boto3_stubs_docs/mypy_boto3_sso_admin/client/#get_application_grant)
615
621
  """
616
622
 
623
+ def get_application_session_configuration(
624
+ self, **kwargs: Unpack[GetApplicationSessionConfigurationRequestTypeDef]
625
+ ) -> GetApplicationSessionConfigurationResponseTypeDef:
626
+ """
627
+ Retrieves the session configuration for an application in IAM Identity Center.
628
+
629
+ [Show boto3 documentation](https://boto3.amazonaws.com/v1/documentation/api/latest/reference/services/sso-admin/client/get_application_session_configuration.html)
630
+ [Show boto3-stubs documentation](https://youtype.github.io/boto3_stubs_docs/mypy_boto3_sso_admin/client/#get_application_session_configuration)
631
+ """
632
+
617
633
  def get_inline_policy_for_permission_set(
618
634
  self, **kwargs: Unpack[GetInlinePolicyForPermissionSetRequestTypeDef]
619
635
  ) -> GetInlinePolicyForPermissionSetResponseTypeDef:
@@ -898,6 +914,16 @@ class SSOAdminClient(BaseClient):
898
914
  [Show boto3-stubs documentation](https://youtype.github.io/boto3_stubs_docs/mypy_boto3_sso_admin/client/#put_application_grant)
899
915
  """
900
916
 
917
+ def put_application_session_configuration(
918
+ self, **kwargs: Unpack[PutApplicationSessionConfigurationRequestTypeDef]
919
+ ) -> Dict[str, Any]:
920
+ """
921
+ Updates the session configuration for an application in IAM Identity Center.
922
+
923
+ [Show boto3 documentation](https://boto3.amazonaws.com/v1/documentation/api/latest/reference/services/sso-admin/client/put_application_session_configuration.html)
924
+ [Show boto3-stubs documentation](https://youtype.github.io/boto3_stubs_docs/mypy_boto3_sso_admin/client/#put_application_session_configuration)
925
+ """
926
+
901
927
  def put_inline_policy_to_permission_set(
902
928
  self, **kwargs: Unpack[PutInlinePolicyToPermissionSetRequestTypeDef]
903
929
  ) -> Dict[str, Any]:
@@ -106,6 +106,8 @@ from .type_defs import (
106
106
  GetApplicationAuthenticationMethodResponseTypeDef,
107
107
  GetApplicationGrantRequestTypeDef,
108
108
  GetApplicationGrantResponseTypeDef,
109
+ GetApplicationSessionConfigurationRequestTypeDef,
110
+ GetApplicationSessionConfigurationResponseTypeDef,
109
111
  GetInlinePolicyForPermissionSetRequestTypeDef,
110
112
  GetInlinePolicyForPermissionSetResponseTypeDef,
111
113
  GetPermissionsBoundaryForPermissionSetRequestTypeDef,
@@ -156,6 +158,7 @@ from .type_defs import (
156
158
  PutApplicationAssignmentConfigurationRequestTypeDef,
157
159
  PutApplicationAuthenticationMethodRequestTypeDef,
158
160
  PutApplicationGrantRequestTypeDef,
161
+ PutApplicationSessionConfigurationRequestTypeDef,
159
162
  PutInlinePolicyToPermissionSetRequestTypeDef,
160
163
  PutPermissionsBoundaryToPermissionSetRequestTypeDef,
161
164
  TagResourceRequestTypeDef,
@@ -178,10 +181,8 @@ if sys.version_info >= (3, 12):
178
181
  else:
179
182
  from typing_extensions import Literal, Unpack
180
183
 
181
-
182
184
  __all__ = ("SSOAdminClient",)
183
185
 
184
-
185
186
  class Exceptions(BaseClientExceptions):
186
187
  AccessDeniedException: Type[BotocoreClientError]
187
188
  ClientError: Type[BotocoreClientError]
@@ -192,7 +193,6 @@ class Exceptions(BaseClientExceptions):
192
193
  ThrottlingException: Type[BotocoreClientError]
193
194
  ValidationException: Type[BotocoreClientError]
194
195
 
195
-
196
196
  class SSOAdminClient(BaseClient):
197
197
  """
198
198
  [Show boto3 documentation](https://boto3.amazonaws.com/v1/documentation/api/latest/reference/services/sso-admin.html#SSOAdmin.Client)
@@ -617,6 +617,16 @@ class SSOAdminClient(BaseClient):
617
617
  [Show boto3-stubs documentation](https://youtype.github.io/boto3_stubs_docs/mypy_boto3_sso_admin/client/#get_application_grant)
618
618
  """
619
619
 
620
+ def get_application_session_configuration(
621
+ self, **kwargs: Unpack[GetApplicationSessionConfigurationRequestTypeDef]
622
+ ) -> GetApplicationSessionConfigurationResponseTypeDef:
623
+ """
624
+ Retrieves the session configuration for an application in IAM Identity Center.
625
+
626
+ [Show boto3 documentation](https://boto3.amazonaws.com/v1/documentation/api/latest/reference/services/sso-admin/client/get_application_session_configuration.html)
627
+ [Show boto3-stubs documentation](https://youtype.github.io/boto3_stubs_docs/mypy_boto3_sso_admin/client/#get_application_session_configuration)
628
+ """
629
+
620
630
  def get_inline_policy_for_permission_set(
621
631
  self, **kwargs: Unpack[GetInlinePolicyForPermissionSetRequestTypeDef]
622
632
  ) -> GetInlinePolicyForPermissionSetResponseTypeDef:
@@ -901,6 +911,16 @@ class SSOAdminClient(BaseClient):
901
911
  [Show boto3-stubs documentation](https://youtype.github.io/boto3_stubs_docs/mypy_boto3_sso_admin/client/#put_application_grant)
902
912
  """
903
913
 
914
+ def put_application_session_configuration(
915
+ self, **kwargs: Unpack[PutApplicationSessionConfigurationRequestTypeDef]
916
+ ) -> Dict[str, Any]:
917
+ """
918
+ Updates the session configuration for an application in IAM Identity Center.
919
+
920
+ [Show boto3 documentation](https://boto3.amazonaws.com/v1/documentation/api/latest/reference/services/sso-admin/client/put_application_session_configuration.html)
921
+ [Show boto3-stubs documentation](https://youtype.github.io/boto3_stubs_docs/mypy_boto3_sso_admin/client/#put_application_session_configuration)
922
+ """
923
+
904
924
  def put_inline_policy_to_permission_set(
905
925
  self, **kwargs: Unpack[PutInlinePolicyToPermissionSetRequestTypeDef]
906
926
  ) -> Dict[str, Any]:
@@ -31,6 +31,8 @@ __all__ = (
31
31
  "InstanceAccessControlAttributeConfigurationStatusType",
32
32
  "InstanceStatusType",
33
33
  "JwksRetrievalOptionType",
34
+ "KmsKeyStatusType",
35
+ "KmsKeyTypeType",
34
36
  "ListAccountAssignmentCreationStatusPaginatorName",
35
37
  "ListAccountAssignmentDeletionStatusPaginatorName",
36
38
  "ListAccountAssignmentsForPrincipalPaginatorName",
@@ -63,6 +65,7 @@ __all__ = (
63
65
  "StatusValuesType",
64
66
  "TargetTypeType",
65
67
  "TrustedTokenIssuerTypeType",
68
+ "UserBackgroundSessionApplicationStatusType",
66
69
  )
67
70
 
68
71
 
@@ -79,8 +82,10 @@ GrantTypeType = Literal[
79
82
  InstanceAccessControlAttributeConfigurationStatusType = Literal[
80
83
  "CREATION_FAILED", "CREATION_IN_PROGRESS", "ENABLED"
81
84
  ]
82
- InstanceStatusType = Literal["ACTIVE", "CREATE_IN_PROGRESS", "DELETE_IN_PROGRESS"]
85
+ InstanceStatusType = Literal["ACTIVE", "CREATE_FAILED", "CREATE_IN_PROGRESS", "DELETE_IN_PROGRESS"]
83
86
  JwksRetrievalOptionType = Literal["OPEN_ID_DISCOVERY"]
87
+ KmsKeyStatusType = Literal["ENABLED", "UPDATE_FAILED", "UPDATING"]
88
+ KmsKeyTypeType = Literal["AWS_OWNED_KMS_KEY", "CUSTOMER_MANAGED_KEY"]
84
89
  ListAccountAssignmentCreationStatusPaginatorName = Literal[
85
90
  "list_account_assignment_creation_status"
86
91
  ]
@@ -126,6 +131,7 @@ SignInOriginType = Literal["APPLICATION", "IDENTITY_CENTER"]
126
131
  StatusValuesType = Literal["FAILED", "IN_PROGRESS", "SUCCEEDED"]
127
132
  TargetTypeType = Literal["AWS_ACCOUNT"]
128
133
  TrustedTokenIssuerTypeType = Literal["OIDC_JWT"]
134
+ UserBackgroundSessionApplicationStatusType = Literal["DISABLED", "ENABLED"]
129
135
  SSOAdminServiceName = Literal["sso-admin"]
130
136
  ServiceName = Literal[
131
137
  "accessanalyzer",
@@ -154,6 +160,7 @@ ServiceName = Literal[
154
160
  "appstream",
155
161
  "appsync",
156
162
  "apptest",
163
+ "arc-region-switch",
157
164
  "arc-zonal-shift",
158
165
  "artifact",
159
166
  "athena",
@@ -165,8 +172,10 @@ ServiceName = Literal[
165
172
  "backup-gateway",
166
173
  "backupsearch",
167
174
  "batch",
175
+ "bcm-dashboards",
168
176
  "bcm-data-exports",
169
177
  "bcm-pricing-calculator",
178
+ "bcm-recommended-actions",
170
179
  "bedrock",
171
180
  "bedrock-agent",
172
181
  "bedrock-agent-runtime",
@@ -408,8 +417,6 @@ ServiceName = Literal[
408
417
  "omics",
409
418
  "opensearch",
410
419
  "opensearchserverless",
411
- "opsworks",
412
- "opsworkscm",
413
420
  "organizations",
414
421
  "osis",
415
422
  "outposts",
@@ -491,7 +498,6 @@ ServiceName = Literal[
491
498
  "shield",
492
499
  "signer",
493
500
  "simspaceweaver",
494
- "sms",
495
501
  "snow-device-management",
496
502
  "snowball",
497
503
  "sns",
@@ -542,16 +548,7 @@ ServiceName = Literal[
542
548
  "xray",
543
549
  ]
544
550
  ResourceServiceName = Literal[
545
- "cloudformation",
546
- "cloudwatch",
547
- "dynamodb",
548
- "ec2",
549
- "glacier",
550
- "iam",
551
- "opsworks",
552
- "s3",
553
- "sns",
554
- "sqs",
551
+ "cloudformation", "cloudwatch", "dynamodb", "ec2", "glacier", "iam", "s3", "sns", "sqs"
555
552
  ]
556
553
  PaginatorName = Literal[
557
554
  "list_account_assignment_creation_status",
@@ -30,6 +30,8 @@ __all__ = (
30
30
  "InstanceAccessControlAttributeConfigurationStatusType",
31
31
  "InstanceStatusType",
32
32
  "JwksRetrievalOptionType",
33
+ "KmsKeyStatusType",
34
+ "KmsKeyTypeType",
33
35
  "ListAccountAssignmentCreationStatusPaginatorName",
34
36
  "ListAccountAssignmentDeletionStatusPaginatorName",
35
37
  "ListAccountAssignmentsForPrincipalPaginatorName",
@@ -62,6 +64,7 @@ __all__ = (
62
64
  "StatusValuesType",
63
65
  "TargetTypeType",
64
66
  "TrustedTokenIssuerTypeType",
67
+ "UserBackgroundSessionApplicationStatusType",
65
68
  )
66
69
 
67
70
  ApplicationStatusType = Literal["DISABLED", "ENABLED"]
@@ -77,8 +80,10 @@ GrantTypeType = Literal[
77
80
  InstanceAccessControlAttributeConfigurationStatusType = Literal[
78
81
  "CREATION_FAILED", "CREATION_IN_PROGRESS", "ENABLED"
79
82
  ]
80
- InstanceStatusType = Literal["ACTIVE", "CREATE_IN_PROGRESS", "DELETE_IN_PROGRESS"]
83
+ InstanceStatusType = Literal["ACTIVE", "CREATE_FAILED", "CREATE_IN_PROGRESS", "DELETE_IN_PROGRESS"]
81
84
  JwksRetrievalOptionType = Literal["OPEN_ID_DISCOVERY"]
85
+ KmsKeyStatusType = Literal["ENABLED", "UPDATE_FAILED", "UPDATING"]
86
+ KmsKeyTypeType = Literal["AWS_OWNED_KMS_KEY", "CUSTOMER_MANAGED_KEY"]
82
87
  ListAccountAssignmentCreationStatusPaginatorName = Literal[
83
88
  "list_account_assignment_creation_status"
84
89
  ]
@@ -124,6 +129,7 @@ SignInOriginType = Literal["APPLICATION", "IDENTITY_CENTER"]
124
129
  StatusValuesType = Literal["FAILED", "IN_PROGRESS", "SUCCEEDED"]
125
130
  TargetTypeType = Literal["AWS_ACCOUNT"]
126
131
  TrustedTokenIssuerTypeType = Literal["OIDC_JWT"]
132
+ UserBackgroundSessionApplicationStatusType = Literal["DISABLED", "ENABLED"]
127
133
  SSOAdminServiceName = Literal["sso-admin"]
128
134
  ServiceName = Literal[
129
135
  "accessanalyzer",
@@ -152,6 +158,7 @@ ServiceName = Literal[
152
158
  "appstream",
153
159
  "appsync",
154
160
  "apptest",
161
+ "arc-region-switch",
155
162
  "arc-zonal-shift",
156
163
  "artifact",
157
164
  "athena",
@@ -163,8 +170,10 @@ ServiceName = Literal[
163
170
  "backup-gateway",
164
171
  "backupsearch",
165
172
  "batch",
173
+ "bcm-dashboards",
166
174
  "bcm-data-exports",
167
175
  "bcm-pricing-calculator",
176
+ "bcm-recommended-actions",
168
177
  "bedrock",
169
178
  "bedrock-agent",
170
179
  "bedrock-agent-runtime",
@@ -406,8 +415,6 @@ ServiceName = Literal[
406
415
  "omics",
407
416
  "opensearch",
408
417
  "opensearchserverless",
409
- "opsworks",
410
- "opsworkscm",
411
418
  "organizations",
412
419
  "osis",
413
420
  "outposts",
@@ -489,7 +496,6 @@ ServiceName = Literal[
489
496
  "shield",
490
497
  "signer",
491
498
  "simspaceweaver",
492
- "sms",
493
499
  "snow-device-management",
494
500
  "snowball",
495
501
  "sns",
@@ -540,16 +546,7 @@ ServiceName = Literal[
540
546
  "xray",
541
547
  ]
542
548
  ResourceServiceName = Literal[
543
- "cloudformation",
544
- "cloudwatch",
545
- "dynamodb",
546
- "ec2",
547
- "glacier",
548
- "iam",
549
- "opsworks",
550
- "s3",
551
- "sns",
552
- "sqs",
549
+ "cloudformation", "cloudwatch", "dynamodb", "ec2", "glacier", "iam", "s3", "sns", "sqs"
553
550
  ]
554
551
  PaginatorName = Literal[
555
552
  "list_account_assignment_creation_status",