aws-sdk-ec2 1.199.0 → 1.200.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: d294e8bfc8ed2fbf06c35a88f7e484f501257964b1ceeb44eae4a4d04426fd3b
4
- data.tar.gz: 0c40b83a509acffc10af1d8a6fc233f37cd59a8f39b89deee0380b2a047ff534
3
+ metadata.gz: 74b39c7015b1fe70243bc4856fd470a2eff67292b7c8a830628eedfb2f3d459d
4
+ data.tar.gz: c15df8e54285b4821dab85348e9a6b1e0d40e2f1d3c544b5cf710bd733815e2c
5
5
  SHA512:
6
- metadata.gz: f98e64b921201a7333235bee4ab5a5dd928e74fe65df1be4fd82536507ac8bd06889913ba77b7b0ee03c1de05f5ce593dfc36e3a5e41972cb4eaba809860496e
7
- data.tar.gz: a90f19ef058dea1b4d0462be12dd981ac9cfc292482beb7eb3cfdf68941524ead67811c1157ff3c4fde8adad4d7a8daa238b1013a9a135de9c2ebd67caca4d62
6
+ metadata.gz: b978170f67bb4ee61056da61e5eb556ba4c8e6127c708cd86b544367a3f4bf4514e1468256fc49f91e8139531755c3adbb900a6eb7d0aaae71b8de0c8dc0d1c7
7
+ data.tar.gz: 734dc51216adbece8bfa2f184a6ad109ff9946908400ebba85937dd6ce01977895e5f378f270c9caeec81fccf4f1b901589d7cd12a7c18b6be44485b533a76d9
@@ -72,6 +72,6 @@ require_relative 'aws-sdk-ec2/customizations'
72
72
  # @!group service
73
73
  module Aws::EC2
74
74
 
75
- GEM_VERSION = '1.199.0'
75
+ GEM_VERSION = '1.200.0'
76
76
 
77
77
  end
@@ -36461,10 +36461,19 @@ module Aws::EC2
36461
36461
  end
36462
36462
 
36463
36463
  # \[VPC only\] Removes the specified egress rules from a security group
36464
- # for EC2-VPC. This action doesn't apply to security groups for use in
36464
+ # for EC2-VPC. This action does not apply to security groups for use in
36465
36465
  # EC2-Classic. To remove a rule, the values that you specify (for
36466
36466
  # example, ports) must match the existing rule's values exactly.
36467
36467
  #
36468
+ # <note markdown="1"> \[Default VPC\] If the values you specify do not match the existing
36469
+ # rule's values, no error is returned, and the output describes the
36470
+ # security group rules that were not revoked.
36471
+ #
36472
+ # AWS recommends that you use DescribeSecurityGroups to verify that the
36473
+ # rule has been removed.
36474
+ #
36475
+ # </note>
36476
+ #
36468
36477
  # Each rule consists of the protocol and the IPv4 or IPv6 CIDR range or
36469
36478
  # source security group. For the TCP and UDP protocols, you must also
36470
36479
  # specify the destination port or range of ports. For the ICMP protocol,
@@ -36509,7 +36518,10 @@ module Aws::EC2
36509
36518
  # Not supported. Use a set of IP permissions to specify a destination
36510
36519
  # security group.
36511
36520
  #
36512
- # @return [Struct] Returns an empty {Seahorse::Client::Response response}.
36521
+ # @return [Types::RevokeSecurityGroupEgressResult] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
36522
+ #
36523
+ # * {Types::RevokeSecurityGroupEgressResult#return #return} => Boolean
36524
+ # * {Types::RevokeSecurityGroupEgressResult#unknown_ip_permissions #unknown_ip_permissions} => Array&lt;Types::IpPermission&gt;
36513
36525
  #
36514
36526
  # @example Request syntax with placeholder values
36515
36527
  #
@@ -36560,6 +36572,31 @@ module Aws::EC2
36560
36572
  # source_security_group_owner_id: "String",
36561
36573
  # })
36562
36574
  #
36575
+ # @example Response structure
36576
+ #
36577
+ # resp.return #=> Boolean
36578
+ # resp.unknown_ip_permissions #=> Array
36579
+ # resp.unknown_ip_permissions[0].from_port #=> Integer
36580
+ # resp.unknown_ip_permissions[0].ip_protocol #=> String
36581
+ # resp.unknown_ip_permissions[0].ip_ranges #=> Array
36582
+ # resp.unknown_ip_permissions[0].ip_ranges[0].cidr_ip #=> String
36583
+ # resp.unknown_ip_permissions[0].ip_ranges[0].description #=> String
36584
+ # resp.unknown_ip_permissions[0].ipv_6_ranges #=> Array
36585
+ # resp.unknown_ip_permissions[0].ipv_6_ranges[0].cidr_ipv_6 #=> String
36586
+ # resp.unknown_ip_permissions[0].ipv_6_ranges[0].description #=> String
36587
+ # resp.unknown_ip_permissions[0].prefix_list_ids #=> Array
36588
+ # resp.unknown_ip_permissions[0].prefix_list_ids[0].description #=> String
36589
+ # resp.unknown_ip_permissions[0].prefix_list_ids[0].prefix_list_id #=> String
36590
+ # resp.unknown_ip_permissions[0].to_port #=> Integer
36591
+ # resp.unknown_ip_permissions[0].user_id_group_pairs #=> Array
36592
+ # resp.unknown_ip_permissions[0].user_id_group_pairs[0].description #=> String
36593
+ # resp.unknown_ip_permissions[0].user_id_group_pairs[0].group_id #=> String
36594
+ # resp.unknown_ip_permissions[0].user_id_group_pairs[0].group_name #=> String
36595
+ # resp.unknown_ip_permissions[0].user_id_group_pairs[0].peering_status #=> String
36596
+ # resp.unknown_ip_permissions[0].user_id_group_pairs[0].user_id #=> String
36597
+ # resp.unknown_ip_permissions[0].user_id_group_pairs[0].vpc_id #=> String
36598
+ # resp.unknown_ip_permissions[0].user_id_group_pairs[0].vpc_peering_connection_id #=> String
36599
+ #
36563
36600
  # @see http://docs.aws.amazon.com/goto/WebAPI/ec2-2016-11-15/RevokeSecurityGroupEgress AWS API Documentation
36564
36601
  #
36565
36602
  # @overload revoke_security_group_egress(params = {})
@@ -36573,9 +36610,12 @@ module Aws::EC2
36573
36610
  # rule, the values that you specify (for example, ports) must match the
36574
36611
  # existing rule's values exactly.
36575
36612
  #
36576
- # <note markdown="1"> \[EC2-Classic only\] If the values you specify do not match the
36577
- # existing rule's values, no error is returned. Use
36578
- # DescribeSecurityGroups to verify that the rule has been removed.
36613
+ # <note markdown="1"> \[EC2-Classic , default VPC\] If the values you specify do not match
36614
+ # the existing rule's values, no error is returned, and the output
36615
+ # describes the security group rules that were not revoked.
36616
+ #
36617
+ # AWS recommends that you use DescribeSecurityGroups to verify that the
36618
+ # rule has been removed.
36579
36619
  #
36580
36620
  # </note>
36581
36621
  #
@@ -36647,7 +36687,10 @@ module Aws::EC2
36647
36687
  # If you have the required permissions, the error response is
36648
36688
  # `DryRunOperation`. Otherwise, it is `UnauthorizedOperation`.
36649
36689
  #
36650
- # @return [Struct] Returns an empty {Seahorse::Client::Response response}.
36690
+ # @return [Types::RevokeSecurityGroupIngressResult] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
36691
+ #
36692
+ # * {Types::RevokeSecurityGroupIngressResult#return #return} => Boolean
36693
+ # * {Types::RevokeSecurityGroupIngressResult#unknown_ip_permissions #unknown_ip_permissions} => Array&lt;Types::IpPermission&gt;
36651
36694
  #
36652
36695
  # @example Request syntax with placeholder values
36653
36696
  #
@@ -36699,6 +36742,31 @@ module Aws::EC2
36699
36742
  # dry_run: false,
36700
36743
  # })
36701
36744
  #
36745
+ # @example Response structure
36746
+ #
36747
+ # resp.return #=> Boolean
36748
+ # resp.unknown_ip_permissions #=> Array
36749
+ # resp.unknown_ip_permissions[0].from_port #=> Integer
36750
+ # resp.unknown_ip_permissions[0].ip_protocol #=> String
36751
+ # resp.unknown_ip_permissions[0].ip_ranges #=> Array
36752
+ # resp.unknown_ip_permissions[0].ip_ranges[0].cidr_ip #=> String
36753
+ # resp.unknown_ip_permissions[0].ip_ranges[0].description #=> String
36754
+ # resp.unknown_ip_permissions[0].ipv_6_ranges #=> Array
36755
+ # resp.unknown_ip_permissions[0].ipv_6_ranges[0].cidr_ipv_6 #=> String
36756
+ # resp.unknown_ip_permissions[0].ipv_6_ranges[0].description #=> String
36757
+ # resp.unknown_ip_permissions[0].prefix_list_ids #=> Array
36758
+ # resp.unknown_ip_permissions[0].prefix_list_ids[0].description #=> String
36759
+ # resp.unknown_ip_permissions[0].prefix_list_ids[0].prefix_list_id #=> String
36760
+ # resp.unknown_ip_permissions[0].to_port #=> Integer
36761
+ # resp.unknown_ip_permissions[0].user_id_group_pairs #=> Array
36762
+ # resp.unknown_ip_permissions[0].user_id_group_pairs[0].description #=> String
36763
+ # resp.unknown_ip_permissions[0].user_id_group_pairs[0].group_id #=> String
36764
+ # resp.unknown_ip_permissions[0].user_id_group_pairs[0].group_name #=> String
36765
+ # resp.unknown_ip_permissions[0].user_id_group_pairs[0].peering_status #=> String
36766
+ # resp.unknown_ip_permissions[0].user_id_group_pairs[0].user_id #=> String
36767
+ # resp.unknown_ip_permissions[0].user_id_group_pairs[0].vpc_id #=> String
36768
+ # resp.unknown_ip_permissions[0].user_id_group_pairs[0].vpc_peering_connection_id #=> String
36769
+ #
36702
36770
  # @see http://docs.aws.amazon.com/goto/WebAPI/ec2-2016-11-15/RevokeSecurityGroupIngress AWS API Documentation
36703
36771
  #
36704
36772
  # @overload revoke_security_group_ingress(params = {})
@@ -38789,7 +38857,7 @@ module Aws::EC2
38789
38857
  params: params,
38790
38858
  config: config)
38791
38859
  context[:gem_name] = 'aws-sdk-ec2'
38792
- context[:gem_version] = '1.199.0'
38860
+ context[:gem_version] = '1.200.0'
38793
38861
  Seahorse::Client::Request.new(handlers, context)
38794
38862
  end
38795
38863
 
@@ -1695,7 +1695,9 @@ module Aws::EC2
1695
1695
  RevokeClientVpnIngressRequest = Shapes::StructureShape.new(name: 'RevokeClientVpnIngressRequest')
1696
1696
  RevokeClientVpnIngressResult = Shapes::StructureShape.new(name: 'RevokeClientVpnIngressResult')
1697
1697
  RevokeSecurityGroupEgressRequest = Shapes::StructureShape.new(name: 'RevokeSecurityGroupEgressRequest')
1698
+ RevokeSecurityGroupEgressResult = Shapes::StructureShape.new(name: 'RevokeSecurityGroupEgressResult')
1698
1699
  RevokeSecurityGroupIngressRequest = Shapes::StructureShape.new(name: 'RevokeSecurityGroupIngressRequest')
1700
+ RevokeSecurityGroupIngressResult = Shapes::StructureShape.new(name: 'RevokeSecurityGroupIngressResult')
1699
1701
  RootDeviceType = Shapes::StringShape.new(name: 'RootDeviceType')
1700
1702
  RootDeviceTypeList = Shapes::ListShape.new(name: 'RootDeviceTypeList')
1701
1703
  Route = Shapes::StructureShape.new(name: 'Route')
@@ -8713,6 +8715,10 @@ module Aws::EC2
8713
8715
  RevokeSecurityGroupEgressRequest.add_member(:source_security_group_owner_id, Shapes::ShapeRef.new(shape: String, location_name: "sourceSecurityGroupOwnerId"))
8714
8716
  RevokeSecurityGroupEgressRequest.struct_class = Types::RevokeSecurityGroupEgressRequest
8715
8717
 
8718
+ RevokeSecurityGroupEgressResult.add_member(:return, Shapes::ShapeRef.new(shape: Boolean, location_name: "return"))
8719
+ RevokeSecurityGroupEgressResult.add_member(:unknown_ip_permissions, Shapes::ShapeRef.new(shape: IpPermissionList, location_name: "unknownIpPermissionSet"))
8720
+ RevokeSecurityGroupEgressResult.struct_class = Types::RevokeSecurityGroupEgressResult
8721
+
8716
8722
  RevokeSecurityGroupIngressRequest.add_member(:cidr_ip, Shapes::ShapeRef.new(shape: String, location_name: "CidrIp"))
8717
8723
  RevokeSecurityGroupIngressRequest.add_member(:from_port, Shapes::ShapeRef.new(shape: Integer, location_name: "FromPort"))
8718
8724
  RevokeSecurityGroupIngressRequest.add_member(:group_id, Shapes::ShapeRef.new(shape: SecurityGroupId, location_name: "GroupId"))
@@ -8725,6 +8731,10 @@ module Aws::EC2
8725
8731
  RevokeSecurityGroupIngressRequest.add_member(:dry_run, Shapes::ShapeRef.new(shape: Boolean, location_name: "dryRun"))
8726
8732
  RevokeSecurityGroupIngressRequest.struct_class = Types::RevokeSecurityGroupIngressRequest
8727
8733
 
8734
+ RevokeSecurityGroupIngressResult.add_member(:return, Shapes::ShapeRef.new(shape: Boolean, location_name: "return"))
8735
+ RevokeSecurityGroupIngressResult.add_member(:unknown_ip_permissions, Shapes::ShapeRef.new(shape: IpPermissionList, location_name: "unknownIpPermissionSet"))
8736
+ RevokeSecurityGroupIngressResult.struct_class = Types::RevokeSecurityGroupIngressResult
8737
+
8728
8738
  RootDeviceTypeList.member = Shapes::ShapeRef.new(shape: RootDeviceType, location_name: "item")
8729
8739
 
8730
8740
  Route.add_member(:destination_cidr_block, Shapes::ShapeRef.new(shape: String, location_name: "destinationCidrBlock"))
@@ -13983,7 +13993,7 @@ module Aws::EC2
13983
13993
  o.http_method = "POST"
13984
13994
  o.http_request_uri = "/"
13985
13995
  o.input = Shapes::ShapeRef.new(shape: RevokeSecurityGroupEgressRequest)
13986
- o.output = Shapes::ShapeRef.new(shape: Shapes::StructureShape.new(struct_class: Aws::EmptyStructure))
13996
+ o.output = Shapes::ShapeRef.new(shape: RevokeSecurityGroupEgressResult)
13987
13997
  end)
13988
13998
 
13989
13999
  api.add_operation(:revoke_security_group_ingress, Seahorse::Model::Operation.new.tap do |o|
@@ -13991,7 +14001,7 @@ module Aws::EC2
13991
14001
  o.http_method = "POST"
13992
14002
  o.http_request_uri = "/"
13993
14003
  o.input = Shapes::ShapeRef.new(shape: RevokeSecurityGroupIngressRequest)
13994
- o.output = Shapes::ShapeRef.new(shape: Shapes::StructureShape.new(struct_class: Aws::EmptyStructure))
14004
+ o.output = Shapes::ShapeRef.new(shape: RevokeSecurityGroupIngressResult)
13995
14005
  end)
13996
14006
 
13997
14007
  api.add_operation(:run_instances, Seahorse::Model::Operation.new.tap do |o|
@@ -580,7 +580,7 @@ module Aws::EC2
580
580
  # @option options [String] :source_security_group_owner_id
581
581
  # Not supported. Use a set of IP permissions to specify a destination
582
582
  # security group.
583
- # @return [EmptyStructure]
583
+ # @return [Types::RevokeSecurityGroupEgressResult]
584
584
  def revoke_egress(options = {})
585
585
  options = options.merge(group_id: @id)
586
586
  resp = @client.revoke_security_group_egress(options)
@@ -680,7 +680,7 @@ module Aws::EC2
680
680
  # without actually making the request, and provides an error response.
681
681
  # If you have the required permissions, the error response is
682
682
  # `DryRunOperation`. Otherwise, it is `UnauthorizedOperation`.
683
- # @return [EmptyStructure]
683
+ # @return [Types::RevokeSecurityGroupIngressResult]
684
684
  def revoke_ingress(options = {})
685
685
  options = options.merge(group_id: @id)
686
686
  resp = @client.revoke_security_group_ingress(options)
@@ -43581,6 +43581,25 @@ module Aws::EC2
43581
43581
  include Aws::Structure
43582
43582
  end
43583
43583
 
43584
+ # @!attribute [rw] return
43585
+ # Returns `true` if the request succeeds; otherwise, returns an error.
43586
+ # @return [Boolean]
43587
+ #
43588
+ # @!attribute [rw] unknown_ip_permissions
43589
+ # The outbound rules that were unknown to the service. In some cases,
43590
+ # `unknownIpPermissionSet` might be in a different format from the
43591
+ # request parameter.
43592
+ # @return [Array<Types::IpPermission>]
43593
+ #
43594
+ # @see http://docs.aws.amazon.com/goto/WebAPI/ec2-2016-11-15/RevokeSecurityGroupEgressResult AWS API Documentation
43595
+ #
43596
+ class RevokeSecurityGroupEgressResult < Struct.new(
43597
+ :return,
43598
+ :unknown_ip_permissions)
43599
+ SENSITIVE = []
43600
+ include Aws::Structure
43601
+ end
43602
+
43584
43603
  # @note When making an API call, you may pass RevokeSecurityGroupIngressRequest
43585
43604
  # data as a hash:
43586
43605
  #
@@ -43718,6 +43737,25 @@ module Aws::EC2
43718
43737
  include Aws::Structure
43719
43738
  end
43720
43739
 
43740
+ # @!attribute [rw] return
43741
+ # Returns `true` if the request succeeds; otherwise, returns an error.
43742
+ # @return [Boolean]
43743
+ #
43744
+ # @!attribute [rw] unknown_ip_permissions
43745
+ # The inbound rules that were unknown to the service. In some cases,
43746
+ # `unknownIpPermissionSet` might be in a different format from the
43747
+ # request parameter.
43748
+ # @return [Array<Types::IpPermission>]
43749
+ #
43750
+ # @see http://docs.aws.amazon.com/goto/WebAPI/ec2-2016-11-15/RevokeSecurityGroupIngressResult AWS API Documentation
43751
+ #
43752
+ class RevokeSecurityGroupIngressResult < Struct.new(
43753
+ :return,
43754
+ :unknown_ip_permissions)
43755
+ SENSITIVE = []
43756
+ include Aws::Structure
43757
+ end
43758
+
43721
43759
  # Describes a route in a route table.
43722
43760
  #
43723
43761
  # @!attribute [rw] destination_cidr_block
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-ec2
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.199.0
4
+ version: 1.200.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2020-10-06 00:00:00.000000000 Z
11
+ date: 2020-10-08 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sigv4