lib/aws-sdk-ec2/resource.rb in aws-sdk-ec2-1.312.0 vs lib/aws-sdk-ec2/resource.rb in aws-sdk-ec2-1.313.0

- old
+ new

@@ -1675,10 +1675,12 @@ # ramdisk_id: "RamdiskId", # root_device_name: "String", # sriov_net_support: "String", # virtualization_type: "String", # boot_mode: "legacy-bios", # accepts legacy-bios, uefi + # tpm_support: "v2.0", # accepts v2.0 + # uefi_data: "StringType", # }) # @param [Hash] options ({}) # @option options [String] :image_location # The full path to your AMI manifest in Amazon S3 storage. The specified # bucket must have the `aws-exec-read` canned access control list (ACL) @@ -1756,9 +1758,29 @@ # the *Amazon Elastic Compute Cloud User Guide*. # # # # [1]: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ami-boot.html + # @option options [String] :tpm_support + # Set to `v2.0` to enable Trusted Platform Module (TPM) support. For + # more information, see [NitroTPM][1] in the *Amazon Elastic Compute + # Cloud User Guide*. + # + # + # + # [1]: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/nitrotpm.html + # @option options [String] :uefi_data + # Base64 representation of the non-volatile UEFI variable store. To + # retrieve the UEFI data, use the [GetInstanceUefiData][1] command. You + # can inspect and modify the UEFI data by using the [python-uefivars + # tool][2] on GitHub. For more information, see [UEFI Secure Boot][3] in + # the *Amazon Elastic Compute Cloud User Guide*. + # + # + # + # [1]: https://docs.aws.amazon.com/AWSEC2/latest/APIReference/API_GetInstanceUefiData + # [2]: https://github.com/awslabs/python-uefivars + # [3]: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/uefi-secure-boot.html # @return [Image] def register_image(options = {}) resp = @client.register_image(options) Image.new( id: resp.data.image_id,