aws-sdk-acm 1.73.0 → 1.74.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: e0b349354030633faef5e12aa08318488cef41afd474714746985c3a1cdf858d
4
- data.tar.gz: c845a750f575c3e9420b33dc3bd335170da8f521307bbd3be95ce8b509e28ea9
3
+ metadata.gz: 864c2ab29816d389eef1638b1300f4029c9a9278d290ac7af0459208cf324247
4
+ data.tar.gz: 5b021dab11976ffc683e3fe473d61c53fed3055094cd5d676a3d0ce6b82b4e7d
5
5
  SHA512:
6
- metadata.gz: 72c5daecfb15eef9fcce4fb0d68e1ea5771d5cf1ba6a1d09551d330de6d0342f86911f2b514838f49e792a9dc0133e244976cd677b5f88508e4ac0ce57e3f630
7
- data.tar.gz: 78567c06e593b691ab984d93f4d704dc2877c8b63f4645abf32b0277debd8b230b9bec315f5131eeb87517cef2ccf89073d134ee0022cdb6aaa62fa09c688a78
6
+ metadata.gz: caa3e0c203346a46e4a21c241b5f631f62394a7d126089c0da696df6a482293a2c85710031e7cf577aa3f9fb14239c71626472f2e9eb491e9fa7b15851be71a2
7
+ data.tar.gz: c217886974646fe9ed6a3be31b67143c4d6c3b98a3b94bca5107b48ed722bc813f6629456622b14acbbeca02991c0cdfa648c2bad35dfe7ddbd4b88b721570dd
data/CHANGELOG.md CHANGED
@@ -1,6 +1,11 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.74.0 (2024-07-05)
5
+ ------------------
6
+
7
+ * Feature - Documentation updates, including fixes for xml formatting, broken links, and ListCertificates description.
8
+
4
9
  1.73.0 (2024-07-02)
5
10
  ------------------
6
11
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.73.0
1
+ 1.74.0
@@ -718,11 +718,14 @@ module Aws::ACM
718
718
  req.send_request(options)
719
719
  end
720
720
 
721
- # Retrieves an Amazon-issued certificate and its certificate chain. The
722
- # chain consists of the certificate of the issuing CA and the
723
- # intermediate certificates of any other subordinate CAs. All of the
724
- # certificates are base64 encoded. You can use [OpenSSL][1] to decode
725
- # the certificates and inspect individual fields.
721
+ # Retrieves a certificate and its certificate chain. The certificate may
722
+ # be either a public or private certificate issued using the ACM
723
+ # `RequestCertificate` action, or a certificate imported into ACM using
724
+ # the `ImportCertificate` action. The chain consists of the certificate
725
+ # of the issuing CA and the intermediate certificates of any other
726
+ # subordinate CAs. All of the certificates are base64 encoded. You can
727
+ # use [OpenSSL][1] to decode the certificates and inspect individual
728
+ # fields.
726
729
  #
727
730
  #
728
731
  #
@@ -789,12 +792,6 @@ module Aws::ACM
789
792
  #
790
793
  # * The private key must be no larger than 5 KB (5,120 bytes).
791
794
  #
792
- # * If the certificate you are importing is not self-signed, you must
793
- # enter its certificate chain.
794
- #
795
- # * If a certificate chain is included, the issuer must be the subject
796
- # of one of the certificates in the chain.
797
- #
798
795
  # * The certificate, private key, and certificate chain must be
799
796
  # PEM-encoded.
800
797
  #
@@ -888,11 +885,15 @@ module Aws::ACM
888
885
  req.send_request(options)
889
886
  end
890
887
 
891
- # Retrieves a list of certificate ARNs and domain names. You can request
892
- # that only certificates that match a specific status be listed. You can
893
- # also filter by specific attributes of the certificate. Default
894
- # filtering returns only `RSA_2048` certificates. For more information,
895
- # see Filters.
888
+ # Retrieves a list of certificate ARNs and domain names. By default, the
889
+ # API returns RSA\_2048 certificates. To return all certificates in the
890
+ # account, include the `keyType` filter with the values `[RSA_1024,
891
+ # RSA_2048, RSA_3072, RSA_4096, EC_prime256v1, EC_secp384r1,
892
+ # EC_secp521r1]`.
893
+ #
894
+ # In addition to `keyType`, you can also filter by the
895
+ # `CertificateStatuses`, `keyUsage`, and `extendedKeyUsage` attributes
896
+ # on the certificate. For more information, see Filters.
896
897
  #
897
898
  # @option params [Array<String>] :certificate_statuses
898
899
  # Filter the certificate list by status value.
@@ -1287,14 +1288,37 @@ module Aws::ACM
1287
1288
  # ACM certificates. Elliptic Curve Digital Signature Algorithm (ECDSA)
1288
1289
  # keys are smaller, offering security comparable to RSA keys but with
1289
1290
  # greater computing efficiency. However, ECDSA is not supported by all
1290
- # network clients. Some AWS services may require RSA keys, or only
1291
- # support ECDSA keys of a particular size, while others allow the use of
1292
- # either RSA and ECDSA keys to ensure that compatibility is not broken.
1293
- # Check the requirements for the AWS service where you plan to deploy
1294
- # your certificate.
1291
+ # network clients. Some Amazon Web Services services may require RSA
1292
+ # keys, or only support ECDSA keys of a particular size, while others
1293
+ # allow the use of either RSA and ECDSA keys to ensure that
1294
+ # compatibility is not broken. Check the requirements for the Amazon Web
1295
+ # Services service where you plan to deploy your certificate. For more
1296
+ # information about selecting an algorithm, see [Key algorithms][1].
1297
+ #
1298
+ # <note markdown="1"> Algorithms supported for an ACM certificate request include:
1299
+ #
1300
+ # * `RSA_2048`
1301
+ #
1302
+ # * `EC_prime256v1`
1303
+ #
1304
+ # * `EC_secp384r1`
1305
+ #
1306
+ # Other listed algorithms are for imported certificates only.
1307
+ #
1308
+ # </note>
1309
+ #
1310
+ # <note markdown="1"> When you request a private PKI certificate signed by a CA from Amazon
1311
+ # Web Services Private CA, the specified signing algorithm family (RSA
1312
+ # or ECDSA) must match the algorithm family of the CA's secret key.
1313
+ #
1314
+ # </note>
1295
1315
  #
1296
1316
  # Default: RSA\_2048
1297
1317
  #
1318
+ #
1319
+ #
1320
+ # [1]: https://docs.aws.amazon.com/acm/latest/userguide/acm-certificate.html#algorithms
1321
+ #
1298
1322
  # @return [Types::RequestCertificateResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
1299
1323
  #
1300
1324
  # * {Types::RequestCertificateResponse#certificate_arn #certificate_arn} => String
@@ -1463,7 +1487,7 @@ module Aws::ACM
1463
1487
  params: params,
1464
1488
  config: config)
1465
1489
  context[:gem_name] = 'aws-sdk-acm'
1466
- context[:gem_version] = '1.73.0'
1490
+ context[:gem_version] = '1.74.0'
1467
1491
  Seahorse::Client::Request.new(handlers, context)
1468
1492
  end
1469
1493
 
@@ -321,30 +321,20 @@ module Aws::ACM
321
321
  # certificate and additional domain names that can be used to connect
322
322
  # to the website.
323
323
  #
324
- # When called by [ListCertificates][1], this parameter will only
325
- # return the first 100 subject alternative names included in the
326
- # certificate. To display the full list of subject alternative names,
327
- # use [DescribeCertificate][2].
328
- #
329
- #
330
- #
331
- # [1]: https://docs.aws.amazon.com/acm/latestAPIReference/API_ListCertificates.html
332
- # [2]: https://docs.aws.amazon.com/acm/latestAPIReference/API_DescribeCertificate.html
324
+ # When called by ListCertificates, this parameter will only return the
325
+ # first 100 subject alternative names included in the certificate. To
326
+ # display the full list of subject alternative names, use
327
+ # DescribeCertificate.
333
328
  # @return [Array<String>]
334
329
  #
335
330
  # @!attribute [rw] has_additional_subject_alternative_names
336
- # When called by [ListCertificates][1], indicates whether the full
337
- # list of subject alternative names has been included in the response.
338
- # If false, the response includes all of the subject alternative names
331
+ # When called by ListCertificates, indicates whether the full list of
332
+ # subject alternative names has been included in the response. If
333
+ # false, the response includes all of the subject alternative names
339
334
  # included in the certificate. If true, the response only includes the
340
335
  # first 100 subject alternative names included in the certificate. To
341
336
  # display the full list of subject alternative names, use
342
- # [DescribeCertificate][2].
343
- #
344
- #
345
- #
346
- # [1]: https://docs.aws.amazon.com/acm/latestAPIReference/API_ListCertificates.html
347
- # [2]: https://docs.aws.amazon.com/acm/latestAPIReference/API_DescribeCertificate.html
337
+ # DescribeCertificate.
348
338
  # @return [Boolean]
349
339
  #
350
340
  # @!attribute [rw] status
@@ -560,9 +550,9 @@ module Aws::ACM
560
550
  #
561
551
  # * `PENDING_VALIDATION`
562
552
  #
563
- # * ``SUCCESS
553
+ # * `SUCCESS`
564
554
  #
565
- # * ``FAILED
555
+ # * `FAILED`
566
556
  # @return [String]
567
557
  #
568
558
  # @!attribute [rw] resource_record
@@ -1337,13 +1327,38 @@ module Aws::ACM
1337
1327
  # for ACM certificates. Elliptic Curve Digital Signature Algorithm
1338
1328
  # (ECDSA) keys are smaller, offering security comparable to RSA keys
1339
1329
  # but with greater computing efficiency. However, ECDSA is not
1340
- # supported by all network clients. Some AWS services may require RSA
1341
- # keys, or only support ECDSA keys of a particular size, while others
1342
- # allow the use of either RSA and ECDSA keys to ensure that
1343
- # compatibility is not broken. Check the requirements for the AWS
1344
- # service where you plan to deploy your certificate.
1330
+ # supported by all network clients. Some Amazon Web Services services
1331
+ # may require RSA keys, or only support ECDSA keys of a particular
1332
+ # size, while others allow the use of either RSA and ECDSA keys to
1333
+ # ensure that compatibility is not broken. Check the requirements for
1334
+ # the Amazon Web Services service where you plan to deploy your
1335
+ # certificate. For more information about selecting an algorithm, see
1336
+ # [Key algorithms][1].
1337
+ #
1338
+ # <note markdown="1"> Algorithms supported for an ACM certificate request include:
1339
+ #
1340
+ # * `RSA_2048`
1341
+ #
1342
+ # * `EC_prime256v1`
1343
+ #
1344
+ # * `EC_secp384r1`
1345
+ #
1346
+ # Other listed algorithms are for imported certificates only.
1347
+ #
1348
+ # </note>
1349
+ #
1350
+ # <note markdown="1"> When you request a private PKI certificate signed by a CA from
1351
+ # Amazon Web Services Private CA, the specified signing algorithm
1352
+ # family (RSA or ECDSA) must match the algorithm family of the CA's
1353
+ # secret key.
1354
+ #
1355
+ # </note>
1345
1356
  #
1346
1357
  # Default: RSA\_2048
1358
+ #
1359
+ #
1360
+ #
1361
+ # [1]: https://docs.aws.amazon.com/acm/latest/userguide/acm-certificate.html#algorithms
1347
1362
  # @return [String]
1348
1363
  #
1349
1364
  # @see http://docs.aws.amazon.com/goto/WebAPI/acm-2015-12-08/RequestCertificateRequest AWS API Documentation
data/lib/aws-sdk-acm.rb CHANGED
@@ -53,6 +53,6 @@ require_relative 'aws-sdk-acm/customizations'
53
53
  # @!group service
54
54
  module Aws::ACM
55
55
 
56
- GEM_VERSION = '1.73.0'
56
+ GEM_VERSION = '1.74.0'
57
57
 
58
58
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-acm
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.73.0
4
+ version: 1.74.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2024-07-02 00:00:00.000000000 Z
11
+ date: 2024-07-05 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core