aws-sdk-acmpca 1.31.0 → 1.32.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: e9248de24e8f0650decb902183ab1be075185fcbd936d73fa01d60288195baab
4
- data.tar.gz: c97ad717942496ed6dd1b9210872f51ee89c5db7795612d43215ab4306ddd8a5
3
+ metadata.gz: dc98acc54b80d947d407c145b5f09f400dad5a8b943019e3b8c9bcd008f2b2c7
4
+ data.tar.gz: 5625afa10f80568e15a65cec8fce964cebe02a72ffeb314d9ec95374a073d012
5
5
  SHA512:
6
- metadata.gz: bb1c7a2154501ecdb1a26f5402da4239c8667255169d172f42a7a7f0f215cff3d08d116a39a0fab7c7efe35b1c57321ecb598d03fc163f43541d6d87e0e44114
7
- data.tar.gz: b21951246a975ef7d3a62d4e92ad64775760f60c4297d12382c4510faac8b8c422ccd0ed4ae21d632e1f5c5e3dd3f04fd9210dc395022778c295246d57236ea2
6
+ metadata.gz: 774424f9c13f043e133ee64be2b4d302d7797645b9d51075aea543f1c215deab51c914473d9f93b6a4d52942974a108c1e69f0946a65e66a1d3c635cab1d7d11
7
+ data.tar.gz: ea1de9d25fd213799a2a277027d62ca35f445a79cc4e2c23553dd182f16c9e8a93f086ffe040dcdd28449c283a5113e3d37fed4b474475d3acac8f4f42272af0
@@ -49,6 +49,6 @@ require_relative 'aws-sdk-acmpca/customizations'
49
49
  # @!group service
50
50
  module Aws::ACMPCA
51
51
 
52
- GEM_VERSION = '1.31.0'
52
+ GEM_VERSION = '1.32.0'
53
53
 
54
54
  end
@@ -385,12 +385,14 @@ module Aws::ACMPCA
385
385
  # The type of the certificate authority.
386
386
  #
387
387
  # @option params [String] :idempotency_token
388
- # Alphanumeric string that can be used to distinguish between calls to
389
- # **CreateCertificateAuthority**. For a given token, ACM Private CA
390
- # creates exactly one CA. If you issue a subsequent call using the same
391
- # token, ACM Private CA returns the ARN of the existing CA and takes no
392
- # further action. If you change the idempotency token across multiple
393
- # calls, ACM Private CA creates a unique CA for each unique token.
388
+ # Custom string that can be used to distinguish between calls to the
389
+ # **CreateCertificateAuthority** action. Idempotency tokens for
390
+ # **CreateCertificateAuthority** time out after five minutes. Therefore,
391
+ # if you call **CreateCertificateAuthority** multiple times with the
392
+ # same idempotency token within five minutes, ACM Private CA recognizes
393
+ # that you are requesting only certificate authority and will issue only
394
+ # one. If you change the idempotency token for each call, PCA recognizes
395
+ # that you are requesting multiple certificate authorities.
394
396
  #
395
397
  # @option params [Array<Types::Tag>] :tags
396
398
  # Key-value pairs that will be attached to the new private CA. You can
@@ -884,7 +886,7 @@ module Aws::ACMPCA
884
886
  # * `EXPIRED` - Your private CA certificate has expired.
885
887
  #
886
888
  # * `FAILED` - Your private CA has failed. Your CA can fail because of
887
- # problems such a network outage or backend AWS failure or other
889
+ # problems such a network outage or back-end AWS failure or other
888
890
  # errors. A failed CA can never return to the pending state. You must
889
891
  # create a new CA.
890
892
  #
@@ -1276,8 +1278,8 @@ module Aws::ACMPCA
1276
1278
  # following preparations must in place:
1277
1279
  #
1278
1280
  # 1. In ACM Private CA, call the [CreateCertificateAuthority][1] action
1279
- # to create the private CA that that you plan to back with the
1280
- # imported certificate.
1281
+ # to create the private CA that you plan to back with the imported
1282
+ # certificate.
1281
1283
  #
1282
1284
  # 2. Call the [GetCertificateAuthorityCsr][2] action to generate a
1283
1285
  # certificate signing request (CSR).
@@ -1299,7 +1301,7 @@ module Aws::ACMPCA
1299
1301
  # * Installing a subordinate CA certificate whose parent authority is
1300
1302
  # externally hosted.
1301
1303
  #
1302
- # The following addtitional requirements apply when you import a CA
1304
+ # The following additional requirements apply when you import a CA
1303
1305
  # certificate.
1304
1306
  #
1305
1307
  # * Only a self-signed certificate can be imported as a root CA.
@@ -1429,6 +1431,21 @@ module Aws::ACMPCA
1429
1431
  #
1430
1432
  # [1]: https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_GetCertificate.html
1431
1433
  #
1434
+ # @option params [Types::ApiPassthrough] :api_passthrough
1435
+ # Specifies X.509 certificate information to be included in the issued
1436
+ # certificate. An `APIPassthrough` or `APICSRPassthrough` template
1437
+ # variant must be selected, or else this parameter is ignored. For more
1438
+ # information about using these templates, see [Understanding
1439
+ # Certificate Templates][1].
1440
+ #
1441
+ # If conflicting or duplicate certificate information is supplied during
1442
+ # certificate issuance, ACM Private CA applies [order of operation
1443
+ # rules](xxxxx) to determine what information is used.
1444
+ #
1445
+ #
1446
+ #
1447
+ # [1]: https://docs.aws.amazon.com/acm-pca/latest/userguide/UsingTemplates.html
1448
+ #
1432
1449
  # @option params [required, String] :certificate_authority_arn
1433
1450
  # The Amazon Resource Name (ARN) that was returned when you called
1434
1451
  # [CreateCertificateAuthority][1]. This must be of the form:
@@ -1442,15 +1459,15 @@ module Aws::ACMPCA
1442
1459
  #
1443
1460
  # @option params [required, String, StringIO, File] :csr
1444
1461
  # The certificate signing request (CSR) for the certificate you want to
1445
- # issue. You can use the following OpenSSL command to create the CSR and
1446
- # a 2048 bit RSA private key.
1462
+ # issue. As an example, you can use the following OpenSSL command to
1463
+ # create the CSR and a 2048 bit RSA private key.
1447
1464
  #
1448
1465
  # `openssl req -new -newkey rsa:2048 -days 365 -keyout
1449
1466
  # private/test_cert_priv_key.pem -out csr/test_cert_.csr`
1450
1467
  #
1451
- # If you have a configuration file, you can use the following OpenSSL
1452
- # command. The `usr_cert` block in the configuration file contains your
1453
- # X509 version 3 extensions.
1468
+ # If you have a configuration file, you can then use the following
1469
+ # OpenSSL command. The `usr_cert` block in the configuration file
1470
+ # contains your X509 version 3 extensions.
1454
1471
  #
1455
1472
  # `openssl req -new -config openssl_rsa.cnf -extensions usr_cert -newkey
1456
1473
  # rsa:2048 -days -365 -keyout private/test_cert_priv_key.pem -out
@@ -1464,7 +1481,8 @@ module Aws::ACMPCA
1464
1481
  # be issued.
1465
1482
  #
1466
1483
  # This parameter should not be confused with the `SigningAlgorithm`
1467
- # parameter used to sign a CSR.
1484
+ # parameter used to sign a CSR in the `CreateCertificateAuthority`
1485
+ # action.
1468
1486
  #
1469
1487
  # @option params [String] :template_arn
1470
1488
  # Specifies a custom configuration template to use when issuing a
@@ -1477,65 +1495,70 @@ module Aws::ACMPCA
1477
1495
  # Note: The CA depth configured on a subordinate CA certificate must not
1478
1496
  # exceed the limit set by its parents in the CA hierarchy.
1479
1497
  #
1480
- # The following service-owned `TemplateArn` values are supported by ACM
1481
- # Private CA:
1482
- #
1483
- # * arn:aws:acm-pca:::template/CodeSigningCertificate/V1
1498
+ # For a list of `TemplateArn` values supported by ACM Private CA, see
1499
+ # [Understanding Certificate Templates][2].
1484
1500
  #
1485
- # * arn:aws:acm-pca:::template/CodeSigningCertificate\_CSRPassthrough/V1
1486
1501
  #
1487
- # * arn:aws:acm-pca:::template/EndEntityCertificate/V1
1488
1502
  #
1489
- # * arn:aws:acm-pca:::template/EndEntityCertificate\_CSRPassthrough/V1
1490
- #
1491
- # * arn:aws:acm-pca:::template/EndEntityClientAuthCertificate/V1
1492
- #
1493
- # * arn:aws:acm-pca:::template/EndEntityClientAuthCertificate\_CSRPassthrough/V1
1494
- #
1495
- # * arn:aws:acm-pca:::template/EndEntityServerAuthCertificate/V1
1496
- #
1497
- # * arn:aws:acm-pca:::template/EndEntityServerAuthCertificate\_CSRPassthrough/V1
1503
+ # [1]: https://docs.aws.amazon.com/acm-pca/latest/userguide/PcaTerms.html#terms-cadepth
1504
+ # [2]: https://docs.aws.amazon.com/acm-pca/latest/userguide/UsingTemplates.html
1498
1505
  #
1499
- # * arn:aws:acm-pca:::template/OCSPSigningCertificate/V1
1506
+ # @option params [required, Types::Validity] :validity
1507
+ # Information describing the end of the validity period of the
1508
+ # certificate. This parameter sets the “Not After” date for the
1509
+ # certificate.
1500
1510
  #
1501
- # * arn:aws:acm-pca:::template/OCSPSigningCertificate\_CSRPassthrough/V1
1511
+ # Certificate validity is the period of time during which a certificate
1512
+ # is valid. Validity can be expressed as an explicit date and time when
1513
+ # the certificate expires, or as a span of time after issuance, stated
1514
+ # in days, months, or years. For more information, see [Validity][1] in
1515
+ # RFC 5280.
1502
1516
  #
1503
- # * arn:aws:acm-pca:::template/RootCACertificate/V1
1517
+ # This value is unaffected when `ValidityNotBefore` is also specified.
1518
+ # For example, if `Validity` is set to 20 days in the future, the
1519
+ # certificate will expire 20 days from issuance time regardless of the
1520
+ # `ValidityNotBefore` value.
1504
1521
  #
1505
- # * arn:aws:acm-pca:::template/SubordinateCACertificate\_PathLen0/V1
1522
+ # The end of the validity period configured on a certificate must not
1523
+ # exceed the limit set on its parents in the CA hierarchy.
1506
1524
  #
1507
- # * arn:aws:acm-pca:::template/SubordinateCACertificate\_PathLen1/V1
1508
1525
  #
1509
- # * arn:aws:acm-pca:::template/SubordinateCACertificate\_PathLen2/V1
1510
1526
  #
1511
- # * arn:aws:acm-pca:::template/SubordinateCACertificate\_PathLen3/V1
1527
+ # [1]: https://tools.ietf.org/html/rfc5280#section-4.1.2.5
1512
1528
  #
1513
- # For more information, see [Using Templates][2].
1529
+ # @option params [Types::Validity] :validity_not_before
1530
+ # Information describing the start of the validity period of the
1531
+ # certificate. This parameter sets the “Not Before" date for the
1532
+ # certificate.
1514
1533
  #
1534
+ # By default, when issuing a certificate, ACM Private CA sets the "Not
1535
+ # Before" date to the issuance time minus 60 minutes. This compensates
1536
+ # for clock inconsistencies across computer systems. The
1537
+ # `ValidityNotBefore` parameter can be used to customize the “Not
1538
+ # Before” value.
1515
1539
  #
1540
+ # Unlike the `Validity` parameter, the `ValidityNotBefore` parameter is
1541
+ # optional.
1516
1542
  #
1517
- # [1]: https://docs.aws.amazon.com/acm-pca/latest/userguide/PcaTerms.html#terms-cadepth
1518
- # [2]: https://docs.aws.amazon.com/acm-pca/latest/userguide/UsingTemplates.html
1543
+ # The `ValidityNotBefore` value is expressed as an explicit date and
1544
+ # time, using the `Validity` type value `ABSOLUTE`. For more
1545
+ # information, see [Validity][1] in this API reference and [Validity][2]
1546
+ # in RFC 5280.
1519
1547
  #
1520
- # @option params [required, Types::Validity] :validity
1521
- # Information describing the validity period of the certificate.
1522
1548
  #
1523
- # When issuing a certificate, ACM Private CA sets the "Not Before"
1524
- # date in the validity field to date and time minus 60 minutes. This is
1525
- # intended to compensate for time inconsistencies across systems of 60
1526
- # minutes or less.
1527
1549
  #
1528
- # The validity period configured on a certificate must not exceed the
1529
- # limit set by its parents in the CA hierarchy.
1550
+ # [1]: https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_Validity.html
1551
+ # [2]: https://tools.ietf.org/html/rfc5280#section-4.1.2.5
1530
1552
  #
1531
1553
  # @option params [String] :idempotency_token
1532
- # Custom string that can be used to distinguish between calls to the
1533
- # **IssueCertificate** action. Idempotency tokens time out after one
1534
- # hour. Therefore, if you call **IssueCertificate** multiple times with
1535
- # the same idempotency token within 5 minutes, ACM Private CA recognizes
1536
- # that you are requesting only one certificate and will issue only one.
1537
- # If you change the idempotency token for each call, PCA recognizes that
1538
- # you are requesting multiple certificates.
1554
+ # Alphanumeric string that can be used to distinguish between calls to
1555
+ # the **IssueCertificate** action. Idempotency tokens for
1556
+ # **IssueCertificate** time out after one minute. Therefore, if you call
1557
+ # **IssueCertificate** multiple times with the same idempotency token
1558
+ # within one minute, ACM Private CA recognizes that you are requesting
1559
+ # only one certificate and will issue only one. If you change the
1560
+ # idempotency token for each call, PCA recognizes that you are
1561
+ # requesting multiple certificates.
1539
1562
  #
1540
1563
  # @return [Types::IssueCertificateResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
1541
1564
  #
@@ -1544,6 +1567,89 @@ module Aws::ACMPCA
1544
1567
  # @example Request syntax with placeholder values
1545
1568
  #
1546
1569
  # resp = client.issue_certificate({
1570
+ # api_passthrough: {
1571
+ # extensions: {
1572
+ # certificate_policies: [
1573
+ # {
1574
+ # cert_policy_id: "CustomObjectIdentifier", # required
1575
+ # policy_qualifiers: [
1576
+ # {
1577
+ # policy_qualifier_id: "CPS", # required, accepts CPS
1578
+ # qualifier: { # required
1579
+ # cps_uri: "String256", # required
1580
+ # },
1581
+ # },
1582
+ # ],
1583
+ # },
1584
+ # ],
1585
+ # extended_key_usage: [
1586
+ # {
1587
+ # extended_key_usage_type: "SERVER_AUTH", # accepts SERVER_AUTH, CLIENT_AUTH, CODE_SIGNING, EMAIL_PROTECTION, TIME_STAMPING, OCSP_SIGNING, SMART_CARD_LOGIN, DOCUMENT_SIGNING, CERTIFICATE_TRANSPARENCY
1588
+ # extended_key_usage_object_identifier: "CustomObjectIdentifier",
1589
+ # },
1590
+ # ],
1591
+ # key_usage: {
1592
+ # digital_signature: false,
1593
+ # non_repudiation: false,
1594
+ # key_encipherment: false,
1595
+ # data_encipherment: false,
1596
+ # key_agreement: false,
1597
+ # key_cert_sign: false,
1598
+ # crl_sign: false,
1599
+ # encipher_only: false,
1600
+ # decipher_only: false,
1601
+ # },
1602
+ # subject_alternative_names: [
1603
+ # {
1604
+ # other_name: {
1605
+ # type_id: "CustomObjectIdentifier", # required
1606
+ # value: "String256", # required
1607
+ # },
1608
+ # rfc_822_name: "String256",
1609
+ # dns_name: "String253",
1610
+ # directory_name: {
1611
+ # country: "CountryCodeString",
1612
+ # organization: "String64",
1613
+ # organizational_unit: "String64",
1614
+ # distinguished_name_qualifier: "ASN1PrintableString64",
1615
+ # state: "String128",
1616
+ # common_name: "String64",
1617
+ # serial_number: "ASN1PrintableString64",
1618
+ # locality: "String128",
1619
+ # title: "String64",
1620
+ # surname: "String40",
1621
+ # given_name: "String16",
1622
+ # initials: "String5",
1623
+ # pseudonym: "String128",
1624
+ # generation_qualifier: "String3",
1625
+ # },
1626
+ # edi_party_name: {
1627
+ # party_name: "String256", # required
1628
+ # name_assigner: "String256",
1629
+ # },
1630
+ # uniform_resource_identifier: "String253",
1631
+ # ip_address: "String39",
1632
+ # registered_id: "CustomObjectIdentifier",
1633
+ # },
1634
+ # ],
1635
+ # },
1636
+ # subject: {
1637
+ # country: "CountryCodeString",
1638
+ # organization: "String64",
1639
+ # organizational_unit: "String64",
1640
+ # distinguished_name_qualifier: "ASN1PrintableString64",
1641
+ # state: "String128",
1642
+ # common_name: "String64",
1643
+ # serial_number: "ASN1PrintableString64",
1644
+ # locality: "String128",
1645
+ # title: "String64",
1646
+ # surname: "String40",
1647
+ # given_name: "String16",
1648
+ # initials: "String5",
1649
+ # pseudonym: "String128",
1650
+ # generation_qualifier: "String3",
1651
+ # },
1652
+ # },
1547
1653
  # certificate_authority_arn: "Arn", # required
1548
1654
  # csr: "data", # required
1549
1655
  # signing_algorithm: "SHA256WITHECDSA", # required, accepts SHA256WITHECDSA, SHA384WITHECDSA, SHA512WITHECDSA, SHA256WITHRSA, SHA384WITHRSA, SHA512WITHRSA
@@ -1552,6 +1658,10 @@ module Aws::ACMPCA
1552
1658
  # value: 1, # required
1553
1659
  # type: "END_DATE", # required, accepts END_DATE, ABSOLUTE, DAYS, MONTHS, YEARS
1554
1660
  # },
1661
+ # validity_not_before: {
1662
+ # value: 1, # required
1663
+ # type: "END_DATE", # required, accepts END_DATE, ABSOLUTE, DAYS, MONTHS, YEARS
1664
+ # },
1555
1665
  # idempotency_token: "IdempotencyToken",
1556
1666
  # })
1557
1667
  #
@@ -1894,7 +2004,7 @@ module Aws::ACMPCA
1894
2004
  # [1]: https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_ListCertificateAuthorities.html
1895
2005
  #
1896
2006
  # @option params [required, String] :policy
1897
- # The path and filename of a JSON-formatted IAM policy to attach to the
2007
+ # The path and file name of a JSON-formatted IAM policy to attach to the
1898
2008
  # specified private CA resource. If this policy does not contain all
1899
2009
  # required statements or if it includes any statement that is not
1900
2010
  # allowed, the `PutPolicy` action returns an `InvalidPolicyException`.
@@ -2229,7 +2339,7 @@ module Aws::ACMPCA
2229
2339
  params: params,
2230
2340
  config: config)
2231
2341
  context[:gem_name] = 'aws-sdk-acmpca'
2232
- context[:gem_version] = '1.31.0'
2342
+ context[:gem_version] = '1.32.0'
2233
2343
  Seahorse::Client::Request.new(handlers, context)
2234
2344
  end
2235
2345
 
@@ -23,6 +23,7 @@ module Aws::ACMPCA
23
23
  AccountId = Shapes::StringShape.new(name: 'AccountId')
24
24
  ActionList = Shapes::ListShape.new(name: 'ActionList')
25
25
  ActionType = Shapes::StringShape.new(name: 'ActionType')
26
+ ApiPassthrough = Shapes::StructureShape.new(name: 'ApiPassthrough')
26
27
  Arn = Shapes::StringShape.new(name: 'Arn')
27
28
  AuditReportId = Shapes::StringShape.new(name: 'AuditReportId')
28
29
  AuditReportResponseFormat = Shapes::StringShape.new(name: 'AuditReportResponseFormat')
@@ -38,6 +39,7 @@ module Aws::ACMPCA
38
39
  CertificateChain = Shapes::StringShape.new(name: 'CertificateChain')
39
40
  CertificateChainBlob = Shapes::BlobShape.new(name: 'CertificateChainBlob')
40
41
  CertificateMismatchException = Shapes::StructureShape.new(name: 'CertificateMismatchException')
42
+ CertificatePolicyList = Shapes::ListShape.new(name: 'CertificatePolicyList')
41
43
  ConcurrentModificationException = Shapes::StructureShape.new(name: 'ConcurrentModificationException')
42
44
  CountryCodeString = Shapes::StringShape.new(name: 'CountryCodeString')
43
45
  CreateCertificateAuthorityAuditReportRequest = Shapes::StructureShape.new(name: 'CreateCertificateAuthorityAuditReportRequest')
@@ -58,8 +60,13 @@ module Aws::ACMPCA
58
60
  DescribeCertificateAuthorityRequest = Shapes::StructureShape.new(name: 'DescribeCertificateAuthorityRequest')
59
61
  DescribeCertificateAuthorityResponse = Shapes::StructureShape.new(name: 'DescribeCertificateAuthorityResponse')
60
62
  EdiPartyName = Shapes::StructureShape.new(name: 'EdiPartyName')
63
+ ExtendedKeyUsage = Shapes::StructureShape.new(name: 'ExtendedKeyUsage')
64
+ ExtendedKeyUsageList = Shapes::ListShape.new(name: 'ExtendedKeyUsageList')
65
+ ExtendedKeyUsageType = Shapes::StringShape.new(name: 'ExtendedKeyUsageType')
66
+ Extensions = Shapes::StructureShape.new(name: 'Extensions')
61
67
  FailureReason = Shapes::StringShape.new(name: 'FailureReason')
62
68
  GeneralName = Shapes::StructureShape.new(name: 'GeneralName')
69
+ GeneralNameList = Shapes::ListShape.new(name: 'GeneralNameList')
63
70
  GetCertificateAuthorityCertificateRequest = Shapes::StructureShape.new(name: 'GetCertificateAuthorityCertificateRequest')
64
71
  GetCertificateAuthorityCertificateResponse = Shapes::StructureShape.new(name: 'GetCertificateAuthorityCertificateResponse')
65
72
  GetCertificateAuthorityCsrRequest = Shapes::StructureShape.new(name: 'GetCertificateAuthorityCsrRequest')
@@ -99,9 +106,14 @@ module Aws::ACMPCA
99
106
  Permission = Shapes::StructureShape.new(name: 'Permission')
100
107
  PermissionAlreadyExistsException = Shapes::StructureShape.new(name: 'PermissionAlreadyExistsException')
101
108
  PermissionList = Shapes::ListShape.new(name: 'PermissionList')
109
+ PolicyInformation = Shapes::StructureShape.new(name: 'PolicyInformation')
110
+ PolicyQualifierId = Shapes::StringShape.new(name: 'PolicyQualifierId')
111
+ PolicyQualifierInfo = Shapes::StructureShape.new(name: 'PolicyQualifierInfo')
112
+ PolicyQualifierInfoList = Shapes::ListShape.new(name: 'PolicyQualifierInfoList')
102
113
  PositiveLong = Shapes::IntegerShape.new(name: 'PositiveLong')
103
114
  Principal = Shapes::StringShape.new(name: 'Principal')
104
115
  PutPolicyRequest = Shapes::StructureShape.new(name: 'PutPolicyRequest')
116
+ Qualifier = Shapes::StructureShape.new(name: 'Qualifier')
105
117
  RequestAlreadyProcessedException = Shapes::StructureShape.new(name: 'RequestAlreadyProcessedException')
106
118
  RequestFailedException = Shapes::StructureShape.new(name: 'RequestFailedException')
107
119
  RequestInProgressException = Shapes::StructureShape.new(name: 'RequestInProgressException')
@@ -165,6 +177,10 @@ module Aws::ACMPCA
165
177
 
166
178
  ActionList.member = Shapes::ShapeRef.new(shape: ActionType)
167
179
 
180
+ ApiPassthrough.add_member(:extensions, Shapes::ShapeRef.new(shape: Extensions, location_name: "Extensions"))
181
+ ApiPassthrough.add_member(:subject, Shapes::ShapeRef.new(shape: ASN1Subject, location_name: "Subject"))
182
+ ApiPassthrough.struct_class = Types::ApiPassthrough
183
+
168
184
  CertificateAuthorities.member = Shapes::ShapeRef.new(shape: CertificateAuthority)
169
185
 
170
186
  CertificateAuthority.add_member(:arn, Shapes::ShapeRef.new(shape: Arn, location_name: "Arn"))
@@ -191,6 +207,8 @@ module Aws::ACMPCA
191
207
  CertificateMismatchException.add_member(:message, Shapes::ShapeRef.new(shape: String, location_name: "message"))
192
208
  CertificateMismatchException.struct_class = Types::CertificateMismatchException
193
209
 
210
+ CertificatePolicyList.member = Shapes::ShapeRef.new(shape: PolicyInformation)
211
+
194
212
  ConcurrentModificationException.add_member(:message, Shapes::ShapeRef.new(shape: String, location_name: "message"))
195
213
  ConcurrentModificationException.struct_class = Types::ConcurrentModificationException
196
214
 
@@ -261,6 +279,18 @@ module Aws::ACMPCA
261
279
  EdiPartyName.add_member(:name_assigner, Shapes::ShapeRef.new(shape: String256, location_name: "NameAssigner"))
262
280
  EdiPartyName.struct_class = Types::EdiPartyName
263
281
 
282
+ ExtendedKeyUsage.add_member(:extended_key_usage_type, Shapes::ShapeRef.new(shape: ExtendedKeyUsageType, location_name: "ExtendedKeyUsageType"))
283
+ ExtendedKeyUsage.add_member(:extended_key_usage_object_identifier, Shapes::ShapeRef.new(shape: CustomObjectIdentifier, location_name: "ExtendedKeyUsageObjectIdentifier"))
284
+ ExtendedKeyUsage.struct_class = Types::ExtendedKeyUsage
285
+
286
+ ExtendedKeyUsageList.member = Shapes::ShapeRef.new(shape: ExtendedKeyUsage)
287
+
288
+ Extensions.add_member(:certificate_policies, Shapes::ShapeRef.new(shape: CertificatePolicyList, location_name: "CertificatePolicies"))
289
+ Extensions.add_member(:extended_key_usage, Shapes::ShapeRef.new(shape: ExtendedKeyUsageList, location_name: "ExtendedKeyUsage"))
290
+ Extensions.add_member(:key_usage, Shapes::ShapeRef.new(shape: KeyUsage, location_name: "KeyUsage"))
291
+ Extensions.add_member(:subject_alternative_names, Shapes::ShapeRef.new(shape: GeneralNameList, location_name: "SubjectAlternativeNames"))
292
+ Extensions.struct_class = Types::Extensions
293
+
264
294
  GeneralName.add_member(:other_name, Shapes::ShapeRef.new(shape: OtherName, location_name: "OtherName"))
265
295
  GeneralName.add_member(:rfc_822_name, Shapes::ShapeRef.new(shape: String256, location_name: "Rfc822Name"))
266
296
  GeneralName.add_member(:dns_name, Shapes::ShapeRef.new(shape: String253, location_name: "DnsName"))
@@ -271,6 +301,8 @@ module Aws::ACMPCA
271
301
  GeneralName.add_member(:registered_id, Shapes::ShapeRef.new(shape: CustomObjectIdentifier, location_name: "RegisteredId"))
272
302
  GeneralName.struct_class = Types::GeneralName
273
303
 
304
+ GeneralNameList.member = Shapes::ShapeRef.new(shape: GeneralName)
305
+
274
306
  GetCertificateAuthorityCertificateRequest.add_member(:certificate_authority_arn, Shapes::ShapeRef.new(shape: Arn, required: true, location_name: "CertificateAuthorityArn"))
275
307
  GetCertificateAuthorityCertificateRequest.struct_class = Types::GetCertificateAuthorityCertificateRequest
276
308
 
@@ -324,11 +356,13 @@ module Aws::ACMPCA
324
356
  InvalidTagException.add_member(:message, Shapes::ShapeRef.new(shape: String, location_name: "message"))
325
357
  InvalidTagException.struct_class = Types::InvalidTagException
326
358
 
359
+ IssueCertificateRequest.add_member(:api_passthrough, Shapes::ShapeRef.new(shape: ApiPassthrough, location_name: "ApiPassthrough"))
327
360
  IssueCertificateRequest.add_member(:certificate_authority_arn, Shapes::ShapeRef.new(shape: Arn, required: true, location_name: "CertificateAuthorityArn"))
328
361
  IssueCertificateRequest.add_member(:csr, Shapes::ShapeRef.new(shape: CsrBlob, required: true, location_name: "Csr"))
329
362
  IssueCertificateRequest.add_member(:signing_algorithm, Shapes::ShapeRef.new(shape: SigningAlgorithm, required: true, location_name: "SigningAlgorithm"))
330
363
  IssueCertificateRequest.add_member(:template_arn, Shapes::ShapeRef.new(shape: Arn, location_name: "TemplateArn"))
331
364
  IssueCertificateRequest.add_member(:validity, Shapes::ShapeRef.new(shape: Validity, required: true, location_name: "Validity"))
365
+ IssueCertificateRequest.add_member(:validity_not_before, Shapes::ShapeRef.new(shape: Validity, location_name: "ValidityNotBefore"))
332
366
  IssueCertificateRequest.add_member(:idempotency_token, Shapes::ShapeRef.new(shape: IdempotencyToken, location_name: "IdempotencyToken"))
333
367
  IssueCertificateRequest.struct_class = Types::IssueCertificateRequest
334
368
 
@@ -402,10 +436,23 @@ module Aws::ACMPCA
402
436
 
403
437
  PermissionList.member = Shapes::ShapeRef.new(shape: Permission)
404
438
 
439
+ PolicyInformation.add_member(:cert_policy_id, Shapes::ShapeRef.new(shape: CustomObjectIdentifier, required: true, location_name: "CertPolicyId"))
440
+ PolicyInformation.add_member(:policy_qualifiers, Shapes::ShapeRef.new(shape: PolicyQualifierInfoList, location_name: "PolicyQualifiers"))
441
+ PolicyInformation.struct_class = Types::PolicyInformation
442
+
443
+ PolicyQualifierInfo.add_member(:policy_qualifier_id, Shapes::ShapeRef.new(shape: PolicyQualifierId, required: true, location_name: "PolicyQualifierId"))
444
+ PolicyQualifierInfo.add_member(:qualifier, Shapes::ShapeRef.new(shape: Qualifier, required: true, location_name: "Qualifier"))
445
+ PolicyQualifierInfo.struct_class = Types::PolicyQualifierInfo
446
+
447
+ PolicyQualifierInfoList.member = Shapes::ShapeRef.new(shape: PolicyQualifierInfo)
448
+
405
449
  PutPolicyRequest.add_member(:resource_arn, Shapes::ShapeRef.new(shape: Arn, required: true, location_name: "ResourceArn"))
406
450
  PutPolicyRequest.add_member(:policy, Shapes::ShapeRef.new(shape: AWSPolicy, required: true, location_name: "Policy"))
407
451
  PutPolicyRequest.struct_class = Types::PutPolicyRequest
408
452
 
453
+ Qualifier.add_member(:cps_uri, Shapes::ShapeRef.new(shape: String256, required: true, location_name: "CpsUri"))
454
+ Qualifier.struct_class = Types::Qualifier
455
+
409
456
  RequestAlreadyProcessedException.add_member(:message, Shapes::ShapeRef.new(shape: String, location_name: "message"))
410
457
  RequestAlreadyProcessedException.struct_class = Types::RequestAlreadyProcessedException
411
458