UNPKG

47.8 kBTypeScriptView Raw
1import {Request} from '../lib/request';
2import {Response} from '../lib/response';
3import {AWSError} from '../lib/error';
4import {Service} from '../lib/service';
5import {WaiterConfiguration} from '../lib/service';
6import {ServiceConfigurationOptions} from '../lib/service';
7import {ConfigBase as Config} from '../lib/config';
8interface Blob {}
9declare class ACM extends Service {
10 /**
11 * Constructs a service object. This object has one method for each API operation.
12 */
13 constructor(options?: ACM.Types.ClientConfiguration)
14 config: Config & ACM.Types.ClientConfiguration;
15 /**
16 * Adds one or more tags to an ACM certificate. Tags are labels that you can use to identify and organize your AWS resources. Each tag consists of a key and an optional value. You specify the certificate on input by its Amazon Resource Name (ARN). You specify the tag by using a key-value pair. You can apply a tag to just one certificate if you want to identify a specific characteristic of that certificate, or you can apply the same tag to multiple certificates if you want to filter for a common relationship among those certificates. Similarly, you can apply the same tag to multiple resources if you want to specify a relationship among those resources. For example, you can add the same tag to an ACM certificate and an Elastic Load Balancing load balancer to indicate that they are both used by the same website. For more information, see Tagging ACM certificates. To remove one or more tags, use the RemoveTagsFromCertificate action. To view all of the tags that have been applied to the certificate, use the ListTagsForCertificate action.
17 */
18 addTagsToCertificate(params: ACM.Types.AddTagsToCertificateRequest, callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
19 /**
20 * Adds one or more tags to an ACM certificate. Tags are labels that you can use to identify and organize your AWS resources. Each tag consists of a key and an optional value. You specify the certificate on input by its Amazon Resource Name (ARN). You specify the tag by using a key-value pair. You can apply a tag to just one certificate if you want to identify a specific characteristic of that certificate, or you can apply the same tag to multiple certificates if you want to filter for a common relationship among those certificates. Similarly, you can apply the same tag to multiple resources if you want to specify a relationship among those resources. For example, you can add the same tag to an ACM certificate and an Elastic Load Balancing load balancer to indicate that they are both used by the same website. For more information, see Tagging ACM certificates. To remove one or more tags, use the RemoveTagsFromCertificate action. To view all of the tags that have been applied to the certificate, use the ListTagsForCertificate action.
21 */
22 addTagsToCertificate(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
23 /**
24 * Deletes a certificate and its associated private key. If this action succeeds, the certificate no longer appears in the list that can be displayed by calling the ListCertificates action or be retrieved by calling the GetCertificate action. The certificate will not be available for use by AWS services integrated with ACM. You cannot delete an ACM certificate that is being used by another AWS service. To delete a certificate that is in use, the certificate association must first be removed.
25 */
26 deleteCertificate(params: ACM.Types.DeleteCertificateRequest, callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
27 /**
28 * Deletes a certificate and its associated private key. If this action succeeds, the certificate no longer appears in the list that can be displayed by calling the ListCertificates action or be retrieved by calling the GetCertificate action. The certificate will not be available for use by AWS services integrated with ACM. You cannot delete an ACM certificate that is being used by another AWS service. To delete a certificate that is in use, the certificate association must first be removed.
29 */
30 deleteCertificate(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
31 /**
32 * Returns detailed metadata about the specified ACM certificate.
33 */
34 describeCertificate(params: ACM.Types.DescribeCertificateRequest, callback?: (err: AWSError, data: ACM.Types.DescribeCertificateResponse) => void): Request<ACM.Types.DescribeCertificateResponse, AWSError>;
35 /**
36 * Returns detailed metadata about the specified ACM certificate.
37 */
38 describeCertificate(callback?: (err: AWSError, data: ACM.Types.DescribeCertificateResponse) => void): Request<ACM.Types.DescribeCertificateResponse, AWSError>;
39 /**
40 * Exports a private certificate issued by a private certificate authority (CA) for use anywhere. You can export the certificate, the certificate chain, and the encrypted private key associated with the public key embedded in the certificate. You must store the private key securely. The private key is a 2048 bit RSA key. You must provide a passphrase for the private key when exporting it. You can use the following OpenSSL command to decrypt it later. Provide the passphrase when prompted. openssl rsa -in encrypted_key.pem -out decrypted_key.pem
41 */
42 exportCertificate(params: ACM.Types.ExportCertificateRequest, callback?: (err: AWSError, data: ACM.Types.ExportCertificateResponse) => void): Request<ACM.Types.ExportCertificateResponse, AWSError>;
43 /**
44 * Exports a private certificate issued by a private certificate authority (CA) for use anywhere. You can export the certificate, the certificate chain, and the encrypted private key associated with the public key embedded in the certificate. You must store the private key securely. The private key is a 2048 bit RSA key. You must provide a passphrase for the private key when exporting it. You can use the following OpenSSL command to decrypt it later. Provide the passphrase when prompted. openssl rsa -in encrypted_key.pem -out decrypted_key.pem
45 */
46 exportCertificate(callback?: (err: AWSError, data: ACM.Types.ExportCertificateResponse) => void): Request<ACM.Types.ExportCertificateResponse, AWSError>;
47 /**
48 * Retrieves a certificate specified by an ARN and its certificate chain . The chain is an ordered list of certificates that contains the end entity certificate, intermediate certificates of subordinate CAs, and the root certificate in that order. The certificate and certificate chain are base64 encoded. If you want to decode the certificate to see the individual fields, you can use OpenSSL.
49 */
50 getCertificate(params: ACM.Types.GetCertificateRequest, callback?: (err: AWSError, data: ACM.Types.GetCertificateResponse) => void): Request<ACM.Types.GetCertificateResponse, AWSError>;
51 /**
52 * Retrieves a certificate specified by an ARN and its certificate chain . The chain is an ordered list of certificates that contains the end entity certificate, intermediate certificates of subordinate CAs, and the root certificate in that order. The certificate and certificate chain are base64 encoded. If you want to decode the certificate to see the individual fields, you can use OpenSSL.
53 */
54 getCertificate(callback?: (err: AWSError, data: ACM.Types.GetCertificateResponse) => void): Request<ACM.Types.GetCertificateResponse, AWSError>;
55 /**
56 * Imports a certificate into AWS Certificate Manager (ACM) to use with services that are integrated with ACM. Note that integrated services allow only certificate types and keys they support to be associated with their resources. Further, their support differs depending on whether the certificate is imported into IAM or into ACM. For more information, see the documentation for each service. For more information about importing certificates into ACM, see Importing Certificates in the AWS Certificate Manager User Guide. ACM does not provide managed renewal for certificates that you import. Note the following guidelines when importing third party certificates: You must enter the private key that matches the certificate you are importing. The private key must be unencrypted. You cannot import a private key that is protected by a password or a passphrase. If the certificate you are importing is not self-signed, you must enter its certificate chain. If a certificate chain is included, the issuer must be the subject of one of the certificates in the chain. The certificate, private key, and certificate chain must be PEM-encoded. The current time must be between the Not Before and Not After certificate fields. The Issuer field must not be empty. The OCSP authority URL, if present, must not exceed 1000 characters. To import a new certificate, omit the CertificateArn argument. Include this argument only when you want to replace a previously imported certificate. When you import a certificate by using the CLI, you must specify the certificate, the certificate chain, and the private key by their file names preceded by file://. For example, you can specify a certificate saved in the C:\temp folder as file://C:\temp\certificate_to_import.pem. If you are making an HTTP or HTTPS Query request, include these arguments as BLOBs. When you import a certificate by using an SDK, you must specify the certificate, the certificate chain, and the private key files in the manner required by the programming language you're using. This operation returns the Amazon Resource Name (ARN) of the imported certificate.
57 */
58 importCertificate(params: ACM.Types.ImportCertificateRequest, callback?: (err: AWSError, data: ACM.Types.ImportCertificateResponse) => void): Request<ACM.Types.ImportCertificateResponse, AWSError>;
59 /**
60 * Imports a certificate into AWS Certificate Manager (ACM) to use with services that are integrated with ACM. Note that integrated services allow only certificate types and keys they support to be associated with their resources. Further, their support differs depending on whether the certificate is imported into IAM or into ACM. For more information, see the documentation for each service. For more information about importing certificates into ACM, see Importing Certificates in the AWS Certificate Manager User Guide. ACM does not provide managed renewal for certificates that you import. Note the following guidelines when importing third party certificates: You must enter the private key that matches the certificate you are importing. The private key must be unencrypted. You cannot import a private key that is protected by a password or a passphrase. If the certificate you are importing is not self-signed, you must enter its certificate chain. If a certificate chain is included, the issuer must be the subject of one of the certificates in the chain. The certificate, private key, and certificate chain must be PEM-encoded. The current time must be between the Not Before and Not After certificate fields. The Issuer field must not be empty. The OCSP authority URL, if present, must not exceed 1000 characters. To import a new certificate, omit the CertificateArn argument. Include this argument only when you want to replace a previously imported certificate. When you import a certificate by using the CLI, you must specify the certificate, the certificate chain, and the private key by their file names preceded by file://. For example, you can specify a certificate saved in the C:\temp folder as file://C:\temp\certificate_to_import.pem. If you are making an HTTP or HTTPS Query request, include these arguments as BLOBs. When you import a certificate by using an SDK, you must specify the certificate, the certificate chain, and the private key files in the manner required by the programming language you're using. This operation returns the Amazon Resource Name (ARN) of the imported certificate.
61 */
62 importCertificate(callback?: (err: AWSError, data: ACM.Types.ImportCertificateResponse) => void): Request<ACM.Types.ImportCertificateResponse, AWSError>;
63 /**
64 * Retrieves a list of certificate ARNs and domain names. You can request that only certificates that match a specific status be listed. You can also filter by specific attributes of the certificate.
65 */
66 listCertificates(params: ACM.Types.ListCertificatesRequest, callback?: (err: AWSError, data: ACM.Types.ListCertificatesResponse) => void): Request<ACM.Types.ListCertificatesResponse, AWSError>;
67 /**
68 * Retrieves a list of certificate ARNs and domain names. You can request that only certificates that match a specific status be listed. You can also filter by specific attributes of the certificate.
69 */
70 listCertificates(callback?: (err: AWSError, data: ACM.Types.ListCertificatesResponse) => void): Request<ACM.Types.ListCertificatesResponse, AWSError>;
71 /**
72 * Lists the tags that have been applied to the ACM certificate. Use the certificate's Amazon Resource Name (ARN) to specify the certificate. To add a tag to an ACM certificate, use the AddTagsToCertificate action. To delete a tag, use the RemoveTagsFromCertificate action.
73 */
74 listTagsForCertificate(params: ACM.Types.ListTagsForCertificateRequest, callback?: (err: AWSError, data: ACM.Types.ListTagsForCertificateResponse) => void): Request<ACM.Types.ListTagsForCertificateResponse, AWSError>;
75 /**
76 * Lists the tags that have been applied to the ACM certificate. Use the certificate's Amazon Resource Name (ARN) to specify the certificate. To add a tag to an ACM certificate, use the AddTagsToCertificate action. To delete a tag, use the RemoveTagsFromCertificate action.
77 */
78 listTagsForCertificate(callback?: (err: AWSError, data: ACM.Types.ListTagsForCertificateResponse) => void): Request<ACM.Types.ListTagsForCertificateResponse, AWSError>;
79 /**
80 * Remove one or more tags from an ACM certificate. A tag consists of a key-value pair. If you do not specify the value portion of the tag when calling this function, the tag will be removed regardless of value. If you specify a value, the tag is removed only if it is associated with the specified value. To add tags to a certificate, use the AddTagsToCertificate action. To view all of the tags that have been applied to a specific ACM certificate, use the ListTagsForCertificate action.
81 */
82 removeTagsFromCertificate(params: ACM.Types.RemoveTagsFromCertificateRequest, callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
83 /**
84 * Remove one or more tags from an ACM certificate. A tag consists of a key-value pair. If you do not specify the value portion of the tag when calling this function, the tag will be removed regardless of value. If you specify a value, the tag is removed only if it is associated with the specified value. To add tags to a certificate, use the AddTagsToCertificate action. To view all of the tags that have been applied to a specific ACM certificate, use the ListTagsForCertificate action.
85 */
86 removeTagsFromCertificate(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
87 /**
88 * Renews an eligable ACM certificate. At this time, only exported private certificates can be renewed with this operation. In order to renew your ACM PCA certificates with ACM, you must first grant the ACM service principal permission to do so. For more information, see Testing Managed Renewal in the ACM User Guide.
89 */
90 renewCertificate(params: ACM.Types.RenewCertificateRequest, callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
91 /**
92 * Renews an eligable ACM certificate. At this time, only exported private certificates can be renewed with this operation. In order to renew your ACM PCA certificates with ACM, you must first grant the ACM service principal permission to do so. For more information, see Testing Managed Renewal in the ACM User Guide.
93 */
94 renewCertificate(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
95 /**
96 * Requests an ACM certificate for use with other AWS services. To request an ACM certificate, you must specify a fully qualified domain name (FQDN) in the DomainName parameter. You can also specify additional FQDNs in the SubjectAlternativeNames parameter. If you are requesting a private certificate, domain validation is not required. If you are requesting a public certificate, each domain name that you specify must be validated to verify that you own or control the domain. You can use DNS validation or email validation. We recommend that you use DNS validation. ACM issues public certificates after receiving approval from the domain owner.
97 */
98 requestCertificate(params: ACM.Types.RequestCertificateRequest, callback?: (err: AWSError, data: ACM.Types.RequestCertificateResponse) => void): Request<ACM.Types.RequestCertificateResponse, AWSError>;
99 /**
100 * Requests an ACM certificate for use with other AWS services. To request an ACM certificate, you must specify a fully qualified domain name (FQDN) in the DomainName parameter. You can also specify additional FQDNs in the SubjectAlternativeNames parameter. If you are requesting a private certificate, domain validation is not required. If you are requesting a public certificate, each domain name that you specify must be validated to verify that you own or control the domain. You can use DNS validation or email validation. We recommend that you use DNS validation. ACM issues public certificates after receiving approval from the domain owner.
101 */
102 requestCertificate(callback?: (err: AWSError, data: ACM.Types.RequestCertificateResponse) => void): Request<ACM.Types.RequestCertificateResponse, AWSError>;
103 /**
104 * Resends the email that requests domain ownership validation. The domain owner or an authorized representative must approve the ACM certificate before it can be issued. The certificate can be approved by clicking a link in the mail to navigate to the Amazon certificate approval website and then clicking I Approve. However, the validation email can be blocked by spam filters. Therefore, if you do not receive the original mail, you can request that the mail be resent within 72 hours of requesting the ACM certificate. If more than 72 hours have elapsed since your original request or since your last attempt to resend validation mail, you must request a new certificate. For more information about setting up your contact email addresses, see Configure Email for your Domain.
105 */
106 resendValidationEmail(params: ACM.Types.ResendValidationEmailRequest, callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
107 /**
108 * Resends the email that requests domain ownership validation. The domain owner or an authorized representative must approve the ACM certificate before it can be issued. The certificate can be approved by clicking a link in the mail to navigate to the Amazon certificate approval website and then clicking I Approve. However, the validation email can be blocked by spam filters. Therefore, if you do not receive the original mail, you can request that the mail be resent within 72 hours of requesting the ACM certificate. If more than 72 hours have elapsed since your original request or since your last attempt to resend validation mail, you must request a new certificate. For more information about setting up your contact email addresses, see Configure Email for your Domain.
109 */
110 resendValidationEmail(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
111 /**
112 * Updates a certificate. Currently, you can use this function to specify whether to opt in to or out of recording your certificate in a certificate transparency log. For more information, see Opting Out of Certificate Transparency Logging.
113 */
114 updateCertificateOptions(params: ACM.Types.UpdateCertificateOptionsRequest, callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
115 /**
116 * Updates a certificate. Currently, you can use this function to specify whether to opt in to or out of recording your certificate in a certificate transparency log. For more information, see Opting Out of Certificate Transparency Logging.
117 */
118 updateCertificateOptions(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
119 /**
120 * Waits for the certificateValidated state by periodically calling the underlying ACM.describeCertificateoperation every 60 seconds (at most 40 times).
121 */
122 waitFor(state: "certificateValidated", params: ACM.Types.DescribeCertificateRequest & {$waiter?: WaiterConfiguration}, callback?: (err: AWSError, data: ACM.Types.DescribeCertificateResponse) => void): Request<ACM.Types.DescribeCertificateResponse, AWSError>;
123 /**
124 * Waits for the certificateValidated state by periodically calling the underlying ACM.describeCertificateoperation every 60 seconds (at most 40 times).
125 */
126 waitFor(state: "certificateValidated", callback?: (err: AWSError, data: ACM.Types.DescribeCertificateResponse) => void): Request<ACM.Types.DescribeCertificateResponse, AWSError>;
127}
128declare namespace ACM {
129 export interface AddTagsToCertificateRequest {
130 /**
131 * String that contains the ARN of the ACM certificate to which the tag is to be applied. This must be of the form: arn:aws:acm:region:123456789012:certificate/12345678-1234-1234-1234-123456789012 For more information about ARNs, see Amazon Resource Names (ARNs) and AWS Service Namespaces.
132 */
133 CertificateArn: Arn;
134 /**
135 * The key-value pair that defines the tag. The tag value is optional.
136 */
137 Tags: TagList;
138 }
139 export type Arn = string;
140 export type CertificateBody = string;
141 export type CertificateBodyBlob = Buffer|Uint8Array|Blob|string;
142 export type CertificateChain = string;
143 export type CertificateChainBlob = Buffer|Uint8Array|Blob|string;
144 export interface CertificateDetail {
145 /**
146 * The Amazon Resource Name (ARN) of the certificate. For more information about ARNs, see Amazon Resource Names (ARNs) and AWS Service Namespaces in the AWS General Reference.
147 */
148 CertificateArn?: Arn;
149 /**
150 * The fully qualified domain name for the certificate, such as www.example.com or example.com.
151 */
152 DomainName?: DomainNameString;
153 /**
154 * One or more domain names (subject alternative names) included in the certificate. This list contains the domain names that are bound to the public key that is contained in the certificate. The subject alternative names include the canonical domain name (CN) of the certificate and additional domain names that can be used to connect to the website.
155 */
156 SubjectAlternativeNames?: DomainList;
157 /**
158 * Contains information about the initial validation of each domain name that occurs as a result of the RequestCertificate request. This field exists only when the certificate type is AMAZON_ISSUED.
159 */
160 DomainValidationOptions?: DomainValidationList;
161 /**
162 * The serial number of the certificate.
163 */
164 Serial?: String;
165 /**
166 * The name of the entity that is associated with the public key contained in the certificate.
167 */
168 Subject?: String;
169 /**
170 * The name of the certificate authority that issued and signed the certificate.
171 */
172 Issuer?: String;
173 /**
174 * The time at which the certificate was requested. This value exists only when the certificate type is AMAZON_ISSUED.
175 */
176 CreatedAt?: TStamp;
177 /**
178 * The time at which the certificate was issued. This value exists only when the certificate type is AMAZON_ISSUED.
179 */
180 IssuedAt?: TStamp;
181 /**
182 * The date and time at which the certificate was imported. This value exists only when the certificate type is IMPORTED.
183 */
184 ImportedAt?: TStamp;
185 /**
186 * The status of the certificate.
187 */
188 Status?: CertificateStatus;
189 /**
190 * The time at which the certificate was revoked. This value exists only when the certificate status is REVOKED.
191 */
192 RevokedAt?: TStamp;
193 /**
194 * The reason the certificate was revoked. This value exists only when the certificate status is REVOKED.
195 */
196 RevocationReason?: RevocationReason;
197 /**
198 * The time before which the certificate is not valid.
199 */
200 NotBefore?: TStamp;
201 /**
202 * The time after which the certificate is not valid.
203 */
204 NotAfter?: TStamp;
205 /**
206 * The algorithm that was used to generate the public-private key pair.
207 */
208 KeyAlgorithm?: KeyAlgorithm;
209 /**
210 * The algorithm that was used to sign the certificate.
211 */
212 SignatureAlgorithm?: String;
213 /**
214 * A list of ARNs for the AWS resources that are using the certificate. A certificate can be used by multiple AWS resources.
215 */
216 InUseBy?: InUseList;
217 /**
218 * The reason the certificate request failed. This value exists only when the certificate status is FAILED. For more information, see Certificate Request Failed in the AWS Certificate Manager User Guide.
219 */
220 FailureReason?: FailureReason;
221 /**
222 * The source of the certificate. For certificates provided by ACM, this value is AMAZON_ISSUED. For certificates that you imported with ImportCertificate, this value is IMPORTED. ACM does not provide managed renewal for imported certificates. For more information about the differences between certificates that you import and those that ACM provides, see Importing Certificates in the AWS Certificate Manager User Guide.
223 */
224 Type?: CertificateType;
225 /**
226 * Contains information about the status of ACM's managed renewal for the certificate. This field exists only when the certificate type is AMAZON_ISSUED.
227 */
228 RenewalSummary?: RenewalSummary;
229 /**
230 * A list of Key Usage X.509 v3 extension objects. Each object is a string value that identifies the purpose of the public key contained in the certificate. Possible extension values include DIGITAL_SIGNATURE, KEY_ENCHIPHERMENT, NON_REPUDIATION, and more.
231 */
232 KeyUsages?: KeyUsageList;
233 /**
234 * Contains a list of Extended Key Usage X.509 v3 extension objects. Each object specifies a purpose for which the certificate public key can be used and consists of a name and an object identifier (OID).
235 */
236 ExtendedKeyUsages?: ExtendedKeyUsageList;
237 /**
238 * The Amazon Resource Name (ARN) of the ACM PCA private certificate authority (CA) that issued the certificate. This has the following format: arn:aws:acm-pca:region:account:certificate-authority/12345678-1234-1234-1234-123456789012
239 */
240 CertificateAuthorityArn?: Arn;
241 /**
242 * Specifies whether the certificate is eligible for renewal. At this time, only exported private certificates can be renewed with the RenewCertificate command.
243 */
244 RenewalEligibility?: RenewalEligibility;
245 /**
246 * Value that specifies whether to add the certificate to a transparency log. Certificate transparency makes it possible to detect SSL certificates that have been mistakenly or maliciously issued. A browser might respond to certificate that has not been logged by showing an error message. The logs are cryptographically secure.
247 */
248 Options?: CertificateOptions;
249 }
250 export interface CertificateOptions {
251 /**
252 * You can opt out of certificate transparency logging by specifying the DISABLED option. Opt in by specifying ENABLED.
253 */
254 CertificateTransparencyLoggingPreference?: CertificateTransparencyLoggingPreference;
255 }
256 export type CertificateStatus = "PENDING_VALIDATION"|"ISSUED"|"INACTIVE"|"EXPIRED"|"VALIDATION_TIMED_OUT"|"REVOKED"|"FAILED"|string;
257 export type CertificateStatuses = CertificateStatus[];
258 export interface CertificateSummary {
259 /**
260 * Amazon Resource Name (ARN) of the certificate. This is of the form: arn:aws:acm:region:123456789012:certificate/12345678-1234-1234-1234-123456789012 For more information about ARNs, see Amazon Resource Names (ARNs) and AWS Service Namespaces.
261 */
262 CertificateArn?: Arn;
263 /**
264 * Fully qualified domain name (FQDN), such as www.example.com or example.com, for the certificate.
265 */
266 DomainName?: DomainNameString;
267 }
268 export type CertificateSummaryList = CertificateSummary[];
269 export type CertificateTransparencyLoggingPreference = "ENABLED"|"DISABLED"|string;
270 export type CertificateType = "IMPORTED"|"AMAZON_ISSUED"|"PRIVATE"|string;
271 export interface DeleteCertificateRequest {
272 /**
273 * String that contains the ARN of the ACM certificate to be deleted. This must be of the form: arn:aws:acm:region:123456789012:certificate/12345678-1234-1234-1234-123456789012 For more information about ARNs, see Amazon Resource Names (ARNs) and AWS Service Namespaces.
274 */
275 CertificateArn: Arn;
276 }
277 export interface DescribeCertificateRequest {
278 /**
279 * The Amazon Resource Name (ARN) of the ACM certificate. The ARN must have the following form: arn:aws:acm:region:123456789012:certificate/12345678-1234-1234-1234-123456789012 For more information about ARNs, see Amazon Resource Names (ARNs) and AWS Service Namespaces.
280 */
281 CertificateArn: Arn;
282 }
283 export interface DescribeCertificateResponse {
284 /**
285 * Metadata about an ACM certificate.
286 */
287 Certificate?: CertificateDetail;
288 }
289 export type DomainList = DomainNameString[];
290 export type DomainNameString = string;
291 export type DomainStatus = "PENDING_VALIDATION"|"SUCCESS"|"FAILED"|string;
292 export interface DomainValidation {
293 /**
294 * A fully qualified domain name (FQDN) in the certificate. For example, www.example.com or example.com.
295 */
296 DomainName: DomainNameString;
297 /**
298 * A list of email addresses that ACM used to send domain validation emails.
299 */
300 ValidationEmails?: ValidationEmailList;
301 /**
302 * The domain name that ACM used to send domain validation emails.
303 */
304 ValidationDomain?: DomainNameString;
305 /**
306 * The validation status of the domain name. This can be one of the following values: PENDING_VALIDATION SUCCESS FAILED
307 */
308 ValidationStatus?: DomainStatus;
309 /**
310 * Contains the CNAME record that you add to your DNS database for domain validation. For more information, see Use DNS to Validate Domain Ownership.
311 */
312 ResourceRecord?: ResourceRecord;
313 /**
314 * Specifies the domain validation method.
315 */
316 ValidationMethod?: ValidationMethod;
317 }
318 export type DomainValidationList = DomainValidation[];
319 export interface DomainValidationOption {
320 /**
321 * A fully qualified domain name (FQDN) in the certificate request.
322 */
323 DomainName: DomainNameString;
324 /**
325 * The domain name that you want ACM to use to send you validation emails. This domain name is the suffix of the email addresses that you want ACM to use. This must be the same as the DomainName value or a superdomain of the DomainName value. For example, if you request a certificate for testing.example.com, you can specify example.com for this value. In that case, ACM sends domain validation emails to the following five addresses: admin@example.com administrator@example.com hostmaster@example.com postmaster@example.com webmaster@example.com
326 */
327 ValidationDomain: DomainNameString;
328 }
329 export type DomainValidationOptionList = DomainValidationOption[];
330 export interface ExportCertificateRequest {
331 /**
332 * An Amazon Resource Name (ARN) of the issued certificate. This must be of the form: arn:aws:acm:region:account:certificate/12345678-1234-1234-1234-123456789012
333 */
334 CertificateArn: Arn;
335 /**
336 * Passphrase to associate with the encrypted exported private key. If you want to later decrypt the private key, you must have the passphrase. You can use the following OpenSSL command to decrypt a private key: openssl rsa -in encrypted_key.pem -out decrypted_key.pem
337 */
338 Passphrase: PassphraseBlob;
339 }
340 export interface ExportCertificateResponse {
341 /**
342 * The base64 PEM-encoded certificate.
343 */
344 Certificate?: CertificateBody;
345 /**
346 * The base64 PEM-encoded certificate chain. This does not include the certificate that you are exporting.
347 */
348 CertificateChain?: CertificateChain;
349 /**
350 * The encrypted private key associated with the public key in the certificate. The key is output in PKCS #8 format and is base64 PEM-encoded.
351 */
352 PrivateKey?: PrivateKey;
353 }
354 export interface ExtendedKeyUsage {
355 /**
356 * The name of an Extended Key Usage value.
357 */
358 Name?: ExtendedKeyUsageName;
359 /**
360 * An object identifier (OID) for the extension value. OIDs are strings of numbers separated by periods. The following OIDs are defined in RFC 3280 and RFC 5280. 1.3.6.1.5.5.7.3.1 (TLS_WEB_SERVER_AUTHENTICATION) 1.3.6.1.5.5.7.3.2 (TLS_WEB_CLIENT_AUTHENTICATION) 1.3.6.1.5.5.7.3.3 (CODE_SIGNING) 1.3.6.1.5.5.7.3.4 (EMAIL_PROTECTION) 1.3.6.1.5.5.7.3.8 (TIME_STAMPING) 1.3.6.1.5.5.7.3.9 (OCSP_SIGNING) 1.3.6.1.5.5.7.3.5 (IPSEC_END_SYSTEM) 1.3.6.1.5.5.7.3.6 (IPSEC_TUNNEL) 1.3.6.1.5.5.7.3.7 (IPSEC_USER)
361 */
362 OID?: String;
363 }
364 export type ExtendedKeyUsageFilterList = ExtendedKeyUsageName[];
365 export type ExtendedKeyUsageList = ExtendedKeyUsage[];
366 export type ExtendedKeyUsageName = "TLS_WEB_SERVER_AUTHENTICATION"|"TLS_WEB_CLIENT_AUTHENTICATION"|"CODE_SIGNING"|"EMAIL_PROTECTION"|"TIME_STAMPING"|"OCSP_SIGNING"|"IPSEC_END_SYSTEM"|"IPSEC_TUNNEL"|"IPSEC_USER"|"ANY"|"NONE"|"CUSTOM"|string;
367 export type FailureReason = "NO_AVAILABLE_CONTACTS"|"ADDITIONAL_VERIFICATION_REQUIRED"|"DOMAIN_NOT_ALLOWED"|"INVALID_PUBLIC_DOMAIN"|"DOMAIN_VALIDATION_DENIED"|"CAA_ERROR"|"PCA_LIMIT_EXCEEDED"|"PCA_INVALID_ARN"|"PCA_INVALID_STATE"|"PCA_REQUEST_FAILED"|"PCA_RESOURCE_NOT_FOUND"|"PCA_INVALID_ARGS"|"PCA_INVALID_DURATION"|"PCA_ACCESS_DENIED"|"OTHER"|string;
368 export interface Filters {
369 /**
370 * Specify one or more ExtendedKeyUsage extension values.
371 */
372 extendedKeyUsage?: ExtendedKeyUsageFilterList;
373 /**
374 * Specify one or more KeyUsage extension values.
375 */
376 keyUsage?: KeyUsageFilterList;
377 /**
378 * Specify one or more algorithms that can be used to generate key pairs.
379 */
380 keyTypes?: KeyAlgorithmList;
381 }
382 export interface GetCertificateRequest {
383 /**
384 * String that contains a certificate ARN in the following format: arn:aws:acm:region:123456789012:certificate/12345678-1234-1234-1234-123456789012 For more information about ARNs, see Amazon Resource Names (ARNs) and AWS Service Namespaces.
385 */
386 CertificateArn: Arn;
387 }
388 export interface GetCertificateResponse {
389 /**
390 * String that contains the ACM certificate represented by the ARN specified at input.
391 */
392 Certificate?: CertificateBody;
393 /**
394 * The certificate chain that contains the root certificate issued by the certificate authority (CA).
395 */
396 CertificateChain?: CertificateChain;
397 }
398 export type IdempotencyToken = string;
399 export interface ImportCertificateRequest {
400 /**
401 * The Amazon Resource Name (ARN) of an imported certificate to replace. To import a new certificate, omit this field.
402 */
403 CertificateArn?: Arn;
404 /**
405 * The certificate to import.
406 */
407 Certificate: CertificateBodyBlob;
408 /**
409 * The private key that matches the public key in the certificate.
410 */
411 PrivateKey: PrivateKeyBlob;
412 /**
413 * The PEM encoded certificate chain.
414 */
415 CertificateChain?: CertificateChainBlob;
416 }
417 export interface ImportCertificateResponse {
418 /**
419 * The Amazon Resource Name (ARN) of the imported certificate.
420 */
421 CertificateArn?: Arn;
422 }
423 export type InUseList = String[];
424 export type KeyAlgorithm = "RSA_2048"|"RSA_1024"|"RSA_4096"|"EC_prime256v1"|"EC_secp384r1"|"EC_secp521r1"|string;
425 export type KeyAlgorithmList = KeyAlgorithm[];
426 export interface KeyUsage {
427 /**
428 * A string value that contains a Key Usage extension name.
429 */
430 Name?: KeyUsageName;
431 }
432 export type KeyUsageFilterList = KeyUsageName[];
433 export type KeyUsageList = KeyUsage[];
434 export type KeyUsageName = "DIGITAL_SIGNATURE"|"NON_REPUDIATION"|"KEY_ENCIPHERMENT"|"DATA_ENCIPHERMENT"|"KEY_AGREEMENT"|"CERTIFICATE_SIGNING"|"CRL_SIGNING"|"ENCIPHER_ONLY"|"DECIPHER_ONLY"|"ANY"|"CUSTOM"|string;
435 export interface ListCertificatesRequest {
436 /**
437 * Filter the certificate list by status value.
438 */
439 CertificateStatuses?: CertificateStatuses;
440 /**
441 * Filter the certificate list. For more information, see the Filters structure.
442 */
443 Includes?: Filters;
444 /**
445 * Use this parameter only when paginating results and only in a subsequent request after you receive a response with truncated results. Set it to the value of NextToken from the response you just received.
446 */
447 NextToken?: NextToken;
448 /**
449 * Use this parameter when paginating results to specify the maximum number of items to return in the response. If additional items exist beyond the number you specify, the NextToken element is sent in the response. Use this NextToken value in a subsequent request to retrieve additional items.
450 */
451 MaxItems?: MaxItems;
452 }
453 export interface ListCertificatesResponse {
454 /**
455 * When the list is truncated, this value is present and contains the value to use for the NextToken parameter in a subsequent pagination request.
456 */
457 NextToken?: NextToken;
458 /**
459 * A list of ACM certificates.
460 */
461 CertificateSummaryList?: CertificateSummaryList;
462 }
463 export interface ListTagsForCertificateRequest {
464 /**
465 * String that contains the ARN of the ACM certificate for which you want to list the tags. This must have the following form: arn:aws:acm:region:123456789012:certificate/12345678-1234-1234-1234-123456789012 For more information about ARNs, see Amazon Resource Names (ARNs) and AWS Service Namespaces.
466 */
467 CertificateArn: Arn;
468 }
469 export interface ListTagsForCertificateResponse {
470 /**
471 * The key-value pairs that define the applied tags.
472 */
473 Tags?: TagList;
474 }
475 export type MaxItems = number;
476 export type NextToken = string;
477 export type PassphraseBlob = Buffer|Uint8Array|Blob|string;
478 export type PrivateKey = string;
479 export type PrivateKeyBlob = Buffer|Uint8Array|Blob|string;
480 export type RecordType = "CNAME"|string;
481 export interface RemoveTagsFromCertificateRequest {
482 /**
483 * String that contains the ARN of the ACM Certificate with one or more tags that you want to remove. This must be of the form: arn:aws:acm:region:123456789012:certificate/12345678-1234-1234-1234-123456789012 For more information about ARNs, see Amazon Resource Names (ARNs) and AWS Service Namespaces.
484 */
485 CertificateArn: Arn;
486 /**
487 * The key-value pair that defines the tag to remove.
488 */
489 Tags: TagList;
490 }
491 export interface RenewCertificateRequest {
492 /**
493 * String that contains the ARN of the ACM certificate to be renewed. This must be of the form: arn:aws:acm:region:123456789012:certificate/12345678-1234-1234-1234-123456789012 For more information about ARNs, see Amazon Resource Names (ARNs) and AWS Service Namespaces.
494 */
495 CertificateArn: Arn;
496 }
497 export type RenewalEligibility = "ELIGIBLE"|"INELIGIBLE"|string;
498 export type RenewalStatus = "PENDING_AUTO_RENEWAL"|"PENDING_VALIDATION"|"SUCCESS"|"FAILED"|string;
499 export interface RenewalSummary {
500 /**
501 * The status of ACM's managed renewal of the certificate.
502 */
503 RenewalStatus: RenewalStatus;
504 /**
505 * Contains information about the validation of each domain name in the certificate, as it pertains to ACM's managed renewal. This is different from the initial validation that occurs as a result of the RequestCertificate request. This field exists only when the certificate type is AMAZON_ISSUED.
506 */
507 DomainValidationOptions: DomainValidationList;
508 /**
509 * The reason that a renewal request was unsuccessful.
510 */
511 RenewalStatusReason?: FailureReason;
512 /**
513 * The time at which the renewal summary was last updated.
514 */
515 UpdatedAt: TStamp;
516 }
517 export interface RequestCertificateRequest {
518 /**
519 * Fully qualified domain name (FQDN), such as www.example.com, that you want to secure with an ACM certificate. Use an asterisk (*) to create a wildcard certificate that protects several sites in the same domain. For example, *.example.com protects www.example.com, site.example.com, and images.example.com. The first domain name you enter cannot exceed 63 octets, including periods. Each subsequent Subject Alternative Name (SAN), however, can be up to 253 octets in length.
520 */
521 DomainName: DomainNameString;
522 /**
523 * The method you want to use if you are requesting a public certificate to validate that you own or control domain. You can validate with DNS or validate with email. We recommend that you use DNS validation.
524 */
525 ValidationMethod?: ValidationMethod;
526 /**
527 * Additional FQDNs to be included in the Subject Alternative Name extension of the ACM certificate. For example, add the name www.example.net to a certificate for which the DomainName field is www.example.com if users can reach your site by using either name. The maximum number of domain names that you can add to an ACM certificate is 100. However, the initial limit is 10 domain names. If you need more than 10 names, you must request a limit increase. For more information, see Limits. The maximum length of a SAN DNS name is 253 octets. The name is made up of multiple labels separated by periods. No label can be longer than 63 octets. Consider the following examples: (63 octets).(63 octets).(63 octets).(61 octets) is legal because the total length is 253 octets (63+1+63+1+63+1+61) and no label exceeds 63 octets. (64 octets).(63 octets).(63 octets).(61 octets) is not legal because the total length exceeds 253 octets (64+1+63+1+63+1+61) and the first label exceeds 63 octets. (63 octets).(63 octets).(63 octets).(62 octets) is not legal because the total length of the DNS name (63+1+63+1+63+1+62) exceeds 253 octets.
528 */
529 SubjectAlternativeNames?: DomainList;
530 /**
531 * Customer chosen string that can be used to distinguish between calls to RequestCertificate. Idempotency tokens time out after one hour. Therefore, if you call RequestCertificate multiple times with the same idempotency token within one hour, ACM recognizes that you are requesting only one certificate and will issue only one. If you change the idempotency token for each call, ACM recognizes that you are requesting multiple certificates.
532 */
533 IdempotencyToken?: IdempotencyToken;
534 /**
535 * The domain name that you want ACM to use to send you emails so that you can validate domain ownership.
536 */
537 DomainValidationOptions?: DomainValidationOptionList;
538 /**
539 * Currently, you can use this parameter to specify whether to add the certificate to a certificate transparency log. Certificate transparency makes it possible to detect SSL/TLS certificates that have been mistakenly or maliciously issued. Certificates that have not been logged typically produce an error message in a browser. For more information, see Opting Out of Certificate Transparency Logging.
540 */
541 Options?: CertificateOptions;
542 /**
543 * The Amazon Resource Name (ARN) of the private certificate authority (CA) that will be used to issue the certificate. If you do not provide an ARN and you are trying to request a private certificate, ACM will attempt to issue a public certificate. For more information about private CAs, see the AWS Certificate Manager Private Certificate Authority (PCA) user guide. The ARN must have the following form: arn:aws:acm-pca:region:account:certificate-authority/12345678-1234-1234-1234-123456789012
544 */
545 CertificateAuthorityArn?: Arn;
546 }
547 export interface RequestCertificateResponse {
548 /**
549 * String that contains the ARN of the issued certificate. This must be of the form: arn:aws:acm:us-east-1:123456789012:certificate/12345678-1234-1234-1234-123456789012
550 */
551 CertificateArn?: Arn;
552 }
553 export interface ResendValidationEmailRequest {
554 /**
555 * String that contains the ARN of the requested certificate. The certificate ARN is generated and returned by the RequestCertificate action as soon as the request is made. By default, using this parameter causes email to be sent to all top-level domains you specified in the certificate request. The ARN must be of the form: arn:aws:acm:us-east-1:123456789012:certificate/12345678-1234-1234-1234-123456789012
556 */
557 CertificateArn: Arn;
558 /**
559 * The fully qualified domain name (FQDN) of the certificate that needs to be validated.
560 */
561 Domain: DomainNameString;
562 /**
563 * The base validation domain that will act as the suffix of the email addresses that are used to send the emails. This must be the same as the Domain value or a superdomain of the Domain value. For example, if you requested a certificate for site.subdomain.example.com and specify a ValidationDomain of subdomain.example.com, ACM sends email to the domain registrant, technical contact, and administrative contact in WHOIS and the following five addresses: admin@subdomain.example.com administrator@subdomain.example.com hostmaster@subdomain.example.com postmaster@subdomain.example.com webmaster@subdomain.example.com
564 */
565 ValidationDomain: DomainNameString;
566 }
567 export interface ResourceRecord {
568 /**
569 * The name of the DNS record to create in your domain. This is supplied by ACM.
570 */
571 Name: String;
572 /**
573 * The type of DNS record. Currently this can be CNAME.
574 */
575 Type: RecordType;
576 /**
577 * The value of the CNAME record to add to your DNS database. This is supplied by ACM.
578 */
579 Value: String;
580 }
581 export type RevocationReason = "UNSPECIFIED"|"KEY_COMPROMISE"|"CA_COMPROMISE"|"AFFILIATION_CHANGED"|"SUPERCEDED"|"CESSATION_OF_OPERATION"|"CERTIFICATE_HOLD"|"REMOVE_FROM_CRL"|"PRIVILEGE_WITHDRAWN"|"A_A_COMPROMISE"|string;
582 export type String = string;
583 export type TStamp = Date;
584 export interface Tag {
585 /**
586 * The key of the tag.
587 */
588 Key: TagKey;
589 /**
590 * The value of the tag.
591 */
592 Value?: TagValue;
593 }
594 export type TagKey = string;
595 export type TagList = Tag[];
596 export type TagValue = string;
597 export interface UpdateCertificateOptionsRequest {
598 /**
599 * ARN of the requested certificate to update. This must be of the form: arn:aws:acm:us-east-1:account:certificate/12345678-1234-1234-1234-123456789012
600 */
601 CertificateArn: Arn;
602 /**
603 * Use to update the options for your certificate. Currently, you can specify whether to add your certificate to a transparency log. Certificate transparency makes it possible to detect SSL/TLS certificates that have been mistakenly or maliciously issued. Certificates that have not been logged typically produce an error message in a browser.
604 */
605 Options: CertificateOptions;
606 }
607 export type ValidationEmailList = String[];
608 export type ValidationMethod = "EMAIL"|"DNS"|string;
609 /**
610 * A string in YYYY-MM-DD format that represents the latest possible API version that can be used in this service. Specify 'latest' to use the latest possible version.
611 */
612 export type apiVersion = "2015-12-08"|"latest"|string;
613 export interface ClientApiVersions {
614 /**
615 * A string in YYYY-MM-DD format that represents the latest possible API version that can be used in this service. Specify 'latest' to use the latest possible version.
616 */
617 apiVersion?: apiVersion;
618 }
619 export type ClientConfiguration = ServiceConfigurationOptions & ClientApiVersions;
620 /**
621 * Contains interfaces for use with the ACM client.
622 */
623 export import Types = ACM;
624}
625export = ACM;