aws-sdk 2.1654.0 → 2.1655.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +1 -1
- package/apis/acm-2015-12-08.min.json +4 -1
- package/apis/ecr-2015-09-21.min.json +4 -1
- package/apis/payment-cryptography-data-2022-02-03.min.json +200 -81
- package/apis/qbusiness-2023-11-27.min.json +72 -54
- package/clients/acm.d.ts +8 -8
- package/clients/paymentcryptographydata.d.ts +86 -81
- package/clients/qbusiness.d.ts +19 -0
- package/dist/aws-sdk-core-react-native.js +1 -1
- package/dist/aws-sdk-react-native.js +5 -5
- package/dist/aws-sdk.js +11 -5
- package/dist/aws-sdk.min.js +9 -9
- package/lib/core.js +1 -1
- package/package.json +1 -1
@@ -326,6 +326,9 @@
|
|
326
326
|
},
|
327
327
|
"qAppsConfiguration": {
|
328
328
|
"shape": "S38"
|
329
|
+
},
|
330
|
+
"personalizationConfiguration": {
|
331
|
+
"shape": "S3a"
|
329
332
|
}
|
330
333
|
}
|
331
334
|
},
|
@@ -362,10 +365,10 @@
|
|
362
365
|
},
|
363
366
|
"displayName": {},
|
364
367
|
"configuration": {
|
365
|
-
"shape": "
|
368
|
+
"shape": "S3g"
|
366
369
|
},
|
367
370
|
"vpcConfiguration": {
|
368
|
-
"shape": "
|
371
|
+
"shape": "S3h"
|
369
372
|
},
|
370
373
|
"description": {},
|
371
374
|
"tags": {
|
@@ -413,7 +416,7 @@
|
|
413
416
|
"shape": "S32"
|
414
417
|
},
|
415
418
|
"capacityConfiguration": {
|
416
|
-
"shape": "
|
419
|
+
"shape": "S3s"
|
417
420
|
},
|
418
421
|
"clientToken": {
|
419
422
|
"idempotencyToken": true
|
@@ -449,11 +452,11 @@
|
|
449
452
|
"displayName": {},
|
450
453
|
"type": {},
|
451
454
|
"authConfiguration": {
|
452
|
-
"shape": "
|
455
|
+
"shape": "S3y"
|
453
456
|
},
|
454
457
|
"serverUrl": {},
|
455
458
|
"customPluginConfiguration": {
|
456
|
-
"shape": "
|
459
|
+
"shape": "S43"
|
457
460
|
},
|
458
461
|
"tags": {
|
459
462
|
"shape": "S32"
|
@@ -494,7 +497,7 @@
|
|
494
497
|
"type": {},
|
495
498
|
"displayName": {},
|
496
499
|
"configuration": {
|
497
|
-
"shape": "
|
500
|
+
"shape": "S4e"
|
498
501
|
},
|
499
502
|
"roleArn": {},
|
500
503
|
"clientToken": {
|
@@ -533,7 +536,7 @@
|
|
533
536
|
"userAliases": {
|
534
537
|
"type": "list",
|
535
538
|
"member": {
|
536
|
-
"shape": "
|
539
|
+
"shape": "S4y"
|
537
540
|
}
|
538
541
|
},
|
539
542
|
"clientToken": {
|
@@ -929,6 +932,9 @@
|
|
929
932
|
},
|
930
933
|
"qAppsConfiguration": {
|
931
934
|
"shape": "S38"
|
935
|
+
},
|
936
|
+
"personalizationConfiguration": {
|
937
|
+
"shape": "S3a"
|
932
938
|
}
|
933
939
|
}
|
934
940
|
}
|
@@ -968,13 +974,13 @@
|
|
968
974
|
"type": "structure",
|
969
975
|
"members": {
|
970
976
|
"blockedPhrases": {
|
971
|
-
"shape": "
|
977
|
+
"shape": "S63"
|
972
978
|
},
|
973
979
|
"systemMessageOverride": {}
|
974
980
|
}
|
975
981
|
},
|
976
982
|
"topicConfigurations": {
|
977
|
-
"shape": "
|
983
|
+
"shape": "S66"
|
978
984
|
},
|
979
985
|
"creatorModeConfiguration": {
|
980
986
|
"type": "structure",
|
@@ -1027,10 +1033,10 @@
|
|
1027
1033
|
"displayName": {},
|
1028
1034
|
"type": {},
|
1029
1035
|
"configuration": {
|
1030
|
-
"shape": "
|
1036
|
+
"shape": "S3g"
|
1031
1037
|
},
|
1032
1038
|
"vpcConfiguration": {
|
1033
|
-
"shape": "
|
1039
|
+
"shape": "S3h"
|
1034
1040
|
},
|
1035
1041
|
"createdAt": {
|
1036
1042
|
"type": "timestamp"
|
@@ -1087,12 +1093,12 @@
|
|
1087
1093
|
"type": "structure",
|
1088
1094
|
"members": {
|
1089
1095
|
"status": {
|
1090
|
-
"shape": "
|
1096
|
+
"shape": "S6t"
|
1091
1097
|
},
|
1092
1098
|
"statusHistory": {
|
1093
1099
|
"type": "list",
|
1094
1100
|
"member": {
|
1095
|
-
"shape": "
|
1101
|
+
"shape": "S6t"
|
1096
1102
|
}
|
1097
1103
|
}
|
1098
1104
|
}
|
@@ -1138,10 +1144,10 @@
|
|
1138
1144
|
"type": "timestamp"
|
1139
1145
|
},
|
1140
1146
|
"capacityConfiguration": {
|
1141
|
-
"shape": "
|
1147
|
+
"shape": "S3s"
|
1142
1148
|
},
|
1143
1149
|
"documentAttributeConfigurations": {
|
1144
|
-
"shape": "
|
1150
|
+
"shape": "S6z"
|
1145
1151
|
},
|
1146
1152
|
"error": {
|
1147
1153
|
"shape": "Sb"
|
@@ -1197,10 +1203,10 @@
|
|
1197
1203
|
"type": {},
|
1198
1204
|
"serverUrl": {},
|
1199
1205
|
"authConfiguration": {
|
1200
|
-
"shape": "
|
1206
|
+
"shape": "S3y"
|
1201
1207
|
},
|
1202
1208
|
"customPluginConfiguration": {
|
1203
|
-
"shape": "
|
1209
|
+
"shape": "S43"
|
1204
1210
|
},
|
1205
1211
|
"buildStatus": {},
|
1206
1212
|
"pluginArn": {},
|
@@ -1247,7 +1253,7 @@
|
|
1247
1253
|
"status": {},
|
1248
1254
|
"displayName": {},
|
1249
1255
|
"configuration": {
|
1250
|
-
"shape": "
|
1256
|
+
"shape": "S4e"
|
1251
1257
|
},
|
1252
1258
|
"roleArn": {},
|
1253
1259
|
"createdAt": {
|
@@ -1286,7 +1292,7 @@
|
|
1286
1292
|
"type": "structure",
|
1287
1293
|
"members": {
|
1288
1294
|
"userAliases": {
|
1289
|
-
"shape": "
|
1295
|
+
"shape": "S7g"
|
1290
1296
|
}
|
1291
1297
|
}
|
1292
1298
|
}
|
@@ -1334,7 +1340,7 @@
|
|
1334
1340
|
"samplePromptsControlMode": {},
|
1335
1341
|
"roleArn": {},
|
1336
1342
|
"authenticationConfiguration": {
|
1337
|
-
"shape": "
|
1343
|
+
"shape": "S7k",
|
1338
1344
|
"deprecated": true,
|
1339
1345
|
"deprecatedMessage": "Property associated with legacy SAML IdP flow. Deprecated in favor of using AWS IAM Identity Center for user management."
|
1340
1346
|
},
|
@@ -2270,6 +2276,9 @@
|
|
2270
2276
|
},
|
2271
2277
|
"qAppsConfiguration": {
|
2272
2278
|
"shape": "S38"
|
2279
|
+
},
|
2280
|
+
"personalizationConfiguration": {
|
2281
|
+
"shape": "S3a"
|
2273
2282
|
}
|
2274
2283
|
}
|
2275
2284
|
},
|
@@ -2303,19 +2312,19 @@
|
|
2303
2312
|
"type": "structure",
|
2304
2313
|
"members": {
|
2305
2314
|
"blockedPhrasesToCreateOrUpdate": {
|
2306
|
-
"shape": "
|
2315
|
+
"shape": "S63"
|
2307
2316
|
},
|
2308
2317
|
"blockedPhrasesToDelete": {
|
2309
|
-
"shape": "
|
2318
|
+
"shape": "S63"
|
2310
2319
|
},
|
2311
2320
|
"systemMessageOverride": {}
|
2312
2321
|
}
|
2313
2322
|
},
|
2314
2323
|
"topicConfigurationsToCreateOrUpdate": {
|
2315
|
-
"shape": "
|
2324
|
+
"shape": "S66"
|
2316
2325
|
},
|
2317
2326
|
"topicConfigurationsToDelete": {
|
2318
|
-
"shape": "
|
2327
|
+
"shape": "S66"
|
2319
2328
|
},
|
2320
2329
|
"creatorModeConfiguration": {
|
2321
2330
|
"type": "structure",
|
@@ -2362,10 +2371,10 @@
|
|
2362
2371
|
},
|
2363
2372
|
"displayName": {},
|
2364
2373
|
"configuration": {
|
2365
|
-
"shape": "
|
2374
|
+
"shape": "S3g"
|
2366
2375
|
},
|
2367
2376
|
"vpcConfiguration": {
|
2368
|
-
"shape": "
|
2377
|
+
"shape": "S3h"
|
2369
2378
|
},
|
2370
2379
|
"description": {},
|
2371
2380
|
"syncSchedule": {},
|
@@ -2405,10 +2414,10 @@
|
|
2405
2414
|
"displayName": {},
|
2406
2415
|
"description": {},
|
2407
2416
|
"capacityConfiguration": {
|
2408
|
-
"shape": "
|
2417
|
+
"shape": "S3s"
|
2409
2418
|
},
|
2410
2419
|
"documentAttributeConfigurations": {
|
2411
|
-
"shape": "
|
2420
|
+
"shape": "S6z"
|
2412
2421
|
}
|
2413
2422
|
}
|
2414
2423
|
},
|
@@ -2443,10 +2452,10 @@
|
|
2443
2452
|
"state": {},
|
2444
2453
|
"serverUrl": {},
|
2445
2454
|
"customPluginConfiguration": {
|
2446
|
-
"shape": "
|
2455
|
+
"shape": "S43"
|
2447
2456
|
},
|
2448
2457
|
"authConfiguration": {
|
2449
|
-
"shape": "
|
2458
|
+
"shape": "S3y"
|
2450
2459
|
}
|
2451
2460
|
}
|
2452
2461
|
},
|
@@ -2478,7 +2487,7 @@
|
|
2478
2487
|
"locationName": "retrieverId"
|
2479
2488
|
},
|
2480
2489
|
"configuration": {
|
2481
|
-
"shape": "
|
2490
|
+
"shape": "S4e"
|
2482
2491
|
},
|
2483
2492
|
"displayName": {},
|
2484
2493
|
"roleArn": {}
|
@@ -2512,10 +2521,10 @@
|
|
2512
2521
|
"locationName": "userId"
|
2513
2522
|
},
|
2514
2523
|
"userAliasesToUpdate": {
|
2515
|
-
"shape": "
|
2524
|
+
"shape": "S7g"
|
2516
2525
|
},
|
2517
2526
|
"userAliasesToDelete": {
|
2518
|
-
"shape": "
|
2527
|
+
"shape": "S7g"
|
2519
2528
|
}
|
2520
2529
|
}
|
2521
2530
|
},
|
@@ -2523,13 +2532,13 @@
|
|
2523
2532
|
"type": "structure",
|
2524
2533
|
"members": {
|
2525
2534
|
"userAliasesAdded": {
|
2526
|
-
"shape": "
|
2535
|
+
"shape": "S7g"
|
2527
2536
|
},
|
2528
2537
|
"userAliasesUpdated": {
|
2529
|
-
"shape": "
|
2538
|
+
"shape": "S7g"
|
2530
2539
|
},
|
2531
2540
|
"userAliasesDeleted": {
|
2532
|
-
"shape": "
|
2541
|
+
"shape": "S7g"
|
2533
2542
|
}
|
2534
2543
|
}
|
2535
2544
|
},
|
@@ -2558,7 +2567,7 @@
|
|
2558
2567
|
},
|
2559
2568
|
"roleArn": {},
|
2560
2569
|
"authenticationConfiguration": {
|
2561
|
-
"shape": "
|
2570
|
+
"shape": "S7k",
|
2562
2571
|
"deprecated": true,
|
2563
2572
|
"deprecatedMessage": "Property associated with legacy SAML IdP flow. Deprecated in favor of using AWS IAM Identity Center for user management."
|
2564
2573
|
},
|
@@ -2910,12 +2919,21 @@
|
|
2910
2919
|
"qAppsControlMode": {}
|
2911
2920
|
}
|
2912
2921
|
},
|
2913
|
-
"
|
2922
|
+
"S3a": {
|
2923
|
+
"type": "structure",
|
2924
|
+
"required": [
|
2925
|
+
"personalizationControlMode"
|
2926
|
+
],
|
2927
|
+
"members": {
|
2928
|
+
"personalizationControlMode": {}
|
2929
|
+
}
|
2930
|
+
},
|
2931
|
+
"S3g": {
|
2914
2932
|
"type": "structure",
|
2915
2933
|
"members": {},
|
2916
2934
|
"document": true
|
2917
2935
|
},
|
2918
|
-
"
|
2936
|
+
"S3h": {
|
2919
2937
|
"type": "structure",
|
2920
2938
|
"required": [
|
2921
2939
|
"subnetIds",
|
@@ -2932,7 +2950,7 @@
|
|
2932
2950
|
}
|
2933
2951
|
}
|
2934
2952
|
},
|
2935
|
-
"
|
2953
|
+
"S3s": {
|
2936
2954
|
"type": "structure",
|
2937
2955
|
"members": {
|
2938
2956
|
"units": {
|
@@ -2940,7 +2958,7 @@
|
|
2940
2958
|
}
|
2941
2959
|
}
|
2942
2960
|
},
|
2943
|
-
"
|
2961
|
+
"S3y": {
|
2944
2962
|
"type": "structure",
|
2945
2963
|
"members": {
|
2946
2964
|
"basicAuthConfiguration": {
|
@@ -2972,7 +2990,7 @@
|
|
2972
2990
|
},
|
2973
2991
|
"union": true
|
2974
2992
|
},
|
2975
|
-
"
|
2993
|
+
"S43": {
|
2976
2994
|
"type": "structure",
|
2977
2995
|
"required": [
|
2978
2996
|
"description",
|
@@ -2997,7 +3015,7 @@
|
|
2997
3015
|
}
|
2998
3016
|
}
|
2999
3017
|
},
|
3000
|
-
"
|
3018
|
+
"S4e": {
|
3001
3019
|
"type": "structure",
|
3002
3020
|
"members": {
|
3003
3021
|
"nativeIndexConfiguration": {
|
@@ -3076,7 +3094,7 @@
|
|
3076
3094
|
},
|
3077
3095
|
"union": true
|
3078
3096
|
},
|
3079
|
-
"
|
3097
|
+
"S4y": {
|
3080
3098
|
"type": "structure",
|
3081
3099
|
"required": [
|
3082
3100
|
"userId"
|
@@ -3087,11 +3105,11 @@
|
|
3087
3105
|
"userId": {}
|
3088
3106
|
}
|
3089
3107
|
},
|
3090
|
-
"
|
3108
|
+
"S63": {
|
3091
3109
|
"type": "list",
|
3092
3110
|
"member": {}
|
3093
3111
|
},
|
3094
|
-
"
|
3112
|
+
"S66": {
|
3095
3113
|
"type": "list",
|
3096
3114
|
"member": {
|
3097
3115
|
"type": "structure",
|
@@ -3115,10 +3133,10 @@
|
|
3115
3133
|
],
|
3116
3134
|
"members": {
|
3117
3135
|
"includedUsersAndGroups": {
|
3118
|
-
"shape": "
|
3136
|
+
"shape": "S6e"
|
3119
3137
|
},
|
3120
3138
|
"excludedUsersAndGroups": {
|
3121
|
-
"shape": "
|
3139
|
+
"shape": "S6e"
|
3122
3140
|
},
|
3123
3141
|
"ruleType": {},
|
3124
3142
|
"ruleConfiguration": {
|
@@ -3154,7 +3172,7 @@
|
|
3154
3172
|
}
|
3155
3173
|
}
|
3156
3174
|
},
|
3157
|
-
"
|
3175
|
+
"S6e": {
|
3158
3176
|
"type": "structure",
|
3159
3177
|
"members": {
|
3160
3178
|
"userIds": {
|
@@ -3166,7 +3184,7 @@
|
|
3166
3184
|
}
|
3167
3185
|
}
|
3168
3186
|
},
|
3169
|
-
"
|
3187
|
+
"S6t": {
|
3170
3188
|
"type": "structure",
|
3171
3189
|
"members": {
|
3172
3190
|
"status": {},
|
@@ -3178,7 +3196,7 @@
|
|
3178
3196
|
}
|
3179
3197
|
}
|
3180
3198
|
},
|
3181
|
-
"
|
3199
|
+
"S6z": {
|
3182
3200
|
"type": "list",
|
3183
3201
|
"member": {
|
3184
3202
|
"type": "structure",
|
@@ -3189,13 +3207,13 @@
|
|
3189
3207
|
}
|
3190
3208
|
}
|
3191
3209
|
},
|
3192
|
-
"
|
3210
|
+
"S7g": {
|
3193
3211
|
"type": "list",
|
3194
3212
|
"member": {
|
3195
|
-
"shape": "
|
3213
|
+
"shape": "S4y"
|
3196
3214
|
}
|
3197
3215
|
},
|
3198
|
-
"
|
3216
|
+
"S7k": {
|
3199
3217
|
"type": "structure",
|
3200
3218
|
"members": {
|
3201
3219
|
"samlConfiguration": {
|
package/clients/acm.d.ts
CHANGED
@@ -49,27 +49,27 @@ declare class ACM extends Service {
|
|
49
49
|
*/
|
50
50
|
getAccountConfiguration(callback?: (err: AWSError, data: ACM.Types.GetAccountConfigurationResponse) => void): Request<ACM.Types.GetAccountConfigurationResponse, AWSError>;
|
51
51
|
/**
|
52
|
-
* Retrieves
|
52
|
+
* Retrieves a certificate and its certificate chain. The certificate may be either a public or private certificate issued using the ACM RequestCertificate action, or a certificate imported into ACM using the ImportCertificate action. The chain consists of the certificate of the issuing CA and the intermediate certificates of any other subordinate CAs. All of the certificates are base64 encoded. You can use OpenSSL to decode the certificates and inspect individual fields.
|
53
53
|
*/
|
54
54
|
getCertificate(params: ACM.Types.GetCertificateRequest, callback?: (err: AWSError, data: ACM.Types.GetCertificateResponse) => void): Request<ACM.Types.GetCertificateResponse, AWSError>;
|
55
55
|
/**
|
56
|
-
* Retrieves
|
56
|
+
* Retrieves a certificate and its certificate chain. The certificate may be either a public or private certificate issued using the ACM RequestCertificate action, or a certificate imported into ACM using the ImportCertificate action. The chain consists of the certificate of the issuing CA and the intermediate certificates of any other subordinate CAs. All of the certificates are base64 encoded. You can use OpenSSL to decode the certificates and inspect individual fields.
|
57
57
|
*/
|
58
58
|
getCertificate(callback?: (err: AWSError, data: ACM.Types.GetCertificateResponse) => void): Request<ACM.Types.GetCertificateResponse, AWSError>;
|
59
59
|
/**
|
60
|
-
* Imports a certificate into Certificate Manager (ACM) to use with services that are integrated with ACM. Note that integrated services allow only certificate types and keys they support to be associated with their resources. Further, their support differs depending on whether the certificate is imported into IAM or into ACM. For more information, see the documentation for each service. For more information about importing certificates into ACM, see Importing Certificates in the Certificate Manager User Guide. ACM does not provide managed renewal for certificates that you import. Note the following guidelines when importing third party certificates: You must enter the private key that matches the certificate you are importing. The private key must be unencrypted. You cannot import a private key that is protected by a password or a passphrase. The private key must be no larger than 5 KB (5,120 bytes).
|
60
|
+
* Imports a certificate into Certificate Manager (ACM) to use with services that are integrated with ACM. Note that integrated services allow only certificate types and keys they support to be associated with their resources. Further, their support differs depending on whether the certificate is imported into IAM or into ACM. For more information, see the documentation for each service. For more information about importing certificates into ACM, see Importing Certificates in the Certificate Manager User Guide. ACM does not provide managed renewal for certificates that you import. Note the following guidelines when importing third party certificates: You must enter the private key that matches the certificate you are importing. The private key must be unencrypted. You cannot import a private key that is protected by a password or a passphrase. The private key must be no larger than 5 KB (5,120 bytes). The certificate, private key, and certificate chain must be PEM-encoded. The current time must be between the Not Before and Not After certificate fields. The Issuer field must not be empty. The OCSP authority URL, if present, must not exceed 1000 characters. To import a new certificate, omit the CertificateArn argument. Include this argument only when you want to replace a previously imported certificate. When you import a certificate by using the CLI, you must specify the certificate, the certificate chain, and the private key by their file names preceded by fileb://. For example, you can specify a certificate saved in the C:\temp folder as fileb://C:\temp\certificate_to_import.pem. If you are making an HTTP or HTTPS Query request, include these arguments as BLOBs. When you import a certificate by using an SDK, you must specify the certificate, the certificate chain, and the private key files in the manner required by the programming language you're using. The cryptographic algorithm of an imported certificate must match the algorithm of the signing CA. For example, if the signing CA key type is RSA, then the certificate key type must also be RSA. This operation returns the Amazon Resource Name (ARN) of the imported certificate.
|
61
61
|
*/
|
62
62
|
importCertificate(params: ACM.Types.ImportCertificateRequest, callback?: (err: AWSError, data: ACM.Types.ImportCertificateResponse) => void): Request<ACM.Types.ImportCertificateResponse, AWSError>;
|
63
63
|
/**
|
64
|
-
* Imports a certificate into Certificate Manager (ACM) to use with services that are integrated with ACM. Note that integrated services allow only certificate types and keys they support to be associated with their resources. Further, their support differs depending on whether the certificate is imported into IAM or into ACM. For more information, see the documentation for each service. For more information about importing certificates into ACM, see Importing Certificates in the Certificate Manager User Guide. ACM does not provide managed renewal for certificates that you import. Note the following guidelines when importing third party certificates: You must enter the private key that matches the certificate you are importing. The private key must be unencrypted. You cannot import a private key that is protected by a password or a passphrase. The private key must be no larger than 5 KB (5,120 bytes).
|
64
|
+
* Imports a certificate into Certificate Manager (ACM) to use with services that are integrated with ACM. Note that integrated services allow only certificate types and keys they support to be associated with their resources. Further, their support differs depending on whether the certificate is imported into IAM or into ACM. For more information, see the documentation for each service. For more information about importing certificates into ACM, see Importing Certificates in the Certificate Manager User Guide. ACM does not provide managed renewal for certificates that you import. Note the following guidelines when importing third party certificates: You must enter the private key that matches the certificate you are importing. The private key must be unencrypted. You cannot import a private key that is protected by a password or a passphrase. The private key must be no larger than 5 KB (5,120 bytes). The certificate, private key, and certificate chain must be PEM-encoded. The current time must be between the Not Before and Not After certificate fields. The Issuer field must not be empty. The OCSP authority URL, if present, must not exceed 1000 characters. To import a new certificate, omit the CertificateArn argument. Include this argument only when you want to replace a previously imported certificate. When you import a certificate by using the CLI, you must specify the certificate, the certificate chain, and the private key by their file names preceded by fileb://. For example, you can specify a certificate saved in the C:\temp folder as fileb://C:\temp\certificate_to_import.pem. If you are making an HTTP or HTTPS Query request, include these arguments as BLOBs. When you import a certificate by using an SDK, you must specify the certificate, the certificate chain, and the private key files in the manner required by the programming language you're using. The cryptographic algorithm of an imported certificate must match the algorithm of the signing CA. For example, if the signing CA key type is RSA, then the certificate key type must also be RSA. This operation returns the Amazon Resource Name (ARN) of the imported certificate.
|
65
65
|
*/
|
66
66
|
importCertificate(callback?: (err: AWSError, data: ACM.Types.ImportCertificateResponse) => void): Request<ACM.Types.ImportCertificateResponse, AWSError>;
|
67
67
|
/**
|
68
|
-
* Retrieves a list of certificate ARNs and domain names.
|
68
|
+
* Retrieves a list of certificate ARNs and domain names. By default, the API returns RSA_2048 certificates. To return all certificates in the account, include the keyType filter with the values [RSA_1024, RSA_2048, RSA_3072, RSA_4096, EC_prime256v1, EC_secp384r1, EC_secp521r1]. In addition to keyType, you can also filter by the CertificateStatuses, keyUsage, and extendedKeyUsage attributes on the certificate. For more information, see Filters.
|
69
69
|
*/
|
70
70
|
listCertificates(params: ACM.Types.ListCertificatesRequest, callback?: (err: AWSError, data: ACM.Types.ListCertificatesResponse) => void): Request<ACM.Types.ListCertificatesResponse, AWSError>;
|
71
71
|
/**
|
72
|
-
* Retrieves a list of certificate ARNs and domain names.
|
72
|
+
* Retrieves a list of certificate ARNs and domain names. By default, the API returns RSA_2048 certificates. To return all certificates in the account, include the keyType filter with the values [RSA_1024, RSA_2048, RSA_3072, RSA_4096, EC_prime256v1, EC_secp384r1, EC_secp521r1]. In addition to keyType, you can also filter by the CertificateStatuses, keyUsage, and extendedKeyUsage attributes on the certificate. For more information, see Filters.
|
73
73
|
*/
|
74
74
|
listCertificates(callback?: (err: AWSError, data: ACM.Types.ListCertificatesResponse) => void): Request<ACM.Types.ListCertificatesResponse, AWSError>;
|
75
75
|
/**
|
@@ -379,7 +379,7 @@ declare namespace ACM {
|
|
379
379
|
*/
|
380
380
|
ValidationDomain?: DomainNameString;
|
381
381
|
/**
|
382
|
-
* The validation status of the domain name. This can be one of the following values: PENDING_VALIDATION SUCCESS
|
382
|
+
* The validation status of the domain name. This can be one of the following values: PENDING_VALIDATION SUCCESS FAILED
|
383
383
|
*/
|
384
384
|
ValidationStatus?: DomainStatus;
|
385
385
|
/**
|
@@ -663,7 +663,7 @@ declare namespace ACM {
|
|
663
663
|
*/
|
664
664
|
Tags?: TagList;
|
665
665
|
/**
|
666
|
-
* Specifies the algorithm of the public and private key pair that your certificate uses to encrypt data. RSA is the default key algorithm for ACM certificates. Elliptic Curve Digital Signature Algorithm (ECDSA) keys are smaller, offering security comparable to RSA keys but with greater computing efficiency. However, ECDSA is not supported by all network clients. Some
|
666
|
+
* Specifies the algorithm of the public and private key pair that your certificate uses to encrypt data. RSA is the default key algorithm for ACM certificates. Elliptic Curve Digital Signature Algorithm (ECDSA) keys are smaller, offering security comparable to RSA keys but with greater computing efficiency. However, ECDSA is not supported by all network clients. Some Amazon Web Services services may require RSA keys, or only support ECDSA keys of a particular size, while others allow the use of either RSA and ECDSA keys to ensure that compatibility is not broken. Check the requirements for the Amazon Web Services service where you plan to deploy your certificate. For more information about selecting an algorithm, see Key algorithms. Algorithms supported for an ACM certificate request include: RSA_2048 EC_prime256v1 EC_secp384r1 Other listed algorithms are for imported certificates only. When you request a private PKI certificate signed by a CA from Amazon Web Services Private CA, the specified signing algorithm family (RSA or ECDSA) must match the algorithm family of the CA's secret key. Default: RSA_2048
|
667
667
|
*/
|
668
668
|
KeyAlgorithm?: KeyAlgorithm;
|
669
669
|
}
|