lib/aws-sdk-ec2/resource.rb in aws-sdk-ec2-1.339.0 vs lib/aws-sdk-ec2/resource.rb in aws-sdk-ec2-1.340.0
- old
+ new
@@ -1735,10 +1735,11 @@
# sriov_net_support: "String",
# virtualization_type: "String",
# boot_mode: "legacy-bios", # accepts legacy-bios, uefi
# tpm_support: "v2.0", # accepts v2.0
# uefi_data: "StringType",
+ # imds_support: "v2.0", # accepts v2.0
# })
# @param [Hash] options ({})
# @option options [String] :image_location
# The full path to your AMI manifest in Amazon S3 storage. The specified
# bucket must have the `aws-exec-read` canned access control list (ACL)
@@ -1836,9 +1837,26 @@
#
#
# [1]: https://docs.aws.amazon.com/AWSEC2/latest/APIReference/API_GetInstanceUefiData
# [2]: https://github.com/awslabs/python-uefivars
# [3]: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/uefi-secure-boot.html
+ # @option options [String] :imds_support
+ # Set to `v2.0` to indicate that IMDSv2 is specified in the AMI.
+ # Instances launched from this AMI will have `HttpTokens` automatically
+ # set to `required` so that, by default, the instance requires that
+ # IMDSv2 is used when requesting instance metadata. In addition,
+ # `HttpPutResponseHopLimit` is set to `2`. For more information, see
+ # [Configure the AMI][1] in the *Amazon Elastic Compute Cloud User
+ # Guide*.
+ #
+ # <note markdown="1"> If you set the value to `v2.0`, make sure that your AMI software can
+ # support IMDSv2.
+ #
+ # </note>
+ #
+ #
+ #
+ # [1]: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/configuring-IMDS-new-instances.html#configure-IMDS-new-instances-ami-configuration
# @return [Image]
def register_image(options = {})
resp = @client.register_image(options)
Image.new(
id: resp.data.image_id,