aws-sdk-acm 1.1.0 → 1.2.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA1:
3
- metadata.gz: 3403fb2e98c0e2ccedeadbb6e1b6328b6d3b6668
4
- data.tar.gz: 39f80502395e1ee07dfe85c91c7397f813f7e837
3
+ metadata.gz: cc5f02c5bea0bcd493337e573f709b674e6bcbeb
4
+ data.tar.gz: 2fc1b0a307e8513b13535a76f37ee3b888830e1f
5
5
  SHA512:
6
- metadata.gz: 2988cb5672c8b2e9c7c1e71c8d897269764b2d99d7d5e630d983d2fcb7c6c5c12c66a20b36c83683b5e2adc76d0146a0697e17e70ed35920bec7b9dea1cfe0bf
7
- data.tar.gz: 2617620a1de7cfc331c2d8816b64e3bb4ba9d3c0b78050b3bc507dcec8728252ec860cf8fa59a56bd4244f782bac9fe3da6977bc8b63f068d89ccb0297e623c5
6
+ metadata.gz: efbbc1453f48ed54825d603a7ac571c50b481e8b9d7776b755dfc1562da7971e6358a51fbb053c27935ec3dc560692f7d4bcfb7ccb0e9518aa11871c66d821e5
7
+ data.tar.gz: f018ef8f70e878692c0a778db21f2eeb16565de82ea93fc9a18d76136ffefc22dff02f7c6cbf4cd3334ae96eddf425ac0703f75f1a791fb095cc7339766a4e5c
@@ -42,6 +42,6 @@ require_relative 'aws-sdk-acm/customizations'
42
42
  # @service
43
43
  module Aws::ACM
44
44
 
45
- GEM_VERSION = '1.1.0'
45
+ GEM_VERSION = '1.2.0'
46
46
 
47
47
  end
@@ -218,11 +218,11 @@ module Aws::ACM
218
218
  req.send_request(options)
219
219
  end
220
220
 
221
- # Deletes an ACM Certificate and its associated private key. If this
222
- # action succeeds, the certificate no longer appears in the list of ACM
223
- # Certificates that can be displayed by calling the ListCertificates
224
- # action or be retrieved by calling the GetCertificate action. The
225
- # certificate will not be available for use by other AWS services.
221
+ # Deletes a certificate and its associated private key. If this action
222
+ # succeeds, the certificate no longer appears in the list that can be
223
+ # displayed by calling the ListCertificates action or be retrieved by
224
+ # calling the GetCertificate action. The certificate will not be
225
+ # available for use by AWS services integrated with ACM.
226
226
  #
227
227
  # <note markdown="1"> You cannot delete an ACM Certificate that is being used by another AWS
228
228
  # service. To delete a certificate that is in use, the certificate
@@ -297,6 +297,10 @@ module Aws::ACM
297
297
  # resp.certificate.domain_validation_options[0].validation_emails[0] #=> String
298
298
  # resp.certificate.domain_validation_options[0].validation_domain #=> String
299
299
  # resp.certificate.domain_validation_options[0].validation_status #=> String, one of "PENDING_VALIDATION", "SUCCESS", "FAILED"
300
+ # resp.certificate.domain_validation_options[0].resource_record.name #=> String
301
+ # resp.certificate.domain_validation_options[0].resource_record.type #=> String, one of "CNAME"
302
+ # resp.certificate.domain_validation_options[0].resource_record.value #=> String
303
+ # resp.certificate.domain_validation_options[0].validation_method #=> String, one of "EMAIL", "DNS"
300
304
  # resp.certificate.serial #=> String
301
305
  # resp.certificate.subject #=> String
302
306
  # resp.certificate.issuer #=> String
@@ -308,11 +312,11 @@ module Aws::ACM
308
312
  # resp.certificate.revocation_reason #=> String, one of "UNSPECIFIED", "KEY_COMPROMISE", "CA_COMPROMISE", "AFFILIATION_CHANGED", "SUPERCEDED", "CESSATION_OF_OPERATION", "CERTIFICATE_HOLD", "REMOVE_FROM_CRL", "PRIVILEGE_WITHDRAWN", "A_A_COMPROMISE"
309
313
  # resp.certificate.not_before #=> Time
310
314
  # resp.certificate.not_after #=> Time
311
- # resp.certificate.key_algorithm #=> String, one of "RSA_2048", "RSA_1024", "EC_prime256v1"
315
+ # resp.certificate.key_algorithm #=> String, one of "RSA_2048", "RSA_1024", "RSA_4096", "EC_prime256v1", "EC_secp384r1", "EC_secp521r1"
312
316
  # resp.certificate.signature_algorithm #=> String
313
317
  # resp.certificate.in_use_by #=> Array
314
318
  # resp.certificate.in_use_by[0] #=> String
315
- # resp.certificate.failure_reason #=> String, one of "NO_AVAILABLE_CONTACTS", "ADDITIONAL_VERIFICATION_REQUIRED", "DOMAIN_NOT_ALLOWED", "INVALID_PUBLIC_DOMAIN", "OTHER"
319
+ # resp.certificate.failure_reason #=> String, one of "NO_AVAILABLE_CONTACTS", "ADDITIONAL_VERIFICATION_REQUIRED", "DOMAIN_NOT_ALLOWED", "INVALID_PUBLIC_DOMAIN", "CAA_ERROR", "OTHER"
316
320
  # resp.certificate.type #=> String, one of "IMPORTED", "AMAZON_ISSUED"
317
321
  # resp.certificate.renewal_summary.renewal_status #=> String, one of "PENDING_AUTO_RENEWAL", "PENDING_VALIDATION", "SUCCESS", "FAILED"
318
322
  # resp.certificate.renewal_summary.domain_validation_options #=> Array
@@ -321,6 +325,15 @@ module Aws::ACM
321
325
  # resp.certificate.renewal_summary.domain_validation_options[0].validation_emails[0] #=> String
322
326
  # resp.certificate.renewal_summary.domain_validation_options[0].validation_domain #=> String
323
327
  # resp.certificate.renewal_summary.domain_validation_options[0].validation_status #=> String, one of "PENDING_VALIDATION", "SUCCESS", "FAILED"
328
+ # resp.certificate.renewal_summary.domain_validation_options[0].resource_record.name #=> String
329
+ # resp.certificate.renewal_summary.domain_validation_options[0].resource_record.type #=> String, one of "CNAME"
330
+ # resp.certificate.renewal_summary.domain_validation_options[0].resource_record.value #=> String
331
+ # resp.certificate.renewal_summary.domain_validation_options[0].validation_method #=> String, one of "EMAIL", "DNS"
332
+ # resp.certificate.key_usages #=> Array
333
+ # resp.certificate.key_usages[0].name #=> String, one of "DIGITAL_SIGNATURE", "NON_REPUDIATION", "KEY_ENCIPHERMENT", "DATA_ENCIPHERMENT", "KEY_AGREEMENT", "CERTIFICATE_SIGNING", "CRL_SIGNING", "ENCIPHER_ONLY", "DECIPHER_ONLY", "ANY", "CUSTOM"
334
+ # resp.certificate.extended_key_usages #=> Array
335
+ # resp.certificate.extended_key_usages[0].name #=> String, one of "TLS_WEB_SERVER_AUTHENTICATION", "TLS_WEB_CLIENT_AUTHENTICATION", "CODE_SIGNING", "EMAIL_PROTECTION", "TIME_STAMPING", "OCSP_SIGNING", "IPSEC_END_SYSTEM", "IPSEC_TUNNEL", "IPSEC_USER", "ANY", "NONE", "CUSTOM"
336
+ # resp.certificate.extended_key_usages[0].oid #=> String
324
337
  #
325
338
  # @see http://docs.aws.amazon.com/goto/WebAPI/acm-2015-12-08/DescribeCertificate AWS API Documentation
326
339
  #
@@ -331,13 +344,12 @@ module Aws::ACM
331
344
  req.send_request(options)
332
345
  end
333
346
 
334
- # Retrieves an ACM Certificate and certificate chain for the certificate
335
- # specified by an ARN. The chain is an ordered list of certificates that
336
- # contains the ACM Certificate, intermediate certificates of subordinate
337
- # CAs, and the root certificate in that order. The certificate and
338
- # certificate chain are base64 encoded. If you want to decode the
339
- # certificate chain to see the individual certificate fields, you can
340
- # use OpenSSL.
347
+ # Retrieves a certificate specified by an ARN and its certificate chain
348
+ # . The chain is an ordered list of certificates that contains the end
349
+ # entity ertificate, intermediate certificates of subordinate CAs, and
350
+ # the root certificate in that order. The certificate and certificate
351
+ # chain are base64 encoded. If you want to decode the certificate to see
352
+ # the individual fields, you can use OpenSSL.
341
353
  #
342
354
  # @option params [required, String] :certificate_arn
343
355
  # String that contains a certificate ARN in the following format:
@@ -376,8 +388,9 @@ module Aws::ACM
376
388
  req.send_request(options)
377
389
  end
378
390
 
379
- # Imports an SSL/TLS certificate into AWS Certificate Manager (ACM) to
380
- # use with [ACM's integrated AWS services][1].
391
+ # Imports a certificate into AWS Certificate Manager (ACM) to use with
392
+ # services that are integrated with ACM. For more information, see
393
+ # [Integrated Services][1].
381
394
  #
382
395
  # <note markdown="1"> ACM does not provide [managed renewal][2] for certificates that you
383
396
  # import.
@@ -386,31 +399,48 @@ module Aws::ACM
386
399
  #
387
400
  # For more information about importing certificates into ACM, including
388
401
  # the differences between certificates that you import and those that
389
- # ACM provides, see [ Importing Certificates][3] in the *AWS Certificate
402
+ # ACM provides, see [Importing Certificates][3] in the *AWS Certificate
390
403
  # Manager User Guide*.
391
404
  #
392
- # To import a certificate, you must provide the certificate and the
393
- # matching private key. When the certificate is not self-signed, you
394
- # must also provide a certificate chain. You can omit the certificate
395
- # chain when importing a self-signed certificate.
405
+ # In general, you can import almost any valid certificate. However,
406
+ # services integrated with ACM allow only certificate types they support
407
+ # to be associated with their resources. The following guidelines are
408
+ # also important:
396
409
  #
397
- # The certificate, private key, and certificate chain must be
398
- # PEM-encoded. For more information about converting these items to PEM
399
- # format, see [Importing Certificates Troubleshooting][4] in the *AWS
400
- # Certificate Manager User Guide*.
410
+ # * You must enter the private key that matches the certificate you are
411
+ # importing.
401
412
  #
402
- # To import a new certificate, omit the `CertificateArn` field. Include
403
- # this field only when you want to replace a previously imported
404
- # certificate.
413
+ # * The private key must be unencrypted. You cannot import a private key
414
+ # that is protected by a password or a passphrase.
405
415
  #
406
- # When you import a certificate by using the CLI or one of the SDKs, you
407
- # must specify the certificate, chain, and private key parameters as
408
- # file names preceded by `file://`. For example, you can specify a
409
- # certificate saved in the `C:\temp` folder as
410
- # `C:\temp\certificate_to_import.pem`. If you are making an HTTP or
411
- # HTTPS Query request, include these parameters as BLOBs.
416
+ # * If the certificate you are importing is not self-signed, you must
417
+ # enter its certificate chain.
412
418
  #
413
- # This operation returns the [Amazon Resource Name (ARN)][5] of the
419
+ # * If a certificate chain is included, the issuer must be the subject
420
+ # of one of the certificates in the chain.
421
+ #
422
+ # * The certificate, private key, and certificate chain must be
423
+ # PEM-encoded.
424
+ #
425
+ # * The current time must be between the `Not Before` and `Not After`
426
+ # certificate fields.
427
+ #
428
+ # * The `Issuer` field must not be empty.
429
+ #
430
+ # * The OCSP authority URL must not exceed 1000 characters.
431
+ #
432
+ # * To import a new certificate, omit the `CertificateArn` field.
433
+ # Include this field only when you want to replace a previously
434
+ # imported certificate.
435
+ #
436
+ # * When you import a certificate by using the CLI or one of the SDKs,
437
+ # you must specify the certificate, certificate chain, and private key
438
+ # parameters as file names preceded by `file://`. For example, you can
439
+ # specify a certificate saved in the `C:\temp` folder as
440
+ # `C:\temp\certificate_to_import.pem`. If you are making an HTTP or
441
+ # HTTPS Query request, include these parameters as BLOBs.
442
+ #
443
+ # This operation returns the [Amazon Resource Name (ARN)][4] of the
414
444
  # imported certificate.
415
445
  #
416
446
  #
@@ -418,8 +448,7 @@ module Aws::ACM
418
448
  # [1]: http://docs.aws.amazon.com/acm/latest/userguide/acm-services.html
419
449
  # [2]: http://docs.aws.amazon.com/acm/latest/userguide/acm-renewal.html
420
450
  # [3]: http://docs.aws.amazon.com/acm/latest/userguide/import-certificate.html
421
- # [4]: http://docs.aws.amazon.com/acm/latest/userguide/import-certificate.html#import-certificate-troubleshooting
422
- # [5]: http://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html
451
+ # [4]: http://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html
423
452
  #
424
453
  # @option params [String] :certificate_arn
425
454
  # The [Amazon Resource Name (ARN)][1] of an imported certificate to
@@ -430,27 +459,13 @@ module Aws::ACM
430
459
  # [1]: http://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html
431
460
  #
432
461
  # @option params [required, String, IO] :certificate
433
- # The certificate to import. It must meet the following requirements:
434
- #
435
- # * Must be PEM-encoded.
436
- #
437
- # * Must contain a 1024-bit or 2048-bit RSA public key.
438
- #
439
- # * Must be valid at the time of import. You cannot import a certificate
440
- # before its validity period begins (the certificate's `NotBefore`
441
- # date) or after it expires (the certificate's `NotAfter` date).
462
+ # The certificate to import.
442
463
  #
443
464
  # @option params [required, String, IO] :private_key
444
- # The private key that matches the public key in the certificate. It
445
- # must meet the following requirements:
446
- #
447
- # * Must be PEM-encoded.
448
- #
449
- # * Must be unencrypted. You cannot import a private key that is
450
- # protected by a password or passphrase.
465
+ # The private key that matches the public key in the certificate.
451
466
  #
452
467
  # @option params [String, IO] :certificate_chain
453
- # The certificate chain. It must be PEM-encoded.
468
+ # The PEM encoded certificate chain.
454
469
  #
455
470
  # @return [Types::ImportCertificateResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
456
471
  #
@@ -478,13 +493,22 @@ module Aws::ACM
478
493
  req.send_request(options)
479
494
  end
480
495
 
481
- # Retrieves a list of ACM Certificates and the domain name for each. You
482
- # can optionally filter the list to return only the certificates that
483
- # match the specified status.
496
+ # Retrieves a list of certificate ARNs and domain names. You can request
497
+ # that only certificates that match a specific status be listed. You can
498
+ # also filter by specific attributes of the certificate.
484
499
  #
485
500
  # @option params [Array<String>] :certificate_statuses
486
- # The status or statuses on which to filter the list of ACM
487
- # Certificates.
501
+ # Filter the certificate list by status value.
502
+ #
503
+ # @option params [Types::Filters] :includes
504
+ # Filter the certificate list by one or more of the following values.
505
+ # For more information, see the Filters structure.
506
+ #
507
+ # * extendedKeyUsage
508
+ #
509
+ # * keyUsage
510
+ #
511
+ # * keyTypes
488
512
  #
489
513
  # @option params [String] :next_token
490
514
  # Use this parameter only when paginating results and only in a
@@ -508,6 +532,11 @@ module Aws::ACM
508
532
  #
509
533
  # resp = client.list_certificates({
510
534
  # certificate_statuses: ["PENDING_VALIDATION"], # accepts PENDING_VALIDATION, ISSUED, INACTIVE, EXPIRED, VALIDATION_TIMED_OUT, REVOKED, FAILED
535
+ # includes: {
536
+ # extended_key_usage: ["TLS_WEB_SERVER_AUTHENTICATION"], # accepts TLS_WEB_SERVER_AUTHENTICATION, TLS_WEB_CLIENT_AUTHENTICATION, CODE_SIGNING, EMAIL_PROTECTION, TIME_STAMPING, OCSP_SIGNING, IPSEC_END_SYSTEM, IPSEC_TUNNEL, IPSEC_USER, ANY, NONE, CUSTOM
537
+ # key_usage: ["DIGITAL_SIGNATURE"], # accepts DIGITAL_SIGNATURE, NON_REPUDIATION, KEY_ENCIPHERMENT, DATA_ENCIPHERMENT, KEY_AGREEMENT, CERTIFICATE_SIGNING, CRL_SIGNING, ENCIPHER_ONLY, DECIPHER_ONLY, ANY, CUSTOM
538
+ # key_types: ["RSA_2048"], # accepts RSA_2048, RSA_1024, RSA_4096, EC_prime256v1, EC_secp384r1, EC_secp521r1
539
+ # },
511
540
  # next_token: "NextToken",
512
541
  # max_items: 1,
513
542
  # })
@@ -535,7 +564,7 @@ module Aws::ACM
535
564
  #
536
565
  # @option params [required, String] :certificate_arn
537
566
  # String that contains the ARN of the ACM Certificate for which you want
538
- # to list the tags. This has the following form:
567
+ # to list the tags. This must have the following form:
539
568
  #
540
569
  # `arn:aws:acm:region:123456789012:certificate/12345678-1234-1234-1234-123456789012`
541
570
  #
@@ -649,21 +678,12 @@ module Aws::ACM
649
678
  # the same domain. For example, *.example.com protects www.example.com,
650
679
  # site.example.com, and images.example.com.
651
680
  #
652
- # The maximum length of a DNS name is 253 octets. The name is made up of
653
- # multiple labels separated by periods. No label can be longer than 63
654
- # octets. Consider the following examples:
655
- #
656
- # `(63 octets).(63 octets).(63 octets).(61 octets)` is legal because the
657
- # total length is 253 octets (63+1+63+1+63+1+61) and no label exceeds 63
658
- # octets.
659
- #
660
- # `(64 octets).(63 octets).(63 octets).(61 octets)` is not legal because
661
- # the total length exceeds 253 octets (64+1+63+1+63+1+61) and the first
662
- # label exceeds 63 octets.
681
+ # The first domain name you enter cannot exceed 63 octets, including
682
+ # periods. Each subsequent Subject Alternative Name (SAN), however, can
683
+ # be up to 253 octets in length.
663
684
  #
664
- # `(63 octets).(63 octets).(63 octets).(62 octets)` is not legal because
665
- # the total length of the DNS name (63+1+63+1+63+1+62) exceeds 253
666
- # octets.
685
+ # @option params [String] :validation_method
686
+ # The method you want to use to validate your domain.
667
687
  #
668
688
  # @option params [Array<String>] :subject_alternative_names
669
689
  # Additional FQDNs to be included in the Subject Alternative Name
@@ -675,6 +695,22 @@ module Aws::ACM
675
695
  # more than 10 names, you must request a limit increase. For more
676
696
  # information, see [Limits][1].
677
697
  #
698
+ # The maximum length of a SAN DNS name is 253 octets. The name is made
699
+ # up of multiple labels separated by periods. No label can be longer
700
+ # than 63 octets. Consider the following examples:
701
+ #
702
+ # * `(63 octets).(63 octets).(63 octets).(61 octets)` is legal because
703
+ # the total length is 253 octets (63+1+63+1+63+1+61) and no label
704
+ # exceeds 63 octets.
705
+ #
706
+ # * `(64 octets).(63 octets).(63 octets).(61 octets)` is not legal
707
+ # because the total length exceeds 253 octets (64+1+63+1+63+1+61) and
708
+ # the first label exceeds 63 octets.
709
+ #
710
+ # * `(63 octets).(63 octets).(63 octets).(62 octets)` is not legal
711
+ # because the total length of the DNS name (63+1+63+1+63+1+62) exceeds
712
+ # 253 octets.
713
+ #
678
714
  #
679
715
  #
680
716
  # [1]: http://docs.aws.amazon.com/acm/latest/userguide/acm-limits.html
@@ -689,8 +725,8 @@ module Aws::ACM
689
725
  # requesting multiple certificates.
690
726
  #
691
727
  # @option params [Array<Types::DomainValidationOption>] :domain_validation_options
692
- # The domain name that you want ACM to use to send you emails to
693
- # validate your ownership of the domain.
728
+ # The domain name that you want ACM to use to send you emails so taht
729
+ # your can validate domain ownership.
694
730
  #
695
731
  # @return [Types::RequestCertificateResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
696
732
  #
@@ -700,6 +736,7 @@ module Aws::ACM
700
736
  #
701
737
  # resp = client.request_certificate({
702
738
  # domain_name: "DomainNameString", # required
739
+ # validation_method: "EMAIL", # accepts EMAIL, DNS
703
740
  # subject_alternative_names: ["DomainNameString"],
704
741
  # idempotency_token: "IdempotencyToken",
705
742
  # domain_validation_options: [
@@ -745,9 +782,7 @@ module Aws::ACM
745
782
  # certificate ARN is generated and returned by the RequestCertificate
746
783
  # action as soon as the request is made. By default, using this
747
784
  # parameter causes email to be sent to all top-level domains you
748
- # specified in the certificate request.
749
- #
750
- # The ARN must be of the form:
785
+ # specified in the certificate request. The ARN must be of the form:
751
786
  #
752
787
  # `arn:aws:acm:us-east-1:123456789012:certificate/12345678-1234-1234-1234-123456789012`
753
788
  #
@@ -807,7 +842,7 @@ module Aws::ACM
807
842
  params: params,
808
843
  config: config)
809
844
  context[:gem_name] = 'aws-sdk-acm'
810
- context[:gem_version] = '1.1.0'
845
+ context[:gem_version] = '1.2.0'
811
846
  Seahorse::Client::Request.new(handlers, context)
812
847
  end
813
848
 
@@ -33,7 +33,12 @@ module Aws::ACM
33
33
  DomainValidationList = Shapes::ListShape.new(name: 'DomainValidationList')
34
34
  DomainValidationOption = Shapes::StructureShape.new(name: 'DomainValidationOption')
35
35
  DomainValidationOptionList = Shapes::ListShape.new(name: 'DomainValidationOptionList')
36
+ ExtendedKeyUsage = Shapes::StructureShape.new(name: 'ExtendedKeyUsage')
37
+ ExtendedKeyUsageFilterList = Shapes::ListShape.new(name: 'ExtendedKeyUsageFilterList')
38
+ ExtendedKeyUsageList = Shapes::ListShape.new(name: 'ExtendedKeyUsageList')
39
+ ExtendedKeyUsageName = Shapes::StringShape.new(name: 'ExtendedKeyUsageName')
36
40
  FailureReason = Shapes::StringShape.new(name: 'FailureReason')
41
+ Filters = Shapes::StructureShape.new(name: 'Filters')
37
42
  GetCertificateRequest = Shapes::StructureShape.new(name: 'GetCertificateRequest')
38
43
  GetCertificateResponse = Shapes::StructureShape.new(name: 'GetCertificateResponse')
39
44
  IdempotencyToken = Shapes::StringShape.new(name: 'IdempotencyToken')
@@ -45,6 +50,11 @@ module Aws::ACM
45
50
  InvalidStateException = Shapes::StructureShape.new(name: 'InvalidStateException')
46
51
  InvalidTagException = Shapes::StructureShape.new(name: 'InvalidTagException')
47
52
  KeyAlgorithm = Shapes::StringShape.new(name: 'KeyAlgorithm')
53
+ KeyAlgorithmList = Shapes::ListShape.new(name: 'KeyAlgorithmList')
54
+ KeyUsage = Shapes::StructureShape.new(name: 'KeyUsage')
55
+ KeyUsageFilterList = Shapes::ListShape.new(name: 'KeyUsageFilterList')
56
+ KeyUsageList = Shapes::ListShape.new(name: 'KeyUsageList')
57
+ KeyUsageName = Shapes::StringShape.new(name: 'KeyUsageName')
48
58
  LimitExceededException = Shapes::StructureShape.new(name: 'LimitExceededException')
49
59
  ListCertificatesRequest = Shapes::StructureShape.new(name: 'ListCertificatesRequest')
50
60
  ListCertificatesResponse = Shapes::StructureShape.new(name: 'ListCertificatesResponse')
@@ -53,6 +63,7 @@ module Aws::ACM
53
63
  MaxItems = Shapes::IntegerShape.new(name: 'MaxItems')
54
64
  NextToken = Shapes::StringShape.new(name: 'NextToken')
55
65
  PrivateKeyBlob = Shapes::BlobShape.new(name: 'PrivateKeyBlob')
66
+ RecordType = Shapes::StringShape.new(name: 'RecordType')
56
67
  RemoveTagsFromCertificateRequest = Shapes::StructureShape.new(name: 'RemoveTagsFromCertificateRequest')
57
68
  RenewalStatus = Shapes::StringShape.new(name: 'RenewalStatus')
58
69
  RenewalSummary = Shapes::StructureShape.new(name: 'RenewalSummary')
@@ -62,6 +73,7 @@ module Aws::ACM
62
73
  ResendValidationEmailRequest = Shapes::StructureShape.new(name: 'ResendValidationEmailRequest')
63
74
  ResourceInUseException = Shapes::StructureShape.new(name: 'ResourceInUseException')
64
75
  ResourceNotFoundException = Shapes::StructureShape.new(name: 'ResourceNotFoundException')
76
+ ResourceRecord = Shapes::StructureShape.new(name: 'ResourceRecord')
65
77
  RevocationReason = Shapes::StringShape.new(name: 'RevocationReason')
66
78
  String = Shapes::StringShape.new(name: 'String')
67
79
  TStamp = Shapes::TimestampShape.new(name: 'TStamp')
@@ -71,6 +83,7 @@ module Aws::ACM
71
83
  TagValue = Shapes::StringShape.new(name: 'TagValue')
72
84
  TooManyTagsException = Shapes::StructureShape.new(name: 'TooManyTagsException')
73
85
  ValidationEmailList = Shapes::ListShape.new(name: 'ValidationEmailList')
86
+ ValidationMethod = Shapes::StringShape.new(name: 'ValidationMethod')
74
87
 
75
88
  AddTagsToCertificateRequest.add_member(:certificate_arn, Shapes::ShapeRef.new(shape: Arn, required: true, location_name: "CertificateArn"))
76
89
  AddTagsToCertificateRequest.add_member(:tags, Shapes::ShapeRef.new(shape: TagList, required: true, location_name: "Tags"))
@@ -97,6 +110,8 @@ module Aws::ACM
97
110
  CertificateDetail.add_member(:failure_reason, Shapes::ShapeRef.new(shape: FailureReason, location_name: "FailureReason"))
98
111
  CertificateDetail.add_member(:type, Shapes::ShapeRef.new(shape: CertificateType, location_name: "Type"))
99
112
  CertificateDetail.add_member(:renewal_summary, Shapes::ShapeRef.new(shape: RenewalSummary, location_name: "RenewalSummary"))
113
+ CertificateDetail.add_member(:key_usages, Shapes::ShapeRef.new(shape: KeyUsageList, location_name: "KeyUsages"))
114
+ CertificateDetail.add_member(:extended_key_usages, Shapes::ShapeRef.new(shape: ExtendedKeyUsageList, location_name: "ExtendedKeyUsages"))
100
115
  CertificateDetail.struct_class = Types::CertificateDetail
101
116
 
102
117
  CertificateStatuses.member = Shapes::ShapeRef.new(shape: CertificateStatus)
@@ -122,6 +137,8 @@ module Aws::ACM
122
137
  DomainValidation.add_member(:validation_emails, Shapes::ShapeRef.new(shape: ValidationEmailList, location_name: "ValidationEmails"))
123
138
  DomainValidation.add_member(:validation_domain, Shapes::ShapeRef.new(shape: DomainNameString, location_name: "ValidationDomain"))
124
139
  DomainValidation.add_member(:validation_status, Shapes::ShapeRef.new(shape: DomainStatus, location_name: "ValidationStatus"))
140
+ DomainValidation.add_member(:resource_record, Shapes::ShapeRef.new(shape: ResourceRecord, location_name: "ResourceRecord"))
141
+ DomainValidation.add_member(:validation_method, Shapes::ShapeRef.new(shape: ValidationMethod, location_name: "ValidationMethod"))
125
142
  DomainValidation.struct_class = Types::DomainValidation
126
143
 
127
144
  DomainValidationList.member = Shapes::ShapeRef.new(shape: DomainValidation)
@@ -132,6 +149,19 @@ module Aws::ACM
132
149
 
133
150
  DomainValidationOptionList.member = Shapes::ShapeRef.new(shape: DomainValidationOption)
134
151
 
152
+ ExtendedKeyUsage.add_member(:name, Shapes::ShapeRef.new(shape: ExtendedKeyUsageName, location_name: "Name"))
153
+ ExtendedKeyUsage.add_member(:oid, Shapes::ShapeRef.new(shape: String, location_name: "OID"))
154
+ ExtendedKeyUsage.struct_class = Types::ExtendedKeyUsage
155
+
156
+ ExtendedKeyUsageFilterList.member = Shapes::ShapeRef.new(shape: ExtendedKeyUsageName)
157
+
158
+ ExtendedKeyUsageList.member = Shapes::ShapeRef.new(shape: ExtendedKeyUsage)
159
+
160
+ Filters.add_member(:extended_key_usage, Shapes::ShapeRef.new(shape: ExtendedKeyUsageFilterList, location_name: "extendedKeyUsage"))
161
+ Filters.add_member(:key_usage, Shapes::ShapeRef.new(shape: KeyUsageFilterList, location_name: "keyUsage"))
162
+ Filters.add_member(:key_types, Shapes::ShapeRef.new(shape: KeyAlgorithmList, location_name: "keyTypes"))
163
+ Filters.struct_class = Types::Filters
164
+
135
165
  GetCertificateRequest.add_member(:certificate_arn, Shapes::ShapeRef.new(shape: Arn, required: true, location_name: "CertificateArn"))
136
166
  GetCertificateRequest.struct_class = Types::GetCertificateRequest
137
167
 
@@ -150,7 +180,17 @@ module Aws::ACM
150
180
 
151
181
  InUseList.member = Shapes::ShapeRef.new(shape: String)
152
182
 
183
+ KeyAlgorithmList.member = Shapes::ShapeRef.new(shape: KeyAlgorithm)
184
+
185
+ KeyUsage.add_member(:name, Shapes::ShapeRef.new(shape: KeyUsageName, location_name: "Name"))
186
+ KeyUsage.struct_class = Types::KeyUsage
187
+
188
+ KeyUsageFilterList.member = Shapes::ShapeRef.new(shape: KeyUsageName)
189
+
190
+ KeyUsageList.member = Shapes::ShapeRef.new(shape: KeyUsage)
191
+
153
192
  ListCertificatesRequest.add_member(:certificate_statuses, Shapes::ShapeRef.new(shape: CertificateStatuses, location_name: "CertificateStatuses"))
193
+ ListCertificatesRequest.add_member(:includes, Shapes::ShapeRef.new(shape: Filters, location_name: "Includes"))
154
194
  ListCertificatesRequest.add_member(:next_token, Shapes::ShapeRef.new(shape: NextToken, location_name: "NextToken"))
155
195
  ListCertificatesRequest.add_member(:max_items, Shapes::ShapeRef.new(shape: MaxItems, location_name: "MaxItems"))
156
196
  ListCertificatesRequest.struct_class = Types::ListCertificatesRequest
@@ -174,6 +214,7 @@ module Aws::ACM
174
214
  RenewalSummary.struct_class = Types::RenewalSummary
175
215
 
176
216
  RequestCertificateRequest.add_member(:domain_name, Shapes::ShapeRef.new(shape: DomainNameString, required: true, location_name: "DomainName"))
217
+ RequestCertificateRequest.add_member(:validation_method, Shapes::ShapeRef.new(shape: ValidationMethod, location_name: "ValidationMethod"))
177
218
  RequestCertificateRequest.add_member(:subject_alternative_names, Shapes::ShapeRef.new(shape: DomainList, location_name: "SubjectAlternativeNames"))
178
219
  RequestCertificateRequest.add_member(:idempotency_token, Shapes::ShapeRef.new(shape: IdempotencyToken, location_name: "IdempotencyToken"))
179
220
  RequestCertificateRequest.add_member(:domain_validation_options, Shapes::ShapeRef.new(shape: DomainValidationOptionList, location_name: "DomainValidationOptions"))
@@ -187,6 +228,11 @@ module Aws::ACM
187
228
  ResendValidationEmailRequest.add_member(:validation_domain, Shapes::ShapeRef.new(shape: DomainNameString, required: true, location_name: "ValidationDomain"))
188
229
  ResendValidationEmailRequest.struct_class = Types::ResendValidationEmailRequest
189
230
 
231
+ ResourceRecord.add_member(:name, Shapes::ShapeRef.new(shape: String, required: true, location_name: "Name"))
232
+ ResourceRecord.add_member(:type, Shapes::ShapeRef.new(shape: RecordType, required: true, location_name: "Type"))
233
+ ResourceRecord.add_member(:value, Shapes::ShapeRef.new(shape: String, required: true, location_name: "Value"))
234
+ ResourceRecord.struct_class = Types::ResourceRecord
235
+
190
236
  Tag.add_member(:key, Shapes::ShapeRef.new(shape: TagKey, required: true, location_name: "Key"))
191
237
  Tag.add_member(:value, Shapes::ShapeRef.new(shape: TagValue, location_name: "Value"))
192
238
  Tag.struct_class = Types::Tag
@@ -132,8 +132,7 @@ module Aws::ACM
132
132
  # @return [Time]
133
133
  #
134
134
  # @!attribute [rw] key_algorithm
135
- # The algorithm that was used to generate the key pair (the public and
136
- # private key).
135
+ # The algorithm that was used to generate the public-private key pair.
137
136
  # @return [String]
138
137
  #
139
138
  # @!attribute [rw] signature_algorithm
@@ -181,6 +180,19 @@ module Aws::ACM
181
180
  # [1]: http://docs.aws.amazon.com/acm/latest/userguide/acm-renewal.html
182
181
  # @return [Types::RenewalSummary]
183
182
  #
183
+ # @!attribute [rw] key_usages
184
+ # A list of Key Usage X.509 v3 extension objects. Each object is a
185
+ # string value that identifies the purpose of the public key contained
186
+ # in the certificate. Possible extension values include
187
+ # DIGITAL\_SIGNATURE, KEY\_ENCHIPHERMENT, NON\_REPUDIATION, and more.
188
+ # @return [Array<Types::KeyUsage>]
189
+ #
190
+ # @!attribute [rw] extended_key_usages
191
+ # Contains a list of Extended Key Usage X.509 v3 extension objects.
192
+ # Each object specifies a purpose for which the certificate public key
193
+ # can be used and consists of a name and an object identifier (OID).
194
+ # @return [Array<Types::ExtendedKeyUsage>]
195
+ #
184
196
  # @see http://docs.aws.amazon.com/goto/WebAPI/acm-2015-12-08/CertificateDetail AWS API Documentation
185
197
  #
186
198
  class CertificateDetail < Struct.new(
@@ -204,7 +216,9 @@ module Aws::ACM
204
216
  :in_use_by,
205
217
  :failure_reason,
206
218
  :type,
207
- :renewal_summary)
219
+ :renewal_summary,
220
+ :key_usages,
221
+ :extended_key_usages)
208
222
  include Aws::Structure
209
223
  end
210
224
 
@@ -322,7 +336,28 @@ module Aws::ACM
322
336
  # @return [String]
323
337
  #
324
338
  # @!attribute [rw] validation_status
325
- # The validation status of the domain name.
339
+ # The validation status of the domain name. This can be one of the
340
+ # following values:
341
+ #
342
+ # * `PENDING_VALIDATION`
343
+ #
344
+ # * ``SUCCESS
345
+ #
346
+ # * ``FAILED
347
+ # @return [String]
348
+ #
349
+ # @!attribute [rw] resource_record
350
+ # Contains the CNAME record that you add to your DNS database for
351
+ # domain validation. For more information, see [Use DNS to Validate
352
+ # Domain Ownership][1].
353
+ #
354
+ #
355
+ #
356
+ # [1]: http://docs.aws.amazon.com/acm/latest/userguide/gs-acm-validate-dns.html
357
+ # @return [Types::ResourceRecord]
358
+ #
359
+ # @!attribute [rw] validation_method
360
+ # Specifies the domain validation method.
326
361
  # @return [String]
327
362
  #
328
363
  # @see http://docs.aws.amazon.com/goto/WebAPI/acm-2015-12-08/DomainValidation AWS API Documentation
@@ -331,12 +366,14 @@ module Aws::ACM
331
366
  :domain_name,
332
367
  :validation_emails,
333
368
  :validation_domain,
334
- :validation_status)
369
+ :validation_status,
370
+ :resource_record,
371
+ :validation_method)
335
372
  include Aws::Structure
336
373
  end
337
374
 
338
375
  # Contains information about the domain names that you want ACM to use
339
- # to send you emails to validate your ownership of the domain.
376
+ # to send you emails that enable you to validate domain ownership.
340
377
  #
341
378
  # @note When making an API call, you may pass DomainValidationOption
342
379
  # data as a hash:
@@ -378,6 +415,80 @@ module Aws::ACM
378
415
  include Aws::Structure
379
416
  end
380
417
 
418
+ # The Extended Key Usage X.509 v3 extension defines one or more purposes
419
+ # for which the public key can be used. This is in addition to or in
420
+ # place of the basic purposes specified by the Key Usage extension.
421
+ #
422
+ # @!attribute [rw] name
423
+ # The name of an Extended Key Usage value.
424
+ # @return [String]
425
+ #
426
+ # @!attribute [rw] oid
427
+ # An object identifier (OID) for the extension value. OIDs are strings
428
+ # of numbers separated by periods. The following OIDs are defined in
429
+ # RFC 3280 and RFC 5280.
430
+ #
431
+ # * `1.3.6.1.5.5.7.3.1 (TLS_WEB_SERVER_AUTHENTICATION)`
432
+ #
433
+ # * `1.3.6.1.5.5.7.3.2 (TLS_WEB_CLIENT_AUTHENTICATION)`
434
+ #
435
+ # * `1.3.6.1.5.5.7.3.3 (CODE_SIGNING)`
436
+ #
437
+ # * `1.3.6.1.5.5.7.3.4 (EMAIL_PROTECTION)`
438
+ #
439
+ # * `1.3.6.1.5.5.7.3.8 (TIME_STAMPING)`
440
+ #
441
+ # * `1.3.6.1.5.5.7.3.9 (OCSP_SIGNING)`
442
+ #
443
+ # * `1.3.6.1.5.5.7.3.5 (IPSEC_END_SYSTEM)`
444
+ #
445
+ # * `1.3.6.1.5.5.7.3.6 (IPSEC_TUNNEL)`
446
+ #
447
+ # * `1.3.6.1.5.5.7.3.7 (IPSEC_USER)`
448
+ # @return [String]
449
+ #
450
+ # @see http://docs.aws.amazon.com/goto/WebAPI/acm-2015-12-08/ExtendedKeyUsage AWS API Documentation
451
+ #
452
+ class ExtendedKeyUsage < Struct.new(
453
+ :name,
454
+ :oid)
455
+ include Aws::Structure
456
+ end
457
+
458
+ # This structure can be used in the ListCertificates action to filter
459
+ # the output of the certificate list.
460
+ #
461
+ # @note When making an API call, you may pass Filters
462
+ # data as a hash:
463
+ #
464
+ # {
465
+ # extended_key_usage: ["TLS_WEB_SERVER_AUTHENTICATION"], # accepts TLS_WEB_SERVER_AUTHENTICATION, TLS_WEB_CLIENT_AUTHENTICATION, CODE_SIGNING, EMAIL_PROTECTION, TIME_STAMPING, OCSP_SIGNING, IPSEC_END_SYSTEM, IPSEC_TUNNEL, IPSEC_USER, ANY, NONE, CUSTOM
466
+ # key_usage: ["DIGITAL_SIGNATURE"], # accepts DIGITAL_SIGNATURE, NON_REPUDIATION, KEY_ENCIPHERMENT, DATA_ENCIPHERMENT, KEY_AGREEMENT, CERTIFICATE_SIGNING, CRL_SIGNING, ENCIPHER_ONLY, DECIPHER_ONLY, ANY, CUSTOM
467
+ # key_types: ["RSA_2048"], # accepts RSA_2048, RSA_1024, RSA_4096, EC_prime256v1, EC_secp384r1, EC_secp521r1
468
+ # }
469
+ #
470
+ # @!attribute [rw] extended_key_usage
471
+ # Specify one or more ExtendedKeyUsage extension values.
472
+ # @return [Array<String>]
473
+ #
474
+ # @!attribute [rw] key_usage
475
+ # Specify one or more KeyUsage extension values.
476
+ # @return [Array<String>]
477
+ #
478
+ # @!attribute [rw] key_types
479
+ # Specify one or more algorithms that can be used to generate key
480
+ # pairs.
481
+ # @return [Array<String>]
482
+ #
483
+ # @see http://docs.aws.amazon.com/goto/WebAPI/acm-2015-12-08/Filters AWS API Documentation
484
+ #
485
+ class Filters < Struct.new(
486
+ :extended_key_usage,
487
+ :key_usage,
488
+ :key_types)
489
+ include Aws::Structure
490
+ end
491
+
381
492
  # @note When making an API call, you may pass GetCertificateRequest
382
493
  # data as a hash:
383
494
  #
@@ -443,30 +554,15 @@ module Aws::ACM
443
554
  # @return [String]
444
555
  #
445
556
  # @!attribute [rw] certificate
446
- # The certificate to import. It must meet the following requirements:
447
- #
448
- # * Must be PEM-encoded.
449
- #
450
- # * Must contain a 1024-bit or 2048-bit RSA public key.
451
- #
452
- # * Must be valid at the time of import. You cannot import a
453
- # certificate before its validity period begins (the certificate's
454
- # `NotBefore` date) or after it expires (the certificate's
455
- # `NotAfter` date).
557
+ # The certificate to import.
456
558
  # @return [String]
457
559
  #
458
560
  # @!attribute [rw] private_key
459
- # The private key that matches the public key in the certificate. It
460
- # must meet the following requirements:
461
- #
462
- # * Must be PEM-encoded.
463
- #
464
- # * Must be unencrypted. You cannot import a private key that is
465
- # protected by a password or passphrase.
561
+ # The private key that matches the public key in the certificate.
466
562
  # @return [String]
467
563
  #
468
564
  # @!attribute [rw] certificate_chain
469
- # The certificate chain. It must be PEM-encoded.
565
+ # The PEM encoded certificate chain.
470
566
  # @return [String]
471
567
  #
472
568
  # @see http://docs.aws.amazon.com/goto/WebAPI/acm-2015-12-08/ImportCertificateRequest AWS API Documentation
@@ -494,20 +590,49 @@ module Aws::ACM
494
590
  include Aws::Structure
495
591
  end
496
592
 
593
+ # The Key Usage X.509 v3 extension defines the purpose of the public key
594
+ # contained in the certificate.
595
+ #
596
+ # @!attribute [rw] name
597
+ # A string value that contains a Key Usage extension name.
598
+ # @return [String]
599
+ #
600
+ # @see http://docs.aws.amazon.com/goto/WebAPI/acm-2015-12-08/KeyUsage AWS API Documentation
601
+ #
602
+ class KeyUsage < Struct.new(
603
+ :name)
604
+ include Aws::Structure
605
+ end
606
+
497
607
  # @note When making an API call, you may pass ListCertificatesRequest
498
608
  # data as a hash:
499
609
  #
500
610
  # {
501
611
  # certificate_statuses: ["PENDING_VALIDATION"], # accepts PENDING_VALIDATION, ISSUED, INACTIVE, EXPIRED, VALIDATION_TIMED_OUT, REVOKED, FAILED
612
+ # includes: {
613
+ # extended_key_usage: ["TLS_WEB_SERVER_AUTHENTICATION"], # accepts TLS_WEB_SERVER_AUTHENTICATION, TLS_WEB_CLIENT_AUTHENTICATION, CODE_SIGNING, EMAIL_PROTECTION, TIME_STAMPING, OCSP_SIGNING, IPSEC_END_SYSTEM, IPSEC_TUNNEL, IPSEC_USER, ANY, NONE, CUSTOM
614
+ # key_usage: ["DIGITAL_SIGNATURE"], # accepts DIGITAL_SIGNATURE, NON_REPUDIATION, KEY_ENCIPHERMENT, DATA_ENCIPHERMENT, KEY_AGREEMENT, CERTIFICATE_SIGNING, CRL_SIGNING, ENCIPHER_ONLY, DECIPHER_ONLY, ANY, CUSTOM
615
+ # key_types: ["RSA_2048"], # accepts RSA_2048, RSA_1024, RSA_4096, EC_prime256v1, EC_secp384r1, EC_secp521r1
616
+ # },
502
617
  # next_token: "NextToken",
503
618
  # max_items: 1,
504
619
  # }
505
620
  #
506
621
  # @!attribute [rw] certificate_statuses
507
- # The status or statuses on which to filter the list of ACM
508
- # Certificates.
622
+ # Filter the certificate list by status value.
509
623
  # @return [Array<String>]
510
624
  #
625
+ # @!attribute [rw] includes
626
+ # Filter the certificate list by one or more of the following values.
627
+ # For more information, see the Filters structure.
628
+ #
629
+ # * extendedKeyUsage
630
+ #
631
+ # * keyUsage
632
+ #
633
+ # * keyTypes
634
+ # @return [Types::Filters]
635
+ #
511
636
  # @!attribute [rw] next_token
512
637
  # Use this parameter only when paginating results and only in a
513
638
  # subsequent request after you receive a response with truncated
@@ -527,6 +652,7 @@ module Aws::ACM
527
652
  #
528
653
  class ListCertificatesRequest < Struct.new(
529
654
  :certificate_statuses,
655
+ :includes,
530
656
  :next_token,
531
657
  :max_items)
532
658
  include Aws::Structure
@@ -559,7 +685,7 @@ module Aws::ACM
559
685
  #
560
686
  # @!attribute [rw] certificate_arn
561
687
  # String that contains the ARN of the ACM Certificate for which you
562
- # want to list the tags. This has the following form:
688
+ # want to list the tags. This must have the following form:
563
689
  #
564
690
  # `arn:aws:acm:region:123456789012:certificate/12345678-1234-1234-1234-123456789012`
565
691
  #
@@ -669,6 +795,7 @@ module Aws::ACM
669
795
  #
670
796
  # {
671
797
  # domain_name: "DomainNameString", # required
798
+ # validation_method: "EMAIL", # accepts EMAIL, DNS
672
799
  # subject_alternative_names: ["DomainNameString"],
673
800
  # idempotency_token: "IdempotencyToken",
674
801
  # domain_validation_options: [
@@ -686,21 +813,13 @@ module Aws::ACM
686
813
  # sites in the same domain. For example, *.example.com protects
687
814
  # www.example.com, site.example.com, and images.example.com.
688
815
  #
689
- # The maximum length of a DNS name is 253 octets. The name is made up
690
- # of multiple labels separated by periods. No label can be longer than
691
- # 63 octets. Consider the following examples:
692
- #
693
- # `(63 octets).(63 octets).(63 octets).(61 octets)` is legal because
694
- # the total length is 253 octets (63+1+63+1+63+1+61) and no label
695
- # exceeds 63 octets.
696
- #
697
- # `(64 octets).(63 octets).(63 octets).(61 octets)` is not legal
698
- # because the total length exceeds 253 octets (64+1+63+1+63+1+61) and
699
- # the first label exceeds 63 octets.
816
+ # The first domain name you enter cannot exceed 63 octets, including
817
+ # periods. Each subsequent Subject Alternative Name (SAN), however,
818
+ # can be up to 253 octets in length.
819
+ # @return [String]
700
820
  #
701
- # `(63 octets).(63 octets).(63 octets).(62 octets)` is not legal
702
- # because the total length of the DNS name (63+1+63+1+63+1+62) exceeds
703
- # 253 octets.
821
+ # @!attribute [rw] validation_method
822
+ # The method you want to use to validate your domain.
704
823
  # @return [String]
705
824
  #
706
825
  # @!attribute [rw] subject_alternative_names
@@ -713,6 +832,22 @@ module Aws::ACM
713
832
  # If you need more than 10 names, you must request a limit increase.
714
833
  # For more information, see [Limits][1].
715
834
  #
835
+ # The maximum length of a SAN DNS name is 253 octets. The name is made
836
+ # up of multiple labels separated by periods. No label can be longer
837
+ # than 63 octets. Consider the following examples:
838
+ #
839
+ # * `(63 octets).(63 octets).(63 octets).(61 octets)` is legal because
840
+ # the total length is 253 octets (63+1+63+1+63+1+61) and no label
841
+ # exceeds 63 octets.
842
+ #
843
+ # * `(64 octets).(63 octets).(63 octets).(61 octets)` is not legal
844
+ # because the total length exceeds 253 octets (64+1+63+1+63+1+61)
845
+ # and the first label exceeds 63 octets.
846
+ #
847
+ # * `(63 octets).(63 octets).(63 octets).(62 octets)` is not legal
848
+ # because the total length of the DNS name (63+1+63+1+63+1+62)
849
+ # exceeds 253 octets.
850
+ #
716
851
  #
717
852
  #
718
853
  # [1]: http://docs.aws.amazon.com/acm/latest/userguide/acm-limits.html
@@ -729,14 +864,15 @@ module Aws::ACM
729
864
  # @return [String]
730
865
  #
731
866
  # @!attribute [rw] domain_validation_options
732
- # The domain name that you want ACM to use to send you emails to
733
- # validate your ownership of the domain.
867
+ # The domain name that you want ACM to use to send you emails so taht
868
+ # your can validate domain ownership.
734
869
  # @return [Array<Types::DomainValidationOption>]
735
870
  #
736
871
  # @see http://docs.aws.amazon.com/goto/WebAPI/acm-2015-12-08/RequestCertificateRequest AWS API Documentation
737
872
  #
738
873
  class RequestCertificateRequest < Struct.new(
739
874
  :domain_name,
875
+ :validation_method,
740
876
  :subject_alternative_names,
741
877
  :idempotency_token,
742
878
  :domain_validation_options)
@@ -771,9 +907,7 @@ module Aws::ACM
771
907
  # certificate ARN is generated and returned by the RequestCertificate
772
908
  # action as soon as the request is made. By default, using this
773
909
  # parameter causes email to be sent to all top-level domains you
774
- # specified in the certificate request.
775
- #
776
- # The ARN must be of the form:
910
+ # specified in the certificate request. The ARN must be of the form:
777
911
  #
778
912
  # `arn:aws:acm:us-east-1:123456789012:certificate/12345678-1234-1234-1234-123456789012`
779
913
  # @return [String]
@@ -813,6 +947,33 @@ module Aws::ACM
813
947
  include Aws::Structure
814
948
  end
815
949
 
950
+ # Contains a DNS record value that you can use to can use to validate
951
+ # ownership or control of a domain. This is used by the
952
+ # DescribeCertificate action.
953
+ #
954
+ # @!attribute [rw] name
955
+ # The name of the DNS record to create in your domain. This is
956
+ # supplied by ACM.
957
+ # @return [String]
958
+ #
959
+ # @!attribute [rw] type
960
+ # The type of DNS record. Currently this can be `CNAME`.
961
+ # @return [String]
962
+ #
963
+ # @!attribute [rw] value
964
+ # The value of the CNAME record to add to your DNS database. This is
965
+ # supplied by ACM.
966
+ # @return [String]
967
+ #
968
+ # @see http://docs.aws.amazon.com/goto/WebAPI/acm-2015-12-08/ResourceRecord AWS API Documentation
969
+ #
970
+ class ResourceRecord < Struct.new(
971
+ :name,
972
+ :type,
973
+ :value)
974
+ include Aws::Structure
975
+ end
976
+
816
977
  # A key-value pair that identifies or specifies metadata about an ACM
817
978
  # resource.
818
979
  #
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-acm
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.1.0
4
+ version: 1.2.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2017-11-01 00:00:00.000000000 Z
11
+ date: 2017-11-22 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core