aws-sdk-ecs 1.114.0 → 1.115.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: c14e1ae322a80a0e104527e1d5f5608f133a9c55b1fafff4f9557230d24404ff
4
- data.tar.gz: b66f29af6d95589d8365dd099f19d8babf2ddb1c781a6152450d84ee9f04879f
3
+ metadata.gz: 3ca30e3806f75411b24b361c388cdb2009426d17f9de6da79fd1e71af4886b0b
4
+ data.tar.gz: 24955861fac0e68d2ad944d2b37edfc3bd21d9b9805b3b36571ae56b3da23096
5
5
  SHA512:
6
- metadata.gz: 58dd9bb74b69d618eaa6a91068349bc7a4042779e565c003ac9ea021ff58d2a29cbebf838bc687c598f19eb1e52d09ff6140131d40b30309b8e609bdfafa7971
7
- data.tar.gz: 477cf6d183bb9f79eedc1a2809261e92b0209a4e72e59fc4ff602cf110816d0f09e42ecb4433ca3af39335ff977738ef9366dfdbdb58fd853e6ad35a7b069321
6
+ metadata.gz: e2049b552727eac77b8e7913b1c5e577842212ee06d596e3e1f7222b1aae807942a5f7a2a538961343b384d577b2a7b75f12928826597dfafee590fde0bc2ca4
7
+ data.tar.gz: 550f9502d73c6c4fab93bb92bc6d7553249905566c9886731d829ab5b8eae50a22fe391bfa7d5bfda055386a387553115ea678ae9c9d481a88d80915532f291e
data/CHANGELOG.md CHANGED
@@ -1,6 +1,11 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.115.0 (2023-04-19)
5
+ ------------------
6
+
7
+ * Feature - This release supports the Account Setting "TagResourceAuthorization" that allows for enhanced Tagging security controls.
8
+
4
9
  1.114.0 (2023-04-14)
5
10
  ------------------
6
11
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.114.0
1
+ 1.115.0
@@ -1887,13 +1887,13 @@ module Aws::ECS
1887
1887
  # @example Request syntax with placeholder values
1888
1888
  #
1889
1889
  # resp = client.delete_account_setting({
1890
- # name: "serviceLongArnFormat", # required, accepts serviceLongArnFormat, taskLongArnFormat, containerInstanceLongArnFormat, awsvpcTrunking, containerInsights, fargateFIPSMode
1890
+ # name: "serviceLongArnFormat", # required, accepts serviceLongArnFormat, taskLongArnFormat, containerInstanceLongArnFormat, awsvpcTrunking, containerInsights, fargateFIPSMode, tagResourceAuthorization
1891
1891
  # principal_arn: "String",
1892
1892
  # })
1893
1893
  #
1894
1894
  # @example Response structure
1895
1895
  #
1896
- # resp.setting.name #=> String, one of "serviceLongArnFormat", "taskLongArnFormat", "containerInstanceLongArnFormat", "awsvpcTrunking", "containerInsights", "fargateFIPSMode"
1896
+ # resp.setting.name #=> String, one of "serviceLongArnFormat", "taskLongArnFormat", "containerInstanceLongArnFormat", "awsvpcTrunking", "containerInsights", "fargateFIPSMode", "tagResourceAuthorization"
1897
1897
  # resp.setting.value #=> String
1898
1898
  # resp.setting.principal_arn #=> String
1899
1899
  #
@@ -4534,7 +4534,7 @@ module Aws::ECS
4534
4534
  # @example Request syntax with placeholder values
4535
4535
  #
4536
4536
  # resp = client.list_account_settings({
4537
- # name: "serviceLongArnFormat", # accepts serviceLongArnFormat, taskLongArnFormat, containerInstanceLongArnFormat, awsvpcTrunking, containerInsights, fargateFIPSMode
4537
+ # name: "serviceLongArnFormat", # accepts serviceLongArnFormat, taskLongArnFormat, containerInstanceLongArnFormat, awsvpcTrunking, containerInsights, fargateFIPSMode, tagResourceAuthorization
4538
4538
  # value: "String",
4539
4539
  # principal_arn: "String",
4540
4540
  # effective_settings: false,
@@ -4545,7 +4545,7 @@ module Aws::ECS
4545
4545
  # @example Response structure
4546
4546
  #
4547
4547
  # resp.settings #=> Array
4548
- # resp.settings[0].name #=> String, one of "serviceLongArnFormat", "taskLongArnFormat", "containerInstanceLongArnFormat", "awsvpcTrunking", "containerInsights", "fargateFIPSMode"
4548
+ # resp.settings[0].name #=> String, one of "serviceLongArnFormat", "taskLongArnFormat", "containerInstanceLongArnFormat", "awsvpcTrunking", "containerInsights", "fargateFIPSMode", "tagResourceAuthorization"
4549
4549
  # resp.settings[0].value #=> String
4550
4550
  # resp.settings[0].principal_arn #=> String
4551
4551
  # resp.next_token #=> String
@@ -5440,11 +5440,21 @@ module Aws::ECS
5440
5440
  # see [CloudWatch Container Insights][3] in the *Amazon Elastic
5441
5441
  # Container Service Developer Guide*.
5442
5442
  #
5443
+ # Amazon ECS is introducing tagging authorization for resource creation.
5444
+ # Users must have permissions for actions that create the resource, such
5445
+ # as `ecsCreateCluster`. If tags are specified when you create a
5446
+ # resource, Amazon Web Services performs additional authorization to
5447
+ # verify if users or roles have permissions to create tags. Therefore,
5448
+ # you must grant explicit permissions to use the `ecs:TagResource`
5449
+ # action. For more information, see [Grant permission to tag resources
5450
+ # on creation][4] in the *Amazon ECS Developer Guide*.
5451
+ #
5443
5452
  #
5444
5453
  #
5445
5454
  # [1]: https://docs.aws.amazon.com/AmazonECS/latest/developerguide/ecs-account-settings.html
5446
5455
  # [2]: https://docs.aws.amazon.com/AmazonECS/latest/developerguide/container-instance-eni.html
5447
5456
  # [3]: https://docs.aws.amazon.com/AmazonECS/latest/developerguide/cloudwatch-container-insights.html
5457
+ # [4]: https://docs.aws.amazon.com/AmazonECS/latest/developerguide/supported-iam-actions-tagging.html
5448
5458
  #
5449
5459
  # @option params [required, String] :name
5450
5460
  # The Amazon ECS resource name for which to modify the account setting.
@@ -5458,7 +5468,14 @@ module Aws::ECS
5458
5468
  # `containerInsights` is specified, the default setting for Amazon Web
5459
5469
  # Services CloudWatch Container Insights for your clusters is affected.
5460
5470
  # If `fargateFIPSMode` is specified, Fargate FIPS 140 compliance is
5461
- # affected.
5471
+ # affected. If `tagResourceAuthorization` is specified, the opt-in
5472
+ # option for tagging resources on creation is affected. For information
5473
+ # about the opt-in timeline, see [Tagging authorization timeline][1] in
5474
+ # the *Amazon ECS Developer Guide*.
5475
+ #
5476
+ #
5477
+ #
5478
+ # [1]: https://docs.aws.amazon.com/AmazonECS/latest/developerguide/ecs-account-settings.html#tag-resources
5462
5479
  #
5463
5480
  # @option params [required, String] :value
5464
5481
  # The account setting value for the specified principal ARN. Accepted
@@ -5525,14 +5542,14 @@ module Aws::ECS
5525
5542
  # @example Request syntax with placeholder values
5526
5543
  #
5527
5544
  # resp = client.put_account_setting({
5528
- # name: "serviceLongArnFormat", # required, accepts serviceLongArnFormat, taskLongArnFormat, containerInstanceLongArnFormat, awsvpcTrunking, containerInsights, fargateFIPSMode
5545
+ # name: "serviceLongArnFormat", # required, accepts serviceLongArnFormat, taskLongArnFormat, containerInstanceLongArnFormat, awsvpcTrunking, containerInsights, fargateFIPSMode, tagResourceAuthorization
5529
5546
  # value: "String", # required
5530
5547
  # principal_arn: "String",
5531
5548
  # })
5532
5549
  #
5533
5550
  # @example Response structure
5534
5551
  #
5535
- # resp.setting.name #=> String, one of "serviceLongArnFormat", "taskLongArnFormat", "containerInstanceLongArnFormat", "awsvpcTrunking", "containerInsights", "fargateFIPSMode"
5552
+ # resp.setting.name #=> String, one of "serviceLongArnFormat", "taskLongArnFormat", "containerInstanceLongArnFormat", "awsvpcTrunking", "containerInsights", "fargateFIPSMode", "tagResourceAuthorization"
5536
5553
  # resp.setting.value #=> String
5537
5554
  # resp.setting.principal_arn #=> String
5538
5555
  #
@@ -5559,18 +5576,22 @@ module Aws::ECS
5559
5576
  # `awsvpcTrunking` is specified, the ENI limit for your Amazon ECS
5560
5577
  # container instances is affected. If `containerInsights` is specified,
5561
5578
  # the default setting for Amazon Web Services CloudWatch Container
5562
- # Insights for your clusters is affected.
5579
+ # Insights for your clusters is affected. If `tagResourceAuthorization`
5580
+ # is specified, the opt-in option for tagging resources on creation is
5581
+ # affected. For information about the opt-in timeline, see [Tagging
5582
+ # authorization timeline][1] in the *Amazon ECS Developer Guide*.
5563
5583
  #
5564
5584
  # When you specify `fargateFIPSMode` for the `name` and `enabled` for
5565
5585
  # the `value`, Fargate uses FIPS-140 compliant cryptographic algorithms
5566
5586
  # on your tasks. For more information about FIPS-140 compliance with
5567
5587
  # Fargate, see [ Amazon Web Services Fargate Federal Information
5568
- # Processing Standard (FIPS) 140-2 compliance][1] in the *Amazon Elastic
5588
+ # Processing Standard (FIPS) 140-2 compliance][2] in the *Amazon Elastic
5569
5589
  # Container Service Developer Guide*.
5570
5590
  #
5571
5591
  #
5572
5592
  #
5573
- # [1]: https://docs.aws.amazon.com/AWSEC2ContainerServiceDocs/build/server-root/AmazonECS/latest/developerguide/ecs-fips-compliance.html
5593
+ # [1]: https://docs.aws.amazon.com/AmazonECS/latest/developerguide/ecs-account-settings.html#tag-resources
5594
+ # [2]: https://docs.aws.amazon.com/AWSEC2ContainerServiceDocs/build/server-root/AmazonECS/latest/developerguide/ecs-fips-compliance.html
5574
5595
  #
5575
5596
  # @option params [required, String] :value
5576
5597
  # The account setting value for the specified principal ARN. Accepted
@@ -5604,13 +5625,13 @@ module Aws::ECS
5604
5625
  # @example Request syntax with placeholder values
5605
5626
  #
5606
5627
  # resp = client.put_account_setting_default({
5607
- # name: "serviceLongArnFormat", # required, accepts serviceLongArnFormat, taskLongArnFormat, containerInstanceLongArnFormat, awsvpcTrunking, containerInsights, fargateFIPSMode
5628
+ # name: "serviceLongArnFormat", # required, accepts serviceLongArnFormat, taskLongArnFormat, containerInstanceLongArnFormat, awsvpcTrunking, containerInsights, fargateFIPSMode, tagResourceAuthorization
5608
5629
  # value: "String", # required
5609
5630
  # })
5610
5631
  #
5611
5632
  # @example Response structure
5612
5633
  #
5613
- # resp.setting.name #=> String, one of "serviceLongArnFormat", "taskLongArnFormat", "containerInstanceLongArnFormat", "awsvpcTrunking", "containerInsights", "fargateFIPSMode"
5634
+ # resp.setting.name #=> String, one of "serviceLongArnFormat", "taskLongArnFormat", "containerInstanceLongArnFormat", "awsvpcTrunking", "containerInsights", "fargateFIPSMode", "tagResourceAuthorization"
5614
5635
  # resp.setting.value #=> String
5615
5636
  # resp.setting.principal_arn #=> String
5616
5637
  #
@@ -6336,7 +6357,7 @@ module Aws::ECS
6336
6357
  #
6337
6358
  # * Linux platform version `1.4.0` or later.
6338
6359
  #
6339
- # ^
6360
+ # * Windows platform version `1.0.0` or later.
6340
6361
  #
6341
6362
  # </note>
6342
6363
  #
@@ -7382,8 +7403,8 @@ module Aws::ECS
7382
7403
  #
7383
7404
  # @option params [Boolean] :enable_execute_command
7384
7405
  # Whether or not the execute command functionality is turned on for the
7385
- # task. If `true`, this enables execute command functionality on all
7386
- # containers in the task.
7406
+ # task. If `true`, this turns on the execute command functionality on
7407
+ # all containers in the task.
7387
7408
  #
7388
7409
  # @option params [String] :group
7389
7410
  # The name of the task group to associate with the task. The default
@@ -9683,7 +9704,7 @@ module Aws::ECS
9683
9704
  params: params,
9684
9705
  config: config)
9685
9706
  context[:gem_name] = 'aws-sdk-ecs'
9686
- context[:gem_version] = '1.114.0'
9707
+ context[:gem_version] = '1.115.0'
9687
9708
  Seahorse::Client::Request.new(handlers, context)
9688
9709
  end
9689
9710
 
@@ -4554,7 +4554,7 @@ module Aws::ECS
4554
4554
  #
4555
4555
  # * Linux platform version `1.4.0` or later.
4556
4556
  #
4557
- # ^
4557
+ # * Windows platform version `1.0.0` or later.
4558
4558
  #
4559
4559
  # </note>
4560
4560
  #
@@ -7146,18 +7146,23 @@ module Aws::ECS
7146
7146
  # `awsvpcTrunking` is specified, the ENI limit for your Amazon ECS
7147
7147
  # container instances is affected. If `containerInsights` is
7148
7148
  # specified, the default setting for Amazon Web Services CloudWatch
7149
- # Container Insights for your clusters is affected.
7149
+ # Container Insights for your clusters is affected. If
7150
+ # `tagResourceAuthorization` is specified, the opt-in option for
7151
+ # tagging resources on creation is affected. For information about the
7152
+ # opt-in timeline, see [Tagging authorization timeline][1] in the
7153
+ # *Amazon ECS Developer Guide*.
7150
7154
  #
7151
7155
  # When you specify `fargateFIPSMode` for the `name` and `enabled` for
7152
7156
  # the `value`, Fargate uses FIPS-140 compliant cryptographic
7153
7157
  # algorithms on your tasks. For more information about FIPS-140
7154
7158
  # compliance with Fargate, see [ Amazon Web Services Fargate Federal
7155
- # Information Processing Standard (FIPS) 140-2 compliance][1] in the
7159
+ # Information Processing Standard (FIPS) 140-2 compliance][2] in the
7156
7160
  # *Amazon Elastic Container Service Developer Guide*.
7157
7161
  #
7158
7162
  #
7159
7163
  #
7160
- # [1]: https://docs.aws.amazon.com/AWSEC2ContainerServiceDocs/build/server-root/AmazonECS/latest/developerguide/ecs-fips-compliance.html
7164
+ # [1]: https://docs.aws.amazon.com/AmazonECS/latest/developerguide/ecs-account-settings.html#tag-resources
7165
+ # [2]: https://docs.aws.amazon.com/AWSEC2ContainerServiceDocs/build/server-root/AmazonECS/latest/developerguide/ecs-fips-compliance.html
7161
7166
  # @return [String]
7162
7167
  #
7163
7168
  # @!attribute [rw] value
@@ -7198,7 +7203,14 @@ module Aws::ECS
7198
7203
  # `containerInsights` is specified, the default setting for Amazon Web
7199
7204
  # Services CloudWatch Container Insights for your clusters is
7200
7205
  # affected. If `fargateFIPSMode` is specified, Fargate FIPS 140
7201
- # compliance is affected.
7206
+ # compliance is affected. If `tagResourceAuthorization` is specified,
7207
+ # the opt-in option for tagging resources on creation is affected. For
7208
+ # information about the opt-in timeline, see [Tagging authorization
7209
+ # timeline][1] in the *Amazon ECS Developer Guide*.
7210
+ #
7211
+ #
7212
+ #
7213
+ # [1]: https://docs.aws.amazon.com/AmazonECS/latest/developerguide/ecs-account-settings.html#tag-resources
7202
7214
  # @return [String]
7203
7215
  #
7204
7216
  # @!attribute [rw] value
@@ -7778,7 +7790,7 @@ module Aws::ECS
7778
7790
  #
7779
7791
  # * Linux platform version `1.4.0` or later.
7780
7792
  #
7781
- # ^
7793
+ # * Windows platform version `1.0.0` or later.
7782
7794
  #
7783
7795
  # </note>
7784
7796
  #
@@ -9084,8 +9096,8 @@ module Aws::ECS
9084
9096
  #
9085
9097
  # @!attribute [rw] enable_execute_command
9086
9098
  # Whether or not the execute command functionality is turned on for
9087
- # the task. If `true`, this enables execute command functionality on
9088
- # all containers in the task.
9099
+ # the task. If `true`, this turns on the execute command functionality
9100
+ # on all containers in the task.
9089
9101
  # @return [Boolean]
9090
9102
  #
9091
9103
  # @!attribute [rw] group
data/lib/aws-sdk-ecs.rb CHANGED
@@ -53,6 +53,6 @@ require_relative 'aws-sdk-ecs/customizations'
53
53
  # @!group service
54
54
  module Aws::ECS
55
55
 
56
- GEM_VERSION = '1.114.0'
56
+ GEM_VERSION = '1.115.0'
57
57
 
58
58
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-ecs
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.114.0
4
+ version: 1.115.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2023-04-14 00:00:00.000000000 Z
11
+ date: 2023-04-19 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core