@aws-sdk/client-acm-pca 3.55.0 → 3.67.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +27 -0
- package/README.md +8 -8
- package/dist-types/ACMPCA.d.ts +37 -37
- package/dist-types/ACMPCAClient.d.ts +6 -6
- package/dist-types/commands/CreateCertificateAuthorityAuditReportCommand.d.ts +3 -3
- package/dist-types/commands/CreateCertificateAuthorityCommand.d.ts +1 -1
- package/dist-types/commands/CreatePermissionCommand.d.ts +1 -1
- package/dist-types/commands/DeleteCertificateAuthorityCommand.d.ts +1 -1
- package/dist-types/commands/DeletePermissionCommand.d.ts +1 -1
- package/dist-types/commands/DeletePolicyCommand.d.ts +2 -2
- package/dist-types/commands/DescribeCertificateAuthorityCommand.d.ts +2 -2
- package/dist-types/commands/GetCertificateAuthorityCsrCommand.d.ts +2 -2
- package/dist-types/commands/GetPolicyCommand.d.ts +2 -2
- package/dist-types/commands/ImportCertificateAuthorityCertificateCommand.d.ts +8 -8
- package/dist-types/commands/IssueCertificateCommand.d.ts +1 -1
- package/dist-types/commands/ListPermissionsCommand.d.ts +1 -1
- package/dist-types/commands/PutPolicyCommand.d.ts +2 -2
- package/dist-types/commands/RevokeCertificateCommand.d.ts +4 -4
- package/dist-types/models/models_0.d.ts +32 -33
- package/package.json +18 -18
package/CHANGELOG.md
CHANGED
|
@@ -3,6 +3,33 @@
|
|
|
3
3
|
All notable changes to this project will be documented in this file.
|
|
4
4
|
See [Conventional Commits](https://conventionalcommits.org) for commit guidelines.
|
|
5
5
|
|
|
6
|
+
# [3.67.0](https://github.com/aws/aws-sdk-js-v3/compare/v3.66.0...v3.67.0) (2022-04-08)
|
|
7
|
+
|
|
8
|
+
**Note:** Version bump only for package @aws-sdk/client-acm-pca
|
|
9
|
+
|
|
10
|
+
|
|
11
|
+
|
|
12
|
+
|
|
13
|
+
|
|
14
|
+
# [3.58.0](https://github.com/aws/aws-sdk-js-v3/compare/v3.57.0...v3.58.0) (2022-03-28)
|
|
15
|
+
|
|
16
|
+
|
|
17
|
+
### Features
|
|
18
|
+
|
|
19
|
+
* **client-acm-pca:** Updating service name entities ([8d633e0](https://github.com/aws/aws-sdk-js-v3/commit/8d633e0c37dbe07f8e7d5a9364c5d8814b90b2b9))
|
|
20
|
+
|
|
21
|
+
|
|
22
|
+
|
|
23
|
+
|
|
24
|
+
|
|
25
|
+
# [3.56.0](https://github.com/aws/aws-sdk-js-v3/compare/v3.55.0...v3.56.0) (2022-03-24)
|
|
26
|
+
|
|
27
|
+
**Note:** Version bump only for package @aws-sdk/client-acm-pca
|
|
28
|
+
|
|
29
|
+
|
|
30
|
+
|
|
31
|
+
|
|
32
|
+
|
|
6
33
|
# [3.55.0](https://github.com/aws/aws-sdk-js-v3/compare/v3.54.1...v3.55.0) (2022-03-21)
|
|
7
34
|
|
|
8
35
|
|
package/README.md
CHANGED
|
@@ -7,21 +7,21 @@
|
|
|
7
7
|
|
|
8
8
|
AWS SDK for JavaScript ACMPCA Client for Node.js, Browser and React Native.
|
|
9
9
|
|
|
10
|
-
<p>This is the <i>
|
|
10
|
+
<p>This is the <i>Certificate Manager Private Certificate Authority (PCA) API Reference</i>. It provides descriptions,
|
|
11
11
|
syntax, and usage examples for each of the actions and data types involved in creating
|
|
12
12
|
and managing a private certificate authority (CA) for your organization.</p>
|
|
13
13
|
<p>The documentation for each action shows the API request parameters and the JSON
|
|
14
14
|
response. Alternatively, you can use one of the Amazon Web Services SDKs to access an API that is
|
|
15
15
|
tailored to the programming language or platform that you prefer. For more information,
|
|
16
16
|
see <a href="https://aws.amazon.com/tools/#SDKs">Amazon Web Services SDKs</a>.</p>
|
|
17
|
-
<p>Each
|
|
18
|
-
operation can be called per second.
|
|
19
|
-
depending on the operation. Throttling means that
|
|
17
|
+
<p>Each ACM Private CA API operation has a quota that determines the number of times the
|
|
18
|
+
operation can be called per second. ACM Private CA throttles API requests at different rates
|
|
19
|
+
depending on the operation. Throttling means that ACM Private CA rejects an otherwise valid
|
|
20
20
|
request because the request exceeds the operation's quota for the number of requests per
|
|
21
|
-
second. When a request is throttled,
|
|
21
|
+
second. When a request is throttled, ACM Private CA returns a <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/CommonErrors.html">ThrottlingException</a> error. ACM Private CA does not guarantee a minimum request
|
|
22
22
|
rate for APIs. </p>
|
|
23
23
|
|
|
24
|
-
<p>To see an up-to-date list of your
|
|
24
|
+
<p>To see an up-to-date list of your ACM Private CA quotas, or to request a quota increase,
|
|
25
25
|
log into your Amazon Web Services account and visit the <a href="https://console.aws.amazon.com/servicequotas/">Service Quotas</a>
|
|
26
26
|
console.</p>
|
|
27
27
|
|
|
@@ -131,7 +131,7 @@ but they are supported by the send operation.
|
|
|
131
131
|
```js
|
|
132
132
|
// callbacks.
|
|
133
133
|
client.send(command, (err, data) => {
|
|
134
|
-
//
|
|
134
|
+
// process err and data.
|
|
135
135
|
});
|
|
136
136
|
```
|
|
137
137
|
|
|
@@ -165,7 +165,7 @@ client
|
|
|
165
165
|
|
|
166
166
|
// callbacks.
|
|
167
167
|
client.createCertificateAuthority(params, (err, data) => {
|
|
168
|
-
//
|
|
168
|
+
// process err and data.
|
|
169
169
|
});
|
|
170
170
|
```
|
|
171
171
|
|
package/dist-types/ACMPCA.d.ts
CHANGED
|
@@ -24,21 +24,21 @@ import { TagCertificateAuthorityCommandInput, TagCertificateAuthorityCommandOutp
|
|
|
24
24
|
import { UntagCertificateAuthorityCommandInput, UntagCertificateAuthorityCommandOutput } from "./commands/UntagCertificateAuthorityCommand";
|
|
25
25
|
import { UpdateCertificateAuthorityCommandInput, UpdateCertificateAuthorityCommandOutput } from "./commands/UpdateCertificateAuthorityCommand";
|
|
26
26
|
/**
|
|
27
|
-
* <p>This is the <i>
|
|
27
|
+
* <p>This is the <i>Certificate Manager Private Certificate Authority (PCA) API Reference</i>. It provides descriptions,
|
|
28
28
|
* syntax, and usage examples for each of the actions and data types involved in creating
|
|
29
29
|
* and managing a private certificate authority (CA) for your organization.</p>
|
|
30
30
|
* <p>The documentation for each action shows the API request parameters and the JSON
|
|
31
31
|
* response. Alternatively, you can use one of the Amazon Web Services SDKs to access an API that is
|
|
32
32
|
* tailored to the programming language or platform that you prefer. For more information,
|
|
33
33
|
* see <a href="https://aws.amazon.com/tools/#SDKs">Amazon Web Services SDKs</a>.</p>
|
|
34
|
-
* <p>Each
|
|
35
|
-
* operation can be called per second.
|
|
36
|
-
* depending on the operation. Throttling means that
|
|
34
|
+
* <p>Each ACM Private CA API operation has a quota that determines the number of times the
|
|
35
|
+
* operation can be called per second. ACM Private CA throttles API requests at different rates
|
|
36
|
+
* depending on the operation. Throttling means that ACM Private CA rejects an otherwise valid
|
|
37
37
|
* request because the request exceeds the operation's quota for the number of requests per
|
|
38
|
-
* second. When a request is throttled,
|
|
38
|
+
* second. When a request is throttled, ACM Private CA returns a <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/CommonErrors.html">ThrottlingException</a> error. ACM Private CA does not guarantee a minimum request
|
|
39
39
|
* rate for APIs. </p>
|
|
40
40
|
*
|
|
41
|
-
* <p>To see an up-to-date list of your
|
|
41
|
+
* <p>To see an up-to-date list of your ACM Private CA quotas, or to request a quota increase,
|
|
42
42
|
* log into your Amazon Web Services account and visit the <a href="https://console.aws.amazon.com/servicequotas/">Service Quotas</a>
|
|
43
43
|
* console.</p>
|
|
44
44
|
*/
|
|
@@ -55,7 +55,7 @@ export declare class ACMPCA extends ACMPCAClient {
|
|
|
55
55
|
* CRL), the Amazon S3 bucket that will contain the CRL, and a CNAME alias for the S3
|
|
56
56
|
* bucket that is included in certificates issued by the CA. If successful, this action
|
|
57
57
|
* returns the Amazon Resource Name (ARN) of the CA.</p>
|
|
58
|
-
* <p>
|
|
58
|
+
* <p>ACM Private CA assets that are stored in Amazon S3 can be protected with encryption.
|
|
59
59
|
* For more information, see <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/PcaCreateCa.html#crl-encryption">Encrypting Your
|
|
60
60
|
* CRLs</a>.</p>
|
|
61
61
|
* <note>
|
|
@@ -70,8 +70,8 @@ export declare class ACMPCA extends ACMPCAClient {
|
|
|
70
70
|
createCertificateAuthority(args: CreateCertificateAuthorityCommandInput, cb: (err: any, data?: CreateCertificateAuthorityCommandOutput) => void): void;
|
|
71
71
|
createCertificateAuthority(args: CreateCertificateAuthorityCommandInput, options: __HttpHandlerOptions, cb: (err: any, data?: CreateCertificateAuthorityCommandOutput) => void): void;
|
|
72
72
|
/**
|
|
73
|
-
* <p>Creates an audit report that lists every time that your CA private key is used. The
|
|
74
|
-
* is saved in the Amazon S3 bucket that you specify on input. The <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_IssueCertificate.html">IssueCertificate</a> and <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_RevokeCertificate.html">RevokeCertificate</a> actions use
|
|
73
|
+
* <p>Creates an audit report that lists every time that your CA private key is used. The
|
|
74
|
+
* report is saved in the Amazon S3 bucket that you specify on input. The <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_IssueCertificate.html">IssueCertificate</a> and <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_RevokeCertificate.html">RevokeCertificate</a> actions use
|
|
75
75
|
* the private key. </p>
|
|
76
76
|
* <note>
|
|
77
77
|
* <p>Both PCA and the IAM principal must have permission to write to
|
|
@@ -80,7 +80,7 @@ export declare class ACMPCA extends ACMPCAClient {
|
|
|
80
80
|
* thrown. For more information, see <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/crl-planning.html#s3-policies">Access
|
|
81
81
|
* policies for CRLs in Amazon S3</a>.</p>
|
|
82
82
|
* </note>
|
|
83
|
-
* <p>
|
|
83
|
+
* <p>ACM Private CA assets that are stored in Amazon S3 can be protected with encryption.
|
|
84
84
|
* For more information, see <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/PcaAuditReport.html#audit-report-encryption">Encrypting Your Audit
|
|
85
85
|
* Reports</a>.</p>
|
|
86
86
|
* <note>
|
|
@@ -115,7 +115,7 @@ export declare class ACMPCA extends ACMPCAClient {
|
|
|
115
115
|
* the ACM certificate owner must set up a resource-based policy to enable
|
|
116
116
|
* cross-account issuance and renewals. For more information, see
|
|
117
117
|
* <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/pca-rbp.html">Using a Resource
|
|
118
|
-
* Based Policy with
|
|
118
|
+
* Based Policy with ACM Private CA</a>.</p>
|
|
119
119
|
* </li>
|
|
120
120
|
* </ul>
|
|
121
121
|
*/
|
|
@@ -134,7 +134,7 @@ export declare class ACMPCA extends ACMPCAClient {
|
|
|
134
134
|
* To do this, call the <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_UpdateCertificateAuthority.html">UpdateCertificateAuthority</a> action and set the <b>CertificateAuthorityStatus</b> parameter to <code>DISABLED</code>. </p>
|
|
135
135
|
* <p>Additionally, you can delete a CA if you are waiting for it to be created (that is,
|
|
136
136
|
* the status of the CA is <code>CREATING</code>). You can also delete it if the CA has
|
|
137
|
-
* been created but you haven't yet imported the signed certificate into
|
|
137
|
+
* been created but you haven't yet imported the signed certificate into ACM Private CA (that
|
|
138
138
|
* is, the status of the CA is <code>PENDING_CERTIFICATE</code>). </p>
|
|
139
139
|
* <p>When you successfully call <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_DeleteCertificateAuthority.html">DeleteCertificateAuthority</a>, the CA's status changes to
|
|
140
140
|
* <code>DELETED</code>. However, the CA won't be permanently deleted until the restoration
|
|
@@ -174,7 +174,7 @@ export declare class ACMPCA extends ACMPCAClient {
|
|
|
174
174
|
* the ACM certificate owner must set up a resource-based policy to enable
|
|
175
175
|
* cross-account issuance and renewals. For more information, see
|
|
176
176
|
* <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/pca-rbp.html">Using a Resource
|
|
177
|
-
* Based Policy with
|
|
177
|
+
* Based Policy with ACM Private CA</a>.</p>
|
|
178
178
|
* </li>
|
|
179
179
|
* </ul>
|
|
180
180
|
*/
|
|
@@ -197,7 +197,7 @@ export declare class ACMPCA extends ACMPCAClient {
|
|
|
197
197
|
* <li>
|
|
198
198
|
* <p>A policy grants access on a private CA to an Amazon Web Services customer account, to Amazon Web Services Organizations, or to
|
|
199
199
|
* an Amazon Web Services Organizations unit. Policies are under the control of a CA administrator. For more information,
|
|
200
|
-
* see <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/pca-rbp.html">Using a Resource Based Policy with
|
|
200
|
+
* see <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/pca-rbp.html">Using a Resource Based Policy with ACM Private CA</a>.</p>
|
|
201
201
|
* </li>
|
|
202
202
|
* <li>
|
|
203
203
|
* <p>A policy permits a user of Certificate Manager (ACM) to issue ACM certificates
|
|
@@ -207,7 +207,7 @@ export declare class ACMPCA extends ACMPCAClient {
|
|
|
207
207
|
* <p>For ACM to manage automatic renewal of these certificates,
|
|
208
208
|
* the ACM user must configure a Service Linked Role (SLR). The SLR allows
|
|
209
209
|
* the ACM service to assume the identity of the user, subject to confirmation against the
|
|
210
|
-
*
|
|
210
|
+
* ACM Private CA policy. For more information, see
|
|
211
211
|
* <a href="https://docs.aws.amazon.com/acm/latest/userguide/acm-slr.html">Using a
|
|
212
212
|
* Service Linked Role with ACM</a>.</p>
|
|
213
213
|
* </li>
|
|
@@ -228,13 +228,13 @@ export declare class ACMPCA extends ACMPCAClient {
|
|
|
228
228
|
* <ul>
|
|
229
229
|
* <li>
|
|
230
230
|
* <p>
|
|
231
|
-
* <code>CREATING</code> -
|
|
231
|
+
* <code>CREATING</code> - ACM Private CA is creating your private certificate
|
|
232
232
|
* authority.</p>
|
|
233
233
|
* </li>
|
|
234
234
|
* <li>
|
|
235
235
|
* <p>
|
|
236
236
|
* <code>PENDING_CERTIFICATE</code> - The certificate is pending. You must use
|
|
237
|
-
* your
|
|
237
|
+
* your ACM Private CA-hosted or on-premises root or subordinate CA to sign your
|
|
238
238
|
* private CA CSR and then import it into PCA. </p>
|
|
239
239
|
* </li>
|
|
240
240
|
* <li>
|
|
@@ -300,9 +300,9 @@ export declare class ACMPCA extends ACMPCAClient {
|
|
|
300
300
|
getCertificateAuthorityCertificate(args: GetCertificateAuthorityCertificateCommandInput, options: __HttpHandlerOptions, cb: (err: any, data?: GetCertificateAuthorityCertificateCommandOutput) => void): void;
|
|
301
301
|
/**
|
|
302
302
|
* <p>Retrieves the certificate signing request (CSR) for your private certificate authority
|
|
303
|
-
* (CA). The CSR is created when you call the <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_CreateCertificateAuthority.html">CreateCertificateAuthority</a> action. Sign the CSR with your
|
|
303
|
+
* (CA). The CSR is created when you call the <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_CreateCertificateAuthority.html">CreateCertificateAuthority</a> action. Sign the CSR with your ACM Private CA-hosted
|
|
304
304
|
* or on-premises root or subordinate CA. Then import the signed certificate back into
|
|
305
|
-
*
|
|
305
|
+
* ACM Private CA by calling the <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_ImportCertificateAuthorityCertificate.html">ImportCertificateAuthorityCertificate</a> action. The CSR is returned as a
|
|
306
306
|
* base64 PEM-encoded string. </p>
|
|
307
307
|
*/
|
|
308
308
|
getCertificateAuthorityCsr(args: GetCertificateAuthorityCsrCommandInput, options?: __HttpHandlerOptions): Promise<GetCertificateAuthorityCsrCommandOutput>;
|
|
@@ -320,7 +320,7 @@ export declare class ACMPCA extends ACMPCAClient {
|
|
|
320
320
|
* <li>
|
|
321
321
|
* <p>A policy grants access on a private CA to an Amazon Web Services customer account, to Amazon Web Services Organizations, or to
|
|
322
322
|
* an Amazon Web Services Organizations unit. Policies are under the control of a CA administrator. For more information,
|
|
323
|
-
* see <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/pca-rbp.html">Using a Resource Based Policy with
|
|
323
|
+
* see <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/pca-rbp.html">Using a Resource Based Policy with ACM Private CA</a>.</p>
|
|
324
324
|
* </li>
|
|
325
325
|
* <li>
|
|
326
326
|
* <p>A policy permits a user of Certificate Manager (ACM) to issue ACM certificates
|
|
@@ -330,7 +330,7 @@ export declare class ACMPCA extends ACMPCAClient {
|
|
|
330
330
|
* <p>For ACM to manage automatic renewal of these certificates,
|
|
331
331
|
* the ACM user must configure a Service Linked Role (SLR). The SLR allows
|
|
332
332
|
* the ACM service to assume the identity of the user, subject to confirmation against the
|
|
333
|
-
*
|
|
333
|
+
* ACM Private CA policy. For more information, see
|
|
334
334
|
* <a href="https://docs.aws.amazon.com/acm/latest/userguide/acm-slr.html">Using a
|
|
335
335
|
* Service Linked Role with ACM</a>.</p>
|
|
336
336
|
* </li>
|
|
@@ -345,12 +345,12 @@ export declare class ACMPCA extends ACMPCAClient {
|
|
|
345
345
|
getPolicy(args: GetPolicyCommandInput, cb: (err: any, data?: GetPolicyCommandOutput) => void): void;
|
|
346
346
|
getPolicy(args: GetPolicyCommandInput, options: __HttpHandlerOptions, cb: (err: any, data?: GetPolicyCommandOutput) => void): void;
|
|
347
347
|
/**
|
|
348
|
-
* <p>Imports a signed private CA certificate into
|
|
349
|
-
* are using a chain of trust whose root is located outside
|
|
348
|
+
* <p>Imports a signed private CA certificate into ACM Private CA. This action is used when you
|
|
349
|
+
* are using a chain of trust whose root is located outside ACM Private CA. Before you can call
|
|
350
350
|
* this action, the following preparations must in place:</p>
|
|
351
351
|
* <ol>
|
|
352
352
|
* <li>
|
|
353
|
-
* <p>In
|
|
353
|
+
* <p>In ACM Private CA, call the <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_CreateCertificateAuthority.html">CreateCertificateAuthority</a> action to create the private CA that you
|
|
354
354
|
* plan to back with the imported certificate.</p>
|
|
355
355
|
* </li>
|
|
356
356
|
* <li>
|
|
@@ -366,14 +366,14 @@ export declare class ACMPCA extends ACMPCAClient {
|
|
|
366
366
|
* chain to your working directory.</p>
|
|
367
367
|
* </li>
|
|
368
368
|
* </ol>
|
|
369
|
-
* <p>
|
|
369
|
+
* <p>ACM Private CA supports three scenarios for installing a CA certificate:</p>
|
|
370
370
|
* <ul>
|
|
371
371
|
* <li>
|
|
372
|
-
* <p>Installing a certificate for a root CA hosted by
|
|
372
|
+
* <p>Installing a certificate for a root CA hosted by ACM Private CA.</p>
|
|
373
373
|
* </li>
|
|
374
374
|
* <li>
|
|
375
375
|
* <p>Installing a subordinate CA certificate whose parent authority is hosted by
|
|
376
|
-
*
|
|
376
|
+
* ACM Private CA.</p>
|
|
377
377
|
* </li>
|
|
378
378
|
* <li>
|
|
379
379
|
* <p>Installing a subordinate CA certificate whose parent authority is externally
|
|
@@ -411,7 +411,7 @@ export declare class ACMPCA extends ACMPCAClient {
|
|
|
411
411
|
* <p>
|
|
412
412
|
* <i>Enforcement of Critical Constraints</i>
|
|
413
413
|
* </p>
|
|
414
|
-
* <p>
|
|
414
|
+
* <p>ACM Private CA allows the following extensions to be marked critical in the imported CA
|
|
415
415
|
* certificate or chain.</p>
|
|
416
416
|
* <ul>
|
|
417
417
|
* <li>
|
|
@@ -451,7 +451,7 @@ export declare class ACMPCA extends ACMPCAClient {
|
|
|
451
451
|
* <p>Inhibit anyPolicy</p>
|
|
452
452
|
* </li>
|
|
453
453
|
* </ul>
|
|
454
|
-
* <p>
|
|
454
|
+
* <p>ACM Private CA rejects the following extensions when they are marked critical in an
|
|
455
455
|
* imported CA certificate or chain.</p>
|
|
456
456
|
* <ul>
|
|
457
457
|
* <li>
|
|
@@ -484,7 +484,7 @@ export declare class ACMPCA extends ACMPCAClient {
|
|
|
484
484
|
* specifying the ARN. </p>
|
|
485
485
|
* <note>
|
|
486
486
|
* <p>You cannot use the ACM <b>ListCertificateAuthorities</b> action to retrieve the ARNs of the
|
|
487
|
-
* certificates that you issue by using
|
|
487
|
+
* certificates that you issue by using ACM Private CA.</p>
|
|
488
488
|
* </note>
|
|
489
489
|
*/
|
|
490
490
|
issueCertificate(args: IssueCertificateCommandInput, options?: __HttpHandlerOptions): Promise<IssueCertificateCommandOutput>;
|
|
@@ -522,7 +522,7 @@ export declare class ACMPCA extends ACMPCAClient {
|
|
|
522
522
|
* the ACM certificate owner must set up a resource-based policy to enable
|
|
523
523
|
* cross-account issuance and renewals. For more information, see
|
|
524
524
|
* <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/pca-rbp.html">Using a Resource
|
|
525
|
-
* Based Policy with
|
|
525
|
+
* Based Policy with ACM Private CA</a>.</p>
|
|
526
526
|
* </li>
|
|
527
527
|
* </ul>
|
|
528
528
|
*/
|
|
@@ -551,7 +551,7 @@ export declare class ACMPCA extends ACMPCAClient {
|
|
|
551
551
|
* <li>
|
|
552
552
|
* <p>A policy grants access on a private CA to an Amazon Web Services customer account, to Amazon Web Services Organizations, or to
|
|
553
553
|
* an Amazon Web Services Organizations unit. Policies are under the control of a CA administrator. For more information,
|
|
554
|
-
* see <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/pca-rbp.html">Using a Resource Based Policy with
|
|
554
|
+
* see <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/pca-rbp.html">Using a Resource Based Policy with ACM Private CA</a>.</p>
|
|
555
555
|
* </li>
|
|
556
556
|
* <li>
|
|
557
557
|
* <p>A policy permits a user of Certificate Manager (ACM) to issue ACM certificates
|
|
@@ -561,7 +561,7 @@ export declare class ACMPCA extends ACMPCAClient {
|
|
|
561
561
|
* <p>For ACM to manage automatic renewal of these certificates,
|
|
562
562
|
* the ACM user must configure a Service Linked Role (SLR). The SLR allows
|
|
563
563
|
* the ACM service to assume the identity of the user, subject to confirmation against the
|
|
564
|
-
*
|
|
564
|
+
* ACM Private CA policy. For more information, see
|
|
565
565
|
* <a href="https://docs.aws.amazon.com/acm/latest/userguide/acm-slr.html">Using a
|
|
566
566
|
* Service Linked Role with ACM</a>.</p>
|
|
567
567
|
* </li>
|
|
@@ -592,11 +592,11 @@ export declare class ACMPCA extends ACMPCAClient {
|
|
|
592
592
|
restoreCertificateAuthority(args: RestoreCertificateAuthorityCommandInput, cb: (err: any, data?: RestoreCertificateAuthorityCommandOutput) => void): void;
|
|
593
593
|
restoreCertificateAuthority(args: RestoreCertificateAuthorityCommandInput, options: __HttpHandlerOptions, cb: (err: any, data?: RestoreCertificateAuthorityCommandOutput) => void): void;
|
|
594
594
|
/**
|
|
595
|
-
* <p>Revokes a certificate that was issued inside
|
|
595
|
+
* <p>Revokes a certificate that was issued inside ACM Private CA. If you enable a certificate
|
|
596
596
|
* revocation list (CRL) when you create or update your private CA, information about the
|
|
597
|
-
* revoked certificates will be included in the CRL.
|
|
597
|
+
* revoked certificates will be included in the CRL. ACM Private CA writes the CRL to an S3
|
|
598
598
|
* bucket that you specify. A CRL is typically updated approximately 30 minutes after a
|
|
599
|
-
* certificate is revoked. If for any reason the CRL update fails,
|
|
599
|
+
* certificate is revoked. If for any reason the CRL update fails, ACM Private CA attempts
|
|
600
600
|
* makes further attempts every 15 minutes. With Amazon CloudWatch, you can create alarms
|
|
601
601
|
* for the metrics <code>CRLGenerated</code> and <code>MisconfiguredCRLBucket</code>. For
|
|
602
602
|
* more information, see <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/PcaCloudWatch.html">Supported CloudWatch Metrics</a>.</p>
|
|
@@ -607,7 +607,7 @@ export declare class ACMPCA extends ACMPCAClient {
|
|
|
607
607
|
* thrown. For more information, see <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/crl-planning.html#s3-policies">Access
|
|
608
608
|
* policies for CRLs in Amazon S3</a>.</p>
|
|
609
609
|
* </note>
|
|
610
|
-
* <p>
|
|
610
|
+
* <p>ACM Private CA also writes revocation information to the audit report. For more
|
|
611
611
|
* information, see <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_CreateCertificateAuthorityAuditReport.html">CreateCertificateAuthorityAuditReport</a>.</p>
|
|
612
612
|
* <note>
|
|
613
613
|
* <p>You cannot revoke a root CA self-signed certificate.</p>
|
|
@@ -149,21 +149,21 @@ declare type ACMPCAClientResolvedConfigType = __SmithyResolvedConfiguration<__Ht
|
|
|
149
149
|
export interface ACMPCAClientResolvedConfig extends ACMPCAClientResolvedConfigType {
|
|
150
150
|
}
|
|
151
151
|
/**
|
|
152
|
-
* <p>This is the <i>
|
|
152
|
+
* <p>This is the <i>Certificate Manager Private Certificate Authority (PCA) API Reference</i>. It provides descriptions,
|
|
153
153
|
* syntax, and usage examples for each of the actions and data types involved in creating
|
|
154
154
|
* and managing a private certificate authority (CA) for your organization.</p>
|
|
155
155
|
* <p>The documentation for each action shows the API request parameters and the JSON
|
|
156
156
|
* response. Alternatively, you can use one of the Amazon Web Services SDKs to access an API that is
|
|
157
157
|
* tailored to the programming language or platform that you prefer. For more information,
|
|
158
158
|
* see <a href="https://aws.amazon.com/tools/#SDKs">Amazon Web Services SDKs</a>.</p>
|
|
159
|
-
* <p>Each
|
|
160
|
-
* operation can be called per second.
|
|
161
|
-
* depending on the operation. Throttling means that
|
|
159
|
+
* <p>Each ACM Private CA API operation has a quota that determines the number of times the
|
|
160
|
+
* operation can be called per second. ACM Private CA throttles API requests at different rates
|
|
161
|
+
* depending on the operation. Throttling means that ACM Private CA rejects an otherwise valid
|
|
162
162
|
* request because the request exceeds the operation's quota for the number of requests per
|
|
163
|
-
* second. When a request is throttled,
|
|
163
|
+
* second. When a request is throttled, ACM Private CA returns a <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/CommonErrors.html">ThrottlingException</a> error. ACM Private CA does not guarantee a minimum request
|
|
164
164
|
* rate for APIs. </p>
|
|
165
165
|
*
|
|
166
|
-
* <p>To see an up-to-date list of your
|
|
166
|
+
* <p>To see an up-to-date list of your ACM Private CA quotas, or to request a quota increase,
|
|
167
167
|
* log into your Amazon Web Services account and visit the <a href="https://console.aws.amazon.com/servicequotas/">Service Quotas</a>
|
|
168
168
|
* console.</p>
|
|
169
169
|
*/
|
|
@@ -7,8 +7,8 @@ export interface CreateCertificateAuthorityAuditReportCommandInput extends Creat
|
|
|
7
7
|
export interface CreateCertificateAuthorityAuditReportCommandOutput extends CreateCertificateAuthorityAuditReportResponse, __MetadataBearer {
|
|
8
8
|
}
|
|
9
9
|
/**
|
|
10
|
-
* <p>Creates an audit report that lists every time that your CA private key is used. The
|
|
11
|
-
* is saved in the Amazon S3 bucket that you specify on input. The <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_IssueCertificate.html">IssueCertificate</a> and <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_RevokeCertificate.html">RevokeCertificate</a> actions use
|
|
10
|
+
* <p>Creates an audit report that lists every time that your CA private key is used. The
|
|
11
|
+
* report is saved in the Amazon S3 bucket that you specify on input. The <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_IssueCertificate.html">IssueCertificate</a> and <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_RevokeCertificate.html">RevokeCertificate</a> actions use
|
|
12
12
|
* the private key. </p>
|
|
13
13
|
* <note>
|
|
14
14
|
* <p>Both PCA and the IAM principal must have permission to write to
|
|
@@ -17,7 +17,7 @@ export interface CreateCertificateAuthorityAuditReportCommandOutput extends Crea
|
|
|
17
17
|
* thrown. For more information, see <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/crl-planning.html#s3-policies">Access
|
|
18
18
|
* policies for CRLs in Amazon S3</a>.</p>
|
|
19
19
|
* </note>
|
|
20
|
-
* <p>
|
|
20
|
+
* <p>ACM Private CA assets that are stored in Amazon S3 can be protected with encryption.
|
|
21
21
|
* For more information, see <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/PcaAuditReport.html#audit-report-encryption">Encrypting Your Audit
|
|
22
22
|
* Reports</a>.</p>
|
|
23
23
|
* <note>
|
|
@@ -18,7 +18,7 @@ export interface CreateCertificateAuthorityCommandOutput extends CreateCertifica
|
|
|
18
18
|
* CRL), the Amazon S3 bucket that will contain the CRL, and a CNAME alias for the S3
|
|
19
19
|
* bucket that is included in certificates issued by the CA. If successful, this action
|
|
20
20
|
* returns the Amazon Resource Name (ARN) of the CA.</p>
|
|
21
|
-
* <p>
|
|
21
|
+
* <p>ACM Private CA assets that are stored in Amazon S3 can be protected with encryption.
|
|
22
22
|
* For more information, see <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/PcaCreateCa.html#crl-encryption">Encrypting Your
|
|
23
23
|
* CRLs</a>.</p>
|
|
24
24
|
* <note>
|
|
@@ -31,7 +31,7 @@ export interface CreatePermissionCommandOutput extends __MetadataBearer {
|
|
|
31
31
|
* the ACM certificate owner must set up a resource-based policy to enable
|
|
32
32
|
* cross-account issuance and renewals. For more information, see
|
|
33
33
|
* <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/pca-rbp.html">Using a Resource
|
|
34
|
-
* Based Policy with
|
|
34
|
+
* Based Policy with ACM Private CA</a>.</p>
|
|
35
35
|
* </li>
|
|
36
36
|
* </ul>
|
|
37
37
|
* @example
|
|
@@ -18,7 +18,7 @@ export interface DeleteCertificateAuthorityCommandOutput extends __MetadataBeare
|
|
|
18
18
|
* To do this, call the <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_UpdateCertificateAuthority.html">UpdateCertificateAuthority</a> action and set the <b>CertificateAuthorityStatus</b> parameter to <code>DISABLED</code>. </p>
|
|
19
19
|
* <p>Additionally, you can delete a CA if you are waiting for it to be created (that is,
|
|
20
20
|
* the status of the CA is <code>CREATING</code>). You can also delete it if the CA has
|
|
21
|
-
* been created but you haven't yet imported the signed certificate into
|
|
21
|
+
* been created but you haven't yet imported the signed certificate into ACM Private CA (that
|
|
22
22
|
* is, the status of the CA is <code>PENDING_CERTIFICATE</code>). </p>
|
|
23
23
|
* <p>When you successfully call <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_DeleteCertificateAuthority.html">DeleteCertificateAuthority</a>, the CA's status changes to
|
|
24
24
|
* <code>DELETED</code>. However, the CA won't be permanently deleted until the restoration
|
|
@@ -33,7 +33,7 @@ export interface DeletePermissionCommandOutput extends __MetadataBearer {
|
|
|
33
33
|
* the ACM certificate owner must set up a resource-based policy to enable
|
|
34
34
|
* cross-account issuance and renewals. For more information, see
|
|
35
35
|
* <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/pca-rbp.html">Using a Resource
|
|
36
|
-
* Based Policy with
|
|
36
|
+
* Based Policy with ACM Private CA</a>.</p>
|
|
37
37
|
* </li>
|
|
38
38
|
* </ul>
|
|
39
39
|
* @example
|
|
@@ -22,7 +22,7 @@ export interface DeletePolicyCommandOutput extends __MetadataBearer {
|
|
|
22
22
|
* <li>
|
|
23
23
|
* <p>A policy grants access on a private CA to an Amazon Web Services customer account, to Amazon Web Services Organizations, or to
|
|
24
24
|
* an Amazon Web Services Organizations unit. Policies are under the control of a CA administrator. For more information,
|
|
25
|
-
* see <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/pca-rbp.html">Using a Resource Based Policy with
|
|
25
|
+
* see <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/pca-rbp.html">Using a Resource Based Policy with ACM Private CA</a>.</p>
|
|
26
26
|
* </li>
|
|
27
27
|
* <li>
|
|
28
28
|
* <p>A policy permits a user of Certificate Manager (ACM) to issue ACM certificates
|
|
@@ -32,7 +32,7 @@ export interface DeletePolicyCommandOutput extends __MetadataBearer {
|
|
|
32
32
|
* <p>For ACM to manage automatic renewal of these certificates,
|
|
33
33
|
* the ACM user must configure a Service Linked Role (SLR). The SLR allows
|
|
34
34
|
* the ACM service to assume the identity of the user, subject to confirmation against the
|
|
35
|
-
*
|
|
35
|
+
* ACM Private CA policy. For more information, see
|
|
36
36
|
* <a href="https://docs.aws.amazon.com/acm/latest/userguide/acm-slr.html">Using a
|
|
37
37
|
* Service Linked Role with ACM</a>.</p>
|
|
38
38
|
* </li>
|
|
@@ -13,13 +13,13 @@ export interface DescribeCertificateAuthorityCommandOutput extends DescribeCerti
|
|
|
13
13
|
* <ul>
|
|
14
14
|
* <li>
|
|
15
15
|
* <p>
|
|
16
|
-
* <code>CREATING</code> -
|
|
16
|
+
* <code>CREATING</code> - ACM Private CA is creating your private certificate
|
|
17
17
|
* authority.</p>
|
|
18
18
|
* </li>
|
|
19
19
|
* <li>
|
|
20
20
|
* <p>
|
|
21
21
|
* <code>PENDING_CERTIFICATE</code> - The certificate is pending. You must use
|
|
22
|
-
* your
|
|
22
|
+
* your ACM Private CA-hosted or on-premises root or subordinate CA to sign your
|
|
23
23
|
* private CA CSR and then import it into PCA. </p>
|
|
24
24
|
* </li>
|
|
25
25
|
* <li>
|
|
@@ -8,9 +8,9 @@ export interface GetCertificateAuthorityCsrCommandOutput extends GetCertificateA
|
|
|
8
8
|
}
|
|
9
9
|
/**
|
|
10
10
|
* <p>Retrieves the certificate signing request (CSR) for your private certificate authority
|
|
11
|
-
* (CA). The CSR is created when you call the <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_CreateCertificateAuthority.html">CreateCertificateAuthority</a> action. Sign the CSR with your
|
|
11
|
+
* (CA). The CSR is created when you call the <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_CreateCertificateAuthority.html">CreateCertificateAuthority</a> action. Sign the CSR with your ACM Private CA-hosted
|
|
12
12
|
* or on-premises root or subordinate CA. Then import the signed certificate back into
|
|
13
|
-
*
|
|
13
|
+
* ACM Private CA by calling the <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_ImportCertificateAuthorityCertificate.html">ImportCertificateAuthorityCertificate</a> action. The CSR is returned as a
|
|
14
14
|
* base64 PEM-encoded string. </p>
|
|
15
15
|
* @example
|
|
16
16
|
* Use a bare-bones client and the command you need to make an API call.
|
|
@@ -18,7 +18,7 @@ export interface GetPolicyCommandOutput extends GetPolicyResponse, __MetadataBea
|
|
|
18
18
|
* <li>
|
|
19
19
|
* <p>A policy grants access on a private CA to an Amazon Web Services customer account, to Amazon Web Services Organizations, or to
|
|
20
20
|
* an Amazon Web Services Organizations unit. Policies are under the control of a CA administrator. For more information,
|
|
21
|
-
* see <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/pca-rbp.html">Using a Resource Based Policy with
|
|
21
|
+
* see <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/pca-rbp.html">Using a Resource Based Policy with ACM Private CA</a>.</p>
|
|
22
22
|
* </li>
|
|
23
23
|
* <li>
|
|
24
24
|
* <p>A policy permits a user of Certificate Manager (ACM) to issue ACM certificates
|
|
@@ -28,7 +28,7 @@ export interface GetPolicyCommandOutput extends GetPolicyResponse, __MetadataBea
|
|
|
28
28
|
* <p>For ACM to manage automatic renewal of these certificates,
|
|
29
29
|
* the ACM user must configure a Service Linked Role (SLR). The SLR allows
|
|
30
30
|
* the ACM service to assume the identity of the user, subject to confirmation against the
|
|
31
|
-
*
|
|
31
|
+
* ACM Private CA policy. For more information, see
|
|
32
32
|
* <a href="https://docs.aws.amazon.com/acm/latest/userguide/acm-slr.html">Using a
|
|
33
33
|
* Service Linked Role with ACM</a>.</p>
|
|
34
34
|
* </li>
|
|
@@ -7,12 +7,12 @@ export interface ImportCertificateAuthorityCertificateCommandInput extends Impor
|
|
|
7
7
|
export interface ImportCertificateAuthorityCertificateCommandOutput extends __MetadataBearer {
|
|
8
8
|
}
|
|
9
9
|
/**
|
|
10
|
-
* <p>Imports a signed private CA certificate into
|
|
11
|
-
* are using a chain of trust whose root is located outside
|
|
10
|
+
* <p>Imports a signed private CA certificate into ACM Private CA. This action is used when you
|
|
11
|
+
* are using a chain of trust whose root is located outside ACM Private CA. Before you can call
|
|
12
12
|
* this action, the following preparations must in place:</p>
|
|
13
13
|
* <ol>
|
|
14
14
|
* <li>
|
|
15
|
-
* <p>In
|
|
15
|
+
* <p>In ACM Private CA, call the <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_CreateCertificateAuthority.html">CreateCertificateAuthority</a> action to create the private CA that you
|
|
16
16
|
* plan to back with the imported certificate.</p>
|
|
17
17
|
* </li>
|
|
18
18
|
* <li>
|
|
@@ -28,14 +28,14 @@ export interface ImportCertificateAuthorityCertificateCommandOutput extends __Me
|
|
|
28
28
|
* chain to your working directory.</p>
|
|
29
29
|
* </li>
|
|
30
30
|
* </ol>
|
|
31
|
-
* <p>
|
|
31
|
+
* <p>ACM Private CA supports three scenarios for installing a CA certificate:</p>
|
|
32
32
|
* <ul>
|
|
33
33
|
* <li>
|
|
34
|
-
* <p>Installing a certificate for a root CA hosted by
|
|
34
|
+
* <p>Installing a certificate for a root CA hosted by ACM Private CA.</p>
|
|
35
35
|
* </li>
|
|
36
36
|
* <li>
|
|
37
37
|
* <p>Installing a subordinate CA certificate whose parent authority is hosted by
|
|
38
|
-
*
|
|
38
|
+
* ACM Private CA.</p>
|
|
39
39
|
* </li>
|
|
40
40
|
* <li>
|
|
41
41
|
* <p>Installing a subordinate CA certificate whose parent authority is externally
|
|
@@ -73,7 +73,7 @@ export interface ImportCertificateAuthorityCertificateCommandOutput extends __Me
|
|
|
73
73
|
* <p>
|
|
74
74
|
* <i>Enforcement of Critical Constraints</i>
|
|
75
75
|
* </p>
|
|
76
|
-
* <p>
|
|
76
|
+
* <p>ACM Private CA allows the following extensions to be marked critical in the imported CA
|
|
77
77
|
* certificate or chain.</p>
|
|
78
78
|
* <ul>
|
|
79
79
|
* <li>
|
|
@@ -113,7 +113,7 @@ export interface ImportCertificateAuthorityCertificateCommandOutput extends __Me
|
|
|
113
113
|
* <p>Inhibit anyPolicy</p>
|
|
114
114
|
* </li>
|
|
115
115
|
* </ul>
|
|
116
|
-
* <p>
|
|
116
|
+
* <p>ACM Private CA rejects the following extensions when they are marked critical in an
|
|
117
117
|
* imported CA certificate or chain.</p>
|
|
118
118
|
* <ul>
|
|
119
119
|
* <li>
|
|
@@ -13,7 +13,7 @@ export interface IssueCertificateCommandOutput extends IssueCertificateResponse,
|
|
|
13
13
|
* specifying the ARN. </p>
|
|
14
14
|
* <note>
|
|
15
15
|
* <p>You cannot use the ACM <b>ListCertificateAuthorities</b> action to retrieve the ARNs of the
|
|
16
|
-
* certificates that you issue by using
|
|
16
|
+
* certificates that you issue by using ACM Private CA.</p>
|
|
17
17
|
* </note>
|
|
18
18
|
* @example
|
|
19
19
|
* Use a bare-bones client and the command you need to make an API call.
|
|
@@ -32,7 +32,7 @@ export interface ListPermissionsCommandOutput extends ListPermissionsResponse, _
|
|
|
32
32
|
* the ACM certificate owner must set up a resource-based policy to enable
|
|
33
33
|
* cross-account issuance and renewals. For more information, see
|
|
34
34
|
* <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/pca-rbp.html">Using a Resource
|
|
35
|
-
* Based Policy with
|
|
35
|
+
* Based Policy with ACM Private CA</a>.</p>
|
|
36
36
|
* </li>
|
|
37
37
|
* </ul>
|
|
38
38
|
* @example
|
|
@@ -19,7 +19,7 @@ export interface PutPolicyCommandOutput extends __MetadataBearer {
|
|
|
19
19
|
* <li>
|
|
20
20
|
* <p>A policy grants access on a private CA to an Amazon Web Services customer account, to Amazon Web Services Organizations, or to
|
|
21
21
|
* an Amazon Web Services Organizations unit. Policies are under the control of a CA administrator. For more information,
|
|
22
|
-
* see <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/pca-rbp.html">Using a Resource Based Policy with
|
|
22
|
+
* see <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/pca-rbp.html">Using a Resource Based Policy with ACM Private CA</a>.</p>
|
|
23
23
|
* </li>
|
|
24
24
|
* <li>
|
|
25
25
|
* <p>A policy permits a user of Certificate Manager (ACM) to issue ACM certificates
|
|
@@ -29,7 +29,7 @@ export interface PutPolicyCommandOutput extends __MetadataBearer {
|
|
|
29
29
|
* <p>For ACM to manage automatic renewal of these certificates,
|
|
30
30
|
* the ACM user must configure a Service Linked Role (SLR). The SLR allows
|
|
31
31
|
* the ACM service to assume the identity of the user, subject to confirmation against the
|
|
32
|
-
*
|
|
32
|
+
* ACM Private CA policy. For more information, see
|
|
33
33
|
* <a href="https://docs.aws.amazon.com/acm/latest/userguide/acm-slr.html">Using a
|
|
34
34
|
* Service Linked Role with ACM</a>.</p>
|
|
35
35
|
* </li>
|
|
@@ -7,11 +7,11 @@ export interface RevokeCertificateCommandInput extends RevokeCertificateRequest
|
|
|
7
7
|
export interface RevokeCertificateCommandOutput extends __MetadataBearer {
|
|
8
8
|
}
|
|
9
9
|
/**
|
|
10
|
-
* <p>Revokes a certificate that was issued inside
|
|
10
|
+
* <p>Revokes a certificate that was issued inside ACM Private CA. If you enable a certificate
|
|
11
11
|
* revocation list (CRL) when you create or update your private CA, information about the
|
|
12
|
-
* revoked certificates will be included in the CRL.
|
|
12
|
+
* revoked certificates will be included in the CRL. ACM Private CA writes the CRL to an S3
|
|
13
13
|
* bucket that you specify. A CRL is typically updated approximately 30 minutes after a
|
|
14
|
-
* certificate is revoked. If for any reason the CRL update fails,
|
|
14
|
+
* certificate is revoked. If for any reason the CRL update fails, ACM Private CA attempts
|
|
15
15
|
* makes further attempts every 15 minutes. With Amazon CloudWatch, you can create alarms
|
|
16
16
|
* for the metrics <code>CRLGenerated</code> and <code>MisconfiguredCRLBucket</code>. For
|
|
17
17
|
* more information, see <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/PcaCloudWatch.html">Supported CloudWatch Metrics</a>.</p>
|
|
@@ -22,7 +22,7 @@ export interface RevokeCertificateCommandOutput extends __MetadataBearer {
|
|
|
22
22
|
* thrown. For more information, see <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/crl-planning.html#s3-policies">Access
|
|
23
23
|
* policies for CRLs in Amazon S3</a>.</p>
|
|
24
24
|
* </note>
|
|
25
|
-
* <p>
|
|
25
|
+
* <p>ACM Private CA also writes revocation information to the audit report. For more
|
|
26
26
|
* information, see <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_CreateCertificateAuthorityAuditReport.html">CreateCertificateAuthorityAuditReport</a>.</p>
|
|
27
27
|
* <note>
|
|
28
28
|
* <p>You cannot revoke a root CA self-signed certificate.</p>
|
|
@@ -409,19 +409,17 @@ export declare enum S3ObjectAcl {
|
|
|
409
409
|
* specifying a value for the <b>CustomCname</b> parameter. Your
|
|
410
410
|
* private CA copies the CNAME or the S3 bucket name to the <b>CRL
|
|
411
411
|
* Distribution Points</b> extension of each certificate it issues. Your S3
|
|
412
|
-
* bucket policy must give write permission to
|
|
413
|
-
* <p>
|
|
412
|
+
* bucket policy must give write permission to ACM Private CA. </p>
|
|
413
|
+
* <p>ACM Private CA assets that are stored in Amazon S3 can be protected with encryption.
|
|
414
414
|
* For more information, see <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/PcaCreateCa.html#crl-encryption">Encrypting Your
|
|
415
415
|
* CRLs</a>.</p>
|
|
416
|
-
* <p>Your private CA uses the value in the <b>ExpirationInDays</b>
|
|
417
|
-
*
|
|
418
|
-
*
|
|
419
|
-
*
|
|
420
|
-
* expires, and then in one additional CRL after expiration, and it always appears in the
|
|
421
|
-
* audit report.</p>
|
|
416
|
+
* <p>Your private CA uses the value in the <b>ExpirationInDays</b> parameter to calculate the <b>nextUpdate</b> field in the CRL. The CRL is refreshed prior to a
|
|
417
|
+
* certificate's expiration date or when a certificate is revoked. When a certificate is
|
|
418
|
+
* revoked, it appears in the CRL until the certificate expires, and then in one additional
|
|
419
|
+
* CRL after expiration, and it always appears in the audit report.</p>
|
|
422
420
|
*
|
|
423
421
|
* <p>A CRL is typically updated approximately 30 minutes after a certificate
|
|
424
|
-
* is revoked. If for any reason a CRL update fails,
|
|
422
|
+
* is revoked. If for any reason a CRL update fails, ACM Private CA makes further attempts
|
|
425
423
|
* every 15 minutes.</p>
|
|
426
424
|
*
|
|
427
425
|
* <p>CRLs contain the following fields:</p>
|
|
@@ -509,14 +507,14 @@ export declare enum S3ObjectAcl {
|
|
|
509
507
|
* CRL.</p>
|
|
510
508
|
* </li>
|
|
511
509
|
* </ul>
|
|
512
|
-
* <p>Certificate revocation lists created by
|
|
510
|
+
* <p>Certificate revocation lists created by ACM Private CA are DER-encoded. You can use the
|
|
513
511
|
* following OpenSSL command to list a CRL.</p>
|
|
514
512
|
* <p>
|
|
515
513
|
* <code>openssl crl -inform DER -text -in <i>crl_path</i>
|
|
516
514
|
* -noout</code>
|
|
517
515
|
* </p>
|
|
518
516
|
* <p>For more information, see <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/crl-planning.html">Planning a certificate revocation list
|
|
519
|
-
* (CRL)</a> in the <i>
|
|
517
|
+
* (CRL)</a> in the <i>Certificate Manager Private Certificate Authority (PCA) User Guide</i>
|
|
520
518
|
* </p>
|
|
521
519
|
*/
|
|
522
520
|
export interface CrlConfiguration {
|
|
@@ -543,7 +541,7 @@ export interface CrlConfiguration {
|
|
|
543
541
|
* <b>CustomCname</b> argument, the name of your S3 bucket
|
|
544
542
|
* is placed into the <b>CRL Distribution Points</b> extension of
|
|
545
543
|
* the issued certificate. You can change the name of your bucket by calling the <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_UpdateCertificateAuthority.html">UpdateCertificateAuthority</a> operation. You must specify a <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/PcaCreateCa.html#s3-policies">bucket
|
|
546
|
-
* policy</a> that allows
|
|
544
|
+
* policy</a> that allows ACM Private CA to write the CRL to your bucket.</p>
|
|
547
545
|
*/
|
|
548
546
|
S3BucketName?: string;
|
|
549
547
|
/**
|
|
@@ -584,13 +582,13 @@ export interface OcspConfiguration {
|
|
|
584
582
|
*/
|
|
585
583
|
Enabled: boolean | undefined;
|
|
586
584
|
/**
|
|
587
|
-
* <p>By default,
|
|
585
|
+
* <p>By default, ACM Private CA injects an Amazon Web Services domain into certificates being validated by
|
|
588
586
|
* the Online Certificate Status Protocol (OCSP). A customer can alternatively use this
|
|
589
587
|
* object to define a CNAME specifying a customized OCSP domain.</p>
|
|
590
588
|
* <p>Note: The value of the CNAME must not include a protocol prefix such as "http://" or
|
|
591
589
|
* "https://".</p>
|
|
592
590
|
* <p>For more information, see <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/ocsp-customize.html">Customizing Online Certificate Status Protocol
|
|
593
|
-
* (OCSP) </a> in the <i>
|
|
591
|
+
* (OCSP) </a> in the <i>Certificate Manager Private Certificate Authority (PCA) User Guide</i>.</p>
|
|
594
592
|
*/
|
|
595
593
|
OcspCustomCname?: string;
|
|
596
594
|
}
|
|
@@ -606,14 +604,14 @@ export declare namespace OcspConfiguration {
|
|
|
606
604
|
* certificate revocation list (CRL). OCSP returns validation information about
|
|
607
605
|
* certificates as requested by clients, and a CRL contains an updated list of certificates
|
|
608
606
|
* revoked by your CA. For more information, see <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_RevokeCertificate.html">RevokeCertificate</a> and <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/revocation-setup.html">Setting up a
|
|
609
|
-
* certificate revocation method</a> in the <i>
|
|
607
|
+
* certificate revocation method</a> in the <i>Certificate Manager Private Certificate Authority (PCA) User
|
|
610
608
|
* Guide</i>.</p>
|
|
611
609
|
*/
|
|
612
610
|
export interface RevocationConfiguration {
|
|
613
611
|
/**
|
|
614
612
|
* <p>Configuration of the certificate revocation list (CRL), if any, maintained by your
|
|
615
613
|
* private CA. A CRL is typically updated approximately 30 minutes after a certificate
|
|
616
|
-
* is revoked. If for any reason a CRL update fails,
|
|
614
|
+
* is revoked. If for any reason a CRL update fails, ACM Private CA makes further attempts
|
|
617
615
|
* every 15 minutes.</p>
|
|
618
616
|
*/
|
|
619
617
|
CrlConfiguration?: CrlConfiguration;
|
|
@@ -673,7 +671,7 @@ export interface CreateCertificateAuthorityRequest {
|
|
|
673
671
|
* <p>Custom string that can be used to distinguish between calls to the <b>CreateCertificateAuthority</b> action. Idempotency tokens for
|
|
674
672
|
* <b>CreateCertificateAuthority</b> time out after five
|
|
675
673
|
* minutes. Therefore, if you call <b>CreateCertificateAuthority</b> multiple times with the same idempotency
|
|
676
|
-
* token within five minutes,
|
|
674
|
+
* token within five minutes, ACM Private CA recognizes that you are requesting only
|
|
677
675
|
* certificate authority and will issue only one. If you change the idempotency token for
|
|
678
676
|
* each call, PCA recognizes that you are requesting multiple certificate
|
|
679
677
|
* authorities.</p>
|
|
@@ -757,7 +755,7 @@ export declare class InvalidTagException extends __BaseException {
|
|
|
757
755
|
constructor(opts: __ExceptionOptionType<InvalidTagException, __BaseException>);
|
|
758
756
|
}
|
|
759
757
|
/**
|
|
760
|
-
* <p>An
|
|
758
|
+
* <p>An ACM Private CA quota has been exceeded. See the exception message returned to determine
|
|
761
759
|
* the quota that was exceeded.</p>
|
|
762
760
|
*/
|
|
763
761
|
export declare class LimitExceededException extends __BaseException {
|
|
@@ -1041,7 +1039,7 @@ export declare enum CertificateAuthorityStatus {
|
|
|
1041
1039
|
* controls the public key contained in the <b>Subject Public Key
|
|
1042
1040
|
* Info</b> field. Call the <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_CreateCertificateAuthority.html">CreateCertificateAuthority</a> action to create your private CA. You must then
|
|
1043
1041
|
* call the <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_GetCertificateAuthorityCertificate.html">GetCertificateAuthorityCertificate</a> action to retrieve a private CA
|
|
1044
|
-
* certificate signing request (CSR). Sign the CSR with your
|
|
1042
|
+
* certificate signing request (CSR). Sign the CSR with your ACM Private CA-hosted or
|
|
1045
1043
|
* on-premises root or subordinate CA certificate. Call the <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_ImportCertificateAuthorityCertificate.html">ImportCertificateAuthorityCertificate</a> action to import the signed
|
|
1046
1044
|
* certificate into Certificate Manager (ACM). </p>
|
|
1047
1045
|
*/
|
|
@@ -1345,7 +1343,7 @@ export interface ImportCertificateAuthorityCertificateRequest {
|
|
|
1345
1343
|
Certificate: Uint8Array | undefined;
|
|
1346
1344
|
/**
|
|
1347
1345
|
* <p>A PEM-encoded file that contains all of your certificates, other than the certificate
|
|
1348
|
-
* you're importing, chaining up to your root CA. Your
|
|
1346
|
+
* you're importing, chaining up to your root CA. Your ACM Private CA-hosted or on-premises
|
|
1349
1347
|
* root certificate is the last in the chain, and each certificate in the chain signs the
|
|
1350
1348
|
* one preceding. </p>
|
|
1351
1349
|
* <p>This parameter must be supplied when you import a subordinate CA. When you import a
|
|
@@ -1385,7 +1383,7 @@ export declare enum PolicyQualifierId {
|
|
|
1385
1383
|
CPS = "CPS"
|
|
1386
1384
|
}
|
|
1387
1385
|
/**
|
|
1388
|
-
* <p>Defines a <code>PolicyInformation</code> qualifier.
|
|
1386
|
+
* <p>Defines a <code>PolicyInformation</code> qualifier. ACM Private CA supports the <a href="https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.4">certification
|
|
1389
1387
|
* practice statement (CPS) qualifier</a> defined in RFC 5280. </p>
|
|
1390
1388
|
*/
|
|
1391
1389
|
export interface Qualifier {
|
|
@@ -1403,7 +1401,7 @@ export declare namespace Qualifier {
|
|
|
1403
1401
|
}
|
|
1404
1402
|
/**
|
|
1405
1403
|
* <p>Modifies the <code>CertPolicyId</code> of a <code>PolicyInformation</code> object with
|
|
1406
|
-
* a qualifier.
|
|
1404
|
+
* a qualifier. ACM Private CA supports the certification practice statement (CPS)
|
|
1407
1405
|
* qualifier.</p>
|
|
1408
1406
|
*/
|
|
1409
1407
|
export interface PolicyQualifierInfo {
|
|
@@ -1412,7 +1410,7 @@ export interface PolicyQualifierInfo {
|
|
|
1412
1410
|
*/
|
|
1413
1411
|
PolicyQualifierId: PolicyQualifierId | string | undefined;
|
|
1414
1412
|
/**
|
|
1415
|
-
* <p>Defines the qualifier type.
|
|
1413
|
+
* <p>Defines the qualifier type. ACM Private CA supports the use of a URI for a CPS qualifier
|
|
1416
1414
|
* in this field.</p>
|
|
1417
1415
|
*/
|
|
1418
1416
|
Qualifier: Qualifier | undefined;
|
|
@@ -1434,7 +1432,7 @@ export interface PolicyInformation {
|
|
|
1434
1432
|
*/
|
|
1435
1433
|
CertPolicyId: string | undefined;
|
|
1436
1434
|
/**
|
|
1437
|
-
* <p>Modifies the given <code>CertPolicyId</code> with a qualifier.
|
|
1435
|
+
* <p>Modifies the given <code>CertPolicyId</code> with a qualifier. ACM Private CA supports the
|
|
1438
1436
|
* certification practice statement (CPS) qualifier.</p>
|
|
1439
1437
|
*/
|
|
1440
1438
|
PolicyQualifiers?: PolicyQualifierInfo[];
|
|
@@ -1451,7 +1449,8 @@ export declare namespace PolicyInformation {
|
|
|
1451
1449
|
* certificate.</p>
|
|
1452
1450
|
* <p>Extensions present in <code>CustomExtensions</code> follow the
|
|
1453
1451
|
* <code>ApiPassthrough</code>
|
|
1454
|
-
* <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/UsingTemplates.html#template-order-of-operations">template
|
|
1452
|
+
* <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/UsingTemplates.html#template-order-of-operations">template
|
|
1453
|
+
* rules</a>. </p>
|
|
1455
1454
|
*/
|
|
1456
1455
|
export interface CustomExtension {
|
|
1457
1456
|
/**
|
|
@@ -1578,7 +1577,7 @@ export declare namespace Extensions {
|
|
|
1578
1577
|
* <code>APIPassthrough</code> or <code>APICSRPassthrough</code> template variant must
|
|
1579
1578
|
* be selected, or else this parameter is ignored. </p>
|
|
1580
1579
|
* <p>If conflicting or duplicate certificate information is supplied from other sources,
|
|
1581
|
-
*
|
|
1580
|
+
* ACM Private CA applies <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/UsingTemplates.html#template-order-of-operations">order of
|
|
1582
1581
|
* operation rules</a> to determine what information is used.</p>
|
|
1583
1582
|
*/
|
|
1584
1583
|
export interface ApiPassthrough {
|
|
@@ -1614,7 +1613,7 @@ export declare enum ValidityPeriodType {
|
|
|
1614
1613
|
* or expires, or as a span of time after issuance, stated in days, months, or years. For
|
|
1615
1614
|
* more information, see <a href="https://datatracker.ietf.org/doc/html/rfc5280#section-4.1.2.5">Validity</a>
|
|
1616
1615
|
* in RFC 5280.</p>
|
|
1617
|
-
* <p>
|
|
1616
|
+
* <p>ACM Private CA API consumes the <code>Validity</code> data type differently in two
|
|
1618
1617
|
* distinct parameters of the <code>IssueCertificate</code> action. The required parameter
|
|
1619
1618
|
* <code>IssueCertificate</code>:<code>Validity</code> specifies the end of a
|
|
1620
1619
|
* certificate's validity period. The optional parameter
|
|
@@ -1627,7 +1626,7 @@ export interface Validity {
|
|
|
1627
1626
|
*/
|
|
1628
1627
|
Value: number | undefined;
|
|
1629
1628
|
/**
|
|
1630
|
-
* <p>Determines how <i>
|
|
1629
|
+
* <p>Determines how <i>ACM Private CA</i> interprets the <code>Value</code>
|
|
1631
1630
|
* parameter, an integer. Supported validity types include those listed below. Type
|
|
1632
1631
|
* definitions with values include a sample input value and the resulting output. </p>
|
|
1633
1632
|
* <p>
|
|
@@ -1687,7 +1686,7 @@ export interface IssueCertificateRequest {
|
|
|
1687
1686
|
* be selected, or else this parameter is ignored. For more information about using these
|
|
1688
1687
|
* templates, see <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/UsingTemplates.html">Understanding Certificate Templates</a>.</p>
|
|
1689
1688
|
* <p>If conflicting or duplicate certificate information is supplied during certificate
|
|
1690
|
-
* issuance,
|
|
1689
|
+
* issuance, ACM Private CA applies <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/UsingTemplates.html#template-order-of-operations">order of
|
|
1691
1690
|
* operation rules</a> to determine what information is used.</p>
|
|
1692
1691
|
*/
|
|
1693
1692
|
ApiPassthrough?: ApiPassthrough;
|
|
@@ -1732,7 +1731,7 @@ export interface IssueCertificateRequest {
|
|
|
1732
1731
|
SigningAlgorithm: SigningAlgorithm | string | undefined;
|
|
1733
1732
|
/**
|
|
1734
1733
|
* <p>Specifies a custom configuration template to use when issuing a certificate. If this
|
|
1735
|
-
* parameter is not provided,
|
|
1734
|
+
* parameter is not provided, ACM Private CA defaults to the
|
|
1736
1735
|
* <code>EndEntityCertificate/V1</code> template. For CA certificates, you should
|
|
1737
1736
|
* choose the shortest path length that meets your needs. The path length is indicated by
|
|
1738
1737
|
* the PathLen<i>N</i> portion of the ARN, where <i>N</i> is
|
|
@@ -1740,7 +1739,7 @@ export interface IssueCertificateRequest {
|
|
|
1740
1739
|
* depth</a>.</p>
|
|
1741
1740
|
* <p>Note: The CA depth configured on a subordinate CA certificate must not exceed the
|
|
1742
1741
|
* limit set by its parents in the CA hierarchy.</p>
|
|
1743
|
-
* <p>For a list of <code>TemplateArn</code> values supported by
|
|
1742
|
+
* <p>For a list of <code>TemplateArn</code> values supported by ACM Private CA, see <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/UsingTemplates.html">Understanding Certificate
|
|
1744
1743
|
* Templates</a>.</p>
|
|
1745
1744
|
*/
|
|
1746
1745
|
TemplateArn?: string;
|
|
@@ -1763,7 +1762,7 @@ export interface IssueCertificateRequest {
|
|
|
1763
1762
|
/**
|
|
1764
1763
|
* <p>Information describing the start of the validity period of the certificate. This
|
|
1765
1764
|
* parameter sets the “Not Before" date for the certificate.</p>
|
|
1766
|
-
* <p>By default, when issuing a certificate,
|
|
1765
|
+
* <p>By default, when issuing a certificate, ACM Private CA sets the "Not Before" date to the
|
|
1767
1766
|
* issuance time minus 60 minutes. This compensates for clock inconsistencies across
|
|
1768
1767
|
* computer systems. The <code>ValidityNotBefore</code> parameter can be used to customize
|
|
1769
1768
|
* the “Not Before” value. </p>
|
|
@@ -1778,7 +1777,7 @@ export interface IssueCertificateRequest {
|
|
|
1778
1777
|
/**
|
|
1779
1778
|
* <p>Alphanumeric string that can be used to distinguish between calls to the <b>IssueCertificate</b> action. Idempotency tokens for <b>IssueCertificate</b> time out after one minute. Therefore, if you
|
|
1780
1779
|
* call <b>IssueCertificate</b> multiple times with the same
|
|
1781
|
-
* idempotency token within one minute,
|
|
1780
|
+
* idempotency token within one minute, ACM Private CA recognizes that you are requesting only
|
|
1782
1781
|
* one certificate and will issue only one. If you change the idempotency token for each
|
|
1783
1782
|
* call, PCA recognizes that you are requesting multiple certificates.</p>
|
|
1784
1783
|
*/
|
package/package.json
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@aws-sdk/client-acm-pca",
|
|
3
3
|
"description": "AWS SDK for JavaScript Acm Pca Client for Node.js, Browser and React Native",
|
|
4
|
-
"version": "3.
|
|
4
|
+
"version": "3.67.0",
|
|
5
5
|
"scripts": {
|
|
6
6
|
"build": "concurrently 'yarn:build:cjs' 'yarn:build:es' 'yarn:build:types'",
|
|
7
7
|
"build:cjs": "tsc -p tsconfig.cjs.json",
|
|
@@ -18,41 +18,41 @@
|
|
|
18
18
|
"dependencies": {
|
|
19
19
|
"@aws-crypto/sha256-browser": "2.0.0",
|
|
20
20
|
"@aws-crypto/sha256-js": "2.0.0",
|
|
21
|
-
"@aws-sdk/client-sts": "3.
|
|
22
|
-
"@aws-sdk/config-resolver": "3.
|
|
23
|
-
"@aws-sdk/credential-provider-node": "3.
|
|
24
|
-
"@aws-sdk/fetch-http-handler": "3.
|
|
21
|
+
"@aws-sdk/client-sts": "3.67.0",
|
|
22
|
+
"@aws-sdk/config-resolver": "3.58.0",
|
|
23
|
+
"@aws-sdk/credential-provider-node": "3.67.0",
|
|
24
|
+
"@aws-sdk/fetch-http-handler": "3.58.0",
|
|
25
25
|
"@aws-sdk/hash-node": "3.55.0",
|
|
26
26
|
"@aws-sdk/invalid-dependency": "3.55.0",
|
|
27
|
-
"@aws-sdk/middleware-content-length": "3.
|
|
28
|
-
"@aws-sdk/middleware-host-header": "3.
|
|
27
|
+
"@aws-sdk/middleware-content-length": "3.58.0",
|
|
28
|
+
"@aws-sdk/middleware-host-header": "3.58.0",
|
|
29
29
|
"@aws-sdk/middleware-logger": "3.55.0",
|
|
30
|
-
"@aws-sdk/middleware-retry": "3.
|
|
30
|
+
"@aws-sdk/middleware-retry": "3.58.0",
|
|
31
31
|
"@aws-sdk/middleware-serde": "3.55.0",
|
|
32
|
-
"@aws-sdk/middleware-signing": "3.
|
|
32
|
+
"@aws-sdk/middleware-signing": "3.58.0",
|
|
33
33
|
"@aws-sdk/middleware-stack": "3.55.0",
|
|
34
|
-
"@aws-sdk/middleware-user-agent": "3.
|
|
35
|
-
"@aws-sdk/node-config-provider": "3.
|
|
36
|
-
"@aws-sdk/node-http-handler": "3.
|
|
37
|
-
"@aws-sdk/protocol-http": "3.
|
|
34
|
+
"@aws-sdk/middleware-user-agent": "3.58.0",
|
|
35
|
+
"@aws-sdk/node-config-provider": "3.58.0",
|
|
36
|
+
"@aws-sdk/node-http-handler": "3.58.0",
|
|
37
|
+
"@aws-sdk/protocol-http": "3.58.0",
|
|
38
38
|
"@aws-sdk/smithy-client": "3.55.0",
|
|
39
39
|
"@aws-sdk/types": "3.55.0",
|
|
40
40
|
"@aws-sdk/url-parser": "3.55.0",
|
|
41
|
-
"@aws-sdk/util-base64-browser": "3.
|
|
41
|
+
"@aws-sdk/util-base64-browser": "3.58.0",
|
|
42
42
|
"@aws-sdk/util-base64-node": "3.55.0",
|
|
43
43
|
"@aws-sdk/util-body-length-browser": "3.55.0",
|
|
44
44
|
"@aws-sdk/util-body-length-node": "3.55.0",
|
|
45
45
|
"@aws-sdk/util-defaults-mode-browser": "3.55.0",
|
|
46
|
-
"@aws-sdk/util-defaults-mode-node": "3.
|
|
47
|
-
"@aws-sdk/util-user-agent-browser": "3.
|
|
48
|
-
"@aws-sdk/util-user-agent-node": "3.
|
|
46
|
+
"@aws-sdk/util-defaults-mode-node": "3.58.0",
|
|
47
|
+
"@aws-sdk/util-user-agent-browser": "3.58.0",
|
|
48
|
+
"@aws-sdk/util-user-agent-node": "3.58.0",
|
|
49
49
|
"@aws-sdk/util-utf8-browser": "3.55.0",
|
|
50
50
|
"@aws-sdk/util-utf8-node": "3.55.0",
|
|
51
51
|
"@aws-sdk/util-waiter": "3.55.0",
|
|
52
52
|
"tslib": "^2.3.1"
|
|
53
53
|
},
|
|
54
54
|
"devDependencies": {
|
|
55
|
-
"@aws-sdk/service-client-documentation-generator": "3.
|
|
55
|
+
"@aws-sdk/service-client-documentation-generator": "3.58.0",
|
|
56
56
|
"@tsconfig/recommended": "1.0.1",
|
|
57
57
|
"@types/node": "^12.7.5",
|
|
58
58
|
"concurrently": "7.0.0",
|