lib/aws-sdk-acm/client.rb in aws-sdk-acm-1.41.0 vs lib/aws-sdk-acm/client.rb in aws-sdk-acm-1.42.0
- old
+ new
@@ -336,14 +336,14 @@
end
# @!group API Operations
# Adds one or more tags to an ACM certificate. Tags are labels that you
- # can use to identify and organize your AWS resources. Each tag consists
- # of a `key` and an optional `value`. You specify the certificate on
- # input by its Amazon Resource Name (ARN). You specify the tag by using
- # a key-value pair.
+ # can use to identify and organize your Amazon Web Services resources.
+ # Each tag consists of a `key` and an optional `value`. You specify the
+ # certificate on input by its Amazon Resource Name (ARN). You specify
+ # the tag by using a key-value pair.
#
# You can apply a tag to just one certificate if you want to identify a
# specific characteristic of that certificate, or you can apply the same
# tag to multiple certificates if you want to filter for a common
# relationship among those certificates. Similarly, you can apply the
@@ -402,15 +402,15 @@
# Deletes a certificate and its associated private key. If this action
# succeeds, the certificate no longer appears in the list that can be
# displayed by calling the ListCertificates action or be retrieved by
# calling the GetCertificate action. The certificate will not be
- # available for use by AWS services integrated with ACM.
+ # available for use by Amazon Web Services services integrated with ACM.
#
- # <note markdown="1"> You cannot delete an ACM certificate that is being used by another AWS
- # service. To delete a certificate that is in use, the certificate
- # association must first be removed.
+ # <note markdown="1"> You cannot delete an ACM certificate that is being used by another
+ # Amazon Web Services service. To delete a certificate that is in use,
+ # the certificate association must first be removed.
#
# </note>
#
# @option params [required, String] :certificate_arn
# String that contains the ARN of the ACM certificate to be deleted.
@@ -492,11 +492,11 @@
# resp.certificate.status #=> String, one of "PENDING_VALIDATION", "ISSUED", "INACTIVE", "EXPIRED", "VALIDATION_TIMED_OUT", "REVOKED", "FAILED"
# resp.certificate.revoked_at #=> Time
# resp.certificate.revocation_reason #=> String, one of "UNSPECIFIED", "KEY_COMPROMISE", "CA_COMPROMISE", "AFFILIATION_CHANGED", "SUPERCEDED", "CESSATION_OF_OPERATION", "CERTIFICATE_HOLD", "REMOVE_FROM_CRL", "PRIVILEGE_WITHDRAWN", "A_A_COMPROMISE"
# resp.certificate.not_before #=> Time
# resp.certificate.not_after #=> Time
- # resp.certificate.key_algorithm #=> String, one of "RSA_2048", "RSA_1024", "RSA_4096", "EC_prime256v1", "EC_secp384r1", "EC_secp521r1"
+ # resp.certificate.key_algorithm #=> String, one of "RSA_1024", "RSA_2048", "RSA_3072", "RSA_4096", "EC_prime256v1", "EC_secp384r1", "EC_secp521r1"
# resp.certificate.signature_algorithm #=> String
# resp.certificate.in_use_by #=> Array
# resp.certificate.in_use_by[0] #=> String
# resp.certificate.failure_reason #=> String, one of "NO_AVAILABLE_CONTACTS", "ADDITIONAL_VERIFICATION_REQUIRED", "DOMAIN_NOT_ALLOWED", "INVALID_PUBLIC_DOMAIN", "DOMAIN_VALIDATION_DENIED", "CAA_ERROR", "PCA_LIMIT_EXCEEDED", "PCA_INVALID_ARN", "PCA_INVALID_STATE", "PCA_REQUEST_FAILED", "PCA_NAME_CONSTRAINTS_VALIDATION", "PCA_RESOURCE_NOT_FOUND", "PCA_INVALID_ARGS", "PCA_INVALID_DURATION", "PCA_ACCESS_DENIED", "SLR_NOT_FOUND", "OTHER"
# resp.certificate.type #=> String, one of "IMPORTED", "AMAZON_ISSUED", "PRIVATE"
@@ -590,12 +590,12 @@
def export_certificate(params = {}, options = {})
req = build_request(:export_certificate, params)
req.send_request(options)
end
- # Returns the account configuration options associated with an AWS
- # account.
+ # Returns the account configuration options associated with an Amazon
+ # Web Services account.
#
# @return [Types::GetAccountConfigurationResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
#
# * {Types::GetAccountConfigurationResponse#expiry_events #expiry_events} => Types::ExpiryEventsConfiguration
#
@@ -657,18 +657,19 @@
def get_certificate(params = {}, options = {})
req = build_request(:get_certificate, params)
req.send_request(options)
end
- # Imports a certificate into AWS Certificate Manager (ACM) to use with
- # services that are integrated with ACM. Note that [integrated
- # services][1] allow only certificate types and keys they support to be
- # associated with their resources. Further, their support differs
- # depending on whether the certificate is imported into IAM or into ACM.
- # For more information, see the documentation for each service. For more
- # information about importing certificates into ACM, see [Importing
- # Certificates][2] in the *AWS Certificate Manager User Guide*.
+ # Imports a certificate into Amazon Web Services Certificate Manager
+ # (ACM) to use with services that are integrated with ACM. Note that
+ # [integrated services][1] allow only certificate types and keys they
+ # support to be associated with their resources. Further, their support
+ # differs depending on whether the certificate is imported into IAM or
+ # into ACM. For more information, see the documentation for each
+ # service. For more information about importing certificates into ACM,
+ # see [Importing Certificates][2] in the *Amazon Web Services
+ # Certificate Manager User Guide*.
#
# <note markdown="1"> ACM does not provide [managed renewal][3] for certificates that you
# import.
#
# </note>
@@ -820,11 +821,11 @@
# resp = client.list_certificates({
# certificate_statuses: ["PENDING_VALIDATION"], # accepts PENDING_VALIDATION, ISSUED, INACTIVE, EXPIRED, VALIDATION_TIMED_OUT, REVOKED, FAILED
# includes: {
# extended_key_usage: ["TLS_WEB_SERVER_AUTHENTICATION"], # accepts TLS_WEB_SERVER_AUTHENTICATION, TLS_WEB_CLIENT_AUTHENTICATION, CODE_SIGNING, EMAIL_PROTECTION, TIME_STAMPING, OCSP_SIGNING, IPSEC_END_SYSTEM, IPSEC_TUNNEL, IPSEC_USER, ANY, NONE, CUSTOM
# key_usage: ["DIGITAL_SIGNATURE"], # accepts DIGITAL_SIGNATURE, NON_REPUDIATION, KEY_ENCIPHERMENT, DATA_ENCIPHERMENT, KEY_AGREEMENT, CERTIFICATE_SIGNING, CRL_SIGNING, ENCIPHER_ONLY, DECIPHER_ONLY, ANY, CUSTOM
- # key_types: ["RSA_2048"], # accepts RSA_2048, RSA_1024, RSA_4096, EC_prime256v1, EC_secp384r1, EC_secp521r1
+ # key_types: ["RSA_1024"], # accepts RSA_1024, RSA_2048, RSA_3072, RSA_4096, EC_prime256v1, EC_secp384r1, EC_secp521r1
# },
# next_token: "NextToken",
# max_items: 1,
# })
#
@@ -1014,26 +1015,36 @@
def renew_certificate(params = {}, options = {})
req = build_request(:renew_certificate, params)
req.send_request(options)
end
- # Requests an ACM certificate for use with other AWS services. To
- # request an ACM certificate, you must specify a fully qualified domain
- # name (FQDN) in the `DomainName` parameter. You can also specify
- # additional FQDNs in the `SubjectAlternativeNames` parameter.
+ # Requests an ACM certificate for use with other Amazon Web Services
+ # services. To request an ACM certificate, you must specify a fully
+ # qualified domain name (FQDN) in the `DomainName` parameter. You can
+ # also specify additional FQDNs in the `SubjectAlternativeNames`
+ # parameter.
#
# If you are requesting a private certificate, domain validation is not
# required. If you are requesting a public certificate, each domain name
# that you specify must be validated to verify that you own or control
# the domain. You can use [DNS validation][1] or [email validation][2].
# We recommend that you use DNS validation. ACM issues public
# certificates after receiving approval from the domain owner.
#
+ # <note markdown="1"> ACM behavior differs from the
+ # [https://tools.ietf.org/html/rfc6125#appendix-B.2][3]RFC 6125
+ # specification of the certificate validation process. first checks for
+ # a subject alternative name, and, if it finds one, ignores the common
+ # name (CN)
#
+ # </note>
#
+ #
+ #
# [1]: https://docs.aws.amazon.com/acm/latest/userguide/gs-acm-validate-dns.html
# [2]: https://docs.aws.amazon.com/acm/latest/userguide/gs-acm-validate-email.html
+ # [3]: https://tools.ietf.org/html/rfc6125#appendix-B.2
#
# @option params [required, String] :domain_name
# Fully qualified domain name (FQDN), such as www.example.com, that you
# want to secure with an ACM certificate. Use an asterisk (*) to create
# a wildcard certificate that protects several sites in the same domain.
@@ -1113,12 +1124,13 @@
# @option params [String] :certificate_authority_arn
# The Amazon Resource Name (ARN) of the private certificate authority
# (CA) that will be used to issue the certificate. If you do not provide
# an ARN and you are trying to request a private certificate, ACM will
# attempt to issue a public certificate. For more information about
- # private CAs, see the [AWS Certificate Manager Private Certificate
- # Authority (PCA)][1] user guide. The ARN must have the following form:
+ # private CAs, see the [Amazon Web Services Certificate Manager Private
+ # Certificate Authority (PCA)][1] user guide. The ARN must have the
+ # following form:
#
# `arn:aws:acm-pca:region:account:certificate-authority/12345678-1234-1234-1234-123456789012`
#
#
#
@@ -1292,10 +1304,10 @@
operation: config.api.operation(operation_name),
client: self,
params: params,
config: config)
context[:gem_name] = 'aws-sdk-acm'
- context[:gem_version] = '1.41.0'
+ context[:gem_version] = '1.42.0'
Seahorse::Client::Request.new(handlers, context)
end
# Polls an API operation until a resource enters a desired state.
#