lib/aws-sdk-acm/client.rb in aws-sdk-acm-1.73.0 vs lib/aws-sdk-acm/client.rb in aws-sdk-acm-1.74.0

- old
+ new

@@ -716,15 +716,18 @@ def get_account_configuration(params = {}, options = {}) req = build_request(:get_account_configuration, params) req.send_request(options) end - # Retrieves an Amazon-issued certificate and its certificate chain. The - # chain consists of the certificate of the issuing CA and the - # intermediate certificates of any other subordinate CAs. All of the - # certificates are base64 encoded. You can use [OpenSSL][1] to decode - # the certificates and inspect individual fields. + # Retrieves a certificate and its certificate chain. The certificate may + # be either a public or private certificate issued using the ACM + # `RequestCertificate` action, or a certificate imported into ACM using + # the `ImportCertificate` action. The chain consists of the certificate + # of the issuing CA and the intermediate certificates of any other + # subordinate CAs. All of the certificates are base64 encoded. You can + # use [OpenSSL][1] to decode the certificates and inspect individual + # fields. # # # # [1]: https://wiki.openssl.org/index.php/Command_Line_Utilities # @@ -787,16 +790,10 @@ # * The private key must be unencrypted. You cannot import a private key # that is protected by a password or a passphrase. # # * The private key must be no larger than 5 KB (5,120 bytes). # - # * If the certificate you are importing is not self-signed, you must - # enter its certificate chain. - # - # * If a certificate chain is included, the issuer must be the subject - # of one of the certificates in the chain. - # # * The certificate, private key, and certificate chain must be # PEM-encoded. # # * The current time must be between the `Not Before` and `Not After` # certificate fields. @@ -886,16 +883,20 @@ def import_certificate(params = {}, options = {}) req = build_request(:import_certificate, params) req.send_request(options) end - # Retrieves a list of certificate ARNs and domain names. You can request - # that only certificates that match a specific status be listed. You can - # also filter by specific attributes of the certificate. Default - # filtering returns only `RSA_2048` certificates. For more information, - # see Filters. + # Retrieves a list of certificate ARNs and domain names. By default, the + # API returns RSA\_2048 certificates. To return all certificates in the + # account, include the `keyType` filter with the values `[RSA_1024, + # RSA_2048, RSA_3072, RSA_4096, EC_prime256v1, EC_secp384r1, + # EC_secp521r1]`. # + # In addition to `keyType`, you can also filter by the + # `CertificateStatuses`, `keyUsage`, and `extendedKeyUsage` attributes + # on the certificate. For more information, see Filters. + # # @option params [Array<String>] :certificate_statuses # Filter the certificate list by status value. # # @option params [Types::Filters] :includes # Filter the certificate list. For more information, see the Filters @@ -1285,18 +1286,41 @@ # Specifies the algorithm of the public and private key pair that your # certificate uses to encrypt data. RSA is the default key algorithm for # ACM certificates. Elliptic Curve Digital Signature Algorithm (ECDSA) # keys are smaller, offering security comparable to RSA keys but with # greater computing efficiency. However, ECDSA is not supported by all - # network clients. Some AWS services may require RSA keys, or only - # support ECDSA keys of a particular size, while others allow the use of - # either RSA and ECDSA keys to ensure that compatibility is not broken. - # Check the requirements for the AWS service where you plan to deploy - # your certificate. + # network clients. Some Amazon Web Services services may require RSA + # keys, or only support ECDSA keys of a particular size, while others + # allow the use of either RSA and ECDSA keys to ensure that + # compatibility is not broken. Check the requirements for the Amazon Web + # Services service where you plan to deploy your certificate. For more + # information about selecting an algorithm, see [Key algorithms][1]. # + # <note markdown="1"> Algorithms supported for an ACM certificate request include: + # + # * `RSA_2048` + # + # * `EC_prime256v1` + # + # * `EC_secp384r1` + # + # Other listed algorithms are for imported certificates only. + # + # </note> + # + # <note markdown="1"> When you request a private PKI certificate signed by a CA from Amazon + # Web Services Private CA, the specified signing algorithm family (RSA + # or ECDSA) must match the algorithm family of the CA's secret key. + # + # </note> + # # Default: RSA\_2048 # + # + # + # [1]: https://docs.aws.amazon.com/acm/latest/userguide/acm-certificate.html#algorithms + # # @return [Types::RequestCertificateResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods: # # * {Types::RequestCertificateResponse#certificate_arn #certificate_arn} => String # # @example Request syntax with placeholder values @@ -1461,10 +1485,10 @@ operation: config.api.operation(operation_name), client: self, params: params, config: config) context[:gem_name] = 'aws-sdk-acm' - context[:gem_version] = '1.73.0' + context[:gem_version] = '1.74.0' Seahorse::Client::Request.new(handlers, context) end # Polls an API operation until a resource enters a desired state. #