aws-sdk-acmpca 1.45.0 → 1.48.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: a2d692548862d12c5768e812f12ab63031ce63e2248b98f2e389de7f6614fcf3
4
- data.tar.gz: 07d15d9935add510fe9157737b63dc0ba3fdb88398ada6e68a06f6c1801981b9
3
+ metadata.gz: 9d5e73b72e120fe6f31fdb18760aa8a128be5cc432116ce6084da30f9e8d3140
4
+ data.tar.gz: 85d9985fb896de12f98b252e9ed8608a056bd4dd98faf9b7f80530dc2e6049d4
5
5
  SHA512:
6
- metadata.gz: d9ff8fdbc02a3dc06f65b1e1093170ceeb0c7f752cdd8324970909b5b340eb27ba63dcd710fe6e0c63f6e545f0102415360f25ef3c34800474ca9fd4c48c5c4a
7
- data.tar.gz: 103ad32731011b73d12a7de30c44ec4740d17f972d3d144953a61d78b2d1dc1b10a8a0367d8e291c0cb648d7988e841926f5db0d236d6d8837ab9b2a13d23c4a
6
+ metadata.gz: a7f3210122e4e950a70270cdc69afa4f776e9ef3f73e5fbc7cb863d1e27910818bf909b461af3de8d3f574b9629d5c8d36563211e3d4f0f40f44ce053b71046d
7
+ data.tar.gz: 2d2e4e53f928df205f5c5624c502d17af55bf3c2d798ac821575380fb12dd59ece4369e7cff091183e2ebbc8bb271e3fb17ff92c74a6cbbce5d2bf12a343df57
data/CHANGELOG.md CHANGED
@@ -1,6 +1,21 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.48.0 (2022-03-28)
5
+ ------------------
6
+
7
+ * Feature - Updating service name entities
8
+
9
+ 1.47.0 (2022-03-16)
10
+ ------------------
11
+
12
+ * Feature - AWS Certificate Manager (ACM) Private Certificate Authority (CA) now supports customizable certificate subject names and extensions.
13
+
14
+ 1.46.0 (2022-02-24)
15
+ ------------------
16
+
17
+ * Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
18
+
4
19
  1.45.0 (2022-02-03)
5
20
  ------------------
6
21
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.45.0
1
+ 1.48.0
@@ -27,6 +27,7 @@ require 'aws-sdk-core/plugins/client_metrics_plugin.rb'
27
27
  require 'aws-sdk-core/plugins/client_metrics_send_plugin.rb'
28
28
  require 'aws-sdk-core/plugins/transfer_encoding.rb'
29
29
  require 'aws-sdk-core/plugins/http_checksum.rb'
30
+ require 'aws-sdk-core/plugins/checksum_algorithm.rb'
30
31
  require 'aws-sdk-core/plugins/defaults_mode.rb'
31
32
  require 'aws-sdk-core/plugins/recursion_detection.rb'
32
33
  require 'aws-sdk-core/plugins/signature_v4.rb'
@@ -75,6 +76,7 @@ module Aws::ACMPCA
75
76
  add_plugin(Aws::Plugins::ClientMetricsSendPlugin)
76
77
  add_plugin(Aws::Plugins::TransferEncoding)
77
78
  add_plugin(Aws::Plugins::HttpChecksum)
79
+ add_plugin(Aws::Plugins::ChecksumAlgorithm)
78
80
  add_plugin(Aws::Plugins::DefaultsMode)
79
81
  add_plugin(Aws::Plugins::RecursionDetection)
80
82
  add_plugin(Aws::Plugins::SignatureV4)
@@ -380,14 +382,14 @@ module Aws::ACMPCA
380
382
  # <note markdown="1"> Both PCA and the IAM principal must have permission to write to the S3
381
383
  # bucket that you specify. If the IAM principal making the call does not
382
384
  # have permission to write to the bucket, then an exception is thrown.
383
- # For more information, see [Configure Access to ACM Private CA][2].
385
+ # For more information, see [Access policies for CRLs in Amazon S3][2].
384
386
  #
385
387
  # </note>
386
388
  #
387
389
  #
388
390
  #
389
391
  # [1]: https://docs.aws.amazon.com/acm-pca/latest/userguide/PcaCreateCa.html#crl-encryption
390
- # [2]: https://docs.aws.amazon.com/acm-pca/latest/userguide/PcaAuthAccess.html
392
+ # [2]: https://docs.aws.amazon.com/acm-pca/latest/userguide/crl-planning.html#s3-policies
391
393
  #
392
394
  # @option params [required, Types::CertificateAuthorityConfiguration] :certificate_authority_configuration
393
395
  # Name and bit size of the private key algorithm, the name of the
@@ -467,6 +469,12 @@ module Aws::ACMPCA
467
469
  # initials: "String5",
468
470
  # pseudonym: "String128",
469
471
  # generation_qualifier: "String3",
472
+ # custom_attributes: [
473
+ # {
474
+ # object_identifier: "CustomObjectIdentifier", # required
475
+ # value: "String1To256", # required
476
+ # },
477
+ # ],
470
478
  # },
471
479
  # csr_extensions: {
472
480
  # key_usage: {
@@ -508,6 +516,12 @@ module Aws::ACMPCA
508
516
  # initials: "String5",
509
517
  # pseudonym: "String128",
510
518
  # generation_qualifier: "String3",
519
+ # custom_attributes: [
520
+ # {
521
+ # object_identifier: "CustomObjectIdentifier", # required
522
+ # value: "String1To256", # required
523
+ # },
524
+ # ],
511
525
  # },
512
526
  # edi_party_name: {
513
527
  # party_name: "String256", # required
@@ -566,7 +580,7 @@ module Aws::ACMPCA
566
580
  # <note markdown="1"> Both PCA and the IAM principal must have permission to write to the S3
567
581
  # bucket that you specify. If the IAM principal making the call does not
568
582
  # have permission to write to the bucket, then an exception is thrown.
569
- # For more information, see [Configure Access to ACM Private CA][3].
583
+ # For more information, see [Access policies for CRLs in Amazon S3][3].
570
584
  #
571
585
  # </note>
572
586
  #
@@ -574,11 +588,15 @@ module Aws::ACMPCA
574
588
  # with encryption. For more information, see [Encrypting Your Audit
575
589
  # Reports][4].
576
590
  #
591
+ # <note markdown="1"> You can generate a maximum of one report every 30 minutes.
592
+ #
593
+ # </note>
594
+ #
577
595
  #
578
596
  #
579
597
  # [1]: https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_IssueCertificate.html
580
598
  # [2]: https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_RevokeCertificate.html
581
- # [3]: https://docs.aws.amazon.com/acm-pca/latest/userguide/PcaAuthAccess.html
599
+ # [3]: https://docs.aws.amazon.com/acm-pca/latest/userguide/crl-planning.html#s3-policies
582
600
  # [4]: https://docs.aws.amazon.com/acm-pca/latest/userguide/PcaAuditReport.html#audit-report-encryption
583
601
  #
584
602
  # @option params [required, String] :certificate_authority_arn
@@ -622,10 +640,10 @@ module Aws::ACMPCA
622
640
  req.send_request(options)
623
641
  end
624
642
 
625
- # Grants one or more permissions on a private CA to the AWS Certificate
643
+ # Grants one or more permissions on a private CA to the Certificate
626
644
  # Manager (ACM) service principal (`acm.amazonaws.com`). These
627
645
  # permissions allow ACM to issue and renew ACM certificates that reside
628
- # in the same AWS account as the CA.
646
+ # in the same Amazon Web Services account as the CA.
629
647
  #
630
648
  # You can list current permissions with the [ListPermissions][1] action
631
649
  # and revoke them with the [DeletePermission][2] action.
@@ -666,15 +684,17 @@ module Aws::ACMPCA
666
684
  # [1]: https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_ListCertificateAuthorities.html
667
685
  #
668
686
  # @option params [required, String] :principal
669
- # The AWS service or identity that receives the permission. At this
670
- # time, the only valid principal is `acm.amazonaws.com`.
687
+ # The Amazon Web Services service or identity that receives the
688
+ # permission. At this time, the only valid principal is
689
+ # `acm.amazonaws.com`.
671
690
  #
672
691
  # @option params [String] :source_account
673
692
  # The ID of the calling account.
674
693
  #
675
694
  # @option params [required, Array<String>] :actions
676
- # The actions that the specified AWS service principal can use. These
677
- # include `IssueCertificate`, `GetCertificate`, and `ListPermissions`.
695
+ # The actions that the specified Amazon Web Services service principal
696
+ # can use. These include `IssueCertificate`, `GetCertificate`, and
697
+ # `ListPermissions`.
678
698
  #
679
699
  # @return [Struct] Returns an empty {Seahorse::Client::Response response}.
680
700
  #
@@ -768,13 +788,13 @@ module Aws::ACMPCA
768
788
  req.send_request(options)
769
789
  end
770
790
 
771
- # Revokes permissions on a private CA granted to the AWS Certificate
772
- # Manager (ACM) service principal (acm.amazonaws.com).
791
+ # Revokes permissions on a private CA granted to the Certificate Manager
792
+ # (ACM) service principal (acm.amazonaws.com).
773
793
  #
774
794
  # These permissions allow ACM to issue and renew ACM certificates that
775
- # reside in the same AWS account as the CA. If you revoke these
776
- # permissions, ACM will no longer renew the affected certificates
777
- # automatically.
795
+ # reside in the same Amazon Web Services account as the CA. If you
796
+ # revoke these permissions, ACM will no longer renew the affected
797
+ # certificates automatically.
778
798
  #
779
799
  # Permissions can be granted with the [CreatePermission][1] action and
780
800
  # listed with the [ListPermissions][2] action.
@@ -816,11 +836,12 @@ module Aws::ACMPCA
816
836
  # [1]: https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_ListCertificateAuthorities.html
817
837
  #
818
838
  # @option params [required, String] :principal
819
- # The AWS service or identity that will have its CA permissions revoked.
820
- # At this time, the only valid service principal is `acm.amazonaws.com`
839
+ # The Amazon Web Services service or identity that will have its CA
840
+ # permissions revoked. At this time, the only valid service principal is
841
+ # `acm.amazonaws.com`
821
842
  #
822
843
  # @option params [String] :source_account
823
- # The AWS account that calls this action.
844
+ # The Amazon Web Services account that calls this action.
824
845
  #
825
846
  # @return [Struct] Returns an empty {Seahorse::Client::Response response}.
826
847
  #
@@ -845,25 +866,26 @@ module Aws::ACMPCA
845
866
  # will remove any access that the policy has granted. If there is no
846
867
  # policy attached to the private CA, this action will return successful.
847
868
  #
848
- # If you delete a policy that was applied through AWS Resource Access
849
- # Manager (RAM), the CA will be removed from all shares in which it was
850
- # included.
869
+ # If you delete a policy that was applied through Amazon Web Services
870
+ # Resource Access Manager (RAM), the CA will be removed from all shares
871
+ # in which it was included.
851
872
  #
852
- # The AWS Certificate Manager Service Linked Role that the policy
853
- # supports is not affected when you delete the policy.
873
+ # The Certificate Manager Service Linked Role that the policy supports
874
+ # is not affected when you delete the policy.
854
875
  #
855
876
  # The current policy can be shown with [GetPolicy][1] and updated with
856
877
  # [PutPolicy][2].
857
878
  #
858
879
  # **About Policies**
859
880
  #
860
- # * A policy grants access on a private CA to an AWS customer account,
861
- # to AWS Organizations, or to an AWS Organizations unit. Policies are
862
- # under the control of a CA administrator. For more information, see
863
- # [Using a Resource Based Policy with ACM Private CA][3].
881
+ # * A policy grants access on a private CA to an Amazon Web Services
882
+ # customer account, to Amazon Web Services Organizations, or to an
883
+ # Amazon Web Services Organizations unit. Policies are under the
884
+ # control of a CA administrator. For more information, see [Using a
885
+ # Resource Based Policy with ACM Private CA][3].
864
886
  #
865
- # * A policy permits a user of AWS Certificate Manager (ACM) to issue
866
- # ACM certificates signed by a CA in another account.
887
+ # * A policy permits a user of Certificate Manager (ACM) to issue ACM
888
+ # certificates signed by a CA in another account.
867
889
  #
868
890
  # * For ACM to manage automatic renewal of these certificates, the ACM
869
891
  # user must configure a Service Linked Role (SLR). The SLR allows the
@@ -871,9 +893,9 @@ module Aws::ACMPCA
871
893
  # confirmation against the ACM Private CA policy. For more
872
894
  # information, see [Using a Service Linked Role with ACM][4].
873
895
  #
874
- # * Updates made in AWS Resource Manager (RAM) are reflected in
875
- # policies. For more information, see [Attach a Policy for
876
- # Cross-Account Access][5].
896
+ # * Updates made in Amazon Web Services Resource Manager (RAM) are
897
+ # reflected in policies. For more information, see [Attach a Policy
898
+ # for Cross-Account Access][5].
877
899
  #
878
900
  #
879
901
  #
@@ -930,9 +952,9 @@ module Aws::ACMPCA
930
952
  # * `EXPIRED` - Your private CA certificate has expired.
931
953
  #
932
954
  # * `FAILED` - Your private CA has failed. Your CA can fail because of
933
- # problems such a network outage or back-end AWS failure or other
934
- # errors. A failed CA can never return to the pending state. You must
935
- # create a new CA.
955
+ # problems such a network outage or back-end Amazon Web Services
956
+ # failure or other errors. A failed CA can never return to the pending
957
+ # state. You must create a new CA.
936
958
  #
937
959
  # * `DELETED` - Your private CA is within the restoration period, after
938
960
  # which it is permanently deleted. The length of time remaining in the
@@ -987,6 +1009,9 @@ module Aws::ACMPCA
987
1009
  # resp.certificate_authority.certificate_authority_configuration.subject.initials #=> String
988
1010
  # resp.certificate_authority.certificate_authority_configuration.subject.pseudonym #=> String
989
1011
  # resp.certificate_authority.certificate_authority_configuration.subject.generation_qualifier #=> String
1012
+ # resp.certificate_authority.certificate_authority_configuration.subject.custom_attributes #=> Array
1013
+ # resp.certificate_authority.certificate_authority_configuration.subject.custom_attributes[0].object_identifier #=> String
1014
+ # resp.certificate_authority.certificate_authority_configuration.subject.custom_attributes[0].value #=> String
990
1015
  # resp.certificate_authority.certificate_authority_configuration.csr_extensions.key_usage.digital_signature #=> Boolean
991
1016
  # resp.certificate_authority.certificate_authority_configuration.csr_extensions.key_usage.non_repudiation #=> Boolean
992
1017
  # resp.certificate_authority.certificate_authority_configuration.csr_extensions.key_usage.key_encipherment #=> Boolean
@@ -1017,6 +1042,9 @@ module Aws::ACMPCA
1017
1042
  # resp.certificate_authority.certificate_authority_configuration.csr_extensions.subject_information_access[0].access_location.directory_name.initials #=> String
1018
1043
  # resp.certificate_authority.certificate_authority_configuration.csr_extensions.subject_information_access[0].access_location.directory_name.pseudonym #=> String
1019
1044
  # resp.certificate_authority.certificate_authority_configuration.csr_extensions.subject_information_access[0].access_location.directory_name.generation_qualifier #=> String
1045
+ # resp.certificate_authority.certificate_authority_configuration.csr_extensions.subject_information_access[0].access_location.directory_name.custom_attributes #=> Array
1046
+ # resp.certificate_authority.certificate_authority_configuration.csr_extensions.subject_information_access[0].access_location.directory_name.custom_attributes[0].object_identifier #=> String
1047
+ # resp.certificate_authority.certificate_authority_configuration.csr_extensions.subject_information_access[0].access_location.directory_name.custom_attributes[0].value #=> String
1020
1048
  # resp.certificate_authority.certificate_authority_configuration.csr_extensions.subject_information_access[0].access_location.edi_party_name.party_name #=> String
1021
1049
  # resp.certificate_authority.certificate_authority_configuration.csr_extensions.subject_information_access[0].access_location.edi_party_name.name_assigner #=> String
1022
1050
  # resp.certificate_authority.certificate_authority_configuration.csr_extensions.subject_information_access[0].access_location.uniform_resource_identifier #=> String
@@ -1266,13 +1294,14 @@ module Aws::ACMPCA
1266
1294
  #
1267
1295
  # **About Policies**
1268
1296
  #
1269
- # * A policy grants access on a private CA to an AWS customer account,
1270
- # to AWS Organizations, or to an AWS Organizations unit. Policies are
1271
- # under the control of a CA administrator. For more information, see
1272
- # [Using a Resource Based Policy with ACM Private CA][3].
1297
+ # * A policy grants access on a private CA to an Amazon Web Services
1298
+ # customer account, to Amazon Web Services Organizations, or to an
1299
+ # Amazon Web Services Organizations unit. Policies are under the
1300
+ # control of a CA administrator. For more information, see [Using a
1301
+ # Resource Based Policy with ACM Private CA][3].
1273
1302
  #
1274
- # * A policy permits a user of AWS Certificate Manager (ACM) to issue
1275
- # ACM certificates signed by a CA in another account.
1303
+ # * A policy permits a user of Certificate Manager (ACM) to issue ACM
1304
+ # certificates signed by a CA in another account.
1276
1305
  #
1277
1306
  # * For ACM to manage automatic renewal of these certificates, the ACM
1278
1307
  # user must configure a Service Linked Role (SLR). The SLR allows the
@@ -1280,9 +1309,9 @@ module Aws::ACMPCA
1280
1309
  # confirmation against the ACM Private CA policy. For more
1281
1310
  # information, see [Using a Service Linked Role with ACM][4].
1282
1311
  #
1283
- # * Updates made in AWS Resource Manager (RAM) are reflected in
1284
- # policies. For more information, see [Attach a Policy for
1285
- # Cross-Account Access][5].
1312
+ # * Updates made in Amazon Web Services Resource Manager (RAM) are
1313
+ # reflected in policies. For more information, see [Attach a Policy
1314
+ # for Cross-Account Access][5].
1286
1315
  #
1287
1316
  #
1288
1317
  #
@@ -1519,7 +1548,7 @@ module Aws::ACMPCA
1519
1548
  # contains your X509 version 3 extensions.
1520
1549
  #
1521
1550
  # `openssl req -new -config openssl_rsa.cnf -extensions usr_cert -newkey
1522
- # rsa:2048 -days -365 -keyout private/test_cert_priv_key.pem -out
1551
+ # rsa:2048 -days 365 -keyout private/test_cert_priv_key.pem -out
1523
1552
  # csr/test_cert_.csr`
1524
1553
  #
1525
1554
  # Note: A CSR must provide either a *subject name* or a *subject
@@ -1533,6 +1562,11 @@ module Aws::ACMPCA
1533
1562
  # parameter used to sign a CSR in the `CreateCertificateAuthority`
1534
1563
  # action.
1535
1564
  #
1565
+ # <note markdown="1"> The specified signing algorithm family (RSA or ECDSA) much match the
1566
+ # algorithm family of the CA's secret key.
1567
+ #
1568
+ # </note>
1569
+ #
1536
1570
  # @option params [String] :template_arn
1537
1571
  # Specifies a custom configuration template to use when issuing a
1538
1572
  # certificate. If this parameter is not provided, ACM Private CA
@@ -1573,7 +1607,7 @@ module Aws::ACMPCA
1573
1607
  #
1574
1608
  #
1575
1609
  #
1576
- # [1]: https://tools.ietf.org/html/rfc5280#section-4.1.2.5
1610
+ # [1]: https://datatracker.ietf.org/doc/html/rfc5280#section-4.1.2.5
1577
1611
  #
1578
1612
  # @option params [Types::Validity] :validity_not_before
1579
1613
  # Information describing the start of the validity period of the
@@ -1597,7 +1631,7 @@ module Aws::ACMPCA
1597
1631
  #
1598
1632
  #
1599
1633
  # [1]: https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_Validity.html
1600
- # [2]: https://tools.ietf.org/html/rfc5280#section-4.1.2.5
1634
+ # [2]: https://datatracker.ietf.org/doc/html/rfc5280#section-4.1.2.5
1601
1635
  #
1602
1636
  # @option params [String] :idempotency_token
1603
1637
  # Alphanumeric string that can be used to distinguish between calls to
@@ -1671,6 +1705,12 @@ module Aws::ACMPCA
1671
1705
  # initials: "String5",
1672
1706
  # pseudonym: "String128",
1673
1707
  # generation_qualifier: "String3",
1708
+ # custom_attributes: [
1709
+ # {
1710
+ # object_identifier: "CustomObjectIdentifier", # required
1711
+ # value: "String1To256", # required
1712
+ # },
1713
+ # ],
1674
1714
  # },
1675
1715
  # edi_party_name: {
1676
1716
  # party_name: "String256", # required
@@ -1681,6 +1721,13 @@ module Aws::ACMPCA
1681
1721
  # registered_id: "CustomObjectIdentifier",
1682
1722
  # },
1683
1723
  # ],
1724
+ # custom_extensions: [
1725
+ # {
1726
+ # object_identifier: "CustomObjectIdentifier", # required
1727
+ # value: "Base64String1To4096", # required
1728
+ # critical: false,
1729
+ # },
1730
+ # ],
1684
1731
  # },
1685
1732
  # subject: {
1686
1733
  # country: "CountryCodeString",
@@ -1697,6 +1744,12 @@ module Aws::ACMPCA
1697
1744
  # initials: "String5",
1698
1745
  # pseudonym: "String128",
1699
1746
  # generation_qualifier: "String3",
1747
+ # custom_attributes: [
1748
+ # {
1749
+ # object_identifier: "CustomObjectIdentifier", # required
1750
+ # value: "String1To256", # required
1751
+ # },
1752
+ # ],
1700
1753
  # },
1701
1754
  # },
1702
1755
  # certificate_authority_arn: "Arn", # required
@@ -1795,6 +1848,9 @@ module Aws::ACMPCA
1795
1848
  # resp.certificate_authorities[0].certificate_authority_configuration.subject.initials #=> String
1796
1849
  # resp.certificate_authorities[0].certificate_authority_configuration.subject.pseudonym #=> String
1797
1850
  # resp.certificate_authorities[0].certificate_authority_configuration.subject.generation_qualifier #=> String
1851
+ # resp.certificate_authorities[0].certificate_authority_configuration.subject.custom_attributes #=> Array
1852
+ # resp.certificate_authorities[0].certificate_authority_configuration.subject.custom_attributes[0].object_identifier #=> String
1853
+ # resp.certificate_authorities[0].certificate_authority_configuration.subject.custom_attributes[0].value #=> String
1798
1854
  # resp.certificate_authorities[0].certificate_authority_configuration.csr_extensions.key_usage.digital_signature #=> Boolean
1799
1855
  # resp.certificate_authorities[0].certificate_authority_configuration.csr_extensions.key_usage.non_repudiation #=> Boolean
1800
1856
  # resp.certificate_authorities[0].certificate_authority_configuration.csr_extensions.key_usage.key_encipherment #=> Boolean
@@ -1825,6 +1881,9 @@ module Aws::ACMPCA
1825
1881
  # resp.certificate_authorities[0].certificate_authority_configuration.csr_extensions.subject_information_access[0].access_location.directory_name.initials #=> String
1826
1882
  # resp.certificate_authorities[0].certificate_authority_configuration.csr_extensions.subject_information_access[0].access_location.directory_name.pseudonym #=> String
1827
1883
  # resp.certificate_authorities[0].certificate_authority_configuration.csr_extensions.subject_information_access[0].access_location.directory_name.generation_qualifier #=> String
1884
+ # resp.certificate_authorities[0].certificate_authority_configuration.csr_extensions.subject_information_access[0].access_location.directory_name.custom_attributes #=> Array
1885
+ # resp.certificate_authorities[0].certificate_authority_configuration.csr_extensions.subject_information_access[0].access_location.directory_name.custom_attributes[0].object_identifier #=> String
1886
+ # resp.certificate_authorities[0].certificate_authority_configuration.csr_extensions.subject_information_access[0].access_location.directory_name.custom_attributes[0].value #=> String
1828
1887
  # resp.certificate_authorities[0].certificate_authority_configuration.csr_extensions.subject_information_access[0].access_location.edi_party_name.party_name #=> String
1829
1888
  # resp.certificate_authorities[0].certificate_authority_configuration.csr_extensions.subject_information_access[0].access_location.edi_party_name.name_assigner #=> String
1830
1889
  # resp.certificate_authorities[0].certificate_authority_configuration.csr_extensions.subject_information_access[0].access_location.uniform_resource_identifier #=> String
@@ -1850,11 +1909,11 @@ module Aws::ACMPCA
1850
1909
  req.send_request(options)
1851
1910
  end
1852
1911
 
1853
- # List all permissions on a private CA, if any, granted to the AWS
1912
+ # List all permissions on a private CA, if any, granted to the
1854
1913
  # Certificate Manager (ACM) service principal (acm.amazonaws.com).
1855
1914
  #
1856
1915
  # These permissions allow ACM to issue and renew ACM certificates that
1857
- # reside in the same AWS account as the CA.
1916
+ # reside in the same Amazon Web Services account as the CA.
1858
1917
  #
1859
1918
  # Permissions can be granted with the [CreatePermission][1] action and
1860
1919
  # revoked with the [DeletePermission][2] action.
@@ -2010,22 +2069,23 @@ module Aws::ACMPCA
2010
2069
 
2011
2070
  # Attaches a resource-based policy to a private CA.
2012
2071
  #
2013
- # A policy can also be applied by sharing a private CA through AWS
2014
- # Resource Access Manager (RAM). For more information, see [Attach a
2015
- # Policy for Cross-Account Access][1].
2072
+ # A policy can also be applied by sharing a private CA through Amazon
2073
+ # Web Services Resource Access Manager (RAM). For more information, see
2074
+ # [Attach a Policy for Cross-Account Access][1].
2016
2075
  #
2017
2076
  # The policy can be displayed with [GetPolicy][2] and removed with
2018
2077
  # [DeletePolicy][3].
2019
2078
  #
2020
2079
  # **About Policies**
2021
2080
  #
2022
- # * A policy grants access on a private CA to an AWS customer account,
2023
- # to AWS Organizations, or to an AWS Organizations unit. Policies are
2024
- # under the control of a CA administrator. For more information, see
2025
- # [Using a Resource Based Policy with ACM Private CA][4].
2081
+ # * A policy grants access on a private CA to an Amazon Web Services
2082
+ # customer account, to Amazon Web Services Organizations, or to an
2083
+ # Amazon Web Services Organizations unit. Policies are under the
2084
+ # control of a CA administrator. For more information, see [Using a
2085
+ # Resource Based Policy with ACM Private CA][4].
2026
2086
  #
2027
- # * A policy permits a user of AWS Certificate Manager (ACM) to issue
2028
- # ACM certificates signed by a CA in another account.
2087
+ # * A policy permits a user of Certificate Manager (ACM) to issue ACM
2088
+ # certificates signed by a CA in another account.
2029
2089
  #
2030
2090
  # * For ACM to manage automatic renewal of these certificates, the ACM
2031
2091
  # user must configure a Service Linked Role (SLR). The SLR allows the
@@ -2033,9 +2093,9 @@ module Aws::ACMPCA
2033
2093
  # confirmation against the ACM Private CA policy. For more
2034
2094
  # information, see [Using a Service Linked Role with ACM][5].
2035
2095
  #
2036
- # * Updates made in AWS Resource Manager (RAM) are reflected in
2037
- # policies. For more information, see [Attach a Policy for
2038
- # Cross-Account Access][1].
2096
+ # * Updates made in Amazon Web Services Resource Manager (RAM) are
2097
+ # reflected in policies. For more information, see [Attach a Policy
2098
+ # for Cross-Account Access][1].
2039
2099
  #
2040
2100
  #
2041
2101
  #
@@ -2154,7 +2214,7 @@ module Aws::ACMPCA
2154
2214
  # <note markdown="1"> Both PCA and the IAM principal must have permission to write to the S3
2155
2215
  # bucket that you specify. If the IAM principal making the call does not
2156
2216
  # have permission to write to the bucket, then an exception is thrown.
2157
- # For more information, see [Configure Access to ACM Private CA][2].
2217
+ # For more information, see [Access policies for CRLs in Amazon S3][2].
2158
2218
  #
2159
2219
  # </note>
2160
2220
  #
@@ -2168,7 +2228,7 @@ module Aws::ACMPCA
2168
2228
  #
2169
2229
  #
2170
2230
  # [1]: https://docs.aws.amazon.com/acm-pca/latest/userguide/PcaCloudWatch.html
2171
- # [2]: https://docs.aws.amazon.com/acm-pca/latest/userguide/PcaAuthAccess.html
2231
+ # [2]: https://docs.aws.amazon.com/acm-pca/latest/userguide/crl-planning.html#s3-policies
2172
2232
  # [3]: https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_CreateCertificateAuthorityAuditReport.html
2173
2233
  #
2174
2234
  # @option params [required, String] :certificate_authority_arn
@@ -2190,7 +2250,7 @@ module Aws::ACMPCA
2190
2250
  # `openssl x509 -in file_path -text -noout`
2191
2251
  #
2192
2252
  # You can also copy the serial number from the console or use the
2193
- # [DescribeCertificate][2] action in the *AWS Certificate Manager API
2253
+ # [DescribeCertificate][2] action in the *Certificate Manager API
2194
2254
  # Reference*.
2195
2255
  #
2196
2256
  #
@@ -2221,15 +2281,15 @@ module Aws::ACMPCA
2221
2281
  end
2222
2282
 
2223
2283
  # Adds one or more tags to your private CA. Tags are labels that you can
2224
- # use to identify and organize your AWS resources. Each tag consists of
2225
- # a key and an optional value. You specify the private CA on input by
2226
- # its Amazon Resource Name (ARN). You specify the tag by using a
2227
- # key-value pair. You can apply a tag to just one private CA if you want
2228
- # to identify a specific characteristic of that CA, or you can apply the
2229
- # same tag to multiple private CAs if you want to filter for a common
2230
- # relationship among those CAs. To remove one or more tags, use the
2231
- # [UntagCertificateAuthority][1] action. Call the [ListTags][2] action
2232
- # to see what tags are associated with your CA.
2284
+ # use to identify and organize your Amazon Web Services resources. Each
2285
+ # tag consists of a key and an optional value. You specify the private
2286
+ # CA on input by its Amazon Resource Name (ARN). You specify the tag by
2287
+ # using a key-value pair. You can apply a tag to just one private CA if
2288
+ # you want to identify a specific characteristic of that CA, or you can
2289
+ # apply the same tag to multiple private CAs if you want to filter for a
2290
+ # common relationship among those CAs. To remove one or more tags, use
2291
+ # the [UntagCertificateAuthority][1] action. Call the [ListTags][2]
2292
+ # action to see what tags are associated with your CA.
2233
2293
  #
2234
2294
  #
2235
2295
  #
@@ -2332,13 +2392,13 @@ module Aws::ACMPCA
2332
2392
  # <note markdown="1"> Both PCA and the IAM principal must have permission to write to the S3
2333
2393
  # bucket that you specify. If the IAM principal making the call does not
2334
2394
  # have permission to write to the bucket, then an exception is thrown.
2335
- # For more information, see [Configure Access to ACM Private CA][1].
2395
+ # For more information, see [Access policies for CRLs in Amazon S3][1].
2336
2396
  #
2337
2397
  # </note>
2338
2398
  #
2339
2399
  #
2340
2400
  #
2341
- # [1]: https://docs.aws.amazon.com/acm-pca/latest/userguide/PcaAuthAccess.html
2401
+ # [1]: https://docs.aws.amazon.com/acm-pca/latest/userguide/crl-planning.html#s3-policies
2342
2402
  #
2343
2403
  # @option params [required, String] :certificate_authority_arn
2344
2404
  # Amazon Resource Name (ARN) of the private CA that issued the
@@ -2406,7 +2466,7 @@ module Aws::ACMPCA
2406
2466
  params: params,
2407
2467
  config: config)
2408
2468
  context[:gem_name] = 'aws-sdk-acmpca'
2409
- context[:gem_version] = '1.45.0'
2469
+ context[:gem_version] = '1.48.0'
2410
2470
  Seahorse::Client::Request.new(handlers, context)
2411
2471
  end
2412
2472
 
@@ -28,6 +28,7 @@ module Aws::ACMPCA
28
28
  AuditReportId = Shapes::StringShape.new(name: 'AuditReportId')
29
29
  AuditReportResponseFormat = Shapes::StringShape.new(name: 'AuditReportResponseFormat')
30
30
  AuditReportStatus = Shapes::StringShape.new(name: 'AuditReportStatus')
31
+ Base64String1To4096 = Shapes::StringShape.new(name: 'Base64String1To4096')
31
32
  Boolean = Shapes::BooleanShape.new(name: 'Boolean')
32
33
  CertificateAuthorities = Shapes::ListShape.new(name: 'CertificateAuthorities')
33
34
  CertificateAuthority = Shapes::StructureShape.new(name: 'CertificateAuthority')
@@ -51,6 +52,10 @@ module Aws::ACMPCA
51
52
  CsrBlob = Shapes::BlobShape.new(name: 'CsrBlob')
52
53
  CsrBody = Shapes::StringShape.new(name: 'CsrBody')
53
54
  CsrExtensions = Shapes::StructureShape.new(name: 'CsrExtensions')
55
+ CustomAttribute = Shapes::StructureShape.new(name: 'CustomAttribute')
56
+ CustomAttributeList = Shapes::ListShape.new(name: 'CustomAttributeList')
57
+ CustomExtension = Shapes::StructureShape.new(name: 'CustomExtension')
58
+ CustomExtensionList = Shapes::ListShape.new(name: 'CustomExtensionList')
54
59
  CustomObjectIdentifier = Shapes::StringShape.new(name: 'CustomObjectIdentifier')
55
60
  DeleteCertificateAuthorityRequest = Shapes::StructureShape.new(name: 'DeleteCertificateAuthorityRequest')
56
61
  DeletePermissionRequest = Shapes::StructureShape.new(name: 'DeletePermissionRequest')
@@ -132,6 +137,7 @@ module Aws::ACMPCA
132
137
  String = Shapes::StringShape.new(name: 'String')
133
138
  String128 = Shapes::StringShape.new(name: 'String128')
134
139
  String16 = Shapes::StringShape.new(name: 'String16')
140
+ String1To256 = Shapes::StringShape.new(name: 'String1To256')
135
141
  String253 = Shapes::StringShape.new(name: 'String253')
136
142
  String256 = Shapes::StringShape.new(name: 'String256')
137
143
  String3 = Shapes::StringShape.new(name: 'String3')
@@ -166,6 +172,7 @@ module Aws::ACMPCA
166
172
  ASN1Subject.add_member(:initials, Shapes::ShapeRef.new(shape: String5, location_name: "Initials"))
167
173
  ASN1Subject.add_member(:pseudonym, Shapes::ShapeRef.new(shape: String128, location_name: "Pseudonym"))
168
174
  ASN1Subject.add_member(:generation_qualifier, Shapes::ShapeRef.new(shape: String3, location_name: "GenerationQualifier"))
175
+ ASN1Subject.add_member(:custom_attributes, Shapes::ShapeRef.new(shape: CustomAttributeList, location_name: "CustomAttributes"))
169
176
  ASN1Subject.struct_class = Types::ASN1Subject
170
177
 
171
178
  AccessDescription.add_member(:access_method, Shapes::ShapeRef.new(shape: AccessMethod, required: true, location_name: "AccessMethod"))
@@ -253,6 +260,19 @@ module Aws::ACMPCA
253
260
  CsrExtensions.add_member(:subject_information_access, Shapes::ShapeRef.new(shape: AccessDescriptionList, location_name: "SubjectInformationAccess"))
254
261
  CsrExtensions.struct_class = Types::CsrExtensions
255
262
 
263
+ CustomAttribute.add_member(:object_identifier, Shapes::ShapeRef.new(shape: CustomObjectIdentifier, required: true, location_name: "ObjectIdentifier"))
264
+ CustomAttribute.add_member(:value, Shapes::ShapeRef.new(shape: String1To256, required: true, location_name: "Value"))
265
+ CustomAttribute.struct_class = Types::CustomAttribute
266
+
267
+ CustomAttributeList.member = Shapes::ShapeRef.new(shape: CustomAttribute)
268
+
269
+ CustomExtension.add_member(:object_identifier, Shapes::ShapeRef.new(shape: CustomObjectIdentifier, required: true, location_name: "ObjectIdentifier"))
270
+ CustomExtension.add_member(:value, Shapes::ShapeRef.new(shape: Base64String1To4096, required: true, location_name: "Value"))
271
+ CustomExtension.add_member(:critical, Shapes::ShapeRef.new(shape: Boolean, location_name: "Critical", metadata: {"box"=>true}))
272
+ CustomExtension.struct_class = Types::CustomExtension
273
+
274
+ CustomExtensionList.member = Shapes::ShapeRef.new(shape: CustomExtension)
275
+
256
276
  DeleteCertificateAuthorityRequest.add_member(:certificate_authority_arn, Shapes::ShapeRef.new(shape: Arn, required: true, location_name: "CertificateAuthorityArn"))
257
277
  DeleteCertificateAuthorityRequest.add_member(:permanent_deletion_time_in_days, Shapes::ShapeRef.new(shape: PermanentDeletionTimeInDays, location_name: "PermanentDeletionTimeInDays"))
258
278
  DeleteCertificateAuthorityRequest.struct_class = Types::DeleteCertificateAuthorityRequest
@@ -295,6 +315,7 @@ module Aws::ACMPCA
295
315
  Extensions.add_member(:extended_key_usage, Shapes::ShapeRef.new(shape: ExtendedKeyUsageList, location_name: "ExtendedKeyUsage"))
296
316
  Extensions.add_member(:key_usage, Shapes::ShapeRef.new(shape: KeyUsage, location_name: "KeyUsage"))
297
317
  Extensions.add_member(:subject_alternative_names, Shapes::ShapeRef.new(shape: GeneralNameList, location_name: "SubjectAlternativeNames"))
318
+ Extensions.add_member(:custom_extensions, Shapes::ShapeRef.new(shape: CustomExtensionList, location_name: "CustomExtensions"))
298
319
  Extensions.struct_class = Types::Extensions
299
320
 
300
321
  GeneralName.add_member(:other_name, Shapes::ShapeRef.new(shape: OtherName, location_name: "OtherName"))
@@ -35,6 +35,12 @@ module Aws::ACMPCA
35
35
  # initials: "String5",
36
36
  # pseudonym: "String128",
37
37
  # generation_qualifier: "String3",
38
+ # custom_attributes: [
39
+ # {
40
+ # object_identifier: "CustomObjectIdentifier", # required
41
+ # value: "String1To256", # required
42
+ # },
43
+ # ],
38
44
  # }
39
45
  #
40
46
  # @!attribute [rw] country
@@ -110,6 +116,22 @@ module Aws::ACMPCA
110
116
  # Examples include Jr. for junior, Sr. for senior, and III for third.
111
117
  # @return [String]
112
118
  #
119
+ # @!attribute [rw] custom_attributes
120
+ # Contains a sequence of one or more X.500 relative distinguished
121
+ # names (RDNs), each of which consists of an object identifier (OID)
122
+ # and a value. For more information, see NIST’s definition of [Object
123
+ # Identifier (OID)][1].
124
+ #
125
+ # <note markdown="1"> Custom attributes cannot be used in combination with standard
126
+ # attributes.
127
+ #
128
+ # </note>
129
+ #
130
+ #
131
+ #
132
+ # [1]: https://csrc.nist.gov/glossary/term/Object_Identifier
133
+ # @return [Array<Types::CustomAttribute>]
134
+ #
113
135
  # @see http://docs.aws.amazon.com/goto/WebAPI/acm-pca-2017-08-22/ASN1Subject AWS API Documentation
114
136
  #
115
137
  class ASN1Subject < Struct.new(
@@ -126,7 +148,8 @@ module Aws::ACMPCA
126
148
  :given_name,
127
149
  :initials,
128
150
  :pseudonym,
129
- :generation_qualifier)
151
+ :generation_qualifier,
152
+ :custom_attributes)
130
153
  SENSITIVE = []
131
154
  include Aws::Structure
132
155
  end
@@ -136,7 +159,7 @@ module Aws::ACMPCA
136
159
  #
137
160
  #
138
161
  #
139
- # [1]: https://tools.ietf.org/html/rfc5280
162
+ # [1]: https://datatracker.ietf.org/doc/html/rfc5280
140
163
  #
141
164
  # @note When making an API call, you may pass AccessDescription
142
165
  # data as a hash:
@@ -168,6 +191,12 @@ module Aws::ACMPCA
168
191
  # initials: "String5",
169
192
  # pseudonym: "String128",
170
193
  # generation_qualifier: "String3",
194
+ # custom_attributes: [
195
+ # {
196
+ # object_identifier: "CustomObjectIdentifier", # required
197
+ # value: "String1To256", # required
198
+ # },
199
+ # ],
171
200
  # },
172
201
  # edi_party_name: {
173
202
  # party_name: "String256", # required
@@ -301,6 +330,12 @@ module Aws::ACMPCA
301
330
  # initials: "String5",
302
331
  # pseudonym: "String128",
303
332
  # generation_qualifier: "String3",
333
+ # custom_attributes: [
334
+ # {
335
+ # object_identifier: "CustomObjectIdentifier", # required
336
+ # value: "String1To256", # required
337
+ # },
338
+ # ],
304
339
  # },
305
340
  # edi_party_name: {
306
341
  # party_name: "String256", # required
@@ -311,6 +346,13 @@ module Aws::ACMPCA
311
346
  # registered_id: "CustomObjectIdentifier",
312
347
  # },
313
348
  # ],
349
+ # custom_extensions: [
350
+ # {
351
+ # object_identifier: "CustomObjectIdentifier", # required
352
+ # value: "Base64String1To4096", # required
353
+ # critical: false,
354
+ # },
355
+ # ],
314
356
  # },
315
357
  # subject: {
316
358
  # country: "CountryCodeString",
@@ -327,6 +369,12 @@ module Aws::ACMPCA
327
369
  # initials: "String5",
328
370
  # pseudonym: "String128",
329
371
  # generation_qualifier: "String3",
372
+ # custom_attributes: [
373
+ # {
374
+ # object_identifier: "CustomObjectIdentifier", # required
375
+ # value: "String1To256", # required
376
+ # },
377
+ # ],
330
378
  # },
331
379
  # }
332
380
  #
@@ -363,7 +411,7 @@ module Aws::ACMPCA
363
411
  # retrieve a private CA certificate signing request (CSR). Sign the CSR
364
412
  # with your ACM Private CA-hosted or on-premises root or subordinate CA
365
413
  # certificate. Call the [ImportCertificateAuthorityCertificate][3]
366
- # action to import the signed certificate into AWS Certificate Manager
414
+ # action to import the signed certificate into Certificate Manager
367
415
  # (ACM).
368
416
  #
369
417
  #
@@ -378,7 +426,8 @@ module Aws::ACMPCA
378
426
  # @return [String]
379
427
  #
380
428
  # @!attribute [rw] owner_account
381
- # The AWS account ID that owns the certificate authority.
429
+ # The Amazon Web Services account ID that owns the certificate
430
+ # authority.
382
431
  # @return [String]
383
432
  #
384
433
  # @!attribute [rw] created_at
@@ -439,7 +488,7 @@ module Aws::ACMPCA
439
488
  #
440
489
  # Default: FIPS\_140\_2\_LEVEL\_3\_OR\_HIGHER
441
490
  #
442
- # Note: AWS Region ap-northeast-3 supports only
491
+ # Note: Amazon Web Services Region ap-northeast-3 supports only
443
492
  # FIPS\_140\_2\_LEVEL\_2\_OR\_HIGHER. You must explicitly specify this
444
493
  # parameter and value when creating a CA in that Region. Specifying a
445
494
  # different value (or no value) results in an `InvalidArgsException`
@@ -501,6 +550,12 @@ module Aws::ACMPCA
501
550
  # initials: "String5",
502
551
  # pseudonym: "String128",
503
552
  # generation_qualifier: "String3",
553
+ # custom_attributes: [
554
+ # {
555
+ # object_identifier: "CustomObjectIdentifier", # required
556
+ # value: "String1To256", # required
557
+ # },
558
+ # ],
504
559
  # },
505
560
  # csr_extensions: {
506
561
  # key_usage: {
@@ -542,6 +597,12 @@ module Aws::ACMPCA
542
597
  # initials: "String5",
543
598
  # pseudonym: "String128",
544
599
  # generation_qualifier: "String3",
600
+ # custom_attributes: [
601
+ # {
602
+ # object_identifier: "CustomObjectIdentifier", # required
603
+ # value: "String1To256", # required
604
+ # },
605
+ # ],
545
606
  # },
546
607
  # edi_party_name: {
547
608
  # party_name: "String256", # required
@@ -695,6 +756,12 @@ module Aws::ACMPCA
695
756
  # initials: "String5",
696
757
  # pseudonym: "String128",
697
758
  # generation_qualifier: "String3",
759
+ # custom_attributes: [
760
+ # {
761
+ # object_identifier: "CustomObjectIdentifier", # required
762
+ # value: "String1To256", # required
763
+ # },
764
+ # ],
698
765
  # },
699
766
  # csr_extensions: {
700
767
  # key_usage: {
@@ -736,6 +803,12 @@ module Aws::ACMPCA
736
803
  # initials: "String5",
737
804
  # pseudonym: "String128",
738
805
  # generation_qualifier: "String3",
806
+ # custom_attributes: [
807
+ # {
808
+ # object_identifier: "CustomObjectIdentifier", # required
809
+ # value: "String1To256", # required
810
+ # },
811
+ # ],
739
812
  # },
740
813
  # edi_party_name: {
741
814
  # party_name: "String256", # required
@@ -888,8 +961,9 @@ module Aws::ACMPCA
888
961
  # @return [String]
889
962
  #
890
963
  # @!attribute [rw] principal
891
- # The AWS service or identity that receives the permission. At this
892
- # time, the only valid principal is `acm.amazonaws.com`.
964
+ # The Amazon Web Services service or identity that receives the
965
+ # permission. At this time, the only valid principal is
966
+ # `acm.amazonaws.com`.
893
967
  # @return [String]
894
968
  #
895
969
  # @!attribute [rw] source_account
@@ -897,8 +971,9 @@ module Aws::ACMPCA
897
971
  # @return [String]
898
972
  #
899
973
  # @!attribute [rw] actions
900
- # The actions that the specified AWS service principal can use. These
901
- # include `IssueCertificate`, `GetCertificate`, and `ListPermissions`.
974
+ # The actions that the specified Amazon Web Services service principal
975
+ # can use. These include `IssueCertificate`, `GetCertificate`, and
976
+ # `ListPermissions`.
902
977
  # @return [Array<String>]
903
978
  #
904
979
  # @see http://docs.aws.amazon.com/goto/WebAPI/acm-pca-2017-08-22/CreatePermissionRequest AWS API Documentation
@@ -928,10 +1003,10 @@ module Aws::ACMPCA
928
1003
  #
929
1004
  # Your private CA uses the value in the **ExpirationInDays** parameter
930
1005
  # to calculate the **nextUpdate** field in the CRL. The CRL is refreshed
931
- # at 1/2 the age of next update or when a certificate is revoked. When a
932
- # certificate is revoked, it is recorded in the next CRL that is
933
- # generated and in the next audit report. Only time valid certificates
934
- # are listed in the CRL. Expired certificates are not included.
1006
+ # prior to a certificate's expiration date or when a certificate is
1007
+ # revoked. When a certificate is revoked, it appears in the CRL until
1008
+ # the certificate expires, and then in one additional CRL after
1009
+ # expiration, and it always appears in the audit report.
935
1010
  #
936
1011
  # A CRL is typically updated approximately 30 minutes after a
937
1012
  # certificate is revoked. If for any reason a CRL update fails, ACM
@@ -985,8 +1060,8 @@ module Aws::ACMPCA
985
1060
  # `openssl crl -inform DER -text -in crl_path -noout`
986
1061
  #
987
1062
  # For more information, see [Planning a certificate revocation list
988
- # (CRL)][2] in the *AWS Certificate Manager Private Certificate
989
- # Authority (PCA) User Guide*
1063
+ # (CRL)][2] in the *Certificate Manager Private Certificate Authority
1064
+ # (PCA) User Guide*
990
1065
  #
991
1066
  #
992
1067
  #
@@ -1127,6 +1202,12 @@ module Aws::ACMPCA
1127
1202
  # initials: "String5",
1128
1203
  # pseudonym: "String128",
1129
1204
  # generation_qualifier: "String3",
1205
+ # custom_attributes: [
1206
+ # {
1207
+ # object_identifier: "CustomObjectIdentifier", # required
1208
+ # value: "String1To256", # required
1209
+ # },
1210
+ # ],
1130
1211
  # },
1131
1212
  # edi_party_name: {
1132
1213
  # party_name: "String256", # required
@@ -1152,7 +1233,7 @@ module Aws::ACMPCA
1152
1233
  #
1153
1234
  #
1154
1235
  #
1155
- # [1]: https://tools.ietf.org/html/rfc5280#section-4.2.2.2
1236
+ # [1]: https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.2.2
1156
1237
  # @return [Array<Types::AccessDescription>]
1157
1238
  #
1158
1239
  # @see http://docs.aws.amazon.com/goto/WebAPI/acm-pca-2017-08-22/CsrExtensions AWS API Documentation
@@ -1164,6 +1245,79 @@ module Aws::ACMPCA
1164
1245
  include Aws::Structure
1165
1246
  end
1166
1247
 
1248
+ # Defines the X.500 relative distinguished name (RDN).
1249
+ #
1250
+ # @note When making an API call, you may pass CustomAttribute
1251
+ # data as a hash:
1252
+ #
1253
+ # {
1254
+ # object_identifier: "CustomObjectIdentifier", # required
1255
+ # value: "String1To256", # required
1256
+ # }
1257
+ #
1258
+ # @!attribute [rw] object_identifier
1259
+ # Specifies the object identifier (OID) of the attribute type of the
1260
+ # relative distinguished name (RDN).
1261
+ # @return [String]
1262
+ #
1263
+ # @!attribute [rw] value
1264
+ # Specifies the attribute value of relative distinguished name (RDN).
1265
+ # @return [String]
1266
+ #
1267
+ # @see http://docs.aws.amazon.com/goto/WebAPI/acm-pca-2017-08-22/CustomAttribute AWS API Documentation
1268
+ #
1269
+ class CustomAttribute < Struct.new(
1270
+ :object_identifier,
1271
+ :value)
1272
+ SENSITIVE = []
1273
+ include Aws::Structure
1274
+ end
1275
+
1276
+ # Specifies the X.509 extension information for a certificate.
1277
+ #
1278
+ # Extensions present in `CustomExtensions` follow the `ApiPassthrough`
1279
+ # [template rules][1].
1280
+ #
1281
+ #
1282
+ #
1283
+ # [1]: https://docs.aws.amazon.com/acm-pca/latest/userguide/UsingTemplates.html#template-order-of-operations
1284
+ #
1285
+ # @note When making an API call, you may pass CustomExtension
1286
+ # data as a hash:
1287
+ #
1288
+ # {
1289
+ # object_identifier: "CustomObjectIdentifier", # required
1290
+ # value: "Base64String1To4096", # required
1291
+ # critical: false,
1292
+ # }
1293
+ #
1294
+ # @!attribute [rw] object_identifier
1295
+ # Specifies the object identifier (OID) of the X.509 extension. For
1296
+ # more information, see the [Global OID reference database.][1]
1297
+ #
1298
+ #
1299
+ #
1300
+ # [1]: https://oidref.com/2.5.29
1301
+ # @return [String]
1302
+ #
1303
+ # @!attribute [rw] value
1304
+ # Specifies the base64-encoded value of the X.509 extension.
1305
+ # @return [String]
1306
+ #
1307
+ # @!attribute [rw] critical
1308
+ # Specifies the critical flag of the X.509 extension.
1309
+ # @return [Boolean]
1310
+ #
1311
+ # @see http://docs.aws.amazon.com/goto/WebAPI/acm-pca-2017-08-22/CustomExtension AWS API Documentation
1312
+ #
1313
+ class CustomExtension < Struct.new(
1314
+ :object_identifier,
1315
+ :value,
1316
+ :critical)
1317
+ SENSITIVE = []
1318
+ include Aws::Structure
1319
+ end
1320
+
1167
1321
  # @note When making an API call, you may pass DeleteCertificateAuthorityRequest
1168
1322
  # data as a hash:
1169
1323
  #
@@ -1223,13 +1377,13 @@ module Aws::ACMPCA
1223
1377
  # @return [String]
1224
1378
  #
1225
1379
  # @!attribute [rw] principal
1226
- # The AWS service or identity that will have its CA permissions
1227
- # revoked. At this time, the only valid service principal is
1228
- # `acm.amazonaws.com`
1380
+ # The Amazon Web Services service or identity that will have its CA
1381
+ # permissions revoked. At this time, the only valid service principal
1382
+ # is `acm.amazonaws.com`
1229
1383
  # @return [String]
1230
1384
  #
1231
1385
  # @!attribute [rw] source_account
1232
- # The AWS account that calls this action.
1386
+ # The Amazon Web Services account that calls this action.
1233
1387
  # @return [String]
1234
1388
  #
1235
1389
  # @see http://docs.aws.amazon.com/goto/WebAPI/acm-pca-2017-08-22/DeletePermissionRequest AWS API Documentation
@@ -1381,7 +1535,7 @@ module Aws::ACMPCA
1381
1535
  #
1382
1536
  #
1383
1537
  #
1384
- # [1]: https://tools.ietf.org/html/rfc5280
1538
+ # [1]: https://datatracker.ietf.org/doc/html/rfc5280
1385
1539
  #
1386
1540
  # @note When making an API call, you may pass EdiPartyName
1387
1541
  # data as a hash:
@@ -1426,7 +1580,7 @@ module Aws::ACMPCA
1426
1580
  #
1427
1581
  #
1428
1582
  #
1429
- # [1]: https://tools.ietf.org/html/rfc5280#section-4.2.1.12
1583
+ # [1]: https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.12
1430
1584
  # @return [String]
1431
1585
  #
1432
1586
  # @!attribute [rw] extended_key_usage_object_identifier
@@ -1502,6 +1656,12 @@ module Aws::ACMPCA
1502
1656
  # initials: "String5",
1503
1657
  # pseudonym: "String128",
1504
1658
  # generation_qualifier: "String3",
1659
+ # custom_attributes: [
1660
+ # {
1661
+ # object_identifier: "CustomObjectIdentifier", # required
1662
+ # value: "String1To256", # required
1663
+ # },
1664
+ # ],
1505
1665
  # },
1506
1666
  # edi_party_name: {
1507
1667
  # party_name: "String256", # required
@@ -1512,6 +1672,13 @@ module Aws::ACMPCA
1512
1672
  # registered_id: "CustomObjectIdentifier",
1513
1673
  # },
1514
1674
  # ],
1675
+ # custom_extensions: [
1676
+ # {
1677
+ # object_identifier: "CustomObjectIdentifier", # required
1678
+ # value: "Base64String1To4096", # required
1679
+ # critical: false,
1680
+ # },
1681
+ # ],
1515
1682
  # }
1516
1683
  #
1517
1684
  # @!attribute [rw] certificate_policies
@@ -1548,13 +1715,31 @@ module Aws::ACMPCA
1548
1715
  # the certificate.
1549
1716
  # @return [Array<Types::GeneralName>]
1550
1717
  #
1718
+ # @!attribute [rw] custom_extensions
1719
+ # Contains a sequence of one or more X.509 extensions, each of which
1720
+ # consists of an object identifier (OID), a base64-encoded value, and
1721
+ # the critical flag. For more information, see the [Global OID
1722
+ # reference database.][1]
1723
+ #
1724
+ # <note markdown="1"> The OID value of a [CustomExtension][2] must not match the OID of a
1725
+ # predefined extension.
1726
+ #
1727
+ # </note>
1728
+ #
1729
+ #
1730
+ #
1731
+ # [1]: https://oidref.com/2.5.29
1732
+ # [2]: https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_CustomExtension.html
1733
+ # @return [Array<Types::CustomExtension>]
1734
+ #
1551
1735
  # @see http://docs.aws.amazon.com/goto/WebAPI/acm-pca-2017-08-22/Extensions AWS API Documentation
1552
1736
  #
1553
1737
  class Extensions < Struct.new(
1554
1738
  :certificate_policies,
1555
1739
  :extended_key_usage,
1556
1740
  :key_usage,
1557
- :subject_alternative_names)
1741
+ :subject_alternative_names,
1742
+ :custom_extensions)
1558
1743
  SENSITIVE = []
1559
1744
  include Aws::Structure
1560
1745
  end
@@ -1565,7 +1750,7 @@ module Aws::ACMPCA
1565
1750
  #
1566
1751
  #
1567
1752
  #
1568
- # [1]: https://tools.ietf.org/html/rfc5280
1753
+ # [1]: https://datatracker.ietf.org/doc/html/rfc5280
1569
1754
  #
1570
1755
  # @note When making an API call, you may pass GeneralName
1571
1756
  # data as a hash:
@@ -1592,6 +1777,12 @@ module Aws::ACMPCA
1592
1777
  # initials: "String5",
1593
1778
  # pseudonym: "String128",
1594
1779
  # generation_qualifier: "String3",
1780
+ # custom_attributes: [
1781
+ # {
1782
+ # object_identifier: "CustomObjectIdentifier", # required
1783
+ # value: "String1To256", # required
1784
+ # },
1785
+ # ],
1595
1786
  # },
1596
1787
  # edi_party_name: {
1597
1788
  # party_name: "String256", # required
@@ -1611,7 +1802,7 @@ module Aws::ACMPCA
1611
1802
  #
1612
1803
  #
1613
1804
  #
1614
- # [1]: https://tools.ietf.org/html/rfc822
1805
+ # [1]: https://datatracker.ietf.org/doc/html/rfc822
1615
1806
  # @return [String]
1616
1807
  #
1617
1808
  # @!attribute [rw] dns_name
@@ -2043,6 +2234,12 @@ module Aws::ACMPCA
2043
2234
  # initials: "String5",
2044
2235
  # pseudonym: "String128",
2045
2236
  # generation_qualifier: "String3",
2237
+ # custom_attributes: [
2238
+ # {
2239
+ # object_identifier: "CustomObjectIdentifier", # required
2240
+ # value: "String1To256", # required
2241
+ # },
2242
+ # ],
2046
2243
  # },
2047
2244
  # edi_party_name: {
2048
2245
  # party_name: "String256", # required
@@ -2053,6 +2250,13 @@ module Aws::ACMPCA
2053
2250
  # registered_id: "CustomObjectIdentifier",
2054
2251
  # },
2055
2252
  # ],
2253
+ # custom_extensions: [
2254
+ # {
2255
+ # object_identifier: "CustomObjectIdentifier", # required
2256
+ # value: "Base64String1To4096", # required
2257
+ # critical: false,
2258
+ # },
2259
+ # ],
2056
2260
  # },
2057
2261
  # subject: {
2058
2262
  # country: "CountryCodeString",
@@ -2069,6 +2273,12 @@ module Aws::ACMPCA
2069
2273
  # initials: "String5",
2070
2274
  # pseudonym: "String128",
2071
2275
  # generation_qualifier: "String3",
2276
+ # custom_attributes: [
2277
+ # {
2278
+ # object_identifier: "CustomObjectIdentifier", # required
2279
+ # value: "String1To256", # required
2280
+ # },
2281
+ # ],
2072
2282
  # },
2073
2283
  # },
2074
2284
  # certificate_authority_arn: "Arn", # required
@@ -2128,7 +2338,7 @@ module Aws::ACMPCA
2128
2338
  # contains your X509 version 3 extensions.
2129
2339
  #
2130
2340
  # `openssl req -new -config openssl_rsa.cnf -extensions usr_cert
2131
- # -newkey rsa:2048 -days -365 -keyout private/test_cert_priv_key.pem
2341
+ # -newkey rsa:2048 -days 365 -keyout private/test_cert_priv_key.pem
2132
2342
  # -out csr/test_cert_.csr`
2133
2343
  #
2134
2344
  # Note: A CSR must provide either a *subject name* or a *subject
@@ -2142,6 +2352,11 @@ module Aws::ACMPCA
2142
2352
  # This parameter should not be confused with the `SigningAlgorithm`
2143
2353
  # parameter used to sign a CSR in the `CreateCertificateAuthority`
2144
2354
  # action.
2355
+ #
2356
+ # <note markdown="1"> The specified signing algorithm family (RSA or ECDSA) much match the
2357
+ # algorithm family of the CA's secret key.
2358
+ #
2359
+ # </note>
2145
2360
  # @return [String]
2146
2361
  #
2147
2362
  # @!attribute [rw] template_arn
@@ -2185,7 +2400,7 @@ module Aws::ACMPCA
2185
2400
  #
2186
2401
  #
2187
2402
  #
2188
- # [1]: https://tools.ietf.org/html/rfc5280#section-4.1.2.5
2403
+ # [1]: https://datatracker.ietf.org/doc/html/rfc5280#section-4.1.2.5
2189
2404
  # @return [Types::Validity]
2190
2405
  #
2191
2406
  # @!attribute [rw] validity_not_before
@@ -2210,7 +2425,7 @@ module Aws::ACMPCA
2210
2425
  #
2211
2426
  #
2212
2427
  # [1]: https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_Validity.html
2213
- # [2]: https://tools.ietf.org/html/rfc5280#section-4.1.2.5
2428
+ # [2]: https://datatracker.ietf.org/doc/html/rfc5280#section-4.1.2.5
2214
2429
  # @return [Types::Validity]
2215
2430
  #
2216
2431
  # @!attribute [rw] idempotency_token
@@ -2588,17 +2803,17 @@ module Aws::ACMPCA
2588
2803
  # @return [Boolean]
2589
2804
  #
2590
2805
  # @!attribute [rw] ocsp_custom_cname
2591
- # By default, ACM Private CA injects an AWS domain into certificates
2592
- # being validated by the Online Certificate Status Protocol (OCSP). A
2593
- # customer can alternatively use this object to define a CNAME
2594
- # specifying a customized OCSP domain.
2806
+ # By default, ACM Private CA injects an Amazon Web Services domain
2807
+ # into certificates being validated by the Online Certificate Status
2808
+ # Protocol (OCSP). A customer can alternatively use this object to
2809
+ # define a CNAME specifying a customized OCSP domain.
2595
2810
  #
2596
2811
  # Note: The value of the CNAME must not include a protocol prefix such
2597
2812
  # as "http://" or "https://".
2598
2813
  #
2599
2814
  # For more information, see [Customizing Online Certificate Status
2600
- # Protocol (OCSP) ][1] in the *AWS Certificate Manager Private
2601
- # Certificate Authority (PCA) User Guide*.
2815
+ # Protocol (OCSP) ][1] in the *Certificate Manager Private Certificate
2816
+ # Authority (PCA) User Guide*.
2602
2817
  #
2603
2818
  #
2604
2819
  #
@@ -2649,12 +2864,13 @@ module Aws::ACMPCA
2649
2864
  end
2650
2865
 
2651
2866
  # Permissions designate which private CA actions can be performed by an
2652
- # AWS service or entity. In order for ACM to automatically renew private
2653
- # certificates, you must give the ACM service principal all available
2654
- # permissions (`IssueCertificate`, `GetCertificate`, and
2655
- # `ListPermissions`). Permissions can be assigned with the
2656
- # [CreatePermission][1] action, removed with the [DeletePermission][2]
2657
- # action, and listed with the [ListPermissions][3] action.
2867
+ # Amazon Web Services service or entity. In order for ACM to
2868
+ # automatically renew private certificates, you must give the ACM
2869
+ # service principal all available permissions (`IssueCertificate`,
2870
+ # `GetCertificate`, and `ListPermissions`). Permissions can be assigned
2871
+ # with the [CreatePermission][1] action, removed with the
2872
+ # [DeletePermission][2] action, and listed with the [ListPermissions][3]
2873
+ # action.
2658
2874
  #
2659
2875
  #
2660
2876
  #
@@ -2672,8 +2888,8 @@ module Aws::ACMPCA
2672
2888
  # @return [Time]
2673
2889
  #
2674
2890
  # @!attribute [rw] principal
2675
- # The AWS service or entity that holds the permission. At this time,
2676
- # the only valid principal is `acm.amazonaws.com`.
2891
+ # The Amazon Web Services service or entity that holds the permission.
2892
+ # At this time, the only valid principal is `acm.amazonaws.com`.
2677
2893
  # @return [String]
2678
2894
  #
2679
2895
  # @!attribute [rw] source_account
@@ -2681,8 +2897,8 @@ module Aws::ACMPCA
2681
2897
  # @return [String]
2682
2898
  #
2683
2899
  # @!attribute [rw] actions
2684
- # The private CA actions that can be performed by the designated AWS
2685
- # service.
2900
+ # The private CA actions that can be performed by the designated
2901
+ # Amazon Web Services service.
2686
2902
  # @return [Array<String>]
2687
2903
  #
2688
2904
  # @!attribute [rw] policy
@@ -2836,7 +3052,7 @@ module Aws::ACMPCA
2836
3052
  #
2837
3053
  #
2838
3054
  #
2839
- # [1]: https://tools.ietf.org/html/rfc5280#section-4.2.1.4
3055
+ # [1]: https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.4
2840
3056
  #
2841
3057
  # @note When making an API call, you may pass Qualifier
2842
3058
  # data as a hash:
@@ -2946,8 +3162,8 @@ module Aws::ACMPCA
2946
3162
  # about certificates as requested by clients, and a CRL contains an
2947
3163
  # updated list of certificates revoked by your CA. For more information,
2948
3164
  # see [RevokeCertificate][3] and [Setting up a certificate revocation
2949
- # method][4] in the *AWS Certificate Manager Private Certificate
2950
- # Authority (PCA) User Guide*.
3165
+ # method][4] in the *Certificate Manager Private Certificate Authority
3166
+ # (PCA) User Guide*.
2951
3167
  #
2952
3168
  #
2953
3169
  #
@@ -3026,7 +3242,7 @@ module Aws::ACMPCA
3026
3242
  # `openssl x509 -in file_path -text -noout`
3027
3243
  #
3028
3244
  # You can also copy the serial number from the console or use the
3029
- # [DescribeCertificate][2] action in the *AWS Certificate Manager API
3245
+ # [DescribeCertificate][2] action in the *Certificate Manager API
3030
3246
  # Reference*.
3031
3247
  #
3032
3248
  #
@@ -3247,7 +3463,7 @@ module Aws::ACMPCA
3247
3463
  #
3248
3464
  #
3249
3465
  #
3250
- # [1]: https://tools.ietf.org/html/rfc5280#section-4.1.2.5
3466
+ # [1]: https://datatracker.ietf.org/doc/html/rfc5280#section-4.1.2.5
3251
3467
  #
3252
3468
  # @note When making an API call, you may pass Validity
3253
3469
  # data as a hash:
@@ -49,6 +49,6 @@ require_relative 'aws-sdk-acmpca/customizations'
49
49
  # @!group service
50
50
  module Aws::ACMPCA
51
51
 
52
- GEM_VERSION = '1.45.0'
52
+ GEM_VERSION = '1.48.0'
53
53
 
54
54
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-acmpca
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.45.0
4
+ version: 1.48.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2022-02-03 00:00:00.000000000 Z
11
+ date: 2022-03-28 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core
@@ -19,7 +19,7 @@ dependencies:
19
19
  version: '3'
20
20
  - - ">="
21
21
  - !ruby/object:Gem::Version
22
- version: 3.126.0
22
+ version: 3.127.0
23
23
  type: :runtime
24
24
  prerelease: false
25
25
  version_requirements: !ruby/object:Gem::Requirement
@@ -29,7 +29,7 @@ dependencies:
29
29
  version: '3'
30
30
  - - ">="
31
31
  - !ruby/object:Gem::Version
32
- version: 3.126.0
32
+ version: 3.127.0
33
33
  - !ruby/object:Gem::Dependency
34
34
  name: aws-sigv4
35
35
  requirement: !ruby/object:Gem::Requirement