Skip to content

Commit 5f5431e

Browse files
author
AWS
committed
Amazon Elastic Compute Cloud Update: This release adds GroupOwnerId as a response member to the DescribeSecurityGroupVpcAssociations API and also adds waiters for SecurityGroupVpcAssociations (SecurityGroupVpcAssociationAssociated and SecurityGroupVpcAssociationDisassociated).
1 parent d131d70 commit 5f5431e

File tree

3 files changed

+69
-2
lines changed

3 files changed

+69
-2
lines changed
Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,6 @@
1+
{
2+
"type": "feature",
3+
"category": "Amazon Elastic Compute Cloud",
4+
"contributor": "",
5+
"description": "This release adds GroupOwnerId as a response member to the DescribeSecurityGroupVpcAssociations API and also adds waiters for SecurityGroupVpcAssociations (SecurityGroupVpcAssociationAssociated and SecurityGroupVpcAssociationDisassociated)."
6+
}

services/ec2/src/main/resources/codegen-resources/service-2.json

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -301,7 +301,7 @@
301301
},
302302
"input":{"shape":"AssociateSecurityGroupVpcRequest"},
303303
"output":{"shape":"AssociateSecurityGroupVpcResult"},
304-
"documentation":"<p>Associates a security group with another VPC in the same Region. This enables you to use the same security group with network interfaces and instances in the specified VPC.</p> <note> <ul> <li> <p>The VPC you want to associate the security group with must be in the same Region.</p> </li> <li> <p>You can associate the security group with another VPC if your account owns the VPC or if the VPC was shared with you.</p> </li> <li> <p>You must own the security group and the VPC that it was created in.</p> </li> <li> <p>You cannot use this feature with default security groups.</p> </li> <li> <p>You cannot use this feature with the default VPC.</p> </li> </ul> </note>"
304+
"documentation":"<p>Associates a security group with another VPC in the same Region. This enables you to use the same security group with network interfaces and instances in the specified VPC.</p> <note> <ul> <li> <p>The VPC you want to associate the security group with must be in the same Region.</p> </li> <li> <p>You can associate the security group with another VPC if your account owns the VPC or if the VPC was shared with you.</p> </li> <li> <p>You must own the security group.</p> </li> <li> <p>You cannot use this feature with default security groups.</p> </li> <li> <p>You cannot use this feature with the default VPC.</p> </li> </ul> </note>"
305305
},
306306
"AssociateSubnetCidrBlock":{
307307
"name":"AssociateSubnetCidrBlock",
@@ -26191,7 +26191,7 @@
2619126191
"members":{
2619226192
"Filters":{
2619326193
"shape":"FilterList",
26194-
"documentation":"<p>Security group VPC association filters.</p> <ul> <li> <p> <code>group-id</code>: The security group ID.</p> </li> <li> <p> <code>vpc-id</code>: The ID of the associated VPC.</p> </li> <li> <p> <code>vpc-owner-id</code>: The account ID of the VPC owner.</p> </li> <li> <p> <code>state</code>: The state of the association.</p> </li> <li> <p> <code>tag:&lt;key&gt;</code>: The key/value combination of a tag assigned to the resource. Use the tag key in the filter name and the tag value as the filter value. For example, to find all resources that have a tag with the key <code>Owner</code> and the value <code>TeamA</code>, specify <code>tag:Owner</code> for the filter name and <code>TeamA</code> for the filter value.</p> </li> <li> <p> <code>tag-key</code>: The key of a tag assigned to the resource. Use this filter to find all resources assigned a tag with a specific key, regardless of the tag value.</p> </li> </ul>",
26194+
"documentation":"<p>Security group VPC association filters.</p> <ul> <li> <p> <code>group-id</code>: The security group ID.</p> </li> <li> <p> <code>group-owner-id</code>: The group owner ID.</p> </li> <li> <p> <code>vpc-id</code>: The ID of the associated VPC.</p> </li> <li> <p> <code>vpc-owner-id</code>: The account ID of the VPC owner.</p> </li> <li> <p> <code>state</code>: The state of the association.</p> </li> <li> <p> <code>tag:&lt;key&gt;</code>: The key/value combination of a tag assigned to the resource. Use the tag key in the filter name and the tag value as the filter value. For example, to find all resources that have a tag with the key <code>Owner</code> and the value <code>TeamA</code>, specify <code>tag:Owner</code> for the filter name and <code>TeamA</code> for the filter value.</p> </li> <li> <p> <code>tag-key</code>: The key of a tag assigned to the resource. Use this filter to find all resources assigned a tag with a specific key, regardless of the tag value.</p> </li> </ul>",
2619526195
"locationName":"Filter"
2619626196
},
2619726197
"NextToken":{
@@ -59385,6 +59385,11 @@
5938559385
"shape":"String",
5938659386
"documentation":"<p>The association's state reason.</p>",
5938759387
"locationName":"stateReason"
59388+
},
59389+
"GroupOwnerId":{
59390+
"shape":"String",
59391+
"documentation":"<p>The Amazon Web Services account ID of the owner of the security group.</p>",
59392+
"locationName":"groupOwnerId"
5938859393
}
5938959394
},
5939059395
"documentation":"<p>A security group association with a VPC that you made with <a href=\"https://docs.aws.amazon.com/AWSEC2/latest/APIReference/API_AssociateSecurityGroupVpc.html\">AssociateSecurityGroupVpc</a>.</p>"

services/ec2/src/main/resources/codegen-resources/waiters-2.json

Lines changed: 56 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -458,6 +458,62 @@
458458
}
459459
]
460460
},
461+
"SecurityGroupVpcAssociationAssociated": {
462+
"delay": 10,
463+
"maxAttempts": 7,
464+
"operation": "DescribeSecurityGroupVpcAssociations",
465+
"acceptors": [
466+
{
467+
"expected": "associated",
468+
"matcher": "pathAll",
469+
"state": "success",
470+
"argument": "SecurityGroupVpcAssociations[].State"
471+
},
472+
{
473+
"expected": "associating",
474+
"matcher": "pathAny",
475+
"state": "retry",
476+
"argument": "SecurityGroupVpcAssociations[].State"
477+
},
478+
{
479+
"expected": "association-failed",
480+
"matcher": "pathAny",
481+
"state": "failure",
482+
"argument": "SecurityGroupVpcAssociations[].State"
483+
}
484+
]
485+
},
486+
"SecurityGroupVpcAssociationDisassociated": {
487+
"delay": 10,
488+
"maxAttempts": 7,
489+
"operation": "DescribeSecurityGroupVpcAssociations",
490+
"acceptors": [
491+
{
492+
"expected": "disassociated",
493+
"matcher": "pathAll",
494+
"state": "success",
495+
"argument": "SecurityGroupVpcAssociations[].State"
496+
},
497+
{
498+
"expected": "disassociating",
499+
"matcher": "pathAny",
500+
"state": "retry",
501+
"argument": "SecurityGroupVpcAssociations[].State"
502+
},
503+
{
504+
"expected": "disassociation-failed",
505+
"matcher": "pathAny",
506+
"state": "failure",
507+
"argument": "SecurityGroupVpcAssociations[].State"
508+
},
509+
{
510+
"expected": true,
511+
"matcher": "path",
512+
"state": "success",
513+
"argument": "length(SecurityGroupVpcAssociations[]) == `0`"
514+
}
515+
]
516+
},
461517
"SpotInstanceRequestFulfilled": {
462518
"operation": "DescribeSpotInstanceRequests",
463519
"maxAttempts": 40,

0 commit comments

Comments
 (0)