@aws-sdk/client-ec2 3.418.0 → 3.420.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -26979,6 +26979,9 @@ const se_CreateVerifiedAccessInstanceRequest = (input, context) => {
26979
26979
  if (input.DryRun != null) {
26980
26980
  entries["DryRun"] = input.DryRun;
26981
26981
  }
26982
+ if (input.FIPSEnabled != null) {
26983
+ entries["FIPSEnabled"] = input.FIPSEnabled;
26984
+ }
26982
26985
  return entries;
26983
26986
  };
26984
26987
  const se_CreateVerifiedAccessTrustProviderDeviceOptions = (input, context) => {
@@ -64326,6 +64329,9 @@ const de_VerifiedAccessInstance = (output, context) => {
64326
64329
  else if (output["tagSet"] !== undefined && output["tagSet"]["item"] !== undefined) {
64327
64330
  contents.Tags = de_TagList((0, smithy_client_1.getArrayIfSingleItem)(output["tagSet"]["item"]), context);
64328
64331
  }
64332
+ if (output["fipsEnabled"] !== undefined) {
64333
+ contents.FipsEnabled = (0, smithy_client_1.parseBoolean)(output["fipsEnabled"]);
64334
+ }
64329
64335
  return contents;
64330
64336
  };
64331
64337
  const de_VerifiedAccessInstanceList = (output, context) => {
@@ -25759,6 +25759,9 @@ const se_CreateVerifiedAccessInstanceRequest = (input, context) => {
25759
25759
  if (input.DryRun != null) {
25760
25760
  entries["DryRun"] = input.DryRun;
25761
25761
  }
25762
+ if (input.FIPSEnabled != null) {
25763
+ entries["FIPSEnabled"] = input.FIPSEnabled;
25764
+ }
25762
25765
  return entries;
25763
25766
  };
25764
25767
  const se_CreateVerifiedAccessTrustProviderDeviceOptions = (input, context) => {
@@ -63106,6 +63109,9 @@ const de_VerifiedAccessInstance = (output, context) => {
63106
63109
  else if (output["tagSet"] !== undefined && output["tagSet"]["item"] !== undefined) {
63107
63110
  contents.Tags = de_TagList(__getArrayIfSingleItem(output["tagSet"]["item"]), context);
63108
63111
  }
63112
+ if (output["fipsEnabled"] !== undefined) {
63113
+ contents.FipsEnabled = __parseBoolean(output["fipsEnabled"]);
63114
+ }
63109
63115
  return contents;
63110
63116
  };
63111
63117
  const de_VerifiedAccessInstanceList = (output, context) => {
@@ -87,6 +87,7 @@ export interface AttachVerifiedAccessTrustProviderCommandOutput extends AttachVe
87
87
  * // Value: "STRING_VALUE",
88
88
  * // },
89
89
  * // ],
90
+ * // FipsEnabled: true || false,
90
91
  * // },
91
92
  * // };
92
93
  *
@@ -46,6 +46,7 @@ export interface CreateVerifiedAccessInstanceCommandOutput extends CreateVerifie
46
46
  * ],
47
47
  * ClientToken: "STRING_VALUE",
48
48
  * DryRun: true || false,
49
+ * FIPSEnabled: true || false,
49
50
  * };
50
51
  * const command = new CreateVerifiedAccessInstanceCommand(input);
51
52
  * const response = await client.send(command);
@@ -70,6 +71,7 @@ export interface CreateVerifiedAccessInstanceCommandOutput extends CreateVerifie
70
71
  * // Value: "STRING_VALUE",
71
72
  * // },
72
73
  * // ],
74
+ * // FipsEnabled: true || false,
73
75
  * // },
74
76
  * // };
75
77
  *
@@ -58,6 +58,7 @@ export interface DeleteVerifiedAccessInstanceCommandOutput extends DeleteVerifie
58
58
  * // Value: "STRING_VALUE",
59
59
  * // },
60
60
  * // ],
61
+ * // FipsEnabled: true || false,
61
62
  * // },
62
63
  * // };
63
64
  *
@@ -70,6 +70,7 @@ export interface DescribeVerifiedAccessInstancesCommandOutput extends DescribeVe
70
70
  * // Value: "STRING_VALUE",
71
71
  * // },
72
72
  * // ],
73
+ * // FipsEnabled: true || false,
73
74
  * // },
74
75
  * // ],
75
76
  * // NextToken: "STRING_VALUE",
@@ -87,6 +87,7 @@ export interface DetachVerifiedAccessTrustProviderCommandOutput extends DetachVe
87
87
  * // Value: "STRING_VALUE",
88
88
  * // },
89
89
  * // ],
90
+ * // FipsEnabled: true || false,
90
91
  * // },
91
92
  * // };
92
93
  *
@@ -59,6 +59,7 @@ export interface ModifyVerifiedAccessInstanceCommandOutput extends ModifyVerifie
59
59
  * // Value: "STRING_VALUE",
60
60
  * // },
61
61
  * // ],
62
+ * // FipsEnabled: true || false,
62
63
  * // },
63
64
  * // };
64
65
  *
@@ -31,8 +31,12 @@ export interface RevokeSecurityGroupIngressCommandOutput extends RevokeSecurityG
31
31
  * destination port or range of ports. For the ICMP protocol, you must also specify the ICMP type
32
32
  * and code. If the security group rule has a description, you do not need to specify the description
33
33
  * to revoke the rule.</p>
34
- * <p>For a default VPC, if the values you specify do not match the existing rule's values, no error is
35
- * returned, and the output describes the security group rules that were not revoked.</p>
34
+ * <p>For a default VPC, if the values you specify do not match the existing rule's values,
35
+ * no error is returned, and the output describes the security group rules that were not
36
+ * revoked.</p>
37
+ * <p>For a non-default VPC, if the values you specify do not match the existing rule's
38
+ * values, an <code>InvalidPermission.NotFound</code> client error is returned, and no
39
+ * rules are revoked.</p>
36
40
  * <p>Amazon Web Services recommends that you describe the security group to verify that the rules were removed.</p>
37
41
  * <p>Rule changes are propagated to instances within the security group as quickly as possible.
38
42
  * However, a small delay might occur.</p>
@@ -4986,6 +4986,13 @@ export interface VerifiedAccessInstance {
4986
4986
  * <p>The tags.</p>
4987
4987
  */
4988
4988
  Tags?: Tag[];
4989
+ /**
4990
+ * @public
4991
+ * <p>
4992
+ * Describes if support for Federal Information Processing Standards (FIPS) is enabled on the instance.
4993
+ * </p>
4994
+ */
4995
+ FipsEnabled?: boolean;
4989
4996
  }
4990
4997
  /**
4991
4998
  * @public
@@ -3884,6 +3884,13 @@ export interface CreateVerifiedAccessInstanceRequest {
3884
3884
  * Otherwise, it is <code>UnauthorizedOperation</code>.</p>
3885
3885
  */
3886
3886
  DryRun?: boolean;
3887
+ /**
3888
+ * @public
3889
+ * <p>
3890
+ * Choose to enable or disable support for Federal Information Processing Standards (FIPS) on the instance.
3891
+ * </p>
3892
+ */
3893
+ FIPSEnabled?: boolean;
3887
3894
  }
3888
3895
  /**
3889
3896
  * @public
@@ -1366,6 +1366,7 @@ export interface VerifiedAccessInstance {
1366
1366
  CreationTime?: string;
1367
1367
  LastUpdatedTime?: string;
1368
1368
  Tags?: Tag[];
1369
+ FipsEnabled?: boolean;
1369
1370
  }
1370
1371
  export interface DeviceOptions {
1371
1372
  TenantId?: string;
@@ -1014,6 +1014,7 @@ export interface CreateVerifiedAccessInstanceRequest {
1014
1014
  TagSpecifications?: TagSpecification[];
1015
1015
  ClientToken?: string;
1016
1016
  DryRun?: boolean;
1017
+ FIPSEnabled?: boolean;
1017
1018
  }
1018
1019
  export interface CreateVerifiedAccessInstanceResult {
1019
1020
  VerifiedAccessInstance?: VerifiedAccessInstance;
package/package.json CHANGED
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "name": "@aws-sdk/client-ec2",
3
3
  "description": "AWS SDK for JavaScript Ec2 Client for Node.js, Browser and React Native",
4
- "version": "3.418.0",
4
+ "version": "3.420.0",
5
5
  "scripts": {
6
6
  "build": "concurrently 'yarn:build:cjs' 'yarn:build:es' 'yarn:build:types'",
7
7
  "build:cjs": "tsc -p tsconfig.cjs.json",