|
6 | 6 | "jsonVersion":"1.1",
|
7 | 7 | "protocol":"json",
|
8 | 8 | "serviceAbbreviation":"Amazon EMR",
|
9 |
| - "serviceFullName":"Amazon Elastic MapReduce", |
| 9 | + "serviceFullName":"Amazon EMR", |
10 | 10 | "serviceId":"EMR",
|
11 | 11 | "signatureVersion":"v4",
|
12 | 12 | "targetPrefix":"ElasticMapReduce",
|
|
174 | 174 | {"shape":"InternalServerException"},
|
175 | 175 | {"shape":"InvalidRequestException"}
|
176 | 176 | ],
|
177 |
| - "documentation":"<p>Provides cluster-level details including status, hardware and software configuration, VPC settings, and so on. </p>" |
| 177 | + "documentation":"<p>Provides cluster-level details including status, hardware and software configuration, VPC settings, and so on.</p>" |
178 | 178 | },
|
179 | 179 | "DescribeJobFlows":{
|
180 | 180 | "name":"DescribeJobFlows",
|
|
594 | 594 | "errors":[
|
595 | 595 | {"shape":"InternalServerError"}
|
596 | 596 | ],
|
597 |
| - "documentation":"<p>Sets the <a>Cluster$VisibleToAllUsers</a> value for an EMR cluster. When <code>true</code>, IAM principals in the account can perform EMR cluster actions that their IAM policies allow. When <code>false</code>, only the IAM principal that created the cluster and the account root user can perform EMR actions on the cluster, regardless of IAM permissions policies attached to other IAM principals.</p> <p>This action works on running clusters. When you create a cluster, use the <a>RunJobFlowInput$VisibleToAllUsers</a> parameter.</p> <p>For more information, see <a href=\"https://docs.aws.amazon.com/emr/latest/ManagementGuide/security_iam_emr-with-iam.html#security_set_visible_to_all_users\">Understanding the EMR Cluster VisibleToAllUsers Setting</a> in the <i>Amazon EMR Management Guide</i>.</p>" |
| 597 | + "documentation":"<p>Sets the <a>Cluster$VisibleToAllUsers</a> value for an EMR cluster. When <code>true</code>, IAM principals in the account can perform EMR cluster actions that their IAM policies allow. When <code>false</code>, only the IAM principal that created the cluster and the account root user can perform EMR actions on the cluster, regardless of IAM permissions policies attached to other IAM principals.</p> <p>This action works on running clusters. When you create a cluster, use the <a>RunJobFlowInput$VisibleToAllUsers</a> parameter.</p> <p>For more information, see <a href=\"https://docs.aws.amazon.com/emr/latest/ManagementGuide/security_iam_emr-with-iam.html#security_set_visible_to_all_users\">Understanding the EMR Cluster VisibleToAllUsers Setting</a> in the <i>Amazon EMRManagement Guide</i>.</p>" |
598 | 598 | },
|
599 | 599 | "StartNotebookExecution":{
|
600 | 600 | "name":"StartNotebookExecution",
|
|
1156 | 1156 | },
|
1157 | 1157 | "VisibleToAllUsers":{
|
1158 | 1158 | "shape":"Boolean",
|
1159 |
| - "documentation":"<p>Indicates whether the cluster is visible to IAM principals in the account associated with the cluster. When <code>true</code>, IAM principals in the account can perform EMR cluster actions on the cluster that their IAM policies allow. When <code>false</code>, only the IAM principal that created the cluster and the account root user can perform EMR actions, regardless of IAM permissions policies attached to other IAM principals.</p> <p>The default value is <code>false</code> if a value is not provided when creating a cluster using the EMR API <a>RunJobFlow</a> command or the CLI <a href=\"https://docs.aws.amazon.com/cli/latest/reference/emr/create-cluster.html\">create-cluster</a> command. The default value is <code>true</code> when a cluster is created using the Management Console. IAM principals that are allowed to perform actions on the cluster can use the <a>SetVisibleToAllUsers</a> action to change the value on a running cluster. For more information, see <a href=\"https://docs.aws.amazon.com/emr/latest/ManagementGuide/security_iam_emr-with-iam.html#security_set_visible_to_all_users\">Understanding the EMR Cluster VisibleToAllUsers Setting</a> in the <i>Amazon EMR Management Guide</i>.</p>" |
| 1159 | + "documentation":"<p>Indicates whether the cluster is visible to IAM principals in the account associated with the cluster. When <code>true</code>, IAM principals in the account can perform EMR cluster actions on the cluster that their IAM policies allow. When <code>false</code>, only the IAM principal that created the cluster and the account root user can perform EMR actions, regardless of IAM permissions policies attached to other IAM principals.</p> <p>The default value is <code>true</code> if a value is not provided when creating a cluster using the EMR API <a>RunJobFlow</a> command, the CLI <a href=\"https://docs.aws.amazon.com/cli/latest/reference/emr/create-cluster.html\">create-cluster</a> command, or the Management Console. IAM principals that are allowed to perform actions on the cluster can use the <a>SetVisibleToAllUsers</a> action to change the value on a running cluster. For more information, see <a href=\"https://docs.aws.amazon.com/emr/latest/ManagementGuide/security_iam_emr-with-iam.html#security_set_visible_to_all_users\">Understanding the EMR Cluster VisibleToAllUsers Setting</a> in the <i>Amazon EMRManagement Guide</i>.</p>" |
1160 | 1160 | },
|
1161 | 1161 | "Applications":{
|
1162 | 1162 | "shape":"ApplicationList",
|
|
1556 | 1556 | },
|
1557 | 1557 | "IdentityId":{
|
1558 | 1558 | "shape":"XmlStringMaxLen256",
|
1559 |
| - "documentation":"<p>The globally unique identifier (GUID) of the user or group from the Amazon Web Services SSO Identity Store. For more information, see <a href=\"https://docs.aws.amazon.com/singlesignon/latest/IdentityStoreAPIReference/API_User.html#singlesignon-Type-User-UserId\">UserId</a> and <a href=\"https://docs.aws.amazon.com/singlesignon/latest/IdentityStoreAPIReference/API_Group.html#singlesignon-Type-Group-GroupId\">GroupId</a> in the <i>Amazon Web Services SSO Identity Store API Reference</i>. Either <code>IdentityName</code> or <code>IdentityId</code> must be specified.</p>" |
| 1559 | + "documentation":"<p>The globally unique identifier (GUID) of the user or group from the Amazon Web Services SSO Identity Store. For more information, see <a href=\"https://docs.aws.amazon.com/singlesignon/latest/IdentityStoreAPIReference/API_User.html#singlesignon-Type-User-UserId\">UserId</a> and <a href=\"https://docs.aws.amazon.com/singlesignon/latest/IdentityStoreAPIReference/API_Group.html#singlesignon-Type-Group-GroupId\">GroupId</a> in the <i>Amazon Web Services SSO Identity Store API Reference</i>. Either <code>IdentityName</code> or <code>IdentityId</code> must be specified, but not both.</p>" |
1560 | 1560 | },
|
1561 | 1561 | "IdentityName":{
|
1562 | 1562 | "shape":"XmlStringMaxLen256",
|
1563 |
| - "documentation":"<p>The name of the user or group. For more information, see <a href=\"https://docs.aws.amazon.com/singlesignon/latest/IdentityStoreAPIReference/API_User.html#singlesignon-Type-User-UserName\">UserName</a> and <a href=\"https://docs.aws.amazon.com/singlesignon/latest/IdentityStoreAPIReference/API_Group.html#singlesignon-Type-Group-DisplayName\">DisplayName</a> in the <i>Amazon Web Services SSO Identity Store API Reference</i>. Either <code>IdentityName</code> or <code>IdentityId</code> must be specified.</p>" |
| 1563 | + "documentation":"<p>The name of the user or group. For more information, see <a href=\"https://docs.aws.amazon.com/singlesignon/latest/IdentityStoreAPIReference/API_User.html#singlesignon-Type-User-UserName\">UserName</a> and <a href=\"https://docs.aws.amazon.com/singlesignon/latest/IdentityStoreAPIReference/API_Group.html#singlesignon-Type-Group-DisplayName\">DisplayName</a> in the <i>Amazon Web Services SSO Identity Store API Reference</i>. Either <code>IdentityName</code> or <code>IdentityId</code> must be specified, but not both.</p>" |
1564 | 1564 | },
|
1565 | 1565 | "IdentityType":{
|
1566 | 1566 | "shape":"IdentityType",
|
|
2433 | 2433 | "AutoScalingPolicy":{
|
2434 | 2434 | "shape":"AutoScalingPolicyDescription",
|
2435 | 2435 | "documentation":"<p>An automatic scaling policy for a core instance group or task instance group in an Amazon EMR cluster. The automatic scaling policy defines how an instance group dynamically adds and terminates EC2 instances in response to the value of a CloudWatch metric. See PutAutoScalingPolicy.</p>"
|
| 2436 | + }, |
| 2437 | + "CustomAmiId":{ |
| 2438 | + "shape":"XmlStringMaxLen256", |
| 2439 | + "documentation":"<p>The custom AMI ID to use for the provisioned instance group.</p>" |
2436 | 2440 | }
|
2437 | 2441 | },
|
2438 | 2442 | "documentation":"<p>This entity represents an instance group, which is a group of instances that have common purpose. For example, CORE instance group is used for HDFS.</p>"
|
|
2480 | 2484 | "AutoScalingPolicy":{
|
2481 | 2485 | "shape":"AutoScalingPolicy",
|
2482 | 2486 | "documentation":"<p>An automatic scaling policy for a core instance group or task instance group in an Amazon EMR cluster. The automatic scaling policy defines how an instance group dynamically adds and terminates EC2 instances in response to the value of a CloudWatch metric. See <a>PutAutoScalingPolicy</a>.</p>"
|
| 2487 | + }, |
| 2488 | + "CustomAmiId":{ |
| 2489 | + "shape":"XmlStringMaxLen256", |
| 2490 | + "documentation":"<p>The custom AMI ID to use for the provisioned instance group.</p>" |
2483 | 2491 | }
|
2484 | 2492 | },
|
2485 | 2493 | "documentation":"<p>Configuration defining a new instance group.</p>"
|
|
2555 | 2563 | "EndDateTime":{
|
2556 | 2564 | "shape":"Date",
|
2557 | 2565 | "documentation":"<p>The date/time the instance group was terminated.</p>"
|
| 2566 | + }, |
| 2567 | + "CustomAmiId":{ |
| 2568 | + "shape":"XmlStringMaxLen256", |
| 2569 | + "documentation":"<p>The custom AMI ID to use for the provisioned instance group.</p>" |
2558 | 2570 | }
|
2559 | 2571 | },
|
2560 | 2572 | "documentation":"<p>Detailed information about an instance group.</p>"
|
|
2828 | 2840 | "Configurations":{
|
2829 | 2841 | "shape":"ConfigurationList",
|
2830 | 2842 | "documentation":"<p>A configuration classification that applies when provisioning cluster instances, which can include configurations for applications and software that run on the cluster.</p>"
|
| 2843 | + }, |
| 2844 | + "CustomAmiId":{ |
| 2845 | + "shape":"XmlStringMaxLen256", |
| 2846 | + "documentation":"<p>The custom AMI ID to use for the instance type.</p>" |
2831 | 2847 | }
|
2832 | 2848 | },
|
2833 | 2849 | "documentation":"<p>An instance type configuration for each instance type in an instance fleet, which determines the EC2 instances Amazon EMR attempts to provision to fulfill On-Demand and Spot target capacities. When you use an allocation strategy, you can include a maximum of 30 instance type configurations for a fleet. For more information about how to use an allocation strategy, see <a href=\"https://docs.aws.amazon.com/emr/latest/ManagementGuide/emr-instance-fleet.html\">Configure Instance Fleets</a>. Without an allocation strategy, you may specify a maximum of five instance type configurations for a fleet.</p> <note> <p>The instance fleet configuration is available only in Amazon EMR versions 4.8.0 and later, excluding 5.0.x versions.</p> </note>"
|
|
2866 | 2882 | "EbsOptimized":{
|
2867 | 2883 | "shape":"BooleanObject",
|
2868 | 2884 | "documentation":"<p>Evaluates to <code>TRUE</code> when the specified <code>InstanceType</code> is EBS-optimized.</p>"
|
| 2885 | + }, |
| 2886 | + "CustomAmiId":{ |
| 2887 | + "shape":"XmlStringMaxLen256", |
| 2888 | + "documentation":"<p>The custom AMI ID to use for the instance type.</p>" |
2869 | 2889 | }
|
2870 | 2890 | },
|
2871 | 2891 | "documentation":"<p>The configuration specification for each instance type in an instance fleet.</p> <note> <p>The instance fleet configuration is available only in Amazon EMR versions 4.8.0 and later, excluding 5.0.x versions.</p> </note>"
|
|
2960 | 2980 | },
|
2961 | 2981 | "VisibleToAllUsers":{
|
2962 | 2982 | "shape":"Boolean",
|
2963 |
| - "documentation":"<p>Indicates whether the cluster is visible to IAM principals in the account associated with the cluster. When <code>true</code>, IAM principals in the account can perform EMR cluster actions that their IAM policies allow. When <code>false</code>, only the IAM principal that created the cluster and the account root user can perform EMR actions, regardless of IAM permissions policies attached to other IAM principals.</p> <p>The default value is <code>false</code> if a value is not provided when creating a cluster using the EMR API <a>RunJobFlow</a> command or the CLI <a href=\"https://docs.aws.amazon.com/cli/latest/reference/emr/create-cluster.html\">create-cluster</a> command. The default value is <code>true</code> when a cluster is created using the Management Console. IAM principals that are authorized to perform actions on the cluster can use the <a>SetVisibleToAllUsers</a> action to change the value on a running cluster. For more information, see <a href=\"https://docs.aws.amazon.com/emr/latest/ManagementGuide/security_iam_emr-with-iam.html#security_set_visible_to_all_users\">Understanding the EMR Cluster VisibleToAllUsers Setting</a> in the <i>Amazon EMR Management Guide</i>.</p>" |
| 2983 | + "documentation":"<p>Indicates whether the cluster is visible to IAM principals in the account associated with the cluster. When <code>true</code>, IAM principals in the account can perform EMR cluster actions that their IAM policies allow. When <code>false</code>, only the IAM principal that created the cluster and the account root user can perform EMR actions, regardless of IAM permissions policies attached to other IAM principals.</p> <p>The default value is <code>true</code> if a value is not provided when creating a cluster using the EMR API <a>RunJobFlow</a> command, the CLI <a href=\"https://docs.aws.amazon.com/cli/latest/reference/emr/create-cluster.html\">create-cluster</a> command, or the Management Console. IAM principals that are authorized to perform actions on the cluster can use the <a>SetVisibleToAllUsers</a> action to change the value on a running cluster. For more information, see <a href=\"https://docs.aws.amazon.com/emr/latest/ManagementGuide/security_iam_emr-with-iam.html#security_set_visible_to_all_users\">Understanding the EMR Cluster VisibleToAllUsers Setting</a> in the <i>Amazon EMRManagement Guide</i>.</p>" |
2964 | 2984 | },
|
2965 | 2985 | "JobFlowRole":{
|
2966 | 2986 | "shape":"XmlString",
|
|
3439 | 3459 | },
|
3440 | 3460 | "NextToken":{
|
3441 | 3461 | "shape":"String",
|
3442 |
| - "documentation":"<p>Specifies the next page of results. If <code>NextToken</code> is not specified, which is usually the case for the first request of ListReleaseLabels, the first page of results are determined by other filtering parameters or by the latest version. The <code>ListReleaseLabels</code> request fails if the identity (AWS AccountID) and all filtering parameters are different from the original request, or if the <code>NextToken</code> is expired or tampered with.</p>" |
| 3462 | + "documentation":"<p>Specifies the next page of results. If <code>NextToken</code> is not specified, which is usually the case for the first request of ListReleaseLabels, the first page of results are determined by other filtering parameters or by the latest version. The <code>ListReleaseLabels</code> request fails if the identity (account ID) and all filtering parameters are different from the original request, or if the <code>NextToken</code> is expired or tampered with.</p>" |
3443 | 3463 | },
|
3444 | 3464 | "MaxResults":{
|
3445 | 3465 | "shape":"MaxResultsNumber",
|
|
4125 | 4145 | },
|
4126 | 4146 | "VisibleToAllUsers":{
|
4127 | 4147 | "shape":"Boolean",
|
4128 |
| - "documentation":"<p>Set this value to <code>true</code> so that IAM principals in the account associated with the cluster can perform EMR actions on the cluster that their IAM policies allow. This value defaults to <code>false</code> for clusters created using the EMR API or the CLI <a href=\"https://docs.aws.amazon.com/cli/latest/reference/emr/create-cluster.html\">create-cluster</a> command.</p> <p>When set to <code>false</code>, only the IAM principal that created the cluster and the account root user can perform EMR actions for the cluster, regardless of the IAM permissions policies attached to other IAM principals. For more information, see <a href=\"https://docs.aws.amazon.com/emr/latest/ManagementGuide/security_iam_emr-with-iam.html#security_set_visible_to_all_users\">Understanding the EMR Cluster VisibleToAllUsers Setting</a> in the <i>Amazon EMR Management Guide</i>.</p>" |
| 4148 | + "documentation":"<p>Set this value to <code>true</code> so that IAM principals in the account associated with the cluster can perform EMR actions on the cluster that their IAM policies allow. This value defaults to <code>true</code> for clusters created using the EMR API or the CLI <a href=\"https://docs.aws.amazon.com/cli/latest/reference/emr/create-cluster.html\">create-cluster</a> command.</p> <p>When set to <code>false</code>, only the IAM principal that created the cluster and the account root user can perform EMR actions for the cluster, regardless of the IAM permissions policies attached to other IAM principals. For more information, see <a href=\"https://docs.aws.amazon.com/emr/latest/ManagementGuide/security_iam_emr-with-iam.html#security_set_visible_to_all_users\">Understanding the EMR Cluster VisibleToAllUsers Setting</a> in the <i>Amazon EMRManagement Guide</i>.</p>" |
4129 | 4149 | },
|
4130 | 4150 | "JobFlowRole":{
|
4131 | 4151 | "shape":"XmlString",
|
|
0 commit comments