mypy-boto3-sso-admin 1.40.37__py3-none-any.whl → 1.41.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- mypy_boto3_sso_admin/__main__.py +4 -4
- mypy_boto3_sso_admin/client.py +34 -39
- mypy_boto3_sso_admin/client.pyi +34 -39
- mypy_boto3_sso_admin/literals.py +6 -7
- mypy_boto3_sso_admin/literals.pyi +6 -7
- mypy_boto3_sso_admin/type_defs.py +33 -38
- mypy_boto3_sso_admin/type_defs.pyi +33 -38
- mypy_boto3_sso_admin/version.py +1 -1
- {mypy_boto3_sso_admin-1.40.37.dist-info → mypy_boto3_sso_admin-1.41.0.dist-info}/METADATA +11 -25
- mypy_boto3_sso_admin-1.41.0.dist-info/RECORD +18 -0
- mypy_boto3_sso_admin-1.40.37.dist-info/RECORD +0 -18
- {mypy_boto3_sso_admin-1.40.37.dist-info → mypy_boto3_sso_admin-1.41.0.dist-info}/WHEEL +0 -0
- {mypy_boto3_sso_admin-1.40.37.dist-info → mypy_boto3_sso_admin-1.41.0.dist-info}/licenses/LICENSE +0 -0
- {mypy_boto3_sso_admin-1.40.37.dist-info → mypy_boto3_sso_admin-1.41.0.dist-info}/top_level.txt +0 -0
mypy_boto3_sso_admin/__main__.py
CHANGED
|
@@ -12,9 +12,9 @@ def print_info() -> None:
|
|
|
12
12
|
Print package info to stdout.
|
|
13
13
|
"""
|
|
14
14
|
sys.stdout.write(
|
|
15
|
-
"Type annotations for boto3 SSOAdmin 1.
|
|
16
|
-
"Version: 1.
|
|
17
|
-
"Builder version: 8.
|
|
15
|
+
"Type annotations for boto3 SSOAdmin 1.41.0\n"
|
|
16
|
+
"Version: 1.41.0\n"
|
|
17
|
+
"Builder version: 8.12.0\n"
|
|
18
18
|
"Docs: https://youtype.github.io/boto3_stubs_docs/mypy_boto3_sso_admin//\n"
|
|
19
19
|
"Boto3 docs: https://boto3.amazonaws.com/v1/documentation/api/latest/reference/services/sso-admin.html#ssoadmin\n"
|
|
20
20
|
"Other services: https://pypi.org/project/boto3-stubs/\n"
|
|
@@ -26,7 +26,7 @@ def print_version() -> None:
|
|
|
26
26
|
"""
|
|
27
27
|
Print package version to stdout.
|
|
28
28
|
"""
|
|
29
|
-
sys.stdout.write("1.
|
|
29
|
+
sys.stdout.write("1.41.0\n")
|
|
30
30
|
|
|
31
31
|
|
|
32
32
|
def main() -> None:
|
mypy_boto3_sso_admin/client.py
CHANGED
|
@@ -19,6 +19,7 @@ Usage::
|
|
|
19
19
|
from __future__ import annotations
|
|
20
20
|
|
|
21
21
|
import sys
|
|
22
|
+
from collections.abc import Mapping
|
|
22
23
|
from typing import Any, overload
|
|
23
24
|
|
|
24
25
|
from botocore.client import BaseClient, ClientMeta
|
|
@@ -170,12 +171,6 @@ from .type_defs import (
|
|
|
170
171
|
UpdateTrustedTokenIssuerRequestTypeDef,
|
|
171
172
|
)
|
|
172
173
|
|
|
173
|
-
if sys.version_info >= (3, 9):
|
|
174
|
-
from builtins import dict as Dict
|
|
175
|
-
from builtins import type as Type
|
|
176
|
-
from collections.abc import Mapping
|
|
177
|
-
else:
|
|
178
|
-
from typing import Dict, Mapping, Type
|
|
179
174
|
if sys.version_info >= (3, 12):
|
|
180
175
|
from typing import Literal, Unpack
|
|
181
176
|
else:
|
|
@@ -186,14 +181,14 @@ __all__ = ("SSOAdminClient",)
|
|
|
186
181
|
|
|
187
182
|
|
|
188
183
|
class Exceptions(BaseClientExceptions):
|
|
189
|
-
AccessDeniedException:
|
|
190
|
-
ClientError:
|
|
191
|
-
ConflictException:
|
|
192
|
-
InternalServerException:
|
|
193
|
-
ResourceNotFoundException:
|
|
194
|
-
ServiceQuotaExceededException:
|
|
195
|
-
ThrottlingException:
|
|
196
|
-
ValidationException:
|
|
184
|
+
AccessDeniedException: type[BotocoreClientError]
|
|
185
|
+
ClientError: type[BotocoreClientError]
|
|
186
|
+
ConflictException: type[BotocoreClientError]
|
|
187
|
+
InternalServerException: type[BotocoreClientError]
|
|
188
|
+
ResourceNotFoundException: type[BotocoreClientError]
|
|
189
|
+
ServiceQuotaExceededException: type[BotocoreClientError]
|
|
190
|
+
ThrottlingException: type[BotocoreClientError]
|
|
191
|
+
ValidationException: type[BotocoreClientError]
|
|
197
192
|
|
|
198
193
|
|
|
199
194
|
class SSOAdminClient(BaseClient):
|
|
@@ -233,7 +228,7 @@ class SSOAdminClient(BaseClient):
|
|
|
233
228
|
|
|
234
229
|
def attach_customer_managed_policy_reference_to_permission_set(
|
|
235
230
|
self, **kwargs: Unpack[AttachCustomerManagedPolicyReferenceToPermissionSetRequestTypeDef]
|
|
236
|
-
) ->
|
|
231
|
+
) -> dict[str, Any]:
|
|
237
232
|
"""
|
|
238
233
|
Attaches the specified customer managed policy to the specified
|
|
239
234
|
<a>PermissionSet</a>.
|
|
@@ -244,7 +239,7 @@ class SSOAdminClient(BaseClient):
|
|
|
244
239
|
|
|
245
240
|
def attach_managed_policy_to_permission_set(
|
|
246
241
|
self, **kwargs: Unpack[AttachManagedPolicyToPermissionSetRequestTypeDef]
|
|
247
|
-
) ->
|
|
242
|
+
) -> dict[str, Any]:
|
|
248
243
|
"""
|
|
249
244
|
Attaches an Amazon Web Services managed policy ARN to a permission set.
|
|
250
245
|
|
|
@@ -276,7 +271,7 @@ class SSOAdminClient(BaseClient):
|
|
|
276
271
|
|
|
277
272
|
def create_application_assignment(
|
|
278
273
|
self, **kwargs: Unpack[CreateApplicationAssignmentRequestTypeDef]
|
|
279
|
-
) ->
|
|
274
|
+
) -> dict[str, Any]:
|
|
280
275
|
"""
|
|
281
276
|
Grant application access to a user or group.
|
|
282
277
|
|
|
@@ -298,7 +293,7 @@ class SSOAdminClient(BaseClient):
|
|
|
298
293
|
|
|
299
294
|
def create_instance_access_control_attribute_configuration(
|
|
300
295
|
self, **kwargs: Unpack[CreateInstanceAccessControlAttributeConfigurationRequestTypeDef]
|
|
301
|
-
) ->
|
|
296
|
+
) -> dict[str, Any]:
|
|
302
297
|
"""
|
|
303
298
|
Enables the attributes-based access control (ABAC) feature for the specified
|
|
304
299
|
IAM Identity Center instance.
|
|
@@ -341,7 +336,7 @@ class SSOAdminClient(BaseClient):
|
|
|
341
336
|
|
|
342
337
|
def delete_application(
|
|
343
338
|
self, **kwargs: Unpack[DeleteApplicationRequestTypeDef]
|
|
344
|
-
) ->
|
|
339
|
+
) -> dict[str, Any]:
|
|
345
340
|
"""
|
|
346
341
|
Deletes the association with the application.
|
|
347
342
|
|
|
@@ -361,7 +356,7 @@ class SSOAdminClient(BaseClient):
|
|
|
361
356
|
|
|
362
357
|
def delete_application_assignment(
|
|
363
358
|
self, **kwargs: Unpack[DeleteApplicationAssignmentRequestTypeDef]
|
|
364
|
-
) ->
|
|
359
|
+
) -> dict[str, Any]:
|
|
365
360
|
"""
|
|
366
361
|
Revoke application access to an application by deleting application assignments
|
|
367
362
|
for a user or group.
|
|
@@ -392,7 +387,7 @@ class SSOAdminClient(BaseClient):
|
|
|
392
387
|
|
|
393
388
|
def delete_inline_policy_from_permission_set(
|
|
394
389
|
self, **kwargs: Unpack[DeleteInlinePolicyFromPermissionSetRequestTypeDef]
|
|
395
|
-
) ->
|
|
390
|
+
) -> dict[str, Any]:
|
|
396
391
|
"""
|
|
397
392
|
Deletes the inline policy from a specified permission set.
|
|
398
393
|
|
|
@@ -400,7 +395,7 @@ class SSOAdminClient(BaseClient):
|
|
|
400
395
|
[Show boto3-stubs documentation](https://youtype.github.io/boto3_stubs_docs/mypy_boto3_sso_admin/client/#delete_inline_policy_from_permission_set)
|
|
401
396
|
"""
|
|
402
397
|
|
|
403
|
-
def delete_instance(self, **kwargs: Unpack[DeleteInstanceRequestTypeDef]) ->
|
|
398
|
+
def delete_instance(self, **kwargs: Unpack[DeleteInstanceRequestTypeDef]) -> dict[str, Any]:
|
|
404
399
|
"""
|
|
405
400
|
Deletes the instance of IAM Identity Center.
|
|
406
401
|
|
|
@@ -410,7 +405,7 @@ class SSOAdminClient(BaseClient):
|
|
|
410
405
|
|
|
411
406
|
def delete_instance_access_control_attribute_configuration(
|
|
412
407
|
self, **kwargs: Unpack[DeleteInstanceAccessControlAttributeConfigurationRequestTypeDef]
|
|
413
|
-
) ->
|
|
408
|
+
) -> dict[str, Any]:
|
|
414
409
|
"""
|
|
415
410
|
Disables the attributes-based access control (ABAC) feature for the specified
|
|
416
411
|
IAM Identity Center instance and deletes all of the attribute mappings that
|
|
@@ -422,7 +417,7 @@ class SSOAdminClient(BaseClient):
|
|
|
422
417
|
|
|
423
418
|
def delete_permission_set(
|
|
424
419
|
self, **kwargs: Unpack[DeletePermissionSetRequestTypeDef]
|
|
425
|
-
) ->
|
|
420
|
+
) -> dict[str, Any]:
|
|
426
421
|
"""
|
|
427
422
|
Deletes the specified permission set.
|
|
428
423
|
|
|
@@ -432,7 +427,7 @@ class SSOAdminClient(BaseClient):
|
|
|
432
427
|
|
|
433
428
|
def delete_permissions_boundary_from_permission_set(
|
|
434
429
|
self, **kwargs: Unpack[DeletePermissionsBoundaryFromPermissionSetRequestTypeDef]
|
|
435
|
-
) ->
|
|
430
|
+
) -> dict[str, Any]:
|
|
436
431
|
"""
|
|
437
432
|
Deletes the permissions boundary from a specified <a>PermissionSet</a>.
|
|
438
433
|
|
|
@@ -442,7 +437,7 @@ class SSOAdminClient(BaseClient):
|
|
|
442
437
|
|
|
443
438
|
def delete_trusted_token_issuer(
|
|
444
439
|
self, **kwargs: Unpack[DeleteTrustedTokenIssuerRequestTypeDef]
|
|
445
|
-
) ->
|
|
440
|
+
) -> dict[str, Any]:
|
|
446
441
|
"""
|
|
447
442
|
Deletes a trusted token issuer configuration from an instance of IAM Identity
|
|
448
443
|
Center.
|
|
@@ -559,7 +554,7 @@ class SSOAdminClient(BaseClient):
|
|
|
559
554
|
|
|
560
555
|
def detach_customer_managed_policy_reference_from_permission_set(
|
|
561
556
|
self, **kwargs: Unpack[DetachCustomerManagedPolicyReferenceFromPermissionSetRequestTypeDef]
|
|
562
|
-
) ->
|
|
557
|
+
) -> dict[str, Any]:
|
|
563
558
|
"""
|
|
564
559
|
Detaches the specified customer managed policy from the specified
|
|
565
560
|
<a>PermissionSet</a>.
|
|
@@ -570,7 +565,7 @@ class SSOAdminClient(BaseClient):
|
|
|
570
565
|
|
|
571
566
|
def detach_managed_policy_from_permission_set(
|
|
572
567
|
self, **kwargs: Unpack[DetachManagedPolicyFromPermissionSetRequestTypeDef]
|
|
573
|
-
) ->
|
|
568
|
+
) -> dict[str, Any]:
|
|
574
569
|
"""
|
|
575
570
|
Detaches the attached Amazon Web Services managed policy ARN from the specified
|
|
576
571
|
permission set.
|
|
@@ -886,7 +881,7 @@ class SSOAdminClient(BaseClient):
|
|
|
886
881
|
|
|
887
882
|
def put_application_assignment_configuration(
|
|
888
883
|
self, **kwargs: Unpack[PutApplicationAssignmentConfigurationRequestTypeDef]
|
|
889
|
-
) ->
|
|
884
|
+
) -> dict[str, Any]:
|
|
890
885
|
"""
|
|
891
886
|
Configure how users gain access to an application.
|
|
892
887
|
|
|
@@ -916,7 +911,7 @@ class SSOAdminClient(BaseClient):
|
|
|
916
911
|
|
|
917
912
|
def put_application_session_configuration(
|
|
918
913
|
self, **kwargs: Unpack[PutApplicationSessionConfigurationRequestTypeDef]
|
|
919
|
-
) ->
|
|
914
|
+
) -> dict[str, Any]:
|
|
920
915
|
"""
|
|
921
916
|
Updates the session configuration for an application in IAM Identity Center.
|
|
922
917
|
|
|
@@ -926,7 +921,7 @@ class SSOAdminClient(BaseClient):
|
|
|
926
921
|
|
|
927
922
|
def put_inline_policy_to_permission_set(
|
|
928
923
|
self, **kwargs: Unpack[PutInlinePolicyToPermissionSetRequestTypeDef]
|
|
929
|
-
) ->
|
|
924
|
+
) -> dict[str, Any]:
|
|
930
925
|
"""
|
|
931
926
|
Attaches an inline policy to a permission set.
|
|
932
927
|
|
|
@@ -936,7 +931,7 @@ class SSOAdminClient(BaseClient):
|
|
|
936
931
|
|
|
937
932
|
def put_permissions_boundary_to_permission_set(
|
|
938
933
|
self, **kwargs: Unpack[PutPermissionsBoundaryToPermissionSetRequestTypeDef]
|
|
939
|
-
) ->
|
|
934
|
+
) -> dict[str, Any]:
|
|
940
935
|
"""
|
|
941
936
|
Attaches an Amazon Web Services managed or customer managed policy to the
|
|
942
937
|
specified <a>PermissionSet</a> as a permissions boundary.
|
|
@@ -945,7 +940,7 @@ class SSOAdminClient(BaseClient):
|
|
|
945
940
|
[Show boto3-stubs documentation](https://youtype.github.io/boto3_stubs_docs/mypy_boto3_sso_admin/client/#put_permissions_boundary_to_permission_set)
|
|
946
941
|
"""
|
|
947
942
|
|
|
948
|
-
def tag_resource(self, **kwargs: Unpack[TagResourceRequestTypeDef]) ->
|
|
943
|
+
def tag_resource(self, **kwargs: Unpack[TagResourceRequestTypeDef]) -> dict[str, Any]:
|
|
949
944
|
"""
|
|
950
945
|
Associates a set of tags with a specified resource.
|
|
951
946
|
|
|
@@ -953,7 +948,7 @@ class SSOAdminClient(BaseClient):
|
|
|
953
948
|
[Show boto3-stubs documentation](https://youtype.github.io/boto3_stubs_docs/mypy_boto3_sso_admin/client/#tag_resource)
|
|
954
949
|
"""
|
|
955
950
|
|
|
956
|
-
def untag_resource(self, **kwargs: Unpack[UntagResourceRequestTypeDef]) ->
|
|
951
|
+
def untag_resource(self, **kwargs: Unpack[UntagResourceRequestTypeDef]) -> dict[str, Any]:
|
|
957
952
|
"""
|
|
958
953
|
Disassociates a set of tags from a specified resource.
|
|
959
954
|
|
|
@@ -963,7 +958,7 @@ class SSOAdminClient(BaseClient):
|
|
|
963
958
|
|
|
964
959
|
def update_application(
|
|
965
960
|
self, **kwargs: Unpack[UpdateApplicationRequestTypeDef]
|
|
966
|
-
) ->
|
|
961
|
+
) -> dict[str, Any]:
|
|
967
962
|
"""
|
|
968
963
|
Updates application properties.
|
|
969
964
|
|
|
@@ -971,7 +966,7 @@ class SSOAdminClient(BaseClient):
|
|
|
971
966
|
[Show boto3-stubs documentation](https://youtype.github.io/boto3_stubs_docs/mypy_boto3_sso_admin/client/#update_application)
|
|
972
967
|
"""
|
|
973
968
|
|
|
974
|
-
def update_instance(self, **kwargs: Unpack[UpdateInstanceRequestTypeDef]) ->
|
|
969
|
+
def update_instance(self, **kwargs: Unpack[UpdateInstanceRequestTypeDef]) -> dict[str, Any]:
|
|
975
970
|
"""
|
|
976
971
|
Update the details for the instance of IAM Identity Center that is owned by the
|
|
977
972
|
Amazon Web Services account.
|
|
@@ -982,7 +977,7 @@ class SSOAdminClient(BaseClient):
|
|
|
982
977
|
|
|
983
978
|
def update_instance_access_control_attribute_configuration(
|
|
984
979
|
self, **kwargs: Unpack[UpdateInstanceAccessControlAttributeConfigurationRequestTypeDef]
|
|
985
|
-
) ->
|
|
980
|
+
) -> dict[str, Any]:
|
|
986
981
|
"""
|
|
987
982
|
Updates the IAM Identity Center identity store attributes that you can use with
|
|
988
983
|
the IAM Identity Center instance for attributes-based access control (ABAC).
|
|
@@ -993,7 +988,7 @@ class SSOAdminClient(BaseClient):
|
|
|
993
988
|
|
|
994
989
|
def update_permission_set(
|
|
995
990
|
self, **kwargs: Unpack[UpdatePermissionSetRequestTypeDef]
|
|
996
|
-
) ->
|
|
991
|
+
) -> dict[str, Any]:
|
|
997
992
|
"""
|
|
998
993
|
Updates an existing permission set.
|
|
999
994
|
|
|
@@ -1003,7 +998,7 @@ class SSOAdminClient(BaseClient):
|
|
|
1003
998
|
|
|
1004
999
|
def update_trusted_token_issuer(
|
|
1005
1000
|
self, **kwargs: Unpack[UpdateTrustedTokenIssuerRequestTypeDef]
|
|
1006
|
-
) ->
|
|
1001
|
+
) -> dict[str, Any]:
|
|
1007
1002
|
"""
|
|
1008
1003
|
Updates the name of the trusted token issuer, or the path of a source attribute
|
|
1009
1004
|
or destination attribute for a trusted token issuer configuration.
|
mypy_boto3_sso_admin/client.pyi
CHANGED
|
@@ -19,6 +19,7 @@ Usage::
|
|
|
19
19
|
from __future__ import annotations
|
|
20
20
|
|
|
21
21
|
import sys
|
|
22
|
+
from collections.abc import Mapping
|
|
22
23
|
from typing import Any, overload
|
|
23
24
|
|
|
24
25
|
from botocore.client import BaseClient, ClientMeta
|
|
@@ -170,12 +171,6 @@ from .type_defs import (
|
|
|
170
171
|
UpdateTrustedTokenIssuerRequestTypeDef,
|
|
171
172
|
)
|
|
172
173
|
|
|
173
|
-
if sys.version_info >= (3, 9):
|
|
174
|
-
from builtins import dict as Dict
|
|
175
|
-
from builtins import type as Type
|
|
176
|
-
from collections.abc import Mapping
|
|
177
|
-
else:
|
|
178
|
-
from typing import Dict, Mapping, Type
|
|
179
174
|
if sys.version_info >= (3, 12):
|
|
180
175
|
from typing import Literal, Unpack
|
|
181
176
|
else:
|
|
@@ -184,14 +179,14 @@ else:
|
|
|
184
179
|
__all__ = ("SSOAdminClient",)
|
|
185
180
|
|
|
186
181
|
class Exceptions(BaseClientExceptions):
|
|
187
|
-
AccessDeniedException:
|
|
188
|
-
ClientError:
|
|
189
|
-
ConflictException:
|
|
190
|
-
InternalServerException:
|
|
191
|
-
ResourceNotFoundException:
|
|
192
|
-
ServiceQuotaExceededException:
|
|
193
|
-
ThrottlingException:
|
|
194
|
-
ValidationException:
|
|
182
|
+
AccessDeniedException: type[BotocoreClientError]
|
|
183
|
+
ClientError: type[BotocoreClientError]
|
|
184
|
+
ConflictException: type[BotocoreClientError]
|
|
185
|
+
InternalServerException: type[BotocoreClientError]
|
|
186
|
+
ResourceNotFoundException: type[BotocoreClientError]
|
|
187
|
+
ServiceQuotaExceededException: type[BotocoreClientError]
|
|
188
|
+
ThrottlingException: type[BotocoreClientError]
|
|
189
|
+
ValidationException: type[BotocoreClientError]
|
|
195
190
|
|
|
196
191
|
class SSOAdminClient(BaseClient):
|
|
197
192
|
"""
|
|
@@ -230,7 +225,7 @@ class SSOAdminClient(BaseClient):
|
|
|
230
225
|
|
|
231
226
|
def attach_customer_managed_policy_reference_to_permission_set(
|
|
232
227
|
self, **kwargs: Unpack[AttachCustomerManagedPolicyReferenceToPermissionSetRequestTypeDef]
|
|
233
|
-
) ->
|
|
228
|
+
) -> dict[str, Any]:
|
|
234
229
|
"""
|
|
235
230
|
Attaches the specified customer managed policy to the specified
|
|
236
231
|
<a>PermissionSet</a>.
|
|
@@ -241,7 +236,7 @@ class SSOAdminClient(BaseClient):
|
|
|
241
236
|
|
|
242
237
|
def attach_managed_policy_to_permission_set(
|
|
243
238
|
self, **kwargs: Unpack[AttachManagedPolicyToPermissionSetRequestTypeDef]
|
|
244
|
-
) ->
|
|
239
|
+
) -> dict[str, Any]:
|
|
245
240
|
"""
|
|
246
241
|
Attaches an Amazon Web Services managed policy ARN to a permission set.
|
|
247
242
|
|
|
@@ -273,7 +268,7 @@ class SSOAdminClient(BaseClient):
|
|
|
273
268
|
|
|
274
269
|
def create_application_assignment(
|
|
275
270
|
self, **kwargs: Unpack[CreateApplicationAssignmentRequestTypeDef]
|
|
276
|
-
) ->
|
|
271
|
+
) -> dict[str, Any]:
|
|
277
272
|
"""
|
|
278
273
|
Grant application access to a user or group.
|
|
279
274
|
|
|
@@ -295,7 +290,7 @@ class SSOAdminClient(BaseClient):
|
|
|
295
290
|
|
|
296
291
|
def create_instance_access_control_attribute_configuration(
|
|
297
292
|
self, **kwargs: Unpack[CreateInstanceAccessControlAttributeConfigurationRequestTypeDef]
|
|
298
|
-
) ->
|
|
293
|
+
) -> dict[str, Any]:
|
|
299
294
|
"""
|
|
300
295
|
Enables the attributes-based access control (ABAC) feature for the specified
|
|
301
296
|
IAM Identity Center instance.
|
|
@@ -338,7 +333,7 @@ class SSOAdminClient(BaseClient):
|
|
|
338
333
|
|
|
339
334
|
def delete_application(
|
|
340
335
|
self, **kwargs: Unpack[DeleteApplicationRequestTypeDef]
|
|
341
|
-
) ->
|
|
336
|
+
) -> dict[str, Any]:
|
|
342
337
|
"""
|
|
343
338
|
Deletes the association with the application.
|
|
344
339
|
|
|
@@ -358,7 +353,7 @@ class SSOAdminClient(BaseClient):
|
|
|
358
353
|
|
|
359
354
|
def delete_application_assignment(
|
|
360
355
|
self, **kwargs: Unpack[DeleteApplicationAssignmentRequestTypeDef]
|
|
361
|
-
) ->
|
|
356
|
+
) -> dict[str, Any]:
|
|
362
357
|
"""
|
|
363
358
|
Revoke application access to an application by deleting application assignments
|
|
364
359
|
for a user or group.
|
|
@@ -389,7 +384,7 @@ class SSOAdminClient(BaseClient):
|
|
|
389
384
|
|
|
390
385
|
def delete_inline_policy_from_permission_set(
|
|
391
386
|
self, **kwargs: Unpack[DeleteInlinePolicyFromPermissionSetRequestTypeDef]
|
|
392
|
-
) ->
|
|
387
|
+
) -> dict[str, Any]:
|
|
393
388
|
"""
|
|
394
389
|
Deletes the inline policy from a specified permission set.
|
|
395
390
|
|
|
@@ -397,7 +392,7 @@ class SSOAdminClient(BaseClient):
|
|
|
397
392
|
[Show boto3-stubs documentation](https://youtype.github.io/boto3_stubs_docs/mypy_boto3_sso_admin/client/#delete_inline_policy_from_permission_set)
|
|
398
393
|
"""
|
|
399
394
|
|
|
400
|
-
def delete_instance(self, **kwargs: Unpack[DeleteInstanceRequestTypeDef]) ->
|
|
395
|
+
def delete_instance(self, **kwargs: Unpack[DeleteInstanceRequestTypeDef]) -> dict[str, Any]:
|
|
401
396
|
"""
|
|
402
397
|
Deletes the instance of IAM Identity Center.
|
|
403
398
|
|
|
@@ -407,7 +402,7 @@ class SSOAdminClient(BaseClient):
|
|
|
407
402
|
|
|
408
403
|
def delete_instance_access_control_attribute_configuration(
|
|
409
404
|
self, **kwargs: Unpack[DeleteInstanceAccessControlAttributeConfigurationRequestTypeDef]
|
|
410
|
-
) ->
|
|
405
|
+
) -> dict[str, Any]:
|
|
411
406
|
"""
|
|
412
407
|
Disables the attributes-based access control (ABAC) feature for the specified
|
|
413
408
|
IAM Identity Center instance and deletes all of the attribute mappings that
|
|
@@ -419,7 +414,7 @@ class SSOAdminClient(BaseClient):
|
|
|
419
414
|
|
|
420
415
|
def delete_permission_set(
|
|
421
416
|
self, **kwargs: Unpack[DeletePermissionSetRequestTypeDef]
|
|
422
|
-
) ->
|
|
417
|
+
) -> dict[str, Any]:
|
|
423
418
|
"""
|
|
424
419
|
Deletes the specified permission set.
|
|
425
420
|
|
|
@@ -429,7 +424,7 @@ class SSOAdminClient(BaseClient):
|
|
|
429
424
|
|
|
430
425
|
def delete_permissions_boundary_from_permission_set(
|
|
431
426
|
self, **kwargs: Unpack[DeletePermissionsBoundaryFromPermissionSetRequestTypeDef]
|
|
432
|
-
) ->
|
|
427
|
+
) -> dict[str, Any]:
|
|
433
428
|
"""
|
|
434
429
|
Deletes the permissions boundary from a specified <a>PermissionSet</a>.
|
|
435
430
|
|
|
@@ -439,7 +434,7 @@ class SSOAdminClient(BaseClient):
|
|
|
439
434
|
|
|
440
435
|
def delete_trusted_token_issuer(
|
|
441
436
|
self, **kwargs: Unpack[DeleteTrustedTokenIssuerRequestTypeDef]
|
|
442
|
-
) ->
|
|
437
|
+
) -> dict[str, Any]:
|
|
443
438
|
"""
|
|
444
439
|
Deletes a trusted token issuer configuration from an instance of IAM Identity
|
|
445
440
|
Center.
|
|
@@ -556,7 +551,7 @@ class SSOAdminClient(BaseClient):
|
|
|
556
551
|
|
|
557
552
|
def detach_customer_managed_policy_reference_from_permission_set(
|
|
558
553
|
self, **kwargs: Unpack[DetachCustomerManagedPolicyReferenceFromPermissionSetRequestTypeDef]
|
|
559
|
-
) ->
|
|
554
|
+
) -> dict[str, Any]:
|
|
560
555
|
"""
|
|
561
556
|
Detaches the specified customer managed policy from the specified
|
|
562
557
|
<a>PermissionSet</a>.
|
|
@@ -567,7 +562,7 @@ class SSOAdminClient(BaseClient):
|
|
|
567
562
|
|
|
568
563
|
def detach_managed_policy_from_permission_set(
|
|
569
564
|
self, **kwargs: Unpack[DetachManagedPolicyFromPermissionSetRequestTypeDef]
|
|
570
|
-
) ->
|
|
565
|
+
) -> dict[str, Any]:
|
|
571
566
|
"""
|
|
572
567
|
Detaches the attached Amazon Web Services managed policy ARN from the specified
|
|
573
568
|
permission set.
|
|
@@ -883,7 +878,7 @@ class SSOAdminClient(BaseClient):
|
|
|
883
878
|
|
|
884
879
|
def put_application_assignment_configuration(
|
|
885
880
|
self, **kwargs: Unpack[PutApplicationAssignmentConfigurationRequestTypeDef]
|
|
886
|
-
) ->
|
|
881
|
+
) -> dict[str, Any]:
|
|
887
882
|
"""
|
|
888
883
|
Configure how users gain access to an application.
|
|
889
884
|
|
|
@@ -913,7 +908,7 @@ class SSOAdminClient(BaseClient):
|
|
|
913
908
|
|
|
914
909
|
def put_application_session_configuration(
|
|
915
910
|
self, **kwargs: Unpack[PutApplicationSessionConfigurationRequestTypeDef]
|
|
916
|
-
) ->
|
|
911
|
+
) -> dict[str, Any]:
|
|
917
912
|
"""
|
|
918
913
|
Updates the session configuration for an application in IAM Identity Center.
|
|
919
914
|
|
|
@@ -923,7 +918,7 @@ class SSOAdminClient(BaseClient):
|
|
|
923
918
|
|
|
924
919
|
def put_inline_policy_to_permission_set(
|
|
925
920
|
self, **kwargs: Unpack[PutInlinePolicyToPermissionSetRequestTypeDef]
|
|
926
|
-
) ->
|
|
921
|
+
) -> dict[str, Any]:
|
|
927
922
|
"""
|
|
928
923
|
Attaches an inline policy to a permission set.
|
|
929
924
|
|
|
@@ -933,7 +928,7 @@ class SSOAdminClient(BaseClient):
|
|
|
933
928
|
|
|
934
929
|
def put_permissions_boundary_to_permission_set(
|
|
935
930
|
self, **kwargs: Unpack[PutPermissionsBoundaryToPermissionSetRequestTypeDef]
|
|
936
|
-
) ->
|
|
931
|
+
) -> dict[str, Any]:
|
|
937
932
|
"""
|
|
938
933
|
Attaches an Amazon Web Services managed or customer managed policy to the
|
|
939
934
|
specified <a>PermissionSet</a> as a permissions boundary.
|
|
@@ -942,7 +937,7 @@ class SSOAdminClient(BaseClient):
|
|
|
942
937
|
[Show boto3-stubs documentation](https://youtype.github.io/boto3_stubs_docs/mypy_boto3_sso_admin/client/#put_permissions_boundary_to_permission_set)
|
|
943
938
|
"""
|
|
944
939
|
|
|
945
|
-
def tag_resource(self, **kwargs: Unpack[TagResourceRequestTypeDef]) ->
|
|
940
|
+
def tag_resource(self, **kwargs: Unpack[TagResourceRequestTypeDef]) -> dict[str, Any]:
|
|
946
941
|
"""
|
|
947
942
|
Associates a set of tags with a specified resource.
|
|
948
943
|
|
|
@@ -950,7 +945,7 @@ class SSOAdminClient(BaseClient):
|
|
|
950
945
|
[Show boto3-stubs documentation](https://youtype.github.io/boto3_stubs_docs/mypy_boto3_sso_admin/client/#tag_resource)
|
|
951
946
|
"""
|
|
952
947
|
|
|
953
|
-
def untag_resource(self, **kwargs: Unpack[UntagResourceRequestTypeDef]) ->
|
|
948
|
+
def untag_resource(self, **kwargs: Unpack[UntagResourceRequestTypeDef]) -> dict[str, Any]:
|
|
954
949
|
"""
|
|
955
950
|
Disassociates a set of tags from a specified resource.
|
|
956
951
|
|
|
@@ -960,7 +955,7 @@ class SSOAdminClient(BaseClient):
|
|
|
960
955
|
|
|
961
956
|
def update_application(
|
|
962
957
|
self, **kwargs: Unpack[UpdateApplicationRequestTypeDef]
|
|
963
|
-
) ->
|
|
958
|
+
) -> dict[str, Any]:
|
|
964
959
|
"""
|
|
965
960
|
Updates application properties.
|
|
966
961
|
|
|
@@ -968,7 +963,7 @@ class SSOAdminClient(BaseClient):
|
|
|
968
963
|
[Show boto3-stubs documentation](https://youtype.github.io/boto3_stubs_docs/mypy_boto3_sso_admin/client/#update_application)
|
|
969
964
|
"""
|
|
970
965
|
|
|
971
|
-
def update_instance(self, **kwargs: Unpack[UpdateInstanceRequestTypeDef]) ->
|
|
966
|
+
def update_instance(self, **kwargs: Unpack[UpdateInstanceRequestTypeDef]) -> dict[str, Any]:
|
|
972
967
|
"""
|
|
973
968
|
Update the details for the instance of IAM Identity Center that is owned by the
|
|
974
969
|
Amazon Web Services account.
|
|
@@ -979,7 +974,7 @@ class SSOAdminClient(BaseClient):
|
|
|
979
974
|
|
|
980
975
|
def update_instance_access_control_attribute_configuration(
|
|
981
976
|
self, **kwargs: Unpack[UpdateInstanceAccessControlAttributeConfigurationRequestTypeDef]
|
|
982
|
-
) ->
|
|
977
|
+
) -> dict[str, Any]:
|
|
983
978
|
"""
|
|
984
979
|
Updates the IAM Identity Center identity store attributes that you can use with
|
|
985
980
|
the IAM Identity Center instance for attributes-based access control (ABAC).
|
|
@@ -990,7 +985,7 @@ class SSOAdminClient(BaseClient):
|
|
|
990
985
|
|
|
991
986
|
def update_permission_set(
|
|
992
987
|
self, **kwargs: Unpack[UpdatePermissionSetRequestTypeDef]
|
|
993
|
-
) ->
|
|
988
|
+
) -> dict[str, Any]:
|
|
994
989
|
"""
|
|
995
990
|
Updates an existing permission set.
|
|
996
991
|
|
|
@@ -1000,7 +995,7 @@ class SSOAdminClient(BaseClient):
|
|
|
1000
995
|
|
|
1001
996
|
def update_trusted_token_issuer(
|
|
1002
997
|
self, **kwargs: Unpack[UpdateTrustedTokenIssuerRequestTypeDef]
|
|
1003
|
-
) ->
|
|
998
|
+
) -> dict[str, Any]:
|
|
1004
999
|
"""
|
|
1005
1000
|
Updates the name of the trusted token issuer, or the path of a source attribute
|
|
1006
1001
|
or destination attribute for a trusted token issuer configuration.
|
mypy_boto3_sso_admin/literals.py
CHANGED
|
@@ -159,7 +159,6 @@ ServiceName = Literal[
|
|
|
159
159
|
"apprunner",
|
|
160
160
|
"appstream",
|
|
161
161
|
"appsync",
|
|
162
|
-
"apptest",
|
|
163
162
|
"arc-region-switch",
|
|
164
163
|
"arc-zonal-shift",
|
|
165
164
|
"artifact",
|
|
@@ -327,7 +326,6 @@ ServiceName = Literal[
|
|
|
327
326
|
"iotdeviceadvisor",
|
|
328
327
|
"iotevents",
|
|
329
328
|
"iotevents-data",
|
|
330
|
-
"iotfleethub",
|
|
331
329
|
"iotfleetwise",
|
|
332
330
|
"iotsecuretunneling",
|
|
333
331
|
"iotsitewise",
|
|
@@ -366,8 +364,6 @@ ServiceName = Literal[
|
|
|
366
364
|
"location",
|
|
367
365
|
"logs",
|
|
368
366
|
"lookoutequipment",
|
|
369
|
-
"lookoutmetrics",
|
|
370
|
-
"lookoutvision",
|
|
371
367
|
"m2",
|
|
372
368
|
"machinelearning",
|
|
373
369
|
"macie2",
|
|
@@ -402,6 +398,7 @@ ServiceName = Literal[
|
|
|
402
398
|
"mq",
|
|
403
399
|
"mturk",
|
|
404
400
|
"mwaa",
|
|
401
|
+
"mwaa-serverless",
|
|
405
402
|
"neptune",
|
|
406
403
|
"neptune-graph",
|
|
407
404
|
"neptunedata",
|
|
@@ -421,6 +418,7 @@ ServiceName = Literal[
|
|
|
421
418
|
"osis",
|
|
422
419
|
"outposts",
|
|
423
420
|
"panorama",
|
|
421
|
+
"partnercentral-channel",
|
|
424
422
|
"partnercentral-selling",
|
|
425
423
|
"payment-cryptography",
|
|
426
424
|
"payment-cryptography-data",
|
|
@@ -442,8 +440,6 @@ ServiceName = Literal[
|
|
|
442
440
|
"qapps",
|
|
443
441
|
"qbusiness",
|
|
444
442
|
"qconnect",
|
|
445
|
-
"qldb",
|
|
446
|
-
"qldb-session",
|
|
447
443
|
"quicksight",
|
|
448
444
|
"ram",
|
|
449
445
|
"rbin",
|
|
@@ -458,7 +454,6 @@ ServiceName = Literal[
|
|
|
458
454
|
"resource-explorer-2",
|
|
459
455
|
"resource-groups",
|
|
460
456
|
"resourcegroupstaggingapi",
|
|
461
|
-
"robomaker",
|
|
462
457
|
"rolesanywhere",
|
|
463
458
|
"route53",
|
|
464
459
|
"route53-recovery-cluster",
|
|
@@ -467,6 +462,7 @@ ServiceName = Literal[
|
|
|
467
462
|
"route53domains",
|
|
468
463
|
"route53profiles",
|
|
469
464
|
"route53resolver",
|
|
465
|
+
"rtbfabric",
|
|
470
466
|
"rum",
|
|
471
467
|
"s3",
|
|
472
468
|
"s3control",
|
|
@@ -497,6 +493,7 @@ ServiceName = Literal[
|
|
|
497
493
|
"sesv2",
|
|
498
494
|
"shield",
|
|
499
495
|
"signer",
|
|
496
|
+
"signin",
|
|
500
497
|
"simspaceweaver",
|
|
501
498
|
"snow-device-management",
|
|
502
499
|
"snowball",
|
|
@@ -585,6 +582,7 @@ RegionName = Literal[
|
|
|
585
582
|
"ap-southeast-3",
|
|
586
583
|
"ap-southeast-4",
|
|
587
584
|
"ap-southeast-5",
|
|
585
|
+
"ap-southeast-7",
|
|
588
586
|
"ca-central-1",
|
|
589
587
|
"ca-west-1",
|
|
590
588
|
"eu-central-1",
|
|
@@ -598,6 +596,7 @@ RegionName = Literal[
|
|
|
598
596
|
"il-central-1",
|
|
599
597
|
"me-central-1",
|
|
600
598
|
"me-south-1",
|
|
599
|
+
"mx-central-1",
|
|
601
600
|
"sa-east-1",
|
|
602
601
|
"us-east-1",
|
|
603
602
|
"us-east-2",
|