aws-sdk-acm 1.1.0 → 1.2.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/lib/aws-sdk-acm.rb +1 -1
- data/lib/aws-sdk-acm/client.rb +115 -80
- data/lib/aws-sdk-acm/client_api.rb +46 -0
- data/lib/aws-sdk-acm/types.rb +207 -46
- metadata +2 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA1:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: cc5f02c5bea0bcd493337e573f709b674e6bcbeb
|
4
|
+
data.tar.gz: 2fc1b0a307e8513b13535a76f37ee3b888830e1f
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: efbbc1453f48ed54825d603a7ac571c50b481e8b9d7776b755dfc1562da7971e6358a51fbb053c27935ec3dc560692f7d4bcfb7ccb0e9518aa11871c66d821e5
|
7
|
+
data.tar.gz: f018ef8f70e878692c0a778db21f2eeb16565de82ea93fc9a18d76136ffefc22dff02f7c6cbf4cd3334ae96eddf425ac0703f75f1a791fb095cc7339766a4e5c
|
data/lib/aws-sdk-acm.rb
CHANGED
data/lib/aws-sdk-acm/client.rb
CHANGED
@@ -218,11 +218,11 @@ module Aws::ACM
|
|
218
218
|
req.send_request(options)
|
219
219
|
end
|
220
220
|
|
221
|
-
# Deletes
|
222
|
-
#
|
223
|
-
#
|
224
|
-
#
|
225
|
-
#
|
221
|
+
# Deletes a certificate and its associated private key. If this action
|
222
|
+
# succeeds, the certificate no longer appears in the list that can be
|
223
|
+
# displayed by calling the ListCertificates action or be retrieved by
|
224
|
+
# calling the GetCertificate action. The certificate will not be
|
225
|
+
# available for use by AWS services integrated with ACM.
|
226
226
|
#
|
227
227
|
# <note markdown="1"> You cannot delete an ACM Certificate that is being used by another AWS
|
228
228
|
# service. To delete a certificate that is in use, the certificate
|
@@ -297,6 +297,10 @@ module Aws::ACM
|
|
297
297
|
# resp.certificate.domain_validation_options[0].validation_emails[0] #=> String
|
298
298
|
# resp.certificate.domain_validation_options[0].validation_domain #=> String
|
299
299
|
# resp.certificate.domain_validation_options[0].validation_status #=> String, one of "PENDING_VALIDATION", "SUCCESS", "FAILED"
|
300
|
+
# resp.certificate.domain_validation_options[0].resource_record.name #=> String
|
301
|
+
# resp.certificate.domain_validation_options[0].resource_record.type #=> String, one of "CNAME"
|
302
|
+
# resp.certificate.domain_validation_options[0].resource_record.value #=> String
|
303
|
+
# resp.certificate.domain_validation_options[0].validation_method #=> String, one of "EMAIL", "DNS"
|
300
304
|
# resp.certificate.serial #=> String
|
301
305
|
# resp.certificate.subject #=> String
|
302
306
|
# resp.certificate.issuer #=> String
|
@@ -308,11 +312,11 @@ module Aws::ACM
|
|
308
312
|
# resp.certificate.revocation_reason #=> String, one of "UNSPECIFIED", "KEY_COMPROMISE", "CA_COMPROMISE", "AFFILIATION_CHANGED", "SUPERCEDED", "CESSATION_OF_OPERATION", "CERTIFICATE_HOLD", "REMOVE_FROM_CRL", "PRIVILEGE_WITHDRAWN", "A_A_COMPROMISE"
|
309
313
|
# resp.certificate.not_before #=> Time
|
310
314
|
# resp.certificate.not_after #=> Time
|
311
|
-
# resp.certificate.key_algorithm #=> String, one of "RSA_2048", "RSA_1024", "EC_prime256v1"
|
315
|
+
# resp.certificate.key_algorithm #=> String, one of "RSA_2048", "RSA_1024", "RSA_4096", "EC_prime256v1", "EC_secp384r1", "EC_secp521r1"
|
312
316
|
# resp.certificate.signature_algorithm #=> String
|
313
317
|
# resp.certificate.in_use_by #=> Array
|
314
318
|
# resp.certificate.in_use_by[0] #=> String
|
315
|
-
# resp.certificate.failure_reason #=> String, one of "NO_AVAILABLE_CONTACTS", "ADDITIONAL_VERIFICATION_REQUIRED", "DOMAIN_NOT_ALLOWED", "INVALID_PUBLIC_DOMAIN", "OTHER"
|
319
|
+
# resp.certificate.failure_reason #=> String, one of "NO_AVAILABLE_CONTACTS", "ADDITIONAL_VERIFICATION_REQUIRED", "DOMAIN_NOT_ALLOWED", "INVALID_PUBLIC_DOMAIN", "CAA_ERROR", "OTHER"
|
316
320
|
# resp.certificate.type #=> String, one of "IMPORTED", "AMAZON_ISSUED"
|
317
321
|
# resp.certificate.renewal_summary.renewal_status #=> String, one of "PENDING_AUTO_RENEWAL", "PENDING_VALIDATION", "SUCCESS", "FAILED"
|
318
322
|
# resp.certificate.renewal_summary.domain_validation_options #=> Array
|
@@ -321,6 +325,15 @@ module Aws::ACM
|
|
321
325
|
# resp.certificate.renewal_summary.domain_validation_options[0].validation_emails[0] #=> String
|
322
326
|
# resp.certificate.renewal_summary.domain_validation_options[0].validation_domain #=> String
|
323
327
|
# resp.certificate.renewal_summary.domain_validation_options[0].validation_status #=> String, one of "PENDING_VALIDATION", "SUCCESS", "FAILED"
|
328
|
+
# resp.certificate.renewal_summary.domain_validation_options[0].resource_record.name #=> String
|
329
|
+
# resp.certificate.renewal_summary.domain_validation_options[0].resource_record.type #=> String, one of "CNAME"
|
330
|
+
# resp.certificate.renewal_summary.domain_validation_options[0].resource_record.value #=> String
|
331
|
+
# resp.certificate.renewal_summary.domain_validation_options[0].validation_method #=> String, one of "EMAIL", "DNS"
|
332
|
+
# resp.certificate.key_usages #=> Array
|
333
|
+
# resp.certificate.key_usages[0].name #=> String, one of "DIGITAL_SIGNATURE", "NON_REPUDIATION", "KEY_ENCIPHERMENT", "DATA_ENCIPHERMENT", "KEY_AGREEMENT", "CERTIFICATE_SIGNING", "CRL_SIGNING", "ENCIPHER_ONLY", "DECIPHER_ONLY", "ANY", "CUSTOM"
|
334
|
+
# resp.certificate.extended_key_usages #=> Array
|
335
|
+
# resp.certificate.extended_key_usages[0].name #=> String, one of "TLS_WEB_SERVER_AUTHENTICATION", "TLS_WEB_CLIENT_AUTHENTICATION", "CODE_SIGNING", "EMAIL_PROTECTION", "TIME_STAMPING", "OCSP_SIGNING", "IPSEC_END_SYSTEM", "IPSEC_TUNNEL", "IPSEC_USER", "ANY", "NONE", "CUSTOM"
|
336
|
+
# resp.certificate.extended_key_usages[0].oid #=> String
|
324
337
|
#
|
325
338
|
# @see http://docs.aws.amazon.com/goto/WebAPI/acm-2015-12-08/DescribeCertificate AWS API Documentation
|
326
339
|
#
|
@@ -331,13 +344,12 @@ module Aws::ACM
|
|
331
344
|
req.send_request(options)
|
332
345
|
end
|
333
346
|
|
334
|
-
# Retrieves
|
335
|
-
#
|
336
|
-
#
|
337
|
-
#
|
338
|
-
#
|
339
|
-
#
|
340
|
-
# use OpenSSL.
|
347
|
+
# Retrieves a certificate specified by an ARN and its certificate chain
|
348
|
+
# . The chain is an ordered list of certificates that contains the end
|
349
|
+
# entity ertificate, intermediate certificates of subordinate CAs, and
|
350
|
+
# the root certificate in that order. The certificate and certificate
|
351
|
+
# chain are base64 encoded. If you want to decode the certificate to see
|
352
|
+
# the individual fields, you can use OpenSSL.
|
341
353
|
#
|
342
354
|
# @option params [required, String] :certificate_arn
|
343
355
|
# String that contains a certificate ARN in the following format:
|
@@ -376,8 +388,9 @@ module Aws::ACM
|
|
376
388
|
req.send_request(options)
|
377
389
|
end
|
378
390
|
|
379
|
-
# Imports
|
380
|
-
#
|
391
|
+
# Imports a certificate into AWS Certificate Manager (ACM) to use with
|
392
|
+
# services that are integrated with ACM. For more information, see
|
393
|
+
# [Integrated Services][1].
|
381
394
|
#
|
382
395
|
# <note markdown="1"> ACM does not provide [managed renewal][2] for certificates that you
|
383
396
|
# import.
|
@@ -386,31 +399,48 @@ module Aws::ACM
|
|
386
399
|
#
|
387
400
|
# For more information about importing certificates into ACM, including
|
388
401
|
# the differences between certificates that you import and those that
|
389
|
-
# ACM provides, see [
|
402
|
+
# ACM provides, see [Importing Certificates][3] in the *AWS Certificate
|
390
403
|
# Manager User Guide*.
|
391
404
|
#
|
392
|
-
#
|
393
|
-
#
|
394
|
-
#
|
395
|
-
#
|
405
|
+
# In general, you can import almost any valid certificate. However,
|
406
|
+
# services integrated with ACM allow only certificate types they support
|
407
|
+
# to be associated with their resources. The following guidelines are
|
408
|
+
# also important:
|
396
409
|
#
|
397
|
-
#
|
398
|
-
#
|
399
|
-
# format, see [Importing Certificates Troubleshooting][4] in the *AWS
|
400
|
-
# Certificate Manager User Guide*.
|
410
|
+
# * You must enter the private key that matches the certificate you are
|
411
|
+
# importing.
|
401
412
|
#
|
402
|
-
#
|
403
|
-
#
|
404
|
-
# certificate.
|
413
|
+
# * The private key must be unencrypted. You cannot import a private key
|
414
|
+
# that is protected by a password or a passphrase.
|
405
415
|
#
|
406
|
-
#
|
407
|
-
#
|
408
|
-
# file names preceded by `file://`. For example, you can specify a
|
409
|
-
# certificate saved in the `C:\temp` folder as
|
410
|
-
# `C:\temp\certificate_to_import.pem`. If you are making an HTTP or
|
411
|
-
# HTTPS Query request, include these parameters as BLOBs.
|
416
|
+
# * If the certificate you are importing is not self-signed, you must
|
417
|
+
# enter its certificate chain.
|
412
418
|
#
|
413
|
-
#
|
419
|
+
# * If a certificate chain is included, the issuer must be the subject
|
420
|
+
# of one of the certificates in the chain.
|
421
|
+
#
|
422
|
+
# * The certificate, private key, and certificate chain must be
|
423
|
+
# PEM-encoded.
|
424
|
+
#
|
425
|
+
# * The current time must be between the `Not Before` and `Not After`
|
426
|
+
# certificate fields.
|
427
|
+
#
|
428
|
+
# * The `Issuer` field must not be empty.
|
429
|
+
#
|
430
|
+
# * The OCSP authority URL must not exceed 1000 characters.
|
431
|
+
#
|
432
|
+
# * To import a new certificate, omit the `CertificateArn` field.
|
433
|
+
# Include this field only when you want to replace a previously
|
434
|
+
# imported certificate.
|
435
|
+
#
|
436
|
+
# * When you import a certificate by using the CLI or one of the SDKs,
|
437
|
+
# you must specify the certificate, certificate chain, and private key
|
438
|
+
# parameters as file names preceded by `file://`. For example, you can
|
439
|
+
# specify a certificate saved in the `C:\temp` folder as
|
440
|
+
# `C:\temp\certificate_to_import.pem`. If you are making an HTTP or
|
441
|
+
# HTTPS Query request, include these parameters as BLOBs.
|
442
|
+
#
|
443
|
+
# This operation returns the [Amazon Resource Name (ARN)][4] of the
|
414
444
|
# imported certificate.
|
415
445
|
#
|
416
446
|
#
|
@@ -418,8 +448,7 @@ module Aws::ACM
|
|
418
448
|
# [1]: http://docs.aws.amazon.com/acm/latest/userguide/acm-services.html
|
419
449
|
# [2]: http://docs.aws.amazon.com/acm/latest/userguide/acm-renewal.html
|
420
450
|
# [3]: http://docs.aws.amazon.com/acm/latest/userguide/import-certificate.html
|
421
|
-
# [4]: http://docs.aws.amazon.com/
|
422
|
-
# [5]: http://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html
|
451
|
+
# [4]: http://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html
|
423
452
|
#
|
424
453
|
# @option params [String] :certificate_arn
|
425
454
|
# The [Amazon Resource Name (ARN)][1] of an imported certificate to
|
@@ -430,27 +459,13 @@ module Aws::ACM
|
|
430
459
|
# [1]: http://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html
|
431
460
|
#
|
432
461
|
# @option params [required, String, IO] :certificate
|
433
|
-
# The certificate to import.
|
434
|
-
#
|
435
|
-
# * Must be PEM-encoded.
|
436
|
-
#
|
437
|
-
# * Must contain a 1024-bit or 2048-bit RSA public key.
|
438
|
-
#
|
439
|
-
# * Must be valid at the time of import. You cannot import a certificate
|
440
|
-
# before its validity period begins (the certificate's `NotBefore`
|
441
|
-
# date) or after it expires (the certificate's `NotAfter` date).
|
462
|
+
# The certificate to import.
|
442
463
|
#
|
443
464
|
# @option params [required, String, IO] :private_key
|
444
|
-
# The private key that matches the public key in the certificate.
|
445
|
-
# must meet the following requirements:
|
446
|
-
#
|
447
|
-
# * Must be PEM-encoded.
|
448
|
-
#
|
449
|
-
# * Must be unencrypted. You cannot import a private key that is
|
450
|
-
# protected by a password or passphrase.
|
465
|
+
# The private key that matches the public key in the certificate.
|
451
466
|
#
|
452
467
|
# @option params [String, IO] :certificate_chain
|
453
|
-
# The certificate chain.
|
468
|
+
# The PEM encoded certificate chain.
|
454
469
|
#
|
455
470
|
# @return [Types::ImportCertificateResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
456
471
|
#
|
@@ -478,13 +493,22 @@ module Aws::ACM
|
|
478
493
|
req.send_request(options)
|
479
494
|
end
|
480
495
|
|
481
|
-
# Retrieves a list of
|
482
|
-
#
|
483
|
-
#
|
496
|
+
# Retrieves a list of certificate ARNs and domain names. You can request
|
497
|
+
# that only certificates that match a specific status be listed. You can
|
498
|
+
# also filter by specific attributes of the certificate.
|
484
499
|
#
|
485
500
|
# @option params [Array<String>] :certificate_statuses
|
486
|
-
#
|
487
|
-
#
|
501
|
+
# Filter the certificate list by status value.
|
502
|
+
#
|
503
|
+
# @option params [Types::Filters] :includes
|
504
|
+
# Filter the certificate list by one or more of the following values.
|
505
|
+
# For more information, see the Filters structure.
|
506
|
+
#
|
507
|
+
# * extendedKeyUsage
|
508
|
+
#
|
509
|
+
# * keyUsage
|
510
|
+
#
|
511
|
+
# * keyTypes
|
488
512
|
#
|
489
513
|
# @option params [String] :next_token
|
490
514
|
# Use this parameter only when paginating results and only in a
|
@@ -508,6 +532,11 @@ module Aws::ACM
|
|
508
532
|
#
|
509
533
|
# resp = client.list_certificates({
|
510
534
|
# certificate_statuses: ["PENDING_VALIDATION"], # accepts PENDING_VALIDATION, ISSUED, INACTIVE, EXPIRED, VALIDATION_TIMED_OUT, REVOKED, FAILED
|
535
|
+
# includes: {
|
536
|
+
# extended_key_usage: ["TLS_WEB_SERVER_AUTHENTICATION"], # accepts TLS_WEB_SERVER_AUTHENTICATION, TLS_WEB_CLIENT_AUTHENTICATION, CODE_SIGNING, EMAIL_PROTECTION, TIME_STAMPING, OCSP_SIGNING, IPSEC_END_SYSTEM, IPSEC_TUNNEL, IPSEC_USER, ANY, NONE, CUSTOM
|
537
|
+
# key_usage: ["DIGITAL_SIGNATURE"], # accepts DIGITAL_SIGNATURE, NON_REPUDIATION, KEY_ENCIPHERMENT, DATA_ENCIPHERMENT, KEY_AGREEMENT, CERTIFICATE_SIGNING, CRL_SIGNING, ENCIPHER_ONLY, DECIPHER_ONLY, ANY, CUSTOM
|
538
|
+
# key_types: ["RSA_2048"], # accepts RSA_2048, RSA_1024, RSA_4096, EC_prime256v1, EC_secp384r1, EC_secp521r1
|
539
|
+
# },
|
511
540
|
# next_token: "NextToken",
|
512
541
|
# max_items: 1,
|
513
542
|
# })
|
@@ -535,7 +564,7 @@ module Aws::ACM
|
|
535
564
|
#
|
536
565
|
# @option params [required, String] :certificate_arn
|
537
566
|
# String that contains the ARN of the ACM Certificate for which you want
|
538
|
-
# to list the tags. This
|
567
|
+
# to list the tags. This must have the following form:
|
539
568
|
#
|
540
569
|
# `arn:aws:acm:region:123456789012:certificate/12345678-1234-1234-1234-123456789012`
|
541
570
|
#
|
@@ -649,21 +678,12 @@ module Aws::ACM
|
|
649
678
|
# the same domain. For example, *.example.com protects www.example.com,
|
650
679
|
# site.example.com, and images.example.com.
|
651
680
|
#
|
652
|
-
# The
|
653
|
-
#
|
654
|
-
#
|
655
|
-
#
|
656
|
-
# `(63 octets).(63 octets).(63 octets).(61 octets)` is legal because the
|
657
|
-
# total length is 253 octets (63+1+63+1+63+1+61) and no label exceeds 63
|
658
|
-
# octets.
|
659
|
-
#
|
660
|
-
# `(64 octets).(63 octets).(63 octets).(61 octets)` is not legal because
|
661
|
-
# the total length exceeds 253 octets (64+1+63+1+63+1+61) and the first
|
662
|
-
# label exceeds 63 octets.
|
681
|
+
# The first domain name you enter cannot exceed 63 octets, including
|
682
|
+
# periods. Each subsequent Subject Alternative Name (SAN), however, can
|
683
|
+
# be up to 253 octets in length.
|
663
684
|
#
|
664
|
-
#
|
665
|
-
#
|
666
|
-
# octets.
|
685
|
+
# @option params [String] :validation_method
|
686
|
+
# The method you want to use to validate your domain.
|
667
687
|
#
|
668
688
|
# @option params [Array<String>] :subject_alternative_names
|
669
689
|
# Additional FQDNs to be included in the Subject Alternative Name
|
@@ -675,6 +695,22 @@ module Aws::ACM
|
|
675
695
|
# more than 10 names, you must request a limit increase. For more
|
676
696
|
# information, see [Limits][1].
|
677
697
|
#
|
698
|
+
# The maximum length of a SAN DNS name is 253 octets. The name is made
|
699
|
+
# up of multiple labels separated by periods. No label can be longer
|
700
|
+
# than 63 octets. Consider the following examples:
|
701
|
+
#
|
702
|
+
# * `(63 octets).(63 octets).(63 octets).(61 octets)` is legal because
|
703
|
+
# the total length is 253 octets (63+1+63+1+63+1+61) and no label
|
704
|
+
# exceeds 63 octets.
|
705
|
+
#
|
706
|
+
# * `(64 octets).(63 octets).(63 octets).(61 octets)` is not legal
|
707
|
+
# because the total length exceeds 253 octets (64+1+63+1+63+1+61) and
|
708
|
+
# the first label exceeds 63 octets.
|
709
|
+
#
|
710
|
+
# * `(63 octets).(63 octets).(63 octets).(62 octets)` is not legal
|
711
|
+
# because the total length of the DNS name (63+1+63+1+63+1+62) exceeds
|
712
|
+
# 253 octets.
|
713
|
+
#
|
678
714
|
#
|
679
715
|
#
|
680
716
|
# [1]: http://docs.aws.amazon.com/acm/latest/userguide/acm-limits.html
|
@@ -689,8 +725,8 @@ module Aws::ACM
|
|
689
725
|
# requesting multiple certificates.
|
690
726
|
#
|
691
727
|
# @option params [Array<Types::DomainValidationOption>] :domain_validation_options
|
692
|
-
# The domain name that you want ACM to use to send you emails
|
693
|
-
#
|
728
|
+
# The domain name that you want ACM to use to send you emails so taht
|
729
|
+
# your can validate domain ownership.
|
694
730
|
#
|
695
731
|
# @return [Types::RequestCertificateResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
696
732
|
#
|
@@ -700,6 +736,7 @@ module Aws::ACM
|
|
700
736
|
#
|
701
737
|
# resp = client.request_certificate({
|
702
738
|
# domain_name: "DomainNameString", # required
|
739
|
+
# validation_method: "EMAIL", # accepts EMAIL, DNS
|
703
740
|
# subject_alternative_names: ["DomainNameString"],
|
704
741
|
# idempotency_token: "IdempotencyToken",
|
705
742
|
# domain_validation_options: [
|
@@ -745,9 +782,7 @@ module Aws::ACM
|
|
745
782
|
# certificate ARN is generated and returned by the RequestCertificate
|
746
783
|
# action as soon as the request is made. By default, using this
|
747
784
|
# parameter causes email to be sent to all top-level domains you
|
748
|
-
# specified in the certificate request.
|
749
|
-
#
|
750
|
-
# The ARN must be of the form:
|
785
|
+
# specified in the certificate request. The ARN must be of the form:
|
751
786
|
#
|
752
787
|
# `arn:aws:acm:us-east-1:123456789012:certificate/12345678-1234-1234-1234-123456789012`
|
753
788
|
#
|
@@ -807,7 +842,7 @@ module Aws::ACM
|
|
807
842
|
params: params,
|
808
843
|
config: config)
|
809
844
|
context[:gem_name] = 'aws-sdk-acm'
|
810
|
-
context[:gem_version] = '1.
|
845
|
+
context[:gem_version] = '1.2.0'
|
811
846
|
Seahorse::Client::Request.new(handlers, context)
|
812
847
|
end
|
813
848
|
|
@@ -33,7 +33,12 @@ module Aws::ACM
|
|
33
33
|
DomainValidationList = Shapes::ListShape.new(name: 'DomainValidationList')
|
34
34
|
DomainValidationOption = Shapes::StructureShape.new(name: 'DomainValidationOption')
|
35
35
|
DomainValidationOptionList = Shapes::ListShape.new(name: 'DomainValidationOptionList')
|
36
|
+
ExtendedKeyUsage = Shapes::StructureShape.new(name: 'ExtendedKeyUsage')
|
37
|
+
ExtendedKeyUsageFilterList = Shapes::ListShape.new(name: 'ExtendedKeyUsageFilterList')
|
38
|
+
ExtendedKeyUsageList = Shapes::ListShape.new(name: 'ExtendedKeyUsageList')
|
39
|
+
ExtendedKeyUsageName = Shapes::StringShape.new(name: 'ExtendedKeyUsageName')
|
36
40
|
FailureReason = Shapes::StringShape.new(name: 'FailureReason')
|
41
|
+
Filters = Shapes::StructureShape.new(name: 'Filters')
|
37
42
|
GetCertificateRequest = Shapes::StructureShape.new(name: 'GetCertificateRequest')
|
38
43
|
GetCertificateResponse = Shapes::StructureShape.new(name: 'GetCertificateResponse')
|
39
44
|
IdempotencyToken = Shapes::StringShape.new(name: 'IdempotencyToken')
|
@@ -45,6 +50,11 @@ module Aws::ACM
|
|
45
50
|
InvalidStateException = Shapes::StructureShape.new(name: 'InvalidStateException')
|
46
51
|
InvalidTagException = Shapes::StructureShape.new(name: 'InvalidTagException')
|
47
52
|
KeyAlgorithm = Shapes::StringShape.new(name: 'KeyAlgorithm')
|
53
|
+
KeyAlgorithmList = Shapes::ListShape.new(name: 'KeyAlgorithmList')
|
54
|
+
KeyUsage = Shapes::StructureShape.new(name: 'KeyUsage')
|
55
|
+
KeyUsageFilterList = Shapes::ListShape.new(name: 'KeyUsageFilterList')
|
56
|
+
KeyUsageList = Shapes::ListShape.new(name: 'KeyUsageList')
|
57
|
+
KeyUsageName = Shapes::StringShape.new(name: 'KeyUsageName')
|
48
58
|
LimitExceededException = Shapes::StructureShape.new(name: 'LimitExceededException')
|
49
59
|
ListCertificatesRequest = Shapes::StructureShape.new(name: 'ListCertificatesRequest')
|
50
60
|
ListCertificatesResponse = Shapes::StructureShape.new(name: 'ListCertificatesResponse')
|
@@ -53,6 +63,7 @@ module Aws::ACM
|
|
53
63
|
MaxItems = Shapes::IntegerShape.new(name: 'MaxItems')
|
54
64
|
NextToken = Shapes::StringShape.new(name: 'NextToken')
|
55
65
|
PrivateKeyBlob = Shapes::BlobShape.new(name: 'PrivateKeyBlob')
|
66
|
+
RecordType = Shapes::StringShape.new(name: 'RecordType')
|
56
67
|
RemoveTagsFromCertificateRequest = Shapes::StructureShape.new(name: 'RemoveTagsFromCertificateRequest')
|
57
68
|
RenewalStatus = Shapes::StringShape.new(name: 'RenewalStatus')
|
58
69
|
RenewalSummary = Shapes::StructureShape.new(name: 'RenewalSummary')
|
@@ -62,6 +73,7 @@ module Aws::ACM
|
|
62
73
|
ResendValidationEmailRequest = Shapes::StructureShape.new(name: 'ResendValidationEmailRequest')
|
63
74
|
ResourceInUseException = Shapes::StructureShape.new(name: 'ResourceInUseException')
|
64
75
|
ResourceNotFoundException = Shapes::StructureShape.new(name: 'ResourceNotFoundException')
|
76
|
+
ResourceRecord = Shapes::StructureShape.new(name: 'ResourceRecord')
|
65
77
|
RevocationReason = Shapes::StringShape.new(name: 'RevocationReason')
|
66
78
|
String = Shapes::StringShape.new(name: 'String')
|
67
79
|
TStamp = Shapes::TimestampShape.new(name: 'TStamp')
|
@@ -71,6 +83,7 @@ module Aws::ACM
|
|
71
83
|
TagValue = Shapes::StringShape.new(name: 'TagValue')
|
72
84
|
TooManyTagsException = Shapes::StructureShape.new(name: 'TooManyTagsException')
|
73
85
|
ValidationEmailList = Shapes::ListShape.new(name: 'ValidationEmailList')
|
86
|
+
ValidationMethod = Shapes::StringShape.new(name: 'ValidationMethod')
|
74
87
|
|
75
88
|
AddTagsToCertificateRequest.add_member(:certificate_arn, Shapes::ShapeRef.new(shape: Arn, required: true, location_name: "CertificateArn"))
|
76
89
|
AddTagsToCertificateRequest.add_member(:tags, Shapes::ShapeRef.new(shape: TagList, required: true, location_name: "Tags"))
|
@@ -97,6 +110,8 @@ module Aws::ACM
|
|
97
110
|
CertificateDetail.add_member(:failure_reason, Shapes::ShapeRef.new(shape: FailureReason, location_name: "FailureReason"))
|
98
111
|
CertificateDetail.add_member(:type, Shapes::ShapeRef.new(shape: CertificateType, location_name: "Type"))
|
99
112
|
CertificateDetail.add_member(:renewal_summary, Shapes::ShapeRef.new(shape: RenewalSummary, location_name: "RenewalSummary"))
|
113
|
+
CertificateDetail.add_member(:key_usages, Shapes::ShapeRef.new(shape: KeyUsageList, location_name: "KeyUsages"))
|
114
|
+
CertificateDetail.add_member(:extended_key_usages, Shapes::ShapeRef.new(shape: ExtendedKeyUsageList, location_name: "ExtendedKeyUsages"))
|
100
115
|
CertificateDetail.struct_class = Types::CertificateDetail
|
101
116
|
|
102
117
|
CertificateStatuses.member = Shapes::ShapeRef.new(shape: CertificateStatus)
|
@@ -122,6 +137,8 @@ module Aws::ACM
|
|
122
137
|
DomainValidation.add_member(:validation_emails, Shapes::ShapeRef.new(shape: ValidationEmailList, location_name: "ValidationEmails"))
|
123
138
|
DomainValidation.add_member(:validation_domain, Shapes::ShapeRef.new(shape: DomainNameString, location_name: "ValidationDomain"))
|
124
139
|
DomainValidation.add_member(:validation_status, Shapes::ShapeRef.new(shape: DomainStatus, location_name: "ValidationStatus"))
|
140
|
+
DomainValidation.add_member(:resource_record, Shapes::ShapeRef.new(shape: ResourceRecord, location_name: "ResourceRecord"))
|
141
|
+
DomainValidation.add_member(:validation_method, Shapes::ShapeRef.new(shape: ValidationMethod, location_name: "ValidationMethod"))
|
125
142
|
DomainValidation.struct_class = Types::DomainValidation
|
126
143
|
|
127
144
|
DomainValidationList.member = Shapes::ShapeRef.new(shape: DomainValidation)
|
@@ -132,6 +149,19 @@ module Aws::ACM
|
|
132
149
|
|
133
150
|
DomainValidationOptionList.member = Shapes::ShapeRef.new(shape: DomainValidationOption)
|
134
151
|
|
152
|
+
ExtendedKeyUsage.add_member(:name, Shapes::ShapeRef.new(shape: ExtendedKeyUsageName, location_name: "Name"))
|
153
|
+
ExtendedKeyUsage.add_member(:oid, Shapes::ShapeRef.new(shape: String, location_name: "OID"))
|
154
|
+
ExtendedKeyUsage.struct_class = Types::ExtendedKeyUsage
|
155
|
+
|
156
|
+
ExtendedKeyUsageFilterList.member = Shapes::ShapeRef.new(shape: ExtendedKeyUsageName)
|
157
|
+
|
158
|
+
ExtendedKeyUsageList.member = Shapes::ShapeRef.new(shape: ExtendedKeyUsage)
|
159
|
+
|
160
|
+
Filters.add_member(:extended_key_usage, Shapes::ShapeRef.new(shape: ExtendedKeyUsageFilterList, location_name: "extendedKeyUsage"))
|
161
|
+
Filters.add_member(:key_usage, Shapes::ShapeRef.new(shape: KeyUsageFilterList, location_name: "keyUsage"))
|
162
|
+
Filters.add_member(:key_types, Shapes::ShapeRef.new(shape: KeyAlgorithmList, location_name: "keyTypes"))
|
163
|
+
Filters.struct_class = Types::Filters
|
164
|
+
|
135
165
|
GetCertificateRequest.add_member(:certificate_arn, Shapes::ShapeRef.new(shape: Arn, required: true, location_name: "CertificateArn"))
|
136
166
|
GetCertificateRequest.struct_class = Types::GetCertificateRequest
|
137
167
|
|
@@ -150,7 +180,17 @@ module Aws::ACM
|
|
150
180
|
|
151
181
|
InUseList.member = Shapes::ShapeRef.new(shape: String)
|
152
182
|
|
183
|
+
KeyAlgorithmList.member = Shapes::ShapeRef.new(shape: KeyAlgorithm)
|
184
|
+
|
185
|
+
KeyUsage.add_member(:name, Shapes::ShapeRef.new(shape: KeyUsageName, location_name: "Name"))
|
186
|
+
KeyUsage.struct_class = Types::KeyUsage
|
187
|
+
|
188
|
+
KeyUsageFilterList.member = Shapes::ShapeRef.new(shape: KeyUsageName)
|
189
|
+
|
190
|
+
KeyUsageList.member = Shapes::ShapeRef.new(shape: KeyUsage)
|
191
|
+
|
153
192
|
ListCertificatesRequest.add_member(:certificate_statuses, Shapes::ShapeRef.new(shape: CertificateStatuses, location_name: "CertificateStatuses"))
|
193
|
+
ListCertificatesRequest.add_member(:includes, Shapes::ShapeRef.new(shape: Filters, location_name: "Includes"))
|
154
194
|
ListCertificatesRequest.add_member(:next_token, Shapes::ShapeRef.new(shape: NextToken, location_name: "NextToken"))
|
155
195
|
ListCertificatesRequest.add_member(:max_items, Shapes::ShapeRef.new(shape: MaxItems, location_name: "MaxItems"))
|
156
196
|
ListCertificatesRequest.struct_class = Types::ListCertificatesRequest
|
@@ -174,6 +214,7 @@ module Aws::ACM
|
|
174
214
|
RenewalSummary.struct_class = Types::RenewalSummary
|
175
215
|
|
176
216
|
RequestCertificateRequest.add_member(:domain_name, Shapes::ShapeRef.new(shape: DomainNameString, required: true, location_name: "DomainName"))
|
217
|
+
RequestCertificateRequest.add_member(:validation_method, Shapes::ShapeRef.new(shape: ValidationMethod, location_name: "ValidationMethod"))
|
177
218
|
RequestCertificateRequest.add_member(:subject_alternative_names, Shapes::ShapeRef.new(shape: DomainList, location_name: "SubjectAlternativeNames"))
|
178
219
|
RequestCertificateRequest.add_member(:idempotency_token, Shapes::ShapeRef.new(shape: IdempotencyToken, location_name: "IdempotencyToken"))
|
179
220
|
RequestCertificateRequest.add_member(:domain_validation_options, Shapes::ShapeRef.new(shape: DomainValidationOptionList, location_name: "DomainValidationOptions"))
|
@@ -187,6 +228,11 @@ module Aws::ACM
|
|
187
228
|
ResendValidationEmailRequest.add_member(:validation_domain, Shapes::ShapeRef.new(shape: DomainNameString, required: true, location_name: "ValidationDomain"))
|
188
229
|
ResendValidationEmailRequest.struct_class = Types::ResendValidationEmailRequest
|
189
230
|
|
231
|
+
ResourceRecord.add_member(:name, Shapes::ShapeRef.new(shape: String, required: true, location_name: "Name"))
|
232
|
+
ResourceRecord.add_member(:type, Shapes::ShapeRef.new(shape: RecordType, required: true, location_name: "Type"))
|
233
|
+
ResourceRecord.add_member(:value, Shapes::ShapeRef.new(shape: String, required: true, location_name: "Value"))
|
234
|
+
ResourceRecord.struct_class = Types::ResourceRecord
|
235
|
+
|
190
236
|
Tag.add_member(:key, Shapes::ShapeRef.new(shape: TagKey, required: true, location_name: "Key"))
|
191
237
|
Tag.add_member(:value, Shapes::ShapeRef.new(shape: TagValue, location_name: "Value"))
|
192
238
|
Tag.struct_class = Types::Tag
|
data/lib/aws-sdk-acm/types.rb
CHANGED
@@ -132,8 +132,7 @@ module Aws::ACM
|
|
132
132
|
# @return [Time]
|
133
133
|
#
|
134
134
|
# @!attribute [rw] key_algorithm
|
135
|
-
# The algorithm that was used to generate the key pair
|
136
|
-
# private key).
|
135
|
+
# The algorithm that was used to generate the public-private key pair.
|
137
136
|
# @return [String]
|
138
137
|
#
|
139
138
|
# @!attribute [rw] signature_algorithm
|
@@ -181,6 +180,19 @@ module Aws::ACM
|
|
181
180
|
# [1]: http://docs.aws.amazon.com/acm/latest/userguide/acm-renewal.html
|
182
181
|
# @return [Types::RenewalSummary]
|
183
182
|
#
|
183
|
+
# @!attribute [rw] key_usages
|
184
|
+
# A list of Key Usage X.509 v3 extension objects. Each object is a
|
185
|
+
# string value that identifies the purpose of the public key contained
|
186
|
+
# in the certificate. Possible extension values include
|
187
|
+
# DIGITAL\_SIGNATURE, KEY\_ENCHIPHERMENT, NON\_REPUDIATION, and more.
|
188
|
+
# @return [Array<Types::KeyUsage>]
|
189
|
+
#
|
190
|
+
# @!attribute [rw] extended_key_usages
|
191
|
+
# Contains a list of Extended Key Usage X.509 v3 extension objects.
|
192
|
+
# Each object specifies a purpose for which the certificate public key
|
193
|
+
# can be used and consists of a name and an object identifier (OID).
|
194
|
+
# @return [Array<Types::ExtendedKeyUsage>]
|
195
|
+
#
|
184
196
|
# @see http://docs.aws.amazon.com/goto/WebAPI/acm-2015-12-08/CertificateDetail AWS API Documentation
|
185
197
|
#
|
186
198
|
class CertificateDetail < Struct.new(
|
@@ -204,7 +216,9 @@ module Aws::ACM
|
|
204
216
|
:in_use_by,
|
205
217
|
:failure_reason,
|
206
218
|
:type,
|
207
|
-
:renewal_summary
|
219
|
+
:renewal_summary,
|
220
|
+
:key_usages,
|
221
|
+
:extended_key_usages)
|
208
222
|
include Aws::Structure
|
209
223
|
end
|
210
224
|
|
@@ -322,7 +336,28 @@ module Aws::ACM
|
|
322
336
|
# @return [String]
|
323
337
|
#
|
324
338
|
# @!attribute [rw] validation_status
|
325
|
-
# The validation status of the domain name.
|
339
|
+
# The validation status of the domain name. This can be one of the
|
340
|
+
# following values:
|
341
|
+
#
|
342
|
+
# * `PENDING_VALIDATION`
|
343
|
+
#
|
344
|
+
# * ``SUCCESS
|
345
|
+
#
|
346
|
+
# * ``FAILED
|
347
|
+
# @return [String]
|
348
|
+
#
|
349
|
+
# @!attribute [rw] resource_record
|
350
|
+
# Contains the CNAME record that you add to your DNS database for
|
351
|
+
# domain validation. For more information, see [Use DNS to Validate
|
352
|
+
# Domain Ownership][1].
|
353
|
+
#
|
354
|
+
#
|
355
|
+
#
|
356
|
+
# [1]: http://docs.aws.amazon.com/acm/latest/userguide/gs-acm-validate-dns.html
|
357
|
+
# @return [Types::ResourceRecord]
|
358
|
+
#
|
359
|
+
# @!attribute [rw] validation_method
|
360
|
+
# Specifies the domain validation method.
|
326
361
|
# @return [String]
|
327
362
|
#
|
328
363
|
# @see http://docs.aws.amazon.com/goto/WebAPI/acm-2015-12-08/DomainValidation AWS API Documentation
|
@@ -331,12 +366,14 @@ module Aws::ACM
|
|
331
366
|
:domain_name,
|
332
367
|
:validation_emails,
|
333
368
|
:validation_domain,
|
334
|
-
:validation_status
|
369
|
+
:validation_status,
|
370
|
+
:resource_record,
|
371
|
+
:validation_method)
|
335
372
|
include Aws::Structure
|
336
373
|
end
|
337
374
|
|
338
375
|
# Contains information about the domain names that you want ACM to use
|
339
|
-
# to send you emails to validate
|
376
|
+
# to send you emails that enable you to validate domain ownership.
|
340
377
|
#
|
341
378
|
# @note When making an API call, you may pass DomainValidationOption
|
342
379
|
# data as a hash:
|
@@ -378,6 +415,80 @@ module Aws::ACM
|
|
378
415
|
include Aws::Structure
|
379
416
|
end
|
380
417
|
|
418
|
+
# The Extended Key Usage X.509 v3 extension defines one or more purposes
|
419
|
+
# for which the public key can be used. This is in addition to or in
|
420
|
+
# place of the basic purposes specified by the Key Usage extension.
|
421
|
+
#
|
422
|
+
# @!attribute [rw] name
|
423
|
+
# The name of an Extended Key Usage value.
|
424
|
+
# @return [String]
|
425
|
+
#
|
426
|
+
# @!attribute [rw] oid
|
427
|
+
# An object identifier (OID) for the extension value. OIDs are strings
|
428
|
+
# of numbers separated by periods. The following OIDs are defined in
|
429
|
+
# RFC 3280 and RFC 5280.
|
430
|
+
#
|
431
|
+
# * `1.3.6.1.5.5.7.3.1 (TLS_WEB_SERVER_AUTHENTICATION)`
|
432
|
+
#
|
433
|
+
# * `1.3.6.1.5.5.7.3.2 (TLS_WEB_CLIENT_AUTHENTICATION)`
|
434
|
+
#
|
435
|
+
# * `1.3.6.1.5.5.7.3.3 (CODE_SIGNING)`
|
436
|
+
#
|
437
|
+
# * `1.3.6.1.5.5.7.3.4 (EMAIL_PROTECTION)`
|
438
|
+
#
|
439
|
+
# * `1.3.6.1.5.5.7.3.8 (TIME_STAMPING)`
|
440
|
+
#
|
441
|
+
# * `1.3.6.1.5.5.7.3.9 (OCSP_SIGNING)`
|
442
|
+
#
|
443
|
+
# * `1.3.6.1.5.5.7.3.5 (IPSEC_END_SYSTEM)`
|
444
|
+
#
|
445
|
+
# * `1.3.6.1.5.5.7.3.6 (IPSEC_TUNNEL)`
|
446
|
+
#
|
447
|
+
# * `1.3.6.1.5.5.7.3.7 (IPSEC_USER)`
|
448
|
+
# @return [String]
|
449
|
+
#
|
450
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/acm-2015-12-08/ExtendedKeyUsage AWS API Documentation
|
451
|
+
#
|
452
|
+
class ExtendedKeyUsage < Struct.new(
|
453
|
+
:name,
|
454
|
+
:oid)
|
455
|
+
include Aws::Structure
|
456
|
+
end
|
457
|
+
|
458
|
+
# This structure can be used in the ListCertificates action to filter
|
459
|
+
# the output of the certificate list.
|
460
|
+
#
|
461
|
+
# @note When making an API call, you may pass Filters
|
462
|
+
# data as a hash:
|
463
|
+
#
|
464
|
+
# {
|
465
|
+
# extended_key_usage: ["TLS_WEB_SERVER_AUTHENTICATION"], # accepts TLS_WEB_SERVER_AUTHENTICATION, TLS_WEB_CLIENT_AUTHENTICATION, CODE_SIGNING, EMAIL_PROTECTION, TIME_STAMPING, OCSP_SIGNING, IPSEC_END_SYSTEM, IPSEC_TUNNEL, IPSEC_USER, ANY, NONE, CUSTOM
|
466
|
+
# key_usage: ["DIGITAL_SIGNATURE"], # accepts DIGITAL_SIGNATURE, NON_REPUDIATION, KEY_ENCIPHERMENT, DATA_ENCIPHERMENT, KEY_AGREEMENT, CERTIFICATE_SIGNING, CRL_SIGNING, ENCIPHER_ONLY, DECIPHER_ONLY, ANY, CUSTOM
|
467
|
+
# key_types: ["RSA_2048"], # accepts RSA_2048, RSA_1024, RSA_4096, EC_prime256v1, EC_secp384r1, EC_secp521r1
|
468
|
+
# }
|
469
|
+
#
|
470
|
+
# @!attribute [rw] extended_key_usage
|
471
|
+
# Specify one or more ExtendedKeyUsage extension values.
|
472
|
+
# @return [Array<String>]
|
473
|
+
#
|
474
|
+
# @!attribute [rw] key_usage
|
475
|
+
# Specify one or more KeyUsage extension values.
|
476
|
+
# @return [Array<String>]
|
477
|
+
#
|
478
|
+
# @!attribute [rw] key_types
|
479
|
+
# Specify one or more algorithms that can be used to generate key
|
480
|
+
# pairs.
|
481
|
+
# @return [Array<String>]
|
482
|
+
#
|
483
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/acm-2015-12-08/Filters AWS API Documentation
|
484
|
+
#
|
485
|
+
class Filters < Struct.new(
|
486
|
+
:extended_key_usage,
|
487
|
+
:key_usage,
|
488
|
+
:key_types)
|
489
|
+
include Aws::Structure
|
490
|
+
end
|
491
|
+
|
381
492
|
# @note When making an API call, you may pass GetCertificateRequest
|
382
493
|
# data as a hash:
|
383
494
|
#
|
@@ -443,30 +554,15 @@ module Aws::ACM
|
|
443
554
|
# @return [String]
|
444
555
|
#
|
445
556
|
# @!attribute [rw] certificate
|
446
|
-
# The certificate to import.
|
447
|
-
#
|
448
|
-
# * Must be PEM-encoded.
|
449
|
-
#
|
450
|
-
# * Must contain a 1024-bit or 2048-bit RSA public key.
|
451
|
-
#
|
452
|
-
# * Must be valid at the time of import. You cannot import a
|
453
|
-
# certificate before its validity period begins (the certificate's
|
454
|
-
# `NotBefore` date) or after it expires (the certificate's
|
455
|
-
# `NotAfter` date).
|
557
|
+
# The certificate to import.
|
456
558
|
# @return [String]
|
457
559
|
#
|
458
560
|
# @!attribute [rw] private_key
|
459
|
-
# The private key that matches the public key in the certificate.
|
460
|
-
# must meet the following requirements:
|
461
|
-
#
|
462
|
-
# * Must be PEM-encoded.
|
463
|
-
#
|
464
|
-
# * Must be unencrypted. You cannot import a private key that is
|
465
|
-
# protected by a password or passphrase.
|
561
|
+
# The private key that matches the public key in the certificate.
|
466
562
|
# @return [String]
|
467
563
|
#
|
468
564
|
# @!attribute [rw] certificate_chain
|
469
|
-
# The certificate chain.
|
565
|
+
# The PEM encoded certificate chain.
|
470
566
|
# @return [String]
|
471
567
|
#
|
472
568
|
# @see http://docs.aws.amazon.com/goto/WebAPI/acm-2015-12-08/ImportCertificateRequest AWS API Documentation
|
@@ -494,20 +590,49 @@ module Aws::ACM
|
|
494
590
|
include Aws::Structure
|
495
591
|
end
|
496
592
|
|
593
|
+
# The Key Usage X.509 v3 extension defines the purpose of the public key
|
594
|
+
# contained in the certificate.
|
595
|
+
#
|
596
|
+
# @!attribute [rw] name
|
597
|
+
# A string value that contains a Key Usage extension name.
|
598
|
+
# @return [String]
|
599
|
+
#
|
600
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/acm-2015-12-08/KeyUsage AWS API Documentation
|
601
|
+
#
|
602
|
+
class KeyUsage < Struct.new(
|
603
|
+
:name)
|
604
|
+
include Aws::Structure
|
605
|
+
end
|
606
|
+
|
497
607
|
# @note When making an API call, you may pass ListCertificatesRequest
|
498
608
|
# data as a hash:
|
499
609
|
#
|
500
610
|
# {
|
501
611
|
# certificate_statuses: ["PENDING_VALIDATION"], # accepts PENDING_VALIDATION, ISSUED, INACTIVE, EXPIRED, VALIDATION_TIMED_OUT, REVOKED, FAILED
|
612
|
+
# includes: {
|
613
|
+
# extended_key_usage: ["TLS_WEB_SERVER_AUTHENTICATION"], # accepts TLS_WEB_SERVER_AUTHENTICATION, TLS_WEB_CLIENT_AUTHENTICATION, CODE_SIGNING, EMAIL_PROTECTION, TIME_STAMPING, OCSP_SIGNING, IPSEC_END_SYSTEM, IPSEC_TUNNEL, IPSEC_USER, ANY, NONE, CUSTOM
|
614
|
+
# key_usage: ["DIGITAL_SIGNATURE"], # accepts DIGITAL_SIGNATURE, NON_REPUDIATION, KEY_ENCIPHERMENT, DATA_ENCIPHERMENT, KEY_AGREEMENT, CERTIFICATE_SIGNING, CRL_SIGNING, ENCIPHER_ONLY, DECIPHER_ONLY, ANY, CUSTOM
|
615
|
+
# key_types: ["RSA_2048"], # accepts RSA_2048, RSA_1024, RSA_4096, EC_prime256v1, EC_secp384r1, EC_secp521r1
|
616
|
+
# },
|
502
617
|
# next_token: "NextToken",
|
503
618
|
# max_items: 1,
|
504
619
|
# }
|
505
620
|
#
|
506
621
|
# @!attribute [rw] certificate_statuses
|
507
|
-
#
|
508
|
-
# Certificates.
|
622
|
+
# Filter the certificate list by status value.
|
509
623
|
# @return [Array<String>]
|
510
624
|
#
|
625
|
+
# @!attribute [rw] includes
|
626
|
+
# Filter the certificate list by one or more of the following values.
|
627
|
+
# For more information, see the Filters structure.
|
628
|
+
#
|
629
|
+
# * extendedKeyUsage
|
630
|
+
#
|
631
|
+
# * keyUsage
|
632
|
+
#
|
633
|
+
# * keyTypes
|
634
|
+
# @return [Types::Filters]
|
635
|
+
#
|
511
636
|
# @!attribute [rw] next_token
|
512
637
|
# Use this parameter only when paginating results and only in a
|
513
638
|
# subsequent request after you receive a response with truncated
|
@@ -527,6 +652,7 @@ module Aws::ACM
|
|
527
652
|
#
|
528
653
|
class ListCertificatesRequest < Struct.new(
|
529
654
|
:certificate_statuses,
|
655
|
+
:includes,
|
530
656
|
:next_token,
|
531
657
|
:max_items)
|
532
658
|
include Aws::Structure
|
@@ -559,7 +685,7 @@ module Aws::ACM
|
|
559
685
|
#
|
560
686
|
# @!attribute [rw] certificate_arn
|
561
687
|
# String that contains the ARN of the ACM Certificate for which you
|
562
|
-
# want to list the tags. This
|
688
|
+
# want to list the tags. This must have the following form:
|
563
689
|
#
|
564
690
|
# `arn:aws:acm:region:123456789012:certificate/12345678-1234-1234-1234-123456789012`
|
565
691
|
#
|
@@ -669,6 +795,7 @@ module Aws::ACM
|
|
669
795
|
#
|
670
796
|
# {
|
671
797
|
# domain_name: "DomainNameString", # required
|
798
|
+
# validation_method: "EMAIL", # accepts EMAIL, DNS
|
672
799
|
# subject_alternative_names: ["DomainNameString"],
|
673
800
|
# idempotency_token: "IdempotencyToken",
|
674
801
|
# domain_validation_options: [
|
@@ -686,21 +813,13 @@ module Aws::ACM
|
|
686
813
|
# sites in the same domain. For example, *.example.com protects
|
687
814
|
# www.example.com, site.example.com, and images.example.com.
|
688
815
|
#
|
689
|
-
# The
|
690
|
-
#
|
691
|
-
#
|
692
|
-
#
|
693
|
-
# `(63 octets).(63 octets).(63 octets).(61 octets)` is legal because
|
694
|
-
# the total length is 253 octets (63+1+63+1+63+1+61) and no label
|
695
|
-
# exceeds 63 octets.
|
696
|
-
#
|
697
|
-
# `(64 octets).(63 octets).(63 octets).(61 octets)` is not legal
|
698
|
-
# because the total length exceeds 253 octets (64+1+63+1+63+1+61) and
|
699
|
-
# the first label exceeds 63 octets.
|
816
|
+
# The first domain name you enter cannot exceed 63 octets, including
|
817
|
+
# periods. Each subsequent Subject Alternative Name (SAN), however,
|
818
|
+
# can be up to 253 octets in length.
|
819
|
+
# @return [String]
|
700
820
|
#
|
701
|
-
#
|
702
|
-
#
|
703
|
-
# 253 octets.
|
821
|
+
# @!attribute [rw] validation_method
|
822
|
+
# The method you want to use to validate your domain.
|
704
823
|
# @return [String]
|
705
824
|
#
|
706
825
|
# @!attribute [rw] subject_alternative_names
|
@@ -713,6 +832,22 @@ module Aws::ACM
|
|
713
832
|
# If you need more than 10 names, you must request a limit increase.
|
714
833
|
# For more information, see [Limits][1].
|
715
834
|
#
|
835
|
+
# The maximum length of a SAN DNS name is 253 octets. The name is made
|
836
|
+
# up of multiple labels separated by periods. No label can be longer
|
837
|
+
# than 63 octets. Consider the following examples:
|
838
|
+
#
|
839
|
+
# * `(63 octets).(63 octets).(63 octets).(61 octets)` is legal because
|
840
|
+
# the total length is 253 octets (63+1+63+1+63+1+61) and no label
|
841
|
+
# exceeds 63 octets.
|
842
|
+
#
|
843
|
+
# * `(64 octets).(63 octets).(63 octets).(61 octets)` is not legal
|
844
|
+
# because the total length exceeds 253 octets (64+1+63+1+63+1+61)
|
845
|
+
# and the first label exceeds 63 octets.
|
846
|
+
#
|
847
|
+
# * `(63 octets).(63 octets).(63 octets).(62 octets)` is not legal
|
848
|
+
# because the total length of the DNS name (63+1+63+1+63+1+62)
|
849
|
+
# exceeds 253 octets.
|
850
|
+
#
|
716
851
|
#
|
717
852
|
#
|
718
853
|
# [1]: http://docs.aws.amazon.com/acm/latest/userguide/acm-limits.html
|
@@ -729,14 +864,15 @@ module Aws::ACM
|
|
729
864
|
# @return [String]
|
730
865
|
#
|
731
866
|
# @!attribute [rw] domain_validation_options
|
732
|
-
# The domain name that you want ACM to use to send you emails
|
733
|
-
#
|
867
|
+
# The domain name that you want ACM to use to send you emails so taht
|
868
|
+
# your can validate domain ownership.
|
734
869
|
# @return [Array<Types::DomainValidationOption>]
|
735
870
|
#
|
736
871
|
# @see http://docs.aws.amazon.com/goto/WebAPI/acm-2015-12-08/RequestCertificateRequest AWS API Documentation
|
737
872
|
#
|
738
873
|
class RequestCertificateRequest < Struct.new(
|
739
874
|
:domain_name,
|
875
|
+
:validation_method,
|
740
876
|
:subject_alternative_names,
|
741
877
|
:idempotency_token,
|
742
878
|
:domain_validation_options)
|
@@ -771,9 +907,7 @@ module Aws::ACM
|
|
771
907
|
# certificate ARN is generated and returned by the RequestCertificate
|
772
908
|
# action as soon as the request is made. By default, using this
|
773
909
|
# parameter causes email to be sent to all top-level domains you
|
774
|
-
# specified in the certificate request.
|
775
|
-
#
|
776
|
-
# The ARN must be of the form:
|
910
|
+
# specified in the certificate request. The ARN must be of the form:
|
777
911
|
#
|
778
912
|
# `arn:aws:acm:us-east-1:123456789012:certificate/12345678-1234-1234-1234-123456789012`
|
779
913
|
# @return [String]
|
@@ -813,6 +947,33 @@ module Aws::ACM
|
|
813
947
|
include Aws::Structure
|
814
948
|
end
|
815
949
|
|
950
|
+
# Contains a DNS record value that you can use to can use to validate
|
951
|
+
# ownership or control of a domain. This is used by the
|
952
|
+
# DescribeCertificate action.
|
953
|
+
#
|
954
|
+
# @!attribute [rw] name
|
955
|
+
# The name of the DNS record to create in your domain. This is
|
956
|
+
# supplied by ACM.
|
957
|
+
# @return [String]
|
958
|
+
#
|
959
|
+
# @!attribute [rw] type
|
960
|
+
# The type of DNS record. Currently this can be `CNAME`.
|
961
|
+
# @return [String]
|
962
|
+
#
|
963
|
+
# @!attribute [rw] value
|
964
|
+
# The value of the CNAME record to add to your DNS database. This is
|
965
|
+
# supplied by ACM.
|
966
|
+
# @return [String]
|
967
|
+
#
|
968
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/acm-2015-12-08/ResourceRecord AWS API Documentation
|
969
|
+
#
|
970
|
+
class ResourceRecord < Struct.new(
|
971
|
+
:name,
|
972
|
+
:type,
|
973
|
+
:value)
|
974
|
+
include Aws::Structure
|
975
|
+
end
|
976
|
+
|
816
977
|
# A key-value pair that identifies or specifies metadata about an ACM
|
817
978
|
# resource.
|
818
979
|
#
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: aws-sdk-acm
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 1.
|
4
|
+
version: 1.2.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Amazon Web Services
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2017-11-
|
11
|
+
date: 2017-11-22 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: aws-sdk-core
|