aws-sdk-acmpca 1.46.0 → 1.49.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 20e6a6916b4d2b10c02df975b6cda79f7dbbfe8ac786ca19628f2c89c2c2609e
4
- data.tar.gz: 65e51a4da808f4d5566e6ce85c0f79dffdab3940333d93bd7586fe7ab14f6ee0
3
+ metadata.gz: a68035efe70685c51e54df7849d02337ab1ed8055de98c659b0537a81271b709
4
+ data.tar.gz: cd8092280a1c134272eaab5bbb70de6ad8d908cc1636575cd6af72ca01d38a4e
5
5
  SHA512:
6
- metadata.gz: d38f9e3091c190934dfb3d0ed160cbc5602baa22495abd110fce61b4a8517e9998c73154f5fa3bb8058d588b9f3ab25315e8120caacdeb4a04bed2b31c163002
7
- data.tar.gz: 58866f5386c2e197b6460328ccf1233257c2f80e3101c7c2e8bc74b1aad8027bf0e5e9598190f89717d60bac0282681484853a6f8241e65b128d64766d8b7951
6
+ metadata.gz: 0bd3680eff0c321ebc29d32e3c1b872131fb29d49f621deb2c7dba50d069fd8fd51fb5ca588ddf7183aecf8411638d80f407e5b826faf4923bcf5ddc397413d0
7
+ data.tar.gz: 95e81fd32a6da57c832b1a1ee66010f361cf73214108dcb0e2b0e624a6375e66838b124611ae76e49ff353f70fb1d4c7defc1c3554379aaf694e3c95886c8cdd
data/CHANGELOG.md CHANGED
@@ -1,6 +1,21 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.49.0 (2022-07-20)
5
+ ------------------
6
+
7
+ * Feature - AWS Certificate Manager (ACM) Private Certificate Authority (PCA) documentation updates
8
+
9
+ 1.48.0 (2022-03-28)
10
+ ------------------
11
+
12
+ * Feature - Updating service name entities
13
+
14
+ 1.47.0 (2022-03-16)
15
+ ------------------
16
+
17
+ * Feature - AWS Certificate Manager (ACM) Private Certificate Authority (CA) now supports customizable certificate subject names and extensions.
18
+
4
19
  1.46.0 (2022-02-24)
5
20
  ------------------
6
21
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.46.0
1
+ 1.49.0
@@ -382,14 +382,14 @@ module Aws::ACMPCA
382
382
  # <note markdown="1"> Both PCA and the IAM principal must have permission to write to the S3
383
383
  # bucket that you specify. If the IAM principal making the call does not
384
384
  # have permission to write to the bucket, then an exception is thrown.
385
- # For more information, see [Configure Access to ACM Private CA][2].
385
+ # For more information, see [Access policies for CRLs in Amazon S3][2].
386
386
  #
387
387
  # </note>
388
388
  #
389
389
  #
390
390
  #
391
391
  # [1]: https://docs.aws.amazon.com/acm-pca/latest/userguide/PcaCreateCa.html#crl-encryption
392
- # [2]: https://docs.aws.amazon.com/acm-pca/latest/userguide/PcaAuthAccess.html
392
+ # [2]: https://docs.aws.amazon.com/acm-pca/latest/userguide/crl-planning.html#s3-policies
393
393
  #
394
394
  # @option params [required, Types::CertificateAuthorityConfiguration] :certificate_authority_configuration
395
395
  # Name and bit size of the private key algorithm, the name of the
@@ -426,9 +426,15 @@ module Aws::ACMPCA
426
426
  #
427
427
  # Default: FIPS\_140\_2\_LEVEL\_3\_OR\_HIGHER
428
428
  #
429
- # Note: `FIPS_140_2_LEVEL_3_OR_HIGHER` is not supported in Region
430
- # ap-northeast-3. When creating a CA in the ap-northeast-3, you must
431
- # provide `FIPS_140_2_LEVEL_2_OR_HIGHER` as the argument for
429
+ # *Note:* `FIPS_140_2_LEVEL_3_OR_HIGHER` is not supported in the
430
+ # following Regions:
431
+ #
432
+ # * ap-northeast-3
433
+ #
434
+ # * ap-southeast-3
435
+ #
436
+ # When creating a CA in these Regions, you must provide
437
+ # `FIPS_140_2_LEVEL_2_OR_HIGHER` as the argument for
432
438
  # `KeyStorageSecurityStandard`. Failure to do this results in an
433
439
  # `InvalidArgsException` with the message, "A certificate authority
434
440
  # cannot be created in this region with the specified security
@@ -469,6 +475,12 @@ module Aws::ACMPCA
469
475
  # initials: "String5",
470
476
  # pseudonym: "String128",
471
477
  # generation_qualifier: "String3",
478
+ # custom_attributes: [
479
+ # {
480
+ # object_identifier: "CustomObjectIdentifier", # required
481
+ # value: "String1To256", # required
482
+ # },
483
+ # ],
472
484
  # },
473
485
  # csr_extensions: {
474
486
  # key_usage: {
@@ -510,6 +522,12 @@ module Aws::ACMPCA
510
522
  # initials: "String5",
511
523
  # pseudonym: "String128",
512
524
  # generation_qualifier: "String3",
525
+ # custom_attributes: [
526
+ # {
527
+ # object_identifier: "CustomObjectIdentifier", # required
528
+ # value: "String1To256", # required
529
+ # },
530
+ # ],
513
531
  # },
514
532
  # edi_party_name: {
515
533
  # party_name: "String256", # required
@@ -568,7 +586,7 @@ module Aws::ACMPCA
568
586
  # <note markdown="1"> Both PCA and the IAM principal must have permission to write to the S3
569
587
  # bucket that you specify. If the IAM principal making the call does not
570
588
  # have permission to write to the bucket, then an exception is thrown.
571
- # For more information, see [Configure Access to ACM Private CA][3].
589
+ # For more information, see [Access policies for CRLs in Amazon S3][3].
572
590
  #
573
591
  # </note>
574
592
  #
@@ -576,11 +594,15 @@ module Aws::ACMPCA
576
594
  # with encryption. For more information, see [Encrypting Your Audit
577
595
  # Reports][4].
578
596
  #
597
+ # <note markdown="1"> You can generate a maximum of one report every 30 minutes.
598
+ #
599
+ # </note>
600
+ #
579
601
  #
580
602
  #
581
603
  # [1]: https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_IssueCertificate.html
582
604
  # [2]: https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_RevokeCertificate.html
583
- # [3]: https://docs.aws.amazon.com/acm-pca/latest/userguide/PcaAuthAccess.html
605
+ # [3]: https://docs.aws.amazon.com/acm-pca/latest/userguide/crl-planning.html#s3-policies
584
606
  # [4]: https://docs.aws.amazon.com/acm-pca/latest/userguide/PcaAuditReport.html#audit-report-encryption
585
607
  #
586
608
  # @option params [required, String] :certificate_authority_arn
@@ -624,10 +646,10 @@ module Aws::ACMPCA
624
646
  req.send_request(options)
625
647
  end
626
648
 
627
- # Grants one or more permissions on a private CA to the AWS Certificate
649
+ # Grants one or more permissions on a private CA to the Certificate
628
650
  # Manager (ACM) service principal (`acm.amazonaws.com`). These
629
651
  # permissions allow ACM to issue and renew ACM certificates that reside
630
- # in the same AWS account as the CA.
652
+ # in the same Amazon Web Services account as the CA.
631
653
  #
632
654
  # You can list current permissions with the [ListPermissions][1] action
633
655
  # and revoke them with the [DeletePermission][2] action.
@@ -668,15 +690,17 @@ module Aws::ACMPCA
668
690
  # [1]: https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_ListCertificateAuthorities.html
669
691
  #
670
692
  # @option params [required, String] :principal
671
- # The AWS service or identity that receives the permission. At this
672
- # time, the only valid principal is `acm.amazonaws.com`.
693
+ # The Amazon Web Services service or identity that receives the
694
+ # permission. At this time, the only valid principal is
695
+ # `acm.amazonaws.com`.
673
696
  #
674
697
  # @option params [String] :source_account
675
698
  # The ID of the calling account.
676
699
  #
677
700
  # @option params [required, Array<String>] :actions
678
- # The actions that the specified AWS service principal can use. These
679
- # include `IssueCertificate`, `GetCertificate`, and `ListPermissions`.
701
+ # The actions that the specified Amazon Web Services service principal
702
+ # can use. These include `IssueCertificate`, `GetCertificate`, and
703
+ # `ListPermissions`.
680
704
  #
681
705
  # @return [Struct] Returns an empty {Seahorse::Client::Response response}.
682
706
  #
@@ -770,13 +794,13 @@ module Aws::ACMPCA
770
794
  req.send_request(options)
771
795
  end
772
796
 
773
- # Revokes permissions on a private CA granted to the AWS Certificate
774
- # Manager (ACM) service principal (acm.amazonaws.com).
797
+ # Revokes permissions on a private CA granted to the Certificate Manager
798
+ # (ACM) service principal (acm.amazonaws.com).
775
799
  #
776
800
  # These permissions allow ACM to issue and renew ACM certificates that
777
- # reside in the same AWS account as the CA. If you revoke these
778
- # permissions, ACM will no longer renew the affected certificates
779
- # automatically.
801
+ # reside in the same Amazon Web Services account as the CA. If you
802
+ # revoke these permissions, ACM will no longer renew the affected
803
+ # certificates automatically.
780
804
  #
781
805
  # Permissions can be granted with the [CreatePermission][1] action and
782
806
  # listed with the [ListPermissions][2] action.
@@ -818,11 +842,12 @@ module Aws::ACMPCA
818
842
  # [1]: https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_ListCertificateAuthorities.html
819
843
  #
820
844
  # @option params [required, String] :principal
821
- # The AWS service or identity that will have its CA permissions revoked.
822
- # At this time, the only valid service principal is `acm.amazonaws.com`
845
+ # The Amazon Web Services service or identity that will have its CA
846
+ # permissions revoked. At this time, the only valid service principal is
847
+ # `acm.amazonaws.com`
823
848
  #
824
849
  # @option params [String] :source_account
825
- # The AWS account that calls this action.
850
+ # The Amazon Web Services account that calls this action.
826
851
  #
827
852
  # @return [Struct] Returns an empty {Seahorse::Client::Response response}.
828
853
  #
@@ -847,25 +872,26 @@ module Aws::ACMPCA
847
872
  # will remove any access that the policy has granted. If there is no
848
873
  # policy attached to the private CA, this action will return successful.
849
874
  #
850
- # If you delete a policy that was applied through AWS Resource Access
851
- # Manager (RAM), the CA will be removed from all shares in which it was
852
- # included.
875
+ # If you delete a policy that was applied through Amazon Web Services
876
+ # Resource Access Manager (RAM), the CA will be removed from all shares
877
+ # in which it was included.
853
878
  #
854
- # The AWS Certificate Manager Service Linked Role that the policy
855
- # supports is not affected when you delete the policy.
879
+ # The Certificate Manager Service Linked Role that the policy supports
880
+ # is not affected when you delete the policy.
856
881
  #
857
882
  # The current policy can be shown with [GetPolicy][1] and updated with
858
883
  # [PutPolicy][2].
859
884
  #
860
885
  # **About Policies**
861
886
  #
862
- # * A policy grants access on a private CA to an AWS customer account,
863
- # to AWS Organizations, or to an AWS Organizations unit. Policies are
864
- # under the control of a CA administrator. For more information, see
865
- # [Using a Resource Based Policy with ACM Private CA][3].
887
+ # * A policy grants access on a private CA to an Amazon Web Services
888
+ # customer account, to Amazon Web Services Organizations, or to an
889
+ # Amazon Web Services Organizations unit. Policies are under the
890
+ # control of a CA administrator. For more information, see [Using a
891
+ # Resource Based Policy with ACM Private CA][3].
866
892
  #
867
- # * A policy permits a user of AWS Certificate Manager (ACM) to issue
868
- # ACM certificates signed by a CA in another account.
893
+ # * A policy permits a user of Certificate Manager (ACM) to issue ACM
894
+ # certificates signed by a CA in another account.
869
895
  #
870
896
  # * For ACM to manage automatic renewal of these certificates, the ACM
871
897
  # user must configure a Service Linked Role (SLR). The SLR allows the
@@ -873,9 +899,9 @@ module Aws::ACMPCA
873
899
  # confirmation against the ACM Private CA policy. For more
874
900
  # information, see [Using a Service Linked Role with ACM][4].
875
901
  #
876
- # * Updates made in AWS Resource Manager (RAM) are reflected in
877
- # policies. For more information, see [Attach a Policy for
878
- # Cross-Account Access][5].
902
+ # * Updates made in Amazon Web Services Resource Manager (RAM) are
903
+ # reflected in policies. For more information, see [Attach a Policy
904
+ # for Cross-Account Access][5].
879
905
  #
880
906
  #
881
907
  #
@@ -932,9 +958,9 @@ module Aws::ACMPCA
932
958
  # * `EXPIRED` - Your private CA certificate has expired.
933
959
  #
934
960
  # * `FAILED` - Your private CA has failed. Your CA can fail because of
935
- # problems such a network outage or back-end AWS failure or other
936
- # errors. A failed CA can never return to the pending state. You must
937
- # create a new CA.
961
+ # problems such a network outage or back-end Amazon Web Services
962
+ # failure or other errors. A failed CA can never return to the pending
963
+ # state. You must create a new CA.
938
964
  #
939
965
  # * `DELETED` - Your private CA is within the restoration period, after
940
966
  # which it is permanently deleted. The length of time remaining in the
@@ -989,6 +1015,9 @@ module Aws::ACMPCA
989
1015
  # resp.certificate_authority.certificate_authority_configuration.subject.initials #=> String
990
1016
  # resp.certificate_authority.certificate_authority_configuration.subject.pseudonym #=> String
991
1017
  # resp.certificate_authority.certificate_authority_configuration.subject.generation_qualifier #=> String
1018
+ # resp.certificate_authority.certificate_authority_configuration.subject.custom_attributes #=> Array
1019
+ # resp.certificate_authority.certificate_authority_configuration.subject.custom_attributes[0].object_identifier #=> String
1020
+ # resp.certificate_authority.certificate_authority_configuration.subject.custom_attributes[0].value #=> String
992
1021
  # resp.certificate_authority.certificate_authority_configuration.csr_extensions.key_usage.digital_signature #=> Boolean
993
1022
  # resp.certificate_authority.certificate_authority_configuration.csr_extensions.key_usage.non_repudiation #=> Boolean
994
1023
  # resp.certificate_authority.certificate_authority_configuration.csr_extensions.key_usage.key_encipherment #=> Boolean
@@ -1019,6 +1048,9 @@ module Aws::ACMPCA
1019
1048
  # resp.certificate_authority.certificate_authority_configuration.csr_extensions.subject_information_access[0].access_location.directory_name.initials #=> String
1020
1049
  # resp.certificate_authority.certificate_authority_configuration.csr_extensions.subject_information_access[0].access_location.directory_name.pseudonym #=> String
1021
1050
  # resp.certificate_authority.certificate_authority_configuration.csr_extensions.subject_information_access[0].access_location.directory_name.generation_qualifier #=> String
1051
+ # resp.certificate_authority.certificate_authority_configuration.csr_extensions.subject_information_access[0].access_location.directory_name.custom_attributes #=> Array
1052
+ # resp.certificate_authority.certificate_authority_configuration.csr_extensions.subject_information_access[0].access_location.directory_name.custom_attributes[0].object_identifier #=> String
1053
+ # resp.certificate_authority.certificate_authority_configuration.csr_extensions.subject_information_access[0].access_location.directory_name.custom_attributes[0].value #=> String
1022
1054
  # resp.certificate_authority.certificate_authority_configuration.csr_extensions.subject_information_access[0].access_location.edi_party_name.party_name #=> String
1023
1055
  # resp.certificate_authority.certificate_authority_configuration.csr_extensions.subject_information_access[0].access_location.edi_party_name.name_assigner #=> String
1024
1056
  # resp.certificate_authority.certificate_authority_configuration.csr_extensions.subject_information_access[0].access_location.uniform_resource_identifier #=> String
@@ -1268,13 +1300,14 @@ module Aws::ACMPCA
1268
1300
  #
1269
1301
  # **About Policies**
1270
1302
  #
1271
- # * A policy grants access on a private CA to an AWS customer account,
1272
- # to AWS Organizations, or to an AWS Organizations unit. Policies are
1273
- # under the control of a CA administrator. For more information, see
1274
- # [Using a Resource Based Policy with ACM Private CA][3].
1303
+ # * A policy grants access on a private CA to an Amazon Web Services
1304
+ # customer account, to Amazon Web Services Organizations, or to an
1305
+ # Amazon Web Services Organizations unit. Policies are under the
1306
+ # control of a CA administrator. For more information, see [Using a
1307
+ # Resource Based Policy with ACM Private CA][3].
1275
1308
  #
1276
- # * A policy permits a user of AWS Certificate Manager (ACM) to issue
1277
- # ACM certificates signed by a CA in another account.
1309
+ # * A policy permits a user of Certificate Manager (ACM) to issue ACM
1310
+ # certificates signed by a CA in another account.
1278
1311
  #
1279
1312
  # * For ACM to manage automatic renewal of these certificates, the ACM
1280
1313
  # user must configure a Service Linked Role (SLR). The SLR allows the
@@ -1282,9 +1315,9 @@ module Aws::ACMPCA
1282
1315
  # confirmation against the ACM Private CA policy. For more
1283
1316
  # information, see [Using a Service Linked Role with ACM][4].
1284
1317
  #
1285
- # * Updates made in AWS Resource Manager (RAM) are reflected in
1286
- # policies. For more information, see [Attach a Policy for
1287
- # Cross-Account Access][5].
1318
+ # * Updates made in Amazon Web Services Resource Manager (RAM) are
1319
+ # reflected in policies. For more information, see [Attach a Policy
1320
+ # for Cross-Account Access][5].
1288
1321
  #
1289
1322
  #
1290
1323
  #
@@ -1521,7 +1554,7 @@ module Aws::ACMPCA
1521
1554
  # contains your X509 version 3 extensions.
1522
1555
  #
1523
1556
  # `openssl req -new -config openssl_rsa.cnf -extensions usr_cert -newkey
1524
- # rsa:2048 -days -365 -keyout private/test_cert_priv_key.pem -out
1557
+ # rsa:2048 -days 365 -keyout private/test_cert_priv_key.pem -out
1525
1558
  # csr/test_cert_.csr`
1526
1559
  #
1527
1560
  # Note: A CSR must provide either a *subject name* or a *subject
@@ -1535,6 +1568,11 @@ module Aws::ACMPCA
1535
1568
  # parameter used to sign a CSR in the `CreateCertificateAuthority`
1536
1569
  # action.
1537
1570
  #
1571
+ # <note markdown="1"> The specified signing algorithm family (RSA or ECDSA) much match the
1572
+ # algorithm family of the CA's secret key.
1573
+ #
1574
+ # </note>
1575
+ #
1538
1576
  # @option params [String] :template_arn
1539
1577
  # Specifies a custom configuration template to use when issuing a
1540
1578
  # certificate. If this parameter is not provided, ACM Private CA
@@ -1575,7 +1613,7 @@ module Aws::ACMPCA
1575
1613
  #
1576
1614
  #
1577
1615
  #
1578
- # [1]: https://tools.ietf.org/html/rfc5280#section-4.1.2.5
1616
+ # [1]: https://datatracker.ietf.org/doc/html/rfc5280#section-4.1.2.5
1579
1617
  #
1580
1618
  # @option params [Types::Validity] :validity_not_before
1581
1619
  # Information describing the start of the validity period of the
@@ -1599,7 +1637,7 @@ module Aws::ACMPCA
1599
1637
  #
1600
1638
  #
1601
1639
  # [1]: https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_Validity.html
1602
- # [2]: https://tools.ietf.org/html/rfc5280#section-4.1.2.5
1640
+ # [2]: https://datatracker.ietf.org/doc/html/rfc5280#section-4.1.2.5
1603
1641
  #
1604
1642
  # @option params [String] :idempotency_token
1605
1643
  # Alphanumeric string that can be used to distinguish between calls to
@@ -1673,6 +1711,12 @@ module Aws::ACMPCA
1673
1711
  # initials: "String5",
1674
1712
  # pseudonym: "String128",
1675
1713
  # generation_qualifier: "String3",
1714
+ # custom_attributes: [
1715
+ # {
1716
+ # object_identifier: "CustomObjectIdentifier", # required
1717
+ # value: "String1To256", # required
1718
+ # },
1719
+ # ],
1676
1720
  # },
1677
1721
  # edi_party_name: {
1678
1722
  # party_name: "String256", # required
@@ -1683,6 +1727,13 @@ module Aws::ACMPCA
1683
1727
  # registered_id: "CustomObjectIdentifier",
1684
1728
  # },
1685
1729
  # ],
1730
+ # custom_extensions: [
1731
+ # {
1732
+ # object_identifier: "CustomObjectIdentifier", # required
1733
+ # value: "Base64String1To4096", # required
1734
+ # critical: false,
1735
+ # },
1736
+ # ],
1686
1737
  # },
1687
1738
  # subject: {
1688
1739
  # country: "CountryCodeString",
@@ -1699,6 +1750,12 @@ module Aws::ACMPCA
1699
1750
  # initials: "String5",
1700
1751
  # pseudonym: "String128",
1701
1752
  # generation_qualifier: "String3",
1753
+ # custom_attributes: [
1754
+ # {
1755
+ # object_identifier: "CustomObjectIdentifier", # required
1756
+ # value: "String1To256", # required
1757
+ # },
1758
+ # ],
1702
1759
  # },
1703
1760
  # },
1704
1761
  # certificate_authority_arn: "Arn", # required
@@ -1797,6 +1854,9 @@ module Aws::ACMPCA
1797
1854
  # resp.certificate_authorities[0].certificate_authority_configuration.subject.initials #=> String
1798
1855
  # resp.certificate_authorities[0].certificate_authority_configuration.subject.pseudonym #=> String
1799
1856
  # resp.certificate_authorities[0].certificate_authority_configuration.subject.generation_qualifier #=> String
1857
+ # resp.certificate_authorities[0].certificate_authority_configuration.subject.custom_attributes #=> Array
1858
+ # resp.certificate_authorities[0].certificate_authority_configuration.subject.custom_attributes[0].object_identifier #=> String
1859
+ # resp.certificate_authorities[0].certificate_authority_configuration.subject.custom_attributes[0].value #=> String
1800
1860
  # resp.certificate_authorities[0].certificate_authority_configuration.csr_extensions.key_usage.digital_signature #=> Boolean
1801
1861
  # resp.certificate_authorities[0].certificate_authority_configuration.csr_extensions.key_usage.non_repudiation #=> Boolean
1802
1862
  # resp.certificate_authorities[0].certificate_authority_configuration.csr_extensions.key_usage.key_encipherment #=> Boolean
@@ -1827,6 +1887,9 @@ module Aws::ACMPCA
1827
1887
  # resp.certificate_authorities[0].certificate_authority_configuration.csr_extensions.subject_information_access[0].access_location.directory_name.initials #=> String
1828
1888
  # resp.certificate_authorities[0].certificate_authority_configuration.csr_extensions.subject_information_access[0].access_location.directory_name.pseudonym #=> String
1829
1889
  # resp.certificate_authorities[0].certificate_authority_configuration.csr_extensions.subject_information_access[0].access_location.directory_name.generation_qualifier #=> String
1890
+ # resp.certificate_authorities[0].certificate_authority_configuration.csr_extensions.subject_information_access[0].access_location.directory_name.custom_attributes #=> Array
1891
+ # resp.certificate_authorities[0].certificate_authority_configuration.csr_extensions.subject_information_access[0].access_location.directory_name.custom_attributes[0].object_identifier #=> String
1892
+ # resp.certificate_authorities[0].certificate_authority_configuration.csr_extensions.subject_information_access[0].access_location.directory_name.custom_attributes[0].value #=> String
1830
1893
  # resp.certificate_authorities[0].certificate_authority_configuration.csr_extensions.subject_information_access[0].access_location.edi_party_name.party_name #=> String
1831
1894
  # resp.certificate_authorities[0].certificate_authority_configuration.csr_extensions.subject_information_access[0].access_location.edi_party_name.name_assigner #=> String
1832
1895
  # resp.certificate_authorities[0].certificate_authority_configuration.csr_extensions.subject_information_access[0].access_location.uniform_resource_identifier #=> String
@@ -1852,11 +1915,11 @@ module Aws::ACMPCA
1852
1915
  req.send_request(options)
1853
1916
  end
1854
1917
 
1855
- # List all permissions on a private CA, if any, granted to the AWS
1918
+ # List all permissions on a private CA, if any, granted to the
1856
1919
  # Certificate Manager (ACM) service principal (acm.amazonaws.com).
1857
1920
  #
1858
1921
  # These permissions allow ACM to issue and renew ACM certificates that
1859
- # reside in the same AWS account as the CA.
1922
+ # reside in the same Amazon Web Services account as the CA.
1860
1923
  #
1861
1924
  # Permissions can be granted with the [CreatePermission][1] action and
1862
1925
  # revoked with the [DeletePermission][2] action.
@@ -2012,22 +2075,23 @@ module Aws::ACMPCA
2012
2075
 
2013
2076
  # Attaches a resource-based policy to a private CA.
2014
2077
  #
2015
- # A policy can also be applied by sharing a private CA through AWS
2016
- # Resource Access Manager (RAM). For more information, see [Attach a
2017
- # Policy for Cross-Account Access][1].
2078
+ # A policy can also be applied by sharing a private CA through Amazon
2079
+ # Web Services Resource Access Manager (RAM). For more information, see
2080
+ # [Attach a Policy for Cross-Account Access][1].
2018
2081
  #
2019
2082
  # The policy can be displayed with [GetPolicy][2] and removed with
2020
2083
  # [DeletePolicy][3].
2021
2084
  #
2022
2085
  # **About Policies**
2023
2086
  #
2024
- # * A policy grants access on a private CA to an AWS customer account,
2025
- # to AWS Organizations, or to an AWS Organizations unit. Policies are
2026
- # under the control of a CA administrator. For more information, see
2027
- # [Using a Resource Based Policy with ACM Private CA][4].
2087
+ # * A policy grants access on a private CA to an Amazon Web Services
2088
+ # customer account, to Amazon Web Services Organizations, or to an
2089
+ # Amazon Web Services Organizations unit. Policies are under the
2090
+ # control of a CA administrator. For more information, see [Using a
2091
+ # Resource Based Policy with ACM Private CA][4].
2028
2092
  #
2029
- # * A policy permits a user of AWS Certificate Manager (ACM) to issue
2030
- # ACM certificates signed by a CA in another account.
2093
+ # * A policy permits a user of Certificate Manager (ACM) to issue ACM
2094
+ # certificates signed by a CA in another account.
2031
2095
  #
2032
2096
  # * For ACM to manage automatic renewal of these certificates, the ACM
2033
2097
  # user must configure a Service Linked Role (SLR). The SLR allows the
@@ -2035,9 +2099,9 @@ module Aws::ACMPCA
2035
2099
  # confirmation against the ACM Private CA policy. For more
2036
2100
  # information, see [Using a Service Linked Role with ACM][5].
2037
2101
  #
2038
- # * Updates made in AWS Resource Manager (RAM) are reflected in
2039
- # policies. For more information, see [Attach a Policy for
2040
- # Cross-Account Access][1].
2102
+ # * Updates made in Amazon Web Services Resource Manager (RAM) are
2103
+ # reflected in policies. For more information, see [Attach a Policy
2104
+ # for Cross-Account Access][1].
2041
2105
  #
2042
2106
  #
2043
2107
  #
@@ -2156,7 +2220,7 @@ module Aws::ACMPCA
2156
2220
  # <note markdown="1"> Both PCA and the IAM principal must have permission to write to the S3
2157
2221
  # bucket that you specify. If the IAM principal making the call does not
2158
2222
  # have permission to write to the bucket, then an exception is thrown.
2159
- # For more information, see [Configure Access to ACM Private CA][2].
2223
+ # For more information, see [Access policies for CRLs in Amazon S3][2].
2160
2224
  #
2161
2225
  # </note>
2162
2226
  #
@@ -2170,7 +2234,7 @@ module Aws::ACMPCA
2170
2234
  #
2171
2235
  #
2172
2236
  # [1]: https://docs.aws.amazon.com/acm-pca/latest/userguide/PcaCloudWatch.html
2173
- # [2]: https://docs.aws.amazon.com/acm-pca/latest/userguide/PcaAuthAccess.html
2237
+ # [2]: https://docs.aws.amazon.com/acm-pca/latest/userguide/crl-planning.html#s3-policies
2174
2238
  # [3]: https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_CreateCertificateAuthorityAuditReport.html
2175
2239
  #
2176
2240
  # @option params [required, String] :certificate_authority_arn
@@ -2192,7 +2256,7 @@ module Aws::ACMPCA
2192
2256
  # `openssl x509 -in file_path -text -noout`
2193
2257
  #
2194
2258
  # You can also copy the serial number from the console or use the
2195
- # [DescribeCertificate][2] action in the *AWS Certificate Manager API
2259
+ # [DescribeCertificate][2] action in the *Certificate Manager API
2196
2260
  # Reference*.
2197
2261
  #
2198
2262
  #
@@ -2223,15 +2287,15 @@ module Aws::ACMPCA
2223
2287
  end
2224
2288
 
2225
2289
  # Adds one or more tags to your private CA. Tags are labels that you can
2226
- # use to identify and organize your AWS resources. Each tag consists of
2227
- # a key and an optional value. You specify the private CA on input by
2228
- # its Amazon Resource Name (ARN). You specify the tag by using a
2229
- # key-value pair. You can apply a tag to just one private CA if you want
2230
- # to identify a specific characteristic of that CA, or you can apply the
2231
- # same tag to multiple private CAs if you want to filter for a common
2232
- # relationship among those CAs. To remove one or more tags, use the
2233
- # [UntagCertificateAuthority][1] action. Call the [ListTags][2] action
2234
- # to see what tags are associated with your CA.
2290
+ # use to identify and organize your Amazon Web Services resources. Each
2291
+ # tag consists of a key and an optional value. You specify the private
2292
+ # CA on input by its Amazon Resource Name (ARN). You specify the tag by
2293
+ # using a key-value pair. You can apply a tag to just one private CA if
2294
+ # you want to identify a specific characteristic of that CA, or you can
2295
+ # apply the same tag to multiple private CAs if you want to filter for a
2296
+ # common relationship among those CAs. To remove one or more tags, use
2297
+ # the [UntagCertificateAuthority][1] action. Call the [ListTags][2]
2298
+ # action to see what tags are associated with your CA.
2235
2299
  #
2236
2300
  #
2237
2301
  #
@@ -2334,13 +2398,13 @@ module Aws::ACMPCA
2334
2398
  # <note markdown="1"> Both PCA and the IAM principal must have permission to write to the S3
2335
2399
  # bucket that you specify. If the IAM principal making the call does not
2336
2400
  # have permission to write to the bucket, then an exception is thrown.
2337
- # For more information, see [Configure Access to ACM Private CA][1].
2401
+ # For more information, see [Access policies for CRLs in Amazon S3][1].
2338
2402
  #
2339
2403
  # </note>
2340
2404
  #
2341
2405
  #
2342
2406
  #
2343
- # [1]: https://docs.aws.amazon.com/acm-pca/latest/userguide/PcaAuthAccess.html
2407
+ # [1]: https://docs.aws.amazon.com/acm-pca/latest/userguide/crl-planning.html#s3-policies
2344
2408
  #
2345
2409
  # @option params [required, String] :certificate_authority_arn
2346
2410
  # Amazon Resource Name (ARN) of the private CA that issued the
@@ -2408,7 +2472,7 @@ module Aws::ACMPCA
2408
2472
  params: params,
2409
2473
  config: config)
2410
2474
  context[:gem_name] = 'aws-sdk-acmpca'
2411
- context[:gem_version] = '1.46.0'
2475
+ context[:gem_version] = '1.49.0'
2412
2476
  Seahorse::Client::Request.new(handlers, context)
2413
2477
  end
2414
2478
 
@@ -28,6 +28,7 @@ module Aws::ACMPCA
28
28
  AuditReportId = Shapes::StringShape.new(name: 'AuditReportId')
29
29
  AuditReportResponseFormat = Shapes::StringShape.new(name: 'AuditReportResponseFormat')
30
30
  AuditReportStatus = Shapes::StringShape.new(name: 'AuditReportStatus')
31
+ Base64String1To4096 = Shapes::StringShape.new(name: 'Base64String1To4096')
31
32
  Boolean = Shapes::BooleanShape.new(name: 'Boolean')
32
33
  CertificateAuthorities = Shapes::ListShape.new(name: 'CertificateAuthorities')
33
34
  CertificateAuthority = Shapes::StructureShape.new(name: 'CertificateAuthority')
@@ -51,6 +52,10 @@ module Aws::ACMPCA
51
52
  CsrBlob = Shapes::BlobShape.new(name: 'CsrBlob')
52
53
  CsrBody = Shapes::StringShape.new(name: 'CsrBody')
53
54
  CsrExtensions = Shapes::StructureShape.new(name: 'CsrExtensions')
55
+ CustomAttribute = Shapes::StructureShape.new(name: 'CustomAttribute')
56
+ CustomAttributeList = Shapes::ListShape.new(name: 'CustomAttributeList')
57
+ CustomExtension = Shapes::StructureShape.new(name: 'CustomExtension')
58
+ CustomExtensionList = Shapes::ListShape.new(name: 'CustomExtensionList')
54
59
  CustomObjectIdentifier = Shapes::StringShape.new(name: 'CustomObjectIdentifier')
55
60
  DeleteCertificateAuthorityRequest = Shapes::StructureShape.new(name: 'DeleteCertificateAuthorityRequest')
56
61
  DeletePermissionRequest = Shapes::StructureShape.new(name: 'DeletePermissionRequest')
@@ -132,6 +137,7 @@ module Aws::ACMPCA
132
137
  String = Shapes::StringShape.new(name: 'String')
133
138
  String128 = Shapes::StringShape.new(name: 'String128')
134
139
  String16 = Shapes::StringShape.new(name: 'String16')
140
+ String1To256 = Shapes::StringShape.new(name: 'String1To256')
135
141
  String253 = Shapes::StringShape.new(name: 'String253')
136
142
  String256 = Shapes::StringShape.new(name: 'String256')
137
143
  String3 = Shapes::StringShape.new(name: 'String3')
@@ -166,6 +172,7 @@ module Aws::ACMPCA
166
172
  ASN1Subject.add_member(:initials, Shapes::ShapeRef.new(shape: String5, location_name: "Initials"))
167
173
  ASN1Subject.add_member(:pseudonym, Shapes::ShapeRef.new(shape: String128, location_name: "Pseudonym"))
168
174
  ASN1Subject.add_member(:generation_qualifier, Shapes::ShapeRef.new(shape: String3, location_name: "GenerationQualifier"))
175
+ ASN1Subject.add_member(:custom_attributes, Shapes::ShapeRef.new(shape: CustomAttributeList, location_name: "CustomAttributes"))
169
176
  ASN1Subject.struct_class = Types::ASN1Subject
170
177
 
171
178
  AccessDescription.add_member(:access_method, Shapes::ShapeRef.new(shape: AccessMethod, required: true, location_name: "AccessMethod"))
@@ -253,6 +260,19 @@ module Aws::ACMPCA
253
260
  CsrExtensions.add_member(:subject_information_access, Shapes::ShapeRef.new(shape: AccessDescriptionList, location_name: "SubjectInformationAccess"))
254
261
  CsrExtensions.struct_class = Types::CsrExtensions
255
262
 
263
+ CustomAttribute.add_member(:object_identifier, Shapes::ShapeRef.new(shape: CustomObjectIdentifier, required: true, location_name: "ObjectIdentifier"))
264
+ CustomAttribute.add_member(:value, Shapes::ShapeRef.new(shape: String1To256, required: true, location_name: "Value"))
265
+ CustomAttribute.struct_class = Types::CustomAttribute
266
+
267
+ CustomAttributeList.member = Shapes::ShapeRef.new(shape: CustomAttribute)
268
+
269
+ CustomExtension.add_member(:object_identifier, Shapes::ShapeRef.new(shape: CustomObjectIdentifier, required: true, location_name: "ObjectIdentifier"))
270
+ CustomExtension.add_member(:value, Shapes::ShapeRef.new(shape: Base64String1To4096, required: true, location_name: "Value"))
271
+ CustomExtension.add_member(:critical, Shapes::ShapeRef.new(shape: Boolean, location_name: "Critical", metadata: {"box"=>true}))
272
+ CustomExtension.struct_class = Types::CustomExtension
273
+
274
+ CustomExtensionList.member = Shapes::ShapeRef.new(shape: CustomExtension)
275
+
256
276
  DeleteCertificateAuthorityRequest.add_member(:certificate_authority_arn, Shapes::ShapeRef.new(shape: Arn, required: true, location_name: "CertificateAuthorityArn"))
257
277
  DeleteCertificateAuthorityRequest.add_member(:permanent_deletion_time_in_days, Shapes::ShapeRef.new(shape: PermanentDeletionTimeInDays, location_name: "PermanentDeletionTimeInDays"))
258
278
  DeleteCertificateAuthorityRequest.struct_class = Types::DeleteCertificateAuthorityRequest
@@ -295,6 +315,7 @@ module Aws::ACMPCA
295
315
  Extensions.add_member(:extended_key_usage, Shapes::ShapeRef.new(shape: ExtendedKeyUsageList, location_name: "ExtendedKeyUsage"))
296
316
  Extensions.add_member(:key_usage, Shapes::ShapeRef.new(shape: KeyUsage, location_name: "KeyUsage"))
297
317
  Extensions.add_member(:subject_alternative_names, Shapes::ShapeRef.new(shape: GeneralNameList, location_name: "SubjectAlternativeNames"))
318
+ Extensions.add_member(:custom_extensions, Shapes::ShapeRef.new(shape: CustomExtensionList, location_name: "CustomExtensions"))
298
319
  Extensions.struct_class = Types::Extensions
299
320
 
300
321
  GeneralName.add_member(:other_name, Shapes::ShapeRef.new(shape: OtherName, location_name: "OtherName"))
@@ -35,6 +35,12 @@ module Aws::ACMPCA
35
35
  # initials: "String5",
36
36
  # pseudonym: "String128",
37
37
  # generation_qualifier: "String3",
38
+ # custom_attributes: [
39
+ # {
40
+ # object_identifier: "CustomObjectIdentifier", # required
41
+ # value: "String1To256", # required
42
+ # },
43
+ # ],
38
44
  # }
39
45
  #
40
46
  # @!attribute [rw] country
@@ -110,6 +116,22 @@ module Aws::ACMPCA
110
116
  # Examples include Jr. for junior, Sr. for senior, and III for third.
111
117
  # @return [String]
112
118
  #
119
+ # @!attribute [rw] custom_attributes
120
+ # Contains a sequence of one or more X.500 relative distinguished
121
+ # names (RDNs), each of which consists of an object identifier (OID)
122
+ # and a value. For more information, see NIST’s definition of [Object
123
+ # Identifier (OID)][1].
124
+ #
125
+ # <note markdown="1"> Custom attributes cannot be used in combination with standard
126
+ # attributes.
127
+ #
128
+ # </note>
129
+ #
130
+ #
131
+ #
132
+ # [1]: https://csrc.nist.gov/glossary/term/Object_Identifier
133
+ # @return [Array<Types::CustomAttribute>]
134
+ #
113
135
  # @see http://docs.aws.amazon.com/goto/WebAPI/acm-pca-2017-08-22/ASN1Subject AWS API Documentation
114
136
  #
115
137
  class ASN1Subject < Struct.new(
@@ -126,7 +148,8 @@ module Aws::ACMPCA
126
148
  :given_name,
127
149
  :initials,
128
150
  :pseudonym,
129
- :generation_qualifier)
151
+ :generation_qualifier,
152
+ :custom_attributes)
130
153
  SENSITIVE = []
131
154
  include Aws::Structure
132
155
  end
@@ -136,7 +159,7 @@ module Aws::ACMPCA
136
159
  #
137
160
  #
138
161
  #
139
- # [1]: https://tools.ietf.org/html/rfc5280
162
+ # [1]: https://datatracker.ietf.org/doc/html/rfc5280
140
163
  #
141
164
  # @note When making an API call, you may pass AccessDescription
142
165
  # data as a hash:
@@ -168,6 +191,12 @@ module Aws::ACMPCA
168
191
  # initials: "String5",
169
192
  # pseudonym: "String128",
170
193
  # generation_qualifier: "String3",
194
+ # custom_attributes: [
195
+ # {
196
+ # object_identifier: "CustomObjectIdentifier", # required
197
+ # value: "String1To256", # required
198
+ # },
199
+ # ],
171
200
  # },
172
201
  # edi_party_name: {
173
202
  # party_name: "String256", # required
@@ -301,6 +330,12 @@ module Aws::ACMPCA
301
330
  # initials: "String5",
302
331
  # pseudonym: "String128",
303
332
  # generation_qualifier: "String3",
333
+ # custom_attributes: [
334
+ # {
335
+ # object_identifier: "CustomObjectIdentifier", # required
336
+ # value: "String1To256", # required
337
+ # },
338
+ # ],
304
339
  # },
305
340
  # edi_party_name: {
306
341
  # party_name: "String256", # required
@@ -311,6 +346,13 @@ module Aws::ACMPCA
311
346
  # registered_id: "CustomObjectIdentifier",
312
347
  # },
313
348
  # ],
349
+ # custom_extensions: [
350
+ # {
351
+ # object_identifier: "CustomObjectIdentifier", # required
352
+ # value: "Base64String1To4096", # required
353
+ # critical: false,
354
+ # },
355
+ # ],
314
356
  # },
315
357
  # subject: {
316
358
  # country: "CountryCodeString",
@@ -327,6 +369,12 @@ module Aws::ACMPCA
327
369
  # initials: "String5",
328
370
  # pseudonym: "String128",
329
371
  # generation_qualifier: "String3",
372
+ # custom_attributes: [
373
+ # {
374
+ # object_identifier: "CustomObjectIdentifier", # required
375
+ # value: "String1To256", # required
376
+ # },
377
+ # ],
330
378
  # },
331
379
  # }
332
380
  #
@@ -363,7 +411,7 @@ module Aws::ACMPCA
363
411
  # retrieve a private CA certificate signing request (CSR). Sign the CSR
364
412
  # with your ACM Private CA-hosted or on-premises root or subordinate CA
365
413
  # certificate. Call the [ImportCertificateAuthorityCertificate][3]
366
- # action to import the signed certificate into AWS Certificate Manager
414
+ # action to import the signed certificate into Certificate Manager
367
415
  # (ACM).
368
416
  #
369
417
  #
@@ -378,7 +426,8 @@ module Aws::ACMPCA
378
426
  # @return [String]
379
427
  #
380
428
  # @!attribute [rw] owner_account
381
- # The AWS account ID that owns the certificate authority.
429
+ # The Amazon Web Services account ID that owns the certificate
430
+ # authority.
382
431
  # @return [String]
383
432
  #
384
433
  # @!attribute [rw] created_at
@@ -439,7 +488,7 @@ module Aws::ACMPCA
439
488
  #
440
489
  # Default: FIPS\_140\_2\_LEVEL\_3\_OR\_HIGHER
441
490
  #
442
- # Note: AWS Region ap-northeast-3 supports only
491
+ # Note: Amazon Web Services Region ap-northeast-3 supports only
443
492
  # FIPS\_140\_2\_LEVEL\_2\_OR\_HIGHER. You must explicitly specify this
444
493
  # parameter and value when creating a CA in that Region. Specifying a
445
494
  # different value (or no value) results in an `InvalidArgsException`
@@ -501,6 +550,12 @@ module Aws::ACMPCA
501
550
  # initials: "String5",
502
551
  # pseudonym: "String128",
503
552
  # generation_qualifier: "String3",
553
+ # custom_attributes: [
554
+ # {
555
+ # object_identifier: "CustomObjectIdentifier", # required
556
+ # value: "String1To256", # required
557
+ # },
558
+ # ],
504
559
  # },
505
560
  # csr_extensions: {
506
561
  # key_usage: {
@@ -542,6 +597,12 @@ module Aws::ACMPCA
542
597
  # initials: "String5",
543
598
  # pseudonym: "String128",
544
599
  # generation_qualifier: "String3",
600
+ # custom_attributes: [
601
+ # {
602
+ # object_identifier: "CustomObjectIdentifier", # required
603
+ # value: "String1To256", # required
604
+ # },
605
+ # ],
545
606
  # },
546
607
  # edi_party_name: {
547
608
  # party_name: "String256", # required
@@ -695,6 +756,12 @@ module Aws::ACMPCA
695
756
  # initials: "String5",
696
757
  # pseudonym: "String128",
697
758
  # generation_qualifier: "String3",
759
+ # custom_attributes: [
760
+ # {
761
+ # object_identifier: "CustomObjectIdentifier", # required
762
+ # value: "String1To256", # required
763
+ # },
764
+ # ],
698
765
  # },
699
766
  # csr_extensions: {
700
767
  # key_usage: {
@@ -736,6 +803,12 @@ module Aws::ACMPCA
736
803
  # initials: "String5",
737
804
  # pseudonym: "String128",
738
805
  # generation_qualifier: "String3",
806
+ # custom_attributes: [
807
+ # {
808
+ # object_identifier: "CustomObjectIdentifier", # required
809
+ # value: "String1To256", # required
810
+ # },
811
+ # ],
739
812
  # },
740
813
  # edi_party_name: {
741
814
  # party_name: "String256", # required
@@ -814,9 +887,15 @@ module Aws::ACMPCA
814
887
  #
815
888
  # Default: FIPS\_140\_2\_LEVEL\_3\_OR\_HIGHER
816
889
  #
817
- # Note: `FIPS_140_2_LEVEL_3_OR_HIGHER` is not supported in Region
818
- # ap-northeast-3. When creating a CA in the ap-northeast-3, you must
819
- # provide `FIPS_140_2_LEVEL_2_OR_HIGHER` as the argument for
890
+ # *Note:* `FIPS_140_2_LEVEL_3_OR_HIGHER` is not supported in the
891
+ # following Regions:
892
+ #
893
+ # * ap-northeast-3
894
+ #
895
+ # * ap-southeast-3
896
+ #
897
+ # When creating a CA in these Regions, you must provide
898
+ # `FIPS_140_2_LEVEL_2_OR_HIGHER` as the argument for
820
899
  # `KeyStorageSecurityStandard`. Failure to do this results in an
821
900
  # `InvalidArgsException` with the message, "A certificate authority
822
901
  # cannot be created in this region with the specified security
@@ -888,8 +967,9 @@ module Aws::ACMPCA
888
967
  # @return [String]
889
968
  #
890
969
  # @!attribute [rw] principal
891
- # The AWS service or identity that receives the permission. At this
892
- # time, the only valid principal is `acm.amazonaws.com`.
970
+ # The Amazon Web Services service or identity that receives the
971
+ # permission. At this time, the only valid principal is
972
+ # `acm.amazonaws.com`.
893
973
  # @return [String]
894
974
  #
895
975
  # @!attribute [rw] source_account
@@ -897,8 +977,9 @@ module Aws::ACMPCA
897
977
  # @return [String]
898
978
  #
899
979
  # @!attribute [rw] actions
900
- # The actions that the specified AWS service principal can use. These
901
- # include `IssueCertificate`, `GetCertificate`, and `ListPermissions`.
980
+ # The actions that the specified Amazon Web Services service principal
981
+ # can use. These include `IssueCertificate`, `GetCertificate`, and
982
+ # `ListPermissions`.
902
983
  # @return [Array<String>]
903
984
  #
904
985
  # @see http://docs.aws.amazon.com/goto/WebAPI/acm-pca-2017-08-22/CreatePermissionRequest AWS API Documentation
@@ -928,10 +1009,10 @@ module Aws::ACMPCA
928
1009
  #
929
1010
  # Your private CA uses the value in the **ExpirationInDays** parameter
930
1011
  # to calculate the **nextUpdate** field in the CRL. The CRL is refreshed
931
- # at 1/2 the age of next update or when a certificate is revoked. When a
932
- # certificate is revoked, it is recorded in the next CRL that is
933
- # generated and in the next audit report. Only time valid certificates
934
- # are listed in the CRL. Expired certificates are not included.
1012
+ # prior to a certificate's expiration date or when a certificate is
1013
+ # revoked. When a certificate is revoked, it appears in the CRL until
1014
+ # the certificate expires, and then in one additional CRL after
1015
+ # expiration, and it always appears in the audit report.
935
1016
  #
936
1017
  # A CRL is typically updated approximately 30 minutes after a
937
1018
  # certificate is revoked. If for any reason a CRL update fails, ACM
@@ -985,8 +1066,8 @@ module Aws::ACMPCA
985
1066
  # `openssl crl -inform DER -text -in crl_path -noout`
986
1067
  #
987
1068
  # For more information, see [Planning a certificate revocation list
988
- # (CRL)][2] in the *AWS Certificate Manager Private Certificate
989
- # Authority (PCA) User Guide*
1069
+ # (CRL)][2] in the *Certificate Manager Private Certificate Authority
1070
+ # (PCA) User Guide*
990
1071
  #
991
1072
  #
992
1073
  #
@@ -1127,6 +1208,12 @@ module Aws::ACMPCA
1127
1208
  # initials: "String5",
1128
1209
  # pseudonym: "String128",
1129
1210
  # generation_qualifier: "String3",
1211
+ # custom_attributes: [
1212
+ # {
1213
+ # object_identifier: "CustomObjectIdentifier", # required
1214
+ # value: "String1To256", # required
1215
+ # },
1216
+ # ],
1130
1217
  # },
1131
1218
  # edi_party_name: {
1132
1219
  # party_name: "String256", # required
@@ -1152,7 +1239,7 @@ module Aws::ACMPCA
1152
1239
  #
1153
1240
  #
1154
1241
  #
1155
- # [1]: https://tools.ietf.org/html/rfc5280#section-4.2.2.2
1242
+ # [1]: https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.2.2
1156
1243
  # @return [Array<Types::AccessDescription>]
1157
1244
  #
1158
1245
  # @see http://docs.aws.amazon.com/goto/WebAPI/acm-pca-2017-08-22/CsrExtensions AWS API Documentation
@@ -1164,6 +1251,79 @@ module Aws::ACMPCA
1164
1251
  include Aws::Structure
1165
1252
  end
1166
1253
 
1254
+ # Defines the X.500 relative distinguished name (RDN).
1255
+ #
1256
+ # @note When making an API call, you may pass CustomAttribute
1257
+ # data as a hash:
1258
+ #
1259
+ # {
1260
+ # object_identifier: "CustomObjectIdentifier", # required
1261
+ # value: "String1To256", # required
1262
+ # }
1263
+ #
1264
+ # @!attribute [rw] object_identifier
1265
+ # Specifies the object identifier (OID) of the attribute type of the
1266
+ # relative distinguished name (RDN).
1267
+ # @return [String]
1268
+ #
1269
+ # @!attribute [rw] value
1270
+ # Specifies the attribute value of relative distinguished name (RDN).
1271
+ # @return [String]
1272
+ #
1273
+ # @see http://docs.aws.amazon.com/goto/WebAPI/acm-pca-2017-08-22/CustomAttribute AWS API Documentation
1274
+ #
1275
+ class CustomAttribute < Struct.new(
1276
+ :object_identifier,
1277
+ :value)
1278
+ SENSITIVE = []
1279
+ include Aws::Structure
1280
+ end
1281
+
1282
+ # Specifies the X.509 extension information for a certificate.
1283
+ #
1284
+ # Extensions present in `CustomExtensions` follow the `ApiPassthrough`
1285
+ # [template rules][1].
1286
+ #
1287
+ #
1288
+ #
1289
+ # [1]: https://docs.aws.amazon.com/acm-pca/latest/userguide/UsingTemplates.html#template-order-of-operations
1290
+ #
1291
+ # @note When making an API call, you may pass CustomExtension
1292
+ # data as a hash:
1293
+ #
1294
+ # {
1295
+ # object_identifier: "CustomObjectIdentifier", # required
1296
+ # value: "Base64String1To4096", # required
1297
+ # critical: false,
1298
+ # }
1299
+ #
1300
+ # @!attribute [rw] object_identifier
1301
+ # Specifies the object identifier (OID) of the X.509 extension. For
1302
+ # more information, see the [Global OID reference database.][1]
1303
+ #
1304
+ #
1305
+ #
1306
+ # [1]: https://oidref.com/2.5.29
1307
+ # @return [String]
1308
+ #
1309
+ # @!attribute [rw] value
1310
+ # Specifies the base64-encoded value of the X.509 extension.
1311
+ # @return [String]
1312
+ #
1313
+ # @!attribute [rw] critical
1314
+ # Specifies the critical flag of the X.509 extension.
1315
+ # @return [Boolean]
1316
+ #
1317
+ # @see http://docs.aws.amazon.com/goto/WebAPI/acm-pca-2017-08-22/CustomExtension AWS API Documentation
1318
+ #
1319
+ class CustomExtension < Struct.new(
1320
+ :object_identifier,
1321
+ :value,
1322
+ :critical)
1323
+ SENSITIVE = []
1324
+ include Aws::Structure
1325
+ end
1326
+
1167
1327
  # @note When making an API call, you may pass DeleteCertificateAuthorityRequest
1168
1328
  # data as a hash:
1169
1329
  #
@@ -1223,13 +1383,13 @@ module Aws::ACMPCA
1223
1383
  # @return [String]
1224
1384
  #
1225
1385
  # @!attribute [rw] principal
1226
- # The AWS service or identity that will have its CA permissions
1227
- # revoked. At this time, the only valid service principal is
1228
- # `acm.amazonaws.com`
1386
+ # The Amazon Web Services service or identity that will have its CA
1387
+ # permissions revoked. At this time, the only valid service principal
1388
+ # is `acm.amazonaws.com`
1229
1389
  # @return [String]
1230
1390
  #
1231
1391
  # @!attribute [rw] source_account
1232
- # The AWS account that calls this action.
1392
+ # The Amazon Web Services account that calls this action.
1233
1393
  # @return [String]
1234
1394
  #
1235
1395
  # @see http://docs.aws.amazon.com/goto/WebAPI/acm-pca-2017-08-22/DeletePermissionRequest AWS API Documentation
@@ -1381,7 +1541,7 @@ module Aws::ACMPCA
1381
1541
  #
1382
1542
  #
1383
1543
  #
1384
- # [1]: https://tools.ietf.org/html/rfc5280
1544
+ # [1]: https://datatracker.ietf.org/doc/html/rfc5280
1385
1545
  #
1386
1546
  # @note When making an API call, you may pass EdiPartyName
1387
1547
  # data as a hash:
@@ -1426,7 +1586,7 @@ module Aws::ACMPCA
1426
1586
  #
1427
1587
  #
1428
1588
  #
1429
- # [1]: https://tools.ietf.org/html/rfc5280#section-4.2.1.12
1589
+ # [1]: https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.12
1430
1590
  # @return [String]
1431
1591
  #
1432
1592
  # @!attribute [rw] extended_key_usage_object_identifier
@@ -1502,6 +1662,12 @@ module Aws::ACMPCA
1502
1662
  # initials: "String5",
1503
1663
  # pseudonym: "String128",
1504
1664
  # generation_qualifier: "String3",
1665
+ # custom_attributes: [
1666
+ # {
1667
+ # object_identifier: "CustomObjectIdentifier", # required
1668
+ # value: "String1To256", # required
1669
+ # },
1670
+ # ],
1505
1671
  # },
1506
1672
  # edi_party_name: {
1507
1673
  # party_name: "String256", # required
@@ -1512,6 +1678,13 @@ module Aws::ACMPCA
1512
1678
  # registered_id: "CustomObjectIdentifier",
1513
1679
  # },
1514
1680
  # ],
1681
+ # custom_extensions: [
1682
+ # {
1683
+ # object_identifier: "CustomObjectIdentifier", # required
1684
+ # value: "Base64String1To4096", # required
1685
+ # critical: false,
1686
+ # },
1687
+ # ],
1515
1688
  # }
1516
1689
  #
1517
1690
  # @!attribute [rw] certificate_policies
@@ -1548,13 +1721,25 @@ module Aws::ACMPCA
1548
1721
  # the certificate.
1549
1722
  # @return [Array<Types::GeneralName>]
1550
1723
  #
1724
+ # @!attribute [rw] custom_extensions
1725
+ # Contains a sequence of one or more X.509 extensions, each of which
1726
+ # consists of an object identifier (OID), a base64-encoded value, and
1727
+ # the critical flag. For more information, see the [Global OID
1728
+ # reference database.][1]
1729
+ #
1730
+ #
1731
+ #
1732
+ # [1]: https://oidref.com/2.5.29
1733
+ # @return [Array<Types::CustomExtension>]
1734
+ #
1551
1735
  # @see http://docs.aws.amazon.com/goto/WebAPI/acm-pca-2017-08-22/Extensions AWS API Documentation
1552
1736
  #
1553
1737
  class Extensions < Struct.new(
1554
1738
  :certificate_policies,
1555
1739
  :extended_key_usage,
1556
1740
  :key_usage,
1557
- :subject_alternative_names)
1741
+ :subject_alternative_names,
1742
+ :custom_extensions)
1558
1743
  SENSITIVE = []
1559
1744
  include Aws::Structure
1560
1745
  end
@@ -1565,7 +1750,7 @@ module Aws::ACMPCA
1565
1750
  #
1566
1751
  #
1567
1752
  #
1568
- # [1]: https://tools.ietf.org/html/rfc5280
1753
+ # [1]: https://datatracker.ietf.org/doc/html/rfc5280
1569
1754
  #
1570
1755
  # @note When making an API call, you may pass GeneralName
1571
1756
  # data as a hash:
@@ -1592,6 +1777,12 @@ module Aws::ACMPCA
1592
1777
  # initials: "String5",
1593
1778
  # pseudonym: "String128",
1594
1779
  # generation_qualifier: "String3",
1780
+ # custom_attributes: [
1781
+ # {
1782
+ # object_identifier: "CustomObjectIdentifier", # required
1783
+ # value: "String1To256", # required
1784
+ # },
1785
+ # ],
1595
1786
  # },
1596
1787
  # edi_party_name: {
1597
1788
  # party_name: "String256", # required
@@ -1611,7 +1802,7 @@ module Aws::ACMPCA
1611
1802
  #
1612
1803
  #
1613
1804
  #
1614
- # [1]: https://tools.ietf.org/html/rfc822
1805
+ # [1]: https://datatracker.ietf.org/doc/html/rfc822
1615
1806
  # @return [String]
1616
1807
  #
1617
1808
  # @!attribute [rw] dns_name
@@ -2043,6 +2234,12 @@ module Aws::ACMPCA
2043
2234
  # initials: "String5",
2044
2235
  # pseudonym: "String128",
2045
2236
  # generation_qualifier: "String3",
2237
+ # custom_attributes: [
2238
+ # {
2239
+ # object_identifier: "CustomObjectIdentifier", # required
2240
+ # value: "String1To256", # required
2241
+ # },
2242
+ # ],
2046
2243
  # },
2047
2244
  # edi_party_name: {
2048
2245
  # party_name: "String256", # required
@@ -2053,6 +2250,13 @@ module Aws::ACMPCA
2053
2250
  # registered_id: "CustomObjectIdentifier",
2054
2251
  # },
2055
2252
  # ],
2253
+ # custom_extensions: [
2254
+ # {
2255
+ # object_identifier: "CustomObjectIdentifier", # required
2256
+ # value: "Base64String1To4096", # required
2257
+ # critical: false,
2258
+ # },
2259
+ # ],
2056
2260
  # },
2057
2261
  # subject: {
2058
2262
  # country: "CountryCodeString",
@@ -2069,6 +2273,12 @@ module Aws::ACMPCA
2069
2273
  # initials: "String5",
2070
2274
  # pseudonym: "String128",
2071
2275
  # generation_qualifier: "String3",
2276
+ # custom_attributes: [
2277
+ # {
2278
+ # object_identifier: "CustomObjectIdentifier", # required
2279
+ # value: "String1To256", # required
2280
+ # },
2281
+ # ],
2072
2282
  # },
2073
2283
  # },
2074
2284
  # certificate_authority_arn: "Arn", # required
@@ -2128,7 +2338,7 @@ module Aws::ACMPCA
2128
2338
  # contains your X509 version 3 extensions.
2129
2339
  #
2130
2340
  # `openssl req -new -config openssl_rsa.cnf -extensions usr_cert
2131
- # -newkey rsa:2048 -days -365 -keyout private/test_cert_priv_key.pem
2341
+ # -newkey rsa:2048 -days 365 -keyout private/test_cert_priv_key.pem
2132
2342
  # -out csr/test_cert_.csr`
2133
2343
  #
2134
2344
  # Note: A CSR must provide either a *subject name* or a *subject
@@ -2142,6 +2352,11 @@ module Aws::ACMPCA
2142
2352
  # This parameter should not be confused with the `SigningAlgorithm`
2143
2353
  # parameter used to sign a CSR in the `CreateCertificateAuthority`
2144
2354
  # action.
2355
+ #
2356
+ # <note markdown="1"> The specified signing algorithm family (RSA or ECDSA) much match the
2357
+ # algorithm family of the CA's secret key.
2358
+ #
2359
+ # </note>
2145
2360
  # @return [String]
2146
2361
  #
2147
2362
  # @!attribute [rw] template_arn
@@ -2185,7 +2400,7 @@ module Aws::ACMPCA
2185
2400
  #
2186
2401
  #
2187
2402
  #
2188
- # [1]: https://tools.ietf.org/html/rfc5280#section-4.1.2.5
2403
+ # [1]: https://datatracker.ietf.org/doc/html/rfc5280#section-4.1.2.5
2189
2404
  # @return [Types::Validity]
2190
2405
  #
2191
2406
  # @!attribute [rw] validity_not_before
@@ -2210,7 +2425,7 @@ module Aws::ACMPCA
2210
2425
  #
2211
2426
  #
2212
2427
  # [1]: https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_Validity.html
2213
- # [2]: https://tools.ietf.org/html/rfc5280#section-4.1.2.5
2428
+ # [2]: https://datatracker.ietf.org/doc/html/rfc5280#section-4.1.2.5
2214
2429
  # @return [Types::Validity]
2215
2430
  #
2216
2431
  # @!attribute [rw] idempotency_token
@@ -2588,17 +2803,17 @@ module Aws::ACMPCA
2588
2803
  # @return [Boolean]
2589
2804
  #
2590
2805
  # @!attribute [rw] ocsp_custom_cname
2591
- # By default, ACM Private CA injects an AWS domain into certificates
2592
- # being validated by the Online Certificate Status Protocol (OCSP). A
2593
- # customer can alternatively use this object to define a CNAME
2594
- # specifying a customized OCSP domain.
2806
+ # By default, ACM Private CA injects an Amazon Web Services domain
2807
+ # into certificates being validated by the Online Certificate Status
2808
+ # Protocol (OCSP). A customer can alternatively use this object to
2809
+ # define a CNAME specifying a customized OCSP domain.
2595
2810
  #
2596
2811
  # Note: The value of the CNAME must not include a protocol prefix such
2597
2812
  # as "http://" or "https://".
2598
2813
  #
2599
2814
  # For more information, see [Customizing Online Certificate Status
2600
- # Protocol (OCSP) ][1] in the *AWS Certificate Manager Private
2601
- # Certificate Authority (PCA) User Guide*.
2815
+ # Protocol (OCSP) ][1] in the *Certificate Manager Private Certificate
2816
+ # Authority (PCA) User Guide*.
2602
2817
  #
2603
2818
  #
2604
2819
  #
@@ -2649,12 +2864,13 @@ module Aws::ACMPCA
2649
2864
  end
2650
2865
 
2651
2866
  # Permissions designate which private CA actions can be performed by an
2652
- # AWS service or entity. In order for ACM to automatically renew private
2653
- # certificates, you must give the ACM service principal all available
2654
- # permissions (`IssueCertificate`, `GetCertificate`, and
2655
- # `ListPermissions`). Permissions can be assigned with the
2656
- # [CreatePermission][1] action, removed with the [DeletePermission][2]
2657
- # action, and listed with the [ListPermissions][3] action.
2867
+ # Amazon Web Services service or entity. In order for ACM to
2868
+ # automatically renew private certificates, you must give the ACM
2869
+ # service principal all available permissions (`IssueCertificate`,
2870
+ # `GetCertificate`, and `ListPermissions`). Permissions can be assigned
2871
+ # with the [CreatePermission][1] action, removed with the
2872
+ # [DeletePermission][2] action, and listed with the [ListPermissions][3]
2873
+ # action.
2658
2874
  #
2659
2875
  #
2660
2876
  #
@@ -2672,8 +2888,8 @@ module Aws::ACMPCA
2672
2888
  # @return [Time]
2673
2889
  #
2674
2890
  # @!attribute [rw] principal
2675
- # The AWS service or entity that holds the permission. At this time,
2676
- # the only valid principal is `acm.amazonaws.com`.
2891
+ # The Amazon Web Services service or entity that holds the permission.
2892
+ # At this time, the only valid principal is `acm.amazonaws.com`.
2677
2893
  # @return [String]
2678
2894
  #
2679
2895
  # @!attribute [rw] source_account
@@ -2681,8 +2897,8 @@ module Aws::ACMPCA
2681
2897
  # @return [String]
2682
2898
  #
2683
2899
  # @!attribute [rw] actions
2684
- # The private CA actions that can be performed by the designated AWS
2685
- # service.
2900
+ # The private CA actions that can be performed by the designated
2901
+ # Amazon Web Services service.
2686
2902
  # @return [Array<String>]
2687
2903
  #
2688
2904
  # @!attribute [rw] policy
@@ -2836,7 +3052,7 @@ module Aws::ACMPCA
2836
3052
  #
2837
3053
  #
2838
3054
  #
2839
- # [1]: https://tools.ietf.org/html/rfc5280#section-4.2.1.4
3055
+ # [1]: https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.4
2840
3056
  #
2841
3057
  # @note When making an API call, you may pass Qualifier
2842
3058
  # data as a hash:
@@ -2946,8 +3162,8 @@ module Aws::ACMPCA
2946
3162
  # about certificates as requested by clients, and a CRL contains an
2947
3163
  # updated list of certificates revoked by your CA. For more information,
2948
3164
  # see [RevokeCertificate][3] and [Setting up a certificate revocation
2949
- # method][4] in the *AWS Certificate Manager Private Certificate
2950
- # Authority (PCA) User Guide*.
3165
+ # method][4] in the *Certificate Manager Private Certificate Authority
3166
+ # (PCA) User Guide*.
2951
3167
  #
2952
3168
  #
2953
3169
  #
@@ -3026,7 +3242,7 @@ module Aws::ACMPCA
3026
3242
  # `openssl x509 -in file_path -text -noout`
3027
3243
  #
3028
3244
  # You can also copy the serial number from the console or use the
3029
- # [DescribeCertificate][2] action in the *AWS Certificate Manager API
3245
+ # [DescribeCertificate][2] action in the *Certificate Manager API
3030
3246
  # Reference*.
3031
3247
  #
3032
3248
  #
@@ -3247,7 +3463,7 @@ module Aws::ACMPCA
3247
3463
  #
3248
3464
  #
3249
3465
  #
3250
- # [1]: https://tools.ietf.org/html/rfc5280#section-4.1.2.5
3466
+ # [1]: https://datatracker.ietf.org/doc/html/rfc5280#section-4.1.2.5
3251
3467
  #
3252
3468
  # @note When making an API call, you may pass Validity
3253
3469
  # data as a hash:
@@ -49,6 +49,6 @@ require_relative 'aws-sdk-acmpca/customizations'
49
49
  # @!group service
50
50
  module Aws::ACMPCA
51
51
 
52
- GEM_VERSION = '1.46.0'
52
+ GEM_VERSION = '1.49.0'
53
53
 
54
54
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-acmpca
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.46.0
4
+ version: 1.49.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2022-02-24 00:00:00.000000000 Z
11
+ date: 2022-07-20 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core