aws-sdk 2.1658.0 → 2.1660.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -283,6 +283,7 @@
283
283
  "enhancedVpcRouting": {
284
284
  "type": "boolean"
285
285
  },
286
+ "ipAddressType": {},
286
287
  "maxCapacity": {
287
288
  "type": "integer"
288
289
  },
@@ -294,7 +295,7 @@
294
295
  "type": "boolean"
295
296
  },
296
297
  "securityGroupIds": {
297
- "shape": "S22"
298
+ "shape": "S23"
298
299
  },
299
300
  "subnetIds": {
300
301
  "shape": "Sn"
@@ -309,7 +310,7 @@
309
310
  "type": "structure",
310
311
  "members": {
311
312
  "workgroup": {
312
- "shape": "S25"
313
+ "shape": "S26"
313
314
  }
314
315
  }
315
316
  },
@@ -494,7 +495,7 @@
494
495
  ],
495
496
  "members": {
496
497
  "workgroup": {
497
- "shape": "S25"
498
+ "shape": "S26"
498
499
  }
499
500
  }
500
501
  },
@@ -609,7 +610,7 @@
609
610
  "type": "structure",
610
611
  "members": {
611
612
  "recoveryPoint": {
612
- "shape": "S33"
613
+ "shape": "S34"
613
614
  }
614
615
  }
615
616
  }
@@ -628,7 +629,7 @@
628
629
  "type": "structure",
629
630
  "members": {
630
631
  "resourcePolicy": {
631
- "shape": "S36"
632
+ "shape": "S37"
632
633
  }
633
634
  }
634
635
  }
@@ -684,7 +685,7 @@
684
685
  "type": "structure",
685
686
  "members": {
686
687
  "tableRestoreStatus": {
687
- "shape": "S3d"
688
+ "shape": "S3e"
688
689
  }
689
690
  }
690
691
  }
@@ -725,7 +726,7 @@
725
726
  ],
726
727
  "members": {
727
728
  "workgroup": {
728
- "shape": "S25"
729
+ "shape": "S26"
729
730
  }
730
731
  }
731
732
  }
@@ -843,7 +844,7 @@
843
844
  "recoveryPoints": {
844
845
  "type": "list",
845
846
  "member": {
846
- "shape": "S33"
847
+ "shape": "S34"
847
848
  }
848
849
  }
849
850
  }
@@ -955,7 +956,7 @@
955
956
  "tableRestoreStatuses": {
956
957
  "type": "list",
957
958
  "member": {
958
- "shape": "S3d"
959
+ "shape": "S3e"
959
960
  }
960
961
  }
961
962
  }
@@ -1026,7 +1027,7 @@
1026
1027
  "workgroups": {
1027
1028
  "type": "list",
1028
1029
  "member": {
1029
- "shape": "S25"
1030
+ "shape": "S26"
1030
1031
  }
1031
1032
  }
1032
1033
  }
@@ -1048,7 +1049,7 @@
1048
1049
  "type": "structure",
1049
1050
  "members": {
1050
1051
  "resourcePolicy": {
1051
- "shape": "S36"
1052
+ "shape": "S37"
1052
1053
  }
1053
1054
  }
1054
1055
  }
@@ -1138,7 +1139,7 @@
1138
1139
  "type": "structure",
1139
1140
  "members": {
1140
1141
  "tableRestoreStatus": {
1141
- "shape": "S3d"
1142
+ "shape": "S3e"
1142
1143
  }
1143
1144
  }
1144
1145
  }
@@ -1173,7 +1174,7 @@
1173
1174
  "type": "structure",
1174
1175
  "members": {
1175
1176
  "tableRestoreStatus": {
1176
- "shape": "S3d"
1177
+ "shape": "S3e"
1177
1178
  }
1178
1179
  }
1179
1180
  }
@@ -1428,6 +1429,7 @@
1428
1429
  "enhancedVpcRouting": {
1429
1430
  "type": "boolean"
1430
1431
  },
1432
+ "ipAddressType": {},
1431
1433
  "maxCapacity": {
1432
1434
  "type": "integer"
1433
1435
  },
@@ -1438,7 +1440,7 @@
1438
1440
  "type": "boolean"
1439
1441
  },
1440
1442
  "securityGroupIds": {
1441
- "shape": "S22"
1443
+ "shape": "S23"
1442
1444
  },
1443
1445
  "subnetIds": {
1444
1446
  "shape": "Sn"
@@ -1453,7 +1455,7 @@
1453
1455
  ],
1454
1456
  "members": {
1455
1457
  "workgroup": {
1456
- "shape": "S25"
1458
+ "shape": "S26"
1457
1459
  }
1458
1460
  }
1459
1461
  }
@@ -1582,6 +1584,7 @@
1582
1584
  "type": "structure",
1583
1585
  "members": {
1584
1586
  "availabilityZone": {},
1587
+ "ipv6Address": {},
1585
1588
  "networkInterfaceId": {},
1586
1589
  "privateIpAddress": {},
1587
1590
  "subnetId": {}
@@ -1733,11 +1736,11 @@
1733
1736
  }
1734
1737
  }
1735
1738
  },
1736
- "S22": {
1739
+ "S23": {
1737
1740
  "type": "list",
1738
1741
  "member": {}
1739
1742
  },
1740
- "S25": {
1743
+ "S26": {
1741
1744
  "type": "structure",
1742
1745
  "members": {
1743
1746
  "baseCapacity": {
@@ -1776,6 +1779,7 @@
1776
1779
  "enhancedVpcRouting": {
1777
1780
  "type": "boolean"
1778
1781
  },
1782
+ "ipAddressType": {},
1779
1783
  "maxCapacity": {
1780
1784
  "type": "integer"
1781
1785
  },
@@ -1788,7 +1792,7 @@
1788
1792
  "type": "boolean"
1789
1793
  },
1790
1794
  "securityGroupIds": {
1791
- "shape": "S22"
1795
+ "shape": "S23"
1792
1796
  },
1793
1797
  "status": {},
1794
1798
  "subnetIds": {
@@ -1800,7 +1804,7 @@
1800
1804
  "workgroupVersion": {}
1801
1805
  }
1802
1806
  },
1803
- "S33": {
1807
+ "S34": {
1804
1808
  "type": "structure",
1805
1809
  "members": {
1806
1810
  "namespaceArn": {},
@@ -1815,14 +1819,14 @@
1815
1819
  "workgroupName": {}
1816
1820
  }
1817
1821
  },
1818
- "S36": {
1822
+ "S37": {
1819
1823
  "type": "structure",
1820
1824
  "members": {
1821
1825
  "policy": {},
1822
1826
  "resourceArn": {}
1823
1827
  }
1824
1828
  },
1825
- "S3d": {
1829
+ "S3e": {
1826
1830
  "type": "structure",
1827
1831
  "members": {
1828
1832
  "message": {},
@@ -109,11 +109,11 @@ declare class ACMPCA extends Service {
109
109
  */
110
110
  getPolicy(callback?: (err: AWSError, data: ACMPCA.Types.GetPolicyResponse) => void): Request<ACMPCA.Types.GetPolicyResponse, AWSError>;
111
111
  /**
112
- * Imports a signed private CA certificate into Amazon Web Services Private CA. This action is used when you are using a chain of trust whose root is located outside Amazon Web Services Private CA. Before you can call this action, the following preparations must in place: In Amazon Web Services Private CA, call the CreateCertificateAuthority action to create the private CA that you plan to back with the imported certificate. Call the GetCertificateAuthorityCsr action to generate a certificate signing request (CSR). Sign the CSR using a root or intermediate CA hosted by either an on-premises PKI hierarchy or by a commercial CA. Create a certificate chain and copy the signed certificate and the certificate chain to your working directory. Amazon Web Services Private CA supports three scenarios for installing a CA certificate: Installing a certificate for a root CA hosted by Amazon Web Services Private CA. Installing a subordinate CA certificate whose parent authority is hosted by Amazon Web Services Private CA. Installing a subordinate CA certificate whose parent authority is externally hosted. The following additional requirements apply when you import a CA certificate. Only a self-signed certificate can be imported as a root CA. A self-signed certificate cannot be imported as a subordinate CA. Your certificate chain must not include the private CA certificate that you are importing. Your root CA must be the last certificate in your chain. The subordinate certificate, if any, that your root CA signed must be next to last. The subordinate certificate signed by the preceding subordinate CA must come next, and so on until your chain is built. The chain must be PEM-encoded. The maximum allowed size of a certificate is 32 KB. The maximum allowed size of a certificate chain is 2 MB. Enforcement of Critical Constraints Amazon Web Services Private CA allows the following extensions to be marked critical in the imported CA certificate or chain. Authority key identifier Basic constraints (must be marked critical) Certificate policies Extended key usage Inhibit anyPolicy Issuer alternative name Key usage Name constraints Policy mappings Subject alternative name Subject directory attributes Subject key identifier Subject information access Amazon Web Services Private CA rejects the following extensions when they are marked critical in an imported CA certificate or chain. Authority information access CRL distribution points Freshest CRL Policy constraints Amazon Web Services Private Certificate Authority will also reject any other extension marked as critical not contained on the preceding list of allowed extensions.
112
+ * Imports a signed private CA certificate into Amazon Web Services Private CA. This action is used when you are using a chain of trust whose root is located outside Amazon Web Services Private CA. Before you can call this action, the following preparations must in place: In Amazon Web Services Private CA, call the CreateCertificateAuthority action to create the private CA that you plan to back with the imported certificate. Call the GetCertificateAuthorityCsr action to generate a certificate signing request (CSR). Sign the CSR using a root or intermediate CA hosted by either an on-premises PKI hierarchy or by a commercial CA. Create a certificate chain and copy the signed certificate and the certificate chain to your working directory. Amazon Web Services Private CA supports three scenarios for installing a CA certificate: Installing a certificate for a root CA hosted by Amazon Web Services Private CA. Installing a subordinate CA certificate whose parent authority is hosted by Amazon Web Services Private CA. Installing a subordinate CA certificate whose parent authority is externally hosted. The following additional requirements apply when you import a CA certificate. Only a self-signed certificate can be imported as a root CA. A self-signed certificate cannot be imported as a subordinate CA. Your certificate chain must not include the private CA certificate that you are importing. Your root CA must be the last certificate in your chain. The subordinate certificate, if any, that your root CA signed must be next to last. The subordinate certificate signed by the preceding subordinate CA must come next, and so on until your chain is built. The chain must be PEM-encoded. The maximum allowed size of a certificate is 32 KB. The maximum allowed size of a certificate chain is 2 MB. Enforcement of Critical Constraints Amazon Web Services Private CA allows the following extensions to be marked critical in the imported CA certificate or chain. Basic constraints (must be marked critical) Subject alternative names Key usage Extended key usage Authority key identifier Subject key identifier Issuer alternative name Subject directory attributes Subject information access Certificate policies Policy mappings Inhibit anyPolicy Amazon Web Services Private CA rejects the following extensions when they are marked critical in an imported CA certificate or chain. Name constraints Policy constraints CRL distribution points Authority information access Freshest CRL Any other extension
113
113
  */
114
114
  importCertificateAuthorityCertificate(params: ACMPCA.Types.ImportCertificateAuthorityCertificateRequest, callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
115
115
  /**
116
- * Imports a signed private CA certificate into Amazon Web Services Private CA. This action is used when you are using a chain of trust whose root is located outside Amazon Web Services Private CA. Before you can call this action, the following preparations must in place: In Amazon Web Services Private CA, call the CreateCertificateAuthority action to create the private CA that you plan to back with the imported certificate. Call the GetCertificateAuthorityCsr action to generate a certificate signing request (CSR). Sign the CSR using a root or intermediate CA hosted by either an on-premises PKI hierarchy or by a commercial CA. Create a certificate chain and copy the signed certificate and the certificate chain to your working directory. Amazon Web Services Private CA supports three scenarios for installing a CA certificate: Installing a certificate for a root CA hosted by Amazon Web Services Private CA. Installing a subordinate CA certificate whose parent authority is hosted by Amazon Web Services Private CA. Installing a subordinate CA certificate whose parent authority is externally hosted. The following additional requirements apply when you import a CA certificate. Only a self-signed certificate can be imported as a root CA. A self-signed certificate cannot be imported as a subordinate CA. Your certificate chain must not include the private CA certificate that you are importing. Your root CA must be the last certificate in your chain. The subordinate certificate, if any, that your root CA signed must be next to last. The subordinate certificate signed by the preceding subordinate CA must come next, and so on until your chain is built. The chain must be PEM-encoded. The maximum allowed size of a certificate is 32 KB. The maximum allowed size of a certificate chain is 2 MB. Enforcement of Critical Constraints Amazon Web Services Private CA allows the following extensions to be marked critical in the imported CA certificate or chain. Authority key identifier Basic constraints (must be marked critical) Certificate policies Extended key usage Inhibit anyPolicy Issuer alternative name Key usage Name constraints Policy mappings Subject alternative name Subject directory attributes Subject key identifier Subject information access Amazon Web Services Private CA rejects the following extensions when they are marked critical in an imported CA certificate or chain. Authority information access CRL distribution points Freshest CRL Policy constraints Amazon Web Services Private Certificate Authority will also reject any other extension marked as critical not contained on the preceding list of allowed extensions.
116
+ * Imports a signed private CA certificate into Amazon Web Services Private CA. This action is used when you are using a chain of trust whose root is located outside Amazon Web Services Private CA. Before you can call this action, the following preparations must in place: In Amazon Web Services Private CA, call the CreateCertificateAuthority action to create the private CA that you plan to back with the imported certificate. Call the GetCertificateAuthorityCsr action to generate a certificate signing request (CSR). Sign the CSR using a root or intermediate CA hosted by either an on-premises PKI hierarchy or by a commercial CA. Create a certificate chain and copy the signed certificate and the certificate chain to your working directory. Amazon Web Services Private CA supports three scenarios for installing a CA certificate: Installing a certificate for a root CA hosted by Amazon Web Services Private CA. Installing a subordinate CA certificate whose parent authority is hosted by Amazon Web Services Private CA. Installing a subordinate CA certificate whose parent authority is externally hosted. The following additional requirements apply when you import a CA certificate. Only a self-signed certificate can be imported as a root CA. A self-signed certificate cannot be imported as a subordinate CA. Your certificate chain must not include the private CA certificate that you are importing. Your root CA must be the last certificate in your chain. The subordinate certificate, if any, that your root CA signed must be next to last. The subordinate certificate signed by the preceding subordinate CA must come next, and so on until your chain is built. The chain must be PEM-encoded. The maximum allowed size of a certificate is 32 KB. The maximum allowed size of a certificate chain is 2 MB. Enforcement of Critical Constraints Amazon Web Services Private CA allows the following extensions to be marked critical in the imported CA certificate or chain. Basic constraints (must be marked critical) Subject alternative names Key usage Extended key usage Authority key identifier Subject key identifier Issuer alternative name Subject directory attributes Subject information access Certificate policies Policy mappings Inhibit anyPolicy Amazon Web Services Private CA rejects the following extensions when they are marked critical in an imported CA certificate or chain. Name constraints Policy constraints CRL distribution points Authority information access Freshest CRL Any other extension
117
117
  */
118
118
  importCertificateAuthorityCertificate(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
119
119
  /**
@@ -197,29 +197,29 @@ declare class ACMPCA extends Service {
197
197
  */
198
198
  updateCertificateAuthority(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
199
199
  /**
200
- * Waits for the certificateAuthorityCSRCreated state by periodically calling the underlying ACMPCA.getCertificateAuthorityCsroperation every 3 seconds (at most 60 times). Wait until a Certificate Authority CSR is created
200
+ * Waits for the auditReportCreated state by periodically calling the underlying ACMPCA.describeCertificateAuthorityAuditReportoperation every 3 seconds (at most 40 times). Wait until a Audit Report is created
201
201
  */
202
- waitFor(state: "certificateAuthorityCSRCreated", params: ACMPCA.Types.GetCertificateAuthorityCsrRequest & {$waiter?: WaiterConfiguration}, callback?: (err: AWSError, data: ACMPCA.Types.GetCertificateAuthorityCsrResponse) => void): Request<ACMPCA.Types.GetCertificateAuthorityCsrResponse, AWSError>;
202
+ waitFor(state: "auditReportCreated", params: ACMPCA.Types.DescribeCertificateAuthorityAuditReportRequest & {$waiter?: WaiterConfiguration}, callback?: (err: AWSError, data: ACMPCA.Types.DescribeCertificateAuthorityAuditReportResponse) => void): Request<ACMPCA.Types.DescribeCertificateAuthorityAuditReportResponse, AWSError>;
203
203
  /**
204
- * Waits for the certificateAuthorityCSRCreated state by periodically calling the underlying ACMPCA.getCertificateAuthorityCsroperation every 3 seconds (at most 60 times). Wait until a Certificate Authority CSR is created
204
+ * Waits for the auditReportCreated state by periodically calling the underlying ACMPCA.describeCertificateAuthorityAuditReportoperation every 3 seconds (at most 40 times). Wait until a Audit Report is created
205
205
  */
206
- waitFor(state: "certificateAuthorityCSRCreated", callback?: (err: AWSError, data: ACMPCA.Types.GetCertificateAuthorityCsrResponse) => void): Request<ACMPCA.Types.GetCertificateAuthorityCsrResponse, AWSError>;
206
+ waitFor(state: "auditReportCreated", callback?: (err: AWSError, data: ACMPCA.Types.DescribeCertificateAuthorityAuditReportResponse) => void): Request<ACMPCA.Types.DescribeCertificateAuthorityAuditReportResponse, AWSError>;
207
207
  /**
208
- * Waits for the certificateIssued state by periodically calling the underlying ACMPCA.getCertificateoperation every 1 seconds (at most 60 times). Wait until a certificate is issued
208
+ * Waits for the certificateAuthorityCSRCreated state by periodically calling the underlying ACMPCA.getCertificateAuthorityCsroperation every 3 seconds (at most 40 times). Wait until a Certificate Authority CSR is created
209
209
  */
210
- waitFor(state: "certificateIssued", params: ACMPCA.Types.GetCertificateRequest & {$waiter?: WaiterConfiguration}, callback?: (err: AWSError, data: ACMPCA.Types.GetCertificateResponse) => void): Request<ACMPCA.Types.GetCertificateResponse, AWSError>;
210
+ waitFor(state: "certificateAuthorityCSRCreated", params: ACMPCA.Types.GetCertificateAuthorityCsrRequest & {$waiter?: WaiterConfiguration}, callback?: (err: AWSError, data: ACMPCA.Types.GetCertificateAuthorityCsrResponse) => void): Request<ACMPCA.Types.GetCertificateAuthorityCsrResponse, AWSError>;
211
211
  /**
212
- * Waits for the certificateIssued state by periodically calling the underlying ACMPCA.getCertificateoperation every 1 seconds (at most 60 times). Wait until a certificate is issued
212
+ * Waits for the certificateAuthorityCSRCreated state by periodically calling the underlying ACMPCA.getCertificateAuthorityCsroperation every 3 seconds (at most 40 times). Wait until a Certificate Authority CSR is created
213
213
  */
214
- waitFor(state: "certificateIssued", callback?: (err: AWSError, data: ACMPCA.Types.GetCertificateResponse) => void): Request<ACMPCA.Types.GetCertificateResponse, AWSError>;
214
+ waitFor(state: "certificateAuthorityCSRCreated", callback?: (err: AWSError, data: ACMPCA.Types.GetCertificateAuthorityCsrResponse) => void): Request<ACMPCA.Types.GetCertificateAuthorityCsrResponse, AWSError>;
215
215
  /**
216
- * Waits for the auditReportCreated state by periodically calling the underlying ACMPCA.describeCertificateAuthorityAuditReportoperation every 3 seconds (at most 60 times). Wait until a Audit Report is created
216
+ * Waits for the certificateIssued state by periodically calling the underlying ACMPCA.getCertificateoperation every 1 seconds (at most 120 times). Wait until a certificate is issued
217
217
  */
218
- waitFor(state: "auditReportCreated", params: ACMPCA.Types.DescribeCertificateAuthorityAuditReportRequest & {$waiter?: WaiterConfiguration}, callback?: (err: AWSError, data: ACMPCA.Types.DescribeCertificateAuthorityAuditReportResponse) => void): Request<ACMPCA.Types.DescribeCertificateAuthorityAuditReportResponse, AWSError>;
218
+ waitFor(state: "certificateIssued", params: ACMPCA.Types.GetCertificateRequest & {$waiter?: WaiterConfiguration}, callback?: (err: AWSError, data: ACMPCA.Types.GetCertificateResponse) => void): Request<ACMPCA.Types.GetCertificateResponse, AWSError>;
219
219
  /**
220
- * Waits for the auditReportCreated state by periodically calling the underlying ACMPCA.describeCertificateAuthorityAuditReportoperation every 3 seconds (at most 60 times). Wait until a Audit Report is created
220
+ * Waits for the certificateIssued state by periodically calling the underlying ACMPCA.getCertificateoperation every 1 seconds (at most 120 times). Wait until a certificate is issued
221
221
  */
222
- waitFor(state: "auditReportCreated", callback?: (err: AWSError, data: ACMPCA.Types.DescribeCertificateAuthorityAuditReportResponse) => void): Request<ACMPCA.Types.DescribeCertificateAuthorityAuditReportResponse, AWSError>;
222
+ waitFor(state: "certificateIssued", callback?: (err: AWSError, data: ACMPCA.Types.GetCertificateResponse) => void): Request<ACMPCA.Types.GetCertificateResponse, AWSError>;
223
223
  }
224
224
  declare namespace ACMPCA {
225
225
  export type ASN1PrintableString64 = string;
@@ -758,7 +758,7 @@ declare namespace ACMPCA {
758
758
  }
759
759
  export interface GetPolicyRequest {
760
760
  /**
761
- * The Amazon Resource Number (ARN) of the private CA that will have its policy retrieved. You can find the CA's ARN by calling the ListCertificateAuthorities action.
761
+ * The Amazon Resource Number (ARN) of the private CA that will have its policy retrieved. You can find the CA's ARN by calling the ListCertificateAuthorities action. &lt;/p&gt;
762
762
  */
763
763
  ResourceArn: Arn;
764
764
  }
@@ -865,76 +865,76 @@ declare namespace ACMPCA {
865
865
  DecipherOnly?: Boolean;
866
866
  }
867
867
  export interface ListCertificateAuthoritiesRequest {
868
- /**
869
- * Use this parameter when paginating results in a subsequent request after you receive a response with truncated results. Set it to the value of the NextToken parameter from the response you just received.
870
- */
871
- NextToken?: NextToken;
872
868
  /**
873
869
  * Use this parameter when paginating results to specify the maximum number of items to return in the response on each page. If additional items exist beyond the number you specify, the NextToken element is sent in the response. Use this NextToken value in a subsequent request to retrieve additional items. Although the maximum value is 1000, the action only returns a maximum of 100 items.
874
870
  */
875
871
  MaxResults?: MaxResults;
872
+ /**
873
+ * Use this parameter when paginating results in a subsequent request after you receive a response with truncated results. Set it to the value of the NextToken parameter from the response you just received.
874
+ */
875
+ NextToken?: NextToken;
876
876
  /**
877
877
  * Use this parameter to filter the returned set of certificate authorities based on their owner. The default is SELF.
878
878
  */
879
879
  ResourceOwner?: ResourceOwner;
880
880
  }
881
881
  export interface ListCertificateAuthoritiesResponse {
882
- /**
883
- * Summary information about each certificate authority you have created.
884
- */
885
- CertificateAuthorities?: CertificateAuthorities;
886
882
  /**
887
883
  * When the list is truncated, this value is present and should be used for the NextToken parameter in a subsequent pagination request.
888
884
  */
889
885
  NextToken?: NextToken;
886
+ /**
887
+ * Summary information about each certificate authority you have created.
888
+ */
889
+ CertificateAuthorities?: CertificateAuthorities;
890
890
  }
891
891
  export interface ListPermissionsRequest {
892
892
  /**
893
- * The Amazon Resource Number (ARN) of the private CA to inspect. You can find the ARN by calling the ListCertificateAuthorities action. This must be of the form: arn:aws:acm-pca:region:account:certificate-authority/12345678-1234-1234-1234-123456789012 You can get a private CA's ARN by running the ListCertificateAuthorities action.
893
+ * When paginating results, use this parameter to specify the maximum number of items to return in the response. If additional items exist beyond the number you specify, the NextToken element is sent in the response. Use this NextToken value in a subsequent request to retrieve additional items.
894
894
  */
895
- CertificateAuthorityArn: Arn;
895
+ MaxResults?: MaxResults;
896
896
  /**
897
897
  * When paginating results, use this parameter in a subsequent request after you receive a response with truncated results. Set it to the value of NextToken from the response you just received.
898
898
  */
899
899
  NextToken?: NextToken;
900
900
  /**
901
- * When paginating results, use this parameter to specify the maximum number of items to return in the response. If additional items exist beyond the number you specify, the NextToken element is sent in the response. Use this NextToken value in a subsequent request to retrieve additional items.
901
+ * The Amazon Resource Number (ARN) of the private CA to inspect. You can find the ARN by calling the ListCertificateAuthorities action. This must be of the form: arn:aws:acm-pca:region:account:certificate-authority/12345678-1234-1234-1234-123456789012 You can get a private CA's ARN by running the ListCertificateAuthorities action.
902
902
  */
903
- MaxResults?: MaxResults;
903
+ CertificateAuthorityArn: Arn;
904
904
  }
905
905
  export interface ListPermissionsResponse {
906
- /**
907
- * Summary information about each permission assigned by the specified private CA, including the action enabled, the policy provided, and the time of creation.
908
- */
909
- Permissions?: PermissionList;
910
906
  /**
911
907
  * When the list is truncated, this value is present and should be used for the NextToken parameter in a subsequent pagination request.
912
908
  */
913
909
  NextToken?: NextToken;
910
+ /**
911
+ * Summary information about each permission assigned by the specified private CA, including the action enabled, the policy provided, and the time of creation.
912
+ */
913
+ Permissions?: PermissionList;
914
914
  }
915
915
  export interface ListTagsRequest {
916
916
  /**
917
- * The Amazon Resource Name (ARN) that was returned when you called the CreateCertificateAuthority action. This must be of the form: arn:aws:acm-pca:region:account:certificate-authority/12345678-1234-1234-1234-123456789012
917
+ * Use this parameter when paginating results to specify the maximum number of items to return in the response. If additional items exist beyond the number you specify, the NextToken element is sent in the response. Use this NextToken value in a subsequent request to retrieve additional items.
918
918
  */
919
- CertificateAuthorityArn: Arn;
919
+ MaxResults?: MaxResults;
920
920
  /**
921
921
  * Use this parameter when paginating results in a subsequent request after you receive a response with truncated results. Set it to the value of NextToken from the response you just received.
922
922
  */
923
923
  NextToken?: NextToken;
924
924
  /**
925
- * Use this parameter when paginating results to specify the maximum number of items to return in the response. If additional items exist beyond the number you specify, the NextToken element is sent in the response. Use this NextToken value in a subsequent request to retrieve additional items.
925
+ * The Amazon Resource Name (ARN) that was returned when you called the CreateCertificateAuthority action. This must be of the form: arn:aws:acm-pca:region:account:certificate-authority/12345678-1234-1234-1234-123456789012
926
926
  */
927
- MaxResults?: MaxResults;
927
+ CertificateAuthorityArn: Arn;
928
928
  }
929
929
  export interface ListTagsResponse {
930
- /**
931
- * The tags associated with your private CA.
932
- */
933
- Tags?: TagList;
934
930
  /**
935
931
  * When the list is truncated, this value is present and should be used for the NextToken parameter in a subsequent pagination request.
936
932
  */
937
933
  NextToken?: NextToken;
934
+ /**
935
+ * The tags associated with your private CA.
936
+ */
937
+ Tags?: TagList;
938
938
  }
939
939
  export type MaxResults = number;
940
940
  export type NextToken = string;
package/clients/all.d.ts CHANGED
@@ -104,7 +104,6 @@ export import DAX = require('./dax');
104
104
  export import MigrationHub = require('./migrationhub');
105
105
  export import CloudHSMV2 = require('./cloudhsmv2');
106
106
  export import Glue = require('./glue');
107
- export import Mobile = require('./mobile');
108
107
  export import Pricing = require('./pricing');
109
108
  export import CostExplorer = require('./costexplorer');
110
109
  export import MediaConvert = require('./mediaconvert');
package/clients/all.js CHANGED
@@ -106,7 +106,6 @@ module.exports = {
106
106
  MigrationHub: require('./migrationhub'),
107
107
  CloudHSMV2: require('./cloudhsmv2'),
108
108
  Glue: require('./glue'),
109
- Mobile: require('./mobile'),
110
109
  Pricing: require('./pricing'),
111
110
  CostExplorer: require('./costexplorer'),
112
111
  MediaConvert: require('./mediaconvert'),