Skip to content

Commit 2cb7f26

Browse files
author
awstools
committed
feat(client-ec2): The release includes AWS verified access to support FIPs compliance in North America regions
1 parent 3adb1ba commit 2cb7f26

11 files changed

+55
-4
lines changed

clients/client-ec2/src/commands/AttachVerifiedAccessTrustProviderCommand.ts

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -110,6 +110,7 @@ export interface AttachVerifiedAccessTrustProviderCommandOutput
110110
* // Value: "STRING_VALUE",
111111
* // },
112112
* // ],
113+
* // FipsEnabled: true || false,
113114
* // },
114115
* // };
115116
*

clients/client-ec2/src/commands/CreateVerifiedAccessInstanceCommand.ts

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -62,6 +62,7 @@ export interface CreateVerifiedAccessInstanceCommandOutput
6262
* ],
6363
* ClientToken: "STRING_VALUE",
6464
* DryRun: true || false,
65+
* FIPSEnabled: true || false,
6566
* };
6667
* const command = new CreateVerifiedAccessInstanceCommand(input);
6768
* const response = await client.send(command);
@@ -86,6 +87,7 @@ export interface CreateVerifiedAccessInstanceCommandOutput
8687
* // Value: "STRING_VALUE",
8788
* // },
8889
* // ],
90+
* // FipsEnabled: true || false,
8991
* // },
9092
* // };
9193
*

clients/client-ec2/src/commands/DeleteVerifiedAccessInstanceCommand.ts

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -74,6 +74,7 @@ export interface DeleteVerifiedAccessInstanceCommandOutput
7474
* // Value: "STRING_VALUE",
7575
* // },
7676
* // ],
77+
* // FipsEnabled: true || false,
7778
* // },
7879
* // };
7980
*

clients/client-ec2/src/commands/DescribeVerifiedAccessInstancesCommand.ts

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -89,6 +89,7 @@ export interface DescribeVerifiedAccessInstancesCommandOutput
8989
* // Value: "STRING_VALUE",
9090
* // },
9191
* // ],
92+
* // FipsEnabled: true || false,
9293
* // },
9394
* // ],
9495
* // NextToken: "STRING_VALUE",

clients/client-ec2/src/commands/DetachVerifiedAccessTrustProviderCommand.ts

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -110,6 +110,7 @@ export interface DetachVerifiedAccessTrustProviderCommandOutput
110110
* // Value: "STRING_VALUE",
111111
* // },
112112
* // ],
113+
* // FipsEnabled: true || false,
113114
* // },
114115
* // };
115116
*

clients/client-ec2/src/commands/ModifyVerifiedAccessInstanceCommand.ts

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -75,6 +75,7 @@ export interface ModifyVerifiedAccessInstanceCommandOutput
7575
* // Value: "STRING_VALUE",
7676
* // },
7777
* // ],
78+
* // FipsEnabled: true || false,
7879
* // },
7980
* // };
8081
*

clients/client-ec2/src/commands/RevokeSecurityGroupIngressCommand.ts

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -45,8 +45,12 @@ export interface RevokeSecurityGroupIngressCommandOutput extends RevokeSecurityG
4545
* destination port or range of ports. For the ICMP protocol, you must also specify the ICMP type
4646
* and code. If the security group rule has a description, you do not need to specify the description
4747
* to revoke the rule.</p>
48-
* <p>For a default VPC, if the values you specify do not match the existing rule's values, no error is
49-
* returned, and the output describes the security group rules that were not revoked.</p>
48+
* <p>For a default VPC, if the values you specify do not match the existing rule's values,
49+
* no error is returned, and the output describes the security group rules that were not
50+
* revoked.</p>
51+
* <p>For a non-default VPC, if the values you specify do not match the existing rule's
52+
* values, an <code>InvalidPermission.NotFound</code> client error is returned, and no
53+
* rules are revoked.</p>
5054
* <p>Amazon Web Services recommends that you describe the security group to verify that the rules were removed.</p>
5155
* <p>Rule changes are propagated to instances within the security group as quickly as possible.
5256
* However, a small delay might occur.</p>

clients/client-ec2/src/models/models_0.ts

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5707,6 +5707,14 @@ export interface VerifiedAccessInstance {
57075707
* <p>The tags.</p>
57085708
*/
57095709
Tags?: Tag[];
5710+
5711+
/**
5712+
* @public
5713+
* <p>
5714+
* Describes if support for Federal Information Processing Standards (FIPS) is enabled on the instance.
5715+
* </p>
5716+
*/
5717+
FipsEnabled?: boolean;
57105718
}
57115719

57125720
/**

clients/client-ec2/src/models/models_2.ts

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4528,6 +4528,14 @@ export interface CreateVerifiedAccessInstanceRequest {
45284528
* Otherwise, it is <code>UnauthorizedOperation</code>.</p>
45294529
*/
45304530
DryRun?: boolean;
4531+
4532+
/**
4533+
* @public
4534+
* <p>
4535+
* Choose to enable or disable support for Federal Information Processing Standards (FIPS) on the instance.
4536+
* </p>
4537+
*/
4538+
FIPSEnabled?: boolean;
45314539
}
45324540

45334541
/**

clients/client-ec2/src/protocols/Aws_ec2.ts

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -43166,6 +43166,9 @@ const se_CreateVerifiedAccessInstanceRequest = (
4316643166
if (input.DryRun != null) {
4316743167
entries["DryRun"] = input.DryRun;
4316843168
}
43169+
if (input.FIPSEnabled != null) {
43170+
entries["FIPSEnabled"] = input.FIPSEnabled;
43171+
}
4316943172
return entries;
4317043173
};
4317143174

@@ -92607,6 +92610,9 @@ const de_VerifiedAccessInstance = (output: any, context: __SerdeContext): Verifi
9260792610
} else if (output["tagSet"] !== undefined && output["tagSet"]["item"] !== undefined) {
9260892611
contents.Tags = de_TagList(__getArrayIfSingleItem(output["tagSet"]["item"]), context);
9260992612
}
92613+
if (output["fipsEnabled"] !== undefined) {
92614+
contents.FipsEnabled = __parseBoolean(output["fipsEnabled"]);
92615+
}
9261092616
return contents;
9261192617
};
9261292618

codegen/sdk-codegen/aws-models/ec2.json

Lines changed: 20 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14227,7 +14227,7 @@
1422714227
"type": "structure",
1422814228
"members": {
1422914229
"AvailabilityZone": {
14230-
"target": "com.amazonaws.ec2#String",
14230+
"target": "com.amazonaws.ec2#AvailabilityZoneName",
1423114231
"traits": {
1423214232
"smithy.api#clientOptional": {},
1423314233
"smithy.api#documentation": "<p>The Availability Zone in which to create the default subnet.</p>",
@@ -20176,6 +20176,14 @@
2017620176
"smithy.api#default": false,
2017720177
"smithy.api#documentation": "<p>Checks whether you have the required permissions for the action, without actually making the request, \n and provides an error response. If you have the required permissions, the error response is <code>DryRunOperation</code>. \n Otherwise, it is <code>UnauthorizedOperation</code>.</p>"
2017820178
}
20179+
},
20180+
"FIPSEnabled": {
20181+
"target": "com.amazonaws.ec2#Boolean",
20182+
"traits": {
20183+
"smithy.api#clientOptional": {},
20184+
"smithy.api#default": false,
20185+
"smithy.api#documentation": "<p>\n\t\t Choose to enable or disable support for Federal Information Processing Standards (FIPS) on the instance.\n\t </p>"
20186+
}
2017920187
}
2018020188
},
2018120189
"traits": {
@@ -88861,7 +88869,7 @@
8886188869
"target": "com.amazonaws.ec2#RevokeSecurityGroupIngressResult"
8886288870
},
8886388871
"traits": {
88864-
"smithy.api#documentation": "<p>Removes the specified inbound (ingress) rules from a security group.</p>\n <p>You can specify rules using either rule IDs or security group rule properties. If you use\n rule properties, the values that you specify (for example, ports) must match the existing rule's \n values exactly. Each rule has a protocol, from and to ports, and source (CIDR range, \n security group, or prefix list). For the TCP and UDP protocols, you must also specify the \n destination port or range of ports. For the ICMP protocol, you must also specify the ICMP type \n and code. If the security group rule has a description, you do not need to specify the description \n to revoke the rule.</p>\n <p>For a default VPC, if the values you specify do not match the existing rule's values, no error is\n returned, and the output describes the security group rules that were not revoked.</p>\n <p>Amazon Web Services recommends that you describe the security group to verify that the rules were removed.</p>\n <p>Rule changes are propagated to instances within the security group as quickly as possible. \n However, a small delay might occur.</p>"
88872+
"smithy.api#documentation": "<p>Removes the specified inbound (ingress) rules from a security group.</p>\n <p>You can specify rules using either rule IDs or security group rule properties. If you use\n rule properties, the values that you specify (for example, ports) must match the existing rule's \n values exactly. Each rule has a protocol, from and to ports, and source (CIDR range, \n security group, or prefix list). For the TCP and UDP protocols, you must also specify the \n destination port or range of ports. For the ICMP protocol, you must also specify the ICMP type \n and code. If the security group rule has a description, you do not need to specify the description \n to revoke the rule.</p>\n <p>For a default VPC, if the values you specify do not match the existing rule's values,\n no error is returned, and the output describes the security group rules that were not\n revoked.</p>\n <p>For a non-default VPC, if the values you specify do not match the existing rule's\n values, an <code>InvalidPermission.NotFound</code> client error is returned, and no\n rules are revoked.</p>\n <p>Amazon Web Services recommends that you describe the security group to verify that the rules were removed.</p>\n <p>Rule changes are propagated to instances within the security group as quickly as possible. \n However, a small delay might occur.</p>"
8886588873
}
8886688874
},
8886788875
"com.amazonaws.ec2#RevokeSecurityGroupIngressRequest": {
@@ -101896,6 +101904,16 @@
101896101904
"smithy.api#documentation": "<p>The tags.</p>",
101897101905
"smithy.api#xmlName": "tagSet"
101898101906
}
101907+
},
101908+
"FipsEnabled": {
101909+
"target": "com.amazonaws.ec2#Boolean",
101910+
"traits": {
101911+
"aws.protocols#ec2QueryName": "FipsEnabled",
101912+
"smithy.api#clientOptional": {},
101913+
"smithy.api#default": false,
101914+
"smithy.api#documentation": "<p>\n\t\t Describes if support for Federal Information Processing Standards (FIPS) is enabled on the instance.\n\t </p>",
101915+
"smithy.api#xmlName": "fipsEnabled"
101916+
}
101899101917
}
101900101918
},
101901101919
"traits": {

0 commit comments

Comments
 (0)