aws-sdk-acmpca 1.34.0 → 1.38.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 9ebd7ace492b94a132d32c6bf1ea0eb5d377ce469fc8ac231d7da2497fe23fc7
4
- data.tar.gz: 84a05ad7a3c239e99a9154e1afb9d99aeb439bfa3063c319ddd9387c1484df48
3
+ metadata.gz: 1e3b9c54b829f9b528ea424085e921f77861159ebf67c72b84808f15a29522bb
4
+ data.tar.gz: e0d459cfd5313eccba4beb2f3e6ab83c4d2dd6e6a555496a6d63f99f914ffc62
5
5
  SHA512:
6
- metadata.gz: 704669191732472bc40eb93ac8077e493392b0b149cf5a56df3e5c92dbeb9a7d9034795b258c60019cd6c6853f09d1721143db976f77498885bbecd023fc56f5
7
- data.tar.gz: ffb31436a68b0b6ddaaa9fa086995952e8c84c47b1a0494ddaadcd8deae5976e2970fe8214efab3366ccb96f79f6e0f84984909549b72010a0eb1c6727922962
6
+ metadata.gz: 6f0c57a1746fe4d500b8ae9dbd96b3140de8c1fda946b2acc4f6e9af2facc1e48ff99f7eb71fd5534ec7c97342bdfb9449c3859f0083bbb857176055155f10a3
7
+ data.tar.gz: 24d4dada5ba7822cfbd6b969b922ffde6af4613c31a14acdaf8730ee84b6333143b1edd056e050d42e19a5cab473dfcb48eaddf194bb2dca2d39e7a2a395356e
data/CHANGELOG.md CHANGED
@@ -1,6 +1,26 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.38.0 (2021-07-30)
5
+ ------------------
6
+
7
+ * Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
8
+
9
+ 1.37.0 (2021-07-28)
10
+ ------------------
11
+
12
+ * Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
13
+
14
+ 1.36.0 (2021-05-26)
15
+ ------------------
16
+
17
+ * Feature - This release enables customers to store CRLs in S3 buckets with Block Public Access enabled. The release adds the S3ObjectAcl parameter to the CreateCertificateAuthority and UpdateCertificateAuthority APIs to allow customers to choose whether their CRL will be publicly available.
18
+
19
+ 1.35.0 (2021-05-04)
20
+ ------------------
21
+
22
+ * Feature - This release adds the KeyStorageSecurityStandard parameter to the CreateCertificateAuthority API to allow customers to mandate a security standard to which the CA key will be stored within.
23
+
4
24
  1.34.0 (2021-03-10)
5
25
  ------------------
6
26
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.34.0
1
+ 1.38.0
@@ -49,6 +49,6 @@ require_relative 'aws-sdk-acmpca/customizations'
49
49
  # @!group service
50
50
  module Aws::ACMPCA
51
51
 
52
- GEM_VERSION = '1.34.0'
52
+ GEM_VERSION = '1.38.0'
53
53
 
54
54
  end
@@ -350,7 +350,7 @@ module Aws::ACMPCA
350
350
  # successful, this action returns the Amazon Resource Name (ARN) of the
351
351
  # CA.
352
352
  #
353
- # ACM Private CAA assets that are stored in Amazon S3 can be protected
353
+ # ACM Private CA assets that are stored in Amazon S3 can be protected
354
354
  # with encryption. For more information, see [Encrypting Your CRLs][1].
355
355
  #
356
356
  # <note markdown="1"> Both PCA and the IAM principal must have permission to write to the S3
@@ -394,6 +394,20 @@ module Aws::ACMPCA
394
394
  # one. If you change the idempotency token for each call, PCA recognizes
395
395
  # that you are requesting multiple certificate authorities.
396
396
  #
397
+ # @option params [String] :key_storage_security_standard
398
+ # Specifies a cryptographic key management compliance standard used for
399
+ # handling CA keys.
400
+ #
401
+ # Default: FIPS\_140\_2\_LEVEL\_3\_OR\_HIGHER
402
+ #
403
+ # Note: `FIPS_140_2_LEVEL_3_OR_HIGHER` is not supported in Region
404
+ # ap-northeast-3. When creating a CA in the ap-northeast-3, you must
405
+ # provide `FIPS_140_2_LEVEL_2_OR_HIGHER` as the argument for
406
+ # `KeyStorageSecurityStandard`. Failure to do this results in an
407
+ # `InvalidArgsException` with the message, "A certificate authority
408
+ # cannot be created in this region with the specified security
409
+ # standard."
410
+ #
397
411
  # @option params [Array<Types::Tag>] :tags
398
412
  # Key-value pairs that will be attached to the new private CA. You can
399
413
  # associate up to 50 tags with a private CA. For information using tags
@@ -489,10 +503,12 @@ module Aws::ACMPCA
489
503
  # expiration_in_days: 1,
490
504
  # custom_cname: "String253",
491
505
  # s3_bucket_name: "String3To255",
506
+ # s3_object_acl: "PUBLIC_READ", # accepts PUBLIC_READ, BUCKET_OWNER_FULL_CONTROL
492
507
  # },
493
508
  # },
494
509
  # certificate_authority_type: "ROOT", # required, accepts ROOT, SUBORDINATE
495
510
  # idempotency_token: "IdempotencyToken",
511
+ # key_storage_security_standard: "FIPS_140_2_LEVEL_2_OR_HIGHER", # accepts FIPS_140_2_LEVEL_2_OR_HIGHER, FIPS_140_2_LEVEL_3_OR_HIGHER
496
512
  # tags: [
497
513
  # {
498
514
  # key: "TagKey", # required
@@ -526,7 +542,7 @@ module Aws::ACMPCA
526
542
  #
527
543
  # </note>
528
544
  #
529
- # ACM Private CAA assets that are stored in Amazon S3 can be protected
545
+ # ACM Private CA assets that are stored in Amazon S3 can be protected
530
546
  # with encryption. For more information, see [Encrypting Your Audit
531
547
  # Reports][4].
532
548
  #
@@ -982,7 +998,9 @@ module Aws::ACMPCA
982
998
  # resp.certificate_authority.revocation_configuration.crl_configuration.expiration_in_days #=> Integer
983
999
  # resp.certificate_authority.revocation_configuration.crl_configuration.custom_cname #=> String
984
1000
  # resp.certificate_authority.revocation_configuration.crl_configuration.s3_bucket_name #=> String
1001
+ # resp.certificate_authority.revocation_configuration.crl_configuration.s3_object_acl #=> String, one of "PUBLIC_READ", "BUCKET_OWNER_FULL_CONTROL"
985
1002
  # resp.certificate_authority.restorable_until #=> Time
1003
+ # resp.certificate_authority.key_storage_security_standard #=> String, one of "FIPS_140_2_LEVEL_2_OR_HIGHER", "FIPS_140_2_LEVEL_3_OR_HIGHER"
986
1004
  #
987
1005
  # @see http://docs.aws.amazon.com/goto/WebAPI/acm-pca-2017-08-22/DescribeCertificateAuthority AWS API Documentation
988
1006
  #
@@ -1440,11 +1458,12 @@ module Aws::ACMPCA
1440
1458
  #
1441
1459
  # If conflicting or duplicate certificate information is supplied during
1442
1460
  # certificate issuance, ACM Private CA applies [order of operation
1443
- # rules](xxxxx) to determine what information is used.
1461
+ # rules][2] to determine what information is used.
1444
1462
  #
1445
1463
  #
1446
1464
  #
1447
1465
  # [1]: https://docs.aws.amazon.com/acm-pca/latest/userguide/UsingTemplates.html
1466
+ # [2]: https://docs.aws.amazon.com/acm-pca/latest/userguide/UsingTemplates.html#template-order-of-operations
1448
1467
  #
1449
1468
  # @option params [required, String] :certificate_authority_arn
1450
1469
  # The Amazon Resource Name (ARN) that was returned when you called
@@ -1785,7 +1804,9 @@ module Aws::ACMPCA
1785
1804
  # resp.certificate_authorities[0].revocation_configuration.crl_configuration.expiration_in_days #=> Integer
1786
1805
  # resp.certificate_authorities[0].revocation_configuration.crl_configuration.custom_cname #=> String
1787
1806
  # resp.certificate_authorities[0].revocation_configuration.crl_configuration.s3_bucket_name #=> String
1807
+ # resp.certificate_authorities[0].revocation_configuration.crl_configuration.s3_object_acl #=> String, one of "PUBLIC_READ", "BUCKET_OWNER_FULL_CONTROL"
1788
1808
  # resp.certificate_authorities[0].restorable_until #=> Time
1809
+ # resp.certificate_authorities[0].key_storage_security_standard #=> String, one of "FIPS_140_2_LEVEL_2_OR_HIGHER", "FIPS_140_2_LEVEL_3_OR_HIGHER"
1789
1810
  # resp.next_token #=> String
1790
1811
  #
1791
1812
  # @see http://docs.aws.amazon.com/goto/WebAPI/acm-pca-2017-08-22/ListCertificateAuthorities AWS API Documentation
@@ -2312,6 +2333,7 @@ module Aws::ACMPCA
2312
2333
  # expiration_in_days: 1,
2313
2334
  # custom_cname: "String253",
2314
2335
  # s3_bucket_name: "String3To255",
2336
+ # s3_object_acl: "PUBLIC_READ", # accepts PUBLIC_READ, BUCKET_OWNER_FULL_CONTROL
2315
2337
  # },
2316
2338
  # },
2317
2339
  # status: "CREATING", # accepts CREATING, PENDING_CERTIFICATE, ACTIVE, DELETED, DISABLED, EXPIRED, FAILED
@@ -2339,7 +2361,7 @@ module Aws::ACMPCA
2339
2361
  params: params,
2340
2362
  config: config)
2341
2363
  context[:gem_name] = 'aws-sdk-acmpca'
2342
- context[:gem_version] = '1.34.0'
2364
+ context[:gem_version] = '1.38.0'
2343
2365
  Seahorse::Client::Request.new(handlers, context)
2344
2366
  end
2345
2367
 
@@ -88,6 +88,7 @@ module Aws::ACMPCA
88
88
  IssueCertificateRequest = Shapes::StructureShape.new(name: 'IssueCertificateRequest')
89
89
  IssueCertificateResponse = Shapes::StructureShape.new(name: 'IssueCertificateResponse')
90
90
  KeyAlgorithm = Shapes::StringShape.new(name: 'KeyAlgorithm')
91
+ KeyStorageSecurityStandard = Shapes::StringShape.new(name: 'KeyStorageSecurityStandard')
91
92
  KeyUsage = Shapes::StructureShape.new(name: 'KeyUsage')
92
93
  LimitExceededException = Shapes::StructureShape.new(name: 'LimitExceededException')
93
94
  ListCertificateAuthoritiesRequest = Shapes::StructureShape.new(name: 'ListCertificateAuthoritiesRequest')
@@ -125,6 +126,7 @@ module Aws::ACMPCA
125
126
  RevokeCertificateRequest = Shapes::StructureShape.new(name: 'RevokeCertificateRequest')
126
127
  S3BucketName = Shapes::StringShape.new(name: 'S3BucketName')
127
128
  S3Key = Shapes::StringShape.new(name: 'S3Key')
129
+ S3ObjectAcl = Shapes::StringShape.new(name: 'S3ObjectAcl')
128
130
  SigningAlgorithm = Shapes::StringShape.new(name: 'SigningAlgorithm')
129
131
  String = Shapes::StringShape.new(name: 'String')
130
132
  String128 = Shapes::StringShape.new(name: 'String128')
@@ -196,6 +198,7 @@ module Aws::ACMPCA
196
198
  CertificateAuthority.add_member(:certificate_authority_configuration, Shapes::ShapeRef.new(shape: CertificateAuthorityConfiguration, location_name: "CertificateAuthorityConfiguration"))
197
199
  CertificateAuthority.add_member(:revocation_configuration, Shapes::ShapeRef.new(shape: RevocationConfiguration, location_name: "RevocationConfiguration"))
198
200
  CertificateAuthority.add_member(:restorable_until, Shapes::ShapeRef.new(shape: TStamp, location_name: "RestorableUntil"))
201
+ CertificateAuthority.add_member(:key_storage_security_standard, Shapes::ShapeRef.new(shape: KeyStorageSecurityStandard, location_name: "KeyStorageSecurityStandard"))
199
202
  CertificateAuthority.struct_class = Types::CertificateAuthority
200
203
 
201
204
  CertificateAuthorityConfiguration.add_member(:key_algorithm, Shapes::ShapeRef.new(shape: KeyAlgorithm, required: true, location_name: "KeyAlgorithm"))
@@ -225,6 +228,7 @@ module Aws::ACMPCA
225
228
  CreateCertificateAuthorityRequest.add_member(:revocation_configuration, Shapes::ShapeRef.new(shape: RevocationConfiguration, location_name: "RevocationConfiguration"))
226
229
  CreateCertificateAuthorityRequest.add_member(:certificate_authority_type, Shapes::ShapeRef.new(shape: CertificateAuthorityType, required: true, location_name: "CertificateAuthorityType"))
227
230
  CreateCertificateAuthorityRequest.add_member(:idempotency_token, Shapes::ShapeRef.new(shape: IdempotencyToken, location_name: "IdempotencyToken"))
231
+ CreateCertificateAuthorityRequest.add_member(:key_storage_security_standard, Shapes::ShapeRef.new(shape: KeyStorageSecurityStandard, location_name: "KeyStorageSecurityStandard"))
228
232
  CreateCertificateAuthorityRequest.add_member(:tags, Shapes::ShapeRef.new(shape: TagList, location_name: "Tags"))
229
233
  CreateCertificateAuthorityRequest.struct_class = Types::CreateCertificateAuthorityRequest
230
234
 
@@ -241,6 +245,7 @@ module Aws::ACMPCA
241
245
  CrlConfiguration.add_member(:expiration_in_days, Shapes::ShapeRef.new(shape: Integer1To5000, location_name: "ExpirationInDays", metadata: {"box"=>true}))
242
246
  CrlConfiguration.add_member(:custom_cname, Shapes::ShapeRef.new(shape: String253, location_name: "CustomCname"))
243
247
  CrlConfiguration.add_member(:s3_bucket_name, Shapes::ShapeRef.new(shape: String3To255, location_name: "S3BucketName"))
248
+ CrlConfiguration.add_member(:s3_object_acl, Shapes::ShapeRef.new(shape: S3ObjectAcl, location_name: "S3ObjectAcl"))
244
249
  CrlConfiguration.struct_class = Types::CrlConfiguration
245
250
 
246
251
  CsrExtensions.add_member(:key_usage, Shapes::ShapeRef.new(shape: KeyUsage, location_name: "KeyUsage"))
@@ -236,8 +236,12 @@ module Aws::ACMPCA
236
236
  # variant must be selected, or else this parameter is ignored.
237
237
  #
238
238
  # If conflicting or duplicate certificate information is supplied from
239
- # other sources, ACM Private CA applies [order of operation
240
- # rules](xxxxx) to determine what information is used.
239
+ # other sources, ACM Private CA applies [order of operation rules][1] to
240
+ # determine what information is used.
241
+ #
242
+ #
243
+ #
244
+ # [1]: https://docs.aws.amazon.com/acm-pca/latest/userguide/UsingTemplates.html#template-order-of-operations
241
245
  #
242
246
  # @note When making an API call, you may pass ApiPassthrough
243
247
  # data as a hash:
@@ -428,6 +432,20 @@ module Aws::ACMPCA
428
432
  # [1]: https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_DeleteCertificateAuthorityRequest.html
429
433
  # @return [Time]
430
434
  #
435
+ # @!attribute [rw] key_storage_security_standard
436
+ # Defines a cryptographic key management compliance standard used for
437
+ # handling CA keys.
438
+ #
439
+ # Default: FIPS\_140\_2\_LEVEL\_3\_OR\_HIGHER
440
+ #
441
+ # Note: AWS Region ap-northeast-3 supports only
442
+ # FIPS\_140\_2\_LEVEL\_2\_OR\_HIGHER. You must explicitly specify this
443
+ # parameter and value when creating a CA in that Region. Specifying a
444
+ # different value (or no value) results in an `InvalidArgsException`
445
+ # with the message "A certificate authority cannot be created in this
446
+ # region with the specified security standard."
447
+ # @return [String]
448
+ #
431
449
  # @see http://docs.aws.amazon.com/goto/WebAPI/acm-pca-2017-08-22/CertificateAuthority AWS API Documentation
432
450
  #
433
451
  class CertificateAuthority < Struct.new(
@@ -443,7 +461,8 @@ module Aws::ACMPCA
443
461
  :failure_reason,
444
462
  :certificate_authority_configuration,
445
463
  :revocation_configuration,
446
- :restorable_until)
464
+ :restorable_until,
465
+ :key_storage_security_standard)
447
466
  SENSITIVE = []
448
467
  include Aws::Structure
449
468
  end
@@ -735,10 +754,12 @@ module Aws::ACMPCA
735
754
  # expiration_in_days: 1,
736
755
  # custom_cname: "String253",
737
756
  # s3_bucket_name: "String3To255",
757
+ # s3_object_acl: "PUBLIC_READ", # accepts PUBLIC_READ, BUCKET_OWNER_FULL_CONTROL
738
758
  # },
739
759
  # },
740
760
  # certificate_authority_type: "ROOT", # required, accepts ROOT, SUBORDINATE
741
761
  # idempotency_token: "IdempotencyToken",
762
+ # key_storage_security_standard: "FIPS_140_2_LEVEL_2_OR_HIGHER", # accepts FIPS_140_2_LEVEL_2_OR_HIGHER, FIPS_140_2_LEVEL_3_OR_HIGHER
742
763
  # tags: [
743
764
  # {
744
765
  # key: "TagKey", # required
@@ -781,6 +802,21 @@ module Aws::ACMPCA
781
802
  # authorities.
782
803
  # @return [String]
783
804
  #
805
+ # @!attribute [rw] key_storage_security_standard
806
+ # Specifies a cryptographic key management compliance standard used
807
+ # for handling CA keys.
808
+ #
809
+ # Default: FIPS\_140\_2\_LEVEL\_3\_OR\_HIGHER
810
+ #
811
+ # Note: `FIPS_140_2_LEVEL_3_OR_HIGHER` is not supported in Region
812
+ # ap-northeast-3. When creating a CA in the ap-northeast-3, you must
813
+ # provide `FIPS_140_2_LEVEL_2_OR_HIGHER` as the argument for
814
+ # `KeyStorageSecurityStandard`. Failure to do this results in an
815
+ # `InvalidArgsException` with the message, "A certificate authority
816
+ # cannot be created in this region with the specified security
817
+ # standard."
818
+ # @return [String]
819
+ #
784
820
  # @!attribute [rw] tags
785
821
  # Key-value pairs that will be attached to the new private CA. You can
786
822
  # associate up to 50 tags with a private CA. For information using
@@ -799,6 +835,7 @@ module Aws::ACMPCA
799
835
  :revocation_configuration,
800
836
  :certificate_authority_type,
801
837
  :idempotency_token,
838
+ :key_storage_security_standard,
802
839
  :tags)
803
840
  SENSITIVE = []
804
841
  include Aws::Structure
@@ -880,7 +917,7 @@ module Aws::ACMPCA
880
917
  # Points** extension of each certificate it issues. Your S3 bucket
881
918
  # policy must give write permission to ACM Private CA.
882
919
  #
883
- # ACM Private CAA assets that are stored in Amazon S3 can be protected
920
+ # ACM Private CA assets that are stored in Amazon S3 can be protected
884
921
  # with encryption. For more information, see [Encrypting Your CRLs][1].
885
922
  #
886
923
  # Your private CA uses the value in the **ExpirationInDays** parameter
@@ -949,6 +986,7 @@ module Aws::ACMPCA
949
986
  # expiration_in_days: 1,
950
987
  # custom_cname: "String253",
951
988
  # s3_bucket_name: "String3To255",
989
+ # s3_object_acl: "PUBLIC_READ", # accepts PUBLIC_READ, BUCKET_OWNER_FULL_CONTROL
952
990
  # }
953
991
  #
954
992
  # @!attribute [rw] enabled
@@ -981,12 +1019,39 @@ module Aws::ACMPCA
981
1019
  # is placed into the **CRL Distribution Points** extension of the
982
1020
  # issued certificate. You can change the name of your bucket by
983
1021
  # calling the [UpdateCertificateAuthority][1] action. You must specify
984
- # a bucket policy that allows ACM Private CA to write the CRL to your
985
- # bucket.
1022
+ # a [bucket policy][2] that allows ACM Private CA to write the CRL to
1023
+ # your bucket.
986
1024
  #
987
1025
  #
988
1026
  #
989
1027
  # [1]: https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_UpdateCertificateAuthority.html
1028
+ # [2]: https://docs.aws.amazon.com/acm-pca/latest/userguide/PcaCreateCa.html#s3-policies
1029
+ # @return [String]
1030
+ #
1031
+ # @!attribute [rw] s3_object_acl
1032
+ # Determines whether the CRL will be publicly readable or privately
1033
+ # held in the CRL Amazon S3 bucket. If you choose PUBLIC\_READ, the
1034
+ # CRL will be accessible over the public internet. If you choose
1035
+ # BUCKET\_OWNER\_FULL\_CONTROL, only the owner of the CRL S3 bucket
1036
+ # can access the CRL, and your PKI clients may need an alternative
1037
+ # method of access.
1038
+ #
1039
+ # If no value is specified, the default is `PUBLIC_READ`.
1040
+ #
1041
+ # *Note:* This default can cause CA creation to fail in some
1042
+ # circumstances. If you have have enabled the Block Public Access
1043
+ # (BPA) feature in your S3 account, then you must specify the value of
1044
+ # this parameter as `BUCKET_OWNER_FULL_CONTROL`, and not doing so
1045
+ # results in an error. If you have disabled BPA in S3, then you can
1046
+ # specify either `BUCKET_OWNER_FULL_CONTROL` or `PUBLIC_READ` as the
1047
+ # value.
1048
+ #
1049
+ # For more information, see [Blocking public access to the S3
1050
+ # bucket][1].
1051
+ #
1052
+ #
1053
+ #
1054
+ # [1]: https://docs.aws.amazon.com/acm-pca/latest/userguide/PcaCreateCa.html#s3-bpa
990
1055
  # @return [String]
991
1056
  #
992
1057
  # @see http://docs.aws.amazon.com/goto/WebAPI/acm-pca-2017-08-22/CrlConfiguration AWS API Documentation
@@ -995,7 +1060,8 @@ module Aws::ACMPCA
995
1060
  :enabled,
996
1061
  :expiration_in_days,
997
1062
  :custom_cname,
998
- :s3_bucket_name)
1063
+ :s3_bucket_name,
1064
+ :s3_object_acl)
999
1065
  SENSITIVE = []
1000
1066
  include Aws::Structure
1001
1067
  end
@@ -2014,11 +2080,12 @@ module Aws::ACMPCA
2014
2080
  #
2015
2081
  # If conflicting or duplicate certificate information is supplied
2016
2082
  # during certificate issuance, ACM Private CA applies [order of
2017
- # operation rules](xxxxx) to determine what information is used.
2083
+ # operation rules][2] to determine what information is used.
2018
2084
  #
2019
2085
  #
2020
2086
  #
2021
2087
  # [1]: https://docs.aws.amazon.com/acm-pca/latest/userguide/UsingTemplates.html
2088
+ # [2]: https://docs.aws.amazon.com/acm-pca/latest/userguide/UsingTemplates.html#template-order-of-operations
2022
2089
  # @return [Types::ApiPassthrough]
2023
2090
  #
2024
2091
  # @!attribute [rw] certificate_authority_arn
@@ -2832,6 +2899,7 @@ module Aws::ACMPCA
2832
2899
  # expiration_in_days: 1,
2833
2900
  # custom_cname: "String253",
2834
2901
  # s3_bucket_name: "String3To255",
2902
+ # s3_object_acl: "PUBLIC_READ", # accepts PUBLIC_READ, BUCKET_OWNER_FULL_CONTROL
2835
2903
  # },
2836
2904
  # }
2837
2905
  #
@@ -3037,6 +3105,7 @@ module Aws::ACMPCA
3037
3105
  # expiration_in_days: 1,
3038
3106
  # custom_cname: "String253",
3039
3107
  # s3_bucket_name: "String3To255",
3108
+ # s3_object_acl: "PUBLIC_READ", # accepts PUBLIC_READ, BUCKET_OWNER_FULL_CONTROL
3040
3109
  # },
3041
3110
  # },
3042
3111
  # status: "CREATING", # accepts CREATING, PENDING_CERTIFICATE, ACTIVE, DELETED, DISABLED, EXPIRED, FAILED
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-acmpca
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.34.0
4
+ version: 1.38.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2021-03-10 00:00:00.000000000 Z
11
+ date: 2021-07-30 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core
@@ -19,7 +19,7 @@ dependencies:
19
19
  version: '3'
20
20
  - - ">="
21
21
  - !ruby/object:Gem::Version
22
- version: 3.112.0
22
+ version: 3.119.0
23
23
  type: :runtime
24
24
  prerelease: false
25
25
  version_requirements: !ruby/object:Gem::Requirement
@@ -29,7 +29,7 @@ dependencies:
29
29
  version: '3'
30
30
  - - ">="
31
31
  - !ruby/object:Gem::Version
32
- version: 3.112.0
32
+ version: 3.119.0
33
33
  - !ruby/object:Gem::Dependency
34
34
  name: aws-sigv4
35
35
  requirement: !ruby/object:Gem::Requirement
@@ -67,8 +67,8 @@ homepage: https://github.com/aws/aws-sdk-ruby
67
67
  licenses:
68
68
  - Apache-2.0
69
69
  metadata:
70
- source_code_uri: https://github.com/aws/aws-sdk-ruby/tree/master/gems/aws-sdk-acmpca
71
- changelog_uri: https://github.com/aws/aws-sdk-ruby/tree/master/gems/aws-sdk-acmpca/CHANGELOG.md
70
+ source_code_uri: https://github.com/aws/aws-sdk-ruby/tree/version-3/gems/aws-sdk-acmpca
71
+ changelog_uri: https://github.com/aws/aws-sdk-ruby/tree/version-3/gems/aws-sdk-acmpca/CHANGELOG.md
72
72
  post_install_message:
73
73
  rdoc_options: []
74
74
  require_paths:
@@ -84,8 +84,7 @@ required_rubygems_version: !ruby/object:Gem::Requirement
84
84
  - !ruby/object:Gem::Version
85
85
  version: '0'
86
86
  requirements: []
87
- rubyforge_project:
88
- rubygems_version: 2.7.6.2
87
+ rubygems_version: 3.1.6
89
88
  signing_key:
90
89
  specification_version: 4
91
90
  summary: AWS SDK for Ruby - ACM-PCA