aws-sdk-acm 1.88.0 → 1.89.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 9bd001aa7d7a94fc363feb294df204432c5f79f9171cc5194fb7cb87b3ee5383
4
- data.tar.gz: 5867f446ccf694b112a52158eb747493bea223532d4edd57c52d2d1272eca010
3
+ metadata.gz: e1e312e70170ccdc9f122c0be7fb268e625ed3245aa1570fd3a7527364a10a3b
4
+ data.tar.gz: '0826c3dcc70b5de3e90871a8af04399f9dd3ef3d6c8977ff37ca93b0527daed3'
5
5
  SHA512:
6
- metadata.gz: 505c61f679ad2bee5d68ab78aedfcc708e1736f7047c625a7200d86e90af8ea1b3a946ea268f7bfce650aa1a7e2e41b412e09f30b21f752f71faf04e76fe8796
7
- data.tar.gz: acf5fb00b8661a89a30afeab55187d1e4874b0ee11260ca42ccb9b3f7f1c4fb3f36b92fd1b1455a2a8aedca9a58e5ee43990c87db06f3964c08146d9e7904a63
6
+ metadata.gz: e2c6aae7cf60e08ae14da3c8fe617f561119f240dccd60a35ae41598f5d5a6a38fba36d1b229b8b78070d27cf197a2b8554ab3be8c3394adc52d1e8fd228c116
7
+ data.tar.gz: 0e9b63f66bcb87fb207e03dc1fe201869ccdfcd15d5ed99b59303b7e265539df93bbb12b3ad14933718ee321eab1a97fefae342ac516938a7f6c37b0859f8c1f
data/CHANGELOG.md CHANGED
@@ -1,6 +1,11 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.89.0 (2025-06-17)
5
+ ------------------
6
+
7
+ * Feature - Adds support for Exportable Public Certificates
8
+
4
9
  1.88.0 (2025-06-02)
5
10
  ------------------
6
11
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.88.0
1
+ 1.89.0
@@ -669,6 +669,7 @@ module Aws::ACM
669
669
  # resp.certificate.certificate_authority_arn #=> String
670
670
  # resp.certificate.renewal_eligibility #=> String, one of "ELIGIBLE", "INELIGIBLE"
671
671
  # resp.certificate.options.certificate_transparency_logging_preference #=> String, one of "ENABLED", "DISABLED"
672
+ # resp.certificate.options.export #=> String, one of "ENABLED", "DISABLED"
672
673
  #
673
674
  #
674
675
  # The following waiters are defined for this operation (see {Client#wait_until} for detailed usage):
@@ -685,18 +686,20 @@ module Aws::ACM
685
686
  end
686
687
 
687
688
  # Exports a private certificate issued by a private certificate
688
- # authority (CA) for use anywhere. The exported file contains the
689
- # certificate, the certificate chain, and the encrypted private 2048-bit
690
- # RSA key associated with the public key that is embedded in the
691
- # certificate. For security, you must assign a passphrase for the
689
+ # authority (CA) or public certificate for use anywhere. The exported
690
+ # file contains the certificate, the certificate chain, and the
691
+ # encrypted private key associated with the public key that is embedded
692
+ # in the certificate. For security, you must assign a passphrase for the
692
693
  # private key when exporting it.
693
694
  #
694
695
  # For information about exporting and formatting a certificate using the
695
- # ACM console or CLI, see [Export a Private Certificate][1].
696
+ # ACM console or CLI, see [Export a private certificate][1] and [Export
697
+ # a public certificate][2].
696
698
  #
697
699
  #
698
700
  #
699
- # [1]: https://docs.aws.amazon.com/acm/latest/userguide/gs-acm-export-private.html
701
+ # [1]: https://docs.aws.amazon.com/acm/latest/userguide/export-private.html
702
+ # [2]: https://docs.aws.amazon.com/acm/latest/userguide/export-public-certificate
700
703
  #
701
704
  # @option params [required, String] :certificate_arn
702
705
  # An Amazon Resource Name (ARN) of the issued certificate. This must be
@@ -983,6 +986,7 @@ module Aws::ACM
983
986
  # extended_key_usage: ["TLS_WEB_SERVER_AUTHENTICATION"], # accepts TLS_WEB_SERVER_AUTHENTICATION, TLS_WEB_CLIENT_AUTHENTICATION, CODE_SIGNING, EMAIL_PROTECTION, TIME_STAMPING, OCSP_SIGNING, IPSEC_END_SYSTEM, IPSEC_TUNNEL, IPSEC_USER, ANY, NONE, CUSTOM
984
987
  # key_usage: ["DIGITAL_SIGNATURE"], # accepts DIGITAL_SIGNATURE, NON_REPUDIATION, KEY_ENCIPHERMENT, DATA_ENCIPHERMENT, KEY_AGREEMENT, CERTIFICATE_SIGNING, CRL_SIGNING, ENCIPHER_ONLY, DECIPHER_ONLY, ANY, CUSTOM
985
988
  # key_types: ["RSA_1024"], # accepts RSA_1024, RSA_2048, RSA_3072, RSA_4096, EC_prime256v1, EC_secp384r1, EC_secp521r1
989
+ # export_option: "ENABLED", # accepts ENABLED, DISABLED
986
990
  # managed_by: "CLOUDFRONT", # accepts CLOUDFRONT
987
991
  # },
988
992
  # next_token: "NextToken",
@@ -1007,6 +1011,7 @@ module Aws::ACM
1007
1011
  # resp.certificate_summary_list[0].key_usages[0] #=> String, one of "DIGITAL_SIGNATURE", "NON_REPUDIATION", "KEY_ENCIPHERMENT", "DATA_ENCIPHERMENT", "KEY_AGREEMENT", "CERTIFICATE_SIGNING", "CRL_SIGNING", "ENCIPHER_ONLY", "DECIPHER_ONLY", "ANY", "CUSTOM"
1008
1012
  # resp.certificate_summary_list[0].extended_key_usages #=> Array
1009
1013
  # resp.certificate_summary_list[0].extended_key_usages[0] #=> String, one of "TLS_WEB_SERVER_AUTHENTICATION", "TLS_WEB_CLIENT_AUTHENTICATION", "CODE_SIGNING", "EMAIL_PROTECTION", "TIME_STAMPING", "OCSP_SIGNING", "IPSEC_END_SYSTEM", "IPSEC_TUNNEL", "IPSEC_USER", "ANY", "NONE", "CUSTOM"
1014
+ # resp.certificate_summary_list[0].export_option #=> String, one of "ENABLED", "DISABLED"
1010
1015
  # resp.certificate_summary_list[0].in_use #=> Boolean
1011
1016
  # resp.certificate_summary_list[0].exported #=> Boolean
1012
1017
  # resp.certificate_summary_list[0].renewal_eligibility #=> String, one of "ELIGIBLE", "INELIGIBLE"
@@ -1158,17 +1163,16 @@ module Aws::ACM
1158
1163
  req.send_request(options)
1159
1164
  end
1160
1165
 
1161
- # Renews an eligible ACM certificate. At this time, only exported
1162
- # private certificates can be renewed with this operation. In order to
1163
- # renew your Amazon Web Services Private CA certificates with ACM, you
1164
- # must first [grant the ACM service principal permission to do so][1].
1165
- # For more information, see [Testing Managed Renewal][2] in the ACM User
1166
- # Guide.
1166
+ # Renews an [eligible ACM certificate][1]. In order to renew your Amazon
1167
+ # Web Services Private CA certificates with ACM, you must first [grant
1168
+ # the ACM service principal permission to do so][2]. For more
1169
+ # information, see [Testing Managed Renewal][3] in the ACM User Guide.
1167
1170
  #
1168
1171
  #
1169
1172
  #
1170
- # [1]: https://docs.aws.amazon.com/privateca/latest/userguide/PcaPermissions.html
1171
- # [2]: https://docs.aws.amazon.com/acm/latest/userguide/manual-renewal.html
1173
+ # [1]: https://docs.aws.amazon.com/acm/latest/userguide/managed-renewal.html
1174
+ # [2]: https://docs.aws.amazon.com/privateca/latest/userguide/PcaPermissions.html
1175
+ # [3]: https://docs.aws.amazon.com/acm/latest/userguide/manual-renewal.html
1172
1176
  #
1173
1177
  # @option params [required, String] :certificate_arn
1174
1178
  # String that contains the ARN of the ACM certificate to be renewed.
@@ -1210,8 +1214,7 @@ module Aws::ACM
1210
1214
  # required. If you are requesting a public certificate, each domain name
1211
1215
  # that you specify must be validated to verify that you own or control
1212
1216
  # the domain. You can use [DNS validation][1] or [email validation][2].
1213
- # We recommend that you use DNS validation. ACM issues public
1214
- # certificates after receiving approval from the domain owner.
1217
+ # We recommend that you use DNS validation.
1215
1218
  #
1216
1219
  # <note markdown="1"> ACM behavior differs from the [RFC 6125][3] specification of the
1217
1220
  # certificate validation process. ACM first checks for a Subject
@@ -1301,16 +1304,24 @@ module Aws::ACM
1301
1304
  # you can validate domain ownership.
1302
1305
  #
1303
1306
  # @option params [Types::CertificateOptions] :options
1304
- # Currently, you can use this parameter to specify whether to add the
1305
- # certificate to a certificate transparency log. Certificate
1306
- # transparency makes it possible to detect SSL/TLS certificates that
1307
- # have been mistakenly or maliciously issued. Certificates that have not
1308
- # been logged typically produce an error message in a browser. For more
1309
- # information, see [Opting Out of Certificate Transparency Logging][1].
1307
+ # You can use this parameter to specify whether to add the certificate
1308
+ # to a certificate transparency log and export your certificate.
1309
+ #
1310
+ # Certificate transparency makes it possible to detect SSL/TLS
1311
+ # certificates that have been mistakenly or maliciously issued.
1312
+ # Certificates that have not been logged typically produce an error
1313
+ # message in a browser. For more information, see [Opting Out of
1314
+ # Certificate Transparency Logging][1].
1315
+ #
1316
+ # You can export public ACM certificates to use with Amazon Web Services
1317
+ # services as well as outside the Amazon Web Services Cloud. For more
1318
+ # information, see [Certificate Manager exportable public
1319
+ # certificate][2].
1310
1320
  #
1311
1321
  #
1312
1322
  #
1313
1323
  # [1]: https://docs.aws.amazon.com/acm/latest/userguide/acm-bestpractices.html#best-practices-transparency
1324
+ # [2]: https://docs.aws.amazon.com/acm/latest/userguide/acm-exportable-certificates.html
1314
1325
  #
1315
1326
  # @option params [String] :certificate_authority_arn
1316
1327
  # The Amazon Resource Name (ARN) of the private certificate authority
@@ -1389,6 +1400,7 @@ module Aws::ACM
1389
1400
  # ],
1390
1401
  # options: {
1391
1402
  # certificate_transparency_logging_preference: "ENABLED", # accepts ENABLED, DISABLED
1403
+ # export: "ENABLED", # accepts ENABLED, DISABLED
1392
1404
  # },
1393
1405
  # certificate_authority_arn: "PcaArn",
1394
1406
  # tags: [
@@ -1483,14 +1495,52 @@ module Aws::ACM
1483
1495
  req.send_request(options)
1484
1496
  end
1485
1497
 
1486
- # Updates a certificate. Currently, you can use this function to specify
1487
- # whether to opt in to or out of recording your certificate in a
1488
- # certificate transparency log. For more information, see [ Opting Out
1489
- # of Certificate Transparency Logging][1].
1498
+ # Revokes a public ACM certificate. You can only revoke certificates
1499
+ # that have been previously exported.
1500
+ #
1501
+ # @option params [required, String] :certificate_arn
1502
+ # The Amazon Resource Name (ARN) of the public or private certificate
1503
+ # that will be revoked. The ARN must have the following form:
1504
+ #
1505
+ # `arn:aws:acm:region:account:certificate/12345678-1234-1234-1234-123456789012`
1506
+ #
1507
+ # @option params [required, String] :revocation_reason
1508
+ # Specifies why you revoked the certificate.
1509
+ #
1510
+ # @return [Types::RevokeCertificateResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
1511
+ #
1512
+ # * {Types::RevokeCertificateResponse#certificate_arn #certificate_arn} => String
1513
+ #
1514
+ # @example Request syntax with placeholder values
1515
+ #
1516
+ # resp = client.revoke_certificate({
1517
+ # certificate_arn: "Arn", # required
1518
+ # revocation_reason: "UNSPECIFIED", # required, accepts UNSPECIFIED, KEY_COMPROMISE, CA_COMPROMISE, AFFILIATION_CHANGED, SUPERCEDED, SUPERSEDED, CESSATION_OF_OPERATION, CERTIFICATE_HOLD, REMOVE_FROM_CRL, PRIVILEGE_WITHDRAWN, A_A_COMPROMISE
1519
+ # })
1520
+ #
1521
+ # @example Response structure
1522
+ #
1523
+ # resp.certificate_arn #=> String
1524
+ #
1525
+ # @see http://docs.aws.amazon.com/goto/WebAPI/acm-2015-12-08/RevokeCertificate AWS API Documentation
1526
+ #
1527
+ # @overload revoke_certificate(params = {})
1528
+ # @param [Hash] params ({})
1529
+ def revoke_certificate(params = {}, options = {})
1530
+ req = build_request(:revoke_certificate, params)
1531
+ req.send_request(options)
1532
+ end
1533
+
1534
+ # Updates a certificate. You can use this function to specify whether to
1535
+ # opt in to or out of recording your certificate in a certificate
1536
+ # transparency log and exporting. For more information, see [ Opting Out
1537
+ # of Certificate Transparency Logging][1] and [Certificate Manager
1538
+ # Exportable Managed Certificates][2].
1490
1539
  #
1491
1540
  #
1492
1541
  #
1493
1542
  # [1]: https://docs.aws.amazon.com/acm/latest/userguide/acm-bestpractices.html#best-practices-transparency
1543
+ # [2]: https://docs.aws.amazon.com/acm/latest/userguide/acm-exportable-certificates.html
1494
1544
  #
1495
1545
  # @option params [required, String] :certificate_arn
1496
1546
  # ARN of the requested certificate to update. This must be of the form:
@@ -1500,11 +1550,11 @@ module Aws::ACM
1500
1550
  #
1501
1551
  # @option params [required, Types::CertificateOptions] :options
1502
1552
  # Use to update the options for your certificate. Currently, you can
1503
- # specify whether to add your certificate to a transparency log.
1504
- # Certificate transparency makes it possible to detect SSL/TLS
1505
- # certificates that have been mistakenly or maliciously issued.
1506
- # Certificates that have not been logged typically produce an error
1507
- # message in a browser.
1553
+ # specify whether to add your certificate to a transparency log or
1554
+ # export your certificate. Certificate transparency makes it possible to
1555
+ # detect SSL/TLS certificates that have been mistakenly or maliciously
1556
+ # issued. Certificates that have not been logged typically produce an
1557
+ # error message in a browser.
1508
1558
  #
1509
1559
  # @return [Struct] Returns an empty {Seahorse::Client::Response response}.
1510
1560
  #
@@ -1514,6 +1564,7 @@ module Aws::ACM
1514
1564
  # certificate_arn: "Arn", # required
1515
1565
  # options: { # required
1516
1566
  # certificate_transparency_logging_preference: "ENABLED", # accepts ENABLED, DISABLED
1567
+ # export: "ENABLED", # accepts ENABLED, DISABLED
1517
1568
  # },
1518
1569
  # })
1519
1570
  #
@@ -1544,7 +1595,7 @@ module Aws::ACM
1544
1595
  tracer: tracer
1545
1596
  )
1546
1597
  context[:gem_name] = 'aws-sdk-acm'
1547
- context[:gem_version] = '1.88.0'
1598
+ context[:gem_version] = '1.89.0'
1548
1599
  Seahorse::Client::Request.new(handlers, context)
1549
1600
  end
1550
1601
 
@@ -23,6 +23,7 @@ module Aws::ACM
23
23
  CertificateChain = Shapes::StringShape.new(name: 'CertificateChain')
24
24
  CertificateChainBlob = Shapes::BlobShape.new(name: 'CertificateChainBlob')
25
25
  CertificateDetail = Shapes::StructureShape.new(name: 'CertificateDetail')
26
+ CertificateExport = Shapes::StringShape.new(name: 'CertificateExport')
26
27
  CertificateManagedBy = Shapes::StringShape.new(name: 'CertificateManagedBy')
27
28
  CertificateOptions = Shapes::StructureShape.new(name: 'CertificateOptions')
28
29
  CertificateStatus = Shapes::StringShape.new(name: 'CertificateStatus')
@@ -101,6 +102,8 @@ module Aws::ACM
101
102
  ResourceNotFoundException = Shapes::StructureShape.new(name: 'ResourceNotFoundException')
102
103
  ResourceRecord = Shapes::StructureShape.new(name: 'ResourceRecord')
103
104
  RevocationReason = Shapes::StringShape.new(name: 'RevocationReason')
105
+ RevokeCertificateRequest = Shapes::StructureShape.new(name: 'RevokeCertificateRequest')
106
+ RevokeCertificateResponse = Shapes::StructureShape.new(name: 'RevokeCertificateResponse')
104
107
  ServiceErrorMessage = Shapes::StringShape.new(name: 'ServiceErrorMessage')
105
108
  SortBy = Shapes::StringShape.new(name: 'SortBy')
106
109
  SortOrder = Shapes::StringShape.new(name: 'SortOrder')
@@ -156,6 +159,7 @@ module Aws::ACM
156
159
  CertificateDetail.struct_class = Types::CertificateDetail
157
160
 
158
161
  CertificateOptions.add_member(:certificate_transparency_logging_preference, Shapes::ShapeRef.new(shape: CertificateTransparencyLoggingPreference, location_name: "CertificateTransparencyLoggingPreference"))
162
+ CertificateOptions.add_member(:export, Shapes::ShapeRef.new(shape: CertificateExport, location_name: "Export"))
159
163
  CertificateOptions.struct_class = Types::CertificateOptions
160
164
 
161
165
  CertificateStatuses.member = Shapes::ShapeRef.new(shape: CertificateStatus)
@@ -169,6 +173,7 @@ module Aws::ACM
169
173
  CertificateSummary.add_member(:key_algorithm, Shapes::ShapeRef.new(shape: KeyAlgorithm, location_name: "KeyAlgorithm"))
170
174
  CertificateSummary.add_member(:key_usages, Shapes::ShapeRef.new(shape: KeyUsageNames, location_name: "KeyUsages"))
171
175
  CertificateSummary.add_member(:extended_key_usages, Shapes::ShapeRef.new(shape: ExtendedKeyUsageNames, location_name: "ExtendedKeyUsages"))
176
+ CertificateSummary.add_member(:export_option, Shapes::ShapeRef.new(shape: CertificateExport, location_name: "ExportOption"))
172
177
  CertificateSummary.add_member(:in_use, Shapes::ShapeRef.new(shape: NullableBoolean, location_name: "InUse"))
173
178
  CertificateSummary.add_member(:exported, Shapes::ShapeRef.new(shape: NullableBoolean, location_name: "Exported"))
174
179
  CertificateSummary.add_member(:renewal_eligibility, Shapes::ShapeRef.new(shape: RenewalEligibility, location_name: "RenewalEligibility"))
@@ -239,6 +244,7 @@ module Aws::ACM
239
244
  Filters.add_member(:extended_key_usage, Shapes::ShapeRef.new(shape: ExtendedKeyUsageFilterList, location_name: "extendedKeyUsage"))
240
245
  Filters.add_member(:key_usage, Shapes::ShapeRef.new(shape: KeyUsageFilterList, location_name: "keyUsage"))
241
246
  Filters.add_member(:key_types, Shapes::ShapeRef.new(shape: KeyAlgorithmList, location_name: "keyTypes"))
247
+ Filters.add_member(:export_option, Shapes::ShapeRef.new(shape: CertificateExport, location_name: "exportOption"))
242
248
  Filters.add_member(:managed_by, Shapes::ShapeRef.new(shape: CertificateManagedBy, location_name: "managedBy"))
243
249
  Filters.struct_class = Types::Filters
244
250
 
@@ -369,6 +375,13 @@ module Aws::ACM
369
375
  ResourceRecord.add_member(:value, Shapes::ShapeRef.new(shape: String, required: true, location_name: "Value"))
370
376
  ResourceRecord.struct_class = Types::ResourceRecord
371
377
 
378
+ RevokeCertificateRequest.add_member(:certificate_arn, Shapes::ShapeRef.new(shape: Arn, required: true, location_name: "CertificateArn"))
379
+ RevokeCertificateRequest.add_member(:revocation_reason, Shapes::ShapeRef.new(shape: RevocationReason, required: true, location_name: "RevocationReason"))
380
+ RevokeCertificateRequest.struct_class = Types::RevokeCertificateRequest
381
+
382
+ RevokeCertificateResponse.add_member(:certificate_arn, Shapes::ShapeRef.new(shape: Arn, location_name: "CertificateArn"))
383
+ RevokeCertificateResponse.struct_class = Types::RevokeCertificateResponse
384
+
372
385
  Tag.add_member(:key, Shapes::ShapeRef.new(shape: TagKey, required: true, location_name: "Key"))
373
386
  Tag.add_member(:value, Shapes::ShapeRef.new(shape: TagValue, location_name: "Value"))
374
387
  Tag.struct_class = Types::Tag
@@ -421,11 +434,11 @@ module Aws::ACM
421
434
  o.http_request_uri = "/"
422
435
  o.input = Shapes::ShapeRef.new(shape: AddTagsToCertificateRequest)
423
436
  o.output = Shapes::ShapeRef.new(shape: Shapes::StructureShape.new(struct_class: Aws::EmptyStructure))
424
- o.errors << Shapes::ShapeRef.new(shape: TagPolicyException)
425
437
  o.errors << Shapes::ShapeRef.new(shape: InvalidParameterException)
438
+ o.errors << Shapes::ShapeRef.new(shape: TagPolicyException)
426
439
  o.errors << Shapes::ShapeRef.new(shape: TooManyTagsException)
427
- o.errors << Shapes::ShapeRef.new(shape: ThrottlingException)
428
440
  o.errors << Shapes::ShapeRef.new(shape: InvalidArnException)
441
+ o.errors << Shapes::ShapeRef.new(shape: ThrottlingException)
429
442
  o.errors << Shapes::ShapeRef.new(shape: InvalidTagException)
430
443
  o.errors << Shapes::ShapeRef.new(shape: ResourceNotFoundException)
431
444
  end)
@@ -437,8 +450,8 @@ module Aws::ACM
437
450
  o.input = Shapes::ShapeRef.new(shape: DeleteCertificateRequest)
438
451
  o.output = Shapes::ShapeRef.new(shape: Shapes::StructureShape.new(struct_class: Aws::EmptyStructure))
439
452
  o.errors << Shapes::ShapeRef.new(shape: ResourceInUseException)
440
- o.errors << Shapes::ShapeRef.new(shape: ThrottlingException)
441
453
  o.errors << Shapes::ShapeRef.new(shape: InvalidArnException)
454
+ o.errors << Shapes::ShapeRef.new(shape: ThrottlingException)
442
455
  o.errors << Shapes::ShapeRef.new(shape: ConflictException)
443
456
  o.errors << Shapes::ShapeRef.new(shape: AccessDeniedException)
444
457
  o.errors << Shapes::ShapeRef.new(shape: ResourceNotFoundException)
@@ -492,8 +505,8 @@ module Aws::ACM
492
505
  o.http_request_uri = "/"
493
506
  o.input = Shapes::ShapeRef.new(shape: ImportCertificateRequest)
494
507
  o.output = Shapes::ShapeRef.new(shape: ImportCertificateResponse)
495
- o.errors << Shapes::ShapeRef.new(shape: TagPolicyException)
496
508
  o.errors << Shapes::ShapeRef.new(shape: InvalidParameterException)
509
+ o.errors << Shapes::ShapeRef.new(shape: TagPolicyException)
497
510
  o.errors << Shapes::ShapeRef.new(shape: TooManyTagsException)
498
511
  o.errors << Shapes::ShapeRef.new(shape: InvalidArnException)
499
512
  o.errors << Shapes::ShapeRef.new(shape: InvalidTagException)
@@ -545,10 +558,10 @@ module Aws::ACM
545
558
  o.http_request_uri = "/"
546
559
  o.input = Shapes::ShapeRef.new(shape: RemoveTagsFromCertificateRequest)
547
560
  o.output = Shapes::ShapeRef.new(shape: Shapes::StructureShape.new(struct_class: Aws::EmptyStructure))
548
- o.errors << Shapes::ShapeRef.new(shape: TagPolicyException)
549
561
  o.errors << Shapes::ShapeRef.new(shape: InvalidParameterException)
550
- o.errors << Shapes::ShapeRef.new(shape: ThrottlingException)
562
+ o.errors << Shapes::ShapeRef.new(shape: TagPolicyException)
551
563
  o.errors << Shapes::ShapeRef.new(shape: InvalidArnException)
564
+ o.errors << Shapes::ShapeRef.new(shape: ThrottlingException)
552
565
  o.errors << Shapes::ShapeRef.new(shape: InvalidTagException)
553
566
  o.errors << Shapes::ShapeRef.new(shape: ResourceNotFoundException)
554
567
  end)
@@ -570,8 +583,8 @@ module Aws::ACM
570
583
  o.http_request_uri = "/"
571
584
  o.input = Shapes::ShapeRef.new(shape: RequestCertificateRequest)
572
585
  o.output = Shapes::ShapeRef.new(shape: RequestCertificateResponse)
573
- o.errors << Shapes::ShapeRef.new(shape: TagPolicyException)
574
586
  o.errors << Shapes::ShapeRef.new(shape: InvalidParameterException)
587
+ o.errors << Shapes::ShapeRef.new(shape: TagPolicyException)
575
588
  o.errors << Shapes::ShapeRef.new(shape: TooManyTagsException)
576
589
  o.errors << Shapes::ShapeRef.new(shape: InvalidArnException)
577
590
  o.errors << Shapes::ShapeRef.new(shape: InvalidTagException)
@@ -591,6 +604,20 @@ module Aws::ACM
591
604
  o.errors << Shapes::ShapeRef.new(shape: ResourceNotFoundException)
592
605
  end)
593
606
 
607
+ api.add_operation(:revoke_certificate, Seahorse::Model::Operation.new.tap do |o|
608
+ o.name = "RevokeCertificate"
609
+ o.http_method = "POST"
610
+ o.http_request_uri = "/"
611
+ o.input = Shapes::ShapeRef.new(shape: RevokeCertificateRequest)
612
+ o.output = Shapes::ShapeRef.new(shape: RevokeCertificateResponse)
613
+ o.errors << Shapes::ShapeRef.new(shape: ResourceInUseException)
614
+ o.errors << Shapes::ShapeRef.new(shape: InvalidArnException)
615
+ o.errors << Shapes::ShapeRef.new(shape: ThrottlingException)
616
+ o.errors << Shapes::ShapeRef.new(shape: ConflictException)
617
+ o.errors << Shapes::ShapeRef.new(shape: AccessDeniedException)
618
+ o.errors << Shapes::ShapeRef.new(shape: ResourceNotFoundException)
619
+ end)
620
+
594
621
  api.add_operation(:update_certificate_options, Seahorse::Model::Operation.new.tap do |o|
595
622
  o.name = "UpdateCertificateOptions"
596
623
  o.http_method = "POST"
@@ -272,28 +272,42 @@ module Aws::ACM
272
272
  include Aws::Structure
273
273
  end
274
274
 
275
- # Structure that contains options for your certificate. Currently, you
276
- # can use this only to specify whether to opt in to or out of
277
- # certificate transparency logging. Some browsers require that public
278
- # certificates issued for your domain be recorded in a log. Certificates
279
- # that are not logged typically generate a browser error. Transparency
280
- # makes it possible for you to detect SSL/TLS certificates that have
281
- # been mistakenly or maliciously issued for your domain. For general
282
- # information, see [Certificate Transparency Logging][1].
275
+ # Structure that contains options for your certificate. You can use this
276
+ # structure to specify whether to opt in to or out of certificate
277
+ # transparency logging and export your certificate.
278
+ #
279
+ # Some browsers require that public certificates issued for your domain
280
+ # be recorded in a log. Certificates that are not logged typically
281
+ # generate a browser error. Transparency makes it possible for you to
282
+ # detect SSL/TLS certificates that have been mistakenly or maliciously
283
+ # issued for your domain. For general information, see [Certificate
284
+ # Transparency Logging][1].
285
+ #
286
+ # You can export public ACM certificates to use with Amazon Web Services
287
+ # services as well as outside Amazon Web Services Cloud. For more
288
+ # information, see [Certificate Manager exportable public
289
+ # certificate][2].
283
290
  #
284
291
  #
285
292
  #
286
293
  # [1]: https://docs.aws.amazon.com/acm/latest/userguide/acm-concepts.html#concept-transparency
294
+ # [2]: https://docs.aws.amazon.com/acm/latest/userguide/acm-exportable-certificates.html
287
295
  #
288
296
  # @!attribute [rw] certificate_transparency_logging_preference
289
297
  # You can opt out of certificate transparency logging by specifying
290
298
  # the `DISABLED` option. Opt in by specifying `ENABLED`.
291
299
  # @return [String]
292
300
  #
301
+ # @!attribute [rw] export
302
+ # You can opt in to allow the export of your certificates by
303
+ # specifying `ENABLED`.
304
+ # @return [String]
305
+ #
293
306
  # @see http://docs.aws.amazon.com/goto/WebAPI/acm-2015-12-08/CertificateOptions AWS API Documentation
294
307
  #
295
308
  class CertificateOptions < Struct.new(
296
- :certificate_transparency_logging_preference)
309
+ :certificate_transparency_logging_preference,
310
+ :export)
297
311
  SENSITIVE = []
298
312
  include Aws::Structure
299
313
  end
@@ -404,6 +418,10 @@ module Aws::ACM
404
418
  # can be used and consists of a name and an object identifier (OID).
405
419
  # @return [Array<String>]
406
420
  #
421
+ # @!attribute [rw] export_option
422
+ # Indicates if export is enabled for the certificate.
423
+ # @return [String]
424
+ #
407
425
  # @!attribute [rw] in_use
408
426
  # Indicates whether the certificate is currently in use by any Amazon
409
427
  # Web Services resources.
@@ -464,6 +482,7 @@ module Aws::ACM
464
482
  :key_algorithm,
465
483
  :key_usages,
466
484
  :extended_key_usages,
485
+ :export_option,
467
486
  :in_use,
468
487
  :exported,
469
488
  :renewal_eligibility,
@@ -582,11 +601,13 @@ module Aws::ACM
582
601
  # domain validation. For more information, see [Use DNS to Validate
583
602
  # Domain Ownership][1].
584
603
  #
585
- # Note: The CNAME information that you need does not include the name
586
- # of your domain. If you include your domain name in the DNS database
604
+ # <note markdown="1"> The CNAME information that you need does not include the name of
605
+ # your domain. If you include your domain name in the DNS database
587
606
  # CNAME record, validation fails. For example, if the name is
588
- # "\_a79865eb4cd1a6ab990a45779b4e0b96.yourdomain.com", only
589
- # "\_a79865eb4cd1a6ab990a45779b4e0b96" must be used.
607
+ # `_a79865eb4cd1a6ab990a45779b4e0b96.yourdomain.com`, only
608
+ # `_a79865eb4cd1a6ab990a45779b4e0b96` must be used.
609
+ #
610
+ # </note>
590
611
  #
591
612
  #
592
613
  #
@@ -595,9 +616,9 @@ module Aws::ACM
595
616
  #
596
617
  # @!attribute [rw] http_redirect
597
618
  # Contains information for HTTP-based domain validation of
598
- # certificates requested through CloudFront and issued by ACM. This
599
- # field exists only when the certificate type is `AMAZON_ISSUED` and
600
- # the validation method is `HTTP`.
619
+ # certificates requested through Amazon CloudFront and issued by ACM.
620
+ # This field exists only when the certificate type is `AMAZON_ISSUED`
621
+ # and the validation method is `HTTP`.
601
622
  # @return [Types::HttpRedirect]
602
623
  #
603
624
  # @!attribute [rw] validation_method
@@ -794,6 +815,11 @@ module Aws::ACM
794
815
  # certificates.
795
816
  # @return [Array<String>]
796
817
  #
818
+ # @!attribute [rw] export_option
819
+ # Specify `ENABLED` or `DISABLED` to identify certificates that can be
820
+ # exported.
821
+ # @return [String]
822
+ #
797
823
  # @!attribute [rw] managed_by
798
824
  # Identifies the Amazon Web Services service that manages the
799
825
  # certificate issued by ACM.
@@ -805,6 +831,7 @@ module Aws::ACM
805
831
  :extended_key_usage,
806
832
  :key_usage,
807
833
  :key_types,
834
+ :export_option,
808
835
  :managed_by)
809
836
  SENSITIVE = []
810
837
  include Aws::Structure
@@ -865,9 +892,9 @@ module Aws::ACM
865
892
  end
866
893
 
867
894
  # Contains information for HTTP-based domain validation of certificates
868
- # requested through CloudFront and issued by ACM. This field exists only
869
- # when the certificate type is `AMAZON_ISSUED` and the validation method
870
- # is `HTTP`.
895
+ # requested through Amazon CloudFront and issued by ACM. This field
896
+ # exists only when the certificate type is `AMAZON_ISSUED` and the
897
+ # validation method is `HTTP`.
871
898
  #
872
899
  # @!attribute [rw] redirect_from
873
900
  # The URL including the domain to be validated. The certificate
@@ -944,7 +971,7 @@ module Aws::ACM
944
971
  include Aws::Structure
945
972
  end
946
973
 
947
- # One or more of of request parameters specified is not valid.
974
+ # One or more of request parameters specified is not valid.
948
975
  #
949
976
  # @!attribute [rw] message
950
977
  # @return [String]
@@ -1349,17 +1376,24 @@ module Aws::ACM
1349
1376
  # @return [Array<Types::DomainValidationOption>]
1350
1377
  #
1351
1378
  # @!attribute [rw] options
1352
- # Currently, you can use this parameter to specify whether to add the
1353
- # certificate to a certificate transparency log. Certificate
1354
- # transparency makes it possible to detect SSL/TLS certificates that
1355
- # have been mistakenly or maliciously issued. Certificates that have
1356
- # not been logged typically produce an error message in a browser. For
1357
- # more information, see [Opting Out of Certificate Transparency
1358
- # Logging][1].
1379
+ # You can use this parameter to specify whether to add the certificate
1380
+ # to a certificate transparency log and export your certificate.
1381
+ #
1382
+ # Certificate transparency makes it possible to detect SSL/TLS
1383
+ # certificates that have been mistakenly or maliciously issued.
1384
+ # Certificates that have not been logged typically produce an error
1385
+ # message in a browser. For more information, see [Opting Out of
1386
+ # Certificate Transparency Logging][1].
1387
+ #
1388
+ # You can export public ACM certificates to use with Amazon Web
1389
+ # Services services as well as outside the Amazon Web Services Cloud.
1390
+ # For more information, see [Certificate Manager exportable public
1391
+ # certificate][2].
1359
1392
  #
1360
1393
  #
1361
1394
  #
1362
1395
  # [1]: https://docs.aws.amazon.com/acm/latest/userguide/acm-bestpractices.html#best-practices-transparency
1396
+ # [2]: https://docs.aws.amazon.com/acm/latest/userguide/acm-exportable-certificates.html
1363
1397
  # @return [Types::CertificateOptions]
1364
1398
  #
1365
1399
  # @!attribute [rw] certificate_authority_arn
@@ -1573,6 +1607,39 @@ module Aws::ACM
1573
1607
  include Aws::Structure
1574
1608
  end
1575
1609
 
1610
+ # @!attribute [rw] certificate_arn
1611
+ # The Amazon Resource Name (ARN) of the public or private certificate
1612
+ # that will be revoked. The ARN must have the following form:
1613
+ #
1614
+ # `arn:aws:acm:region:account:certificate/12345678-1234-1234-1234-123456789012`
1615
+ # @return [String]
1616
+ #
1617
+ # @!attribute [rw] revocation_reason
1618
+ # Specifies why you revoked the certificate.
1619
+ # @return [String]
1620
+ #
1621
+ # @see http://docs.aws.amazon.com/goto/WebAPI/acm-2015-12-08/RevokeCertificateRequest AWS API Documentation
1622
+ #
1623
+ class RevokeCertificateRequest < Struct.new(
1624
+ :certificate_arn,
1625
+ :revocation_reason)
1626
+ SENSITIVE = []
1627
+ include Aws::Structure
1628
+ end
1629
+
1630
+ # @!attribute [rw] certificate_arn
1631
+ # The Amazon Resource Name (ARN) of the public or private certificate
1632
+ # that was revoked.
1633
+ # @return [String]
1634
+ #
1635
+ # @see http://docs.aws.amazon.com/goto/WebAPI/acm-2015-12-08/RevokeCertificateResponse AWS API Documentation
1636
+ #
1637
+ class RevokeCertificateResponse < Struct.new(
1638
+ :certificate_arn)
1639
+ SENSITIVE = []
1640
+ include Aws::Structure
1641
+ end
1642
+
1576
1643
  # A key-value pair that identifies or specifies metadata about an ACM
1577
1644
  # resource.
1578
1645
  #
@@ -1644,11 +1711,11 @@ module Aws::ACM
1644
1711
  #
1645
1712
  # @!attribute [rw] options
1646
1713
  # Use to update the options for your certificate. Currently, you can
1647
- # specify whether to add your certificate to a transparency log.
1648
- # Certificate transparency makes it possible to detect SSL/TLS
1649
- # certificates that have been mistakenly or maliciously issued.
1650
- # Certificates that have not been logged typically produce an error
1651
- # message in a browser.
1714
+ # specify whether to add your certificate to a transparency log or
1715
+ # export your certificate. Certificate transparency makes it possible
1716
+ # to detect SSL/TLS certificates that have been mistakenly or
1717
+ # maliciously issued. Certificates that have not been logged typically
1718
+ # produce an error message in a browser.
1652
1719
  # @return [Types::CertificateOptions]
1653
1720
  #
1654
1721
  # @see http://docs.aws.amazon.com/goto/WebAPI/acm-2015-12-08/UpdateCertificateOptionsRequest AWS API Documentation
data/lib/aws-sdk-acm.rb CHANGED
@@ -55,7 +55,7 @@ module Aws::ACM
55
55
  autoload :EndpointProvider, 'aws-sdk-acm/endpoint_provider'
56
56
  autoload :Endpoints, 'aws-sdk-acm/endpoints'
57
57
 
58
- GEM_VERSION = '1.88.0'
58
+ GEM_VERSION = '1.89.0'
59
59
 
60
60
  end
61
61
 
data/sig/client.rbs CHANGED
@@ -169,6 +169,7 @@ module Aws
169
169
  extended_key_usage: Array[("TLS_WEB_SERVER_AUTHENTICATION" | "TLS_WEB_CLIENT_AUTHENTICATION" | "CODE_SIGNING" | "EMAIL_PROTECTION" | "TIME_STAMPING" | "OCSP_SIGNING" | "IPSEC_END_SYSTEM" | "IPSEC_TUNNEL" | "IPSEC_USER" | "ANY" | "NONE" | "CUSTOM")]?,
170
170
  key_usage: Array[("DIGITAL_SIGNATURE" | "NON_REPUDIATION" | "KEY_ENCIPHERMENT" | "DATA_ENCIPHERMENT" | "KEY_AGREEMENT" | "CERTIFICATE_SIGNING" | "CRL_SIGNING" | "ENCIPHER_ONLY" | "DECIPHER_ONLY" | "ANY" | "CUSTOM")]?,
171
171
  key_types: Array[("RSA_1024" | "RSA_2048" | "RSA_3072" | "RSA_4096" | "EC_prime256v1" | "EC_secp384r1" | "EC_secp521r1")]?,
172
+ export_option: ("ENABLED" | "DISABLED")?,
172
173
  managed_by: ("CLOUDFRONT")?
173
174
  },
174
175
  ?next_token: ::String,
@@ -232,7 +233,8 @@ module Aws
232
233
  },
233
234
  ],
234
235
  ?options: {
235
- certificate_transparency_logging_preference: ("ENABLED" | "DISABLED")?
236
+ certificate_transparency_logging_preference: ("ENABLED" | "DISABLED")?,
237
+ export: ("ENABLED" | "DISABLED")?
236
238
  },
237
239
  ?certificate_authority_arn: ::String,
238
240
  ?tags: Array[
@@ -254,11 +256,23 @@ module Aws
254
256
  ) -> ::Seahorse::Client::_ResponseSuccess[::Aws::EmptyStructure]
255
257
  | (Hash[Symbol, untyped] params, ?Hash[Symbol, untyped] options) -> ::Seahorse::Client::_ResponseSuccess[::Aws::EmptyStructure]
256
258
 
259
+ interface _RevokeCertificateResponseSuccess
260
+ include ::Seahorse::Client::_ResponseSuccess[Types::RevokeCertificateResponse]
261
+ def certificate_arn: () -> ::String
262
+ end
263
+ # https://docs.aws.amazon.com/sdk-for-ruby/v3/api/Aws/ACM/Client.html#revoke_certificate-instance_method
264
+ def revoke_certificate: (
265
+ certificate_arn: ::String,
266
+ revocation_reason: ("UNSPECIFIED" | "KEY_COMPROMISE" | "CA_COMPROMISE" | "AFFILIATION_CHANGED" | "SUPERCEDED" | "SUPERSEDED" | "CESSATION_OF_OPERATION" | "CERTIFICATE_HOLD" | "REMOVE_FROM_CRL" | "PRIVILEGE_WITHDRAWN" | "A_A_COMPROMISE")
267
+ ) -> _RevokeCertificateResponseSuccess
268
+ | (Hash[Symbol, untyped] params, ?Hash[Symbol, untyped] options) -> _RevokeCertificateResponseSuccess
269
+
257
270
  # https://docs.aws.amazon.com/sdk-for-ruby/v3/api/Aws/ACM/Client.html#update_certificate_options-instance_method
258
271
  def update_certificate_options: (
259
272
  certificate_arn: ::String,
260
273
  options: {
261
- certificate_transparency_logging_preference: ("ENABLED" | "DISABLED")?
274
+ certificate_transparency_logging_preference: ("ENABLED" | "DISABLED")?,
275
+ export: ("ENABLED" | "DISABLED")?
262
276
  }
263
277
  ) -> ::Seahorse::Client::_ResponseSuccess[::Aws::EmptyStructure]
264
278
  | (Hash[Symbol, untyped] params, ?Hash[Symbol, untyped] options) -> ::Seahorse::Client::_ResponseSuccess[::Aws::EmptyStructure]
data/sig/types.rbs CHANGED
@@ -52,6 +52,7 @@ module Aws::ACM
52
52
 
53
53
  class CertificateOptions
54
54
  attr_accessor certificate_transparency_logging_preference: ("ENABLED" | "DISABLED")
55
+ attr_accessor export: ("ENABLED" | "DISABLED")
55
56
  SENSITIVE: []
56
57
  end
57
58
 
@@ -65,6 +66,7 @@ module Aws::ACM
65
66
  attr_accessor key_algorithm: ("RSA_1024" | "RSA_2048" | "RSA_3072" | "RSA_4096" | "EC_prime256v1" | "EC_secp384r1" | "EC_secp521r1")
66
67
  attr_accessor key_usages: ::Array[("DIGITAL_SIGNATURE" | "NON_REPUDIATION" | "KEY_ENCIPHERMENT" | "DATA_ENCIPHERMENT" | "KEY_AGREEMENT" | "CERTIFICATE_SIGNING" | "CRL_SIGNING" | "ENCIPHER_ONLY" | "DECIPHER_ONLY" | "ANY" | "CUSTOM")]
67
68
  attr_accessor extended_key_usages: ::Array[("TLS_WEB_SERVER_AUTHENTICATION" | "TLS_WEB_CLIENT_AUTHENTICATION" | "CODE_SIGNING" | "EMAIL_PROTECTION" | "TIME_STAMPING" | "OCSP_SIGNING" | "IPSEC_END_SYSTEM" | "IPSEC_TUNNEL" | "IPSEC_USER" | "ANY" | "NONE" | "CUSTOM")]
69
+ attr_accessor export_option: ("ENABLED" | "DISABLED")
68
70
  attr_accessor in_use: bool
69
71
  attr_accessor exported: bool
70
72
  attr_accessor renewal_eligibility: ("ELIGIBLE" | "INELIGIBLE")
@@ -143,6 +145,7 @@ module Aws::ACM
143
145
  attr_accessor extended_key_usage: ::Array[("TLS_WEB_SERVER_AUTHENTICATION" | "TLS_WEB_CLIENT_AUTHENTICATION" | "CODE_SIGNING" | "EMAIL_PROTECTION" | "TIME_STAMPING" | "OCSP_SIGNING" | "IPSEC_END_SYSTEM" | "IPSEC_TUNNEL" | "IPSEC_USER" | "ANY" | "NONE" | "CUSTOM")]
144
146
  attr_accessor key_usage: ::Array[("DIGITAL_SIGNATURE" | "NON_REPUDIATION" | "KEY_ENCIPHERMENT" | "DATA_ENCIPHERMENT" | "KEY_AGREEMENT" | "CERTIFICATE_SIGNING" | "CRL_SIGNING" | "ENCIPHER_ONLY" | "DECIPHER_ONLY" | "ANY" | "CUSTOM")]
145
147
  attr_accessor key_types: ::Array[("RSA_1024" | "RSA_2048" | "RSA_3072" | "RSA_4096" | "EC_prime256v1" | "EC_secp384r1" | "EC_secp521r1")]
148
+ attr_accessor export_option: ("ENABLED" | "DISABLED")
146
149
  attr_accessor managed_by: ("CLOUDFRONT")
147
150
  SENSITIVE: []
148
151
  end
@@ -322,6 +325,17 @@ module Aws::ACM
322
325
  SENSITIVE: []
323
326
  end
324
327
 
328
+ class RevokeCertificateRequest
329
+ attr_accessor certificate_arn: ::String
330
+ attr_accessor revocation_reason: ("UNSPECIFIED" | "KEY_COMPROMISE" | "CA_COMPROMISE" | "AFFILIATION_CHANGED" | "SUPERCEDED" | "SUPERSEDED" | "CESSATION_OF_OPERATION" | "CERTIFICATE_HOLD" | "REMOVE_FROM_CRL" | "PRIVILEGE_WITHDRAWN" | "A_A_COMPROMISE")
331
+ SENSITIVE: []
332
+ end
333
+
334
+ class RevokeCertificateResponse
335
+ attr_accessor certificate_arn: ::String
336
+ SENSITIVE: []
337
+ end
338
+
325
339
  class Tag
326
340
  attr_accessor key: ::String
327
341
  attr_accessor value: ::String
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-acm
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.88.0
4
+ version: 1.89.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services