aws-sdk-acmpca 1.31.0 → 1.32.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: e9248de24e8f0650decb902183ab1be075185fcbd936d73fa01d60288195baab
4
- data.tar.gz: c97ad717942496ed6dd1b9210872f51ee89c5db7795612d43215ab4306ddd8a5
3
+ metadata.gz: dc98acc54b80d947d407c145b5f09f400dad5a8b943019e3b8c9bcd008f2b2c7
4
+ data.tar.gz: 5625afa10f80568e15a65cec8fce964cebe02a72ffeb314d9ec95374a073d012
5
5
  SHA512:
6
- metadata.gz: bb1c7a2154501ecdb1a26f5402da4239c8667255169d172f42a7a7f0f215cff3d08d116a39a0fab7c7efe35b1c57321ecb598d03fc163f43541d6d87e0e44114
7
- data.tar.gz: b21951246a975ef7d3a62d4e92ad64775760f60c4297d12382c4510faac8b8c422ccd0ed4ae21d632e1f5c5e3dd3f04fd9210dc395022778c295246d57236ea2
6
+ metadata.gz: 774424f9c13f043e133ee64be2b4d302d7797645b9d51075aea543f1c215deab51c914473d9f93b6a4d52942974a108c1e69f0946a65e66a1d3c635cab1d7d11
7
+ data.tar.gz: ea1de9d25fd213799a2a277027d62ca35f445a79cc4e2c23553dd182f16c9e8a93f086ffe040dcdd28449c283a5113e3d37fed4b474475d3acac8f4f42272af0
@@ -49,6 +49,6 @@ require_relative 'aws-sdk-acmpca/customizations'
49
49
  # @!group service
50
50
  module Aws::ACMPCA
51
51
 
52
- GEM_VERSION = '1.31.0'
52
+ GEM_VERSION = '1.32.0'
53
53
 
54
54
  end
@@ -385,12 +385,14 @@ module Aws::ACMPCA
385
385
  # The type of the certificate authority.
386
386
  #
387
387
  # @option params [String] :idempotency_token
388
- # Alphanumeric string that can be used to distinguish between calls to
389
- # **CreateCertificateAuthority**. For a given token, ACM Private CA
390
- # creates exactly one CA. If you issue a subsequent call using the same
391
- # token, ACM Private CA returns the ARN of the existing CA and takes no
392
- # further action. If you change the idempotency token across multiple
393
- # calls, ACM Private CA creates a unique CA for each unique token.
388
+ # Custom string that can be used to distinguish between calls to the
389
+ # **CreateCertificateAuthority** action. Idempotency tokens for
390
+ # **CreateCertificateAuthority** time out after five minutes. Therefore,
391
+ # if you call **CreateCertificateAuthority** multiple times with the
392
+ # same idempotency token within five minutes, ACM Private CA recognizes
393
+ # that you are requesting only certificate authority and will issue only
394
+ # one. If you change the idempotency token for each call, PCA recognizes
395
+ # that you are requesting multiple certificate authorities.
394
396
  #
395
397
  # @option params [Array<Types::Tag>] :tags
396
398
  # Key-value pairs that will be attached to the new private CA. You can
@@ -884,7 +886,7 @@ module Aws::ACMPCA
884
886
  # * `EXPIRED` - Your private CA certificate has expired.
885
887
  #
886
888
  # * `FAILED` - Your private CA has failed. Your CA can fail because of
887
- # problems such a network outage or backend AWS failure or other
889
+ # problems such a network outage or back-end AWS failure or other
888
890
  # errors. A failed CA can never return to the pending state. You must
889
891
  # create a new CA.
890
892
  #
@@ -1276,8 +1278,8 @@ module Aws::ACMPCA
1276
1278
  # following preparations must in place:
1277
1279
  #
1278
1280
  # 1. In ACM Private CA, call the [CreateCertificateAuthority][1] action
1279
- # to create the private CA that that you plan to back with the
1280
- # imported certificate.
1281
+ # to create the private CA that you plan to back with the imported
1282
+ # certificate.
1281
1283
  #
1282
1284
  # 2. Call the [GetCertificateAuthorityCsr][2] action to generate a
1283
1285
  # certificate signing request (CSR).
@@ -1299,7 +1301,7 @@ module Aws::ACMPCA
1299
1301
  # * Installing a subordinate CA certificate whose parent authority is
1300
1302
  # externally hosted.
1301
1303
  #
1302
- # The following addtitional requirements apply when you import a CA
1304
+ # The following additional requirements apply when you import a CA
1303
1305
  # certificate.
1304
1306
  #
1305
1307
  # * Only a self-signed certificate can be imported as a root CA.
@@ -1429,6 +1431,21 @@ module Aws::ACMPCA
1429
1431
  #
1430
1432
  # [1]: https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_GetCertificate.html
1431
1433
  #
1434
+ # @option params [Types::ApiPassthrough] :api_passthrough
1435
+ # Specifies X.509 certificate information to be included in the issued
1436
+ # certificate. An `APIPassthrough` or `APICSRPassthrough` template
1437
+ # variant must be selected, or else this parameter is ignored. For more
1438
+ # information about using these templates, see [Understanding
1439
+ # Certificate Templates][1].
1440
+ #
1441
+ # If conflicting or duplicate certificate information is supplied during
1442
+ # certificate issuance, ACM Private CA applies [order of operation
1443
+ # rules](xxxxx) to determine what information is used.
1444
+ #
1445
+ #
1446
+ #
1447
+ # [1]: https://docs.aws.amazon.com/acm-pca/latest/userguide/UsingTemplates.html
1448
+ #
1432
1449
  # @option params [required, String] :certificate_authority_arn
1433
1450
  # The Amazon Resource Name (ARN) that was returned when you called
1434
1451
  # [CreateCertificateAuthority][1]. This must be of the form:
@@ -1442,15 +1459,15 @@ module Aws::ACMPCA
1442
1459
  #
1443
1460
  # @option params [required, String, StringIO, File] :csr
1444
1461
  # The certificate signing request (CSR) for the certificate you want to
1445
- # issue. You can use the following OpenSSL command to create the CSR and
1446
- # a 2048 bit RSA private key.
1462
+ # issue. As an example, you can use the following OpenSSL command to
1463
+ # create the CSR and a 2048 bit RSA private key.
1447
1464
  #
1448
1465
  # `openssl req -new -newkey rsa:2048 -days 365 -keyout
1449
1466
  # private/test_cert_priv_key.pem -out csr/test_cert_.csr`
1450
1467
  #
1451
- # If you have a configuration file, you can use the following OpenSSL
1452
- # command. The `usr_cert` block in the configuration file contains your
1453
- # X509 version 3 extensions.
1468
+ # If you have a configuration file, you can then use the following
1469
+ # OpenSSL command. The `usr_cert` block in the configuration file
1470
+ # contains your X509 version 3 extensions.
1454
1471
  #
1455
1472
  # `openssl req -new -config openssl_rsa.cnf -extensions usr_cert -newkey
1456
1473
  # rsa:2048 -days -365 -keyout private/test_cert_priv_key.pem -out
@@ -1464,7 +1481,8 @@ module Aws::ACMPCA
1464
1481
  # be issued.
1465
1482
  #
1466
1483
  # This parameter should not be confused with the `SigningAlgorithm`
1467
- # parameter used to sign a CSR.
1484
+ # parameter used to sign a CSR in the `CreateCertificateAuthority`
1485
+ # action.
1468
1486
  #
1469
1487
  # @option params [String] :template_arn
1470
1488
  # Specifies a custom configuration template to use when issuing a
@@ -1477,65 +1495,70 @@ module Aws::ACMPCA
1477
1495
  # Note: The CA depth configured on a subordinate CA certificate must not
1478
1496
  # exceed the limit set by its parents in the CA hierarchy.
1479
1497
  #
1480
- # The following service-owned `TemplateArn` values are supported by ACM
1481
- # Private CA:
1482
- #
1483
- # * arn:aws:acm-pca:::template/CodeSigningCertificate/V1
1498
+ # For a list of `TemplateArn` values supported by ACM Private CA, see
1499
+ # [Understanding Certificate Templates][2].
1484
1500
  #
1485
- # * arn:aws:acm-pca:::template/CodeSigningCertificate\_CSRPassthrough/V1
1486
1501
  #
1487
- # * arn:aws:acm-pca:::template/EndEntityCertificate/V1
1488
1502
  #
1489
- # * arn:aws:acm-pca:::template/EndEntityCertificate\_CSRPassthrough/V1
1490
- #
1491
- # * arn:aws:acm-pca:::template/EndEntityClientAuthCertificate/V1
1492
- #
1493
- # * arn:aws:acm-pca:::template/EndEntityClientAuthCertificate\_CSRPassthrough/V1
1494
- #
1495
- # * arn:aws:acm-pca:::template/EndEntityServerAuthCertificate/V1
1496
- #
1497
- # * arn:aws:acm-pca:::template/EndEntityServerAuthCertificate\_CSRPassthrough/V1
1503
+ # [1]: https://docs.aws.amazon.com/acm-pca/latest/userguide/PcaTerms.html#terms-cadepth
1504
+ # [2]: https://docs.aws.amazon.com/acm-pca/latest/userguide/UsingTemplates.html
1498
1505
  #
1499
- # * arn:aws:acm-pca:::template/OCSPSigningCertificate/V1
1506
+ # @option params [required, Types::Validity] :validity
1507
+ # Information describing the end of the validity period of the
1508
+ # certificate. This parameter sets the “Not After” date for the
1509
+ # certificate.
1500
1510
  #
1501
- # * arn:aws:acm-pca:::template/OCSPSigningCertificate\_CSRPassthrough/V1
1511
+ # Certificate validity is the period of time during which a certificate
1512
+ # is valid. Validity can be expressed as an explicit date and time when
1513
+ # the certificate expires, or as a span of time after issuance, stated
1514
+ # in days, months, or years. For more information, see [Validity][1] in
1515
+ # RFC 5280.
1502
1516
  #
1503
- # * arn:aws:acm-pca:::template/RootCACertificate/V1
1517
+ # This value is unaffected when `ValidityNotBefore` is also specified.
1518
+ # For example, if `Validity` is set to 20 days in the future, the
1519
+ # certificate will expire 20 days from issuance time regardless of the
1520
+ # `ValidityNotBefore` value.
1504
1521
  #
1505
- # * arn:aws:acm-pca:::template/SubordinateCACertificate\_PathLen0/V1
1522
+ # The end of the validity period configured on a certificate must not
1523
+ # exceed the limit set on its parents in the CA hierarchy.
1506
1524
  #
1507
- # * arn:aws:acm-pca:::template/SubordinateCACertificate\_PathLen1/V1
1508
1525
  #
1509
- # * arn:aws:acm-pca:::template/SubordinateCACertificate\_PathLen2/V1
1510
1526
  #
1511
- # * arn:aws:acm-pca:::template/SubordinateCACertificate\_PathLen3/V1
1527
+ # [1]: https://tools.ietf.org/html/rfc5280#section-4.1.2.5
1512
1528
  #
1513
- # For more information, see [Using Templates][2].
1529
+ # @option params [Types::Validity] :validity_not_before
1530
+ # Information describing the start of the validity period of the
1531
+ # certificate. This parameter sets the “Not Before" date for the
1532
+ # certificate.
1514
1533
  #
1534
+ # By default, when issuing a certificate, ACM Private CA sets the "Not
1535
+ # Before" date to the issuance time minus 60 minutes. This compensates
1536
+ # for clock inconsistencies across computer systems. The
1537
+ # `ValidityNotBefore` parameter can be used to customize the “Not
1538
+ # Before” value.
1515
1539
  #
1540
+ # Unlike the `Validity` parameter, the `ValidityNotBefore` parameter is
1541
+ # optional.
1516
1542
  #
1517
- # [1]: https://docs.aws.amazon.com/acm-pca/latest/userguide/PcaTerms.html#terms-cadepth
1518
- # [2]: https://docs.aws.amazon.com/acm-pca/latest/userguide/UsingTemplates.html
1543
+ # The `ValidityNotBefore` value is expressed as an explicit date and
1544
+ # time, using the `Validity` type value `ABSOLUTE`. For more
1545
+ # information, see [Validity][1] in this API reference and [Validity][2]
1546
+ # in RFC 5280.
1519
1547
  #
1520
- # @option params [required, Types::Validity] :validity
1521
- # Information describing the validity period of the certificate.
1522
1548
  #
1523
- # When issuing a certificate, ACM Private CA sets the "Not Before"
1524
- # date in the validity field to date and time minus 60 minutes. This is
1525
- # intended to compensate for time inconsistencies across systems of 60
1526
- # minutes or less.
1527
1549
  #
1528
- # The validity period configured on a certificate must not exceed the
1529
- # limit set by its parents in the CA hierarchy.
1550
+ # [1]: https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_Validity.html
1551
+ # [2]: https://tools.ietf.org/html/rfc5280#section-4.1.2.5
1530
1552
  #
1531
1553
  # @option params [String] :idempotency_token
1532
- # Custom string that can be used to distinguish between calls to the
1533
- # **IssueCertificate** action. Idempotency tokens time out after one
1534
- # hour. Therefore, if you call **IssueCertificate** multiple times with
1535
- # the same idempotency token within 5 minutes, ACM Private CA recognizes
1536
- # that you are requesting only one certificate and will issue only one.
1537
- # If you change the idempotency token for each call, PCA recognizes that
1538
- # you are requesting multiple certificates.
1554
+ # Alphanumeric string that can be used to distinguish between calls to
1555
+ # the **IssueCertificate** action. Idempotency tokens for
1556
+ # **IssueCertificate** time out after one minute. Therefore, if you call
1557
+ # **IssueCertificate** multiple times with the same idempotency token
1558
+ # within one minute, ACM Private CA recognizes that you are requesting
1559
+ # only one certificate and will issue only one. If you change the
1560
+ # idempotency token for each call, PCA recognizes that you are
1561
+ # requesting multiple certificates.
1539
1562
  #
1540
1563
  # @return [Types::IssueCertificateResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
1541
1564
  #
@@ -1544,6 +1567,89 @@ module Aws::ACMPCA
1544
1567
  # @example Request syntax with placeholder values
1545
1568
  #
1546
1569
  # resp = client.issue_certificate({
1570
+ # api_passthrough: {
1571
+ # extensions: {
1572
+ # certificate_policies: [
1573
+ # {
1574
+ # cert_policy_id: "CustomObjectIdentifier", # required
1575
+ # policy_qualifiers: [
1576
+ # {
1577
+ # policy_qualifier_id: "CPS", # required, accepts CPS
1578
+ # qualifier: { # required
1579
+ # cps_uri: "String256", # required
1580
+ # },
1581
+ # },
1582
+ # ],
1583
+ # },
1584
+ # ],
1585
+ # extended_key_usage: [
1586
+ # {
1587
+ # extended_key_usage_type: "SERVER_AUTH", # accepts SERVER_AUTH, CLIENT_AUTH, CODE_SIGNING, EMAIL_PROTECTION, TIME_STAMPING, OCSP_SIGNING, SMART_CARD_LOGIN, DOCUMENT_SIGNING, CERTIFICATE_TRANSPARENCY
1588
+ # extended_key_usage_object_identifier: "CustomObjectIdentifier",
1589
+ # },
1590
+ # ],
1591
+ # key_usage: {
1592
+ # digital_signature: false,
1593
+ # non_repudiation: false,
1594
+ # key_encipherment: false,
1595
+ # data_encipherment: false,
1596
+ # key_agreement: false,
1597
+ # key_cert_sign: false,
1598
+ # crl_sign: false,
1599
+ # encipher_only: false,
1600
+ # decipher_only: false,
1601
+ # },
1602
+ # subject_alternative_names: [
1603
+ # {
1604
+ # other_name: {
1605
+ # type_id: "CustomObjectIdentifier", # required
1606
+ # value: "String256", # required
1607
+ # },
1608
+ # rfc_822_name: "String256",
1609
+ # dns_name: "String253",
1610
+ # directory_name: {
1611
+ # country: "CountryCodeString",
1612
+ # organization: "String64",
1613
+ # organizational_unit: "String64",
1614
+ # distinguished_name_qualifier: "ASN1PrintableString64",
1615
+ # state: "String128",
1616
+ # common_name: "String64",
1617
+ # serial_number: "ASN1PrintableString64",
1618
+ # locality: "String128",
1619
+ # title: "String64",
1620
+ # surname: "String40",
1621
+ # given_name: "String16",
1622
+ # initials: "String5",
1623
+ # pseudonym: "String128",
1624
+ # generation_qualifier: "String3",
1625
+ # },
1626
+ # edi_party_name: {
1627
+ # party_name: "String256", # required
1628
+ # name_assigner: "String256",
1629
+ # },
1630
+ # uniform_resource_identifier: "String253",
1631
+ # ip_address: "String39",
1632
+ # registered_id: "CustomObjectIdentifier",
1633
+ # },
1634
+ # ],
1635
+ # },
1636
+ # subject: {
1637
+ # country: "CountryCodeString",
1638
+ # organization: "String64",
1639
+ # organizational_unit: "String64",
1640
+ # distinguished_name_qualifier: "ASN1PrintableString64",
1641
+ # state: "String128",
1642
+ # common_name: "String64",
1643
+ # serial_number: "ASN1PrintableString64",
1644
+ # locality: "String128",
1645
+ # title: "String64",
1646
+ # surname: "String40",
1647
+ # given_name: "String16",
1648
+ # initials: "String5",
1649
+ # pseudonym: "String128",
1650
+ # generation_qualifier: "String3",
1651
+ # },
1652
+ # },
1547
1653
  # certificate_authority_arn: "Arn", # required
1548
1654
  # csr: "data", # required
1549
1655
  # signing_algorithm: "SHA256WITHECDSA", # required, accepts SHA256WITHECDSA, SHA384WITHECDSA, SHA512WITHECDSA, SHA256WITHRSA, SHA384WITHRSA, SHA512WITHRSA
@@ -1552,6 +1658,10 @@ module Aws::ACMPCA
1552
1658
  # value: 1, # required
1553
1659
  # type: "END_DATE", # required, accepts END_DATE, ABSOLUTE, DAYS, MONTHS, YEARS
1554
1660
  # },
1661
+ # validity_not_before: {
1662
+ # value: 1, # required
1663
+ # type: "END_DATE", # required, accepts END_DATE, ABSOLUTE, DAYS, MONTHS, YEARS
1664
+ # },
1555
1665
  # idempotency_token: "IdempotencyToken",
1556
1666
  # })
1557
1667
  #
@@ -1894,7 +2004,7 @@ module Aws::ACMPCA
1894
2004
  # [1]: https://docs.aws.amazon.com/acm-pca/latest/APIReference/API_ListCertificateAuthorities.html
1895
2005
  #
1896
2006
  # @option params [required, String] :policy
1897
- # The path and filename of a JSON-formatted IAM policy to attach to the
2007
+ # The path and file name of a JSON-formatted IAM policy to attach to the
1898
2008
  # specified private CA resource. If this policy does not contain all
1899
2009
  # required statements or if it includes any statement that is not
1900
2010
  # allowed, the `PutPolicy` action returns an `InvalidPolicyException`.
@@ -2229,7 +2339,7 @@ module Aws::ACMPCA
2229
2339
  params: params,
2230
2340
  config: config)
2231
2341
  context[:gem_name] = 'aws-sdk-acmpca'
2232
- context[:gem_version] = '1.31.0'
2342
+ context[:gem_version] = '1.32.0'
2233
2343
  Seahorse::Client::Request.new(handlers, context)
2234
2344
  end
2235
2345
 
@@ -23,6 +23,7 @@ module Aws::ACMPCA
23
23
  AccountId = Shapes::StringShape.new(name: 'AccountId')
24
24
  ActionList = Shapes::ListShape.new(name: 'ActionList')
25
25
  ActionType = Shapes::StringShape.new(name: 'ActionType')
26
+ ApiPassthrough = Shapes::StructureShape.new(name: 'ApiPassthrough')
26
27
  Arn = Shapes::StringShape.new(name: 'Arn')
27
28
  AuditReportId = Shapes::StringShape.new(name: 'AuditReportId')
28
29
  AuditReportResponseFormat = Shapes::StringShape.new(name: 'AuditReportResponseFormat')
@@ -38,6 +39,7 @@ module Aws::ACMPCA
38
39
  CertificateChain = Shapes::StringShape.new(name: 'CertificateChain')
39
40
  CertificateChainBlob = Shapes::BlobShape.new(name: 'CertificateChainBlob')
40
41
  CertificateMismatchException = Shapes::StructureShape.new(name: 'CertificateMismatchException')
42
+ CertificatePolicyList = Shapes::ListShape.new(name: 'CertificatePolicyList')
41
43
  ConcurrentModificationException = Shapes::StructureShape.new(name: 'ConcurrentModificationException')
42
44
  CountryCodeString = Shapes::StringShape.new(name: 'CountryCodeString')
43
45
  CreateCertificateAuthorityAuditReportRequest = Shapes::StructureShape.new(name: 'CreateCertificateAuthorityAuditReportRequest')
@@ -58,8 +60,13 @@ module Aws::ACMPCA
58
60
  DescribeCertificateAuthorityRequest = Shapes::StructureShape.new(name: 'DescribeCertificateAuthorityRequest')
59
61
  DescribeCertificateAuthorityResponse = Shapes::StructureShape.new(name: 'DescribeCertificateAuthorityResponse')
60
62
  EdiPartyName = Shapes::StructureShape.new(name: 'EdiPartyName')
63
+ ExtendedKeyUsage = Shapes::StructureShape.new(name: 'ExtendedKeyUsage')
64
+ ExtendedKeyUsageList = Shapes::ListShape.new(name: 'ExtendedKeyUsageList')
65
+ ExtendedKeyUsageType = Shapes::StringShape.new(name: 'ExtendedKeyUsageType')
66
+ Extensions = Shapes::StructureShape.new(name: 'Extensions')
61
67
  FailureReason = Shapes::StringShape.new(name: 'FailureReason')
62
68
  GeneralName = Shapes::StructureShape.new(name: 'GeneralName')
69
+ GeneralNameList = Shapes::ListShape.new(name: 'GeneralNameList')
63
70
  GetCertificateAuthorityCertificateRequest = Shapes::StructureShape.new(name: 'GetCertificateAuthorityCertificateRequest')
64
71
  GetCertificateAuthorityCertificateResponse = Shapes::StructureShape.new(name: 'GetCertificateAuthorityCertificateResponse')
65
72
  GetCertificateAuthorityCsrRequest = Shapes::StructureShape.new(name: 'GetCertificateAuthorityCsrRequest')
@@ -99,9 +106,14 @@ module Aws::ACMPCA
99
106
  Permission = Shapes::StructureShape.new(name: 'Permission')
100
107
  PermissionAlreadyExistsException = Shapes::StructureShape.new(name: 'PermissionAlreadyExistsException')
101
108
  PermissionList = Shapes::ListShape.new(name: 'PermissionList')
109
+ PolicyInformation = Shapes::StructureShape.new(name: 'PolicyInformation')
110
+ PolicyQualifierId = Shapes::StringShape.new(name: 'PolicyQualifierId')
111
+ PolicyQualifierInfo = Shapes::StructureShape.new(name: 'PolicyQualifierInfo')
112
+ PolicyQualifierInfoList = Shapes::ListShape.new(name: 'PolicyQualifierInfoList')
102
113
  PositiveLong = Shapes::IntegerShape.new(name: 'PositiveLong')
103
114
  Principal = Shapes::StringShape.new(name: 'Principal')
104
115
  PutPolicyRequest = Shapes::StructureShape.new(name: 'PutPolicyRequest')
116
+ Qualifier = Shapes::StructureShape.new(name: 'Qualifier')
105
117
  RequestAlreadyProcessedException = Shapes::StructureShape.new(name: 'RequestAlreadyProcessedException')
106
118
  RequestFailedException = Shapes::StructureShape.new(name: 'RequestFailedException')
107
119
  RequestInProgressException = Shapes::StructureShape.new(name: 'RequestInProgressException')
@@ -165,6 +177,10 @@ module Aws::ACMPCA
165
177
 
166
178
  ActionList.member = Shapes::ShapeRef.new(shape: ActionType)
167
179
 
180
+ ApiPassthrough.add_member(:extensions, Shapes::ShapeRef.new(shape: Extensions, location_name: "Extensions"))
181
+ ApiPassthrough.add_member(:subject, Shapes::ShapeRef.new(shape: ASN1Subject, location_name: "Subject"))
182
+ ApiPassthrough.struct_class = Types::ApiPassthrough
183
+
168
184
  CertificateAuthorities.member = Shapes::ShapeRef.new(shape: CertificateAuthority)
169
185
 
170
186
  CertificateAuthority.add_member(:arn, Shapes::ShapeRef.new(shape: Arn, location_name: "Arn"))
@@ -191,6 +207,8 @@ module Aws::ACMPCA
191
207
  CertificateMismatchException.add_member(:message, Shapes::ShapeRef.new(shape: String, location_name: "message"))
192
208
  CertificateMismatchException.struct_class = Types::CertificateMismatchException
193
209
 
210
+ CertificatePolicyList.member = Shapes::ShapeRef.new(shape: PolicyInformation)
211
+
194
212
  ConcurrentModificationException.add_member(:message, Shapes::ShapeRef.new(shape: String, location_name: "message"))
195
213
  ConcurrentModificationException.struct_class = Types::ConcurrentModificationException
196
214
 
@@ -261,6 +279,18 @@ module Aws::ACMPCA
261
279
  EdiPartyName.add_member(:name_assigner, Shapes::ShapeRef.new(shape: String256, location_name: "NameAssigner"))
262
280
  EdiPartyName.struct_class = Types::EdiPartyName
263
281
 
282
+ ExtendedKeyUsage.add_member(:extended_key_usage_type, Shapes::ShapeRef.new(shape: ExtendedKeyUsageType, location_name: "ExtendedKeyUsageType"))
283
+ ExtendedKeyUsage.add_member(:extended_key_usage_object_identifier, Shapes::ShapeRef.new(shape: CustomObjectIdentifier, location_name: "ExtendedKeyUsageObjectIdentifier"))
284
+ ExtendedKeyUsage.struct_class = Types::ExtendedKeyUsage
285
+
286
+ ExtendedKeyUsageList.member = Shapes::ShapeRef.new(shape: ExtendedKeyUsage)
287
+
288
+ Extensions.add_member(:certificate_policies, Shapes::ShapeRef.new(shape: CertificatePolicyList, location_name: "CertificatePolicies"))
289
+ Extensions.add_member(:extended_key_usage, Shapes::ShapeRef.new(shape: ExtendedKeyUsageList, location_name: "ExtendedKeyUsage"))
290
+ Extensions.add_member(:key_usage, Shapes::ShapeRef.new(shape: KeyUsage, location_name: "KeyUsage"))
291
+ Extensions.add_member(:subject_alternative_names, Shapes::ShapeRef.new(shape: GeneralNameList, location_name: "SubjectAlternativeNames"))
292
+ Extensions.struct_class = Types::Extensions
293
+
264
294
  GeneralName.add_member(:other_name, Shapes::ShapeRef.new(shape: OtherName, location_name: "OtherName"))
265
295
  GeneralName.add_member(:rfc_822_name, Shapes::ShapeRef.new(shape: String256, location_name: "Rfc822Name"))
266
296
  GeneralName.add_member(:dns_name, Shapes::ShapeRef.new(shape: String253, location_name: "DnsName"))
@@ -271,6 +301,8 @@ module Aws::ACMPCA
271
301
  GeneralName.add_member(:registered_id, Shapes::ShapeRef.new(shape: CustomObjectIdentifier, location_name: "RegisteredId"))
272
302
  GeneralName.struct_class = Types::GeneralName
273
303
 
304
+ GeneralNameList.member = Shapes::ShapeRef.new(shape: GeneralName)
305
+
274
306
  GetCertificateAuthorityCertificateRequest.add_member(:certificate_authority_arn, Shapes::ShapeRef.new(shape: Arn, required: true, location_name: "CertificateAuthorityArn"))
275
307
  GetCertificateAuthorityCertificateRequest.struct_class = Types::GetCertificateAuthorityCertificateRequest
276
308
 
@@ -324,11 +356,13 @@ module Aws::ACMPCA
324
356
  InvalidTagException.add_member(:message, Shapes::ShapeRef.new(shape: String, location_name: "message"))
325
357
  InvalidTagException.struct_class = Types::InvalidTagException
326
358
 
359
+ IssueCertificateRequest.add_member(:api_passthrough, Shapes::ShapeRef.new(shape: ApiPassthrough, location_name: "ApiPassthrough"))
327
360
  IssueCertificateRequest.add_member(:certificate_authority_arn, Shapes::ShapeRef.new(shape: Arn, required: true, location_name: "CertificateAuthorityArn"))
328
361
  IssueCertificateRequest.add_member(:csr, Shapes::ShapeRef.new(shape: CsrBlob, required: true, location_name: "Csr"))
329
362
  IssueCertificateRequest.add_member(:signing_algorithm, Shapes::ShapeRef.new(shape: SigningAlgorithm, required: true, location_name: "SigningAlgorithm"))
330
363
  IssueCertificateRequest.add_member(:template_arn, Shapes::ShapeRef.new(shape: Arn, location_name: "TemplateArn"))
331
364
  IssueCertificateRequest.add_member(:validity, Shapes::ShapeRef.new(shape: Validity, required: true, location_name: "Validity"))
365
+ IssueCertificateRequest.add_member(:validity_not_before, Shapes::ShapeRef.new(shape: Validity, location_name: "ValidityNotBefore"))
332
366
  IssueCertificateRequest.add_member(:idempotency_token, Shapes::ShapeRef.new(shape: IdempotencyToken, location_name: "IdempotencyToken"))
333
367
  IssueCertificateRequest.struct_class = Types::IssueCertificateRequest
334
368
 
@@ -402,10 +436,23 @@ module Aws::ACMPCA
402
436
 
403
437
  PermissionList.member = Shapes::ShapeRef.new(shape: Permission)
404
438
 
439
+ PolicyInformation.add_member(:cert_policy_id, Shapes::ShapeRef.new(shape: CustomObjectIdentifier, required: true, location_name: "CertPolicyId"))
440
+ PolicyInformation.add_member(:policy_qualifiers, Shapes::ShapeRef.new(shape: PolicyQualifierInfoList, location_name: "PolicyQualifiers"))
441
+ PolicyInformation.struct_class = Types::PolicyInformation
442
+
443
+ PolicyQualifierInfo.add_member(:policy_qualifier_id, Shapes::ShapeRef.new(shape: PolicyQualifierId, required: true, location_name: "PolicyQualifierId"))
444
+ PolicyQualifierInfo.add_member(:qualifier, Shapes::ShapeRef.new(shape: Qualifier, required: true, location_name: "Qualifier"))
445
+ PolicyQualifierInfo.struct_class = Types::PolicyQualifierInfo
446
+
447
+ PolicyQualifierInfoList.member = Shapes::ShapeRef.new(shape: PolicyQualifierInfo)
448
+
405
449
  PutPolicyRequest.add_member(:resource_arn, Shapes::ShapeRef.new(shape: Arn, required: true, location_name: "ResourceArn"))
406
450
  PutPolicyRequest.add_member(:policy, Shapes::ShapeRef.new(shape: AWSPolicy, required: true, location_name: "Policy"))
407
451
  PutPolicyRequest.struct_class = Types::PutPolicyRequest
408
452
 
453
+ Qualifier.add_member(:cps_uri, Shapes::ShapeRef.new(shape: String256, required: true, location_name: "CpsUri"))
454
+ Qualifier.struct_class = Types::Qualifier
455
+
409
456
  RequestAlreadyProcessedException.add_member(:message, Shapes::ShapeRef.new(shape: String, location_name: "message"))
410
457
  RequestAlreadyProcessedException.struct_class = Types::RequestAlreadyProcessedException
411
458