@aws-sdk/client-acm-pca 3.56.0 → 3.58.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/CHANGELOG.md CHANGED
@@ -3,6 +3,17 @@
3
3
  All notable changes to this project will be documented in this file.
4
4
  See [Conventional Commits](https://conventionalcommits.org) for commit guidelines.
5
5
 
6
+ # [3.58.0](https://github.com/aws/aws-sdk-js-v3/compare/v3.57.0...v3.58.0) (2022-03-28)
7
+
8
+
9
+ ### Features
10
+
11
+ * **client-acm-pca:** Updating service name entities ([8d633e0](https://github.com/aws/aws-sdk-js-v3/commit/8d633e0c37dbe07f8e7d5a9364c5d8814b90b2b9))
12
+
13
+
14
+
15
+
16
+
6
17
  # [3.56.0](https://github.com/aws/aws-sdk-js-v3/compare/v3.55.0...v3.56.0) (2022-03-24)
7
18
 
8
19
  **Note:** Version bump only for package @aws-sdk/client-acm-pca
package/README.md CHANGED
@@ -7,21 +7,21 @@
7
7
 
8
8
  AWS SDK for JavaScript ACMPCA Client for Node.js, Browser and React Native.
9
9
 
10
- <p>This is the <i>Amazon Web Services Private Certificate Authority API Reference</i>. It provides descriptions,
10
+ <p>This is the <i>Certificate Manager Private Certificate Authority (PCA) API Reference</i>. It provides descriptions,
11
11
  syntax, and usage examples for each of the actions and data types involved in creating
12
12
  and managing a private certificate authority (CA) for your organization.</p>
13
13
  <p>The documentation for each action shows the API request parameters and the JSON
14
14
  response. Alternatively, you can use one of the Amazon Web Services SDKs to access an API that is
15
15
  tailored to the programming language or platform that you prefer. For more information,
16
16
  see <a href="https://aws.amazon.com/tools/#SDKs">Amazon Web Services SDKs</a>.</p>
17
- <p>Each Amazon Web Services Private CA API operation has a quota that determines the number of times the
18
- operation can be called per second. Amazon Web Services Private CA throttles API requests at different rates
19
- depending on the operation. Throttling means that Amazon Web Services Private CA rejects an otherwise valid
17
+ <p>Each ACM Private CA API operation has a quota that determines the number of times the
18
+ operation can be called per second. ACM Private CA throttles API requests at different rates
19
+ depending on the operation. Throttling means that ACM Private CA rejects an otherwise valid
20
20
  request because the request exceeds the operation's quota for the number of requests per
21
- second. When a request is throttled, Amazon Web Services Private CA returns a <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/CommonErrors.html">ThrottlingException</a> error. Amazon Web Services Private CA does not guarantee a minimum request
21
+ second. When a request is throttled, ACM Private CA returns a <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/CommonErrors.html">ThrottlingException</a> error. ACM Private CA does not guarantee a minimum request
22
22
  rate for APIs. </p>
23
23
 
24
- <p>To see an up-to-date list of your Amazon Web Services Private CA quotas, or to request a quota increase,
24
+ <p>To see an up-to-date list of your ACM Private CA quotas, or to request a quota increase,
25
25
  log into your Amazon Web Services account and visit the <a href="https://console.aws.amazon.com/servicequotas/">Service Quotas</a>
26
26
  console.</p>
27
27
 
@@ -24,21 +24,21 @@ import { TagCertificateAuthorityCommandInput, TagCertificateAuthorityCommandOutp
24
24
  import { UntagCertificateAuthorityCommandInput, UntagCertificateAuthorityCommandOutput } from "./commands/UntagCertificateAuthorityCommand";
25
25
  import { UpdateCertificateAuthorityCommandInput, UpdateCertificateAuthorityCommandOutput } from "./commands/UpdateCertificateAuthorityCommand";
26
26
  /**
27
- * <p>This is the <i>Amazon Web Services Private Certificate Authority API Reference</i>. It provides descriptions,
27
+ * <p>This is the <i>Certificate Manager Private Certificate Authority (PCA) API Reference</i>. It provides descriptions,
28
28
  * syntax, and usage examples for each of the actions and data types involved in creating
29
29
  * and managing a private certificate authority (CA) for your organization.</p>
30
30
  * <p>The documentation for each action shows the API request parameters and the JSON
31
31
  * response. Alternatively, you can use one of the Amazon Web Services SDKs to access an API that is
32
32
  * tailored to the programming language or platform that you prefer. For more information,
33
33
  * see <a href="https://aws.amazon.com/tools/#SDKs">Amazon Web Services SDKs</a>.</p>
34
- * <p>Each Amazon Web Services Private CA API operation has a quota that determines the number of times the
35
- * operation can be called per second. Amazon Web Services Private CA throttles API requests at different rates
36
- * depending on the operation. Throttling means that Amazon Web Services Private CA rejects an otherwise valid
34
+ * <p>Each ACM Private CA API operation has a quota that determines the number of times the
35
+ * operation can be called per second. ACM Private CA throttles API requests at different rates
36
+ * depending on the operation. Throttling means that ACM Private CA rejects an otherwise valid
37
37
  * request because the request exceeds the operation's quota for the number of requests per
38
- * second. When a request is throttled, Amazon Web Services Private CA returns a <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/CommonErrors.html">ThrottlingException</a> error. Amazon Web Services Private CA does not guarantee a minimum request
38
+ * second. When a request is throttled, ACM Private CA returns a <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/CommonErrors.html">ThrottlingException</a> error. ACM Private CA does not guarantee a minimum request
39
39
  * rate for APIs. </p>
40
40
  *
41
- * <p>To see an up-to-date list of your Amazon Web Services Private CA quotas, or to request a quota increase,
41
+ * <p>To see an up-to-date list of your ACM Private CA quotas, or to request a quota increase,
42
42
  * log into your Amazon Web Services account and visit the <a href="https://console.aws.amazon.com/servicequotas/">Service Quotas</a>
43
43
  * console.</p>
44
44
  */
@@ -55,7 +55,7 @@ export declare class ACMPCA extends ACMPCAClient {
55
55
  * CRL), the Amazon S3 bucket that will contain the CRL, and a CNAME alias for the S3
56
56
  * bucket that is included in certificates issued by the CA. If successful, this action
57
57
  * returns the Amazon Resource Name (ARN) of the CA.</p>
58
- * <p>Amazon Web Services Private CA assets that are stored in Amazon S3 can be protected with encryption.
58
+ * <p>ACM Private CA assets that are stored in Amazon S3 can be protected with encryption.
59
59
  * For more information, see <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/PcaCreateCa.html#crl-encryption">Encrypting Your
60
60
  * CRLs</a>.</p>
61
61
  * <note>
@@ -70,8 +70,8 @@ export declare class ACMPCA extends ACMPCAClient {
70
70
  createCertificateAuthority(args: CreateCertificateAuthorityCommandInput, cb: (err: any, data?: CreateCertificateAuthorityCommandOutput) => void): void;
71
71
  createCertificateAuthority(args: CreateCertificateAuthorityCommandInput, options: __HttpHandlerOptions, cb: (err: any, data?: CreateCertificateAuthorityCommandOutput) => void): void;
72
72
  /**
73
- * <p>Creates an audit report that lists every time that your CA private key is used. The report
74
- * is saved in the Amazon S3 bucket that you specify on input. The <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_IssueCertificate.html">IssueCertificate</a> and <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_RevokeCertificate.html">RevokeCertificate</a> actions use
73
+ * <p>Creates an audit report that lists every time that your CA private key is used. The
74
+ * report is saved in the Amazon S3 bucket that you specify on input. The <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_IssueCertificate.html">IssueCertificate</a> and <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_RevokeCertificate.html">RevokeCertificate</a> actions use
75
75
  * the private key. </p>
76
76
  * <note>
77
77
  * <p>Both PCA and the IAM principal must have permission to write to
@@ -80,7 +80,7 @@ export declare class ACMPCA extends ACMPCAClient {
80
80
  * thrown. For more information, see <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/crl-planning.html#s3-policies">Access
81
81
  * policies for CRLs in Amazon S3</a>.</p>
82
82
  * </note>
83
- * <p>Amazon Web Services Private CA assets that are stored in Amazon S3 can be protected with encryption.
83
+ * <p>ACM Private CA assets that are stored in Amazon S3 can be protected with encryption.
84
84
  * For more information, see <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/PcaAuditReport.html#audit-report-encryption">Encrypting Your Audit
85
85
  * Reports</a>.</p>
86
86
  * <note>
@@ -115,7 +115,7 @@ export declare class ACMPCA extends ACMPCAClient {
115
115
  * the ACM certificate owner must set up a resource-based policy to enable
116
116
  * cross-account issuance and renewals. For more information, see
117
117
  * <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/pca-rbp.html">Using a Resource
118
- * Based Policy with Amazon Web Services Private CA</a>.</p>
118
+ * Based Policy with ACM Private CA</a>.</p>
119
119
  * </li>
120
120
  * </ul>
121
121
  */
@@ -134,7 +134,7 @@ export declare class ACMPCA extends ACMPCAClient {
134
134
  * To do this, call the <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_UpdateCertificateAuthority.html">UpdateCertificateAuthority</a> action and set the <b>CertificateAuthorityStatus</b> parameter to <code>DISABLED</code>. </p>
135
135
  * <p>Additionally, you can delete a CA if you are waiting for it to be created (that is,
136
136
  * the status of the CA is <code>CREATING</code>). You can also delete it if the CA has
137
- * been created but you haven't yet imported the signed certificate into Amazon Web Services Private CA (that
137
+ * been created but you haven't yet imported the signed certificate into ACM Private CA (that
138
138
  * is, the status of the CA is <code>PENDING_CERTIFICATE</code>). </p>
139
139
  * <p>When you successfully call <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_DeleteCertificateAuthority.html">DeleteCertificateAuthority</a>, the CA's status changes to
140
140
  * <code>DELETED</code>. However, the CA won't be permanently deleted until the restoration
@@ -174,7 +174,7 @@ export declare class ACMPCA extends ACMPCAClient {
174
174
  * the ACM certificate owner must set up a resource-based policy to enable
175
175
  * cross-account issuance and renewals. For more information, see
176
176
  * <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/pca-rbp.html">Using a Resource
177
- * Based Policy with Amazon Web Services Private CA</a>.</p>
177
+ * Based Policy with ACM Private CA</a>.</p>
178
178
  * </li>
179
179
  * </ul>
180
180
  */
@@ -197,7 +197,7 @@ export declare class ACMPCA extends ACMPCAClient {
197
197
  * <li>
198
198
  * <p>A policy grants access on a private CA to an Amazon Web Services customer account, to Amazon Web Services Organizations, or to
199
199
  * an Amazon Web Services Organizations unit. Policies are under the control of a CA administrator. For more information,
200
- * see <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/pca-rbp.html">Using a Resource Based Policy with Amazon Web Services Private CA</a>.</p>
200
+ * see <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/pca-rbp.html">Using a Resource Based Policy with ACM Private CA</a>.</p>
201
201
  * </li>
202
202
  * <li>
203
203
  * <p>A policy permits a user of Certificate Manager (ACM) to issue ACM certificates
@@ -207,7 +207,7 @@ export declare class ACMPCA extends ACMPCAClient {
207
207
  * <p>For ACM to manage automatic renewal of these certificates,
208
208
  * the ACM user must configure a Service Linked Role (SLR). The SLR allows
209
209
  * the ACM service to assume the identity of the user, subject to confirmation against the
210
- * Amazon Web Services Private CA policy. For more information, see
210
+ * ACM Private CA policy. For more information, see
211
211
  * <a href="https://docs.aws.amazon.com/acm/latest/userguide/acm-slr.html">Using a
212
212
  * Service Linked Role with ACM</a>.</p>
213
213
  * </li>
@@ -228,13 +228,13 @@ export declare class ACMPCA extends ACMPCAClient {
228
228
  * <ul>
229
229
  * <li>
230
230
  * <p>
231
- * <code>CREATING</code> - Amazon Web Services Private CA is creating your private certificate
231
+ * <code>CREATING</code> - ACM Private CA is creating your private certificate
232
232
  * authority.</p>
233
233
  * </li>
234
234
  * <li>
235
235
  * <p>
236
236
  * <code>PENDING_CERTIFICATE</code> - The certificate is pending. You must use
237
- * your Amazon Web Services Private CA-hosted or on-premises root or subordinate CA to sign your
237
+ * your ACM Private CA-hosted or on-premises root or subordinate CA to sign your
238
238
  * private CA CSR and then import it into PCA. </p>
239
239
  * </li>
240
240
  * <li>
@@ -300,9 +300,9 @@ export declare class ACMPCA extends ACMPCAClient {
300
300
  getCertificateAuthorityCertificate(args: GetCertificateAuthorityCertificateCommandInput, options: __HttpHandlerOptions, cb: (err: any, data?: GetCertificateAuthorityCertificateCommandOutput) => void): void;
301
301
  /**
302
302
  * <p>Retrieves the certificate signing request (CSR) for your private certificate authority
303
- * (CA). The CSR is created when you call the <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_CreateCertificateAuthority.html">CreateCertificateAuthority</a> action. Sign the CSR with your Amazon Web Services Private CA-hosted
303
+ * (CA). The CSR is created when you call the <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_CreateCertificateAuthority.html">CreateCertificateAuthority</a> action. Sign the CSR with your ACM Private CA-hosted
304
304
  * or on-premises root or subordinate CA. Then import the signed certificate back into
305
- * Amazon Web Services Private CA by calling the <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_ImportCertificateAuthorityCertificate.html">ImportCertificateAuthorityCertificate</a> action. The CSR is returned as a
305
+ * ACM Private CA by calling the <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_ImportCertificateAuthorityCertificate.html">ImportCertificateAuthorityCertificate</a> action. The CSR is returned as a
306
306
  * base64 PEM-encoded string. </p>
307
307
  */
308
308
  getCertificateAuthorityCsr(args: GetCertificateAuthorityCsrCommandInput, options?: __HttpHandlerOptions): Promise<GetCertificateAuthorityCsrCommandOutput>;
@@ -320,7 +320,7 @@ export declare class ACMPCA extends ACMPCAClient {
320
320
  * <li>
321
321
  * <p>A policy grants access on a private CA to an Amazon Web Services customer account, to Amazon Web Services Organizations, or to
322
322
  * an Amazon Web Services Organizations unit. Policies are under the control of a CA administrator. For more information,
323
- * see <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/pca-rbp.html">Using a Resource Based Policy with Amazon Web Services Private CA</a>.</p>
323
+ * see <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/pca-rbp.html">Using a Resource Based Policy with ACM Private CA</a>.</p>
324
324
  * </li>
325
325
  * <li>
326
326
  * <p>A policy permits a user of Certificate Manager (ACM) to issue ACM certificates
@@ -330,7 +330,7 @@ export declare class ACMPCA extends ACMPCAClient {
330
330
  * <p>For ACM to manage automatic renewal of these certificates,
331
331
  * the ACM user must configure a Service Linked Role (SLR). The SLR allows
332
332
  * the ACM service to assume the identity of the user, subject to confirmation against the
333
- * Amazon Web Services Private CA policy. For more information, see
333
+ * ACM Private CA policy. For more information, see
334
334
  * <a href="https://docs.aws.amazon.com/acm/latest/userguide/acm-slr.html">Using a
335
335
  * Service Linked Role with ACM</a>.</p>
336
336
  * </li>
@@ -345,12 +345,12 @@ export declare class ACMPCA extends ACMPCAClient {
345
345
  getPolicy(args: GetPolicyCommandInput, cb: (err: any, data?: GetPolicyCommandOutput) => void): void;
346
346
  getPolicy(args: GetPolicyCommandInput, options: __HttpHandlerOptions, cb: (err: any, data?: GetPolicyCommandOutput) => void): void;
347
347
  /**
348
- * <p>Imports a signed private CA certificate into Amazon Web Services Private CA. This action is used when you
349
- * are using a chain of trust whose root is located outside Amazon Web Services Private CA. Before you can call
348
+ * <p>Imports a signed private CA certificate into ACM Private CA. This action is used when you
349
+ * are using a chain of trust whose root is located outside ACM Private CA. Before you can call
350
350
  * this action, the following preparations must in place:</p>
351
351
  * <ol>
352
352
  * <li>
353
- * <p>In Amazon Web Services Private CA, call the <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_CreateCertificateAuthority.html">CreateCertificateAuthority</a> action to create the private CA that you
353
+ * <p>In ACM Private CA, call the <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_CreateCertificateAuthority.html">CreateCertificateAuthority</a> action to create the private CA that you
354
354
  * plan to back with the imported certificate.</p>
355
355
  * </li>
356
356
  * <li>
@@ -366,14 +366,14 @@ export declare class ACMPCA extends ACMPCAClient {
366
366
  * chain to your working directory.</p>
367
367
  * </li>
368
368
  * </ol>
369
- * <p>Amazon Web Services Private CA supports three scenarios for installing a CA certificate:</p>
369
+ * <p>ACM Private CA supports three scenarios for installing a CA certificate:</p>
370
370
  * <ul>
371
371
  * <li>
372
- * <p>Installing a certificate for a root CA hosted by Amazon Web Services Private CA.</p>
372
+ * <p>Installing a certificate for a root CA hosted by ACM Private CA.</p>
373
373
  * </li>
374
374
  * <li>
375
375
  * <p>Installing a subordinate CA certificate whose parent authority is hosted by
376
- * Amazon Web Services Private CA.</p>
376
+ * ACM Private CA.</p>
377
377
  * </li>
378
378
  * <li>
379
379
  * <p>Installing a subordinate CA certificate whose parent authority is externally
@@ -411,7 +411,7 @@ export declare class ACMPCA extends ACMPCAClient {
411
411
  * <p>
412
412
  * <i>Enforcement of Critical Constraints</i>
413
413
  * </p>
414
- * <p>Amazon Web Services Private CA allows the following extensions to be marked critical in the imported CA
414
+ * <p>ACM Private CA allows the following extensions to be marked critical in the imported CA
415
415
  * certificate or chain.</p>
416
416
  * <ul>
417
417
  * <li>
@@ -451,7 +451,7 @@ export declare class ACMPCA extends ACMPCAClient {
451
451
  * <p>Inhibit anyPolicy</p>
452
452
  * </li>
453
453
  * </ul>
454
- * <p>Amazon Web Services Private CA rejects the following extensions when they are marked critical in an
454
+ * <p>ACM Private CA rejects the following extensions when they are marked critical in an
455
455
  * imported CA certificate or chain.</p>
456
456
  * <ul>
457
457
  * <li>
@@ -484,7 +484,7 @@ export declare class ACMPCA extends ACMPCAClient {
484
484
  * specifying the ARN. </p>
485
485
  * <note>
486
486
  * <p>You cannot use the ACM <b>ListCertificateAuthorities</b> action to retrieve the ARNs of the
487
- * certificates that you issue by using Amazon Web Services Private CA.</p>
487
+ * certificates that you issue by using ACM Private CA.</p>
488
488
  * </note>
489
489
  */
490
490
  issueCertificate(args: IssueCertificateCommandInput, options?: __HttpHandlerOptions): Promise<IssueCertificateCommandOutput>;
@@ -522,7 +522,7 @@ export declare class ACMPCA extends ACMPCAClient {
522
522
  * the ACM certificate owner must set up a resource-based policy to enable
523
523
  * cross-account issuance and renewals. For more information, see
524
524
  * <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/pca-rbp.html">Using a Resource
525
- * Based Policy with Amazon Web Services Private CA</a>.</p>
525
+ * Based Policy with ACM Private CA</a>.</p>
526
526
  * </li>
527
527
  * </ul>
528
528
  */
@@ -551,7 +551,7 @@ export declare class ACMPCA extends ACMPCAClient {
551
551
  * <li>
552
552
  * <p>A policy grants access on a private CA to an Amazon Web Services customer account, to Amazon Web Services Organizations, or to
553
553
  * an Amazon Web Services Organizations unit. Policies are under the control of a CA administrator. For more information,
554
- * see <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/pca-rbp.html">Using a Resource Based Policy with Amazon Web Services Private CA</a>.</p>
554
+ * see <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/pca-rbp.html">Using a Resource Based Policy with ACM Private CA</a>.</p>
555
555
  * </li>
556
556
  * <li>
557
557
  * <p>A policy permits a user of Certificate Manager (ACM) to issue ACM certificates
@@ -561,7 +561,7 @@ export declare class ACMPCA extends ACMPCAClient {
561
561
  * <p>For ACM to manage automatic renewal of these certificates,
562
562
  * the ACM user must configure a Service Linked Role (SLR). The SLR allows
563
563
  * the ACM service to assume the identity of the user, subject to confirmation against the
564
- * Amazon Web Services Private CA policy. For more information, see
564
+ * ACM Private CA policy. For more information, see
565
565
  * <a href="https://docs.aws.amazon.com/acm/latest/userguide/acm-slr.html">Using a
566
566
  * Service Linked Role with ACM</a>.</p>
567
567
  * </li>
@@ -592,11 +592,11 @@ export declare class ACMPCA extends ACMPCAClient {
592
592
  restoreCertificateAuthority(args: RestoreCertificateAuthorityCommandInput, cb: (err: any, data?: RestoreCertificateAuthorityCommandOutput) => void): void;
593
593
  restoreCertificateAuthority(args: RestoreCertificateAuthorityCommandInput, options: __HttpHandlerOptions, cb: (err: any, data?: RestoreCertificateAuthorityCommandOutput) => void): void;
594
594
  /**
595
- * <p>Revokes a certificate that was issued inside Amazon Web Services Private CA. If you enable a certificate
595
+ * <p>Revokes a certificate that was issued inside ACM Private CA. If you enable a certificate
596
596
  * revocation list (CRL) when you create or update your private CA, information about the
597
- * revoked certificates will be included in the CRL. Amazon Web Services Private CA writes the CRL to an S3
597
+ * revoked certificates will be included in the CRL. ACM Private CA writes the CRL to an S3
598
598
  * bucket that you specify. A CRL is typically updated approximately 30 minutes after a
599
- * certificate is revoked. If for any reason the CRL update fails, Amazon Web Services Private CA attempts
599
+ * certificate is revoked. If for any reason the CRL update fails, ACM Private CA attempts
600
600
  * makes further attempts every 15 minutes. With Amazon CloudWatch, you can create alarms
601
601
  * for the metrics <code>CRLGenerated</code> and <code>MisconfiguredCRLBucket</code>. For
602
602
  * more information, see <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/PcaCloudWatch.html">Supported CloudWatch Metrics</a>.</p>
@@ -607,7 +607,7 @@ export declare class ACMPCA extends ACMPCAClient {
607
607
  * thrown. For more information, see <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/crl-planning.html#s3-policies">Access
608
608
  * policies for CRLs in Amazon S3</a>.</p>
609
609
  * </note>
610
- * <p>Amazon Web Services Private CA also writes revocation information to the audit report. For more
610
+ * <p>ACM Private CA also writes revocation information to the audit report. For more
611
611
  * information, see <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_CreateCertificateAuthorityAuditReport.html">CreateCertificateAuthorityAuditReport</a>.</p>
612
612
  * <note>
613
613
  * <p>You cannot revoke a root CA self-signed certificate.</p>
@@ -149,21 +149,21 @@ declare type ACMPCAClientResolvedConfigType = __SmithyResolvedConfiguration<__Ht
149
149
  export interface ACMPCAClientResolvedConfig extends ACMPCAClientResolvedConfigType {
150
150
  }
151
151
  /**
152
- * <p>This is the <i>Amazon Web Services Private Certificate Authority API Reference</i>. It provides descriptions,
152
+ * <p>This is the <i>Certificate Manager Private Certificate Authority (PCA) API Reference</i>. It provides descriptions,
153
153
  * syntax, and usage examples for each of the actions and data types involved in creating
154
154
  * and managing a private certificate authority (CA) for your organization.</p>
155
155
  * <p>The documentation for each action shows the API request parameters and the JSON
156
156
  * response. Alternatively, you can use one of the Amazon Web Services SDKs to access an API that is
157
157
  * tailored to the programming language or platform that you prefer. For more information,
158
158
  * see <a href="https://aws.amazon.com/tools/#SDKs">Amazon Web Services SDKs</a>.</p>
159
- * <p>Each Amazon Web Services Private CA API operation has a quota that determines the number of times the
160
- * operation can be called per second. Amazon Web Services Private CA throttles API requests at different rates
161
- * depending on the operation. Throttling means that Amazon Web Services Private CA rejects an otherwise valid
159
+ * <p>Each ACM Private CA API operation has a quota that determines the number of times the
160
+ * operation can be called per second. ACM Private CA throttles API requests at different rates
161
+ * depending on the operation. Throttling means that ACM Private CA rejects an otherwise valid
162
162
  * request because the request exceeds the operation's quota for the number of requests per
163
- * second. When a request is throttled, Amazon Web Services Private CA returns a <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/CommonErrors.html">ThrottlingException</a> error. Amazon Web Services Private CA does not guarantee a minimum request
163
+ * second. When a request is throttled, ACM Private CA returns a <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/CommonErrors.html">ThrottlingException</a> error. ACM Private CA does not guarantee a minimum request
164
164
  * rate for APIs. </p>
165
165
  *
166
- * <p>To see an up-to-date list of your Amazon Web Services Private CA quotas, or to request a quota increase,
166
+ * <p>To see an up-to-date list of your ACM Private CA quotas, or to request a quota increase,
167
167
  * log into your Amazon Web Services account and visit the <a href="https://console.aws.amazon.com/servicequotas/">Service Quotas</a>
168
168
  * console.</p>
169
169
  */
@@ -7,8 +7,8 @@ export interface CreateCertificateAuthorityAuditReportCommandInput extends Creat
7
7
  export interface CreateCertificateAuthorityAuditReportCommandOutput extends CreateCertificateAuthorityAuditReportResponse, __MetadataBearer {
8
8
  }
9
9
  /**
10
- * <p>Creates an audit report that lists every time that your CA private key is used. The report
11
- * is saved in the Amazon S3 bucket that you specify on input. The <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_IssueCertificate.html">IssueCertificate</a> and <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_RevokeCertificate.html">RevokeCertificate</a> actions use
10
+ * <p>Creates an audit report that lists every time that your CA private key is used. The
11
+ * report is saved in the Amazon S3 bucket that you specify on input. The <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_IssueCertificate.html">IssueCertificate</a> and <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_RevokeCertificate.html">RevokeCertificate</a> actions use
12
12
  * the private key. </p>
13
13
  * <note>
14
14
  * <p>Both PCA and the IAM principal must have permission to write to
@@ -17,7 +17,7 @@ export interface CreateCertificateAuthorityAuditReportCommandOutput extends Crea
17
17
  * thrown. For more information, see <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/crl-planning.html#s3-policies">Access
18
18
  * policies for CRLs in Amazon S3</a>.</p>
19
19
  * </note>
20
- * <p>Amazon Web Services Private CA assets that are stored in Amazon S3 can be protected with encryption.
20
+ * <p>ACM Private CA assets that are stored in Amazon S3 can be protected with encryption.
21
21
  * For more information, see <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/PcaAuditReport.html#audit-report-encryption">Encrypting Your Audit
22
22
  * Reports</a>.</p>
23
23
  * <note>
@@ -18,7 +18,7 @@ export interface CreateCertificateAuthorityCommandOutput extends CreateCertifica
18
18
  * CRL), the Amazon S3 bucket that will contain the CRL, and a CNAME alias for the S3
19
19
  * bucket that is included in certificates issued by the CA. If successful, this action
20
20
  * returns the Amazon Resource Name (ARN) of the CA.</p>
21
- * <p>Amazon Web Services Private CA assets that are stored in Amazon S3 can be protected with encryption.
21
+ * <p>ACM Private CA assets that are stored in Amazon S3 can be protected with encryption.
22
22
  * For more information, see <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/PcaCreateCa.html#crl-encryption">Encrypting Your
23
23
  * CRLs</a>.</p>
24
24
  * <note>
@@ -31,7 +31,7 @@ export interface CreatePermissionCommandOutput extends __MetadataBearer {
31
31
  * the ACM certificate owner must set up a resource-based policy to enable
32
32
  * cross-account issuance and renewals. For more information, see
33
33
  * <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/pca-rbp.html">Using a Resource
34
- * Based Policy with Amazon Web Services Private CA</a>.</p>
34
+ * Based Policy with ACM Private CA</a>.</p>
35
35
  * </li>
36
36
  * </ul>
37
37
  * @example
@@ -18,7 +18,7 @@ export interface DeleteCertificateAuthorityCommandOutput extends __MetadataBeare
18
18
  * To do this, call the <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_UpdateCertificateAuthority.html">UpdateCertificateAuthority</a> action and set the <b>CertificateAuthorityStatus</b> parameter to <code>DISABLED</code>. </p>
19
19
  * <p>Additionally, you can delete a CA if you are waiting for it to be created (that is,
20
20
  * the status of the CA is <code>CREATING</code>). You can also delete it if the CA has
21
- * been created but you haven't yet imported the signed certificate into Amazon Web Services Private CA (that
21
+ * been created but you haven't yet imported the signed certificate into ACM Private CA (that
22
22
  * is, the status of the CA is <code>PENDING_CERTIFICATE</code>). </p>
23
23
  * <p>When you successfully call <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_DeleteCertificateAuthority.html">DeleteCertificateAuthority</a>, the CA's status changes to
24
24
  * <code>DELETED</code>. However, the CA won't be permanently deleted until the restoration
@@ -33,7 +33,7 @@ export interface DeletePermissionCommandOutput extends __MetadataBearer {
33
33
  * the ACM certificate owner must set up a resource-based policy to enable
34
34
  * cross-account issuance and renewals. For more information, see
35
35
  * <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/pca-rbp.html">Using a Resource
36
- * Based Policy with Amazon Web Services Private CA</a>.</p>
36
+ * Based Policy with ACM Private CA</a>.</p>
37
37
  * </li>
38
38
  * </ul>
39
39
  * @example
@@ -22,7 +22,7 @@ export interface DeletePolicyCommandOutput extends __MetadataBearer {
22
22
  * <li>
23
23
  * <p>A policy grants access on a private CA to an Amazon Web Services customer account, to Amazon Web Services Organizations, or to
24
24
  * an Amazon Web Services Organizations unit. Policies are under the control of a CA administrator. For more information,
25
- * see <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/pca-rbp.html">Using a Resource Based Policy with Amazon Web Services Private CA</a>.</p>
25
+ * see <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/pca-rbp.html">Using a Resource Based Policy with ACM Private CA</a>.</p>
26
26
  * </li>
27
27
  * <li>
28
28
  * <p>A policy permits a user of Certificate Manager (ACM) to issue ACM certificates
@@ -32,7 +32,7 @@ export interface DeletePolicyCommandOutput extends __MetadataBearer {
32
32
  * <p>For ACM to manage automatic renewal of these certificates,
33
33
  * the ACM user must configure a Service Linked Role (SLR). The SLR allows
34
34
  * the ACM service to assume the identity of the user, subject to confirmation against the
35
- * Amazon Web Services Private CA policy. For more information, see
35
+ * ACM Private CA policy. For more information, see
36
36
  * <a href="https://docs.aws.amazon.com/acm/latest/userguide/acm-slr.html">Using a
37
37
  * Service Linked Role with ACM</a>.</p>
38
38
  * </li>
@@ -13,13 +13,13 @@ export interface DescribeCertificateAuthorityCommandOutput extends DescribeCerti
13
13
  * <ul>
14
14
  * <li>
15
15
  * <p>
16
- * <code>CREATING</code> - Amazon Web Services Private CA is creating your private certificate
16
+ * <code>CREATING</code> - ACM Private CA is creating your private certificate
17
17
  * authority.</p>
18
18
  * </li>
19
19
  * <li>
20
20
  * <p>
21
21
  * <code>PENDING_CERTIFICATE</code> - The certificate is pending. You must use
22
- * your Amazon Web Services Private CA-hosted or on-premises root or subordinate CA to sign your
22
+ * your ACM Private CA-hosted or on-premises root or subordinate CA to sign your
23
23
  * private CA CSR and then import it into PCA. </p>
24
24
  * </li>
25
25
  * <li>
@@ -8,9 +8,9 @@ export interface GetCertificateAuthorityCsrCommandOutput extends GetCertificateA
8
8
  }
9
9
  /**
10
10
  * <p>Retrieves the certificate signing request (CSR) for your private certificate authority
11
- * (CA). The CSR is created when you call the <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_CreateCertificateAuthority.html">CreateCertificateAuthority</a> action. Sign the CSR with your Amazon Web Services Private CA-hosted
11
+ * (CA). The CSR is created when you call the <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_CreateCertificateAuthority.html">CreateCertificateAuthority</a> action. Sign the CSR with your ACM Private CA-hosted
12
12
  * or on-premises root or subordinate CA. Then import the signed certificate back into
13
- * Amazon Web Services Private CA by calling the <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_ImportCertificateAuthorityCertificate.html">ImportCertificateAuthorityCertificate</a> action. The CSR is returned as a
13
+ * ACM Private CA by calling the <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_ImportCertificateAuthorityCertificate.html">ImportCertificateAuthorityCertificate</a> action. The CSR is returned as a
14
14
  * base64 PEM-encoded string. </p>
15
15
  * @example
16
16
  * Use a bare-bones client and the command you need to make an API call.
@@ -18,7 +18,7 @@ export interface GetPolicyCommandOutput extends GetPolicyResponse, __MetadataBea
18
18
  * <li>
19
19
  * <p>A policy grants access on a private CA to an Amazon Web Services customer account, to Amazon Web Services Organizations, or to
20
20
  * an Amazon Web Services Organizations unit. Policies are under the control of a CA administrator. For more information,
21
- * see <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/pca-rbp.html">Using a Resource Based Policy with Amazon Web Services Private CA</a>.</p>
21
+ * see <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/pca-rbp.html">Using a Resource Based Policy with ACM Private CA</a>.</p>
22
22
  * </li>
23
23
  * <li>
24
24
  * <p>A policy permits a user of Certificate Manager (ACM) to issue ACM certificates
@@ -28,7 +28,7 @@ export interface GetPolicyCommandOutput extends GetPolicyResponse, __MetadataBea
28
28
  * <p>For ACM to manage automatic renewal of these certificates,
29
29
  * the ACM user must configure a Service Linked Role (SLR). The SLR allows
30
30
  * the ACM service to assume the identity of the user, subject to confirmation against the
31
- * Amazon Web Services Private CA policy. For more information, see
31
+ * ACM Private CA policy. For more information, see
32
32
  * <a href="https://docs.aws.amazon.com/acm/latest/userguide/acm-slr.html">Using a
33
33
  * Service Linked Role with ACM</a>.</p>
34
34
  * </li>
@@ -7,12 +7,12 @@ export interface ImportCertificateAuthorityCertificateCommandInput extends Impor
7
7
  export interface ImportCertificateAuthorityCertificateCommandOutput extends __MetadataBearer {
8
8
  }
9
9
  /**
10
- * <p>Imports a signed private CA certificate into Amazon Web Services Private CA. This action is used when you
11
- * are using a chain of trust whose root is located outside Amazon Web Services Private CA. Before you can call
10
+ * <p>Imports a signed private CA certificate into ACM Private CA. This action is used when you
11
+ * are using a chain of trust whose root is located outside ACM Private CA. Before you can call
12
12
  * this action, the following preparations must in place:</p>
13
13
  * <ol>
14
14
  * <li>
15
- * <p>In Amazon Web Services Private CA, call the <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_CreateCertificateAuthority.html">CreateCertificateAuthority</a> action to create the private CA that you
15
+ * <p>In ACM Private CA, call the <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_CreateCertificateAuthority.html">CreateCertificateAuthority</a> action to create the private CA that you
16
16
  * plan to back with the imported certificate.</p>
17
17
  * </li>
18
18
  * <li>
@@ -28,14 +28,14 @@ export interface ImportCertificateAuthorityCertificateCommandOutput extends __Me
28
28
  * chain to your working directory.</p>
29
29
  * </li>
30
30
  * </ol>
31
- * <p>Amazon Web Services Private CA supports three scenarios for installing a CA certificate:</p>
31
+ * <p>ACM Private CA supports three scenarios for installing a CA certificate:</p>
32
32
  * <ul>
33
33
  * <li>
34
- * <p>Installing a certificate for a root CA hosted by Amazon Web Services Private CA.</p>
34
+ * <p>Installing a certificate for a root CA hosted by ACM Private CA.</p>
35
35
  * </li>
36
36
  * <li>
37
37
  * <p>Installing a subordinate CA certificate whose parent authority is hosted by
38
- * Amazon Web Services Private CA.</p>
38
+ * ACM Private CA.</p>
39
39
  * </li>
40
40
  * <li>
41
41
  * <p>Installing a subordinate CA certificate whose parent authority is externally
@@ -73,7 +73,7 @@ export interface ImportCertificateAuthorityCertificateCommandOutput extends __Me
73
73
  * <p>
74
74
  * <i>Enforcement of Critical Constraints</i>
75
75
  * </p>
76
- * <p>Amazon Web Services Private CA allows the following extensions to be marked critical in the imported CA
76
+ * <p>ACM Private CA allows the following extensions to be marked critical in the imported CA
77
77
  * certificate or chain.</p>
78
78
  * <ul>
79
79
  * <li>
@@ -113,7 +113,7 @@ export interface ImportCertificateAuthorityCertificateCommandOutput extends __Me
113
113
  * <p>Inhibit anyPolicy</p>
114
114
  * </li>
115
115
  * </ul>
116
- * <p>Amazon Web Services Private CA rejects the following extensions when they are marked critical in an
116
+ * <p>ACM Private CA rejects the following extensions when they are marked critical in an
117
117
  * imported CA certificate or chain.</p>
118
118
  * <ul>
119
119
  * <li>
@@ -13,7 +13,7 @@ export interface IssueCertificateCommandOutput extends IssueCertificateResponse,
13
13
  * specifying the ARN. </p>
14
14
  * <note>
15
15
  * <p>You cannot use the ACM <b>ListCertificateAuthorities</b> action to retrieve the ARNs of the
16
- * certificates that you issue by using Amazon Web Services Private CA.</p>
16
+ * certificates that you issue by using ACM Private CA.</p>
17
17
  * </note>
18
18
  * @example
19
19
  * Use a bare-bones client and the command you need to make an API call.
@@ -32,7 +32,7 @@ export interface ListPermissionsCommandOutput extends ListPermissionsResponse, _
32
32
  * the ACM certificate owner must set up a resource-based policy to enable
33
33
  * cross-account issuance and renewals. For more information, see
34
34
  * <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/pca-rbp.html">Using a Resource
35
- * Based Policy with Amazon Web Services Private CA</a>.</p>
35
+ * Based Policy with ACM Private CA</a>.</p>
36
36
  * </li>
37
37
  * </ul>
38
38
  * @example
@@ -19,7 +19,7 @@ export interface PutPolicyCommandOutput extends __MetadataBearer {
19
19
  * <li>
20
20
  * <p>A policy grants access on a private CA to an Amazon Web Services customer account, to Amazon Web Services Organizations, or to
21
21
  * an Amazon Web Services Organizations unit. Policies are under the control of a CA administrator. For more information,
22
- * see <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/pca-rbp.html">Using a Resource Based Policy with Amazon Web Services Private CA</a>.</p>
22
+ * see <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/pca-rbp.html">Using a Resource Based Policy with ACM Private CA</a>.</p>
23
23
  * </li>
24
24
  * <li>
25
25
  * <p>A policy permits a user of Certificate Manager (ACM) to issue ACM certificates
@@ -29,7 +29,7 @@ export interface PutPolicyCommandOutput extends __MetadataBearer {
29
29
  * <p>For ACM to manage automatic renewal of these certificates,
30
30
  * the ACM user must configure a Service Linked Role (SLR). The SLR allows
31
31
  * the ACM service to assume the identity of the user, subject to confirmation against the
32
- * Amazon Web Services Private CA policy. For more information, see
32
+ * ACM Private CA policy. For more information, see
33
33
  * <a href="https://docs.aws.amazon.com/acm/latest/userguide/acm-slr.html">Using a
34
34
  * Service Linked Role with ACM</a>.</p>
35
35
  * </li>
@@ -7,11 +7,11 @@ export interface RevokeCertificateCommandInput extends RevokeCertificateRequest
7
7
  export interface RevokeCertificateCommandOutput extends __MetadataBearer {
8
8
  }
9
9
  /**
10
- * <p>Revokes a certificate that was issued inside Amazon Web Services Private CA. If you enable a certificate
10
+ * <p>Revokes a certificate that was issued inside ACM Private CA. If you enable a certificate
11
11
  * revocation list (CRL) when you create or update your private CA, information about the
12
- * revoked certificates will be included in the CRL. Amazon Web Services Private CA writes the CRL to an S3
12
+ * revoked certificates will be included in the CRL. ACM Private CA writes the CRL to an S3
13
13
  * bucket that you specify. A CRL is typically updated approximately 30 minutes after a
14
- * certificate is revoked. If for any reason the CRL update fails, Amazon Web Services Private CA attempts
14
+ * certificate is revoked. If for any reason the CRL update fails, ACM Private CA attempts
15
15
  * makes further attempts every 15 minutes. With Amazon CloudWatch, you can create alarms
16
16
  * for the metrics <code>CRLGenerated</code> and <code>MisconfiguredCRLBucket</code>. For
17
17
  * more information, see <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/PcaCloudWatch.html">Supported CloudWatch Metrics</a>.</p>
@@ -22,7 +22,7 @@ export interface RevokeCertificateCommandOutput extends __MetadataBearer {
22
22
  * thrown. For more information, see <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/crl-planning.html#s3-policies">Access
23
23
  * policies for CRLs in Amazon S3</a>.</p>
24
24
  * </note>
25
- * <p>Amazon Web Services Private CA also writes revocation information to the audit report. For more
25
+ * <p>ACM Private CA also writes revocation information to the audit report. For more
26
26
  * information, see <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_CreateCertificateAuthorityAuditReport.html">CreateCertificateAuthorityAuditReport</a>.</p>
27
27
  * <note>
28
28
  * <p>You cannot revoke a root CA self-signed certificate.</p>
@@ -409,19 +409,17 @@ export declare enum S3ObjectAcl {
409
409
  * specifying a value for the <b>CustomCname</b> parameter. Your
410
410
  * private CA copies the CNAME or the S3 bucket name to the <b>CRL
411
411
  * Distribution Points</b> extension of each certificate it issues. Your S3
412
- * bucket policy must give write permission to Amazon Web Services Private CA. </p>
413
- * <p>Amazon Web Services Private CA assets that are stored in Amazon S3 can be protected with encryption.
412
+ * bucket policy must give write permission to ACM Private CA. </p>
413
+ * <p>ACM Private CA assets that are stored in Amazon S3 can be protected with encryption.
414
414
  * For more information, see <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/PcaCreateCa.html#crl-encryption">Encrypting Your
415
415
  * CRLs</a>.</p>
416
- * <p>Your private CA uses the value in the <b>ExpirationInDays</b>
417
- * parameter to calculate the <b>nextUpdate</b> field in the CRL.
418
- * The CRL is refreshed prior to a certificate's expiration date or when a certificate is
419
- * revoked. When a certificate is revoked, it appears in the CRL until the certificate
420
- * expires, and then in one additional CRL after expiration, and it always appears in the
421
- * audit report.</p>
416
+ * <p>Your private CA uses the value in the <b>ExpirationInDays</b> parameter to calculate the <b>nextUpdate</b> field in the CRL. The CRL is refreshed prior to a
417
+ * certificate's expiration date or when a certificate is revoked. When a certificate is
418
+ * revoked, it appears in the CRL until the certificate expires, and then in one additional
419
+ * CRL after expiration, and it always appears in the audit report.</p>
422
420
  *
423
421
  * <p>A CRL is typically updated approximately 30 minutes after a certificate
424
- * is revoked. If for any reason a CRL update fails, Amazon Web Services Private CA makes further attempts
422
+ * is revoked. If for any reason a CRL update fails, ACM Private CA makes further attempts
425
423
  * every 15 minutes.</p>
426
424
  *
427
425
  * <p>CRLs contain the following fields:</p>
@@ -509,14 +507,14 @@ export declare enum S3ObjectAcl {
509
507
  * CRL.</p>
510
508
  * </li>
511
509
  * </ul>
512
- * <p>Certificate revocation lists created by Amazon Web Services Private CA are DER-encoded. You can use the
510
+ * <p>Certificate revocation lists created by ACM Private CA are DER-encoded. You can use the
513
511
  * following OpenSSL command to list a CRL.</p>
514
512
  * <p>
515
513
  * <code>openssl crl -inform DER -text -in <i>crl_path</i>
516
514
  * -noout</code>
517
515
  * </p>
518
516
  * <p>For more information, see <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/crl-planning.html">Planning a certificate revocation list
519
- * (CRL)</a> in the <i>Amazon Web Services Private Certificate Authority User Guide</i>
517
+ * (CRL)</a> in the <i>Certificate Manager Private Certificate Authority (PCA) User Guide</i>
520
518
  * </p>
521
519
  */
522
520
  export interface CrlConfiguration {
@@ -543,7 +541,7 @@ export interface CrlConfiguration {
543
541
  * <b>CustomCname</b> argument, the name of your S3 bucket
544
542
  * is placed into the <b>CRL Distribution Points</b> extension of
545
543
  * the issued certificate. You can change the name of your bucket by calling the <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_UpdateCertificateAuthority.html">UpdateCertificateAuthority</a> operation. You must specify a <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/PcaCreateCa.html#s3-policies">bucket
546
- * policy</a> that allows Amazon Web Services Private CA to write the CRL to your bucket.</p>
544
+ * policy</a> that allows ACM Private CA to write the CRL to your bucket.</p>
547
545
  */
548
546
  S3BucketName?: string;
549
547
  /**
@@ -584,13 +582,13 @@ export interface OcspConfiguration {
584
582
  */
585
583
  Enabled: boolean | undefined;
586
584
  /**
587
- * <p>By default, Amazon Web Services Private CA injects an Amazon Web Services domain into certificates being validated by
585
+ * <p>By default, ACM Private CA injects an Amazon Web Services domain into certificates being validated by
588
586
  * the Online Certificate Status Protocol (OCSP). A customer can alternatively use this
589
587
  * object to define a CNAME specifying a customized OCSP domain.</p>
590
588
  * <p>Note: The value of the CNAME must not include a protocol prefix such as "http://" or
591
589
  * "https://".</p>
592
590
  * <p>For more information, see <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/ocsp-customize.html">Customizing Online Certificate Status Protocol
593
- * (OCSP) </a> in the <i>Amazon Web Services Private Certificate Authority User Guide</i>.</p>
591
+ * (OCSP) </a> in the <i>Certificate Manager Private Certificate Authority (PCA) User Guide</i>.</p>
594
592
  */
595
593
  OcspCustomCname?: string;
596
594
  }
@@ -606,14 +604,14 @@ export declare namespace OcspConfiguration {
606
604
  * certificate revocation list (CRL). OCSP returns validation information about
607
605
  * certificates as requested by clients, and a CRL contains an updated list of certificates
608
606
  * revoked by your CA. For more information, see <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_RevokeCertificate.html">RevokeCertificate</a> and <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/revocation-setup.html">Setting up a
609
- * certificate revocation method</a> in the <i>Amazon Web Services Private Certificate Authority User
607
+ * certificate revocation method</a> in the <i>Certificate Manager Private Certificate Authority (PCA) User
610
608
  * Guide</i>.</p>
611
609
  */
612
610
  export interface RevocationConfiguration {
613
611
  /**
614
612
  * <p>Configuration of the certificate revocation list (CRL), if any, maintained by your
615
613
  * private CA. A CRL is typically updated approximately 30 minutes after a certificate
616
- * is revoked. If for any reason a CRL update fails, Amazon Web Services Private CA makes further attempts
614
+ * is revoked. If for any reason a CRL update fails, ACM Private CA makes further attempts
617
615
  * every 15 minutes.</p>
618
616
  */
619
617
  CrlConfiguration?: CrlConfiguration;
@@ -673,7 +671,7 @@ export interface CreateCertificateAuthorityRequest {
673
671
  * <p>Custom string that can be used to distinguish between calls to the <b>CreateCertificateAuthority</b> action. Idempotency tokens for
674
672
  * <b>CreateCertificateAuthority</b> time out after five
675
673
  * minutes. Therefore, if you call <b>CreateCertificateAuthority</b> multiple times with the same idempotency
676
- * token within five minutes, Amazon Web Services Private CA recognizes that you are requesting only
674
+ * token within five minutes, ACM Private CA recognizes that you are requesting only
677
675
  * certificate authority and will issue only one. If you change the idempotency token for
678
676
  * each call, PCA recognizes that you are requesting multiple certificate
679
677
  * authorities.</p>
@@ -757,7 +755,7 @@ export declare class InvalidTagException extends __BaseException {
757
755
  constructor(opts: __ExceptionOptionType<InvalidTagException, __BaseException>);
758
756
  }
759
757
  /**
760
- * <p>An Amazon Web Services Private CA quota has been exceeded. See the exception message returned to determine
758
+ * <p>An ACM Private CA quota has been exceeded. See the exception message returned to determine
761
759
  * the quota that was exceeded.</p>
762
760
  */
763
761
  export declare class LimitExceededException extends __BaseException {
@@ -1041,7 +1039,7 @@ export declare enum CertificateAuthorityStatus {
1041
1039
  * controls the public key contained in the <b>Subject Public Key
1042
1040
  * Info</b> field. Call the <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_CreateCertificateAuthority.html">CreateCertificateAuthority</a> action to create your private CA. You must then
1043
1041
  * call the <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_GetCertificateAuthorityCertificate.html">GetCertificateAuthorityCertificate</a> action to retrieve a private CA
1044
- * certificate signing request (CSR). Sign the CSR with your Amazon Web Services Private CA-hosted or
1042
+ * certificate signing request (CSR). Sign the CSR with your ACM Private CA-hosted or
1045
1043
  * on-premises root or subordinate CA certificate. Call the <a href="https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_ImportCertificateAuthorityCertificate.html">ImportCertificateAuthorityCertificate</a> action to import the signed
1046
1044
  * certificate into Certificate Manager (ACM). </p>
1047
1045
  */
@@ -1345,7 +1343,7 @@ export interface ImportCertificateAuthorityCertificateRequest {
1345
1343
  Certificate: Uint8Array | undefined;
1346
1344
  /**
1347
1345
  * <p>A PEM-encoded file that contains all of your certificates, other than the certificate
1348
- * you're importing, chaining up to your root CA. Your Amazon Web Services Private CA-hosted or on-premises
1346
+ * you're importing, chaining up to your root CA. Your ACM Private CA-hosted or on-premises
1349
1347
  * root certificate is the last in the chain, and each certificate in the chain signs the
1350
1348
  * one preceding. </p>
1351
1349
  * <p>This parameter must be supplied when you import a subordinate CA. When you import a
@@ -1385,7 +1383,7 @@ export declare enum PolicyQualifierId {
1385
1383
  CPS = "CPS"
1386
1384
  }
1387
1385
  /**
1388
- * <p>Defines a <code>PolicyInformation</code> qualifier. Amazon Web Services Private CA supports the <a href="https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.4">certification
1386
+ * <p>Defines a <code>PolicyInformation</code> qualifier. ACM Private CA supports the <a href="https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.4">certification
1389
1387
  * practice statement (CPS) qualifier</a> defined in RFC 5280. </p>
1390
1388
  */
1391
1389
  export interface Qualifier {
@@ -1403,7 +1401,7 @@ export declare namespace Qualifier {
1403
1401
  }
1404
1402
  /**
1405
1403
  * <p>Modifies the <code>CertPolicyId</code> of a <code>PolicyInformation</code> object with
1406
- * a qualifier. Amazon Web Services Private CA supports the certification practice statement (CPS)
1404
+ * a qualifier. ACM Private CA supports the certification practice statement (CPS)
1407
1405
  * qualifier.</p>
1408
1406
  */
1409
1407
  export interface PolicyQualifierInfo {
@@ -1412,7 +1410,7 @@ export interface PolicyQualifierInfo {
1412
1410
  */
1413
1411
  PolicyQualifierId: PolicyQualifierId | string | undefined;
1414
1412
  /**
1415
- * <p>Defines the qualifier type. Amazon Web Services Private CA supports the use of a URI for a CPS qualifier
1413
+ * <p>Defines the qualifier type. ACM Private CA supports the use of a URI for a CPS qualifier
1416
1414
  * in this field.</p>
1417
1415
  */
1418
1416
  Qualifier: Qualifier | undefined;
@@ -1434,7 +1432,7 @@ export interface PolicyInformation {
1434
1432
  */
1435
1433
  CertPolicyId: string | undefined;
1436
1434
  /**
1437
- * <p>Modifies the given <code>CertPolicyId</code> with a qualifier. Amazon Web Services Private CA supports the
1435
+ * <p>Modifies the given <code>CertPolicyId</code> with a qualifier. ACM Private CA supports the
1438
1436
  * certification practice statement (CPS) qualifier.</p>
1439
1437
  */
1440
1438
  PolicyQualifiers?: PolicyQualifierInfo[];
@@ -1451,7 +1449,8 @@ export declare namespace PolicyInformation {
1451
1449
  * certificate.</p>
1452
1450
  * <p>Extensions present in <code>CustomExtensions</code> follow the
1453
1451
  * <code>ApiPassthrough</code>
1454
- * <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/UsingTemplates.html#template-order-of-operations">template rules</a>. </p>
1452
+ * <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/UsingTemplates.html#template-order-of-operations">template
1453
+ * rules</a>. </p>
1455
1454
  */
1456
1455
  export interface CustomExtension {
1457
1456
  /**
@@ -1578,7 +1577,7 @@ export declare namespace Extensions {
1578
1577
  * <code>APIPassthrough</code> or <code>APICSRPassthrough</code> template variant must
1579
1578
  * be selected, or else this parameter is ignored. </p>
1580
1579
  * <p>If conflicting or duplicate certificate information is supplied from other sources,
1581
- * Amazon Web Services Private CA applies <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/UsingTemplates.html#template-order-of-operations">order of
1580
+ * ACM Private CA applies <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/UsingTemplates.html#template-order-of-operations">order of
1582
1581
  * operation rules</a> to determine what information is used.</p>
1583
1582
  */
1584
1583
  export interface ApiPassthrough {
@@ -1614,7 +1613,7 @@ export declare enum ValidityPeriodType {
1614
1613
  * or expires, or as a span of time after issuance, stated in days, months, or years. For
1615
1614
  * more information, see <a href="https://datatracker.ietf.org/doc/html/rfc5280#section-4.1.2.5">Validity</a>
1616
1615
  * in RFC 5280.</p>
1617
- * <p>Amazon Web Services Private CA API consumes the <code>Validity</code> data type differently in two
1616
+ * <p>ACM Private CA API consumes the <code>Validity</code> data type differently in two
1618
1617
  * distinct parameters of the <code>IssueCertificate</code> action. The required parameter
1619
1618
  * <code>IssueCertificate</code>:<code>Validity</code> specifies the end of a
1620
1619
  * certificate's validity period. The optional parameter
@@ -1627,7 +1626,7 @@ export interface Validity {
1627
1626
  */
1628
1627
  Value: number | undefined;
1629
1628
  /**
1630
- * <p>Determines how <i>Amazon Web Services Private CA</i> interprets the <code>Value</code>
1629
+ * <p>Determines how <i>ACM Private CA</i> interprets the <code>Value</code>
1631
1630
  * parameter, an integer. Supported validity types include those listed below. Type
1632
1631
  * definitions with values include a sample input value and the resulting output. </p>
1633
1632
  * <p>
@@ -1687,7 +1686,7 @@ export interface IssueCertificateRequest {
1687
1686
  * be selected, or else this parameter is ignored. For more information about using these
1688
1687
  * templates, see <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/UsingTemplates.html">Understanding Certificate Templates</a>.</p>
1689
1688
  * <p>If conflicting or duplicate certificate information is supplied during certificate
1690
- * issuance, Amazon Web Services Private CA applies <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/UsingTemplates.html#template-order-of-operations">order of
1689
+ * issuance, ACM Private CA applies <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/UsingTemplates.html#template-order-of-operations">order of
1691
1690
  * operation rules</a> to determine what information is used.</p>
1692
1691
  */
1693
1692
  ApiPassthrough?: ApiPassthrough;
@@ -1732,7 +1731,7 @@ export interface IssueCertificateRequest {
1732
1731
  SigningAlgorithm: SigningAlgorithm | string | undefined;
1733
1732
  /**
1734
1733
  * <p>Specifies a custom configuration template to use when issuing a certificate. If this
1735
- * parameter is not provided, Amazon Web Services Private CA defaults to the
1734
+ * parameter is not provided, ACM Private CA defaults to the
1736
1735
  * <code>EndEntityCertificate/V1</code> template. For CA certificates, you should
1737
1736
  * choose the shortest path length that meets your needs. The path length is indicated by
1738
1737
  * the PathLen<i>N</i> portion of the ARN, where <i>N</i> is
@@ -1740,7 +1739,7 @@ export interface IssueCertificateRequest {
1740
1739
  * depth</a>.</p>
1741
1740
  * <p>Note: The CA depth configured on a subordinate CA certificate must not exceed the
1742
1741
  * limit set by its parents in the CA hierarchy.</p>
1743
- * <p>For a list of <code>TemplateArn</code> values supported by Amazon Web Services Private CA, see <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/UsingTemplates.html">Understanding Certificate
1742
+ * <p>For a list of <code>TemplateArn</code> values supported by ACM Private CA, see <a href="https://docs.aws.amazon.com/acm-pca/latest/userguide/UsingTemplates.html">Understanding Certificate
1744
1743
  * Templates</a>.</p>
1745
1744
  */
1746
1745
  TemplateArn?: string;
@@ -1763,7 +1762,7 @@ export interface IssueCertificateRequest {
1763
1762
  /**
1764
1763
  * <p>Information describing the start of the validity period of the certificate. This
1765
1764
  * parameter sets the “Not Before" date for the certificate.</p>
1766
- * <p>By default, when issuing a certificate, Amazon Web Services Private CA sets the "Not Before" date to the
1765
+ * <p>By default, when issuing a certificate, ACM Private CA sets the "Not Before" date to the
1767
1766
  * issuance time minus 60 minutes. This compensates for clock inconsistencies across
1768
1767
  * computer systems. The <code>ValidityNotBefore</code> parameter can be used to customize
1769
1768
  * the “Not Before” value. </p>
@@ -1778,7 +1777,7 @@ export interface IssueCertificateRequest {
1778
1777
  /**
1779
1778
  * <p>Alphanumeric string that can be used to distinguish between calls to the <b>IssueCertificate</b> action. Idempotency tokens for <b>IssueCertificate</b> time out after one minute. Therefore, if you
1780
1779
  * call <b>IssueCertificate</b> multiple times with the same
1781
- * idempotency token within one minute, Amazon Web Services Private CA recognizes that you are requesting only
1780
+ * idempotency token within one minute, ACM Private CA recognizes that you are requesting only
1782
1781
  * one certificate and will issue only one. If you change the idempotency token for each
1783
1782
  * call, PCA recognizes that you are requesting multiple certificates.</p>
1784
1783
  */
package/package.json CHANGED
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "name": "@aws-sdk/client-acm-pca",
3
3
  "description": "AWS SDK for JavaScript Acm Pca Client for Node.js, Browser and React Native",
4
- "version": "3.56.0",
4
+ "version": "3.58.0",
5
5
  "scripts": {
6
6
  "build": "concurrently 'yarn:build:cjs' 'yarn:build:es' 'yarn:build:types'",
7
7
  "build:cjs": "tsc -p tsconfig.cjs.json",
@@ -18,41 +18,41 @@
18
18
  "dependencies": {
19
19
  "@aws-crypto/sha256-browser": "2.0.0",
20
20
  "@aws-crypto/sha256-js": "2.0.0",
21
- "@aws-sdk/client-sts": "3.56.0",
22
- "@aws-sdk/config-resolver": "3.56.0",
23
- "@aws-sdk/credential-provider-node": "3.56.0",
24
- "@aws-sdk/fetch-http-handler": "3.55.0",
21
+ "@aws-sdk/client-sts": "3.58.0",
22
+ "@aws-sdk/config-resolver": "3.58.0",
23
+ "@aws-sdk/credential-provider-node": "3.58.0",
24
+ "@aws-sdk/fetch-http-handler": "3.58.0",
25
25
  "@aws-sdk/hash-node": "3.55.0",
26
26
  "@aws-sdk/invalid-dependency": "3.55.0",
27
- "@aws-sdk/middleware-content-length": "3.55.0",
28
- "@aws-sdk/middleware-host-header": "3.55.0",
27
+ "@aws-sdk/middleware-content-length": "3.58.0",
28
+ "@aws-sdk/middleware-host-header": "3.58.0",
29
29
  "@aws-sdk/middleware-logger": "3.55.0",
30
- "@aws-sdk/middleware-retry": "3.56.0",
30
+ "@aws-sdk/middleware-retry": "3.58.0",
31
31
  "@aws-sdk/middleware-serde": "3.55.0",
32
- "@aws-sdk/middleware-signing": "3.56.0",
32
+ "@aws-sdk/middleware-signing": "3.58.0",
33
33
  "@aws-sdk/middleware-stack": "3.55.0",
34
- "@aws-sdk/middleware-user-agent": "3.55.0",
35
- "@aws-sdk/node-config-provider": "3.56.0",
36
- "@aws-sdk/node-http-handler": "3.55.0",
37
- "@aws-sdk/protocol-http": "3.55.0",
34
+ "@aws-sdk/middleware-user-agent": "3.58.0",
35
+ "@aws-sdk/node-config-provider": "3.58.0",
36
+ "@aws-sdk/node-http-handler": "3.58.0",
37
+ "@aws-sdk/protocol-http": "3.58.0",
38
38
  "@aws-sdk/smithy-client": "3.55.0",
39
39
  "@aws-sdk/types": "3.55.0",
40
40
  "@aws-sdk/url-parser": "3.55.0",
41
- "@aws-sdk/util-base64-browser": "3.55.0",
41
+ "@aws-sdk/util-base64-browser": "3.58.0",
42
42
  "@aws-sdk/util-base64-node": "3.55.0",
43
43
  "@aws-sdk/util-body-length-browser": "3.55.0",
44
44
  "@aws-sdk/util-body-length-node": "3.55.0",
45
45
  "@aws-sdk/util-defaults-mode-browser": "3.55.0",
46
- "@aws-sdk/util-defaults-mode-node": "3.56.0",
47
- "@aws-sdk/util-user-agent-browser": "3.55.0",
48
- "@aws-sdk/util-user-agent-node": "3.56.0",
46
+ "@aws-sdk/util-defaults-mode-node": "3.58.0",
47
+ "@aws-sdk/util-user-agent-browser": "3.58.0",
48
+ "@aws-sdk/util-user-agent-node": "3.58.0",
49
49
  "@aws-sdk/util-utf8-browser": "3.55.0",
50
50
  "@aws-sdk/util-utf8-node": "3.55.0",
51
51
  "@aws-sdk/util-waiter": "3.55.0",
52
52
  "tslib": "^2.3.1"
53
53
  },
54
54
  "devDependencies": {
55
- "@aws-sdk/service-client-documentation-generator": "3.55.0",
55
+ "@aws-sdk/service-client-documentation-generator": "3.58.0",
56
56
  "@tsconfig/recommended": "1.0.1",
57
57
  "@types/node": "^12.7.5",
58
58
  "concurrently": "7.0.0",