aws-sdk-kms 1.121.0 → 1.123.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +10 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-kms/client.rb +60 -17
- data/lib/aws-sdk-kms/client_api.rb +8 -2
- data/lib/aws-sdk-kms/types.rb +56 -12
- data/lib/aws-sdk-kms.rb +1 -1
- data/sig/client.rbs +7 -5
- data/sig/types.rbs +2 -0
- metadata +3 -3
checksums.yaml
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
---
|
|
2
2
|
SHA256:
|
|
3
|
-
metadata.gz:
|
|
4
|
-
data.tar.gz:
|
|
3
|
+
metadata.gz: 81e60e410223f2b2cbb99309fbad50439886f9e7db3e7f1f7cbe1f76725742f6
|
|
4
|
+
data.tar.gz: c6a2b9ed15729a65d456aba409399830d4d86bb5a7b2767441829b7c09e56cbf
|
|
5
5
|
SHA512:
|
|
6
|
-
metadata.gz:
|
|
7
|
-
data.tar.gz:
|
|
6
|
+
metadata.gz: 92ccf453c5e58f7d7284ab5b358ef9aa55587ee3b0fbbc63d7d86cffef4ef6daad83b9d9442a60d3fc024684e2cf50327e615b137ceb073d37524bc5ee6a57c0
|
|
7
|
+
data.tar.gz: a84b166adb6ced12a7695b79938361c2774dbd18b14c3c23b52972fc1de0a7c9eddc902845310281f7dec8068c9e66ae6b4daa60caed5924cd34b75e19de6c5b
|
data/CHANGELOG.md
CHANGED
|
@@ -1,6 +1,16 @@
|
|
|
1
1
|
Unreleased Changes
|
|
2
2
|
------------------
|
|
3
3
|
|
|
4
|
+
1.123.0 (2026-03-18)
|
|
5
|
+
------------------
|
|
6
|
+
|
|
7
|
+
* Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
|
|
8
|
+
|
|
9
|
+
1.122.0 (2026-02-16)
|
|
10
|
+
------------------
|
|
11
|
+
|
|
12
|
+
* Feature - Added support for Decrypt and ReEncrypt API's to use dry run feature without ciphertext for authorization validation
|
|
13
|
+
|
|
4
14
|
1.121.0 (2026-01-16)
|
|
5
15
|
------------------
|
|
6
16
|
|
data/VERSION
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
1.
|
|
1
|
+
1.123.0
|
data/lib/aws-sdk-kms/client.rb
CHANGED
|
@@ -1604,7 +1604,6 @@ module Aws::KMS
|
|
|
1604
1604
|
#
|
|
1605
1605
|
#
|
|
1606
1606
|
# Multi-Region primary keys
|
|
1607
|
-
# Imported key material
|
|
1608
1607
|
#
|
|
1609
1608
|
# : To create a multi-Region *primary key* in the local Amazon Web
|
|
1610
1609
|
# Services Region, use the `MultiRegion` parameter with a value of
|
|
@@ -1632,6 +1631,8 @@ module Aws::KMS
|
|
|
1632
1631
|
#
|
|
1633
1632
|
#
|
|
1634
1633
|
#
|
|
1634
|
+
# Imported key material
|
|
1635
|
+
#
|
|
1635
1636
|
# : To import your own key material into a KMS key, begin by creating a
|
|
1636
1637
|
# KMS key with no key material. To do this, use the `Origin` parameter
|
|
1637
1638
|
# of `CreateKey` with a value of `EXTERNAL`. Next, use
|
|
@@ -2591,9 +2592,12 @@ module Aws::KMS
|
|
|
2591
2592
|
# [9]: https://docs.aws.amazon.com/kms/latest/developerguide/kms-api-permissions-reference.html
|
|
2592
2593
|
# [10]: https://docs.aws.amazon.com/kms/latest/developerguide/accessing-kms.html#programming-eventual-consistency
|
|
2593
2594
|
#
|
|
2594
|
-
# @option params [
|
|
2595
|
+
# @option params [String, StringIO, File] :ciphertext_blob
|
|
2595
2596
|
# Ciphertext to be decrypted. The blob includes metadata.
|
|
2596
2597
|
#
|
|
2598
|
+
# This parameter is required in all cases except when `DryRun` is `true`
|
|
2599
|
+
# and `DryRunModifiers` is set to `IGNORE_CIPHERTEXT`.
|
|
2600
|
+
#
|
|
2597
2601
|
# @option params [Hash<String,String>] :encryption_context
|
|
2598
2602
|
# Specifies the encryption context to use when decrypting the data. An
|
|
2599
2603
|
# encryption context is valid only for [cryptographic operations][1]
|
|
@@ -2638,11 +2642,12 @@ module Aws::KMS
|
|
|
2638
2642
|
# `IncorrectKeyException`.
|
|
2639
2643
|
#
|
|
2640
2644
|
# This parameter is required only when the ciphertext was encrypted
|
|
2641
|
-
# under an asymmetric KMS key
|
|
2642
|
-
#
|
|
2643
|
-
# symmetric
|
|
2644
|
-
#
|
|
2645
|
-
#
|
|
2645
|
+
# under an asymmetric KMS key or when `DryRun` is `true` and
|
|
2646
|
+
# `DryRunModifiers` is set to `IGNORE_CIPHERTEXT`. If you used a
|
|
2647
|
+
# symmetric encryption KMS key, KMS can get the KMS key from metadata
|
|
2648
|
+
# that it adds to the symmetric ciphertext blob. However, it is always
|
|
2649
|
+
# recommended as a best practice. This practice ensures that you use the
|
|
2650
|
+
# KMS key that you intend.
|
|
2646
2651
|
#
|
|
2647
2652
|
# To specify a KMS key, use its key ID, key ARN, alias name, or alias
|
|
2648
2653
|
# ARN. When using an alias name, prefix it with `"alias/"`. To specify a
|
|
@@ -2714,6 +2719,22 @@ module Aws::KMS
|
|
|
2714
2719
|
#
|
|
2715
2720
|
# [1]: https://docs.aws.amazon.com/kms/latest/developerguide/testing-permissions.html
|
|
2716
2721
|
#
|
|
2722
|
+
# @option params [Array<String>] :dry_run_modifiers
|
|
2723
|
+
# Specifies the modifiers to apply to the dry run operation.
|
|
2724
|
+
# `DryRunModifiers` is an optional parameter that only applies when
|
|
2725
|
+
# `DryRun` is set to `true`.
|
|
2726
|
+
#
|
|
2727
|
+
# When set to `IGNORE_CIPHERTEXT`, KMS performs only authorization
|
|
2728
|
+
# validation without ciphertext validation. This allows you to test
|
|
2729
|
+
# permissions without requiring a valid ciphertext blob.
|
|
2730
|
+
#
|
|
2731
|
+
# To learn more about how to use this parameter, see [Testing your
|
|
2732
|
+
# permissions][1] in the *Key Management Service Developer Guide*.
|
|
2733
|
+
#
|
|
2734
|
+
#
|
|
2735
|
+
#
|
|
2736
|
+
# [1]: https://docs.aws.amazon.com/kms/latest/developerguide/testing-permissions.html
|
|
2737
|
+
#
|
|
2717
2738
|
# @return [Types::DecryptResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
|
2718
2739
|
#
|
|
2719
2740
|
# * {Types::DecryptResponse#key_id #key_id} => String
|
|
@@ -2784,7 +2805,7 @@ module Aws::KMS
|
|
|
2784
2805
|
# @example Request syntax with placeholder values
|
|
2785
2806
|
#
|
|
2786
2807
|
# resp = client.decrypt({
|
|
2787
|
-
# ciphertext_blob: "data",
|
|
2808
|
+
# ciphertext_blob: "data",
|
|
2788
2809
|
# encryption_context: {
|
|
2789
2810
|
# "EncryptionContextKey" => "EncryptionContextValue",
|
|
2790
2811
|
# },
|
|
@@ -2796,6 +2817,7 @@ module Aws::KMS
|
|
|
2796
2817
|
# attestation_document: "data",
|
|
2797
2818
|
# },
|
|
2798
2819
|
# dry_run: false,
|
|
2820
|
+
# dry_run_modifiers: ["IGNORE_CIPHERTEXT"], # accepts IGNORE_CIPHERTEXT
|
|
2799
2821
|
# })
|
|
2800
2822
|
#
|
|
2801
2823
|
# @example Response structure
|
|
@@ -8398,9 +8420,12 @@ module Aws::KMS
|
|
|
8398
8420
|
# [8]: https://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html
|
|
8399
8421
|
# [9]: https://docs.aws.amazon.com/kms/latest/developerguide/accessing-kms.html#programming-eventual-consistency
|
|
8400
8422
|
#
|
|
8401
|
-
# @option params [
|
|
8423
|
+
# @option params [String, StringIO, File] :ciphertext_blob
|
|
8402
8424
|
# Ciphertext of the data to reencrypt.
|
|
8403
8425
|
#
|
|
8426
|
+
# This parameter is required in all cases except when `DryRun` is `true`
|
|
8427
|
+
# and `DryRunModifiers` is set to `IGNORE_CIPHERTEXT`.
|
|
8428
|
+
#
|
|
8404
8429
|
# @option params [Hash<String,String>] :source_encryption_context
|
|
8405
8430
|
# Specifies the encryption context to use to decrypt the ciphertext.
|
|
8406
8431
|
# Enter the same encryption context that was used to encrypt the
|
|
@@ -8430,11 +8455,12 @@ module Aws::KMS
|
|
|
8430
8455
|
# an `IncorrectKeyException`.
|
|
8431
8456
|
#
|
|
8432
8457
|
# This parameter is required only when the ciphertext was encrypted
|
|
8433
|
-
# under an asymmetric KMS key
|
|
8434
|
-
#
|
|
8435
|
-
# symmetric
|
|
8436
|
-
#
|
|
8437
|
-
#
|
|
8458
|
+
# under an asymmetric KMS key or when `DryRun` is `true` and
|
|
8459
|
+
# `DryRunModifiers` is set to `IGNORE_CIPHERTEXT`. If you used a
|
|
8460
|
+
# symmetric encryption KMS key, KMS can get the KMS key from metadata
|
|
8461
|
+
# that it adds to the symmetric ciphertext blob. However, it is always
|
|
8462
|
+
# recommended as a best practice. This practice ensures that you use the
|
|
8463
|
+
# KMS key that you intend.
|
|
8438
8464
|
#
|
|
8439
8465
|
# To specify a KMS key, use its key ID, key ARN, alias name, or alias
|
|
8440
8466
|
# ARN. When using an alias name, prefix it with `"alias/"`. To specify a
|
|
@@ -8552,6 +8578,22 @@ module Aws::KMS
|
|
|
8552
8578
|
#
|
|
8553
8579
|
# [1]: https://docs.aws.amazon.com/kms/latest/developerguide/testing-permissions.html
|
|
8554
8580
|
#
|
|
8581
|
+
# @option params [Array<String>] :dry_run_modifiers
|
|
8582
|
+
# Specifies the modifiers to apply to the dry run operation.
|
|
8583
|
+
# `DryRunModifiers` is an optional parameter that only applies when
|
|
8584
|
+
# `DryRun` is set to `true`.
|
|
8585
|
+
#
|
|
8586
|
+
# When set to `IGNORE_CIPHERTEXT`, KMS performs only authorization
|
|
8587
|
+
# validation without ciphertext validation. This allows you to test
|
|
8588
|
+
# permissions without requiring a valid ciphertext blob.
|
|
8589
|
+
#
|
|
8590
|
+
# To learn more about how to use this parameter, see [Testing your
|
|
8591
|
+
# permissions][1] in the *Key Management Service Developer Guide*.
|
|
8592
|
+
#
|
|
8593
|
+
#
|
|
8594
|
+
#
|
|
8595
|
+
# [1]: https://docs.aws.amazon.com/kms/latest/developerguide/testing-permissions.html
|
|
8596
|
+
#
|
|
8555
8597
|
# @return [Types::ReEncryptResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
|
8556
8598
|
#
|
|
8557
8599
|
# * {Types::ReEncryptResponse#ciphertext_blob #ciphertext_blob} => String
|
|
@@ -8586,7 +8628,7 @@ module Aws::KMS
|
|
|
8586
8628
|
# @example Request syntax with placeholder values
|
|
8587
8629
|
#
|
|
8588
8630
|
# resp = client.re_encrypt({
|
|
8589
|
-
# ciphertext_blob: "data",
|
|
8631
|
+
# ciphertext_blob: "data",
|
|
8590
8632
|
# source_encryption_context: {
|
|
8591
8633
|
# "EncryptionContextKey" => "EncryptionContextValue",
|
|
8592
8634
|
# },
|
|
@@ -8599,6 +8641,7 @@ module Aws::KMS
|
|
|
8599
8641
|
# destination_encryption_algorithm: "SYMMETRIC_DEFAULT", # accepts SYMMETRIC_DEFAULT, RSAES_OAEP_SHA_1, RSAES_OAEP_SHA_256, SM2PKE
|
|
8600
8642
|
# grant_tokens: ["GrantTokenType"],
|
|
8601
8643
|
# dry_run: false,
|
|
8644
|
+
# dry_run_modifiers: ["IGNORE_CIPHERTEXT"], # accepts IGNORE_CIPHERTEXT
|
|
8602
8645
|
# })
|
|
8603
8646
|
#
|
|
8604
8647
|
# @example Response structure
|
|
@@ -9239,7 +9282,7 @@ module Aws::KMS
|
|
|
9239
9282
|
# automatically rotate, as scheduled, on April 14, 2024 and every 730
|
|
9240
9283
|
# days thereafter.
|
|
9241
9284
|
#
|
|
9242
|
-
# <note markdown="1"> You can perform on-demand key rotation a **maximum of
|
|
9285
|
+
# <note markdown="1"> You can perform on-demand key rotation a **maximum of 25 times** per
|
|
9243
9286
|
# KMS key. You can use the KMS console to view the number of remaining
|
|
9244
9287
|
# on-demand rotations available for a KMS key.
|
|
9245
9288
|
#
|
|
@@ -11157,7 +11200,7 @@ module Aws::KMS
|
|
|
11157
11200
|
tracer: tracer
|
|
11158
11201
|
)
|
|
11159
11202
|
context[:gem_name] = 'aws-sdk-kms'
|
|
11160
|
-
context[:gem_version] = '1.
|
|
11203
|
+
context[:gem_version] = '1.123.0'
|
|
11161
11204
|
Seahorse::Client::Request.new(handlers, context)
|
|
11162
11205
|
end
|
|
11163
11206
|
|
|
@@ -80,6 +80,8 @@ module Aws::KMS
|
|
|
80
80
|
DisabledException = Shapes::StructureShape.new(name: 'DisabledException')
|
|
81
81
|
DisconnectCustomKeyStoreRequest = Shapes::StructureShape.new(name: 'DisconnectCustomKeyStoreRequest')
|
|
82
82
|
DisconnectCustomKeyStoreResponse = Shapes::StructureShape.new(name: 'DisconnectCustomKeyStoreResponse')
|
|
83
|
+
DryRunModifierList = Shapes::ListShape.new(name: 'DryRunModifierList')
|
|
84
|
+
DryRunModifierType = Shapes::StringShape.new(name: 'DryRunModifierType')
|
|
83
85
|
DryRunOperationException = Shapes::StructureShape.new(name: 'DryRunOperationException')
|
|
84
86
|
EnableKeyRequest = Shapes::StructureShape.new(name: 'EnableKeyRequest')
|
|
85
87
|
EnableKeyRotationRequest = Shapes::StructureShape.new(name: 'EnableKeyRotationRequest')
|
|
@@ -372,13 +374,14 @@ module Aws::KMS
|
|
|
372
374
|
CustomKeyStoresListEntry.add_member(:xks_proxy_configuration, Shapes::ShapeRef.new(shape: XksProxyConfigurationType, location_name: "XksProxyConfiguration"))
|
|
373
375
|
CustomKeyStoresListEntry.struct_class = Types::CustomKeyStoresListEntry
|
|
374
376
|
|
|
375
|
-
DecryptRequest.add_member(:ciphertext_blob, Shapes::ShapeRef.new(shape: CiphertextType,
|
|
377
|
+
DecryptRequest.add_member(:ciphertext_blob, Shapes::ShapeRef.new(shape: CiphertextType, location_name: "CiphertextBlob"))
|
|
376
378
|
DecryptRequest.add_member(:encryption_context, Shapes::ShapeRef.new(shape: EncryptionContextType, location_name: "EncryptionContext"))
|
|
377
379
|
DecryptRequest.add_member(:grant_tokens, Shapes::ShapeRef.new(shape: GrantTokenList, location_name: "GrantTokens"))
|
|
378
380
|
DecryptRequest.add_member(:key_id, Shapes::ShapeRef.new(shape: KeyIdType, location_name: "KeyId"))
|
|
379
381
|
DecryptRequest.add_member(:encryption_algorithm, Shapes::ShapeRef.new(shape: EncryptionAlgorithmSpec, location_name: "EncryptionAlgorithm"))
|
|
380
382
|
DecryptRequest.add_member(:recipient, Shapes::ShapeRef.new(shape: RecipientInfo, location_name: "Recipient"))
|
|
381
383
|
DecryptRequest.add_member(:dry_run, Shapes::ShapeRef.new(shape: NullableBooleanType, location_name: "DryRun"))
|
|
384
|
+
DecryptRequest.add_member(:dry_run_modifiers, Shapes::ShapeRef.new(shape: DryRunModifierList, location_name: "DryRunModifiers"))
|
|
382
385
|
DecryptRequest.struct_class = Types::DecryptRequest
|
|
383
386
|
|
|
384
387
|
DecryptResponse.add_member(:key_id, Shapes::ShapeRef.new(shape: KeyIdType, location_name: "KeyId"))
|
|
@@ -454,6 +457,8 @@ module Aws::KMS
|
|
|
454
457
|
|
|
455
458
|
DisconnectCustomKeyStoreResponse.struct_class = Types::DisconnectCustomKeyStoreResponse
|
|
456
459
|
|
|
460
|
+
DryRunModifierList.member = Shapes::ShapeRef.new(shape: DryRunModifierType)
|
|
461
|
+
|
|
457
462
|
DryRunOperationException.add_member(:message, Shapes::ShapeRef.new(shape: ErrorMessageType, location_name: "message"))
|
|
458
463
|
DryRunOperationException.struct_class = Types::DryRunOperationException
|
|
459
464
|
|
|
@@ -825,7 +830,7 @@ module Aws::KMS
|
|
|
825
830
|
PutKeyPolicyRequest.add_member(:bypass_policy_lockout_safety_check, Shapes::ShapeRef.new(shape: BooleanType, location_name: "BypassPolicyLockoutSafetyCheck"))
|
|
826
831
|
PutKeyPolicyRequest.struct_class = Types::PutKeyPolicyRequest
|
|
827
832
|
|
|
828
|
-
ReEncryptRequest.add_member(:ciphertext_blob, Shapes::ShapeRef.new(shape: CiphertextType,
|
|
833
|
+
ReEncryptRequest.add_member(:ciphertext_blob, Shapes::ShapeRef.new(shape: CiphertextType, location_name: "CiphertextBlob"))
|
|
829
834
|
ReEncryptRequest.add_member(:source_encryption_context, Shapes::ShapeRef.new(shape: EncryptionContextType, location_name: "SourceEncryptionContext"))
|
|
830
835
|
ReEncryptRequest.add_member(:source_key_id, Shapes::ShapeRef.new(shape: KeyIdType, location_name: "SourceKeyId"))
|
|
831
836
|
ReEncryptRequest.add_member(:destination_key_id, Shapes::ShapeRef.new(shape: KeyIdType, required: true, location_name: "DestinationKeyId"))
|
|
@@ -834,6 +839,7 @@ module Aws::KMS
|
|
|
834
839
|
ReEncryptRequest.add_member(:destination_encryption_algorithm, Shapes::ShapeRef.new(shape: EncryptionAlgorithmSpec, location_name: "DestinationEncryptionAlgorithm"))
|
|
835
840
|
ReEncryptRequest.add_member(:grant_tokens, Shapes::ShapeRef.new(shape: GrantTokenList, location_name: "GrantTokens"))
|
|
836
841
|
ReEncryptRequest.add_member(:dry_run, Shapes::ShapeRef.new(shape: NullableBooleanType, location_name: "DryRun"))
|
|
842
|
+
ReEncryptRequest.add_member(:dry_run_modifiers, Shapes::ShapeRef.new(shape: DryRunModifierList, location_name: "DryRunModifiers"))
|
|
837
843
|
ReEncryptRequest.struct_class = Types::ReEncryptRequest
|
|
838
844
|
|
|
839
845
|
ReEncryptResponse.add_member(:ciphertext_blob, Shapes::ShapeRef.new(shape: CiphertextType, location_name: "CiphertextBlob"))
|
data/lib/aws-sdk-kms/types.rb
CHANGED
|
@@ -1558,6 +1558,9 @@ module Aws::KMS
|
|
|
1558
1558
|
|
|
1559
1559
|
# @!attribute [rw] ciphertext_blob
|
|
1560
1560
|
# Ciphertext to be decrypted. The blob includes metadata.
|
|
1561
|
+
#
|
|
1562
|
+
# This parameter is required in all cases except when `DryRun` is
|
|
1563
|
+
# `true` and `DryRunModifiers` is set to `IGNORE_CIPHERTEXT`.
|
|
1561
1564
|
# @return [String]
|
|
1562
1565
|
#
|
|
1563
1566
|
# @!attribute [rw] encryption_context
|
|
@@ -1607,11 +1610,12 @@ module Aws::KMS
|
|
|
1607
1610
|
# operation throws an `IncorrectKeyException`.
|
|
1608
1611
|
#
|
|
1609
1612
|
# This parameter is required only when the ciphertext was encrypted
|
|
1610
|
-
# under an asymmetric KMS key
|
|
1611
|
-
#
|
|
1612
|
-
# symmetric
|
|
1613
|
-
#
|
|
1614
|
-
# you
|
|
1613
|
+
# under an asymmetric KMS key or when `DryRun` is `true` and
|
|
1614
|
+
# `DryRunModifiers` is set to `IGNORE_CIPHERTEXT`. If you used a
|
|
1615
|
+
# symmetric encryption KMS key, KMS can get the KMS key from metadata
|
|
1616
|
+
# that it adds to the symmetric ciphertext blob. However, it is always
|
|
1617
|
+
# recommended as a best practice. This practice ensures that you use
|
|
1618
|
+
# the KMS key that you intend.
|
|
1615
1619
|
#
|
|
1616
1620
|
# To specify a KMS key, use its key ID, key ARN, alias name, or alias
|
|
1617
1621
|
# ARN. When using an alias name, prefix it with `"alias/"`. To specify
|
|
@@ -1687,6 +1691,23 @@ module Aws::KMS
|
|
|
1687
1691
|
# [1]: https://docs.aws.amazon.com/kms/latest/developerguide/testing-permissions.html
|
|
1688
1692
|
# @return [Boolean]
|
|
1689
1693
|
#
|
|
1694
|
+
# @!attribute [rw] dry_run_modifiers
|
|
1695
|
+
# Specifies the modifiers to apply to the dry run operation.
|
|
1696
|
+
# `DryRunModifiers` is an optional parameter that only applies when
|
|
1697
|
+
# `DryRun` is set to `true`.
|
|
1698
|
+
#
|
|
1699
|
+
# When set to `IGNORE_CIPHERTEXT`, KMS performs only authorization
|
|
1700
|
+
# validation without ciphertext validation. This allows you to test
|
|
1701
|
+
# permissions without requiring a valid ciphertext blob.
|
|
1702
|
+
#
|
|
1703
|
+
# To learn more about how to use this parameter, see [Testing your
|
|
1704
|
+
# permissions][1] in the *Key Management Service Developer Guide*.
|
|
1705
|
+
#
|
|
1706
|
+
#
|
|
1707
|
+
#
|
|
1708
|
+
# [1]: https://docs.aws.amazon.com/kms/latest/developerguide/testing-permissions.html
|
|
1709
|
+
# @return [Array<String>]
|
|
1710
|
+
#
|
|
1690
1711
|
# @see http://docs.aws.amazon.com/goto/WebAPI/kms-2014-11-01/DecryptRequest AWS API Documentation
|
|
1691
1712
|
#
|
|
1692
1713
|
class DecryptRequest < Struct.new(
|
|
@@ -1696,7 +1717,8 @@ module Aws::KMS
|
|
|
1696
1717
|
:key_id,
|
|
1697
1718
|
:encryption_algorithm,
|
|
1698
1719
|
:recipient,
|
|
1699
|
-
:dry_run
|
|
1720
|
+
:dry_run,
|
|
1721
|
+
:dry_run_modifiers)
|
|
1700
1722
|
SENSITIVE = []
|
|
1701
1723
|
include Aws::Structure
|
|
1702
1724
|
end
|
|
@@ -5340,6 +5362,9 @@ module Aws::KMS
|
|
|
5340
5362
|
|
|
5341
5363
|
# @!attribute [rw] ciphertext_blob
|
|
5342
5364
|
# Ciphertext of the data to reencrypt.
|
|
5365
|
+
#
|
|
5366
|
+
# This parameter is required in all cases except when `DryRun` is
|
|
5367
|
+
# `true` and `DryRunModifiers` is set to `IGNORE_CIPHERTEXT`.
|
|
5343
5368
|
# @return [String]
|
|
5344
5369
|
#
|
|
5345
5370
|
# @!attribute [rw] source_encryption_context
|
|
@@ -5373,11 +5398,12 @@ module Aws::KMS
|
|
|
5373
5398
|
# operation throws an `IncorrectKeyException`.
|
|
5374
5399
|
#
|
|
5375
5400
|
# This parameter is required only when the ciphertext was encrypted
|
|
5376
|
-
# under an asymmetric KMS key
|
|
5377
|
-
#
|
|
5378
|
-
# symmetric
|
|
5379
|
-
#
|
|
5380
|
-
# you
|
|
5401
|
+
# under an asymmetric KMS key or when `DryRun` is `true` and
|
|
5402
|
+
# `DryRunModifiers` is set to `IGNORE_CIPHERTEXT`. If you used a
|
|
5403
|
+
# symmetric encryption KMS key, KMS can get the KMS key from metadata
|
|
5404
|
+
# that it adds to the symmetric ciphertext blob. However, it is always
|
|
5405
|
+
# recommended as a best practice. This practice ensures that you use
|
|
5406
|
+
# the KMS key that you intend.
|
|
5381
5407
|
#
|
|
5382
5408
|
# To specify a KMS key, use its key ID, key ARN, alias name, or alias
|
|
5383
5409
|
# ARN. When using an alias name, prefix it with `"alias/"`. To specify
|
|
@@ -5503,6 +5529,23 @@ module Aws::KMS
|
|
|
5503
5529
|
# [1]: https://docs.aws.amazon.com/kms/latest/developerguide/testing-permissions.html
|
|
5504
5530
|
# @return [Boolean]
|
|
5505
5531
|
#
|
|
5532
|
+
# @!attribute [rw] dry_run_modifiers
|
|
5533
|
+
# Specifies the modifiers to apply to the dry run operation.
|
|
5534
|
+
# `DryRunModifiers` is an optional parameter that only applies when
|
|
5535
|
+
# `DryRun` is set to `true`.
|
|
5536
|
+
#
|
|
5537
|
+
# When set to `IGNORE_CIPHERTEXT`, KMS performs only authorization
|
|
5538
|
+
# validation without ciphertext validation. This allows you to test
|
|
5539
|
+
# permissions without requiring a valid ciphertext blob.
|
|
5540
|
+
#
|
|
5541
|
+
# To learn more about how to use this parameter, see [Testing your
|
|
5542
|
+
# permissions][1] in the *Key Management Service Developer Guide*.
|
|
5543
|
+
#
|
|
5544
|
+
#
|
|
5545
|
+
#
|
|
5546
|
+
# [1]: https://docs.aws.amazon.com/kms/latest/developerguide/testing-permissions.html
|
|
5547
|
+
# @return [Array<String>]
|
|
5548
|
+
#
|
|
5506
5549
|
# @see http://docs.aws.amazon.com/goto/WebAPI/kms-2014-11-01/ReEncryptRequest AWS API Documentation
|
|
5507
5550
|
#
|
|
5508
5551
|
class ReEncryptRequest < Struct.new(
|
|
@@ -5514,7 +5557,8 @@ module Aws::KMS
|
|
|
5514
5557
|
:source_encryption_algorithm,
|
|
5515
5558
|
:destination_encryption_algorithm,
|
|
5516
5559
|
:grant_tokens,
|
|
5517
|
-
:dry_run
|
|
5560
|
+
:dry_run,
|
|
5561
|
+
:dry_run_modifiers)
|
|
5518
5562
|
SENSITIVE = []
|
|
5519
5563
|
include Aws::Structure
|
|
5520
5564
|
end
|
data/lib/aws-sdk-kms.rb
CHANGED
data/sig/client.rbs
CHANGED
|
@@ -184,7 +184,7 @@ module Aws
|
|
|
184
184
|
end
|
|
185
185
|
# https://docs.aws.amazon.com/sdk-for-ruby/v3/api/Aws/KMS/Client.html#decrypt-instance_method
|
|
186
186
|
def decrypt: (
|
|
187
|
-
ciphertext_blob: ::String,
|
|
187
|
+
?ciphertext_blob: ::String,
|
|
188
188
|
?encryption_context: Hash[::String, ::String],
|
|
189
189
|
?grant_tokens: Array[::String],
|
|
190
190
|
?key_id: ::String,
|
|
@@ -193,9 +193,10 @@ module Aws
|
|
|
193
193
|
key_encryption_algorithm: ("RSAES_OAEP_SHA_256")?,
|
|
194
194
|
attestation_document: ::String?
|
|
195
195
|
},
|
|
196
|
-
?dry_run: bool
|
|
196
|
+
?dry_run: bool,
|
|
197
|
+
?dry_run_modifiers: Array[("IGNORE_CIPHERTEXT")]
|
|
197
198
|
) -> _DecryptResponseSuccess
|
|
198
|
-
| (Hash[Symbol, untyped] params, ?Hash[Symbol, untyped] options) -> _DecryptResponseSuccess
|
|
199
|
+
| (?Hash[Symbol, untyped] params, ?Hash[Symbol, untyped] options) -> _DecryptResponseSuccess
|
|
199
200
|
|
|
200
201
|
# https://docs.aws.amazon.com/sdk-for-ruby/v3/api/Aws/KMS/Client.html#delete_alias-instance_method
|
|
201
202
|
def delete_alias: (
|
|
@@ -635,7 +636,7 @@ module Aws
|
|
|
635
636
|
end
|
|
636
637
|
# https://docs.aws.amazon.com/sdk-for-ruby/v3/api/Aws/KMS/Client.html#re_encrypt-instance_method
|
|
637
638
|
def re_encrypt: (
|
|
638
|
-
ciphertext_blob: ::String,
|
|
639
|
+
?ciphertext_blob: ::String,
|
|
639
640
|
?source_encryption_context: Hash[::String, ::String],
|
|
640
641
|
?source_key_id: ::String,
|
|
641
642
|
destination_key_id: ::String,
|
|
@@ -643,7 +644,8 @@ module Aws
|
|
|
643
644
|
?source_encryption_algorithm: ("SYMMETRIC_DEFAULT" | "RSAES_OAEP_SHA_1" | "RSAES_OAEP_SHA_256" | "SM2PKE"),
|
|
644
645
|
?destination_encryption_algorithm: ("SYMMETRIC_DEFAULT" | "RSAES_OAEP_SHA_1" | "RSAES_OAEP_SHA_256" | "SM2PKE"),
|
|
645
646
|
?grant_tokens: Array[::String],
|
|
646
|
-
?dry_run: bool
|
|
647
|
+
?dry_run: bool,
|
|
648
|
+
?dry_run_modifiers: Array[("IGNORE_CIPHERTEXT")]
|
|
647
649
|
) -> _ReEncryptResponseSuccess
|
|
648
650
|
| (Hash[Symbol, untyped] params, ?Hash[Symbol, untyped] options) -> _ReEncryptResponseSuccess
|
|
649
651
|
|
data/sig/types.rbs
CHANGED
|
@@ -175,6 +175,7 @@ module Aws::KMS
|
|
|
175
175
|
attr_accessor encryption_algorithm: ("SYMMETRIC_DEFAULT" | "RSAES_OAEP_SHA_1" | "RSAES_OAEP_SHA_256" | "SM2PKE")
|
|
176
176
|
attr_accessor recipient: Types::RecipientInfo
|
|
177
177
|
attr_accessor dry_run: bool
|
|
178
|
+
attr_accessor dry_run_modifiers: ::Array[("IGNORE_CIPHERTEXT")]
|
|
178
179
|
SENSITIVE: []
|
|
179
180
|
end
|
|
180
181
|
|
|
@@ -779,6 +780,7 @@ module Aws::KMS
|
|
|
779
780
|
attr_accessor destination_encryption_algorithm: ("SYMMETRIC_DEFAULT" | "RSAES_OAEP_SHA_1" | "RSAES_OAEP_SHA_256" | "SM2PKE")
|
|
780
781
|
attr_accessor grant_tokens: ::Array[::String]
|
|
781
782
|
attr_accessor dry_run: bool
|
|
783
|
+
attr_accessor dry_run_modifiers: ::Array[("IGNORE_CIPHERTEXT")]
|
|
782
784
|
SENSITIVE: []
|
|
783
785
|
end
|
|
784
786
|
|
metadata
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
|
2
2
|
name: aws-sdk-kms
|
|
3
3
|
version: !ruby/object:Gem::Version
|
|
4
|
-
version: 1.
|
|
4
|
+
version: 1.123.0
|
|
5
5
|
platform: ruby
|
|
6
6
|
authors:
|
|
7
7
|
- Amazon Web Services
|
|
@@ -18,7 +18,7 @@ dependencies:
|
|
|
18
18
|
version: '3'
|
|
19
19
|
- - ">="
|
|
20
20
|
- !ruby/object:Gem::Version
|
|
21
|
-
version: 3.
|
|
21
|
+
version: 3.244.0
|
|
22
22
|
type: :runtime
|
|
23
23
|
prerelease: false
|
|
24
24
|
version_requirements: !ruby/object:Gem::Requirement
|
|
@@ -28,7 +28,7 @@ dependencies:
|
|
|
28
28
|
version: '3'
|
|
29
29
|
- - ">="
|
|
30
30
|
- !ruby/object:Gem::Version
|
|
31
|
-
version: 3.
|
|
31
|
+
version: 3.244.0
|
|
32
32
|
- !ruby/object:Gem::Dependency
|
|
33
33
|
name: aws-sigv4
|
|
34
34
|
requirement: !ruby/object:Gem::Requirement
|