aws-sdk-kms 1.116.0 → 1.118.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +10 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-kms/client.rb +133 -75
- data/lib/aws-sdk-kms/types.rb +61 -19
- data/lib/aws-sdk-kms.rb +1 -1
- data/sig/client.rbs +11 -11
- data/sig/types.rbs +14 -14
- metadata +3 -3
checksums.yaml
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
---
|
|
2
2
|
SHA256:
|
|
3
|
-
metadata.gz:
|
|
4
|
-
data.tar.gz:
|
|
3
|
+
metadata.gz: 9e2a68224f5a86c92b415535c7bef7f87cf196d5dd5ffbd46a3a75724fb210fe
|
|
4
|
+
data.tar.gz: 87ba5536876bed1393d07de29b509be6684217d0397aa3981bec94cb5e573bb5
|
|
5
5
|
SHA512:
|
|
6
|
-
metadata.gz:
|
|
7
|
-
data.tar.gz:
|
|
6
|
+
metadata.gz: 26bfa9abee5b2cb9e02977f17a145247f4b1091d08a398864a5d84ff8b6849b026062b37a07e6c5e12dbb511f709628796200818a6e08e9e72e67197920b11ff
|
|
7
|
+
data.tar.gz: ddadc9d563a9613fa0f709ac71148ba6bf9449cf6e7848b0367484520ea6771ac6f38854ff1d230ce70455eed6706a9d05192d966d2d1e983f16fbb1c2cb5f33
|
data/CHANGELOG.md
CHANGED
|
@@ -1,6 +1,16 @@
|
|
|
1
1
|
Unreleased Changes
|
|
2
2
|
------------------
|
|
3
3
|
|
|
4
|
+
1.118.0 (2025-11-21)
|
|
5
|
+
------------------
|
|
6
|
+
|
|
7
|
+
* Feature - Support for on-demand rotation of AWS KMS Multi-Region keys with imported key material
|
|
8
|
+
|
|
9
|
+
1.117.0 (2025-11-07)
|
|
10
|
+
------------------
|
|
11
|
+
|
|
12
|
+
* Feature - Added support for new ECC_NIST_EDWARDS25519 AWS KMS key spec
|
|
13
|
+
|
|
4
14
|
1.116.0 (2025-10-30)
|
|
5
15
|
------------------
|
|
6
16
|
|
data/VERSION
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
1.
|
|
1
|
+
1.118.0
|
data/lib/aws-sdk-kms/client.rb
CHANGED
|
@@ -1576,8 +1576,8 @@ module Aws::KMS
|
|
|
1576
1576
|
# download the public key so it can be used outside of KMS. Each KMS
|
|
1577
1577
|
# key can have only one key usage. KMS keys with RSA key pairs can be
|
|
1578
1578
|
# used to encrypt and decrypt data or sign and verify messages (but
|
|
1579
|
-
# not both). KMS keys with NIST-
|
|
1580
|
-
#
|
|
1579
|
+
# not both). KMS keys with NIST-standard ECC key pairs can be used to
|
|
1580
|
+
# sign and verify messages or derive shared secrets (but not both).
|
|
1581
1581
|
# KMS keys with `ECC_SECG_P256K1` can be used only to sign and verify
|
|
1582
1582
|
# messages. KMS keys with ML-DSA key pairs can be used to sign and
|
|
1583
1583
|
# verify messages. KMS keys with SM2 key pairs (China Regions only)
|
|
@@ -1827,8 +1827,8 @@ module Aws::KMS
|
|
|
1827
1827
|
# * For asymmetric KMS keys with RSA key pairs, specify
|
|
1828
1828
|
# `ENCRYPT_DECRYPT` or `SIGN_VERIFY`.
|
|
1829
1829
|
#
|
|
1830
|
-
# * For asymmetric KMS keys with NIST-
|
|
1831
|
-
#
|
|
1830
|
+
# * For asymmetric KMS keys with NIST-standard elliptic curve key pairs,
|
|
1831
|
+
# specify `SIGN_VERIFY` or `KEY_AGREEMENT`.
|
|
1832
1832
|
#
|
|
1833
1833
|
# * For asymmetric KMS keys with `ECC_SECG_P256K1` key pairs, specify
|
|
1834
1834
|
# `SIGN_VERIFY`.
|
|
@@ -1899,7 +1899,7 @@ module Aws::KMS
|
|
|
1899
1899
|
# * `RSA_3072`
|
|
1900
1900
|
#
|
|
1901
1901
|
# * `RSA_4096`
|
|
1902
|
-
# * Asymmetric NIST-
|
|
1902
|
+
# * Asymmetric NIST-standard elliptic curve key pairs (signing and
|
|
1903
1903
|
# verification -or- deriving shared secrets)
|
|
1904
1904
|
#
|
|
1905
1905
|
# * `ECC_NIST_P256` (secp256r1)
|
|
@@ -1907,6 +1907,17 @@ module Aws::KMS
|
|
|
1907
1907
|
# * `ECC_NIST_P384` (secp384r1)
|
|
1908
1908
|
#
|
|
1909
1909
|
# * `ECC_NIST_P521` (secp521r1)
|
|
1910
|
+
#
|
|
1911
|
+
# * `ECC_NIST_EDWARDS25519` (ed25519) - signing and verification only
|
|
1912
|
+
#
|
|
1913
|
+
# * **Note:** For ECC\_NIST\_EDWARDS25519 KMS keys, the
|
|
1914
|
+
# ED25519\_SHA\_512 signing algorithm requires [ `MessageType:RAW`
|
|
1915
|
+
# ](kms/latest/APIReference/API_Sign.html#KMS-Sign-request-MessageType),
|
|
1916
|
+
# while ED25519\_PH\_SHA\_512 requires [ `MessageType:DIGEST`
|
|
1917
|
+
# ](kms/latest/APIReference/API_Sign.html#KMS-Sign-request-MessageType).
|
|
1918
|
+
# These message types cannot be used interchangeably.
|
|
1919
|
+
#
|
|
1920
|
+
# ^
|
|
1910
1921
|
# * Other asymmetric elliptic curve key pairs (signing and verification)
|
|
1911
1922
|
#
|
|
1912
1923
|
# * `ECC_SECG_P256K1` (secp256k1), commonly used for cryptocurrencies.
|
|
@@ -2422,7 +2433,7 @@ module Aws::KMS
|
|
|
2422
2433
|
# description: "DescriptionType",
|
|
2423
2434
|
# key_usage: "SIGN_VERIFY", # accepts SIGN_VERIFY, ENCRYPT_DECRYPT, GENERATE_VERIFY_MAC, KEY_AGREEMENT
|
|
2424
2435
|
# customer_master_key_spec: "RSA_2048", # accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1, SYMMETRIC_DEFAULT, HMAC_224, HMAC_256, HMAC_384, HMAC_512, SM2
|
|
2425
|
-
# key_spec: "RSA_2048", # accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1, SYMMETRIC_DEFAULT, HMAC_224, HMAC_256, HMAC_384, HMAC_512, SM2, ML_DSA_44, ML_DSA_65, ML_DSA_87
|
|
2436
|
+
# key_spec: "RSA_2048", # accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1, SYMMETRIC_DEFAULT, HMAC_224, HMAC_256, HMAC_384, HMAC_512, SM2, ML_DSA_44, ML_DSA_65, ML_DSA_87, ECC_NIST_EDWARDS25519
|
|
2426
2437
|
# origin: "AWS_KMS", # accepts AWS_KMS, EXTERNAL, AWS_CLOUDHSM, EXTERNAL_KEY_STORE
|
|
2427
2438
|
# custom_key_store_id: "CustomKeyStoreIdType",
|
|
2428
2439
|
# bypass_policy_lockout_safety_check: false,
|
|
@@ -2454,11 +2465,11 @@ module Aws::KMS
|
|
|
2454
2465
|
# resp.key_metadata.expiration_model #=> String, one of "KEY_MATERIAL_EXPIRES", "KEY_MATERIAL_DOES_NOT_EXPIRE"
|
|
2455
2466
|
# resp.key_metadata.key_manager #=> String, one of "AWS", "CUSTOMER"
|
|
2456
2467
|
# resp.key_metadata.customer_master_key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2"
|
|
2457
|
-
# resp.key_metadata.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2", "ML_DSA_44", "ML_DSA_65", "ML_DSA_87"
|
|
2468
|
+
# resp.key_metadata.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2", "ML_DSA_44", "ML_DSA_65", "ML_DSA_87", "ECC_NIST_EDWARDS25519"
|
|
2458
2469
|
# resp.key_metadata.encryption_algorithms #=> Array
|
|
2459
2470
|
# resp.key_metadata.encryption_algorithms[0] #=> String, one of "SYMMETRIC_DEFAULT", "RSAES_OAEP_SHA_1", "RSAES_OAEP_SHA_256", "SM2PKE"
|
|
2460
2471
|
# resp.key_metadata.signing_algorithms #=> Array
|
|
2461
|
-
# resp.key_metadata.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256"
|
|
2472
|
+
# resp.key_metadata.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256", "ED25519_SHA_512", "ED25519_PH_SHA_512"
|
|
2462
2473
|
# resp.key_metadata.key_agreement_algorithms #=> Array
|
|
2463
2474
|
# resp.key_metadata.key_agreement_algorithms[0] #=> String, one of "ECDH"
|
|
2464
2475
|
# resp.key_metadata.multi_region #=> Boolean
|
|
@@ -2995,6 +3006,16 @@ module Aws::KMS
|
|
|
2995
3006
|
# operation does not change the KMS key's state. Otherwise, it changes
|
|
2996
3007
|
# the KMS key's state to `PendingImport`.
|
|
2997
3008
|
#
|
|
3009
|
+
# **Considerations for multi-Region symmetric encryption keys**
|
|
3010
|
+
#
|
|
3011
|
+
# * When you delete the key material of a primary Region key that is in
|
|
3012
|
+
# `PENDING_ROTATION` or
|
|
3013
|
+
# `PENDING_MULTI_REGION_IMPORT_AND_ROTATION`state, you'll also be
|
|
3014
|
+
# deleting the key materials for the replica Region keys.
|
|
3015
|
+
#
|
|
3016
|
+
# * If you delete any key material of a replica Region key, the primary
|
|
3017
|
+
# Region key and other replica Region keys remain unchanged.
|
|
3018
|
+
#
|
|
2998
3019
|
# The KMS key that you use for this operation must be in a compatible
|
|
2999
3020
|
# key state. For details, see [Key states of KMS keys][2] in the *Key
|
|
3000
3021
|
# Management Service Developer Guide*.
|
|
@@ -3086,8 +3107,8 @@ module Aws::KMS
|
|
|
3086
3107
|
|
|
3087
3108
|
# Derives a shared secret using a key agreement algorithm.
|
|
3088
3109
|
#
|
|
3089
|
-
# <note markdown="1"> You must use an asymmetric NIST-
|
|
3090
|
-
#
|
|
3110
|
+
# <note markdown="1"> You must use an asymmetric NIST-standard elliptic curve (ECC) or SM2
|
|
3111
|
+
# (China Regions only) KMS key pair with a `KeyUsage` value of
|
|
3091
3112
|
# `KEY_AGREEMENT` to call DeriveSharedSecret.
|
|
3092
3113
|
#
|
|
3093
3114
|
# </note>
|
|
@@ -3108,15 +3129,15 @@ module Aws::KMS
|
|
|
3108
3129
|
# 1. **Alice** calls CreateKey to create an asymmetric KMS key pair
|
|
3109
3130
|
# with a `KeyUsage` value of `KEY_AGREEMENT`.
|
|
3110
3131
|
#
|
|
3111
|
-
# The asymmetric KMS key must use a NIST-
|
|
3132
|
+
# The asymmetric KMS key must use a NIST-standard elliptic curve
|
|
3112
3133
|
# (ECC) or SM2 (China Regions only) key spec.
|
|
3113
3134
|
#
|
|
3114
3135
|
# 2. **Bob** creates an elliptic curve key pair.
|
|
3115
3136
|
#
|
|
3116
3137
|
# Bob can call CreateKey to create an asymmetric KMS key pair or
|
|
3117
3138
|
# generate a key pair outside of KMS. Bob's key pair must use the
|
|
3118
|
-
# same NIST-
|
|
3119
|
-
#
|
|
3139
|
+
# same NIST-standard elliptic curve (ECC) or SM2 (China Regions ony)
|
|
3140
|
+
# curve as Alice.
|
|
3120
3141
|
#
|
|
3121
3142
|
# 3. Alice and Bob **exchange their public keys** through an insecure
|
|
3122
3143
|
# communication channel (like the internet).
|
|
@@ -3143,12 +3164,12 @@ module Aws::KMS
|
|
|
3143
3164
|
# his private key and Alice's public key.
|
|
3144
3165
|
#
|
|
3145
3166
|
# To derive a shared secret you must provide a key agreement algorithm,
|
|
3146
|
-
# the private key of the caller's asymmetric NIST-
|
|
3167
|
+
# the private key of the caller's asymmetric NIST-standard elliptic
|
|
3147
3168
|
# curve or SM2 (China Regions only) KMS key pair, and the public key
|
|
3148
|
-
# from your peer's NIST-
|
|
3149
|
-
#
|
|
3150
|
-
#
|
|
3151
|
-
#
|
|
3169
|
+
# from your peer's NIST-standard elliptic curve or SM2 (China Regions
|
|
3170
|
+
# only) key pair. The public key can be from another asymmetric KMS key
|
|
3171
|
+
# pair or from a key pair generated outside of KMS, but both key pairs
|
|
3172
|
+
# must be on the same elliptic curve.
|
|
3152
3173
|
#
|
|
3153
3174
|
# The KMS key that you use for this operation must be in a compatible
|
|
3154
3175
|
# key state. For details, see [Key states of KMS keys][3] in the *Key
|
|
@@ -3180,9 +3201,9 @@ module Aws::KMS
|
|
|
3180
3201
|
# [5]: https://docs.aws.amazon.com/kms/latest/developerguide/accessing-kms.html#programming-eventual-consistency
|
|
3181
3202
|
#
|
|
3182
3203
|
# @option params [required, String] :key_id
|
|
3183
|
-
# Identifies an asymmetric NIST-
|
|
3184
|
-
#
|
|
3185
|
-
#
|
|
3204
|
+
# Identifies an asymmetric NIST-standard ECC or SM2 (China Regions only)
|
|
3205
|
+
# KMS key. KMS uses the private key in the specified key pair to derive
|
|
3206
|
+
# the shared secret. The key usage of the KMS key must be
|
|
3186
3207
|
# `KEY_AGREEMENT`. To find the `KeyUsage` of a KMS key, use the
|
|
3187
3208
|
# DescribeKey operation.
|
|
3188
3209
|
#
|
|
@@ -3210,8 +3231,8 @@ module Aws::KMS
|
|
|
3210
3231
|
# secret. The only valid value is `ECDH`.
|
|
3211
3232
|
#
|
|
3212
3233
|
# @option params [required, String, StringIO, File] :public_key
|
|
3213
|
-
# Specifies the public key in your peer's NIST-
|
|
3214
|
-
#
|
|
3234
|
+
# Specifies the public key in your peer's NIST-standard elliptic curve
|
|
3235
|
+
# (ECC) or SM2 (China Regions only) key pair.
|
|
3215
3236
|
#
|
|
3216
3237
|
# The public key must be a DER-encoded X.509 public key, also known as
|
|
3217
3238
|
# `SubjectPublicKeyInfo` (SPKI), as defined in [RFC 5280][1].
|
|
@@ -3975,11 +3996,11 @@ module Aws::KMS
|
|
|
3975
3996
|
# resp.key_metadata.expiration_model #=> String, one of "KEY_MATERIAL_EXPIRES", "KEY_MATERIAL_DOES_NOT_EXPIRE"
|
|
3976
3997
|
# resp.key_metadata.key_manager #=> String, one of "AWS", "CUSTOMER"
|
|
3977
3998
|
# resp.key_metadata.customer_master_key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2"
|
|
3978
|
-
# resp.key_metadata.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2", "ML_DSA_44", "ML_DSA_65", "ML_DSA_87"
|
|
3999
|
+
# resp.key_metadata.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2", "ML_DSA_44", "ML_DSA_65", "ML_DSA_87", "ECC_NIST_EDWARDS25519"
|
|
3979
4000
|
# resp.key_metadata.encryption_algorithms #=> Array
|
|
3980
4001
|
# resp.key_metadata.encryption_algorithms[0] #=> String, one of "SYMMETRIC_DEFAULT", "RSAES_OAEP_SHA_1", "RSAES_OAEP_SHA_256", "SM2PKE"
|
|
3981
4002
|
# resp.key_metadata.signing_algorithms #=> Array
|
|
3982
|
-
# resp.key_metadata.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256"
|
|
4003
|
+
# resp.key_metadata.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256", "ED25519_SHA_512", "ED25519_PH_SHA_512"
|
|
3983
4004
|
# resp.key_metadata.key_agreement_algorithms #=> Array
|
|
3984
4005
|
# resp.key_metadata.key_agreement_algorithms[0] #=> String, one of "ECDH"
|
|
3985
4006
|
# resp.key_metadata.multi_region #=> Boolean
|
|
@@ -5358,7 +5379,7 @@ module Aws::KMS
|
|
|
5358
5379
|
# "EncryptionContextKey" => "EncryptionContextValue",
|
|
5359
5380
|
# },
|
|
5360
5381
|
# key_id: "KeyIdType", # required
|
|
5361
|
-
# key_pair_spec: "RSA_2048", # required, accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1, SM2
|
|
5382
|
+
# key_pair_spec: "RSA_2048", # required, accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1, SM2, ECC_NIST_EDWARDS25519
|
|
5362
5383
|
# grant_tokens: ["GrantTokenType"],
|
|
5363
5384
|
# recipient: {
|
|
5364
5385
|
# key_encryption_algorithm: "RSAES_OAEP_SHA_256", # accepts RSAES_OAEP_SHA_256
|
|
@@ -5373,7 +5394,7 @@ module Aws::KMS
|
|
|
5373
5394
|
# resp.private_key_plaintext #=> String
|
|
5374
5395
|
# resp.public_key #=> String
|
|
5375
5396
|
# resp.key_id #=> String
|
|
5376
|
-
# resp.key_pair_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SM2"
|
|
5397
|
+
# resp.key_pair_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SM2", "ECC_NIST_EDWARDS25519"
|
|
5377
5398
|
# resp.ciphertext_for_recipient #=> String
|
|
5378
5399
|
# resp.key_material_id #=> String
|
|
5379
5400
|
#
|
|
@@ -5576,7 +5597,7 @@ module Aws::KMS
|
|
|
5576
5597
|
# "EncryptionContextKey" => "EncryptionContextValue",
|
|
5577
5598
|
# },
|
|
5578
5599
|
# key_id: "KeyIdType", # required
|
|
5579
|
-
# key_pair_spec: "RSA_2048", # required, accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1, SM2
|
|
5600
|
+
# key_pair_spec: "RSA_2048", # required, accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1, SM2, ECC_NIST_EDWARDS25519
|
|
5580
5601
|
# grant_tokens: ["GrantTokenType"],
|
|
5581
5602
|
# dry_run: false,
|
|
5582
5603
|
# })
|
|
@@ -5586,7 +5607,7 @@ module Aws::KMS
|
|
|
5586
5607
|
# resp.private_key_ciphertext_blob #=> String
|
|
5587
5608
|
# resp.public_key #=> String
|
|
5588
5609
|
# resp.key_id #=> String
|
|
5589
|
-
# resp.key_pair_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SM2"
|
|
5610
|
+
# resp.key_pair_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SM2", "ECC_NIST_EDWARDS25519"
|
|
5590
5611
|
# resp.key_material_id #=> String
|
|
5591
5612
|
#
|
|
5592
5613
|
# @see http://docs.aws.amazon.com/goto/WebAPI/kms-2014-11-01/GenerateDataKeyPairWithoutPlaintext AWS API Documentation
|
|
@@ -6750,12 +6771,12 @@ module Aws::KMS
|
|
|
6750
6771
|
# resp.key_id #=> String
|
|
6751
6772
|
# resp.public_key #=> String
|
|
6752
6773
|
# resp.customer_master_key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2"
|
|
6753
|
-
# resp.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2", "ML_DSA_44", "ML_DSA_65", "ML_DSA_87"
|
|
6774
|
+
# resp.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2", "ML_DSA_44", "ML_DSA_65", "ML_DSA_87", "ECC_NIST_EDWARDS25519"
|
|
6754
6775
|
# resp.key_usage #=> String, one of "SIGN_VERIFY", "ENCRYPT_DECRYPT", "GENERATE_VERIFY_MAC", "KEY_AGREEMENT"
|
|
6755
6776
|
# resp.encryption_algorithms #=> Array
|
|
6756
6777
|
# resp.encryption_algorithms[0] #=> String, one of "SYMMETRIC_DEFAULT", "RSAES_OAEP_SHA_1", "RSAES_OAEP_SHA_256", "SM2PKE"
|
|
6757
6778
|
# resp.signing_algorithms #=> Array
|
|
6758
|
-
# resp.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256"
|
|
6779
|
+
# resp.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256", "ED25519_SHA_512", "ED25519_PH_SHA_512"
|
|
6759
6780
|
# resp.key_agreement_algorithms #=> Array
|
|
6760
6781
|
# resp.key_agreement_algorithms[0] #=> String, one of "ECDH"
|
|
6761
6782
|
#
|
|
@@ -6778,10 +6799,28 @@ module Aws::KMS
|
|
|
6778
6799
|
# information about importing key material, see [Importing key
|
|
6779
6800
|
# material][1].
|
|
6780
6801
|
#
|
|
6781
|
-
# For asymmetric
|
|
6782
|
-
#
|
|
6783
|
-
#
|
|
6784
|
-
#
|
|
6802
|
+
# For asymmetric and HMAC keys, you cannot change the key material after
|
|
6803
|
+
# the initial import. You can import multiple key materials into
|
|
6804
|
+
# symmetric encryption keys and rotate the key material on demand using
|
|
6805
|
+
# `RotateKeyOnDemand`.
|
|
6806
|
+
#
|
|
6807
|
+
# You can import new key materials into multi-Region symmetric
|
|
6808
|
+
# encryption keys. To do so, you must import the new key material into
|
|
6809
|
+
# the primary Region key. Then you can import the same key materials
|
|
6810
|
+
# into the replica Region keys. You cannot directly import new key
|
|
6811
|
+
# material into the replica Region keys.
|
|
6812
|
+
#
|
|
6813
|
+
# To import new key material for a multi-Region symmetric key, you’ll
|
|
6814
|
+
# need to complete the following:
|
|
6815
|
+
#
|
|
6816
|
+
# 1. Call `ImportKeyMaterial` on the primary Region key with the
|
|
6817
|
+
# `ImportType`set to `NEW_KEY_MATERIAL`.
|
|
6818
|
+
#
|
|
6819
|
+
# 2. Call `ImportKeyMaterial` on the replica Region key with the
|
|
6820
|
+
# `ImportType` set to `EXISTING_KEY_MATERIAL` using the same key
|
|
6821
|
+
# material imported to the primary Region key. You must do this for
|
|
6822
|
+
# every replica Region key before you can perform the
|
|
6823
|
+
# RotateKeyOnDemand operation on the primary Region key.
|
|
6785
6824
|
#
|
|
6786
6825
|
# After you import key material, you can [reimport the same key
|
|
6787
6826
|
# material][2] into that KMS key or, if the key supports on-demand
|
|
@@ -6823,10 +6862,10 @@ module Aws::KMS
|
|
|
6823
6862
|
#
|
|
6824
6863
|
# * The key ID or key ARN of the KMS key to associate with the imported
|
|
6825
6864
|
# key material. Its `Origin` must be `EXTERNAL` and its `KeyState`
|
|
6826
|
-
# must be `PendingImport`. You cannot perform this
|
|
6827
|
-
# key in a [custom key store][5], or on a KMS key
|
|
6828
|
-
# Amazon Web Services account. To get the `Origin` and
|
|
6829
|
-
# KMS key, call DescribeKey.
|
|
6865
|
+
# must be `PendingImport` or `Enabled`. You cannot perform this
|
|
6866
|
+
# operation on a KMS key in a [custom key store][5], or on a KMS key
|
|
6867
|
+
# in a different Amazon Web Services account. To get the `Origin` and
|
|
6868
|
+
# `KeyState` of a KMS key, call DescribeKey.
|
|
6830
6869
|
#
|
|
6831
6870
|
# * The encrypted key material.
|
|
6832
6871
|
#
|
|
@@ -6846,13 +6885,12 @@ module Aws::KMS
|
|
|
6846
6885
|
# Each time you reimport, you can eliminate or reset the expiration
|
|
6847
6886
|
# time.
|
|
6848
6887
|
#
|
|
6849
|
-
# When this operation is successful, the
|
|
6850
|
-
#
|
|
6851
|
-
#
|
|
6852
|
-
#
|
|
6853
|
-
# the
|
|
6854
|
-
#
|
|
6855
|
-
# key material associated with a KMS key.
|
|
6888
|
+
# When this operation is successful, the state of the KMS key changes to
|
|
6889
|
+
# `Enabled`, and you can use the KMS key in cryptographic operations.
|
|
6890
|
+
# For symmetric encryption keys, you will need to import all of the key
|
|
6891
|
+
# materials associated with the KMS key to change its state to
|
|
6892
|
+
# `Enabled`. Use the `ListKeyRotations` operation to list the ID and
|
|
6893
|
+
# import state of each key material associated with a KMS key.
|
|
6856
6894
|
#
|
|
6857
6895
|
# If this operation fails, use the exception to help determine the
|
|
6858
6896
|
# problem. If the error is related to the key material, the import
|
|
@@ -6980,6 +7018,12 @@ module Aws::KMS
|
|
|
6980
7018
|
# material is imported, if this parameter is omitted then the parameter
|
|
6981
7019
|
# defaults to `EXISTING_KEY_MATERIAL`.
|
|
6982
7020
|
#
|
|
7021
|
+
# For multi-Region keys, you must first import new key material into the
|
|
7022
|
+
# primary Region key. You should use the `NEW_KEY_MATERIAL` import type
|
|
7023
|
+
# when importing key material into the primary Region key. Then, you can
|
|
7024
|
+
# import the same key material into the replica Region key. The import
|
|
7025
|
+
# type for the replica Region key should be `EXISTING_KEY_MATERIAL`.
|
|
7026
|
+
#
|
|
6983
7027
|
# @option params [String] :key_material_description
|
|
6984
7028
|
# Description for the key material being imported. This parameter is
|
|
6985
7029
|
# optional and only usable with symmetric encryption keys. If you do not
|
|
@@ -7676,7 +7720,7 @@ module Aws::KMS
|
|
|
7676
7720
|
# resp.rotations[0].key_material_id #=> String
|
|
7677
7721
|
# resp.rotations[0].key_material_description #=> String
|
|
7678
7722
|
# resp.rotations[0].import_state #=> String, one of "IMPORTED", "PENDING_IMPORT"
|
|
7679
|
-
# resp.rotations[0].key_material_state #=> String, one of "NON_CURRENT", "CURRENT", "PENDING_ROTATION"
|
|
7723
|
+
# resp.rotations[0].key_material_state #=> String, one of "NON_CURRENT", "CURRENT", "PENDING_ROTATION", "PENDING_MULTI_REGION_IMPORT_AND_ROTATION"
|
|
7680
7724
|
# resp.rotations[0].expiration_model #=> String, one of "KEY_MATERIAL_EXPIRES", "KEY_MATERIAL_DOES_NOT_EXPIRE"
|
|
7681
7725
|
# resp.rotations[0].valid_to #=> Time
|
|
7682
7726
|
# resp.rotations[0].rotation_date #=> Time
|
|
@@ -8928,11 +8972,11 @@ module Aws::KMS
|
|
|
8928
8972
|
# resp.replica_key_metadata.expiration_model #=> String, one of "KEY_MATERIAL_EXPIRES", "KEY_MATERIAL_DOES_NOT_EXPIRE"
|
|
8929
8973
|
# resp.replica_key_metadata.key_manager #=> String, one of "AWS", "CUSTOMER"
|
|
8930
8974
|
# resp.replica_key_metadata.customer_master_key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2"
|
|
8931
|
-
# resp.replica_key_metadata.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2", "ML_DSA_44", "ML_DSA_65", "ML_DSA_87"
|
|
8975
|
+
# resp.replica_key_metadata.key_spec #=> String, one of "RSA_2048", "RSA_3072", "RSA_4096", "ECC_NIST_P256", "ECC_NIST_P384", "ECC_NIST_P521", "ECC_SECG_P256K1", "SYMMETRIC_DEFAULT", "HMAC_224", "HMAC_256", "HMAC_384", "HMAC_512", "SM2", "ML_DSA_44", "ML_DSA_65", "ML_DSA_87", "ECC_NIST_EDWARDS25519"
|
|
8932
8976
|
# resp.replica_key_metadata.encryption_algorithms #=> Array
|
|
8933
8977
|
# resp.replica_key_metadata.encryption_algorithms[0] #=> String, one of "SYMMETRIC_DEFAULT", "RSAES_OAEP_SHA_1", "RSAES_OAEP_SHA_256", "SM2PKE"
|
|
8934
8978
|
# resp.replica_key_metadata.signing_algorithms #=> Array
|
|
8935
|
-
# resp.replica_key_metadata.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256"
|
|
8979
|
+
# resp.replica_key_metadata.signing_algorithms[0] #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256", "ED25519_SHA_512", "ED25519_PH_SHA_512"
|
|
8936
8980
|
# resp.replica_key_metadata.key_agreement_algorithms #=> Array
|
|
8937
8981
|
# resp.replica_key_metadata.key_agreement_algorithms[0] #=> String, one of "ECDH"
|
|
8938
8982
|
# resp.replica_key_metadata.multi_region #=> Boolean
|
|
@@ -9209,30 +9253,31 @@ module Aws::KMS
|
|
|
9209
9253
|
#
|
|
9210
9254
|
# On-demand key rotation is supported only on symmetric encryption KMS
|
|
9211
9255
|
# keys. You cannot perform on-demand rotation of [asymmetric KMS
|
|
9212
|
-
# keys][3], [HMAC KMS keys][4],
|
|
9213
|
-
#
|
|
9214
|
-
#
|
|
9215
|
-
#
|
|
9216
|
-
# material][7] and that key material's state should be
|
|
9256
|
+
# keys][3], [HMAC KMS keys][4], or KMS keys in a [custom key store][5].
|
|
9257
|
+
# When you initiate on-demand key rotation on a symmetric encryption KMS
|
|
9258
|
+
# key with imported key material, you must have already imported [new
|
|
9259
|
+
# key material][6] and that key material's state should be
|
|
9217
9260
|
# `PENDING_ROTATION`. Use the `ListKeyRotations` operation to check the
|
|
9218
9261
|
# state of all key materials associated with a KMS key. To perform
|
|
9219
|
-
# on-demand rotation of a set of related [multi-Region keys][
|
|
9220
|
-
#
|
|
9262
|
+
# on-demand rotation of a set of related [multi-Region keys][7], import
|
|
9263
|
+
# new key material in the primary Region key, import the same key
|
|
9264
|
+
# material in each replica Region key, and invoke the on-demand rotation
|
|
9265
|
+
# on the primary Region key.
|
|
9221
9266
|
#
|
|
9222
9267
|
# You cannot initiate on-demand rotation of [Amazon Web Services managed
|
|
9223
|
-
# KMS keys][
|
|
9268
|
+
# KMS keys][8]. KMS always rotates the key material of Amazon Web
|
|
9224
9269
|
# Services managed keys every year. Rotation of [Amazon Web Services
|
|
9225
|
-
# owned KMS keys][
|
|
9270
|
+
# owned KMS keys][9] is managed by the Amazon Web Services service that
|
|
9226
9271
|
# owns the key.
|
|
9227
9272
|
#
|
|
9228
9273
|
# The KMS key that you use for this operation must be in a compatible
|
|
9229
|
-
# key state. For details, see [Key states of KMS keys][
|
|
9274
|
+
# key state. For details, see [Key states of KMS keys][10] in the *Key
|
|
9230
9275
|
# Management Service Developer Guide*.
|
|
9231
9276
|
#
|
|
9232
9277
|
# **Cross-account use**: No. You cannot perform this operation on a KMS
|
|
9233
9278
|
# key in a different Amazon Web Services account.
|
|
9234
9279
|
#
|
|
9235
|
-
# **Required permissions**: [kms:RotateKeyOnDemand][
|
|
9280
|
+
# **Required permissions**: [kms:RotateKeyOnDemand][11] (key policy)
|
|
9236
9281
|
#
|
|
9237
9282
|
# **Related operations:**
|
|
9238
9283
|
#
|
|
@@ -9247,7 +9292,7 @@ module Aws::KMS
|
|
|
9247
9292
|
# * ListKeyRotations
|
|
9248
9293
|
#
|
|
9249
9294
|
# **Eventual consistency**: The KMS API follows an eventual consistency
|
|
9250
|
-
# model. For more information, see [KMS eventual consistency][
|
|
9295
|
+
# model. For more information, see [KMS eventual consistency][12].
|
|
9251
9296
|
#
|
|
9252
9297
|
#
|
|
9253
9298
|
#
|
|
@@ -9255,15 +9300,14 @@ module Aws::KMS
|
|
|
9255
9300
|
# [2]: https://docs.aws.amazon.com/kms/latest/developerguide/rotating-keys-enable-disable.html
|
|
9256
9301
|
# [3]: https://docs.aws.amazon.com/kms/latest/developerguide/symmetric-asymmetric.html
|
|
9257
9302
|
# [4]: https://docs.aws.amazon.com/kms/latest/developerguide/hmac.html
|
|
9258
|
-
# [5]: https://docs.aws.amazon.com/kms/latest/developerguide/
|
|
9259
|
-
# [6]: https://docs.aws.amazon.com/kms/latest/developerguide/key-
|
|
9260
|
-
# [7]: https://docs.aws.amazon.com/kms/latest/developerguide/
|
|
9261
|
-
# [8]: https://docs.aws.amazon.com/kms/latest/developerguide/
|
|
9262
|
-
# [9]: https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#aws-
|
|
9263
|
-
# [10]: https://docs.aws.amazon.com/kms/latest/developerguide/
|
|
9264
|
-
# [11]: https://docs.aws.amazon.com/kms/latest/developerguide/
|
|
9265
|
-
# [12]: https://docs.aws.amazon.com/kms/latest/developerguide/kms-
|
|
9266
|
-
# [13]: https://docs.aws.amazon.com/kms/latest/developerguide/accessing-kms.html#programming-eventual-consistency
|
|
9303
|
+
# [5]: https://docs.aws.amazon.com/kms/latest/developerguide/key-store-overview.html
|
|
9304
|
+
# [6]: https://docs.aws.amazon.com/kms/latest/developerguide/importing-keys-import-key-material.html
|
|
9305
|
+
# [7]: https://docs.aws.amazon.com/kms/latest/developerguide/rotate-keys.html#multi-region-rotate
|
|
9306
|
+
# [8]: https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#aws-managed-key
|
|
9307
|
+
# [9]: https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#aws-owned-key
|
|
9308
|
+
# [10]: https://docs.aws.amazon.com/kms/latest/developerguide/key-state.html
|
|
9309
|
+
# [11]: https://docs.aws.amazon.com/kms/latest/developerguide/kms-api-permissions-reference.html
|
|
9310
|
+
# [12]: https://docs.aws.amazon.com/kms/latest/developerguide/accessing-kms.html#programming-eventual-consistency
|
|
9267
9311
|
#
|
|
9268
9312
|
# @option params [required, String] :key_id
|
|
9269
9313
|
# Identifies a symmetric encryption KMS key. You cannot perform
|
|
@@ -9605,6 +9649,13 @@ module Aws::KMS
|
|
|
9605
9649
|
# with an unhashed message, the security of the signing operation can be
|
|
9606
9650
|
# compromised.
|
|
9607
9651
|
#
|
|
9652
|
+
# When using ECC\_NIST\_EDWARDS25519 KMS keys:
|
|
9653
|
+
#
|
|
9654
|
+
# * ED25519\_SHA\_512 signing algorithm requires KMS `MessageType:RAW`
|
|
9655
|
+
#
|
|
9656
|
+
# * ED25519\_PH\_SHA\_512 signing algorithm requires KMS
|
|
9657
|
+
# `MessageType:DIGEST`
|
|
9658
|
+
#
|
|
9608
9659
|
# When the value of `MessageType` is `DIGEST`, the length of the
|
|
9609
9660
|
# `Message` value must match the length of hashed messages for the
|
|
9610
9661
|
# specified signing algorithm.
|
|
@@ -9724,7 +9775,7 @@ module Aws::KMS
|
|
|
9724
9775
|
# message: "data", # required
|
|
9725
9776
|
# message_type: "RAW", # accepts RAW, DIGEST, EXTERNAL_MU
|
|
9726
9777
|
# grant_tokens: ["GrantTokenType"],
|
|
9727
|
-
# signing_algorithm: "RSASSA_PSS_SHA_256", # required, accepts RSASSA_PSS_SHA_256, RSASSA_PSS_SHA_384, RSASSA_PSS_SHA_512, RSASSA_PKCS1_V1_5_SHA_256, RSASSA_PKCS1_V1_5_SHA_384, RSASSA_PKCS1_V1_5_SHA_512, ECDSA_SHA_256, ECDSA_SHA_384, ECDSA_SHA_512, SM2DSA, ML_DSA_SHAKE_256
|
|
9778
|
+
# signing_algorithm: "RSASSA_PSS_SHA_256", # required, accepts RSASSA_PSS_SHA_256, RSASSA_PSS_SHA_384, RSASSA_PSS_SHA_512, RSASSA_PKCS1_V1_5_SHA_256, RSASSA_PKCS1_V1_5_SHA_384, RSASSA_PKCS1_V1_5_SHA_512, ECDSA_SHA_256, ECDSA_SHA_384, ECDSA_SHA_512, SM2DSA, ML_DSA_SHAKE_256, ED25519_SHA_512, ED25519_PH_SHA_512
|
|
9728
9779
|
# dry_run: false,
|
|
9729
9780
|
# })
|
|
9730
9781
|
#
|
|
@@ -9732,7 +9783,7 @@ module Aws::KMS
|
|
|
9732
9783
|
#
|
|
9733
9784
|
# resp.key_id #=> String
|
|
9734
9785
|
# resp.signature #=> String
|
|
9735
|
-
# resp.signing_algorithm #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256"
|
|
9786
|
+
# resp.signing_algorithm #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256", "ED25519_SHA_512", "ED25519_PH_SHA_512"
|
|
9736
9787
|
#
|
|
9737
9788
|
# @see http://docs.aws.amazon.com/goto/WebAPI/kms-2014-11-01/Sign AWS API Documentation
|
|
9738
9789
|
#
|
|
@@ -10801,6 +10852,13 @@ module Aws::KMS
|
|
|
10801
10852
|
# with an unhashed message, the security of the signing operation can be
|
|
10802
10853
|
# compromised.
|
|
10803
10854
|
#
|
|
10855
|
+
# When using ECC\_NIST\_EDWARDS25519 KMS keys:
|
|
10856
|
+
#
|
|
10857
|
+
# * ED25519\_SHA\_512 signing algorithm requires KMS `MessageType:RAW`
|
|
10858
|
+
#
|
|
10859
|
+
# * ED25519\_PH\_SHA\_512 signing algorithm requires KMS
|
|
10860
|
+
# `MessageType:DIGEST`
|
|
10861
|
+
#
|
|
10804
10862
|
# When the value of `MessageType` is `DIGEST`, the length of the
|
|
10805
10863
|
# `Message` value must match the length of hashed messages for the
|
|
10806
10864
|
# specified signing algorithm.
|
|
@@ -10921,7 +10979,7 @@ module Aws::KMS
|
|
|
10921
10979
|
# message: "data", # required
|
|
10922
10980
|
# message_type: "RAW", # accepts RAW, DIGEST, EXTERNAL_MU
|
|
10923
10981
|
# signature: "data", # required
|
|
10924
|
-
# signing_algorithm: "RSASSA_PSS_SHA_256", # required, accepts RSASSA_PSS_SHA_256, RSASSA_PSS_SHA_384, RSASSA_PSS_SHA_512, RSASSA_PKCS1_V1_5_SHA_256, RSASSA_PKCS1_V1_5_SHA_384, RSASSA_PKCS1_V1_5_SHA_512, ECDSA_SHA_256, ECDSA_SHA_384, ECDSA_SHA_512, SM2DSA, ML_DSA_SHAKE_256
|
|
10982
|
+
# signing_algorithm: "RSASSA_PSS_SHA_256", # required, accepts RSASSA_PSS_SHA_256, RSASSA_PSS_SHA_384, RSASSA_PSS_SHA_512, RSASSA_PKCS1_V1_5_SHA_256, RSASSA_PKCS1_V1_5_SHA_384, RSASSA_PKCS1_V1_5_SHA_512, ECDSA_SHA_256, ECDSA_SHA_384, ECDSA_SHA_512, SM2DSA, ML_DSA_SHAKE_256, ED25519_SHA_512, ED25519_PH_SHA_512
|
|
10925
10983
|
# grant_tokens: ["GrantTokenType"],
|
|
10926
10984
|
# dry_run: false,
|
|
10927
10985
|
# })
|
|
@@ -10930,7 +10988,7 @@ module Aws::KMS
|
|
|
10930
10988
|
#
|
|
10931
10989
|
# resp.key_id #=> String
|
|
10932
10990
|
# resp.signature_valid #=> Boolean
|
|
10933
|
-
# resp.signing_algorithm #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256"
|
|
10991
|
+
# resp.signing_algorithm #=> String, one of "RSASSA_PSS_SHA_256", "RSASSA_PSS_SHA_384", "RSASSA_PSS_SHA_512", "RSASSA_PKCS1_V1_5_SHA_256", "RSASSA_PKCS1_V1_5_SHA_384", "RSASSA_PKCS1_V1_5_SHA_512", "ECDSA_SHA_256", "ECDSA_SHA_384", "ECDSA_SHA_512", "SM2DSA", "ML_DSA_SHAKE_256", "ED25519_SHA_512", "ED25519_PH_SHA_512"
|
|
10934
10992
|
#
|
|
10935
10993
|
# @see http://docs.aws.amazon.com/goto/WebAPI/kms-2014-11-01/Verify AWS API Documentation
|
|
10936
10994
|
#
|
|
@@ -11099,7 +11157,7 @@ module Aws::KMS
|
|
|
11099
11157
|
tracer: tracer
|
|
11100
11158
|
)
|
|
11101
11159
|
context[:gem_name] = 'aws-sdk-kms'
|
|
11102
|
-
context[:gem_version] = '1.
|
|
11160
|
+
context[:gem_version] = '1.118.0'
|
|
11103
11161
|
Seahorse::Client::Request.new(handlers, context)
|
|
11104
11162
|
end
|
|
11105
11163
|
|
data/lib/aws-sdk-kms/types.rb
CHANGED
|
@@ -872,7 +872,7 @@ module Aws::KMS
|
|
|
872
872
|
# * For asymmetric KMS keys with RSA key pairs, specify
|
|
873
873
|
# `ENCRYPT_DECRYPT` or `SIGN_VERIFY`.
|
|
874
874
|
#
|
|
875
|
-
# * For asymmetric KMS keys with NIST-
|
|
875
|
+
# * For asymmetric KMS keys with NIST-standard elliptic curve key
|
|
876
876
|
# pairs, specify `SIGN_VERIFY` or `KEY_AGREEMENT`.
|
|
877
877
|
#
|
|
878
878
|
# * For asymmetric KMS keys with `ECC_SECG_P256K1` key pairs, specify
|
|
@@ -947,7 +947,7 @@ module Aws::KMS
|
|
|
947
947
|
# * `RSA_3072`
|
|
948
948
|
#
|
|
949
949
|
# * `RSA_4096`
|
|
950
|
-
# * Asymmetric NIST-
|
|
950
|
+
# * Asymmetric NIST-standard elliptic curve key pairs (signing and
|
|
951
951
|
# verification -or- deriving shared secrets)
|
|
952
952
|
#
|
|
953
953
|
# * `ECC_NIST_P256` (secp256r1)
|
|
@@ -955,6 +955,19 @@ module Aws::KMS
|
|
|
955
955
|
# * `ECC_NIST_P384` (secp384r1)
|
|
956
956
|
#
|
|
957
957
|
# * `ECC_NIST_P521` (secp521r1)
|
|
958
|
+
#
|
|
959
|
+
# * `ECC_NIST_EDWARDS25519` (ed25519) - signing and verification
|
|
960
|
+
# only
|
|
961
|
+
#
|
|
962
|
+
# * **Note:** For ECC\_NIST\_EDWARDS25519 KMS keys, the
|
|
963
|
+
# ED25519\_SHA\_512 signing algorithm requires [
|
|
964
|
+
# `MessageType:RAW`
|
|
965
|
+
# ](kms/latest/APIReference/API_Sign.html#KMS-Sign-request-MessageType),
|
|
966
|
+
# while ED25519\_PH\_SHA\_512 requires [ `MessageType:DIGEST`
|
|
967
|
+
# ](kms/latest/APIReference/API_Sign.html#KMS-Sign-request-MessageType).
|
|
968
|
+
# These message types cannot be used interchangeably.
|
|
969
|
+
#
|
|
970
|
+
# ^
|
|
958
971
|
# * Other asymmetric elliptic curve key pairs (signing and
|
|
959
972
|
# verification)
|
|
960
973
|
#
|
|
@@ -1850,7 +1863,7 @@ module Aws::KMS
|
|
|
1850
1863
|
end
|
|
1851
1864
|
|
|
1852
1865
|
# @!attribute [rw] key_id
|
|
1853
|
-
# Identifies an asymmetric NIST-
|
|
1866
|
+
# Identifies an asymmetric NIST-standard ECC or SM2 (China Regions
|
|
1854
1867
|
# only) KMS key. KMS uses the private key in the specified key pair to
|
|
1855
1868
|
# derive the shared secret. The key usage of the KMS key must be
|
|
1856
1869
|
# `KEY_AGREEMENT`. To find the `KeyUsage` of a KMS key, use the
|
|
@@ -1882,7 +1895,7 @@ module Aws::KMS
|
|
|
1882
1895
|
# @return [String]
|
|
1883
1896
|
#
|
|
1884
1897
|
# @!attribute [rw] public_key
|
|
1885
|
-
# Specifies the public key in your peer's NIST-
|
|
1898
|
+
# Specifies the public key in your peer's NIST-standard elliptic
|
|
1886
1899
|
# curve (ECC) or SM2 (China Regions only) key pair.
|
|
1887
1900
|
#
|
|
1888
1901
|
# The public key must be a DER-encoded X.509 public key, also known as
|
|
@@ -3980,6 +3993,13 @@ module Aws::KMS
|
|
|
3980
3993
|
# the parameter defaults to `NEW_KEY_MATERIAL`. After the first key
|
|
3981
3994
|
# material is imported, if this parameter is omitted then the
|
|
3982
3995
|
# parameter defaults to `EXISTING_KEY_MATERIAL`.
|
|
3996
|
+
#
|
|
3997
|
+
# For multi-Region keys, you must first import new key material into
|
|
3998
|
+
# the primary Region key. You should use the `NEW_KEY_MATERIAL` import
|
|
3999
|
+
# type when importing key material into the primary Region key. Then,
|
|
4000
|
+
# you can import the same key material into the replica Region key.
|
|
4001
|
+
# The import type for the replica Region key should be
|
|
4002
|
+
# `EXISTING_KEY_MATERIAL`.
|
|
3983
4003
|
# @return [String]
|
|
3984
4004
|
#
|
|
3985
4005
|
# @!attribute [rw] key_material_description
|
|
@@ -4563,12 +4583,11 @@ module Aws::KMS
|
|
|
4563
4583
|
#
|
|
4564
4584
|
# @!attribute [rw] current_key_material_id
|
|
4565
4585
|
# Identifies the current key material. This value is present for
|
|
4566
|
-
# symmetric encryption keys with `AWS_KMS` origin
|
|
4567
|
-
#
|
|
4568
|
-
#
|
|
4569
|
-
# key
|
|
4570
|
-
# material for
|
|
4571
|
-
# material for decryption operations only.
|
|
4586
|
+
# symmetric encryption keys with `AWS_KMS` or `EXTERNAL` origin. These
|
|
4587
|
+
# KMS keys support automatic or on-demand key rotation and can have
|
|
4588
|
+
# multiple key materials associated with them. KMS uses the current
|
|
4589
|
+
# key material for both encryption and decryption, and the non-current
|
|
4590
|
+
# key material for decryption operations only.
|
|
4572
4591
|
# @return [String]
|
|
4573
4592
|
#
|
|
4574
4593
|
# @see http://docs.aws.amazon.com/goto/WebAPI/kms-2014-11-01/KeyMetadata AWS API Documentation
|
|
@@ -5988,15 +6007,24 @@ module Aws::KMS
|
|
|
5988
6007
|
# @return [String]
|
|
5989
6008
|
#
|
|
5990
6009
|
# @!attribute [rw] key_material_state
|
|
5991
|
-
# There are
|
|
5992
|
-
# `NON_CURRENT
|
|
5993
|
-
#
|
|
5994
|
-
#
|
|
5995
|
-
# material that has been
|
|
5996
|
-
#
|
|
5997
|
-
#
|
|
5998
|
-
#
|
|
5999
|
-
#
|
|
6010
|
+
# There are four possible values for this field: `CURRENT`,
|
|
6011
|
+
# `NON_CURRENT`, `PENDING_MULTI_REGION_IMPORT_AND_ROTATION` and
|
|
6012
|
+
# `PENDING_ROTATION`. KMS uses `CURRENT` key material for both
|
|
6013
|
+
# encryption and decryption and `NON_CURRENT` key material only for
|
|
6014
|
+
# decryption. `PENDING_ROTATION` identifies key material that has been
|
|
6015
|
+
# imported for on-demand key rotation but the rotation hasn't
|
|
6016
|
+
# completed. The key material state
|
|
6017
|
+
# `PENDING_MULTI_REGION_IMPORT_AND_ROTATION` is unique to
|
|
6018
|
+
# multi-region, symmetric encryption keys with imported key material.
|
|
6019
|
+
# It indicates key material that has been imported into the primary
|
|
6020
|
+
# Region key but not all of the replica Region keys. When this key
|
|
6021
|
+
# material is imported in to all of the replica Region keys, the key
|
|
6022
|
+
# material state will change to `PENDING_ROTATION`. Key material in
|
|
6023
|
+
# `PENDING_MULTI_REGION_IMPORT_AND_ROTATION` or `PENDING_ROTATION`
|
|
6024
|
+
# state is not permanently associated with the KMS key. You can delete
|
|
6025
|
+
# this key material and import different key material in its place.
|
|
6026
|
+
# The `PENDING_MULTI_REGION_IMPORT_AND_ROTATION` and
|
|
6027
|
+
# `PENDING_ROTATION` values are only used in symmetric encryption keys
|
|
6000
6028
|
# with imported key material. The other values, `CURRENT` and
|
|
6001
6029
|
# `NON_CURRENT`, are used for all KMS keys that support automatic or
|
|
6002
6030
|
# on-demand key rotation.
|
|
@@ -6198,6 +6226,13 @@ module Aws::KMS
|
|
|
6198
6226
|
# value with an unhashed message, the security of the signing
|
|
6199
6227
|
# operation can be compromised.
|
|
6200
6228
|
#
|
|
6229
|
+
# When using ECC\_NIST\_EDWARDS25519 KMS keys:
|
|
6230
|
+
#
|
|
6231
|
+
# * ED25519\_SHA\_512 signing algorithm requires KMS `MessageType:RAW`
|
|
6232
|
+
#
|
|
6233
|
+
# * ED25519\_PH\_SHA\_512 signing algorithm requires KMS
|
|
6234
|
+
# `MessageType:DIGEST`
|
|
6235
|
+
#
|
|
6201
6236
|
# When the value of `MessageType` is `DIGEST`, the length of the
|
|
6202
6237
|
# `Message` value must match the length of hashed messages for the
|
|
6203
6238
|
# specified signing algorithm.
|
|
@@ -6892,6 +6927,13 @@ module Aws::KMS
|
|
|
6892
6927
|
# value with an unhashed message, the security of the signing
|
|
6893
6928
|
# operation can be compromised.
|
|
6894
6929
|
#
|
|
6930
|
+
# When using ECC\_NIST\_EDWARDS25519 KMS keys:
|
|
6931
|
+
#
|
|
6932
|
+
# * ED25519\_SHA\_512 signing algorithm requires KMS `MessageType:RAW`
|
|
6933
|
+
#
|
|
6934
|
+
# * ED25519\_PH\_SHA\_512 signing algorithm requires KMS
|
|
6935
|
+
# `MessageType:DIGEST`
|
|
6936
|
+
#
|
|
6895
6937
|
# When the value of `MessageType` is `DIGEST`, the length of the
|
|
6896
6938
|
# `Message` value must match the length of hashed messages for the
|
|
6897
6939
|
# specified signing algorithm.
|
data/lib/aws-sdk-kms.rb
CHANGED
data/sig/client.rbs
CHANGED
|
@@ -159,7 +159,7 @@ module Aws
|
|
|
159
159
|
?description: ::String,
|
|
160
160
|
?key_usage: ("SIGN_VERIFY" | "ENCRYPT_DECRYPT" | "GENERATE_VERIFY_MAC" | "KEY_AGREEMENT"),
|
|
161
161
|
?customer_master_key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2"),
|
|
162
|
-
?key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87"),
|
|
162
|
+
?key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87" | "ECC_NIST_EDWARDS25519"),
|
|
163
163
|
?origin: ("AWS_KMS" | "EXTERNAL" | "AWS_CLOUDHSM" | "EXTERNAL_KEY_STORE"),
|
|
164
164
|
?custom_key_store_id: ::String,
|
|
165
165
|
?bypass_policy_lockout_safety_check: bool,
|
|
@@ -352,7 +352,7 @@ module Aws
|
|
|
352
352
|
def private_key_plaintext: () -> ::String
|
|
353
353
|
def public_key: () -> ::String
|
|
354
354
|
def key_id: () -> ::String
|
|
355
|
-
def key_pair_spec: () -> ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2")
|
|
355
|
+
def key_pair_spec: () -> ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2" | "ECC_NIST_EDWARDS25519")
|
|
356
356
|
def ciphertext_for_recipient: () -> ::String
|
|
357
357
|
def key_material_id: () -> ::String
|
|
358
358
|
end
|
|
@@ -360,7 +360,7 @@ module Aws
|
|
|
360
360
|
def generate_data_key_pair: (
|
|
361
361
|
?encryption_context: Hash[::String, ::String],
|
|
362
362
|
key_id: ::String,
|
|
363
|
-
key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2"),
|
|
363
|
+
key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2" | "ECC_NIST_EDWARDS25519"),
|
|
364
364
|
?grant_tokens: Array[::String],
|
|
365
365
|
?recipient: {
|
|
366
366
|
key_encryption_algorithm: ("RSAES_OAEP_SHA_256")?,
|
|
@@ -375,14 +375,14 @@ module Aws
|
|
|
375
375
|
def private_key_ciphertext_blob: () -> ::String
|
|
376
376
|
def public_key: () -> ::String
|
|
377
377
|
def key_id: () -> ::String
|
|
378
|
-
def key_pair_spec: () -> ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2")
|
|
378
|
+
def key_pair_spec: () -> ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2" | "ECC_NIST_EDWARDS25519")
|
|
379
379
|
def key_material_id: () -> ::String
|
|
380
380
|
end
|
|
381
381
|
# https://docs.aws.amazon.com/sdk-for-ruby/v3/api/Aws/KMS/Client.html#generate_data_key_pair_without_plaintext-instance_method
|
|
382
382
|
def generate_data_key_pair_without_plaintext: (
|
|
383
383
|
?encryption_context: Hash[::String, ::String],
|
|
384
384
|
key_id: ::String,
|
|
385
|
-
key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2"),
|
|
385
|
+
key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2" | "ECC_NIST_EDWARDS25519"),
|
|
386
386
|
?grant_tokens: Array[::String],
|
|
387
387
|
?dry_run: bool
|
|
388
388
|
) -> _GenerateDataKeyPairWithoutPlaintextResponseSuccess
|
|
@@ -483,10 +483,10 @@ module Aws
|
|
|
483
483
|
def key_id: () -> ::String
|
|
484
484
|
def public_key: () -> ::String
|
|
485
485
|
def customer_master_key_spec: () -> ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2")
|
|
486
|
-
def key_spec: () -> ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87")
|
|
486
|
+
def key_spec: () -> ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87" | "ECC_NIST_EDWARDS25519")
|
|
487
487
|
def key_usage: () -> ("SIGN_VERIFY" | "ENCRYPT_DECRYPT" | "GENERATE_VERIFY_MAC" | "KEY_AGREEMENT")
|
|
488
488
|
def encryption_algorithms: () -> ::Array[("SYMMETRIC_DEFAULT" | "RSAES_OAEP_SHA_1" | "RSAES_OAEP_SHA_256" | "SM2PKE")]
|
|
489
|
-
def signing_algorithms: () -> ::Array[("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")]
|
|
489
|
+
def signing_algorithms: () -> ::Array[("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512")]
|
|
490
490
|
def key_agreement_algorithms: () -> ::Array[("ECDH")]
|
|
491
491
|
end
|
|
492
492
|
# https://docs.aws.amazon.com/sdk-for-ruby/v3/api/Aws/KMS/Client.html#get_public_key-instance_method
|
|
@@ -714,7 +714,7 @@ module Aws
|
|
|
714
714
|
include ::Seahorse::Client::_ResponseSuccess[Types::SignResponse]
|
|
715
715
|
def key_id: () -> ::String
|
|
716
716
|
def signature: () -> ::String
|
|
717
|
-
def signing_algorithm: () -> ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")
|
|
717
|
+
def signing_algorithm: () -> ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512")
|
|
718
718
|
end
|
|
719
719
|
# https://docs.aws.amazon.com/sdk-for-ruby/v3/api/Aws/KMS/Client.html#sign-instance_method
|
|
720
720
|
def sign: (
|
|
@@ -722,7 +722,7 @@ module Aws
|
|
|
722
722
|
message: ::String,
|
|
723
723
|
?message_type: ("RAW" | "DIGEST" | "EXTERNAL_MU"),
|
|
724
724
|
?grant_tokens: Array[::String],
|
|
725
|
-
signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256"),
|
|
725
|
+
signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512"),
|
|
726
726
|
?dry_run: bool
|
|
727
727
|
) -> _SignResponseSuccess
|
|
728
728
|
| (Hash[Symbol, untyped] params, ?Hash[Symbol, untyped] options) -> _SignResponseSuccess
|
|
@@ -792,7 +792,7 @@ module Aws
|
|
|
792
792
|
include ::Seahorse::Client::_ResponseSuccess[Types::VerifyResponse]
|
|
793
793
|
def key_id: () -> ::String
|
|
794
794
|
def signature_valid: () -> bool
|
|
795
|
-
def signing_algorithm: () -> ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")
|
|
795
|
+
def signing_algorithm: () -> ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512")
|
|
796
796
|
end
|
|
797
797
|
# https://docs.aws.amazon.com/sdk-for-ruby/v3/api/Aws/KMS/Client.html#verify-instance_method
|
|
798
798
|
def verify: (
|
|
@@ -800,7 +800,7 @@ module Aws
|
|
|
800
800
|
message: ::String,
|
|
801
801
|
?message_type: ("RAW" | "DIGEST" | "EXTERNAL_MU"),
|
|
802
802
|
signature: ::String,
|
|
803
|
-
signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256"),
|
|
803
|
+
signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512"),
|
|
804
804
|
?grant_tokens: Array[::String],
|
|
805
805
|
?dry_run: bool
|
|
806
806
|
) -> _VerifyResponseSuccess
|
data/sig/types.rbs
CHANGED
|
@@ -119,7 +119,7 @@ module Aws::KMS
|
|
|
119
119
|
attr_accessor description: ::String
|
|
120
120
|
attr_accessor key_usage: ("SIGN_VERIFY" | "ENCRYPT_DECRYPT" | "GENERATE_VERIFY_MAC" | "KEY_AGREEMENT")
|
|
121
121
|
attr_accessor customer_master_key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2")
|
|
122
|
-
attr_accessor key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87")
|
|
122
|
+
attr_accessor key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87" | "ECC_NIST_EDWARDS25519")
|
|
123
123
|
attr_accessor origin: ("AWS_KMS" | "EXTERNAL" | "AWS_CLOUDHSM" | "EXTERNAL_KEY_STORE")
|
|
124
124
|
attr_accessor custom_key_store_id: ::String
|
|
125
125
|
attr_accessor bypass_policy_lockout_safety_check: bool
|
|
@@ -326,7 +326,7 @@ module Aws::KMS
|
|
|
326
326
|
class GenerateDataKeyPairRequest
|
|
327
327
|
attr_accessor encryption_context: ::Hash[::String, ::String]
|
|
328
328
|
attr_accessor key_id: ::String
|
|
329
|
-
attr_accessor key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2")
|
|
329
|
+
attr_accessor key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2" | "ECC_NIST_EDWARDS25519")
|
|
330
330
|
attr_accessor grant_tokens: ::Array[::String]
|
|
331
331
|
attr_accessor recipient: Types::RecipientInfo
|
|
332
332
|
attr_accessor dry_run: bool
|
|
@@ -338,7 +338,7 @@ module Aws::KMS
|
|
|
338
338
|
attr_accessor private_key_plaintext: ::String
|
|
339
339
|
attr_accessor public_key: ::String
|
|
340
340
|
attr_accessor key_id: ::String
|
|
341
|
-
attr_accessor key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2")
|
|
341
|
+
attr_accessor key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2" | "ECC_NIST_EDWARDS25519")
|
|
342
342
|
attr_accessor ciphertext_for_recipient: ::String
|
|
343
343
|
attr_accessor key_material_id: ::String
|
|
344
344
|
SENSITIVE: [:private_key_plaintext]
|
|
@@ -347,7 +347,7 @@ module Aws::KMS
|
|
|
347
347
|
class GenerateDataKeyPairWithoutPlaintextRequest
|
|
348
348
|
attr_accessor encryption_context: ::Hash[::String, ::String]
|
|
349
349
|
attr_accessor key_id: ::String
|
|
350
|
-
attr_accessor key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2")
|
|
350
|
+
attr_accessor key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2" | "ECC_NIST_EDWARDS25519")
|
|
351
351
|
attr_accessor grant_tokens: ::Array[::String]
|
|
352
352
|
attr_accessor dry_run: bool
|
|
353
353
|
SENSITIVE: []
|
|
@@ -357,7 +357,7 @@ module Aws::KMS
|
|
|
357
357
|
attr_accessor private_key_ciphertext_blob: ::String
|
|
358
358
|
attr_accessor public_key: ::String
|
|
359
359
|
attr_accessor key_id: ::String
|
|
360
|
-
attr_accessor key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2")
|
|
360
|
+
attr_accessor key_pair_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SM2" | "ECC_NIST_EDWARDS25519")
|
|
361
361
|
attr_accessor key_material_id: ::String
|
|
362
362
|
SENSITIVE: []
|
|
363
363
|
end
|
|
@@ -479,10 +479,10 @@ module Aws::KMS
|
|
|
479
479
|
attr_accessor key_id: ::String
|
|
480
480
|
attr_accessor public_key: ::String
|
|
481
481
|
attr_accessor customer_master_key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2")
|
|
482
|
-
attr_accessor key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87")
|
|
482
|
+
attr_accessor key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87" | "ECC_NIST_EDWARDS25519")
|
|
483
483
|
attr_accessor key_usage: ("SIGN_VERIFY" | "ENCRYPT_DECRYPT" | "GENERATE_VERIFY_MAC" | "KEY_AGREEMENT")
|
|
484
484
|
attr_accessor encryption_algorithms: ::Array[("SYMMETRIC_DEFAULT" | "RSAES_OAEP_SHA_1" | "RSAES_OAEP_SHA_256" | "SM2PKE")]
|
|
485
|
-
attr_accessor signing_algorithms: ::Array[("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")]
|
|
485
|
+
attr_accessor signing_algorithms: ::Array[("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512")]
|
|
486
486
|
attr_accessor key_agreement_algorithms: ::Array[("ECDH")]
|
|
487
487
|
SENSITIVE: []
|
|
488
488
|
end
|
|
@@ -622,9 +622,9 @@ module Aws::KMS
|
|
|
622
622
|
attr_accessor expiration_model: ("KEY_MATERIAL_EXPIRES" | "KEY_MATERIAL_DOES_NOT_EXPIRE")
|
|
623
623
|
attr_accessor key_manager: ("AWS" | "CUSTOMER")
|
|
624
624
|
attr_accessor customer_master_key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2")
|
|
625
|
-
attr_accessor key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87")
|
|
625
|
+
attr_accessor key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "ECC_NIST_P256" | "ECC_NIST_P384" | "ECC_NIST_P521" | "ECC_SECG_P256K1" | "SYMMETRIC_DEFAULT" | "HMAC_224" | "HMAC_256" | "HMAC_384" | "HMAC_512" | "SM2" | "ML_DSA_44" | "ML_DSA_65" | "ML_DSA_87" | "ECC_NIST_EDWARDS25519")
|
|
626
626
|
attr_accessor encryption_algorithms: ::Array[("SYMMETRIC_DEFAULT" | "RSAES_OAEP_SHA_1" | "RSAES_OAEP_SHA_256" | "SM2PKE")]
|
|
627
|
-
attr_accessor signing_algorithms: ::Array[("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")]
|
|
627
|
+
attr_accessor signing_algorithms: ::Array[("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512")]
|
|
628
628
|
attr_accessor key_agreement_algorithms: ::Array[("ECDH")]
|
|
629
629
|
attr_accessor multi_region: bool
|
|
630
630
|
attr_accessor multi_region_configuration: Types::MultiRegionConfiguration
|
|
@@ -846,7 +846,7 @@ module Aws::KMS
|
|
|
846
846
|
attr_accessor key_material_id: ::String
|
|
847
847
|
attr_accessor key_material_description: ::String
|
|
848
848
|
attr_accessor import_state: ("IMPORTED" | "PENDING_IMPORT")
|
|
849
|
-
attr_accessor key_material_state: ("NON_CURRENT" | "CURRENT" | "PENDING_ROTATION")
|
|
849
|
+
attr_accessor key_material_state: ("NON_CURRENT" | "CURRENT" | "PENDING_ROTATION" | "PENDING_MULTI_REGION_IMPORT_AND_ROTATION")
|
|
850
850
|
attr_accessor expiration_model: ("KEY_MATERIAL_EXPIRES" | "KEY_MATERIAL_DOES_NOT_EXPIRE")
|
|
851
851
|
attr_accessor valid_to: ::Time
|
|
852
852
|
attr_accessor rotation_date: ::Time
|
|
@@ -873,7 +873,7 @@ module Aws::KMS
|
|
|
873
873
|
attr_accessor message: ::String
|
|
874
874
|
attr_accessor message_type: ("RAW" | "DIGEST" | "EXTERNAL_MU")
|
|
875
875
|
attr_accessor grant_tokens: ::Array[::String]
|
|
876
|
-
attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")
|
|
876
|
+
attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512")
|
|
877
877
|
attr_accessor dry_run: bool
|
|
878
878
|
SENSITIVE: [:message]
|
|
879
879
|
end
|
|
@@ -881,7 +881,7 @@ module Aws::KMS
|
|
|
881
881
|
class SignResponse
|
|
882
882
|
attr_accessor key_id: ::String
|
|
883
883
|
attr_accessor signature: ::String
|
|
884
|
-
attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")
|
|
884
|
+
attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512")
|
|
885
885
|
SENSITIVE: []
|
|
886
886
|
end
|
|
887
887
|
|
|
@@ -970,7 +970,7 @@ module Aws::KMS
|
|
|
970
970
|
attr_accessor message: ::String
|
|
971
971
|
attr_accessor message_type: ("RAW" | "DIGEST" | "EXTERNAL_MU")
|
|
972
972
|
attr_accessor signature: ::String
|
|
973
|
-
attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")
|
|
973
|
+
attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512")
|
|
974
974
|
attr_accessor grant_tokens: ::Array[::String]
|
|
975
975
|
attr_accessor dry_run: bool
|
|
976
976
|
SENSITIVE: [:message]
|
|
@@ -979,7 +979,7 @@ module Aws::KMS
|
|
|
979
979
|
class VerifyResponse
|
|
980
980
|
attr_accessor key_id: ::String
|
|
981
981
|
attr_accessor signature_valid: bool
|
|
982
|
-
attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256")
|
|
982
|
+
attr_accessor signing_algorithm: ("RSASSA_PSS_SHA_256" | "RSASSA_PSS_SHA_384" | "RSASSA_PSS_SHA_512" | "RSASSA_PKCS1_V1_5_SHA_256" | "RSASSA_PKCS1_V1_5_SHA_384" | "RSASSA_PKCS1_V1_5_SHA_512" | "ECDSA_SHA_256" | "ECDSA_SHA_384" | "ECDSA_SHA_512" | "SM2DSA" | "ML_DSA_SHAKE_256" | "ED25519_SHA_512" | "ED25519_PH_SHA_512")
|
|
983
983
|
SENSITIVE: []
|
|
984
984
|
end
|
|
985
985
|
|
metadata
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
|
2
2
|
name: aws-sdk-kms
|
|
3
3
|
version: !ruby/object:Gem::Version
|
|
4
|
-
version: 1.
|
|
4
|
+
version: 1.118.0
|
|
5
5
|
platform: ruby
|
|
6
6
|
authors:
|
|
7
7
|
- Amazon Web Services
|
|
@@ -18,7 +18,7 @@ dependencies:
|
|
|
18
18
|
version: '3'
|
|
19
19
|
- - ">="
|
|
20
20
|
- !ruby/object:Gem::Version
|
|
21
|
-
version: 3.
|
|
21
|
+
version: 3.239.1
|
|
22
22
|
type: :runtime
|
|
23
23
|
prerelease: false
|
|
24
24
|
version_requirements: !ruby/object:Gem::Requirement
|
|
@@ -28,7 +28,7 @@ dependencies:
|
|
|
28
28
|
version: '3'
|
|
29
29
|
- - ">="
|
|
30
30
|
- !ruby/object:Gem::Version
|
|
31
|
-
version: 3.
|
|
31
|
+
version: 3.239.1
|
|
32
32
|
- !ruby/object:Gem::Dependency
|
|
33
33
|
name: aws-sigv4
|
|
34
34
|
requirement: !ruby/object:Gem::Requirement
|