aws-sdk-acm 1.1.0 → 1.2.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA1:
3
- metadata.gz: 3403fb2e98c0e2ccedeadbb6e1b6328b6d3b6668
4
- data.tar.gz: 39f80502395e1ee07dfe85c91c7397f813f7e837
3
+ metadata.gz: cc5f02c5bea0bcd493337e573f709b674e6bcbeb
4
+ data.tar.gz: 2fc1b0a307e8513b13535a76f37ee3b888830e1f
5
5
  SHA512:
6
- metadata.gz: 2988cb5672c8b2e9c7c1e71c8d897269764b2d99d7d5e630d983d2fcb7c6c5c12c66a20b36c83683b5e2adc76d0146a0697e17e70ed35920bec7b9dea1cfe0bf
7
- data.tar.gz: 2617620a1de7cfc331c2d8816b64e3bb4ba9d3c0b78050b3bc507dcec8728252ec860cf8fa59a56bd4244f782bac9fe3da6977bc8b63f068d89ccb0297e623c5
6
+ metadata.gz: efbbc1453f48ed54825d603a7ac571c50b481e8b9d7776b755dfc1562da7971e6358a51fbb053c27935ec3dc560692f7d4bcfb7ccb0e9518aa11871c66d821e5
7
+ data.tar.gz: f018ef8f70e878692c0a778db21f2eeb16565de82ea93fc9a18d76136ffefc22dff02f7c6cbf4cd3334ae96eddf425ac0703f75f1a791fb095cc7339766a4e5c
@@ -42,6 +42,6 @@ require_relative 'aws-sdk-acm/customizations'
42
42
  # @service
43
43
  module Aws::ACM
44
44
 
45
- GEM_VERSION = '1.1.0'
45
+ GEM_VERSION = '1.2.0'
46
46
 
47
47
  end
@@ -218,11 +218,11 @@ module Aws::ACM
218
218
  req.send_request(options)
219
219
  end
220
220
 
221
- # Deletes an ACM Certificate and its associated private key. If this
222
- # action succeeds, the certificate no longer appears in the list of ACM
223
- # Certificates that can be displayed by calling the ListCertificates
224
- # action or be retrieved by calling the GetCertificate action. The
225
- # certificate will not be available for use by other AWS services.
221
+ # Deletes a certificate and its associated private key. If this action
222
+ # succeeds, the certificate no longer appears in the list that can be
223
+ # displayed by calling the ListCertificates action or be retrieved by
224
+ # calling the GetCertificate action. The certificate will not be
225
+ # available for use by AWS services integrated with ACM.
226
226
  #
227
227
  # <note markdown="1"> You cannot delete an ACM Certificate that is being used by another AWS
228
228
  # service. To delete a certificate that is in use, the certificate
@@ -297,6 +297,10 @@ module Aws::ACM
297
297
  # resp.certificate.domain_validation_options[0].validation_emails[0] #=> String
298
298
  # resp.certificate.domain_validation_options[0].validation_domain #=> String
299
299
  # resp.certificate.domain_validation_options[0].validation_status #=> String, one of "PENDING_VALIDATION", "SUCCESS", "FAILED"
300
+ # resp.certificate.domain_validation_options[0].resource_record.name #=> String
301
+ # resp.certificate.domain_validation_options[0].resource_record.type #=> String, one of "CNAME"
302
+ # resp.certificate.domain_validation_options[0].resource_record.value #=> String
303
+ # resp.certificate.domain_validation_options[0].validation_method #=> String, one of "EMAIL", "DNS"
300
304
  # resp.certificate.serial #=> String
301
305
  # resp.certificate.subject #=> String
302
306
  # resp.certificate.issuer #=> String
@@ -308,11 +312,11 @@ module Aws::ACM
308
312
  # resp.certificate.revocation_reason #=> String, one of "UNSPECIFIED", "KEY_COMPROMISE", "CA_COMPROMISE", "AFFILIATION_CHANGED", "SUPERCEDED", "CESSATION_OF_OPERATION", "CERTIFICATE_HOLD", "REMOVE_FROM_CRL", "PRIVILEGE_WITHDRAWN", "A_A_COMPROMISE"
309
313
  # resp.certificate.not_before #=> Time
310
314
  # resp.certificate.not_after #=> Time
311
- # resp.certificate.key_algorithm #=> String, one of "RSA_2048", "RSA_1024", "EC_prime256v1"
315
+ # resp.certificate.key_algorithm #=> String, one of "RSA_2048", "RSA_1024", "RSA_4096", "EC_prime256v1", "EC_secp384r1", "EC_secp521r1"
312
316
  # resp.certificate.signature_algorithm #=> String
313
317
  # resp.certificate.in_use_by #=> Array
314
318
  # resp.certificate.in_use_by[0] #=> String
315
- # resp.certificate.failure_reason #=> String, one of "NO_AVAILABLE_CONTACTS", "ADDITIONAL_VERIFICATION_REQUIRED", "DOMAIN_NOT_ALLOWED", "INVALID_PUBLIC_DOMAIN", "OTHER"
319
+ # resp.certificate.failure_reason #=> String, one of "NO_AVAILABLE_CONTACTS", "ADDITIONAL_VERIFICATION_REQUIRED", "DOMAIN_NOT_ALLOWED", "INVALID_PUBLIC_DOMAIN", "CAA_ERROR", "OTHER"
316
320
  # resp.certificate.type #=> String, one of "IMPORTED", "AMAZON_ISSUED"
317
321
  # resp.certificate.renewal_summary.renewal_status #=> String, one of "PENDING_AUTO_RENEWAL", "PENDING_VALIDATION", "SUCCESS", "FAILED"
318
322
  # resp.certificate.renewal_summary.domain_validation_options #=> Array
@@ -321,6 +325,15 @@ module Aws::ACM
321
325
  # resp.certificate.renewal_summary.domain_validation_options[0].validation_emails[0] #=> String
322
326
  # resp.certificate.renewal_summary.domain_validation_options[0].validation_domain #=> String
323
327
  # resp.certificate.renewal_summary.domain_validation_options[0].validation_status #=> String, one of "PENDING_VALIDATION", "SUCCESS", "FAILED"
328
+ # resp.certificate.renewal_summary.domain_validation_options[0].resource_record.name #=> String
329
+ # resp.certificate.renewal_summary.domain_validation_options[0].resource_record.type #=> String, one of "CNAME"
330
+ # resp.certificate.renewal_summary.domain_validation_options[0].resource_record.value #=> String
331
+ # resp.certificate.renewal_summary.domain_validation_options[0].validation_method #=> String, one of "EMAIL", "DNS"
332
+ # resp.certificate.key_usages #=> Array
333
+ # resp.certificate.key_usages[0].name #=> String, one of "DIGITAL_SIGNATURE", "NON_REPUDIATION", "KEY_ENCIPHERMENT", "DATA_ENCIPHERMENT", "KEY_AGREEMENT", "CERTIFICATE_SIGNING", "CRL_SIGNING", "ENCIPHER_ONLY", "DECIPHER_ONLY", "ANY", "CUSTOM"
334
+ # resp.certificate.extended_key_usages #=> Array
335
+ # resp.certificate.extended_key_usages[0].name #=> String, one of "TLS_WEB_SERVER_AUTHENTICATION", "TLS_WEB_CLIENT_AUTHENTICATION", "CODE_SIGNING", "EMAIL_PROTECTION", "TIME_STAMPING", "OCSP_SIGNING", "IPSEC_END_SYSTEM", "IPSEC_TUNNEL", "IPSEC_USER", "ANY", "NONE", "CUSTOM"
336
+ # resp.certificate.extended_key_usages[0].oid #=> String
324
337
  #
325
338
  # @see http://docs.aws.amazon.com/goto/WebAPI/acm-2015-12-08/DescribeCertificate AWS API Documentation
326
339
  #
@@ -331,13 +344,12 @@ module Aws::ACM
331
344
  req.send_request(options)
332
345
  end
333
346
 
334
- # Retrieves an ACM Certificate and certificate chain for the certificate
335
- # specified by an ARN. The chain is an ordered list of certificates that
336
- # contains the ACM Certificate, intermediate certificates of subordinate
337
- # CAs, and the root certificate in that order. The certificate and
338
- # certificate chain are base64 encoded. If you want to decode the
339
- # certificate chain to see the individual certificate fields, you can
340
- # use OpenSSL.
347
+ # Retrieves a certificate specified by an ARN and its certificate chain
348
+ # . The chain is an ordered list of certificates that contains the end
349
+ # entity ertificate, intermediate certificates of subordinate CAs, and
350
+ # the root certificate in that order. The certificate and certificate
351
+ # chain are base64 encoded. If you want to decode the certificate to see
352
+ # the individual fields, you can use OpenSSL.
341
353
  #
342
354
  # @option params [required, String] :certificate_arn
343
355
  # String that contains a certificate ARN in the following format:
@@ -376,8 +388,9 @@ module Aws::ACM
376
388
  req.send_request(options)
377
389
  end
378
390
 
379
- # Imports an SSL/TLS certificate into AWS Certificate Manager (ACM) to
380
- # use with [ACM's integrated AWS services][1].
391
+ # Imports a certificate into AWS Certificate Manager (ACM) to use with
392
+ # services that are integrated with ACM. For more information, see
393
+ # [Integrated Services][1].
381
394
  #
382
395
  # <note markdown="1"> ACM does not provide [managed renewal][2] for certificates that you
383
396
  # import.
@@ -386,31 +399,48 @@ module Aws::ACM
386
399
  #
387
400
  # For more information about importing certificates into ACM, including
388
401
  # the differences between certificates that you import and those that
389
- # ACM provides, see [ Importing Certificates][3] in the *AWS Certificate
402
+ # ACM provides, see [Importing Certificates][3] in the *AWS Certificate
390
403
  # Manager User Guide*.
391
404
  #
392
- # To import a certificate, you must provide the certificate and the
393
- # matching private key. When the certificate is not self-signed, you
394
- # must also provide a certificate chain. You can omit the certificate
395
- # chain when importing a self-signed certificate.
405
+ # In general, you can import almost any valid certificate. However,
406
+ # services integrated with ACM allow only certificate types they support
407
+ # to be associated with their resources. The following guidelines are
408
+ # also important:
396
409
  #
397
- # The certificate, private key, and certificate chain must be
398
- # PEM-encoded. For more information about converting these items to PEM
399
- # format, see [Importing Certificates Troubleshooting][4] in the *AWS
400
- # Certificate Manager User Guide*.
410
+ # * You must enter the private key that matches the certificate you are
411
+ # importing.
401
412
  #
402
- # To import a new certificate, omit the `CertificateArn` field. Include
403
- # this field only when you want to replace a previously imported
404
- # certificate.
413
+ # * The private key must be unencrypted. You cannot import a private key
414
+ # that is protected by a password or a passphrase.
405
415
  #
406
- # When you import a certificate by using the CLI or one of the SDKs, you
407
- # must specify the certificate, chain, and private key parameters as
408
- # file names preceded by `file://`. For example, you can specify a
409
- # certificate saved in the `C:\temp` folder as
410
- # `C:\temp\certificate_to_import.pem`. If you are making an HTTP or
411
- # HTTPS Query request, include these parameters as BLOBs.
416
+ # * If the certificate you are importing is not self-signed, you must
417
+ # enter its certificate chain.
412
418
  #
413
- # This operation returns the [Amazon Resource Name (ARN)][5] of the
419
+ # * If a certificate chain is included, the issuer must be the subject
420
+ # of one of the certificates in the chain.
421
+ #
422
+ # * The certificate, private key, and certificate chain must be
423
+ # PEM-encoded.
424
+ #
425
+ # * The current time must be between the `Not Before` and `Not After`
426
+ # certificate fields.
427
+ #
428
+ # * The `Issuer` field must not be empty.
429
+ #
430
+ # * The OCSP authority URL must not exceed 1000 characters.
431
+ #
432
+ # * To import a new certificate, omit the `CertificateArn` field.
433
+ # Include this field only when you want to replace a previously
434
+ # imported certificate.
435
+ #
436
+ # * When you import a certificate by using the CLI or one of the SDKs,
437
+ # you must specify the certificate, certificate chain, and private key
438
+ # parameters as file names preceded by `file://`. For example, you can
439
+ # specify a certificate saved in the `C:\temp` folder as
440
+ # `C:\temp\certificate_to_import.pem`. If you are making an HTTP or
441
+ # HTTPS Query request, include these parameters as BLOBs.
442
+ #
443
+ # This operation returns the [Amazon Resource Name (ARN)][4] of the
414
444
  # imported certificate.
415
445
  #
416
446
  #
@@ -418,8 +448,7 @@ module Aws::ACM
418
448
  # [1]: http://docs.aws.amazon.com/acm/latest/userguide/acm-services.html
419
449
  # [2]: http://docs.aws.amazon.com/acm/latest/userguide/acm-renewal.html
420
450
  # [3]: http://docs.aws.amazon.com/acm/latest/userguide/import-certificate.html
421
- # [4]: http://docs.aws.amazon.com/acm/latest/userguide/import-certificate.html#import-certificate-troubleshooting
422
- # [5]: http://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html
451
+ # [4]: http://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html
423
452
  #
424
453
  # @option params [String] :certificate_arn
425
454
  # The [Amazon Resource Name (ARN)][1] of an imported certificate to
@@ -430,27 +459,13 @@ module Aws::ACM
430
459
  # [1]: http://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html
431
460
  #
432
461
  # @option params [required, String, IO] :certificate
433
- # The certificate to import. It must meet the following requirements:
434
- #
435
- # * Must be PEM-encoded.
436
- #
437
- # * Must contain a 1024-bit or 2048-bit RSA public key.
438
- #
439
- # * Must be valid at the time of import. You cannot import a certificate
440
- # before its validity period begins (the certificate's `NotBefore`
441
- # date) or after it expires (the certificate's `NotAfter` date).
462
+ # The certificate to import.
442
463
  #
443
464
  # @option params [required, String, IO] :private_key
444
- # The private key that matches the public key in the certificate. It
445
- # must meet the following requirements:
446
- #
447
- # * Must be PEM-encoded.
448
- #
449
- # * Must be unencrypted. You cannot import a private key that is
450
- # protected by a password or passphrase.
465
+ # The private key that matches the public key in the certificate.
451
466
  #
452
467
  # @option params [String, IO] :certificate_chain
453
- # The certificate chain. It must be PEM-encoded.
468
+ # The PEM encoded certificate chain.
454
469
  #
455
470
  # @return [Types::ImportCertificateResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
456
471
  #
@@ -478,13 +493,22 @@ module Aws::ACM
478
493
  req.send_request(options)
479
494
  end
480
495
 
481
- # Retrieves a list of ACM Certificates and the domain name for each. You
482
- # can optionally filter the list to return only the certificates that
483
- # match the specified status.
496
+ # Retrieves a list of certificate ARNs and domain names. You can request
497
+ # that only certificates that match a specific status be listed. You can
498
+ # also filter by specific attributes of the certificate.
484
499
  #
485
500
  # @option params [Array<String>] :certificate_statuses
486
- # The status or statuses on which to filter the list of ACM
487
- # Certificates.
501
+ # Filter the certificate list by status value.
502
+ #
503
+ # @option params [Types::Filters] :includes
504
+ # Filter the certificate list by one or more of the following values.
505
+ # For more information, see the Filters structure.
506
+ #
507
+ # * extendedKeyUsage
508
+ #
509
+ # * keyUsage
510
+ #
511
+ # * keyTypes
488
512
  #
489
513
  # @option params [String] :next_token
490
514
  # Use this parameter only when paginating results and only in a
@@ -508,6 +532,11 @@ module Aws::ACM
508
532
  #
509
533
  # resp = client.list_certificates({
510
534
  # certificate_statuses: ["PENDING_VALIDATION"], # accepts PENDING_VALIDATION, ISSUED, INACTIVE, EXPIRED, VALIDATION_TIMED_OUT, REVOKED, FAILED
535
+ # includes: {
536
+ # extended_key_usage: ["TLS_WEB_SERVER_AUTHENTICATION"], # accepts TLS_WEB_SERVER_AUTHENTICATION, TLS_WEB_CLIENT_AUTHENTICATION, CODE_SIGNING, EMAIL_PROTECTION, TIME_STAMPING, OCSP_SIGNING, IPSEC_END_SYSTEM, IPSEC_TUNNEL, IPSEC_USER, ANY, NONE, CUSTOM
537
+ # key_usage: ["DIGITAL_SIGNATURE"], # accepts DIGITAL_SIGNATURE, NON_REPUDIATION, KEY_ENCIPHERMENT, DATA_ENCIPHERMENT, KEY_AGREEMENT, CERTIFICATE_SIGNING, CRL_SIGNING, ENCIPHER_ONLY, DECIPHER_ONLY, ANY, CUSTOM
538
+ # key_types: ["RSA_2048"], # accepts RSA_2048, RSA_1024, RSA_4096, EC_prime256v1, EC_secp384r1, EC_secp521r1
539
+ # },
511
540
  # next_token: "NextToken",
512
541
  # max_items: 1,
513
542
  # })
@@ -535,7 +564,7 @@ module Aws::ACM
535
564
  #
536
565
  # @option params [required, String] :certificate_arn
537
566
  # String that contains the ARN of the ACM Certificate for which you want
538
- # to list the tags. This has the following form:
567
+ # to list the tags. This must have the following form:
539
568
  #
540
569
  # `arn:aws:acm:region:123456789012:certificate/12345678-1234-1234-1234-123456789012`
541
570
  #
@@ -649,21 +678,12 @@ module Aws::ACM
649
678
  # the same domain. For example, *.example.com protects www.example.com,
650
679
  # site.example.com, and images.example.com.
651
680
  #
652
- # The maximum length of a DNS name is 253 octets. The name is made up of
653
- # multiple labels separated by periods. No label can be longer than 63
654
- # octets. Consider the following examples:
655
- #
656
- # `(63 octets).(63 octets).(63 octets).(61 octets)` is legal because the
657
- # total length is 253 octets (63+1+63+1+63+1+61) and no label exceeds 63
658
- # octets.
659
- #
660
- # `(64 octets).(63 octets).(63 octets).(61 octets)` is not legal because
661
- # the total length exceeds 253 octets (64+1+63+1+63+1+61) and the first
662
- # label exceeds 63 octets.
681
+ # The first domain name you enter cannot exceed 63 octets, including
682
+ # periods. Each subsequent Subject Alternative Name (SAN), however, can
683
+ # be up to 253 octets in length.
663
684
  #
664
- # `(63 octets).(63 octets).(63 octets).(62 octets)` is not legal because
665
- # the total length of the DNS name (63+1+63+1+63+1+62) exceeds 253
666
- # octets.
685
+ # @option params [String] :validation_method
686
+ # The method you want to use to validate your domain.
667
687
  #
668
688
  # @option params [Array<String>] :subject_alternative_names
669
689
  # Additional FQDNs to be included in the Subject Alternative Name
@@ -675,6 +695,22 @@ module Aws::ACM
675
695
  # more than 10 names, you must request a limit increase. For more
676
696
  # information, see [Limits][1].
677
697
  #
698
+ # The maximum length of a SAN DNS name is 253 octets. The name is made
699
+ # up of multiple labels separated by periods. No label can be longer
700
+ # than 63 octets. Consider the following examples:
701
+ #
702
+ # * `(63 octets).(63 octets).(63 octets).(61 octets)` is legal because
703
+ # the total length is 253 octets (63+1+63+1+63+1+61) and no label
704
+ # exceeds 63 octets.
705
+ #
706
+ # * `(64 octets).(63 octets).(63 octets).(61 octets)` is not legal
707
+ # because the total length exceeds 253 octets (64+1+63+1+63+1+61) and
708
+ # the first label exceeds 63 octets.
709
+ #
710
+ # * `(63 octets).(63 octets).(63 octets).(62 octets)` is not legal
711
+ # because the total length of the DNS name (63+1+63+1+63+1+62) exceeds
712
+ # 253 octets.
713
+ #
678
714
  #
679
715
  #
680
716
  # [1]: http://docs.aws.amazon.com/acm/latest/userguide/acm-limits.html
@@ -689,8 +725,8 @@ module Aws::ACM
689
725
  # requesting multiple certificates.
690
726
  #
691
727
  # @option params [Array<Types::DomainValidationOption>] :domain_validation_options
692
- # The domain name that you want ACM to use to send you emails to
693
- # validate your ownership of the domain.
728
+ # The domain name that you want ACM to use to send you emails so taht
729
+ # your can validate domain ownership.
694
730
  #
695
731
  # @return [Types::RequestCertificateResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
696
732
  #
@@ -700,6 +736,7 @@ module Aws::ACM
700
736
  #
701
737
  # resp = client.request_certificate({
702
738
  # domain_name: "DomainNameString", # required
739
+ # validation_method: "EMAIL", # accepts EMAIL, DNS
703
740
  # subject_alternative_names: ["DomainNameString"],
704
741
  # idempotency_token: "IdempotencyToken",
705
742
  # domain_validation_options: [
@@ -745,9 +782,7 @@ module Aws::ACM
745
782
  # certificate ARN is generated and returned by the RequestCertificate
746
783
  # action as soon as the request is made. By default, using this
747
784
  # parameter causes email to be sent to all top-level domains you
748
- # specified in the certificate request.
749
- #
750
- # The ARN must be of the form:
785
+ # specified in the certificate request. The ARN must be of the form:
751
786
  #
752
787
  # `arn:aws:acm:us-east-1:123456789012:certificate/12345678-1234-1234-1234-123456789012`
753
788
  #
@@ -807,7 +842,7 @@ module Aws::ACM
807
842
  params: params,
808
843
  config: config)
809
844
  context[:gem_name] = 'aws-sdk-acm'
810
- context[:gem_version] = '1.1.0'
845
+ context[:gem_version] = '1.2.0'
811
846
  Seahorse::Client::Request.new(handlers, context)
812
847
  end
813
848
 
@@ -33,7 +33,12 @@ module Aws::ACM
33
33
  DomainValidationList = Shapes::ListShape.new(name: 'DomainValidationList')
34
34
  DomainValidationOption = Shapes::StructureShape.new(name: 'DomainValidationOption')
35
35
  DomainValidationOptionList = Shapes::ListShape.new(name: 'DomainValidationOptionList')
36
+ ExtendedKeyUsage = Shapes::StructureShape.new(name: 'ExtendedKeyUsage')
37
+ ExtendedKeyUsageFilterList = Shapes::ListShape.new(name: 'ExtendedKeyUsageFilterList')
38
+ ExtendedKeyUsageList = Shapes::ListShape.new(name: 'ExtendedKeyUsageList')
39
+ ExtendedKeyUsageName = Shapes::StringShape.new(name: 'ExtendedKeyUsageName')
36
40
  FailureReason = Shapes::StringShape.new(name: 'FailureReason')
41
+ Filters = Shapes::StructureShape.new(name: 'Filters')
37
42
  GetCertificateRequest = Shapes::StructureShape.new(name: 'GetCertificateRequest')
38
43
  GetCertificateResponse = Shapes::StructureShape.new(name: 'GetCertificateResponse')
39
44
  IdempotencyToken = Shapes::StringShape.new(name: 'IdempotencyToken')
@@ -45,6 +50,11 @@ module Aws::ACM
45
50
  InvalidStateException = Shapes::StructureShape.new(name: 'InvalidStateException')
46
51
  InvalidTagException = Shapes::StructureShape.new(name: 'InvalidTagException')
47
52
  KeyAlgorithm = Shapes::StringShape.new(name: 'KeyAlgorithm')
53
+ KeyAlgorithmList = Shapes::ListShape.new(name: 'KeyAlgorithmList')
54
+ KeyUsage = Shapes::StructureShape.new(name: 'KeyUsage')
55
+ KeyUsageFilterList = Shapes::ListShape.new(name: 'KeyUsageFilterList')
56
+ KeyUsageList = Shapes::ListShape.new(name: 'KeyUsageList')
57
+ KeyUsageName = Shapes::StringShape.new(name: 'KeyUsageName')
48
58
  LimitExceededException = Shapes::StructureShape.new(name: 'LimitExceededException')
49
59
  ListCertificatesRequest = Shapes::StructureShape.new(name: 'ListCertificatesRequest')
50
60
  ListCertificatesResponse = Shapes::StructureShape.new(name: 'ListCertificatesResponse')
@@ -53,6 +63,7 @@ module Aws::ACM
53
63
  MaxItems = Shapes::IntegerShape.new(name: 'MaxItems')
54
64
  NextToken = Shapes::StringShape.new(name: 'NextToken')
55
65
  PrivateKeyBlob = Shapes::BlobShape.new(name: 'PrivateKeyBlob')
66
+ RecordType = Shapes::StringShape.new(name: 'RecordType')
56
67
  RemoveTagsFromCertificateRequest = Shapes::StructureShape.new(name: 'RemoveTagsFromCertificateRequest')
57
68
  RenewalStatus = Shapes::StringShape.new(name: 'RenewalStatus')
58
69
  RenewalSummary = Shapes::StructureShape.new(name: 'RenewalSummary')
@@ -62,6 +73,7 @@ module Aws::ACM
62
73
  ResendValidationEmailRequest = Shapes::StructureShape.new(name: 'ResendValidationEmailRequest')
63
74
  ResourceInUseException = Shapes::StructureShape.new(name: 'ResourceInUseException')
64
75
  ResourceNotFoundException = Shapes::StructureShape.new(name: 'ResourceNotFoundException')
76
+ ResourceRecord = Shapes::StructureShape.new(name: 'ResourceRecord')
65
77
  RevocationReason = Shapes::StringShape.new(name: 'RevocationReason')
66
78
  String = Shapes::StringShape.new(name: 'String')
67
79
  TStamp = Shapes::TimestampShape.new(name: 'TStamp')
@@ -71,6 +83,7 @@ module Aws::ACM
71
83
  TagValue = Shapes::StringShape.new(name: 'TagValue')
72
84
  TooManyTagsException = Shapes::StructureShape.new(name: 'TooManyTagsException')
73
85
  ValidationEmailList = Shapes::ListShape.new(name: 'ValidationEmailList')
86
+ ValidationMethod = Shapes::StringShape.new(name: 'ValidationMethod')
74
87
 
75
88
  AddTagsToCertificateRequest.add_member(:certificate_arn, Shapes::ShapeRef.new(shape: Arn, required: true, location_name: "CertificateArn"))
76
89
  AddTagsToCertificateRequest.add_member(:tags, Shapes::ShapeRef.new(shape: TagList, required: true, location_name: "Tags"))
@@ -97,6 +110,8 @@ module Aws::ACM
97
110
  CertificateDetail.add_member(:failure_reason, Shapes::ShapeRef.new(shape: FailureReason, location_name: "FailureReason"))
98
111
  CertificateDetail.add_member(:type, Shapes::ShapeRef.new(shape: CertificateType, location_name: "Type"))
99
112
  CertificateDetail.add_member(:renewal_summary, Shapes::ShapeRef.new(shape: RenewalSummary, location_name: "RenewalSummary"))
113
+ CertificateDetail.add_member(:key_usages, Shapes::ShapeRef.new(shape: KeyUsageList, location_name: "KeyUsages"))
114
+ CertificateDetail.add_member(:extended_key_usages, Shapes::ShapeRef.new(shape: ExtendedKeyUsageList, location_name: "ExtendedKeyUsages"))
100
115
  CertificateDetail.struct_class = Types::CertificateDetail
101
116
 
102
117
  CertificateStatuses.member = Shapes::ShapeRef.new(shape: CertificateStatus)
@@ -122,6 +137,8 @@ module Aws::ACM
122
137
  DomainValidation.add_member(:validation_emails, Shapes::ShapeRef.new(shape: ValidationEmailList, location_name: "ValidationEmails"))
123
138
  DomainValidation.add_member(:validation_domain, Shapes::ShapeRef.new(shape: DomainNameString, location_name: "ValidationDomain"))
124
139
  DomainValidation.add_member(:validation_status, Shapes::ShapeRef.new(shape: DomainStatus, location_name: "ValidationStatus"))
140
+ DomainValidation.add_member(:resource_record, Shapes::ShapeRef.new(shape: ResourceRecord, location_name: "ResourceRecord"))
141
+ DomainValidation.add_member(:validation_method, Shapes::ShapeRef.new(shape: ValidationMethod, location_name: "ValidationMethod"))
125
142
  DomainValidation.struct_class = Types::DomainValidation
126
143
 
127
144
  DomainValidationList.member = Shapes::ShapeRef.new(shape: DomainValidation)
@@ -132,6 +149,19 @@ module Aws::ACM
132
149
 
133
150
  DomainValidationOptionList.member = Shapes::ShapeRef.new(shape: DomainValidationOption)
134
151
 
152
+ ExtendedKeyUsage.add_member(:name, Shapes::ShapeRef.new(shape: ExtendedKeyUsageName, location_name: "Name"))
153
+ ExtendedKeyUsage.add_member(:oid, Shapes::ShapeRef.new(shape: String, location_name: "OID"))
154
+ ExtendedKeyUsage.struct_class = Types::ExtendedKeyUsage
155
+
156
+ ExtendedKeyUsageFilterList.member = Shapes::ShapeRef.new(shape: ExtendedKeyUsageName)
157
+
158
+ ExtendedKeyUsageList.member = Shapes::ShapeRef.new(shape: ExtendedKeyUsage)
159
+
160
+ Filters.add_member(:extended_key_usage, Shapes::ShapeRef.new(shape: ExtendedKeyUsageFilterList, location_name: "extendedKeyUsage"))
161
+ Filters.add_member(:key_usage, Shapes::ShapeRef.new(shape: KeyUsageFilterList, location_name: "keyUsage"))
162
+ Filters.add_member(:key_types, Shapes::ShapeRef.new(shape: KeyAlgorithmList, location_name: "keyTypes"))
163
+ Filters.struct_class = Types::Filters
164
+
135
165
  GetCertificateRequest.add_member(:certificate_arn, Shapes::ShapeRef.new(shape: Arn, required: true, location_name: "CertificateArn"))
136
166
  GetCertificateRequest.struct_class = Types::GetCertificateRequest
137
167
 
@@ -150,7 +180,17 @@ module Aws::ACM
150
180
 
151
181
  InUseList.member = Shapes::ShapeRef.new(shape: String)
152
182
 
183
+ KeyAlgorithmList.member = Shapes::ShapeRef.new(shape: KeyAlgorithm)
184
+
185
+ KeyUsage.add_member(:name, Shapes::ShapeRef.new(shape: KeyUsageName, location_name: "Name"))
186
+ KeyUsage.struct_class = Types::KeyUsage
187
+
188
+ KeyUsageFilterList.member = Shapes::ShapeRef.new(shape: KeyUsageName)
189
+
190
+ KeyUsageList.member = Shapes::ShapeRef.new(shape: KeyUsage)
191
+
153
192
  ListCertificatesRequest.add_member(:certificate_statuses, Shapes::ShapeRef.new(shape: CertificateStatuses, location_name: "CertificateStatuses"))
193
+ ListCertificatesRequest.add_member(:includes, Shapes::ShapeRef.new(shape: Filters, location_name: "Includes"))
154
194
  ListCertificatesRequest.add_member(:next_token, Shapes::ShapeRef.new(shape: NextToken, location_name: "NextToken"))
155
195
  ListCertificatesRequest.add_member(:max_items, Shapes::ShapeRef.new(shape: MaxItems, location_name: "MaxItems"))
156
196
  ListCertificatesRequest.struct_class = Types::ListCertificatesRequest
@@ -174,6 +214,7 @@ module Aws::ACM
174
214
  RenewalSummary.struct_class = Types::RenewalSummary
175
215
 
176
216
  RequestCertificateRequest.add_member(:domain_name, Shapes::ShapeRef.new(shape: DomainNameString, required: true, location_name: "DomainName"))
217
+ RequestCertificateRequest.add_member(:validation_method, Shapes::ShapeRef.new(shape: ValidationMethod, location_name: "ValidationMethod"))
177
218
  RequestCertificateRequest.add_member(:subject_alternative_names, Shapes::ShapeRef.new(shape: DomainList, location_name: "SubjectAlternativeNames"))
178
219
  RequestCertificateRequest.add_member(:idempotency_token, Shapes::ShapeRef.new(shape: IdempotencyToken, location_name: "IdempotencyToken"))
179
220
  RequestCertificateRequest.add_member(:domain_validation_options, Shapes::ShapeRef.new(shape: DomainValidationOptionList, location_name: "DomainValidationOptions"))
@@ -187,6 +228,11 @@ module Aws::ACM
187
228
  ResendValidationEmailRequest.add_member(:validation_domain, Shapes::ShapeRef.new(shape: DomainNameString, required: true, location_name: "ValidationDomain"))
188
229
  ResendValidationEmailRequest.struct_class = Types::ResendValidationEmailRequest
189
230
 
231
+ ResourceRecord.add_member(:name, Shapes::ShapeRef.new(shape: String, required: true, location_name: "Name"))
232
+ ResourceRecord.add_member(:type, Shapes::ShapeRef.new(shape: RecordType, required: true, location_name: "Type"))
233
+ ResourceRecord.add_member(:value, Shapes::ShapeRef.new(shape: String, required: true, location_name: "Value"))
234
+ ResourceRecord.struct_class = Types::ResourceRecord
235
+
190
236
  Tag.add_member(:key, Shapes::ShapeRef.new(shape: TagKey, required: true, location_name: "Key"))
191
237
  Tag.add_member(:value, Shapes::ShapeRef.new(shape: TagValue, location_name: "Value"))
192
238
  Tag.struct_class = Types::Tag
@@ -132,8 +132,7 @@ module Aws::ACM
132
132
  # @return [Time]
133
133
  #
134
134
  # @!attribute [rw] key_algorithm
135
- # The algorithm that was used to generate the key pair (the public and
136
- # private key).
135
+ # The algorithm that was used to generate the public-private key pair.
137
136
  # @return [String]
138
137
  #
139
138
  # @!attribute [rw] signature_algorithm
@@ -181,6 +180,19 @@ module Aws::ACM
181
180
  # [1]: http://docs.aws.amazon.com/acm/latest/userguide/acm-renewal.html
182
181
  # @return [Types::RenewalSummary]
183
182
  #
183
+ # @!attribute [rw] key_usages
184
+ # A list of Key Usage X.509 v3 extension objects. Each object is a
185
+ # string value that identifies the purpose of the public key contained
186
+ # in the certificate. Possible extension values include
187
+ # DIGITAL\_SIGNATURE, KEY\_ENCHIPHERMENT, NON\_REPUDIATION, and more.
188
+ # @return [Array<Types::KeyUsage>]
189
+ #
190
+ # @!attribute [rw] extended_key_usages
191
+ # Contains a list of Extended Key Usage X.509 v3 extension objects.
192
+ # Each object specifies a purpose for which the certificate public key
193
+ # can be used and consists of a name and an object identifier (OID).
194
+ # @return [Array<Types::ExtendedKeyUsage>]
195
+ #
184
196
  # @see http://docs.aws.amazon.com/goto/WebAPI/acm-2015-12-08/CertificateDetail AWS API Documentation
185
197
  #
186
198
  class CertificateDetail < Struct.new(
@@ -204,7 +216,9 @@ module Aws::ACM
204
216
  :in_use_by,
205
217
  :failure_reason,
206
218
  :type,
207
- :renewal_summary)
219
+ :renewal_summary,
220
+ :key_usages,
221
+ :extended_key_usages)
208
222
  include Aws::Structure
209
223
  end
210
224
 
@@ -322,7 +336,28 @@ module Aws::ACM
322
336
  # @return [String]
323
337
  #
324
338
  # @!attribute [rw] validation_status
325
- # The validation status of the domain name.
339
+ # The validation status of the domain name. This can be one of the
340
+ # following values:
341
+ #
342
+ # * `PENDING_VALIDATION`
343
+ #
344
+ # * ``SUCCESS
345
+ #
346
+ # * ``FAILED
347
+ # @return [String]
348
+ #
349
+ # @!attribute [rw] resource_record
350
+ # Contains the CNAME record that you add to your DNS database for
351
+ # domain validation. For more information, see [Use DNS to Validate
352
+ # Domain Ownership][1].
353
+ #
354
+ #
355
+ #
356
+ # [1]: http://docs.aws.amazon.com/acm/latest/userguide/gs-acm-validate-dns.html
357
+ # @return [Types::ResourceRecord]
358
+ #
359
+ # @!attribute [rw] validation_method
360
+ # Specifies the domain validation method.
326
361
  # @return [String]
327
362
  #
328
363
  # @see http://docs.aws.amazon.com/goto/WebAPI/acm-2015-12-08/DomainValidation AWS API Documentation
@@ -331,12 +366,14 @@ module Aws::ACM
331
366
  :domain_name,
332
367
  :validation_emails,
333
368
  :validation_domain,
334
- :validation_status)
369
+ :validation_status,
370
+ :resource_record,
371
+ :validation_method)
335
372
  include Aws::Structure
336
373
  end
337
374
 
338
375
  # Contains information about the domain names that you want ACM to use
339
- # to send you emails to validate your ownership of the domain.
376
+ # to send you emails that enable you to validate domain ownership.
340
377
  #
341
378
  # @note When making an API call, you may pass DomainValidationOption
342
379
  # data as a hash:
@@ -378,6 +415,80 @@ module Aws::ACM
378
415
  include Aws::Structure
379
416
  end
380
417
 
418
+ # The Extended Key Usage X.509 v3 extension defines one or more purposes
419
+ # for which the public key can be used. This is in addition to or in
420
+ # place of the basic purposes specified by the Key Usage extension.
421
+ #
422
+ # @!attribute [rw] name
423
+ # The name of an Extended Key Usage value.
424
+ # @return [String]
425
+ #
426
+ # @!attribute [rw] oid
427
+ # An object identifier (OID) for the extension value. OIDs are strings
428
+ # of numbers separated by periods. The following OIDs are defined in
429
+ # RFC 3280 and RFC 5280.
430
+ #
431
+ # * `1.3.6.1.5.5.7.3.1 (TLS_WEB_SERVER_AUTHENTICATION)`
432
+ #
433
+ # * `1.3.6.1.5.5.7.3.2 (TLS_WEB_CLIENT_AUTHENTICATION)`
434
+ #
435
+ # * `1.3.6.1.5.5.7.3.3 (CODE_SIGNING)`
436
+ #
437
+ # * `1.3.6.1.5.5.7.3.4 (EMAIL_PROTECTION)`
438
+ #
439
+ # * `1.3.6.1.5.5.7.3.8 (TIME_STAMPING)`
440
+ #
441
+ # * `1.3.6.1.5.5.7.3.9 (OCSP_SIGNING)`
442
+ #
443
+ # * `1.3.6.1.5.5.7.3.5 (IPSEC_END_SYSTEM)`
444
+ #
445
+ # * `1.3.6.1.5.5.7.3.6 (IPSEC_TUNNEL)`
446
+ #
447
+ # * `1.3.6.1.5.5.7.3.7 (IPSEC_USER)`
448
+ # @return [String]
449
+ #
450
+ # @see http://docs.aws.amazon.com/goto/WebAPI/acm-2015-12-08/ExtendedKeyUsage AWS API Documentation
451
+ #
452
+ class ExtendedKeyUsage < Struct.new(
453
+ :name,
454
+ :oid)
455
+ include Aws::Structure
456
+ end
457
+
458
+ # This structure can be used in the ListCertificates action to filter
459
+ # the output of the certificate list.
460
+ #
461
+ # @note When making an API call, you may pass Filters
462
+ # data as a hash:
463
+ #
464
+ # {
465
+ # extended_key_usage: ["TLS_WEB_SERVER_AUTHENTICATION"], # accepts TLS_WEB_SERVER_AUTHENTICATION, TLS_WEB_CLIENT_AUTHENTICATION, CODE_SIGNING, EMAIL_PROTECTION, TIME_STAMPING, OCSP_SIGNING, IPSEC_END_SYSTEM, IPSEC_TUNNEL, IPSEC_USER, ANY, NONE, CUSTOM
466
+ # key_usage: ["DIGITAL_SIGNATURE"], # accepts DIGITAL_SIGNATURE, NON_REPUDIATION, KEY_ENCIPHERMENT, DATA_ENCIPHERMENT, KEY_AGREEMENT, CERTIFICATE_SIGNING, CRL_SIGNING, ENCIPHER_ONLY, DECIPHER_ONLY, ANY, CUSTOM
467
+ # key_types: ["RSA_2048"], # accepts RSA_2048, RSA_1024, RSA_4096, EC_prime256v1, EC_secp384r1, EC_secp521r1
468
+ # }
469
+ #
470
+ # @!attribute [rw] extended_key_usage
471
+ # Specify one or more ExtendedKeyUsage extension values.
472
+ # @return [Array<String>]
473
+ #
474
+ # @!attribute [rw] key_usage
475
+ # Specify one or more KeyUsage extension values.
476
+ # @return [Array<String>]
477
+ #
478
+ # @!attribute [rw] key_types
479
+ # Specify one or more algorithms that can be used to generate key
480
+ # pairs.
481
+ # @return [Array<String>]
482
+ #
483
+ # @see http://docs.aws.amazon.com/goto/WebAPI/acm-2015-12-08/Filters AWS API Documentation
484
+ #
485
+ class Filters < Struct.new(
486
+ :extended_key_usage,
487
+ :key_usage,
488
+ :key_types)
489
+ include Aws::Structure
490
+ end
491
+
381
492
  # @note When making an API call, you may pass GetCertificateRequest
382
493
  # data as a hash:
383
494
  #
@@ -443,30 +554,15 @@ module Aws::ACM
443
554
  # @return [String]
444
555
  #
445
556
  # @!attribute [rw] certificate
446
- # The certificate to import. It must meet the following requirements:
447
- #
448
- # * Must be PEM-encoded.
449
- #
450
- # * Must contain a 1024-bit or 2048-bit RSA public key.
451
- #
452
- # * Must be valid at the time of import. You cannot import a
453
- # certificate before its validity period begins (the certificate's
454
- # `NotBefore` date) or after it expires (the certificate's
455
- # `NotAfter` date).
557
+ # The certificate to import.
456
558
  # @return [String]
457
559
  #
458
560
  # @!attribute [rw] private_key
459
- # The private key that matches the public key in the certificate. It
460
- # must meet the following requirements:
461
- #
462
- # * Must be PEM-encoded.
463
- #
464
- # * Must be unencrypted. You cannot import a private key that is
465
- # protected by a password or passphrase.
561
+ # The private key that matches the public key in the certificate.
466
562
  # @return [String]
467
563
  #
468
564
  # @!attribute [rw] certificate_chain
469
- # The certificate chain. It must be PEM-encoded.
565
+ # The PEM encoded certificate chain.
470
566
  # @return [String]
471
567
  #
472
568
  # @see http://docs.aws.amazon.com/goto/WebAPI/acm-2015-12-08/ImportCertificateRequest AWS API Documentation
@@ -494,20 +590,49 @@ module Aws::ACM
494
590
  include Aws::Structure
495
591
  end
496
592
 
593
+ # The Key Usage X.509 v3 extension defines the purpose of the public key
594
+ # contained in the certificate.
595
+ #
596
+ # @!attribute [rw] name
597
+ # A string value that contains a Key Usage extension name.
598
+ # @return [String]
599
+ #
600
+ # @see http://docs.aws.amazon.com/goto/WebAPI/acm-2015-12-08/KeyUsage AWS API Documentation
601
+ #
602
+ class KeyUsage < Struct.new(
603
+ :name)
604
+ include Aws::Structure
605
+ end
606
+
497
607
  # @note When making an API call, you may pass ListCertificatesRequest
498
608
  # data as a hash:
499
609
  #
500
610
  # {
501
611
  # certificate_statuses: ["PENDING_VALIDATION"], # accepts PENDING_VALIDATION, ISSUED, INACTIVE, EXPIRED, VALIDATION_TIMED_OUT, REVOKED, FAILED
612
+ # includes: {
613
+ # extended_key_usage: ["TLS_WEB_SERVER_AUTHENTICATION"], # accepts TLS_WEB_SERVER_AUTHENTICATION, TLS_WEB_CLIENT_AUTHENTICATION, CODE_SIGNING, EMAIL_PROTECTION, TIME_STAMPING, OCSP_SIGNING, IPSEC_END_SYSTEM, IPSEC_TUNNEL, IPSEC_USER, ANY, NONE, CUSTOM
614
+ # key_usage: ["DIGITAL_SIGNATURE"], # accepts DIGITAL_SIGNATURE, NON_REPUDIATION, KEY_ENCIPHERMENT, DATA_ENCIPHERMENT, KEY_AGREEMENT, CERTIFICATE_SIGNING, CRL_SIGNING, ENCIPHER_ONLY, DECIPHER_ONLY, ANY, CUSTOM
615
+ # key_types: ["RSA_2048"], # accepts RSA_2048, RSA_1024, RSA_4096, EC_prime256v1, EC_secp384r1, EC_secp521r1
616
+ # },
502
617
  # next_token: "NextToken",
503
618
  # max_items: 1,
504
619
  # }
505
620
  #
506
621
  # @!attribute [rw] certificate_statuses
507
- # The status or statuses on which to filter the list of ACM
508
- # Certificates.
622
+ # Filter the certificate list by status value.
509
623
  # @return [Array<String>]
510
624
  #
625
+ # @!attribute [rw] includes
626
+ # Filter the certificate list by one or more of the following values.
627
+ # For more information, see the Filters structure.
628
+ #
629
+ # * extendedKeyUsage
630
+ #
631
+ # * keyUsage
632
+ #
633
+ # * keyTypes
634
+ # @return [Types::Filters]
635
+ #
511
636
  # @!attribute [rw] next_token
512
637
  # Use this parameter only when paginating results and only in a
513
638
  # subsequent request after you receive a response with truncated
@@ -527,6 +652,7 @@ module Aws::ACM
527
652
  #
528
653
  class ListCertificatesRequest < Struct.new(
529
654
  :certificate_statuses,
655
+ :includes,
530
656
  :next_token,
531
657
  :max_items)
532
658
  include Aws::Structure
@@ -559,7 +685,7 @@ module Aws::ACM
559
685
  #
560
686
  # @!attribute [rw] certificate_arn
561
687
  # String that contains the ARN of the ACM Certificate for which you
562
- # want to list the tags. This has the following form:
688
+ # want to list the tags. This must have the following form:
563
689
  #
564
690
  # `arn:aws:acm:region:123456789012:certificate/12345678-1234-1234-1234-123456789012`
565
691
  #
@@ -669,6 +795,7 @@ module Aws::ACM
669
795
  #
670
796
  # {
671
797
  # domain_name: "DomainNameString", # required
798
+ # validation_method: "EMAIL", # accepts EMAIL, DNS
672
799
  # subject_alternative_names: ["DomainNameString"],
673
800
  # idempotency_token: "IdempotencyToken",
674
801
  # domain_validation_options: [
@@ -686,21 +813,13 @@ module Aws::ACM
686
813
  # sites in the same domain. For example, *.example.com protects
687
814
  # www.example.com, site.example.com, and images.example.com.
688
815
  #
689
- # The maximum length of a DNS name is 253 octets. The name is made up
690
- # of multiple labels separated by periods. No label can be longer than
691
- # 63 octets. Consider the following examples:
692
- #
693
- # `(63 octets).(63 octets).(63 octets).(61 octets)` is legal because
694
- # the total length is 253 octets (63+1+63+1+63+1+61) and no label
695
- # exceeds 63 octets.
696
- #
697
- # `(64 octets).(63 octets).(63 octets).(61 octets)` is not legal
698
- # because the total length exceeds 253 octets (64+1+63+1+63+1+61) and
699
- # the first label exceeds 63 octets.
816
+ # The first domain name you enter cannot exceed 63 octets, including
817
+ # periods. Each subsequent Subject Alternative Name (SAN), however,
818
+ # can be up to 253 octets in length.
819
+ # @return [String]
700
820
  #
701
- # `(63 octets).(63 octets).(63 octets).(62 octets)` is not legal
702
- # because the total length of the DNS name (63+1+63+1+63+1+62) exceeds
703
- # 253 octets.
821
+ # @!attribute [rw] validation_method
822
+ # The method you want to use to validate your domain.
704
823
  # @return [String]
705
824
  #
706
825
  # @!attribute [rw] subject_alternative_names
@@ -713,6 +832,22 @@ module Aws::ACM
713
832
  # If you need more than 10 names, you must request a limit increase.
714
833
  # For more information, see [Limits][1].
715
834
  #
835
+ # The maximum length of a SAN DNS name is 253 octets. The name is made
836
+ # up of multiple labels separated by periods. No label can be longer
837
+ # than 63 octets. Consider the following examples:
838
+ #
839
+ # * `(63 octets).(63 octets).(63 octets).(61 octets)` is legal because
840
+ # the total length is 253 octets (63+1+63+1+63+1+61) and no label
841
+ # exceeds 63 octets.
842
+ #
843
+ # * `(64 octets).(63 octets).(63 octets).(61 octets)` is not legal
844
+ # because the total length exceeds 253 octets (64+1+63+1+63+1+61)
845
+ # and the first label exceeds 63 octets.
846
+ #
847
+ # * `(63 octets).(63 octets).(63 octets).(62 octets)` is not legal
848
+ # because the total length of the DNS name (63+1+63+1+63+1+62)
849
+ # exceeds 253 octets.
850
+ #
716
851
  #
717
852
  #
718
853
  # [1]: http://docs.aws.amazon.com/acm/latest/userguide/acm-limits.html
@@ -729,14 +864,15 @@ module Aws::ACM
729
864
  # @return [String]
730
865
  #
731
866
  # @!attribute [rw] domain_validation_options
732
- # The domain name that you want ACM to use to send you emails to
733
- # validate your ownership of the domain.
867
+ # The domain name that you want ACM to use to send you emails so taht
868
+ # your can validate domain ownership.
734
869
  # @return [Array<Types::DomainValidationOption>]
735
870
  #
736
871
  # @see http://docs.aws.amazon.com/goto/WebAPI/acm-2015-12-08/RequestCertificateRequest AWS API Documentation
737
872
  #
738
873
  class RequestCertificateRequest < Struct.new(
739
874
  :domain_name,
875
+ :validation_method,
740
876
  :subject_alternative_names,
741
877
  :idempotency_token,
742
878
  :domain_validation_options)
@@ -771,9 +907,7 @@ module Aws::ACM
771
907
  # certificate ARN is generated and returned by the RequestCertificate
772
908
  # action as soon as the request is made. By default, using this
773
909
  # parameter causes email to be sent to all top-level domains you
774
- # specified in the certificate request.
775
- #
776
- # The ARN must be of the form:
910
+ # specified in the certificate request. The ARN must be of the form:
777
911
  #
778
912
  # `arn:aws:acm:us-east-1:123456789012:certificate/12345678-1234-1234-1234-123456789012`
779
913
  # @return [String]
@@ -813,6 +947,33 @@ module Aws::ACM
813
947
  include Aws::Structure
814
948
  end
815
949
 
950
+ # Contains a DNS record value that you can use to can use to validate
951
+ # ownership or control of a domain. This is used by the
952
+ # DescribeCertificate action.
953
+ #
954
+ # @!attribute [rw] name
955
+ # The name of the DNS record to create in your domain. This is
956
+ # supplied by ACM.
957
+ # @return [String]
958
+ #
959
+ # @!attribute [rw] type
960
+ # The type of DNS record. Currently this can be `CNAME`.
961
+ # @return [String]
962
+ #
963
+ # @!attribute [rw] value
964
+ # The value of the CNAME record to add to your DNS database. This is
965
+ # supplied by ACM.
966
+ # @return [String]
967
+ #
968
+ # @see http://docs.aws.amazon.com/goto/WebAPI/acm-2015-12-08/ResourceRecord AWS API Documentation
969
+ #
970
+ class ResourceRecord < Struct.new(
971
+ :name,
972
+ :type,
973
+ :value)
974
+ include Aws::Structure
975
+ end
976
+
816
977
  # A key-value pair that identifies or specifies metadata about an ACM
817
978
  # resource.
818
979
  #
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-acm
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.1.0
4
+ version: 1.2.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2017-11-01 00:00:00.000000000 Z
11
+ date: 2017-11-22 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core