aws-sdk-acm 1.53.0 → 1.54.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +5 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-acm/client.rb +24 -8
- data/lib/aws-sdk-acm/client_api.rb +7 -1
- data/lib/aws-sdk-acm/types.rb +21 -4
- data/lib/aws-sdk-acm.rb +1 -1
- metadata +2 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 2085e2ddda99653688c557569a63baf167aeb20176510c15b4975461a4aba04d
|
4
|
+
data.tar.gz: d9ebe9d64183257ab068f94729ff27dd6447666181e0dc2df9bd3cfb25ea0ef4
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 3f1db2ec7982360308a42a91592a1e10b091bdaebb087a0eb7b6e730eb3658b82abb90482fc7727377e8cad3db5208d126f1efd4693f7fa1fceae670fcff7528
|
7
|
+
data.tar.gz: ca6c4653dade74e3e20aba7ed4acf87b418dfcad4acf0c098b5717406c09d19224c8c405b45d4bfda5d0d3c816a3573e11aa97fe07db0e51107320ec48387005
|
data/CHANGELOG.md
CHANGED
@@ -1,6 +1,11 @@
|
|
1
1
|
Unreleased Changes
|
2
2
|
------------------
|
3
3
|
|
4
|
+
1.54.0 (2022-11-08)
|
5
|
+
------------------
|
6
|
+
|
7
|
+
* Feature - Support added for requesting elliptic curve certificate key algorithm types P-256 (EC_prime256v1) and P-384 (EC_secp384r1).
|
8
|
+
|
4
9
|
1.53.0 (2022-10-25)
|
5
10
|
------------------
|
6
11
|
|
data/VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
1.
|
1
|
+
1.54.0
|
data/lib/aws-sdk-acm/client.rb
CHANGED
@@ -1058,13 +1058,14 @@ module Aws::ACM
|
|
1058
1058
|
|
1059
1059
|
# Renews an eligible ACM certificate. At this time, only exported
|
1060
1060
|
# private certificates can be renewed with this operation. In order to
|
1061
|
-
# renew your
|
1062
|
-
# the ACM service principal permission to do so][1].
|
1063
|
-
# information, see [Testing Managed Renewal][2] in the ACM User
|
1061
|
+
# renew your Amazon Web Services Private CA certificates with ACM, you
|
1062
|
+
# must first [grant the ACM service principal permission to do so][1].
|
1063
|
+
# For more information, see [Testing Managed Renewal][2] in the ACM User
|
1064
|
+
# Guide.
|
1064
1065
|
#
|
1065
1066
|
#
|
1066
1067
|
#
|
1067
|
-
# [1]: https://docs.aws.amazon.com/
|
1068
|
+
# [1]: https://docs.aws.amazon.com/privateca/latest/userguide/PcaPermissions.html
|
1068
1069
|
# [2]: https://docs.aws.amazon.com/acm/latest/userguide/manual-renewal.html
|
1069
1070
|
#
|
1070
1071
|
# @option params [required, String] :certificate_arn
|
@@ -1214,18 +1215,32 @@ module Aws::ACM
|
|
1214
1215
|
# (CA) that will be used to issue the certificate. If you do not provide
|
1215
1216
|
# an ARN and you are trying to request a private certificate, ACM will
|
1216
1217
|
# attempt to issue a public certificate. For more information about
|
1217
|
-
# private CAs, see the [
|
1218
|
+
# private CAs, see the [Amazon Web Services Private Certificate
|
1218
1219
|
# Authority][1] user guide. The ARN must have the following form:
|
1219
1220
|
#
|
1220
1221
|
# `arn:aws:acm-pca:region:account:certificate-authority/12345678-1234-1234-1234-123456789012`
|
1221
1222
|
#
|
1222
1223
|
#
|
1223
1224
|
#
|
1224
|
-
# [1]: https://docs.aws.amazon.com/
|
1225
|
+
# [1]: https://docs.aws.amazon.com/privateca/latest/userguide/PcaWelcome.html
|
1225
1226
|
#
|
1226
1227
|
# @option params [Array<Types::Tag>] :tags
|
1227
1228
|
# One or more resource tags to associate with the certificate.
|
1228
1229
|
#
|
1230
|
+
# @option params [String] :key_algorithm
|
1231
|
+
# Specifies the algorithm of the public and private key pair that your
|
1232
|
+
# certificate uses to encrypt data. RSA is the default key algorithm for
|
1233
|
+
# ACM certificates. Elliptic Curve Digital Signature Algorithm (ECDSA)
|
1234
|
+
# keys are smaller, offering security comparable to RSA keys but with
|
1235
|
+
# greater computing efficiency. However, ECDSA is not supported by all
|
1236
|
+
# network clients. Some AWS services may require RSA keys, or only
|
1237
|
+
# support ECDSA keys of a particular size, while others allow the use of
|
1238
|
+
# either RSA and ECDSA keys to ensure that compatibility is not broken.
|
1239
|
+
# Check the requirements for the AWS service where you plan to deploy
|
1240
|
+
# your certificate.
|
1241
|
+
#
|
1242
|
+
# Default: RSA\_2048
|
1243
|
+
#
|
1229
1244
|
# @return [Types::RequestCertificateResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
1230
1245
|
#
|
1231
1246
|
# * {Types::RequestCertificateResponse#certificate_arn #certificate_arn} => String
|
@@ -1246,13 +1261,14 @@ module Aws::ACM
|
|
1246
1261
|
# options: {
|
1247
1262
|
# certificate_transparency_logging_preference: "ENABLED", # accepts ENABLED, DISABLED
|
1248
1263
|
# },
|
1249
|
-
# certificate_authority_arn: "
|
1264
|
+
# certificate_authority_arn: "PcaArn",
|
1250
1265
|
# tags: [
|
1251
1266
|
# {
|
1252
1267
|
# key: "TagKey", # required
|
1253
1268
|
# value: "TagValue",
|
1254
1269
|
# },
|
1255
1270
|
# ],
|
1271
|
+
# key_algorithm: "RSA_1024", # accepts RSA_1024, RSA_2048, RSA_3072, RSA_4096, EC_prime256v1, EC_secp384r1, EC_secp521r1
|
1256
1272
|
# })
|
1257
1273
|
#
|
1258
1274
|
# @example Response structure
|
@@ -1393,7 +1409,7 @@ module Aws::ACM
|
|
1393
1409
|
params: params,
|
1394
1410
|
config: config)
|
1395
1411
|
context[:gem_name] = 'aws-sdk-acm'
|
1396
|
-
context[:gem_version] = '1.
|
1412
|
+
context[:gem_version] = '1.54.0'
|
1397
1413
|
Seahorse::Client::Request.new(handlers, context)
|
1398
1414
|
end
|
1399
1415
|
|
@@ -79,6 +79,7 @@ module Aws::ACM
|
|
79
79
|
NextToken = Shapes::StringShape.new(name: 'NextToken')
|
80
80
|
NullableBoolean = Shapes::BooleanShape.new(name: 'NullableBoolean')
|
81
81
|
PassphraseBlob = Shapes::BlobShape.new(name: 'PassphraseBlob')
|
82
|
+
PcaArn = Shapes::StringShape.new(name: 'PcaArn')
|
82
83
|
PositiveInteger = Shapes::IntegerShape.new(name: 'PositiveInteger')
|
83
84
|
PrivateKey = Shapes::StringShape.new(name: 'PrivateKey')
|
84
85
|
PrivateKeyBlob = Shapes::BlobShape.new(name: 'PrivateKeyBlob')
|
@@ -329,8 +330,9 @@ module Aws::ACM
|
|
329
330
|
RequestCertificateRequest.add_member(:idempotency_token, Shapes::ShapeRef.new(shape: IdempotencyToken, location_name: "IdempotencyToken"))
|
330
331
|
RequestCertificateRequest.add_member(:domain_validation_options, Shapes::ShapeRef.new(shape: DomainValidationOptionList, location_name: "DomainValidationOptions"))
|
331
332
|
RequestCertificateRequest.add_member(:options, Shapes::ShapeRef.new(shape: CertificateOptions, location_name: "Options"))
|
332
|
-
RequestCertificateRequest.add_member(:certificate_authority_arn, Shapes::ShapeRef.new(shape:
|
333
|
+
RequestCertificateRequest.add_member(:certificate_authority_arn, Shapes::ShapeRef.new(shape: PcaArn, location_name: "CertificateAuthorityArn"))
|
333
334
|
RequestCertificateRequest.add_member(:tags, Shapes::ShapeRef.new(shape: TagList, location_name: "Tags"))
|
335
|
+
RequestCertificateRequest.add_member(:key_algorithm, Shapes::ShapeRef.new(shape: KeyAlgorithm, location_name: "KeyAlgorithm"))
|
334
336
|
RequestCertificateRequest.struct_class = Types::RequestCertificateRequest
|
335
337
|
|
336
338
|
RequestCertificateResponse.add_member(:certificate_arn, Shapes::ShapeRef.new(shape: Arn, location_name: "CertificateArn"))
|
@@ -421,6 +423,9 @@ module Aws::ACM
|
|
421
423
|
o.output = Shapes::ShapeRef.new(shape: Shapes::StructureShape.new(struct_class: Aws::EmptyStructure))
|
422
424
|
o.errors << Shapes::ShapeRef.new(shape: ResourceNotFoundException)
|
423
425
|
o.errors << Shapes::ShapeRef.new(shape: ResourceInUseException)
|
426
|
+
o.errors << Shapes::ShapeRef.new(shape: AccessDeniedException)
|
427
|
+
o.errors << Shapes::ShapeRef.new(shape: ThrottlingException)
|
428
|
+
o.errors << Shapes::ShapeRef.new(shape: ConflictException)
|
424
429
|
o.errors << Shapes::ShapeRef.new(shape: InvalidArnException)
|
425
430
|
end)
|
426
431
|
|
@@ -488,6 +493,7 @@ module Aws::ACM
|
|
488
493
|
o.input = Shapes::ShapeRef.new(shape: ListCertificatesRequest)
|
489
494
|
o.output = Shapes::ShapeRef.new(shape: ListCertificatesResponse)
|
490
495
|
o.errors << Shapes::ShapeRef.new(shape: InvalidArgsException)
|
496
|
+
o.errors << Shapes::ShapeRef.new(shape: ValidationException)
|
491
497
|
o[:pager] = Aws::Pager.new(
|
492
498
|
limit_key: "max_items",
|
493
499
|
tokens: {
|
data/lib/aws-sdk-acm/types.rb
CHANGED
@@ -1381,13 +1381,14 @@ module Aws::ACM
|
|
1381
1381
|
# options: {
|
1382
1382
|
# certificate_transparency_logging_preference: "ENABLED", # accepts ENABLED, DISABLED
|
1383
1383
|
# },
|
1384
|
-
# certificate_authority_arn: "
|
1384
|
+
# certificate_authority_arn: "PcaArn",
|
1385
1385
|
# tags: [
|
1386
1386
|
# {
|
1387
1387
|
# key: "TagKey", # required
|
1388
1388
|
# value: "TagValue",
|
1389
1389
|
# },
|
1390
1390
|
# ],
|
1391
|
+
# key_algorithm: "RSA_1024", # accepts RSA_1024, RSA_2048, RSA_3072, RSA_4096, EC_prime256v1, EC_secp384r1, EC_secp521r1
|
1391
1392
|
# }
|
1392
1393
|
#
|
1393
1394
|
# @!attribute [rw] domain_name
|
@@ -1485,20 +1486,35 @@ module Aws::ACM
|
|
1485
1486
|
# (CA) that will be used to issue the certificate. If you do not
|
1486
1487
|
# provide an ARN and you are trying to request a private certificate,
|
1487
1488
|
# ACM will attempt to issue a public certificate. For more information
|
1488
|
-
# about private CAs, see the [
|
1489
|
+
# about private CAs, see the [Amazon Web Services Private Certificate
|
1489
1490
|
# Authority][1] user guide. The ARN must have the following form:
|
1490
1491
|
#
|
1491
1492
|
# `arn:aws:acm-pca:region:account:certificate-authority/12345678-1234-1234-1234-123456789012`
|
1492
1493
|
#
|
1493
1494
|
#
|
1494
1495
|
#
|
1495
|
-
# [1]: https://docs.aws.amazon.com/
|
1496
|
+
# [1]: https://docs.aws.amazon.com/privateca/latest/userguide/PcaWelcome.html
|
1496
1497
|
# @return [String]
|
1497
1498
|
#
|
1498
1499
|
# @!attribute [rw] tags
|
1499
1500
|
# One or more resource tags to associate with the certificate.
|
1500
1501
|
# @return [Array<Types::Tag>]
|
1501
1502
|
#
|
1503
|
+
# @!attribute [rw] key_algorithm
|
1504
|
+
# Specifies the algorithm of the public and private key pair that your
|
1505
|
+
# certificate uses to encrypt data. RSA is the default key algorithm
|
1506
|
+
# for ACM certificates. Elliptic Curve Digital Signature Algorithm
|
1507
|
+
# (ECDSA) keys are smaller, offering security comparable to RSA keys
|
1508
|
+
# but with greater computing efficiency. However, ECDSA is not
|
1509
|
+
# supported by all network clients. Some AWS services may require RSA
|
1510
|
+
# keys, or only support ECDSA keys of a particular size, while others
|
1511
|
+
# allow the use of either RSA and ECDSA keys to ensure that
|
1512
|
+
# compatibility is not broken. Check the requirements for the AWS
|
1513
|
+
# service where you plan to deploy your certificate.
|
1514
|
+
#
|
1515
|
+
# Default: RSA\_2048
|
1516
|
+
# @return [String]
|
1517
|
+
#
|
1502
1518
|
# @see http://docs.aws.amazon.com/goto/WebAPI/acm-2015-12-08/RequestCertificateRequest AWS API Documentation
|
1503
1519
|
#
|
1504
1520
|
class RequestCertificateRequest < Struct.new(
|
@@ -1509,7 +1525,8 @@ module Aws::ACM
|
|
1509
1525
|
:domain_validation_options,
|
1510
1526
|
:options,
|
1511
1527
|
:certificate_authority_arn,
|
1512
|
-
:tags
|
1528
|
+
:tags,
|
1529
|
+
:key_algorithm)
|
1513
1530
|
SENSITIVE = []
|
1514
1531
|
include Aws::Structure
|
1515
1532
|
end
|
data/lib/aws-sdk-acm.rb
CHANGED
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: aws-sdk-acm
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 1.
|
4
|
+
version: 1.54.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Amazon Web Services
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2022-
|
11
|
+
date: 2022-11-08 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: aws-sdk-core
|