Skip to content

Commit

Permalink
chore: Updates version to 1.0.17
Browse files Browse the repository at this point in the history
  • Loading branch information
aws-sdk-swift-automation committed Oct 10, 2024
1 parent 2dc1f37 commit 4c084c0
Show file tree
Hide file tree
Showing 29 changed files with 6,579 additions and 192 deletions.
3 changes: 2 additions & 1 deletion Package.swift
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,7 @@ import PackageDescription

// MARK: - Dynamic Content

let clientRuntimeVersion: Version = "0.77.0"
let clientRuntimeVersion: Version = "0.78.0"
let crtVersion: Version = "0.36.0"

let excludeRuntimeUnitTests = false
Expand Down Expand Up @@ -373,6 +373,7 @@ let serviceTargets: [String] = [
"AWSSimSpaceWeaver",
"AWSSnowDeviceManagement",
"AWSSnowball",
"AWSSocialMessaging",
"AWSSsmSap",
"AWSStorageGateway",
"AWSSupplyChain",
Expand Down
2 changes: 1 addition & 1 deletion Package.version
Original file line number Diff line number Diff line change
@@ -1 +1 @@
1.0.16
1.0.17
2 changes: 1 addition & 1 deletion Package.version.next
Original file line number Diff line number Diff line change
@@ -1 +1 @@
1.0.17
1.0.18
Original file line number Diff line number Diff line change
Expand Up @@ -779,6 +779,8 @@ This SDK is open-source. Code is available on Github [here](https://github.com/

[AWSSnowball](../../../../../swift/api/awssnowball/latest)

[AWSSocialMessaging](../../../../../swift/api/awssocialmessaging/latest)

[AWSSsmSap](../../../../../swift/api/awsssmsap/latest)

[AWSStorageGateway](../../../../../swift/api/awsstoragegateway/latest)
Expand Down
35 changes: 18 additions & 17 deletions Sources/Services/AWSACMPCA/Sources/AWSACMPCA/ACMPCAClient.swift
Original file line number Diff line number Diff line change
Expand Up @@ -269,7 +269,7 @@ extension ACMPCAClient {

/// Performs the `CreateCertificateAuthorityAuditReport` operation on the `ACMPrivateCA` service.
///
/// Creates an audit report that lists every time that your CA private key is used. The report is saved in the Amazon S3 bucket that you specify on input. The [IssueCertificate](https://docs.aws.amazon.com/privateca/latest/APIReference/API_IssueCertificate.html) and [RevokeCertificate](https://docs.aws.amazon.com/privateca/latest/APIReference/API_RevokeCertificate.html) actions use the private key. Both Amazon Web Services Private CA and the IAM principal must have permission to write to the S3 bucket that you specify. If the IAM principal making the call does not have permission to write to the bucket, then an exception is thrown. For more information, see [Access policies for CRLs in Amazon S3](https://docs.aws.amazon.com/privateca/latest/userguide/crl-planning.html#s3-policies). Amazon Web Services Private CA assets that are stored in Amazon S3 can be protected with encryption. For more information, see [Encrypting Your Audit Reports](https://docs.aws.amazon.com/privateca/latest/userguide/PcaAuditReport.html#audit-report-encryption). You can generate a maximum of one report every 30 minutes.
/// Creates an audit report that lists every time that your CA private key is used to issue a certificate. The [IssueCertificate](https://docs.aws.amazon.com/privateca/latest/APIReference/API_IssueCertificate.html) and [RevokeCertificate](https://docs.aws.amazon.com/privateca/latest/APIReference/API_RevokeCertificate.html) actions use the private key. To save the audit report to your designated Amazon S3 bucket, you must create a bucket policy that grants Amazon Web Services Private CA permission to access and write to it. For an example policy, see [Prepare an Amazon S3 bucket for audit reports](https://docs.aws.amazon.com/privateca/latest/userguide/PcaAuditReport.html#s3-access). Amazon Web Services Private CA assets that are stored in Amazon S3 can be protected with encryption. For more information, see [Encrypting Your Audit Reports](https://docs.aws.amazon.com/privateca/latest/userguide/PcaAuditReport.html#audit-report-encryption). You can generate a maximum of one report every 30 minutes.
///
/// - Parameter CreateCertificateAuthorityAuditReportInput : [no documentation found]
///
Expand Down Expand Up @@ -1157,44 +1157,45 @@ extension ACMPCAClient {
///
/// Enforcement of Critical Constraints Amazon Web Services Private CA allows the following extensions to be marked critical in the imported CA certificate or chain.
///
/// * Basic constraints (must be marked critical)
/// * Authority key identifier
///
/// * Subject alternative names
/// * Basic constraints (must be marked critical)
///
/// * Key usage
/// * Certificate policies
///
/// * Extended key usage
///
/// * Authority key identifier
///
/// * Subject key identifier
/// * Inhibit anyPolicy
///
/// * Issuer alternative name
///
/// * Subject directory attributes
///
/// * Subject information access
/// * Key usage
///
/// * Certificate policies
/// * Name constraints
///
/// * Policy mappings
///
/// * Inhibit anyPolicy
/// * Subject alternative name
///
/// * Subject directory attributes
///
/// Amazon Web Services Private CA rejects the following extensions when they are marked critical in an imported CA certificate or chain.
/// * Subject key identifier
///
/// * Name constraints
/// * Subject information access
///
/// * Policy constraints
///
/// * CRL distribution points
/// Amazon Web Services Private CA rejects the following extensions when they are marked critical in an imported CA certificate or chain.
///
/// * Authority information access
///
/// * CRL distribution points
///
/// * Freshest CRL
///
/// * Any other extension
/// * Policy constraints
///
///
/// Amazon Web Services Private Certificate Authority will also reject any other extension marked as critical not contained on the preceding list of allowed extensions.
///
/// - Parameter ImportCertificateAuthorityCertificateInput : [no documentation found]
///
Expand Down
7 changes: 5 additions & 2 deletions Sources/Services/AWSACMPCA/Sources/AWSACMPCA/Models.swift
Original file line number Diff line number Diff line change
Expand Up @@ -901,7 +901,7 @@ public struct CreateCertificateAuthorityInput: Swift.Sendable {
public var idempotencyToken: Swift.String?
/// Specifies a cryptographic key management compliance standard used for handling CA keys. Default: FIPS_140_2_LEVEL_3_OR_HIGHER Some Amazon Web Services Regions do not support the default. When creating a CA in these Regions, you must provide FIPS_140_2_LEVEL_2_OR_HIGHER as the argument for KeyStorageSecurityStandard. Failure to do this results in an InvalidArgsException with the message, "A certificate authority cannot be created in this region with the specified security standard." For information about security standard support in various Regions, see [Storage and security compliance of Amazon Web Services Private CA private keys](https://docs.aws.amazon.com/privateca/latest/userguide/data-protection.html#private-keys).
public var keyStorageSecurityStandard: ACMPCAClientTypes.KeyStorageSecurityStandard?
/// Contains information to enable Online Certificate Status Protocol (OCSP) support, to enable a certificate revocation list (CRL), to enable both, or to enable neither. The default is for both certificate validation mechanisms to be disabled. The following requirements apply to revocation configurations.
/// Contains information to enable support for Online Certificate Status Protocol (OCSP), certificate revocation list (CRL), both protocols, or neither. By default, both certificate validation mechanisms are disabled. The following requirements apply to revocation configurations.
///
/// * A configuration disabling CRLs or OCSP must contain only the Enabled=False parameter, and will fail if other parameters such as CustomCname or ExpirationInDays are included.
///
Expand Down Expand Up @@ -2559,7 +2559,7 @@ public struct UpdateCertificateAuthorityInput: Swift.Sendable {
/// Amazon Resource Name (ARN) of the private CA that issued the certificate to be revoked. This must be of the form: arn:aws:acm-pca:region:account:certificate-authority/12345678-1234-1234-1234-123456789012
/// This member is required.
public var certificateAuthorityArn: Swift.String?
/// Contains information to enable Online Certificate Status Protocol (OCSP) support, to enable a certificate revocation list (CRL), to enable both, or to enable neither. If this parameter is not supplied, existing capibilites remain unchanged. For more information, see the [OcspConfiguration](https://docs.aws.amazon.com/privateca/latest/APIReference/API_OcspConfiguration.html) and [CrlConfiguration](https://docs.aws.amazon.com/privateca/latest/APIReference/API_CrlConfiguration.html) types. The following requirements apply to revocation configurations.
/// Contains information to enable support for Online Certificate Status Protocol (OCSP), certificate revocation list (CRL), both protocols, or neither. If you don't supply this parameter, existing capibilites remain unchanged. For more information, see the [OcspConfiguration](https://docs.aws.amazon.com/privateca/latest/APIReference/API_OcspConfiguration.html) and [CrlConfiguration](https://docs.aws.amazon.com/privateca/latest/APIReference/API_CrlConfiguration.html) types. The following requirements apply to revocation configurations.
///
/// * A configuration disabling CRLs or OCSP must contain only the Enabled=False parameter, and will fail if other parameters such as CustomCname or ExpirationInDays are included.
///
Expand All @@ -2568,6 +2568,9 @@ public struct UpdateCertificateAuthorityInput: Swift.Sendable {
/// * A configuration containing a custom Canonical Name (CNAME) parameter for CRLs or OCSP must conform to [RFC2396](https://www.ietf.org/rfc/rfc2396.txt) restrictions on the use of special characters in a CNAME.
///
/// * In a CRL or OCSP configuration, the value of a CNAME parameter must not include a protocol prefix such as "http://" or "https://".
///
///
/// If you update the S3BucketName of [CrlConfiguration](https://docs.aws.amazon.com/privateca/latest/APIReference/API_CrlConfiguration.html), you can break revocation for existing certificates. In other words, if you call [UpdateCertificateAuthority](https://docs.aws.amazon.com/privateca/latest/APIReference/API_UpdateCertificateAuthority.html) to update the CRL configuration's S3 bucket name, Amazon Web Services Private CA only writes CRLs to the new S3 bucket. Certificates issued prior to this point will have the old S3 bucket name in your CRL Distribution Point (CDP) extension, essentially breaking revocation. If you must update the S3 bucket, you'll need to reissue old certificates to keep the revocation working. Alternatively, you can use a [CustomCname](https://docs.aws.amazon.com/privateca/latest/APIReference/API_CrlConfiguration.html#privateca-Type-CrlConfiguration-CustomCname) in your CRL configuration if you might need to change the S3 bucket name in the future.
public var revocationConfiguration: ACMPCAClientTypes.RevocationConfiguration?
/// Status of your private CA.
public var status: ACMPCAClientTypes.CertificateAuthorityStatus?
Expand Down
6 changes: 3 additions & 3 deletions Sources/Services/AWSACMPCA/Sources/AWSACMPCA/Waiters.swift
Original file line number Diff line number Diff line change
Expand Up @@ -39,7 +39,7 @@ extension ACMPCAClient {
return (error as? ClientRuntime.ServiceError)?.typeName == "AccessDeniedException"
}),
]
return try SmithyWaitersAPI.WaiterConfiguration<DescribeCertificateAuthorityAuditReportInput, DescribeCertificateAuthorityAuditReportOutput>(acceptors: acceptors, minDelay: 3.0, maxDelay: 120.0)
return try SmithyWaitersAPI.WaiterConfiguration<DescribeCertificateAuthorityAuditReportInput, DescribeCertificateAuthorityAuditReportOutput>(acceptors: acceptors, minDelay: 3.0, maxDelay: 180.0)
}

/// Initiates waiting for the AuditReportCreated event on the describeCertificateAuthorityAuditReport operation.
Expand Down Expand Up @@ -75,7 +75,7 @@ extension ACMPCAClient {
return (error as? ClientRuntime.ServiceError)?.typeName == "AccessDeniedException"
}),
]
return try SmithyWaitersAPI.WaiterConfiguration<GetCertificateInput, GetCertificateOutput>(acceptors: acceptors, minDelay: 1.0, maxDelay: 120.0)
return try SmithyWaitersAPI.WaiterConfiguration<GetCertificateInput, GetCertificateOutput>(acceptors: acceptors, minDelay: 1.0, maxDelay: 60.0)
}

/// Initiates waiting for the CertificateIssued event on the getCertificate operation.
Expand Down Expand Up @@ -111,7 +111,7 @@ extension ACMPCAClient {
return (error as? ClientRuntime.ServiceError)?.typeName == "AccessDeniedException"
}),
]
return try SmithyWaitersAPI.WaiterConfiguration<GetCertificateAuthorityCsrInput, GetCertificateAuthorityCsrOutput>(acceptors: acceptors, minDelay: 3.0, maxDelay: 120.0)
return try SmithyWaitersAPI.WaiterConfiguration<GetCertificateAuthorityCsrInput, GetCertificateAuthorityCsrOutput>(acceptors: acceptors, minDelay: 3.0, maxDelay: 180.0)
}

/// Initiates waiting for the CertificateAuthorityCSRCreated event on the getCertificateAuthorityCsr operation.
Expand Down
Loading

0 comments on commit 4c084c0

Please sign in to comment.