Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
4 changes: 2 additions & 2 deletions src/aws_accessanalyzer.erl
Original file line number Diff line number Diff line change
Expand Up @@ -116,8 +116,8 @@ create_archive_rule(Client, AnalyzerName, Input0, Options) ->
%% @doc Deletes the specified analyzer.
%%
%% When you delete an analyzer, Access Analyzer is disabled for the account
%% in the current or specific Region. All findings that were generated by the
%% analyzer are deleted. You cannot undo this action.
%% or organization in the current or specific Region. All findings that were
%% generated by the analyzer are deleted. You cannot undo this action.
delete_analyzer(Client, AnalyzerName, Input) ->
delete_analyzer(Client, AnalyzerName, Input, []).
delete_analyzer(Client, AnalyzerName, Input0, Options) ->
Expand Down
45 changes: 37 additions & 8 deletions src/aws_acm.erl
Original file line number Diff line number Diff line change
Expand Up @@ -3,11 +3,11 @@

%% @doc AWS Certificate Manager
%%
%% Welcome to the AWS Certificate Manager (ACM) API documentation.
%% You can use AWS Certificate Manager (ACM) to manage SSL/TLS certificates
%% for your AWS-based websites and applications.
%%
%% You can use ACM to manage SSL/TLS certificates for your AWS-based websites
%% and applications. For general information about using ACM, see the AWS
%% Certificate Manager User Guide .
%% For more information about using ACM, see the AWS Certificate Manager User
%% Guide.
-module(aws_acm).

-export([add_tags_to_certificate/2,
Expand All @@ -18,6 +18,8 @@
describe_certificate/3,
export_certificate/2,
export_certificate/3,
get_account_configuration/2,
get_account_configuration/3,
get_certificate/2,
get_certificate/3,
import_certificate/2,
Expand All @@ -26,6 +28,8 @@
list_certificates/3,
list_tags_for_certificate/2,
list_tags_for_certificate/3,
put_account_configuration/2,
put_account_configuration/3,
remove_tags_from_certificate/2,
remove_tags_from_certificate/3,
renew_certificate/2,
Expand Down Expand Up @@ -112,6 +116,15 @@ export_certificate(Client, Input, Options)
when is_map(Client), is_map(Input), is_list(Options) ->
request(Client, <<"ExportCertificate">>, Input, Options).

%% @doc Returns the account configuration options associated with an AWS
%% account.
get_account_configuration(Client, Input)
when is_map(Client), is_map(Input) ->
get_account_configuration(Client, Input, []).
get_account_configuration(Client, Input, Options)
when is_map(Client), is_map(Input), is_list(Options) ->
request(Client, <<"GetAccountConfiguration">>, Input, Options).

%% @doc Retrieves an Amazon-issued certificate and its certificate chain.
%%
%% The chain consists of the certificate of the issuing CA and the
Expand Down Expand Up @@ -145,6 +158,8 @@ get_certificate(Client, Input, Options)
%% </li> <li> The private key must be unencrypted. You cannot import a
%% private key that is protected by a password or a passphrase.
%%
%% </li> <li> The private key must be no larger than 5 KB (5,120 bytes).
%%
%% </li> <li> If the certificate you are importing is not self-signed, you
%% must enter its certificate chain.
%%
Expand All @@ -164,13 +179,13 @@ get_certificate(Client, Input, Options)
%%
%% </li> <li> To import a new certificate, omit the `CertificateArn'
%% argument. Include this argument only when you want to replace a previously
%% imported certifica
%% imported certificate.
%%
%% </li> <li> When you import a certificate by using the CLI, you must
%% specify the certificate, the certificate chain, and the private key by
%% their file names preceded by `file://'. For example, you can specify a
%% their file names preceded by `fileb://'. For example, you can specify a
%% certificate saved in the `C:\temp' folder as
%% `file://C:\temp\certificate_to_import.pem'. If you are making an HTTP or
%% `fileb://C:\temp\certificate_to_import.pem'. If you are making an HTTP or
%% HTTPS Query request, include these arguments as BLOBs.
%%
%% </li> <li> When you import a certificate by using an SDK, you must specify
Expand Down Expand Up @@ -216,6 +231,20 @@ list_tags_for_certificate(Client, Input, Options)
when is_map(Client), is_map(Input), is_list(Options) ->
request(Client, <<"ListTagsForCertificate">>, Input, Options).

%% @doc Adds or modifies account-level configurations in ACM.
%%
%% The supported configuration option is `DaysBeforeExpiry'. This option
%% specifies the number of days prior to certificate expiration when ACM
%% starts generating `EventBridge' events. ACM sends one event per day per
%% certificate until the certificate expires. By default, accounts receive
%% events starting 45 days before certificate expiration.
put_account_configuration(Client, Input)
when is_map(Client), is_map(Input) ->
put_account_configuration(Client, Input, []).
put_account_configuration(Client, Input, Options)
when is_map(Client), is_map(Input), is_list(Options) ->
request(Client, <<"PutAccountConfiguration">>, Input, Options).

%% @doc Remove one or more tags from an ACM certificate.
%%
%% A tag consists of a key-value pair. If you do not specify the value
Expand All @@ -233,7 +262,7 @@ remove_tags_from_certificate(Client, Input, Options)
when is_map(Client), is_map(Input), is_list(Options) ->
request(Client, <<"RemoveTagsFromCertificate">>, Input, Options).

%% @doc Renews an eligable ACM certificate.
%% @doc Renews an eligible ACM certificate.
%%
%% At this time, only exported private certificates can be renewed with this
%% operation. In order to renew your ACM PCA certificates with ACM, you must
Expand Down
55 changes: 31 additions & 24 deletions src/aws_acm_pca.erl
Original file line number Diff line number Diff line change
@@ -1,9 +1,7 @@
%% WARNING: DO NOT EDIT, AUTO-GENERATED CODE!
%% See https://github.com/aws-beam/aws-codegen for more details.

%% @doc
%%
%% This is the ACM Private CA API Reference.
%% @doc This is the ACM Private CA API Reference.
%%
%% It provides descriptions, syntax, and usage examples for each of the
%% actions and data types involved in creating and managing private
Expand Down Expand Up @@ -249,8 +247,8 @@ delete_permission(Client, Input, Options)
%% Service Linked Role with ACM.
%%
%% </li> <li> Updates made in AWS Resource Manager (RAM) are reflected in
%% policies. For more information, see Using AWS Resource Access Manager
%% (RAM) with ACM Private CA.
%% policies. For more information, see Attach a Policy for Cross-Account
%% Access.
%%
%% </li> </ul>
delete_policy(Client, Input)
Expand Down Expand Up @@ -280,7 +278,7 @@ delete_policy(Client, Input, Options)
%% </li> <li> `EXPIRED' - Your private CA certificate has expired.
%%
%% </li> <li> `FAILED' - Your private CA has failed. Your CA can fail because
%% of problems such a network outage or backend AWS failure or other errors.
%% of problems such a network outage or back-end AWS failure or other errors.
%% A failed CA can never return to the pending state. You must create a new
%% CA.
%%
Expand Down Expand Up @@ -379,8 +377,8 @@ get_certificate_authority_csr(Client, Input, Options)
%% Service Linked Role with ACM.
%%
%% </li> <li> Updates made in AWS Resource Manager (RAM) are reflected in
%% policies. For more information, see Using AWS Resource Access Manager
%% (RAM) with ACM Private CA.
%% policies. For more information, see Attach a Policy for Cross-Account
%% Access.
%%
%% </li> </ul>
get_policy(Client, Input)
Expand All @@ -397,8 +395,7 @@ get_policy(Client, Input, Options)
%% following preparations must in place:
%%
%% <ol> <li> In ACM Private CA, call the CreateCertificateAuthority action to
%% create the private CA that that you plan to back with the imported
%% certificate.
%% create the private CA that you plan to back with the imported certificate.
%%
%% </li> <li> Call the GetCertificateAuthorityCsr action to generate a
%% certificate signing request (CSR).
Expand All @@ -409,23 +406,32 @@ get_policy(Client, Input, Options)
%% </li> <li> Create a certificate chain and copy the signed certificate and
%% the certificate chain to your working directory.
%%
%% </li> </ol> The following requirements apply when you import a CA
%% certificate.
%% </li> </ol> ACM Private CA supports three scenarios for installing a CA
%% certificate:
%%
%% <ul> <li> Installing a certificate for a root CA hosted by ACM Private CA.
%%
%% </li> <li> Installing a subordinate CA certificate whose parent authority
%% is hosted by ACM Private CA.
%%
%% <ul> <li> You cannot import a non-self-signed certificate for use as a
%% root CA.
%% </li> <li> Installing a subordinate CA certificate whose parent authority
%% is externally hosted.
%%
%% </li> <li> You cannot import a self-signed certificate for use as a
%% subordinate CA.
%% </li> </ul> The following additional requirements apply when you import a
%% CA certificate.
%%
%% <ul> <li> Only a self-signed certificate can be imported as a root CA.
%%
%% </li> <li> A self-signed certificate cannot be imported as a subordinate
%% CA.
%%
%% </li> <li> Your certificate chain must not include the private CA
%% certificate that you are importing.
%%
%% </li> <li> Your ACM Private CA-hosted or on-premises CA certificate must
%% be the last certificate in your chain. The subordinate certificate, if
%% any, that your root CA signed must be next to last. The subordinate
%% certificate signed by the preceding subordinate CA must come next, and so
%% on until your chain is built.
%% </li> <li> Your root CA must be the last certificate in your chain. The
%% subordinate certificate, if any, that your root CA signed must be next to
%% last. The subordinate certificate signed by the preceding subordinate CA
%% must come next, and so on until your chain is built.
%%
%% </li> <li> The chain must be PEM-encoded.
%%
Expand Down Expand Up @@ -559,7 +565,8 @@ list_tags(Client, Input, Options)
%% @doc Attaches a resource-based policy to a private CA.
%%
%% A policy can also be applied by sharing a private CA through AWS Resource
%% Access Manager (RAM).
%% Access Manager (RAM). For more information, see Attach a Policy for
%% Cross-Account Access.
%%
%% The policy can be displayed with GetPolicy and removed with DeletePolicy.
%%
Expand All @@ -580,8 +587,8 @@ list_tags(Client, Input, Options)
%% Service Linked Role with ACM.
%%
%% </li> <li> Updates made in AWS Resource Manager (RAM) are reflected in
%% policies. For more information, see Using AWS Resource Access Manager
%% (RAM) with ACM Private CA.
%% policies. For more information, see Attach a Policy for Cross-Account
%% Access.
%%
%% </li> </ul>
put_policy(Client, Input)
Expand Down
7 changes: 7 additions & 0 deletions src/aws_alexa_for_business.erl
Original file line number Diff line number Diff line change
Expand Up @@ -795,6 +795,13 @@ reject_skill(Client, Input, Options)
%% invoked.
%%
%% This operation is used by skill developers.
%%
%% To query ResolveRoom from an Alexa skill, the skill ID needs to be
%% authorized. When the skill is using an AWS Lambda function, the skill is
%% automatically authorized when you publish your skill as a private skill to
%% your AWS account. Skills that are hosted using a custom web service must
%% be manually authorized. To get your skill authorized, contact AWS Support
%% with your AWS account ID that queries the ResolveRoom API and skill ID.
resolve_room(Client, Input)
when is_map(Client), is_map(Input) ->
resolve_room(Client, Input, []).
Expand Down
Loading