Skip to content

Commit

Permalink
chore: AWS model files renamed without version (#1634)
Browse files Browse the repository at this point in the history
  • Loading branch information
jbelkins authored Jul 16, 2024
1 parent 4593a21 commit bce9336
Show file tree
Hide file tree
Showing 497 changed files with 65,085 additions and 12,345 deletions.
4 changes: 2 additions & 2 deletions .github/workflows/model-integration.yml
Original file line number Diff line number Diff line change
Expand Up @@ -43,8 +43,8 @@ jobs:
with:
distribution: corretto
java-version: 17
- name: Install OpenSSL
run: apt-get -q update && apt-get -q install -y libssl-dev
- name: Install OpenSSL & jq
run: apt-get -q update && apt-get -q install -y libssl-dev jq
- name: Tools Versions
run: ./scripts/ci_steps/log_tool_versions.sh
- name: Update models from aws/aws-models repo
Expand Down
1 change: 1 addition & 0 deletions Package.swift
Original file line number Diff line number Diff line change
Expand Up @@ -546,6 +546,7 @@ let serviceTargets: [String] = [
"AWSPricing",
"AWSPrivateNetworks",
"AWSProton",
"AWSQApps",
"AWSQBusiness",
"AWSQConnect",
"AWSQLDB",
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -577,6 +577,8 @@ This SDK is open-source. Code is available on Github [here](https://github.com/

[AWSProton](../../../../../swift/api/awsproton/latest)

[AWSQApps](../../../../../swift/api/awsqapps/latest)

[AWSQBusiness](../../../../../swift/api/awsqbusiness/latest)

[AWSQConnect](../../../../../swift/api/awsqconnect/latest)
Expand Down
8 changes: 2 additions & 6 deletions Sources/Services/AWSACM/Sources/AWSACM/ACMClient.swift
Original file line number Diff line number Diff line change
Expand Up @@ -441,7 +441,7 @@ extension ACMClient {

/// Performs the `GetCertificate` operation on the `CertificateManager` service.
///
/// Retrieves an Amazon-issued certificate and its certificate chain. The chain consists of the certificate of the issuing CA and the intermediate certificates of any other subordinate CAs. All of the certificates are base64 encoded. You can use [OpenSSL](https://wiki.openssl.org/index.php/Command_Line_Utilities) to decode the certificates and inspect individual fields.
/// Retrieves a certificate and its certificate chain. The certificate may be either a public or private certificate issued using the ACM RequestCertificate action, or a certificate imported into ACM using the ImportCertificate action. The chain consists of the certificate of the issuing CA and the intermediate certificates of any other subordinate CAs. All of the certificates are base64 encoded. You can use [OpenSSL](https://wiki.openssl.org/index.php/Command_Line_Utilities) to decode the certificates and inspect individual fields.
///
/// - Parameter GetCertificateInput : [no documentation found]
///
Expand Down Expand Up @@ -500,10 +500,6 @@ extension ACMClient {
///
/// * The private key must be no larger than 5 KB (5,120 bytes).
///
/// * If the certificate you are importing is not self-signed, you must enter its certificate chain.
///
/// * If a certificate chain is included, the issuer must be the subject of one of the certificates in the chain.
///
/// * The certificate, private key, and certificate chain must be PEM-encoded.
///
/// * The current time must be between the Not Before and Not After certificate fields.
Expand Down Expand Up @@ -576,7 +572,7 @@ extension ACMClient {

/// Performs the `ListCertificates` operation on the `CertificateManager` service.
///
/// Retrieves a list of certificate ARNs and domain names. You can request that only certificates that match a specific status be listed. You can also filter by specific attributes of the certificate. Default filtering returns only RSA_2048 certificates. For more information, see [Filters].
/// Retrieves a list of certificate ARNs and domain names. By default, the API returns RSA_2048 certificates. To return all certificates in the account, include the keyType filter with the values [RSA_1024, RSA_2048, RSA_3072, RSA_4096, EC_prime256v1, EC_secp384r1, EC_secp521r1]. In addition to keyType, you can also filter by the CertificateStatuses, keyUsage, and extendedKeyUsage attributes on the certificate. For more information, see [Filters].
///
/// - Parameter ListCertificatesInput : [no documentation found]
///
Expand Down
15 changes: 12 additions & 3 deletions Sources/Services/AWSACM/Sources/AWSACM/Models.swift
Original file line number Diff line number Diff line change
Expand Up @@ -1581,7 +1581,7 @@ extension ACMClientTypes {
public var exported: Swift.Bool?
/// Contains a list of Extended Key Usage X.509 v3 extension objects. Each object specifies a purpose for which the certificate public key can be used and consists of a name and an object identifier (OID).
public var extendedKeyUsages: [ACMClientTypes.ExtendedKeyUsageName]?
/// When called by [ListCertificates](https://docs.aws.amazon.com/acm/latestAPIReference/API_ListCertificates.html), indicates whether the full list of subject alternative names has been included in the response. If false, the response includes all of the subject alternative names included in the certificate. If true, the response only includes the first 100 subject alternative names included in the certificate. To display the full list of subject alternative names, use [DescribeCertificate](https://docs.aws.amazon.com/acm/latestAPIReference/API_DescribeCertificate.html).
/// When called by [ListCertificates], indicates whether the full list of subject alternative names has been included in the response. If false, the response includes all of the subject alternative names included in the certificate. If true, the response only includes the first 100 subject alternative names included in the certificate. To display the full list of subject alternative names, use [DescribeCertificate].
public var hasAdditionalSubjectAlternativeNames: Swift.Bool?
/// The date and time when the certificate was imported. This value exists only when the certificate type is IMPORTED.
public var importedAt: Foundation.Date?
Expand All @@ -1603,7 +1603,7 @@ extension ACMClientTypes {
public var revokedAt: Foundation.Date?
/// The status of the certificate. A certificate enters status PENDING_VALIDATION upon being requested, unless it fails for any of the reasons given in the troubleshooting topic [Certificate request fails](https://docs.aws.amazon.com/acm/latest/userguide/troubleshooting-failed.html). ACM makes repeated attempts to validate a certificate for 72 hours and then times out. If a certificate shows status FAILED or VALIDATION_TIMED_OUT, delete the request, correct the issue with [DNS validation](https://docs.aws.amazon.com/acm/latest/userguide/dns-validation.html) or [Email validation](https://docs.aws.amazon.com/acm/latest/userguide/email-validation.html), and try again. If validation succeeds, the certificate enters status ISSUED.
public var status: ACMClientTypes.CertificateStatus?
/// One or more domain names (subject alternative names) included in the certificate. This list contains the domain names that are bound to the public key that is contained in the certificate. The subject alternative names include the canonical domain name (CN) of the certificate and additional domain names that can be used to connect to the website. When called by [ListCertificates](https://docs.aws.amazon.com/acm/latestAPIReference/API_ListCertificates.html), this parameter will only return the first 100 subject alternative names included in the certificate. To display the full list of subject alternative names, use [DescribeCertificate](https://docs.aws.amazon.com/acm/latestAPIReference/API_DescribeCertificate.html).
/// One or more domain names (subject alternative names) included in the certificate. This list contains the domain names that are bound to the public key that is contained in the certificate. The subject alternative names include the canonical domain name (CN) of the certificate and additional domain names that can be used to connect to the website. When called by [ListCertificates], this parameter will only return the first 100 subject alternative names included in the certificate. To display the full list of subject alternative names, use [DescribeCertificate].
public var subjectAlternativeNameSummaries: [Swift.String]?
/// The source of the certificate. For certificates provided by ACM, this value is AMAZON_ISSUED. For certificates that you imported with [ImportCertificate], this value is IMPORTED. ACM does not provide [managed renewal](https://docs.aws.amazon.com/acm/latest/userguide/acm-renewal.html) for imported certificates. For more information about the differences between certificates that you import and those that ACM provides, see [Importing Certificates](https://docs.aws.amazon.com/acm/latest/userguide/import-certificate.html) in the Certificate Manager User Guide.
public var type: ACMClientTypes.CertificateType?
Expand Down Expand Up @@ -1807,7 +1807,16 @@ public struct RequestCertificateInput {
public var domainValidationOptions: [ACMClientTypes.DomainValidationOption]?
/// Customer chosen string that can be used to distinguish between calls to RequestCertificate. Idempotency tokens time out after one hour. Therefore, if you call RequestCertificate multiple times with the same idempotency token within one hour, ACM recognizes that you are requesting only one certificate and will issue only one. If you change the idempotency token for each call, ACM recognizes that you are requesting multiple certificates.
public var idempotencyToken: Swift.String?
/// Specifies the algorithm of the public and private key pair that your certificate uses to encrypt data. RSA is the default key algorithm for ACM certificates. Elliptic Curve Digital Signature Algorithm (ECDSA) keys are smaller, offering security comparable to RSA keys but with greater computing efficiency. However, ECDSA is not supported by all network clients. Some AWS services may require RSA keys, or only support ECDSA keys of a particular size, while others allow the use of either RSA and ECDSA keys to ensure that compatibility is not broken. Check the requirements for the AWS service where you plan to deploy your certificate. Default: RSA_2048
/// Specifies the algorithm of the public and private key pair that your certificate uses to encrypt data. RSA is the default key algorithm for ACM certificates. Elliptic Curve Digital Signature Algorithm (ECDSA) keys are smaller, offering security comparable to RSA keys but with greater computing efficiency. However, ECDSA is not supported by all network clients. Some Amazon Web Services services may require RSA keys, or only support ECDSA keys of a particular size, while others allow the use of either RSA and ECDSA keys to ensure that compatibility is not broken. Check the requirements for the Amazon Web Services service where you plan to deploy your certificate. For more information about selecting an algorithm, see [Key algorithms](https://docs.aws.amazon.com/acm/latest/userguide/acm-certificate.html#algorithms). Algorithms supported for an ACM certificate request include:
///
/// * RSA_2048
///
/// * EC_prime256v1
///
/// * EC_secp384r1
///
///
/// Other listed algorithms are for imported certificates only. When you request a private PKI certificate signed by a CA from Amazon Web Services Private CA, the specified signing algorithm family (RSA or ECDSA) must match the algorithm family of the CA's secret key. Default: RSA_2048
public var keyAlgorithm: ACMClientTypes.KeyAlgorithm?
/// Currently, you can use this parameter to specify whether to add the certificate to a certificate transparency log. Certificate transparency makes it possible to detect SSL/TLS certificates that have been mistakenly or maliciously issued. Certificates that have not been logged typically produce an error message in a browser. For more information, see [Opting Out of Certificate Transparency Logging](https://docs.aws.amazon.com/acm/latest/userguide/acm-bestpractices.html#best-practices-transparency).
public var options: ACMClientTypes.CertificateOptions?
Expand Down
33 changes: 16 additions & 17 deletions Sources/Services/AWSACMPCA/Sources/AWSACMPCA/ACMPCAClient.swift
Original file line number Diff line number Diff line change
Expand Up @@ -890,45 +890,44 @@ extension ACMPCAClient {
///
/// Enforcement of Critical Constraints Amazon Web Services Private CA allows the following extensions to be marked critical in the imported CA certificate or chain.
///
/// * Authority key identifier
///
/// * Basic constraints (must be marked critical)
///
/// * Certificate policies
/// * Subject alternative names
///
/// * Key usage
///
/// * Extended key usage
///
/// * Inhibit anyPolicy
/// * Authority key identifier
///
/// * Subject key identifier
///
/// * Issuer alternative name
///
/// * Key usage
/// * Subject directory attributes
///
/// * Name constraints
/// * Subject information access
///
/// * Certificate policies
///
/// * Policy mappings
///
/// * Subject alternative name
/// * Inhibit anyPolicy
///
/// * Subject directory attributes
///
/// * Subject key identifier
/// Amazon Web Services Private CA rejects the following extensions when they are marked critical in an imported CA certificate or chain.
///
/// * Subject information access
/// * Name constraints
///
/// * Policy constraints
///
/// Amazon Web Services Private CA rejects the following extensions when they are marked critical in an imported CA certificate or chain.
/// * CRL distribution points
///
/// * Authority information access
///
/// * CRL distribution points
///
/// * Freshest CRL
///
/// * Policy constraints
///
///
/// Amazon Web Services Private Certificate Authority will also reject any other extension marked as critical not contained on the preceding list of allowed extensions.
/// * Any other extension
///
/// - Parameter ImportCertificateAuthorityCertificateInput : [no documentation found]
///
Expand Down
13 changes: 11 additions & 2 deletions Sources/Services/AWSACMPCA/Sources/AWSACMPCA/Models.swift
Original file line number Diff line number Diff line change
Expand Up @@ -502,14 +502,16 @@ extension ACMPCAClientTypes {
case ecSecp384r1
case rsa2048
case rsa4096
case sm2
case sdkUnknown(Swift.String)

public static var allCases: [KeyAlgorithm] {
return [
.ecPrime256v1,
.ecSecp384r1,
.rsa2048,
.rsa4096
.rsa4096,
.sm2
]
}

Expand All @@ -524,6 +526,7 @@ extension ACMPCAClientTypes {
case .ecSecp384r1: return "EC_secp384r1"
case .rsa2048: return "RSA_2048"
case .rsa4096: return "RSA_4096"
case .sm2: return "SM2"
case let .sdkUnknown(s): return s
}
}
Expand All @@ -539,6 +542,7 @@ extension ACMPCAClientTypes {
case sha384withrsa
case sha512withecdsa
case sha512withrsa
case sm3withsm2
case sdkUnknown(Swift.String)

public static var allCases: [SigningAlgorithm] {
Expand All @@ -548,7 +552,8 @@ extension ACMPCAClientTypes {
.sha384withecdsa,
.sha384withrsa,
.sha512withecdsa,
.sha512withrsa
.sha512withrsa,
.sm3withsm2
]
}

Expand All @@ -565,6 +570,7 @@ extension ACMPCAClientTypes {
case .sha384withrsa: return "SHA384WITHRSA"
case .sha512withecdsa: return "SHA512WITHECDSA"
case .sha512withrsa: return "SHA512WITHRSA"
case .sm3withsm2: return "SM3WITHSM2"
case let .sdkUnknown(s): return s
}
}
Expand Down Expand Up @@ -634,12 +640,14 @@ extension ACMPCAClientTypes {
extension ACMPCAClientTypes {

public enum KeyStorageSecurityStandard: Swift.Equatable, Swift.RawRepresentable, Swift.CaseIterable, Swift.Hashable {
case ccpcLevel1OrHigher
case fips1402Level2OrHigher
case fips1402Level3OrHigher
case sdkUnknown(Swift.String)

public static var allCases: [KeyStorageSecurityStandard] {
return [
.ccpcLevel1OrHigher,
.fips1402Level2OrHigher,
.fips1402Level3OrHigher
]
Expand All @@ -652,6 +660,7 @@ extension ACMPCAClientTypes {

public var rawValue: Swift.String {
switch self {
case .ccpcLevel1OrHigher: return "CCPC_LEVEL_1_OR_HIGHER"
case .fips1402Level2OrHigher: return "FIPS_140_2_LEVEL_2_OR_HIGHER"
case .fips1402Level3OrHigher: return "FIPS_140_2_LEVEL_3_OR_HIGHER"
case let .sdkUnknown(s): return s
Expand Down
Loading

0 comments on commit bce9336

Please sign in to comment.