aws-sdk-acm 1.53.0 → 1.54.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: d40f231cc976aae38e21848b5e67991e6ea65b358eb032d99d7b87a0b246ce65
4
- data.tar.gz: df1771e3a3e00edf015c00c3043e3ef9810b3ad01674414868d40c3d88067657
3
+ metadata.gz: 2085e2ddda99653688c557569a63baf167aeb20176510c15b4975461a4aba04d
4
+ data.tar.gz: d9ebe9d64183257ab068f94729ff27dd6447666181e0dc2df9bd3cfb25ea0ef4
5
5
  SHA512:
6
- metadata.gz: e0e1788365a14476e749d8a5a5df200237ccf97b1d8c9a892fb913fad5ab4a5ae6c521c64fc939a46a8218c65e67ccdc98742cc40a7760819ba30746e38e2cc1
7
- data.tar.gz: c27445af49d323b48952579b1db87a2bd5f4f10c791d1a2531228e40cde7c01bb6a2d87426fa2ffa46ba7dd0868befd0416a64eeb793e21e100b4cda5f0b4df9
6
+ metadata.gz: 3f1db2ec7982360308a42a91592a1e10b091bdaebb087a0eb7b6e730eb3658b82abb90482fc7727377e8cad3db5208d126f1efd4693f7fa1fceae670fcff7528
7
+ data.tar.gz: ca6c4653dade74e3e20aba7ed4acf87b418dfcad4acf0c098b5717406c09d19224c8c405b45d4bfda5d0d3c816a3573e11aa97fe07db0e51107320ec48387005
data/CHANGELOG.md CHANGED
@@ -1,6 +1,11 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.54.0 (2022-11-08)
5
+ ------------------
6
+
7
+ * Feature - Support added for requesting elliptic curve certificate key algorithm types P-256 (EC_prime256v1) and P-384 (EC_secp384r1).
8
+
4
9
  1.53.0 (2022-10-25)
5
10
  ------------------
6
11
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.53.0
1
+ 1.54.0
@@ -1058,13 +1058,14 @@ module Aws::ACM
1058
1058
 
1059
1059
  # Renews an eligible ACM certificate. At this time, only exported
1060
1060
  # private certificates can be renewed with this operation. In order to
1061
- # renew your ACM Private CA certificates with ACM, you must first [grant
1062
- # the ACM service principal permission to do so][1]. For more
1063
- # information, see [Testing Managed Renewal][2] in the ACM User Guide.
1061
+ # renew your Amazon Web Services Private CA certificates with ACM, you
1062
+ # must first [grant the ACM service principal permission to do so][1].
1063
+ # For more information, see [Testing Managed Renewal][2] in the ACM User
1064
+ # Guide.
1064
1065
  #
1065
1066
  #
1066
1067
  #
1067
- # [1]: https://docs.aws.amazon.com/acm-pca/latest/userguide/PcaPermissions.html
1068
+ # [1]: https://docs.aws.amazon.com/privateca/latest/userguide/PcaPermissions.html
1068
1069
  # [2]: https://docs.aws.amazon.com/acm/latest/userguide/manual-renewal.html
1069
1070
  #
1070
1071
  # @option params [required, String] :certificate_arn
@@ -1214,18 +1215,32 @@ module Aws::ACM
1214
1215
  # (CA) that will be used to issue the certificate. If you do not provide
1215
1216
  # an ARN and you are trying to request a private certificate, ACM will
1216
1217
  # attempt to issue a public certificate. For more information about
1217
- # private CAs, see the [Certificate Manager Private Certificate
1218
+ # private CAs, see the [Amazon Web Services Private Certificate
1218
1219
  # Authority][1] user guide. The ARN must have the following form:
1219
1220
  #
1220
1221
  # `arn:aws:acm-pca:region:account:certificate-authority/12345678-1234-1234-1234-123456789012`
1221
1222
  #
1222
1223
  #
1223
1224
  #
1224
- # [1]: https://docs.aws.amazon.com/acm-pca/latest/userguide/PcaWelcome.html
1225
+ # [1]: https://docs.aws.amazon.com/privateca/latest/userguide/PcaWelcome.html
1225
1226
  #
1226
1227
  # @option params [Array<Types::Tag>] :tags
1227
1228
  # One or more resource tags to associate with the certificate.
1228
1229
  #
1230
+ # @option params [String] :key_algorithm
1231
+ # Specifies the algorithm of the public and private key pair that your
1232
+ # certificate uses to encrypt data. RSA is the default key algorithm for
1233
+ # ACM certificates. Elliptic Curve Digital Signature Algorithm (ECDSA)
1234
+ # keys are smaller, offering security comparable to RSA keys but with
1235
+ # greater computing efficiency. However, ECDSA is not supported by all
1236
+ # network clients. Some AWS services may require RSA keys, or only
1237
+ # support ECDSA keys of a particular size, while others allow the use of
1238
+ # either RSA and ECDSA keys to ensure that compatibility is not broken.
1239
+ # Check the requirements for the AWS service where you plan to deploy
1240
+ # your certificate.
1241
+ #
1242
+ # Default: RSA\_2048
1243
+ #
1229
1244
  # @return [Types::RequestCertificateResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
1230
1245
  #
1231
1246
  # * {Types::RequestCertificateResponse#certificate_arn #certificate_arn} => String
@@ -1246,13 +1261,14 @@ module Aws::ACM
1246
1261
  # options: {
1247
1262
  # certificate_transparency_logging_preference: "ENABLED", # accepts ENABLED, DISABLED
1248
1263
  # },
1249
- # certificate_authority_arn: "Arn",
1264
+ # certificate_authority_arn: "PcaArn",
1250
1265
  # tags: [
1251
1266
  # {
1252
1267
  # key: "TagKey", # required
1253
1268
  # value: "TagValue",
1254
1269
  # },
1255
1270
  # ],
1271
+ # key_algorithm: "RSA_1024", # accepts RSA_1024, RSA_2048, RSA_3072, RSA_4096, EC_prime256v1, EC_secp384r1, EC_secp521r1
1256
1272
  # })
1257
1273
  #
1258
1274
  # @example Response structure
@@ -1393,7 +1409,7 @@ module Aws::ACM
1393
1409
  params: params,
1394
1410
  config: config)
1395
1411
  context[:gem_name] = 'aws-sdk-acm'
1396
- context[:gem_version] = '1.53.0'
1412
+ context[:gem_version] = '1.54.0'
1397
1413
  Seahorse::Client::Request.new(handlers, context)
1398
1414
  end
1399
1415
 
@@ -79,6 +79,7 @@ module Aws::ACM
79
79
  NextToken = Shapes::StringShape.new(name: 'NextToken')
80
80
  NullableBoolean = Shapes::BooleanShape.new(name: 'NullableBoolean')
81
81
  PassphraseBlob = Shapes::BlobShape.new(name: 'PassphraseBlob')
82
+ PcaArn = Shapes::StringShape.new(name: 'PcaArn')
82
83
  PositiveInteger = Shapes::IntegerShape.new(name: 'PositiveInteger')
83
84
  PrivateKey = Shapes::StringShape.new(name: 'PrivateKey')
84
85
  PrivateKeyBlob = Shapes::BlobShape.new(name: 'PrivateKeyBlob')
@@ -329,8 +330,9 @@ module Aws::ACM
329
330
  RequestCertificateRequest.add_member(:idempotency_token, Shapes::ShapeRef.new(shape: IdempotencyToken, location_name: "IdempotencyToken"))
330
331
  RequestCertificateRequest.add_member(:domain_validation_options, Shapes::ShapeRef.new(shape: DomainValidationOptionList, location_name: "DomainValidationOptions"))
331
332
  RequestCertificateRequest.add_member(:options, Shapes::ShapeRef.new(shape: CertificateOptions, location_name: "Options"))
332
- RequestCertificateRequest.add_member(:certificate_authority_arn, Shapes::ShapeRef.new(shape: Arn, location_name: "CertificateAuthorityArn"))
333
+ RequestCertificateRequest.add_member(:certificate_authority_arn, Shapes::ShapeRef.new(shape: PcaArn, location_name: "CertificateAuthorityArn"))
333
334
  RequestCertificateRequest.add_member(:tags, Shapes::ShapeRef.new(shape: TagList, location_name: "Tags"))
335
+ RequestCertificateRequest.add_member(:key_algorithm, Shapes::ShapeRef.new(shape: KeyAlgorithm, location_name: "KeyAlgorithm"))
334
336
  RequestCertificateRequest.struct_class = Types::RequestCertificateRequest
335
337
 
336
338
  RequestCertificateResponse.add_member(:certificate_arn, Shapes::ShapeRef.new(shape: Arn, location_name: "CertificateArn"))
@@ -421,6 +423,9 @@ module Aws::ACM
421
423
  o.output = Shapes::ShapeRef.new(shape: Shapes::StructureShape.new(struct_class: Aws::EmptyStructure))
422
424
  o.errors << Shapes::ShapeRef.new(shape: ResourceNotFoundException)
423
425
  o.errors << Shapes::ShapeRef.new(shape: ResourceInUseException)
426
+ o.errors << Shapes::ShapeRef.new(shape: AccessDeniedException)
427
+ o.errors << Shapes::ShapeRef.new(shape: ThrottlingException)
428
+ o.errors << Shapes::ShapeRef.new(shape: ConflictException)
424
429
  o.errors << Shapes::ShapeRef.new(shape: InvalidArnException)
425
430
  end)
426
431
 
@@ -488,6 +493,7 @@ module Aws::ACM
488
493
  o.input = Shapes::ShapeRef.new(shape: ListCertificatesRequest)
489
494
  o.output = Shapes::ShapeRef.new(shape: ListCertificatesResponse)
490
495
  o.errors << Shapes::ShapeRef.new(shape: InvalidArgsException)
496
+ o.errors << Shapes::ShapeRef.new(shape: ValidationException)
491
497
  o[:pager] = Aws::Pager.new(
492
498
  limit_key: "max_items",
493
499
  tokens: {
@@ -1381,13 +1381,14 @@ module Aws::ACM
1381
1381
  # options: {
1382
1382
  # certificate_transparency_logging_preference: "ENABLED", # accepts ENABLED, DISABLED
1383
1383
  # },
1384
- # certificate_authority_arn: "Arn",
1384
+ # certificate_authority_arn: "PcaArn",
1385
1385
  # tags: [
1386
1386
  # {
1387
1387
  # key: "TagKey", # required
1388
1388
  # value: "TagValue",
1389
1389
  # },
1390
1390
  # ],
1391
+ # key_algorithm: "RSA_1024", # accepts RSA_1024, RSA_2048, RSA_3072, RSA_4096, EC_prime256v1, EC_secp384r1, EC_secp521r1
1391
1392
  # }
1392
1393
  #
1393
1394
  # @!attribute [rw] domain_name
@@ -1485,20 +1486,35 @@ module Aws::ACM
1485
1486
  # (CA) that will be used to issue the certificate. If you do not
1486
1487
  # provide an ARN and you are trying to request a private certificate,
1487
1488
  # ACM will attempt to issue a public certificate. For more information
1488
- # about private CAs, see the [Certificate Manager Private Certificate
1489
+ # about private CAs, see the [Amazon Web Services Private Certificate
1489
1490
  # Authority][1] user guide. The ARN must have the following form:
1490
1491
  #
1491
1492
  # `arn:aws:acm-pca:region:account:certificate-authority/12345678-1234-1234-1234-123456789012`
1492
1493
  #
1493
1494
  #
1494
1495
  #
1495
- # [1]: https://docs.aws.amazon.com/acm-pca/latest/userguide/PcaWelcome.html
1496
+ # [1]: https://docs.aws.amazon.com/privateca/latest/userguide/PcaWelcome.html
1496
1497
  # @return [String]
1497
1498
  #
1498
1499
  # @!attribute [rw] tags
1499
1500
  # One or more resource tags to associate with the certificate.
1500
1501
  # @return [Array<Types::Tag>]
1501
1502
  #
1503
+ # @!attribute [rw] key_algorithm
1504
+ # Specifies the algorithm of the public and private key pair that your
1505
+ # certificate uses to encrypt data. RSA is the default key algorithm
1506
+ # for ACM certificates. Elliptic Curve Digital Signature Algorithm
1507
+ # (ECDSA) keys are smaller, offering security comparable to RSA keys
1508
+ # but with greater computing efficiency. However, ECDSA is not
1509
+ # supported by all network clients. Some AWS services may require RSA
1510
+ # keys, or only support ECDSA keys of a particular size, while others
1511
+ # allow the use of either RSA and ECDSA keys to ensure that
1512
+ # compatibility is not broken. Check the requirements for the AWS
1513
+ # service where you plan to deploy your certificate.
1514
+ #
1515
+ # Default: RSA\_2048
1516
+ # @return [String]
1517
+ #
1502
1518
  # @see http://docs.aws.amazon.com/goto/WebAPI/acm-2015-12-08/RequestCertificateRequest AWS API Documentation
1503
1519
  #
1504
1520
  class RequestCertificateRequest < Struct.new(
@@ -1509,7 +1525,8 @@ module Aws::ACM
1509
1525
  :domain_validation_options,
1510
1526
  :options,
1511
1527
  :certificate_authority_arn,
1512
- :tags)
1528
+ :tags,
1529
+ :key_algorithm)
1513
1530
  SENSITIVE = []
1514
1531
  include Aws::Structure
1515
1532
  end
data/lib/aws-sdk-acm.rb CHANGED
@@ -53,6 +53,6 @@ require_relative 'aws-sdk-acm/customizations'
53
53
  # @!group service
54
54
  module Aws::ACM
55
55
 
56
- GEM_VERSION = '1.53.0'
56
+ GEM_VERSION = '1.54.0'
57
57
 
58
58
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-acm
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.53.0
4
+ version: 1.54.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2022-10-25 00:00:00.000000000 Z
11
+ date: 2022-11-08 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core