aws-sdk-acm 1.53.0 → 1.54.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: d40f231cc976aae38e21848b5e67991e6ea65b358eb032d99d7b87a0b246ce65
4
- data.tar.gz: df1771e3a3e00edf015c00c3043e3ef9810b3ad01674414868d40c3d88067657
3
+ metadata.gz: 2085e2ddda99653688c557569a63baf167aeb20176510c15b4975461a4aba04d
4
+ data.tar.gz: d9ebe9d64183257ab068f94729ff27dd6447666181e0dc2df9bd3cfb25ea0ef4
5
5
  SHA512:
6
- metadata.gz: e0e1788365a14476e749d8a5a5df200237ccf97b1d8c9a892fb913fad5ab4a5ae6c521c64fc939a46a8218c65e67ccdc98742cc40a7760819ba30746e38e2cc1
7
- data.tar.gz: c27445af49d323b48952579b1db87a2bd5f4f10c791d1a2531228e40cde7c01bb6a2d87426fa2ffa46ba7dd0868befd0416a64eeb793e21e100b4cda5f0b4df9
6
+ metadata.gz: 3f1db2ec7982360308a42a91592a1e10b091bdaebb087a0eb7b6e730eb3658b82abb90482fc7727377e8cad3db5208d126f1efd4693f7fa1fceae670fcff7528
7
+ data.tar.gz: ca6c4653dade74e3e20aba7ed4acf87b418dfcad4acf0c098b5717406c09d19224c8c405b45d4bfda5d0d3c816a3573e11aa97fe07db0e51107320ec48387005
data/CHANGELOG.md CHANGED
@@ -1,6 +1,11 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.54.0 (2022-11-08)
5
+ ------------------
6
+
7
+ * Feature - Support added for requesting elliptic curve certificate key algorithm types P-256 (EC_prime256v1) and P-384 (EC_secp384r1).
8
+
4
9
  1.53.0 (2022-10-25)
5
10
  ------------------
6
11
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.53.0
1
+ 1.54.0
@@ -1058,13 +1058,14 @@ module Aws::ACM
1058
1058
 
1059
1059
  # Renews an eligible ACM certificate. At this time, only exported
1060
1060
  # private certificates can be renewed with this operation. In order to
1061
- # renew your ACM Private CA certificates with ACM, you must first [grant
1062
- # the ACM service principal permission to do so][1]. For more
1063
- # information, see [Testing Managed Renewal][2] in the ACM User Guide.
1061
+ # renew your Amazon Web Services Private CA certificates with ACM, you
1062
+ # must first [grant the ACM service principal permission to do so][1].
1063
+ # For more information, see [Testing Managed Renewal][2] in the ACM User
1064
+ # Guide.
1064
1065
  #
1065
1066
  #
1066
1067
  #
1067
- # [1]: https://docs.aws.amazon.com/acm-pca/latest/userguide/PcaPermissions.html
1068
+ # [1]: https://docs.aws.amazon.com/privateca/latest/userguide/PcaPermissions.html
1068
1069
  # [2]: https://docs.aws.amazon.com/acm/latest/userguide/manual-renewal.html
1069
1070
  #
1070
1071
  # @option params [required, String] :certificate_arn
@@ -1214,18 +1215,32 @@ module Aws::ACM
1214
1215
  # (CA) that will be used to issue the certificate. If you do not provide
1215
1216
  # an ARN and you are trying to request a private certificate, ACM will
1216
1217
  # attempt to issue a public certificate. For more information about
1217
- # private CAs, see the [Certificate Manager Private Certificate
1218
+ # private CAs, see the [Amazon Web Services Private Certificate
1218
1219
  # Authority][1] user guide. The ARN must have the following form:
1219
1220
  #
1220
1221
  # `arn:aws:acm-pca:region:account:certificate-authority/12345678-1234-1234-1234-123456789012`
1221
1222
  #
1222
1223
  #
1223
1224
  #
1224
- # [1]: https://docs.aws.amazon.com/acm-pca/latest/userguide/PcaWelcome.html
1225
+ # [1]: https://docs.aws.amazon.com/privateca/latest/userguide/PcaWelcome.html
1225
1226
  #
1226
1227
  # @option params [Array<Types::Tag>] :tags
1227
1228
  # One or more resource tags to associate with the certificate.
1228
1229
  #
1230
+ # @option params [String] :key_algorithm
1231
+ # Specifies the algorithm of the public and private key pair that your
1232
+ # certificate uses to encrypt data. RSA is the default key algorithm for
1233
+ # ACM certificates. Elliptic Curve Digital Signature Algorithm (ECDSA)
1234
+ # keys are smaller, offering security comparable to RSA keys but with
1235
+ # greater computing efficiency. However, ECDSA is not supported by all
1236
+ # network clients. Some AWS services may require RSA keys, or only
1237
+ # support ECDSA keys of a particular size, while others allow the use of
1238
+ # either RSA and ECDSA keys to ensure that compatibility is not broken.
1239
+ # Check the requirements for the AWS service where you plan to deploy
1240
+ # your certificate.
1241
+ #
1242
+ # Default: RSA\_2048
1243
+ #
1229
1244
  # @return [Types::RequestCertificateResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
1230
1245
  #
1231
1246
  # * {Types::RequestCertificateResponse#certificate_arn #certificate_arn} => String
@@ -1246,13 +1261,14 @@ module Aws::ACM
1246
1261
  # options: {
1247
1262
  # certificate_transparency_logging_preference: "ENABLED", # accepts ENABLED, DISABLED
1248
1263
  # },
1249
- # certificate_authority_arn: "Arn",
1264
+ # certificate_authority_arn: "PcaArn",
1250
1265
  # tags: [
1251
1266
  # {
1252
1267
  # key: "TagKey", # required
1253
1268
  # value: "TagValue",
1254
1269
  # },
1255
1270
  # ],
1271
+ # key_algorithm: "RSA_1024", # accepts RSA_1024, RSA_2048, RSA_3072, RSA_4096, EC_prime256v1, EC_secp384r1, EC_secp521r1
1256
1272
  # })
1257
1273
  #
1258
1274
  # @example Response structure
@@ -1393,7 +1409,7 @@ module Aws::ACM
1393
1409
  params: params,
1394
1410
  config: config)
1395
1411
  context[:gem_name] = 'aws-sdk-acm'
1396
- context[:gem_version] = '1.53.0'
1412
+ context[:gem_version] = '1.54.0'
1397
1413
  Seahorse::Client::Request.new(handlers, context)
1398
1414
  end
1399
1415
 
@@ -79,6 +79,7 @@ module Aws::ACM
79
79
  NextToken = Shapes::StringShape.new(name: 'NextToken')
80
80
  NullableBoolean = Shapes::BooleanShape.new(name: 'NullableBoolean')
81
81
  PassphraseBlob = Shapes::BlobShape.new(name: 'PassphraseBlob')
82
+ PcaArn = Shapes::StringShape.new(name: 'PcaArn')
82
83
  PositiveInteger = Shapes::IntegerShape.new(name: 'PositiveInteger')
83
84
  PrivateKey = Shapes::StringShape.new(name: 'PrivateKey')
84
85
  PrivateKeyBlob = Shapes::BlobShape.new(name: 'PrivateKeyBlob')
@@ -329,8 +330,9 @@ module Aws::ACM
329
330
  RequestCertificateRequest.add_member(:idempotency_token, Shapes::ShapeRef.new(shape: IdempotencyToken, location_name: "IdempotencyToken"))
330
331
  RequestCertificateRequest.add_member(:domain_validation_options, Shapes::ShapeRef.new(shape: DomainValidationOptionList, location_name: "DomainValidationOptions"))
331
332
  RequestCertificateRequest.add_member(:options, Shapes::ShapeRef.new(shape: CertificateOptions, location_name: "Options"))
332
- RequestCertificateRequest.add_member(:certificate_authority_arn, Shapes::ShapeRef.new(shape: Arn, location_name: "CertificateAuthorityArn"))
333
+ RequestCertificateRequest.add_member(:certificate_authority_arn, Shapes::ShapeRef.new(shape: PcaArn, location_name: "CertificateAuthorityArn"))
333
334
  RequestCertificateRequest.add_member(:tags, Shapes::ShapeRef.new(shape: TagList, location_name: "Tags"))
335
+ RequestCertificateRequest.add_member(:key_algorithm, Shapes::ShapeRef.new(shape: KeyAlgorithm, location_name: "KeyAlgorithm"))
334
336
  RequestCertificateRequest.struct_class = Types::RequestCertificateRequest
335
337
 
336
338
  RequestCertificateResponse.add_member(:certificate_arn, Shapes::ShapeRef.new(shape: Arn, location_name: "CertificateArn"))
@@ -421,6 +423,9 @@ module Aws::ACM
421
423
  o.output = Shapes::ShapeRef.new(shape: Shapes::StructureShape.new(struct_class: Aws::EmptyStructure))
422
424
  o.errors << Shapes::ShapeRef.new(shape: ResourceNotFoundException)
423
425
  o.errors << Shapes::ShapeRef.new(shape: ResourceInUseException)
426
+ o.errors << Shapes::ShapeRef.new(shape: AccessDeniedException)
427
+ o.errors << Shapes::ShapeRef.new(shape: ThrottlingException)
428
+ o.errors << Shapes::ShapeRef.new(shape: ConflictException)
424
429
  o.errors << Shapes::ShapeRef.new(shape: InvalidArnException)
425
430
  end)
426
431
 
@@ -488,6 +493,7 @@ module Aws::ACM
488
493
  o.input = Shapes::ShapeRef.new(shape: ListCertificatesRequest)
489
494
  o.output = Shapes::ShapeRef.new(shape: ListCertificatesResponse)
490
495
  o.errors << Shapes::ShapeRef.new(shape: InvalidArgsException)
496
+ o.errors << Shapes::ShapeRef.new(shape: ValidationException)
491
497
  o[:pager] = Aws::Pager.new(
492
498
  limit_key: "max_items",
493
499
  tokens: {
@@ -1381,13 +1381,14 @@ module Aws::ACM
1381
1381
  # options: {
1382
1382
  # certificate_transparency_logging_preference: "ENABLED", # accepts ENABLED, DISABLED
1383
1383
  # },
1384
- # certificate_authority_arn: "Arn",
1384
+ # certificate_authority_arn: "PcaArn",
1385
1385
  # tags: [
1386
1386
  # {
1387
1387
  # key: "TagKey", # required
1388
1388
  # value: "TagValue",
1389
1389
  # },
1390
1390
  # ],
1391
+ # key_algorithm: "RSA_1024", # accepts RSA_1024, RSA_2048, RSA_3072, RSA_4096, EC_prime256v1, EC_secp384r1, EC_secp521r1
1391
1392
  # }
1392
1393
  #
1393
1394
  # @!attribute [rw] domain_name
@@ -1485,20 +1486,35 @@ module Aws::ACM
1485
1486
  # (CA) that will be used to issue the certificate. If you do not
1486
1487
  # provide an ARN and you are trying to request a private certificate,
1487
1488
  # ACM will attempt to issue a public certificate. For more information
1488
- # about private CAs, see the [Certificate Manager Private Certificate
1489
+ # about private CAs, see the [Amazon Web Services Private Certificate
1489
1490
  # Authority][1] user guide. The ARN must have the following form:
1490
1491
  #
1491
1492
  # `arn:aws:acm-pca:region:account:certificate-authority/12345678-1234-1234-1234-123456789012`
1492
1493
  #
1493
1494
  #
1494
1495
  #
1495
- # [1]: https://docs.aws.amazon.com/acm-pca/latest/userguide/PcaWelcome.html
1496
+ # [1]: https://docs.aws.amazon.com/privateca/latest/userguide/PcaWelcome.html
1496
1497
  # @return [String]
1497
1498
  #
1498
1499
  # @!attribute [rw] tags
1499
1500
  # One or more resource tags to associate with the certificate.
1500
1501
  # @return [Array<Types::Tag>]
1501
1502
  #
1503
+ # @!attribute [rw] key_algorithm
1504
+ # Specifies the algorithm of the public and private key pair that your
1505
+ # certificate uses to encrypt data. RSA is the default key algorithm
1506
+ # for ACM certificates. Elliptic Curve Digital Signature Algorithm
1507
+ # (ECDSA) keys are smaller, offering security comparable to RSA keys
1508
+ # but with greater computing efficiency. However, ECDSA is not
1509
+ # supported by all network clients. Some AWS services may require RSA
1510
+ # keys, or only support ECDSA keys of a particular size, while others
1511
+ # allow the use of either RSA and ECDSA keys to ensure that
1512
+ # compatibility is not broken. Check the requirements for the AWS
1513
+ # service where you plan to deploy your certificate.
1514
+ #
1515
+ # Default: RSA\_2048
1516
+ # @return [String]
1517
+ #
1502
1518
  # @see http://docs.aws.amazon.com/goto/WebAPI/acm-2015-12-08/RequestCertificateRequest AWS API Documentation
1503
1519
  #
1504
1520
  class RequestCertificateRequest < Struct.new(
@@ -1509,7 +1525,8 @@ module Aws::ACM
1509
1525
  :domain_validation_options,
1510
1526
  :options,
1511
1527
  :certificate_authority_arn,
1512
- :tags)
1528
+ :tags,
1529
+ :key_algorithm)
1513
1530
  SENSITIVE = []
1514
1531
  include Aws::Structure
1515
1532
  end
data/lib/aws-sdk-acm.rb CHANGED
@@ -53,6 +53,6 @@ require_relative 'aws-sdk-acm/customizations'
53
53
  # @!group service
54
54
  module Aws::ACM
55
55
 
56
- GEM_VERSION = '1.53.0'
56
+ GEM_VERSION = '1.54.0'
57
57
 
58
58
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-acm
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.53.0
4
+ version: 1.54.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2022-10-25 00:00:00.000000000 Z
11
+ date: 2022-11-08 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core