aws-sdk-acm 1.73.0 → 1.74.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: e0b349354030633faef5e12aa08318488cef41afd474714746985c3a1cdf858d
4
- data.tar.gz: c845a750f575c3e9420b33dc3bd335170da8f521307bbd3be95ce8b509e28ea9
3
+ metadata.gz: 864c2ab29816d389eef1638b1300f4029c9a9278d290ac7af0459208cf324247
4
+ data.tar.gz: 5b021dab11976ffc683e3fe473d61c53fed3055094cd5d676a3d0ce6b82b4e7d
5
5
  SHA512:
6
- metadata.gz: 72c5daecfb15eef9fcce4fb0d68e1ea5771d5cf1ba6a1d09551d330de6d0342f86911f2b514838f49e792a9dc0133e244976cd677b5f88508e4ac0ce57e3f630
7
- data.tar.gz: 78567c06e593b691ab984d93f4d704dc2877c8b63f4645abf32b0277debd8b230b9bec315f5131eeb87517cef2ccf89073d134ee0022cdb6aaa62fa09c688a78
6
+ metadata.gz: caa3e0c203346a46e4a21c241b5f631f62394a7d126089c0da696df6a482293a2c85710031e7cf577aa3f9fb14239c71626472f2e9eb491e9fa7b15851be71a2
7
+ data.tar.gz: c217886974646fe9ed6a3be31b67143c4d6c3b98a3b94bca5107b48ed722bc813f6629456622b14acbbeca02991c0cdfa648c2bad35dfe7ddbd4b88b721570dd
data/CHANGELOG.md CHANGED
@@ -1,6 +1,11 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.74.0 (2024-07-05)
5
+ ------------------
6
+
7
+ * Feature - Documentation updates, including fixes for xml formatting, broken links, and ListCertificates description.
8
+
4
9
  1.73.0 (2024-07-02)
5
10
  ------------------
6
11
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.73.0
1
+ 1.74.0
@@ -718,11 +718,14 @@ module Aws::ACM
718
718
  req.send_request(options)
719
719
  end
720
720
 
721
- # Retrieves an Amazon-issued certificate and its certificate chain. The
722
- # chain consists of the certificate of the issuing CA and the
723
- # intermediate certificates of any other subordinate CAs. All of the
724
- # certificates are base64 encoded. You can use [OpenSSL][1] to decode
725
- # the certificates and inspect individual fields.
721
+ # Retrieves a certificate and its certificate chain. The certificate may
722
+ # be either a public or private certificate issued using the ACM
723
+ # `RequestCertificate` action, or a certificate imported into ACM using
724
+ # the `ImportCertificate` action. The chain consists of the certificate
725
+ # of the issuing CA and the intermediate certificates of any other
726
+ # subordinate CAs. All of the certificates are base64 encoded. You can
727
+ # use [OpenSSL][1] to decode the certificates and inspect individual
728
+ # fields.
726
729
  #
727
730
  #
728
731
  #
@@ -789,12 +792,6 @@ module Aws::ACM
789
792
  #
790
793
  # * The private key must be no larger than 5 KB (5,120 bytes).
791
794
  #
792
- # * If the certificate you are importing is not self-signed, you must
793
- # enter its certificate chain.
794
- #
795
- # * If a certificate chain is included, the issuer must be the subject
796
- # of one of the certificates in the chain.
797
- #
798
795
  # * The certificate, private key, and certificate chain must be
799
796
  # PEM-encoded.
800
797
  #
@@ -888,11 +885,15 @@ module Aws::ACM
888
885
  req.send_request(options)
889
886
  end
890
887
 
891
- # Retrieves a list of certificate ARNs and domain names. You can request
892
- # that only certificates that match a specific status be listed. You can
893
- # also filter by specific attributes of the certificate. Default
894
- # filtering returns only `RSA_2048` certificates. For more information,
895
- # see Filters.
888
+ # Retrieves a list of certificate ARNs and domain names. By default, the
889
+ # API returns RSA\_2048 certificates. To return all certificates in the
890
+ # account, include the `keyType` filter with the values `[RSA_1024,
891
+ # RSA_2048, RSA_3072, RSA_4096, EC_prime256v1, EC_secp384r1,
892
+ # EC_secp521r1]`.
893
+ #
894
+ # In addition to `keyType`, you can also filter by the
895
+ # `CertificateStatuses`, `keyUsage`, and `extendedKeyUsage` attributes
896
+ # on the certificate. For more information, see Filters.
896
897
  #
897
898
  # @option params [Array<String>] :certificate_statuses
898
899
  # Filter the certificate list by status value.
@@ -1287,14 +1288,37 @@ module Aws::ACM
1287
1288
  # ACM certificates. Elliptic Curve Digital Signature Algorithm (ECDSA)
1288
1289
  # keys are smaller, offering security comparable to RSA keys but with
1289
1290
  # greater computing efficiency. However, ECDSA is not supported by all
1290
- # network clients. Some AWS services may require RSA keys, or only
1291
- # support ECDSA keys of a particular size, while others allow the use of
1292
- # either RSA and ECDSA keys to ensure that compatibility is not broken.
1293
- # Check the requirements for the AWS service where you plan to deploy
1294
- # your certificate.
1291
+ # network clients. Some Amazon Web Services services may require RSA
1292
+ # keys, or only support ECDSA keys of a particular size, while others
1293
+ # allow the use of either RSA and ECDSA keys to ensure that
1294
+ # compatibility is not broken. Check the requirements for the Amazon Web
1295
+ # Services service where you plan to deploy your certificate. For more
1296
+ # information about selecting an algorithm, see [Key algorithms][1].
1297
+ #
1298
+ # <note markdown="1"> Algorithms supported for an ACM certificate request include:
1299
+ #
1300
+ # * `RSA_2048`
1301
+ #
1302
+ # * `EC_prime256v1`
1303
+ #
1304
+ # * `EC_secp384r1`
1305
+ #
1306
+ # Other listed algorithms are for imported certificates only.
1307
+ #
1308
+ # </note>
1309
+ #
1310
+ # <note markdown="1"> When you request a private PKI certificate signed by a CA from Amazon
1311
+ # Web Services Private CA, the specified signing algorithm family (RSA
1312
+ # or ECDSA) must match the algorithm family of the CA's secret key.
1313
+ #
1314
+ # </note>
1295
1315
  #
1296
1316
  # Default: RSA\_2048
1297
1317
  #
1318
+ #
1319
+ #
1320
+ # [1]: https://docs.aws.amazon.com/acm/latest/userguide/acm-certificate.html#algorithms
1321
+ #
1298
1322
  # @return [Types::RequestCertificateResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
1299
1323
  #
1300
1324
  # * {Types::RequestCertificateResponse#certificate_arn #certificate_arn} => String
@@ -1463,7 +1487,7 @@ module Aws::ACM
1463
1487
  params: params,
1464
1488
  config: config)
1465
1489
  context[:gem_name] = 'aws-sdk-acm'
1466
- context[:gem_version] = '1.73.0'
1490
+ context[:gem_version] = '1.74.0'
1467
1491
  Seahorse::Client::Request.new(handlers, context)
1468
1492
  end
1469
1493
 
@@ -321,30 +321,20 @@ module Aws::ACM
321
321
  # certificate and additional domain names that can be used to connect
322
322
  # to the website.
323
323
  #
324
- # When called by [ListCertificates][1], this parameter will only
325
- # return the first 100 subject alternative names included in the
326
- # certificate. To display the full list of subject alternative names,
327
- # use [DescribeCertificate][2].
328
- #
329
- #
330
- #
331
- # [1]: https://docs.aws.amazon.com/acm/latestAPIReference/API_ListCertificates.html
332
- # [2]: https://docs.aws.amazon.com/acm/latestAPIReference/API_DescribeCertificate.html
324
+ # When called by ListCertificates, this parameter will only return the
325
+ # first 100 subject alternative names included in the certificate. To
326
+ # display the full list of subject alternative names, use
327
+ # DescribeCertificate.
333
328
  # @return [Array<String>]
334
329
  #
335
330
  # @!attribute [rw] has_additional_subject_alternative_names
336
- # When called by [ListCertificates][1], indicates whether the full
337
- # list of subject alternative names has been included in the response.
338
- # If false, the response includes all of the subject alternative names
331
+ # When called by ListCertificates, indicates whether the full list of
332
+ # subject alternative names has been included in the response. If
333
+ # false, the response includes all of the subject alternative names
339
334
  # included in the certificate. If true, the response only includes the
340
335
  # first 100 subject alternative names included in the certificate. To
341
336
  # display the full list of subject alternative names, use
342
- # [DescribeCertificate][2].
343
- #
344
- #
345
- #
346
- # [1]: https://docs.aws.amazon.com/acm/latestAPIReference/API_ListCertificates.html
347
- # [2]: https://docs.aws.amazon.com/acm/latestAPIReference/API_DescribeCertificate.html
337
+ # DescribeCertificate.
348
338
  # @return [Boolean]
349
339
  #
350
340
  # @!attribute [rw] status
@@ -560,9 +550,9 @@ module Aws::ACM
560
550
  #
561
551
  # * `PENDING_VALIDATION`
562
552
  #
563
- # * ``SUCCESS
553
+ # * `SUCCESS`
564
554
  #
565
- # * ``FAILED
555
+ # * `FAILED`
566
556
  # @return [String]
567
557
  #
568
558
  # @!attribute [rw] resource_record
@@ -1337,13 +1327,38 @@ module Aws::ACM
1337
1327
  # for ACM certificates. Elliptic Curve Digital Signature Algorithm
1338
1328
  # (ECDSA) keys are smaller, offering security comparable to RSA keys
1339
1329
  # but with greater computing efficiency. However, ECDSA is not
1340
- # supported by all network clients. Some AWS services may require RSA
1341
- # keys, or only support ECDSA keys of a particular size, while others
1342
- # allow the use of either RSA and ECDSA keys to ensure that
1343
- # compatibility is not broken. Check the requirements for the AWS
1344
- # service where you plan to deploy your certificate.
1330
+ # supported by all network clients. Some Amazon Web Services services
1331
+ # may require RSA keys, or only support ECDSA keys of a particular
1332
+ # size, while others allow the use of either RSA and ECDSA keys to
1333
+ # ensure that compatibility is not broken. Check the requirements for
1334
+ # the Amazon Web Services service where you plan to deploy your
1335
+ # certificate. For more information about selecting an algorithm, see
1336
+ # [Key algorithms][1].
1337
+ #
1338
+ # <note markdown="1"> Algorithms supported for an ACM certificate request include:
1339
+ #
1340
+ # * `RSA_2048`
1341
+ #
1342
+ # * `EC_prime256v1`
1343
+ #
1344
+ # * `EC_secp384r1`
1345
+ #
1346
+ # Other listed algorithms are for imported certificates only.
1347
+ #
1348
+ # </note>
1349
+ #
1350
+ # <note markdown="1"> When you request a private PKI certificate signed by a CA from
1351
+ # Amazon Web Services Private CA, the specified signing algorithm
1352
+ # family (RSA or ECDSA) must match the algorithm family of the CA's
1353
+ # secret key.
1354
+ #
1355
+ # </note>
1345
1356
  #
1346
1357
  # Default: RSA\_2048
1358
+ #
1359
+ #
1360
+ #
1361
+ # [1]: https://docs.aws.amazon.com/acm/latest/userguide/acm-certificate.html#algorithms
1347
1362
  # @return [String]
1348
1363
  #
1349
1364
  # @see http://docs.aws.amazon.com/goto/WebAPI/acm-2015-12-08/RequestCertificateRequest AWS API Documentation
data/lib/aws-sdk-acm.rb CHANGED
@@ -53,6 +53,6 @@ require_relative 'aws-sdk-acm/customizations'
53
53
  # @!group service
54
54
  module Aws::ACM
55
55
 
56
- GEM_VERSION = '1.73.0'
56
+ GEM_VERSION = '1.74.0'
57
57
 
58
58
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-acm
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.73.0
4
+ version: 1.74.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2024-07-02 00:00:00.000000000 Z
11
+ date: 2024-07-05 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core