aws-sdk-ec2 1.90.0 → 1.91.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA1:
3
- metadata.gz: 96e7d054bd65722fcb9118bd156d719e5233926d
4
- data.tar.gz: ad51ff1006c44c11b8d8660835935bcc79326b4d
3
+ metadata.gz: 5bb12febcf31504c2be445f7593265ef73adaf17
4
+ data.tar.gz: 4a8cc2e7e498c29db0078ac870d9d69cc000eae1
5
5
  SHA512:
6
- metadata.gz: 856bb69c739beb0faad3cca25b8cc5f298571b1dd09f05e54dd18f65159c8931b53077220cf6481ce1d83f17c68f737d0b2f896761c130461871e19ab62c743b
7
- data.tar.gz: 9c0f55945ff836d366ff9d3f5c5d88db99f140696e8544650228bc0feb05c9f9474a844d1a965b73c8336c6f9808c0ce4b10347aee40443c07f8c0c30304e578
6
+ metadata.gz: a2b435d527cb86d5cb69cfc803dee6d5b16c49f1ac07499943aff76268d8b6f9056a956c20b5cad73cd554e5ab06ac4d54d6d6fc8bebc4a7cc46d059b6be4c19
7
+ data.tar.gz: a5e27153821a075500b416913dd96ae17ce59ea8dd279cdb0e5633cd4bc35aba4f933f75e167a8f1fccec5be0aa240564e2c65ee597b32d5e602317014e898df
@@ -65,6 +65,6 @@ require_relative 'aws-sdk-ec2/customizations'
65
65
  # @service
66
66
  module Aws::EC2
67
67
 
68
- GEM_VERSION = '1.90.0'
68
+ GEM_VERSION = '1.91.0'
69
69
 
70
70
  end
@@ -1396,7 +1396,7 @@ module Aws::EC2
1396
1396
  # resp.association.transit_gateway_route_table_id #=> String
1397
1397
  # resp.association.transit_gateway_attachment_id #=> String
1398
1398
  # resp.association.resource_id #=> String
1399
- # resp.association.resource_type #=> String, one of "vpc", "vpn"
1399
+ # resp.association.resource_type #=> String, one of "vpc", "vpn", "direct-connect-gateway"
1400
1400
  # resp.association.state #=> String, one of "associating", "associated", "disassociating", "disassociated"
1401
1401
  #
1402
1402
  # @see http://docs.aws.amazon.com/goto/WebAPI/ec2-2016-11-15/AssociateTransitGatewayRouteTable AWS API Documentation
@@ -1635,15 +1635,12 @@ module Aws::EC2
1635
1635
  # Attaches an EBS volume to a running or stopped instance and exposes it
1636
1636
  # to the instance with the specified device name.
1637
1637
  #
1638
- # Encrypted EBS volumes may only be attached to instances that support
1638
+ # Encrypted EBS volumes must be attached to instances that support
1639
1639
  # Amazon EBS encryption. For more information, see [Amazon EBS
1640
1640
  # Encryption][1] in the *Amazon Elastic Compute Cloud User Guide*.
1641
1641
  #
1642
- # For a list of supported device names, see [Attaching an EBS Volume to
1643
- # an Instance][2]. Any device names that aren't reserved for instance
1644
- # store volumes can be used for EBS volumes. For more information, see
1645
- # [Amazon EC2 Instance Store][3] in the *Amazon Elastic Compute Cloud
1646
- # User Guide*.
1642
+ # After you attach an EBS volume, you must make it available. For more
1643
+ # information, see [Making an EBS Volume Available For Use][2].
1647
1644
  #
1648
1645
  # If a volume has an AWS Marketplace product code:
1649
1646
  #
@@ -1658,14 +1655,14 @@ module Aws::EC2
1658
1655
  # the product. For example, you can't detach a volume from a Windows
1659
1656
  # instance and attach it to a Linux instance.
1660
1657
  #
1661
- # For more information about EBS volumes, see [Attaching Amazon EBS
1662
- # Volumes][2] in the *Amazon Elastic Compute Cloud User Guide*.
1658
+ # For more information, see [Attaching Amazon EBS Volumes][3] in the
1659
+ # *Amazon Elastic Compute Cloud User Guide*.
1663
1660
  #
1664
1661
  #
1665
1662
  #
1666
1663
  # [1]: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/EBSEncryption.html
1667
- # [2]: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ebs-attaching-volume.html
1668
- # [3]: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/InstanceStorage.html
1664
+ # [2]: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ebs-using-volumes.html
1665
+ # [3]: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ebs-attaching-volume.html
1669
1666
  #
1670
1667
  # @option params [required, String] :device
1671
1668
  # The device name (for example, `/dev/sdh` or `xvdh`).
@@ -3009,15 +3006,13 @@ module Aws::EC2
3009
3006
  # Copies a point-in-time snapshot of an EBS volume and stores it in
3010
3007
  # Amazon S3. You can copy the snapshot within the same Region or from
3011
3008
  # one Region to another. You can use the snapshot to create EBS volumes
3012
- # or Amazon Machine Images (AMIs). The snapshot is copied to the
3013
- # regional endpoint that you send the HTTP request to.
3009
+ # or Amazon Machine Images (AMIs).
3014
3010
  #
3015
3011
  # Copies of encrypted EBS snapshots remain encrypted. Copies of
3016
- # unencrypted snapshots remain unencrypted, unless the `Encrypted` flag
3017
- # is specified during the snapshot copy operation. By default, encrypted
3018
- # snapshot copies use the default AWS Key Management Service (AWS KMS)
3019
- # customer master key (CMK); however, you can specify a non-default CMK
3020
- # with the `KmsKeyId` parameter.
3012
+ # unencrypted snapshots remain unencrypted, unless you enable encryption
3013
+ # for the snapshot copy operation. By default, encrypted snapshot copies
3014
+ # use the default AWS Key Management Service (AWS KMS) customer master
3015
+ # key (CMK); however, you can specify a different CMK.
3021
3016
  #
3022
3017
  # To copy an encrypted snapshot that has been shared from another
3023
3018
  # account, you must have permissions for the CMK used to encrypt the
@@ -3050,9 +3045,7 @@ module Aws::EC2
3050
3045
  # @option params [Boolean] :encrypted
3051
3046
  # Specifies whether the destination snapshot should be encrypted. You
3052
3047
  # can encrypt a copy of an unencrypted snapshot, but you cannot use it
3053
- # to create an unencrypted copy of an encrypted snapshot. Your default
3054
- # CMK for EBS is used unless you specify a non-default AWS Key
3055
- # Management Service (AWS KMS) CMK using `KmsKeyId`. For more
3048
+ # to create an unencrypted copy of an encrypted snapshot. For more
3056
3049
  # information, see [Amazon EBS Encryption][1] in the *Amazon Elastic
3057
3050
  # Compute Cloud User Guide*.
3058
3051
  #
@@ -3061,31 +3054,26 @@ module Aws::EC2
3061
3054
  # [1]: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/EBSEncryption.html
3062
3055
  #
3063
3056
  # @option params [String] :kms_key_id
3064
- # An identifier for the AWS Key Management Service (AWS KMS) customer
3065
- # master key (CMK) to use to encrypt the volume. This parameter is only
3066
- # required if you want to use a customer-managed CMK; if this parameter
3067
- # is not specified, your AWS-managed CMK for the account is used. If a
3068
- # `KmsKeyId` is specified, the `Encrypted` flag must also be set.
3057
+ # The identifier of the AWS Key Management Service (AWS KMS) customer
3058
+ # master key (CMK) to use for Amazon EBS encryption. If this parameter
3059
+ # is not specified, your AWS managed CMK for EBS is used. If `KmsKeyId`
3060
+ # is specified, the encrypted state must be `true`.
3069
3061
  #
3070
- # The CMK identifier may be provided in any of the following formats:
3062
+ # You can specify the CMK using any of the following:
3071
3063
  #
3072
- # * Key ID: For example, key/1234abcd-12ab-34cd-56ef-1234567890ab.
3064
+ # * Key ID. For example, key/1234abcd-12ab-34cd-56ef-1234567890ab.
3073
3065
  #
3074
- # * Key alias: For example, alias/ExampleAlias.
3066
+ # * Key alias. For example, alias/ExampleAlias.
3075
3067
  #
3076
- # * Key ARN: The key ARN contains the `arn:aws:kms` namespace, followed
3077
- # by the Region of the CMK, the AWS account ID of the CMK owner, the
3078
- # `key` namespace, and then the CMK ID. For example,
3068
+ # * Key ARN. For example,
3079
3069
  # arn:aws:kms:*us-east-1*\:*012345678910*\:key/*abcd1234-a123-456a-a12b-a123b4cd56ef*.
3080
3070
  #
3081
- # * Alias ARN: The alias ARN contains the `arn:aws:kms` namespace,
3082
- # followed by the Region of the CMK, the AWS account ID of the CMK
3083
- # owner, the `alias` namespace, and then the CMK alias. For example,
3071
+ # * Alias ARN. For example,
3084
3072
  # arn:aws:kms:*us-east-1*\:*012345678910*\:alias/*ExampleAlias*.
3085
3073
  #
3086
- # AWS authenticates `KmsKeyId` asynchronously, meaning that the action
3087
- # you call may appear to complete even though you provided an invalid
3088
- # identifier. The action will eventually fail.
3074
+ # AWS authenticates the CMK asynchronously. Therefore, if you specify an
3075
+ # ID, alias, or ARN that is not valid, the action can appear to
3076
+ # complete, but eventually fails.
3089
3077
  #
3090
3078
  # @option params [String] :presigned_url
3091
3079
  # When you copy an encrypted source snapshot using the Amazon EC2 Query
@@ -7040,7 +7028,7 @@ module Aws::EC2
7040
7028
  # resp.route.transit_gateway_attachments #=> Array
7041
7029
  # resp.route.transit_gateway_attachments[0].resource_id #=> String
7042
7030
  # resp.route.transit_gateway_attachments[0].transit_gateway_attachment_id #=> String
7043
- # resp.route.transit_gateway_attachments[0].resource_type #=> String, one of "vpc", "vpn"
7031
+ # resp.route.transit_gateway_attachments[0].resource_type #=> String, one of "vpc", "vpn", "direct-connect-gateway"
7044
7032
  # resp.route.type #=> String, one of "static", "propagated"
7045
7033
  # resp.route.state #=> String, one of "pending", "active", "blackhole", "deleting", "deleted"
7046
7034
  #
@@ -7205,12 +7193,11 @@ module Aws::EC2
7205
7193
  # snapshot. Any AWS Marketplace product codes from the snapshot are
7206
7194
  # propagated to the volume.
7207
7195
  #
7208
- # You can create encrypted volumes with the `Encrypted` parameter.
7209
- # Encrypted volumes may only be attached to instances that support
7210
- # Amazon EBS encryption. Volumes that are created from encrypted
7211
- # snapshots are also automatically encrypted. For more information, see
7212
- # [Amazon EBS Encryption][2] in the *Amazon Elastic Compute Cloud User
7213
- # Guide*.
7196
+ # You can create encrypted volumes. Encrypted volumes must be attached
7197
+ # to instances that support Amazon EBS encryption. Volumes that are
7198
+ # created from encrypted snapshots are also automatically encrypted. For
7199
+ # more information, see [Amazon EBS Encryption][2] in the *Amazon
7200
+ # Elastic Compute Cloud User Guide*.
7214
7201
  #
7215
7202
  # You can tag your volumes during creation. For more information, see
7216
7203
  # [Tagging Your Amazon EC2 Resources][3] in the *Amazon Elastic Compute
@@ -7230,24 +7217,21 @@ module Aws::EC2
7230
7217
  # The Availability Zone in which to create the volume.
7231
7218
  #
7232
7219
  # @option params [Boolean] :encrypted
7233
- # Specifies the encryption state of the volume. The default effect of
7234
- # setting the `Encrypted` parameter to `true` depends on the volume
7235
- # origin (new or from a snapshot), starting encryption state, ownership,
7236
- # and whether [account-level encryption][1] is enabled. Each default
7237
- # case can be overridden by specifying a customer master key (CMK) using
7238
- # the `KmsKeyId` parameter, in addition to setting `Encrypted` to
7239
- # `true`. For a complete list of possible encryption cases, see [Amazon
7240
- # EBS Encryption][2].
7241
- #
7242
- # Encrypted Amazon EBS volumes may only be attached to instances that
7220
+ # Specifies whether the volume should be encrypted. The effect of
7221
+ # setting the encryption state to `true` depends on the volume origin
7222
+ # (new or from a snapshot), starting encryption state, ownership, and
7223
+ # whether encryption by default is enabled. For more information, see
7224
+ # [Encryption by Default][1] in the *Amazon Elastic Compute Cloud User
7225
+ # Guide*.
7226
+ #
7227
+ # Encrypted Amazon EBS volumes must be attached to instances that
7243
7228
  # support Amazon EBS encryption. For more information, see [Supported
7244
- # Instance Types][3].
7229
+ # Instance Types][2].
7245
7230
  #
7246
7231
  #
7247
7232
  #
7248
- # [1]: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/account-level-encryption.html
7249
- # [2]: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/EBSEncryption.html#encryption-by-default
7250
- # [3]: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/EBSEncryption.html#EBSEncryption_supported_instances
7233
+ # [1]: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/EBSEncryption.html#encryption-by-default
7234
+ # [2]: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/EBSEncryption.html#EBSEncryption_supported_instances
7251
7235
  #
7252
7236
  # @option params [Integer] :iops
7253
7237
  # The number of I/O operations per second (IOPS) to provision for the
@@ -7265,31 +7249,26 @@ module Aws::EC2
7265
7249
  # [2]: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/EBSVolumeTypes.html
7266
7250
  #
7267
7251
  # @option params [String] :kms_key_id
7268
- # An identifier for the AWS Key Management Service (AWS KMS) customer
7269
- # master key (CMK) to use to encrypt the volume. This parameter is only
7270
- # required if you want to use a customer-managed CMK; if this parameter
7271
- # is not specified, your AWS-managed CMK for the account is used. If a
7272
- # `KmsKeyId` is specified, the `Encrypted` flag must also be set.
7252
+ # The identifier of the AWS Key Management Service (AWS KMS) customer
7253
+ # master key (CMK) to use for Amazon EBS encryption. If this parameter
7254
+ # is not specified, your AWS managed CMK for EBS is used. If `KmsKeyId`
7255
+ # is specified, the encrypted state must be `true`.
7273
7256
  #
7274
- # The CMK identifier may be provided in any of the following formats:
7257
+ # You can specify the CMK using any of the following:
7275
7258
  #
7276
- # * Key ID: For example, key/1234abcd-12ab-34cd-56ef-1234567890ab.
7259
+ # * Key ID. For example, key/1234abcd-12ab-34cd-56ef-1234567890ab.
7277
7260
  #
7278
- # * Key alias: For example, alias/ExampleAlias.
7261
+ # * Key alias. For example, alias/ExampleAlias.
7279
7262
  #
7280
- # * Key ARN: The key ARN contains the `arn:aws:kms` namespace, followed
7281
- # by the Region of the CMK, the AWS account ID of the CMK owner, the
7282
- # `key` namespace, and then the CMK ID. For example,
7263
+ # * Key ARN. For example,
7283
7264
  # arn:aws:kms:*us-east-1*\:*012345678910*\:key/*abcd1234-a123-456a-a12b-a123b4cd56ef*.
7284
7265
  #
7285
- # * Alias ARN: The alias ARN contains the `arn:aws:kms` namespace,
7286
- # followed by the Region of the CMK, the AWS account ID of the CMK
7287
- # owner, the `alias` namespace, and then the CMK alias. For example,
7266
+ # * Alias ARN. For example,
7288
7267
  # arn:aws:kms:*us-east-1*\:*012345678910*\:alias/*ExampleAlias*.
7289
7268
  #
7290
- # AWS authenticates `KmsKeyId` asynchronously, meaning that the action
7291
- # you call may appear to complete even though you provided an invalid
7292
- # identifier. The action will eventually fail.
7269
+ # AWS authenticates the CMK asynchronously. Therefore, if you specify an
7270
+ # ID, alias, or ARN that is not valid, the action can appear to
7271
+ # complete, but eventually fails.
7293
7272
  #
7294
7273
  # @option params [Integer] :size
7295
7274
  # The size of the volume, in GiBs.
@@ -7706,6 +7685,7 @@ module Aws::EC2
7706
7685
  # resp.vpc_endpoint.tags #=> Array
7707
7686
  # resp.vpc_endpoint.tags[0].key #=> String
7708
7687
  # resp.vpc_endpoint.tags[0].value #=> String
7688
+ # resp.vpc_endpoint.owner_id #=> String
7709
7689
  # resp.client_token #=> String
7710
7690
  #
7711
7691
  # @see http://docs.aws.amazon.com/goto/WebAPI/ec2-2016-11-15/CreateVpcEndpoint AWS API Documentation
@@ -9452,7 +9432,7 @@ module Aws::EC2
9452
9432
  # resp.route.transit_gateway_attachments #=> Array
9453
9433
  # resp.route.transit_gateway_attachments[0].resource_id #=> String
9454
9434
  # resp.route.transit_gateway_attachments[0].transit_gateway_attachment_id #=> String
9455
- # resp.route.transit_gateway_attachments[0].resource_type #=> String, one of "vpc", "vpn"
9435
+ # resp.route.transit_gateway_attachments[0].resource_type #=> String, one of "vpc", "vpn", "direct-connect-gateway"
9456
9436
  # resp.route.type #=> String, one of "static", "propagated"
9457
9437
  # resp.route.state #=> String, one of "pending", "active", "blackhole", "deleting", "deleted"
9458
9438
  #
@@ -12802,7 +12782,8 @@ module Aws::EC2
12802
12782
  # @option params [Array<Types::Filter>] :filters
12803
12783
  # The filters.
12804
12784
  #
12805
- # * `architecture` - The image architecture (`i386` \| `x86_64`).
12785
+ # * `architecture` - The image architecture (`i386` \| `x86_64` \|
12786
+ # `arm64`).
12806
12787
  #
12807
12788
  # * `block-device-mapping.delete-on-termination` - A Boolean value that
12808
12789
  # indicates whether the Amazon EBS volume is deleted on instance
@@ -13651,7 +13632,8 @@ module Aws::EC2
13651
13632
  # * `affinity` - The affinity setting for an instance running on a
13652
13633
  # Dedicated Host (`default` \| `host`).
13653
13634
  #
13654
- # * `architecture` - The instance architecture (`i386` \| `x86_64`).
13635
+ # * `architecture` - The instance architecture (`i386` \| `x86_64` \|
13636
+ # `arm64`).
13655
13637
  #
13656
13638
  # * `availability-zone` - The Availability Zone of the instance.
13657
13639
  #
@@ -18979,7 +18961,7 @@ module Aws::EC2
18979
18961
  # resp.transit_gateway_attachments[0].transit_gateway_id #=> String
18980
18962
  # resp.transit_gateway_attachments[0].transit_gateway_owner_id #=> String
18981
18963
  # resp.transit_gateway_attachments[0].resource_owner_id #=> String
18982
- # resp.transit_gateway_attachments[0].resource_type #=> String, one of "vpc", "vpn"
18964
+ # resp.transit_gateway_attachments[0].resource_type #=> String, one of "vpc", "vpn", "direct-connect-gateway"
18983
18965
  # resp.transit_gateway_attachments[0].resource_id #=> String
18984
18966
  # resp.transit_gateway_attachments[0].state #=> String, one of "pendingAcceptance", "rollingBack", "pending", "available", "modifying", "deleting", "deleted", "failed", "rejected", "rejecting", "failing"
18985
18967
  # resp.transit_gateway_attachments[0].association.transit_gateway_route_table_id #=> String
@@ -20219,6 +20201,11 @@ module Aws::EC2
20219
20201
  # resp.vpc_endpoint_connections[0].vpc_endpoint_owner #=> String
20220
20202
  # resp.vpc_endpoint_connections[0].vpc_endpoint_state #=> String, one of "PendingAcceptance", "Pending", "Available", "Deleting", "Deleted", "Rejected", "Failed", "Expired"
20221
20203
  # resp.vpc_endpoint_connections[0].creation_timestamp #=> Time
20204
+ # resp.vpc_endpoint_connections[0].dns_entries #=> Array
20205
+ # resp.vpc_endpoint_connections[0].dns_entries[0].dns_name #=> String
20206
+ # resp.vpc_endpoint_connections[0].dns_entries[0].hosted_zone_id #=> String
20207
+ # resp.vpc_endpoint_connections[0].network_load_balancer_arns #=> Array
20208
+ # resp.vpc_endpoint_connections[0].network_load_balancer_arns[0] #=> String
20222
20209
  # resp.next_token #=> String
20223
20210
  #
20224
20211
  # @see http://docs.aws.amazon.com/goto/WebAPI/ec2-2016-11-15/DescribeVpcEndpointConnections AWS API Documentation
@@ -20572,6 +20559,7 @@ module Aws::EC2
20572
20559
  # resp.vpc_endpoints[0].tags #=> Array
20573
20560
  # resp.vpc_endpoints[0].tags[0].key #=> String
20574
20561
  # resp.vpc_endpoints[0].tags[0].value #=> String
20562
+ # resp.vpc_endpoints[0].owner_id #=> String
20575
20563
  # resp.next_token #=> String
20576
20564
  #
20577
20565
  # @see http://docs.aws.amazon.com/goto/WebAPI/ec2-2016-11-15/DescribeVpcEndpoints AWS API Documentation
@@ -21335,17 +21323,21 @@ module Aws::EC2
21335
21323
  req.send_request(options)
21336
21324
  end
21337
21325
 
21338
- # Disables default encryption for EBS volumes that are created in your
21339
- # account in the current region.
21326
+ # Disables EBS encryption by default for your account in the current
21327
+ # Region.
21328
+ #
21329
+ # After you disable encryption by default, you can still create
21330
+ # encrypted volumes by enabling encryption when you create each volume.
21331
+ #
21332
+ # Disabling encryption by default does not change the encryption status
21333
+ # of your existing volumes.
21334
+ #
21335
+ # For more information, see [Amazon EBS Encryption][1] in the *Amazon
21336
+ # Elastic Compute Cloud User Guide*.
21340
21337
  #
21341
- # Call this API if you have enabled default encryption using
21342
- # EnableEbsEncryptionByDefault and want to disable default EBS
21343
- # encryption. Once default EBS encryption is disabled, you can still
21344
- # create an encrypted volume by setting *encrypted* to *true* in the API
21345
- # call that creates the volume.
21346
21338
  #
21347
- # Disabling default EBS encryption will not change the encryption status
21348
- # of any of your existing volumes.
21339
+ #
21340
+ # [1]: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/EBSEncryption.html
21349
21341
  #
21350
21342
  # @option params [Boolean] :dry_run
21351
21343
  # Checks whether you have the required permissions for the action,
@@ -21407,7 +21399,7 @@ module Aws::EC2
21407
21399
  #
21408
21400
  # resp.propagation.transit_gateway_attachment_id #=> String
21409
21401
  # resp.propagation.resource_id #=> String
21410
- # resp.propagation.resource_type #=> String, one of "vpc", "vpn"
21402
+ # resp.propagation.resource_type #=> String, one of "vpc", "vpn", "direct-connect-gateway"
21411
21403
  # resp.propagation.transit_gateway_route_table_id #=> String
21412
21404
  # resp.propagation.state #=> String, one of "enabling", "enabled", "disabling", "disabled"
21413
21405
  #
@@ -21818,7 +21810,7 @@ module Aws::EC2
21818
21810
  # resp.association.transit_gateway_route_table_id #=> String
21819
21811
  # resp.association.transit_gateway_attachment_id #=> String
21820
21812
  # resp.association.resource_id #=> String
21821
- # resp.association.resource_type #=> String, one of "vpc", "vpn"
21813
+ # resp.association.resource_type #=> String, one of "vpc", "vpn", "direct-connect-gateway"
21822
21814
  # resp.association.state #=> String, one of "associating", "associated", "disassociating", "disassociated"
21823
21815
  #
21824
21816
  # @see http://docs.aws.amazon.com/goto/WebAPI/ec2-2016-11-15/DisassociateTransitGatewayRouteTable AWS API Documentation
@@ -21875,36 +21867,28 @@ module Aws::EC2
21875
21867
  req.send_request(options)
21876
21868
  end
21877
21869
 
21878
- # Enables default encryption for EBS volumes that are created in your
21879
- # account in the current region.
21880
- #
21881
- # Once encryption is enabled with this action, EBS volumes that are
21882
- # created in your account will always be encrypted even if encryption is
21883
- # not specified at launch. This setting overrides the *encrypted*
21884
- # setting to *true* in all API calls that create EBS volumes in your
21885
- # account. A volume will be encrypted even if you specify *encryption*
21886
- # to be *false* in the API call that creates the volume.
21870
+ # Enables EBS encryption by default for your account in the current
21871
+ # Region.
21887
21872
  #
21888
- # If you do not specify a customer master key (CMK) in the API call that
21889
- # creates the EBS volume, then the volume is encrypted to your AWS
21890
- # account's managed CMK.
21873
+ # After you enable encryption by default, the EBS volumes that you
21874
+ # create are are always encrypted, either using the default CMK or the
21875
+ # CMK that you specified when you created each volume. For more
21876
+ # information, see [Amazon EBS Encryption][1] in the *Amazon Elastic
21877
+ # Compute Cloud User Guide*.
21891
21878
  #
21892
- # You can specify a CMK of your choice using ModifyEbsDefaultKmsKeyId.
21879
+ # You can specify the default CMK for encryption by default using
21880
+ # ModifyEbsDefaultKmsKeyId or ResetEbsDefaultKmsKeyId.
21893
21881
  #
21894
- # Enabling encryption-by-default for EBS volumes has no effect on
21895
- # existing unencrypted volumes in your account. Encrypting the data in
21896
- # these requires manual action. You can either create an encrypted
21897
- # snapshot of an unencrypted volume, or encrypt a copy of an unencrypted
21898
- # snapshot. Any volume restored from an encrypted snapshot is also
21899
- # encrypted. For more information, see [Amazon EBS Snapshots][1].
21882
+ # Enabling encryption by default has no effect on the encryption status
21883
+ # of your existing volumes.
21900
21884
  #
21901
- # After EBS encryption-by-default is enabled, you can no longer launch
21902
- # older-generation instance types that do not support encryption. For
21885
+ # After you enable encryption by default, you can no longer launch
21886
+ # instances using instance types that do not support encryption. For
21903
21887
  # more information, see [Supported Instance Types][2].
21904
21888
  #
21905
21889
  #
21906
21890
  #
21907
- # [1]: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/EBSSnapshots.html
21891
+ # [1]: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/EBSEncryption.html
21908
21892
  # [2]: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/EBSEncryption.html#EBSEncryption_supported_instances
21909
21893
  #
21910
21894
  # @option params [Boolean] :dry_run
@@ -21967,7 +21951,7 @@ module Aws::EC2
21967
21951
  #
21968
21952
  # resp.propagation.transit_gateway_attachment_id #=> String
21969
21953
  # resp.propagation.resource_id #=> String
21970
- # resp.propagation.resource_type #=> String, one of "vpc", "vpn"
21954
+ # resp.propagation.resource_type #=> String, one of "vpc", "vpn", "direct-connect-gateway"
21971
21955
  # resp.propagation.transit_gateway_route_table_id #=> String
21972
21956
  # resp.propagation.state #=> String, one of "enabling", "enabled", "disabling", "disabled"
21973
21957
  #
@@ -22231,7 +22215,7 @@ module Aws::EC2
22231
22215
  # @option params [Array<Types::Filter>] :filters
22232
22216
  # One or more filters. The possible values are:
22233
22217
  #
22234
- # * `attachment.transit-gateway-attachment-id`- The id of the transit
22218
+ # * `attachment.transit-gateway-attachment-id` - The id of the transit
22235
22219
  # gateway attachment.
22236
22220
  #
22237
22221
  # * `attachment.resource-id` - The resource id of the transit gateway
@@ -22258,7 +22242,7 @@ module Aws::EC2
22258
22242
  #
22259
22243
  # * `transit-gateway-route-destination-cidr-block` - The CIDR range.
22260
22244
  #
22261
- # * `type` - The type of roue (`active` \| `blackhole`).
22245
+ # * `type` - The type of route (`active` \| `blackhole`).
22262
22246
  #
22263
22247
  # @option params [required, String] :s3_bucket
22264
22248
  # The name of the S3 bucket.
@@ -22427,9 +22411,17 @@ module Aws::EC2
22427
22411
  req.send_request(options)
22428
22412
  end
22429
22413
 
22430
- # Describes the default customer master key (CMK) that your account uses
22431
- # to encrypt EBS volumes if you don’t specify a CMK in the API call. You
22432
- # can change this default using ModifyEbsDefaultKmsKeyId.
22414
+ # Describes the default customer master key (CMK) for EBS encryption by
22415
+ # default for your account in this Region. You can change the default
22416
+ # CMK for encryption by default using ModifyEbsDefaultKmsKeyId or
22417
+ # ResetEbsDefaultKmsKeyId.
22418
+ #
22419
+ # For more information, see [Amazon EBS Encryption][1] in the *Amazon
22420
+ # Elastic Compute Cloud User Guide*.
22421
+ #
22422
+ #
22423
+ #
22424
+ # [1]: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/EBSEncryption.html
22433
22425
  #
22434
22426
  # @option params [Boolean] :dry_run
22435
22427
  # Checks whether you have the required permissions for the action,
@@ -22460,8 +22452,15 @@ module Aws::EC2
22460
22452
  req.send_request(options)
22461
22453
  end
22462
22454
 
22463
- # Describes whether default EBS encryption is enabled for your account
22464
- # in the current region.
22455
+ # Describes whether EBS encryption by default is enabled for your
22456
+ # account in the current Region.
22457
+ #
22458
+ # For more information, see [Amazon EBS Encryption][1] in the *Amazon
22459
+ # Elastic Compute Cloud User Guide*.
22460
+ #
22461
+ #
22462
+ #
22463
+ # [1]: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/EBSEncryption.html
22465
22464
  #
22466
22465
  # @option params [Boolean] :dry_run
22467
22466
  # Checks whether you have the required permissions for the action,
@@ -22976,7 +22975,7 @@ module Aws::EC2
22976
22975
  # resp.associations #=> Array
22977
22976
  # resp.associations[0].transit_gateway_attachment_id #=> String
22978
22977
  # resp.associations[0].resource_id #=> String
22979
- # resp.associations[0].resource_type #=> String, one of "vpc", "vpn"
22978
+ # resp.associations[0].resource_type #=> String, one of "vpc", "vpn", "direct-connect-gateway"
22980
22979
  # resp.associations[0].state #=> String, one of "associating", "associated", "disassociating", "disassociated"
22981
22980
  # resp.next_token #=> String
22982
22981
  #
@@ -23043,7 +23042,7 @@ module Aws::EC2
23043
23042
  # resp.transit_gateway_route_table_propagations #=> Array
23044
23043
  # resp.transit_gateway_route_table_propagations[0].transit_gateway_attachment_id #=> String
23045
23044
  # resp.transit_gateway_route_table_propagations[0].resource_id #=> String
23046
- # resp.transit_gateway_route_table_propagations[0].resource_type #=> String, one of "vpc", "vpn"
23045
+ # resp.transit_gateway_route_table_propagations[0].resource_type #=> String, one of "vpc", "vpn", "direct-connect-gateway"
23047
23046
  # resp.transit_gateway_route_table_propagations[0].state #=> String, one of "enabling", "enabled", "disabling", "disabled"
23048
23047
  # resp.next_token #=> String
23049
23048
  #
@@ -23119,7 +23118,7 @@ module Aws::EC2
23119
23118
  # @option params [String] :architecture
23120
23119
  # The architecture of the virtual machine.
23121
23120
  #
23122
- # Valid values: `i386` \| `x86_64`
23121
+ # Valid values: `i386` \| `x86_64` \| `arm64`
23123
23122
  #
23124
23123
  # @option params [Types::ClientData] :client_data
23125
23124
  # The client-specific data.
@@ -23853,43 +23852,47 @@ module Aws::EC2
23853
23852
  req.send_request(options)
23854
23853
  end
23855
23854
 
23856
- # Changes the customer master key (CMK) that your account uses to
23857
- # encrypt EBS volumes if you don't specify a CMK in the API call.
23855
+ # Changes the default customer master key (CMK) for EBS encryption by
23856
+ # default for your account in this Region.
23857
+ #
23858
+ # AWS creates a unique AWS managed CMK in each Region for use with
23859
+ # encryption by default. If you change the default CMK to a customer
23860
+ # managed CMK, it is used instead of the AWS managed CMK. To reset the
23861
+ # default CMK to the AWS managed CMK for EBS, use
23862
+ # ResetEbsDefaultKmsKeyId.
23863
+ #
23864
+ # If you delete or disable the customer managed CMK that you specified
23865
+ # for use with encryption by default, your instances will fail to
23866
+ # launch.
23867
+ #
23868
+ # For more information, see [Amazon EBS Encryption][1] in the *Amazon
23869
+ # Elastic Compute Cloud User Guide*.
23858
23870
  #
23859
- # By default, your account has an AWS-managed CMK that is used for
23860
- # encrypting an EBS volume when no CMK is specified in the API call that
23861
- # creates the volume. By calling this API, you can specify a
23862
- # customer-managed CMK to use in place of the AWS-managed CMK.
23863
23871
  #
23864
- # Note: Deleting or disabling the CMK that you have specified to act as
23865
- # your default CMK will result in instance-launch failures.
23872
+ #
23873
+ # [1]: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/EBSEncryption.html
23866
23874
  #
23867
23875
  # @option params [required, String] :kms_key_id
23868
- # An identifier for the AWS Key Management Service (AWS KMS) customer
23869
- # master key (CMK) to use to encrypt the volume. This parameter is only
23870
- # required if you want to use a customer-managed CMK; if this parameter
23871
- # is not specified, your AWS-managed CMK for the account is used. If a
23872
- # `KmsKeyId` is specified, the `Encrypted` flag must also be set.
23876
+ # The identifier of the AWS Key Management Service (AWS KMS) customer
23877
+ # master key (CMK) to use for Amazon EBS encryption. If this parameter
23878
+ # is not specified, your AWS managed CMK for EBS is used. If `KmsKeyId`
23879
+ # is specified, the encrypted state must be `true`.
23873
23880
  #
23874
- # The CMK identifier may be provided in any of the following formats:
23881
+ # You can specify the CMK using any of the following:
23875
23882
  #
23876
- # * Key ID: For example, key/1234abcd-12ab-34cd-56ef-1234567890ab.
23883
+ # * Key ID. For example, key/1234abcd-12ab-34cd-56ef-1234567890ab.
23877
23884
  #
23878
- # * Key alias: For example, alias/ExampleAlias.
23885
+ # * Key alias. For example, alias/ExampleAlias.
23879
23886
  #
23880
- # * Key ARN: The key ARN contains the `arn:aws:kms` namespace, followed
23881
- # by the Region of the CMK, the AWS account ID of the CMK owner, the
23882
- # `key` namespace, and then the CMK ID. For example,
23887
+ # * Key ARN. For example,
23883
23888
  # arn:aws:kms:*us-east-1*\:*012345678910*\:key/*abcd1234-a123-456a-a12b-a123b4cd56ef*.
23884
23889
  #
23885
- # * Alias ARN: The alias ARN contains the `arn:aws:kms` namespace,
23886
- # followed by the Region of the CMK, the AWS account ID of the CMK
23887
- # owner, the `alias` namespace, and then the CMK alias. For example,
23890
+ # * Alias ARN. For example,
23888
23891
  # arn:aws:kms:*us-east-1*\:*012345678910*\:alias/*ExampleAlias*.
23889
23892
  #
23890
- # AWS authenticates `KmsKeyId` asynchronously, meaning that the action
23891
- # you call may appear to complete even though you provided an invalid
23892
- # identifier. The action will eventually fail.
23893
+ # AWS authenticates the CMK asynchronously. Therefore, if you specify an
23894
+ # ID, alias, or ARN that is not valid, the action can appear to
23895
+ # complete, but eventually fails.
23893
23896
  #
23894
23897
  # @option params [Boolean] :dry_run
23895
23898
  # Checks whether you have the required permissions for the action,
@@ -25114,9 +25117,9 @@ module Aws::EC2
25114
25117
 
25115
25118
  # Adds or removes permission settings for the specified snapshot. You
25116
25119
  # may add or remove specified AWS account IDs from a snapshot's list of
25117
- # create volume permissions, but you cannot do both in a single API
25118
- # call. If you need to both add and remove account IDs for a snapshot,
25119
- # you must use multiple API calls.
25120
+ # create volume permissions, but you cannot do both in a single
25121
+ # operation. If you need to both add and remove account IDs for a
25122
+ # snapshot, you must use multiple operations.
25120
25123
  #
25121
25124
  # Encrypted snapshots and snapshots with AWS Marketplace product codes
25122
25125
  # cannot be made public. Snapshots encrypted with your default CMK
@@ -25462,8 +25465,8 @@ module Aws::EC2
25462
25465
  # You can use CloudWatch Events to check the status of a modification to
25463
25466
  # an EBS volume. For information about CloudWatch Events, see the
25464
25467
  # [Amazon CloudWatch Events User Guide][5]. You can also track the
25465
- # status of a modification using the DescribeVolumesModifications API.
25466
- # For information about tracking status changes using either method, see
25468
+ # status of a modification using DescribeVolumesModifications. For
25469
+ # information about tracking status changes using either method, see
25467
25470
  # [Monitoring Volume Modifications][6].
25468
25471
  #
25469
25472
  # With previous-generation instance types, resizing an EBS volume may
@@ -27524,7 +27527,7 @@ module Aws::EC2
27524
27527
  # resp.route.transit_gateway_attachments #=> Array
27525
27528
  # resp.route.transit_gateway_attachments[0].resource_id #=> String
27526
27529
  # resp.route.transit_gateway_attachments[0].transit_gateway_attachment_id #=> String
27527
- # resp.route.transit_gateway_attachments[0].resource_type #=> String, one of "vpc", "vpn"
27530
+ # resp.route.transit_gateway_attachments[0].resource_type #=> String, one of "vpc", "vpn", "direct-connect-gateway"
27528
27531
  # resp.route.type #=> String, one of "static", "propagated"
27529
27532
  # resp.route.state #=> String, one of "pending", "active", "blackhole", "deleting", "deleted"
27530
27533
  #
@@ -28298,20 +28301,17 @@ module Aws::EC2
28298
28301
  req.send_request(options)
28299
28302
  end
28300
28303
 
28301
- # Resets the account's default customer master key (CMK) to the
28302
- # account's AWS-managed default CMK. This default CMK is used to
28303
- # encrypt EBS volumes when you have enabled EBS encryption by default
28304
- # without specifying a CMK in the API call. If you have not enabled
28305
- # encryption by default, then this CMK is used when you set the
28306
- # `Encrypted` parameter to true without specifying a custom CMK in the
28307
- # API call.
28304
+ # Resets the default customer master key (CMK) for EBS encryption for
28305
+ # your account in this Region to the AWS managed CMK for EBS.
28308
28306
  #
28309
- # Call this API if you have modified the default CMK that is used for
28310
- # encrypting your EBS volume using ModifyEbsDefaultKmsKeyId and you want
28311
- # to reset it to the AWS-managed default CMK. After resetting, you can
28312
- # continue to provide a CMK of your choice in the API call that creates
28313
- # the volume. However, if no CMK is specified, your account will encrypt
28314
- # the volume to the AWS-managed default CMK.
28307
+ # After resetting the default CMK to the AWS managed CMK, you can
28308
+ # continue to encrypt by a customer managed CMK by specifying it when
28309
+ # you create the volume. For more information, see [Amazon EBS
28310
+ # Encryption][1] in the *Amazon Elastic Compute Cloud User Guide*.
28311
+ #
28312
+ #
28313
+ #
28314
+ # [1]: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/EBSEncryption.html
28315
28315
  #
28316
28316
  # @option params [Boolean] :dry_run
28317
28317
  # Checks whether you have the required permissions for the action,
@@ -29866,11 +29866,9 @@ module Aws::EC2
29866
29866
  # supernet-of-match as 10.0.1.0/30, then the result returns
29867
29867
  # 10.0.1.0/29.
29868
29868
  #
29869
- # * `state` - The state of the attachment (`available` \| `deleted` \|
29870
- # `deleting` \| `failed` \| `modifying` \| `pendingAcceptance` \|
29871
- # `pending` \| `rollingBack` \| `rejected` \| `rejecting`).
29869
+ # * `state` - The state of the route (`active` \| `blackhole`).
29872
29870
  #
29873
- # * `type` - The type of roue (`active` \| `blackhole`).
29871
+ # * `type` - The type of roue (`propagated` \| `static`).
29874
29872
  #
29875
29873
  # @option params [Integer] :max_results
29876
29874
  # The maximum number of routes to return.
@@ -29907,7 +29905,7 @@ module Aws::EC2
29907
29905
  # resp.routes[0].transit_gateway_attachments #=> Array
29908
29906
  # resp.routes[0].transit_gateway_attachments[0].resource_id #=> String
29909
29907
  # resp.routes[0].transit_gateway_attachments[0].transit_gateway_attachment_id #=> String
29910
- # resp.routes[0].transit_gateway_attachments[0].resource_type #=> String, one of "vpc", "vpn"
29908
+ # resp.routes[0].transit_gateway_attachments[0].resource_type #=> String, one of "vpc", "vpn", "direct-connect-gateway"
29911
29909
  # resp.routes[0].type #=> String, one of "static", "propagated"
29912
29910
  # resp.routes[0].state #=> String, one of "pending", "active", "blackhole", "deleting", "deleted"
29913
29911
  # resp.additional_routes_available #=> Boolean
@@ -30728,7 +30726,7 @@ module Aws::EC2
30728
30726
  params: params,
30729
30727
  config: config)
30730
30728
  context[:gem_name] = 'aws-sdk-ec2'
30731
- context[:gem_version] = '1.90.0'
30729
+ context[:gem_version] = '1.91.0'
30732
30730
  Seahorse::Client::Request.new(handlers, context)
30733
30731
  end
30734
30732