aws-sdk-acmpca 1.95.0 → 1.97.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 4d1d9d2de090d579f921ef3643ddac1f75c104d1e7630a220686230338a47e4d
4
- data.tar.gz: 108e677b04aba7e7664ec51127025b0b40472e9731d8c993ada8b311022b8356
3
+ metadata.gz: 797b487ec4f81c8144c931ff351369bbd179fab6299f113fd2f273b465e2afdc
4
+ data.tar.gz: b16edb629af7aa162b3bba9be5d606a91c25d9403ee7b6f1c60274622e833ae4
5
5
  SHA512:
6
- metadata.gz: aa4aa436dac5547da84692c662938da6ad5530fa03ccf4175556fed78276052d9c5a5b6b3f171510d133a8e1eb8ddea72b310fcc927daeb298b78d3225b6181d
7
- data.tar.gz: c6fada40d79b21911a2440a830bf9ea52b9d98e7be7666255a2a76f7d7ca7fefa80307da1689d2e150a2823ec7ef94320d6a9fdd96cd805906f3a1f43dadbf2c
6
+ metadata.gz: e6a88ed83b68cdc27ab7f0cfd68ee8be0f7162f0d7064f930725d557ec928994115e65b65b9766d3660a02b6af2a2e0803b0e38375847baf51fb95802c75424b
7
+ data.tar.gz: e58b55d11f5a67bb9ca24ed70e70d015e19ecc8c19a945bda560f0357df36f658165f65285a14b064993c5ee1023776913a81184a85a06b924946ed366d9fd68
data/CHANGELOG.md CHANGED
@@ -1,6 +1,16 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.97.0 (2025-08-01)
5
+ ------------------
6
+
7
+ * Feature - Doc-only update to add more information to GetCertificate action.
8
+
9
+ 1.96.0 (2025-07-31)
10
+ ------------------
11
+
12
+ * Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
13
+
4
14
  1.95.0 (2025-07-21)
5
15
  ------------------
6
16
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.95.0
1
+ 1.97.0
@@ -569,22 +569,22 @@ module Aws::ACMPCA
569
569
  # requesting multiple certificate authorities.
570
570
  #
571
571
  # @option params [String] :key_storage_security_standard
572
- # Specifies a cryptographic key management compliance standard used for
573
- # handling CA keys.
572
+ # Specifies a cryptographic key management compliance standard for
573
+ # handling and protecting CA keys.
574
574
  #
575
575
  # Default: FIPS\_140\_2\_LEVEL\_3\_OR\_HIGHER
576
576
  #
577
- # <note markdown="1"> Some Amazon Web Services Regions do not support the default. When
578
- # creating a CA in these Regions, you must provide
579
- # `FIPS_140_2_LEVEL_2_OR_HIGHER` as the argument for
580
- # `KeyStorageSecurityStandard`. Failure to do this results in an
581
- # `InvalidArgsException` with the message, "A certificate authority
577
+ # <note markdown="1"> Some Amazon Web Services Regions don't support the default value.
578
+ # When you create a CA in these Regions, you must use
579
+ # `CCPC_LEVEL_1_OR_HIGHER` for the `KeyStorageSecurityStandard`
580
+ # parameter. If you don't, the operation returns an
581
+ # `InvalidArgsException` with this message: "A certificate authority
582
582
  # cannot be created in this region with the specified security
583
583
  # standard."
584
584
  #
585
- # For information about security standard support in various Regions,
586
- # see [Storage and security compliance of Amazon Web Services Private CA
587
- # private keys][1].
585
+ # For information about security standard support in different Amazon
586
+ # Web Services Regions, see [Storage and security compliance of Amazon
587
+ # Web Services Private CA private keys][1].
588
588
  #
589
589
  # </note>
590
590
  #
@@ -916,6 +916,16 @@ module Aws::ACMPCA
916
916
  # state. To restore an eligible CA, call the
917
917
  # [RestoreCertificateAuthority][5] action.
918
918
  #
919
+ # A private CA can be deleted if it is in the `PENDING_CERTIFICATE`,
920
+ # `CREATING`, `EXPIRED`, `DISABLED`, or `FAILED` state. To delete a CA
921
+ # in the `ACTIVE` state, you must first disable it, or else the delete
922
+ # request results in an exception. If you are deleting a private CA in
923
+ # the `PENDING_CERTIFICATE` or `DISABLED` state, you can set the length
924
+ # of its restoration period to 7-30 days. The default is 30. During this
925
+ # time, the status is set to `DELETED` and the CA can be restored. A
926
+ # private CA deleted in the `CREATING` or `FAILED` state has no assigned
927
+ # restoration period and cannot be restored.
928
+ #
919
929
  #
920
930
  #
921
931
  # [1]: https://docs.aws.amazon.com/privateca/latest/APIReference/API_ListCertificateAuthorities.html
@@ -1310,7 +1320,7 @@ module Aws::ACMPCA
1310
1320
  # the [IssueCertificate][1] action. You must specify both the ARN of
1311
1321
  # your private CA and the ARN of the issued certificate when calling the
1312
1322
  # **GetCertificate** action. You can retrieve the certificate if it is
1313
- # in the **ISSUED** state. You can call the
1323
+ # in the **ISSUED**, **EXPIRED**, or **REVOKED** state. You can call the
1314
1324
  # [CreateCertificateAuthorityAuditReport][2] action to create a report
1315
1325
  # that contains information about all of the certificates issued and
1316
1326
  # revoked by your private CA.
@@ -1498,7 +1508,7 @@ module Aws::ACMPCA
1498
1508
  # @option params [required, String] :resource_arn
1499
1509
  # The Amazon Resource Number (ARN) of the private CA that will have its
1500
1510
  # policy retrieved. You can find the CA's ARN by calling the
1501
- # ListCertificateAuthorities action. </p>
1511
+ # ListCertificateAuthorities action.
1502
1512
  #
1503
1513
  # @return [Types::GetPolicyResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
1504
1514
  #
@@ -2706,7 +2716,7 @@ module Aws::ACMPCA
2706
2716
  tracer: tracer
2707
2717
  )
2708
2718
  context[:gem_name] = 'aws-sdk-acmpca'
2709
- context[:gem_version] = '1.95.0'
2719
+ context[:gem_version] = '1.97.0'
2710
2720
  Seahorse::Client::Request.new(handlers, context)
2711
2721
  end
2712
2722
 
@@ -589,10 +589,10 @@ module Aws::ACMPCA
589
589
  o.input = Shapes::ShapeRef.new(shape: CreateCertificateAuthorityAuditReportRequest)
590
590
  o.output = Shapes::ShapeRef.new(shape: CreateCertificateAuthorityAuditReportResponse)
591
591
  o.errors << Shapes::ShapeRef.new(shape: ResourceNotFoundException)
592
- o.errors << Shapes::ShapeRef.new(shape: InvalidArnException)
593
592
  o.errors << Shapes::ShapeRef.new(shape: InvalidArgsException)
594
- o.errors << Shapes::ShapeRef.new(shape: RequestFailedException)
593
+ o.errors << Shapes::ShapeRef.new(shape: InvalidArnException)
595
594
  o.errors << Shapes::ShapeRef.new(shape: InvalidStateException)
595
+ o.errors << Shapes::ShapeRef.new(shape: RequestFailedException)
596
596
  o.errors << Shapes::ShapeRef.new(shape: RequestInProgressException)
597
597
  end)
598
598
 
@@ -606,8 +606,8 @@ module Aws::ACMPCA
606
606
  o.errors << Shapes::ShapeRef.new(shape: PermissionAlreadyExistsException)
607
607
  o.errors << Shapes::ShapeRef.new(shape: ResourceNotFoundException)
608
608
  o.errors << Shapes::ShapeRef.new(shape: InvalidArnException)
609
- o.errors << Shapes::ShapeRef.new(shape: RequestFailedException)
610
609
  o.errors << Shapes::ShapeRef.new(shape: InvalidStateException)
610
+ o.errors << Shapes::ShapeRef.new(shape: RequestFailedException)
611
611
  end)
612
612
 
613
613
  api.add_operation(:delete_certificate_authority, Seahorse::Model::Operation.new.tap do |o|
@@ -630,8 +630,8 @@ module Aws::ACMPCA
630
630
  o.output = Shapes::ShapeRef.new(shape: Shapes::StructureShape.new(struct_class: Aws::EmptyStructure))
631
631
  o.errors << Shapes::ShapeRef.new(shape: ResourceNotFoundException)
632
632
  o.errors << Shapes::ShapeRef.new(shape: InvalidArnException)
633
- o.errors << Shapes::ShapeRef.new(shape: RequestFailedException)
634
633
  o.errors << Shapes::ShapeRef.new(shape: InvalidStateException)
634
+ o.errors << Shapes::ShapeRef.new(shape: RequestFailedException)
635
635
  end)
636
636
 
637
637
  api.add_operation(:delete_policy, Seahorse::Model::Operation.new.tap do |o|
@@ -643,8 +643,8 @@ module Aws::ACMPCA
643
643
  o.errors << Shapes::ShapeRef.new(shape: LockoutPreventedException)
644
644
  o.errors << Shapes::ShapeRef.new(shape: ResourceNotFoundException)
645
645
  o.errors << Shapes::ShapeRef.new(shape: InvalidArnException)
646
- o.errors << Shapes::ShapeRef.new(shape: RequestFailedException)
647
646
  o.errors << Shapes::ShapeRef.new(shape: InvalidStateException)
647
+ o.errors << Shapes::ShapeRef.new(shape: RequestFailedException)
648
648
  o.errors << Shapes::ShapeRef.new(shape: ConcurrentModificationException)
649
649
  end)
650
650
 
@@ -665,8 +665,8 @@ module Aws::ACMPCA
665
665
  o.input = Shapes::ShapeRef.new(shape: DescribeCertificateAuthorityAuditReportRequest)
666
666
  o.output = Shapes::ShapeRef.new(shape: DescribeCertificateAuthorityAuditReportResponse)
667
667
  o.errors << Shapes::ShapeRef.new(shape: ResourceNotFoundException)
668
- o.errors << Shapes::ShapeRef.new(shape: InvalidArnException)
669
668
  o.errors << Shapes::ShapeRef.new(shape: InvalidArgsException)
669
+ o.errors << Shapes::ShapeRef.new(shape: InvalidArnException)
670
670
  end)
671
671
 
672
672
  api.add_operation(:get_certificate, Seahorse::Model::Operation.new.tap do |o|
@@ -677,8 +677,8 @@ module Aws::ACMPCA
677
677
  o.output = Shapes::ShapeRef.new(shape: GetCertificateResponse)
678
678
  o.errors << Shapes::ShapeRef.new(shape: ResourceNotFoundException)
679
679
  o.errors << Shapes::ShapeRef.new(shape: InvalidArnException)
680
- o.errors << Shapes::ShapeRef.new(shape: RequestFailedException)
681
680
  o.errors << Shapes::ShapeRef.new(shape: InvalidStateException)
681
+ o.errors << Shapes::ShapeRef.new(shape: RequestFailedException)
682
682
  o.errors << Shapes::ShapeRef.new(shape: RequestInProgressException)
683
683
  end)
684
684
 
@@ -701,8 +701,8 @@ module Aws::ACMPCA
701
701
  o.output = Shapes::ShapeRef.new(shape: GetCertificateAuthorityCsrResponse)
702
702
  o.errors << Shapes::ShapeRef.new(shape: ResourceNotFoundException)
703
703
  o.errors << Shapes::ShapeRef.new(shape: InvalidArnException)
704
- o.errors << Shapes::ShapeRef.new(shape: RequestFailedException)
705
704
  o.errors << Shapes::ShapeRef.new(shape: InvalidStateException)
705
+ o.errors << Shapes::ShapeRef.new(shape: RequestFailedException)
706
706
  o.errors << Shapes::ShapeRef.new(shape: RequestInProgressException)
707
707
  end)
708
708
 
@@ -714,8 +714,8 @@ module Aws::ACMPCA
714
714
  o.output = Shapes::ShapeRef.new(shape: GetPolicyResponse)
715
715
  o.errors << Shapes::ShapeRef.new(shape: ResourceNotFoundException)
716
716
  o.errors << Shapes::ShapeRef.new(shape: InvalidArnException)
717
- o.errors << Shapes::ShapeRef.new(shape: RequestFailedException)
718
717
  o.errors << Shapes::ShapeRef.new(shape: InvalidStateException)
718
+ o.errors << Shapes::ShapeRef.new(shape: RequestFailedException)
719
719
  end)
720
720
 
721
721
  api.add_operation(:import_certificate_authority_certificate, Seahorse::Model::Operation.new.tap do |o|
@@ -729,8 +729,8 @@ module Aws::ACMPCA
729
729
  o.errors << Shapes::ShapeRef.new(shape: ResourceNotFoundException)
730
730
  o.errors << Shapes::ShapeRef.new(shape: InvalidArnException)
731
731
  o.errors << Shapes::ShapeRef.new(shape: InvalidRequestException)
732
- o.errors << Shapes::ShapeRef.new(shape: RequestFailedException)
733
732
  o.errors << Shapes::ShapeRef.new(shape: InvalidStateException)
733
+ o.errors << Shapes::ShapeRef.new(shape: RequestFailedException)
734
734
  o.errors << Shapes::ShapeRef.new(shape: ConcurrentModificationException)
735
735
  o.errors << Shapes::ShapeRef.new(shape: RequestInProgressException)
736
736
  end)
@@ -743,8 +743,8 @@ module Aws::ACMPCA
743
743
  o.output = Shapes::ShapeRef.new(shape: IssueCertificateResponse)
744
744
  o.errors << Shapes::ShapeRef.new(shape: LimitExceededException)
745
745
  o.errors << Shapes::ShapeRef.new(shape: ResourceNotFoundException)
746
- o.errors << Shapes::ShapeRef.new(shape: InvalidArnException)
747
746
  o.errors << Shapes::ShapeRef.new(shape: InvalidArgsException)
747
+ o.errors << Shapes::ShapeRef.new(shape: InvalidArnException)
748
748
  o.errors << Shapes::ShapeRef.new(shape: InvalidStateException)
749
749
  o.errors << Shapes::ShapeRef.new(shape: MalformedCSRException)
750
750
  end)
@@ -772,8 +772,8 @@ module Aws::ACMPCA
772
772
  o.output = Shapes::ShapeRef.new(shape: ListPermissionsResponse)
773
773
  o.errors << Shapes::ShapeRef.new(shape: ResourceNotFoundException)
774
774
  o.errors << Shapes::ShapeRef.new(shape: InvalidArnException)
775
- o.errors << Shapes::ShapeRef.new(shape: RequestFailedException)
776
775
  o.errors << Shapes::ShapeRef.new(shape: InvalidStateException)
776
+ o.errors << Shapes::ShapeRef.new(shape: RequestFailedException)
777
777
  o.errors << Shapes::ShapeRef.new(shape: InvalidNextTokenException)
778
778
  o[:pager] = Aws::Pager.new(
779
779
  limit_key: "max_results",
@@ -791,8 +791,8 @@ module Aws::ACMPCA
791
791
  o.output = Shapes::ShapeRef.new(shape: ListTagsResponse)
792
792
  o.errors << Shapes::ShapeRef.new(shape: ResourceNotFoundException)
793
793
  o.errors << Shapes::ShapeRef.new(shape: InvalidArnException)
794
- o.errors << Shapes::ShapeRef.new(shape: RequestFailedException)
795
794
  o.errors << Shapes::ShapeRef.new(shape: InvalidStateException)
795
+ o.errors << Shapes::ShapeRef.new(shape: RequestFailedException)
796
796
  o[:pager] = Aws::Pager.new(
797
797
  limit_key: "max_results",
798
798
  tokens: {
@@ -810,8 +810,8 @@ module Aws::ACMPCA
810
810
  o.errors << Shapes::ShapeRef.new(shape: LockoutPreventedException)
811
811
  o.errors << Shapes::ShapeRef.new(shape: ResourceNotFoundException)
812
812
  o.errors << Shapes::ShapeRef.new(shape: InvalidArnException)
813
- o.errors << Shapes::ShapeRef.new(shape: RequestFailedException)
814
813
  o.errors << Shapes::ShapeRef.new(shape: InvalidStateException)
814
+ o.errors << Shapes::ShapeRef.new(shape: RequestFailedException)
815
815
  o.errors << Shapes::ShapeRef.new(shape: ConcurrentModificationException)
816
816
  o.errors << Shapes::ShapeRef.new(shape: InvalidPolicyException)
817
817
  end)
@@ -838,8 +838,8 @@ module Aws::ACMPCA
838
838
  o.errors << Shapes::ShapeRef.new(shape: ResourceNotFoundException)
839
839
  o.errors << Shapes::ShapeRef.new(shape: InvalidArnException)
840
840
  o.errors << Shapes::ShapeRef.new(shape: InvalidRequestException)
841
- o.errors << Shapes::ShapeRef.new(shape: RequestFailedException)
842
841
  o.errors << Shapes::ShapeRef.new(shape: InvalidStateException)
842
+ o.errors << Shapes::ShapeRef.new(shape: RequestFailedException)
843
843
  o.errors << Shapes::ShapeRef.new(shape: ConcurrentModificationException)
844
844
  o.errors << Shapes::ShapeRef.new(shape: RequestInProgressException)
845
845
  end)
@@ -876,8 +876,8 @@ module Aws::ACMPCA
876
876
  o.input = Shapes::ShapeRef.new(shape: UpdateCertificateAuthorityRequest)
877
877
  o.output = Shapes::ShapeRef.new(shape: Shapes::StructureShape.new(struct_class: Aws::EmptyStructure))
878
878
  o.errors << Shapes::ShapeRef.new(shape: ResourceNotFoundException)
879
- o.errors << Shapes::ShapeRef.new(shape: InvalidArnException)
880
879
  o.errors << Shapes::ShapeRef.new(shape: InvalidArgsException)
880
+ o.errors << Shapes::ShapeRef.new(shape: InvalidArnException)
881
881
  o.errors << Shapes::ShapeRef.new(shape: InvalidStateException)
882
882
  o.errors << Shapes::ShapeRef.new(shape: ConcurrentModificationException)
883
883
  o.errors << Shapes::ShapeRef.new(shape: InvalidPolicyException)
@@ -296,17 +296,24 @@ module Aws::ACMPCA
296
296
  # @return [Time]
297
297
  #
298
298
  # @!attribute [rw] key_storage_security_standard
299
- # Defines a cryptographic key management compliance standard used for
300
- # handling CA keys.
299
+ # Defines a cryptographic key management compliance standard for
300
+ # handling and protecting CA keys.
301
301
  #
302
302
  # Default: FIPS\_140\_2\_LEVEL\_3\_OR\_HIGHER
303
303
  #
304
- # Note: Amazon Web Services Region ap-northeast-3 supports only
305
- # FIPS\_140\_2\_LEVEL\_2\_OR\_HIGHER. You must explicitly specify this
306
- # parameter and value when creating a CA in that Region. Specifying a
307
- # different value (or no value) results in an `InvalidArgsException`
308
- # with the message "A certificate authority cannot be created in this
309
- # region with the specified security standard."
304
+ # <note markdown="1"> Starting January 26, 2023, Amazon Web Services Private CA protects
305
+ # all CA private keys in non-China regions using hardware security
306
+ # modules (HSMs) that comply with FIPS PUB 140-2 Level 3.
307
+ #
308
+ # For information about security standard support in different Amazon
309
+ # Web Services Regions, see [Storage and security compliance of Amazon
310
+ # Web Services Private CA private keys][1].
311
+ #
312
+ # </note>
313
+ #
314
+ #
315
+ #
316
+ # [1]: https://docs.aws.amazon.com/privateca/latest/userguide/data-protection.html#private-keys
310
317
  # @return [String]
311
318
  #
312
319
  # @!attribute [rw] usage_mode
@@ -516,22 +523,22 @@ module Aws::ACMPCA
516
523
  # @return [String]
517
524
  #
518
525
  # @!attribute [rw] key_storage_security_standard
519
- # Specifies a cryptographic key management compliance standard used
520
- # for handling CA keys.
526
+ # Specifies a cryptographic key management compliance standard for
527
+ # handling and protecting CA keys.
521
528
  #
522
529
  # Default: FIPS\_140\_2\_LEVEL\_3\_OR\_HIGHER
523
530
  #
524
- # <note markdown="1"> Some Amazon Web Services Regions do not support the default. When
525
- # creating a CA in these Regions, you must provide
526
- # `FIPS_140_2_LEVEL_2_OR_HIGHER` as the argument for
527
- # `KeyStorageSecurityStandard`. Failure to do this results in an
528
- # `InvalidArgsException` with the message, "A certificate authority
531
+ # <note markdown="1"> Some Amazon Web Services Regions don't support the default value.
532
+ # When you create a CA in these Regions, you must use
533
+ # `CCPC_LEVEL_1_OR_HIGHER` for the `KeyStorageSecurityStandard`
534
+ # parameter. If you don't, the operation returns an
535
+ # `InvalidArgsException` with this message: "A certificate authority
529
536
  # cannot be created in this region with the specified security
530
537
  # standard."
531
538
  #
532
- # For information about security standard support in various Regions,
533
- # see [Storage and security compliance of Amazon Web Services Private
534
- # CA private keys][1].
539
+ # For information about security standard support in different Amazon
540
+ # Web Services Regions, see [Storage and security compliance of Amazon
541
+ # Web Services Private CA private keys][1].
535
542
  #
536
543
  # </note>
537
544
  #
@@ -1434,7 +1441,7 @@ module Aws::ACMPCA
1434
1441
  # @!attribute [rw] resource_arn
1435
1442
  # The Amazon Resource Number (ARN) of the private CA that will have
1436
1443
  # its policy retrieved. You can find the CA's ARN by calling the
1437
- # ListCertificateAuthorities action. </p>
1444
+ # ListCertificateAuthorities action.
1438
1445
  # @return [String]
1439
1446
  #
1440
1447
  # @see http://docs.aws.amazon.com/goto/WebAPI/acm-pca-2017-08-22/GetPolicyRequest AWS API Documentation
@@ -55,7 +55,7 @@ module Aws::ACMPCA
55
55
  autoload :EndpointProvider, 'aws-sdk-acmpca/endpoint_provider'
56
56
  autoload :Endpoints, 'aws-sdk-acmpca/endpoints'
57
57
 
58
- GEM_VERSION = '1.95.0'
58
+ GEM_VERSION = '1.97.0'
59
59
 
60
60
  end
61
61
 
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-acmpca
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.95.0
4
+ version: 1.97.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
@@ -18,7 +18,7 @@ dependencies:
18
18
  version: '3'
19
19
  - - ">="
20
20
  - !ruby/object:Gem::Version
21
- version: 3.227.0
21
+ version: 3.228.0
22
22
  type: :runtime
23
23
  prerelease: false
24
24
  version_requirements: !ruby/object:Gem::Requirement
@@ -28,7 +28,7 @@ dependencies:
28
28
  version: '3'
29
29
  - - ">="
30
30
  - !ruby/object:Gem::Version
31
- version: 3.227.0
31
+ version: 3.228.0
32
32
  - !ruby/object:Gem::Dependency
33
33
  name: aws-sigv4
34
34
  requirement: !ruby/object:Gem::Requirement