Aws Certificate Manager
Node: awsCertificateManager · Full type: n8n-nodes-base.awsCertificateManager · Version: 1
Credentials
aws (alias: @aws) / awsAssumeRole (alias: @aws)
CREDENTIAL @aws = aws "My Aws Certificate Manager"
Operations
Resource: certificate
delete
| Parameter |
Type |
Default |
Details |
certificateArn |
string |
"" |
required |
bucketName |
string |
"" |
required |
certificateKey |
string |
"" |
required |
get
| Parameter |
Type |
Default |
Details |
certificateArn |
string |
"" |
required |
getMany
| Parameter |
Type |
Default |
Details |
returnAll |
boolean |
false |
|
limit |
number |
100 |
|
options |
collection |
{} |
keys: certificateStatuses, extendedKeyUsage, keyTypes, keyUsage |
| Parameter |
Type |
Default |
Details |
certificateArn |
string |
"" |
required |
renew
| Parameter |
Type |
Default |
Details |
certificateArn |
string |
"" |
required |
Common Parameters
| Parameter |
Type |
Default |
Details |
authentication |
options |
"iam" |
iam, assumeRole |
Parameter Details
options children:
| Parameter |
Type |
Default |
Details |
certificateStatuses |
multiOptions |
[] |
multi: EXPIRED, FAILED, INACTIVE, ISSUED, PENDING_VALIDATION, REVOKED, VALIDATION_TIMED_OUT |
extendedKeyUsage |
multiOptions |
[] |
multi: ANY, CODE_SIGNING, CUSTOM, EMAIL_PROTECTION, IPSEC_END_SYSTEM, IPSEC_TUNNEL, IPSEC_USER, NONE, ... (12 total) |
keyTypes |
multiOptions |
[...] |
multi: EC_prime256v1, EC_secp384r1, EC_secp521r1, RSA_1024, RSA_2048, RSA_4096 |
keyUsage |
multiOptions |
[] |
multi: ANY, CERTIFICATE_SIGNING, CRL_SIGNING, CUSTOM, DATA_ENCIPHERMENT, DECIPHER_ONLY, DIGITAL_SIGNATURE, ENCIPHER_ONLY, ... (11 total) |
Example
NODE "awsCertificateManager" @aws AS "Aws Certificate Manager" {
resource: "certificate",
operation: "get",
certificateArn: {{ $json.certificateArn }},
bucketName: {{ $json.bucketName }},
certificateKey: {{ $json.certificateKey }}
}