aws-sdk-acmpca 1.31.0 → 1.32.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/lib/aws-sdk-acmpca.rb +1 -1
- data/lib/aws-sdk-acmpca/client.rb +168 -58
- data/lib/aws-sdk-acmpca/client_api.rb +47 -0
- data/lib/aws-sdk-acmpca/types.rb +567 -87
- metadata +2 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: dc98acc54b80d947d407c145b5f09f400dad5a8b943019e3b8c9bcd008f2b2c7
|
4
|
+
data.tar.gz: 5625afa10f80568e15a65cec8fce964cebe02a72ffeb314d9ec95374a073d012
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 774424f9c13f043e133ee64be2b4d302d7797645b9d51075aea543f1c215deab51c914473d9f93b6a4d52942974a108c1e69f0946a65e66a1d3c635cab1d7d11
|
7
|
+
data.tar.gz: ea1de9d25fd213799a2a277027d62ca35f445a79cc4e2c23553dd182f16c9e8a93f086ffe040dcdd28449c283a5113e3d37fed4b474475d3acac8f4f42272af0
|
data/lib/aws-sdk-acmpca.rb
CHANGED
@@ -385,12 +385,14 @@ module Aws::ACMPCA
|
|
385
385
|
# The type of the certificate authority.
|
386
386
|
#
|
387
387
|
# @option params [String] :idempotency_token
|
388
|
-
#
|
389
|
-
# **CreateCertificateAuthority
|
390
|
-
#
|
391
|
-
#
|
392
|
-
#
|
393
|
-
#
|
388
|
+
# Custom string that can be used to distinguish between calls to the
|
389
|
+
# **CreateCertificateAuthority** action. Idempotency tokens for
|
390
|
+
# **CreateCertificateAuthority** time out after five minutes. Therefore,
|
391
|
+
# if you call **CreateCertificateAuthority** multiple times with the
|
392
|
+
# same idempotency token within five minutes, ACM Private CA recognizes
|
393
|
+
# that you are requesting only certificate authority and will issue only
|
394
|
+
# one. If you change the idempotency token for each call, PCA recognizes
|
395
|
+
# that you are requesting multiple certificate authorities.
|
394
396
|
#
|
395
397
|
# @option params [Array<Types::Tag>] :tags
|
396
398
|
# Key-value pairs that will be attached to the new private CA. You can
|
@@ -884,7 +886,7 @@ module Aws::ACMPCA
|
|
884
886
|
# * `EXPIRED` - Your private CA certificate has expired.
|
885
887
|
#
|
886
888
|
# * `FAILED` - Your private CA has failed. Your CA can fail because of
|
887
|
-
# problems such a network outage or
|
889
|
+
# problems such a network outage or back-end AWS failure or other
|
888
890
|
# errors. A failed CA can never return to the pending state. You must
|
889
891
|
# create a new CA.
|
890
892
|
#
|
@@ -1276,8 +1278,8 @@ module Aws::ACMPCA
|
|
1276
1278
|
# following preparations must in place:
|
1277
1279
|
#
|
1278
1280
|
# 1. In ACM Private CA, call the [CreateCertificateAuthority][1] action
|
1279
|
-
# to create the private CA that
|
1280
|
-
#
|
1281
|
+
# to create the private CA that you plan to back with the imported
|
1282
|
+
# certificate.
|
1281
1283
|
#
|
1282
1284
|
# 2. Call the [GetCertificateAuthorityCsr][2] action to generate a
|
1283
1285
|
# certificate signing request (CSR).
|
@@ -1299,7 +1301,7 @@ module Aws::ACMPCA
|
|
1299
1301
|
# * Installing a subordinate CA certificate whose parent authority is
|
1300
1302
|
# externally hosted.
|
1301
1303
|
#
|
1302
|
-
# The following
|
1304
|
+
# The following additional requirements apply when you import a CA
|
1303
1305
|
# certificate.
|
1304
1306
|
#
|
1305
1307
|
# * Only a self-signed certificate can be imported as a root CA.
|
@@ -1429,6 +1431,21 @@ module Aws::ACMPCA
|
|
1429
1431
|
#
|
1430
1432
|
# [1]: https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_GetCertificate.html
|
1431
1433
|
#
|
1434
|
+
# @option params [Types::ApiPassthrough] :api_passthrough
|
1435
|
+
# Specifies X.509 certificate information to be included in the issued
|
1436
|
+
# certificate. An `APIPassthrough` or `APICSRPassthrough` template
|
1437
|
+
# variant must be selected, or else this parameter is ignored. For more
|
1438
|
+
# information about using these templates, see [Understanding
|
1439
|
+
# Certificate Templates][1].
|
1440
|
+
#
|
1441
|
+
# If conflicting or duplicate certificate information is supplied during
|
1442
|
+
# certificate issuance, ACM Private CA applies [order of operation
|
1443
|
+
# rules](xxxxx) to determine what information is used.
|
1444
|
+
#
|
1445
|
+
#
|
1446
|
+
#
|
1447
|
+
# [1]: https://docs.aws.amazon.com/acm-pca/latest/userguide/UsingTemplates.html
|
1448
|
+
#
|
1432
1449
|
# @option params [required, String] :certificate_authority_arn
|
1433
1450
|
# The Amazon Resource Name (ARN) that was returned when you called
|
1434
1451
|
# [CreateCertificateAuthority][1]. This must be of the form:
|
@@ -1442,15 +1459,15 @@ module Aws::ACMPCA
|
|
1442
1459
|
#
|
1443
1460
|
# @option params [required, String, StringIO, File] :csr
|
1444
1461
|
# The certificate signing request (CSR) for the certificate you want to
|
1445
|
-
# issue.
|
1446
|
-
# a 2048 bit RSA private key.
|
1462
|
+
# issue. As an example, you can use the following OpenSSL command to
|
1463
|
+
# create the CSR and a 2048 bit RSA private key.
|
1447
1464
|
#
|
1448
1465
|
# `openssl req -new -newkey rsa:2048 -days 365 -keyout
|
1449
1466
|
# private/test_cert_priv_key.pem -out csr/test_cert_.csr`
|
1450
1467
|
#
|
1451
|
-
# If you have a configuration file, you can use the following
|
1452
|
-
# command. The `usr_cert` block in the configuration file
|
1453
|
-
# X509 version 3 extensions.
|
1468
|
+
# If you have a configuration file, you can then use the following
|
1469
|
+
# OpenSSL command. The `usr_cert` block in the configuration file
|
1470
|
+
# contains your X509 version 3 extensions.
|
1454
1471
|
#
|
1455
1472
|
# `openssl req -new -config openssl_rsa.cnf -extensions usr_cert -newkey
|
1456
1473
|
# rsa:2048 -days -365 -keyout private/test_cert_priv_key.pem -out
|
@@ -1464,7 +1481,8 @@ module Aws::ACMPCA
|
|
1464
1481
|
# be issued.
|
1465
1482
|
#
|
1466
1483
|
# This parameter should not be confused with the `SigningAlgorithm`
|
1467
|
-
# parameter used to sign a CSR
|
1484
|
+
# parameter used to sign a CSR in the `CreateCertificateAuthority`
|
1485
|
+
# action.
|
1468
1486
|
#
|
1469
1487
|
# @option params [String] :template_arn
|
1470
1488
|
# Specifies a custom configuration template to use when issuing a
|
@@ -1477,65 +1495,70 @@ module Aws::ACMPCA
|
|
1477
1495
|
# Note: The CA depth configured on a subordinate CA certificate must not
|
1478
1496
|
# exceed the limit set by its parents in the CA hierarchy.
|
1479
1497
|
#
|
1480
|
-
#
|
1481
|
-
#
|
1482
|
-
#
|
1483
|
-
# * arn:aws:acm-pca:::template/CodeSigningCertificate/V1
|
1498
|
+
# For a list of `TemplateArn` values supported by ACM Private CA, see
|
1499
|
+
# [Understanding Certificate Templates][2].
|
1484
1500
|
#
|
1485
|
-
# * arn:aws:acm-pca:::template/CodeSigningCertificate\_CSRPassthrough/V1
|
1486
1501
|
#
|
1487
|
-
# * arn:aws:acm-pca:::template/EndEntityCertificate/V1
|
1488
1502
|
#
|
1489
|
-
#
|
1490
|
-
#
|
1491
|
-
# * arn:aws:acm-pca:::template/EndEntityClientAuthCertificate/V1
|
1492
|
-
#
|
1493
|
-
# * arn:aws:acm-pca:::template/EndEntityClientAuthCertificate\_CSRPassthrough/V1
|
1494
|
-
#
|
1495
|
-
# * arn:aws:acm-pca:::template/EndEntityServerAuthCertificate/V1
|
1496
|
-
#
|
1497
|
-
# * arn:aws:acm-pca:::template/EndEntityServerAuthCertificate\_CSRPassthrough/V1
|
1503
|
+
# [1]: https://docs.aws.amazon.com/acm-pca/latest/userguide/PcaTerms.html#terms-cadepth
|
1504
|
+
# [2]: https://docs.aws.amazon.com/acm-pca/latest/userguide/UsingTemplates.html
|
1498
1505
|
#
|
1499
|
-
#
|
1506
|
+
# @option params [required, Types::Validity] :validity
|
1507
|
+
# Information describing the end of the validity period of the
|
1508
|
+
# certificate. This parameter sets the “Not After” date for the
|
1509
|
+
# certificate.
|
1500
1510
|
#
|
1501
|
-
#
|
1511
|
+
# Certificate validity is the period of time during which a certificate
|
1512
|
+
# is valid. Validity can be expressed as an explicit date and time when
|
1513
|
+
# the certificate expires, or as a span of time after issuance, stated
|
1514
|
+
# in days, months, or years. For more information, see [Validity][1] in
|
1515
|
+
# RFC 5280.
|
1502
1516
|
#
|
1503
|
-
#
|
1517
|
+
# This value is unaffected when `ValidityNotBefore` is also specified.
|
1518
|
+
# For example, if `Validity` is set to 20 days in the future, the
|
1519
|
+
# certificate will expire 20 days from issuance time regardless of the
|
1520
|
+
# `ValidityNotBefore` value.
|
1504
1521
|
#
|
1505
|
-
#
|
1522
|
+
# The end of the validity period configured on a certificate must not
|
1523
|
+
# exceed the limit set on its parents in the CA hierarchy.
|
1506
1524
|
#
|
1507
|
-
# * arn:aws:acm-pca:::template/SubordinateCACertificate\_PathLen1/V1
|
1508
1525
|
#
|
1509
|
-
# * arn:aws:acm-pca:::template/SubordinateCACertificate\_PathLen2/V1
|
1510
1526
|
#
|
1511
|
-
#
|
1527
|
+
# [1]: https://tools.ietf.org/html/rfc5280#section-4.1.2.5
|
1512
1528
|
#
|
1513
|
-
#
|
1529
|
+
# @option params [Types::Validity] :validity_not_before
|
1530
|
+
# Information describing the start of the validity period of the
|
1531
|
+
# certificate. This parameter sets the “Not Before" date for the
|
1532
|
+
# certificate.
|
1514
1533
|
#
|
1534
|
+
# By default, when issuing a certificate, ACM Private CA sets the "Not
|
1535
|
+
# Before" date to the issuance time minus 60 minutes. This compensates
|
1536
|
+
# for clock inconsistencies across computer systems. The
|
1537
|
+
# `ValidityNotBefore` parameter can be used to customize the “Not
|
1538
|
+
# Before” value.
|
1515
1539
|
#
|
1540
|
+
# Unlike the `Validity` parameter, the `ValidityNotBefore` parameter is
|
1541
|
+
# optional.
|
1516
1542
|
#
|
1517
|
-
#
|
1518
|
-
#
|
1543
|
+
# The `ValidityNotBefore` value is expressed as an explicit date and
|
1544
|
+
# time, using the `Validity` type value `ABSOLUTE`. For more
|
1545
|
+
# information, see [Validity][1] in this API reference and [Validity][2]
|
1546
|
+
# in RFC 5280.
|
1519
1547
|
#
|
1520
|
-
# @option params [required, Types::Validity] :validity
|
1521
|
-
# Information describing the validity period of the certificate.
|
1522
1548
|
#
|
1523
|
-
# When issuing a certificate, ACM Private CA sets the "Not Before"
|
1524
|
-
# date in the validity field to date and time minus 60 minutes. This is
|
1525
|
-
# intended to compensate for time inconsistencies across systems of 60
|
1526
|
-
# minutes or less.
|
1527
1549
|
#
|
1528
|
-
#
|
1529
|
-
#
|
1550
|
+
# [1]: https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_Validity.html
|
1551
|
+
# [2]: https://tools.ietf.org/html/rfc5280#section-4.1.2.5
|
1530
1552
|
#
|
1531
1553
|
# @option params [String] :idempotency_token
|
1532
|
-
#
|
1533
|
-
# **IssueCertificate** action. Idempotency tokens
|
1534
|
-
#
|
1535
|
-
# the same idempotency token
|
1536
|
-
#
|
1537
|
-
#
|
1538
|
-
#
|
1554
|
+
# Alphanumeric string that can be used to distinguish between calls to
|
1555
|
+
# the **IssueCertificate** action. Idempotency tokens for
|
1556
|
+
# **IssueCertificate** time out after one minute. Therefore, if you call
|
1557
|
+
# **IssueCertificate** multiple times with the same idempotency token
|
1558
|
+
# within one minute, ACM Private CA recognizes that you are requesting
|
1559
|
+
# only one certificate and will issue only one. If you change the
|
1560
|
+
# idempotency token for each call, PCA recognizes that you are
|
1561
|
+
# requesting multiple certificates.
|
1539
1562
|
#
|
1540
1563
|
# @return [Types::IssueCertificateResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
1541
1564
|
#
|
@@ -1544,6 +1567,89 @@ module Aws::ACMPCA
|
|
1544
1567
|
# @example Request syntax with placeholder values
|
1545
1568
|
#
|
1546
1569
|
# resp = client.issue_certificate({
|
1570
|
+
# api_passthrough: {
|
1571
|
+
# extensions: {
|
1572
|
+
# certificate_policies: [
|
1573
|
+
# {
|
1574
|
+
# cert_policy_id: "CustomObjectIdentifier", # required
|
1575
|
+
# policy_qualifiers: [
|
1576
|
+
# {
|
1577
|
+
# policy_qualifier_id: "CPS", # required, accepts CPS
|
1578
|
+
# qualifier: { # required
|
1579
|
+
# cps_uri: "String256", # required
|
1580
|
+
# },
|
1581
|
+
# },
|
1582
|
+
# ],
|
1583
|
+
# },
|
1584
|
+
# ],
|
1585
|
+
# extended_key_usage: [
|
1586
|
+
# {
|
1587
|
+
# extended_key_usage_type: "SERVER_AUTH", # accepts SERVER_AUTH, CLIENT_AUTH, CODE_SIGNING, EMAIL_PROTECTION, TIME_STAMPING, OCSP_SIGNING, SMART_CARD_LOGIN, DOCUMENT_SIGNING, CERTIFICATE_TRANSPARENCY
|
1588
|
+
# extended_key_usage_object_identifier: "CustomObjectIdentifier",
|
1589
|
+
# },
|
1590
|
+
# ],
|
1591
|
+
# key_usage: {
|
1592
|
+
# digital_signature: false,
|
1593
|
+
# non_repudiation: false,
|
1594
|
+
# key_encipherment: false,
|
1595
|
+
# data_encipherment: false,
|
1596
|
+
# key_agreement: false,
|
1597
|
+
# key_cert_sign: false,
|
1598
|
+
# crl_sign: false,
|
1599
|
+
# encipher_only: false,
|
1600
|
+
# decipher_only: false,
|
1601
|
+
# },
|
1602
|
+
# subject_alternative_names: [
|
1603
|
+
# {
|
1604
|
+
# other_name: {
|
1605
|
+
# type_id: "CustomObjectIdentifier", # required
|
1606
|
+
# value: "String256", # required
|
1607
|
+
# },
|
1608
|
+
# rfc_822_name: "String256",
|
1609
|
+
# dns_name: "String253",
|
1610
|
+
# directory_name: {
|
1611
|
+
# country: "CountryCodeString",
|
1612
|
+
# organization: "String64",
|
1613
|
+
# organizational_unit: "String64",
|
1614
|
+
# distinguished_name_qualifier: "ASN1PrintableString64",
|
1615
|
+
# state: "String128",
|
1616
|
+
# common_name: "String64",
|
1617
|
+
# serial_number: "ASN1PrintableString64",
|
1618
|
+
# locality: "String128",
|
1619
|
+
# title: "String64",
|
1620
|
+
# surname: "String40",
|
1621
|
+
# given_name: "String16",
|
1622
|
+
# initials: "String5",
|
1623
|
+
# pseudonym: "String128",
|
1624
|
+
# generation_qualifier: "String3",
|
1625
|
+
# },
|
1626
|
+
# edi_party_name: {
|
1627
|
+
# party_name: "String256", # required
|
1628
|
+
# name_assigner: "String256",
|
1629
|
+
# },
|
1630
|
+
# uniform_resource_identifier: "String253",
|
1631
|
+
# ip_address: "String39",
|
1632
|
+
# registered_id: "CustomObjectIdentifier",
|
1633
|
+
# },
|
1634
|
+
# ],
|
1635
|
+
# },
|
1636
|
+
# subject: {
|
1637
|
+
# country: "CountryCodeString",
|
1638
|
+
# organization: "String64",
|
1639
|
+
# organizational_unit: "String64",
|
1640
|
+
# distinguished_name_qualifier: "ASN1PrintableString64",
|
1641
|
+
# state: "String128",
|
1642
|
+
# common_name: "String64",
|
1643
|
+
# serial_number: "ASN1PrintableString64",
|
1644
|
+
# locality: "String128",
|
1645
|
+
# title: "String64",
|
1646
|
+
# surname: "String40",
|
1647
|
+
# given_name: "String16",
|
1648
|
+
# initials: "String5",
|
1649
|
+
# pseudonym: "String128",
|
1650
|
+
# generation_qualifier: "String3",
|
1651
|
+
# },
|
1652
|
+
# },
|
1547
1653
|
# certificate_authority_arn: "Arn", # required
|
1548
1654
|
# csr: "data", # required
|
1549
1655
|
# signing_algorithm: "SHA256WITHECDSA", # required, accepts SHA256WITHECDSA, SHA384WITHECDSA, SHA512WITHECDSA, SHA256WITHRSA, SHA384WITHRSA, SHA512WITHRSA
|
@@ -1552,6 +1658,10 @@ module Aws::ACMPCA
|
|
1552
1658
|
# value: 1, # required
|
1553
1659
|
# type: "END_DATE", # required, accepts END_DATE, ABSOLUTE, DAYS, MONTHS, YEARS
|
1554
1660
|
# },
|
1661
|
+
# validity_not_before: {
|
1662
|
+
# value: 1, # required
|
1663
|
+
# type: "END_DATE", # required, accepts END_DATE, ABSOLUTE, DAYS, MONTHS, YEARS
|
1664
|
+
# },
|
1555
1665
|
# idempotency_token: "IdempotencyToken",
|
1556
1666
|
# })
|
1557
1667
|
#
|
@@ -1894,7 +2004,7 @@ module Aws::ACMPCA
|
|
1894
2004
|
# [1]: https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_ListCertificateAuthorities.html
|
1895
2005
|
#
|
1896
2006
|
# @option params [required, String] :policy
|
1897
|
-
# The path and
|
2007
|
+
# The path and file name of a JSON-formatted IAM policy to attach to the
|
1898
2008
|
# specified private CA resource. If this policy does not contain all
|
1899
2009
|
# required statements or if it includes any statement that is not
|
1900
2010
|
# allowed, the `PutPolicy` action returns an `InvalidPolicyException`.
|
@@ -2229,7 +2339,7 @@ module Aws::ACMPCA
|
|
2229
2339
|
params: params,
|
2230
2340
|
config: config)
|
2231
2341
|
context[:gem_name] = 'aws-sdk-acmpca'
|
2232
|
-
context[:gem_version] = '1.
|
2342
|
+
context[:gem_version] = '1.32.0'
|
2233
2343
|
Seahorse::Client::Request.new(handlers, context)
|
2234
2344
|
end
|
2235
2345
|
|
@@ -23,6 +23,7 @@ module Aws::ACMPCA
|
|
23
23
|
AccountId = Shapes::StringShape.new(name: 'AccountId')
|
24
24
|
ActionList = Shapes::ListShape.new(name: 'ActionList')
|
25
25
|
ActionType = Shapes::StringShape.new(name: 'ActionType')
|
26
|
+
ApiPassthrough = Shapes::StructureShape.new(name: 'ApiPassthrough')
|
26
27
|
Arn = Shapes::StringShape.new(name: 'Arn')
|
27
28
|
AuditReportId = Shapes::StringShape.new(name: 'AuditReportId')
|
28
29
|
AuditReportResponseFormat = Shapes::StringShape.new(name: 'AuditReportResponseFormat')
|
@@ -38,6 +39,7 @@ module Aws::ACMPCA
|
|
38
39
|
CertificateChain = Shapes::StringShape.new(name: 'CertificateChain')
|
39
40
|
CertificateChainBlob = Shapes::BlobShape.new(name: 'CertificateChainBlob')
|
40
41
|
CertificateMismatchException = Shapes::StructureShape.new(name: 'CertificateMismatchException')
|
42
|
+
CertificatePolicyList = Shapes::ListShape.new(name: 'CertificatePolicyList')
|
41
43
|
ConcurrentModificationException = Shapes::StructureShape.new(name: 'ConcurrentModificationException')
|
42
44
|
CountryCodeString = Shapes::StringShape.new(name: 'CountryCodeString')
|
43
45
|
CreateCertificateAuthorityAuditReportRequest = Shapes::StructureShape.new(name: 'CreateCertificateAuthorityAuditReportRequest')
|
@@ -58,8 +60,13 @@ module Aws::ACMPCA
|
|
58
60
|
DescribeCertificateAuthorityRequest = Shapes::StructureShape.new(name: 'DescribeCertificateAuthorityRequest')
|
59
61
|
DescribeCertificateAuthorityResponse = Shapes::StructureShape.new(name: 'DescribeCertificateAuthorityResponse')
|
60
62
|
EdiPartyName = Shapes::StructureShape.new(name: 'EdiPartyName')
|
63
|
+
ExtendedKeyUsage = Shapes::StructureShape.new(name: 'ExtendedKeyUsage')
|
64
|
+
ExtendedKeyUsageList = Shapes::ListShape.new(name: 'ExtendedKeyUsageList')
|
65
|
+
ExtendedKeyUsageType = Shapes::StringShape.new(name: 'ExtendedKeyUsageType')
|
66
|
+
Extensions = Shapes::StructureShape.new(name: 'Extensions')
|
61
67
|
FailureReason = Shapes::StringShape.new(name: 'FailureReason')
|
62
68
|
GeneralName = Shapes::StructureShape.new(name: 'GeneralName')
|
69
|
+
GeneralNameList = Shapes::ListShape.new(name: 'GeneralNameList')
|
63
70
|
GetCertificateAuthorityCertificateRequest = Shapes::StructureShape.new(name: 'GetCertificateAuthorityCertificateRequest')
|
64
71
|
GetCertificateAuthorityCertificateResponse = Shapes::StructureShape.new(name: 'GetCertificateAuthorityCertificateResponse')
|
65
72
|
GetCertificateAuthorityCsrRequest = Shapes::StructureShape.new(name: 'GetCertificateAuthorityCsrRequest')
|
@@ -99,9 +106,14 @@ module Aws::ACMPCA
|
|
99
106
|
Permission = Shapes::StructureShape.new(name: 'Permission')
|
100
107
|
PermissionAlreadyExistsException = Shapes::StructureShape.new(name: 'PermissionAlreadyExistsException')
|
101
108
|
PermissionList = Shapes::ListShape.new(name: 'PermissionList')
|
109
|
+
PolicyInformation = Shapes::StructureShape.new(name: 'PolicyInformation')
|
110
|
+
PolicyQualifierId = Shapes::StringShape.new(name: 'PolicyQualifierId')
|
111
|
+
PolicyQualifierInfo = Shapes::StructureShape.new(name: 'PolicyQualifierInfo')
|
112
|
+
PolicyQualifierInfoList = Shapes::ListShape.new(name: 'PolicyQualifierInfoList')
|
102
113
|
PositiveLong = Shapes::IntegerShape.new(name: 'PositiveLong')
|
103
114
|
Principal = Shapes::StringShape.new(name: 'Principal')
|
104
115
|
PutPolicyRequest = Shapes::StructureShape.new(name: 'PutPolicyRequest')
|
116
|
+
Qualifier = Shapes::StructureShape.new(name: 'Qualifier')
|
105
117
|
RequestAlreadyProcessedException = Shapes::StructureShape.new(name: 'RequestAlreadyProcessedException')
|
106
118
|
RequestFailedException = Shapes::StructureShape.new(name: 'RequestFailedException')
|
107
119
|
RequestInProgressException = Shapes::StructureShape.new(name: 'RequestInProgressException')
|
@@ -165,6 +177,10 @@ module Aws::ACMPCA
|
|
165
177
|
|
166
178
|
ActionList.member = Shapes::ShapeRef.new(shape: ActionType)
|
167
179
|
|
180
|
+
ApiPassthrough.add_member(:extensions, Shapes::ShapeRef.new(shape: Extensions, location_name: "Extensions"))
|
181
|
+
ApiPassthrough.add_member(:subject, Shapes::ShapeRef.new(shape: ASN1Subject, location_name: "Subject"))
|
182
|
+
ApiPassthrough.struct_class = Types::ApiPassthrough
|
183
|
+
|
168
184
|
CertificateAuthorities.member = Shapes::ShapeRef.new(shape: CertificateAuthority)
|
169
185
|
|
170
186
|
CertificateAuthority.add_member(:arn, Shapes::ShapeRef.new(shape: Arn, location_name: "Arn"))
|
@@ -191,6 +207,8 @@ module Aws::ACMPCA
|
|
191
207
|
CertificateMismatchException.add_member(:message, Shapes::ShapeRef.new(shape: String, location_name: "message"))
|
192
208
|
CertificateMismatchException.struct_class = Types::CertificateMismatchException
|
193
209
|
|
210
|
+
CertificatePolicyList.member = Shapes::ShapeRef.new(shape: PolicyInformation)
|
211
|
+
|
194
212
|
ConcurrentModificationException.add_member(:message, Shapes::ShapeRef.new(shape: String, location_name: "message"))
|
195
213
|
ConcurrentModificationException.struct_class = Types::ConcurrentModificationException
|
196
214
|
|
@@ -261,6 +279,18 @@ module Aws::ACMPCA
|
|
261
279
|
EdiPartyName.add_member(:name_assigner, Shapes::ShapeRef.new(shape: String256, location_name: "NameAssigner"))
|
262
280
|
EdiPartyName.struct_class = Types::EdiPartyName
|
263
281
|
|
282
|
+
ExtendedKeyUsage.add_member(:extended_key_usage_type, Shapes::ShapeRef.new(shape: ExtendedKeyUsageType, location_name: "ExtendedKeyUsageType"))
|
283
|
+
ExtendedKeyUsage.add_member(:extended_key_usage_object_identifier, Shapes::ShapeRef.new(shape: CustomObjectIdentifier, location_name: "ExtendedKeyUsageObjectIdentifier"))
|
284
|
+
ExtendedKeyUsage.struct_class = Types::ExtendedKeyUsage
|
285
|
+
|
286
|
+
ExtendedKeyUsageList.member = Shapes::ShapeRef.new(shape: ExtendedKeyUsage)
|
287
|
+
|
288
|
+
Extensions.add_member(:certificate_policies, Shapes::ShapeRef.new(shape: CertificatePolicyList, location_name: "CertificatePolicies"))
|
289
|
+
Extensions.add_member(:extended_key_usage, Shapes::ShapeRef.new(shape: ExtendedKeyUsageList, location_name: "ExtendedKeyUsage"))
|
290
|
+
Extensions.add_member(:key_usage, Shapes::ShapeRef.new(shape: KeyUsage, location_name: "KeyUsage"))
|
291
|
+
Extensions.add_member(:subject_alternative_names, Shapes::ShapeRef.new(shape: GeneralNameList, location_name: "SubjectAlternativeNames"))
|
292
|
+
Extensions.struct_class = Types::Extensions
|
293
|
+
|
264
294
|
GeneralName.add_member(:other_name, Shapes::ShapeRef.new(shape: OtherName, location_name: "OtherName"))
|
265
295
|
GeneralName.add_member(:rfc_822_name, Shapes::ShapeRef.new(shape: String256, location_name: "Rfc822Name"))
|
266
296
|
GeneralName.add_member(:dns_name, Shapes::ShapeRef.new(shape: String253, location_name: "DnsName"))
|
@@ -271,6 +301,8 @@ module Aws::ACMPCA
|
|
271
301
|
GeneralName.add_member(:registered_id, Shapes::ShapeRef.new(shape: CustomObjectIdentifier, location_name: "RegisteredId"))
|
272
302
|
GeneralName.struct_class = Types::GeneralName
|
273
303
|
|
304
|
+
GeneralNameList.member = Shapes::ShapeRef.new(shape: GeneralName)
|
305
|
+
|
274
306
|
GetCertificateAuthorityCertificateRequest.add_member(:certificate_authority_arn, Shapes::ShapeRef.new(shape: Arn, required: true, location_name: "CertificateAuthorityArn"))
|
275
307
|
GetCertificateAuthorityCertificateRequest.struct_class = Types::GetCertificateAuthorityCertificateRequest
|
276
308
|
|
@@ -324,11 +356,13 @@ module Aws::ACMPCA
|
|
324
356
|
InvalidTagException.add_member(:message, Shapes::ShapeRef.new(shape: String, location_name: "message"))
|
325
357
|
InvalidTagException.struct_class = Types::InvalidTagException
|
326
358
|
|
359
|
+
IssueCertificateRequest.add_member(:api_passthrough, Shapes::ShapeRef.new(shape: ApiPassthrough, location_name: "ApiPassthrough"))
|
327
360
|
IssueCertificateRequest.add_member(:certificate_authority_arn, Shapes::ShapeRef.new(shape: Arn, required: true, location_name: "CertificateAuthorityArn"))
|
328
361
|
IssueCertificateRequest.add_member(:csr, Shapes::ShapeRef.new(shape: CsrBlob, required: true, location_name: "Csr"))
|
329
362
|
IssueCertificateRequest.add_member(:signing_algorithm, Shapes::ShapeRef.new(shape: SigningAlgorithm, required: true, location_name: "SigningAlgorithm"))
|
330
363
|
IssueCertificateRequest.add_member(:template_arn, Shapes::ShapeRef.new(shape: Arn, location_name: "TemplateArn"))
|
331
364
|
IssueCertificateRequest.add_member(:validity, Shapes::ShapeRef.new(shape: Validity, required: true, location_name: "Validity"))
|
365
|
+
IssueCertificateRequest.add_member(:validity_not_before, Shapes::ShapeRef.new(shape: Validity, location_name: "ValidityNotBefore"))
|
332
366
|
IssueCertificateRequest.add_member(:idempotency_token, Shapes::ShapeRef.new(shape: IdempotencyToken, location_name: "IdempotencyToken"))
|
333
367
|
IssueCertificateRequest.struct_class = Types::IssueCertificateRequest
|
334
368
|
|
@@ -402,10 +436,23 @@ module Aws::ACMPCA
|
|
402
436
|
|
403
437
|
PermissionList.member = Shapes::ShapeRef.new(shape: Permission)
|
404
438
|
|
439
|
+
PolicyInformation.add_member(:cert_policy_id, Shapes::ShapeRef.new(shape: CustomObjectIdentifier, required: true, location_name: "CertPolicyId"))
|
440
|
+
PolicyInformation.add_member(:policy_qualifiers, Shapes::ShapeRef.new(shape: PolicyQualifierInfoList, location_name: "PolicyQualifiers"))
|
441
|
+
PolicyInformation.struct_class = Types::PolicyInformation
|
442
|
+
|
443
|
+
PolicyQualifierInfo.add_member(:policy_qualifier_id, Shapes::ShapeRef.new(shape: PolicyQualifierId, required: true, location_name: "PolicyQualifierId"))
|
444
|
+
PolicyQualifierInfo.add_member(:qualifier, Shapes::ShapeRef.new(shape: Qualifier, required: true, location_name: "Qualifier"))
|
445
|
+
PolicyQualifierInfo.struct_class = Types::PolicyQualifierInfo
|
446
|
+
|
447
|
+
PolicyQualifierInfoList.member = Shapes::ShapeRef.new(shape: PolicyQualifierInfo)
|
448
|
+
|
405
449
|
PutPolicyRequest.add_member(:resource_arn, Shapes::ShapeRef.new(shape: Arn, required: true, location_name: "ResourceArn"))
|
406
450
|
PutPolicyRequest.add_member(:policy, Shapes::ShapeRef.new(shape: AWSPolicy, required: true, location_name: "Policy"))
|
407
451
|
PutPolicyRequest.struct_class = Types::PutPolicyRequest
|
408
452
|
|
453
|
+
Qualifier.add_member(:cps_uri, Shapes::ShapeRef.new(shape: String256, required: true, location_name: "CpsUri"))
|
454
|
+
Qualifier.struct_class = Types::Qualifier
|
455
|
+
|
409
456
|
RequestAlreadyProcessedException.add_member(:message, Shapes::ShapeRef.new(shape: String, location_name: "message"))
|
410
457
|
RequestAlreadyProcessedException.struct_class = Types::RequestAlreadyProcessedException
|
411
458
|
|