aws-sdk-kms 1.116.0 → 1.118.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: c4eb2a648acbddead266bcb95a6608654f439f91fb9d091d55a4967849ec3855
4
- data.tar.gz: faec355b13ce018945e5390e66d7496371665c3ecd2be47e8005c4a6b309e827
3
+ metadata.gz: 9e2a68224f5a86c92b415535c7bef7f87cf196d5dd5ffbd46a3a75724fb210fe
4
+ data.tar.gz: 87ba5536876bed1393d07de29b509be6684217d0397aa3981bec94cb5e573bb5
5
5
  SHA512:
6
- metadata.gz: 144ddfd505186599b73146764f9a50db60d70675fc33d6cc203d3a2791c98cd1203d646702ef1f0274d831e49bd3eeb09431b1e652d4463c6065c53945825ee3
7
- data.tar.gz: c99f71427bb4f99df68a00b2a135ea29c387c1627a9c4f7dc587f24b3b5b31346c769f34aa262c5dfffcd40090426df8ae2b1fd21709c381f56eff0b3b016562
6
+ metadata.gz: 26bfa9abee5b2cb9e02977f17a145247f4b1091d08a398864a5d84ff8b6849b026062b37a07e6c5e12dbb511f709628796200818a6e08e9e72e67197920b11ff
7
+ data.tar.gz: ddadc9d563a9613fa0f709ac71148ba6bf9449cf6e7848b0367484520ea6771ac6f38854ff1d230ce70455eed6706a9d05192d966d2d1e983f16fbb1c2cb5f33
data/CHANGELOG.md CHANGED
@@ -1,6 +1,16 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.118.0 (2025-11-21)
5
+ ------------------
6
+
7
+ * Feature - Support for on-demand rotation of AWS KMS Multi-Region keys with imported key material
8
+
9
+ 1.117.0 (2025-11-07)
10
+ ------------------
11
+
12
+ * Feature - Added support for new ECC_NIST_EDWARDS25519 AWS KMS key spec
13
+
4
14
  1.116.0 (2025-10-30)
5
15
  ------------------
6
16
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.116.0
1
+ 1.118.0
@@ -1576,8 +1576,8 @@ module Aws::KMS
1576
1576
  # download the public key so it can be used outside of KMS. Each KMS
1577
1577
  # key can have only one key usage. KMS keys with RSA key pairs can be
1578
1578
  # used to encrypt and decrypt data or sign and verify messages (but
1579
- # not both). KMS keys with NIST-recommended ECC key pairs can be used
1580
- # to sign and verify messages or derive shared secrets (but not both).
1579
+ # not both). KMS keys with NIST-standard ECC key pairs can be used to
1580
+ # sign and verify messages or derive shared secrets (but not both).
1581
1581
  # KMS keys with `ECC_SECG_P256K1` can be used only to sign and verify
1582
1582
  # messages. KMS keys with ML-DSA key pairs can be used to sign and
1583
1583
  # verify messages. KMS keys with SM2 key pairs (China Regions only)
@@ -1827,8 +1827,8 @@ module Aws::KMS
1827
1827
  # * For asymmetric KMS keys with RSA key pairs, specify
1828
1828
  # `ENCRYPT_DECRYPT` or `SIGN_VERIFY`.
1829
1829
  #
1830
- # * For asymmetric KMS keys with NIST-recommended elliptic curve key
1831
- # pairs, specify `SIGN_VERIFY` or `KEY_AGREEMENT`.
1830
+ # * For asymmetric KMS keys with NIST-standard elliptic curve key pairs,
1831
+ # specify `SIGN_VERIFY` or `KEY_AGREEMENT`.
1832
1832
  #
1833
1833
  # * For asymmetric KMS keys with `ECC_SECG_P256K1` key pairs, specify
1834
1834
  # `SIGN_VERIFY`.
@@ -1899,7 +1899,7 @@ module Aws::KMS
1899
1899
  # * `RSA_3072`
1900
1900
  #
1901
1901
  # * `RSA_4096`
1902
- # * Asymmetric NIST-recommended elliptic curve key pairs (signing and
1902
+ # * Asymmetric NIST-standard elliptic curve key pairs (signing and
1903
1903
  # verification -or- deriving shared secrets)
1904
1904
  #
1905
1905
  # * `ECC_NIST_P256` (secp256r1)
@@ -1907,6 +1907,17 @@ module Aws::KMS
1907
1907
  # * `ECC_NIST_P384` (secp384r1)
1908
1908
  #
1909
1909
  # * `ECC_NIST_P521` (secp521r1)
1910
+ #
1911
+ # * `ECC_NIST_EDWARDS25519` (ed25519) - signing and verification only
1912
+ #
1913
+ # * **Note:** For ECC\_NIST\_EDWARDS25519 KMS keys, the
1914
+ # ED25519\_SHA\_512 signing algorithm requires [ `MessageType:RAW`
1915
+ # ](kms/latest/APIReference/API_Sign.html#KMS-Sign-request-MessageType),
1916
+ # while ED25519\_PH\_SHA\_512 requires [ `MessageType:DIGEST`
1917
+ # ](kms/latest/APIReference/API_Sign.html#KMS-Sign-request-MessageType).
1918
+ # These message types cannot be used interchangeably.
1919
+ #
1920
+ # ^
1910
1921
  # * Other asymmetric elliptic curve key pairs (signing and verification)
1911
1922
  #
1912
1923
  # * `ECC_SECG_P256K1` (secp256k1), commonly used for cryptocurrencies.
@@ -2422,7 +2433,7 @@ module Aws::KMS
2422
2433
  # description: "DescriptionType",
2423
2434
  # key_usage: "SIGN_VERIFY", # accepts SIGN_VERIFY, ENCRYPT_DECRYPT, GENERATE_VERIFY_MAC, KEY_AGREEMENT
2424
2435
  # customer_master_key_spec: "RSA_2048", # accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1, SYMMETRIC_DEFAULT, HMAC_224, HMAC_256, HMAC_384, HMAC_512, SM2
2425
- # key_spec: "RSA_2048", # accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1, SYMMETRIC_DEFAULT, HMAC_224, HMAC_256, HMAC_384, HMAC_512, SM2, ML_DSA_44, ML_DSA_65, ML_DSA_87
2436
+ # key_spec: "RSA_2048", # accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1, SYMMETRIC_DEFAULT, HMAC_224, HMAC_256, HMAC_384, HMAC_512, SM2, ML_DSA_44, ML_DSA_65, ML_DSA_87, ECC_NIST_EDWARDS25519
2426
2437
  # origin: "AWS_KMS", # accepts AWS_KMS, EXTERNAL, AWS_CLOUDHSM, EXTERNAL_KEY_STORE
2427
2438
  # custom_key_store_id: "CustomKeyStoreIdType",
2428
2439
  # bypass_policy_lockout_safety_check: false,
@@ -2454,11 +2465,11 @@ module Aws::KMS
2454
2465
  # resp.key_metadata.expiration_model #=> String, one of "KEY_MATERIAL_EXPIRES", "KEY_MATERIAL_DOES_NOT_EXPIRE"
2455
2466
  # resp.key_metadata.key_manager #=> String, one of "AWS", "CUSTOMER"
2456
2467
  # resp.key_metadata.customer_master_key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2"
2457
- # resp.key_metadata.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2", "ML_DSA_44", "ML_DSA_65", "ML_DSA_87"
2468
+ # resp.key_metadata.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2", "ML_DSA_44", "ML_DSA_65", "ML_DSA_87", "ECC_NIST_EDWARDS25519"
2458
2469
  # resp.key_metadata.encryption_algorithms #=> Array
2459
2470
  # resp.key_metadata.encryption_algorithms[0] #=> String, one of "SYMMETRIC_DEFAULT", "RSAES_OAEP_SHA_1", "RSAES_OAEP_SHA_256", "SM2PKE"
2460
2471
  # resp.key_metadata.signing_algorithms #=> Array
2461
- # resp.key_metadata.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256"
2472
+ # resp.key_metadata.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256", "ED25519_SHA_512", "ED25519_PH_SHA_512"
2462
2473
  # resp.key_metadata.key_agreement_algorithms #=> Array
2463
2474
  # resp.key_metadata.key_agreement_algorithms[0] #=> String, one of "ECDH"
2464
2475
  # resp.key_metadata.multi_region #=> Boolean
@@ -2995,6 +3006,16 @@ module Aws::KMS
2995
3006
  # operation does not change the KMS key's state. Otherwise, it changes
2996
3007
  # the KMS key's state to `PendingImport`.
2997
3008
  #
3009
+ # **Considerations for multi-Region symmetric encryption keys**
3010
+ #
3011
+ # * When you delete the key material of a primary Region key that is in
3012
+ # `PENDING_ROTATION` or
3013
+ # `PENDING_MULTI_REGION_IMPORT_AND_ROTATION`state, you'll also be
3014
+ # deleting the key materials for the replica Region keys.
3015
+ #
3016
+ # * If you delete any key material of a replica Region key, the primary
3017
+ # Region key and other replica Region keys remain unchanged.
3018
+ #
2998
3019
  # The KMS key that you use for this operation must be in a compatible
2999
3020
  # key state. For details, see [Key states of KMS keys][2] in the *Key
3000
3021
  # Management Service Developer Guide*.
@@ -3086,8 +3107,8 @@ module Aws::KMS
3086
3107
 
3087
3108
  # Derives a shared secret using a key agreement algorithm.
3088
3109
  #
3089
- # <note markdown="1"> You must use an asymmetric NIST-recommended elliptic curve (ECC) or
3090
- # SM2 (China Regions only) KMS key pair with a `KeyUsage` value of
3110
+ # <note markdown="1"> You must use an asymmetric NIST-standard elliptic curve (ECC) or SM2
3111
+ # (China Regions only) KMS key pair with a `KeyUsage` value of
3091
3112
  # `KEY_AGREEMENT` to call DeriveSharedSecret.
3092
3113
  #
3093
3114
  # </note>
@@ -3108,15 +3129,15 @@ module Aws::KMS
3108
3129
  # 1. **Alice** calls CreateKey to create an asymmetric KMS key pair
3109
3130
  # with a `KeyUsage` value of `KEY_AGREEMENT`.
3110
3131
  #
3111
- # The asymmetric KMS key must use a NIST-recommended elliptic curve
3132
+ # The asymmetric KMS key must use a NIST-standard elliptic curve
3112
3133
  # (ECC) or SM2 (China Regions only) key spec.
3113
3134
  #
3114
3135
  # 2. **Bob** creates an elliptic curve key pair.
3115
3136
  #
3116
3137
  # Bob can call CreateKey to create an asymmetric KMS key pair or
3117
3138
  # generate a key pair outside of KMS. Bob's key pair must use the
3118
- # same NIST-recommended elliptic curve (ECC) or SM2 (China Regions
3119
- # ony) curve as Alice.
3139
+ # same NIST-standard elliptic curve (ECC) or SM2 (China Regions ony)
3140
+ # curve as Alice.
3120
3141
  #
3121
3142
  # 3. Alice and Bob **exchange their public keys** through an insecure
3122
3143
  # communication channel (like the internet).
@@ -3143,12 +3164,12 @@ module Aws::KMS
3143
3164
  # his private key and Alice's public key.
3144
3165
  #
3145
3166
  # To derive a shared secret you must provide a key agreement algorithm,
3146
- # the private key of the caller's asymmetric NIST-recommended elliptic
3167
+ # the private key of the caller's asymmetric NIST-standard elliptic
3147
3168
  # curve or SM2 (China Regions only) KMS key pair, and the public key
3148
- # from your peer's NIST-recommended elliptic curve or SM2 (China
3149
- # Regions only) key pair. The public key can be from another asymmetric
3150
- # KMS key pair or from a key pair generated outside of KMS, but both key
3151
- # pairs must be on the same elliptic curve.
3169
+ # from your peer's NIST-standard elliptic curve or SM2 (China Regions
3170
+ # only) key pair. The public key can be from another asymmetric KMS key
3171
+ # pair or from a key pair generated outside of KMS, but both key pairs
3172
+ # must be on the same elliptic curve.
3152
3173
  #
3153
3174
  # The KMS key that you use for this operation must be in a compatible
3154
3175
  # key state. For details, see [Key states of KMS keys][3] in the *Key
@@ -3180,9 +3201,9 @@ module Aws::KMS
3180
3201
  # [5]: https://docs.aws.amazon.com/kms/latest/developerguide/accessing-kms.html#programming-eventual-consistency
3181
3202
  #
3182
3203
  # @option params [required, String] :key_id
3183
- # Identifies an asymmetric NIST-recommended ECC or SM2 (China Regions
3184
- # only) KMS key. KMS uses the private key in the specified key pair to
3185
- # derive the shared secret. The key usage of the KMS key must be
3204
+ # Identifies an asymmetric NIST-standard ECC or SM2 (China Regions only)
3205
+ # KMS key. KMS uses the private key in the specified key pair to derive
3206
+ # the shared secret. The key usage of the KMS key must be
3186
3207
  # `KEY_AGREEMENT`. To find the `KeyUsage` of a KMS key, use the
3187
3208
  # DescribeKey operation.
3188
3209
  #
@@ -3210,8 +3231,8 @@ module Aws::KMS
3210
3231
  # secret. The only valid value is `ECDH`.
3211
3232
  #
3212
3233
  # @option params [required, String, StringIO, File] :public_key
3213
- # Specifies the public key in your peer's NIST-recommended elliptic
3214
- # curve (ECC) or SM2 (China Regions only) key pair.
3234
+ # Specifies the public key in your peer's NIST-standard elliptic curve
3235
+ # (ECC) or SM2 (China Regions only) key pair.
3215
3236
  #
3216
3237
  # The public key must be a DER-encoded X.509 public key, also known as
3217
3238
  # `SubjectPublicKeyInfo` (SPKI), as defined in [RFC 5280][1].
@@ -3975,11 +3996,11 @@ module Aws::KMS
3975
3996
  # resp.key_metadata.expiration_model #=> String, one of "KEY_MATERIAL_EXPIRES", "KEY_MATERIAL_DOES_NOT_EXPIRE"
3976
3997
  # resp.key_metadata.key_manager #=> String, one of "AWS", "CUSTOMER"
3977
3998
  # resp.key_metadata.customer_master_key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2"
3978
- # resp.key_metadata.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2", "ML_DSA_44", "ML_DSA_65", "ML_DSA_87"
3999
+ # resp.key_metadata.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2", "ML_DSA_44", "ML_DSA_65", "ML_DSA_87", "ECC_NIST_EDWARDS25519"
3979
4000
  # resp.key_metadata.encryption_algorithms #=> Array
3980
4001
  # resp.key_metadata.encryption_algorithms[0] #=> String, one of "SYMMETRIC_DEFAULT", "RSAES_OAEP_SHA_1", "RSAES_OAEP_SHA_256", "SM2PKE"
3981
4002
  # resp.key_metadata.signing_algorithms #=> Array
3982
- # resp.key_metadata.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256"
4003
+ # resp.key_metadata.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256", "ED25519_SHA_512", "ED25519_PH_SHA_512"
3983
4004
  # resp.key_metadata.key_agreement_algorithms #=> Array
3984
4005
  # resp.key_metadata.key_agreement_algorithms[0] #=> String, one of "ECDH"
3985
4006
  # resp.key_metadata.multi_region #=> Boolean
@@ -5358,7 +5379,7 @@ module Aws::KMS
5358
5379
  # "EncryptionContextKey" => "EncryptionContextValue",
5359
5380
  # },
5360
5381
  # key_id: "KeyIdType", # required
5361
- # key_pair_spec: "RSA_2048", # required, accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1, SM2
5382
+ # key_pair_spec: "RSA_2048", # required, accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1, SM2, ECC_NIST_EDWARDS25519
5362
5383
  # grant_tokens: ["GrantTokenType"],
5363
5384
  # recipient: {
5364
5385
  # key_encryption_algorithm: "RSAES_OAEP_SHA_256", # accepts RSAES_OAEP_SHA_256
@@ -5373,7 +5394,7 @@ module Aws::KMS
5373
5394
  # resp.private_key_plaintext #=> String
5374
5395
  # resp.public_key #=> String
5375
5396
  # resp.key_id #=> String
5376
- # resp.key_pair_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SM2"
5397
+ # resp.key_pair_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SM2", "ECC_NIST_EDWARDS25519"
5377
5398
  # resp.ciphertext_for_recipient #=> String
5378
5399
  # resp.key_material_id #=> String
5379
5400
  #
@@ -5576,7 +5597,7 @@ module Aws::KMS
5576
5597
  # "EncryptionContextKey" => "EncryptionContextValue",
5577
5598
  # },
5578
5599
  # key_id: "KeyIdType", # required
5579
- # key_pair_spec: "RSA_2048", # required, accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1, SM2
5600
+ # key_pair_spec: "RSA_2048", # required, accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1, SM2, ECC_NIST_EDWARDS25519
5580
5601
  # grant_tokens: ["GrantTokenType"],
5581
5602
  # dry_run: false,
5582
5603
  # })
@@ -5586,7 +5607,7 @@ module Aws::KMS
5586
5607
  # resp.private_key_ciphertext_blob #=> String
5587
5608
  # resp.public_key #=> String
5588
5609
  # resp.key_id #=> String
5589
- # resp.key_pair_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SM2"
5610
+ # resp.key_pair_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SM2", "ECC_NIST_EDWARDS25519"
5590
5611
  # resp.key_material_id #=> String
5591
5612
  #
5592
5613
  # @see http://docs.aws.amazon.com/goto/WebAPI/kms-2014-11-01/GenerateDataKeyPairWithoutPlaintext AWS API Documentation
@@ -6750,12 +6771,12 @@ module Aws::KMS
6750
6771
  # resp.key_id #=> String
6751
6772
  # resp.public_key #=> String
6752
6773
  # resp.customer_master_key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2"
6753
- # resp.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2", "ML_DSA_44", "ML_DSA_65", "ML_DSA_87"
6774
+ # resp.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2", "ML_DSA_44", "ML_DSA_65", "ML_DSA_87", "ECC_NIST_EDWARDS25519"
6754
6775
  # resp.key_usage #=> String, one of "SIGN_VERIFY", "ENCRYPT_DECRYPT", "GENERATE_VERIFY_MAC", "KEY_AGREEMENT"
6755
6776
  # resp.encryption_algorithms #=> Array
6756
6777
  # resp.encryption_algorithms[0] #=> String, one of "SYMMETRIC_DEFAULT", "RSAES_OAEP_SHA_1", "RSAES_OAEP_SHA_256", "SM2PKE"
6757
6778
  # resp.signing_algorithms #=> Array
6758
- # resp.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256"
6779
+ # resp.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256", "ED25519_SHA_512", "ED25519_PH_SHA_512"
6759
6780
  # resp.key_agreement_algorithms #=> Array
6760
6781
  # resp.key_agreement_algorithms[0] #=> String, one of "ECDH"
6761
6782
  #
@@ -6778,10 +6799,28 @@ module Aws::KMS
6778
6799
  # information about importing key material, see [Importing key
6779
6800
  # material][1].
6780
6801
  #
6781
- # For asymmetric, HMAC and multi-Region keys, you cannot change the key
6782
- # material after the initial import. You can import multiple key
6783
- # materials into single-Region, symmetric encryption keys and rotate the
6784
- # key material on demand using `RotateKeyOnDemand`.
6802
+ # For asymmetric and HMAC keys, you cannot change the key material after
6803
+ # the initial import. You can import multiple key materials into
6804
+ # symmetric encryption keys and rotate the key material on demand using
6805
+ # `RotateKeyOnDemand`.
6806
+ #
6807
+ # You can import new key materials into multi-Region symmetric
6808
+ # encryption keys. To do so, you must import the new key material into
6809
+ # the primary Region key. Then you can import the same key materials
6810
+ # into the replica Region keys. You cannot directly import new key
6811
+ # material into the replica Region keys.
6812
+ #
6813
+ # To import new key material for a multi-Region symmetric key, you’ll
6814
+ # need to complete the following:
6815
+ #
6816
+ # 1. Call `ImportKeyMaterial` on the primary Region key with the
6817
+ # `ImportType`set to `NEW_KEY_MATERIAL`.
6818
+ #
6819
+ # 2. Call `ImportKeyMaterial` on the replica Region key with the
6820
+ # `ImportType` set to `EXISTING_KEY_MATERIAL` using the same key
6821
+ # material imported to the primary Region key. You must do this for
6822
+ # every replica Region key before you can perform the
6823
+ # RotateKeyOnDemand operation on the primary Region key.
6785
6824
  #
6786
6825
  # After you import key material, you can [reimport the same key
6787
6826
  # material][2] into that KMS key or, if the key supports on-demand
@@ -6823,10 +6862,10 @@ module Aws::KMS
6823
6862
  #
6824
6863
  # * The key ID or key ARN of the KMS key to associate with the imported
6825
6864
  # key material. Its `Origin` must be `EXTERNAL` and its `KeyState`
6826
- # must be `PendingImport`. You cannot perform this operation on a KMS
6827
- # key in a [custom key store][5], or on a KMS key in a different
6828
- # Amazon Web Services account. To get the `Origin` and `KeyState` of a
6829
- # KMS key, call DescribeKey.
6865
+ # must be `PendingImport` or `Enabled`. You cannot perform this
6866
+ # operation on a KMS key in a [custom key store][5], or on a KMS key
6867
+ # in a different Amazon Web Services account. To get the `Origin` and
6868
+ # `KeyState` of a KMS key, call DescribeKey.
6830
6869
  #
6831
6870
  # * The encrypted key material.
6832
6871
  #
@@ -6846,13 +6885,12 @@ module Aws::KMS
6846
6885
  # Each time you reimport, you can eliminate or reset the expiration
6847
6886
  # time.
6848
6887
  #
6849
- # When this operation is successful, the key state of the KMS key
6850
- # changes from `PendingImport` to `Enabled`, and you can use the KMS key
6851
- # in cryptographic operations. For single-Region, symmetric encryption
6852
- # keys, you will need to import all of the key materials associated with
6853
- # the KMS key to change its state to `Enabled`. Use the
6854
- # `ListKeyRotations` operation to list the ID and import state of each
6855
- # key material associated with a KMS key.
6888
+ # When this operation is successful, the state of the KMS key changes to
6889
+ # `Enabled`, and you can use the KMS key in cryptographic operations.
6890
+ # For symmetric encryption keys, you will need to import all of the key
6891
+ # materials associated with the KMS key to change its state to
6892
+ # `Enabled`. Use the `ListKeyRotations` operation to list the ID and
6893
+ # import state of each key material associated with a KMS key.
6856
6894
  #
6857
6895
  # If this operation fails, use the exception to help determine the
6858
6896
  # problem. If the error is related to the key material, the import
@@ -6980,6 +7018,12 @@ module Aws::KMS
6980
7018
  # material is imported, if this parameter is omitted then the parameter
6981
7019
  # defaults to `EXISTING_KEY_MATERIAL`.
6982
7020
  #
7021
+ # For multi-Region keys, you must first import new key material into the
7022
+ # primary Region key. You should use the `NEW_KEY_MATERIAL` import type
7023
+ # when importing key material into the primary Region key. Then, you can
7024
+ # import the same key material into the replica Region key. The import
7025
+ # type for the replica Region key should be `EXISTING_KEY_MATERIAL`.
7026
+ #
6983
7027
  # @option params [String] :key_material_description
6984
7028
  # Description for the key material being imported. This parameter is
6985
7029
  # optional and only usable with symmetric encryption keys. If you do not
@@ -7676,7 +7720,7 @@ module Aws::KMS
7676
7720
  # resp.rotations[0].key_material_id #=> String
7677
7721
  # resp.rotations[0].key_material_description #=> String
7678
7722
  # resp.rotations[0].import_state #=> String, one of "IMPORTED", "PENDING_IMPORT"
7679
- # resp.rotations[0].key_material_state #=> String, one of "NON_CURRENT", "CURRENT", "PENDING_ROTATION"
7723
+ # resp.rotations[0].key_material_state #=> String, one of "NON_CURRENT", "CURRENT", "PENDING_ROTATION", "PENDING_MULTI_REGION_IMPORT_AND_ROTATION"
7680
7724
  # resp.rotations[0].expiration_model #=> String, one of "KEY_MATERIAL_EXPIRES", "KEY_MATERIAL_DOES_NOT_EXPIRE"
7681
7725
  # resp.rotations[0].valid_to #=> Time
7682
7726
  # resp.rotations[0].rotation_date #=> Time
@@ -8928,11 +8972,11 @@ module Aws::KMS
8928
8972
  # resp.replica_key_metadata.expiration_model #=> String, one of "KEY_MATERIAL_EXPIRES", "KEY_MATERIAL_DOES_NOT_EXPIRE"
8929
8973
  # resp.replica_key_metadata.key_manager #=> String, one of "AWS", "CUSTOMER"
8930
8974
  # resp.replica_key_metadata.customer_master_key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2"
8931
- # resp.replica_key_metadata.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2", "ML_DSA_44", "ML_DSA_65", "ML_DSA_87"
8975
+ # resp.replica_key_metadata.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2", "ML_DSA_44", "ML_DSA_65", "ML_DSA_87", "ECC_NIST_EDWARDS25519"
8932
8976
  # resp.replica_key_metadata.encryption_algorithms #=> Array
8933
8977
  # resp.replica_key_metadata.encryption_algorithms[0] #=> String, one of "SYMMETRIC_DEFAULT", "RSAES_OAEP_SHA_1", "RSAES_OAEP_SHA_256", "SM2PKE"
8934
8978
  # resp.replica_key_metadata.signing_algorithms #=> Array
8935
- # resp.replica_key_metadata.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256"
8979
+ # resp.replica_key_metadata.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256", "ED25519_SHA_512", "ED25519_PH_SHA_512"
8936
8980
  # resp.replica_key_metadata.key_agreement_algorithms #=> Array
8937
8981
  # resp.replica_key_metadata.key_agreement_algorithms[0] #=> String, one of "ECDH"
8938
8982
  # resp.replica_key_metadata.multi_region #=> Boolean
@@ -9209,30 +9253,31 @@ module Aws::KMS
9209
9253
  #
9210
9254
  # On-demand key rotation is supported only on symmetric encryption KMS
9211
9255
  # keys. You cannot perform on-demand rotation of [asymmetric KMS
9212
- # keys][3], [HMAC KMS keys][4], multi-Region KMS keys with [imported key
9213
- # material][5], or KMS keys in a [custom key store][6]. When you
9214
- # initiate on-demand key rotation on a symmetric encryption KMS key with
9215
- # imported key material, you must have already imported [new key
9216
- # material][7] and that key material's state should be
9256
+ # keys][3], [HMAC KMS keys][4], or KMS keys in a [custom key store][5].
9257
+ # When you initiate on-demand key rotation on a symmetric encryption KMS
9258
+ # key with imported key material, you must have already imported [new
9259
+ # key material][6] and that key material's state should be
9217
9260
  # `PENDING_ROTATION`. Use the `ListKeyRotations` operation to check the
9218
9261
  # state of all key materials associated with a KMS key. To perform
9219
- # on-demand rotation of a set of related [multi-Region keys][8], invoke
9220
- # the on-demand rotation on the primary key.
9262
+ # on-demand rotation of a set of related [multi-Region keys][7], import
9263
+ # new key material in the primary Region key, import the same key
9264
+ # material in each replica Region key, and invoke the on-demand rotation
9265
+ # on the primary Region key.
9221
9266
  #
9222
9267
  # You cannot initiate on-demand rotation of [Amazon Web Services managed
9223
- # KMS keys][9]. KMS always rotates the key material of Amazon Web
9268
+ # KMS keys][8]. KMS always rotates the key material of Amazon Web
9224
9269
  # Services managed keys every year. Rotation of [Amazon Web Services
9225
- # owned KMS keys][10] is managed by the Amazon Web Services service that
9270
+ # owned KMS keys][9] is managed by the Amazon Web Services service that
9226
9271
  # owns the key.
9227
9272
  #
9228
9273
  # The KMS key that you use for this operation must be in a compatible
9229
- # key state. For details, see [Key states of KMS keys][11] in the *Key
9274
+ # key state. For details, see [Key states of KMS keys][10] in the *Key
9230
9275
  # Management Service Developer Guide*.
9231
9276
  #
9232
9277
  # **Cross-account use**: No. You cannot perform this operation on a KMS
9233
9278
  # key in a different Amazon Web Services account.
9234
9279
  #
9235
- # **Required permissions**: [kms:RotateKeyOnDemand][12] (key policy)
9280
+ # **Required permissions**: [kms:RotateKeyOnDemand][11] (key policy)
9236
9281
  #
9237
9282
  # **Related operations:**
9238
9283
  #
@@ -9247,7 +9292,7 @@ module Aws::KMS
9247
9292
  # * ListKeyRotations
9248
9293
  #
9249
9294
  # **Eventual consistency**: The KMS API follows an eventual consistency
9250
- # model. For more information, see [KMS eventual consistency][13].
9295
+ # model. For more information, see [KMS eventual consistency][12].
9251
9296
  #
9252
9297
  #
9253
9298
  #
@@ -9255,15 +9300,14 @@ module Aws::KMS
9255
9300
  # [2]: https://docs.aws.amazon.com/kms/latest/developerguide/rotating-keys-enable-disable.html
9256
9301
  # [3]: https://docs.aws.amazon.com/kms/latest/developerguide/symmetric-asymmetric.html
9257
9302
  # [4]: https://docs.aws.amazon.com/kms/latest/developerguide/hmac.html
9258
- # [5]: https://docs.aws.amazon.com/kms/latest/developerguide/importing-keys.html
9259
- # [6]: https://docs.aws.amazon.com/kms/latest/developerguide/key-store-overview.html
9260
- # [7]: https://docs.aws.amazon.com/kms/latest/developerguide/importing-keys-import-key-material.html
9261
- # [8]: https://docs.aws.amazon.com/kms/latest/developerguide/rotate-keys.html#multi-region-rotate
9262
- # [9]: https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#aws-managed-key
9263
- # [10]: https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#aws-owned-key
9264
- # [11]: https://docs.aws.amazon.com/kms/latest/developerguide/key-state.html
9265
- # [12]: https://docs.aws.amazon.com/kms/latest/developerguide/kms-api-permissions-reference.html
9266
- # [13]: https://docs.aws.amazon.com/kms/latest/developerguide/accessing-kms.html#programming-eventual-consistency
9303
+ # [5]: https://docs.aws.amazon.com/kms/latest/developerguide/key-store-overview.html
9304
+ # [6]: https://docs.aws.amazon.com/kms/latest/developerguide/importing-keys-import-key-material.html
9305
+ # [7]: https://docs.aws.amazon.com/kms/latest/developerguide/rotate-keys.html#multi-region-rotate
9306
+ # [8]: https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#aws-managed-key
9307
+ # [9]: https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#aws-owned-key
9308
+ # [10]: https://docs.aws.amazon.com/kms/latest/developerguide/key-state.html
9309
+ # [11]: https://docs.aws.amazon.com/kms/latest/developerguide/kms-api-permissions-reference.html
9310
+ # [12]: https://docs.aws.amazon.com/kms/latest/developerguide/accessing-kms.html#programming-eventual-consistency
9267
9311
  #
9268
9312
  # @option params [required, String] :key_id
9269
9313
  # Identifies a symmetric encryption KMS key. You cannot perform
@@ -9605,6 +9649,13 @@ module Aws::KMS
9605
9649
  # with an unhashed message, the security of the signing operation can be
9606
9650
  # compromised.
9607
9651
  #
9652
+ # When using ECC\_NIST\_EDWARDS25519 KMS keys:
9653
+ #
9654
+ # * ED25519\_SHA\_512 signing algorithm requires KMS `MessageType:RAW`
9655
+ #
9656
+ # * ED25519\_PH\_SHA\_512 signing algorithm requires KMS
9657
+ # `MessageType:DIGEST`
9658
+ #
9608
9659
  # When the value of `MessageType` is `DIGEST`, the length of the
9609
9660
  # `Message` value must match the length of hashed messages for the
9610
9661
  # specified signing algorithm.
@@ -9724,7 +9775,7 @@ module Aws::KMS
9724
9775
  # message: "data", # required
9725
9776
  # message_type: "RAW", # accepts RAW, DIGEST, EXTERNAL_MU
9726
9777
  # grant_tokens: ["GrantTokenType"],
9727
- # signing_algorithm: "RSASSA_PSS_SHA_256", # required, accepts RSASSA_PSS_SHA_256, RSASSA_PSS_SHA_384, RSASSA_PSS_SHA_512, RSASSA_PKCS1_V1_5_SHA_256, RSASSA_PKCS1_V1_5_SHA_384, RSASSA_PKCS1_V1_5_SHA_512, ECDSA_SHA_256, ECDSA_SHA_384, ECDSA_SHA_512, SM2DSA, ML_DSA_SHAKE_256
9778
+ # signing_algorithm: "RSASSA_PSS_SHA_256", # required, accepts RSASSA_PSS_SHA_256, RSASSA_PSS_SHA_384, RSASSA_PSS_SHA_512, RSASSA_PKCS1_V1_5_SHA_256, RSASSA_PKCS1_V1_5_SHA_384, RSASSA_PKCS1_V1_5_SHA_512, ECDSA_SHA_256, ECDSA_SHA_384, ECDSA_SHA_512, SM2DSA, ML_DSA_SHAKE_256, ED25519_SHA_512, ED25519_PH_SHA_512
9728
9779
  # dry_run: false,
9729
9780
  # })
9730
9781
  #
@@ -9732,7 +9783,7 @@ module Aws::KMS
9732
9783
  #
9733
9784
  # resp.key_id #=> String
9734
9785
  # resp.signature #=> String
9735
- # resp.signing_algorithm #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256"
9786
+ # resp.signing_algorithm #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256", "ED25519_SHA_512", "ED25519_PH_SHA_512"
9736
9787
  #
9737
9788
  # @see http://docs.aws.amazon.com/goto/WebAPI/kms-2014-11-01/Sign AWS API Documentation
9738
9789
  #
@@ -10801,6 +10852,13 @@ module Aws::KMS
10801
10852
  # with an unhashed message, the security of the signing operation can be
10802
10853
  # compromised.
10803
10854
  #
10855
+ # When using ECC\_NIST\_EDWARDS25519 KMS keys:
10856
+ #
10857
+ # * ED25519\_SHA\_512 signing algorithm requires KMS `MessageType:RAW`
10858
+ #
10859
+ # * ED25519\_PH\_SHA\_512 signing algorithm requires KMS
10860
+ # `MessageType:DIGEST`
10861
+ #
10804
10862
  # When the value of `MessageType` is `DIGEST`, the length of the
10805
10863
  # `Message` value must match the length of hashed messages for the
10806
10864
  # specified signing algorithm.
@@ -10921,7 +10979,7 @@ module Aws::KMS
10921
10979
  # message: "data", # required
10922
10980
  # message_type: "RAW", # accepts RAW, DIGEST, EXTERNAL_MU
10923
10981
  # signature: "data", # required
10924
- # signing_algorithm: "RSASSA_PSS_SHA_256", # required, accepts RSASSA_PSS_SHA_256, RSASSA_PSS_SHA_384, RSASSA_PSS_SHA_512, RSASSA_PKCS1_V1_5_SHA_256, RSASSA_PKCS1_V1_5_SHA_384, RSASSA_PKCS1_V1_5_SHA_512, ECDSA_SHA_256, ECDSA_SHA_384, ECDSA_SHA_512, SM2DSA, ML_DSA_SHAKE_256
10982
+ # signing_algorithm: "RSASSA_PSS_SHA_256", # required, accepts RSASSA_PSS_SHA_256, RSASSA_PSS_SHA_384, RSASSA_PSS_SHA_512, RSASSA_PKCS1_V1_5_SHA_256, RSASSA_PKCS1_V1_5_SHA_384, RSASSA_PKCS1_V1_5_SHA_512, ECDSA_SHA_256, ECDSA_SHA_384, ECDSA_SHA_512, SM2DSA, ML_DSA_SHAKE_256, ED25519_SHA_512, ED25519_PH_SHA_512
10925
10983
  # grant_tokens: ["GrantTokenType"],
10926
10984
  # dry_run: false,
10927
10985
  # })
@@ -10930,7 +10988,7 @@ module Aws::KMS
10930
10988
  #
10931
10989
  # resp.key_id #=> String
10932
10990
  # resp.signature_valid #=> Boolean
10933
- # resp.signing_algorithm #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256"
10991
+ # resp.signing_algorithm #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256", "ED25519_SHA_512", "ED25519_PH_SHA_512"
10934
10992
  #
10935
10993
  # @see http://docs.aws.amazon.com/goto/WebAPI/kms-2014-11-01/Verify AWS API Documentation
10936
10994
  #
@@ -11099,7 +11157,7 @@ module Aws::KMS
11099
11157
  tracer: tracer
11100
11158
  )
11101
11159
  context[:gem_name] = 'aws-sdk-kms'
11102
- context[:gem_version] = '1.116.0'
11160
+ context[:gem_version] = '1.118.0'
11103
11161
  Seahorse::Client::Request.new(handlers, context)
11104
11162
  end
11105
11163
 
@@ -872,7 +872,7 @@ module Aws::KMS
872
872
  # * For asymmetric KMS keys with RSA key pairs, specify
873
873
  # `ENCRYPT_DECRYPT` or `SIGN_VERIFY`.
874
874
  #
875
- # * For asymmetric KMS keys with NIST-recommended elliptic curve key
875
+ # * For asymmetric KMS keys with NIST-standard elliptic curve key
876
876
  # pairs, specify `SIGN_VERIFY` or `KEY_AGREEMENT`.
877
877
  #
878
878
  # * For asymmetric KMS keys with `ECC_SECG_P256K1` key pairs, specify
@@ -947,7 +947,7 @@ module Aws::KMS
947
947
  # * `RSA_3072`
948
948
  #
949
949
  # * `RSA_4096`
950
- # * Asymmetric NIST-recommended elliptic curve key pairs (signing and
950
+ # * Asymmetric NIST-standard elliptic curve key pairs (signing and
951
951
  # verification -or- deriving shared secrets)
952
952
  #
953
953
  # * `ECC_NIST_P256` (secp256r1)
@@ -955,6 +955,19 @@ module Aws::KMS
955
955
  # * `ECC_NIST_P384` (secp384r1)
956
956
  #
957
957
  # * `ECC_NIST_P521` (secp521r1)
958
+ #
959
+ # * `ECC_NIST_EDWARDS25519` (ed25519) - signing and verification
960
+ # only
961
+ #
962
+ # * **Note:** For ECC\_NIST\_EDWARDS25519 KMS keys, the
963
+ # ED25519\_SHA\_512 signing algorithm requires [
964
+ # `MessageType:RAW`
965
+ # ](kms/latest/APIReference/API_Sign.html#KMS-Sign-request-MessageType),
966
+ # while ED25519\_PH\_SHA\_512 requires [ `MessageType:DIGEST`
967
+ # ](kms/latest/APIReference/API_Sign.html#KMS-Sign-request-MessageType).
968
+ # These message types cannot be used interchangeably.
969
+ #
970
+ # ^
958
971
  # * Other asymmetric elliptic curve key pairs (signing and
959
972
  # verification)
960
973
  #
@@ -1850,7 +1863,7 @@ module Aws::KMS
1850
1863
  end
1851
1864
 
1852
1865
  # @!attribute [rw] key_id
1853
- # Identifies an asymmetric NIST-recommended ECC or SM2 (China Regions
1866
+ # Identifies an asymmetric NIST-standard ECC or SM2 (China Regions
1854
1867
  # only) KMS key. KMS uses the private key in the specified key pair to
1855
1868
  # derive the shared secret. The key usage of the KMS key must be
1856
1869
  # `KEY_AGREEMENT`. To find the `KeyUsage` of a KMS key, use the
@@ -1882,7 +1895,7 @@ module Aws::KMS
1882
1895
  # @return [String]
1883
1896
  #
1884
1897
  # @!attribute [rw] public_key
1885
- # Specifies the public key in your peer's NIST-recommended elliptic
1898
+ # Specifies the public key in your peer's NIST-standard elliptic
1886
1899
  # curve (ECC) or SM2 (China Regions only) key pair.
1887
1900
  #
1888
1901
  # The public key must be a DER-encoded X.509 public key, also known as
@@ -3980,6 +3993,13 @@ module Aws::KMS
3980
3993
  # the parameter defaults to `NEW_KEY_MATERIAL`. After the first key
3981
3994
  # material is imported, if this parameter is omitted then the
3982
3995
  # parameter defaults to `EXISTING_KEY_MATERIAL`.
3996
+ #
3997
+ # For multi-Region keys, you must first import new key material into
3998
+ # the primary Region key. You should use the `NEW_KEY_MATERIAL` import
3999
+ # type when importing key material into the primary Region key. Then,
4000
+ # you can import the same key material into the replica Region key.
4001
+ # The import type for the replica Region key should be
4002
+ # `EXISTING_KEY_MATERIAL`.
3983
4003
  # @return [String]
3984
4004
  #
3985
4005
  # @!attribute [rw] key_material_description
@@ -4563,12 +4583,11 @@ module Aws::KMS
4563
4583
  #
4564
4584
  # @!attribute [rw] current_key_material_id
4565
4585
  # Identifies the current key material. This value is present for
4566
- # symmetric encryption keys with `AWS_KMS` origin and single-Region,
4567
- # symmetric encryption keys with `EXTERNAL` origin. These KMS keys
4568
- # support automatic or on-demand key rotation and can have multiple
4569
- # key materials associated with them. KMS uses the current key
4570
- # material for both encryption and decryption, and the non-current key
4571
- # material for decryption operations only.
4586
+ # symmetric encryption keys with `AWS_KMS` or `EXTERNAL` origin. These
4587
+ # KMS keys support automatic or on-demand key rotation and can have
4588
+ # multiple key materials associated with them. KMS uses the current
4589
+ # key material for both encryption and decryption, and the non-current
4590
+ # key material for decryption operations only.
4572
4591
  # @return [String]
4573
4592
  #
4574
4593
  # @see http://docs.aws.amazon.com/goto/WebAPI/kms-2014-11-01/KeyMetadata AWS API Documentation
@@ -5988,15 +6007,24 @@ module Aws::KMS
5988
6007
  # @return [String]
5989
6008
  #
5990
6009
  # @!attribute [rw] key_material_state
5991
- # There are three possible values for this field: `CURRENT`,
5992
- # `NON_CURRENT` and `PENDING_ROTATION`. KMS uses `CURRENT` key
5993
- # material for both encryption and decryption and `NON_CURRENT` key
5994
- # material only for decryption. `PENDING_ROTATION` identifies key
5995
- # material that has been imported for on-demand key rotation but the
5996
- # rotation hasn't completed. Key material in `PENDING_ROTATION` is
5997
- # not permanently associated with the KMS key. You can delete this key
5998
- # material and import different key material in its place. The
5999
- # `PENDING_ROTATION` value is only used in symmetric encryption keys
6010
+ # There are four possible values for this field: `CURRENT`,
6011
+ # `NON_CURRENT`, `PENDING_MULTI_REGION_IMPORT_AND_ROTATION` and
6012
+ # `PENDING_ROTATION`. KMS uses `CURRENT` key material for both
6013
+ # encryption and decryption and `NON_CURRENT` key material only for
6014
+ # decryption. `PENDING_ROTATION` identifies key material that has been
6015
+ # imported for on-demand key rotation but the rotation hasn't
6016
+ # completed. The key material state
6017
+ # `PENDING_MULTI_REGION_IMPORT_AND_ROTATION` is unique to
6018
+ # multi-region, symmetric encryption keys with imported key material.
6019
+ # It indicates key material that has been imported into the primary
6020
+ # Region key but not all of the replica Region keys. When this key
6021
+ # material is imported in to all of the replica Region keys, the key
6022
+ # material state will change to `PENDING_ROTATION`. Key material in
6023
+ # `PENDING_MULTI_REGION_IMPORT_AND_ROTATION` or `PENDING_ROTATION`
6024
+ # state is not permanently associated with the KMS key. You can delete
6025
+ # this key material and import different key material in its place.
6026
+ # The `PENDING_MULTI_REGION_IMPORT_AND_ROTATION` and
6027
+ # `PENDING_ROTATION` values are only used in symmetric encryption keys
6000
6028
  # with imported key material. The other values, `CURRENT` and
6001
6029
  # `NON_CURRENT`, are used for all KMS keys that support automatic or
6002
6030
  # on-demand key rotation.
@@ -6198,6 +6226,13 @@ module Aws::KMS
6198
6226
  # value with an unhashed message, the security of the signing
6199
6227
  # operation can be compromised.
6200
6228
  #
6229
+ # When using ECC\_NIST\_EDWARDS25519 KMS keys:
6230
+ #
6231
+ # * ED25519\_SHA\_512 signing algorithm requires KMS `MessageType:RAW`
6232
+ #
6233
+ # * ED25519\_PH\_SHA\_512 signing algorithm requires KMS
6234
+ # `MessageType:DIGEST`
6235
+ #
6201
6236
  # When the value of `MessageType` is `DIGEST`, the length of the
6202
6237
  # `Message` value must match the length of hashed messages for the
6203
6238
  # specified signing algorithm.
@@ -6892,6 +6927,13 @@ module Aws::KMS
6892
6927
  # value with an unhashed message, the security of the signing
6893
6928
  # operation can be compromised.
6894
6929
  #
6930
+ # When using ECC\_NIST\_EDWARDS25519 KMS keys:
6931
+ #
6932
+ # * ED25519\_SHA\_512 signing algorithm requires KMS `MessageType:RAW`
6933
+ #
6934
+ # * ED25519\_PH\_SHA\_512 signing algorithm requires KMS
6935
+ # `MessageType:DIGEST`
6936
+ #
6895
6937
  # When the value of `MessageType` is `DIGEST`, the length of the
6896
6938
  # `Message` value must match the length of hashed messages for the
6897
6939
  # specified signing algorithm.
data/lib/aws-sdk-kms.rb CHANGED
@@ -54,7 +54,7 @@ module Aws::KMS
54
54
  autoload :EndpointProvider, 'aws-sdk-kms/endpoint_provider'
55
55
  autoload :Endpoints, 'aws-sdk-kms/endpoints'
56
56
 
57
- GEM_VERSION = '1.116.0'
57
+ GEM_VERSION = '1.118.0'
58
58
 
59
59
  end
60
60
 
data/sig/client.rbs CHANGED
@@ -159,7 +159,7 @@ module Aws
159
159
  ?description: ::String,
160
160
  ?key_usage: ("SIGN_VERIFY" | "ENCRYPT_DECRYPT" | "GENERATE_VERIFY_MAC" | "KEY_AGREEMENT"),
161
161
  ?customer_master_key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2"),
162
- ?key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87"),
162
+ ?key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87" | "ECC_NIST_EDWARDS25519"),
163
163
  ?origin: ("AWS_KMS" | "EXTERNAL" | "AWS_CLOUDHSM" | "EXTERNAL_KEY_STORE"),
164
164
  ?custom_key_store_id: ::String,
165
165
  ?bypass_policy_lockout_safety_check: bool,
@@ -352,7 +352,7 @@ module Aws
352
352
  def private_key_plaintext: () -> ::String
353
353
  def public_key: () -> ::String
354
354
  def key_id: () -> ::String
355
- def key_pair_spec: () -> ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2")
355
+ def key_pair_spec: () -> ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2" | "ECC_NIST_EDWARDS25519")
356
356
  def ciphertext_for_recipient: () -> ::String
357
357
  def key_material_id: () -> ::String
358
358
  end
@@ -360,7 +360,7 @@ module Aws
360
360
  def generate_data_key_pair: (
361
361
  ?encryption_context: Hash[::String, ::String],
362
362
  key_id: ::String,
363
- key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2"),
363
+ key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2" | "ECC_NIST_EDWARDS25519"),
364
364
  ?grant_tokens: Array[::String],
365
365
  ?recipient: {
366
366
  key_encryption_algorithm: ("RSAES_OAEP_SHA_256")?,
@@ -375,14 +375,14 @@ module Aws
375
375
  def private_key_ciphertext_blob: () -> ::String
376
376
  def public_key: () -> ::String
377
377
  def key_id: () -> ::String
378
- def key_pair_spec: () -> ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2")
378
+ def key_pair_spec: () -> ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2" | "ECC_NIST_EDWARDS25519")
379
379
  def key_material_id: () -> ::String
380
380
  end
381
381
  # https://docs.aws.amazon.com/sdk-for-ruby/v3/api/Aws/KMS/Client.html#generate_data_key_pair_without_plaintext-instance_method
382
382
  def generate_data_key_pair_without_plaintext: (
383
383
  ?encryption_context: Hash[::String, ::String],
384
384
  key_id: ::String,
385
- key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2"),
385
+ key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2" | "ECC_NIST_EDWARDS25519"),
386
386
  ?grant_tokens: Array[::String],
387
387
  ?dry_run: bool
388
388
  ) -> _GenerateDataKeyPairWithoutPlaintextResponseSuccess
@@ -483,10 +483,10 @@ module Aws
483
483
  def key_id: () -> ::String
484
484
  def public_key: () -> ::String
485
485
  def customer_master_key_spec: () -> ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2")
486
- def key_spec: () -> ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87")
486
+ def key_spec: () -> ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87" | "ECC_NIST_EDWARDS25519")
487
487
  def key_usage: () -> ("SIGN_VERIFY" | "ENCRYPT_DECRYPT" | "GENERATE_VERIFY_MAC" | "KEY_AGREEMENT")
488
488
  def encryption_algorithms: () -> ::Array[("SYMMETRIC_DEFAULT" | "RSAES_OAEP_SHA_1" | "RSAES_OAEP_SHA_256" | "SM2PKE")]
489
- def signing_algorithms: () -> ::Array[("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")]
489
+ def signing_algorithms: () -> ::Array[("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512")]
490
490
  def key_agreement_algorithms: () -> ::Array[("ECDH")]
491
491
  end
492
492
  # https://docs.aws.amazon.com/sdk-for-ruby/v3/api/Aws/KMS/Client.html#get_public_key-instance_method
@@ -714,7 +714,7 @@ module Aws
714
714
  include ::Seahorse::Client::_ResponseSuccess[Types::SignResponse]
715
715
  def key_id: () -> ::String
716
716
  def signature: () -> ::String
717
- def signing_algorithm: () -> ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")
717
+ def signing_algorithm: () -> ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512")
718
718
  end
719
719
  # https://docs.aws.amazon.com/sdk-for-ruby/v3/api/Aws/KMS/Client.html#sign-instance_method
720
720
  def sign: (
@@ -722,7 +722,7 @@ module Aws
722
722
  message: ::String,
723
723
  ?message_type: ("RAW" | "DIGEST" | "EXTERNAL_MU"),
724
724
  ?grant_tokens: Array[::String],
725
- signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256"),
725
+ signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512"),
726
726
  ?dry_run: bool
727
727
  ) -> _SignResponseSuccess
728
728
  | (Hash[Symbol, untyped] params, ?Hash[Symbol, untyped] options) -> _SignResponseSuccess
@@ -792,7 +792,7 @@ module Aws
792
792
  include ::Seahorse::Client::_ResponseSuccess[Types::VerifyResponse]
793
793
  def key_id: () -> ::String
794
794
  def signature_valid: () -> bool
795
- def signing_algorithm: () -> ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")
795
+ def signing_algorithm: () -> ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512")
796
796
  end
797
797
  # https://docs.aws.amazon.com/sdk-for-ruby/v3/api/Aws/KMS/Client.html#verify-instance_method
798
798
  def verify: (
@@ -800,7 +800,7 @@ module Aws
800
800
  message: ::String,
801
801
  ?message_type: ("RAW" | "DIGEST" | "EXTERNAL_MU"),
802
802
  signature: ::String,
803
- signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256"),
803
+ signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512"),
804
804
  ?grant_tokens: Array[::String],
805
805
  ?dry_run: bool
806
806
  ) -> _VerifyResponseSuccess
data/sig/types.rbs CHANGED
@@ -119,7 +119,7 @@ module Aws::KMS
119
119
  attr_accessor description: ::String
120
120
  attr_accessor key_usage: ("SIGN_VERIFY" | "ENCRYPT_DECRYPT" | "GENERATE_VERIFY_MAC" | "KEY_AGREEMENT")
121
121
  attr_accessor customer_master_key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2")
122
- attr_accessor key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87")
122
+ attr_accessor key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87" | "ECC_NIST_EDWARDS25519")
123
123
  attr_accessor origin: ("AWS_KMS" | "EXTERNAL" | "AWS_CLOUDHSM" | "EXTERNAL_KEY_STORE")
124
124
  attr_accessor custom_key_store_id: ::String
125
125
  attr_accessor bypass_policy_lockout_safety_check: bool
@@ -326,7 +326,7 @@ module Aws::KMS
326
326
  class GenerateDataKeyPairRequest
327
327
  attr_accessor encryption_context: ::Hash[::String, ::String]
328
328
  attr_accessor key_id: ::String
329
- attr_accessor key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2")
329
+ attr_accessor key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2" | "ECC_NIST_EDWARDS25519")
330
330
  attr_accessor grant_tokens: ::Array[::String]
331
331
  attr_accessor recipient: Types::RecipientInfo
332
332
  attr_accessor dry_run: bool
@@ -338,7 +338,7 @@ module Aws::KMS
338
338
  attr_accessor private_key_plaintext: ::String
339
339
  attr_accessor public_key: ::String
340
340
  attr_accessor key_id: ::String
341
- attr_accessor key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2")
341
+ attr_accessor key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2" | "ECC_NIST_EDWARDS25519")
342
342
  attr_accessor ciphertext_for_recipient: ::String
343
343
  attr_accessor key_material_id: ::String
344
344
  SENSITIVE: [:private_key_plaintext]
@@ -347,7 +347,7 @@ module Aws::KMS
347
347
  class GenerateDataKeyPairWithoutPlaintextRequest
348
348
  attr_accessor encryption_context: ::Hash[::String, ::String]
349
349
  attr_accessor key_id: ::String
350
- attr_accessor key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2")
350
+ attr_accessor key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2" | "ECC_NIST_EDWARDS25519")
351
351
  attr_accessor grant_tokens: ::Array[::String]
352
352
  attr_accessor dry_run: bool
353
353
  SENSITIVE: []
@@ -357,7 +357,7 @@ module Aws::KMS
357
357
  attr_accessor private_key_ciphertext_blob: ::String
358
358
  attr_accessor public_key: ::String
359
359
  attr_accessor key_id: ::String
360
- attr_accessor key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2")
360
+ attr_accessor key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2" | "ECC_NIST_EDWARDS25519")
361
361
  attr_accessor key_material_id: ::String
362
362
  SENSITIVE: []
363
363
  end
@@ -479,10 +479,10 @@ module Aws::KMS
479
479
  attr_accessor key_id: ::String
480
480
  attr_accessor public_key: ::String
481
481
  attr_accessor customer_master_key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2")
482
- attr_accessor key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87")
482
+ attr_accessor key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87" | "ECC_NIST_EDWARDS25519")
483
483
  attr_accessor key_usage: ("SIGN_VERIFY" | "ENCRYPT_DECRYPT" | "GENERATE_VERIFY_MAC" | "KEY_AGREEMENT")
484
484
  attr_accessor encryption_algorithms: ::Array[("SYMMETRIC_DEFAULT" | "RSAES_OAEP_SHA_1" | "RSAES_OAEP_SHA_256" | "SM2PKE")]
485
- attr_accessor signing_algorithms: ::Array[("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")]
485
+ attr_accessor signing_algorithms: ::Array[("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512")]
486
486
  attr_accessor key_agreement_algorithms: ::Array[("ECDH")]
487
487
  SENSITIVE: []
488
488
  end
@@ -622,9 +622,9 @@ module Aws::KMS
622
622
  attr_accessor expiration_model: ("KEY_MATERIAL_EXPIRES" | "KEY_MATERIAL_DOES_NOT_EXPIRE")
623
623
  attr_accessor key_manager: ("AWS" | "CUSTOMER")
624
624
  attr_accessor customer_master_key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2")
625
- attr_accessor key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87")
625
+ attr_accessor key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87" | "ECC_NIST_EDWARDS25519")
626
626
  attr_accessor encryption_algorithms: ::Array[("SYMMETRIC_DEFAULT" | "RSAES_OAEP_SHA_1" | "RSAES_OAEP_SHA_256" | "SM2PKE")]
627
- attr_accessor signing_algorithms: ::Array[("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")]
627
+ attr_accessor signing_algorithms: ::Array[("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512")]
628
628
  attr_accessor key_agreement_algorithms: ::Array[("ECDH")]
629
629
  attr_accessor multi_region: bool
630
630
  attr_accessor multi_region_configuration: Types::MultiRegionConfiguration
@@ -846,7 +846,7 @@ module Aws::KMS
846
846
  attr_accessor key_material_id: ::String
847
847
  attr_accessor key_material_description: ::String
848
848
  attr_accessor import_state: ("IMPORTED" | "PENDING_IMPORT")
849
- attr_accessor key_material_state: ("NON_CURRENT" | "CURRENT" | "PENDING_ROTATION")
849
+ attr_accessor key_material_state: ("NON_CURRENT" | "CURRENT" | "PENDING_ROTATION" | "PENDING_MULTI_REGION_IMPORT_AND_ROTATION")
850
850
  attr_accessor expiration_model: ("KEY_MATERIAL_EXPIRES" | "KEY_MATERIAL_DOES_NOT_EXPIRE")
851
851
  attr_accessor valid_to: ::Time
852
852
  attr_accessor rotation_date: ::Time
@@ -873,7 +873,7 @@ module Aws::KMS
873
873
  attr_accessor message: ::String
874
874
  attr_accessor message_type: ("RAW" | "DIGEST" | "EXTERNAL_MU")
875
875
  attr_accessor grant_tokens: ::Array[::String]
876
- attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")
876
+ attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512")
877
877
  attr_accessor dry_run: bool
878
878
  SENSITIVE: [:message]
879
879
  end
@@ -881,7 +881,7 @@ module Aws::KMS
881
881
  class SignResponse
882
882
  attr_accessor key_id: ::String
883
883
  attr_accessor signature: ::String
884
- attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")
884
+ attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512")
885
885
  SENSITIVE: []
886
886
  end
887
887
 
@@ -970,7 +970,7 @@ module Aws::KMS
970
970
  attr_accessor message: ::String
971
971
  attr_accessor message_type: ("RAW" | "DIGEST" | "EXTERNAL_MU")
972
972
  attr_accessor signature: ::String
973
- attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")
973
+ attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512")
974
974
  attr_accessor grant_tokens: ::Array[::String]
975
975
  attr_accessor dry_run: bool
976
976
  SENSITIVE: [:message]
@@ -979,7 +979,7 @@ module Aws::KMS
979
979
  class VerifyResponse
980
980
  attr_accessor key_id: ::String
981
981
  attr_accessor signature_valid: bool
982
- attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")
982
+ attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512")
983
983
  SENSITIVE: []
984
984
  end
985
985
 
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-kms
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.116.0
4
+ version: 1.118.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
@@ -18,7 +18,7 @@ dependencies:
18
18
  version: '3'
19
19
  - - ">="
20
20
  - !ruby/object:Gem::Version
21
- version: 3.234.0
21
+ version: 3.239.1
22
22
  type: :runtime
23
23
  prerelease: false
24
24
  version_requirements: !ruby/object:Gem::Requirement
@@ -28,7 +28,7 @@ dependencies:
28
28
  version: '3'
29
29
  - - ">="
30
30
  - !ruby/object:Gem::Version
31
- version: 3.234.0
31
+ version: 3.239.1
32
32
  - !ruby/object:Gem::Dependency
33
33
  name: aws-sigv4
34
34
  requirement: !ruby/object:Gem::Requirement