aws-sdk-ssm 1.174.0 → 1.175.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: f614eecfb52999436d04fb44a567fd12832d2e1c4562ef41585fa71a75e2a9d0
4
- data.tar.gz: 75371fcd7d259aef8ecb9919e7484b330b887b1ce8906e5316655fcbfe9f01af
3
+ metadata.gz: 4c475be05cbd950c1fa254bd9ec01fd156c63a82c0865fd5e24e15501545c4b7
4
+ data.tar.gz: 1c5e0b65311c04427b52efd8a6a8d86d27be775b49fed71ee19a986c9c40ec4b
5
5
  SHA512:
6
- metadata.gz: 63bf99534356bf313c4b952dc0d802125cf8055b93e7c2e9d1c40f917461f6a4ec103814af10b69e9378e22711ade023635649e633c2b8b098b06d77059c2c9a
7
- data.tar.gz: da800deda1393c1533c7f24d2b795a5272d4cd9b90bab680f01c3b6e532dc6e5f2f79d626fe89ed408dd9492534b60ac00ec0b8edf3325e7d2902600148cb966
6
+ metadata.gz: 85aa05ad10912118af25fefc5e5bf19b360dd39b9913ca24d6a39f14ceb0c3d1476cd8c47651b0547e1bb6efb7f570affde5d56db61128c1720f129f2bc2c6dd
7
+ data.tar.gz: bcf55202f3246cddaa608089be6c12406ddcaf26fc86452944b5c49d1ae595f1715d1ccbf1b9531d987d94d50e0398c97e0512c7dac572b2c5ae309f8edbb9fc
data/CHANGELOG.md CHANGED
@@ -1,6 +1,11 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.175.0 (2024-08-09)
5
+ ------------------
6
+
7
+ * Feature - Systems Manager doc-only updates for August 2024.
8
+
4
9
  1.174.0 (2024-08-02)
5
10
  ------------------
6
11
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.174.0
1
+ 1.175.0
@@ -2037,19 +2037,28 @@ module Aws::SSM
2037
2037
  # The action for Patch Manager to take on patches included in the
2038
2038
  # `RejectedPackages` list.
2039
2039
  #
2040
- # * <b> <code>ALLOW_AS_DEPENDENCY</code> </b>: A package in the
2041
- # `Rejected` patches list is installed only if it is a dependency of
2042
- # another package. It is considered compliant with the patch baseline,
2043
- # and its status is reported as `InstalledOther`. This is the default
2044
- # action if no option is specified.
2040
+ # ALLOW\_AS\_DEPENDENCY
2045
2041
  #
2046
- # * **BLOCK**: Packages in the **Rejected patches** list, and packages
2042
+ # : **Linux and macOS**: A package in the rejected patches list is
2043
+ # installed only if it is a dependency of another package. It is
2044
+ # considered compliant with the patch baseline, and its status is
2045
+ # reported as `INSTALLED_OTHER`. This is the default action if no
2046
+ # option is specified.
2047
+ #
2048
+ # **Windows Server**: Windows Server doesn't support the concept of
2049
+ # package dependencies. If a package in the rejected patches list and
2050
+ # already installed on the node, its status is reported as
2051
+ # `INSTALLED_OTHER`. Any package not already installed on the node is
2052
+ # skipped. This is the default action if no option is specified.
2053
+ #
2054
+ # BLOCK
2055
+ #
2056
+ # : **All OSs**: Packages in the rejected patches list, and packages
2047
2057
  # that include them as dependencies, aren't installed by Patch
2048
2058
  # Manager under any circumstances. If a package was installed before
2049
- # it was added to the **Rejected patches** list, or is installed
2050
- # outside of Patch Manager afterward, it's considered noncompliant
2051
- # with the patch baseline and its status is reported as
2052
- # *InstalledRejected*.
2059
+ # it was added to the rejected patches list, or is installed outside
2060
+ # of Patch Manager afterward, it's considered noncompliant with the
2061
+ # patch baseline and its status is reported as `INSTALLED_REJECTED`.
2053
2062
  #
2054
2063
  # @option params [String] :description
2055
2064
  # A description of the patch baseline.
@@ -3893,9 +3902,10 @@ module Aws::SSM
3893
3902
  # information for all your managed nodes. If you specify a node ID that
3894
3903
  # isn't valid or a node that you don't own, you receive an error.
3895
3904
  #
3896
- # <note markdown="1"> The `IamRole` field returned for this API operation is the Identity
3897
- # and Access Management (IAM) role assigned to on-premises managed
3898
- # nodes. This operation does not return the IAM role for EC2 instances.
3905
+ # <note markdown="1"> The `IamRole` field returned for this API operation is the role
3906
+ # assigned to an Amazon EC2 instance configured with a Systems Manager
3907
+ # Quick Setup host management configuration or the role assigned to an
3908
+ # on-premises managed node.
3899
3909
  #
3900
3910
  # </note>
3901
3911
  #
@@ -5373,6 +5383,10 @@ module Aws::SSM
5373
5383
  #
5374
5384
  # : Valid properties: `PRODUCT` \| `CLASSIFICATION` \| `SEVERITY`
5375
5385
  #
5386
+ # AMAZON\_LINUX\_2023
5387
+ #
5388
+ # : Valid properties: `PRODUCT` \| `CLASSIFICATION` \| `SEVERITY`
5389
+ #
5376
5390
  # CENTOS
5377
5391
  #
5378
5392
  # : Valid properties: `PRODUCT` \| `CLASSIFICATION` \| `SEVERITY`
@@ -5796,7 +5810,12 @@ module Aws::SSM
5796
5810
  end
5797
5811
 
5798
5812
  # Returns detailed information about command execution for an invocation
5799
- # or plugin.
5813
+ # or plugin. The Run Command API follows an eventual consistency model,
5814
+ # due to the distributed nature of the system supporting the API. This
5815
+ # means that the result of an API command you run that affects your
5816
+ # resources might not be immediately visible to all subsequent commands
5817
+ # you run. You should keep this in mind when you carry out an API
5818
+ # command that immediately follows a previous API command.
5800
5819
  #
5801
5820
  # `GetCommandInvocation` only gives the execution status of a plugin in
5802
5821
  # a document. To get the command execution status on a specific managed
@@ -12280,19 +12299,28 @@ module Aws::SSM
12280
12299
  # The action for Patch Manager to take on patches included in the
12281
12300
  # `RejectedPackages` list.
12282
12301
  #
12283
- # * <b> <code>ALLOW_AS_DEPENDENCY</code> </b>: A package in the
12284
- # `Rejected` patches list is installed only if it is a dependency of
12285
- # another package. It is considered compliant with the patch baseline,
12286
- # and its status is reported as `InstalledOther`. This is the default
12287
- # action if no option is specified.
12302
+ # ALLOW\_AS\_DEPENDENCY
12303
+ #
12304
+ # : **Linux and macOS**: A package in the rejected patches list is
12305
+ # installed only if it is a dependency of another package. It is
12306
+ # considered compliant with the patch baseline, and its status is
12307
+ # reported as `INSTALLED_OTHER`. This is the default action if no
12308
+ # option is specified.
12309
+ #
12310
+ # **Windows Server**: Windows Server doesn't support the concept of
12311
+ # package dependencies. If a package in the rejected patches list and
12312
+ # already installed on the node, its status is reported as
12313
+ # `INSTALLED_OTHER`. Any package not already installed on the node is
12314
+ # skipped. This is the default action if no option is specified.
12315
+ #
12316
+ # BLOCK
12288
12317
  #
12289
- # * **BLOCK**: Packages in the **Rejected patches** list, and packages
12318
+ # : **All OSs**: Packages in the rejected patches list, and packages
12290
12319
  # that include them as dependencies, aren't installed by Patch
12291
12320
  # Manager under any circumstances. If a package was installed before
12292
- # it was added to the **Rejected patches** list, or is installed
12293
- # outside of Patch Manager afterward, it's considered noncompliant
12294
- # with the patch baseline and its status is reported as
12295
- # *InstalledRejected*.
12321
+ # it was added to the rejected patches list, or is installed outside
12322
+ # of Patch Manager afterward, it's considered noncompliant with the
12323
+ # patch baseline and its status is reported as `INSTALLED_REJECTED`.
12296
12324
  #
12297
12325
  # @option params [String] :description
12298
12326
  # A description of the patch baseline.
@@ -12576,7 +12604,7 @@ module Aws::SSM
12576
12604
  params: params,
12577
12605
  config: config)
12578
12606
  context[:gem_name] = 'aws-sdk-ssm'
12579
- context[:gem_version] = '1.174.0'
12607
+ context[:gem_version] = '1.175.0'
12580
12608
  Seahorse::Client::Request.new(handlers, context)
12581
12609
  end
12582
12610
 
@@ -3884,19 +3884,28 @@ module Aws::SSM
3884
3884
  # The action for Patch Manager to take on patches included in the
3885
3885
  # `RejectedPackages` list.
3886
3886
  #
3887
- # * <b> <code>ALLOW_AS_DEPENDENCY</code> </b>: A package in the
3888
- # `Rejected` patches list is installed only if it is a dependency of
3889
- # another package. It is considered compliant with the patch
3890
- # baseline, and its status is reported as `InstalledOther`. This is
3891
- # the default action if no option is specified.
3887
+ # ALLOW\_AS\_DEPENDENCY
3892
3888
  #
3893
- # * **BLOCK**: Packages in the **Rejected patches** list, and packages
3889
+ # : **Linux and macOS**: A package in the rejected patches list is
3890
+ # installed only if it is a dependency of another package. It is
3891
+ # considered compliant with the patch baseline, and its status is
3892
+ # reported as `INSTALLED_OTHER`. This is the default action if no
3893
+ # option is specified.
3894
+ #
3895
+ # **Windows Server**: Windows Server doesn't support the concept of
3896
+ # package dependencies. If a package in the rejected patches list
3897
+ # and already installed on the node, its status is reported as
3898
+ # `INSTALLED_OTHER`. Any package not already installed on the node
3899
+ # is skipped. This is the default action if no option is specified.
3900
+ #
3901
+ # BLOCK
3902
+ #
3903
+ # : **All OSs**: Packages in the rejected patches list, and packages
3894
3904
  # that include them as dependencies, aren't installed by Patch
3895
3905
  # Manager under any circumstances. If a package was installed before
3896
- # it was added to the **Rejected patches** list, or is installed
3897
- # outside of Patch Manager afterward, it's considered noncompliant
3898
- # with the patch baseline and its status is reported as
3899
- # *InstalledRejected*.
3906
+ # it was added to the rejected patches list, or is installed outside
3907
+ # of Patch Manager afterward, it's considered noncompliant with the
3908
+ # patch baseline and its status is reported as `INSTALLED_REJECTED`.
3900
3909
  # @return [String]
3901
3910
  #
3902
3911
  # @!attribute [rw] description
@@ -8407,10 +8416,24 @@ module Aws::SSM
8407
8416
  # @return [String]
8408
8417
  #
8409
8418
  # @!attribute [rw] service_role_arn
8410
- # The Amazon Resource Name (ARN) of the Identity and Access Management
8411
- # (IAM) service role to use to publish Amazon Simple Notification
8412
- # Service (Amazon SNS) notifications for maintenance window Run
8413
- # Command tasks.
8419
+ # The Amazon Resource Name (ARN) of the IAM service role for Amazon
8420
+ # Web Services Systems Manager to assume when running a maintenance
8421
+ # window task. If you do not specify a service role ARN, Systems
8422
+ # Manager uses a service-linked role in your account. If no
8423
+ # appropriate service-linked role for Systems Manager exists in your
8424
+ # account, it is created when you run
8425
+ # `RegisterTaskWithMaintenanceWindow`.
8426
+ #
8427
+ # However, for an improved security posture, we strongly recommend
8428
+ # creating a custom policy and custom service role for running your
8429
+ # maintenance window tasks. The policy can be crafted to provide only
8430
+ # the permissions needed for your particular maintenance window tasks.
8431
+ # For more information, see [Setting up maintenance windows][1] in the
8432
+ # in the *Amazon Web Services Systems Manager User Guide*.
8433
+ #
8434
+ #
8435
+ #
8436
+ # [1]: https://docs.aws.amazon.com/systems-manager/latest/userguide/sysman-maintenance-permissions.html
8414
8437
  # @return [String]
8415
8438
  #
8416
8439
  # @!attribute [rw] task_type
@@ -9450,11 +9473,14 @@ module Aws::SSM
9450
9473
  # @return [String]
9451
9474
  #
9452
9475
  # @!attribute [rw] iam_role
9453
- # The Identity and Access Management (IAM) role assigned to the
9454
- # on-premises Systems Manager managed node. This call doesn't return
9455
- # the IAM role for Amazon Elastic Compute Cloud (Amazon EC2)
9456
- # instances. To retrieve the IAM role for an EC2 instance, use the
9457
- # Amazon EC2 `DescribeInstances` operation. For information, see
9476
+ # The role assigned to an Amazon EC2 instance configured with a
9477
+ # Systems Manager Quick Setup host management configuration or the
9478
+ # role assigned to an on-premises managed node.
9479
+ #
9480
+ # This call doesn't return the IAM role for *unmanaged* Amazon EC2
9481
+ # instances (instances not configured for Systems Manager). To
9482
+ # retrieve the role for an unmanaged instance, use the Amazon EC2
9483
+ # `DescribeInstances` operation. For information, see
9458
9484
  # [DescribeInstances][1] in the *Amazon EC2 API Reference* or
9459
9485
  # [describe-instances][2] in the *Amazon Web Services CLI Command
9460
9486
  # Reference*.
@@ -9899,7 +9925,7 @@ module Aws::SSM
9899
9925
  # @return [String]
9900
9926
  #
9901
9927
  # @!attribute [rw] architecture
9902
- # The CPU architecture of the node. For example, x86\_64.
9928
+ # The CPU architecture of the node. For example, `x86_64`.
9903
9929
  # @return [String]
9904
9930
  #
9905
9931
  # @!attribute [rw] ip_address
@@ -12539,10 +12565,24 @@ module Aws::SSM
12539
12565
  # @return [Hash<String,Array<String>>]
12540
12566
  #
12541
12567
  # @!attribute [rw] service_role_arn
12542
- # The Amazon Resource Name (ARN) of the Identity and Access Management
12543
- # (IAM) service role to use to publish Amazon Simple Notification
12544
- # Service (Amazon SNS) notifications for maintenance window Run
12545
- # Command tasks.
12568
+ # The Amazon Resource Name (ARN) of the IAM service role for Amazon
12569
+ # Web Services Systems Manager to assume when running a maintenance
12570
+ # window task. If you do not specify a service role ARN, Systems
12571
+ # Manager uses a service-linked role in your account. If no
12572
+ # appropriate service-linked role for Systems Manager exists in your
12573
+ # account, it is created when you run
12574
+ # `RegisterTaskWithMaintenanceWindow`.
12575
+ #
12576
+ # However, for an improved security posture, we strongly recommend
12577
+ # creating a custom policy and custom service role for running your
12578
+ # maintenance window tasks. The policy can be crafted to provide only
12579
+ # the permissions needed for your particular maintenance window tasks.
12580
+ # For more information, see [Setting up maintenance windows][1] in the
12581
+ # in the *Amazon Web Services Systems Manager User Guide*.
12582
+ #
12583
+ #
12584
+ #
12585
+ # [1]: https://docs.aws.amazon.com/systems-manager/latest/userguide/sysman-maintenance-permissions.html
12546
12586
  # @return [String]
12547
12587
  #
12548
12588
  # @!attribute [rw] timeout_seconds
@@ -12726,10 +12766,24 @@ module Aws::SSM
12726
12766
  # @return [Types::LoggingInfo]
12727
12767
  #
12728
12768
  # @!attribute [rw] service_role_arn
12729
- # The Amazon Resource Name (ARN) of the Identity and Access Management
12730
- # (IAM) service role to use to publish Amazon Simple Notification
12731
- # Service (Amazon SNS) notifications for maintenance window Run
12732
- # Command tasks.
12769
+ # The Amazon Resource Name (ARN) of the IAM service role for Amazon
12770
+ # Web Services Systems Manager to assume when running a maintenance
12771
+ # window task. If you do not specify a service role ARN, Systems
12772
+ # Manager uses a service-linked role in your account. If no
12773
+ # appropriate service-linked role for Systems Manager exists in your
12774
+ # account, it is created when you run
12775
+ # `RegisterTaskWithMaintenanceWindow`.
12776
+ #
12777
+ # However, for an improved security posture, we strongly recommend
12778
+ # creating a custom policy and custom service role for running your
12779
+ # maintenance window tasks. The policy can be crafted to provide only
12780
+ # the permissions needed for your particular maintenance window tasks.
12781
+ # For more information, see [Setting up maintenance windows][1] in the
12782
+ # in the *Amazon Web Services Systems Manager User Guide*.
12783
+ #
12784
+ #
12785
+ #
12786
+ # [1]: https://docs.aws.amazon.com/systems-manager/latest/userguide/sysman-maintenance-permissions.html
12733
12787
  # @return [String]
12734
12788
  #
12735
12789
  # @!attribute [rw] max_concurrency
@@ -14637,10 +14691,10 @@ module Aws::SSM
14637
14691
  # @return [String]
14638
14692
  #
14639
14693
  # @!attribute [rw] default_baseline
14640
- # Whether this is the default baseline. Amazon Web Services Systems
14641
- # Manager supports creating multiple default patch baselines. For
14642
- # example, you can create a default patch baseline for each operating
14643
- # system.
14694
+ # Indicates whether this is the default baseline. Amazon Web Services
14695
+ # Systems Manager supports creating multiple default patch baselines.
14696
+ # For example, you can create a default patch baseline for each
14697
+ # operating system.
14644
14698
  # @return [Boolean]
14645
14699
  #
14646
14700
  # @see http://docs.aws.amazon.com/goto/WebAPI/ssm-2014-11-06/PatchBaselineIdentity AWS API Documentation
@@ -14840,16 +14894,28 @@ module Aws::SSM
14840
14894
  # The number of days after the release date of each patch matched by
14841
14895
  # the rule that the patch is marked as approved in the patch baseline.
14842
14896
  # For example, a value of `7` means that patches are approved seven
14843
- # days after they are released. Not supported on Debian Server or
14844
- # Ubuntu Server.
14897
+ # days after they are released.
14898
+ #
14899
+ # <note markdown="1"> This parameter is marked as not required, but your request must
14900
+ # include a value for either `ApproveAfterDays` or `ApproveUntilDate`.
14901
+ #
14902
+ # </note>
14903
+ #
14904
+ # Not supported for Debian Server or Ubuntu Server.
14845
14905
  # @return [Integer]
14846
14906
  #
14847
14907
  # @!attribute [rw] approve_until_date
14848
14908
  # The cutoff date for auto approval of released patches. Any patches
14849
- # released on or before this date are installed automatically. Not
14850
- # supported on Debian Server or Ubuntu Server.
14909
+ # released on or before this date are installed automatically.
14851
14910
  #
14852
14911
  # Enter dates in the format `YYYY-MM-DD`. For example, `2021-12-31`.
14912
+ #
14913
+ # <note markdown="1"> This parameter is marked as not required, but your request must
14914
+ # include a value for either `ApproveUntilDate` or `ApproveAfterDays`.
14915
+ #
14916
+ # </note>
14917
+ #
14918
+ # Not supported for Debian Server or Ubuntu Server.
14853
14919
  # @return [String]
14854
14920
  #
14855
14921
  # @!attribute [rw] enable_non_security
@@ -19256,10 +19322,24 @@ module Aws::SSM
19256
19322
  # @return [String]
19257
19323
  #
19258
19324
  # @!attribute [rw] service_role_arn
19259
- # The Amazon Resource Name (ARN) of the Identity and Access Management
19260
- # (IAM) service role to use to publish Amazon Simple Notification
19261
- # Service (Amazon SNS) notifications for maintenance window Run
19262
- # Command tasks.
19325
+ # The Amazon Resource Name (ARN) of the IAM service role for Amazon
19326
+ # Web Services Systems Manager to assume when running a maintenance
19327
+ # window task. If you do not specify a service role ARN, Systems
19328
+ # Manager uses a service-linked role in your account. If no
19329
+ # appropriate service-linked role for Systems Manager exists in your
19330
+ # account, it is created when you run
19331
+ # `RegisterTaskWithMaintenanceWindow`.
19332
+ #
19333
+ # However, for an improved security posture, we strongly recommend
19334
+ # creating a custom policy and custom service role for running your
19335
+ # maintenance window tasks. The policy can be crafted to provide only
19336
+ # the permissions needed for your particular maintenance window tasks.
19337
+ # For more information, see [Setting up maintenance windows][1] in the
19338
+ # in the *Amazon Web Services Systems Manager User Guide*.
19339
+ #
19340
+ #
19341
+ #
19342
+ # [1]: https://docs.aws.amazon.com/systems-manager/latest/userguide/sysman-maintenance-permissions.html
19263
19343
  # @return [String]
19264
19344
  #
19265
19345
  # @!attribute [rw] task_parameters
@@ -19612,19 +19692,28 @@ module Aws::SSM
19612
19692
  # The action for Patch Manager to take on patches included in the
19613
19693
  # `RejectedPackages` list.
19614
19694
  #
19615
- # * <b> <code>ALLOW_AS_DEPENDENCY</code> </b>: A package in the
19616
- # `Rejected` patches list is installed only if it is a dependency of
19617
- # another package. It is considered compliant with the patch
19618
- # baseline, and its status is reported as `InstalledOther`. This is
19619
- # the default action if no option is specified.
19695
+ # ALLOW\_AS\_DEPENDENCY
19696
+ #
19697
+ # : **Linux and macOS**: A package in the rejected patches list is
19698
+ # installed only if it is a dependency of another package. It is
19699
+ # considered compliant with the patch baseline, and its status is
19700
+ # reported as `INSTALLED_OTHER`. This is the default action if no
19701
+ # option is specified.
19702
+ #
19703
+ # **Windows Server**: Windows Server doesn't support the concept of
19704
+ # package dependencies. If a package in the rejected patches list
19705
+ # and already installed on the node, its status is reported as
19706
+ # `INSTALLED_OTHER`. Any package not already installed on the node
19707
+ # is skipped. This is the default action if no option is specified.
19708
+ #
19709
+ # BLOCK
19620
19710
  #
19621
- # * **BLOCK**: Packages in the **Rejected patches** list, and packages
19711
+ # : **All OSs**: Packages in the rejected patches list, and packages
19622
19712
  # that include them as dependencies, aren't installed by Patch
19623
19713
  # Manager under any circumstances. If a package was installed before
19624
- # it was added to the **Rejected patches** list, or is installed
19625
- # outside of Patch Manager afterward, it's considered noncompliant
19626
- # with the patch baseline and its status is reported as
19627
- # *InstalledRejected*.
19714
+ # it was added to the rejected patches list, or is installed outside
19715
+ # of Patch Manager afterward, it's considered noncompliant with the
19716
+ # patch baseline and its status is reported as `INSTALLED_REJECTED`.
19628
19717
  # @return [String]
19629
19718
  #
19630
19719
  # @!attribute [rw] description
data/lib/aws-sdk-ssm.rb CHANGED
@@ -53,6 +53,6 @@ require_relative 'aws-sdk-ssm/customizations'
53
53
  # @!group service
54
54
  module Aws::SSM
55
55
 
56
- GEM_VERSION = '1.174.0'
56
+ GEM_VERSION = '1.175.0'
57
57
 
58
58
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-ssm
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.174.0
4
+ version: 1.175.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2024-08-02 00:00:00.000000000 Z
11
+ date: 2024-08-09 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core