aws-sdk-ssm 1.93.0 → 1.94.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: c4a730d0567fdfcce02e1461b884dd73e06c9a285f3bf5a7f41e10c71e032af6
4
- data.tar.gz: f74e4920f4df3fd5fd0167c2f292c8d81ee88ad3ce95de0a05e324504fbc1b4f
3
+ metadata.gz: 8f4ee7898abab202265e5683df1dd3ee63e32ca0f305e833bfeb5911bdc1886b
4
+ data.tar.gz: 6c5df6a825f7637ed7f6801950dcde030ec1c0dd5842f8b1f5a1f8be24cf43fc
5
5
  SHA512:
6
- metadata.gz: c0446f8cd8873d7e62d9077a585475650726978977c0776f1b997ccca5f6adc3a0a06a2b99596762e2cd14fce6f14b836da815bd7d3c8f87567f9497483872c2
7
- data.tar.gz: 4eab740ff179f56805d7914e12010a59d7de6dfbd5fe4475e8938d66e2f89608d13213a5f47d08d75df46ed74556c6b9fadcac8eac2efe33766777028e31ea66
6
+ metadata.gz: e2697209bcc6993b16ffec15ce998b8f51db5b8422b395eb4f39f2ab8d10d167ff7a493772fa0b5f56bb4b679e95a572d038e1d1c470a3517657b48d29f09748
7
+ data.tar.gz: 3a5ca0268063639e26d5e5a6eb1d17427e5f144613b46b2b9ed7856d26f4c1c07fbcdc820919add48b5c16cd8d9ac6d6630ce3d34850e70a3f120c730cbd0f5f
@@ -49,6 +49,6 @@ require_relative 'aws-sdk-ssm/customizations'
49
49
  # @!group service
50
50
  module Aws::SSM
51
51
 
52
- GEM_VERSION = '1.93.0'
52
+ GEM_VERSION = '1.94.0'
53
53
 
54
54
  end
@@ -1522,7 +1522,7 @@ module Aws::SSM
1522
1522
  # global_filters: {
1523
1523
  # patch_filters: [ # required
1524
1524
  # {
1525
- # key: "PATCH_SET", # required, accepts PATCH_SET, PRODUCT, PRODUCT_FAMILY, CLASSIFICATION, MSRC_SEVERITY, PATCH_ID, SECTION, PRIORITY, SEVERITY
1525
+ # key: "ARCH", # required, accepts ARCH, ADVISORY_ID, BUGZILLA_ID, PATCH_SET, PRODUCT, PRODUCT_FAMILY, CLASSIFICATION, CVE_ID, EPOCH, MSRC_SEVERITY, NAME, PATCH_ID, SECTION, PRIORITY, REPOSITORY, RELEASE, SEVERITY, SECURITY, VERSION
1526
1526
  # values: ["PatchFilterValue"], # required
1527
1527
  # },
1528
1528
  # ],
@@ -1533,7 +1533,7 @@ module Aws::SSM
1533
1533
  # patch_filter_group: { # required
1534
1534
  # patch_filters: [ # required
1535
1535
  # {
1536
- # key: "PATCH_SET", # required, accepts PATCH_SET, PRODUCT, PRODUCT_FAMILY, CLASSIFICATION, MSRC_SEVERITY, PATCH_ID, SECTION, PRIORITY, SEVERITY
1536
+ # key: "ARCH", # required, accepts ARCH, ADVISORY_ID, BUGZILLA_ID, PATCH_SET, PRODUCT, PRODUCT_FAMILY, CLASSIFICATION, CVE_ID, EPOCH, MSRC_SEVERITY, NAME, PATCH_ID, SECTION, PRIORITY, REPOSITORY, RELEASE, SEVERITY, SECURITY, VERSION
1537
1537
  # values: ["PatchFilterValue"], # required
1538
1538
  # },
1539
1539
  # ],
@@ -2651,6 +2651,19 @@ module Aws::SSM
2651
2651
  # resp.patches[0].kb_number #=> String
2652
2652
  # resp.patches[0].msrc_number #=> String
2653
2653
  # resp.patches[0].language #=> String
2654
+ # resp.patches[0].advisory_ids #=> Array
2655
+ # resp.patches[0].advisory_ids[0] #=> String
2656
+ # resp.patches[0].bugzilla_ids #=> Array
2657
+ # resp.patches[0].bugzilla_ids[0] #=> String
2658
+ # resp.patches[0].cve_ids #=> Array
2659
+ # resp.patches[0].cve_ids[0] #=> String
2660
+ # resp.patches[0].name #=> String
2661
+ # resp.patches[0].epoch #=> Integer
2662
+ # resp.patches[0].version #=> String
2663
+ # resp.patches[0].release #=> String
2664
+ # resp.patches[0].arch #=> String
2665
+ # resp.patches[0].severity #=> String
2666
+ # resp.patches[0].repository #=> String
2654
2667
  # resp.next_token #=> String
2655
2668
  #
2656
2669
  # @see http://docs.aws.amazon.com/goto/WebAPI/ssm-2014-11-06/DescribeAvailablePatches AWS API Documentation
@@ -2865,6 +2878,19 @@ module Aws::SSM
2865
2878
  # resp.effective_patches[0].patch.kb_number #=> String
2866
2879
  # resp.effective_patches[0].patch.msrc_number #=> String
2867
2880
  # resp.effective_patches[0].patch.language #=> String
2881
+ # resp.effective_patches[0].patch.advisory_ids #=> Array
2882
+ # resp.effective_patches[0].patch.advisory_ids[0] #=> String
2883
+ # resp.effective_patches[0].patch.bugzilla_ids #=> Array
2884
+ # resp.effective_patches[0].patch.bugzilla_ids[0] #=> String
2885
+ # resp.effective_patches[0].patch.cve_ids #=> Array
2886
+ # resp.effective_patches[0].patch.cve_ids[0] #=> String
2887
+ # resp.effective_patches[0].patch.name #=> String
2888
+ # resp.effective_patches[0].patch.epoch #=> Integer
2889
+ # resp.effective_patches[0].patch.version #=> String
2890
+ # resp.effective_patches[0].patch.release #=> String
2891
+ # resp.effective_patches[0].patch.arch #=> String
2892
+ # resp.effective_patches[0].patch.severity #=> String
2893
+ # resp.effective_patches[0].patch.repository #=> String
2868
2894
  # resp.effective_patches[0].patch_status.deployment_status #=> String, one of "APPROVED", "PENDING_APPROVAL", "EXPLICIT_APPROVED", "EXPLICIT_REJECTED"
2869
2895
  # resp.effective_patches[0].patch_status.compliance_level #=> String, one of "CRITICAL", "HIGH", "MEDIUM", "LOW", "INFORMATIONAL", "UNSPECIFIED"
2870
2896
  # resp.effective_patches[0].patch_status.approval_date #=> Time
@@ -5469,10 +5495,10 @@ module Aws::SSM
5469
5495
  req.send_request(options)
5470
5496
  end
5471
5497
 
5472
- # Query a list of all parameters used by the AWS account.
5498
+ # Retrieves the history of all changes to a parameter.
5473
5499
  #
5474
5500
  # @option params [required, String] :name
5475
- # The name of a parameter you want to query.
5501
+ # The name of the parameter for which you want to review history.
5476
5502
  #
5477
5503
  # @option params [Boolean] :with_decryption
5478
5504
  # Return decrypted values for secure string parameters. This flag is
@@ -5716,12 +5742,12 @@ module Aws::SSM
5716
5742
  # resp.name #=> String
5717
5743
  # resp.operating_system #=> String, one of "WINDOWS", "AMAZON_LINUX", "AMAZON_LINUX_2", "UBUNTU", "REDHAT_ENTERPRISE_LINUX", "SUSE", "CENTOS", "ORACLE_LINUX", "DEBIAN"
5718
5744
  # resp.global_filters.patch_filters #=> Array
5719
- # resp.global_filters.patch_filters[0].key #=> String, one of "PATCH_SET", "PRODUCT", "PRODUCT_FAMILY", "CLASSIFICATION", "MSRC_SEVERITY", "PATCH_ID", "SECTION", "PRIORITY", "SEVERITY"
5745
+ # resp.global_filters.patch_filters[0].key #=> String, one of "ARCH", "ADVISORY_ID", "BUGZILLA_ID", "PATCH_SET", "PRODUCT", "PRODUCT_FAMILY", "CLASSIFICATION", "CVE_ID", "EPOCH", "MSRC_SEVERITY", "NAME", "PATCH_ID", "SECTION", "PRIORITY", "REPOSITORY", "RELEASE", "SEVERITY", "SECURITY", "VERSION"
5720
5746
  # resp.global_filters.patch_filters[0].values #=> Array
5721
5747
  # resp.global_filters.patch_filters[0].values[0] #=> String
5722
5748
  # resp.approval_rules.patch_rules #=> Array
5723
5749
  # resp.approval_rules.patch_rules[0].patch_filter_group.patch_filters #=> Array
5724
- # resp.approval_rules.patch_rules[0].patch_filter_group.patch_filters[0].key #=> String, one of "PATCH_SET", "PRODUCT", "PRODUCT_FAMILY", "CLASSIFICATION", "MSRC_SEVERITY", "PATCH_ID", "SECTION", "PRIORITY", "SEVERITY"
5750
+ # resp.approval_rules.patch_rules[0].patch_filter_group.patch_filters[0].key #=> String, one of "ARCH", "ADVISORY_ID", "BUGZILLA_ID", "PATCH_SET", "PRODUCT", "PRODUCT_FAMILY", "CLASSIFICATION", "CVE_ID", "EPOCH", "MSRC_SEVERITY", "NAME", "PATCH_ID", "SECTION", "PRIORITY", "REPOSITORY", "RELEASE", "SEVERITY", "SECURITY", "VERSION"
5725
5751
  # resp.approval_rules.patch_rules[0].patch_filter_group.patch_filters[0].values #=> Array
5726
5752
  # resp.approval_rules.patch_rules[0].patch_filter_group.patch_filters[0].values[0] #=> String
5727
5753
  # resp.approval_rules.patch_rules[0].compliance_level #=> String, one of "CRITICAL", "HIGH", "MEDIUM", "LOW", "INFORMATIONAL", "UNSPECIFIED"
@@ -9543,7 +9569,7 @@ module Aws::SSM
9543
9569
  # global_filters: {
9544
9570
  # patch_filters: [ # required
9545
9571
  # {
9546
- # key: "PATCH_SET", # required, accepts PATCH_SET, PRODUCT, PRODUCT_FAMILY, CLASSIFICATION, MSRC_SEVERITY, PATCH_ID, SECTION, PRIORITY, SEVERITY
9572
+ # key: "ARCH", # required, accepts ARCH, ADVISORY_ID, BUGZILLA_ID, PATCH_SET, PRODUCT, PRODUCT_FAMILY, CLASSIFICATION, CVE_ID, EPOCH, MSRC_SEVERITY, NAME, PATCH_ID, SECTION, PRIORITY, REPOSITORY, RELEASE, SEVERITY, SECURITY, VERSION
9547
9573
  # values: ["PatchFilterValue"], # required
9548
9574
  # },
9549
9575
  # ],
@@ -9554,7 +9580,7 @@ module Aws::SSM
9554
9580
  # patch_filter_group: { # required
9555
9581
  # patch_filters: [ # required
9556
9582
  # {
9557
- # key: "PATCH_SET", # required, accepts PATCH_SET, PRODUCT, PRODUCT_FAMILY, CLASSIFICATION, MSRC_SEVERITY, PATCH_ID, SECTION, PRIORITY, SEVERITY
9583
+ # key: "ARCH", # required, accepts ARCH, ADVISORY_ID, BUGZILLA_ID, PATCH_SET, PRODUCT, PRODUCT_FAMILY, CLASSIFICATION, CVE_ID, EPOCH, MSRC_SEVERITY, NAME, PATCH_ID, SECTION, PRIORITY, REPOSITORY, RELEASE, SEVERITY, SECURITY, VERSION
9558
9584
  # values: ["PatchFilterValue"], # required
9559
9585
  # },
9560
9586
  # ],
@@ -9588,12 +9614,12 @@ module Aws::SSM
9588
9614
  # resp.name #=> String
9589
9615
  # resp.operating_system #=> String, one of "WINDOWS", "AMAZON_LINUX", "AMAZON_LINUX_2", "UBUNTU", "REDHAT_ENTERPRISE_LINUX", "SUSE", "CENTOS", "ORACLE_LINUX", "DEBIAN"
9590
9616
  # resp.global_filters.patch_filters #=> Array
9591
- # resp.global_filters.patch_filters[0].key #=> String, one of "PATCH_SET", "PRODUCT", "PRODUCT_FAMILY", "CLASSIFICATION", "MSRC_SEVERITY", "PATCH_ID", "SECTION", "PRIORITY", "SEVERITY"
9617
+ # resp.global_filters.patch_filters[0].key #=> String, one of "ARCH", "ADVISORY_ID", "BUGZILLA_ID", "PATCH_SET", "PRODUCT", "PRODUCT_FAMILY", "CLASSIFICATION", "CVE_ID", "EPOCH", "MSRC_SEVERITY", "NAME", "PATCH_ID", "SECTION", "PRIORITY", "REPOSITORY", "RELEASE", "SEVERITY", "SECURITY", "VERSION"
9592
9618
  # resp.global_filters.patch_filters[0].values #=> Array
9593
9619
  # resp.global_filters.patch_filters[0].values[0] #=> String
9594
9620
  # resp.approval_rules.patch_rules #=> Array
9595
9621
  # resp.approval_rules.patch_rules[0].patch_filter_group.patch_filters #=> Array
9596
- # resp.approval_rules.patch_rules[0].patch_filter_group.patch_filters[0].key #=> String, one of "PATCH_SET", "PRODUCT", "PRODUCT_FAMILY", "CLASSIFICATION", "MSRC_SEVERITY", "PATCH_ID", "SECTION", "PRIORITY", "SEVERITY"
9622
+ # resp.approval_rules.patch_rules[0].patch_filter_group.patch_filters[0].key #=> String, one of "ARCH", "ADVISORY_ID", "BUGZILLA_ID", "PATCH_SET", "PRODUCT", "PRODUCT_FAMILY", "CLASSIFICATION", "CVE_ID", "EPOCH", "MSRC_SEVERITY", "NAME", "PATCH_ID", "SECTION", "PRIORITY", "REPOSITORY", "RELEASE", "SEVERITY", "SECURITY", "VERSION"
9597
9623
  # resp.approval_rules.patch_rules[0].patch_filter_group.patch_filters[0].values #=> Array
9598
9624
  # resp.approval_rules.patch_rules[0].patch_filter_group.patch_filters[0].values[0] #=> String
9599
9625
  # resp.approval_rules.patch_rules[0].compliance_level #=> String, one of "CRITICAL", "HIGH", "MEDIUM", "LOW", "INFORMATIONAL", "UNSPECIFIED"
@@ -9755,7 +9781,7 @@ module Aws::SSM
9755
9781
  params: params,
9756
9782
  config: config)
9757
9783
  context[:gem_name] = 'aws-sdk-ssm'
9758
- context[:gem_version] = '1.93.0'
9784
+ context[:gem_version] = '1.94.0'
9759
9785
  Seahorse::Client::Request.new(handlers, context)
9760
9786
  end
9761
9787
 
@@ -765,9 +765,16 @@ module Aws::SSM
765
765
  ParametersFilterValueList = Shapes::ListShape.new(name: 'ParametersFilterValueList')
766
766
  Patch = Shapes::StructureShape.new(name: 'Patch')
767
767
  PatchAction = Shapes::StringShape.new(name: 'PatchAction')
768
+ PatchAdvisoryId = Shapes::StringShape.new(name: 'PatchAdvisoryId')
769
+ PatchAdvisoryIdList = Shapes::ListShape.new(name: 'PatchAdvisoryIdList')
770
+ PatchArch = Shapes::StringShape.new(name: 'PatchArch')
768
771
  PatchBaselineIdentity = Shapes::StructureShape.new(name: 'PatchBaselineIdentity')
769
772
  PatchBaselineIdentityList = Shapes::ListShape.new(name: 'PatchBaselineIdentityList')
770
773
  PatchBaselineMaxResults = Shapes::IntegerShape.new(name: 'PatchBaselineMaxResults')
774
+ PatchBugzillaId = Shapes::StringShape.new(name: 'PatchBugzillaId')
775
+ PatchBugzillaIdList = Shapes::ListShape.new(name: 'PatchBugzillaIdList')
776
+ PatchCVEId = Shapes::StringShape.new(name: 'PatchCVEId')
777
+ PatchCVEIdList = Shapes::ListShape.new(name: 'PatchCVEIdList')
771
778
  PatchClassification = Shapes::StringShape.new(name: 'PatchClassification')
772
779
  PatchComplianceData = Shapes::StructureShape.new(name: 'PatchComplianceData')
773
780
  PatchComplianceDataList = Shapes::ListShape.new(name: 'PatchComplianceDataList')
@@ -777,6 +784,7 @@ module Aws::SSM
777
784
  PatchContentUrl = Shapes::StringShape.new(name: 'PatchContentUrl')
778
785
  PatchDeploymentStatus = Shapes::StringShape.new(name: 'PatchDeploymentStatus')
779
786
  PatchDescription = Shapes::StringShape.new(name: 'PatchDescription')
787
+ PatchEpoch = Shapes::IntegerShape.new(name: 'PatchEpoch')
780
788
  PatchFailedCount = Shapes::IntegerShape.new(name: 'PatchFailedCount')
781
789
  PatchFilter = Shapes::StructureShape.new(name: 'PatchFilter')
782
790
  PatchFilterGroup = Shapes::StructureShape.new(name: 'PatchFilterGroup')
@@ -800,6 +808,7 @@ module Aws::SSM
800
808
  PatchMissingCount = Shapes::IntegerShape.new(name: 'PatchMissingCount')
801
809
  PatchMsrcNumber = Shapes::StringShape.new(name: 'PatchMsrcNumber')
802
810
  PatchMsrcSeverity = Shapes::StringShape.new(name: 'PatchMsrcSeverity')
811
+ PatchName = Shapes::StringShape.new(name: 'PatchName')
803
812
  PatchNotApplicableCount = Shapes::IntegerShape.new(name: 'PatchNotApplicableCount')
804
813
  PatchOperationType = Shapes::StringShape.new(name: 'PatchOperationType')
805
814
  PatchOrchestratorFilter = Shapes::StructureShape.new(name: 'PatchOrchestratorFilter')
@@ -812,6 +821,8 @@ module Aws::SSM
812
821
  PatchPropertiesList = Shapes::ListShape.new(name: 'PatchPropertiesList')
813
822
  PatchProperty = Shapes::StringShape.new(name: 'PatchProperty')
814
823
  PatchPropertyEntry = Shapes::MapShape.new(name: 'PatchPropertyEntry')
824
+ PatchRelease = Shapes::StringShape.new(name: 'PatchRelease')
825
+ PatchRepository = Shapes::StringShape.new(name: 'PatchRepository')
815
826
  PatchRule = Shapes::StructureShape.new(name: 'PatchRule')
816
827
  PatchRuleGroup = Shapes::StructureShape.new(name: 'PatchRuleGroup')
817
828
  PatchRuleList = Shapes::ListShape.new(name: 'PatchRuleList')
@@ -828,6 +839,7 @@ module Aws::SSM
828
839
  PatchTitle = Shapes::StringShape.new(name: 'PatchTitle')
829
840
  PatchUnreportedNotApplicableCount = Shapes::IntegerShape.new(name: 'PatchUnreportedNotApplicableCount')
830
841
  PatchVendor = Shapes::StringShape.new(name: 'PatchVendor')
842
+ PatchVersion = Shapes::StringShape.new(name: 'PatchVersion')
831
843
  PingStatus = Shapes::StringShape.new(name: 'PingStatus')
832
844
  PlatformType = Shapes::StringShape.new(name: 'PlatformType')
833
845
  PlatformTypeList = Shapes::ListShape.new(name: 'PlatformTypeList')
@@ -3313,8 +3325,20 @@ module Aws::SSM
3313
3325
  Patch.add_member(:kb_number, Shapes::ShapeRef.new(shape: PatchKbNumber, location_name: "KbNumber"))
3314
3326
  Patch.add_member(:msrc_number, Shapes::ShapeRef.new(shape: PatchMsrcNumber, location_name: "MsrcNumber"))
3315
3327
  Patch.add_member(:language, Shapes::ShapeRef.new(shape: PatchLanguage, location_name: "Language"))
3328
+ Patch.add_member(:advisory_ids, Shapes::ShapeRef.new(shape: PatchAdvisoryIdList, location_name: "AdvisoryIds"))
3329
+ Patch.add_member(:bugzilla_ids, Shapes::ShapeRef.new(shape: PatchBugzillaIdList, location_name: "BugzillaIds"))
3330
+ Patch.add_member(:cve_ids, Shapes::ShapeRef.new(shape: PatchCVEIdList, location_name: "CVEIds"))
3331
+ Patch.add_member(:name, Shapes::ShapeRef.new(shape: PatchName, location_name: "Name"))
3332
+ Patch.add_member(:epoch, Shapes::ShapeRef.new(shape: PatchEpoch, location_name: "Epoch"))
3333
+ Patch.add_member(:version, Shapes::ShapeRef.new(shape: PatchVersion, location_name: "Version"))
3334
+ Patch.add_member(:release, Shapes::ShapeRef.new(shape: PatchRelease, location_name: "Release"))
3335
+ Patch.add_member(:arch, Shapes::ShapeRef.new(shape: PatchArch, location_name: "Arch"))
3336
+ Patch.add_member(:severity, Shapes::ShapeRef.new(shape: PatchSeverity, location_name: "Severity"))
3337
+ Patch.add_member(:repository, Shapes::ShapeRef.new(shape: PatchRepository, location_name: "Repository"))
3316
3338
  Patch.struct_class = Types::Patch
3317
3339
 
3340
+ PatchAdvisoryIdList.member = Shapes::ShapeRef.new(shape: PatchAdvisoryId)
3341
+
3318
3342
  PatchBaselineIdentity.add_member(:baseline_id, Shapes::ShapeRef.new(shape: BaselineId, location_name: "BaselineId"))
3319
3343
  PatchBaselineIdentity.add_member(:baseline_name, Shapes::ShapeRef.new(shape: BaselineName, location_name: "BaselineName"))
3320
3344
  PatchBaselineIdentity.add_member(:operating_system, Shapes::ShapeRef.new(shape: OperatingSystem, location_name: "OperatingSystem"))
@@ -3324,6 +3348,10 @@ module Aws::SSM
3324
3348
 
3325
3349
  PatchBaselineIdentityList.member = Shapes::ShapeRef.new(shape: PatchBaselineIdentity)
3326
3350
 
3351
+ PatchBugzillaIdList.member = Shapes::ShapeRef.new(shape: PatchBugzillaId)
3352
+
3353
+ PatchCVEIdList.member = Shapes::ShapeRef.new(shape: PatchCVEId)
3354
+
3327
3355
  PatchComplianceData.add_member(:title, Shapes::ShapeRef.new(shape: PatchTitle, required: true, location_name: "Title"))
3328
3356
  PatchComplianceData.add_member(:kb_id, Shapes::ShapeRef.new(shape: PatchKbNumber, required: true, location_name: "KBId"))
3329
3357
  PatchComplianceData.add_member(:classification, Shapes::ShapeRef.new(shape: PatchClassification, required: true, location_name: "Classification"))
@@ -3316,7 +3316,7 @@ module Aws::SSM
3316
3316
  # global_filters: {
3317
3317
  # patch_filters: [ # required
3318
3318
  # {
3319
- # key: "PATCH_SET", # required, accepts PATCH_SET, PRODUCT, PRODUCT_FAMILY, CLASSIFICATION, MSRC_SEVERITY, PATCH_ID, SECTION, PRIORITY, SEVERITY
3319
+ # key: "ARCH", # required, accepts ARCH, ADVISORY_ID, BUGZILLA_ID, PATCH_SET, PRODUCT, PRODUCT_FAMILY, CLASSIFICATION, CVE_ID, EPOCH, MSRC_SEVERITY, NAME, PATCH_ID, SECTION, PRIORITY, REPOSITORY, RELEASE, SEVERITY, SECURITY, VERSION
3320
3320
  # values: ["PatchFilterValue"], # required
3321
3321
  # },
3322
3322
  # ],
@@ -3327,7 +3327,7 @@ module Aws::SSM
3327
3327
  # patch_filter_group: { # required
3328
3328
  # patch_filters: [ # required
3329
3329
  # {
3330
- # key: "PATCH_SET", # required, accepts PATCH_SET, PRODUCT, PRODUCT_FAMILY, CLASSIFICATION, MSRC_SEVERITY, PATCH_ID, SECTION, PRIORITY, SEVERITY
3330
+ # key: "ARCH", # required, accepts ARCH, ADVISORY_ID, BUGZILLA_ID, PATCH_SET, PRODUCT, PRODUCT_FAMILY, CLASSIFICATION, CVE_ID, EPOCH, MSRC_SEVERITY, NAME, PATCH_ID, SECTION, PRIORITY, REPOSITORY, RELEASE, SEVERITY, SECURITY, VERSION
3331
3331
  # values: ["PatchFilterValue"], # required
3332
3332
  # },
3333
3333
  # ],
@@ -8303,7 +8303,7 @@ module Aws::SSM
8303
8303
  # }
8304
8304
  #
8305
8305
  # @!attribute [rw] name
8306
- # The name of a parameter you want to query.
8306
+ # The name of the parameter for which you want to review history.
8307
8307
  # @return [String]
8308
8308
  #
8309
8309
  # @!attribute [rw] with_decryption
@@ -13323,8 +13323,11 @@ module Aws::SSM
13323
13323
  # Represents metadata about a patch.
13324
13324
  #
13325
13325
  # @!attribute [rw] id
13326
- # The ID of the patch (this is different than the Microsoft Knowledge
13327
- # Base ID).
13326
+ # The ID of the patch. Applies to Windows patches only.
13327
+ #
13328
+ # <note markdown="1"> This ID is not the same as the Microsoft Knowledge Base ID.
13329
+ #
13330
+ # </note>
13328
13331
  # @return [String]
13329
13332
  #
13330
13333
  # @!attribute [rw] release_date
@@ -13348,37 +13351,95 @@ module Aws::SSM
13348
13351
  # @return [String]
13349
13352
  #
13350
13353
  # @!attribute [rw] product_family
13351
- # The product family the patch is applicable for (for example,
13352
- # Windows).
13354
+ # The product family the patch is applicable for. For example,
13355
+ # `Windows` or `Amazon Linux 2`.
13353
13356
  # @return [String]
13354
13357
  #
13355
13358
  # @!attribute [rw] product
13356
- # The specific product the patch is applicable for (for example,
13357
- # WindowsServer2016).
13359
+ # The specific product the patch is applicable for. For example,
13360
+ # `WindowsServer2016` or `AmazonLinux2018.03`.
13358
13361
  # @return [String]
13359
13362
  #
13360
13363
  # @!attribute [rw] classification
13361
- # The classification of the patch (for example, SecurityUpdates,
13362
- # Updates, CriticalUpdates).
13364
+ # The classification of the patch. For example, `SecurityUpdates`,
13365
+ # `Updates`, or `CriticalUpdates`.
13363
13366
  # @return [String]
13364
13367
  #
13365
13368
  # @!attribute [rw] msrc_severity
13366
- # The severity of the patch (for example Critical, Important,
13367
- # Moderate).
13369
+ # The severity of the patch, such as `Critical`, `Important`, or
13370
+ # `Moderate`. Applies to Windows patches only.
13368
13371
  # @return [String]
13369
13372
  #
13370
13373
  # @!attribute [rw] kb_number
13371
- # The Microsoft Knowledge Base ID of the patch.
13374
+ # The Microsoft Knowledge Base ID of the patch. Applies to Windows
13375
+ # patches only.
13372
13376
  # @return [String]
13373
13377
  #
13374
13378
  # @!attribute [rw] msrc_number
13375
- # The ID of the MSRC bulletin the patch is related to.
13379
+ # The ID of the Microsoft Security Response Center (MSRC) bulletin the
13380
+ # patch is related to. For example, `MS14-045`. Applies to Windows
13381
+ # patches only.
13376
13382
  # @return [String]
13377
13383
  #
13378
13384
  # @!attribute [rw] language
13379
13385
  # The language of the patch if it's language-specific.
13380
13386
  # @return [String]
13381
13387
  #
13388
+ # @!attribute [rw] advisory_ids
13389
+ # The Advisory ID of the patch. For example, `RHSA-2020:3779`. Applies
13390
+ # to Linux-based instances only.
13391
+ # @return [Array<String>]
13392
+ #
13393
+ # @!attribute [rw] bugzilla_ids
13394
+ # The Bugzilla ID of the patch. For example, `1600646`. Applies to
13395
+ # Linux-based instances only.
13396
+ # @return [Array<String>]
13397
+ #
13398
+ # @!attribute [rw] cve_ids
13399
+ # The Common Vulnerabilities and Exposures (CVE) ID of the patch. For
13400
+ # example, `CVE-1999-0067`. Applies to Linux-based instances only.
13401
+ # @return [Array<String>]
13402
+ #
13403
+ # @!attribute [rw] name
13404
+ # The name of the patch. Applies to Linux-based instances only.
13405
+ # @return [String]
13406
+ #
13407
+ # @!attribute [rw] epoch
13408
+ # The epoch of the patch. For example in
13409
+ # `pkg-example-EE-20180914-2.2.amzn1.noarch`, the epoch value is
13410
+ # `20180914-2`. Applies to Linux-based instances only.
13411
+ # @return [Integer]
13412
+ #
13413
+ # @!attribute [rw] version
13414
+ # The version number of the patch. For example, in
13415
+ # `example-pkg-1.710.10-2.7.abcd.x86_64`, the version number is
13416
+ # indicated by `-1`. Applies to Linux-based instances only.
13417
+ # @return [String]
13418
+ #
13419
+ # @!attribute [rw] release
13420
+ # The particular release of a patch. For example, in
13421
+ # `pkg-example-EE-20180914-2.2.amzn1.noarch`, the release is
13422
+ # `2.amaz1`. Applies to Linux-based instances only.
13423
+ # @return [String]
13424
+ #
13425
+ # @!attribute [rw] arch
13426
+ # The architecture of the patch. For example, in
13427
+ # `example-pkg-0.710.10-2.7.abcd.x86_64`, the architecture is
13428
+ # indicated by `x86_64`. Applies to Linux-based instances only.
13429
+ # @return [String]
13430
+ #
13431
+ # @!attribute [rw] severity
13432
+ # The severity level of the patch. For example, `CRITICAL` or
13433
+ # `MODERATE`.
13434
+ # @return [String]
13435
+ #
13436
+ # @!attribute [rw] repository
13437
+ # The source patch repository for the operating system and version,
13438
+ # such as `trusty-security` for Ubuntu Server 14.04 LTE and
13439
+ # `focal-security` for Ubuntu Server 20.04 LTE. Applies to Linux-based
13440
+ # instances only.
13441
+ # @return [String]
13442
+ #
13382
13443
  # @see http://docs.aws.amazon.com/goto/WebAPI/ssm-2014-11-06/Patch AWS API Documentation
13383
13444
  #
13384
13445
  class Patch < Struct.new(
@@ -13394,7 +13455,17 @@ module Aws::SSM
13394
13455
  :msrc_severity,
13395
13456
  :kb_number,
13396
13457
  :msrc_number,
13397
- :language)
13458
+ :language,
13459
+ :advisory_ids,
13460
+ :bugzilla_ids,
13461
+ :cve_ids,
13462
+ :name,
13463
+ :epoch,
13464
+ :version,
13465
+ :release,
13466
+ :arch,
13467
+ :severity,
13468
+ :repository)
13398
13469
  SENSITIVE = []
13399
13470
  include Aws::Structure
13400
13471
  end
@@ -13508,7 +13579,7 @@ module Aws::SSM
13508
13579
  # data as a hash:
13509
13580
  #
13510
13581
  # {
13511
- # key: "PATCH_SET", # required, accepts PATCH_SET, PRODUCT, PRODUCT_FAMILY, CLASSIFICATION, MSRC_SEVERITY, PATCH_ID, SECTION, PRIORITY, SEVERITY
13582
+ # key: "ARCH", # required, accepts ARCH, ADVISORY_ID, BUGZILLA_ID, PATCH_SET, PRODUCT, PRODUCT_FAMILY, CLASSIFICATION, CVE_ID, EPOCH, MSRC_SEVERITY, NAME, PATCH_ID, SECTION, PRIORITY, REPOSITORY, RELEASE, SEVERITY, SECURITY, VERSION
13512
13583
  # values: ["PatchFilterValue"], # required
13513
13584
  # }
13514
13585
  #
@@ -13543,7 +13614,7 @@ module Aws::SSM
13543
13614
  # {
13544
13615
  # patch_filters: [ # required
13545
13616
  # {
13546
- # key: "PATCH_SET", # required, accepts PATCH_SET, PRODUCT, PRODUCT_FAMILY, CLASSIFICATION, MSRC_SEVERITY, PATCH_ID, SECTION, PRIORITY, SEVERITY
13617
+ # key: "ARCH", # required, accepts ARCH, ADVISORY_ID, BUGZILLA_ID, PATCH_SET, PRODUCT, PRODUCT_FAMILY, CLASSIFICATION, CVE_ID, EPOCH, MSRC_SEVERITY, NAME, PATCH_ID, SECTION, PRIORITY, REPOSITORY, RELEASE, SEVERITY, SECURITY, VERSION
13547
13618
  # values: ["PatchFilterValue"], # required
13548
13619
  # },
13549
13620
  # ],
@@ -13617,7 +13688,7 @@ module Aws::SSM
13617
13688
  # patch_filter_group: { # required
13618
13689
  # patch_filters: [ # required
13619
13690
  # {
13620
- # key: "PATCH_SET", # required, accepts PATCH_SET, PRODUCT, PRODUCT_FAMILY, CLASSIFICATION, MSRC_SEVERITY, PATCH_ID, SECTION, PRIORITY, SEVERITY
13691
+ # key: "ARCH", # required, accepts ARCH, ADVISORY_ID, BUGZILLA_ID, PATCH_SET, PRODUCT, PRODUCT_FAMILY, CLASSIFICATION, CVE_ID, EPOCH, MSRC_SEVERITY, NAME, PATCH_ID, SECTION, PRIORITY, REPOSITORY, RELEASE, SEVERITY, SECURITY, VERSION
13621
13692
  # values: ["PatchFilterValue"], # required
13622
13693
  # },
13623
13694
  # ],
@@ -13682,7 +13753,7 @@ module Aws::SSM
13682
13753
  # patch_filter_group: { # required
13683
13754
  # patch_filters: [ # required
13684
13755
  # {
13685
- # key: "PATCH_SET", # required, accepts PATCH_SET, PRODUCT, PRODUCT_FAMILY, CLASSIFICATION, MSRC_SEVERITY, PATCH_ID, SECTION, PRIORITY, SEVERITY
13756
+ # key: "ARCH", # required, accepts ARCH, ADVISORY_ID, BUGZILLA_ID, PATCH_SET, PRODUCT, PRODUCT_FAMILY, CLASSIFICATION, CVE_ID, EPOCH, MSRC_SEVERITY, NAME, PATCH_ID, SECTION, PRIORITY, REPOSITORY, RELEASE, SEVERITY, SECURITY, VERSION
13686
13757
  # values: ["PatchFilterValue"], # required
13687
13758
  # },
13688
13759
  # ],
@@ -18050,7 +18121,7 @@ module Aws::SSM
18050
18121
  # global_filters: {
18051
18122
  # patch_filters: [ # required
18052
18123
  # {
18053
- # key: "PATCH_SET", # required, accepts PATCH_SET, PRODUCT, PRODUCT_FAMILY, CLASSIFICATION, MSRC_SEVERITY, PATCH_ID, SECTION, PRIORITY, SEVERITY
18124
+ # key: "ARCH", # required, accepts ARCH, ADVISORY_ID, BUGZILLA_ID, PATCH_SET, PRODUCT, PRODUCT_FAMILY, CLASSIFICATION, CVE_ID, EPOCH, MSRC_SEVERITY, NAME, PATCH_ID, SECTION, PRIORITY, REPOSITORY, RELEASE, SEVERITY, SECURITY, VERSION
18054
18125
  # values: ["PatchFilterValue"], # required
18055
18126
  # },
18056
18127
  # ],
@@ -18061,7 +18132,7 @@ module Aws::SSM
18061
18132
  # patch_filter_group: { # required
18062
18133
  # patch_filters: [ # required
18063
18134
  # {
18064
- # key: "PATCH_SET", # required, accepts PATCH_SET, PRODUCT, PRODUCT_FAMILY, CLASSIFICATION, MSRC_SEVERITY, PATCH_ID, SECTION, PRIORITY, SEVERITY
18135
+ # key: "ARCH", # required, accepts ARCH, ADVISORY_ID, BUGZILLA_ID, PATCH_SET, PRODUCT, PRODUCT_FAMILY, CLASSIFICATION, CVE_ID, EPOCH, MSRC_SEVERITY, NAME, PATCH_ID, SECTION, PRIORITY, REPOSITORY, RELEASE, SEVERITY, SECURITY, VERSION
18065
18136
  # values: ["PatchFilterValue"], # required
18066
18137
  # },
18067
18138
  # ],
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-ssm
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.93.0
4
+ version: 1.94.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2020-09-30 00:00:00.000000000 Z
11
+ date: 2020-10-15 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core