aws-sdk-kms 1.114.0 → 1.118.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +20 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-kms/client.rb +152 -75
- data/lib/aws-sdk-kms/client_api.rb +4 -0
- data/lib/aws-sdk-kms/types.rb +90 -20
- data/lib/aws-sdk-kms.rb +1 -1
- data/sig/client.rbs +13 -11
- data/sig/types.rbs +17 -14
- metadata +3 -3
checksums.yaml
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
---
|
|
2
2
|
SHA256:
|
|
3
|
-
metadata.gz:
|
|
4
|
-
data.tar.gz:
|
|
3
|
+
metadata.gz: 9e2a68224f5a86c92b415535c7bef7f87cf196d5dd5ffbd46a3a75724fb210fe
|
|
4
|
+
data.tar.gz: 87ba5536876bed1393d07de29b509be6684217d0397aa3981bec94cb5e573bb5
|
|
5
5
|
SHA512:
|
|
6
|
-
metadata.gz:
|
|
7
|
-
data.tar.gz:
|
|
6
|
+
metadata.gz: 26bfa9abee5b2cb9e02977f17a145247f4b1091d08a398864a5d84ff8b6849b026062b37a07e6c5e12dbb511f709628796200818a6e08e9e72e67197920b11ff
|
|
7
|
+
data.tar.gz: ddadc9d563a9613fa0f709ac71148ba6bf9449cf6e7848b0367484520ea6771ac6f38854ff1d230ce70455eed6706a9d05192d966d2d1e983f16fbb1c2cb5f33
|
data/CHANGELOG.md
CHANGED
|
@@ -1,6 +1,26 @@
|
|
|
1
1
|
Unreleased Changes
|
|
2
2
|
------------------
|
|
3
3
|
|
|
4
|
+
1.118.0 (2025-11-21)
|
|
5
|
+
------------------
|
|
6
|
+
|
|
7
|
+
* Feature - Support for on-demand rotation of AWS KMS Multi-Region keys with imported key material
|
|
8
|
+
|
|
9
|
+
1.117.0 (2025-11-07)
|
|
10
|
+
------------------
|
|
11
|
+
|
|
12
|
+
* Feature - Added support for new ECC_NIST_EDWARDS25519 AWS KMS key spec
|
|
13
|
+
|
|
14
|
+
1.116.0 (2025-10-30)
|
|
15
|
+
------------------
|
|
16
|
+
|
|
17
|
+
* Feature - Add cross account VPC endpoint service connectivity support to CustomKeyStore.
|
|
18
|
+
|
|
19
|
+
1.115.0 (2025-10-21)
|
|
20
|
+
------------------
|
|
21
|
+
|
|
22
|
+
* Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
|
|
23
|
+
|
|
4
24
|
1.114.0 (2025-10-16)
|
|
5
25
|
------------------
|
|
6
26
|
|
data/VERSION
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
1.
|
|
1
|
+
1.118.0
|
data/lib/aws-sdk-kms/client.rb
CHANGED
|
@@ -1083,6 +1083,13 @@ module Aws::KMS
|
|
|
1083
1083
|
#
|
|
1084
1084
|
# [1]: https://docs.aws.amazon.com/kms/latest/developerguide/create-xks-keystore.html#xks-requirements
|
|
1085
1085
|
#
|
|
1086
|
+
# @option params [String] :xks_proxy_vpc_endpoint_service_owner
|
|
1087
|
+
# Specifies the Amazon Web Services account ID that owns the Amazon VPC
|
|
1088
|
+
# service endpoint for the interface that is used to communicate with
|
|
1089
|
+
# your external key store proxy (XKS proxy). This parameter is optional.
|
|
1090
|
+
# If not provided, the Amazon Web Services account ID calling the action
|
|
1091
|
+
# will be used.
|
|
1092
|
+
#
|
|
1086
1093
|
# @option params [Types::XksProxyAuthenticationCredentialType] :xks_proxy_authentication_credential
|
|
1087
1094
|
# Specifies an authentication credential for the external key store
|
|
1088
1095
|
# proxy (XKS proxy). This parameter is required for all custom key
|
|
@@ -1209,6 +1216,7 @@ module Aws::KMS
|
|
|
1209
1216
|
# xks_proxy_uri_endpoint: "XksProxyUriEndpointType",
|
|
1210
1217
|
# xks_proxy_uri_path: "XksProxyUriPathType",
|
|
1211
1218
|
# xks_proxy_vpc_endpoint_service_name: "XksProxyVpcEndpointServiceNameType",
|
|
1219
|
+
# xks_proxy_vpc_endpoint_service_owner: "AccountIdType",
|
|
1212
1220
|
# xks_proxy_authentication_credential: {
|
|
1213
1221
|
# access_key_id: "XksProxyAuthenticationAccessKeyIdType", # required
|
|
1214
1222
|
# raw_secret_access_key: "XksProxyAuthenticationRawSecretAccessKeyType", # required
|
|
@@ -1568,8 +1576,8 @@ module Aws::KMS
|
|
|
1568
1576
|
# download the public key so it can be used outside of KMS. Each KMS
|
|
1569
1577
|
# key can have only one key usage. KMS keys with RSA key pairs can be
|
|
1570
1578
|
# used to encrypt and decrypt data or sign and verify messages (but
|
|
1571
|
-
# not both). KMS keys with NIST-
|
|
1572
|
-
#
|
|
1579
|
+
# not both). KMS keys with NIST-standard ECC key pairs can be used to
|
|
1580
|
+
# sign and verify messages or derive shared secrets (but not both).
|
|
1573
1581
|
# KMS keys with `ECC_SECG_P256K1` can be used only to sign and verify
|
|
1574
1582
|
# messages. KMS keys with ML-DSA key pairs can be used to sign and
|
|
1575
1583
|
# verify messages. KMS keys with SM2 key pairs (China Regions only)
|
|
@@ -1819,8 +1827,8 @@ module Aws::KMS
|
|
|
1819
1827
|
# * For asymmetric KMS keys with RSA key pairs, specify
|
|
1820
1828
|
# `ENCRYPT_DECRYPT` or `SIGN_VERIFY`.
|
|
1821
1829
|
#
|
|
1822
|
-
# * For asymmetric KMS keys with NIST-
|
|
1823
|
-
#
|
|
1830
|
+
# * For asymmetric KMS keys with NIST-standard elliptic curve key pairs,
|
|
1831
|
+
# specify `SIGN_VERIFY` or `KEY_AGREEMENT`.
|
|
1824
1832
|
#
|
|
1825
1833
|
# * For asymmetric KMS keys with `ECC_SECG_P256K1` key pairs, specify
|
|
1826
1834
|
# `SIGN_VERIFY`.
|
|
@@ -1891,7 +1899,7 @@ module Aws::KMS
|
|
|
1891
1899
|
# * `RSA_3072`
|
|
1892
1900
|
#
|
|
1893
1901
|
# * `RSA_4096`
|
|
1894
|
-
# * Asymmetric NIST-
|
|
1902
|
+
# * Asymmetric NIST-standard elliptic curve key pairs (signing and
|
|
1895
1903
|
# verification -or- deriving shared secrets)
|
|
1896
1904
|
#
|
|
1897
1905
|
# * `ECC_NIST_P256` (secp256r1)
|
|
@@ -1899,6 +1907,17 @@ module Aws::KMS
|
|
|
1899
1907
|
# * `ECC_NIST_P384` (secp384r1)
|
|
1900
1908
|
#
|
|
1901
1909
|
# * `ECC_NIST_P521` (secp521r1)
|
|
1910
|
+
#
|
|
1911
|
+
# * `ECC_NIST_EDWARDS25519` (ed25519) - signing and verification only
|
|
1912
|
+
#
|
|
1913
|
+
# * **Note:** For ECC\_NIST\_EDWARDS25519 KMS keys, the
|
|
1914
|
+
# ED25519\_SHA\_512 signing algorithm requires [ `MessageType:RAW`
|
|
1915
|
+
# ](kms/latest/APIReference/API_Sign.html#KMS-Sign-request-MessageType),
|
|
1916
|
+
# while ED25519\_PH\_SHA\_512 requires [ `MessageType:DIGEST`
|
|
1917
|
+
# ](kms/latest/APIReference/API_Sign.html#KMS-Sign-request-MessageType).
|
|
1918
|
+
# These message types cannot be used interchangeably.
|
|
1919
|
+
#
|
|
1920
|
+
# ^
|
|
1902
1921
|
# * Other asymmetric elliptic curve key pairs (signing and verification)
|
|
1903
1922
|
#
|
|
1904
1923
|
# * `ECC_SECG_P256K1` (secp256k1), commonly used for cryptocurrencies.
|
|
@@ -2414,7 +2433,7 @@ module Aws::KMS
|
|
|
2414
2433
|
# description: "DescriptionType",
|
|
2415
2434
|
# key_usage: "SIGN_VERIFY", # accepts SIGN_VERIFY, ENCRYPT_DECRYPT, GENERATE_VERIFY_MAC, KEY_AGREEMENT
|
|
2416
2435
|
# customer_master_key_spec: "RSA_2048", # accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1, SYMMETRIC_DEFAULT, HMAC_224, HMAC_256, HMAC_384, HMAC_512, SM2
|
|
2417
|
-
# key_spec: "RSA_2048", # accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1, SYMMETRIC_DEFAULT, HMAC_224, HMAC_256, HMAC_384, HMAC_512, SM2, ML_DSA_44, ML_DSA_65, ML_DSA_87
|
|
2436
|
+
# key_spec: "RSA_2048", # accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1, SYMMETRIC_DEFAULT, HMAC_224, HMAC_256, HMAC_384, HMAC_512, SM2, ML_DSA_44, ML_DSA_65, ML_DSA_87, ECC_NIST_EDWARDS25519
|
|
2418
2437
|
# origin: "AWS_KMS", # accepts AWS_KMS, EXTERNAL, AWS_CLOUDHSM, EXTERNAL_KEY_STORE
|
|
2419
2438
|
# custom_key_store_id: "CustomKeyStoreIdType",
|
|
2420
2439
|
# bypass_policy_lockout_safety_check: false,
|
|
@@ -2446,11 +2465,11 @@ module Aws::KMS
|
|
|
2446
2465
|
# resp.key_metadata.expiration_model #=> String, one of "KEY_MATERIAL_EXPIRES", "KEY_MATERIAL_DOES_NOT_EXPIRE"
|
|
2447
2466
|
# resp.key_metadata.key_manager #=> String, one of "AWS", "CUSTOMER"
|
|
2448
2467
|
# resp.key_metadata.customer_master_key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2"
|
|
2449
|
-
# resp.key_metadata.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2", "ML_DSA_44", "ML_DSA_65", "ML_DSA_87"
|
|
2468
|
+
# resp.key_metadata.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2", "ML_DSA_44", "ML_DSA_65", "ML_DSA_87", "ECC_NIST_EDWARDS25519"
|
|
2450
2469
|
# resp.key_metadata.encryption_algorithms #=> Array
|
|
2451
2470
|
# resp.key_metadata.encryption_algorithms[0] #=> String, one of "SYMMETRIC_DEFAULT", "RSAES_OAEP_SHA_1", "RSAES_OAEP_SHA_256", "SM2PKE"
|
|
2452
2471
|
# resp.key_metadata.signing_algorithms #=> Array
|
|
2453
|
-
# resp.key_metadata.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256"
|
|
2472
|
+
# resp.key_metadata.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256", "ED25519_SHA_512", "ED25519_PH_SHA_512"
|
|
2454
2473
|
# resp.key_metadata.key_agreement_algorithms #=> Array
|
|
2455
2474
|
# resp.key_metadata.key_agreement_algorithms[0] #=> String, one of "ECDH"
|
|
2456
2475
|
# resp.key_metadata.multi_region #=> Boolean
|
|
@@ -2987,6 +3006,16 @@ module Aws::KMS
|
|
|
2987
3006
|
# operation does not change the KMS key's state. Otherwise, it changes
|
|
2988
3007
|
# the KMS key's state to `PendingImport`.
|
|
2989
3008
|
#
|
|
3009
|
+
# **Considerations for multi-Region symmetric encryption keys**
|
|
3010
|
+
#
|
|
3011
|
+
# * When you delete the key material of a primary Region key that is in
|
|
3012
|
+
# `PENDING_ROTATION` or
|
|
3013
|
+
# `PENDING_MULTI_REGION_IMPORT_AND_ROTATION`state, you'll also be
|
|
3014
|
+
# deleting the key materials for the replica Region keys.
|
|
3015
|
+
#
|
|
3016
|
+
# * If you delete any key material of a replica Region key, the primary
|
|
3017
|
+
# Region key and other replica Region keys remain unchanged.
|
|
3018
|
+
#
|
|
2990
3019
|
# The KMS key that you use for this operation must be in a compatible
|
|
2991
3020
|
# key state. For details, see [Key states of KMS keys][2] in the *Key
|
|
2992
3021
|
# Management Service Developer Guide*.
|
|
@@ -3078,8 +3107,8 @@ module Aws::KMS
|
|
|
3078
3107
|
|
|
3079
3108
|
# Derives a shared secret using a key agreement algorithm.
|
|
3080
3109
|
#
|
|
3081
|
-
# <note markdown="1"> You must use an asymmetric NIST-
|
|
3082
|
-
#
|
|
3110
|
+
# <note markdown="1"> You must use an asymmetric NIST-standard elliptic curve (ECC) or SM2
|
|
3111
|
+
# (China Regions only) KMS key pair with a `KeyUsage` value of
|
|
3083
3112
|
# `KEY_AGREEMENT` to call DeriveSharedSecret.
|
|
3084
3113
|
#
|
|
3085
3114
|
# </note>
|
|
@@ -3100,15 +3129,15 @@ module Aws::KMS
|
|
|
3100
3129
|
# 1. **Alice** calls CreateKey to create an asymmetric KMS key pair
|
|
3101
3130
|
# with a `KeyUsage` value of `KEY_AGREEMENT`.
|
|
3102
3131
|
#
|
|
3103
|
-
# The asymmetric KMS key must use a NIST-
|
|
3132
|
+
# The asymmetric KMS key must use a NIST-standard elliptic curve
|
|
3104
3133
|
# (ECC) or SM2 (China Regions only) key spec.
|
|
3105
3134
|
#
|
|
3106
3135
|
# 2. **Bob** creates an elliptic curve key pair.
|
|
3107
3136
|
#
|
|
3108
3137
|
# Bob can call CreateKey to create an asymmetric KMS key pair or
|
|
3109
3138
|
# generate a key pair outside of KMS. Bob's key pair must use the
|
|
3110
|
-
# same NIST-
|
|
3111
|
-
#
|
|
3139
|
+
# same NIST-standard elliptic curve (ECC) or SM2 (China Regions ony)
|
|
3140
|
+
# curve as Alice.
|
|
3112
3141
|
#
|
|
3113
3142
|
# 3. Alice and Bob **exchange their public keys** through an insecure
|
|
3114
3143
|
# communication channel (like the internet).
|
|
@@ -3135,12 +3164,12 @@ module Aws::KMS
|
|
|
3135
3164
|
# his private key and Alice's public key.
|
|
3136
3165
|
#
|
|
3137
3166
|
# To derive a shared secret you must provide a key agreement algorithm,
|
|
3138
|
-
# the private key of the caller's asymmetric NIST-
|
|
3167
|
+
# the private key of the caller's asymmetric NIST-standard elliptic
|
|
3139
3168
|
# curve or SM2 (China Regions only) KMS key pair, and the public key
|
|
3140
|
-
# from your peer's NIST-
|
|
3141
|
-
#
|
|
3142
|
-
#
|
|
3143
|
-
#
|
|
3169
|
+
# from your peer's NIST-standard elliptic curve or SM2 (China Regions
|
|
3170
|
+
# only) key pair. The public key can be from another asymmetric KMS key
|
|
3171
|
+
# pair or from a key pair generated outside of KMS, but both key pairs
|
|
3172
|
+
# must be on the same elliptic curve.
|
|
3144
3173
|
#
|
|
3145
3174
|
# The KMS key that you use for this operation must be in a compatible
|
|
3146
3175
|
# key state. For details, see [Key states of KMS keys][3] in the *Key
|
|
@@ -3172,9 +3201,9 @@ module Aws::KMS
|
|
|
3172
3201
|
# [5]: https://docs.aws.amazon.com/kms/latest/developerguide/accessing-kms.html#programming-eventual-consistency
|
|
3173
3202
|
#
|
|
3174
3203
|
# @option params [required, String] :key_id
|
|
3175
|
-
# Identifies an asymmetric NIST-
|
|
3176
|
-
#
|
|
3177
|
-
#
|
|
3204
|
+
# Identifies an asymmetric NIST-standard ECC or SM2 (China Regions only)
|
|
3205
|
+
# KMS key. KMS uses the private key in the specified key pair to derive
|
|
3206
|
+
# the shared secret. The key usage of the KMS key must be
|
|
3178
3207
|
# `KEY_AGREEMENT`. To find the `KeyUsage` of a KMS key, use the
|
|
3179
3208
|
# DescribeKey operation.
|
|
3180
3209
|
#
|
|
@@ -3202,8 +3231,8 @@ module Aws::KMS
|
|
|
3202
3231
|
# secret. The only valid value is `ECDH`.
|
|
3203
3232
|
#
|
|
3204
3233
|
# @option params [required, String, StringIO, File] :public_key
|
|
3205
|
-
# Specifies the public key in your peer's NIST-
|
|
3206
|
-
#
|
|
3234
|
+
# Specifies the public key in your peer's NIST-standard elliptic curve
|
|
3235
|
+
# (ECC) or SM2 (China Regions only) key pair.
|
|
3207
3236
|
#
|
|
3208
3237
|
# The public key must be a DER-encoded X.509 public key, also known as
|
|
3209
3238
|
# `SubjectPublicKeyInfo` (SPKI), as defined in [RFC 5280][1].
|
|
@@ -3593,6 +3622,7 @@ module Aws::KMS
|
|
|
3593
3622
|
# resp.custom_key_stores[0].xks_proxy_configuration.uri_endpoint #=> String
|
|
3594
3623
|
# resp.custom_key_stores[0].xks_proxy_configuration.uri_path #=> String
|
|
3595
3624
|
# resp.custom_key_stores[0].xks_proxy_configuration.vpc_endpoint_service_name #=> String
|
|
3625
|
+
# resp.custom_key_stores[0].xks_proxy_configuration.vpc_endpoint_service_owner #=> String
|
|
3596
3626
|
# resp.next_marker #=> String
|
|
3597
3627
|
# resp.truncated #=> Boolean
|
|
3598
3628
|
#
|
|
@@ -3966,11 +3996,11 @@ module Aws::KMS
|
|
|
3966
3996
|
# resp.key_metadata.expiration_model #=> String, one of "KEY_MATERIAL_EXPIRES", "KEY_MATERIAL_DOES_NOT_EXPIRE"
|
|
3967
3997
|
# resp.key_metadata.key_manager #=> String, one of "AWS", "CUSTOMER"
|
|
3968
3998
|
# resp.key_metadata.customer_master_key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2"
|
|
3969
|
-
# resp.key_metadata.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2", "ML_DSA_44", "ML_DSA_65", "ML_DSA_87"
|
|
3999
|
+
# resp.key_metadata.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2", "ML_DSA_44", "ML_DSA_65", "ML_DSA_87", "ECC_NIST_EDWARDS25519"
|
|
3970
4000
|
# resp.key_metadata.encryption_algorithms #=> Array
|
|
3971
4001
|
# resp.key_metadata.encryption_algorithms[0] #=> String, one of "SYMMETRIC_DEFAULT", "RSAES_OAEP_SHA_1", "RSAES_OAEP_SHA_256", "SM2PKE"
|
|
3972
4002
|
# resp.key_metadata.signing_algorithms #=> Array
|
|
3973
|
-
# resp.key_metadata.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256"
|
|
4003
|
+
# resp.key_metadata.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256", "ED25519_SHA_512", "ED25519_PH_SHA_512"
|
|
3974
4004
|
# resp.key_metadata.key_agreement_algorithms #=> Array
|
|
3975
4005
|
# resp.key_metadata.key_agreement_algorithms[0] #=> String, one of "ECDH"
|
|
3976
4006
|
# resp.key_metadata.multi_region #=> Boolean
|
|
@@ -5349,7 +5379,7 @@ module Aws::KMS
|
|
|
5349
5379
|
# "EncryptionContextKey" => "EncryptionContextValue",
|
|
5350
5380
|
# },
|
|
5351
5381
|
# key_id: "KeyIdType", # required
|
|
5352
|
-
# key_pair_spec: "RSA_2048", # required, accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1, SM2
|
|
5382
|
+
# key_pair_spec: "RSA_2048", # required, accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1, SM2, ECC_NIST_EDWARDS25519
|
|
5353
5383
|
# grant_tokens: ["GrantTokenType"],
|
|
5354
5384
|
# recipient: {
|
|
5355
5385
|
# key_encryption_algorithm: "RSAES_OAEP_SHA_256", # accepts RSAES_OAEP_SHA_256
|
|
@@ -5364,7 +5394,7 @@ module Aws::KMS
|
|
|
5364
5394
|
# resp.private_key_plaintext #=> String
|
|
5365
5395
|
# resp.public_key #=> String
|
|
5366
5396
|
# resp.key_id #=> String
|
|
5367
|
-
# resp.key_pair_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SM2"
|
|
5397
|
+
# resp.key_pair_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SM2", "ECC_NIST_EDWARDS25519"
|
|
5368
5398
|
# resp.ciphertext_for_recipient #=> String
|
|
5369
5399
|
# resp.key_material_id #=> String
|
|
5370
5400
|
#
|
|
@@ -5567,7 +5597,7 @@ module Aws::KMS
|
|
|
5567
5597
|
# "EncryptionContextKey" => "EncryptionContextValue",
|
|
5568
5598
|
# },
|
|
5569
5599
|
# key_id: "KeyIdType", # required
|
|
5570
|
-
# key_pair_spec: "RSA_2048", # required, accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1, SM2
|
|
5600
|
+
# key_pair_spec: "RSA_2048", # required, accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1, SM2, ECC_NIST_EDWARDS25519
|
|
5571
5601
|
# grant_tokens: ["GrantTokenType"],
|
|
5572
5602
|
# dry_run: false,
|
|
5573
5603
|
# })
|
|
@@ -5577,7 +5607,7 @@ module Aws::KMS
|
|
|
5577
5607
|
# resp.private_key_ciphertext_blob #=> String
|
|
5578
5608
|
# resp.public_key #=> String
|
|
5579
5609
|
# resp.key_id #=> String
|
|
5580
|
-
# resp.key_pair_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SM2"
|
|
5610
|
+
# resp.key_pair_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SM2", "ECC_NIST_EDWARDS25519"
|
|
5581
5611
|
# resp.key_material_id #=> String
|
|
5582
5612
|
#
|
|
5583
5613
|
# @see http://docs.aws.amazon.com/goto/WebAPI/kms-2014-11-01/GenerateDataKeyPairWithoutPlaintext AWS API Documentation
|
|
@@ -6741,12 +6771,12 @@ module Aws::KMS
|
|
|
6741
6771
|
# resp.key_id #=> String
|
|
6742
6772
|
# resp.public_key #=> String
|
|
6743
6773
|
# resp.customer_master_key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2"
|
|
6744
|
-
# resp.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2", "ML_DSA_44", "ML_DSA_65", "ML_DSA_87"
|
|
6774
|
+
# resp.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2", "ML_DSA_44", "ML_DSA_65", "ML_DSA_87", "ECC_NIST_EDWARDS25519"
|
|
6745
6775
|
# resp.key_usage #=> String, one of "SIGN_VERIFY", "ENCRYPT_DECRYPT", "GENERATE_VERIFY_MAC", "KEY_AGREEMENT"
|
|
6746
6776
|
# resp.encryption_algorithms #=> Array
|
|
6747
6777
|
# resp.encryption_algorithms[0] #=> String, one of "SYMMETRIC_DEFAULT", "RSAES_OAEP_SHA_1", "RSAES_OAEP_SHA_256", "SM2PKE"
|
|
6748
6778
|
# resp.signing_algorithms #=> Array
|
|
6749
|
-
# resp.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256"
|
|
6779
|
+
# resp.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256", "ED25519_SHA_512", "ED25519_PH_SHA_512"
|
|
6750
6780
|
# resp.key_agreement_algorithms #=> Array
|
|
6751
6781
|
# resp.key_agreement_algorithms[0] #=> String, one of "ECDH"
|
|
6752
6782
|
#
|
|
@@ -6769,10 +6799,28 @@ module Aws::KMS
|
|
|
6769
6799
|
# information about importing key material, see [Importing key
|
|
6770
6800
|
# material][1].
|
|
6771
6801
|
#
|
|
6772
|
-
# For asymmetric
|
|
6773
|
-
#
|
|
6774
|
-
#
|
|
6775
|
-
#
|
|
6802
|
+
# For asymmetric and HMAC keys, you cannot change the key material after
|
|
6803
|
+
# the initial import. You can import multiple key materials into
|
|
6804
|
+
# symmetric encryption keys and rotate the key material on demand using
|
|
6805
|
+
# `RotateKeyOnDemand`.
|
|
6806
|
+
#
|
|
6807
|
+
# You can import new key materials into multi-Region symmetric
|
|
6808
|
+
# encryption keys. To do so, you must import the new key material into
|
|
6809
|
+
# the primary Region key. Then you can import the same key materials
|
|
6810
|
+
# into the replica Region keys. You cannot directly import new key
|
|
6811
|
+
# material into the replica Region keys.
|
|
6812
|
+
#
|
|
6813
|
+
# To import new key material for a multi-Region symmetric key, you’ll
|
|
6814
|
+
# need to complete the following:
|
|
6815
|
+
#
|
|
6816
|
+
# 1. Call `ImportKeyMaterial` on the primary Region key with the
|
|
6817
|
+
# `ImportType`set to `NEW_KEY_MATERIAL`.
|
|
6818
|
+
#
|
|
6819
|
+
# 2. Call `ImportKeyMaterial` on the replica Region key with the
|
|
6820
|
+
# `ImportType` set to `EXISTING_KEY_MATERIAL` using the same key
|
|
6821
|
+
# material imported to the primary Region key. You must do this for
|
|
6822
|
+
# every replica Region key before you can perform the
|
|
6823
|
+
# RotateKeyOnDemand operation on the primary Region key.
|
|
6776
6824
|
#
|
|
6777
6825
|
# After you import key material, you can [reimport the same key
|
|
6778
6826
|
# material][2] into that KMS key or, if the key supports on-demand
|
|
@@ -6814,10 +6862,10 @@ module Aws::KMS
|
|
|
6814
6862
|
#
|
|
6815
6863
|
# * The key ID or key ARN of the KMS key to associate with the imported
|
|
6816
6864
|
# key material. Its `Origin` must be `EXTERNAL` and its `KeyState`
|
|
6817
|
-
# must be `PendingImport`. You cannot perform this
|
|
6818
|
-
# key in a [custom key store][5], or on a KMS key
|
|
6819
|
-
# Amazon Web Services account. To get the `Origin` and
|
|
6820
|
-
# KMS key, call DescribeKey.
|
|
6865
|
+
# must be `PendingImport` or `Enabled`. You cannot perform this
|
|
6866
|
+
# operation on a KMS key in a [custom key store][5], or on a KMS key
|
|
6867
|
+
# in a different Amazon Web Services account. To get the `Origin` and
|
|
6868
|
+
# `KeyState` of a KMS key, call DescribeKey.
|
|
6821
6869
|
#
|
|
6822
6870
|
# * The encrypted key material.
|
|
6823
6871
|
#
|
|
@@ -6837,13 +6885,12 @@ module Aws::KMS
|
|
|
6837
6885
|
# Each time you reimport, you can eliminate or reset the expiration
|
|
6838
6886
|
# time.
|
|
6839
6887
|
#
|
|
6840
|
-
# When this operation is successful, the
|
|
6841
|
-
#
|
|
6842
|
-
#
|
|
6843
|
-
#
|
|
6844
|
-
# the
|
|
6845
|
-
#
|
|
6846
|
-
# key material associated with a KMS key.
|
|
6888
|
+
# When this operation is successful, the state of the KMS key changes to
|
|
6889
|
+
# `Enabled`, and you can use the KMS key in cryptographic operations.
|
|
6890
|
+
# For symmetric encryption keys, you will need to import all of the key
|
|
6891
|
+
# materials associated with the KMS key to change its state to
|
|
6892
|
+
# `Enabled`. Use the `ListKeyRotations` operation to list the ID and
|
|
6893
|
+
# import state of each key material associated with a KMS key.
|
|
6847
6894
|
#
|
|
6848
6895
|
# If this operation fails, use the exception to help determine the
|
|
6849
6896
|
# problem. If the error is related to the key material, the import
|
|
@@ -6971,6 +7018,12 @@ module Aws::KMS
|
|
|
6971
7018
|
# material is imported, if this parameter is omitted then the parameter
|
|
6972
7019
|
# defaults to `EXISTING_KEY_MATERIAL`.
|
|
6973
7020
|
#
|
|
7021
|
+
# For multi-Region keys, you must first import new key material into the
|
|
7022
|
+
# primary Region key. You should use the `NEW_KEY_MATERIAL` import type
|
|
7023
|
+
# when importing key material into the primary Region key. Then, you can
|
|
7024
|
+
# import the same key material into the replica Region key. The import
|
|
7025
|
+
# type for the replica Region key should be `EXISTING_KEY_MATERIAL`.
|
|
7026
|
+
#
|
|
6974
7027
|
# @option params [String] :key_material_description
|
|
6975
7028
|
# Description for the key material being imported. This parameter is
|
|
6976
7029
|
# optional and only usable with symmetric encryption keys. If you do not
|
|
@@ -7667,7 +7720,7 @@ module Aws::KMS
|
|
|
7667
7720
|
# resp.rotations[0].key_material_id #=> String
|
|
7668
7721
|
# resp.rotations[0].key_material_description #=> String
|
|
7669
7722
|
# resp.rotations[0].import_state #=> String, one of "IMPORTED", "PENDING_IMPORT"
|
|
7670
|
-
# resp.rotations[0].key_material_state #=> String, one of "NON_CURRENT", "CURRENT", "PENDING_ROTATION"
|
|
7723
|
+
# resp.rotations[0].key_material_state #=> String, one of "NON_CURRENT", "CURRENT", "PENDING_ROTATION", "PENDING_MULTI_REGION_IMPORT_AND_ROTATION"
|
|
7671
7724
|
# resp.rotations[0].expiration_model #=> String, one of "KEY_MATERIAL_EXPIRES", "KEY_MATERIAL_DOES_NOT_EXPIRE"
|
|
7672
7725
|
# resp.rotations[0].valid_to #=> Time
|
|
7673
7726
|
# resp.rotations[0].rotation_date #=> Time
|
|
@@ -8919,11 +8972,11 @@ module Aws::KMS
|
|
|
8919
8972
|
# resp.replica_key_metadata.expiration_model #=> String, one of "KEY_MATERIAL_EXPIRES", "KEY_MATERIAL_DOES_NOT_EXPIRE"
|
|
8920
8973
|
# resp.replica_key_metadata.key_manager #=> String, one of "AWS", "CUSTOMER"
|
|
8921
8974
|
# resp.replica_key_metadata.customer_master_key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2"
|
|
8922
|
-
# resp.replica_key_metadata.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2", "ML_DSA_44", "ML_DSA_65", "ML_DSA_87"
|
|
8975
|
+
# resp.replica_key_metadata.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2", "ML_DSA_44", "ML_DSA_65", "ML_DSA_87", "ECC_NIST_EDWARDS25519"
|
|
8923
8976
|
# resp.replica_key_metadata.encryption_algorithms #=> Array
|
|
8924
8977
|
# resp.replica_key_metadata.encryption_algorithms[0] #=> String, one of "SYMMETRIC_DEFAULT", "RSAES_OAEP_SHA_1", "RSAES_OAEP_SHA_256", "SM2PKE"
|
|
8925
8978
|
# resp.replica_key_metadata.signing_algorithms #=> Array
|
|
8926
|
-
# resp.replica_key_metadata.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256"
|
|
8979
|
+
# resp.replica_key_metadata.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256", "ED25519_SHA_512", "ED25519_PH_SHA_512"
|
|
8927
8980
|
# resp.replica_key_metadata.key_agreement_algorithms #=> Array
|
|
8928
8981
|
# resp.replica_key_metadata.key_agreement_algorithms[0] #=> String, one of "ECDH"
|
|
8929
8982
|
# resp.replica_key_metadata.multi_region #=> Boolean
|
|
@@ -9200,30 +9253,31 @@ module Aws::KMS
|
|
|
9200
9253
|
#
|
|
9201
9254
|
# On-demand key rotation is supported only on symmetric encryption KMS
|
|
9202
9255
|
# keys. You cannot perform on-demand rotation of [asymmetric KMS
|
|
9203
|
-
# keys][3], [HMAC KMS keys][4],
|
|
9204
|
-
#
|
|
9205
|
-
#
|
|
9206
|
-
#
|
|
9207
|
-
# material][7] and that key material's state should be
|
|
9256
|
+
# keys][3], [HMAC KMS keys][4], or KMS keys in a [custom key store][5].
|
|
9257
|
+
# When you initiate on-demand key rotation on a symmetric encryption KMS
|
|
9258
|
+
# key with imported key material, you must have already imported [new
|
|
9259
|
+
# key material][6] and that key material's state should be
|
|
9208
9260
|
# `PENDING_ROTATION`. Use the `ListKeyRotations` operation to check the
|
|
9209
9261
|
# state of all key materials associated with a KMS key. To perform
|
|
9210
|
-
# on-demand rotation of a set of related [multi-Region keys][
|
|
9211
|
-
#
|
|
9262
|
+
# on-demand rotation of a set of related [multi-Region keys][7], import
|
|
9263
|
+
# new key material in the primary Region key, import the same key
|
|
9264
|
+
# material in each replica Region key, and invoke the on-demand rotation
|
|
9265
|
+
# on the primary Region key.
|
|
9212
9266
|
#
|
|
9213
9267
|
# You cannot initiate on-demand rotation of [Amazon Web Services managed
|
|
9214
|
-
# KMS keys][
|
|
9268
|
+
# KMS keys][8]. KMS always rotates the key material of Amazon Web
|
|
9215
9269
|
# Services managed keys every year. Rotation of [Amazon Web Services
|
|
9216
|
-
# owned KMS keys][
|
|
9270
|
+
# owned KMS keys][9] is managed by the Amazon Web Services service that
|
|
9217
9271
|
# owns the key.
|
|
9218
9272
|
#
|
|
9219
9273
|
# The KMS key that you use for this operation must be in a compatible
|
|
9220
|
-
# key state. For details, see [Key states of KMS keys][
|
|
9274
|
+
# key state. For details, see [Key states of KMS keys][10] in the *Key
|
|
9221
9275
|
# Management Service Developer Guide*.
|
|
9222
9276
|
#
|
|
9223
9277
|
# **Cross-account use**: No. You cannot perform this operation on a KMS
|
|
9224
9278
|
# key in a different Amazon Web Services account.
|
|
9225
9279
|
#
|
|
9226
|
-
# **Required permissions**: [kms:RotateKeyOnDemand][
|
|
9280
|
+
# **Required permissions**: [kms:RotateKeyOnDemand][11] (key policy)
|
|
9227
9281
|
#
|
|
9228
9282
|
# **Related operations:**
|
|
9229
9283
|
#
|
|
@@ -9238,7 +9292,7 @@ module Aws::KMS
|
|
|
9238
9292
|
# * ListKeyRotations
|
|
9239
9293
|
#
|
|
9240
9294
|
# **Eventual consistency**: The KMS API follows an eventual consistency
|
|
9241
|
-
# model. For more information, see [KMS eventual consistency][
|
|
9295
|
+
# model. For more information, see [KMS eventual consistency][12].
|
|
9242
9296
|
#
|
|
9243
9297
|
#
|
|
9244
9298
|
#
|
|
@@ -9246,15 +9300,14 @@ module Aws::KMS
|
|
|
9246
9300
|
# [2]: https://docs.aws.amazon.com/kms/latest/developerguide/rotating-keys-enable-disable.html
|
|
9247
9301
|
# [3]: https://docs.aws.amazon.com/kms/latest/developerguide/symmetric-asymmetric.html
|
|
9248
9302
|
# [4]: https://docs.aws.amazon.com/kms/latest/developerguide/hmac.html
|
|
9249
|
-
# [5]: https://docs.aws.amazon.com/kms/latest/developerguide/
|
|
9250
|
-
# [6]: https://docs.aws.amazon.com/kms/latest/developerguide/key-
|
|
9251
|
-
# [7]: https://docs.aws.amazon.com/kms/latest/developerguide/
|
|
9252
|
-
# [8]: https://docs.aws.amazon.com/kms/latest/developerguide/
|
|
9253
|
-
# [9]: https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#aws-
|
|
9254
|
-
# [10]: https://docs.aws.amazon.com/kms/latest/developerguide/
|
|
9255
|
-
# [11]: https://docs.aws.amazon.com/kms/latest/developerguide/
|
|
9256
|
-
# [12]: https://docs.aws.amazon.com/kms/latest/developerguide/kms-
|
|
9257
|
-
# [13]: https://docs.aws.amazon.com/kms/latest/developerguide/accessing-kms.html#programming-eventual-consistency
|
|
9303
|
+
# [5]: https://docs.aws.amazon.com/kms/latest/developerguide/key-store-overview.html
|
|
9304
|
+
# [6]: https://docs.aws.amazon.com/kms/latest/developerguide/importing-keys-import-key-material.html
|
|
9305
|
+
# [7]: https://docs.aws.amazon.com/kms/latest/developerguide/rotate-keys.html#multi-region-rotate
|
|
9306
|
+
# [8]: https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#aws-managed-key
|
|
9307
|
+
# [9]: https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#aws-owned-key
|
|
9308
|
+
# [10]: https://docs.aws.amazon.com/kms/latest/developerguide/key-state.html
|
|
9309
|
+
# [11]: https://docs.aws.amazon.com/kms/latest/developerguide/kms-api-permissions-reference.html
|
|
9310
|
+
# [12]: https://docs.aws.amazon.com/kms/latest/developerguide/accessing-kms.html#programming-eventual-consistency
|
|
9258
9311
|
#
|
|
9259
9312
|
# @option params [required, String] :key_id
|
|
9260
9313
|
# Identifies a symmetric encryption KMS key. You cannot perform
|
|
@@ -9596,6 +9649,13 @@ module Aws::KMS
|
|
|
9596
9649
|
# with an unhashed message, the security of the signing operation can be
|
|
9597
9650
|
# compromised.
|
|
9598
9651
|
#
|
|
9652
|
+
# When using ECC\_NIST\_EDWARDS25519 KMS keys:
|
|
9653
|
+
#
|
|
9654
|
+
# * ED25519\_SHA\_512 signing algorithm requires KMS `MessageType:RAW`
|
|
9655
|
+
#
|
|
9656
|
+
# * ED25519\_PH\_SHA\_512 signing algorithm requires KMS
|
|
9657
|
+
# `MessageType:DIGEST`
|
|
9658
|
+
#
|
|
9599
9659
|
# When the value of `MessageType` is `DIGEST`, the length of the
|
|
9600
9660
|
# `Message` value must match the length of hashed messages for the
|
|
9601
9661
|
# specified signing algorithm.
|
|
@@ -9715,7 +9775,7 @@ module Aws::KMS
|
|
|
9715
9775
|
# message: "data", # required
|
|
9716
9776
|
# message_type: "RAW", # accepts RAW, DIGEST, EXTERNAL_MU
|
|
9717
9777
|
# grant_tokens: ["GrantTokenType"],
|
|
9718
|
-
# signing_algorithm: "RSASSA_PSS_SHA_256", # required, accepts RSASSA_PSS_SHA_256, RSASSA_PSS_SHA_384, RSASSA_PSS_SHA_512, RSASSA_PKCS1_V1_5_SHA_256, RSASSA_PKCS1_V1_5_SHA_384, RSASSA_PKCS1_V1_5_SHA_512, ECDSA_SHA_256, ECDSA_SHA_384, ECDSA_SHA_512, SM2DSA, ML_DSA_SHAKE_256
|
|
9778
|
+
# signing_algorithm: "RSASSA_PSS_SHA_256", # required, accepts RSASSA_PSS_SHA_256, RSASSA_PSS_SHA_384, RSASSA_PSS_SHA_512, RSASSA_PKCS1_V1_5_SHA_256, RSASSA_PKCS1_V1_5_SHA_384, RSASSA_PKCS1_V1_5_SHA_512, ECDSA_SHA_256, ECDSA_SHA_384, ECDSA_SHA_512, SM2DSA, ML_DSA_SHAKE_256, ED25519_SHA_512, ED25519_PH_SHA_512
|
|
9719
9779
|
# dry_run: false,
|
|
9720
9780
|
# })
|
|
9721
9781
|
#
|
|
@@ -9723,7 +9783,7 @@ module Aws::KMS
|
|
|
9723
9783
|
#
|
|
9724
9784
|
# resp.key_id #=> String
|
|
9725
9785
|
# resp.signature #=> String
|
|
9726
|
-
# resp.signing_algorithm #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256"
|
|
9786
|
+
# resp.signing_algorithm #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256", "ED25519_SHA_512", "ED25519_PH_SHA_512"
|
|
9727
9787
|
#
|
|
9728
9788
|
# @see http://docs.aws.amazon.com/goto/WebAPI/kms-2014-11-01/Sign AWS API Documentation
|
|
9729
9789
|
#
|
|
@@ -10290,6 +10350,15 @@ module Aws::KMS
|
|
|
10290
10350
|
#
|
|
10291
10351
|
# To change this value, the external key store must be disconnected.
|
|
10292
10352
|
#
|
|
10353
|
+
# @option params [String] :xks_proxy_vpc_endpoint_service_owner
|
|
10354
|
+
# Changes the Amazon Web Services account ID that KMS uses to identify
|
|
10355
|
+
# the Amazon VPC endpoint service for your external key store proxy (XKS
|
|
10356
|
+
# proxy). This parameter is optional. If not specified, the current
|
|
10357
|
+
# Amazon Web Services account ID for the VPC endpoint service will not
|
|
10358
|
+
# be updated.
|
|
10359
|
+
#
|
|
10360
|
+
# To change this value, the external key store must be disconnected.
|
|
10361
|
+
#
|
|
10293
10362
|
# @option params [Types::XksProxyAuthenticationCredentialType] :xks_proxy_authentication_credential
|
|
10294
10363
|
# Changes the credentials that KMS uses to sign requests to the external
|
|
10295
10364
|
# key store proxy (XKS proxy). This parameter is valid only for custom
|
|
@@ -10431,6 +10500,7 @@ module Aws::KMS
|
|
|
10431
10500
|
# xks_proxy_uri_endpoint: "XksProxyUriEndpointType",
|
|
10432
10501
|
# xks_proxy_uri_path: "XksProxyUriPathType",
|
|
10433
10502
|
# xks_proxy_vpc_endpoint_service_name: "XksProxyVpcEndpointServiceNameType",
|
|
10503
|
+
# xks_proxy_vpc_endpoint_service_owner: "AccountIdType",
|
|
10434
10504
|
# xks_proxy_authentication_credential: {
|
|
10435
10505
|
# access_key_id: "XksProxyAuthenticationAccessKeyIdType", # required
|
|
10436
10506
|
# raw_secret_access_key: "XksProxyAuthenticationRawSecretAccessKeyType", # required
|
|
@@ -10782,6 +10852,13 @@ module Aws::KMS
|
|
|
10782
10852
|
# with an unhashed message, the security of the signing operation can be
|
|
10783
10853
|
# compromised.
|
|
10784
10854
|
#
|
|
10855
|
+
# When using ECC\_NIST\_EDWARDS25519 KMS keys:
|
|
10856
|
+
#
|
|
10857
|
+
# * ED25519\_SHA\_512 signing algorithm requires KMS `MessageType:RAW`
|
|
10858
|
+
#
|
|
10859
|
+
# * ED25519\_PH\_SHA\_512 signing algorithm requires KMS
|
|
10860
|
+
# `MessageType:DIGEST`
|
|
10861
|
+
#
|
|
10785
10862
|
# When the value of `MessageType` is `DIGEST`, the length of the
|
|
10786
10863
|
# `Message` value must match the length of hashed messages for the
|
|
10787
10864
|
# specified signing algorithm.
|
|
@@ -10902,7 +10979,7 @@ module Aws::KMS
|
|
|
10902
10979
|
# message: "data", # required
|
|
10903
10980
|
# message_type: "RAW", # accepts RAW, DIGEST, EXTERNAL_MU
|
|
10904
10981
|
# signature: "data", # required
|
|
10905
|
-
# signing_algorithm: "RSASSA_PSS_SHA_256", # required, accepts RSASSA_PSS_SHA_256, RSASSA_PSS_SHA_384, RSASSA_PSS_SHA_512, RSASSA_PKCS1_V1_5_SHA_256, RSASSA_PKCS1_V1_5_SHA_384, RSASSA_PKCS1_V1_5_SHA_512, ECDSA_SHA_256, ECDSA_SHA_384, ECDSA_SHA_512, SM2DSA, ML_DSA_SHAKE_256
|
|
10982
|
+
# signing_algorithm: "RSASSA_PSS_SHA_256", # required, accepts RSASSA_PSS_SHA_256, RSASSA_PSS_SHA_384, RSASSA_PSS_SHA_512, RSASSA_PKCS1_V1_5_SHA_256, RSASSA_PKCS1_V1_5_SHA_384, RSASSA_PKCS1_V1_5_SHA_512, ECDSA_SHA_256, ECDSA_SHA_384, ECDSA_SHA_512, SM2DSA, ML_DSA_SHAKE_256, ED25519_SHA_512, ED25519_PH_SHA_512
|
|
10906
10983
|
# grant_tokens: ["GrantTokenType"],
|
|
10907
10984
|
# dry_run: false,
|
|
10908
10985
|
# })
|
|
@@ -10911,7 +10988,7 @@ module Aws::KMS
|
|
|
10911
10988
|
#
|
|
10912
10989
|
# resp.key_id #=> String
|
|
10913
10990
|
# resp.signature_valid #=> Boolean
|
|
10914
|
-
# resp.signing_algorithm #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256"
|
|
10991
|
+
# resp.signing_algorithm #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256", "ED25519_SHA_512", "ED25519_PH_SHA_512"
|
|
10915
10992
|
#
|
|
10916
10993
|
# @see http://docs.aws.amazon.com/goto/WebAPI/kms-2014-11-01/Verify AWS API Documentation
|
|
10917
10994
|
#
|
|
@@ -11080,7 +11157,7 @@ module Aws::KMS
|
|
|
11080
11157
|
tracer: tracer
|
|
11081
11158
|
)
|
|
11082
11159
|
context[:gem_name] = 'aws-sdk-kms'
|
|
11083
|
-
context[:gem_version] = '1.
|
|
11160
|
+
context[:gem_version] = '1.118.0'
|
|
11084
11161
|
Seahorse::Client::Request.new(handlers, context)
|
|
11085
11162
|
end
|
|
11086
11163
|
|
|
@@ -15,6 +15,7 @@ module Aws::KMS
|
|
|
15
15
|
include Seahorse::Model
|
|
16
16
|
|
|
17
17
|
AWSAccountIdType = Shapes::StringShape.new(name: 'AWSAccountIdType')
|
|
18
|
+
AccountIdType = Shapes::StringShape.new(name: 'AccountIdType')
|
|
18
19
|
AlgorithmSpec = Shapes::StringShape.new(name: 'AlgorithmSpec')
|
|
19
20
|
AliasList = Shapes::ListShape.new(name: 'AliasList')
|
|
20
21
|
AliasListEntry = Shapes::StructureShape.new(name: 'AliasListEntry')
|
|
@@ -308,6 +309,7 @@ module Aws::KMS
|
|
|
308
309
|
CreateCustomKeyStoreRequest.add_member(:xks_proxy_uri_endpoint, Shapes::ShapeRef.new(shape: XksProxyUriEndpointType, location_name: "XksProxyUriEndpoint"))
|
|
309
310
|
CreateCustomKeyStoreRequest.add_member(:xks_proxy_uri_path, Shapes::ShapeRef.new(shape: XksProxyUriPathType, location_name: "XksProxyUriPath"))
|
|
310
311
|
CreateCustomKeyStoreRequest.add_member(:xks_proxy_vpc_endpoint_service_name, Shapes::ShapeRef.new(shape: XksProxyVpcEndpointServiceNameType, location_name: "XksProxyVpcEndpointServiceName"))
|
|
312
|
+
CreateCustomKeyStoreRequest.add_member(:xks_proxy_vpc_endpoint_service_owner, Shapes::ShapeRef.new(shape: AccountIdType, location_name: "XksProxyVpcEndpointServiceOwner"))
|
|
311
313
|
CreateCustomKeyStoreRequest.add_member(:xks_proxy_authentication_credential, Shapes::ShapeRef.new(shape: XksProxyAuthenticationCredentialType, location_name: "XksProxyAuthenticationCredential"))
|
|
312
314
|
CreateCustomKeyStoreRequest.add_member(:xks_proxy_connectivity, Shapes::ShapeRef.new(shape: XksProxyConnectivityType, location_name: "XksProxyConnectivity"))
|
|
313
315
|
CreateCustomKeyStoreRequest.struct_class = Types::CreateCustomKeyStoreRequest
|
|
@@ -948,6 +950,7 @@ module Aws::KMS
|
|
|
948
950
|
UpdateCustomKeyStoreRequest.add_member(:xks_proxy_uri_endpoint, Shapes::ShapeRef.new(shape: XksProxyUriEndpointType, location_name: "XksProxyUriEndpoint"))
|
|
949
951
|
UpdateCustomKeyStoreRequest.add_member(:xks_proxy_uri_path, Shapes::ShapeRef.new(shape: XksProxyUriPathType, location_name: "XksProxyUriPath"))
|
|
950
952
|
UpdateCustomKeyStoreRequest.add_member(:xks_proxy_vpc_endpoint_service_name, Shapes::ShapeRef.new(shape: XksProxyVpcEndpointServiceNameType, location_name: "XksProxyVpcEndpointServiceName"))
|
|
953
|
+
UpdateCustomKeyStoreRequest.add_member(:xks_proxy_vpc_endpoint_service_owner, Shapes::ShapeRef.new(shape: AccountIdType, location_name: "XksProxyVpcEndpointServiceOwner"))
|
|
951
954
|
UpdateCustomKeyStoreRequest.add_member(:xks_proxy_authentication_credential, Shapes::ShapeRef.new(shape: XksProxyAuthenticationCredentialType, location_name: "XksProxyAuthenticationCredential"))
|
|
952
955
|
UpdateCustomKeyStoreRequest.add_member(:xks_proxy_connectivity, Shapes::ShapeRef.new(shape: XksProxyConnectivityType, location_name: "XksProxyConnectivity"))
|
|
953
956
|
UpdateCustomKeyStoreRequest.struct_class = Types::UpdateCustomKeyStoreRequest
|
|
@@ -1010,6 +1013,7 @@ module Aws::KMS
|
|
|
1010
1013
|
XksProxyConfigurationType.add_member(:uri_endpoint, Shapes::ShapeRef.new(shape: XksProxyUriEndpointType, location_name: "UriEndpoint"))
|
|
1011
1014
|
XksProxyConfigurationType.add_member(:uri_path, Shapes::ShapeRef.new(shape: XksProxyUriPathType, location_name: "UriPath"))
|
|
1012
1015
|
XksProxyConfigurationType.add_member(:vpc_endpoint_service_name, Shapes::ShapeRef.new(shape: XksProxyVpcEndpointServiceNameType, location_name: "VpcEndpointServiceName"))
|
|
1016
|
+
XksProxyConfigurationType.add_member(:vpc_endpoint_service_owner, Shapes::ShapeRef.new(shape: AccountIdType, location_name: "VpcEndpointServiceOwner"))
|
|
1013
1017
|
XksProxyConfigurationType.struct_class = Types::XksProxyConfigurationType
|
|
1014
1018
|
|
|
1015
1019
|
XksProxyIncorrectAuthenticationCredentialException.add_member(:message, Shapes::ShapeRef.new(shape: ErrorMessageType, location_name: "message"))
|
data/lib/aws-sdk-kms/types.rb
CHANGED
|
@@ -485,6 +485,14 @@ module Aws::KMS
|
|
|
485
485
|
# [1]: https://docs.aws.amazon.com/kms/latest/developerguide/create-xks-keystore.html#xks-requirements
|
|
486
486
|
# @return [String]
|
|
487
487
|
#
|
|
488
|
+
# @!attribute [rw] xks_proxy_vpc_endpoint_service_owner
|
|
489
|
+
# Specifies the Amazon Web Services account ID that owns the Amazon
|
|
490
|
+
# VPC service endpoint for the interface that is used to communicate
|
|
491
|
+
# with your external key store proxy (XKS proxy). This parameter is
|
|
492
|
+
# optional. If not provided, the Amazon Web Services account ID
|
|
493
|
+
# calling the action will be used.
|
|
494
|
+
# @return [String]
|
|
495
|
+
#
|
|
488
496
|
# @!attribute [rw] xks_proxy_authentication_credential
|
|
489
497
|
# Specifies an authentication credential for the external key store
|
|
490
498
|
# proxy (XKS proxy). This parameter is required for all custom key
|
|
@@ -549,6 +557,7 @@ module Aws::KMS
|
|
|
549
557
|
:xks_proxy_uri_endpoint,
|
|
550
558
|
:xks_proxy_uri_path,
|
|
551
559
|
:xks_proxy_vpc_endpoint_service_name,
|
|
560
|
+
:xks_proxy_vpc_endpoint_service_owner,
|
|
552
561
|
:xks_proxy_authentication_credential,
|
|
553
562
|
:xks_proxy_connectivity)
|
|
554
563
|
SENSITIVE = [:key_store_password]
|
|
@@ -863,7 +872,7 @@ module Aws::KMS
|
|
|
863
872
|
# * For asymmetric KMS keys with RSA key pairs, specify
|
|
864
873
|
# `ENCRYPT_DECRYPT` or `SIGN_VERIFY`.
|
|
865
874
|
#
|
|
866
|
-
# * For asymmetric KMS keys with NIST-
|
|
875
|
+
# * For asymmetric KMS keys with NIST-standard elliptic curve key
|
|
867
876
|
# pairs, specify `SIGN_VERIFY` or `KEY_AGREEMENT`.
|
|
868
877
|
#
|
|
869
878
|
# * For asymmetric KMS keys with `ECC_SECG_P256K1` key pairs, specify
|
|
@@ -938,7 +947,7 @@ module Aws::KMS
|
|
|
938
947
|
# * `RSA_3072`
|
|
939
948
|
#
|
|
940
949
|
# * `RSA_4096`
|
|
941
|
-
# * Asymmetric NIST-
|
|
950
|
+
# * Asymmetric NIST-standard elliptic curve key pairs (signing and
|
|
942
951
|
# verification -or- deriving shared secrets)
|
|
943
952
|
#
|
|
944
953
|
# * `ECC_NIST_P256` (secp256r1)
|
|
@@ -946,6 +955,19 @@ module Aws::KMS
|
|
|
946
955
|
# * `ECC_NIST_P384` (secp384r1)
|
|
947
956
|
#
|
|
948
957
|
# * `ECC_NIST_P521` (secp521r1)
|
|
958
|
+
#
|
|
959
|
+
# * `ECC_NIST_EDWARDS25519` (ed25519) - signing and verification
|
|
960
|
+
# only
|
|
961
|
+
#
|
|
962
|
+
# * **Note:** For ECC\_NIST\_EDWARDS25519 KMS keys, the
|
|
963
|
+
# ED25519\_SHA\_512 signing algorithm requires [
|
|
964
|
+
# `MessageType:RAW`
|
|
965
|
+
# ](kms/latest/APIReference/API_Sign.html#KMS-Sign-request-MessageType),
|
|
966
|
+
# while ED25519\_PH\_SHA\_512 requires [ `MessageType:DIGEST`
|
|
967
|
+
# ](kms/latest/APIReference/API_Sign.html#KMS-Sign-request-MessageType).
|
|
968
|
+
# These message types cannot be used interchangeably.
|
|
969
|
+
#
|
|
970
|
+
# ^
|
|
949
971
|
# * Other asymmetric elliptic curve key pairs (signing and
|
|
950
972
|
# verification)
|
|
951
973
|
#
|
|
@@ -1841,7 +1863,7 @@ module Aws::KMS
|
|
|
1841
1863
|
end
|
|
1842
1864
|
|
|
1843
1865
|
# @!attribute [rw] key_id
|
|
1844
|
-
# Identifies an asymmetric NIST-
|
|
1866
|
+
# Identifies an asymmetric NIST-standard ECC or SM2 (China Regions
|
|
1845
1867
|
# only) KMS key. KMS uses the private key in the specified key pair to
|
|
1846
1868
|
# derive the shared secret. The key usage of the KMS key must be
|
|
1847
1869
|
# `KEY_AGREEMENT`. To find the `KeyUsage` of a KMS key, use the
|
|
@@ -1873,7 +1895,7 @@ module Aws::KMS
|
|
|
1873
1895
|
# @return [String]
|
|
1874
1896
|
#
|
|
1875
1897
|
# @!attribute [rw] public_key
|
|
1876
|
-
# Specifies the public key in your peer's NIST-
|
|
1898
|
+
# Specifies the public key in your peer's NIST-standard elliptic
|
|
1877
1899
|
# curve (ECC) or SM2 (China Regions only) key pair.
|
|
1878
1900
|
#
|
|
1879
1901
|
# The public key must be a DER-encoded X.509 public key, also known as
|
|
@@ -3971,6 +3993,13 @@ module Aws::KMS
|
|
|
3971
3993
|
# the parameter defaults to `NEW_KEY_MATERIAL`. After the first key
|
|
3972
3994
|
# material is imported, if this parameter is omitted then the
|
|
3973
3995
|
# parameter defaults to `EXISTING_KEY_MATERIAL`.
|
|
3996
|
+
#
|
|
3997
|
+
# For multi-Region keys, you must first import new key material into
|
|
3998
|
+
# the primary Region key. You should use the `NEW_KEY_MATERIAL` import
|
|
3999
|
+
# type when importing key material into the primary Region key. Then,
|
|
4000
|
+
# you can import the same key material into the replica Region key.
|
|
4001
|
+
# The import type for the replica Region key should be
|
|
4002
|
+
# `EXISTING_KEY_MATERIAL`.
|
|
3974
4003
|
# @return [String]
|
|
3975
4004
|
#
|
|
3976
4005
|
# @!attribute [rw] key_material_description
|
|
@@ -4554,12 +4583,11 @@ module Aws::KMS
|
|
|
4554
4583
|
#
|
|
4555
4584
|
# @!attribute [rw] current_key_material_id
|
|
4556
4585
|
# Identifies the current key material. This value is present for
|
|
4557
|
-
# symmetric encryption keys with `AWS_KMS` origin
|
|
4558
|
-
#
|
|
4559
|
-
#
|
|
4560
|
-
# key
|
|
4561
|
-
# material for
|
|
4562
|
-
# material for decryption operations only.
|
|
4586
|
+
# symmetric encryption keys with `AWS_KMS` or `EXTERNAL` origin. These
|
|
4587
|
+
# KMS keys support automatic or on-demand key rotation and can have
|
|
4588
|
+
# multiple key materials associated with them. KMS uses the current
|
|
4589
|
+
# key material for both encryption and decryption, and the non-current
|
|
4590
|
+
# key material for decryption operations only.
|
|
4563
4591
|
# @return [String]
|
|
4564
4592
|
#
|
|
4565
4593
|
# @see http://docs.aws.amazon.com/goto/WebAPI/kms-2014-11-01/KeyMetadata AWS API Documentation
|
|
@@ -5979,15 +6007,24 @@ module Aws::KMS
|
|
|
5979
6007
|
# @return [String]
|
|
5980
6008
|
#
|
|
5981
6009
|
# @!attribute [rw] key_material_state
|
|
5982
|
-
# There are
|
|
5983
|
-
# `NON_CURRENT
|
|
5984
|
-
#
|
|
5985
|
-
#
|
|
5986
|
-
# material that has been
|
|
5987
|
-
#
|
|
5988
|
-
#
|
|
5989
|
-
#
|
|
5990
|
-
#
|
|
6010
|
+
# There are four possible values for this field: `CURRENT`,
|
|
6011
|
+
# `NON_CURRENT`, `PENDING_MULTI_REGION_IMPORT_AND_ROTATION` and
|
|
6012
|
+
# `PENDING_ROTATION`. KMS uses `CURRENT` key material for both
|
|
6013
|
+
# encryption and decryption and `NON_CURRENT` key material only for
|
|
6014
|
+
# decryption. `PENDING_ROTATION` identifies key material that has been
|
|
6015
|
+
# imported for on-demand key rotation but the rotation hasn't
|
|
6016
|
+
# completed. The key material state
|
|
6017
|
+
# `PENDING_MULTI_REGION_IMPORT_AND_ROTATION` is unique to
|
|
6018
|
+
# multi-region, symmetric encryption keys with imported key material.
|
|
6019
|
+
# It indicates key material that has been imported into the primary
|
|
6020
|
+
# Region key but not all of the replica Region keys. When this key
|
|
6021
|
+
# material is imported in to all of the replica Region keys, the key
|
|
6022
|
+
# material state will change to `PENDING_ROTATION`. Key material in
|
|
6023
|
+
# `PENDING_MULTI_REGION_IMPORT_AND_ROTATION` or `PENDING_ROTATION`
|
|
6024
|
+
# state is not permanently associated with the KMS key. You can delete
|
|
6025
|
+
# this key material and import different key material in its place.
|
|
6026
|
+
# The `PENDING_MULTI_REGION_IMPORT_AND_ROTATION` and
|
|
6027
|
+
# `PENDING_ROTATION` values are only used in symmetric encryption keys
|
|
5991
6028
|
# with imported key material. The other values, `CURRENT` and
|
|
5992
6029
|
# `NON_CURRENT`, are used for all KMS keys that support automatic or
|
|
5993
6030
|
# on-demand key rotation.
|
|
@@ -6189,6 +6226,13 @@ module Aws::KMS
|
|
|
6189
6226
|
# value with an unhashed message, the security of the signing
|
|
6190
6227
|
# operation can be compromised.
|
|
6191
6228
|
#
|
|
6229
|
+
# When using ECC\_NIST\_EDWARDS25519 KMS keys:
|
|
6230
|
+
#
|
|
6231
|
+
# * ED25519\_SHA\_512 signing algorithm requires KMS `MessageType:RAW`
|
|
6232
|
+
#
|
|
6233
|
+
# * ED25519\_PH\_SHA\_512 signing algorithm requires KMS
|
|
6234
|
+
# `MessageType:DIGEST`
|
|
6235
|
+
#
|
|
6192
6236
|
# When the value of `MessageType` is `DIGEST`, the length of the
|
|
6193
6237
|
# `Message` value must match the length of hashed messages for the
|
|
6194
6238
|
# specified signing algorithm.
|
|
@@ -6596,6 +6640,16 @@ module Aws::KMS
|
|
|
6596
6640
|
# To change this value, the external key store must be disconnected.
|
|
6597
6641
|
# @return [String]
|
|
6598
6642
|
#
|
|
6643
|
+
# @!attribute [rw] xks_proxy_vpc_endpoint_service_owner
|
|
6644
|
+
# Changes the Amazon Web Services account ID that KMS uses to identify
|
|
6645
|
+
# the Amazon VPC endpoint service for your external key store proxy
|
|
6646
|
+
# (XKS proxy). This parameter is optional. If not specified, the
|
|
6647
|
+
# current Amazon Web Services account ID for the VPC endpoint service
|
|
6648
|
+
# will not be updated.
|
|
6649
|
+
#
|
|
6650
|
+
# To change this value, the external key store must be disconnected.
|
|
6651
|
+
# @return [String]
|
|
6652
|
+
#
|
|
6599
6653
|
# @!attribute [rw] xks_proxy_authentication_credential
|
|
6600
6654
|
# Changes the credentials that KMS uses to sign requests to the
|
|
6601
6655
|
# external key store proxy (XKS proxy). This parameter is valid only
|
|
@@ -6643,6 +6697,7 @@ module Aws::KMS
|
|
|
6643
6697
|
:xks_proxy_uri_endpoint,
|
|
6644
6698
|
:xks_proxy_uri_path,
|
|
6645
6699
|
:xks_proxy_vpc_endpoint_service_name,
|
|
6700
|
+
:xks_proxy_vpc_endpoint_service_owner,
|
|
6646
6701
|
:xks_proxy_authentication_credential,
|
|
6647
6702
|
:xks_proxy_connectivity)
|
|
6648
6703
|
SENSITIVE = [:key_store_password]
|
|
@@ -6872,6 +6927,13 @@ module Aws::KMS
|
|
|
6872
6927
|
# value with an unhashed message, the security of the signing
|
|
6873
6928
|
# operation can be compromised.
|
|
6874
6929
|
#
|
|
6930
|
+
# When using ECC\_NIST\_EDWARDS25519 KMS keys:
|
|
6931
|
+
#
|
|
6932
|
+
# * ED25519\_SHA\_512 signing algorithm requires KMS `MessageType:RAW`
|
|
6933
|
+
#
|
|
6934
|
+
# * ED25519\_PH\_SHA\_512 signing algorithm requires KMS
|
|
6935
|
+
# `MessageType:DIGEST`
|
|
6936
|
+
#
|
|
6875
6937
|
# When the value of `MessageType` is `DIGEST`, the length of the
|
|
6876
6938
|
# `Message` value must match the length of hashed messages for the
|
|
6877
6939
|
# specified signing algorithm.
|
|
@@ -7141,6 +7203,13 @@ module Aws::KMS
|
|
|
7141
7203
|
# with KMS.
|
|
7142
7204
|
# @return [String]
|
|
7143
7205
|
#
|
|
7206
|
+
# @!attribute [rw] vpc_endpoint_service_owner
|
|
7207
|
+
# The Amazon Web Services account ID that owns the Amazon VPC endpoint
|
|
7208
|
+
# service used to communicate with the external key store proxy (XKS).
|
|
7209
|
+
# This field appears only when the XKS uses an VPC endpoint service to
|
|
7210
|
+
# communicate with KMS.
|
|
7211
|
+
# @return [String]
|
|
7212
|
+
#
|
|
7144
7213
|
# @see http://docs.aws.amazon.com/goto/WebAPI/kms-2014-11-01/XksProxyConfigurationType AWS API Documentation
|
|
7145
7214
|
#
|
|
7146
7215
|
class XksProxyConfigurationType < Struct.new(
|
|
@@ -7148,7 +7217,8 @@ module Aws::KMS
|
|
|
7148
7217
|
:access_key_id,
|
|
7149
7218
|
:uri_endpoint,
|
|
7150
7219
|
:uri_path,
|
|
7151
|
-
:vpc_endpoint_service_name
|
|
7220
|
+
:vpc_endpoint_service_name,
|
|
7221
|
+
:vpc_endpoint_service_owner)
|
|
7152
7222
|
SENSITIVE = [:access_key_id]
|
|
7153
7223
|
include Aws::Structure
|
|
7154
7224
|
end
|
data/lib/aws-sdk-kms.rb
CHANGED
data/sig/client.rbs
CHANGED
|
@@ -119,6 +119,7 @@ module Aws
|
|
|
119
119
|
?xks_proxy_uri_endpoint: ::String,
|
|
120
120
|
?xks_proxy_uri_path: ::String,
|
|
121
121
|
?xks_proxy_vpc_endpoint_service_name: ::String,
|
|
122
|
+
?xks_proxy_vpc_endpoint_service_owner: ::String,
|
|
122
123
|
?xks_proxy_authentication_credential: {
|
|
123
124
|
access_key_id: ::String,
|
|
124
125
|
raw_secret_access_key: ::String
|
|
@@ -158,7 +159,7 @@ module Aws
|
|
|
158
159
|
?description: ::String,
|
|
159
160
|
?key_usage: ("SIGN_VERIFY" | "ENCRYPT_DECRYPT" | "GENERATE_VERIFY_MAC" | "KEY_AGREEMENT"),
|
|
160
161
|
?customer_master_key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2"),
|
|
161
|
-
?key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87"),
|
|
162
|
+
?key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87" | "ECC_NIST_EDWARDS25519"),
|
|
162
163
|
?origin: ("AWS_KMS" | "EXTERNAL" | "AWS_CLOUDHSM" | "EXTERNAL_KEY_STORE"),
|
|
163
164
|
?custom_key_store_id: ::String,
|
|
164
165
|
?bypass_policy_lockout_safety_check: bool,
|
|
@@ -351,7 +352,7 @@ module Aws
|
|
|
351
352
|
def private_key_plaintext: () -> ::String
|
|
352
353
|
def public_key: () -> ::String
|
|
353
354
|
def key_id: () -> ::String
|
|
354
|
-
def key_pair_spec: () -> ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2")
|
|
355
|
+
def key_pair_spec: () -> ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2" | "ECC_NIST_EDWARDS25519")
|
|
355
356
|
def ciphertext_for_recipient: () -> ::String
|
|
356
357
|
def key_material_id: () -> ::String
|
|
357
358
|
end
|
|
@@ -359,7 +360,7 @@ module Aws
|
|
|
359
360
|
def generate_data_key_pair: (
|
|
360
361
|
?encryption_context: Hash[::String, ::String],
|
|
361
362
|
key_id: ::String,
|
|
362
|
-
key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2"),
|
|
363
|
+
key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2" | "ECC_NIST_EDWARDS25519"),
|
|
363
364
|
?grant_tokens: Array[::String],
|
|
364
365
|
?recipient: {
|
|
365
366
|
key_encryption_algorithm: ("RSAES_OAEP_SHA_256")?,
|
|
@@ -374,14 +375,14 @@ module Aws
|
|
|
374
375
|
def private_key_ciphertext_blob: () -> ::String
|
|
375
376
|
def public_key: () -> ::String
|
|
376
377
|
def key_id: () -> ::String
|
|
377
|
-
def key_pair_spec: () -> ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2")
|
|
378
|
+
def key_pair_spec: () -> ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2" | "ECC_NIST_EDWARDS25519")
|
|
378
379
|
def key_material_id: () -> ::String
|
|
379
380
|
end
|
|
380
381
|
# https://docs.aws.amazon.com/sdk-for-ruby/v3/api/Aws/KMS/Client.html#generate_data_key_pair_without_plaintext-instance_method
|
|
381
382
|
def generate_data_key_pair_without_plaintext: (
|
|
382
383
|
?encryption_context: Hash[::String, ::String],
|
|
383
384
|
key_id: ::String,
|
|
384
|
-
key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2"),
|
|
385
|
+
key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2" | "ECC_NIST_EDWARDS25519"),
|
|
385
386
|
?grant_tokens: Array[::String],
|
|
386
387
|
?dry_run: bool
|
|
387
388
|
) -> _GenerateDataKeyPairWithoutPlaintextResponseSuccess
|
|
@@ -482,10 +483,10 @@ module Aws
|
|
|
482
483
|
def key_id: () -> ::String
|
|
483
484
|
def public_key: () -> ::String
|
|
484
485
|
def customer_master_key_spec: () -> ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2")
|
|
485
|
-
def key_spec: () -> ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87")
|
|
486
|
+
def key_spec: () -> ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87" | "ECC_NIST_EDWARDS25519")
|
|
486
487
|
def key_usage: () -> ("SIGN_VERIFY" | "ENCRYPT_DECRYPT" | "GENERATE_VERIFY_MAC" | "KEY_AGREEMENT")
|
|
487
488
|
def encryption_algorithms: () -> ::Array[("SYMMETRIC_DEFAULT" | "RSAES_OAEP_SHA_1" | "RSAES_OAEP_SHA_256" | "SM2PKE")]
|
|
488
|
-
def signing_algorithms: () -> ::Array[("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")]
|
|
489
|
+
def signing_algorithms: () -> ::Array[("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512")]
|
|
489
490
|
def key_agreement_algorithms: () -> ::Array[("ECDH")]
|
|
490
491
|
end
|
|
491
492
|
# https://docs.aws.amazon.com/sdk-for-ruby/v3/api/Aws/KMS/Client.html#get_public_key-instance_method
|
|
@@ -713,7 +714,7 @@ module Aws
|
|
|
713
714
|
include ::Seahorse::Client::_ResponseSuccess[Types::SignResponse]
|
|
714
715
|
def key_id: () -> ::String
|
|
715
716
|
def signature: () -> ::String
|
|
716
|
-
def signing_algorithm: () -> ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")
|
|
717
|
+
def signing_algorithm: () -> ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512")
|
|
717
718
|
end
|
|
718
719
|
# https://docs.aws.amazon.com/sdk-for-ruby/v3/api/Aws/KMS/Client.html#sign-instance_method
|
|
719
720
|
def sign: (
|
|
@@ -721,7 +722,7 @@ module Aws
|
|
|
721
722
|
message: ::String,
|
|
722
723
|
?message_type: ("RAW" | "DIGEST" | "EXTERNAL_MU"),
|
|
723
724
|
?grant_tokens: Array[::String],
|
|
724
|
-
signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256"),
|
|
725
|
+
signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512"),
|
|
725
726
|
?dry_run: bool
|
|
726
727
|
) -> _SignResponseSuccess
|
|
727
728
|
| (Hash[Symbol, untyped] params, ?Hash[Symbol, untyped] options) -> _SignResponseSuccess
|
|
@@ -764,6 +765,7 @@ module Aws
|
|
|
764
765
|
?xks_proxy_uri_endpoint: ::String,
|
|
765
766
|
?xks_proxy_uri_path: ::String,
|
|
766
767
|
?xks_proxy_vpc_endpoint_service_name: ::String,
|
|
768
|
+
?xks_proxy_vpc_endpoint_service_owner: ::String,
|
|
767
769
|
?xks_proxy_authentication_credential: {
|
|
768
770
|
access_key_id: ::String,
|
|
769
771
|
raw_secret_access_key: ::String
|
|
@@ -790,7 +792,7 @@ module Aws
|
|
|
790
792
|
include ::Seahorse::Client::_ResponseSuccess[Types::VerifyResponse]
|
|
791
793
|
def key_id: () -> ::String
|
|
792
794
|
def signature_valid: () -> bool
|
|
793
|
-
def signing_algorithm: () -> ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")
|
|
795
|
+
def signing_algorithm: () -> ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512")
|
|
794
796
|
end
|
|
795
797
|
# https://docs.aws.amazon.com/sdk-for-ruby/v3/api/Aws/KMS/Client.html#verify-instance_method
|
|
796
798
|
def verify: (
|
|
@@ -798,7 +800,7 @@ module Aws
|
|
|
798
800
|
message: ::String,
|
|
799
801
|
?message_type: ("RAW" | "DIGEST" | "EXTERNAL_MU"),
|
|
800
802
|
signature: ::String,
|
|
801
|
-
signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256"),
|
|
803
|
+
signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512"),
|
|
802
804
|
?grant_tokens: Array[::String],
|
|
803
805
|
?dry_run: bool
|
|
804
806
|
) -> _VerifyResponseSuccess
|
data/sig/types.rbs
CHANGED
|
@@ -85,6 +85,7 @@ module Aws::KMS
|
|
|
85
85
|
attr_accessor xks_proxy_uri_endpoint: ::String
|
|
86
86
|
attr_accessor xks_proxy_uri_path: ::String
|
|
87
87
|
attr_accessor xks_proxy_vpc_endpoint_service_name: ::String
|
|
88
|
+
attr_accessor xks_proxy_vpc_endpoint_service_owner: ::String
|
|
88
89
|
attr_accessor xks_proxy_authentication_credential: Types::XksProxyAuthenticationCredentialType
|
|
89
90
|
attr_accessor xks_proxy_connectivity: ("PUBLIC_ENDPOINT" | "VPC_ENDPOINT_SERVICE")
|
|
90
91
|
SENSITIVE: [:key_store_password]
|
|
@@ -118,7 +119,7 @@ module Aws::KMS
|
|
|
118
119
|
attr_accessor description: ::String
|
|
119
120
|
attr_accessor key_usage: ("SIGN_VERIFY" | "ENCRYPT_DECRYPT" | "GENERATE_VERIFY_MAC" | "KEY_AGREEMENT")
|
|
120
121
|
attr_accessor customer_master_key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2")
|
|
121
|
-
attr_accessor key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87")
|
|
122
|
+
attr_accessor key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87" | "ECC_NIST_EDWARDS25519")
|
|
122
123
|
attr_accessor origin: ("AWS_KMS" | "EXTERNAL" | "AWS_CLOUDHSM" | "EXTERNAL_KEY_STORE")
|
|
123
124
|
attr_accessor custom_key_store_id: ::String
|
|
124
125
|
attr_accessor bypass_policy_lockout_safety_check: bool
|
|
@@ -325,7 +326,7 @@ module Aws::KMS
|
|
|
325
326
|
class GenerateDataKeyPairRequest
|
|
326
327
|
attr_accessor encryption_context: ::Hash[::String, ::String]
|
|
327
328
|
attr_accessor key_id: ::String
|
|
328
|
-
attr_accessor key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2")
|
|
329
|
+
attr_accessor key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2" | "ECC_NIST_EDWARDS25519")
|
|
329
330
|
attr_accessor grant_tokens: ::Array[::String]
|
|
330
331
|
attr_accessor recipient: Types::RecipientInfo
|
|
331
332
|
attr_accessor dry_run: bool
|
|
@@ -337,7 +338,7 @@ module Aws::KMS
|
|
|
337
338
|
attr_accessor private_key_plaintext: ::String
|
|
338
339
|
attr_accessor public_key: ::String
|
|
339
340
|
attr_accessor key_id: ::String
|
|
340
|
-
attr_accessor key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2")
|
|
341
|
+
attr_accessor key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2" | "ECC_NIST_EDWARDS25519")
|
|
341
342
|
attr_accessor ciphertext_for_recipient: ::String
|
|
342
343
|
attr_accessor key_material_id: ::String
|
|
343
344
|
SENSITIVE: [:private_key_plaintext]
|
|
@@ -346,7 +347,7 @@ module Aws::KMS
|
|
|
346
347
|
class GenerateDataKeyPairWithoutPlaintextRequest
|
|
347
348
|
attr_accessor encryption_context: ::Hash[::String, ::String]
|
|
348
349
|
attr_accessor key_id: ::String
|
|
349
|
-
attr_accessor key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2")
|
|
350
|
+
attr_accessor key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2" | "ECC_NIST_EDWARDS25519")
|
|
350
351
|
attr_accessor grant_tokens: ::Array[::String]
|
|
351
352
|
attr_accessor dry_run: bool
|
|
352
353
|
SENSITIVE: []
|
|
@@ -356,7 +357,7 @@ module Aws::KMS
|
|
|
356
357
|
attr_accessor private_key_ciphertext_blob: ::String
|
|
357
358
|
attr_accessor public_key: ::String
|
|
358
359
|
attr_accessor key_id: ::String
|
|
359
|
-
attr_accessor key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2")
|
|
360
|
+
attr_accessor key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2" | "ECC_NIST_EDWARDS25519")
|
|
360
361
|
attr_accessor key_material_id: ::String
|
|
361
362
|
SENSITIVE: []
|
|
362
363
|
end
|
|
@@ -478,10 +479,10 @@ module Aws::KMS
|
|
|
478
479
|
attr_accessor key_id: ::String
|
|
479
480
|
attr_accessor public_key: ::String
|
|
480
481
|
attr_accessor customer_master_key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2")
|
|
481
|
-
attr_accessor key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87")
|
|
482
|
+
attr_accessor key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87" | "ECC_NIST_EDWARDS25519")
|
|
482
483
|
attr_accessor key_usage: ("SIGN_VERIFY" | "ENCRYPT_DECRYPT" | "GENERATE_VERIFY_MAC" | "KEY_AGREEMENT")
|
|
483
484
|
attr_accessor encryption_algorithms: ::Array[("SYMMETRIC_DEFAULT" | "RSAES_OAEP_SHA_1" | "RSAES_OAEP_SHA_256" | "SM2PKE")]
|
|
484
|
-
attr_accessor signing_algorithms: ::Array[("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")]
|
|
485
|
+
attr_accessor signing_algorithms: ::Array[("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512")]
|
|
485
486
|
attr_accessor key_agreement_algorithms: ::Array[("ECDH")]
|
|
486
487
|
SENSITIVE: []
|
|
487
488
|
end
|
|
@@ -621,9 +622,9 @@ module Aws::KMS
|
|
|
621
622
|
attr_accessor expiration_model: ("KEY_MATERIAL_EXPIRES" | "KEY_MATERIAL_DOES_NOT_EXPIRE")
|
|
622
623
|
attr_accessor key_manager: ("AWS" | "CUSTOMER")
|
|
623
624
|
attr_accessor customer_master_key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2")
|
|
624
|
-
attr_accessor key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87")
|
|
625
|
+
attr_accessor key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87" | "ECC_NIST_EDWARDS25519")
|
|
625
626
|
attr_accessor encryption_algorithms: ::Array[("SYMMETRIC_DEFAULT" | "RSAES_OAEP_SHA_1" | "RSAES_OAEP_SHA_256" | "SM2PKE")]
|
|
626
|
-
attr_accessor signing_algorithms: ::Array[("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")]
|
|
627
|
+
attr_accessor signing_algorithms: ::Array[("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512")]
|
|
627
628
|
attr_accessor key_agreement_algorithms: ::Array[("ECDH")]
|
|
628
629
|
attr_accessor multi_region: bool
|
|
629
630
|
attr_accessor multi_region_configuration: Types::MultiRegionConfiguration
|
|
@@ -845,7 +846,7 @@ module Aws::KMS
|
|
|
845
846
|
attr_accessor key_material_id: ::String
|
|
846
847
|
attr_accessor key_material_description: ::String
|
|
847
848
|
attr_accessor import_state: ("IMPORTED" | "PENDING_IMPORT")
|
|
848
|
-
attr_accessor key_material_state: ("NON_CURRENT" | "CURRENT" | "PENDING_ROTATION")
|
|
849
|
+
attr_accessor key_material_state: ("NON_CURRENT" | "CURRENT" | "PENDING_ROTATION" | "PENDING_MULTI_REGION_IMPORT_AND_ROTATION")
|
|
849
850
|
attr_accessor expiration_model: ("KEY_MATERIAL_EXPIRES" | "KEY_MATERIAL_DOES_NOT_EXPIRE")
|
|
850
851
|
attr_accessor valid_to: ::Time
|
|
851
852
|
attr_accessor rotation_date: ::Time
|
|
@@ -872,7 +873,7 @@ module Aws::KMS
|
|
|
872
873
|
attr_accessor message: ::String
|
|
873
874
|
attr_accessor message_type: ("RAW" | "DIGEST" | "EXTERNAL_MU")
|
|
874
875
|
attr_accessor grant_tokens: ::Array[::String]
|
|
875
|
-
attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")
|
|
876
|
+
attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512")
|
|
876
877
|
attr_accessor dry_run: bool
|
|
877
878
|
SENSITIVE: [:message]
|
|
878
879
|
end
|
|
@@ -880,7 +881,7 @@ module Aws::KMS
|
|
|
880
881
|
class SignResponse
|
|
881
882
|
attr_accessor key_id: ::String
|
|
882
883
|
attr_accessor signature: ::String
|
|
883
|
-
attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")
|
|
884
|
+
attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512")
|
|
884
885
|
SENSITIVE: []
|
|
885
886
|
end
|
|
886
887
|
|
|
@@ -926,6 +927,7 @@ module Aws::KMS
|
|
|
926
927
|
attr_accessor xks_proxy_uri_endpoint: ::String
|
|
927
928
|
attr_accessor xks_proxy_uri_path: ::String
|
|
928
929
|
attr_accessor xks_proxy_vpc_endpoint_service_name: ::String
|
|
930
|
+
attr_accessor xks_proxy_vpc_endpoint_service_owner: ::String
|
|
929
931
|
attr_accessor xks_proxy_authentication_credential: Types::XksProxyAuthenticationCredentialType
|
|
930
932
|
attr_accessor xks_proxy_connectivity: ("PUBLIC_ENDPOINT" | "VPC_ENDPOINT_SERVICE")
|
|
931
933
|
SENSITIVE: [:key_store_password]
|
|
@@ -968,7 +970,7 @@ module Aws::KMS
|
|
|
968
970
|
attr_accessor message: ::String
|
|
969
971
|
attr_accessor message_type: ("RAW" | "DIGEST" | "EXTERNAL_MU")
|
|
970
972
|
attr_accessor signature: ::String
|
|
971
|
-
attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")
|
|
973
|
+
attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512")
|
|
972
974
|
attr_accessor grant_tokens: ::Array[::String]
|
|
973
975
|
attr_accessor dry_run: bool
|
|
974
976
|
SENSITIVE: [:message]
|
|
@@ -977,7 +979,7 @@ module Aws::KMS
|
|
|
977
979
|
class VerifyResponse
|
|
978
980
|
attr_accessor key_id: ::String
|
|
979
981
|
attr_accessor signature_valid: bool
|
|
980
|
-
attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")
|
|
982
|
+
attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512")
|
|
981
983
|
SENSITIVE: []
|
|
982
984
|
end
|
|
983
985
|
|
|
@@ -1013,6 +1015,7 @@ module Aws::KMS
|
|
|
1013
1015
|
attr_accessor uri_endpoint: ::String
|
|
1014
1016
|
attr_accessor uri_path: ::String
|
|
1015
1017
|
attr_accessor vpc_endpoint_service_name: ::String
|
|
1018
|
+
attr_accessor vpc_endpoint_service_owner: ::String
|
|
1016
1019
|
SENSITIVE: [:access_key_id]
|
|
1017
1020
|
end
|
|
1018
1021
|
|
metadata
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
|
2
2
|
name: aws-sdk-kms
|
|
3
3
|
version: !ruby/object:Gem::Version
|
|
4
|
-
version: 1.
|
|
4
|
+
version: 1.118.0
|
|
5
5
|
platform: ruby
|
|
6
6
|
authors:
|
|
7
7
|
- Amazon Web Services
|
|
@@ -18,7 +18,7 @@ dependencies:
|
|
|
18
18
|
version: '3'
|
|
19
19
|
- - ">="
|
|
20
20
|
- !ruby/object:Gem::Version
|
|
21
|
-
version: 3.
|
|
21
|
+
version: 3.239.1
|
|
22
22
|
type: :runtime
|
|
23
23
|
prerelease: false
|
|
24
24
|
version_requirements: !ruby/object:Gem::Requirement
|
|
@@ -28,7 +28,7 @@ dependencies:
|
|
|
28
28
|
version: '3'
|
|
29
29
|
- - ">="
|
|
30
30
|
- !ruby/object:Gem::Version
|
|
31
|
-
version: 3.
|
|
31
|
+
version: 3.239.1
|
|
32
32
|
- !ruby/object:Gem::Dependency
|
|
33
33
|
name: aws-sigv4
|
|
34
34
|
requirement: !ruby/object:Gem::Requirement
|