aws-sdk-ec2 1.90.0 → 1.91.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA1:
3
- metadata.gz: 96e7d054bd65722fcb9118bd156d719e5233926d
4
- data.tar.gz: ad51ff1006c44c11b8d8660835935bcc79326b4d
3
+ metadata.gz: 5bb12febcf31504c2be445f7593265ef73adaf17
4
+ data.tar.gz: 4a8cc2e7e498c29db0078ac870d9d69cc000eae1
5
5
  SHA512:
6
- metadata.gz: 856bb69c739beb0faad3cca25b8cc5f298571b1dd09f05e54dd18f65159c8931b53077220cf6481ce1d83f17c68f737d0b2f896761c130461871e19ab62c743b
7
- data.tar.gz: 9c0f55945ff836d366ff9d3f5c5d88db99f140696e8544650228bc0feb05c9f9474a844d1a965b73c8336c6f9808c0ce4b10347aee40443c07f8c0c30304e578
6
+ metadata.gz: a2b435d527cb86d5cb69cfc803dee6d5b16c49f1ac07499943aff76268d8b6f9056a956c20b5cad73cd554e5ab06ac4d54d6d6fc8bebc4a7cc46d059b6be4c19
7
+ data.tar.gz: a5e27153821a075500b416913dd96ae17ce59ea8dd279cdb0e5633cd4bc35aba4f933f75e167a8f1fccec5be0aa240564e2c65ee597b32d5e602317014e898df
@@ -65,6 +65,6 @@ require_relative 'aws-sdk-ec2/customizations'
65
65
  # @service
66
66
  module Aws::EC2
67
67
 
68
- GEM_VERSION = '1.90.0'
68
+ GEM_VERSION = '1.91.0'
69
69
 
70
70
  end
@@ -1396,7 +1396,7 @@ module Aws::EC2
1396
1396
  # resp.association.transit_gateway_route_table_id #=> String
1397
1397
  # resp.association.transit_gateway_attachment_id #=> String
1398
1398
  # resp.association.resource_id #=> String
1399
- # resp.association.resource_type #=> String, one of "vpc", "vpn"
1399
+ # resp.association.resource_type #=> String, one of "vpc", "vpn", "direct-connect-gateway"
1400
1400
  # resp.association.state #=> String, one of "associating", "associated", "disassociating", "disassociated"
1401
1401
  #
1402
1402
  # @see http://docs.aws.amazon.com/goto/WebAPI/ec2-2016-11-15/AssociateTransitGatewayRouteTable AWS API Documentation
@@ -1635,15 +1635,12 @@ module Aws::EC2
1635
1635
  # Attaches an EBS volume to a running or stopped instance and exposes it
1636
1636
  # to the instance with the specified device name.
1637
1637
  #
1638
- # Encrypted EBS volumes may only be attached to instances that support
1638
+ # Encrypted EBS volumes must be attached to instances that support
1639
1639
  # Amazon EBS encryption. For more information, see [Amazon EBS
1640
1640
  # Encryption][1] in the *Amazon Elastic Compute Cloud User Guide*.
1641
1641
  #
1642
- # For a list of supported device names, see [Attaching an EBS Volume to
1643
- # an Instance][2]. Any device names that aren't reserved for instance
1644
- # store volumes can be used for EBS volumes. For more information, see
1645
- # [Amazon EC2 Instance Store][3] in the *Amazon Elastic Compute Cloud
1646
- # User Guide*.
1642
+ # After you attach an EBS volume, you must make it available. For more
1643
+ # information, see [Making an EBS Volume Available For Use][2].
1647
1644
  #
1648
1645
  # If a volume has an AWS Marketplace product code:
1649
1646
  #
@@ -1658,14 +1655,14 @@ module Aws::EC2
1658
1655
  # the product. For example, you can't detach a volume from a Windows
1659
1656
  # instance and attach it to a Linux instance.
1660
1657
  #
1661
- # For more information about EBS volumes, see [Attaching Amazon EBS
1662
- # Volumes][2] in the *Amazon Elastic Compute Cloud User Guide*.
1658
+ # For more information, see [Attaching Amazon EBS Volumes][3] in the
1659
+ # *Amazon Elastic Compute Cloud User Guide*.
1663
1660
  #
1664
1661
  #
1665
1662
  #
1666
1663
  # [1]: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/EBSEncryption.html
1667
- # [2]: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ebs-attaching-volume.html
1668
- # [3]: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/InstanceStorage.html
1664
+ # [2]: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ebs-using-volumes.html
1665
+ # [3]: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ebs-attaching-volume.html
1669
1666
  #
1670
1667
  # @option params [required, String] :device
1671
1668
  # The device name (for example, `/dev/sdh` or `xvdh`).
@@ -3009,15 +3006,13 @@ module Aws::EC2
3009
3006
  # Copies a point-in-time snapshot of an EBS volume and stores it in
3010
3007
  # Amazon S3. You can copy the snapshot within the same Region or from
3011
3008
  # one Region to another. You can use the snapshot to create EBS volumes
3012
- # or Amazon Machine Images (AMIs). The snapshot is copied to the
3013
- # regional endpoint that you send the HTTP request to.
3009
+ # or Amazon Machine Images (AMIs).
3014
3010
  #
3015
3011
  # Copies of encrypted EBS snapshots remain encrypted. Copies of
3016
- # unencrypted snapshots remain unencrypted, unless the `Encrypted` flag
3017
- # is specified during the snapshot copy operation. By default, encrypted
3018
- # snapshot copies use the default AWS Key Management Service (AWS KMS)
3019
- # customer master key (CMK); however, you can specify a non-default CMK
3020
- # with the `KmsKeyId` parameter.
3012
+ # unencrypted snapshots remain unencrypted, unless you enable encryption
3013
+ # for the snapshot copy operation. By default, encrypted snapshot copies
3014
+ # use the default AWS Key Management Service (AWS KMS) customer master
3015
+ # key (CMK); however, you can specify a different CMK.
3021
3016
  #
3022
3017
  # To copy an encrypted snapshot that has been shared from another
3023
3018
  # account, you must have permissions for the CMK used to encrypt the
@@ -3050,9 +3045,7 @@ module Aws::EC2
3050
3045
  # @option params [Boolean] :encrypted
3051
3046
  # Specifies whether the destination snapshot should be encrypted. You
3052
3047
  # can encrypt a copy of an unencrypted snapshot, but you cannot use it
3053
- # to create an unencrypted copy of an encrypted snapshot. Your default
3054
- # CMK for EBS is used unless you specify a non-default AWS Key
3055
- # Management Service (AWS KMS) CMK using `KmsKeyId`. For more
3048
+ # to create an unencrypted copy of an encrypted snapshot. For more
3056
3049
  # information, see [Amazon EBS Encryption][1] in the *Amazon Elastic
3057
3050
  # Compute Cloud User Guide*.
3058
3051
  #
@@ -3061,31 +3054,26 @@ module Aws::EC2
3061
3054
  # [1]: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/EBSEncryption.html
3062
3055
  #
3063
3056
  # @option params [String] :kms_key_id
3064
- # An identifier for the AWS Key Management Service (AWS KMS) customer
3065
- # master key (CMK) to use to encrypt the volume. This parameter is only
3066
- # required if you want to use a customer-managed CMK; if this parameter
3067
- # is not specified, your AWS-managed CMK for the account is used. If a
3068
- # `KmsKeyId` is specified, the `Encrypted` flag must also be set.
3057
+ # The identifier of the AWS Key Management Service (AWS KMS) customer
3058
+ # master key (CMK) to use for Amazon EBS encryption. If this parameter
3059
+ # is not specified, your AWS managed CMK for EBS is used. If `KmsKeyId`
3060
+ # is specified, the encrypted state must be `true`.
3069
3061
  #
3070
- # The CMK identifier may be provided in any of the following formats:
3062
+ # You can specify the CMK using any of the following:
3071
3063
  #
3072
- # * Key ID: For example, key/1234abcd-12ab-34cd-56ef-1234567890ab.
3064
+ # * Key ID. For example, key/1234abcd-12ab-34cd-56ef-1234567890ab.
3073
3065
  #
3074
- # * Key alias: For example, alias/ExampleAlias.
3066
+ # * Key alias. For example, alias/ExampleAlias.
3075
3067
  #
3076
- # * Key ARN: The key ARN contains the `arn:aws:kms` namespace, followed
3077
- # by the Region of the CMK, the AWS account ID of the CMK owner, the
3078
- # `key` namespace, and then the CMK ID. For example,
3068
+ # * Key ARN. For example,
3079
3069
  # arn:aws:kms:*us-east-1*\:*012345678910*\:key/*abcd1234-a123-456a-a12b-a123b4cd56ef*.
3080
3070
  #
3081
- # * Alias ARN: The alias ARN contains the `arn:aws:kms` namespace,
3082
- # followed by the Region of the CMK, the AWS account ID of the CMK
3083
- # owner, the `alias` namespace, and then the CMK alias. For example,
3071
+ # * Alias ARN. For example,
3084
3072
  # arn:aws:kms:*us-east-1*\:*012345678910*\:alias/*ExampleAlias*.
3085
3073
  #
3086
- # AWS authenticates `KmsKeyId` asynchronously, meaning that the action
3087
- # you call may appear to complete even though you provided an invalid
3088
- # identifier. The action will eventually fail.
3074
+ # AWS authenticates the CMK asynchronously. Therefore, if you specify an
3075
+ # ID, alias, or ARN that is not valid, the action can appear to
3076
+ # complete, but eventually fails.
3089
3077
  #
3090
3078
  # @option params [String] :presigned_url
3091
3079
  # When you copy an encrypted source snapshot using the Amazon EC2 Query
@@ -7040,7 +7028,7 @@ module Aws::EC2
7040
7028
  # resp.route.transit_gateway_attachments #=> Array
7041
7029
  # resp.route.transit_gateway_attachments[0].resource_id #=> String
7042
7030
  # resp.route.transit_gateway_attachments[0].transit_gateway_attachment_id #=> String
7043
- # resp.route.transit_gateway_attachments[0].resource_type #=> String, one of "vpc", "vpn"
7031
+ # resp.route.transit_gateway_attachments[0].resource_type #=> String, one of "vpc", "vpn", "direct-connect-gateway"
7044
7032
  # resp.route.type #=> String, one of "static", "propagated"
7045
7033
  # resp.route.state #=> String, one of "pending", "active", "blackhole", "deleting", "deleted"
7046
7034
  #
@@ -7205,12 +7193,11 @@ module Aws::EC2
7205
7193
  # snapshot. Any AWS Marketplace product codes from the snapshot are
7206
7194
  # propagated to the volume.
7207
7195
  #
7208
- # You can create encrypted volumes with the `Encrypted` parameter.
7209
- # Encrypted volumes may only be attached to instances that support
7210
- # Amazon EBS encryption. Volumes that are created from encrypted
7211
- # snapshots are also automatically encrypted. For more information, see
7212
- # [Amazon EBS Encryption][2] in the *Amazon Elastic Compute Cloud User
7213
- # Guide*.
7196
+ # You can create encrypted volumes. Encrypted volumes must be attached
7197
+ # to instances that support Amazon EBS encryption. Volumes that are
7198
+ # created from encrypted snapshots are also automatically encrypted. For
7199
+ # more information, see [Amazon EBS Encryption][2] in the *Amazon
7200
+ # Elastic Compute Cloud User Guide*.
7214
7201
  #
7215
7202
  # You can tag your volumes during creation. For more information, see
7216
7203
  # [Tagging Your Amazon EC2 Resources][3] in the *Amazon Elastic Compute
@@ -7230,24 +7217,21 @@ module Aws::EC2
7230
7217
  # The Availability Zone in which to create the volume.
7231
7218
  #
7232
7219
  # @option params [Boolean] :encrypted
7233
- # Specifies the encryption state of the volume. The default effect of
7234
- # setting the `Encrypted` parameter to `true` depends on the volume
7235
- # origin (new or from a snapshot), starting encryption state, ownership,
7236
- # and whether [account-level encryption][1] is enabled. Each default
7237
- # case can be overridden by specifying a customer master key (CMK) using
7238
- # the `KmsKeyId` parameter, in addition to setting `Encrypted` to
7239
- # `true`. For a complete list of possible encryption cases, see [Amazon
7240
- # EBS Encryption][2].
7241
- #
7242
- # Encrypted Amazon EBS volumes may only be attached to instances that
7220
+ # Specifies whether the volume should be encrypted. The effect of
7221
+ # setting the encryption state to `true` depends on the volume origin
7222
+ # (new or from a snapshot), starting encryption state, ownership, and
7223
+ # whether encryption by default is enabled. For more information, see
7224
+ # [Encryption by Default][1] in the *Amazon Elastic Compute Cloud User
7225
+ # Guide*.
7226
+ #
7227
+ # Encrypted Amazon EBS volumes must be attached to instances that
7243
7228
  # support Amazon EBS encryption. For more information, see [Supported
7244
- # Instance Types][3].
7229
+ # Instance Types][2].
7245
7230
  #
7246
7231
  #
7247
7232
  #
7248
- # [1]: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/account-level-encryption.html
7249
- # [2]: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/EBSEncryption.html#encryption-by-default
7250
- # [3]: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/EBSEncryption.html#EBSEncryption_supported_instances
7233
+ # [1]: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/EBSEncryption.html#encryption-by-default
7234
+ # [2]: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/EBSEncryption.html#EBSEncryption_supported_instances
7251
7235
  #
7252
7236
  # @option params [Integer] :iops
7253
7237
  # The number of I/O operations per second (IOPS) to provision for the
@@ -7265,31 +7249,26 @@ module Aws::EC2
7265
7249
  # [2]: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/EBSVolumeTypes.html
7266
7250
  #
7267
7251
  # @option params [String] :kms_key_id
7268
- # An identifier for the AWS Key Management Service (AWS KMS) customer
7269
- # master key (CMK) to use to encrypt the volume. This parameter is only
7270
- # required if you want to use a customer-managed CMK; if this parameter
7271
- # is not specified, your AWS-managed CMK for the account is used. If a
7272
- # `KmsKeyId` is specified, the `Encrypted` flag must also be set.
7252
+ # The identifier of the AWS Key Management Service (AWS KMS) customer
7253
+ # master key (CMK) to use for Amazon EBS encryption. If this parameter
7254
+ # is not specified, your AWS managed CMK for EBS is used. If `KmsKeyId`
7255
+ # is specified, the encrypted state must be `true`.
7273
7256
  #
7274
- # The CMK identifier may be provided in any of the following formats:
7257
+ # You can specify the CMK using any of the following:
7275
7258
  #
7276
- # * Key ID: For example, key/1234abcd-12ab-34cd-56ef-1234567890ab.
7259
+ # * Key ID. For example, key/1234abcd-12ab-34cd-56ef-1234567890ab.
7277
7260
  #
7278
- # * Key alias: For example, alias/ExampleAlias.
7261
+ # * Key alias. For example, alias/ExampleAlias.
7279
7262
  #
7280
- # * Key ARN: The key ARN contains the `arn:aws:kms` namespace, followed
7281
- # by the Region of the CMK, the AWS account ID of the CMK owner, the
7282
- # `key` namespace, and then the CMK ID. For example,
7263
+ # * Key ARN. For example,
7283
7264
  # arn:aws:kms:*us-east-1*\:*012345678910*\:key/*abcd1234-a123-456a-a12b-a123b4cd56ef*.
7284
7265
  #
7285
- # * Alias ARN: The alias ARN contains the `arn:aws:kms` namespace,
7286
- # followed by the Region of the CMK, the AWS account ID of the CMK
7287
- # owner, the `alias` namespace, and then the CMK alias. For example,
7266
+ # * Alias ARN. For example,
7288
7267
  # arn:aws:kms:*us-east-1*\:*012345678910*\:alias/*ExampleAlias*.
7289
7268
  #
7290
- # AWS authenticates `KmsKeyId` asynchronously, meaning that the action
7291
- # you call may appear to complete even though you provided an invalid
7292
- # identifier. The action will eventually fail.
7269
+ # AWS authenticates the CMK asynchronously. Therefore, if you specify an
7270
+ # ID, alias, or ARN that is not valid, the action can appear to
7271
+ # complete, but eventually fails.
7293
7272
  #
7294
7273
  # @option params [Integer] :size
7295
7274
  # The size of the volume, in GiBs.
@@ -7706,6 +7685,7 @@ module Aws::EC2
7706
7685
  # resp.vpc_endpoint.tags #=> Array
7707
7686
  # resp.vpc_endpoint.tags[0].key #=> String
7708
7687
  # resp.vpc_endpoint.tags[0].value #=> String
7688
+ # resp.vpc_endpoint.owner_id #=> String
7709
7689
  # resp.client_token #=> String
7710
7690
  #
7711
7691
  # @see http://docs.aws.amazon.com/goto/WebAPI/ec2-2016-11-15/CreateVpcEndpoint AWS API Documentation
@@ -9452,7 +9432,7 @@ module Aws::EC2
9452
9432
  # resp.route.transit_gateway_attachments #=> Array
9453
9433
  # resp.route.transit_gateway_attachments[0].resource_id #=> String
9454
9434
  # resp.route.transit_gateway_attachments[0].transit_gateway_attachment_id #=> String
9455
- # resp.route.transit_gateway_attachments[0].resource_type #=> String, one of "vpc", "vpn"
9435
+ # resp.route.transit_gateway_attachments[0].resource_type #=> String, one of "vpc", "vpn", "direct-connect-gateway"
9456
9436
  # resp.route.type #=> String, one of "static", "propagated"
9457
9437
  # resp.route.state #=> String, one of "pending", "active", "blackhole", "deleting", "deleted"
9458
9438
  #
@@ -12802,7 +12782,8 @@ module Aws::EC2
12802
12782
  # @option params [Array<Types::Filter>] :filters
12803
12783
  # The filters.
12804
12784
  #
12805
- # * `architecture` - The image architecture (`i386` \| `x86_64`).
12785
+ # * `architecture` - The image architecture (`i386` \| `x86_64` \|
12786
+ # `arm64`).
12806
12787
  #
12807
12788
  # * `block-device-mapping.delete-on-termination` - A Boolean value that
12808
12789
  # indicates whether the Amazon EBS volume is deleted on instance
@@ -13651,7 +13632,8 @@ module Aws::EC2
13651
13632
  # * `affinity` - The affinity setting for an instance running on a
13652
13633
  # Dedicated Host (`default` \| `host`).
13653
13634
  #
13654
- # * `architecture` - The instance architecture (`i386` \| `x86_64`).
13635
+ # * `architecture` - The instance architecture (`i386` \| `x86_64` \|
13636
+ # `arm64`).
13655
13637
  #
13656
13638
  # * `availability-zone` - The Availability Zone of the instance.
13657
13639
  #
@@ -18979,7 +18961,7 @@ module Aws::EC2
18979
18961
  # resp.transit_gateway_attachments[0].transit_gateway_id #=> String
18980
18962
  # resp.transit_gateway_attachments[0].transit_gateway_owner_id #=> String
18981
18963
  # resp.transit_gateway_attachments[0].resource_owner_id #=> String
18982
- # resp.transit_gateway_attachments[0].resource_type #=> String, one of "vpc", "vpn"
18964
+ # resp.transit_gateway_attachments[0].resource_type #=> String, one of "vpc", "vpn", "direct-connect-gateway"
18983
18965
  # resp.transit_gateway_attachments[0].resource_id #=> String
18984
18966
  # resp.transit_gateway_attachments[0].state #=> String, one of "pendingAcceptance", "rollingBack", "pending", "available", "modifying", "deleting", "deleted", "failed", "rejected", "rejecting", "failing"
18985
18967
  # resp.transit_gateway_attachments[0].association.transit_gateway_route_table_id #=> String
@@ -20219,6 +20201,11 @@ module Aws::EC2
20219
20201
  # resp.vpc_endpoint_connections[0].vpc_endpoint_owner #=> String
20220
20202
  # resp.vpc_endpoint_connections[0].vpc_endpoint_state #=> String, one of "PendingAcceptance", "Pending", "Available", "Deleting", "Deleted", "Rejected", "Failed", "Expired"
20221
20203
  # resp.vpc_endpoint_connections[0].creation_timestamp #=> Time
20204
+ # resp.vpc_endpoint_connections[0].dns_entries #=> Array
20205
+ # resp.vpc_endpoint_connections[0].dns_entries[0].dns_name #=> String
20206
+ # resp.vpc_endpoint_connections[0].dns_entries[0].hosted_zone_id #=> String
20207
+ # resp.vpc_endpoint_connections[0].network_load_balancer_arns #=> Array
20208
+ # resp.vpc_endpoint_connections[0].network_load_balancer_arns[0] #=> String
20222
20209
  # resp.next_token #=> String
20223
20210
  #
20224
20211
  # @see http://docs.aws.amazon.com/goto/WebAPI/ec2-2016-11-15/DescribeVpcEndpointConnections AWS API Documentation
@@ -20572,6 +20559,7 @@ module Aws::EC2
20572
20559
  # resp.vpc_endpoints[0].tags #=> Array
20573
20560
  # resp.vpc_endpoints[0].tags[0].key #=> String
20574
20561
  # resp.vpc_endpoints[0].tags[0].value #=> String
20562
+ # resp.vpc_endpoints[0].owner_id #=> String
20575
20563
  # resp.next_token #=> String
20576
20564
  #
20577
20565
  # @see http://docs.aws.amazon.com/goto/WebAPI/ec2-2016-11-15/DescribeVpcEndpoints AWS API Documentation
@@ -21335,17 +21323,21 @@ module Aws::EC2
21335
21323
  req.send_request(options)
21336
21324
  end
21337
21325
 
21338
- # Disables default encryption for EBS volumes that are created in your
21339
- # account in the current region.
21326
+ # Disables EBS encryption by default for your account in the current
21327
+ # Region.
21328
+ #
21329
+ # After you disable encryption by default, you can still create
21330
+ # encrypted volumes by enabling encryption when you create each volume.
21331
+ #
21332
+ # Disabling encryption by default does not change the encryption status
21333
+ # of your existing volumes.
21334
+ #
21335
+ # For more information, see [Amazon EBS Encryption][1] in the *Amazon
21336
+ # Elastic Compute Cloud User Guide*.
21340
21337
  #
21341
- # Call this API if you have enabled default encryption using
21342
- # EnableEbsEncryptionByDefault and want to disable default EBS
21343
- # encryption. Once default EBS encryption is disabled, you can still
21344
- # create an encrypted volume by setting *encrypted* to *true* in the API
21345
- # call that creates the volume.
21346
21338
  #
21347
- # Disabling default EBS encryption will not change the encryption status
21348
- # of any of your existing volumes.
21339
+ #
21340
+ # [1]: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/EBSEncryption.html
21349
21341
  #
21350
21342
  # @option params [Boolean] :dry_run
21351
21343
  # Checks whether you have the required permissions for the action,
@@ -21407,7 +21399,7 @@ module Aws::EC2
21407
21399
  #
21408
21400
  # resp.propagation.transit_gateway_attachment_id #=> String
21409
21401
  # resp.propagation.resource_id #=> String
21410
- # resp.propagation.resource_type #=> String, one of "vpc", "vpn"
21402
+ # resp.propagation.resource_type #=> String, one of "vpc", "vpn", "direct-connect-gateway"
21411
21403
  # resp.propagation.transit_gateway_route_table_id #=> String
21412
21404
  # resp.propagation.state #=> String, one of "enabling", "enabled", "disabling", "disabled"
21413
21405
  #
@@ -21818,7 +21810,7 @@ module Aws::EC2
21818
21810
  # resp.association.transit_gateway_route_table_id #=> String
21819
21811
  # resp.association.transit_gateway_attachment_id #=> String
21820
21812
  # resp.association.resource_id #=> String
21821
- # resp.association.resource_type #=> String, one of "vpc", "vpn"
21813
+ # resp.association.resource_type #=> String, one of "vpc", "vpn", "direct-connect-gateway"
21822
21814
  # resp.association.state #=> String, one of "associating", "associated", "disassociating", "disassociated"
21823
21815
  #
21824
21816
  # @see http://docs.aws.amazon.com/goto/WebAPI/ec2-2016-11-15/DisassociateTransitGatewayRouteTable AWS API Documentation
@@ -21875,36 +21867,28 @@ module Aws::EC2
21875
21867
  req.send_request(options)
21876
21868
  end
21877
21869
 
21878
- # Enables default encryption for EBS volumes that are created in your
21879
- # account in the current region.
21880
- #
21881
- # Once encryption is enabled with this action, EBS volumes that are
21882
- # created in your account will always be encrypted even if encryption is
21883
- # not specified at launch. This setting overrides the *encrypted*
21884
- # setting to *true* in all API calls that create EBS volumes in your
21885
- # account. A volume will be encrypted even if you specify *encryption*
21886
- # to be *false* in the API call that creates the volume.
21870
+ # Enables EBS encryption by default for your account in the current
21871
+ # Region.
21887
21872
  #
21888
- # If you do not specify a customer master key (CMK) in the API call that
21889
- # creates the EBS volume, then the volume is encrypted to your AWS
21890
- # account's managed CMK.
21873
+ # After you enable encryption by default, the EBS volumes that you
21874
+ # create are are always encrypted, either using the default CMK or the
21875
+ # CMK that you specified when you created each volume. For more
21876
+ # information, see [Amazon EBS Encryption][1] in the *Amazon Elastic
21877
+ # Compute Cloud User Guide*.
21891
21878
  #
21892
- # You can specify a CMK of your choice using ModifyEbsDefaultKmsKeyId.
21879
+ # You can specify the default CMK for encryption by default using
21880
+ # ModifyEbsDefaultKmsKeyId or ResetEbsDefaultKmsKeyId.
21893
21881
  #
21894
- # Enabling encryption-by-default for EBS volumes has no effect on
21895
- # existing unencrypted volumes in your account. Encrypting the data in
21896
- # these requires manual action. You can either create an encrypted
21897
- # snapshot of an unencrypted volume, or encrypt a copy of an unencrypted
21898
- # snapshot. Any volume restored from an encrypted snapshot is also
21899
- # encrypted. For more information, see [Amazon EBS Snapshots][1].
21882
+ # Enabling encryption by default has no effect on the encryption status
21883
+ # of your existing volumes.
21900
21884
  #
21901
- # After EBS encryption-by-default is enabled, you can no longer launch
21902
- # older-generation instance types that do not support encryption. For
21885
+ # After you enable encryption by default, you can no longer launch
21886
+ # instances using instance types that do not support encryption. For
21903
21887
  # more information, see [Supported Instance Types][2].
21904
21888
  #
21905
21889
  #
21906
21890
  #
21907
- # [1]: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/EBSSnapshots.html
21891
+ # [1]: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/EBSEncryption.html
21908
21892
  # [2]: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/EBSEncryption.html#EBSEncryption_supported_instances
21909
21893
  #
21910
21894
  # @option params [Boolean] :dry_run
@@ -21967,7 +21951,7 @@ module Aws::EC2
21967
21951
  #
21968
21952
  # resp.propagation.transit_gateway_attachment_id #=> String
21969
21953
  # resp.propagation.resource_id #=> String
21970
- # resp.propagation.resource_type #=> String, one of "vpc", "vpn"
21954
+ # resp.propagation.resource_type #=> String, one of "vpc", "vpn", "direct-connect-gateway"
21971
21955
  # resp.propagation.transit_gateway_route_table_id #=> String
21972
21956
  # resp.propagation.state #=> String, one of "enabling", "enabled", "disabling", "disabled"
21973
21957
  #
@@ -22231,7 +22215,7 @@ module Aws::EC2
22231
22215
  # @option params [Array<Types::Filter>] :filters
22232
22216
  # One or more filters. The possible values are:
22233
22217
  #
22234
- # * `attachment.transit-gateway-attachment-id`- The id of the transit
22218
+ # * `attachment.transit-gateway-attachment-id` - The id of the transit
22235
22219
  # gateway attachment.
22236
22220
  #
22237
22221
  # * `attachment.resource-id` - The resource id of the transit gateway
@@ -22258,7 +22242,7 @@ module Aws::EC2
22258
22242
  #
22259
22243
  # * `transit-gateway-route-destination-cidr-block` - The CIDR range.
22260
22244
  #
22261
- # * `type` - The type of roue (`active` \| `blackhole`).
22245
+ # * `type` - The type of route (`active` \| `blackhole`).
22262
22246
  #
22263
22247
  # @option params [required, String] :s3_bucket
22264
22248
  # The name of the S3 bucket.
@@ -22427,9 +22411,17 @@ module Aws::EC2
22427
22411
  req.send_request(options)
22428
22412
  end
22429
22413
 
22430
- # Describes the default customer master key (CMK) that your account uses
22431
- # to encrypt EBS volumes if you don’t specify a CMK in the API call. You
22432
- # can change this default using ModifyEbsDefaultKmsKeyId.
22414
+ # Describes the default customer master key (CMK) for EBS encryption by
22415
+ # default for your account in this Region. You can change the default
22416
+ # CMK for encryption by default using ModifyEbsDefaultKmsKeyId or
22417
+ # ResetEbsDefaultKmsKeyId.
22418
+ #
22419
+ # For more information, see [Amazon EBS Encryption][1] in the *Amazon
22420
+ # Elastic Compute Cloud User Guide*.
22421
+ #
22422
+ #
22423
+ #
22424
+ # [1]: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/EBSEncryption.html
22433
22425
  #
22434
22426
  # @option params [Boolean] :dry_run
22435
22427
  # Checks whether you have the required permissions for the action,
@@ -22460,8 +22452,15 @@ module Aws::EC2
22460
22452
  req.send_request(options)
22461
22453
  end
22462
22454
 
22463
- # Describes whether default EBS encryption is enabled for your account
22464
- # in the current region.
22455
+ # Describes whether EBS encryption by default is enabled for your
22456
+ # account in the current Region.
22457
+ #
22458
+ # For more information, see [Amazon EBS Encryption][1] in the *Amazon
22459
+ # Elastic Compute Cloud User Guide*.
22460
+ #
22461
+ #
22462
+ #
22463
+ # [1]: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/EBSEncryption.html
22465
22464
  #
22466
22465
  # @option params [Boolean] :dry_run
22467
22466
  # Checks whether you have the required permissions for the action,
@@ -22976,7 +22975,7 @@ module Aws::EC2
22976
22975
  # resp.associations #=> Array
22977
22976
  # resp.associations[0].transit_gateway_attachment_id #=> String
22978
22977
  # resp.associations[0].resource_id #=> String
22979
- # resp.associations[0].resource_type #=> String, one of "vpc", "vpn"
22978
+ # resp.associations[0].resource_type #=> String, one of "vpc", "vpn", "direct-connect-gateway"
22980
22979
  # resp.associations[0].state #=> String, one of "associating", "associated", "disassociating", "disassociated"
22981
22980
  # resp.next_token #=> String
22982
22981
  #
@@ -23043,7 +23042,7 @@ module Aws::EC2
23043
23042
  # resp.transit_gateway_route_table_propagations #=> Array
23044
23043
  # resp.transit_gateway_route_table_propagations[0].transit_gateway_attachment_id #=> String
23045
23044
  # resp.transit_gateway_route_table_propagations[0].resource_id #=> String
23046
- # resp.transit_gateway_route_table_propagations[0].resource_type #=> String, one of "vpc", "vpn"
23045
+ # resp.transit_gateway_route_table_propagations[0].resource_type #=> String, one of "vpc", "vpn", "direct-connect-gateway"
23047
23046
  # resp.transit_gateway_route_table_propagations[0].state #=> String, one of "enabling", "enabled", "disabling", "disabled"
23048
23047
  # resp.next_token #=> String
23049
23048
  #
@@ -23119,7 +23118,7 @@ module Aws::EC2
23119
23118
  # @option params [String] :architecture
23120
23119
  # The architecture of the virtual machine.
23121
23120
  #
23122
- # Valid values: `i386` \| `x86_64`
23121
+ # Valid values: `i386` \| `x86_64` \| `arm64`
23123
23122
  #
23124
23123
  # @option params [Types::ClientData] :client_data
23125
23124
  # The client-specific data.
@@ -23853,43 +23852,47 @@ module Aws::EC2
23853
23852
  req.send_request(options)
23854
23853
  end
23855
23854
 
23856
- # Changes the customer master key (CMK) that your account uses to
23857
- # encrypt EBS volumes if you don't specify a CMK in the API call.
23855
+ # Changes the default customer master key (CMK) for EBS encryption by
23856
+ # default for your account in this Region.
23857
+ #
23858
+ # AWS creates a unique AWS managed CMK in each Region for use with
23859
+ # encryption by default. If you change the default CMK to a customer
23860
+ # managed CMK, it is used instead of the AWS managed CMK. To reset the
23861
+ # default CMK to the AWS managed CMK for EBS, use
23862
+ # ResetEbsDefaultKmsKeyId.
23863
+ #
23864
+ # If you delete or disable the customer managed CMK that you specified
23865
+ # for use with encryption by default, your instances will fail to
23866
+ # launch.
23867
+ #
23868
+ # For more information, see [Amazon EBS Encryption][1] in the *Amazon
23869
+ # Elastic Compute Cloud User Guide*.
23858
23870
  #
23859
- # By default, your account has an AWS-managed CMK that is used for
23860
- # encrypting an EBS volume when no CMK is specified in the API call that
23861
- # creates the volume. By calling this API, you can specify a
23862
- # customer-managed CMK to use in place of the AWS-managed CMK.
23863
23871
  #
23864
- # Note: Deleting or disabling the CMK that you have specified to act as
23865
- # your default CMK will result in instance-launch failures.
23872
+ #
23873
+ # [1]: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/EBSEncryption.html
23866
23874
  #
23867
23875
  # @option params [required, String] :kms_key_id
23868
- # An identifier for the AWS Key Management Service (AWS KMS) customer
23869
- # master key (CMK) to use to encrypt the volume. This parameter is only
23870
- # required if you want to use a customer-managed CMK; if this parameter
23871
- # is not specified, your AWS-managed CMK for the account is used. If a
23872
- # `KmsKeyId` is specified, the `Encrypted` flag must also be set.
23876
+ # The identifier of the AWS Key Management Service (AWS KMS) customer
23877
+ # master key (CMK) to use for Amazon EBS encryption. If this parameter
23878
+ # is not specified, your AWS managed CMK for EBS is used. If `KmsKeyId`
23879
+ # is specified, the encrypted state must be `true`.
23873
23880
  #
23874
- # The CMK identifier may be provided in any of the following formats:
23881
+ # You can specify the CMK using any of the following:
23875
23882
  #
23876
- # * Key ID: For example, key/1234abcd-12ab-34cd-56ef-1234567890ab.
23883
+ # * Key ID. For example, key/1234abcd-12ab-34cd-56ef-1234567890ab.
23877
23884
  #
23878
- # * Key alias: For example, alias/ExampleAlias.
23885
+ # * Key alias. For example, alias/ExampleAlias.
23879
23886
  #
23880
- # * Key ARN: The key ARN contains the `arn:aws:kms` namespace, followed
23881
- # by the Region of the CMK, the AWS account ID of the CMK owner, the
23882
- # `key` namespace, and then the CMK ID. For example,
23887
+ # * Key ARN. For example,
23883
23888
  # arn:aws:kms:*us-east-1*\:*012345678910*\:key/*abcd1234-a123-456a-a12b-a123b4cd56ef*.
23884
23889
  #
23885
- # * Alias ARN: The alias ARN contains the `arn:aws:kms` namespace,
23886
- # followed by the Region of the CMK, the AWS account ID of the CMK
23887
- # owner, the `alias` namespace, and then the CMK alias. For example,
23890
+ # * Alias ARN. For example,
23888
23891
  # arn:aws:kms:*us-east-1*\:*012345678910*\:alias/*ExampleAlias*.
23889
23892
  #
23890
- # AWS authenticates `KmsKeyId` asynchronously, meaning that the action
23891
- # you call may appear to complete even though you provided an invalid
23892
- # identifier. The action will eventually fail.
23893
+ # AWS authenticates the CMK asynchronously. Therefore, if you specify an
23894
+ # ID, alias, or ARN that is not valid, the action can appear to
23895
+ # complete, but eventually fails.
23893
23896
  #
23894
23897
  # @option params [Boolean] :dry_run
23895
23898
  # Checks whether you have the required permissions for the action,
@@ -25114,9 +25117,9 @@ module Aws::EC2
25114
25117
 
25115
25118
  # Adds or removes permission settings for the specified snapshot. You
25116
25119
  # may add or remove specified AWS account IDs from a snapshot's list of
25117
- # create volume permissions, but you cannot do both in a single API
25118
- # call. If you need to both add and remove account IDs for a snapshot,
25119
- # you must use multiple API calls.
25120
+ # create volume permissions, but you cannot do both in a single
25121
+ # operation. If you need to both add and remove account IDs for a
25122
+ # snapshot, you must use multiple operations.
25120
25123
  #
25121
25124
  # Encrypted snapshots and snapshots with AWS Marketplace product codes
25122
25125
  # cannot be made public. Snapshots encrypted with your default CMK
@@ -25462,8 +25465,8 @@ module Aws::EC2
25462
25465
  # You can use CloudWatch Events to check the status of a modification to
25463
25466
  # an EBS volume. For information about CloudWatch Events, see the
25464
25467
  # [Amazon CloudWatch Events User Guide][5]. You can also track the
25465
- # status of a modification using the DescribeVolumesModifications API.
25466
- # For information about tracking status changes using either method, see
25468
+ # status of a modification using DescribeVolumesModifications. For
25469
+ # information about tracking status changes using either method, see
25467
25470
  # [Monitoring Volume Modifications][6].
25468
25471
  #
25469
25472
  # With previous-generation instance types, resizing an EBS volume may
@@ -27524,7 +27527,7 @@ module Aws::EC2
27524
27527
  # resp.route.transit_gateway_attachments #=> Array
27525
27528
  # resp.route.transit_gateway_attachments[0].resource_id #=> String
27526
27529
  # resp.route.transit_gateway_attachments[0].transit_gateway_attachment_id #=> String
27527
- # resp.route.transit_gateway_attachments[0].resource_type #=> String, one of "vpc", "vpn"
27530
+ # resp.route.transit_gateway_attachments[0].resource_type #=> String, one of "vpc", "vpn", "direct-connect-gateway"
27528
27531
  # resp.route.type #=> String, one of "static", "propagated"
27529
27532
  # resp.route.state #=> String, one of "pending", "active", "blackhole", "deleting", "deleted"
27530
27533
  #
@@ -28298,20 +28301,17 @@ module Aws::EC2
28298
28301
  req.send_request(options)
28299
28302
  end
28300
28303
 
28301
- # Resets the account's default customer master key (CMK) to the
28302
- # account's AWS-managed default CMK. This default CMK is used to
28303
- # encrypt EBS volumes when you have enabled EBS encryption by default
28304
- # without specifying a CMK in the API call. If you have not enabled
28305
- # encryption by default, then this CMK is used when you set the
28306
- # `Encrypted` parameter to true without specifying a custom CMK in the
28307
- # API call.
28304
+ # Resets the default customer master key (CMK) for EBS encryption for
28305
+ # your account in this Region to the AWS managed CMK for EBS.
28308
28306
  #
28309
- # Call this API if you have modified the default CMK that is used for
28310
- # encrypting your EBS volume using ModifyEbsDefaultKmsKeyId and you want
28311
- # to reset it to the AWS-managed default CMK. After resetting, you can
28312
- # continue to provide a CMK of your choice in the API call that creates
28313
- # the volume. However, if no CMK is specified, your account will encrypt
28314
- # the volume to the AWS-managed default CMK.
28307
+ # After resetting the default CMK to the AWS managed CMK, you can
28308
+ # continue to encrypt by a customer managed CMK by specifying it when
28309
+ # you create the volume. For more information, see [Amazon EBS
28310
+ # Encryption][1] in the *Amazon Elastic Compute Cloud User Guide*.
28311
+ #
28312
+ #
28313
+ #
28314
+ # [1]: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/EBSEncryption.html
28315
28315
  #
28316
28316
  # @option params [Boolean] :dry_run
28317
28317
  # Checks whether you have the required permissions for the action,
@@ -29866,11 +29866,9 @@ module Aws::EC2
29866
29866
  # supernet-of-match as 10.0.1.0/30, then the result returns
29867
29867
  # 10.0.1.0/29.
29868
29868
  #
29869
- # * `state` - The state of the attachment (`available` \| `deleted` \|
29870
- # `deleting` \| `failed` \| `modifying` \| `pendingAcceptance` \|
29871
- # `pending` \| `rollingBack` \| `rejected` \| `rejecting`).
29869
+ # * `state` - The state of the route (`active` \| `blackhole`).
29872
29870
  #
29873
- # * `type` - The type of roue (`active` \| `blackhole`).
29871
+ # * `type` - The type of roue (`propagated` \| `static`).
29874
29872
  #
29875
29873
  # @option params [Integer] :max_results
29876
29874
  # The maximum number of routes to return.
@@ -29907,7 +29905,7 @@ module Aws::EC2
29907
29905
  # resp.routes[0].transit_gateway_attachments #=> Array
29908
29906
  # resp.routes[0].transit_gateway_attachments[0].resource_id #=> String
29909
29907
  # resp.routes[0].transit_gateway_attachments[0].transit_gateway_attachment_id #=> String
29910
- # resp.routes[0].transit_gateway_attachments[0].resource_type #=> String, one of "vpc", "vpn"
29908
+ # resp.routes[0].transit_gateway_attachments[0].resource_type #=> String, one of "vpc", "vpn", "direct-connect-gateway"
29911
29909
  # resp.routes[0].type #=> String, one of "static", "propagated"
29912
29910
  # resp.routes[0].state #=> String, one of "pending", "active", "blackhole", "deleting", "deleted"
29913
29911
  # resp.additional_routes_available #=> Boolean
@@ -30728,7 +30726,7 @@ module Aws::EC2
30728
30726
  params: params,
30729
30727
  config: config)
30730
30728
  context[:gem_name] = 'aws-sdk-ec2'
30731
- context[:gem_version] = '1.90.0'
30729
+ context[:gem_version] = '1.91.0'
30732
30730
  Seahorse::Client::Request.new(handlers, context)
30733
30731
  end
30734
30732