aws-sdk-kms 1.115.0 → 1.117.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +10 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-kms/client.rb +82 -38
- data/lib/aws-sdk-kms/client_api.rb +4 -0
- data/lib/aws-sdk-kms/types.rb +60 -5
- data/lib/aws-sdk-kms.rb +1 -1
- data/sig/client.rbs +13 -11
- data/sig/types.rbs +16 -13
- metadata +1 -1
checksums.yaml
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
---
|
|
2
2
|
SHA256:
|
|
3
|
-
metadata.gz:
|
|
4
|
-
data.tar.gz:
|
|
3
|
+
metadata.gz: 9190b06b6236c6657d8775c0e0b82387d3a287a06d941c2d6ca9ee5ab86fbe92
|
|
4
|
+
data.tar.gz: 96ac5a0f1ffa0d94902d0d85a2ae32fb9e1d90bae3b31ab3777f6da3d2a8a1f6
|
|
5
5
|
SHA512:
|
|
6
|
-
metadata.gz:
|
|
7
|
-
data.tar.gz:
|
|
6
|
+
metadata.gz: 22f84927d2c55a566453f0147279ae7f7e01d69b0cab21c0a6501414d3ecf359bbf0c800ef2bb5c246f68ee650056743f93210b67057a1969fc3f1d262036741
|
|
7
|
+
data.tar.gz: a75a199790f08b1d8623917c0b366371c7827be29b31075d4c7a9698c517cbc38c67b02c0813a621b4a6fc9bcb19d49172792b2d14b3a90de2076e5c4a65b044
|
data/CHANGELOG.md
CHANGED
|
@@ -1,6 +1,16 @@
|
|
|
1
1
|
Unreleased Changes
|
|
2
2
|
------------------
|
|
3
3
|
|
|
4
|
+
1.117.0 (2025-11-07)
|
|
5
|
+
------------------
|
|
6
|
+
|
|
7
|
+
* Feature - Added support for new ECC_NIST_EDWARDS25519 AWS KMS key spec
|
|
8
|
+
|
|
9
|
+
1.116.0 (2025-10-30)
|
|
10
|
+
------------------
|
|
11
|
+
|
|
12
|
+
* Feature - Add cross account VPC endpoint service connectivity support to CustomKeyStore.
|
|
13
|
+
|
|
4
14
|
1.115.0 (2025-10-21)
|
|
5
15
|
------------------
|
|
6
16
|
|
data/VERSION
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
1.
|
|
1
|
+
1.117.0
|
data/lib/aws-sdk-kms/client.rb
CHANGED
|
@@ -1083,6 +1083,13 @@ module Aws::KMS
|
|
|
1083
1083
|
#
|
|
1084
1084
|
# [1]: https://docs.aws.amazon.com/kms/latest/developerguide/create-xks-keystore.html#xks-requirements
|
|
1085
1085
|
#
|
|
1086
|
+
# @option params [String] :xks_proxy_vpc_endpoint_service_owner
|
|
1087
|
+
# Specifies the Amazon Web Services account ID that owns the Amazon VPC
|
|
1088
|
+
# service endpoint for the interface that is used to communicate with
|
|
1089
|
+
# your external key store proxy (XKS proxy). This parameter is optional.
|
|
1090
|
+
# If not provided, the Amazon Web Services account ID calling the action
|
|
1091
|
+
# will be used.
|
|
1092
|
+
#
|
|
1086
1093
|
# @option params [Types::XksProxyAuthenticationCredentialType] :xks_proxy_authentication_credential
|
|
1087
1094
|
# Specifies an authentication credential for the external key store
|
|
1088
1095
|
# proxy (XKS proxy). This parameter is required for all custom key
|
|
@@ -1209,6 +1216,7 @@ module Aws::KMS
|
|
|
1209
1216
|
# xks_proxy_uri_endpoint: "XksProxyUriEndpointType",
|
|
1210
1217
|
# xks_proxy_uri_path: "XksProxyUriPathType",
|
|
1211
1218
|
# xks_proxy_vpc_endpoint_service_name: "XksProxyVpcEndpointServiceNameType",
|
|
1219
|
+
# xks_proxy_vpc_endpoint_service_owner: "AccountIdType",
|
|
1212
1220
|
# xks_proxy_authentication_credential: {
|
|
1213
1221
|
# access_key_id: "XksProxyAuthenticationAccessKeyIdType", # required
|
|
1214
1222
|
# raw_secret_access_key: "XksProxyAuthenticationRawSecretAccessKeyType", # required
|
|
@@ -1568,8 +1576,8 @@ module Aws::KMS
|
|
|
1568
1576
|
# download the public key so it can be used outside of KMS. Each KMS
|
|
1569
1577
|
# key can have only one key usage. KMS keys with RSA key pairs can be
|
|
1570
1578
|
# used to encrypt and decrypt data or sign and verify messages (but
|
|
1571
|
-
# not both). KMS keys with NIST-
|
|
1572
|
-
#
|
|
1579
|
+
# not both). KMS keys with NIST-standard ECC key pairs can be used to
|
|
1580
|
+
# sign and verify messages or derive shared secrets (but not both).
|
|
1573
1581
|
# KMS keys with `ECC_SECG_P256K1` can be used only to sign and verify
|
|
1574
1582
|
# messages. KMS keys with ML-DSA key pairs can be used to sign and
|
|
1575
1583
|
# verify messages. KMS keys with SM2 key pairs (China Regions only)
|
|
@@ -1819,8 +1827,8 @@ module Aws::KMS
|
|
|
1819
1827
|
# * For asymmetric KMS keys with RSA key pairs, specify
|
|
1820
1828
|
# `ENCRYPT_DECRYPT` or `SIGN_VERIFY`.
|
|
1821
1829
|
#
|
|
1822
|
-
# * For asymmetric KMS keys with NIST-
|
|
1823
|
-
#
|
|
1830
|
+
# * For asymmetric KMS keys with NIST-standard elliptic curve key pairs,
|
|
1831
|
+
# specify `SIGN_VERIFY` or `KEY_AGREEMENT`.
|
|
1824
1832
|
#
|
|
1825
1833
|
# * For asymmetric KMS keys with `ECC_SECG_P256K1` key pairs, specify
|
|
1826
1834
|
# `SIGN_VERIFY`.
|
|
@@ -1891,7 +1899,7 @@ module Aws::KMS
|
|
|
1891
1899
|
# * `RSA_3072`
|
|
1892
1900
|
#
|
|
1893
1901
|
# * `RSA_4096`
|
|
1894
|
-
# * Asymmetric NIST-
|
|
1902
|
+
# * Asymmetric NIST-standard elliptic curve key pairs (signing and
|
|
1895
1903
|
# verification -or- deriving shared secrets)
|
|
1896
1904
|
#
|
|
1897
1905
|
# * `ECC_NIST_P256` (secp256r1)
|
|
@@ -1899,6 +1907,17 @@ module Aws::KMS
|
|
|
1899
1907
|
# * `ECC_NIST_P384` (secp384r1)
|
|
1900
1908
|
#
|
|
1901
1909
|
# * `ECC_NIST_P521` (secp521r1)
|
|
1910
|
+
#
|
|
1911
|
+
# * `ECC_NIST_EDWARDS25519` (ed25519) - signing and verification only
|
|
1912
|
+
#
|
|
1913
|
+
# * **Note:** For ECC\_NIST\_EDWARDS25519 KMS keys, the
|
|
1914
|
+
# ED25519\_SHA\_512 signing algorithm requires [ `MessageType:RAW`
|
|
1915
|
+
# ](kms/latest/APIReference/API_Sign.html#KMS-Sign-request-MessageType),
|
|
1916
|
+
# while ED25519\_PH\_SHA\_512 requires [ `MessageType:DIGEST`
|
|
1917
|
+
# ](kms/latest/APIReference/API_Sign.html#KMS-Sign-request-MessageType).
|
|
1918
|
+
# These message types cannot be used interchangeably.
|
|
1919
|
+
#
|
|
1920
|
+
# ^
|
|
1902
1921
|
# * Other asymmetric elliptic curve key pairs (signing and verification)
|
|
1903
1922
|
#
|
|
1904
1923
|
# * `ECC_SECG_P256K1` (secp256k1), commonly used for cryptocurrencies.
|
|
@@ -2414,7 +2433,7 @@ module Aws::KMS
|
|
|
2414
2433
|
# description: "DescriptionType",
|
|
2415
2434
|
# key_usage: "SIGN_VERIFY", # accepts SIGN_VERIFY, ENCRYPT_DECRYPT, GENERATE_VERIFY_MAC, KEY_AGREEMENT
|
|
2416
2435
|
# customer_master_key_spec: "RSA_2048", # accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1, SYMMETRIC_DEFAULT, HMAC_224, HMAC_256, HMAC_384, HMAC_512, SM2
|
|
2417
|
-
# key_spec: "RSA_2048", # accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1, SYMMETRIC_DEFAULT, HMAC_224, HMAC_256, HMAC_384, HMAC_512, SM2, ML_DSA_44, ML_DSA_65, ML_DSA_87
|
|
2436
|
+
# key_spec: "RSA_2048", # accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1, SYMMETRIC_DEFAULT, HMAC_224, HMAC_256, HMAC_384, HMAC_512, SM2, ML_DSA_44, ML_DSA_65, ML_DSA_87, ECC_NIST_EDWARDS25519
|
|
2418
2437
|
# origin: "AWS_KMS", # accepts AWS_KMS, EXTERNAL, AWS_CLOUDHSM, EXTERNAL_KEY_STORE
|
|
2419
2438
|
# custom_key_store_id: "CustomKeyStoreIdType",
|
|
2420
2439
|
# bypass_policy_lockout_safety_check: false,
|
|
@@ -2446,11 +2465,11 @@ module Aws::KMS
|
|
|
2446
2465
|
# resp.key_metadata.expiration_model #=> String, one of "KEY_MATERIAL_EXPIRES", "KEY_MATERIAL_DOES_NOT_EXPIRE"
|
|
2447
2466
|
# resp.key_metadata.key_manager #=> String, one of "AWS", "CUSTOMER"
|
|
2448
2467
|
# resp.key_metadata.customer_master_key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2"
|
|
2449
|
-
# resp.key_metadata.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2", "ML_DSA_44", "ML_DSA_65", "ML_DSA_87"
|
|
2468
|
+
# resp.key_metadata.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2", "ML_DSA_44", "ML_DSA_65", "ML_DSA_87", "ECC_NIST_EDWARDS25519"
|
|
2450
2469
|
# resp.key_metadata.encryption_algorithms #=> Array
|
|
2451
2470
|
# resp.key_metadata.encryption_algorithms[0] #=> String, one of "SYMMETRIC_DEFAULT", "RSAES_OAEP_SHA_1", "RSAES_OAEP_SHA_256", "SM2PKE"
|
|
2452
2471
|
# resp.key_metadata.signing_algorithms #=> Array
|
|
2453
|
-
# resp.key_metadata.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256"
|
|
2472
|
+
# resp.key_metadata.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256", "ED25519_SHA_512", "ED25519_PH_SHA_512"
|
|
2454
2473
|
# resp.key_metadata.key_agreement_algorithms #=> Array
|
|
2455
2474
|
# resp.key_metadata.key_agreement_algorithms[0] #=> String, one of "ECDH"
|
|
2456
2475
|
# resp.key_metadata.multi_region #=> Boolean
|
|
@@ -3078,8 +3097,8 @@ module Aws::KMS
|
|
|
3078
3097
|
|
|
3079
3098
|
# Derives a shared secret using a key agreement algorithm.
|
|
3080
3099
|
#
|
|
3081
|
-
# <note markdown="1"> You must use an asymmetric NIST-
|
|
3082
|
-
#
|
|
3100
|
+
# <note markdown="1"> You must use an asymmetric NIST-standard elliptic curve (ECC) or SM2
|
|
3101
|
+
# (China Regions only) KMS key pair with a `KeyUsage` value of
|
|
3083
3102
|
# `KEY_AGREEMENT` to call DeriveSharedSecret.
|
|
3084
3103
|
#
|
|
3085
3104
|
# </note>
|
|
@@ -3100,15 +3119,15 @@ module Aws::KMS
|
|
|
3100
3119
|
# 1. **Alice** calls CreateKey to create an asymmetric KMS key pair
|
|
3101
3120
|
# with a `KeyUsage` value of `KEY_AGREEMENT`.
|
|
3102
3121
|
#
|
|
3103
|
-
# The asymmetric KMS key must use a NIST-
|
|
3122
|
+
# The asymmetric KMS key must use a NIST-standard elliptic curve
|
|
3104
3123
|
# (ECC) or SM2 (China Regions only) key spec.
|
|
3105
3124
|
#
|
|
3106
3125
|
# 2. **Bob** creates an elliptic curve key pair.
|
|
3107
3126
|
#
|
|
3108
3127
|
# Bob can call CreateKey to create an asymmetric KMS key pair or
|
|
3109
3128
|
# generate a key pair outside of KMS. Bob's key pair must use the
|
|
3110
|
-
# same NIST-
|
|
3111
|
-
#
|
|
3129
|
+
# same NIST-standard elliptic curve (ECC) or SM2 (China Regions ony)
|
|
3130
|
+
# curve as Alice.
|
|
3112
3131
|
#
|
|
3113
3132
|
# 3. Alice and Bob **exchange their public keys** through an insecure
|
|
3114
3133
|
# communication channel (like the internet).
|
|
@@ -3135,12 +3154,12 @@ module Aws::KMS
|
|
|
3135
3154
|
# his private key and Alice's public key.
|
|
3136
3155
|
#
|
|
3137
3156
|
# To derive a shared secret you must provide a key agreement algorithm,
|
|
3138
|
-
# the private key of the caller's asymmetric NIST-
|
|
3157
|
+
# the private key of the caller's asymmetric NIST-standard elliptic
|
|
3139
3158
|
# curve or SM2 (China Regions only) KMS key pair, and the public key
|
|
3140
|
-
# from your peer's NIST-
|
|
3141
|
-
#
|
|
3142
|
-
#
|
|
3143
|
-
#
|
|
3159
|
+
# from your peer's NIST-standard elliptic curve or SM2 (China Regions
|
|
3160
|
+
# only) key pair. The public key can be from another asymmetric KMS key
|
|
3161
|
+
# pair or from a key pair generated outside of KMS, but both key pairs
|
|
3162
|
+
# must be on the same elliptic curve.
|
|
3144
3163
|
#
|
|
3145
3164
|
# The KMS key that you use for this operation must be in a compatible
|
|
3146
3165
|
# key state. For details, see [Key states of KMS keys][3] in the *Key
|
|
@@ -3172,9 +3191,9 @@ module Aws::KMS
|
|
|
3172
3191
|
# [5]: https://docs.aws.amazon.com/kms/latest/developerguide/accessing-kms.html#programming-eventual-consistency
|
|
3173
3192
|
#
|
|
3174
3193
|
# @option params [required, String] :key_id
|
|
3175
|
-
# Identifies an asymmetric NIST-
|
|
3176
|
-
#
|
|
3177
|
-
#
|
|
3194
|
+
# Identifies an asymmetric NIST-standard ECC or SM2 (China Regions only)
|
|
3195
|
+
# KMS key. KMS uses the private key in the specified key pair to derive
|
|
3196
|
+
# the shared secret. The key usage of the KMS key must be
|
|
3178
3197
|
# `KEY_AGREEMENT`. To find the `KeyUsage` of a KMS key, use the
|
|
3179
3198
|
# DescribeKey operation.
|
|
3180
3199
|
#
|
|
@@ -3202,8 +3221,8 @@ module Aws::KMS
|
|
|
3202
3221
|
# secret. The only valid value is `ECDH`.
|
|
3203
3222
|
#
|
|
3204
3223
|
# @option params [required, String, StringIO, File] :public_key
|
|
3205
|
-
# Specifies the public key in your peer's NIST-
|
|
3206
|
-
#
|
|
3224
|
+
# Specifies the public key in your peer's NIST-standard elliptic curve
|
|
3225
|
+
# (ECC) or SM2 (China Regions only) key pair.
|
|
3207
3226
|
#
|
|
3208
3227
|
# The public key must be a DER-encoded X.509 public key, also known as
|
|
3209
3228
|
# `SubjectPublicKeyInfo` (SPKI), as defined in [RFC 5280][1].
|
|
@@ -3593,6 +3612,7 @@ module Aws::KMS
|
|
|
3593
3612
|
# resp.custom_key_stores[0].xks_proxy_configuration.uri_endpoint #=> String
|
|
3594
3613
|
# resp.custom_key_stores[0].xks_proxy_configuration.uri_path #=> String
|
|
3595
3614
|
# resp.custom_key_stores[0].xks_proxy_configuration.vpc_endpoint_service_name #=> String
|
|
3615
|
+
# resp.custom_key_stores[0].xks_proxy_configuration.vpc_endpoint_service_owner #=> String
|
|
3596
3616
|
# resp.next_marker #=> String
|
|
3597
3617
|
# resp.truncated #=> Boolean
|
|
3598
3618
|
#
|
|
@@ -3966,11 +3986,11 @@ module Aws::KMS
|
|
|
3966
3986
|
# resp.key_metadata.expiration_model #=> String, one of "KEY_MATERIAL_EXPIRES", "KEY_MATERIAL_DOES_NOT_EXPIRE"
|
|
3967
3987
|
# resp.key_metadata.key_manager #=> String, one of "AWS", "CUSTOMER"
|
|
3968
3988
|
# resp.key_metadata.customer_master_key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2"
|
|
3969
|
-
# resp.key_metadata.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2", "ML_DSA_44", "ML_DSA_65", "ML_DSA_87"
|
|
3989
|
+
# resp.key_metadata.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2", "ML_DSA_44", "ML_DSA_65", "ML_DSA_87", "ECC_NIST_EDWARDS25519"
|
|
3970
3990
|
# resp.key_metadata.encryption_algorithms #=> Array
|
|
3971
3991
|
# resp.key_metadata.encryption_algorithms[0] #=> String, one of "SYMMETRIC_DEFAULT", "RSAES_OAEP_SHA_1", "RSAES_OAEP_SHA_256", "SM2PKE"
|
|
3972
3992
|
# resp.key_metadata.signing_algorithms #=> Array
|
|
3973
|
-
# resp.key_metadata.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256"
|
|
3993
|
+
# resp.key_metadata.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256", "ED25519_SHA_512", "ED25519_PH_SHA_512"
|
|
3974
3994
|
# resp.key_metadata.key_agreement_algorithms #=> Array
|
|
3975
3995
|
# resp.key_metadata.key_agreement_algorithms[0] #=> String, one of "ECDH"
|
|
3976
3996
|
# resp.key_metadata.multi_region #=> Boolean
|
|
@@ -5349,7 +5369,7 @@ module Aws::KMS
|
|
|
5349
5369
|
# "EncryptionContextKey" => "EncryptionContextValue",
|
|
5350
5370
|
# },
|
|
5351
5371
|
# key_id: "KeyIdType", # required
|
|
5352
|
-
# key_pair_spec: "RSA_2048", # required, accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1, SM2
|
|
5372
|
+
# key_pair_spec: "RSA_2048", # required, accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1, SM2, ECC_NIST_EDWARDS25519
|
|
5353
5373
|
# grant_tokens: ["GrantTokenType"],
|
|
5354
5374
|
# recipient: {
|
|
5355
5375
|
# key_encryption_algorithm: "RSAES_OAEP_SHA_256", # accepts RSAES_OAEP_SHA_256
|
|
@@ -5364,7 +5384,7 @@ module Aws::KMS
|
|
|
5364
5384
|
# resp.private_key_plaintext #=> String
|
|
5365
5385
|
# resp.public_key #=> String
|
|
5366
5386
|
# resp.key_id #=> String
|
|
5367
|
-
# resp.key_pair_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SM2"
|
|
5387
|
+
# resp.key_pair_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SM2", "ECC_NIST_EDWARDS25519"
|
|
5368
5388
|
# resp.ciphertext_for_recipient #=> String
|
|
5369
5389
|
# resp.key_material_id #=> String
|
|
5370
5390
|
#
|
|
@@ -5567,7 +5587,7 @@ module Aws::KMS
|
|
|
5567
5587
|
# "EncryptionContextKey" => "EncryptionContextValue",
|
|
5568
5588
|
# },
|
|
5569
5589
|
# key_id: "KeyIdType", # required
|
|
5570
|
-
# key_pair_spec: "RSA_2048", # required, accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1, SM2
|
|
5590
|
+
# key_pair_spec: "RSA_2048", # required, accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1, SM2, ECC_NIST_EDWARDS25519
|
|
5571
5591
|
# grant_tokens: ["GrantTokenType"],
|
|
5572
5592
|
# dry_run: false,
|
|
5573
5593
|
# })
|
|
@@ -5577,7 +5597,7 @@ module Aws::KMS
|
|
|
5577
5597
|
# resp.private_key_ciphertext_blob #=> String
|
|
5578
5598
|
# resp.public_key #=> String
|
|
5579
5599
|
# resp.key_id #=> String
|
|
5580
|
-
# resp.key_pair_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SM2"
|
|
5600
|
+
# resp.key_pair_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SM2", "ECC_NIST_EDWARDS25519"
|
|
5581
5601
|
# resp.key_material_id #=> String
|
|
5582
5602
|
#
|
|
5583
5603
|
# @see http://docs.aws.amazon.com/goto/WebAPI/kms-2014-11-01/GenerateDataKeyPairWithoutPlaintext AWS API Documentation
|
|
@@ -6741,12 +6761,12 @@ module Aws::KMS
|
|
|
6741
6761
|
# resp.key_id #=> String
|
|
6742
6762
|
# resp.public_key #=> String
|
|
6743
6763
|
# resp.customer_master_key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2"
|
|
6744
|
-
# resp.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2", "ML_DSA_44", "ML_DSA_65", "ML_DSA_87"
|
|
6764
|
+
# resp.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2", "ML_DSA_44", "ML_DSA_65", "ML_DSA_87", "ECC_NIST_EDWARDS25519"
|
|
6745
6765
|
# resp.key_usage #=> String, one of "SIGN_VERIFY", "ENCRYPT_DECRYPT", "GENERATE_VERIFY_MAC", "KEY_AGREEMENT"
|
|
6746
6766
|
# resp.encryption_algorithms #=> Array
|
|
6747
6767
|
# resp.encryption_algorithms[0] #=> String, one of "SYMMETRIC_DEFAULT", "RSAES_OAEP_SHA_1", "RSAES_OAEP_SHA_256", "SM2PKE"
|
|
6748
6768
|
# resp.signing_algorithms #=> Array
|
|
6749
|
-
# resp.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256"
|
|
6769
|
+
# resp.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256", "ED25519_SHA_512", "ED25519_PH_SHA_512"
|
|
6750
6770
|
# resp.key_agreement_algorithms #=> Array
|
|
6751
6771
|
# resp.key_agreement_algorithms[0] #=> String, one of "ECDH"
|
|
6752
6772
|
#
|
|
@@ -8919,11 +8939,11 @@ module Aws::KMS
|
|
|
8919
8939
|
# resp.replica_key_metadata.expiration_model #=> String, one of "KEY_MATERIAL_EXPIRES", "KEY_MATERIAL_DOES_NOT_EXPIRE"
|
|
8920
8940
|
# resp.replica_key_metadata.key_manager #=> String, one of "AWS", "CUSTOMER"
|
|
8921
8941
|
# resp.replica_key_metadata.customer_master_key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2"
|
|
8922
|
-
# resp.replica_key_metadata.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2", "ML_DSA_44", "ML_DSA_65", "ML_DSA_87"
|
|
8942
|
+
# resp.replica_key_metadata.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2", "ML_DSA_44", "ML_DSA_65", "ML_DSA_87", "ECC_NIST_EDWARDS25519"
|
|
8923
8943
|
# resp.replica_key_metadata.encryption_algorithms #=> Array
|
|
8924
8944
|
# resp.replica_key_metadata.encryption_algorithms[0] #=> String, one of "SYMMETRIC_DEFAULT", "RSAES_OAEP_SHA_1", "RSAES_OAEP_SHA_256", "SM2PKE"
|
|
8925
8945
|
# resp.replica_key_metadata.signing_algorithms #=> Array
|
|
8926
|
-
# resp.replica_key_metadata.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256"
|
|
8946
|
+
# resp.replica_key_metadata.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256", "ED25519_SHA_512", "ED25519_PH_SHA_512"
|
|
8927
8947
|
# resp.replica_key_metadata.key_agreement_algorithms #=> Array
|
|
8928
8948
|
# resp.replica_key_metadata.key_agreement_algorithms[0] #=> String, one of "ECDH"
|
|
8929
8949
|
# resp.replica_key_metadata.multi_region #=> Boolean
|
|
@@ -9596,6 +9616,13 @@ module Aws::KMS
|
|
|
9596
9616
|
# with an unhashed message, the security of the signing operation can be
|
|
9597
9617
|
# compromised.
|
|
9598
9618
|
#
|
|
9619
|
+
# When using ECC\_NIST\_EDWARDS25519 KMS keys:
|
|
9620
|
+
#
|
|
9621
|
+
# * ED25519\_SHA\_512 signing algorithm requires KMS `MessageType:RAW`
|
|
9622
|
+
#
|
|
9623
|
+
# * ED25519\_PH\_SHA\_512 signing algorithm requires KMS
|
|
9624
|
+
# `MessageType:DIGEST`
|
|
9625
|
+
#
|
|
9599
9626
|
# When the value of `MessageType` is `DIGEST`, the length of the
|
|
9600
9627
|
# `Message` value must match the length of hashed messages for the
|
|
9601
9628
|
# specified signing algorithm.
|
|
@@ -9715,7 +9742,7 @@ module Aws::KMS
|
|
|
9715
9742
|
# message: "data", # required
|
|
9716
9743
|
# message_type: "RAW", # accepts RAW, DIGEST, EXTERNAL_MU
|
|
9717
9744
|
# grant_tokens: ["GrantTokenType"],
|
|
9718
|
-
# signing_algorithm: "RSASSA_PSS_SHA_256", # required, accepts RSASSA_PSS_SHA_256, RSASSA_PSS_SHA_384, RSASSA_PSS_SHA_512, RSASSA_PKCS1_V1_5_SHA_256, RSASSA_PKCS1_V1_5_SHA_384, RSASSA_PKCS1_V1_5_SHA_512, ECDSA_SHA_256, ECDSA_SHA_384, ECDSA_SHA_512, SM2DSA, ML_DSA_SHAKE_256
|
|
9745
|
+
# signing_algorithm: "RSASSA_PSS_SHA_256", # required, accepts RSASSA_PSS_SHA_256, RSASSA_PSS_SHA_384, RSASSA_PSS_SHA_512, RSASSA_PKCS1_V1_5_SHA_256, RSASSA_PKCS1_V1_5_SHA_384, RSASSA_PKCS1_V1_5_SHA_512, ECDSA_SHA_256, ECDSA_SHA_384, ECDSA_SHA_512, SM2DSA, ML_DSA_SHAKE_256, ED25519_SHA_512, ED25519_PH_SHA_512
|
|
9719
9746
|
# dry_run: false,
|
|
9720
9747
|
# })
|
|
9721
9748
|
#
|
|
@@ -9723,7 +9750,7 @@ module Aws::KMS
|
|
|
9723
9750
|
#
|
|
9724
9751
|
# resp.key_id #=> String
|
|
9725
9752
|
# resp.signature #=> String
|
|
9726
|
-
# resp.signing_algorithm #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256"
|
|
9753
|
+
# resp.signing_algorithm #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256", "ED25519_SHA_512", "ED25519_PH_SHA_512"
|
|
9727
9754
|
#
|
|
9728
9755
|
# @see http://docs.aws.amazon.com/goto/WebAPI/kms-2014-11-01/Sign AWS API Documentation
|
|
9729
9756
|
#
|
|
@@ -10290,6 +10317,15 @@ module Aws::KMS
|
|
|
10290
10317
|
#
|
|
10291
10318
|
# To change this value, the external key store must be disconnected.
|
|
10292
10319
|
#
|
|
10320
|
+
# @option params [String] :xks_proxy_vpc_endpoint_service_owner
|
|
10321
|
+
# Changes the Amazon Web Services account ID that KMS uses to identify
|
|
10322
|
+
# the Amazon VPC endpoint service for your external key store proxy (XKS
|
|
10323
|
+
# proxy). This parameter is optional. If not specified, the current
|
|
10324
|
+
# Amazon Web Services account ID for the VPC endpoint service will not
|
|
10325
|
+
# be updated.
|
|
10326
|
+
#
|
|
10327
|
+
# To change this value, the external key store must be disconnected.
|
|
10328
|
+
#
|
|
10293
10329
|
# @option params [Types::XksProxyAuthenticationCredentialType] :xks_proxy_authentication_credential
|
|
10294
10330
|
# Changes the credentials that KMS uses to sign requests to the external
|
|
10295
10331
|
# key store proxy (XKS proxy). This parameter is valid only for custom
|
|
@@ -10431,6 +10467,7 @@ module Aws::KMS
|
|
|
10431
10467
|
# xks_proxy_uri_endpoint: "XksProxyUriEndpointType",
|
|
10432
10468
|
# xks_proxy_uri_path: "XksProxyUriPathType",
|
|
10433
10469
|
# xks_proxy_vpc_endpoint_service_name: "XksProxyVpcEndpointServiceNameType",
|
|
10470
|
+
# xks_proxy_vpc_endpoint_service_owner: "AccountIdType",
|
|
10434
10471
|
# xks_proxy_authentication_credential: {
|
|
10435
10472
|
# access_key_id: "XksProxyAuthenticationAccessKeyIdType", # required
|
|
10436
10473
|
# raw_secret_access_key: "XksProxyAuthenticationRawSecretAccessKeyType", # required
|
|
@@ -10782,6 +10819,13 @@ module Aws::KMS
|
|
|
10782
10819
|
# with an unhashed message, the security of the signing operation can be
|
|
10783
10820
|
# compromised.
|
|
10784
10821
|
#
|
|
10822
|
+
# When using ECC\_NIST\_EDWARDS25519 KMS keys:
|
|
10823
|
+
#
|
|
10824
|
+
# * ED25519\_SHA\_512 signing algorithm requires KMS `MessageType:RAW`
|
|
10825
|
+
#
|
|
10826
|
+
# * ED25519\_PH\_SHA\_512 signing algorithm requires KMS
|
|
10827
|
+
# `MessageType:DIGEST`
|
|
10828
|
+
#
|
|
10785
10829
|
# When the value of `MessageType` is `DIGEST`, the length of the
|
|
10786
10830
|
# `Message` value must match the length of hashed messages for the
|
|
10787
10831
|
# specified signing algorithm.
|
|
@@ -10902,7 +10946,7 @@ module Aws::KMS
|
|
|
10902
10946
|
# message: "data", # required
|
|
10903
10947
|
# message_type: "RAW", # accepts RAW, DIGEST, EXTERNAL_MU
|
|
10904
10948
|
# signature: "data", # required
|
|
10905
|
-
# signing_algorithm: "RSASSA_PSS_SHA_256", # required, accepts RSASSA_PSS_SHA_256, RSASSA_PSS_SHA_384, RSASSA_PSS_SHA_512, RSASSA_PKCS1_V1_5_SHA_256, RSASSA_PKCS1_V1_5_SHA_384, RSASSA_PKCS1_V1_5_SHA_512, ECDSA_SHA_256, ECDSA_SHA_384, ECDSA_SHA_512, SM2DSA, ML_DSA_SHAKE_256
|
|
10949
|
+
# signing_algorithm: "RSASSA_PSS_SHA_256", # required, accepts RSASSA_PSS_SHA_256, RSASSA_PSS_SHA_384, RSASSA_PSS_SHA_512, RSASSA_PKCS1_V1_5_SHA_256, RSASSA_PKCS1_V1_5_SHA_384, RSASSA_PKCS1_V1_5_SHA_512, ECDSA_SHA_256, ECDSA_SHA_384, ECDSA_SHA_512, SM2DSA, ML_DSA_SHAKE_256, ED25519_SHA_512, ED25519_PH_SHA_512
|
|
10906
10950
|
# grant_tokens: ["GrantTokenType"],
|
|
10907
10951
|
# dry_run: false,
|
|
10908
10952
|
# })
|
|
@@ -10911,7 +10955,7 @@ module Aws::KMS
|
|
|
10911
10955
|
#
|
|
10912
10956
|
# resp.key_id #=> String
|
|
10913
10957
|
# resp.signature_valid #=> Boolean
|
|
10914
|
-
# resp.signing_algorithm #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256"
|
|
10958
|
+
# resp.signing_algorithm #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256", "ED25519_SHA_512", "ED25519_PH_SHA_512"
|
|
10915
10959
|
#
|
|
10916
10960
|
# @see http://docs.aws.amazon.com/goto/WebAPI/kms-2014-11-01/Verify AWS API Documentation
|
|
10917
10961
|
#
|
|
@@ -11080,7 +11124,7 @@ module Aws::KMS
|
|
|
11080
11124
|
tracer: tracer
|
|
11081
11125
|
)
|
|
11082
11126
|
context[:gem_name] = 'aws-sdk-kms'
|
|
11083
|
-
context[:gem_version] = '1.
|
|
11127
|
+
context[:gem_version] = '1.117.0'
|
|
11084
11128
|
Seahorse::Client::Request.new(handlers, context)
|
|
11085
11129
|
end
|
|
11086
11130
|
|
|
@@ -15,6 +15,7 @@ module Aws::KMS
|
|
|
15
15
|
include Seahorse::Model
|
|
16
16
|
|
|
17
17
|
AWSAccountIdType = Shapes::StringShape.new(name: 'AWSAccountIdType')
|
|
18
|
+
AccountIdType = Shapes::StringShape.new(name: 'AccountIdType')
|
|
18
19
|
AlgorithmSpec = Shapes::StringShape.new(name: 'AlgorithmSpec')
|
|
19
20
|
AliasList = Shapes::ListShape.new(name: 'AliasList')
|
|
20
21
|
AliasListEntry = Shapes::StructureShape.new(name: 'AliasListEntry')
|
|
@@ -308,6 +309,7 @@ module Aws::KMS
|
|
|
308
309
|
CreateCustomKeyStoreRequest.add_member(:xks_proxy_uri_endpoint, Shapes::ShapeRef.new(shape: XksProxyUriEndpointType, location_name: "XksProxyUriEndpoint"))
|
|
309
310
|
CreateCustomKeyStoreRequest.add_member(:xks_proxy_uri_path, Shapes::ShapeRef.new(shape: XksProxyUriPathType, location_name: "XksProxyUriPath"))
|
|
310
311
|
CreateCustomKeyStoreRequest.add_member(:xks_proxy_vpc_endpoint_service_name, Shapes::ShapeRef.new(shape: XksProxyVpcEndpointServiceNameType, location_name: "XksProxyVpcEndpointServiceName"))
|
|
312
|
+
CreateCustomKeyStoreRequest.add_member(:xks_proxy_vpc_endpoint_service_owner, Shapes::ShapeRef.new(shape: AccountIdType, location_name: "XksProxyVpcEndpointServiceOwner"))
|
|
311
313
|
CreateCustomKeyStoreRequest.add_member(:xks_proxy_authentication_credential, Shapes::ShapeRef.new(shape: XksProxyAuthenticationCredentialType, location_name: "XksProxyAuthenticationCredential"))
|
|
312
314
|
CreateCustomKeyStoreRequest.add_member(:xks_proxy_connectivity, Shapes::ShapeRef.new(shape: XksProxyConnectivityType, location_name: "XksProxyConnectivity"))
|
|
313
315
|
CreateCustomKeyStoreRequest.struct_class = Types::CreateCustomKeyStoreRequest
|
|
@@ -948,6 +950,7 @@ module Aws::KMS
|
|
|
948
950
|
UpdateCustomKeyStoreRequest.add_member(:xks_proxy_uri_endpoint, Shapes::ShapeRef.new(shape: XksProxyUriEndpointType, location_name: "XksProxyUriEndpoint"))
|
|
949
951
|
UpdateCustomKeyStoreRequest.add_member(:xks_proxy_uri_path, Shapes::ShapeRef.new(shape: XksProxyUriPathType, location_name: "XksProxyUriPath"))
|
|
950
952
|
UpdateCustomKeyStoreRequest.add_member(:xks_proxy_vpc_endpoint_service_name, Shapes::ShapeRef.new(shape: XksProxyVpcEndpointServiceNameType, location_name: "XksProxyVpcEndpointServiceName"))
|
|
953
|
+
UpdateCustomKeyStoreRequest.add_member(:xks_proxy_vpc_endpoint_service_owner, Shapes::ShapeRef.new(shape: AccountIdType, location_name: "XksProxyVpcEndpointServiceOwner"))
|
|
951
954
|
UpdateCustomKeyStoreRequest.add_member(:xks_proxy_authentication_credential, Shapes::ShapeRef.new(shape: XksProxyAuthenticationCredentialType, location_name: "XksProxyAuthenticationCredential"))
|
|
952
955
|
UpdateCustomKeyStoreRequest.add_member(:xks_proxy_connectivity, Shapes::ShapeRef.new(shape: XksProxyConnectivityType, location_name: "XksProxyConnectivity"))
|
|
953
956
|
UpdateCustomKeyStoreRequest.struct_class = Types::UpdateCustomKeyStoreRequest
|
|
@@ -1010,6 +1013,7 @@ module Aws::KMS
|
|
|
1010
1013
|
XksProxyConfigurationType.add_member(:uri_endpoint, Shapes::ShapeRef.new(shape: XksProxyUriEndpointType, location_name: "UriEndpoint"))
|
|
1011
1014
|
XksProxyConfigurationType.add_member(:uri_path, Shapes::ShapeRef.new(shape: XksProxyUriPathType, location_name: "UriPath"))
|
|
1012
1015
|
XksProxyConfigurationType.add_member(:vpc_endpoint_service_name, Shapes::ShapeRef.new(shape: XksProxyVpcEndpointServiceNameType, location_name: "VpcEndpointServiceName"))
|
|
1016
|
+
XksProxyConfigurationType.add_member(:vpc_endpoint_service_owner, Shapes::ShapeRef.new(shape: AccountIdType, location_name: "VpcEndpointServiceOwner"))
|
|
1013
1017
|
XksProxyConfigurationType.struct_class = Types::XksProxyConfigurationType
|
|
1014
1018
|
|
|
1015
1019
|
XksProxyIncorrectAuthenticationCredentialException.add_member(:message, Shapes::ShapeRef.new(shape: ErrorMessageType, location_name: "message"))
|
data/lib/aws-sdk-kms/types.rb
CHANGED
|
@@ -485,6 +485,14 @@ module Aws::KMS
|
|
|
485
485
|
# [1]: https://docs.aws.amazon.com/kms/latest/developerguide/create-xks-keystore.html#xks-requirements
|
|
486
486
|
# @return [String]
|
|
487
487
|
#
|
|
488
|
+
# @!attribute [rw] xks_proxy_vpc_endpoint_service_owner
|
|
489
|
+
# Specifies the Amazon Web Services account ID that owns the Amazon
|
|
490
|
+
# VPC service endpoint for the interface that is used to communicate
|
|
491
|
+
# with your external key store proxy (XKS proxy). This parameter is
|
|
492
|
+
# optional. If not provided, the Amazon Web Services account ID
|
|
493
|
+
# calling the action will be used.
|
|
494
|
+
# @return [String]
|
|
495
|
+
#
|
|
488
496
|
# @!attribute [rw] xks_proxy_authentication_credential
|
|
489
497
|
# Specifies an authentication credential for the external key store
|
|
490
498
|
# proxy (XKS proxy). This parameter is required for all custom key
|
|
@@ -549,6 +557,7 @@ module Aws::KMS
|
|
|
549
557
|
:xks_proxy_uri_endpoint,
|
|
550
558
|
:xks_proxy_uri_path,
|
|
551
559
|
:xks_proxy_vpc_endpoint_service_name,
|
|
560
|
+
:xks_proxy_vpc_endpoint_service_owner,
|
|
552
561
|
:xks_proxy_authentication_credential,
|
|
553
562
|
:xks_proxy_connectivity)
|
|
554
563
|
SENSITIVE = [:key_store_password]
|
|
@@ -863,7 +872,7 @@ module Aws::KMS
|
|
|
863
872
|
# * For asymmetric KMS keys with RSA key pairs, specify
|
|
864
873
|
# `ENCRYPT_DECRYPT` or `SIGN_VERIFY`.
|
|
865
874
|
#
|
|
866
|
-
# * For asymmetric KMS keys with NIST-
|
|
875
|
+
# * For asymmetric KMS keys with NIST-standard elliptic curve key
|
|
867
876
|
# pairs, specify `SIGN_VERIFY` or `KEY_AGREEMENT`.
|
|
868
877
|
#
|
|
869
878
|
# * For asymmetric KMS keys with `ECC_SECG_P256K1` key pairs, specify
|
|
@@ -938,7 +947,7 @@ module Aws::KMS
|
|
|
938
947
|
# * `RSA_3072`
|
|
939
948
|
#
|
|
940
949
|
# * `RSA_4096`
|
|
941
|
-
# * Asymmetric NIST-
|
|
950
|
+
# * Asymmetric NIST-standard elliptic curve key pairs (signing and
|
|
942
951
|
# verification -or- deriving shared secrets)
|
|
943
952
|
#
|
|
944
953
|
# * `ECC_NIST_P256` (secp256r1)
|
|
@@ -946,6 +955,19 @@ module Aws::KMS
|
|
|
946
955
|
# * `ECC_NIST_P384` (secp384r1)
|
|
947
956
|
#
|
|
948
957
|
# * `ECC_NIST_P521` (secp521r1)
|
|
958
|
+
#
|
|
959
|
+
# * `ECC_NIST_EDWARDS25519` (ed25519) - signing and verification
|
|
960
|
+
# only
|
|
961
|
+
#
|
|
962
|
+
# * **Note:** For ECC\_NIST\_EDWARDS25519 KMS keys, the
|
|
963
|
+
# ED25519\_SHA\_512 signing algorithm requires [
|
|
964
|
+
# `MessageType:RAW`
|
|
965
|
+
# ](kms/latest/APIReference/API_Sign.html#KMS-Sign-request-MessageType),
|
|
966
|
+
# while ED25519\_PH\_SHA\_512 requires [ `MessageType:DIGEST`
|
|
967
|
+
# ](kms/latest/APIReference/API_Sign.html#KMS-Sign-request-MessageType).
|
|
968
|
+
# These message types cannot be used interchangeably.
|
|
969
|
+
#
|
|
970
|
+
# ^
|
|
949
971
|
# * Other asymmetric elliptic curve key pairs (signing and
|
|
950
972
|
# verification)
|
|
951
973
|
#
|
|
@@ -1841,7 +1863,7 @@ module Aws::KMS
|
|
|
1841
1863
|
end
|
|
1842
1864
|
|
|
1843
1865
|
# @!attribute [rw] key_id
|
|
1844
|
-
# Identifies an asymmetric NIST-
|
|
1866
|
+
# Identifies an asymmetric NIST-standard ECC or SM2 (China Regions
|
|
1845
1867
|
# only) KMS key. KMS uses the private key in the specified key pair to
|
|
1846
1868
|
# derive the shared secret. The key usage of the KMS key must be
|
|
1847
1869
|
# `KEY_AGREEMENT`. To find the `KeyUsage` of a KMS key, use the
|
|
@@ -1873,7 +1895,7 @@ module Aws::KMS
|
|
|
1873
1895
|
# @return [String]
|
|
1874
1896
|
#
|
|
1875
1897
|
# @!attribute [rw] public_key
|
|
1876
|
-
# Specifies the public key in your peer's NIST-
|
|
1898
|
+
# Specifies the public key in your peer's NIST-standard elliptic
|
|
1877
1899
|
# curve (ECC) or SM2 (China Regions only) key pair.
|
|
1878
1900
|
#
|
|
1879
1901
|
# The public key must be a DER-encoded X.509 public key, also known as
|
|
@@ -6189,6 +6211,13 @@ module Aws::KMS
|
|
|
6189
6211
|
# value with an unhashed message, the security of the signing
|
|
6190
6212
|
# operation can be compromised.
|
|
6191
6213
|
#
|
|
6214
|
+
# When using ECC\_NIST\_EDWARDS25519 KMS keys:
|
|
6215
|
+
#
|
|
6216
|
+
# * ED25519\_SHA\_512 signing algorithm requires KMS `MessageType:RAW`
|
|
6217
|
+
#
|
|
6218
|
+
# * ED25519\_PH\_SHA\_512 signing algorithm requires KMS
|
|
6219
|
+
# `MessageType:DIGEST`
|
|
6220
|
+
#
|
|
6192
6221
|
# When the value of `MessageType` is `DIGEST`, the length of the
|
|
6193
6222
|
# `Message` value must match the length of hashed messages for the
|
|
6194
6223
|
# specified signing algorithm.
|
|
@@ -6596,6 +6625,16 @@ module Aws::KMS
|
|
|
6596
6625
|
# To change this value, the external key store must be disconnected.
|
|
6597
6626
|
# @return [String]
|
|
6598
6627
|
#
|
|
6628
|
+
# @!attribute [rw] xks_proxy_vpc_endpoint_service_owner
|
|
6629
|
+
# Changes the Amazon Web Services account ID that KMS uses to identify
|
|
6630
|
+
# the Amazon VPC endpoint service for your external key store proxy
|
|
6631
|
+
# (XKS proxy). This parameter is optional. If not specified, the
|
|
6632
|
+
# current Amazon Web Services account ID for the VPC endpoint service
|
|
6633
|
+
# will not be updated.
|
|
6634
|
+
#
|
|
6635
|
+
# To change this value, the external key store must be disconnected.
|
|
6636
|
+
# @return [String]
|
|
6637
|
+
#
|
|
6599
6638
|
# @!attribute [rw] xks_proxy_authentication_credential
|
|
6600
6639
|
# Changes the credentials that KMS uses to sign requests to the
|
|
6601
6640
|
# external key store proxy (XKS proxy). This parameter is valid only
|
|
@@ -6643,6 +6682,7 @@ module Aws::KMS
|
|
|
6643
6682
|
:xks_proxy_uri_endpoint,
|
|
6644
6683
|
:xks_proxy_uri_path,
|
|
6645
6684
|
:xks_proxy_vpc_endpoint_service_name,
|
|
6685
|
+
:xks_proxy_vpc_endpoint_service_owner,
|
|
6646
6686
|
:xks_proxy_authentication_credential,
|
|
6647
6687
|
:xks_proxy_connectivity)
|
|
6648
6688
|
SENSITIVE = [:key_store_password]
|
|
@@ -6872,6 +6912,13 @@ module Aws::KMS
|
|
|
6872
6912
|
# value with an unhashed message, the security of the signing
|
|
6873
6913
|
# operation can be compromised.
|
|
6874
6914
|
#
|
|
6915
|
+
# When using ECC\_NIST\_EDWARDS25519 KMS keys:
|
|
6916
|
+
#
|
|
6917
|
+
# * ED25519\_SHA\_512 signing algorithm requires KMS `MessageType:RAW`
|
|
6918
|
+
#
|
|
6919
|
+
# * ED25519\_PH\_SHA\_512 signing algorithm requires KMS
|
|
6920
|
+
# `MessageType:DIGEST`
|
|
6921
|
+
#
|
|
6875
6922
|
# When the value of `MessageType` is `DIGEST`, the length of the
|
|
6876
6923
|
# `Message` value must match the length of hashed messages for the
|
|
6877
6924
|
# specified signing algorithm.
|
|
@@ -7141,6 +7188,13 @@ module Aws::KMS
|
|
|
7141
7188
|
# with KMS.
|
|
7142
7189
|
# @return [String]
|
|
7143
7190
|
#
|
|
7191
|
+
# @!attribute [rw] vpc_endpoint_service_owner
|
|
7192
|
+
# The Amazon Web Services account ID that owns the Amazon VPC endpoint
|
|
7193
|
+
# service used to communicate with the external key store proxy (XKS).
|
|
7194
|
+
# This field appears only when the XKS uses an VPC endpoint service to
|
|
7195
|
+
# communicate with KMS.
|
|
7196
|
+
# @return [String]
|
|
7197
|
+
#
|
|
7144
7198
|
# @see http://docs.aws.amazon.com/goto/WebAPI/kms-2014-11-01/XksProxyConfigurationType AWS API Documentation
|
|
7145
7199
|
#
|
|
7146
7200
|
class XksProxyConfigurationType < Struct.new(
|
|
@@ -7148,7 +7202,8 @@ module Aws::KMS
|
|
|
7148
7202
|
:access_key_id,
|
|
7149
7203
|
:uri_endpoint,
|
|
7150
7204
|
:uri_path,
|
|
7151
|
-
:vpc_endpoint_service_name
|
|
7205
|
+
:vpc_endpoint_service_name,
|
|
7206
|
+
:vpc_endpoint_service_owner)
|
|
7152
7207
|
SENSITIVE = [:access_key_id]
|
|
7153
7208
|
include Aws::Structure
|
|
7154
7209
|
end
|
data/lib/aws-sdk-kms.rb
CHANGED
data/sig/client.rbs
CHANGED
|
@@ -119,6 +119,7 @@ module Aws
|
|
|
119
119
|
?xks_proxy_uri_endpoint: ::String,
|
|
120
120
|
?xks_proxy_uri_path: ::String,
|
|
121
121
|
?xks_proxy_vpc_endpoint_service_name: ::String,
|
|
122
|
+
?xks_proxy_vpc_endpoint_service_owner: ::String,
|
|
122
123
|
?xks_proxy_authentication_credential: {
|
|
123
124
|
access_key_id: ::String,
|
|
124
125
|
raw_secret_access_key: ::String
|
|
@@ -158,7 +159,7 @@ module Aws
|
|
|
158
159
|
?description: ::String,
|
|
159
160
|
?key_usage: ("SIGN_VERIFY" | "ENCRYPT_DECRYPT" | "GENERATE_VERIFY_MAC" | "KEY_AGREEMENT"),
|
|
160
161
|
?customer_master_key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2"),
|
|
161
|
-
?key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87"),
|
|
162
|
+
?key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87" | "ECC_NIST_EDWARDS25519"),
|
|
162
163
|
?origin: ("AWS_KMS" | "EXTERNAL" | "AWS_CLOUDHSM" | "EXTERNAL_KEY_STORE"),
|
|
163
164
|
?custom_key_store_id: ::String,
|
|
164
165
|
?bypass_policy_lockout_safety_check: bool,
|
|
@@ -351,7 +352,7 @@ module Aws
|
|
|
351
352
|
def private_key_plaintext: () -> ::String
|
|
352
353
|
def public_key: () -> ::String
|
|
353
354
|
def key_id: () -> ::String
|
|
354
|
-
def key_pair_spec: () -> ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2")
|
|
355
|
+
def key_pair_spec: () -> ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2" | "ECC_NIST_EDWARDS25519")
|
|
355
356
|
def ciphertext_for_recipient: () -> ::String
|
|
356
357
|
def key_material_id: () -> ::String
|
|
357
358
|
end
|
|
@@ -359,7 +360,7 @@ module Aws
|
|
|
359
360
|
def generate_data_key_pair: (
|
|
360
361
|
?encryption_context: Hash[::String, ::String],
|
|
361
362
|
key_id: ::String,
|
|
362
|
-
key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2"),
|
|
363
|
+
key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2" | "ECC_NIST_EDWARDS25519"),
|
|
363
364
|
?grant_tokens: Array[::String],
|
|
364
365
|
?recipient: {
|
|
365
366
|
key_encryption_algorithm: ("RSAES_OAEP_SHA_256")?,
|
|
@@ -374,14 +375,14 @@ module Aws
|
|
|
374
375
|
def private_key_ciphertext_blob: () -> ::String
|
|
375
376
|
def public_key: () -> ::String
|
|
376
377
|
def key_id: () -> ::String
|
|
377
|
-
def key_pair_spec: () -> ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2")
|
|
378
|
+
def key_pair_spec: () -> ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2" | "ECC_NIST_EDWARDS25519")
|
|
378
379
|
def key_material_id: () -> ::String
|
|
379
380
|
end
|
|
380
381
|
# https://docs.aws.amazon.com/sdk-for-ruby/v3/api/Aws/KMS/Client.html#generate_data_key_pair_without_plaintext-instance_method
|
|
381
382
|
def generate_data_key_pair_without_plaintext: (
|
|
382
383
|
?encryption_context: Hash[::String, ::String],
|
|
383
384
|
key_id: ::String,
|
|
384
|
-
key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2"),
|
|
385
|
+
key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2" | "ECC_NIST_EDWARDS25519"),
|
|
385
386
|
?grant_tokens: Array[::String],
|
|
386
387
|
?dry_run: bool
|
|
387
388
|
) -> _GenerateDataKeyPairWithoutPlaintextResponseSuccess
|
|
@@ -482,10 +483,10 @@ module Aws
|
|
|
482
483
|
def key_id: () -> ::String
|
|
483
484
|
def public_key: () -> ::String
|
|
484
485
|
def customer_master_key_spec: () -> ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2")
|
|
485
|
-
def key_spec: () -> ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87")
|
|
486
|
+
def key_spec: () -> ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87" | "ECC_NIST_EDWARDS25519")
|
|
486
487
|
def key_usage: () -> ("SIGN_VERIFY" | "ENCRYPT_DECRYPT" | "GENERATE_VERIFY_MAC" | "KEY_AGREEMENT")
|
|
487
488
|
def encryption_algorithms: () -> ::Array[("SYMMETRIC_DEFAULT" | "RSAES_OAEP_SHA_1" | "RSAES_OAEP_SHA_256" | "SM2PKE")]
|
|
488
|
-
def signing_algorithms: () -> ::Array[("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")]
|
|
489
|
+
def signing_algorithms: () -> ::Array[("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512")]
|
|
489
490
|
def key_agreement_algorithms: () -> ::Array[("ECDH")]
|
|
490
491
|
end
|
|
491
492
|
# https://docs.aws.amazon.com/sdk-for-ruby/v3/api/Aws/KMS/Client.html#get_public_key-instance_method
|
|
@@ -713,7 +714,7 @@ module Aws
|
|
|
713
714
|
include ::Seahorse::Client::_ResponseSuccess[Types::SignResponse]
|
|
714
715
|
def key_id: () -> ::String
|
|
715
716
|
def signature: () -> ::String
|
|
716
|
-
def signing_algorithm: () -> ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")
|
|
717
|
+
def signing_algorithm: () -> ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512")
|
|
717
718
|
end
|
|
718
719
|
# https://docs.aws.amazon.com/sdk-for-ruby/v3/api/Aws/KMS/Client.html#sign-instance_method
|
|
719
720
|
def sign: (
|
|
@@ -721,7 +722,7 @@ module Aws
|
|
|
721
722
|
message: ::String,
|
|
722
723
|
?message_type: ("RAW" | "DIGEST" | "EXTERNAL_MU"),
|
|
723
724
|
?grant_tokens: Array[::String],
|
|
724
|
-
signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256"),
|
|
725
|
+
signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512"),
|
|
725
726
|
?dry_run: bool
|
|
726
727
|
) -> _SignResponseSuccess
|
|
727
728
|
| (Hash[Symbol, untyped] params, ?Hash[Symbol, untyped] options) -> _SignResponseSuccess
|
|
@@ -764,6 +765,7 @@ module Aws
|
|
|
764
765
|
?xks_proxy_uri_endpoint: ::String,
|
|
765
766
|
?xks_proxy_uri_path: ::String,
|
|
766
767
|
?xks_proxy_vpc_endpoint_service_name: ::String,
|
|
768
|
+
?xks_proxy_vpc_endpoint_service_owner: ::String,
|
|
767
769
|
?xks_proxy_authentication_credential: {
|
|
768
770
|
access_key_id: ::String,
|
|
769
771
|
raw_secret_access_key: ::String
|
|
@@ -790,7 +792,7 @@ module Aws
|
|
|
790
792
|
include ::Seahorse::Client::_ResponseSuccess[Types::VerifyResponse]
|
|
791
793
|
def key_id: () -> ::String
|
|
792
794
|
def signature_valid: () -> bool
|
|
793
|
-
def signing_algorithm: () -> ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")
|
|
795
|
+
def signing_algorithm: () -> ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512")
|
|
794
796
|
end
|
|
795
797
|
# https://docs.aws.amazon.com/sdk-for-ruby/v3/api/Aws/KMS/Client.html#verify-instance_method
|
|
796
798
|
def verify: (
|
|
@@ -798,7 +800,7 @@ module Aws
|
|
|
798
800
|
message: ::String,
|
|
799
801
|
?message_type: ("RAW" | "DIGEST" | "EXTERNAL_MU"),
|
|
800
802
|
signature: ::String,
|
|
801
|
-
signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256"),
|
|
803
|
+
signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512"),
|
|
802
804
|
?grant_tokens: Array[::String],
|
|
803
805
|
?dry_run: bool
|
|
804
806
|
) -> _VerifyResponseSuccess
|
data/sig/types.rbs
CHANGED
|
@@ -85,6 +85,7 @@ module Aws::KMS
|
|
|
85
85
|
attr_accessor xks_proxy_uri_endpoint: ::String
|
|
86
86
|
attr_accessor xks_proxy_uri_path: ::String
|
|
87
87
|
attr_accessor xks_proxy_vpc_endpoint_service_name: ::String
|
|
88
|
+
attr_accessor xks_proxy_vpc_endpoint_service_owner: ::String
|
|
88
89
|
attr_accessor xks_proxy_authentication_credential: Types::XksProxyAuthenticationCredentialType
|
|
89
90
|
attr_accessor xks_proxy_connectivity: ("PUBLIC_ENDPOINT" | "VPC_ENDPOINT_SERVICE")
|
|
90
91
|
SENSITIVE: [:key_store_password]
|
|
@@ -118,7 +119,7 @@ module Aws::KMS
|
|
|
118
119
|
attr_accessor description: ::String
|
|
119
120
|
attr_accessor key_usage: ("SIGN_VERIFY" | "ENCRYPT_DECRYPT" | "GENERATE_VERIFY_MAC" | "KEY_AGREEMENT")
|
|
120
121
|
attr_accessor customer_master_key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2")
|
|
121
|
-
attr_accessor key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87")
|
|
122
|
+
attr_accessor key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87" | "ECC_NIST_EDWARDS25519")
|
|
122
123
|
attr_accessor origin: ("AWS_KMS" | "EXTERNAL" | "AWS_CLOUDHSM" | "EXTERNAL_KEY_STORE")
|
|
123
124
|
attr_accessor custom_key_store_id: ::String
|
|
124
125
|
attr_accessor bypass_policy_lockout_safety_check: bool
|
|
@@ -325,7 +326,7 @@ module Aws::KMS
|
|
|
325
326
|
class GenerateDataKeyPairRequest
|
|
326
327
|
attr_accessor encryption_context: ::Hash[::String, ::String]
|
|
327
328
|
attr_accessor key_id: ::String
|
|
328
|
-
attr_accessor key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2")
|
|
329
|
+
attr_accessor key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2" | "ECC_NIST_EDWARDS25519")
|
|
329
330
|
attr_accessor grant_tokens: ::Array[::String]
|
|
330
331
|
attr_accessor recipient: Types::RecipientInfo
|
|
331
332
|
attr_accessor dry_run: bool
|
|
@@ -337,7 +338,7 @@ module Aws::KMS
|
|
|
337
338
|
attr_accessor private_key_plaintext: ::String
|
|
338
339
|
attr_accessor public_key: ::String
|
|
339
340
|
attr_accessor key_id: ::String
|
|
340
|
-
attr_accessor key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2")
|
|
341
|
+
attr_accessor key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2" | "ECC_NIST_EDWARDS25519")
|
|
341
342
|
attr_accessor ciphertext_for_recipient: ::String
|
|
342
343
|
attr_accessor key_material_id: ::String
|
|
343
344
|
SENSITIVE: [:private_key_plaintext]
|
|
@@ -346,7 +347,7 @@ module Aws::KMS
|
|
|
346
347
|
class GenerateDataKeyPairWithoutPlaintextRequest
|
|
347
348
|
attr_accessor encryption_context: ::Hash[::String, ::String]
|
|
348
349
|
attr_accessor key_id: ::String
|
|
349
|
-
attr_accessor key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2")
|
|
350
|
+
attr_accessor key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2" | "ECC_NIST_EDWARDS25519")
|
|
350
351
|
attr_accessor grant_tokens: ::Array[::String]
|
|
351
352
|
attr_accessor dry_run: bool
|
|
352
353
|
SENSITIVE: []
|
|
@@ -356,7 +357,7 @@ module Aws::KMS
|
|
|
356
357
|
attr_accessor private_key_ciphertext_blob: ::String
|
|
357
358
|
attr_accessor public_key: ::String
|
|
358
359
|
attr_accessor key_id: ::String
|
|
359
|
-
attr_accessor key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2")
|
|
360
|
+
attr_accessor key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2" | "ECC_NIST_EDWARDS25519")
|
|
360
361
|
attr_accessor key_material_id: ::String
|
|
361
362
|
SENSITIVE: []
|
|
362
363
|
end
|
|
@@ -478,10 +479,10 @@ module Aws::KMS
|
|
|
478
479
|
attr_accessor key_id: ::String
|
|
479
480
|
attr_accessor public_key: ::String
|
|
480
481
|
attr_accessor customer_master_key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2")
|
|
481
|
-
attr_accessor key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87")
|
|
482
|
+
attr_accessor key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87" | "ECC_NIST_EDWARDS25519")
|
|
482
483
|
attr_accessor key_usage: ("SIGN_VERIFY" | "ENCRYPT_DECRYPT" | "GENERATE_VERIFY_MAC" | "KEY_AGREEMENT")
|
|
483
484
|
attr_accessor encryption_algorithms: ::Array[("SYMMETRIC_DEFAULT" | "RSAES_OAEP_SHA_1" | "RSAES_OAEP_SHA_256" | "SM2PKE")]
|
|
484
|
-
attr_accessor signing_algorithms: ::Array[("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")]
|
|
485
|
+
attr_accessor signing_algorithms: ::Array[("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512")]
|
|
485
486
|
attr_accessor key_agreement_algorithms: ::Array[("ECDH")]
|
|
486
487
|
SENSITIVE: []
|
|
487
488
|
end
|
|
@@ -621,9 +622,9 @@ module Aws::KMS
|
|
|
621
622
|
attr_accessor expiration_model: ("KEY_MATERIAL_EXPIRES" | "KEY_MATERIAL_DOES_NOT_EXPIRE")
|
|
622
623
|
attr_accessor key_manager: ("AWS" | "CUSTOMER")
|
|
623
624
|
attr_accessor customer_master_key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2")
|
|
624
|
-
attr_accessor key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87")
|
|
625
|
+
attr_accessor key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87" | "ECC_NIST_EDWARDS25519")
|
|
625
626
|
attr_accessor encryption_algorithms: ::Array[("SYMMETRIC_DEFAULT" | "RSAES_OAEP_SHA_1" | "RSAES_OAEP_SHA_256" | "SM2PKE")]
|
|
626
|
-
attr_accessor signing_algorithms: ::Array[("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")]
|
|
627
|
+
attr_accessor signing_algorithms: ::Array[("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512")]
|
|
627
628
|
attr_accessor key_agreement_algorithms: ::Array[("ECDH")]
|
|
628
629
|
attr_accessor multi_region: bool
|
|
629
630
|
attr_accessor multi_region_configuration: Types::MultiRegionConfiguration
|
|
@@ -872,7 +873,7 @@ module Aws::KMS
|
|
|
872
873
|
attr_accessor message: ::String
|
|
873
874
|
attr_accessor message_type: ("RAW" | "DIGEST" | "EXTERNAL_MU")
|
|
874
875
|
attr_accessor grant_tokens: ::Array[::String]
|
|
875
|
-
attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")
|
|
876
|
+
attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512")
|
|
876
877
|
attr_accessor dry_run: bool
|
|
877
878
|
SENSITIVE: [:message]
|
|
878
879
|
end
|
|
@@ -880,7 +881,7 @@ module Aws::KMS
|
|
|
880
881
|
class SignResponse
|
|
881
882
|
attr_accessor key_id: ::String
|
|
882
883
|
attr_accessor signature: ::String
|
|
883
|
-
attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")
|
|
884
|
+
attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512")
|
|
884
885
|
SENSITIVE: []
|
|
885
886
|
end
|
|
886
887
|
|
|
@@ -926,6 +927,7 @@ module Aws::KMS
|
|
|
926
927
|
attr_accessor xks_proxy_uri_endpoint: ::String
|
|
927
928
|
attr_accessor xks_proxy_uri_path: ::String
|
|
928
929
|
attr_accessor xks_proxy_vpc_endpoint_service_name: ::String
|
|
930
|
+
attr_accessor xks_proxy_vpc_endpoint_service_owner: ::String
|
|
929
931
|
attr_accessor xks_proxy_authentication_credential: Types::XksProxyAuthenticationCredentialType
|
|
930
932
|
attr_accessor xks_proxy_connectivity: ("PUBLIC_ENDPOINT" | "VPC_ENDPOINT_SERVICE")
|
|
931
933
|
SENSITIVE: [:key_store_password]
|
|
@@ -968,7 +970,7 @@ module Aws::KMS
|
|
|
968
970
|
attr_accessor message: ::String
|
|
969
971
|
attr_accessor message_type: ("RAW" | "DIGEST" | "EXTERNAL_MU")
|
|
970
972
|
attr_accessor signature: ::String
|
|
971
|
-
attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")
|
|
973
|
+
attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512")
|
|
972
974
|
attr_accessor grant_tokens: ::Array[::String]
|
|
973
975
|
attr_accessor dry_run: bool
|
|
974
976
|
SENSITIVE: [:message]
|
|
@@ -977,7 +979,7 @@ module Aws::KMS
|
|
|
977
979
|
class VerifyResponse
|
|
978
980
|
attr_accessor key_id: ::String
|
|
979
981
|
attr_accessor signature_valid: bool
|
|
980
|
-
attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")
|
|
982
|
+
attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512")
|
|
981
983
|
SENSITIVE: []
|
|
982
984
|
end
|
|
983
985
|
|
|
@@ -1013,6 +1015,7 @@ module Aws::KMS
|
|
|
1013
1015
|
attr_accessor uri_endpoint: ::String
|
|
1014
1016
|
attr_accessor uri_path: ::String
|
|
1015
1017
|
attr_accessor vpc_endpoint_service_name: ::String
|
|
1018
|
+
attr_accessor vpc_endpoint_service_owner: ::String
|
|
1016
1019
|
SENSITIVE: [:access_key_id]
|
|
1017
1020
|
end
|
|
1018
1021
|
|