Skip to content

Commit

Permalink
chore: Updates version to 0.19.0
Browse files Browse the repository at this point in the history
  • Loading branch information
aws-sdk-swift-automation committed Jun 21, 2023
1 parent 8f682b1 commit da209be
Show file tree
Hide file tree
Showing 768 changed files with 98,428 additions and 92,914 deletions.
5 changes: 4 additions & 1 deletion Package.swift
Original file line number Diff line number Diff line change
Expand Up @@ -169,7 +169,7 @@ func addProtocolTests() {
// MARK: - Generated

addDependencies(
clientRuntimeVersion: "0.21.0",
clientRuntimeVersion: "0.22.0",
crtVersion: "0.12.0"
)

Expand Down Expand Up @@ -237,6 +237,7 @@ let serviceTargets: [String] = [
"AWSCodeDeploy",
"AWSCodeGuruProfiler",
"AWSCodeGuruReviewer",
"AWSCodeGuruSecurity",
"AWSCodePipeline",
"AWSCodeStar",
"AWSCodeStarconnections",
Expand Down Expand Up @@ -415,6 +416,8 @@ let serviceTargets: [String] = [
"AWSOutposts",
"AWSPI",
"AWSPanorama",
"AWSPaymentCryptography",
"AWSPaymentCryptographyData",
"AWSPersonalize",
"AWSPersonalizeEvents",
"AWSPersonalizeRuntime",
Expand Down
2 changes: 1 addition & 1 deletion Package.version
Original file line number Diff line number Diff line change
@@ -1 +1 @@
0.18.0
0.19.0
211 changes: 43 additions & 168 deletions Sources/Services/AWSACM/ACMClient.swift

Large diffs are not rendered by default.

5 changes: 0 additions & 5 deletions Sources/Services/AWSACM/ACMClientProtocol.swift
Original file line number Diff line number Diff line change
@@ -1,6 +1,5 @@
// Code generated by smithy-swift-codegen. DO NOT EDIT!

@_spi(FileBasedConfig) import AWSClientRuntime
import ClientRuntime

/// Certificate Manager You can use Certificate Manager (ACM) to manage SSL/TLS certificates for your Amazon Web Services-based websites and applications. For more information about using ACM, see the [Certificate Manager User Guide](https://docs.aws.amazon.com/acm/latest/userguide/).
Expand Down Expand Up @@ -66,8 +65,4 @@ public protocol ACMClientProtocol {
func updateCertificateOptions(input: UpdateCertificateOptionsInput) async throws -> UpdateCertificateOptionsOutputResponse
}

public protocol ACMClientConfigurationProtocol : AWSClientRuntime.AWSClientConfiguration {
var endpointResolver: EndpointResolver { get }
}

public enum ACMClientTypes {}
243 changes: 59 additions & 184 deletions Sources/Services/AWSACMPCA/ACMPCAClient.swift

Large diffs are not rendered by default.

5 changes: 0 additions & 5 deletions Sources/Services/AWSACMPCA/ACMPCAClientProtocol.swift
Original file line number Diff line number Diff line change
@@ -1,6 +1,5 @@
// Code generated by smithy-swift-codegen. DO NOT EDIT!

@_spi(FileBasedConfig) import AWSClientRuntime
import ClientRuntime

/// This is the Amazon Web Services Private Certificate Authority API Reference. It provides descriptions, syntax, and usage examples for each of the actions and data types involved in creating and managing a private certificate authority (CA) for your organization. The documentation for each action shows the API request parameters and the JSON response. Alternatively, you can use one of the Amazon Web Services SDKs to access an API that is tailored to the programming language or platform that you prefer. For more information, see [Amazon Web Services SDKs](https://aws.amazon.com/tools/#SDKs). Each Amazon Web Services Private CA API operation has a quota that determines the number of times the operation can be called per second. Amazon Web Services Private CA throttles API requests at different rates depending on the operation. Throttling means that Amazon Web Services Private CA rejects an otherwise valid request because the request exceeds the operation's quota for the number of requests per second. When a request is throttled, Amazon Web Services Private CA returns a [ThrottlingException](https://docs.aws.amazon.com/acm-pca/latest/APIReference/CommonErrors.html) error. Amazon Web Services Private CA does not guarantee a minimum request rate for APIs. To see an up-to-date list of your Amazon Web Services Private CA quotas, or to request a quota increase, log into your Amazon Web Services account and visit the [Service Quotas](https://console.aws.amazon.com/servicequotas/) console.
Expand Down Expand Up @@ -185,8 +184,4 @@ public protocol ACMPCAClientProtocol {
func updateCertificateAuthority(input: UpdateCertificateAuthorityInput) async throws -> UpdateCertificateAuthorityOutputResponse
}

public protocol ACMPCAClientConfigurationProtocol : AWSClientRuntime.AWSClientConfiguration {
var endpointResolver: EndpointResolver { get }
}

public enum ACMPCAClientTypes {}
13 changes: 3 additions & 10 deletions Sources/Services/AWSACMPCA/models/Models.swift
Original file line number Diff line number Diff line change
Expand Up @@ -1122,14 +1122,7 @@ public struct CreateCertificateAuthorityInput: Swift.Equatable {
public var certificateAuthorityType: ACMPCAClientTypes.CertificateAuthorityType?
/// Custom string that can be used to distinguish between calls to the CreateCertificateAuthority action. Idempotency tokens for CreateCertificateAuthority time out after five minutes. Therefore, if you call CreateCertificateAuthority multiple times with the same idempotency token within five minutes, Amazon Web Services Private CA recognizes that you are requesting only certificate authority and will issue only one. If you change the idempotency token for each call, Amazon Web Services Private CA recognizes that you are requesting multiple certificate authorities.
public var idempotencyToken: Swift.String?
/// Specifies a cryptographic key management compliance standard used for handling CA keys. Default: FIPS_140_2_LEVEL_3_OR_HIGHER Note: FIPS_140_2_LEVEL_3_OR_HIGHER is not supported in the following Regions:
///
/// * ap-northeast-3
///
/// * ap-southeast-3
///
///
/// When creating a CA in these Regions, you must provide FIPS_140_2_LEVEL_2_OR_HIGHER as the argument for KeyStorageSecurityStandard. Failure to do this results in an InvalidArgsException with the message, "A certificate authority cannot be created in this region with the specified security standard."
/// Specifies a cryptographic key management compliance standard used for handling CA keys. Default: FIPS_140_2_LEVEL_3_OR_HIGHER Some Amazon Web Services Regions do not support the default. When creating a CA in these Regions, you must provide FIPS_140_2_LEVEL_2_OR_HIGHER as the argument for KeyStorageSecurityStandard. Failure to do this results in an InvalidArgsException with the message, "A certificate authority cannot be created in this region with the specified security standard." For information about security standard support in various Regions, see [Storage and security compliance of Amazon Web Services Private CA private keys](https://docs.aws.amazon.com/privateca/latest/userguide/data-protection.html#private-keys).
public var keyStorageSecurityStandard: ACMPCAClientTypes.KeyStorageSecurityStandard?
/// Contains information to enable Online Certificate Status Protocol (OCSP) support, to enable a certificate revocation list (CRL), to enable both, or to enable neither. The default is for both certificate validation mechanisms to be disabled. The following requirements apply to revocation configurations.
///
Expand Down Expand Up @@ -3568,15 +3561,15 @@ public struct IssueCertificateInput: Swift.Equatable {
public var csr: ClientRuntime.Data?
/// Alphanumeric string that can be used to distinguish between calls to the IssueCertificate action. Idempotency tokens for IssueCertificate time out after one minute. Therefore, if you call IssueCertificate multiple times with the same idempotency token within one minute, Amazon Web Services Private CA recognizes that you are requesting only one certificate and will issue only one. If you change the idempotency token for each call, Amazon Web Services Private CA recognizes that you are requesting multiple certificates.
public var idempotencyToken: Swift.String?
/// The name of the algorithm that will be used to sign the certificate to be issued. This parameter should not be confused with the SigningAlgorithm parameter used to sign a CSR in the CreateCertificateAuthority action. The specified signing algorithm family (RSA or ECDSA) much match the algorithm family of the CA's secret key.
/// The name of the algorithm that will be used to sign the certificate to be issued. This parameter should not be confused with the SigningAlgorithm parameter used to sign a CSR in the CreateCertificateAuthority action. The specified signing algorithm family (RSA or ECDSA) must match the algorithm family of the CA's secret key.
/// This member is required.
public var signingAlgorithm: ACMPCAClientTypes.SigningAlgorithm?
/// Specifies a custom configuration template to use when issuing a certificate. If this parameter is not provided, Amazon Web Services Private CA defaults to the EndEntityCertificate/V1 template. For CA certificates, you should choose the shortest path length that meets your needs. The path length is indicated by the PathLenN portion of the ARN, where N is the [CA depth](https://docs.aws.amazon.com/privateca/latest/userguide/PcaTerms.html#terms-cadepth). Note: The CA depth configured on a subordinate CA certificate must not exceed the limit set by its parents in the CA hierarchy. For a list of TemplateArn values supported by Amazon Web Services Private CA, see [Understanding Certificate Templates](https://docs.aws.amazon.com/privateca/latest/userguide/UsingTemplates.html).
public var templateArn: Swift.String?
/// Information describing the end of the validity period of the certificate. This parameter sets the “Not After” date for the certificate. Certificate validity is the period of time during which a certificate is valid. Validity can be expressed as an explicit date and time when the certificate expires, or as a span of time after issuance, stated in days, months, or years. For more information, see [Validity](https://datatracker.ietf.org/doc/html/rfc5280#section-4.1.2.5) in RFC 5280. This value is unaffected when ValidityNotBefore is also specified. For example, if Validity is set to 20 days in the future, the certificate will expire 20 days from issuance time regardless of the ValidityNotBefore value. The end of the validity period configured on a certificate must not exceed the limit set on its parents in the CA hierarchy.
/// This member is required.
public var validity: ACMPCAClientTypes.Validity?
/// Information describing the start of the validity period of the certificate. This parameter sets the “Not Before" date for the certificate. By default, when issuing a certificate, Amazon Web Services Private CA sets the "Not Before" date to the issuance time minus 60 minutes. This compensates for clock inconsistencies across computer systems. The ValidityNotBefore parameter can be used to customize the “Not Before” value. Unlike the Validity parameter, the ValidityNotBefore parameter is optional. The ValidityNotBefore value is expressed as an explicit date and time, using the Validity type value ABSOLUTE. For more information, see [Validity](https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_Validity.html) in this API reference and [Validity](https://datatracker.ietf.org/doc/html/rfc5280#section-4.1.2.5) in RFC 5280.
/// Information describing the start of the validity period of the certificate. This parameter sets the “Not Before" date for the certificate. By default, when issuing a certificate, Amazon Web Services Private CA sets the "Not Before" date to the issuance time minus 60 minutes. This compensates for clock inconsistencies across computer systems. The ValidityNotBefore parameter can be used to customize the “Not Before” value. Unlike the Validity parameter, the ValidityNotBefore parameter is optional. The ValidityNotBefore value is expressed as an explicit date and time, using the Validity type value ABSOLUTE. For more information, see [Validity](https://docs.aws.amazon.com/privateca/latest/APIReference/API_Validity.html) in this API reference and [Validity](https://datatracker.ietf.org/doc/html/rfc5280#section-4.1.2.5) in RFC 5280.
public var validityNotBefore: ACMPCAClientTypes.Validity?

public init(
Expand Down
Loading

0 comments on commit da209be

Please sign in to comment.