Skip to content

Commit bf647e5

Browse files
chore: Updates version to 1.5.12
1 parent bb8690f commit bf647e5

File tree

438 files changed

+11322
-788
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

438 files changed

+11322
-788
lines changed

Package.swift

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -27,6 +27,7 @@ let serviceTargets: [String] = [
2727
"AWSACMPCA",
2828
"AWSAIOps",
2929
"AWSAPIGateway",
30+
"AWSARCRegionswitch",
3031
"AWSARCZonalShift",
3132
"AWSAccessAnalyzer",
3233
"AWSAccount",

Package.version

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
1.5.11
1+
1.5.12

Package.version.next

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
1.5.12
1+
1.5.13

Sources/Core/AWSSDKForSwift/Documentation.docc/AWSSDKForSwift.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -85,6 +85,8 @@ This SDK is open-source. Code is available on Github [here](https://github.com/
8585

8686
[AWSAPIGateway](../../../../../swift/api/awsapigateway/latest)
8787

88+
[AWSARCRegionswitch](../../../../../swift/api/awsarcregionswitch/latest)
89+
8890
[AWSARCZonalShift](../../../../../swift/api/awsarczonalshift/latest)
8991

9092
[AWSAccessAnalyzer](../../../../../swift/api/awsaccessanalyzer/latest)

Sources/Core/AWSSDKIdentity/Sources/InternalAWSSSO/SSOClient.swift

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@ import typealias SmithyHTTPAuthAPI.AuthSchemes
6262

6363
internal class SSOClient: ClientRuntime.Client {
6464
public static let clientName = "SSOClient"
65-
public static let version = "1.5.11"
65+
public static let version = "1.5.12"
6666
let client: ClientRuntime.SdkHttpClient
6767
let config: SSOClient.SSOClientConfiguration
6868
let serviceName = "SSO"

Sources/Core/AWSSDKIdentity/Sources/InternalAWSSSOOIDC/SSOOIDCClient.swift

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -65,7 +65,7 @@ import typealias SmithyHTTPAuthAPI.AuthSchemes
6565

6666
internal class SSOOIDCClient: ClientRuntime.Client {
6767
public static let clientName = "SSOOIDCClient"
68-
public static let version = "1.5.11"
68+
public static let version = "1.5.12"
6969
let client: ClientRuntime.SdkHttpClient
7070
let config: SSOOIDCClient.SSOOIDCClientConfiguration
7171
let serviceName = "SSO OIDC"

Sources/Core/AWSSDKIdentity/Sources/InternalAWSSTS/STSClient.swift

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -65,7 +65,7 @@ import typealias SmithyHTTPAuthAPI.AuthSchemes
6565

6666
internal class STSClient: ClientRuntime.Client {
6767
public static let clientName = "STSClient"
68-
public static let version = "1.5.11"
68+
public static let version = "1.5.12"
6969
let client: ClientRuntime.SdkHttpClient
7070
let config: STSClient.STSClientConfiguration
7171
let serviceName = "STS"

Sources/Services/AWSACM/Sources/AWSACM/ACMClient.swift

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -67,7 +67,7 @@ import typealias SmithyHTTPAuthAPI.AuthSchemes
6767

6868
public class ACMClient: ClientRuntime.Client {
6969
public static let clientName = "ACMClient"
70-
public static let version = "1.5.11"
70+
public static let version = "1.5.12"
7171
let client: ClientRuntime.SdkHttpClient
7272
let config: ACMClient.ACMClientConfiguration
7373
let serviceName = "ACM"

Sources/Services/AWSACMPCA/Sources/AWSACMPCA/ACMPCAClient.swift

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -67,7 +67,7 @@ import typealias SmithyHTTPAuthAPI.AuthSchemes
6767

6868
public class ACMPCAClient: ClientRuntime.Client {
6969
public static let clientName = "ACMPCAClient"
70-
public static let version = "1.5.11"
70+
public static let version = "1.5.12"
7171
let client: ClientRuntime.SdkHttpClient
7272
let config: ACMPCAClient.ACMPCAClientConfiguration
7373
let serviceName = "ACM PCA"
@@ -594,7 +594,7 @@ extension ACMPCAClient {
594594

595595
/// Performs the `DeleteCertificateAuthority` operation on the `ACMPCA` service.
596596
///
597-
/// Deletes a private certificate authority (CA). You must provide the Amazon Resource Name (ARN) of the private CA that you want to delete. You can find the ARN by calling the [ListCertificateAuthorities](https://docs.aws.amazon.com/privateca/latest/APIReference/API_ListCertificateAuthorities.html) action. Deleting a CA will invalidate other CAs and certificates below it in your CA hierarchy. Before you can delete a CA that you have created and activated, you must disable it. To do this, call the [UpdateCertificateAuthority](https://docs.aws.amazon.com/privateca/latest/APIReference/API_UpdateCertificateAuthority.html) action and set the CertificateAuthorityStatus parameter to DISABLED. Additionally, you can delete a CA if you are waiting for it to be created (that is, the status of the CA is CREATING). You can also delete it if the CA has been created but you haven't yet imported the signed certificate into Amazon Web Services Private CA (that is, the status of the CA is PENDING_CERTIFICATE). When you successfully call [DeleteCertificateAuthority](https://docs.aws.amazon.com/privateca/latest/APIReference/API_DeleteCertificateAuthority.html), the CA's status changes to DELETED. However, the CA won't be permanently deleted until the restoration period has passed. By default, if you do not set the PermanentDeletionTimeInDays parameter, the CA remains restorable for 30 days. You can set the parameter from 7 to 30 days. The [DescribeCertificateAuthority](https://docs.aws.amazon.com/privateca/latest/APIReference/API_DescribeCertificateAuthority.html) action returns the time remaining in the restoration window of a private CA in the DELETED state. To restore an eligible CA, call the [RestoreCertificateAuthority](https://docs.aws.amazon.com/privateca/latest/APIReference/API_RestoreCertificateAuthority.html) action.
597+
/// Deletes a private certificate authority (CA). You must provide the Amazon Resource Name (ARN) of the private CA that you want to delete. You can find the ARN by calling the [ListCertificateAuthorities](https://docs.aws.amazon.com/privateca/latest/APIReference/API_ListCertificateAuthorities.html) action. Deleting a CA will invalidate other CAs and certificates below it in your CA hierarchy. Before you can delete a CA that you have created and activated, you must disable it. To do this, call the [UpdateCertificateAuthority](https://docs.aws.amazon.com/privateca/latest/APIReference/API_UpdateCertificateAuthority.html) action and set the CertificateAuthorityStatus parameter to DISABLED. Additionally, you can delete a CA if you are waiting for it to be created (that is, the status of the CA is CREATING). You can also delete it if the CA has been created but you haven't yet imported the signed certificate into Amazon Web Services Private CA (that is, the status of the CA is PENDING_CERTIFICATE). When you successfully call [DeleteCertificateAuthority](https://docs.aws.amazon.com/privateca/latest/APIReference/API_DeleteCertificateAuthority.html), the CA's status changes to DELETED. However, the CA won't be permanently deleted until the restoration period has passed. By default, if you do not set the PermanentDeletionTimeInDays parameter, the CA remains restorable for 30 days. You can set the parameter from 7 to 30 days. The [DescribeCertificateAuthority](https://docs.aws.amazon.com/privateca/latest/APIReference/API_DescribeCertificateAuthority.html) action returns the time remaining in the restoration window of a private CA in the DELETED state. To restore an eligible CA, call the [RestoreCertificateAuthority](https://docs.aws.amazon.com/privateca/latest/APIReference/API_RestoreCertificateAuthority.html) action. A private CA can be deleted if it is in the PENDING_CERTIFICATE, CREATING, EXPIRED, DISABLED, or FAILED state. To delete a CA in the ACTIVE state, you must first disable it, or else the delete request results in an exception. If you are deleting a private CA in the PENDING_CERTIFICATE or DISABLED state, you can set the length of its restoration period to 7-30 days. The default is 30. During this time, the status is set to DELETED and the CA can be restored. A private CA deleted in the CREATING or FAILED state has no assigned restoration period and cannot be restored.
598598
///
599599
/// - Parameter DeleteCertificateAuthorityInput : [no documentation found]
600600
///
@@ -976,7 +976,7 @@ extension ACMPCAClient {
976976

977977
/// Performs the `GetCertificate` operation on the `ACMPCA` service.
978978
///
979-
/// Retrieves a certificate from your private CA or one that has been shared with you. The ARN of the certificate is returned when you call the [IssueCertificate](https://docs.aws.amazon.com/privateca/latest/APIReference/API_IssueCertificate.html) action. You must specify both the ARN of your private CA and the ARN of the issued certificate when calling the GetCertificate action. You can retrieve the certificate if it is in the ISSUED state. You can call the [CreateCertificateAuthorityAuditReport](https://docs.aws.amazon.com/privateca/latest/APIReference/API_CreateCertificateAuthorityAuditReport.html) action to create a report that contains information about all of the certificates issued and revoked by your private CA.
979+
/// Retrieves a certificate from your private CA or one that has been shared with you. The ARN of the certificate is returned when you call the [IssueCertificate](https://docs.aws.amazon.com/privateca/latest/APIReference/API_IssueCertificate.html) action. You must specify both the ARN of your private CA and the ARN of the issued certificate when calling the GetCertificate action. You can retrieve the certificate if it is in the ISSUED, EXPIRED, or REVOKED state. You can call the [CreateCertificateAuthorityAuditReport](https://docs.aws.amazon.com/privateca/latest/APIReference/API_CreateCertificateAuthorityAuditReport.html) action to create a report that contains information about all of the certificates issued and revoked by your private CA.
980980
///
981981
/// - Parameter GetCertificateInput : [no documentation found]
982982
///

Sources/Services/AWSACMPCA/Sources/AWSACMPCA/Models.swift

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -927,7 +927,7 @@ public struct CreateCertificateAuthorityInput: Swift.Sendable {
927927
public var certificateAuthorityType: ACMPCAClientTypes.CertificateAuthorityType?
928928
/// Custom string that can be used to distinguish between calls to the CreateCertificateAuthority action. Idempotency tokens for CreateCertificateAuthority time out after five minutes. Therefore, if you call CreateCertificateAuthority multiple times with the same idempotency token within five minutes, Amazon Web Services Private CA recognizes that you are requesting only certificate authority and will issue only one. If you change the idempotency token for each call, Amazon Web Services Private CA recognizes that you are requesting multiple certificate authorities.
929929
public var idempotencyToken: Swift.String?
930-
/// Specifies a cryptographic key management compliance standard used for handling CA keys. Default: FIPS_140_2_LEVEL_3_OR_HIGHER Some Amazon Web Services Regions do not support the default. When creating a CA in these Regions, you must provide FIPS_140_2_LEVEL_2_OR_HIGHER as the argument for KeyStorageSecurityStandard. Failure to do this results in an InvalidArgsException with the message, "A certificate authority cannot be created in this region with the specified security standard." For information about security standard support in various Regions, see [Storage and security compliance of Amazon Web Services Private CA private keys](https://docs.aws.amazon.com/privateca/latest/userguide/data-protection.html#private-keys).
930+
/// Specifies a cryptographic key management compliance standard for handling and protecting CA keys. Default: FIPS_140_2_LEVEL_3_OR_HIGHER Some Amazon Web Services Regions don't support the default value. When you create a CA in these Regions, you must use CCPC_LEVEL_1_OR_HIGHER for the KeyStorageSecurityStandard parameter. If you don't, the operation returns an InvalidArgsException with this message: "A certificate authority cannot be created in this region with the specified security standard." For information about security standard support in different Amazon Web Services Regions, see [Storage and security compliance of Amazon Web Services Private CA private keys](https://docs.aws.amazon.com/privateca/latest/userguide/data-protection.html#private-keys).
931931
public var keyStorageSecurityStandard: ACMPCAClientTypes.KeyStorageSecurityStandard?
932932
/// Contains information to enable support for Online Certificate Status Protocol (OCSP), certificate revocation list (CRL), both protocols, or neither. By default, both certificate validation mechanisms are disabled. The following requirements apply to revocation configurations.
933933
///
@@ -1434,7 +1434,7 @@ extension ACMPCAClientTypes {
14341434
public var createdAt: Foundation.Date?
14351435
/// Reason the request to create your private CA failed.
14361436
public var failureReason: ACMPCAClientTypes.FailureReason?
1437-
/// Defines a cryptographic key management compliance standard used for handling CA keys. Default: FIPS_140_2_LEVEL_3_OR_HIGHER Note: Amazon Web Services Region ap-northeast-3 supports only FIPS_140_2_LEVEL_2_OR_HIGHER. You must explicitly specify this parameter and value when creating a CA in that Region. Specifying a different value (or no value) results in an InvalidArgsException with the message "A certificate authority cannot be created in this region with the specified security standard."
1437+
/// Defines a cryptographic key management compliance standard for handling and protecting CA keys. Default: FIPS_140_2_LEVEL_3_OR_HIGHER Starting January 26, 2023, Amazon Web Services Private CA protects all CA private keys in non-China regions using hardware security modules (HSMs) that comply with FIPS PUB 140-2 Level 3. For information about security standard support in different Amazon Web Services Regions, see [Storage and security compliance of Amazon Web Services Private CA private keys](https://docs.aws.amazon.com/privateca/latest/userguide/data-protection.html#private-keys).
14381438
public var keyStorageSecurityStandard: ACMPCAClientTypes.KeyStorageSecurityStandard?
14391439
/// Date and time at which your private CA was last updated.
14401440
public var lastStateChangeAt: Foundation.Date?

0 commit comments

Comments
 (0)