aws-sdk-kms 1.121.0 → 1.123.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 3ae2b156e814456bf263415ae6fb942e7d3d882f2815c7d9b2d5359f5ec421bd
4
- data.tar.gz: 6f6058c73084be1246138a7eac25e524eae04f7baf2bb0b39bbdd7fbfe390fec
3
+ metadata.gz: 81e60e410223f2b2cbb99309fbad50439886f9e7db3e7f1f7cbe1f76725742f6
4
+ data.tar.gz: c6a2b9ed15729a65d456aba409399830d4d86bb5a7b2767441829b7c09e56cbf
5
5
  SHA512:
6
- metadata.gz: 6cda75f103a5ef0150e5a3b77818c09e5f439df084321769b6c373a58357ad5def3409dea5ccbdbd14a6c0fe79852b37bb24034628688e35d528ddfe8dd407fe
7
- data.tar.gz: b1db8f4b429d71ad05d1ef8243128a703c4525b421c461cd5ff189372b0ebfd64ba938baf439d379c4d3303ef569187d7e1a2e0e230b6271a271ac5d063907c2
6
+ metadata.gz: 92ccf453c5e58f7d7284ab5b358ef9aa55587ee3b0fbbc63d7d86cffef4ef6daad83b9d9442a60d3fc024684e2cf50327e615b137ceb073d37524bc5ee6a57c0
7
+ data.tar.gz: a84b166adb6ced12a7695b79938361c2774dbd18b14c3c23b52972fc1de0a7c9eddc902845310281f7dec8068c9e66ae6b4daa60caed5924cd34b75e19de6c5b
data/CHANGELOG.md CHANGED
@@ -1,6 +1,16 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.123.0 (2026-03-18)
5
+ ------------------
6
+
7
+ * Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
8
+
9
+ 1.122.0 (2026-02-16)
10
+ ------------------
11
+
12
+ * Feature - Added support for Decrypt and ReEncrypt API's to use dry run feature without ciphertext for authorization validation
13
+
4
14
  1.121.0 (2026-01-16)
5
15
  ------------------
6
16
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.121.0
1
+ 1.123.0
@@ -1604,7 +1604,6 @@ module Aws::KMS
1604
1604
  #
1605
1605
  #
1606
1606
  # Multi-Region primary keys
1607
- # Imported key material
1608
1607
  #
1609
1608
  # : To create a multi-Region *primary key* in the local Amazon Web
1610
1609
  # Services Region, use the `MultiRegion` parameter with a value of
@@ -1632,6 +1631,8 @@ module Aws::KMS
1632
1631
  #
1633
1632
  #
1634
1633
  #
1634
+ # Imported key material
1635
+ #
1635
1636
  # : To import your own key material into a KMS key, begin by creating a
1636
1637
  # KMS key with no key material. To do this, use the `Origin` parameter
1637
1638
  # of `CreateKey` with a value of `EXTERNAL`. Next, use
@@ -2591,9 +2592,12 @@ module Aws::KMS
2591
2592
  # [9]: https://docs.aws.amazon.com/kms/latest/developerguide/kms-api-permissions-reference.html
2592
2593
  # [10]: https://docs.aws.amazon.com/kms/latest/developerguide/accessing-kms.html#programming-eventual-consistency
2593
2594
  #
2594
- # @option params [required, String, StringIO, File] :ciphertext_blob
2595
+ # @option params [String, StringIO, File] :ciphertext_blob
2595
2596
  # Ciphertext to be decrypted. The blob includes metadata.
2596
2597
  #
2598
+ # This parameter is required in all cases except when `DryRun` is `true`
2599
+ # and `DryRunModifiers` is set to `IGNORE_CIPHERTEXT`.
2600
+ #
2597
2601
  # @option params [Hash<String,String>] :encryption_context
2598
2602
  # Specifies the encryption context to use when decrypting the data. An
2599
2603
  # encryption context is valid only for [cryptographic operations][1]
@@ -2638,11 +2642,12 @@ module Aws::KMS
2638
2642
  # `IncorrectKeyException`.
2639
2643
  #
2640
2644
  # This parameter is required only when the ciphertext was encrypted
2641
- # under an asymmetric KMS key. If you used a symmetric encryption KMS
2642
- # key, KMS can get the KMS key from metadata that it adds to the
2643
- # symmetric ciphertext blob. However, it is always recommended as a best
2644
- # practice. This practice ensures that you use the KMS key that you
2645
- # intend.
2645
+ # under an asymmetric KMS key or when `DryRun` is `true` and
2646
+ # `DryRunModifiers` is set to `IGNORE_CIPHERTEXT`. If you used a
2647
+ # symmetric encryption KMS key, KMS can get the KMS key from metadata
2648
+ # that it adds to the symmetric ciphertext blob. However, it is always
2649
+ # recommended as a best practice. This practice ensures that you use the
2650
+ # KMS key that you intend.
2646
2651
  #
2647
2652
  # To specify a KMS key, use its key ID, key ARN, alias name, or alias
2648
2653
  # ARN. When using an alias name, prefix it with `"alias/"`. To specify a
@@ -2714,6 +2719,22 @@ module Aws::KMS
2714
2719
  #
2715
2720
  # [1]: https://docs.aws.amazon.com/kms/latest/developerguide/testing-permissions.html
2716
2721
  #
2722
+ # @option params [Array<String>] :dry_run_modifiers
2723
+ # Specifies the modifiers to apply to the dry run operation.
2724
+ # `DryRunModifiers` is an optional parameter that only applies when
2725
+ # `DryRun` is set to `true`.
2726
+ #
2727
+ # When set to `IGNORE_CIPHERTEXT`, KMS performs only authorization
2728
+ # validation without ciphertext validation. This allows you to test
2729
+ # permissions without requiring a valid ciphertext blob.
2730
+ #
2731
+ # To learn more about how to use this parameter, see [Testing your
2732
+ # permissions][1] in the *Key Management Service Developer Guide*.
2733
+ #
2734
+ #
2735
+ #
2736
+ # [1]: https://docs.aws.amazon.com/kms/latest/developerguide/testing-permissions.html
2737
+ #
2717
2738
  # @return [Types::DecryptResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
2718
2739
  #
2719
2740
  # * {Types::DecryptResponse#key_id #key_id} => String
@@ -2784,7 +2805,7 @@ module Aws::KMS
2784
2805
  # @example Request syntax with placeholder values
2785
2806
  #
2786
2807
  # resp = client.decrypt({
2787
- # ciphertext_blob: "data", # required
2808
+ # ciphertext_blob: "data",
2788
2809
  # encryption_context: {
2789
2810
  # "EncryptionContextKey" => "EncryptionContextValue",
2790
2811
  # },
@@ -2796,6 +2817,7 @@ module Aws::KMS
2796
2817
  # attestation_document: "data",
2797
2818
  # },
2798
2819
  # dry_run: false,
2820
+ # dry_run_modifiers: ["IGNORE_CIPHERTEXT"], # accepts IGNORE_CIPHERTEXT
2799
2821
  # })
2800
2822
  #
2801
2823
  # @example Response structure
@@ -8398,9 +8420,12 @@ module Aws::KMS
8398
8420
  # [8]: https://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html
8399
8421
  # [9]: https://docs.aws.amazon.com/kms/latest/developerguide/accessing-kms.html#programming-eventual-consistency
8400
8422
  #
8401
- # @option params [required, String, StringIO, File] :ciphertext_blob
8423
+ # @option params [String, StringIO, File] :ciphertext_blob
8402
8424
  # Ciphertext of the data to reencrypt.
8403
8425
  #
8426
+ # This parameter is required in all cases except when `DryRun` is `true`
8427
+ # and `DryRunModifiers` is set to `IGNORE_CIPHERTEXT`.
8428
+ #
8404
8429
  # @option params [Hash<String,String>] :source_encryption_context
8405
8430
  # Specifies the encryption context to use to decrypt the ciphertext.
8406
8431
  # Enter the same encryption context that was used to encrypt the
@@ -8430,11 +8455,12 @@ module Aws::KMS
8430
8455
  # an `IncorrectKeyException`.
8431
8456
  #
8432
8457
  # This parameter is required only when the ciphertext was encrypted
8433
- # under an asymmetric KMS key. If you used a symmetric encryption KMS
8434
- # key, KMS can get the KMS key from metadata that it adds to the
8435
- # symmetric ciphertext blob. However, it is always recommended as a best
8436
- # practice. This practice ensures that you use the KMS key that you
8437
- # intend.
8458
+ # under an asymmetric KMS key or when `DryRun` is `true` and
8459
+ # `DryRunModifiers` is set to `IGNORE_CIPHERTEXT`. If you used a
8460
+ # symmetric encryption KMS key, KMS can get the KMS key from metadata
8461
+ # that it adds to the symmetric ciphertext blob. However, it is always
8462
+ # recommended as a best practice. This practice ensures that you use the
8463
+ # KMS key that you intend.
8438
8464
  #
8439
8465
  # To specify a KMS key, use its key ID, key ARN, alias name, or alias
8440
8466
  # ARN. When using an alias name, prefix it with `"alias/"`. To specify a
@@ -8552,6 +8578,22 @@ module Aws::KMS
8552
8578
  #
8553
8579
  # [1]: https://docs.aws.amazon.com/kms/latest/developerguide/testing-permissions.html
8554
8580
  #
8581
+ # @option params [Array<String>] :dry_run_modifiers
8582
+ # Specifies the modifiers to apply to the dry run operation.
8583
+ # `DryRunModifiers` is an optional parameter that only applies when
8584
+ # `DryRun` is set to `true`.
8585
+ #
8586
+ # When set to `IGNORE_CIPHERTEXT`, KMS performs only authorization
8587
+ # validation without ciphertext validation. This allows you to test
8588
+ # permissions without requiring a valid ciphertext blob.
8589
+ #
8590
+ # To learn more about how to use this parameter, see [Testing your
8591
+ # permissions][1] in the *Key Management Service Developer Guide*.
8592
+ #
8593
+ #
8594
+ #
8595
+ # [1]: https://docs.aws.amazon.com/kms/latest/developerguide/testing-permissions.html
8596
+ #
8555
8597
  # @return [Types::ReEncryptResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
8556
8598
  #
8557
8599
  # * {Types::ReEncryptResponse#ciphertext_blob #ciphertext_blob} => String
@@ -8586,7 +8628,7 @@ module Aws::KMS
8586
8628
  # @example Request syntax with placeholder values
8587
8629
  #
8588
8630
  # resp = client.re_encrypt({
8589
- # ciphertext_blob: "data", # required
8631
+ # ciphertext_blob: "data",
8590
8632
  # source_encryption_context: {
8591
8633
  # "EncryptionContextKey" => "EncryptionContextValue",
8592
8634
  # },
@@ -8599,6 +8641,7 @@ module Aws::KMS
8599
8641
  # destination_encryption_algorithm: "SYMMETRIC_DEFAULT", # accepts SYMMETRIC_DEFAULT, RSAES_OAEP_SHA_1, RSAES_OAEP_SHA_256, SM2PKE
8600
8642
  # grant_tokens: ["GrantTokenType"],
8601
8643
  # dry_run: false,
8644
+ # dry_run_modifiers: ["IGNORE_CIPHERTEXT"], # accepts IGNORE_CIPHERTEXT
8602
8645
  # })
8603
8646
  #
8604
8647
  # @example Response structure
@@ -9239,7 +9282,7 @@ module Aws::KMS
9239
9282
  # automatically rotate, as scheduled, on April 14, 2024 and every 730
9240
9283
  # days thereafter.
9241
9284
  #
9242
- # <note markdown="1"> You can perform on-demand key rotation a **maximum of 10 times** per
9285
+ # <note markdown="1"> You can perform on-demand key rotation a **maximum of 25 times** per
9243
9286
  # KMS key. You can use the KMS console to view the number of remaining
9244
9287
  # on-demand rotations available for a KMS key.
9245
9288
  #
@@ -11157,7 +11200,7 @@ module Aws::KMS
11157
11200
  tracer: tracer
11158
11201
  )
11159
11202
  context[:gem_name] = 'aws-sdk-kms'
11160
- context[:gem_version] = '1.121.0'
11203
+ context[:gem_version] = '1.123.0'
11161
11204
  Seahorse::Client::Request.new(handlers, context)
11162
11205
  end
11163
11206
 
@@ -80,6 +80,8 @@ module Aws::KMS
80
80
  DisabledException = Shapes::StructureShape.new(name: 'DisabledException')
81
81
  DisconnectCustomKeyStoreRequest = Shapes::StructureShape.new(name: 'DisconnectCustomKeyStoreRequest')
82
82
  DisconnectCustomKeyStoreResponse = Shapes::StructureShape.new(name: 'DisconnectCustomKeyStoreResponse')
83
+ DryRunModifierList = Shapes::ListShape.new(name: 'DryRunModifierList')
84
+ DryRunModifierType = Shapes::StringShape.new(name: 'DryRunModifierType')
83
85
  DryRunOperationException = Shapes::StructureShape.new(name: 'DryRunOperationException')
84
86
  EnableKeyRequest = Shapes::StructureShape.new(name: 'EnableKeyRequest')
85
87
  EnableKeyRotationRequest = Shapes::StructureShape.new(name: 'EnableKeyRotationRequest')
@@ -372,13 +374,14 @@ module Aws::KMS
372
374
  CustomKeyStoresListEntry.add_member(:xks_proxy_configuration, Shapes::ShapeRef.new(shape: XksProxyConfigurationType, location_name: "XksProxyConfiguration"))
373
375
  CustomKeyStoresListEntry.struct_class = Types::CustomKeyStoresListEntry
374
376
 
375
- DecryptRequest.add_member(:ciphertext_blob, Shapes::ShapeRef.new(shape: CiphertextType, required: true, location_name: "CiphertextBlob"))
377
+ DecryptRequest.add_member(:ciphertext_blob, Shapes::ShapeRef.new(shape: CiphertextType, location_name: "CiphertextBlob"))
376
378
  DecryptRequest.add_member(:encryption_context, Shapes::ShapeRef.new(shape: EncryptionContextType, location_name: "EncryptionContext"))
377
379
  DecryptRequest.add_member(:grant_tokens, Shapes::ShapeRef.new(shape: GrantTokenList, location_name: "GrantTokens"))
378
380
  DecryptRequest.add_member(:key_id, Shapes::ShapeRef.new(shape: KeyIdType, location_name: "KeyId"))
379
381
  DecryptRequest.add_member(:encryption_algorithm, Shapes::ShapeRef.new(shape: EncryptionAlgorithmSpec, location_name: "EncryptionAlgorithm"))
380
382
  DecryptRequest.add_member(:recipient, Shapes::ShapeRef.new(shape: RecipientInfo, location_name: "Recipient"))
381
383
  DecryptRequest.add_member(:dry_run, Shapes::ShapeRef.new(shape: NullableBooleanType, location_name: "DryRun"))
384
+ DecryptRequest.add_member(:dry_run_modifiers, Shapes::ShapeRef.new(shape: DryRunModifierList, location_name: "DryRunModifiers"))
382
385
  DecryptRequest.struct_class = Types::DecryptRequest
383
386
 
384
387
  DecryptResponse.add_member(:key_id, Shapes::ShapeRef.new(shape: KeyIdType, location_name: "KeyId"))
@@ -454,6 +457,8 @@ module Aws::KMS
454
457
 
455
458
  DisconnectCustomKeyStoreResponse.struct_class = Types::DisconnectCustomKeyStoreResponse
456
459
 
460
+ DryRunModifierList.member = Shapes::ShapeRef.new(shape: DryRunModifierType)
461
+
457
462
  DryRunOperationException.add_member(:message, Shapes::ShapeRef.new(shape: ErrorMessageType, location_name: "message"))
458
463
  DryRunOperationException.struct_class = Types::DryRunOperationException
459
464
 
@@ -825,7 +830,7 @@ module Aws::KMS
825
830
  PutKeyPolicyRequest.add_member(:bypass_policy_lockout_safety_check, Shapes::ShapeRef.new(shape: BooleanType, location_name: "BypassPolicyLockoutSafetyCheck"))
826
831
  PutKeyPolicyRequest.struct_class = Types::PutKeyPolicyRequest
827
832
 
828
- ReEncryptRequest.add_member(:ciphertext_blob, Shapes::ShapeRef.new(shape: CiphertextType, required: true, location_name: "CiphertextBlob"))
833
+ ReEncryptRequest.add_member(:ciphertext_blob, Shapes::ShapeRef.new(shape: CiphertextType, location_name: "CiphertextBlob"))
829
834
  ReEncryptRequest.add_member(:source_encryption_context, Shapes::ShapeRef.new(shape: EncryptionContextType, location_name: "SourceEncryptionContext"))
830
835
  ReEncryptRequest.add_member(:source_key_id, Shapes::ShapeRef.new(shape: KeyIdType, location_name: "SourceKeyId"))
831
836
  ReEncryptRequest.add_member(:destination_key_id, Shapes::ShapeRef.new(shape: KeyIdType, required: true, location_name: "DestinationKeyId"))
@@ -834,6 +839,7 @@ module Aws::KMS
834
839
  ReEncryptRequest.add_member(:destination_encryption_algorithm, Shapes::ShapeRef.new(shape: EncryptionAlgorithmSpec, location_name: "DestinationEncryptionAlgorithm"))
835
840
  ReEncryptRequest.add_member(:grant_tokens, Shapes::ShapeRef.new(shape: GrantTokenList, location_name: "GrantTokens"))
836
841
  ReEncryptRequest.add_member(:dry_run, Shapes::ShapeRef.new(shape: NullableBooleanType, location_name: "DryRun"))
842
+ ReEncryptRequest.add_member(:dry_run_modifiers, Shapes::ShapeRef.new(shape: DryRunModifierList, location_name: "DryRunModifiers"))
837
843
  ReEncryptRequest.struct_class = Types::ReEncryptRequest
838
844
 
839
845
  ReEncryptResponse.add_member(:ciphertext_blob, Shapes::ShapeRef.new(shape: CiphertextType, location_name: "CiphertextBlob"))
@@ -1558,6 +1558,9 @@ module Aws::KMS
1558
1558
 
1559
1559
  # @!attribute [rw] ciphertext_blob
1560
1560
  # Ciphertext to be decrypted. The blob includes metadata.
1561
+ #
1562
+ # This parameter is required in all cases except when `DryRun` is
1563
+ # `true` and `DryRunModifiers` is set to `IGNORE_CIPHERTEXT`.
1561
1564
  # @return [String]
1562
1565
  #
1563
1566
  # @!attribute [rw] encryption_context
@@ -1607,11 +1610,12 @@ module Aws::KMS
1607
1610
  # operation throws an `IncorrectKeyException`.
1608
1611
  #
1609
1612
  # This parameter is required only when the ciphertext was encrypted
1610
- # under an asymmetric KMS key. If you used a symmetric encryption KMS
1611
- # key, KMS can get the KMS key from metadata that it adds to the
1612
- # symmetric ciphertext blob. However, it is always recommended as a
1613
- # best practice. This practice ensures that you use the KMS key that
1614
- # you intend.
1613
+ # under an asymmetric KMS key or when `DryRun` is `true` and
1614
+ # `DryRunModifiers` is set to `IGNORE_CIPHERTEXT`. If you used a
1615
+ # symmetric encryption KMS key, KMS can get the KMS key from metadata
1616
+ # that it adds to the symmetric ciphertext blob. However, it is always
1617
+ # recommended as a best practice. This practice ensures that you use
1618
+ # the KMS key that you intend.
1615
1619
  #
1616
1620
  # To specify a KMS key, use its key ID, key ARN, alias name, or alias
1617
1621
  # ARN. When using an alias name, prefix it with `"alias/"`. To specify
@@ -1687,6 +1691,23 @@ module Aws::KMS
1687
1691
  # [1]: https://docs.aws.amazon.com/kms/latest/developerguide/testing-permissions.html
1688
1692
  # @return [Boolean]
1689
1693
  #
1694
+ # @!attribute [rw] dry_run_modifiers
1695
+ # Specifies the modifiers to apply to the dry run operation.
1696
+ # `DryRunModifiers` is an optional parameter that only applies when
1697
+ # `DryRun` is set to `true`.
1698
+ #
1699
+ # When set to `IGNORE_CIPHERTEXT`, KMS performs only authorization
1700
+ # validation without ciphertext validation. This allows you to test
1701
+ # permissions without requiring a valid ciphertext blob.
1702
+ #
1703
+ # To learn more about how to use this parameter, see [Testing your
1704
+ # permissions][1] in the *Key Management Service Developer Guide*.
1705
+ #
1706
+ #
1707
+ #
1708
+ # [1]: https://docs.aws.amazon.com/kms/latest/developerguide/testing-permissions.html
1709
+ # @return [Array<String>]
1710
+ #
1690
1711
  # @see http://docs.aws.amazon.com/goto/WebAPI/kms-2014-11-01/DecryptRequest AWS API Documentation
1691
1712
  #
1692
1713
  class DecryptRequest < Struct.new(
@@ -1696,7 +1717,8 @@ module Aws::KMS
1696
1717
  :key_id,
1697
1718
  :encryption_algorithm,
1698
1719
  :recipient,
1699
- :dry_run)
1720
+ :dry_run,
1721
+ :dry_run_modifiers)
1700
1722
  SENSITIVE = []
1701
1723
  include Aws::Structure
1702
1724
  end
@@ -5340,6 +5362,9 @@ module Aws::KMS
5340
5362
 
5341
5363
  # @!attribute [rw] ciphertext_blob
5342
5364
  # Ciphertext of the data to reencrypt.
5365
+ #
5366
+ # This parameter is required in all cases except when `DryRun` is
5367
+ # `true` and `DryRunModifiers` is set to `IGNORE_CIPHERTEXT`.
5343
5368
  # @return [String]
5344
5369
  #
5345
5370
  # @!attribute [rw] source_encryption_context
@@ -5373,11 +5398,12 @@ module Aws::KMS
5373
5398
  # operation throws an `IncorrectKeyException`.
5374
5399
  #
5375
5400
  # This parameter is required only when the ciphertext was encrypted
5376
- # under an asymmetric KMS key. If you used a symmetric encryption KMS
5377
- # key, KMS can get the KMS key from metadata that it adds to the
5378
- # symmetric ciphertext blob. However, it is always recommended as a
5379
- # best practice. This practice ensures that you use the KMS key that
5380
- # you intend.
5401
+ # under an asymmetric KMS key or when `DryRun` is `true` and
5402
+ # `DryRunModifiers` is set to `IGNORE_CIPHERTEXT`. If you used a
5403
+ # symmetric encryption KMS key, KMS can get the KMS key from metadata
5404
+ # that it adds to the symmetric ciphertext blob. However, it is always
5405
+ # recommended as a best practice. This practice ensures that you use
5406
+ # the KMS key that you intend.
5381
5407
  #
5382
5408
  # To specify a KMS key, use its key ID, key ARN, alias name, or alias
5383
5409
  # ARN. When using an alias name, prefix it with `"alias/"`. To specify
@@ -5503,6 +5529,23 @@ module Aws::KMS
5503
5529
  # [1]: https://docs.aws.amazon.com/kms/latest/developerguide/testing-permissions.html
5504
5530
  # @return [Boolean]
5505
5531
  #
5532
+ # @!attribute [rw] dry_run_modifiers
5533
+ # Specifies the modifiers to apply to the dry run operation.
5534
+ # `DryRunModifiers` is an optional parameter that only applies when
5535
+ # `DryRun` is set to `true`.
5536
+ #
5537
+ # When set to `IGNORE_CIPHERTEXT`, KMS performs only authorization
5538
+ # validation without ciphertext validation. This allows you to test
5539
+ # permissions without requiring a valid ciphertext blob.
5540
+ #
5541
+ # To learn more about how to use this parameter, see [Testing your
5542
+ # permissions][1] in the *Key Management Service Developer Guide*.
5543
+ #
5544
+ #
5545
+ #
5546
+ # [1]: https://docs.aws.amazon.com/kms/latest/developerguide/testing-permissions.html
5547
+ # @return [Array<String>]
5548
+ #
5506
5549
  # @see http://docs.aws.amazon.com/goto/WebAPI/kms-2014-11-01/ReEncryptRequest AWS API Documentation
5507
5550
  #
5508
5551
  class ReEncryptRequest < Struct.new(
@@ -5514,7 +5557,8 @@ module Aws::KMS
5514
5557
  :source_encryption_algorithm,
5515
5558
  :destination_encryption_algorithm,
5516
5559
  :grant_tokens,
5517
- :dry_run)
5560
+ :dry_run,
5561
+ :dry_run_modifiers)
5518
5562
  SENSITIVE = []
5519
5563
  include Aws::Structure
5520
5564
  end
data/lib/aws-sdk-kms.rb CHANGED
@@ -54,7 +54,7 @@ module Aws::KMS
54
54
  autoload :EndpointProvider, 'aws-sdk-kms/endpoint_provider'
55
55
  autoload :Endpoints, 'aws-sdk-kms/endpoints'
56
56
 
57
- GEM_VERSION = '1.121.0'
57
+ GEM_VERSION = '1.123.0'
58
58
 
59
59
  end
60
60
 
data/sig/client.rbs CHANGED
@@ -184,7 +184,7 @@ module Aws
184
184
  end
185
185
  # https://docs.aws.amazon.com/sdk-for-ruby/v3/api/Aws/KMS/Client.html#decrypt-instance_method
186
186
  def decrypt: (
187
- ciphertext_blob: ::String,
187
+ ?ciphertext_blob: ::String,
188
188
  ?encryption_context: Hash[::String, ::String],
189
189
  ?grant_tokens: Array[::String],
190
190
  ?key_id: ::String,
@@ -193,9 +193,10 @@ module Aws
193
193
  key_encryption_algorithm: ("RSAES_OAEP_SHA_256")?,
194
194
  attestation_document: ::String?
195
195
  },
196
- ?dry_run: bool
196
+ ?dry_run: bool,
197
+ ?dry_run_modifiers: Array[("IGNORE_CIPHERTEXT")]
197
198
  ) -> _DecryptResponseSuccess
198
- | (Hash[Symbol, untyped] params, ?Hash[Symbol, untyped] options) -> _DecryptResponseSuccess
199
+ | (?Hash[Symbol, untyped] params, ?Hash[Symbol, untyped] options) -> _DecryptResponseSuccess
199
200
 
200
201
  # https://docs.aws.amazon.com/sdk-for-ruby/v3/api/Aws/KMS/Client.html#delete_alias-instance_method
201
202
  def delete_alias: (
@@ -635,7 +636,7 @@ module Aws
635
636
  end
636
637
  # https://docs.aws.amazon.com/sdk-for-ruby/v3/api/Aws/KMS/Client.html#re_encrypt-instance_method
637
638
  def re_encrypt: (
638
- ciphertext_blob: ::String,
639
+ ?ciphertext_blob: ::String,
639
640
  ?source_encryption_context: Hash[::String, ::String],
640
641
  ?source_key_id: ::String,
641
642
  destination_key_id: ::String,
@@ -643,7 +644,8 @@ module Aws
643
644
  ?source_encryption_algorithm: ("SYMMETRIC_DEFAULT" | "RSAES_OAEP_SHA_1" | "RSAES_OAEP_SHA_256" | "SM2PKE"),
644
645
  ?destination_encryption_algorithm: ("SYMMETRIC_DEFAULT" | "RSAES_OAEP_SHA_1" | "RSAES_OAEP_SHA_256" | "SM2PKE"),
645
646
  ?grant_tokens: Array[::String],
646
- ?dry_run: bool
647
+ ?dry_run: bool,
648
+ ?dry_run_modifiers: Array[("IGNORE_CIPHERTEXT")]
647
649
  ) -> _ReEncryptResponseSuccess
648
650
  | (Hash[Symbol, untyped] params, ?Hash[Symbol, untyped] options) -> _ReEncryptResponseSuccess
649
651
 
data/sig/types.rbs CHANGED
@@ -175,6 +175,7 @@ module Aws::KMS
175
175
  attr_accessor encryption_algorithm: ("SYMMETRIC_DEFAULT" | "RSAES_OAEP_SHA_1" | "RSAES_OAEP_SHA_256" | "SM2PKE")
176
176
  attr_accessor recipient: Types::RecipientInfo
177
177
  attr_accessor dry_run: bool
178
+ attr_accessor dry_run_modifiers: ::Array[("IGNORE_CIPHERTEXT")]
178
179
  SENSITIVE: []
179
180
  end
180
181
 
@@ -779,6 +780,7 @@ module Aws::KMS
779
780
  attr_accessor destination_encryption_algorithm: ("SYMMETRIC_DEFAULT" | "RSAES_OAEP_SHA_1" | "RSAES_OAEP_SHA_256" | "SM2PKE")
780
781
  attr_accessor grant_tokens: ::Array[::String]
781
782
  attr_accessor dry_run: bool
783
+ attr_accessor dry_run_modifiers: ::Array[("IGNORE_CIPHERTEXT")]
782
784
  SENSITIVE: []
783
785
  end
784
786
 
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-kms
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.121.0
4
+ version: 1.123.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
@@ -18,7 +18,7 @@ dependencies:
18
18
  version: '3'
19
19
  - - ">="
20
20
  - !ruby/object:Gem::Version
21
- version: 3.241.4
21
+ version: 3.244.0
22
22
  type: :runtime
23
23
  prerelease: false
24
24
  version_requirements: !ruby/object:Gem::Requirement
@@ -28,7 +28,7 @@ dependencies:
28
28
  version: '3'
29
29
  - - ">="
30
30
  - !ruby/object:Gem::Version
31
- version: 3.241.4
31
+ version: 3.244.0
32
32
  - !ruby/object:Gem::Dependency
33
33
  name: aws-sigv4
34
34
  requirement: !ruby/object:Gem::Requirement