Hi there! Are you looking for the official Deno documentation? Try docs.deno.com for all your Deno learning needs.

ImportSnapshotRequest

import type { ImportSnapshotRequest } from "https://aws-api.deno.dev/v0.3/services/ec2.ts?docs=full";
interface ImportSnapshotRequest {
ClientData?: ClientData | null;
ClientToken?: string | null;
Description?: string | null;
DiskContainer?: SnapshotDiskContainer | null;
DryRun?: boolean | null;
Encrypted?: boolean | null;
KmsKeyId?: string | null;
RoleName?: string | null;
TagSpecifications?: TagSpecification[] | null;
}

§Properties

§
ClientData?: ClientData | null
[src]

The client-specific data.

§
ClientToken?: string | null
[src]

Token to enable idempotency for VM import requests.

§
Description?: string | null
[src]

The description string for the import snapshot task.

§
DiskContainer?: SnapshotDiskContainer | null
[src]

Information about the disk container.

§
DryRun?: boolean | null
[src]

Checks whether you have the required permissions for the action, without actually making the request, and provides an error response. If you have the required permissions, the error response is DryRunOperation. Otherwise, it is UnauthorizedOperation.

§
Encrypted?: boolean | null
[src]

Specifies whether the destination snapshot of the imported image should be encrypted. The default KMS key for EBS is used unless you specify a non-default KMS key using KmsKeyId. For more information, see Amazon EBS Encryption in the Amazon Elastic Compute Cloud User Guide.

§
KmsKeyId?: string | null
[src]

An identifier for the symmetric KMS key to use when creating the encrypted snapshot. This parameter is only required if you want to use a non-default KMS key; if this parameter is not specified, the default KMS key for EBS is used. If a KmsKeyId is specified, the Encrypted flag must also be set.

The KMS key identifier may be provided in any of the following formats:

  • Key ID
  • Key alias. The alias ARN contains the arn:aws:kms namespace, followed by the Region of the key, the Amazon Web Services account ID of the key owner, the alias namespace, and then the key alias. For example, arn:aws:kms:us-east-1:012345678910:alias/ExampleAlias.
  • ARN using key ID. The ID ARN contains the arn:aws:kms namespace, followed by the Region of the key, the Amazon Web Services account ID of the key owner, the key namespace, and then the key ID. For example, arn:aws:kms:us-east-1:012345678910:key/abcd1234-a123-456a-a12b-a123b4cd56ef.
  • ARN using key alias. The alias ARN contains the arn:aws:kms namespace, followed by the Region of the key, the Amazon Web Services account ID of the key owner, the alias namespace, and then the key alias. For example, arn:aws:kms:us-east-1:012345678910:alias/ExampleAlias.

Amazon Web Services parses KmsKeyId asynchronously, meaning that the action you call may appear to complete even though you provided an invalid identifier. This action will eventually report failure.

The specified KMS key must exist in the Region that the snapshot is being copied to.

Amazon EBS does not support asymmetric KMS keys.

§
RoleName?: string | null
[src]

The name of the role to use when not using the default role, 'vmimport'.

§
TagSpecifications?: TagSpecification[] | null
[src]

The tags to apply to the import snapshot task during creation.