[−][src]Struct rusoto_acm_pca::IssueCertificateRequest
Fields
The Amazon Resource Name (ARN) that was returned when you called CreateCertificateAuthority. This must be of the form:
arn:aws:acm-pca:region:account:certificate-authority/12345678-1234-1234-1234-123456789012
csr: Bytes
The certificate signing request (CSR) for the certificate you want to issue. You can use the following OpenSSL command to create the CSR and a 2048 bit RSA private key.
openssl req -new -newkey rsa:2048 -days 365 -keyout private/test_cert_priv_key.pem -out csr/test_cert_.csr
If you have a configuration file, you can use the following OpenSSL command. The usr_cert
block in the configuration file contains your X509 version 3 extensions.
openssl req -new -config openssl_rsa.cnf -extensions usr_cert -newkey rsa:2048 -days -365 -keyout private/test_cert_priv_key.pem -out csr/test_cert_.csr
Note: A CSR must provide either a subject name or a subject alternative name or the request will be rejected.
idempotency_token: Option<String>
Custom string that can be used to distinguish between calls to the IssueCertificate action. Idempotency tokens time out after one hour. Therefore, if you call IssueCertificate multiple times with the same idempotency token within 5 minutes, ACM Private CA recognizes that you are requesting only one certificate and will issue only one. If you change the idempotency token for each call, PCA recognizes that you are requesting multiple certificates.
signing_algorithm: String
The name of the algorithm that will be used to sign the certificate to be issued.
This parameter should not be confused with the SigningAlgorithm
parameter used to sign a CSR.
template_arn: Option<String>
Specifies a custom configuration template to use when issuing a certificate. If this parameter is not provided, ACM Private CA defaults to the EndEntityCertificate/V1
template. For CA certificates, you should choose the shortest path length that meets your needs. The path length is indicated by the PathLenN portion of the ARN, where N is the CA depth.
Note: The CA depth configured on a subordinate CA certificate must not exceed the limit set by its parents in the CA hierarchy.
The following service-owned TemplateArn
values are supported by ACM Private CA:
-
arn:aws:acm-pca:::template/CodeSigningCertificate/V1
-
arn:aws:acm-pca:::template/CodeSigningCertificate_CSRPassthrough/V1
-
arn:aws:acm-pca:::template/EndEntityCertificate/V1
-
arn:aws:acm-pca:::template/EndEntityCertificate_CSRPassthrough/V1
-
arn:aws:acm-pca:::template/EndEntityClientAuthCertificate/V1
-
arn:aws:acm-pca:::template/EndEntityClientAuthCertificate_CSRPassthrough/V1
-
arn:aws:acm-pca:::template/EndEntityServerAuthCertificate/V1
-
arn:aws:acm-pca:::template/EndEntityServerAuthCertificate_CSRPassthrough/V1
-
arn:aws:acm-pca:::template/OCSPSigningCertificate/V1
-
arn:aws:acm-pca:::template/OCSPSigningCertificate_CSRPassthrough/V1
-
arn:aws:acm-pca:::template/RootCACertificate/V1
-
arn:aws:acm-pca:::template/SubordinateCACertificate_PathLen0/V1
-
arn:aws:acm-pca:::template/SubordinateCACertificate_PathLen1/V1
-
arn:aws:acm-pca:::template/SubordinateCACertificate_PathLen2/V1
-
arn:aws:acm-pca:::template/SubordinateCACertificate_PathLen3/V1
For more information, see Using Templates.
validity: Validity
Information describing the validity period of the certificate.
When issuing a certificate, ACM Private CA sets the "Not Before" date in the validity field to date and time minus 60 minutes. This is intended to compensate for time inconsistencies across systems of 60 minutes or less.
The validity period configured on a certificate must not exceed the limit set by its parents in the CA hierarchy.
Trait Implementations
impl Clone for IssueCertificateRequest
[src]
pub fn clone(&self) -> IssueCertificateRequest
[src]
pub fn clone_from(&mut self, source: &Self)
1.0.0[src]
impl Debug for IssueCertificateRequest
[src]
impl Default for IssueCertificateRequest
[src]
pub fn default() -> IssueCertificateRequest
[src]
impl PartialEq<IssueCertificateRequest> for IssueCertificateRequest
[src]
pub fn eq(&self, other: &IssueCertificateRequest) -> bool
[src]
pub fn ne(&self, other: &IssueCertificateRequest) -> bool
[src]
impl Serialize for IssueCertificateRequest
[src]
pub fn serialize<__S>(&self, __serializer: __S) -> Result<__S::Ok, __S::Error> where
__S: Serializer,
[src]
__S: Serializer,
impl StructuralPartialEq for IssueCertificateRequest
[src]
Auto Trait Implementations
impl RefUnwindSafe for IssueCertificateRequest
[src]
impl Send for IssueCertificateRequest
[src]
impl Sync for IssueCertificateRequest
[src]
impl Unpin for IssueCertificateRequest
[src]
impl UnwindSafe for IssueCertificateRequest
[src]
Blanket Implementations
impl<T> Any for T where
T: 'static + ?Sized,
[src]
T: 'static + ?Sized,
impl<T> Borrow<T> for T where
T: ?Sized,
[src]
T: ?Sized,
impl<T> BorrowMut<T> for T where
T: ?Sized,
[src]
T: ?Sized,
pub fn borrow_mut(&mut self) -> &mut T
[src]
impl<T> From<T> for T
[src]
impl<T> Instrument for T
[src]
pub fn instrument(self, span: Span) -> Instrumented<Self>
[src]
pub fn in_current_span(self) -> Instrumented<Self>
[src]
impl<T, U> Into<U> for T where
U: From<T>,
[src]
U: From<T>,
impl<T> Same<T> for T
type Output = T
Should always be Self
impl<T> ToOwned for T where
T: Clone,
[src]
T: Clone,
type Owned = T
The resulting type after obtaining ownership.
pub fn to_owned(&self) -> T
[src]
pub fn clone_into(&self, target: &mut T)
[src]
impl<T, U> TryFrom<U> for T where
U: Into<T>,
[src]
U: Into<T>,
type Error = Infallible
The type returned in the event of a conversion error.
pub fn try_from(value: U) -> Result<T, <T as TryFrom<U>>::Error>
[src]
impl<T, U> TryInto<U> for T where
U: TryFrom<T>,
[src]
U: TryFrom<T>,