aws-sdk-cloudwatchevents 1.10.0 → 1.11.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA1:
3
- metadata.gz: f3b63a276c1a7d39c5b5398964d0ddb0da65da9a
4
- data.tar.gz: eb2174198be763d95a5433bc2f70f1035bae0579
3
+ metadata.gz: c6ec113ceb1e8c65a60e93f4272490e2f87b203c
4
+ data.tar.gz: 67fd5d1e537b0cc1bcebe6c594b6dcb05614b3ba
5
5
  SHA512:
6
- metadata.gz: 532242ceede110c23cd53190e3ba605d028026064afbf047770f4169c961d65f32f63e66efe7f553d53cd98f34d4b6c2bc882bc106e2937530c09dff34689e48
7
- data.tar.gz: 692cfd24dc7e920815319d01990d70057846ab8ffe26f85f1baa884a574e6e9d5f1f12d5b0b77cdf09e7cd95078757493308644f4d0fb9d82634a0a4d231edc6
6
+ metadata.gz: 729fe895035b639e4cf795861552adc5860c83f8145f2c35c8ad1fca8da5f2d3e47ba00169181afab6a7fbcebcc0a22da2c91bea4d7f099b8c268114af0c4caf
7
+ data.tar.gz: c2028dca0a4ef335bcc7087b16419c30b7734c074bf91179043194313a15ef3e426b3a9ce144b6f71299a74f0c90a1d63e467f8b535a59339a5b39c0fd42d8a9
@@ -42,6 +42,6 @@ require_relative 'aws-sdk-cloudwatchevents/customizations'
42
42
  # @service
43
43
  module Aws::CloudWatchEvents
44
44
 
45
- GEM_VERSION = '1.10.0'
45
+ GEM_VERSION = '1.11.0'
46
46
 
47
47
  end
@@ -15,6 +15,7 @@ require 'aws-sdk-core/plugins/helpful_socket_errors.rb'
15
15
  require 'aws-sdk-core/plugins/retry_errors.rb'
16
16
  require 'aws-sdk-core/plugins/global_configuration.rb'
17
17
  require 'aws-sdk-core/plugins/regional_endpoint.rb'
18
+ require 'aws-sdk-core/plugins/endpoint_discovery.rb'
18
19
  require 'aws-sdk-core/plugins/response_paging.rb'
19
20
  require 'aws-sdk-core/plugins/stub_responses.rb'
20
21
  require 'aws-sdk-core/plugins/idempotency_token.rb'
@@ -45,6 +46,7 @@ module Aws::CloudWatchEvents
45
46
  add_plugin(Aws::Plugins::RetryErrors)
46
47
  add_plugin(Aws::Plugins::GlobalConfiguration)
47
48
  add_plugin(Aws::Plugins::RegionalEndpoint)
49
+ add_plugin(Aws::Plugins::EndpointDiscovery)
48
50
  add_plugin(Aws::Plugins::ResponsePaging)
49
51
  add_plugin(Aws::Plugins::StubResponses)
50
52
  add_plugin(Aws::Plugins::IdempotencyToken)
@@ -98,6 +100,10 @@ module Aws::CloudWatchEvents
98
100
  #
99
101
  # @option options [String] :access_key_id
100
102
  #
103
+ # @option options [Boolean] :active_endpoint_cache (false)
104
+ # When set to `true`, a thread polling for endpoints will be running in
105
+ # the background every 60 secs (default). Defaults to `false`.
106
+ #
101
107
  # @option options [Boolean] :client_side_monitoring (false)
102
108
  # When `true`, client-side metrics will be collected for all API requests from
103
109
  # this client.
@@ -123,6 +129,21 @@ module Aws::CloudWatchEvents
123
129
  # option. You should only configure an `:endpoint` when connecting
124
130
  # to test endpoints. This should be avalid HTTP(S) URI.
125
131
  #
132
+ # @option options [Integer] :endpoint_cache_max_entries (1000)
133
+ # Used for the maximum size limit of the LRU cache storing endpoints data
134
+ # for endpoint discovery enabled operations. Defaults to 1000.
135
+ #
136
+ # @option options [Integer] :endpoint_cache_max_threads (10)
137
+ # Used for the maximum threads in use for polling endpoints to be cached, defaults to 10.
138
+ #
139
+ # @option options [Integer] :endpoint_cache_poll_interval (60)
140
+ # When :endpoint_discovery and :active_endpoint_cache is enabled,
141
+ # Use this option to config the time interval in seconds for making
142
+ # requests fetching endpoints information. Defaults to 60 sec.
143
+ #
144
+ # @option options [Boolean] :endpoint_discovery (false)
145
+ # When set to `true`, endpoint discovery will be enabled for operations when available. Defaults to `false`.
146
+ #
126
147
  # @option options [Aws::Log::Formatter] :log_formatter (Aws::Log::Formatter.default)
127
148
  # The log formatter.
128
149
  #
@@ -558,9 +579,19 @@ module Aws::CloudWatchEvents
558
579
  # the AWS organization ID in `Condition`, to grant permissions to all
559
580
  # accounts in that organization.
560
581
  #
582
+ # If you grant permissions using an organization, then accounts in that
583
+ # organization must specify a `RoleArn` with proper permissions when
584
+ # they use `PutTarget` to add your account's event bus as a target. For
585
+ # more information, see [Sending and Receiving Events Between AWS
586
+ # Accounts][1] in the *Amazon CloudWatch Events User Guide*.
587
+ #
561
588
  # The permission policy on the default event bus cannot exceed 10 KB in
562
589
  # size.
563
590
  #
591
+ #
592
+ #
593
+ # [1]: http://docs.aws.amazon.com/AmazonCloudWatch/latest/events/CloudWatchEvents-CrossAccountEventDelivery.html
594
+ #
564
595
  # @option params [required, String] :action
565
596
  # The action that you are enabling the other account to perform.
566
597
  # Currently, this must be `events:PutEvents`.
@@ -650,6 +681,26 @@ module Aws::CloudWatchEvents
650
681
  # when creating event patterns so that they match the ARN syntax in the
651
682
  # event you want to match.
652
683
  #
684
+ # In CloudWatch Events, it is possible to create rules that lead to
685
+ # infinite loops, where a rule is fired repeatedly. For example, a rule
686
+ # might detect that ACLs have changed on an S3 bucket, and trigger
687
+ # software to change them to the desired state. If the rule is not
688
+ # written carefully, the subsequent change to the ACLs fires the rule
689
+ # again, creating an infinite loop.
690
+ #
691
+ # To prevent this, write the rules so that the triggered actions do not
692
+ # re-fire the same rule. For example, your rule could fire only if ACLs
693
+ # are found to be in a bad state, instead of after any change.
694
+ #
695
+ # An infinite loop can quickly cause higher than expected charges. We
696
+ # recommend that you use budgeting, which alerts you when charges exceed
697
+ # your specified limit. For more information, see [Managing Your Costs
698
+ # with Budgets][1].
699
+ #
700
+ #
701
+ #
702
+ # [1]: http://docs.aws.amazon.com/awsaccountbilling/latest/aboutv2/budgets-managing-costs.html
703
+ #
653
704
  # @option params [required, String] :name
654
705
  # The name of the rule that you are creating or updating.
655
706
  #
@@ -771,6 +822,13 @@ module Aws::CloudWatchEvents
771
822
  # is not charged. For more information, see [Amazon CloudWatch
772
823
  # Pricing][2].
773
824
  #
825
+ # If you are setting the event bus of another account as the target, and
826
+ # that account granted permission to your account through an
827
+ # organization instead of directly by the account ID, then you must
828
+ # specify a `RoleArn` with proper permissions in the `Target` structure.
829
+ # For more information, see [Sending and Receiving Events Between AWS
830
+ # Accounts][3] in the *Amazon CloudWatch Events User Guide*.
831
+ #
774
832
  # For more information about enabling cross-account events, see
775
833
  # PutPermission.
776
834
  #
@@ -811,6 +869,7 @@ module Aws::CloudWatchEvents
811
869
  #
812
870
  # [1]: http://docs.aws.amazon.com/AmazonCloudWatch/latest/events/auth-and-access-control-cwe.html
813
871
  # [2]: https://aws.amazon.com/cloudwatch/pricing/
872
+ # [3]: http://docs.aws.amazon.com/AmazonCloudWatch/latest/events/CloudWatchEvents-CrossAccountEventDelivery.html
814
873
  #
815
874
  # @option params [required, String] :rule
816
875
  # The name of the rule.
@@ -1029,7 +1088,7 @@ module Aws::CloudWatchEvents
1029
1088
  params: params,
1030
1089
  config: config)
1031
1090
  context[:gem_name] = 'aws-sdk-cloudwatchevents'
1032
- context[:gem_version] = '1.10.0'
1091
+ context[:gem_version] = '1.11.0'
1033
1092
  Seahorse::Client::Request.new(handlers, context)
1034
1093
  end
1035
1094
 
@@ -1291,6 +1291,17 @@ module Aws::CloudWatchEvents
1291
1291
  # a complete list of services and resources that can be set as a target,
1292
1292
  # see PutTargets.
1293
1293
  #
1294
+ # If you are setting the event bus of another account as the target, and
1295
+ # that account granted permission to your account through an
1296
+ # organization instead of directly by the account ID, then you must
1297
+ # specify a `RoleArn` with proper permissions in the `Target` structure.
1298
+ # For more information, see [Sending and Receiving Events Between AWS
1299
+ # Accounts][1] in the *Amazon CloudWatch Events User Guide*.
1300
+ #
1301
+ #
1302
+ #
1303
+ # [1]: http://docs.aws.amazon.com/AmazonCloudWatch/latest/events/CloudWatchEvents-CrossAccountEventDelivery.html
1304
+ #
1294
1305
  # @note When making an API call, you may pass Target
1295
1306
  # data as a hash:
1296
1307
  #
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-cloudwatchevents
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.10.0
4
+ version: 1.11.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2018-10-24 00:00:00.000000000 Z
11
+ date: 2018-11-08 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core