aws-sdk-ssm 1.174.0 → 1.175.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: f614eecfb52999436d04fb44a567fd12832d2e1c4562ef41585fa71a75e2a9d0
4
- data.tar.gz: 75371fcd7d259aef8ecb9919e7484b330b887b1ce8906e5316655fcbfe9f01af
3
+ metadata.gz: 4c475be05cbd950c1fa254bd9ec01fd156c63a82c0865fd5e24e15501545c4b7
4
+ data.tar.gz: 1c5e0b65311c04427b52efd8a6a8d86d27be775b49fed71ee19a986c9c40ec4b
5
5
  SHA512:
6
- metadata.gz: 63bf99534356bf313c4b952dc0d802125cf8055b93e7c2e9d1c40f917461f6a4ec103814af10b69e9378e22711ade023635649e633c2b8b098b06d77059c2c9a
7
- data.tar.gz: da800deda1393c1533c7f24d2b795a5272d4cd9b90bab680f01c3b6e532dc6e5f2f79d626fe89ed408dd9492534b60ac00ec0b8edf3325e7d2902600148cb966
6
+ metadata.gz: 85aa05ad10912118af25fefc5e5bf19b360dd39b9913ca24d6a39f14ceb0c3d1476cd8c47651b0547e1bb6efb7f570affde5d56db61128c1720f129f2bc2c6dd
7
+ data.tar.gz: bcf55202f3246cddaa608089be6c12406ddcaf26fc86452944b5c49d1ae595f1715d1ccbf1b9531d987d94d50e0398c97e0512c7dac572b2c5ae309f8edbb9fc
data/CHANGELOG.md CHANGED
@@ -1,6 +1,11 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.175.0 (2024-08-09)
5
+ ------------------
6
+
7
+ * Feature - Systems Manager doc-only updates for August 2024.
8
+
4
9
  1.174.0 (2024-08-02)
5
10
  ------------------
6
11
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.174.0
1
+ 1.175.0
@@ -2037,19 +2037,28 @@ module Aws::SSM
2037
2037
  # The action for Patch Manager to take on patches included in the
2038
2038
  # `RejectedPackages` list.
2039
2039
  #
2040
- # * <b> <code>ALLOW_AS_DEPENDENCY</code> </b>: A package in the
2041
- # `Rejected` patches list is installed only if it is a dependency of
2042
- # another package. It is considered compliant with the patch baseline,
2043
- # and its status is reported as `InstalledOther`. This is the default
2044
- # action if no option is specified.
2040
+ # ALLOW\_AS\_DEPENDENCY
2045
2041
  #
2046
- # * **BLOCK**: Packages in the **Rejected patches** list, and packages
2042
+ # : **Linux and macOS**: A package in the rejected patches list is
2043
+ # installed only if it is a dependency of another package. It is
2044
+ # considered compliant with the patch baseline, and its status is
2045
+ # reported as `INSTALLED_OTHER`. This is the default action if no
2046
+ # option is specified.
2047
+ #
2048
+ # **Windows Server**: Windows Server doesn't support the concept of
2049
+ # package dependencies. If a package in the rejected patches list and
2050
+ # already installed on the node, its status is reported as
2051
+ # `INSTALLED_OTHER`. Any package not already installed on the node is
2052
+ # skipped. This is the default action if no option is specified.
2053
+ #
2054
+ # BLOCK
2055
+ #
2056
+ # : **All OSs**: Packages in the rejected patches list, and packages
2047
2057
  # that include them as dependencies, aren't installed by Patch
2048
2058
  # Manager under any circumstances. If a package was installed before
2049
- # it was added to the **Rejected patches** list, or is installed
2050
- # outside of Patch Manager afterward, it's considered noncompliant
2051
- # with the patch baseline and its status is reported as
2052
- # *InstalledRejected*.
2059
+ # it was added to the rejected patches list, or is installed outside
2060
+ # of Patch Manager afterward, it's considered noncompliant with the
2061
+ # patch baseline and its status is reported as `INSTALLED_REJECTED`.
2053
2062
  #
2054
2063
  # @option params [String] :description
2055
2064
  # A description of the patch baseline.
@@ -3893,9 +3902,10 @@ module Aws::SSM
3893
3902
  # information for all your managed nodes. If you specify a node ID that
3894
3903
  # isn't valid or a node that you don't own, you receive an error.
3895
3904
  #
3896
- # <note markdown="1"> The `IamRole` field returned for this API operation is the Identity
3897
- # and Access Management (IAM) role assigned to on-premises managed
3898
- # nodes. This operation does not return the IAM role for EC2 instances.
3905
+ # <note markdown="1"> The `IamRole` field returned for this API operation is the role
3906
+ # assigned to an Amazon EC2 instance configured with a Systems Manager
3907
+ # Quick Setup host management configuration or the role assigned to an
3908
+ # on-premises managed node.
3899
3909
  #
3900
3910
  # </note>
3901
3911
  #
@@ -5373,6 +5383,10 @@ module Aws::SSM
5373
5383
  #
5374
5384
  # : Valid properties: `PRODUCT` \| `CLASSIFICATION` \| `SEVERITY`
5375
5385
  #
5386
+ # AMAZON\_LINUX\_2023
5387
+ #
5388
+ # : Valid properties: `PRODUCT` \| `CLASSIFICATION` \| `SEVERITY`
5389
+ #
5376
5390
  # CENTOS
5377
5391
  #
5378
5392
  # : Valid properties: `PRODUCT` \| `CLASSIFICATION` \| `SEVERITY`
@@ -5796,7 +5810,12 @@ module Aws::SSM
5796
5810
  end
5797
5811
 
5798
5812
  # Returns detailed information about command execution for an invocation
5799
- # or plugin.
5813
+ # or plugin. The Run Command API follows an eventual consistency model,
5814
+ # due to the distributed nature of the system supporting the API. This
5815
+ # means that the result of an API command you run that affects your
5816
+ # resources might not be immediately visible to all subsequent commands
5817
+ # you run. You should keep this in mind when you carry out an API
5818
+ # command that immediately follows a previous API command.
5800
5819
  #
5801
5820
  # `GetCommandInvocation` only gives the execution status of a plugin in
5802
5821
  # a document. To get the command execution status on a specific managed
@@ -12280,19 +12299,28 @@ module Aws::SSM
12280
12299
  # The action for Patch Manager to take on patches included in the
12281
12300
  # `RejectedPackages` list.
12282
12301
  #
12283
- # * <b> <code>ALLOW_AS_DEPENDENCY</code> </b>: A package in the
12284
- # `Rejected` patches list is installed only if it is a dependency of
12285
- # another package. It is considered compliant with the patch baseline,
12286
- # and its status is reported as `InstalledOther`. This is the default
12287
- # action if no option is specified.
12302
+ # ALLOW\_AS\_DEPENDENCY
12303
+ #
12304
+ # : **Linux and macOS**: A package in the rejected patches list is
12305
+ # installed only if it is a dependency of another package. It is
12306
+ # considered compliant with the patch baseline, and its status is
12307
+ # reported as `INSTALLED_OTHER`. This is the default action if no
12308
+ # option is specified.
12309
+ #
12310
+ # **Windows Server**: Windows Server doesn't support the concept of
12311
+ # package dependencies. If a package in the rejected patches list and
12312
+ # already installed on the node, its status is reported as
12313
+ # `INSTALLED_OTHER`. Any package not already installed on the node is
12314
+ # skipped. This is the default action if no option is specified.
12315
+ #
12316
+ # BLOCK
12288
12317
  #
12289
- # * **BLOCK**: Packages in the **Rejected patches** list, and packages
12318
+ # : **All OSs**: Packages in the rejected patches list, and packages
12290
12319
  # that include them as dependencies, aren't installed by Patch
12291
12320
  # Manager under any circumstances. If a package was installed before
12292
- # it was added to the **Rejected patches** list, or is installed
12293
- # outside of Patch Manager afterward, it's considered noncompliant
12294
- # with the patch baseline and its status is reported as
12295
- # *InstalledRejected*.
12321
+ # it was added to the rejected patches list, or is installed outside
12322
+ # of Patch Manager afterward, it's considered noncompliant with the
12323
+ # patch baseline and its status is reported as `INSTALLED_REJECTED`.
12296
12324
  #
12297
12325
  # @option params [String] :description
12298
12326
  # A description of the patch baseline.
@@ -12576,7 +12604,7 @@ module Aws::SSM
12576
12604
  params: params,
12577
12605
  config: config)
12578
12606
  context[:gem_name] = 'aws-sdk-ssm'
12579
- context[:gem_version] = '1.174.0'
12607
+ context[:gem_version] = '1.175.0'
12580
12608
  Seahorse::Client::Request.new(handlers, context)
12581
12609
  end
12582
12610
 
@@ -3884,19 +3884,28 @@ module Aws::SSM
3884
3884
  # The action for Patch Manager to take on patches included in the
3885
3885
  # `RejectedPackages` list.
3886
3886
  #
3887
- # * <b> <code>ALLOW_AS_DEPENDENCY</code> </b>: A package in the
3888
- # `Rejected` patches list is installed only if it is a dependency of
3889
- # another package. It is considered compliant with the patch
3890
- # baseline, and its status is reported as `InstalledOther`. This is
3891
- # the default action if no option is specified.
3887
+ # ALLOW\_AS\_DEPENDENCY
3892
3888
  #
3893
- # * **BLOCK**: Packages in the **Rejected patches** list, and packages
3889
+ # : **Linux and macOS**: A package in the rejected patches list is
3890
+ # installed only if it is a dependency of another package. It is
3891
+ # considered compliant with the patch baseline, and its status is
3892
+ # reported as `INSTALLED_OTHER`. This is the default action if no
3893
+ # option is specified.
3894
+ #
3895
+ # **Windows Server**: Windows Server doesn't support the concept of
3896
+ # package dependencies. If a package in the rejected patches list
3897
+ # and already installed on the node, its status is reported as
3898
+ # `INSTALLED_OTHER`. Any package not already installed on the node
3899
+ # is skipped. This is the default action if no option is specified.
3900
+ #
3901
+ # BLOCK
3902
+ #
3903
+ # : **All OSs**: Packages in the rejected patches list, and packages
3894
3904
  # that include them as dependencies, aren't installed by Patch
3895
3905
  # Manager under any circumstances. If a package was installed before
3896
- # it was added to the **Rejected patches** list, or is installed
3897
- # outside of Patch Manager afterward, it's considered noncompliant
3898
- # with the patch baseline and its status is reported as
3899
- # *InstalledRejected*.
3906
+ # it was added to the rejected patches list, or is installed outside
3907
+ # of Patch Manager afterward, it's considered noncompliant with the
3908
+ # patch baseline and its status is reported as `INSTALLED_REJECTED`.
3900
3909
  # @return [String]
3901
3910
  #
3902
3911
  # @!attribute [rw] description
@@ -8407,10 +8416,24 @@ module Aws::SSM
8407
8416
  # @return [String]
8408
8417
  #
8409
8418
  # @!attribute [rw] service_role_arn
8410
- # The Amazon Resource Name (ARN) of the Identity and Access Management
8411
- # (IAM) service role to use to publish Amazon Simple Notification
8412
- # Service (Amazon SNS) notifications for maintenance window Run
8413
- # Command tasks.
8419
+ # The Amazon Resource Name (ARN) of the IAM service role for Amazon
8420
+ # Web Services Systems Manager to assume when running a maintenance
8421
+ # window task. If you do not specify a service role ARN, Systems
8422
+ # Manager uses a service-linked role in your account. If no
8423
+ # appropriate service-linked role for Systems Manager exists in your
8424
+ # account, it is created when you run
8425
+ # `RegisterTaskWithMaintenanceWindow`.
8426
+ #
8427
+ # However, for an improved security posture, we strongly recommend
8428
+ # creating a custom policy and custom service role for running your
8429
+ # maintenance window tasks. The policy can be crafted to provide only
8430
+ # the permissions needed for your particular maintenance window tasks.
8431
+ # For more information, see [Setting up maintenance windows][1] in the
8432
+ # in the *Amazon Web Services Systems Manager User Guide*.
8433
+ #
8434
+ #
8435
+ #
8436
+ # [1]: https://docs.aws.amazon.com/systems-manager/latest/userguide/sysman-maintenance-permissions.html
8414
8437
  # @return [String]
8415
8438
  #
8416
8439
  # @!attribute [rw] task_type
@@ -9450,11 +9473,14 @@ module Aws::SSM
9450
9473
  # @return [String]
9451
9474
  #
9452
9475
  # @!attribute [rw] iam_role
9453
- # The Identity and Access Management (IAM) role assigned to the
9454
- # on-premises Systems Manager managed node. This call doesn't return
9455
- # the IAM role for Amazon Elastic Compute Cloud (Amazon EC2)
9456
- # instances. To retrieve the IAM role for an EC2 instance, use the
9457
- # Amazon EC2 `DescribeInstances` operation. For information, see
9476
+ # The role assigned to an Amazon EC2 instance configured with a
9477
+ # Systems Manager Quick Setup host management configuration or the
9478
+ # role assigned to an on-premises managed node.
9479
+ #
9480
+ # This call doesn't return the IAM role for *unmanaged* Amazon EC2
9481
+ # instances (instances not configured for Systems Manager). To
9482
+ # retrieve the role for an unmanaged instance, use the Amazon EC2
9483
+ # `DescribeInstances` operation. For information, see
9458
9484
  # [DescribeInstances][1] in the *Amazon EC2 API Reference* or
9459
9485
  # [describe-instances][2] in the *Amazon Web Services CLI Command
9460
9486
  # Reference*.
@@ -9899,7 +9925,7 @@ module Aws::SSM
9899
9925
  # @return [String]
9900
9926
  #
9901
9927
  # @!attribute [rw] architecture
9902
- # The CPU architecture of the node. For example, x86\_64.
9928
+ # The CPU architecture of the node. For example, `x86_64`.
9903
9929
  # @return [String]
9904
9930
  #
9905
9931
  # @!attribute [rw] ip_address
@@ -12539,10 +12565,24 @@ module Aws::SSM
12539
12565
  # @return [Hash<String,Array<String>>]
12540
12566
  #
12541
12567
  # @!attribute [rw] service_role_arn
12542
- # The Amazon Resource Name (ARN) of the Identity and Access Management
12543
- # (IAM) service role to use to publish Amazon Simple Notification
12544
- # Service (Amazon SNS) notifications for maintenance window Run
12545
- # Command tasks.
12568
+ # The Amazon Resource Name (ARN) of the IAM service role for Amazon
12569
+ # Web Services Systems Manager to assume when running a maintenance
12570
+ # window task. If you do not specify a service role ARN, Systems
12571
+ # Manager uses a service-linked role in your account. If no
12572
+ # appropriate service-linked role for Systems Manager exists in your
12573
+ # account, it is created when you run
12574
+ # `RegisterTaskWithMaintenanceWindow`.
12575
+ #
12576
+ # However, for an improved security posture, we strongly recommend
12577
+ # creating a custom policy and custom service role for running your
12578
+ # maintenance window tasks. The policy can be crafted to provide only
12579
+ # the permissions needed for your particular maintenance window tasks.
12580
+ # For more information, see [Setting up maintenance windows][1] in the
12581
+ # in the *Amazon Web Services Systems Manager User Guide*.
12582
+ #
12583
+ #
12584
+ #
12585
+ # [1]: https://docs.aws.amazon.com/systems-manager/latest/userguide/sysman-maintenance-permissions.html
12546
12586
  # @return [String]
12547
12587
  #
12548
12588
  # @!attribute [rw] timeout_seconds
@@ -12726,10 +12766,24 @@ module Aws::SSM
12726
12766
  # @return [Types::LoggingInfo]
12727
12767
  #
12728
12768
  # @!attribute [rw] service_role_arn
12729
- # The Amazon Resource Name (ARN) of the Identity and Access Management
12730
- # (IAM) service role to use to publish Amazon Simple Notification
12731
- # Service (Amazon SNS) notifications for maintenance window Run
12732
- # Command tasks.
12769
+ # The Amazon Resource Name (ARN) of the IAM service role for Amazon
12770
+ # Web Services Systems Manager to assume when running a maintenance
12771
+ # window task. If you do not specify a service role ARN, Systems
12772
+ # Manager uses a service-linked role in your account. If no
12773
+ # appropriate service-linked role for Systems Manager exists in your
12774
+ # account, it is created when you run
12775
+ # `RegisterTaskWithMaintenanceWindow`.
12776
+ #
12777
+ # However, for an improved security posture, we strongly recommend
12778
+ # creating a custom policy and custom service role for running your
12779
+ # maintenance window tasks. The policy can be crafted to provide only
12780
+ # the permissions needed for your particular maintenance window tasks.
12781
+ # For more information, see [Setting up maintenance windows][1] in the
12782
+ # in the *Amazon Web Services Systems Manager User Guide*.
12783
+ #
12784
+ #
12785
+ #
12786
+ # [1]: https://docs.aws.amazon.com/systems-manager/latest/userguide/sysman-maintenance-permissions.html
12733
12787
  # @return [String]
12734
12788
  #
12735
12789
  # @!attribute [rw] max_concurrency
@@ -14637,10 +14691,10 @@ module Aws::SSM
14637
14691
  # @return [String]
14638
14692
  #
14639
14693
  # @!attribute [rw] default_baseline
14640
- # Whether this is the default baseline. Amazon Web Services Systems
14641
- # Manager supports creating multiple default patch baselines. For
14642
- # example, you can create a default patch baseline for each operating
14643
- # system.
14694
+ # Indicates whether this is the default baseline. Amazon Web Services
14695
+ # Systems Manager supports creating multiple default patch baselines.
14696
+ # For example, you can create a default patch baseline for each
14697
+ # operating system.
14644
14698
  # @return [Boolean]
14645
14699
  #
14646
14700
  # @see http://docs.aws.amazon.com/goto/WebAPI/ssm-2014-11-06/PatchBaselineIdentity AWS API Documentation
@@ -14840,16 +14894,28 @@ module Aws::SSM
14840
14894
  # The number of days after the release date of each patch matched by
14841
14895
  # the rule that the patch is marked as approved in the patch baseline.
14842
14896
  # For example, a value of `7` means that patches are approved seven
14843
- # days after they are released. Not supported on Debian Server or
14844
- # Ubuntu Server.
14897
+ # days after they are released.
14898
+ #
14899
+ # <note markdown="1"> This parameter is marked as not required, but your request must
14900
+ # include a value for either `ApproveAfterDays` or `ApproveUntilDate`.
14901
+ #
14902
+ # </note>
14903
+ #
14904
+ # Not supported for Debian Server or Ubuntu Server.
14845
14905
  # @return [Integer]
14846
14906
  #
14847
14907
  # @!attribute [rw] approve_until_date
14848
14908
  # The cutoff date for auto approval of released patches. Any patches
14849
- # released on or before this date are installed automatically. Not
14850
- # supported on Debian Server or Ubuntu Server.
14909
+ # released on or before this date are installed automatically.
14851
14910
  #
14852
14911
  # Enter dates in the format `YYYY-MM-DD`. For example, `2021-12-31`.
14912
+ #
14913
+ # <note markdown="1"> This parameter is marked as not required, but your request must
14914
+ # include a value for either `ApproveUntilDate` or `ApproveAfterDays`.
14915
+ #
14916
+ # </note>
14917
+ #
14918
+ # Not supported for Debian Server or Ubuntu Server.
14853
14919
  # @return [String]
14854
14920
  #
14855
14921
  # @!attribute [rw] enable_non_security
@@ -19256,10 +19322,24 @@ module Aws::SSM
19256
19322
  # @return [String]
19257
19323
  #
19258
19324
  # @!attribute [rw] service_role_arn
19259
- # The Amazon Resource Name (ARN) of the Identity and Access Management
19260
- # (IAM) service role to use to publish Amazon Simple Notification
19261
- # Service (Amazon SNS) notifications for maintenance window Run
19262
- # Command tasks.
19325
+ # The Amazon Resource Name (ARN) of the IAM service role for Amazon
19326
+ # Web Services Systems Manager to assume when running a maintenance
19327
+ # window task. If you do not specify a service role ARN, Systems
19328
+ # Manager uses a service-linked role in your account. If no
19329
+ # appropriate service-linked role for Systems Manager exists in your
19330
+ # account, it is created when you run
19331
+ # `RegisterTaskWithMaintenanceWindow`.
19332
+ #
19333
+ # However, for an improved security posture, we strongly recommend
19334
+ # creating a custom policy and custom service role for running your
19335
+ # maintenance window tasks. The policy can be crafted to provide only
19336
+ # the permissions needed for your particular maintenance window tasks.
19337
+ # For more information, see [Setting up maintenance windows][1] in the
19338
+ # in the *Amazon Web Services Systems Manager User Guide*.
19339
+ #
19340
+ #
19341
+ #
19342
+ # [1]: https://docs.aws.amazon.com/systems-manager/latest/userguide/sysman-maintenance-permissions.html
19263
19343
  # @return [String]
19264
19344
  #
19265
19345
  # @!attribute [rw] task_parameters
@@ -19612,19 +19692,28 @@ module Aws::SSM
19612
19692
  # The action for Patch Manager to take on patches included in the
19613
19693
  # `RejectedPackages` list.
19614
19694
  #
19615
- # * <b> <code>ALLOW_AS_DEPENDENCY</code> </b>: A package in the
19616
- # `Rejected` patches list is installed only if it is a dependency of
19617
- # another package. It is considered compliant with the patch
19618
- # baseline, and its status is reported as `InstalledOther`. This is
19619
- # the default action if no option is specified.
19695
+ # ALLOW\_AS\_DEPENDENCY
19696
+ #
19697
+ # : **Linux and macOS**: A package in the rejected patches list is
19698
+ # installed only if it is a dependency of another package. It is
19699
+ # considered compliant with the patch baseline, and its status is
19700
+ # reported as `INSTALLED_OTHER`. This is the default action if no
19701
+ # option is specified.
19702
+ #
19703
+ # **Windows Server**: Windows Server doesn't support the concept of
19704
+ # package dependencies. If a package in the rejected patches list
19705
+ # and already installed on the node, its status is reported as
19706
+ # `INSTALLED_OTHER`. Any package not already installed on the node
19707
+ # is skipped. This is the default action if no option is specified.
19708
+ #
19709
+ # BLOCK
19620
19710
  #
19621
- # * **BLOCK**: Packages in the **Rejected patches** list, and packages
19711
+ # : **All OSs**: Packages in the rejected patches list, and packages
19622
19712
  # that include them as dependencies, aren't installed by Patch
19623
19713
  # Manager under any circumstances. If a package was installed before
19624
- # it was added to the **Rejected patches** list, or is installed
19625
- # outside of Patch Manager afterward, it's considered noncompliant
19626
- # with the patch baseline and its status is reported as
19627
- # *InstalledRejected*.
19714
+ # it was added to the rejected patches list, or is installed outside
19715
+ # of Patch Manager afterward, it's considered noncompliant with the
19716
+ # patch baseline and its status is reported as `INSTALLED_REJECTED`.
19628
19717
  # @return [String]
19629
19718
  #
19630
19719
  # @!attribute [rw] description
data/lib/aws-sdk-ssm.rb CHANGED
@@ -53,6 +53,6 @@ require_relative 'aws-sdk-ssm/customizations'
53
53
  # @!group service
54
54
  module Aws::SSM
55
55
 
56
- GEM_VERSION = '1.174.0'
56
+ GEM_VERSION = '1.175.0'
57
57
 
58
58
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-ssm
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.174.0
4
+ version: 1.175.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2024-08-02 00:00:00.000000000 Z
11
+ date: 2024-08-09 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core