Skip to content

Commit

Permalink
This release updates our regex based validation rules in regards to v…
Browse files Browse the repository at this point in the history
…alid DbInstance and DbParameterGroup name.

Documentation updates for AWS Private CA.
Introduces DescribeDataMigrations, CreateDataMigration, ModifyDataMigration, DeleteDataMigration, StartDataMigration, StopDataMigration operations to SDK. Provides FailedDependencyFault error message.
This release adds support for assigning the billing of shared Amazon EC2 On-Demand Capacity Reservations.
Refine campaign related API validations
This is a documentation only release that updates to documentation to let customers know that Amazon Elastic Inference is no longer available.
Route 53 Resolver Forwarding Rules can now include a server name indication (SNI) in the target address for rules that use the DNS-over-HTTPS (DoH) protocol. When a DoH-enabled Outbound Resolver Endpoint forwards a request to a DoH server, it will provide the SNI in the TLS handshake.
Elastic Inference - Documentation update to add service shutdown notice.
Support for 16 m-NCU graphs available through account allowlisting
Adding new "DELIVERED" enum value for Outposts Order status
This release for AWS End User Messaging includes a public SDK, providing a suite of APIs that enable sending WhatsApp messages to end users.
  • Loading branch information
aws-sdk-cpp-automation committed Oct 10, 2024
1 parent cceb7ae commit 2826c73
Show file tree
Hide file tree
Showing 240 changed files with 20,213 additions and 1,023 deletions.
2 changes: 1 addition & 1 deletion VERSION
Original file line number Diff line number Diff line change
@@ -1 +1 @@
1.11.423
1.11.424
Original file line number Diff line number Diff line change
Expand Up @@ -144,19 +144,18 @@ namespace ACMPCA

/**
* <p>Creates an audit report that lists every time that your CA private key is
* used. The report is saved in the Amazon S3 bucket that you specify on input. The
* <a
* used to issue a certificate. The <a
* href="https://docs.aws.amazon.com/privateca/latest/APIReference/API_IssueCertificate.html">IssueCertificate</a>
* and <a
* href="https://docs.aws.amazon.com/privateca/latest/APIReference/API_RevokeCertificate.html">RevokeCertificate</a>
* actions use the private key. </p> <p>Both Amazon Web Services Private CA
* and the IAM principal must have permission to write to the S3 bucket that you
* specify. If the IAM principal making the call does not have permission to write
* to the bucket, then an exception is thrown. For more information, see <a
* href="https://docs.aws.amazon.com/privateca/latest/userguide/crl-planning.html#s3-policies">Access
* policies for CRLs in Amazon S3</a>.</p> <p>Amazon Web Services Private
* CA assets that are stored in Amazon S3 can be protected with encryption. For
* more information, see <a
* actions use the private key.</p> <p>To save the audit report to your designated
* Amazon S3 bucket, you must create a bucket policy that grants Amazon Web
* Services Private CA permission to access and write to it. For an example policy,
* see <a
* href="https://docs.aws.amazon.com/privateca/latest/userguide/PcaAuditReport.html#s3-access">Prepare
* an Amazon S3 bucket for audit reports</a>.</p> <p>Amazon Web Services Private CA
* assets that are stored in Amazon S3 can be protected with encryption. For more
* information, see <a
* href="https://docs.aws.amazon.com/privateca/latest/userguide/PcaAuditReport.html#audit-report-encryption">Encrypting
* Your Audit Reports</a>.</p> <p>You can generate a maximum of one report
* every 30 minutes.</p> <p><h3>See Also:</h3> <a
Expand Down Expand Up @@ -631,19 +630,20 @@ namespace ACMPCA
* size of a certificate chain is 2 MB.</p> </li> </ul> <p> <i>Enforcement of
* Critical Constraints</i> </p> <p>Amazon Web Services Private CA allows the
* following extensions to be marked critical in the imported CA certificate or
* chain.</p> <ul> <li> <p>Basic constraints (<i>must</i> be marked critical)</p>
* </li> <li> <p>Subject alternative names</p> </li> <li> <p>Key usage</p> </li>
* <li> <p>Extended key usage</p> </li> <li> <p>Authority key identifier</p> </li>
* <li> <p>Subject key identifier</p> </li> <li> <p>Issuer alternative name</p>
* </li> <li> <p>Subject directory attributes</p> </li> <li> <p>Subject information
* access</p> </li> <li> <p>Certificate policies</p> </li> <li> <p>Policy
* mappings</p> </li> <li> <p>Inhibit anyPolicy</p> </li> </ul> <p>Amazon Web
* Services Private CA rejects the following extensions when they are marked
* critical in an imported CA certificate or chain.</p> <ul> <li> <p>Name
* constraints</p> </li> <li> <p>Policy constraints</p> </li> <li> <p>CRL
* distribution points</p> </li> <li> <p>Authority information access</p> </li>
* <li> <p>Freshest CRL</p> </li> <li> <p>Any other extension</p> </li>
* </ul><p><h3>See Also:</h3> <a
* chain.</p> <ul> <li> <p>Authority key identifier</p> </li> <li> <p>Basic
* constraints (<i>must</i> be marked critical)</p> </li> <li> <p>Certificate
* policies</p> </li> <li> <p>Extended key usage</p> </li> <li> <p>Inhibit
* anyPolicy</p> </li> <li> <p>Issuer alternative name</p> </li> <li> <p>Key
* usage</p> </li> <li> <p>Name constraints</p> </li> <li> <p>Policy mappings</p>
* </li> <li> <p>Subject alternative name</p> </li> <li> <p>Subject directory
* attributes</p> </li> <li> <p>Subject key identifier</p> </li> <li> <p>Subject
* information access</p> </li> </ul> <p>Amazon Web Services Private CA rejects the
* following extensions when they are marked critical in an imported CA certificate
* or chain.</p> <ul> <li> <p>Authority information access</p> </li> <li> <p>CRL
* distribution points</p> </li> <li> <p>Freshest CRL</p> </li> <li> <p>Policy
* constraints</p> </li> </ul> <p>Amazon Web Services Private Certificate Authority
* will also reject any other extension marked as critical not contained on the
* preceding list of allowed extensions.</p><p><h3>See Also:</h3> <a
* href="http://docs.aws.amazon.com/goto/WebAPI/acm-pca-2017-08-22/ImportCertificateAuthorityCertificate">AWS
* API Reference</a></p>
*/
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -56,23 +56,23 @@ namespace Model

///@{
/**
* <p>Contains information to enable Online Certificate Status Protocol (OCSP)
* support, to enable a certificate revocation list (CRL), to enable both, or to
* enable neither. The default is for both certificate validation mechanisms to be
* disabled. </p> <p>The following requirements apply to revocation
* configurations.</p> <ul> <li> <p>A configuration disabling CRLs or OCSP must
* contain only the <code>Enabled=False</code> parameter, and will fail if other
* parameters such as <code>CustomCname</code> or <code>ExpirationInDays</code> are
* included.</p> </li> <li> <p>In a CRL configuration, the
* <code>S3BucketName</code> parameter must conform to <a
* <p>Contains information to enable support for Online Certificate Status Protocol
* (OCSP), certificate revocation list (CRL), both protocols, or neither. By
* default, both certificate validation mechanisms are disabled.</p> <p>The
* following requirements apply to revocation configurations.</p> <ul> <li> <p>A
* configuration disabling CRLs or OCSP must contain only the
* <code>Enabled=False</code> parameter, and will fail if other parameters such as
* <code>CustomCname</code> or <code>ExpirationInDays</code> are included.</p>
* </li> <li> <p>In a CRL configuration, the <code>S3BucketName</code> parameter
* must conform to <a
* href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/bucketnamingrules.html">Amazon
* S3 bucket naming rules</a>.</p> </li> <li> <p>A configuration containing a
* custom Canonical Name (CNAME) parameter for CRLs or OCSP must conform to <a
* href="https://www.ietf.org/rfc/rfc2396.txt">RFC2396</a> restrictions on the use
* of special characters in a CNAME. </p> </li> <li> <p>In a CRL or OCSP
* configuration, the value of a CNAME parameter must not include a protocol prefix
* such as "http://" or "https://".</p> </li> </ul> <p> For more
* information, see the <a
* such as "http://" or "https://".</p> </li> </ul> <p> For more information, see
* the <a
* href="https://docs.aws.amazon.com/privateca/latest/APIReference/API_OcspConfiguration.html">OcspConfiguration</a>
* and <a
* href="https://docs.aws.amazon.com/privateca/latest/APIReference/API_CrlConfiguration.html">CrlConfiguration</a>
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -55,26 +55,40 @@ namespace Model

///@{
/**
* <p>Contains information to enable Online Certificate Status Protocol (OCSP)
* support, to enable a certificate revocation list (CRL), to enable both, or to
* enable neither. If this parameter is not supplied, existing capibilites remain
* unchanged. For more information, see the <a
* <p>Contains information to enable support for Online Certificate Status Protocol
* (OCSP), certificate revocation list (CRL), both protocols, or neither. If you
* don't supply this parameter, existing capibilites remain unchanged. For more
* information, see the <a
* href="https://docs.aws.amazon.com/privateca/latest/APIReference/API_OcspConfiguration.html">OcspConfiguration</a>
* and <a
* href="https://docs.aws.amazon.com/privateca/latest/APIReference/API_CrlConfiguration.html">CrlConfiguration</a>
* types.</p> <p>The following requirements apply to revocation
* configurations.</p> <ul> <li> <p>A configuration disabling CRLs or OCSP must
* contain only the <code>Enabled=False</code> parameter, and will fail if other
* parameters such as <code>CustomCname</code> or <code>ExpirationInDays</code> are
* included.</p> </li> <li> <p>In a CRL configuration, the
* <code>S3BucketName</code> parameter must conform to <a
* types.</p> <p>The following requirements apply to revocation configurations.</p>
* <ul> <li> <p>A configuration disabling CRLs or OCSP must contain only the
* <code>Enabled=False</code> parameter, and will fail if other parameters such as
* <code>CustomCname</code> or <code>ExpirationInDays</code> are included.</p>
* </li> <li> <p>In a CRL configuration, the <code>S3BucketName</code> parameter
* must conform to <a
* href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/bucketnamingrules.html">Amazon
* S3 bucket naming rules</a>.</p> </li> <li> <p>A configuration containing a
* custom Canonical Name (CNAME) parameter for CRLs or OCSP must conform to <a
* href="https://www.ietf.org/rfc/rfc2396.txt">RFC2396</a> restrictions on the use
* of special characters in a CNAME. </p> </li> <li> <p>In a CRL or OCSP
* configuration, the value of a CNAME parameter must not include a protocol prefix
* such as "http://" or "https://".</p> </li> </ul>
* such as "http://" or "https://".</p> </li> </ul> <p> If you update
* the <code>S3BucketName</code> of <a
* href="https://docs.aws.amazon.com/privateca/latest/APIReference/API_CrlConfiguration.html">CrlConfiguration</a>,
* you can break revocation for existing certificates. In other words, if you call
* <a
* href="https://docs.aws.amazon.com/privateca/latest/APIReference/API_UpdateCertificateAuthority.html">UpdateCertificateAuthority</a>
* to update the CRL configuration's S3 bucket name, Amazon Web Services Private CA
* only writes CRLs to the new S3 bucket. Certificates issued prior to this point
* will have the old S3 bucket name in your CRL Distribution Point (CDP) extension,
* essentially breaking revocation. If you must update the S3 bucket, you'll need
* to reissue old certificates to keep the revocation working. Alternatively, you
* can use a <a
* href="https://docs.aws.amazon.com/privateca/latest/APIReference/API_CrlConfiguration.html#privateca-Type-CrlConfiguration-CustomCname">CustomCname</a>
* in your CRL configuration if you might need to change the S3 bucket name in the
* future.</p>
*/
inline const RevocationConfiguration& GetRevocationConfiguration() const{ return m_revocationConfiguration; }
inline bool RevocationConfigurationHasBeenSet() const { return m_revocationConfigurationHasBeenSet; }
Expand Down
Loading

0 comments on commit 2826c73

Please sign in to comment.