aws-sdk-kms 1.115.0 → 1.117.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 216c84dec3f43f2dab0dbdb9eaac52386c7b57a1b91679462d7b0587ca18228b
4
- data.tar.gz: b0ce79d99147e06a1b94193f12083ee583b862590d20ffcf023bba72f1ba0e6c
3
+ metadata.gz: 9190b06b6236c6657d8775c0e0b82387d3a287a06d941c2d6ca9ee5ab86fbe92
4
+ data.tar.gz: 96ac5a0f1ffa0d94902d0d85a2ae32fb9e1d90bae3b31ab3777f6da3d2a8a1f6
5
5
  SHA512:
6
- metadata.gz: 1652deddd2b93a91382c155877b04d10321ff31867df867015ae14404be68e1cc5a2b6473fd185b299f11541757aeb65531f67a3166ddc3b330d85a51be266d0
7
- data.tar.gz: f171a7a9331ac72266af160cc2a5f1422de8d635f5b566b3c370ba4f1260701d659d739a654dc28d7f39231d1e601777bb5ec9044c6dbd6e0dc8ba95fe167521
6
+ metadata.gz: 22f84927d2c55a566453f0147279ae7f7e01d69b0cab21c0a6501414d3ecf359bbf0c800ef2bb5c246f68ee650056743f93210b67057a1969fc3f1d262036741
7
+ data.tar.gz: a75a199790f08b1d8623917c0b366371c7827be29b31075d4c7a9698c517cbc38c67b02c0813a621b4a6fc9bcb19d49172792b2d14b3a90de2076e5c4a65b044
data/CHANGELOG.md CHANGED
@@ -1,6 +1,16 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.117.0 (2025-11-07)
5
+ ------------------
6
+
7
+ * Feature - Added support for new ECC_NIST_EDWARDS25519 AWS KMS key spec
8
+
9
+ 1.116.0 (2025-10-30)
10
+ ------------------
11
+
12
+ * Feature - Add cross account VPC endpoint service connectivity support to CustomKeyStore.
13
+
4
14
  1.115.0 (2025-10-21)
5
15
  ------------------
6
16
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.115.0
1
+ 1.117.0
@@ -1083,6 +1083,13 @@ module Aws::KMS
1083
1083
  #
1084
1084
  # [1]: https://docs.aws.amazon.com/kms/latest/developerguide/create-xks-keystore.html#xks-requirements
1085
1085
  #
1086
+ # @option params [String] :xks_proxy_vpc_endpoint_service_owner
1087
+ # Specifies the Amazon Web Services account ID that owns the Amazon VPC
1088
+ # service endpoint for the interface that is used to communicate with
1089
+ # your external key store proxy (XKS proxy). This parameter is optional.
1090
+ # If not provided, the Amazon Web Services account ID calling the action
1091
+ # will be used.
1092
+ #
1086
1093
  # @option params [Types::XksProxyAuthenticationCredentialType] :xks_proxy_authentication_credential
1087
1094
  # Specifies an authentication credential for the external key store
1088
1095
  # proxy (XKS proxy). This parameter is required for all custom key
@@ -1209,6 +1216,7 @@ module Aws::KMS
1209
1216
  # xks_proxy_uri_endpoint: "XksProxyUriEndpointType",
1210
1217
  # xks_proxy_uri_path: "XksProxyUriPathType",
1211
1218
  # xks_proxy_vpc_endpoint_service_name: "XksProxyVpcEndpointServiceNameType",
1219
+ # xks_proxy_vpc_endpoint_service_owner: "AccountIdType",
1212
1220
  # xks_proxy_authentication_credential: {
1213
1221
  # access_key_id: "XksProxyAuthenticationAccessKeyIdType", # required
1214
1222
  # raw_secret_access_key: "XksProxyAuthenticationRawSecretAccessKeyType", # required
@@ -1568,8 +1576,8 @@ module Aws::KMS
1568
1576
  # download the public key so it can be used outside of KMS. Each KMS
1569
1577
  # key can have only one key usage. KMS keys with RSA key pairs can be
1570
1578
  # used to encrypt and decrypt data or sign and verify messages (but
1571
- # not both). KMS keys with NIST-recommended ECC key pairs can be used
1572
- # to sign and verify messages or derive shared secrets (but not both).
1579
+ # not both). KMS keys with NIST-standard ECC key pairs can be used to
1580
+ # sign and verify messages or derive shared secrets (but not both).
1573
1581
  # KMS keys with `ECC_SECG_P256K1` can be used only to sign and verify
1574
1582
  # messages. KMS keys with ML-DSA key pairs can be used to sign and
1575
1583
  # verify messages. KMS keys with SM2 key pairs (China Regions only)
@@ -1819,8 +1827,8 @@ module Aws::KMS
1819
1827
  # * For asymmetric KMS keys with RSA key pairs, specify
1820
1828
  # `ENCRYPT_DECRYPT` or `SIGN_VERIFY`.
1821
1829
  #
1822
- # * For asymmetric KMS keys with NIST-recommended elliptic curve key
1823
- # pairs, specify `SIGN_VERIFY` or `KEY_AGREEMENT`.
1830
+ # * For asymmetric KMS keys with NIST-standard elliptic curve key pairs,
1831
+ # specify `SIGN_VERIFY` or `KEY_AGREEMENT`.
1824
1832
  #
1825
1833
  # * For asymmetric KMS keys with `ECC_SECG_P256K1` key pairs, specify
1826
1834
  # `SIGN_VERIFY`.
@@ -1891,7 +1899,7 @@ module Aws::KMS
1891
1899
  # * `RSA_3072`
1892
1900
  #
1893
1901
  # * `RSA_4096`
1894
- # * Asymmetric NIST-recommended elliptic curve key pairs (signing and
1902
+ # * Asymmetric NIST-standard elliptic curve key pairs (signing and
1895
1903
  # verification -or- deriving shared secrets)
1896
1904
  #
1897
1905
  # * `ECC_NIST_P256` (secp256r1)
@@ -1899,6 +1907,17 @@ module Aws::KMS
1899
1907
  # * `ECC_NIST_P384` (secp384r1)
1900
1908
  #
1901
1909
  # * `ECC_NIST_P521` (secp521r1)
1910
+ #
1911
+ # * `ECC_NIST_EDWARDS25519` (ed25519) - signing and verification only
1912
+ #
1913
+ # * **Note:** For ECC\_NIST\_EDWARDS25519 KMS keys, the
1914
+ # ED25519\_SHA\_512 signing algorithm requires [ `MessageType:RAW`
1915
+ # ](kms/latest/APIReference/API_Sign.html#KMS-Sign-request-MessageType),
1916
+ # while ED25519\_PH\_SHA\_512 requires [ `MessageType:DIGEST`
1917
+ # ](kms/latest/APIReference/API_Sign.html#KMS-Sign-request-MessageType).
1918
+ # These message types cannot be used interchangeably.
1919
+ #
1920
+ # ^
1902
1921
  # * Other asymmetric elliptic curve key pairs (signing and verification)
1903
1922
  #
1904
1923
  # * `ECC_SECG_P256K1` (secp256k1), commonly used for cryptocurrencies.
@@ -2414,7 +2433,7 @@ module Aws::KMS
2414
2433
  # description: "DescriptionType",
2415
2434
  # key_usage: "SIGN_VERIFY", # accepts SIGN_VERIFY, ENCRYPT_DECRYPT, GENERATE_VERIFY_MAC, KEY_AGREEMENT
2416
2435
  # customer_master_key_spec: "RSA_2048", # accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1, SYMMETRIC_DEFAULT, HMAC_224, HMAC_256, HMAC_384, HMAC_512, SM2
2417
- # key_spec: "RSA_2048", # accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1, SYMMETRIC_DEFAULT, HMAC_224, HMAC_256, HMAC_384, HMAC_512, SM2, ML_DSA_44, ML_DSA_65, ML_DSA_87
2436
+ # key_spec: "RSA_2048", # accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1, SYMMETRIC_DEFAULT, HMAC_224, HMAC_256, HMAC_384, HMAC_512, SM2, ML_DSA_44, ML_DSA_65, ML_DSA_87, ECC_NIST_EDWARDS25519
2418
2437
  # origin: "AWS_KMS", # accepts AWS_KMS, EXTERNAL, AWS_CLOUDHSM, EXTERNAL_KEY_STORE
2419
2438
  # custom_key_store_id: "CustomKeyStoreIdType",
2420
2439
  # bypass_policy_lockout_safety_check: false,
@@ -2446,11 +2465,11 @@ module Aws::KMS
2446
2465
  # resp.key_metadata.expiration_model #=> String, one of "KEY_MATERIAL_EXPIRES", "KEY_MATERIAL_DOES_NOT_EXPIRE"
2447
2466
  # resp.key_metadata.key_manager #=> String, one of "AWS", "CUSTOMER"
2448
2467
  # resp.key_metadata.customer_master_key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2"
2449
- # resp.key_metadata.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2", "ML_DSA_44", "ML_DSA_65", "ML_DSA_87"
2468
+ # resp.key_metadata.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2", "ML_DSA_44", "ML_DSA_65", "ML_DSA_87", "ECC_NIST_EDWARDS25519"
2450
2469
  # resp.key_metadata.encryption_algorithms #=> Array
2451
2470
  # resp.key_metadata.encryption_algorithms[0] #=> String, one of "SYMMETRIC_DEFAULT", "RSAES_OAEP_SHA_1", "RSAES_OAEP_SHA_256", "SM2PKE"
2452
2471
  # resp.key_metadata.signing_algorithms #=> Array
2453
- # resp.key_metadata.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256"
2472
+ # resp.key_metadata.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256", "ED25519_SHA_512", "ED25519_PH_SHA_512"
2454
2473
  # resp.key_metadata.key_agreement_algorithms #=> Array
2455
2474
  # resp.key_metadata.key_agreement_algorithms[0] #=> String, one of "ECDH"
2456
2475
  # resp.key_metadata.multi_region #=> Boolean
@@ -3078,8 +3097,8 @@ module Aws::KMS
3078
3097
 
3079
3098
  # Derives a shared secret using a key agreement algorithm.
3080
3099
  #
3081
- # <note markdown="1"> You must use an asymmetric NIST-recommended elliptic curve (ECC) or
3082
- # SM2 (China Regions only) KMS key pair with a `KeyUsage` value of
3100
+ # <note markdown="1"> You must use an asymmetric NIST-standard elliptic curve (ECC) or SM2
3101
+ # (China Regions only) KMS key pair with a `KeyUsage` value of
3083
3102
  # `KEY_AGREEMENT` to call DeriveSharedSecret.
3084
3103
  #
3085
3104
  # </note>
@@ -3100,15 +3119,15 @@ module Aws::KMS
3100
3119
  # 1. **Alice** calls CreateKey to create an asymmetric KMS key pair
3101
3120
  # with a `KeyUsage` value of `KEY_AGREEMENT`.
3102
3121
  #
3103
- # The asymmetric KMS key must use a NIST-recommended elliptic curve
3122
+ # The asymmetric KMS key must use a NIST-standard elliptic curve
3104
3123
  # (ECC) or SM2 (China Regions only) key spec.
3105
3124
  #
3106
3125
  # 2. **Bob** creates an elliptic curve key pair.
3107
3126
  #
3108
3127
  # Bob can call CreateKey to create an asymmetric KMS key pair or
3109
3128
  # generate a key pair outside of KMS. Bob's key pair must use the
3110
- # same NIST-recommended elliptic curve (ECC) or SM2 (China Regions
3111
- # ony) curve as Alice.
3129
+ # same NIST-standard elliptic curve (ECC) or SM2 (China Regions ony)
3130
+ # curve as Alice.
3112
3131
  #
3113
3132
  # 3. Alice and Bob **exchange their public keys** through an insecure
3114
3133
  # communication channel (like the internet).
@@ -3135,12 +3154,12 @@ module Aws::KMS
3135
3154
  # his private key and Alice's public key.
3136
3155
  #
3137
3156
  # To derive a shared secret you must provide a key agreement algorithm,
3138
- # the private key of the caller's asymmetric NIST-recommended elliptic
3157
+ # the private key of the caller's asymmetric NIST-standard elliptic
3139
3158
  # curve or SM2 (China Regions only) KMS key pair, and the public key
3140
- # from your peer's NIST-recommended elliptic curve or SM2 (China
3141
- # Regions only) key pair. The public key can be from another asymmetric
3142
- # KMS key pair or from a key pair generated outside of KMS, but both key
3143
- # pairs must be on the same elliptic curve.
3159
+ # from your peer's NIST-standard elliptic curve or SM2 (China Regions
3160
+ # only) key pair. The public key can be from another asymmetric KMS key
3161
+ # pair or from a key pair generated outside of KMS, but both key pairs
3162
+ # must be on the same elliptic curve.
3144
3163
  #
3145
3164
  # The KMS key that you use for this operation must be in a compatible
3146
3165
  # key state. For details, see [Key states of KMS keys][3] in the *Key
@@ -3172,9 +3191,9 @@ module Aws::KMS
3172
3191
  # [5]: https://docs.aws.amazon.com/kms/latest/developerguide/accessing-kms.html#programming-eventual-consistency
3173
3192
  #
3174
3193
  # @option params [required, String] :key_id
3175
- # Identifies an asymmetric NIST-recommended ECC or SM2 (China Regions
3176
- # only) KMS key. KMS uses the private key in the specified key pair to
3177
- # derive the shared secret. The key usage of the KMS key must be
3194
+ # Identifies an asymmetric NIST-standard ECC or SM2 (China Regions only)
3195
+ # KMS key. KMS uses the private key in the specified key pair to derive
3196
+ # the shared secret. The key usage of the KMS key must be
3178
3197
  # `KEY_AGREEMENT`. To find the `KeyUsage` of a KMS key, use the
3179
3198
  # DescribeKey operation.
3180
3199
  #
@@ -3202,8 +3221,8 @@ module Aws::KMS
3202
3221
  # secret. The only valid value is `ECDH`.
3203
3222
  #
3204
3223
  # @option params [required, String, StringIO, File] :public_key
3205
- # Specifies the public key in your peer's NIST-recommended elliptic
3206
- # curve (ECC) or SM2 (China Regions only) key pair.
3224
+ # Specifies the public key in your peer's NIST-standard elliptic curve
3225
+ # (ECC) or SM2 (China Regions only) key pair.
3207
3226
  #
3208
3227
  # The public key must be a DER-encoded X.509 public key, also known as
3209
3228
  # `SubjectPublicKeyInfo` (SPKI), as defined in [RFC 5280][1].
@@ -3593,6 +3612,7 @@ module Aws::KMS
3593
3612
  # resp.custom_key_stores[0].xks_proxy_configuration.uri_endpoint #=> String
3594
3613
  # resp.custom_key_stores[0].xks_proxy_configuration.uri_path #=> String
3595
3614
  # resp.custom_key_stores[0].xks_proxy_configuration.vpc_endpoint_service_name #=> String
3615
+ # resp.custom_key_stores[0].xks_proxy_configuration.vpc_endpoint_service_owner #=> String
3596
3616
  # resp.next_marker #=> String
3597
3617
  # resp.truncated #=> Boolean
3598
3618
  #
@@ -3966,11 +3986,11 @@ module Aws::KMS
3966
3986
  # resp.key_metadata.expiration_model #=> String, one of "KEY_MATERIAL_EXPIRES", "KEY_MATERIAL_DOES_NOT_EXPIRE"
3967
3987
  # resp.key_metadata.key_manager #=> String, one of "AWS", "CUSTOMER"
3968
3988
  # resp.key_metadata.customer_master_key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2"
3969
- # resp.key_metadata.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2", "ML_DSA_44", "ML_DSA_65", "ML_DSA_87"
3989
+ # resp.key_metadata.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2", "ML_DSA_44", "ML_DSA_65", "ML_DSA_87", "ECC_NIST_EDWARDS25519"
3970
3990
  # resp.key_metadata.encryption_algorithms #=> Array
3971
3991
  # resp.key_metadata.encryption_algorithms[0] #=> String, one of "SYMMETRIC_DEFAULT", "RSAES_OAEP_SHA_1", "RSAES_OAEP_SHA_256", "SM2PKE"
3972
3992
  # resp.key_metadata.signing_algorithms #=> Array
3973
- # resp.key_metadata.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256"
3993
+ # resp.key_metadata.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256", "ED25519_SHA_512", "ED25519_PH_SHA_512"
3974
3994
  # resp.key_metadata.key_agreement_algorithms #=> Array
3975
3995
  # resp.key_metadata.key_agreement_algorithms[0] #=> String, one of "ECDH"
3976
3996
  # resp.key_metadata.multi_region #=> Boolean
@@ -5349,7 +5369,7 @@ module Aws::KMS
5349
5369
  # "EncryptionContextKey" => "EncryptionContextValue",
5350
5370
  # },
5351
5371
  # key_id: "KeyIdType", # required
5352
- # key_pair_spec: "RSA_2048", # required, accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1, SM2
5372
+ # key_pair_spec: "RSA_2048", # required, accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1, SM2, ECC_NIST_EDWARDS25519
5353
5373
  # grant_tokens: ["GrantTokenType"],
5354
5374
  # recipient: {
5355
5375
  # key_encryption_algorithm: "RSAES_OAEP_SHA_256", # accepts RSAES_OAEP_SHA_256
@@ -5364,7 +5384,7 @@ module Aws::KMS
5364
5384
  # resp.private_key_plaintext #=> String
5365
5385
  # resp.public_key #=> String
5366
5386
  # resp.key_id #=> String
5367
- # resp.key_pair_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SM2"
5387
+ # resp.key_pair_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SM2", "ECC_NIST_EDWARDS25519"
5368
5388
  # resp.ciphertext_for_recipient #=> String
5369
5389
  # resp.key_material_id #=> String
5370
5390
  #
@@ -5567,7 +5587,7 @@ module Aws::KMS
5567
5587
  # "EncryptionContextKey" => "EncryptionContextValue",
5568
5588
  # },
5569
5589
  # key_id: "KeyIdType", # required
5570
- # key_pair_spec: "RSA_2048", # required, accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1, SM2
5590
+ # key_pair_spec: "RSA_2048", # required, accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1, SM2, ECC_NIST_EDWARDS25519
5571
5591
  # grant_tokens: ["GrantTokenType"],
5572
5592
  # dry_run: false,
5573
5593
  # })
@@ -5577,7 +5597,7 @@ module Aws::KMS
5577
5597
  # resp.private_key_ciphertext_blob #=> String
5578
5598
  # resp.public_key #=> String
5579
5599
  # resp.key_id #=> String
5580
- # resp.key_pair_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SM2"
5600
+ # resp.key_pair_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SM2", "ECC_NIST_EDWARDS25519"
5581
5601
  # resp.key_material_id #=> String
5582
5602
  #
5583
5603
  # @see http://docs.aws.amazon.com/goto/WebAPI/kms-2014-11-01/GenerateDataKeyPairWithoutPlaintext AWS API Documentation
@@ -6741,12 +6761,12 @@ module Aws::KMS
6741
6761
  # resp.key_id #=> String
6742
6762
  # resp.public_key #=> String
6743
6763
  # resp.customer_master_key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2"
6744
- # resp.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2", "ML_DSA_44", "ML_DSA_65", "ML_DSA_87"
6764
+ # resp.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2", "ML_DSA_44", "ML_DSA_65", "ML_DSA_87", "ECC_NIST_EDWARDS25519"
6745
6765
  # resp.key_usage #=> String, one of "SIGN_VERIFY", "ENCRYPT_DECRYPT", "GENERATE_VERIFY_MAC", "KEY_AGREEMENT"
6746
6766
  # resp.encryption_algorithms #=> Array
6747
6767
  # resp.encryption_algorithms[0] #=> String, one of "SYMMETRIC_DEFAULT", "RSAES_OAEP_SHA_1", "RSAES_OAEP_SHA_256", "SM2PKE"
6748
6768
  # resp.signing_algorithms #=> Array
6749
- # resp.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256"
6769
+ # resp.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256", "ED25519_SHA_512", "ED25519_PH_SHA_512"
6750
6770
  # resp.key_agreement_algorithms #=> Array
6751
6771
  # resp.key_agreement_algorithms[0] #=> String, one of "ECDH"
6752
6772
  #
@@ -8919,11 +8939,11 @@ module Aws::KMS
8919
8939
  # resp.replica_key_metadata.expiration_model #=> String, one of "KEY_MATERIAL_EXPIRES", "KEY_MATERIAL_DOES_NOT_EXPIRE"
8920
8940
  # resp.replica_key_metadata.key_manager #=> String, one of "AWS", "CUSTOMER"
8921
8941
  # resp.replica_key_metadata.customer_master_key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2"
8922
- # resp.replica_key_metadata.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2", "ML_DSA_44", "ML_DSA_65", "ML_DSA_87"
8942
+ # resp.replica_key_metadata.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2", "ML_DSA_44", "ML_DSA_65", "ML_DSA_87", "ECC_NIST_EDWARDS25519"
8923
8943
  # resp.replica_key_metadata.encryption_algorithms #=> Array
8924
8944
  # resp.replica_key_metadata.encryption_algorithms[0] #=> String, one of "SYMMETRIC_DEFAULT", "RSAES_OAEP_SHA_1", "RSAES_OAEP_SHA_256", "SM2PKE"
8925
8945
  # resp.replica_key_metadata.signing_algorithms #=> Array
8926
- # resp.replica_key_metadata.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256"
8946
+ # resp.replica_key_metadata.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256", "ED25519_SHA_512", "ED25519_PH_SHA_512"
8927
8947
  # resp.replica_key_metadata.key_agreement_algorithms #=> Array
8928
8948
  # resp.replica_key_metadata.key_agreement_algorithms[0] #=> String, one of "ECDH"
8929
8949
  # resp.replica_key_metadata.multi_region #=> Boolean
@@ -9596,6 +9616,13 @@ module Aws::KMS
9596
9616
  # with an unhashed message, the security of the signing operation can be
9597
9617
  # compromised.
9598
9618
  #
9619
+ # When using ECC\_NIST\_EDWARDS25519 KMS keys:
9620
+ #
9621
+ # * ED25519\_SHA\_512 signing algorithm requires KMS `MessageType:RAW`
9622
+ #
9623
+ # * ED25519\_PH\_SHA\_512 signing algorithm requires KMS
9624
+ # `MessageType:DIGEST`
9625
+ #
9599
9626
  # When the value of `MessageType` is `DIGEST`, the length of the
9600
9627
  # `Message` value must match the length of hashed messages for the
9601
9628
  # specified signing algorithm.
@@ -9715,7 +9742,7 @@ module Aws::KMS
9715
9742
  # message: "data", # required
9716
9743
  # message_type: "RAW", # accepts RAW, DIGEST, EXTERNAL_MU
9717
9744
  # grant_tokens: ["GrantTokenType"],
9718
- # signing_algorithm: "RSASSA_PSS_SHA_256", # required, accepts RSASSA_PSS_SHA_256, RSASSA_PSS_SHA_384, RSASSA_PSS_SHA_512, RSASSA_PKCS1_V1_5_SHA_256, RSASSA_PKCS1_V1_5_SHA_384, RSASSA_PKCS1_V1_5_SHA_512, ECDSA_SHA_256, ECDSA_SHA_384, ECDSA_SHA_512, SM2DSA, ML_DSA_SHAKE_256
9745
+ # signing_algorithm: "RSASSA_PSS_SHA_256", # required, accepts RSASSA_PSS_SHA_256, RSASSA_PSS_SHA_384, RSASSA_PSS_SHA_512, RSASSA_PKCS1_V1_5_SHA_256, RSASSA_PKCS1_V1_5_SHA_384, RSASSA_PKCS1_V1_5_SHA_512, ECDSA_SHA_256, ECDSA_SHA_384, ECDSA_SHA_512, SM2DSA, ML_DSA_SHAKE_256, ED25519_SHA_512, ED25519_PH_SHA_512
9719
9746
  # dry_run: false,
9720
9747
  # })
9721
9748
  #
@@ -9723,7 +9750,7 @@ module Aws::KMS
9723
9750
  #
9724
9751
  # resp.key_id #=> String
9725
9752
  # resp.signature #=> String
9726
- # resp.signing_algorithm #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256"
9753
+ # resp.signing_algorithm #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256", "ED25519_SHA_512", "ED25519_PH_SHA_512"
9727
9754
  #
9728
9755
  # @see http://docs.aws.amazon.com/goto/WebAPI/kms-2014-11-01/Sign AWS API Documentation
9729
9756
  #
@@ -10290,6 +10317,15 @@ module Aws::KMS
10290
10317
  #
10291
10318
  # To change this value, the external key store must be disconnected.
10292
10319
  #
10320
+ # @option params [String] :xks_proxy_vpc_endpoint_service_owner
10321
+ # Changes the Amazon Web Services account ID that KMS uses to identify
10322
+ # the Amazon VPC endpoint service for your external key store proxy (XKS
10323
+ # proxy). This parameter is optional. If not specified, the current
10324
+ # Amazon Web Services account ID for the VPC endpoint service will not
10325
+ # be updated.
10326
+ #
10327
+ # To change this value, the external key store must be disconnected.
10328
+ #
10293
10329
  # @option params [Types::XksProxyAuthenticationCredentialType] :xks_proxy_authentication_credential
10294
10330
  # Changes the credentials that KMS uses to sign requests to the external
10295
10331
  # key store proxy (XKS proxy). This parameter is valid only for custom
@@ -10431,6 +10467,7 @@ module Aws::KMS
10431
10467
  # xks_proxy_uri_endpoint: "XksProxyUriEndpointType",
10432
10468
  # xks_proxy_uri_path: "XksProxyUriPathType",
10433
10469
  # xks_proxy_vpc_endpoint_service_name: "XksProxyVpcEndpointServiceNameType",
10470
+ # xks_proxy_vpc_endpoint_service_owner: "AccountIdType",
10434
10471
  # xks_proxy_authentication_credential: {
10435
10472
  # access_key_id: "XksProxyAuthenticationAccessKeyIdType", # required
10436
10473
  # raw_secret_access_key: "XksProxyAuthenticationRawSecretAccessKeyType", # required
@@ -10782,6 +10819,13 @@ module Aws::KMS
10782
10819
  # with an unhashed message, the security of the signing operation can be
10783
10820
  # compromised.
10784
10821
  #
10822
+ # When using ECC\_NIST\_EDWARDS25519 KMS keys:
10823
+ #
10824
+ # * ED25519\_SHA\_512 signing algorithm requires KMS `MessageType:RAW`
10825
+ #
10826
+ # * ED25519\_PH\_SHA\_512 signing algorithm requires KMS
10827
+ # `MessageType:DIGEST`
10828
+ #
10785
10829
  # When the value of `MessageType` is `DIGEST`, the length of the
10786
10830
  # `Message` value must match the length of hashed messages for the
10787
10831
  # specified signing algorithm.
@@ -10902,7 +10946,7 @@ module Aws::KMS
10902
10946
  # message: "data", # required
10903
10947
  # message_type: "RAW", # accepts RAW, DIGEST, EXTERNAL_MU
10904
10948
  # signature: "data", # required
10905
- # signing_algorithm: "RSASSA_PSS_SHA_256", # required, accepts RSASSA_PSS_SHA_256, RSASSA_PSS_SHA_384, RSASSA_PSS_SHA_512, RSASSA_PKCS1_V1_5_SHA_256, RSASSA_PKCS1_V1_5_SHA_384, RSASSA_PKCS1_V1_5_SHA_512, ECDSA_SHA_256, ECDSA_SHA_384, ECDSA_SHA_512, SM2DSA, ML_DSA_SHAKE_256
10949
+ # signing_algorithm: "RSASSA_PSS_SHA_256", # required, accepts RSASSA_PSS_SHA_256, RSASSA_PSS_SHA_384, RSASSA_PSS_SHA_512, RSASSA_PKCS1_V1_5_SHA_256, RSASSA_PKCS1_V1_5_SHA_384, RSASSA_PKCS1_V1_5_SHA_512, ECDSA_SHA_256, ECDSA_SHA_384, ECDSA_SHA_512, SM2DSA, ML_DSA_SHAKE_256, ED25519_SHA_512, ED25519_PH_SHA_512
10906
10950
  # grant_tokens: ["GrantTokenType"],
10907
10951
  # dry_run: false,
10908
10952
  # })
@@ -10911,7 +10955,7 @@ module Aws::KMS
10911
10955
  #
10912
10956
  # resp.key_id #=> String
10913
10957
  # resp.signature_valid #=> Boolean
10914
- # resp.signing_algorithm #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256"
10958
+ # resp.signing_algorithm #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256", "ED25519_SHA_512", "ED25519_PH_SHA_512"
10915
10959
  #
10916
10960
  # @see http://docs.aws.amazon.com/goto/WebAPI/kms-2014-11-01/Verify AWS API Documentation
10917
10961
  #
@@ -11080,7 +11124,7 @@ module Aws::KMS
11080
11124
  tracer: tracer
11081
11125
  )
11082
11126
  context[:gem_name] = 'aws-sdk-kms'
11083
- context[:gem_version] = '1.115.0'
11127
+ context[:gem_version] = '1.117.0'
11084
11128
  Seahorse::Client::Request.new(handlers, context)
11085
11129
  end
11086
11130
 
@@ -15,6 +15,7 @@ module Aws::KMS
15
15
  include Seahorse::Model
16
16
 
17
17
  AWSAccountIdType = Shapes::StringShape.new(name: 'AWSAccountIdType')
18
+ AccountIdType = Shapes::StringShape.new(name: 'AccountIdType')
18
19
  AlgorithmSpec = Shapes::StringShape.new(name: 'AlgorithmSpec')
19
20
  AliasList = Shapes::ListShape.new(name: 'AliasList')
20
21
  AliasListEntry = Shapes::StructureShape.new(name: 'AliasListEntry')
@@ -308,6 +309,7 @@ module Aws::KMS
308
309
  CreateCustomKeyStoreRequest.add_member(:xks_proxy_uri_endpoint, Shapes::ShapeRef.new(shape: XksProxyUriEndpointType, location_name: "XksProxyUriEndpoint"))
309
310
  CreateCustomKeyStoreRequest.add_member(:xks_proxy_uri_path, Shapes::ShapeRef.new(shape: XksProxyUriPathType, location_name: "XksProxyUriPath"))
310
311
  CreateCustomKeyStoreRequest.add_member(:xks_proxy_vpc_endpoint_service_name, Shapes::ShapeRef.new(shape: XksProxyVpcEndpointServiceNameType, location_name: "XksProxyVpcEndpointServiceName"))
312
+ CreateCustomKeyStoreRequest.add_member(:xks_proxy_vpc_endpoint_service_owner, Shapes::ShapeRef.new(shape: AccountIdType, location_name: "XksProxyVpcEndpointServiceOwner"))
311
313
  CreateCustomKeyStoreRequest.add_member(:xks_proxy_authentication_credential, Shapes::ShapeRef.new(shape: XksProxyAuthenticationCredentialType, location_name: "XksProxyAuthenticationCredential"))
312
314
  CreateCustomKeyStoreRequest.add_member(:xks_proxy_connectivity, Shapes::ShapeRef.new(shape: XksProxyConnectivityType, location_name: "XksProxyConnectivity"))
313
315
  CreateCustomKeyStoreRequest.struct_class = Types::CreateCustomKeyStoreRequest
@@ -948,6 +950,7 @@ module Aws::KMS
948
950
  UpdateCustomKeyStoreRequest.add_member(:xks_proxy_uri_endpoint, Shapes::ShapeRef.new(shape: XksProxyUriEndpointType, location_name: "XksProxyUriEndpoint"))
949
951
  UpdateCustomKeyStoreRequest.add_member(:xks_proxy_uri_path, Shapes::ShapeRef.new(shape: XksProxyUriPathType, location_name: "XksProxyUriPath"))
950
952
  UpdateCustomKeyStoreRequest.add_member(:xks_proxy_vpc_endpoint_service_name, Shapes::ShapeRef.new(shape: XksProxyVpcEndpointServiceNameType, location_name: "XksProxyVpcEndpointServiceName"))
953
+ UpdateCustomKeyStoreRequest.add_member(:xks_proxy_vpc_endpoint_service_owner, Shapes::ShapeRef.new(shape: AccountIdType, location_name: "XksProxyVpcEndpointServiceOwner"))
951
954
  UpdateCustomKeyStoreRequest.add_member(:xks_proxy_authentication_credential, Shapes::ShapeRef.new(shape: XksProxyAuthenticationCredentialType, location_name: "XksProxyAuthenticationCredential"))
952
955
  UpdateCustomKeyStoreRequest.add_member(:xks_proxy_connectivity, Shapes::ShapeRef.new(shape: XksProxyConnectivityType, location_name: "XksProxyConnectivity"))
953
956
  UpdateCustomKeyStoreRequest.struct_class = Types::UpdateCustomKeyStoreRequest
@@ -1010,6 +1013,7 @@ module Aws::KMS
1010
1013
  XksProxyConfigurationType.add_member(:uri_endpoint, Shapes::ShapeRef.new(shape: XksProxyUriEndpointType, location_name: "UriEndpoint"))
1011
1014
  XksProxyConfigurationType.add_member(:uri_path, Shapes::ShapeRef.new(shape: XksProxyUriPathType, location_name: "UriPath"))
1012
1015
  XksProxyConfigurationType.add_member(:vpc_endpoint_service_name, Shapes::ShapeRef.new(shape: XksProxyVpcEndpointServiceNameType, location_name: "VpcEndpointServiceName"))
1016
+ XksProxyConfigurationType.add_member(:vpc_endpoint_service_owner, Shapes::ShapeRef.new(shape: AccountIdType, location_name: "VpcEndpointServiceOwner"))
1013
1017
  XksProxyConfigurationType.struct_class = Types::XksProxyConfigurationType
1014
1018
 
1015
1019
  XksProxyIncorrectAuthenticationCredentialException.add_member(:message, Shapes::ShapeRef.new(shape: ErrorMessageType, location_name: "message"))
@@ -485,6 +485,14 @@ module Aws::KMS
485
485
  # [1]: https://docs.aws.amazon.com/kms/latest/developerguide/create-xks-keystore.html#xks-requirements
486
486
  # @return [String]
487
487
  #
488
+ # @!attribute [rw] xks_proxy_vpc_endpoint_service_owner
489
+ # Specifies the Amazon Web Services account ID that owns the Amazon
490
+ # VPC service endpoint for the interface that is used to communicate
491
+ # with your external key store proxy (XKS proxy). This parameter is
492
+ # optional. If not provided, the Amazon Web Services account ID
493
+ # calling the action will be used.
494
+ # @return [String]
495
+ #
488
496
  # @!attribute [rw] xks_proxy_authentication_credential
489
497
  # Specifies an authentication credential for the external key store
490
498
  # proxy (XKS proxy). This parameter is required for all custom key
@@ -549,6 +557,7 @@ module Aws::KMS
549
557
  :xks_proxy_uri_endpoint,
550
558
  :xks_proxy_uri_path,
551
559
  :xks_proxy_vpc_endpoint_service_name,
560
+ :xks_proxy_vpc_endpoint_service_owner,
552
561
  :xks_proxy_authentication_credential,
553
562
  :xks_proxy_connectivity)
554
563
  SENSITIVE = [:key_store_password]
@@ -863,7 +872,7 @@ module Aws::KMS
863
872
  # * For asymmetric KMS keys with RSA key pairs, specify
864
873
  # `ENCRYPT_DECRYPT` or `SIGN_VERIFY`.
865
874
  #
866
- # * For asymmetric KMS keys with NIST-recommended elliptic curve key
875
+ # * For asymmetric KMS keys with NIST-standard elliptic curve key
867
876
  # pairs, specify `SIGN_VERIFY` or `KEY_AGREEMENT`.
868
877
  #
869
878
  # * For asymmetric KMS keys with `ECC_SECG_P256K1` key pairs, specify
@@ -938,7 +947,7 @@ module Aws::KMS
938
947
  # * `RSA_3072`
939
948
  #
940
949
  # * `RSA_4096`
941
- # * Asymmetric NIST-recommended elliptic curve key pairs (signing and
950
+ # * Asymmetric NIST-standard elliptic curve key pairs (signing and
942
951
  # verification -or- deriving shared secrets)
943
952
  #
944
953
  # * `ECC_NIST_P256` (secp256r1)
@@ -946,6 +955,19 @@ module Aws::KMS
946
955
  # * `ECC_NIST_P384` (secp384r1)
947
956
  #
948
957
  # * `ECC_NIST_P521` (secp521r1)
958
+ #
959
+ # * `ECC_NIST_EDWARDS25519` (ed25519) - signing and verification
960
+ # only
961
+ #
962
+ # * **Note:** For ECC\_NIST\_EDWARDS25519 KMS keys, the
963
+ # ED25519\_SHA\_512 signing algorithm requires [
964
+ # `MessageType:RAW`
965
+ # ](kms/latest/APIReference/API_Sign.html#KMS-Sign-request-MessageType),
966
+ # while ED25519\_PH\_SHA\_512 requires [ `MessageType:DIGEST`
967
+ # ](kms/latest/APIReference/API_Sign.html#KMS-Sign-request-MessageType).
968
+ # These message types cannot be used interchangeably.
969
+ #
970
+ # ^
949
971
  # * Other asymmetric elliptic curve key pairs (signing and
950
972
  # verification)
951
973
  #
@@ -1841,7 +1863,7 @@ module Aws::KMS
1841
1863
  end
1842
1864
 
1843
1865
  # @!attribute [rw] key_id
1844
- # Identifies an asymmetric NIST-recommended ECC or SM2 (China Regions
1866
+ # Identifies an asymmetric NIST-standard ECC or SM2 (China Regions
1845
1867
  # only) KMS key. KMS uses the private key in the specified key pair to
1846
1868
  # derive the shared secret. The key usage of the KMS key must be
1847
1869
  # `KEY_AGREEMENT`. To find the `KeyUsage` of a KMS key, use the
@@ -1873,7 +1895,7 @@ module Aws::KMS
1873
1895
  # @return [String]
1874
1896
  #
1875
1897
  # @!attribute [rw] public_key
1876
- # Specifies the public key in your peer's NIST-recommended elliptic
1898
+ # Specifies the public key in your peer's NIST-standard elliptic
1877
1899
  # curve (ECC) or SM2 (China Regions only) key pair.
1878
1900
  #
1879
1901
  # The public key must be a DER-encoded X.509 public key, also known as
@@ -6189,6 +6211,13 @@ module Aws::KMS
6189
6211
  # value with an unhashed message, the security of the signing
6190
6212
  # operation can be compromised.
6191
6213
  #
6214
+ # When using ECC\_NIST\_EDWARDS25519 KMS keys:
6215
+ #
6216
+ # * ED25519\_SHA\_512 signing algorithm requires KMS `MessageType:RAW`
6217
+ #
6218
+ # * ED25519\_PH\_SHA\_512 signing algorithm requires KMS
6219
+ # `MessageType:DIGEST`
6220
+ #
6192
6221
  # When the value of `MessageType` is `DIGEST`, the length of the
6193
6222
  # `Message` value must match the length of hashed messages for the
6194
6223
  # specified signing algorithm.
@@ -6596,6 +6625,16 @@ module Aws::KMS
6596
6625
  # To change this value, the external key store must be disconnected.
6597
6626
  # @return [String]
6598
6627
  #
6628
+ # @!attribute [rw] xks_proxy_vpc_endpoint_service_owner
6629
+ # Changes the Amazon Web Services account ID that KMS uses to identify
6630
+ # the Amazon VPC endpoint service for your external key store proxy
6631
+ # (XKS proxy). This parameter is optional. If not specified, the
6632
+ # current Amazon Web Services account ID for the VPC endpoint service
6633
+ # will not be updated.
6634
+ #
6635
+ # To change this value, the external key store must be disconnected.
6636
+ # @return [String]
6637
+ #
6599
6638
  # @!attribute [rw] xks_proxy_authentication_credential
6600
6639
  # Changes the credentials that KMS uses to sign requests to the
6601
6640
  # external key store proxy (XKS proxy). This parameter is valid only
@@ -6643,6 +6682,7 @@ module Aws::KMS
6643
6682
  :xks_proxy_uri_endpoint,
6644
6683
  :xks_proxy_uri_path,
6645
6684
  :xks_proxy_vpc_endpoint_service_name,
6685
+ :xks_proxy_vpc_endpoint_service_owner,
6646
6686
  :xks_proxy_authentication_credential,
6647
6687
  :xks_proxy_connectivity)
6648
6688
  SENSITIVE = [:key_store_password]
@@ -6872,6 +6912,13 @@ module Aws::KMS
6872
6912
  # value with an unhashed message, the security of the signing
6873
6913
  # operation can be compromised.
6874
6914
  #
6915
+ # When using ECC\_NIST\_EDWARDS25519 KMS keys:
6916
+ #
6917
+ # * ED25519\_SHA\_512 signing algorithm requires KMS `MessageType:RAW`
6918
+ #
6919
+ # * ED25519\_PH\_SHA\_512 signing algorithm requires KMS
6920
+ # `MessageType:DIGEST`
6921
+ #
6875
6922
  # When the value of `MessageType` is `DIGEST`, the length of the
6876
6923
  # `Message` value must match the length of hashed messages for the
6877
6924
  # specified signing algorithm.
@@ -7141,6 +7188,13 @@ module Aws::KMS
7141
7188
  # with KMS.
7142
7189
  # @return [String]
7143
7190
  #
7191
+ # @!attribute [rw] vpc_endpoint_service_owner
7192
+ # The Amazon Web Services account ID that owns the Amazon VPC endpoint
7193
+ # service used to communicate with the external key store proxy (XKS).
7194
+ # This field appears only when the XKS uses an VPC endpoint service to
7195
+ # communicate with KMS.
7196
+ # @return [String]
7197
+ #
7144
7198
  # @see http://docs.aws.amazon.com/goto/WebAPI/kms-2014-11-01/XksProxyConfigurationType AWS API Documentation
7145
7199
  #
7146
7200
  class XksProxyConfigurationType < Struct.new(
@@ -7148,7 +7202,8 @@ module Aws::KMS
7148
7202
  :access_key_id,
7149
7203
  :uri_endpoint,
7150
7204
  :uri_path,
7151
- :vpc_endpoint_service_name)
7205
+ :vpc_endpoint_service_name,
7206
+ :vpc_endpoint_service_owner)
7152
7207
  SENSITIVE = [:access_key_id]
7153
7208
  include Aws::Structure
7154
7209
  end
data/lib/aws-sdk-kms.rb CHANGED
@@ -54,7 +54,7 @@ module Aws::KMS
54
54
  autoload :EndpointProvider, 'aws-sdk-kms/endpoint_provider'
55
55
  autoload :Endpoints, 'aws-sdk-kms/endpoints'
56
56
 
57
- GEM_VERSION = '1.115.0'
57
+ GEM_VERSION = '1.117.0'
58
58
 
59
59
  end
60
60
 
data/sig/client.rbs CHANGED
@@ -119,6 +119,7 @@ module Aws
119
119
  ?xks_proxy_uri_endpoint: ::String,
120
120
  ?xks_proxy_uri_path: ::String,
121
121
  ?xks_proxy_vpc_endpoint_service_name: ::String,
122
+ ?xks_proxy_vpc_endpoint_service_owner: ::String,
122
123
  ?xks_proxy_authentication_credential: {
123
124
  access_key_id: ::String,
124
125
  raw_secret_access_key: ::String
@@ -158,7 +159,7 @@ module Aws
158
159
  ?description: ::String,
159
160
  ?key_usage: ("SIGN_VERIFY" | "ENCRYPT_DECRYPT" | "GENERATE_VERIFY_MAC" | "KEY_AGREEMENT"),
160
161
  ?customer_master_key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2"),
161
- ?key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87"),
162
+ ?key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87" | "ECC_NIST_EDWARDS25519"),
162
163
  ?origin: ("AWS_KMS" | "EXTERNAL" | "AWS_CLOUDHSM" | "EXTERNAL_KEY_STORE"),
163
164
  ?custom_key_store_id: ::String,
164
165
  ?bypass_policy_lockout_safety_check: bool,
@@ -351,7 +352,7 @@ module Aws
351
352
  def private_key_plaintext: () -> ::String
352
353
  def public_key: () -> ::String
353
354
  def key_id: () -> ::String
354
- def key_pair_spec: () -> ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2")
355
+ def key_pair_spec: () -> ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2" | "ECC_NIST_EDWARDS25519")
355
356
  def ciphertext_for_recipient: () -> ::String
356
357
  def key_material_id: () -> ::String
357
358
  end
@@ -359,7 +360,7 @@ module Aws
359
360
  def generate_data_key_pair: (
360
361
  ?encryption_context: Hash[::String, ::String],
361
362
  key_id: ::String,
362
- key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2"),
363
+ key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2" | "ECC_NIST_EDWARDS25519"),
363
364
  ?grant_tokens: Array[::String],
364
365
  ?recipient: {
365
366
  key_encryption_algorithm: ("RSAES_OAEP_SHA_256")?,
@@ -374,14 +375,14 @@ module Aws
374
375
  def private_key_ciphertext_blob: () -> ::String
375
376
  def public_key: () -> ::String
376
377
  def key_id: () -> ::String
377
- def key_pair_spec: () -> ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2")
378
+ def key_pair_spec: () -> ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2" | "ECC_NIST_EDWARDS25519")
378
379
  def key_material_id: () -> ::String
379
380
  end
380
381
  # https://docs.aws.amazon.com/sdk-for-ruby/v3/api/Aws/KMS/Client.html#generate_data_key_pair_without_plaintext-instance_method
381
382
  def generate_data_key_pair_without_plaintext: (
382
383
  ?encryption_context: Hash[::String, ::String],
383
384
  key_id: ::String,
384
- key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2"),
385
+ key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2" | "ECC_NIST_EDWARDS25519"),
385
386
  ?grant_tokens: Array[::String],
386
387
  ?dry_run: bool
387
388
  ) -> _GenerateDataKeyPairWithoutPlaintextResponseSuccess
@@ -482,10 +483,10 @@ module Aws
482
483
  def key_id: () -> ::String
483
484
  def public_key: () -> ::String
484
485
  def customer_master_key_spec: () -> ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2")
485
- def key_spec: () -> ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87")
486
+ def key_spec: () -> ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87" | "ECC_NIST_EDWARDS25519")
486
487
  def key_usage: () -> ("SIGN_VERIFY" | "ENCRYPT_DECRYPT" | "GENERATE_VERIFY_MAC" | "KEY_AGREEMENT")
487
488
  def encryption_algorithms: () -> ::Array[("SYMMETRIC_DEFAULT" | "RSAES_OAEP_SHA_1" | "RSAES_OAEP_SHA_256" | "SM2PKE")]
488
- def signing_algorithms: () -> ::Array[("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")]
489
+ def signing_algorithms: () -> ::Array[("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512")]
489
490
  def key_agreement_algorithms: () -> ::Array[("ECDH")]
490
491
  end
491
492
  # https://docs.aws.amazon.com/sdk-for-ruby/v3/api/Aws/KMS/Client.html#get_public_key-instance_method
@@ -713,7 +714,7 @@ module Aws
713
714
  include ::Seahorse::Client::_ResponseSuccess[Types::SignResponse]
714
715
  def key_id: () -> ::String
715
716
  def signature: () -> ::String
716
- def signing_algorithm: () -> ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")
717
+ def signing_algorithm: () -> ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512")
717
718
  end
718
719
  # https://docs.aws.amazon.com/sdk-for-ruby/v3/api/Aws/KMS/Client.html#sign-instance_method
719
720
  def sign: (
@@ -721,7 +722,7 @@ module Aws
721
722
  message: ::String,
722
723
  ?message_type: ("RAW" | "DIGEST" | "EXTERNAL_MU"),
723
724
  ?grant_tokens: Array[::String],
724
- signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256"),
725
+ signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512"),
725
726
  ?dry_run: bool
726
727
  ) -> _SignResponseSuccess
727
728
  | (Hash[Symbol, untyped] params, ?Hash[Symbol, untyped] options) -> _SignResponseSuccess
@@ -764,6 +765,7 @@ module Aws
764
765
  ?xks_proxy_uri_endpoint: ::String,
765
766
  ?xks_proxy_uri_path: ::String,
766
767
  ?xks_proxy_vpc_endpoint_service_name: ::String,
768
+ ?xks_proxy_vpc_endpoint_service_owner: ::String,
767
769
  ?xks_proxy_authentication_credential: {
768
770
  access_key_id: ::String,
769
771
  raw_secret_access_key: ::String
@@ -790,7 +792,7 @@ module Aws
790
792
  include ::Seahorse::Client::_ResponseSuccess[Types::VerifyResponse]
791
793
  def key_id: () -> ::String
792
794
  def signature_valid: () -> bool
793
- def signing_algorithm: () -> ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")
795
+ def signing_algorithm: () -> ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512")
794
796
  end
795
797
  # https://docs.aws.amazon.com/sdk-for-ruby/v3/api/Aws/KMS/Client.html#verify-instance_method
796
798
  def verify: (
@@ -798,7 +800,7 @@ module Aws
798
800
  message: ::String,
799
801
  ?message_type: ("RAW" | "DIGEST" | "EXTERNAL_MU"),
800
802
  signature: ::String,
801
- signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256"),
803
+ signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512"),
802
804
  ?grant_tokens: Array[::String],
803
805
  ?dry_run: bool
804
806
  ) -> _VerifyResponseSuccess
data/sig/types.rbs CHANGED
@@ -85,6 +85,7 @@ module Aws::KMS
85
85
  attr_accessor xks_proxy_uri_endpoint: ::String
86
86
  attr_accessor xks_proxy_uri_path: ::String
87
87
  attr_accessor xks_proxy_vpc_endpoint_service_name: ::String
88
+ attr_accessor xks_proxy_vpc_endpoint_service_owner: ::String
88
89
  attr_accessor xks_proxy_authentication_credential: Types::XksProxyAuthenticationCredentialType
89
90
  attr_accessor xks_proxy_connectivity: ("PUBLIC_ENDPOINT" | "VPC_ENDPOINT_SERVICE")
90
91
  SENSITIVE: [:key_store_password]
@@ -118,7 +119,7 @@ module Aws::KMS
118
119
  attr_accessor description: ::String
119
120
  attr_accessor key_usage: ("SIGN_VERIFY" | "ENCRYPT_DECRYPT" | "GENERATE_VERIFY_MAC" | "KEY_AGREEMENT")
120
121
  attr_accessor customer_master_key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2")
121
- attr_accessor key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87")
122
+ attr_accessor key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87" | "ECC_NIST_EDWARDS25519")
122
123
  attr_accessor origin: ("AWS_KMS" | "EXTERNAL" | "AWS_CLOUDHSM" | "EXTERNAL_KEY_STORE")
123
124
  attr_accessor custom_key_store_id: ::String
124
125
  attr_accessor bypass_policy_lockout_safety_check: bool
@@ -325,7 +326,7 @@ module Aws::KMS
325
326
  class GenerateDataKeyPairRequest
326
327
  attr_accessor encryption_context: ::Hash[::String, ::String]
327
328
  attr_accessor key_id: ::String
328
- attr_accessor key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2")
329
+ attr_accessor key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2" | "ECC_NIST_EDWARDS25519")
329
330
  attr_accessor grant_tokens: ::Array[::String]
330
331
  attr_accessor recipient: Types::RecipientInfo
331
332
  attr_accessor dry_run: bool
@@ -337,7 +338,7 @@ module Aws::KMS
337
338
  attr_accessor private_key_plaintext: ::String
338
339
  attr_accessor public_key: ::String
339
340
  attr_accessor key_id: ::String
340
- attr_accessor key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2")
341
+ attr_accessor key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2" | "ECC_NIST_EDWARDS25519")
341
342
  attr_accessor ciphertext_for_recipient: ::String
342
343
  attr_accessor key_material_id: ::String
343
344
  SENSITIVE: [:private_key_plaintext]
@@ -346,7 +347,7 @@ module Aws::KMS
346
347
  class GenerateDataKeyPairWithoutPlaintextRequest
347
348
  attr_accessor encryption_context: ::Hash[::String, ::String]
348
349
  attr_accessor key_id: ::String
349
- attr_accessor key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2")
350
+ attr_accessor key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2" | "ECC_NIST_EDWARDS25519")
350
351
  attr_accessor grant_tokens: ::Array[::String]
351
352
  attr_accessor dry_run: bool
352
353
  SENSITIVE: []
@@ -356,7 +357,7 @@ module Aws::KMS
356
357
  attr_accessor private_key_ciphertext_blob: ::String
357
358
  attr_accessor public_key: ::String
358
359
  attr_accessor key_id: ::String
359
- attr_accessor key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2")
360
+ attr_accessor key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2" | "ECC_NIST_EDWARDS25519")
360
361
  attr_accessor key_material_id: ::String
361
362
  SENSITIVE: []
362
363
  end
@@ -478,10 +479,10 @@ module Aws::KMS
478
479
  attr_accessor key_id: ::String
479
480
  attr_accessor public_key: ::String
480
481
  attr_accessor customer_master_key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2")
481
- attr_accessor key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87")
482
+ attr_accessor key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87" | "ECC_NIST_EDWARDS25519")
482
483
  attr_accessor key_usage: ("SIGN_VERIFY" | "ENCRYPT_DECRYPT" | "GENERATE_VERIFY_MAC" | "KEY_AGREEMENT")
483
484
  attr_accessor encryption_algorithms: ::Array[("SYMMETRIC_DEFAULT" | "RSAES_OAEP_SHA_1" | "RSAES_OAEP_SHA_256" | "SM2PKE")]
484
- attr_accessor signing_algorithms: ::Array[("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")]
485
+ attr_accessor signing_algorithms: ::Array[("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512")]
485
486
  attr_accessor key_agreement_algorithms: ::Array[("ECDH")]
486
487
  SENSITIVE: []
487
488
  end
@@ -621,9 +622,9 @@ module Aws::KMS
621
622
  attr_accessor expiration_model: ("KEY_MATERIAL_EXPIRES" | "KEY_MATERIAL_DOES_NOT_EXPIRE")
622
623
  attr_accessor key_manager: ("AWS" | "CUSTOMER")
623
624
  attr_accessor customer_master_key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2")
624
- attr_accessor key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87")
625
+ attr_accessor key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87" | "ECC_NIST_EDWARDS25519")
625
626
  attr_accessor encryption_algorithms: ::Array[("SYMMETRIC_DEFAULT" | "RSAES_OAEP_SHA_1" | "RSAES_OAEP_SHA_256" | "SM2PKE")]
626
- attr_accessor signing_algorithms: ::Array[("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")]
627
+ attr_accessor signing_algorithms: ::Array[("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512")]
627
628
  attr_accessor key_agreement_algorithms: ::Array[("ECDH")]
628
629
  attr_accessor multi_region: bool
629
630
  attr_accessor multi_region_configuration: Types::MultiRegionConfiguration
@@ -872,7 +873,7 @@ module Aws::KMS
872
873
  attr_accessor message: ::String
873
874
  attr_accessor message_type: ("RAW" | "DIGEST" | "EXTERNAL_MU")
874
875
  attr_accessor grant_tokens: ::Array[::String]
875
- attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")
876
+ attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512")
876
877
  attr_accessor dry_run: bool
877
878
  SENSITIVE: [:message]
878
879
  end
@@ -880,7 +881,7 @@ module Aws::KMS
880
881
  class SignResponse
881
882
  attr_accessor key_id: ::String
882
883
  attr_accessor signature: ::String
883
- attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")
884
+ attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512")
884
885
  SENSITIVE: []
885
886
  end
886
887
 
@@ -926,6 +927,7 @@ module Aws::KMS
926
927
  attr_accessor xks_proxy_uri_endpoint: ::String
927
928
  attr_accessor xks_proxy_uri_path: ::String
928
929
  attr_accessor xks_proxy_vpc_endpoint_service_name: ::String
930
+ attr_accessor xks_proxy_vpc_endpoint_service_owner: ::String
929
931
  attr_accessor xks_proxy_authentication_credential: Types::XksProxyAuthenticationCredentialType
930
932
  attr_accessor xks_proxy_connectivity: ("PUBLIC_ENDPOINT" | "VPC_ENDPOINT_SERVICE")
931
933
  SENSITIVE: [:key_store_password]
@@ -968,7 +970,7 @@ module Aws::KMS
968
970
  attr_accessor message: ::String
969
971
  attr_accessor message_type: ("RAW" | "DIGEST" | "EXTERNAL_MU")
970
972
  attr_accessor signature: ::String
971
- attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")
973
+ attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512")
972
974
  attr_accessor grant_tokens: ::Array[::String]
973
975
  attr_accessor dry_run: bool
974
976
  SENSITIVE: [:message]
@@ -977,7 +979,7 @@ module Aws::KMS
977
979
  class VerifyResponse
978
980
  attr_accessor key_id: ::String
979
981
  attr_accessor signature_valid: bool
980
- attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")
982
+ attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512")
981
983
  SENSITIVE: []
982
984
  end
983
985
 
@@ -1013,6 +1015,7 @@ module Aws::KMS
1013
1015
  attr_accessor uri_endpoint: ::String
1014
1016
  attr_accessor uri_path: ::String
1015
1017
  attr_accessor vpc_endpoint_service_name: ::String
1018
+ attr_accessor vpc_endpoint_service_owner: ::String
1016
1019
  SENSITIVE: [:access_key_id]
1017
1020
  end
1018
1021
 
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-kms
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.115.0
4
+ version: 1.117.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services