aws-sdk-kms 1.114.0 → 1.118.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: edc26d9f7be689e6da42647baf114ed5a61a15c83b62af7ba23fdaeb765d4b35
4
- data.tar.gz: 2783d59837929469fafe807454af59bdfd9973e8d9b34eb83287fc48c04b862b
3
+ metadata.gz: 9e2a68224f5a86c92b415535c7bef7f87cf196d5dd5ffbd46a3a75724fb210fe
4
+ data.tar.gz: 87ba5536876bed1393d07de29b509be6684217d0397aa3981bec94cb5e573bb5
5
5
  SHA512:
6
- metadata.gz: 9efb3b9915d5e6589df12d93580198fe7f0102c253496e6d3313405bce74d3b363ca5db9c44d9978ee5b2e592e1a93ae67fa7fee7ff10455eaa941d60f2a52f2
7
- data.tar.gz: 75f27fc673347a89a183ef8b5d0fc8285b6d547fe967301254cc0bcaf543b92514ff59a5efa0e13cdacbd4385f2eb2709b6c96d218abe428e24372eb8c88c578
6
+ metadata.gz: 26bfa9abee5b2cb9e02977f17a145247f4b1091d08a398864a5d84ff8b6849b026062b37a07e6c5e12dbb511f709628796200818a6e08e9e72e67197920b11ff
7
+ data.tar.gz: ddadc9d563a9613fa0f709ac71148ba6bf9449cf6e7848b0367484520ea6771ac6f38854ff1d230ce70455eed6706a9d05192d966d2d1e983f16fbb1c2cb5f33
data/CHANGELOG.md CHANGED
@@ -1,6 +1,26 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.118.0 (2025-11-21)
5
+ ------------------
6
+
7
+ * Feature - Support for on-demand rotation of AWS KMS Multi-Region keys with imported key material
8
+
9
+ 1.117.0 (2025-11-07)
10
+ ------------------
11
+
12
+ * Feature - Added support for new ECC_NIST_EDWARDS25519 AWS KMS key spec
13
+
14
+ 1.116.0 (2025-10-30)
15
+ ------------------
16
+
17
+ * Feature - Add cross account VPC endpoint service connectivity support to CustomKeyStore.
18
+
19
+ 1.115.0 (2025-10-21)
20
+ ------------------
21
+
22
+ * Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
23
+
4
24
  1.114.0 (2025-10-16)
5
25
  ------------------
6
26
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.114.0
1
+ 1.118.0
@@ -1083,6 +1083,13 @@ module Aws::KMS
1083
1083
  #
1084
1084
  # [1]: https://docs.aws.amazon.com/kms/latest/developerguide/create-xks-keystore.html#xks-requirements
1085
1085
  #
1086
+ # @option params [String] :xks_proxy_vpc_endpoint_service_owner
1087
+ # Specifies the Amazon Web Services account ID that owns the Amazon VPC
1088
+ # service endpoint for the interface that is used to communicate with
1089
+ # your external key store proxy (XKS proxy). This parameter is optional.
1090
+ # If not provided, the Amazon Web Services account ID calling the action
1091
+ # will be used.
1092
+ #
1086
1093
  # @option params [Types::XksProxyAuthenticationCredentialType] :xks_proxy_authentication_credential
1087
1094
  # Specifies an authentication credential for the external key store
1088
1095
  # proxy (XKS proxy). This parameter is required for all custom key
@@ -1209,6 +1216,7 @@ module Aws::KMS
1209
1216
  # xks_proxy_uri_endpoint: "XksProxyUriEndpointType",
1210
1217
  # xks_proxy_uri_path: "XksProxyUriPathType",
1211
1218
  # xks_proxy_vpc_endpoint_service_name: "XksProxyVpcEndpointServiceNameType",
1219
+ # xks_proxy_vpc_endpoint_service_owner: "AccountIdType",
1212
1220
  # xks_proxy_authentication_credential: {
1213
1221
  # access_key_id: "XksProxyAuthenticationAccessKeyIdType", # required
1214
1222
  # raw_secret_access_key: "XksProxyAuthenticationRawSecretAccessKeyType", # required
@@ -1568,8 +1576,8 @@ module Aws::KMS
1568
1576
  # download the public key so it can be used outside of KMS. Each KMS
1569
1577
  # key can have only one key usage. KMS keys with RSA key pairs can be
1570
1578
  # used to encrypt and decrypt data or sign and verify messages (but
1571
- # not both). KMS keys with NIST-recommended ECC key pairs can be used
1572
- # to sign and verify messages or derive shared secrets (but not both).
1579
+ # not both). KMS keys with NIST-standard ECC key pairs can be used to
1580
+ # sign and verify messages or derive shared secrets (but not both).
1573
1581
  # KMS keys with `ECC_SECG_P256K1` can be used only to sign and verify
1574
1582
  # messages. KMS keys with ML-DSA key pairs can be used to sign and
1575
1583
  # verify messages. KMS keys with SM2 key pairs (China Regions only)
@@ -1819,8 +1827,8 @@ module Aws::KMS
1819
1827
  # * For asymmetric KMS keys with RSA key pairs, specify
1820
1828
  # `ENCRYPT_DECRYPT` or `SIGN_VERIFY`.
1821
1829
  #
1822
- # * For asymmetric KMS keys with NIST-recommended elliptic curve key
1823
- # pairs, specify `SIGN_VERIFY` or `KEY_AGREEMENT`.
1830
+ # * For asymmetric KMS keys with NIST-standard elliptic curve key pairs,
1831
+ # specify `SIGN_VERIFY` or `KEY_AGREEMENT`.
1824
1832
  #
1825
1833
  # * For asymmetric KMS keys with `ECC_SECG_P256K1` key pairs, specify
1826
1834
  # `SIGN_VERIFY`.
@@ -1891,7 +1899,7 @@ module Aws::KMS
1891
1899
  # * `RSA_3072`
1892
1900
  #
1893
1901
  # * `RSA_4096`
1894
- # * Asymmetric NIST-recommended elliptic curve key pairs (signing and
1902
+ # * Asymmetric NIST-standard elliptic curve key pairs (signing and
1895
1903
  # verification -or- deriving shared secrets)
1896
1904
  #
1897
1905
  # * `ECC_NIST_P256` (secp256r1)
@@ -1899,6 +1907,17 @@ module Aws::KMS
1899
1907
  # * `ECC_NIST_P384` (secp384r1)
1900
1908
  #
1901
1909
  # * `ECC_NIST_P521` (secp521r1)
1910
+ #
1911
+ # * `ECC_NIST_EDWARDS25519` (ed25519) - signing and verification only
1912
+ #
1913
+ # * **Note:** For ECC\_NIST\_EDWARDS25519 KMS keys, the
1914
+ # ED25519\_SHA\_512 signing algorithm requires [ `MessageType:RAW`
1915
+ # ](kms/latest/APIReference/API_Sign.html#KMS-Sign-request-MessageType),
1916
+ # while ED25519\_PH\_SHA\_512 requires [ `MessageType:DIGEST`
1917
+ # ](kms/latest/APIReference/API_Sign.html#KMS-Sign-request-MessageType).
1918
+ # These message types cannot be used interchangeably.
1919
+ #
1920
+ # ^
1902
1921
  # * Other asymmetric elliptic curve key pairs (signing and verification)
1903
1922
  #
1904
1923
  # * `ECC_SECG_P256K1` (secp256k1), commonly used for cryptocurrencies.
@@ -2414,7 +2433,7 @@ module Aws::KMS
2414
2433
  # description: "DescriptionType",
2415
2434
  # key_usage: "SIGN_VERIFY", # accepts SIGN_VERIFY, ENCRYPT_DECRYPT, GENERATE_VERIFY_MAC, KEY_AGREEMENT
2416
2435
  # customer_master_key_spec: "RSA_2048", # accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1, SYMMETRIC_DEFAULT, HMAC_224, HMAC_256, HMAC_384, HMAC_512, SM2
2417
- # key_spec: "RSA_2048", # accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1, SYMMETRIC_DEFAULT, HMAC_224, HMAC_256, HMAC_384, HMAC_512, SM2, ML_DSA_44, ML_DSA_65, ML_DSA_87
2436
+ # key_spec: "RSA_2048", # accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1, SYMMETRIC_DEFAULT, HMAC_224, HMAC_256, HMAC_384, HMAC_512, SM2, ML_DSA_44, ML_DSA_65, ML_DSA_87, ECC_NIST_EDWARDS25519
2418
2437
  # origin: "AWS_KMS", # accepts AWS_KMS, EXTERNAL, AWS_CLOUDHSM, EXTERNAL_KEY_STORE
2419
2438
  # custom_key_store_id: "CustomKeyStoreIdType",
2420
2439
  # bypass_policy_lockout_safety_check: false,
@@ -2446,11 +2465,11 @@ module Aws::KMS
2446
2465
  # resp.key_metadata.expiration_model #=> String, one of "KEY_MATERIAL_EXPIRES", "KEY_MATERIAL_DOES_NOT_EXPIRE"
2447
2466
  # resp.key_metadata.key_manager #=> String, one of "AWS", "CUSTOMER"
2448
2467
  # resp.key_metadata.customer_master_key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2"
2449
- # resp.key_metadata.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2", "ML_DSA_44", "ML_DSA_65", "ML_DSA_87"
2468
+ # resp.key_metadata.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2", "ML_DSA_44", "ML_DSA_65", "ML_DSA_87", "ECC_NIST_EDWARDS25519"
2450
2469
  # resp.key_metadata.encryption_algorithms #=> Array
2451
2470
  # resp.key_metadata.encryption_algorithms[0] #=> String, one of "SYMMETRIC_DEFAULT", "RSAES_OAEP_SHA_1", "RSAES_OAEP_SHA_256", "SM2PKE"
2452
2471
  # resp.key_metadata.signing_algorithms #=> Array
2453
- # resp.key_metadata.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256"
2472
+ # resp.key_metadata.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256", "ED25519_SHA_512", "ED25519_PH_SHA_512"
2454
2473
  # resp.key_metadata.key_agreement_algorithms #=> Array
2455
2474
  # resp.key_metadata.key_agreement_algorithms[0] #=> String, one of "ECDH"
2456
2475
  # resp.key_metadata.multi_region #=> Boolean
@@ -2987,6 +3006,16 @@ module Aws::KMS
2987
3006
  # operation does not change the KMS key's state. Otherwise, it changes
2988
3007
  # the KMS key's state to `PendingImport`.
2989
3008
  #
3009
+ # **Considerations for multi-Region symmetric encryption keys**
3010
+ #
3011
+ # * When you delete the key material of a primary Region key that is in
3012
+ # `PENDING_ROTATION` or
3013
+ # `PENDING_MULTI_REGION_IMPORT_AND_ROTATION`state, you'll also be
3014
+ # deleting the key materials for the replica Region keys.
3015
+ #
3016
+ # * If you delete any key material of a replica Region key, the primary
3017
+ # Region key and other replica Region keys remain unchanged.
3018
+ #
2990
3019
  # The KMS key that you use for this operation must be in a compatible
2991
3020
  # key state. For details, see [Key states of KMS keys][2] in the *Key
2992
3021
  # Management Service Developer Guide*.
@@ -3078,8 +3107,8 @@ module Aws::KMS
3078
3107
 
3079
3108
  # Derives a shared secret using a key agreement algorithm.
3080
3109
  #
3081
- # <note markdown="1"> You must use an asymmetric NIST-recommended elliptic curve (ECC) or
3082
- # SM2 (China Regions only) KMS key pair with a `KeyUsage` value of
3110
+ # <note markdown="1"> You must use an asymmetric NIST-standard elliptic curve (ECC) or SM2
3111
+ # (China Regions only) KMS key pair with a `KeyUsage` value of
3083
3112
  # `KEY_AGREEMENT` to call DeriveSharedSecret.
3084
3113
  #
3085
3114
  # </note>
@@ -3100,15 +3129,15 @@ module Aws::KMS
3100
3129
  # 1. **Alice** calls CreateKey to create an asymmetric KMS key pair
3101
3130
  # with a `KeyUsage` value of `KEY_AGREEMENT`.
3102
3131
  #
3103
- # The asymmetric KMS key must use a NIST-recommended elliptic curve
3132
+ # The asymmetric KMS key must use a NIST-standard elliptic curve
3104
3133
  # (ECC) or SM2 (China Regions only) key spec.
3105
3134
  #
3106
3135
  # 2. **Bob** creates an elliptic curve key pair.
3107
3136
  #
3108
3137
  # Bob can call CreateKey to create an asymmetric KMS key pair or
3109
3138
  # generate a key pair outside of KMS. Bob's key pair must use the
3110
- # same NIST-recommended elliptic curve (ECC) or SM2 (China Regions
3111
- # ony) curve as Alice.
3139
+ # same NIST-standard elliptic curve (ECC) or SM2 (China Regions ony)
3140
+ # curve as Alice.
3112
3141
  #
3113
3142
  # 3. Alice and Bob **exchange their public keys** through an insecure
3114
3143
  # communication channel (like the internet).
@@ -3135,12 +3164,12 @@ module Aws::KMS
3135
3164
  # his private key and Alice's public key.
3136
3165
  #
3137
3166
  # To derive a shared secret you must provide a key agreement algorithm,
3138
- # the private key of the caller's asymmetric NIST-recommended elliptic
3167
+ # the private key of the caller's asymmetric NIST-standard elliptic
3139
3168
  # curve or SM2 (China Regions only) KMS key pair, and the public key
3140
- # from your peer's NIST-recommended elliptic curve or SM2 (China
3141
- # Regions only) key pair. The public key can be from another asymmetric
3142
- # KMS key pair or from a key pair generated outside of KMS, but both key
3143
- # pairs must be on the same elliptic curve.
3169
+ # from your peer's NIST-standard elliptic curve or SM2 (China Regions
3170
+ # only) key pair. The public key can be from another asymmetric KMS key
3171
+ # pair or from a key pair generated outside of KMS, but both key pairs
3172
+ # must be on the same elliptic curve.
3144
3173
  #
3145
3174
  # The KMS key that you use for this operation must be in a compatible
3146
3175
  # key state. For details, see [Key states of KMS keys][3] in the *Key
@@ -3172,9 +3201,9 @@ module Aws::KMS
3172
3201
  # [5]: https://docs.aws.amazon.com/kms/latest/developerguide/accessing-kms.html#programming-eventual-consistency
3173
3202
  #
3174
3203
  # @option params [required, String] :key_id
3175
- # Identifies an asymmetric NIST-recommended ECC or SM2 (China Regions
3176
- # only) KMS key. KMS uses the private key in the specified key pair to
3177
- # derive the shared secret. The key usage of the KMS key must be
3204
+ # Identifies an asymmetric NIST-standard ECC or SM2 (China Regions only)
3205
+ # KMS key. KMS uses the private key in the specified key pair to derive
3206
+ # the shared secret. The key usage of the KMS key must be
3178
3207
  # `KEY_AGREEMENT`. To find the `KeyUsage` of a KMS key, use the
3179
3208
  # DescribeKey operation.
3180
3209
  #
@@ -3202,8 +3231,8 @@ module Aws::KMS
3202
3231
  # secret. The only valid value is `ECDH`.
3203
3232
  #
3204
3233
  # @option params [required, String, StringIO, File] :public_key
3205
- # Specifies the public key in your peer's NIST-recommended elliptic
3206
- # curve (ECC) or SM2 (China Regions only) key pair.
3234
+ # Specifies the public key in your peer's NIST-standard elliptic curve
3235
+ # (ECC) or SM2 (China Regions only) key pair.
3207
3236
  #
3208
3237
  # The public key must be a DER-encoded X.509 public key, also known as
3209
3238
  # `SubjectPublicKeyInfo` (SPKI), as defined in [RFC 5280][1].
@@ -3593,6 +3622,7 @@ module Aws::KMS
3593
3622
  # resp.custom_key_stores[0].xks_proxy_configuration.uri_endpoint #=> String
3594
3623
  # resp.custom_key_stores[0].xks_proxy_configuration.uri_path #=> String
3595
3624
  # resp.custom_key_stores[0].xks_proxy_configuration.vpc_endpoint_service_name #=> String
3625
+ # resp.custom_key_stores[0].xks_proxy_configuration.vpc_endpoint_service_owner #=> String
3596
3626
  # resp.next_marker #=> String
3597
3627
  # resp.truncated #=> Boolean
3598
3628
  #
@@ -3966,11 +3996,11 @@ module Aws::KMS
3966
3996
  # resp.key_metadata.expiration_model #=> String, one of "KEY_MATERIAL_EXPIRES", "KEY_MATERIAL_DOES_NOT_EXPIRE"
3967
3997
  # resp.key_metadata.key_manager #=> String, one of "AWS", "CUSTOMER"
3968
3998
  # resp.key_metadata.customer_master_key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2"
3969
- # resp.key_metadata.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2", "ML_DSA_44", "ML_DSA_65", "ML_DSA_87"
3999
+ # resp.key_metadata.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2", "ML_DSA_44", "ML_DSA_65", "ML_DSA_87", "ECC_NIST_EDWARDS25519"
3970
4000
  # resp.key_metadata.encryption_algorithms #=> Array
3971
4001
  # resp.key_metadata.encryption_algorithms[0] #=> String, one of "SYMMETRIC_DEFAULT", "RSAES_OAEP_SHA_1", "RSAES_OAEP_SHA_256", "SM2PKE"
3972
4002
  # resp.key_metadata.signing_algorithms #=> Array
3973
- # resp.key_metadata.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256"
4003
+ # resp.key_metadata.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256", "ED25519_SHA_512", "ED25519_PH_SHA_512"
3974
4004
  # resp.key_metadata.key_agreement_algorithms #=> Array
3975
4005
  # resp.key_metadata.key_agreement_algorithms[0] #=> String, one of "ECDH"
3976
4006
  # resp.key_metadata.multi_region #=> Boolean
@@ -5349,7 +5379,7 @@ module Aws::KMS
5349
5379
  # "EncryptionContextKey" => "EncryptionContextValue",
5350
5380
  # },
5351
5381
  # key_id: "KeyIdType", # required
5352
- # key_pair_spec: "RSA_2048", # required, accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1, SM2
5382
+ # key_pair_spec: "RSA_2048", # required, accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1, SM2, ECC_NIST_EDWARDS25519
5353
5383
  # grant_tokens: ["GrantTokenType"],
5354
5384
  # recipient: {
5355
5385
  # key_encryption_algorithm: "RSAES_OAEP_SHA_256", # accepts RSAES_OAEP_SHA_256
@@ -5364,7 +5394,7 @@ module Aws::KMS
5364
5394
  # resp.private_key_plaintext #=> String
5365
5395
  # resp.public_key #=> String
5366
5396
  # resp.key_id #=> String
5367
- # resp.key_pair_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SM2"
5397
+ # resp.key_pair_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SM2", "ECC_NIST_EDWARDS25519"
5368
5398
  # resp.ciphertext_for_recipient #=> String
5369
5399
  # resp.key_material_id #=> String
5370
5400
  #
@@ -5567,7 +5597,7 @@ module Aws::KMS
5567
5597
  # "EncryptionContextKey" => "EncryptionContextValue",
5568
5598
  # },
5569
5599
  # key_id: "KeyIdType", # required
5570
- # key_pair_spec: "RSA_2048", # required, accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1, SM2
5600
+ # key_pair_spec: "RSA_2048", # required, accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1, SM2, ECC_NIST_EDWARDS25519
5571
5601
  # grant_tokens: ["GrantTokenType"],
5572
5602
  # dry_run: false,
5573
5603
  # })
@@ -5577,7 +5607,7 @@ module Aws::KMS
5577
5607
  # resp.private_key_ciphertext_blob #=> String
5578
5608
  # resp.public_key #=> String
5579
5609
  # resp.key_id #=> String
5580
- # resp.key_pair_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SM2"
5610
+ # resp.key_pair_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SM2", "ECC_NIST_EDWARDS25519"
5581
5611
  # resp.key_material_id #=> String
5582
5612
  #
5583
5613
  # @see http://docs.aws.amazon.com/goto/WebAPI/kms-2014-11-01/GenerateDataKeyPairWithoutPlaintext AWS API Documentation
@@ -6741,12 +6771,12 @@ module Aws::KMS
6741
6771
  # resp.key_id #=> String
6742
6772
  # resp.public_key #=> String
6743
6773
  # resp.customer_master_key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2"
6744
- # resp.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2", "ML_DSA_44", "ML_DSA_65", "ML_DSA_87"
6774
+ # resp.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2", "ML_DSA_44", "ML_DSA_65", "ML_DSA_87", "ECC_NIST_EDWARDS25519"
6745
6775
  # resp.key_usage #=> String, one of "SIGN_VERIFY", "ENCRYPT_DECRYPT", "GENERATE_VERIFY_MAC", "KEY_AGREEMENT"
6746
6776
  # resp.encryption_algorithms #=> Array
6747
6777
  # resp.encryption_algorithms[0] #=> String, one of "SYMMETRIC_DEFAULT", "RSAES_OAEP_SHA_1", "RSAES_OAEP_SHA_256", "SM2PKE"
6748
6778
  # resp.signing_algorithms #=> Array
6749
- # resp.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256"
6779
+ # resp.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256", "ED25519_SHA_512", "ED25519_PH_SHA_512"
6750
6780
  # resp.key_agreement_algorithms #=> Array
6751
6781
  # resp.key_agreement_algorithms[0] #=> String, one of "ECDH"
6752
6782
  #
@@ -6769,10 +6799,28 @@ module Aws::KMS
6769
6799
  # information about importing key material, see [Importing key
6770
6800
  # material][1].
6771
6801
  #
6772
- # For asymmetric, HMAC and multi-Region keys, you cannot change the key
6773
- # material after the initial import. You can import multiple key
6774
- # materials into single-Region, symmetric encryption keys and rotate the
6775
- # key material on demand using `RotateKeyOnDemand`.
6802
+ # For asymmetric and HMAC keys, you cannot change the key material after
6803
+ # the initial import. You can import multiple key materials into
6804
+ # symmetric encryption keys and rotate the key material on demand using
6805
+ # `RotateKeyOnDemand`.
6806
+ #
6807
+ # You can import new key materials into multi-Region symmetric
6808
+ # encryption keys. To do so, you must import the new key material into
6809
+ # the primary Region key. Then you can import the same key materials
6810
+ # into the replica Region keys. You cannot directly import new key
6811
+ # material into the replica Region keys.
6812
+ #
6813
+ # To import new key material for a multi-Region symmetric key, you’ll
6814
+ # need to complete the following:
6815
+ #
6816
+ # 1. Call `ImportKeyMaterial` on the primary Region key with the
6817
+ # `ImportType`set to `NEW_KEY_MATERIAL`.
6818
+ #
6819
+ # 2. Call `ImportKeyMaterial` on the replica Region key with the
6820
+ # `ImportType` set to `EXISTING_KEY_MATERIAL` using the same key
6821
+ # material imported to the primary Region key. You must do this for
6822
+ # every replica Region key before you can perform the
6823
+ # RotateKeyOnDemand operation on the primary Region key.
6776
6824
  #
6777
6825
  # After you import key material, you can [reimport the same key
6778
6826
  # material][2] into that KMS key or, if the key supports on-demand
@@ -6814,10 +6862,10 @@ module Aws::KMS
6814
6862
  #
6815
6863
  # * The key ID or key ARN of the KMS key to associate with the imported
6816
6864
  # key material. Its `Origin` must be `EXTERNAL` and its `KeyState`
6817
- # must be `PendingImport`. You cannot perform this operation on a KMS
6818
- # key in a [custom key store][5], or on a KMS key in a different
6819
- # Amazon Web Services account. To get the `Origin` and `KeyState` of a
6820
- # KMS key, call DescribeKey.
6865
+ # must be `PendingImport` or `Enabled`. You cannot perform this
6866
+ # operation on a KMS key in a [custom key store][5], or on a KMS key
6867
+ # in a different Amazon Web Services account. To get the `Origin` and
6868
+ # `KeyState` of a KMS key, call DescribeKey.
6821
6869
  #
6822
6870
  # * The encrypted key material.
6823
6871
  #
@@ -6837,13 +6885,12 @@ module Aws::KMS
6837
6885
  # Each time you reimport, you can eliminate or reset the expiration
6838
6886
  # time.
6839
6887
  #
6840
- # When this operation is successful, the key state of the KMS key
6841
- # changes from `PendingImport` to `Enabled`, and you can use the KMS key
6842
- # in cryptographic operations. For single-Region, symmetric encryption
6843
- # keys, you will need to import all of the key materials associated with
6844
- # the KMS key to change its state to `Enabled`. Use the
6845
- # `ListKeyRotations` operation to list the ID and import state of each
6846
- # key material associated with a KMS key.
6888
+ # When this operation is successful, the state of the KMS key changes to
6889
+ # `Enabled`, and you can use the KMS key in cryptographic operations.
6890
+ # For symmetric encryption keys, you will need to import all of the key
6891
+ # materials associated with the KMS key to change its state to
6892
+ # `Enabled`. Use the `ListKeyRotations` operation to list the ID and
6893
+ # import state of each key material associated with a KMS key.
6847
6894
  #
6848
6895
  # If this operation fails, use the exception to help determine the
6849
6896
  # problem. If the error is related to the key material, the import
@@ -6971,6 +7018,12 @@ module Aws::KMS
6971
7018
  # material is imported, if this parameter is omitted then the parameter
6972
7019
  # defaults to `EXISTING_KEY_MATERIAL`.
6973
7020
  #
7021
+ # For multi-Region keys, you must first import new key material into the
7022
+ # primary Region key. You should use the `NEW_KEY_MATERIAL` import type
7023
+ # when importing key material into the primary Region key. Then, you can
7024
+ # import the same key material into the replica Region key. The import
7025
+ # type for the replica Region key should be `EXISTING_KEY_MATERIAL`.
7026
+ #
6974
7027
  # @option params [String] :key_material_description
6975
7028
  # Description for the key material being imported. This parameter is
6976
7029
  # optional and only usable with symmetric encryption keys. If you do not
@@ -7667,7 +7720,7 @@ module Aws::KMS
7667
7720
  # resp.rotations[0].key_material_id #=> String
7668
7721
  # resp.rotations[0].key_material_description #=> String
7669
7722
  # resp.rotations[0].import_state #=> String, one of "IMPORTED", "PENDING_IMPORT"
7670
- # resp.rotations[0].key_material_state #=> String, one of "NON_CURRENT", "CURRENT", "PENDING_ROTATION"
7723
+ # resp.rotations[0].key_material_state #=> String, one of "NON_CURRENT", "CURRENT", "PENDING_ROTATION", "PENDING_MULTI_REGION_IMPORT_AND_ROTATION"
7671
7724
  # resp.rotations[0].expiration_model #=> String, one of "KEY_MATERIAL_EXPIRES", "KEY_MATERIAL_DOES_NOT_EXPIRE"
7672
7725
  # resp.rotations[0].valid_to #=> Time
7673
7726
  # resp.rotations[0].rotation_date #=> Time
@@ -8919,11 +8972,11 @@ module Aws::KMS
8919
8972
  # resp.replica_key_metadata.expiration_model #=> String, one of "KEY_MATERIAL_EXPIRES", "KEY_MATERIAL_DOES_NOT_EXPIRE"
8920
8973
  # resp.replica_key_metadata.key_manager #=> String, one of "AWS", "CUSTOMER"
8921
8974
  # resp.replica_key_metadata.customer_master_key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2"
8922
- # resp.replica_key_metadata.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2", "ML_DSA_44", "ML_DSA_65", "ML_DSA_87"
8975
+ # resp.replica_key_metadata.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2", "ML_DSA_44", "ML_DSA_65", "ML_DSA_87", "ECC_NIST_EDWARDS25519"
8923
8976
  # resp.replica_key_metadata.encryption_algorithms #=> Array
8924
8977
  # resp.replica_key_metadata.encryption_algorithms[0] #=> String, one of "SYMMETRIC_DEFAULT", "RSAES_OAEP_SHA_1", "RSAES_OAEP_SHA_256", "SM2PKE"
8925
8978
  # resp.replica_key_metadata.signing_algorithms #=> Array
8926
- # resp.replica_key_metadata.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256"
8979
+ # resp.replica_key_metadata.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256", "ED25519_SHA_512", "ED25519_PH_SHA_512"
8927
8980
  # resp.replica_key_metadata.key_agreement_algorithms #=> Array
8928
8981
  # resp.replica_key_metadata.key_agreement_algorithms[0] #=> String, one of "ECDH"
8929
8982
  # resp.replica_key_metadata.multi_region #=> Boolean
@@ -9200,30 +9253,31 @@ module Aws::KMS
9200
9253
  #
9201
9254
  # On-demand key rotation is supported only on symmetric encryption KMS
9202
9255
  # keys. You cannot perform on-demand rotation of [asymmetric KMS
9203
- # keys][3], [HMAC KMS keys][4], multi-Region KMS keys with [imported key
9204
- # material][5], or KMS keys in a [custom key store][6]. When you
9205
- # initiate on-demand key rotation on a symmetric encryption KMS key with
9206
- # imported key material, you must have already imported [new key
9207
- # material][7] and that key material's state should be
9256
+ # keys][3], [HMAC KMS keys][4], or KMS keys in a [custom key store][5].
9257
+ # When you initiate on-demand key rotation on a symmetric encryption KMS
9258
+ # key with imported key material, you must have already imported [new
9259
+ # key material][6] and that key material's state should be
9208
9260
  # `PENDING_ROTATION`. Use the `ListKeyRotations` operation to check the
9209
9261
  # state of all key materials associated with a KMS key. To perform
9210
- # on-demand rotation of a set of related [multi-Region keys][8], invoke
9211
- # the on-demand rotation on the primary key.
9262
+ # on-demand rotation of a set of related [multi-Region keys][7], import
9263
+ # new key material in the primary Region key, import the same key
9264
+ # material in each replica Region key, and invoke the on-demand rotation
9265
+ # on the primary Region key.
9212
9266
  #
9213
9267
  # You cannot initiate on-demand rotation of [Amazon Web Services managed
9214
- # KMS keys][9]. KMS always rotates the key material of Amazon Web
9268
+ # KMS keys][8]. KMS always rotates the key material of Amazon Web
9215
9269
  # Services managed keys every year. Rotation of [Amazon Web Services
9216
- # owned KMS keys][10] is managed by the Amazon Web Services service that
9270
+ # owned KMS keys][9] is managed by the Amazon Web Services service that
9217
9271
  # owns the key.
9218
9272
  #
9219
9273
  # The KMS key that you use for this operation must be in a compatible
9220
- # key state. For details, see [Key states of KMS keys][11] in the *Key
9274
+ # key state. For details, see [Key states of KMS keys][10] in the *Key
9221
9275
  # Management Service Developer Guide*.
9222
9276
  #
9223
9277
  # **Cross-account use**: No. You cannot perform this operation on a KMS
9224
9278
  # key in a different Amazon Web Services account.
9225
9279
  #
9226
- # **Required permissions**: [kms:RotateKeyOnDemand][12] (key policy)
9280
+ # **Required permissions**: [kms:RotateKeyOnDemand][11] (key policy)
9227
9281
  #
9228
9282
  # **Related operations:**
9229
9283
  #
@@ -9238,7 +9292,7 @@ module Aws::KMS
9238
9292
  # * ListKeyRotations
9239
9293
  #
9240
9294
  # **Eventual consistency**: The KMS API follows an eventual consistency
9241
- # model. For more information, see [KMS eventual consistency][13].
9295
+ # model. For more information, see [KMS eventual consistency][12].
9242
9296
  #
9243
9297
  #
9244
9298
  #
@@ -9246,15 +9300,14 @@ module Aws::KMS
9246
9300
  # [2]: https://docs.aws.amazon.com/kms/latest/developerguide/rotating-keys-enable-disable.html
9247
9301
  # [3]: https://docs.aws.amazon.com/kms/latest/developerguide/symmetric-asymmetric.html
9248
9302
  # [4]: https://docs.aws.amazon.com/kms/latest/developerguide/hmac.html
9249
- # [5]: https://docs.aws.amazon.com/kms/latest/developerguide/importing-keys.html
9250
- # [6]: https://docs.aws.amazon.com/kms/latest/developerguide/key-store-overview.html
9251
- # [7]: https://docs.aws.amazon.com/kms/latest/developerguide/importing-keys-import-key-material.html
9252
- # [8]: https://docs.aws.amazon.com/kms/latest/developerguide/rotate-keys.html#multi-region-rotate
9253
- # [9]: https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#aws-managed-key
9254
- # [10]: https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#aws-owned-key
9255
- # [11]: https://docs.aws.amazon.com/kms/latest/developerguide/key-state.html
9256
- # [12]: https://docs.aws.amazon.com/kms/latest/developerguide/kms-api-permissions-reference.html
9257
- # [13]: https://docs.aws.amazon.com/kms/latest/developerguide/accessing-kms.html#programming-eventual-consistency
9303
+ # [5]: https://docs.aws.amazon.com/kms/latest/developerguide/key-store-overview.html
9304
+ # [6]: https://docs.aws.amazon.com/kms/latest/developerguide/importing-keys-import-key-material.html
9305
+ # [7]: https://docs.aws.amazon.com/kms/latest/developerguide/rotate-keys.html#multi-region-rotate
9306
+ # [8]: https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#aws-managed-key
9307
+ # [9]: https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#aws-owned-key
9308
+ # [10]: https://docs.aws.amazon.com/kms/latest/developerguide/key-state.html
9309
+ # [11]: https://docs.aws.amazon.com/kms/latest/developerguide/kms-api-permissions-reference.html
9310
+ # [12]: https://docs.aws.amazon.com/kms/latest/developerguide/accessing-kms.html#programming-eventual-consistency
9258
9311
  #
9259
9312
  # @option params [required, String] :key_id
9260
9313
  # Identifies a symmetric encryption KMS key. You cannot perform
@@ -9596,6 +9649,13 @@ module Aws::KMS
9596
9649
  # with an unhashed message, the security of the signing operation can be
9597
9650
  # compromised.
9598
9651
  #
9652
+ # When using ECC\_NIST\_EDWARDS25519 KMS keys:
9653
+ #
9654
+ # * ED25519\_SHA\_512 signing algorithm requires KMS `MessageType:RAW`
9655
+ #
9656
+ # * ED25519\_PH\_SHA\_512 signing algorithm requires KMS
9657
+ # `MessageType:DIGEST`
9658
+ #
9599
9659
  # When the value of `MessageType` is `DIGEST`, the length of the
9600
9660
  # `Message` value must match the length of hashed messages for the
9601
9661
  # specified signing algorithm.
@@ -9715,7 +9775,7 @@ module Aws::KMS
9715
9775
  # message: "data", # required
9716
9776
  # message_type: "RAW", # accepts RAW, DIGEST, EXTERNAL_MU
9717
9777
  # grant_tokens: ["GrantTokenType"],
9718
- # signing_algorithm: "RSASSA_PSS_SHA_256", # required, accepts RSASSA_PSS_SHA_256, RSASSA_PSS_SHA_384, RSASSA_PSS_SHA_512, RSASSA_PKCS1_V1_5_SHA_256, RSASSA_PKCS1_V1_5_SHA_384, RSASSA_PKCS1_V1_5_SHA_512, ECDSA_SHA_256, ECDSA_SHA_384, ECDSA_SHA_512, SM2DSA, ML_DSA_SHAKE_256
9778
+ # signing_algorithm: "RSASSA_PSS_SHA_256", # required, accepts RSASSA_PSS_SHA_256, RSASSA_PSS_SHA_384, RSASSA_PSS_SHA_512, RSASSA_PKCS1_V1_5_SHA_256, RSASSA_PKCS1_V1_5_SHA_384, RSASSA_PKCS1_V1_5_SHA_512, ECDSA_SHA_256, ECDSA_SHA_384, ECDSA_SHA_512, SM2DSA, ML_DSA_SHAKE_256, ED25519_SHA_512, ED25519_PH_SHA_512
9719
9779
  # dry_run: false,
9720
9780
  # })
9721
9781
  #
@@ -9723,7 +9783,7 @@ module Aws::KMS
9723
9783
  #
9724
9784
  # resp.key_id #=> String
9725
9785
  # resp.signature #=> String
9726
- # resp.signing_algorithm #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256"
9786
+ # resp.signing_algorithm #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256", "ED25519_SHA_512", "ED25519_PH_SHA_512"
9727
9787
  #
9728
9788
  # @see http://docs.aws.amazon.com/goto/WebAPI/kms-2014-11-01/Sign AWS API Documentation
9729
9789
  #
@@ -10290,6 +10350,15 @@ module Aws::KMS
10290
10350
  #
10291
10351
  # To change this value, the external key store must be disconnected.
10292
10352
  #
10353
+ # @option params [String] :xks_proxy_vpc_endpoint_service_owner
10354
+ # Changes the Amazon Web Services account ID that KMS uses to identify
10355
+ # the Amazon VPC endpoint service for your external key store proxy (XKS
10356
+ # proxy). This parameter is optional. If not specified, the current
10357
+ # Amazon Web Services account ID for the VPC endpoint service will not
10358
+ # be updated.
10359
+ #
10360
+ # To change this value, the external key store must be disconnected.
10361
+ #
10293
10362
  # @option params [Types::XksProxyAuthenticationCredentialType] :xks_proxy_authentication_credential
10294
10363
  # Changes the credentials that KMS uses to sign requests to the external
10295
10364
  # key store proxy (XKS proxy). This parameter is valid only for custom
@@ -10431,6 +10500,7 @@ module Aws::KMS
10431
10500
  # xks_proxy_uri_endpoint: "XksProxyUriEndpointType",
10432
10501
  # xks_proxy_uri_path: "XksProxyUriPathType",
10433
10502
  # xks_proxy_vpc_endpoint_service_name: "XksProxyVpcEndpointServiceNameType",
10503
+ # xks_proxy_vpc_endpoint_service_owner: "AccountIdType",
10434
10504
  # xks_proxy_authentication_credential: {
10435
10505
  # access_key_id: "XksProxyAuthenticationAccessKeyIdType", # required
10436
10506
  # raw_secret_access_key: "XksProxyAuthenticationRawSecretAccessKeyType", # required
@@ -10782,6 +10852,13 @@ module Aws::KMS
10782
10852
  # with an unhashed message, the security of the signing operation can be
10783
10853
  # compromised.
10784
10854
  #
10855
+ # When using ECC\_NIST\_EDWARDS25519 KMS keys:
10856
+ #
10857
+ # * ED25519\_SHA\_512 signing algorithm requires KMS `MessageType:RAW`
10858
+ #
10859
+ # * ED25519\_PH\_SHA\_512 signing algorithm requires KMS
10860
+ # `MessageType:DIGEST`
10861
+ #
10785
10862
  # When the value of `MessageType` is `DIGEST`, the length of the
10786
10863
  # `Message` value must match the length of hashed messages for the
10787
10864
  # specified signing algorithm.
@@ -10902,7 +10979,7 @@ module Aws::KMS
10902
10979
  # message: "data", # required
10903
10980
  # message_type: "RAW", # accepts RAW, DIGEST, EXTERNAL_MU
10904
10981
  # signature: "data", # required
10905
- # signing_algorithm: "RSASSA_PSS_SHA_256", # required, accepts RSASSA_PSS_SHA_256, RSASSA_PSS_SHA_384, RSASSA_PSS_SHA_512, RSASSA_PKCS1_V1_5_SHA_256, RSASSA_PKCS1_V1_5_SHA_384, RSASSA_PKCS1_V1_5_SHA_512, ECDSA_SHA_256, ECDSA_SHA_384, ECDSA_SHA_512, SM2DSA, ML_DSA_SHAKE_256
10982
+ # signing_algorithm: "RSASSA_PSS_SHA_256", # required, accepts RSASSA_PSS_SHA_256, RSASSA_PSS_SHA_384, RSASSA_PSS_SHA_512, RSASSA_PKCS1_V1_5_SHA_256, RSASSA_PKCS1_V1_5_SHA_384, RSASSA_PKCS1_V1_5_SHA_512, ECDSA_SHA_256, ECDSA_SHA_384, ECDSA_SHA_512, SM2DSA, ML_DSA_SHAKE_256, ED25519_SHA_512, ED25519_PH_SHA_512
10906
10983
  # grant_tokens: ["GrantTokenType"],
10907
10984
  # dry_run: false,
10908
10985
  # })
@@ -10911,7 +10988,7 @@ module Aws::KMS
10911
10988
  #
10912
10989
  # resp.key_id #=> String
10913
10990
  # resp.signature_valid #=> Boolean
10914
- # resp.signing_algorithm #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256"
10991
+ # resp.signing_algorithm #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256", "ED25519_SHA_512", "ED25519_PH_SHA_512"
10915
10992
  #
10916
10993
  # @see http://docs.aws.amazon.com/goto/WebAPI/kms-2014-11-01/Verify AWS API Documentation
10917
10994
  #
@@ -11080,7 +11157,7 @@ module Aws::KMS
11080
11157
  tracer: tracer
11081
11158
  )
11082
11159
  context[:gem_name] = 'aws-sdk-kms'
11083
- context[:gem_version] = '1.114.0'
11160
+ context[:gem_version] = '1.118.0'
11084
11161
  Seahorse::Client::Request.new(handlers, context)
11085
11162
  end
11086
11163
 
@@ -15,6 +15,7 @@ module Aws::KMS
15
15
  include Seahorse::Model
16
16
 
17
17
  AWSAccountIdType = Shapes::StringShape.new(name: 'AWSAccountIdType')
18
+ AccountIdType = Shapes::StringShape.new(name: 'AccountIdType')
18
19
  AlgorithmSpec = Shapes::StringShape.new(name: 'AlgorithmSpec')
19
20
  AliasList = Shapes::ListShape.new(name: 'AliasList')
20
21
  AliasListEntry = Shapes::StructureShape.new(name: 'AliasListEntry')
@@ -308,6 +309,7 @@ module Aws::KMS
308
309
  CreateCustomKeyStoreRequest.add_member(:xks_proxy_uri_endpoint, Shapes::ShapeRef.new(shape: XksProxyUriEndpointType, location_name: "XksProxyUriEndpoint"))
309
310
  CreateCustomKeyStoreRequest.add_member(:xks_proxy_uri_path, Shapes::ShapeRef.new(shape: XksProxyUriPathType, location_name: "XksProxyUriPath"))
310
311
  CreateCustomKeyStoreRequest.add_member(:xks_proxy_vpc_endpoint_service_name, Shapes::ShapeRef.new(shape: XksProxyVpcEndpointServiceNameType, location_name: "XksProxyVpcEndpointServiceName"))
312
+ CreateCustomKeyStoreRequest.add_member(:xks_proxy_vpc_endpoint_service_owner, Shapes::ShapeRef.new(shape: AccountIdType, location_name: "XksProxyVpcEndpointServiceOwner"))
311
313
  CreateCustomKeyStoreRequest.add_member(:xks_proxy_authentication_credential, Shapes::ShapeRef.new(shape: XksProxyAuthenticationCredentialType, location_name: "XksProxyAuthenticationCredential"))
312
314
  CreateCustomKeyStoreRequest.add_member(:xks_proxy_connectivity, Shapes::ShapeRef.new(shape: XksProxyConnectivityType, location_name: "XksProxyConnectivity"))
313
315
  CreateCustomKeyStoreRequest.struct_class = Types::CreateCustomKeyStoreRequest
@@ -948,6 +950,7 @@ module Aws::KMS
948
950
  UpdateCustomKeyStoreRequest.add_member(:xks_proxy_uri_endpoint, Shapes::ShapeRef.new(shape: XksProxyUriEndpointType, location_name: "XksProxyUriEndpoint"))
949
951
  UpdateCustomKeyStoreRequest.add_member(:xks_proxy_uri_path, Shapes::ShapeRef.new(shape: XksProxyUriPathType, location_name: "XksProxyUriPath"))
950
952
  UpdateCustomKeyStoreRequest.add_member(:xks_proxy_vpc_endpoint_service_name, Shapes::ShapeRef.new(shape: XksProxyVpcEndpointServiceNameType, location_name: "XksProxyVpcEndpointServiceName"))
953
+ UpdateCustomKeyStoreRequest.add_member(:xks_proxy_vpc_endpoint_service_owner, Shapes::ShapeRef.new(shape: AccountIdType, location_name: "XksProxyVpcEndpointServiceOwner"))
951
954
  UpdateCustomKeyStoreRequest.add_member(:xks_proxy_authentication_credential, Shapes::ShapeRef.new(shape: XksProxyAuthenticationCredentialType, location_name: "XksProxyAuthenticationCredential"))
952
955
  UpdateCustomKeyStoreRequest.add_member(:xks_proxy_connectivity, Shapes::ShapeRef.new(shape: XksProxyConnectivityType, location_name: "XksProxyConnectivity"))
953
956
  UpdateCustomKeyStoreRequest.struct_class = Types::UpdateCustomKeyStoreRequest
@@ -1010,6 +1013,7 @@ module Aws::KMS
1010
1013
  XksProxyConfigurationType.add_member(:uri_endpoint, Shapes::ShapeRef.new(shape: XksProxyUriEndpointType, location_name: "UriEndpoint"))
1011
1014
  XksProxyConfigurationType.add_member(:uri_path, Shapes::ShapeRef.new(shape: XksProxyUriPathType, location_name: "UriPath"))
1012
1015
  XksProxyConfigurationType.add_member(:vpc_endpoint_service_name, Shapes::ShapeRef.new(shape: XksProxyVpcEndpointServiceNameType, location_name: "VpcEndpointServiceName"))
1016
+ XksProxyConfigurationType.add_member(:vpc_endpoint_service_owner, Shapes::ShapeRef.new(shape: AccountIdType, location_name: "VpcEndpointServiceOwner"))
1013
1017
  XksProxyConfigurationType.struct_class = Types::XksProxyConfigurationType
1014
1018
 
1015
1019
  XksProxyIncorrectAuthenticationCredentialException.add_member(:message, Shapes::ShapeRef.new(shape: ErrorMessageType, location_name: "message"))
@@ -485,6 +485,14 @@ module Aws::KMS
485
485
  # [1]: https://docs.aws.amazon.com/kms/latest/developerguide/create-xks-keystore.html#xks-requirements
486
486
  # @return [String]
487
487
  #
488
+ # @!attribute [rw] xks_proxy_vpc_endpoint_service_owner
489
+ # Specifies the Amazon Web Services account ID that owns the Amazon
490
+ # VPC service endpoint for the interface that is used to communicate
491
+ # with your external key store proxy (XKS proxy). This parameter is
492
+ # optional. If not provided, the Amazon Web Services account ID
493
+ # calling the action will be used.
494
+ # @return [String]
495
+ #
488
496
  # @!attribute [rw] xks_proxy_authentication_credential
489
497
  # Specifies an authentication credential for the external key store
490
498
  # proxy (XKS proxy). This parameter is required for all custom key
@@ -549,6 +557,7 @@ module Aws::KMS
549
557
  :xks_proxy_uri_endpoint,
550
558
  :xks_proxy_uri_path,
551
559
  :xks_proxy_vpc_endpoint_service_name,
560
+ :xks_proxy_vpc_endpoint_service_owner,
552
561
  :xks_proxy_authentication_credential,
553
562
  :xks_proxy_connectivity)
554
563
  SENSITIVE = [:key_store_password]
@@ -863,7 +872,7 @@ module Aws::KMS
863
872
  # * For asymmetric KMS keys with RSA key pairs, specify
864
873
  # `ENCRYPT_DECRYPT` or `SIGN_VERIFY`.
865
874
  #
866
- # * For asymmetric KMS keys with NIST-recommended elliptic curve key
875
+ # * For asymmetric KMS keys with NIST-standard elliptic curve key
867
876
  # pairs, specify `SIGN_VERIFY` or `KEY_AGREEMENT`.
868
877
  #
869
878
  # * For asymmetric KMS keys with `ECC_SECG_P256K1` key pairs, specify
@@ -938,7 +947,7 @@ module Aws::KMS
938
947
  # * `RSA_3072`
939
948
  #
940
949
  # * `RSA_4096`
941
- # * Asymmetric NIST-recommended elliptic curve key pairs (signing and
950
+ # * Asymmetric NIST-standard elliptic curve key pairs (signing and
942
951
  # verification -or- deriving shared secrets)
943
952
  #
944
953
  # * `ECC_NIST_P256` (secp256r1)
@@ -946,6 +955,19 @@ module Aws::KMS
946
955
  # * `ECC_NIST_P384` (secp384r1)
947
956
  #
948
957
  # * `ECC_NIST_P521` (secp521r1)
958
+ #
959
+ # * `ECC_NIST_EDWARDS25519` (ed25519) - signing and verification
960
+ # only
961
+ #
962
+ # * **Note:** For ECC\_NIST\_EDWARDS25519 KMS keys, the
963
+ # ED25519\_SHA\_512 signing algorithm requires [
964
+ # `MessageType:RAW`
965
+ # ](kms/latest/APIReference/API_Sign.html#KMS-Sign-request-MessageType),
966
+ # while ED25519\_PH\_SHA\_512 requires [ `MessageType:DIGEST`
967
+ # ](kms/latest/APIReference/API_Sign.html#KMS-Sign-request-MessageType).
968
+ # These message types cannot be used interchangeably.
969
+ #
970
+ # ^
949
971
  # * Other asymmetric elliptic curve key pairs (signing and
950
972
  # verification)
951
973
  #
@@ -1841,7 +1863,7 @@ module Aws::KMS
1841
1863
  end
1842
1864
 
1843
1865
  # @!attribute [rw] key_id
1844
- # Identifies an asymmetric NIST-recommended ECC or SM2 (China Regions
1866
+ # Identifies an asymmetric NIST-standard ECC or SM2 (China Regions
1845
1867
  # only) KMS key. KMS uses the private key in the specified key pair to
1846
1868
  # derive the shared secret. The key usage of the KMS key must be
1847
1869
  # `KEY_AGREEMENT`. To find the `KeyUsage` of a KMS key, use the
@@ -1873,7 +1895,7 @@ module Aws::KMS
1873
1895
  # @return [String]
1874
1896
  #
1875
1897
  # @!attribute [rw] public_key
1876
- # Specifies the public key in your peer's NIST-recommended elliptic
1898
+ # Specifies the public key in your peer's NIST-standard elliptic
1877
1899
  # curve (ECC) or SM2 (China Regions only) key pair.
1878
1900
  #
1879
1901
  # The public key must be a DER-encoded X.509 public key, also known as
@@ -3971,6 +3993,13 @@ module Aws::KMS
3971
3993
  # the parameter defaults to `NEW_KEY_MATERIAL`. After the first key
3972
3994
  # material is imported, if this parameter is omitted then the
3973
3995
  # parameter defaults to `EXISTING_KEY_MATERIAL`.
3996
+ #
3997
+ # For multi-Region keys, you must first import new key material into
3998
+ # the primary Region key. You should use the `NEW_KEY_MATERIAL` import
3999
+ # type when importing key material into the primary Region key. Then,
4000
+ # you can import the same key material into the replica Region key.
4001
+ # The import type for the replica Region key should be
4002
+ # `EXISTING_KEY_MATERIAL`.
3974
4003
  # @return [String]
3975
4004
  #
3976
4005
  # @!attribute [rw] key_material_description
@@ -4554,12 +4583,11 @@ module Aws::KMS
4554
4583
  #
4555
4584
  # @!attribute [rw] current_key_material_id
4556
4585
  # Identifies the current key material. This value is present for
4557
- # symmetric encryption keys with `AWS_KMS` origin and single-Region,
4558
- # symmetric encryption keys with `EXTERNAL` origin. These KMS keys
4559
- # support automatic or on-demand key rotation and can have multiple
4560
- # key materials associated with them. KMS uses the current key
4561
- # material for both encryption and decryption, and the non-current key
4562
- # material for decryption operations only.
4586
+ # symmetric encryption keys with `AWS_KMS` or `EXTERNAL` origin. These
4587
+ # KMS keys support automatic or on-demand key rotation and can have
4588
+ # multiple key materials associated with them. KMS uses the current
4589
+ # key material for both encryption and decryption, and the non-current
4590
+ # key material for decryption operations only.
4563
4591
  # @return [String]
4564
4592
  #
4565
4593
  # @see http://docs.aws.amazon.com/goto/WebAPI/kms-2014-11-01/KeyMetadata AWS API Documentation
@@ -5979,15 +6007,24 @@ module Aws::KMS
5979
6007
  # @return [String]
5980
6008
  #
5981
6009
  # @!attribute [rw] key_material_state
5982
- # There are three possible values for this field: `CURRENT`,
5983
- # `NON_CURRENT` and `PENDING_ROTATION`. KMS uses `CURRENT` key
5984
- # material for both encryption and decryption and `NON_CURRENT` key
5985
- # material only for decryption. `PENDING_ROTATION` identifies key
5986
- # material that has been imported for on-demand key rotation but the
5987
- # rotation hasn't completed. Key material in `PENDING_ROTATION` is
5988
- # not permanently associated with the KMS key. You can delete this key
5989
- # material and import different key material in its place. The
5990
- # `PENDING_ROTATION` value is only used in symmetric encryption keys
6010
+ # There are four possible values for this field: `CURRENT`,
6011
+ # `NON_CURRENT`, `PENDING_MULTI_REGION_IMPORT_AND_ROTATION` and
6012
+ # `PENDING_ROTATION`. KMS uses `CURRENT` key material for both
6013
+ # encryption and decryption and `NON_CURRENT` key material only for
6014
+ # decryption. `PENDING_ROTATION` identifies key material that has been
6015
+ # imported for on-demand key rotation but the rotation hasn't
6016
+ # completed. The key material state
6017
+ # `PENDING_MULTI_REGION_IMPORT_AND_ROTATION` is unique to
6018
+ # multi-region, symmetric encryption keys with imported key material.
6019
+ # It indicates key material that has been imported into the primary
6020
+ # Region key but not all of the replica Region keys. When this key
6021
+ # material is imported in to all of the replica Region keys, the key
6022
+ # material state will change to `PENDING_ROTATION`. Key material in
6023
+ # `PENDING_MULTI_REGION_IMPORT_AND_ROTATION` or `PENDING_ROTATION`
6024
+ # state is not permanently associated with the KMS key. You can delete
6025
+ # this key material and import different key material in its place.
6026
+ # The `PENDING_MULTI_REGION_IMPORT_AND_ROTATION` and
6027
+ # `PENDING_ROTATION` values are only used in symmetric encryption keys
5991
6028
  # with imported key material. The other values, `CURRENT` and
5992
6029
  # `NON_CURRENT`, are used for all KMS keys that support automatic or
5993
6030
  # on-demand key rotation.
@@ -6189,6 +6226,13 @@ module Aws::KMS
6189
6226
  # value with an unhashed message, the security of the signing
6190
6227
  # operation can be compromised.
6191
6228
  #
6229
+ # When using ECC\_NIST\_EDWARDS25519 KMS keys:
6230
+ #
6231
+ # * ED25519\_SHA\_512 signing algorithm requires KMS `MessageType:RAW`
6232
+ #
6233
+ # * ED25519\_PH\_SHA\_512 signing algorithm requires KMS
6234
+ # `MessageType:DIGEST`
6235
+ #
6192
6236
  # When the value of `MessageType` is `DIGEST`, the length of the
6193
6237
  # `Message` value must match the length of hashed messages for the
6194
6238
  # specified signing algorithm.
@@ -6596,6 +6640,16 @@ module Aws::KMS
6596
6640
  # To change this value, the external key store must be disconnected.
6597
6641
  # @return [String]
6598
6642
  #
6643
+ # @!attribute [rw] xks_proxy_vpc_endpoint_service_owner
6644
+ # Changes the Amazon Web Services account ID that KMS uses to identify
6645
+ # the Amazon VPC endpoint service for your external key store proxy
6646
+ # (XKS proxy). This parameter is optional. If not specified, the
6647
+ # current Amazon Web Services account ID for the VPC endpoint service
6648
+ # will not be updated.
6649
+ #
6650
+ # To change this value, the external key store must be disconnected.
6651
+ # @return [String]
6652
+ #
6599
6653
  # @!attribute [rw] xks_proxy_authentication_credential
6600
6654
  # Changes the credentials that KMS uses to sign requests to the
6601
6655
  # external key store proxy (XKS proxy). This parameter is valid only
@@ -6643,6 +6697,7 @@ module Aws::KMS
6643
6697
  :xks_proxy_uri_endpoint,
6644
6698
  :xks_proxy_uri_path,
6645
6699
  :xks_proxy_vpc_endpoint_service_name,
6700
+ :xks_proxy_vpc_endpoint_service_owner,
6646
6701
  :xks_proxy_authentication_credential,
6647
6702
  :xks_proxy_connectivity)
6648
6703
  SENSITIVE = [:key_store_password]
@@ -6872,6 +6927,13 @@ module Aws::KMS
6872
6927
  # value with an unhashed message, the security of the signing
6873
6928
  # operation can be compromised.
6874
6929
  #
6930
+ # When using ECC\_NIST\_EDWARDS25519 KMS keys:
6931
+ #
6932
+ # * ED25519\_SHA\_512 signing algorithm requires KMS `MessageType:RAW`
6933
+ #
6934
+ # * ED25519\_PH\_SHA\_512 signing algorithm requires KMS
6935
+ # `MessageType:DIGEST`
6936
+ #
6875
6937
  # When the value of `MessageType` is `DIGEST`, the length of the
6876
6938
  # `Message` value must match the length of hashed messages for the
6877
6939
  # specified signing algorithm.
@@ -7141,6 +7203,13 @@ module Aws::KMS
7141
7203
  # with KMS.
7142
7204
  # @return [String]
7143
7205
  #
7206
+ # @!attribute [rw] vpc_endpoint_service_owner
7207
+ # The Amazon Web Services account ID that owns the Amazon VPC endpoint
7208
+ # service used to communicate with the external key store proxy (XKS).
7209
+ # This field appears only when the XKS uses an VPC endpoint service to
7210
+ # communicate with KMS.
7211
+ # @return [String]
7212
+ #
7144
7213
  # @see http://docs.aws.amazon.com/goto/WebAPI/kms-2014-11-01/XksProxyConfigurationType AWS API Documentation
7145
7214
  #
7146
7215
  class XksProxyConfigurationType < Struct.new(
@@ -7148,7 +7217,8 @@ module Aws::KMS
7148
7217
  :access_key_id,
7149
7218
  :uri_endpoint,
7150
7219
  :uri_path,
7151
- :vpc_endpoint_service_name)
7220
+ :vpc_endpoint_service_name,
7221
+ :vpc_endpoint_service_owner)
7152
7222
  SENSITIVE = [:access_key_id]
7153
7223
  include Aws::Structure
7154
7224
  end
data/lib/aws-sdk-kms.rb CHANGED
@@ -54,7 +54,7 @@ module Aws::KMS
54
54
  autoload :EndpointProvider, 'aws-sdk-kms/endpoint_provider'
55
55
  autoload :Endpoints, 'aws-sdk-kms/endpoints'
56
56
 
57
- GEM_VERSION = '1.114.0'
57
+ GEM_VERSION = '1.118.0'
58
58
 
59
59
  end
60
60
 
data/sig/client.rbs CHANGED
@@ -119,6 +119,7 @@ module Aws
119
119
  ?xks_proxy_uri_endpoint: ::String,
120
120
  ?xks_proxy_uri_path: ::String,
121
121
  ?xks_proxy_vpc_endpoint_service_name: ::String,
122
+ ?xks_proxy_vpc_endpoint_service_owner: ::String,
122
123
  ?xks_proxy_authentication_credential: {
123
124
  access_key_id: ::String,
124
125
  raw_secret_access_key: ::String
@@ -158,7 +159,7 @@ module Aws
158
159
  ?description: ::String,
159
160
  ?key_usage: ("SIGN_VERIFY" | "ENCRYPT_DECRYPT" | "GENERATE_VERIFY_MAC" | "KEY_AGREEMENT"),
160
161
  ?customer_master_key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2"),
161
- ?key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87"),
162
+ ?key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87" | "ECC_NIST_EDWARDS25519"),
162
163
  ?origin: ("AWS_KMS" | "EXTERNAL" | "AWS_CLOUDHSM" | "EXTERNAL_KEY_STORE"),
163
164
  ?custom_key_store_id: ::String,
164
165
  ?bypass_policy_lockout_safety_check: bool,
@@ -351,7 +352,7 @@ module Aws
351
352
  def private_key_plaintext: () -> ::String
352
353
  def public_key: () -> ::String
353
354
  def key_id: () -> ::String
354
- def key_pair_spec: () -> ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2")
355
+ def key_pair_spec: () -> ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2" | "ECC_NIST_EDWARDS25519")
355
356
  def ciphertext_for_recipient: () -> ::String
356
357
  def key_material_id: () -> ::String
357
358
  end
@@ -359,7 +360,7 @@ module Aws
359
360
  def generate_data_key_pair: (
360
361
  ?encryption_context: Hash[::String, ::String],
361
362
  key_id: ::String,
362
- key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2"),
363
+ key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2" | "ECC_NIST_EDWARDS25519"),
363
364
  ?grant_tokens: Array[::String],
364
365
  ?recipient: {
365
366
  key_encryption_algorithm: ("RSAES_OAEP_SHA_256")?,
@@ -374,14 +375,14 @@ module Aws
374
375
  def private_key_ciphertext_blob: () -> ::String
375
376
  def public_key: () -> ::String
376
377
  def key_id: () -> ::String
377
- def key_pair_spec: () -> ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2")
378
+ def key_pair_spec: () -> ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2" | "ECC_NIST_EDWARDS25519")
378
379
  def key_material_id: () -> ::String
379
380
  end
380
381
  # https://docs.aws.amazon.com/sdk-for-ruby/v3/api/Aws/KMS/Client.html#generate_data_key_pair_without_plaintext-instance_method
381
382
  def generate_data_key_pair_without_plaintext: (
382
383
  ?encryption_context: Hash[::String, ::String],
383
384
  key_id: ::String,
384
- key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2"),
385
+ key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2" | "ECC_NIST_EDWARDS25519"),
385
386
  ?grant_tokens: Array[::String],
386
387
  ?dry_run: bool
387
388
  ) -> _GenerateDataKeyPairWithoutPlaintextResponseSuccess
@@ -482,10 +483,10 @@ module Aws
482
483
  def key_id: () -> ::String
483
484
  def public_key: () -> ::String
484
485
  def customer_master_key_spec: () -> ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2")
485
- def key_spec: () -> ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87")
486
+ def key_spec: () -> ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87" | "ECC_NIST_EDWARDS25519")
486
487
  def key_usage: () -> ("SIGN_VERIFY" | "ENCRYPT_DECRYPT" | "GENERATE_VERIFY_MAC" | "KEY_AGREEMENT")
487
488
  def encryption_algorithms: () -> ::Array[("SYMMETRIC_DEFAULT" | "RSAES_OAEP_SHA_1" | "RSAES_OAEP_SHA_256" | "SM2PKE")]
488
- def signing_algorithms: () -> ::Array[("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")]
489
+ def signing_algorithms: () -> ::Array[("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512")]
489
490
  def key_agreement_algorithms: () -> ::Array[("ECDH")]
490
491
  end
491
492
  # https://docs.aws.amazon.com/sdk-for-ruby/v3/api/Aws/KMS/Client.html#get_public_key-instance_method
@@ -713,7 +714,7 @@ module Aws
713
714
  include ::Seahorse::Client::_ResponseSuccess[Types::SignResponse]
714
715
  def key_id: () -> ::String
715
716
  def signature: () -> ::String
716
- def signing_algorithm: () -> ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")
717
+ def signing_algorithm: () -> ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512")
717
718
  end
718
719
  # https://docs.aws.amazon.com/sdk-for-ruby/v3/api/Aws/KMS/Client.html#sign-instance_method
719
720
  def sign: (
@@ -721,7 +722,7 @@ module Aws
721
722
  message: ::String,
722
723
  ?message_type: ("RAW" | "DIGEST" | "EXTERNAL_MU"),
723
724
  ?grant_tokens: Array[::String],
724
- signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256"),
725
+ signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512"),
725
726
  ?dry_run: bool
726
727
  ) -> _SignResponseSuccess
727
728
  | (Hash[Symbol, untyped] params, ?Hash[Symbol, untyped] options) -> _SignResponseSuccess
@@ -764,6 +765,7 @@ module Aws
764
765
  ?xks_proxy_uri_endpoint: ::String,
765
766
  ?xks_proxy_uri_path: ::String,
766
767
  ?xks_proxy_vpc_endpoint_service_name: ::String,
768
+ ?xks_proxy_vpc_endpoint_service_owner: ::String,
767
769
  ?xks_proxy_authentication_credential: {
768
770
  access_key_id: ::String,
769
771
  raw_secret_access_key: ::String
@@ -790,7 +792,7 @@ module Aws
790
792
  include ::Seahorse::Client::_ResponseSuccess[Types::VerifyResponse]
791
793
  def key_id: () -> ::String
792
794
  def signature_valid: () -> bool
793
- def signing_algorithm: () -> ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")
795
+ def signing_algorithm: () -> ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512")
794
796
  end
795
797
  # https://docs.aws.amazon.com/sdk-for-ruby/v3/api/Aws/KMS/Client.html#verify-instance_method
796
798
  def verify: (
@@ -798,7 +800,7 @@ module Aws
798
800
  message: ::String,
799
801
  ?message_type: ("RAW" | "DIGEST" | "EXTERNAL_MU"),
800
802
  signature: ::String,
801
- signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256"),
803
+ signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512"),
802
804
  ?grant_tokens: Array[::String],
803
805
  ?dry_run: bool
804
806
  ) -> _VerifyResponseSuccess
data/sig/types.rbs CHANGED
@@ -85,6 +85,7 @@ module Aws::KMS
85
85
  attr_accessor xks_proxy_uri_endpoint: ::String
86
86
  attr_accessor xks_proxy_uri_path: ::String
87
87
  attr_accessor xks_proxy_vpc_endpoint_service_name: ::String
88
+ attr_accessor xks_proxy_vpc_endpoint_service_owner: ::String
88
89
  attr_accessor xks_proxy_authentication_credential: Types::XksProxyAuthenticationCredentialType
89
90
  attr_accessor xks_proxy_connectivity: ("PUBLIC_ENDPOINT" | "VPC_ENDPOINT_SERVICE")
90
91
  SENSITIVE: [:key_store_password]
@@ -118,7 +119,7 @@ module Aws::KMS
118
119
  attr_accessor description: ::String
119
120
  attr_accessor key_usage: ("SIGN_VERIFY" | "ENCRYPT_DECRYPT" | "GENERATE_VERIFY_MAC" | "KEY_AGREEMENT")
120
121
  attr_accessor customer_master_key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2")
121
- attr_accessor key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87")
122
+ attr_accessor key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87" | "ECC_NIST_EDWARDS25519")
122
123
  attr_accessor origin: ("AWS_KMS" | "EXTERNAL" | "AWS_CLOUDHSM" | "EXTERNAL_KEY_STORE")
123
124
  attr_accessor custom_key_store_id: ::String
124
125
  attr_accessor bypass_policy_lockout_safety_check: bool
@@ -325,7 +326,7 @@ module Aws::KMS
325
326
  class GenerateDataKeyPairRequest
326
327
  attr_accessor encryption_context: ::Hash[::String, ::String]
327
328
  attr_accessor key_id: ::String
328
- attr_accessor key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2")
329
+ attr_accessor key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2" | "ECC_NIST_EDWARDS25519")
329
330
  attr_accessor grant_tokens: ::Array[::String]
330
331
  attr_accessor recipient: Types::RecipientInfo
331
332
  attr_accessor dry_run: bool
@@ -337,7 +338,7 @@ module Aws::KMS
337
338
  attr_accessor private_key_plaintext: ::String
338
339
  attr_accessor public_key: ::String
339
340
  attr_accessor key_id: ::String
340
- attr_accessor key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2")
341
+ attr_accessor key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2" | "ECC_NIST_EDWARDS25519")
341
342
  attr_accessor ciphertext_for_recipient: ::String
342
343
  attr_accessor key_material_id: ::String
343
344
  SENSITIVE: [:private_key_plaintext]
@@ -346,7 +347,7 @@ module Aws::KMS
346
347
  class GenerateDataKeyPairWithoutPlaintextRequest
347
348
  attr_accessor encryption_context: ::Hash[::String, ::String]
348
349
  attr_accessor key_id: ::String
349
- attr_accessor key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2")
350
+ attr_accessor key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2" | "ECC_NIST_EDWARDS25519")
350
351
  attr_accessor grant_tokens: ::Array[::String]
351
352
  attr_accessor dry_run: bool
352
353
  SENSITIVE: []
@@ -356,7 +357,7 @@ module Aws::KMS
356
357
  attr_accessor private_key_ciphertext_blob: ::String
357
358
  attr_accessor public_key: ::String
358
359
  attr_accessor key_id: ::String
359
- attr_accessor key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2")
360
+ attr_accessor key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2" | "ECC_NIST_EDWARDS25519")
360
361
  attr_accessor key_material_id: ::String
361
362
  SENSITIVE: []
362
363
  end
@@ -478,10 +479,10 @@ module Aws::KMS
478
479
  attr_accessor key_id: ::String
479
480
  attr_accessor public_key: ::String
480
481
  attr_accessor customer_master_key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2")
481
- attr_accessor key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87")
482
+ attr_accessor key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87" | "ECC_NIST_EDWARDS25519")
482
483
  attr_accessor key_usage: ("SIGN_VERIFY" | "ENCRYPT_DECRYPT" | "GENERATE_VERIFY_MAC" | "KEY_AGREEMENT")
483
484
  attr_accessor encryption_algorithms: ::Array[("SYMMETRIC_DEFAULT" | "RSAES_OAEP_SHA_1" | "RSAES_OAEP_SHA_256" | "SM2PKE")]
484
- attr_accessor signing_algorithms: ::Array[("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")]
485
+ attr_accessor signing_algorithms: ::Array[("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512")]
485
486
  attr_accessor key_agreement_algorithms: ::Array[("ECDH")]
486
487
  SENSITIVE: []
487
488
  end
@@ -621,9 +622,9 @@ module Aws::KMS
621
622
  attr_accessor expiration_model: ("KEY_MATERIAL_EXPIRES" | "KEY_MATERIAL_DOES_NOT_EXPIRE")
622
623
  attr_accessor key_manager: ("AWS" | "CUSTOMER")
623
624
  attr_accessor customer_master_key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2")
624
- attr_accessor key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87")
625
+ attr_accessor key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87" | "ECC_NIST_EDWARDS25519")
625
626
  attr_accessor encryption_algorithms: ::Array[("SYMMETRIC_DEFAULT" | "RSAES_OAEP_SHA_1" | "RSAES_OAEP_SHA_256" | "SM2PKE")]
626
- attr_accessor signing_algorithms: ::Array[("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")]
627
+ attr_accessor signing_algorithms: ::Array[("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512")]
627
628
  attr_accessor key_agreement_algorithms: ::Array[("ECDH")]
628
629
  attr_accessor multi_region: bool
629
630
  attr_accessor multi_region_configuration: Types::MultiRegionConfiguration
@@ -845,7 +846,7 @@ module Aws::KMS
845
846
  attr_accessor key_material_id: ::String
846
847
  attr_accessor key_material_description: ::String
847
848
  attr_accessor import_state: ("IMPORTED" | "PENDING_IMPORT")
848
- attr_accessor key_material_state: ("NON_CURRENT" | "CURRENT" | "PENDING_ROTATION")
849
+ attr_accessor key_material_state: ("NON_CURRENT" | "CURRENT" | "PENDING_ROTATION" | "PENDING_MULTI_REGION_IMPORT_AND_ROTATION")
849
850
  attr_accessor expiration_model: ("KEY_MATERIAL_EXPIRES" | "KEY_MATERIAL_DOES_NOT_EXPIRE")
850
851
  attr_accessor valid_to: ::Time
851
852
  attr_accessor rotation_date: ::Time
@@ -872,7 +873,7 @@ module Aws::KMS
872
873
  attr_accessor message: ::String
873
874
  attr_accessor message_type: ("RAW" | "DIGEST" | "EXTERNAL_MU")
874
875
  attr_accessor grant_tokens: ::Array[::String]
875
- attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")
876
+ attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512")
876
877
  attr_accessor dry_run: bool
877
878
  SENSITIVE: [:message]
878
879
  end
@@ -880,7 +881,7 @@ module Aws::KMS
880
881
  class SignResponse
881
882
  attr_accessor key_id: ::String
882
883
  attr_accessor signature: ::String
883
- attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")
884
+ attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512")
884
885
  SENSITIVE: []
885
886
  end
886
887
 
@@ -926,6 +927,7 @@ module Aws::KMS
926
927
  attr_accessor xks_proxy_uri_endpoint: ::String
927
928
  attr_accessor xks_proxy_uri_path: ::String
928
929
  attr_accessor xks_proxy_vpc_endpoint_service_name: ::String
930
+ attr_accessor xks_proxy_vpc_endpoint_service_owner: ::String
929
931
  attr_accessor xks_proxy_authentication_credential: Types::XksProxyAuthenticationCredentialType
930
932
  attr_accessor xks_proxy_connectivity: ("PUBLIC_ENDPOINT" | "VPC_ENDPOINT_SERVICE")
931
933
  SENSITIVE: [:key_store_password]
@@ -968,7 +970,7 @@ module Aws::KMS
968
970
  attr_accessor message: ::String
969
971
  attr_accessor message_type: ("RAW" | "DIGEST" | "EXTERNAL_MU")
970
972
  attr_accessor signature: ::String
971
- attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")
973
+ attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512")
972
974
  attr_accessor grant_tokens: ::Array[::String]
973
975
  attr_accessor dry_run: bool
974
976
  SENSITIVE: [:message]
@@ -977,7 +979,7 @@ module Aws::KMS
977
979
  class VerifyResponse
978
980
  attr_accessor key_id: ::String
979
981
  attr_accessor signature_valid: bool
980
- attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")
982
+ attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512")
981
983
  SENSITIVE: []
982
984
  end
983
985
 
@@ -1013,6 +1015,7 @@ module Aws::KMS
1013
1015
  attr_accessor uri_endpoint: ::String
1014
1016
  attr_accessor uri_path: ::String
1015
1017
  attr_accessor vpc_endpoint_service_name: ::String
1018
+ attr_accessor vpc_endpoint_service_owner: ::String
1016
1019
  SENSITIVE: [:access_key_id]
1017
1020
  end
1018
1021
 
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-kms
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.114.0
4
+ version: 1.118.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
@@ -18,7 +18,7 @@ dependencies:
18
18
  version: '3'
19
19
  - - ">="
20
20
  - !ruby/object:Gem::Version
21
- version: 3.231.0
21
+ version: 3.239.1
22
22
  type: :runtime
23
23
  prerelease: false
24
24
  version_requirements: !ruby/object:Gem::Requirement
@@ -28,7 +28,7 @@ dependencies:
28
28
  version: '3'
29
29
  - - ">="
30
30
  - !ruby/object:Gem::Version
31
- version: 3.231.0
31
+ version: 3.239.1
32
32
  - !ruby/object:Gem::Dependency
33
33
  name: aws-sigv4
34
34
  requirement: !ruby/object:Gem::Requirement