aws-sdk-kms 1.57.0 → 1.58.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/CHANGELOG.md +5 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-kms/client.rb +211 -154
- data/lib/aws-sdk-kms/client_api.rb +24 -3
- data/lib/aws-sdk-kms/types.rb +87 -65
- data/lib/aws-sdk-kms.rb +1 -1
- metadata +2 -2
@@ -249,9 +249,9 @@ module Aws::KMS
|
|
249
249
|
CreateAliasRequest.struct_class = Types::CreateAliasRequest
|
250
250
|
|
251
251
|
CreateCustomKeyStoreRequest.add_member(:custom_key_store_name, Shapes::ShapeRef.new(shape: CustomKeyStoreNameType, required: true, location_name: "CustomKeyStoreName"))
|
252
|
-
CreateCustomKeyStoreRequest.add_member(:cloud_hsm_cluster_id, Shapes::ShapeRef.new(shape: CloudHsmClusterIdType,
|
253
|
-
CreateCustomKeyStoreRequest.add_member(:trust_anchor_certificate, Shapes::ShapeRef.new(shape: TrustAnchorCertificateType,
|
254
|
-
CreateCustomKeyStoreRequest.add_member(:key_store_password, Shapes::ShapeRef.new(shape: KeyStorePasswordType,
|
252
|
+
CreateCustomKeyStoreRequest.add_member(:cloud_hsm_cluster_id, Shapes::ShapeRef.new(shape: CloudHsmClusterIdType, location_name: "CloudHsmClusterId"))
|
253
|
+
CreateCustomKeyStoreRequest.add_member(:trust_anchor_certificate, Shapes::ShapeRef.new(shape: TrustAnchorCertificateType, location_name: "TrustAnchorCertificate"))
|
254
|
+
CreateCustomKeyStoreRequest.add_member(:key_store_password, Shapes::ShapeRef.new(shape: KeyStorePasswordType, location_name: "KeyStorePassword"))
|
255
255
|
CreateCustomKeyStoreRequest.struct_class = Types::CreateCustomKeyStoreRequest
|
256
256
|
|
257
257
|
CreateCustomKeyStoreResponse.add_member(:custom_key_store_id, Shapes::ShapeRef.new(shape: CustomKeyStoreIdType, location_name: "CustomKeyStoreId"))
|
@@ -994,6 +994,13 @@ module Aws::KMS
|
|
994
994
|
o.errors << Shapes::ShapeRef.new(shape: CustomKeyStoreNotFoundException)
|
995
995
|
o.errors << Shapes::ShapeRef.new(shape: InvalidMarkerException)
|
996
996
|
o.errors << Shapes::ShapeRef.new(shape: KMSInternalException)
|
997
|
+
o[:pager] = Aws::Pager.new(
|
998
|
+
more_results: "truncated",
|
999
|
+
limit_key: "limit",
|
1000
|
+
tokens: {
|
1001
|
+
"next_marker" => "marker"
|
1002
|
+
}
|
1003
|
+
)
|
997
1004
|
end)
|
998
1005
|
|
999
1006
|
api.add_operation(:describe_key, Seahorse::Model::Operation.new.tap do |o|
|
@@ -1352,6 +1359,13 @@ module Aws::KMS
|
|
1352
1359
|
o.errors << Shapes::ShapeRef.new(shape: NotFoundException)
|
1353
1360
|
o.errors << Shapes::ShapeRef.new(shape: InvalidArnException)
|
1354
1361
|
o.errors << Shapes::ShapeRef.new(shape: InvalidMarkerException)
|
1362
|
+
o[:pager] = Aws::Pager.new(
|
1363
|
+
more_results: "truncated",
|
1364
|
+
limit_key: "limit",
|
1365
|
+
tokens: {
|
1366
|
+
"next_marker" => "marker"
|
1367
|
+
}
|
1368
|
+
)
|
1355
1369
|
end)
|
1356
1370
|
|
1357
1371
|
api.add_operation(:list_retirable_grants, Seahorse::Model::Operation.new.tap do |o|
|
@@ -1365,6 +1379,13 @@ module Aws::KMS
|
|
1365
1379
|
o.errors << Shapes::ShapeRef.new(shape: InvalidArnException)
|
1366
1380
|
o.errors << Shapes::ShapeRef.new(shape: NotFoundException)
|
1367
1381
|
o.errors << Shapes::ShapeRef.new(shape: KMSInternalException)
|
1382
|
+
o[:pager] = Aws::Pager.new(
|
1383
|
+
more_results: "truncated",
|
1384
|
+
limit_key: "limit",
|
1385
|
+
tokens: {
|
1386
|
+
"next_marker" => "marker"
|
1387
|
+
}
|
1388
|
+
)
|
1368
1389
|
end)
|
1369
1390
|
|
1370
1391
|
api.add_operation(:put_key_policy, Seahorse::Model::Operation.new.tap do |o|
|
data/lib/aws-sdk-kms/types.rb
CHANGED
@@ -338,9 +338,9 @@ module Aws::KMS
|
|
338
338
|
#
|
339
339
|
# {
|
340
340
|
# custom_key_store_name: "CustomKeyStoreNameType", # required
|
341
|
-
# cloud_hsm_cluster_id: "CloudHsmClusterIdType",
|
342
|
-
# trust_anchor_certificate: "TrustAnchorCertificateType",
|
343
|
-
# key_store_password: "KeyStorePasswordType",
|
341
|
+
# cloud_hsm_cluster_id: "CloudHsmClusterIdType",
|
342
|
+
# trust_anchor_certificate: "TrustAnchorCertificateType",
|
343
|
+
# key_store_password: "KeyStorePasswordType",
|
344
344
|
# }
|
345
345
|
#
|
346
346
|
# @!attribute [rw] custom_key_store_name
|
@@ -627,8 +627,8 @@ module Aws::KMS
|
|
627
627
|
# policy: "PolicyType",
|
628
628
|
# description: "DescriptionType",
|
629
629
|
# key_usage: "SIGN_VERIFY", # accepts SIGN_VERIFY, ENCRYPT_DECRYPT, GENERATE_VERIFY_MAC
|
630
|
-
# customer_master_key_spec: "RSA_2048", # accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1, SYMMETRIC_DEFAULT, HMAC_224, HMAC_256, HMAC_384, HMAC_512
|
631
|
-
# key_spec: "RSA_2048", # accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1, SYMMETRIC_DEFAULT, HMAC_224, HMAC_256, HMAC_384, HMAC_512
|
630
|
+
# customer_master_key_spec: "RSA_2048", # accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1, SYMMETRIC_DEFAULT, HMAC_224, HMAC_256, HMAC_384, HMAC_512, SM2
|
631
|
+
# key_spec: "RSA_2048", # accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1, SYMMETRIC_DEFAULT, HMAC_224, HMAC_256, HMAC_384, HMAC_512, SM2
|
632
632
|
# origin: "AWS_KMS", # accepts AWS_KMS, EXTERNAL, AWS_CLOUDHSM
|
633
633
|
# custom_key_store_id: "CustomKeyStoreIdType",
|
634
634
|
# bypass_policy_lockout_safety_check: false,
|
@@ -667,31 +667,30 @@ module Aws::KMS
|
|
667
667
|
# immediately visible][3] in the *Amazon Web Services Identity and
|
668
668
|
# Access Management User Guide*.
|
669
669
|
#
|
670
|
-
# A key policy document
|
670
|
+
# A key policy document can include only the following characters:
|
671
671
|
#
|
672
|
-
# *
|
672
|
+
# * Printable ASCII characters from the space character (`\u0020`)
|
673
|
+
# through the end of the ASCII character range.
|
673
674
|
#
|
674
|
-
# *
|
675
|
+
# * Printable characters in the Basic Latin and Latin-1 Supplement
|
676
|
+
# character set (through `\u00FF`).
|
675
677
|
#
|
676
|
-
# * The
|
677
|
-
#
|
678
|
-
# carriage return (U+000D), and characters in the range U+0020 to
|
679
|
-
# U+00FF.
|
678
|
+
# * The tab (`\u0009`), line feed (`\u000A`), and carriage return
|
679
|
+
# (`\u000D`) special characters
|
680
680
|
#
|
681
|
-
#
|
682
|
-
#
|
683
|
-
#
|
684
|
-
#
|
685
|
-
#
|
686
|
-
# JSON Policy Reference][4] in the <i> <i>Identity and Access
|
687
|
-
# Management User Guide</i> </i>.
|
681
|
+
# For information about key policies, see [Key policies in KMS][4] in
|
682
|
+
# the *Key Management Service Developer Guide*. For help writing and
|
683
|
+
# formatting a JSON policy document, see the [IAM JSON Policy
|
684
|
+
# Reference][5] in the <i> <i>Identity and Access Management User
|
685
|
+
# Guide</i> </i>.
|
688
686
|
#
|
689
687
|
#
|
690
688
|
#
|
691
689
|
# [1]: https://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html#key-policy-default
|
692
690
|
# [2]: https://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html#key-policy-default-allow-root-enable-iam
|
693
691
|
# [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/troubleshoot_general.html#troubleshoot_general_eventual-consistency
|
694
|
-
# [4]: https://docs.aws.amazon.com/
|
692
|
+
# [4]: https://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html
|
693
|
+
# [5]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies.html
|
695
694
|
# @return [String]
|
696
695
|
#
|
697
696
|
# @!attribute [rw] description
|
@@ -725,6 +724,9 @@ module Aws::KMS
|
|
725
724
|
# * For asymmetric KMS keys with ECC key material, specify
|
726
725
|
# `SIGN_VERIFY`.
|
727
726
|
#
|
727
|
+
# * For asymmetric KMS keys with SM2 key material (China Regions
|
728
|
+
# only), specify `ENCRYPT_DECRYPT` or `SIGN_VERIFY`.
|
729
|
+
#
|
728
730
|
#
|
729
731
|
#
|
730
732
|
# [1]: https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#cryptographic-operations
|
@@ -741,10 +743,12 @@ module Aws::KMS
|
|
741
743
|
#
|
742
744
|
# @!attribute [rw] key_spec
|
743
745
|
# Specifies the type of KMS key to create. The default value,
|
744
|
-
# `SYMMETRIC_DEFAULT`, creates a KMS key with a 256-bit
|
745
|
-
# for encryption and decryption
|
746
|
-
#
|
747
|
-
#
|
746
|
+
# `SYMMETRIC_DEFAULT`, creates a KMS key with a 256-bit AES-GCM key
|
747
|
+
# that is used for encryption and decryption, except in China Regions,
|
748
|
+
# where it creates a 128-bit symmetric key that uses SM4 encryption.
|
749
|
+
# For help choosing a key spec for your KMS key, see [Choosing a KMS
|
750
|
+
# key type][1] in the <i> <i>Key Management Service Developer
|
751
|
+
# Guide</i> </i>.
|
748
752
|
#
|
749
753
|
# The `KeySpec` determines whether the KMS key contains a symmetric
|
750
754
|
# key or an asymmetric key pair. It also determines the cryptographic
|
@@ -764,7 +768,7 @@ module Aws::KMS
|
|
764
768
|
#
|
765
769
|
# * Symmetric encryption key (default)
|
766
770
|
#
|
767
|
-
# * `SYMMETRIC_DEFAULT`
|
771
|
+
# * `SYMMETRIC_DEFAULT`
|
768
772
|
#
|
769
773
|
# ^
|
770
774
|
#
|
@@ -801,6 +805,12 @@ module Aws::KMS
|
|
801
805
|
#
|
802
806
|
# ^
|
803
807
|
#
|
808
|
+
# * SM2 key pairs (China Regions only)
|
809
|
+
#
|
810
|
+
# * `SM2`
|
811
|
+
#
|
812
|
+
# ^
|
813
|
+
#
|
804
814
|
#
|
805
815
|
#
|
806
816
|
# [1]: https://docs.aws.amazon.com/kms/latest/developerguide/key-types.html#symm-asymm-choose
|
@@ -851,7 +861,7 @@ module Aws::KMS
|
|
851
861
|
# The response includes the custom key store ID and the ID of the
|
852
862
|
# CloudHSM cluster.
|
853
863
|
#
|
854
|
-
# This operation is part of the [
|
864
|
+
# This operation is part of the [custom key store feature][1] feature
|
855
865
|
# in KMS, which combines the convenience and extensive integration of
|
856
866
|
# KMS with the isolation and control of a single-tenant key store.
|
857
867
|
#
|
@@ -1197,7 +1207,7 @@ module Aws::KMS
|
|
1197
1207
|
# },
|
1198
1208
|
# grant_tokens: ["GrantTokenType"],
|
1199
1209
|
# key_id: "KeyIdType",
|
1200
|
-
# encryption_algorithm: "SYMMETRIC_DEFAULT", # accepts SYMMETRIC_DEFAULT, RSAES_OAEP_SHA_1, RSAES_OAEP_SHA_256
|
1210
|
+
# encryption_algorithm: "SYMMETRIC_DEFAULT", # accepts SYMMETRIC_DEFAULT, RSAES_OAEP_SHA_1, RSAES_OAEP_SHA_256, SM2PKE
|
1201
1211
|
# }
|
1202
1212
|
#
|
1203
1213
|
# @!attribute [rw] ciphertext_blob
|
@@ -1769,7 +1779,7 @@ module Aws::KMS
|
|
1769
1779
|
# "EncryptionContextKey" => "EncryptionContextValue",
|
1770
1780
|
# },
|
1771
1781
|
# grant_tokens: ["GrantTokenType"],
|
1772
|
-
# encryption_algorithm: "SYMMETRIC_DEFAULT", # accepts SYMMETRIC_DEFAULT, RSAES_OAEP_SHA_1, RSAES_OAEP_SHA_256
|
1782
|
+
# encryption_algorithm: "SYMMETRIC_DEFAULT", # accepts SYMMETRIC_DEFAULT, RSAES_OAEP_SHA_1, RSAES_OAEP_SHA_256, SM2PKE
|
1773
1783
|
# }
|
1774
1784
|
#
|
1775
1785
|
# @!attribute [rw] key_id
|
@@ -1916,7 +1926,7 @@ module Aws::KMS
|
|
1916
1926
|
# "EncryptionContextKey" => "EncryptionContextValue",
|
1917
1927
|
# },
|
1918
1928
|
# key_id: "KeyIdType", # required
|
1919
|
-
# key_pair_spec: "RSA_2048", # required, accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1
|
1929
|
+
# key_pair_spec: "RSA_2048", # required, accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1, SM2
|
1920
1930
|
# grant_tokens: ["GrantTokenType"],
|
1921
1931
|
# }
|
1922
1932
|
#
|
@@ -1970,10 +1980,12 @@ module Aws::KMS
|
|
1970
1980
|
# @!attribute [rw] key_pair_spec
|
1971
1981
|
# Determines the type of data key pair that is generated.
|
1972
1982
|
#
|
1973
|
-
# The KMS rule that restricts the use of asymmetric RSA
|
1974
|
-
# encrypt and decrypt or to sign and verify (but not both),
|
1975
|
-
# rule that permits you to use ECC KMS keys only to sign and
|
1976
|
-
# are not effective on data key pairs, which are used outside
|
1983
|
+
# The KMS rule that restricts the use of asymmetric RSA and SM2 KMS
|
1984
|
+
# keys to encrypt and decrypt or to sign and verify (but not both),
|
1985
|
+
# and the rule that permits you to use ECC KMS keys only to sign and
|
1986
|
+
# verify, are not effective on data key pairs, which are used outside
|
1987
|
+
# of KMS. The SM2 key spec is only available in China Regions. RSA and
|
1988
|
+
# ECC asymmetric key pairs are also available in China Regions.
|
1977
1989
|
# @return [String]
|
1978
1990
|
#
|
1979
1991
|
# @!attribute [rw] grant_tokens
|
@@ -2052,7 +2064,7 @@ module Aws::KMS
|
|
2052
2064
|
# "EncryptionContextKey" => "EncryptionContextValue",
|
2053
2065
|
# },
|
2054
2066
|
# key_id: "KeyIdType", # required
|
2055
|
-
# key_pair_spec: "RSA_2048", # required, accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1
|
2067
|
+
# key_pair_spec: "RSA_2048", # required, accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1, SM2
|
2056
2068
|
# grant_tokens: ["GrantTokenType"],
|
2057
2069
|
# }
|
2058
2070
|
#
|
@@ -2106,10 +2118,12 @@ module Aws::KMS
|
|
2106
2118
|
# @!attribute [rw] key_pair_spec
|
2107
2119
|
# Determines the type of data key pair that is generated.
|
2108
2120
|
#
|
2109
|
-
# The KMS rule that restricts the use of asymmetric RSA
|
2110
|
-
# encrypt and decrypt or to sign and verify (but not both),
|
2111
|
-
# rule that permits you to use ECC KMS keys only to sign and
|
2112
|
-
# are not effective on data key pairs, which are used outside
|
2121
|
+
# The KMS rule that restricts the use of asymmetric RSA and SM2 KMS
|
2122
|
+
# keys to encrypt and decrypt or to sign and verify (but not both),
|
2123
|
+
# and the rule that permits you to use ECC KMS keys only to sign and
|
2124
|
+
# verify, are not effective on data key pairs, which are used outside
|
2125
|
+
# of KMS. The SM2 key spec is only available in China Regions. RSA and
|
2126
|
+
# ECC asymmetric key pairs are also available in China Regions.
|
2113
2127
|
# @return [String]
|
2114
2128
|
#
|
2115
2129
|
# @!attribute [rw] grant_tokens
|
@@ -2528,7 +2542,7 @@ module Aws::KMS
|
|
2528
2542
|
# }
|
2529
2543
|
#
|
2530
2544
|
# @!attribute [rw] number_of_bytes
|
2531
|
-
# The length of the byte string.
|
2545
|
+
# The length of the random byte string. This parameter is required.
|
2532
2546
|
# @return [Integer]
|
2533
2547
|
#
|
2534
2548
|
# @!attribute [rw] custom_key_store_id
|
@@ -4241,25 +4255,29 @@ module Aws::KMS
|
|
4241
4255
|
# immediately visible][2] in the *Amazon Web Services Identity and
|
4242
4256
|
# Access Management User Guide*.
|
4243
4257
|
#
|
4244
|
-
# A key policy document
|
4258
|
+
# A key policy document can include only the following characters:
|
4245
4259
|
#
|
4246
|
-
# *
|
4260
|
+
# * Printable ASCII characters from the space character (`\u0020`)
|
4261
|
+
# through the end of the ASCII character range.
|
4247
4262
|
#
|
4248
|
-
# *
|
4263
|
+
# * Printable characters in the Basic Latin and Latin-1 Supplement
|
4264
|
+
# character set (through `\u00FF`).
|
4249
4265
|
#
|
4250
|
-
# * The
|
4251
|
-
#
|
4252
|
-
# carriage return (U+000D), and characters in the range U+0020 to
|
4253
|
-
# U+00FF.
|
4266
|
+
# * The tab (`\u0009`), line feed (`\u000A`), and carriage return
|
4267
|
+
# (`\u000D`) special characters
|
4254
4268
|
#
|
4255
|
-
#
|
4256
|
-
#
|
4257
|
-
#
|
4269
|
+
# For information about key policies, see [Key policies in KMS][3] in
|
4270
|
+
# the *Key Management Service Developer Guide*. For help writing and
|
4271
|
+
# formatting a JSON policy document, see the [IAM JSON Policy
|
4272
|
+
# Reference][4] in the <i> <i>Identity and Access Management User
|
4273
|
+
# Guide</i> </i>.
|
4258
4274
|
#
|
4259
4275
|
#
|
4260
4276
|
#
|
4261
4277
|
# [1]: https://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html#key-policy-default-allow-root-enable-iam
|
4262
4278
|
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/troubleshoot_general.html#troubleshoot_general_eventual-consistency
|
4279
|
+
# [3]: https://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html
|
4280
|
+
# [4]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies.html
|
4263
4281
|
# @return [String]
|
4264
4282
|
#
|
4265
4283
|
# @!attribute [rw] bypass_policy_lockout_safety_check
|
@@ -4308,8 +4326,8 @@ module Aws::KMS
|
|
4308
4326
|
# destination_encryption_context: {
|
4309
4327
|
# "EncryptionContextKey" => "EncryptionContextValue",
|
4310
4328
|
# },
|
4311
|
-
# source_encryption_algorithm: "SYMMETRIC_DEFAULT", # accepts SYMMETRIC_DEFAULT, RSAES_OAEP_SHA_1, RSAES_OAEP_SHA_256
|
4312
|
-
# destination_encryption_algorithm: "SYMMETRIC_DEFAULT", # accepts SYMMETRIC_DEFAULT, RSAES_OAEP_SHA_1, RSAES_OAEP_SHA_256
|
4329
|
+
# source_encryption_algorithm: "SYMMETRIC_DEFAULT", # accepts SYMMETRIC_DEFAULT, RSAES_OAEP_SHA_1, RSAES_OAEP_SHA_256, SM2PKE
|
4330
|
+
# destination_encryption_algorithm: "SYMMETRIC_DEFAULT", # accepts SYMMETRIC_DEFAULT, RSAES_OAEP_SHA_1, RSAES_OAEP_SHA_256, SM2PKE
|
4313
4331
|
# grant_tokens: ["GrantTokenType"],
|
4314
4332
|
# }
|
4315
4333
|
#
|
@@ -4621,26 +4639,30 @@ module Aws::KMS
|
|
4621
4639
|
# immediately visible][3] in the <i> <i>Identity and Access
|
4622
4640
|
# Management User Guide</i> </i>.
|
4623
4641
|
#
|
4624
|
-
# A key policy document
|
4642
|
+
# A key policy document can include only the following characters:
|
4625
4643
|
#
|
4626
|
-
# *
|
4644
|
+
# * Printable ASCII characters from the space character (`\u0020`)
|
4645
|
+
# through the end of the ASCII character range.
|
4627
4646
|
#
|
4628
|
-
# *
|
4647
|
+
# * Printable characters in the Basic Latin and Latin-1 Supplement
|
4648
|
+
# character set (through `\u00FF`).
|
4629
4649
|
#
|
4630
|
-
# * The
|
4631
|
-
#
|
4632
|
-
# carriage return (U+000D), and characters in the range U+0020 to
|
4633
|
-
# U+00FF.
|
4650
|
+
# * The tab (`\u0009`), line feed (`\u000A`), and carriage return
|
4651
|
+
# (`\u000D`) special characters
|
4634
4652
|
#
|
4635
|
-
#
|
4636
|
-
#
|
4637
|
-
#
|
4653
|
+
# For information about key policies, see [Key policies in KMS][4] in
|
4654
|
+
# the *Key Management Service Developer Guide*. For help writing and
|
4655
|
+
# formatting a JSON policy document, see the [IAM JSON Policy
|
4656
|
+
# Reference][5] in the <i> <i>Identity and Access Management User
|
4657
|
+
# Guide</i> </i>.
|
4638
4658
|
#
|
4639
4659
|
#
|
4640
4660
|
#
|
4641
4661
|
# [1]: https://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html#key-policy-default
|
4642
4662
|
# [2]: https://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html#key-policy-default-allow-root-enable-iam
|
4643
4663
|
# [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/troubleshoot_general.html#troubleshoot_general_eventual-consistency
|
4664
|
+
# [4]: https://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html
|
4665
|
+
# [5]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies.html
|
4644
4666
|
# @return [String]
|
4645
4667
|
#
|
4646
4668
|
# @!attribute [rw] bypass_policy_lockout_safety_check
|
@@ -4951,7 +4973,7 @@ module Aws::KMS
|
|
4951
4973
|
# message: "data", # required
|
4952
4974
|
# message_type: "RAW", # accepts RAW, DIGEST
|
4953
4975
|
# grant_tokens: ["GrantTokenType"],
|
4954
|
-
# signing_algorithm: "RSASSA_PSS_SHA_256", # required, accepts RSASSA_PSS_SHA_256, RSASSA_PSS_SHA_384, RSASSA_PSS_SHA_512, RSASSA_PKCS1_V1_5_SHA_256, RSASSA_PKCS1_V1_5_SHA_384, RSASSA_PKCS1_V1_5_SHA_512, ECDSA_SHA_256, ECDSA_SHA_384, ECDSA_SHA_512
|
4976
|
+
# signing_algorithm: "RSASSA_PSS_SHA_256", # required, accepts RSASSA_PSS_SHA_256, RSASSA_PSS_SHA_384, RSASSA_PSS_SHA_512, RSASSA_PKCS1_V1_5_SHA_256, RSASSA_PKCS1_V1_5_SHA_384, RSASSA_PKCS1_V1_5_SHA_512, ECDSA_SHA_256, ECDSA_SHA_384, ECDSA_SHA_512, SM2DSA
|
4955
4977
|
# }
|
4956
4978
|
#
|
4957
4979
|
# @!attribute [rw] key_id
|
@@ -5232,8 +5254,8 @@ module Aws::KMS
|
|
5232
5254
|
# @!attribute [rw] alias_name
|
5233
5255
|
# Identifies the alias that is changing its KMS key. This value must
|
5234
5256
|
# begin with `alias/` followed by the alias name, such as
|
5235
|
-
# `alias/ExampleAlias`. You cannot use UpdateAlias to change the
|
5236
|
-
# name.
|
5257
|
+
# `alias/ExampleAlias`. You cannot use `UpdateAlias` to change the
|
5258
|
+
# alias name.
|
5237
5259
|
# @return [String]
|
5238
5260
|
#
|
5239
5261
|
# @!attribute [rw] target_key_id
|
@@ -5522,7 +5544,7 @@ module Aws::KMS
|
|
5522
5544
|
# message: "data", # required
|
5523
5545
|
# message_type: "RAW", # accepts RAW, DIGEST
|
5524
5546
|
# signature: "data", # required
|
5525
|
-
# signing_algorithm: "RSASSA_PSS_SHA_256", # required, accepts RSASSA_PSS_SHA_256, RSASSA_PSS_SHA_384, RSASSA_PSS_SHA_512, RSASSA_PKCS1_V1_5_SHA_256, RSASSA_PKCS1_V1_5_SHA_384, RSASSA_PKCS1_V1_5_SHA_512, ECDSA_SHA_256, ECDSA_SHA_384, ECDSA_SHA_512
|
5547
|
+
# signing_algorithm: "RSASSA_PSS_SHA_256", # required, accepts RSASSA_PSS_SHA_256, RSASSA_PSS_SHA_384, RSASSA_PSS_SHA_512, RSASSA_PKCS1_V1_5_SHA_256, RSASSA_PKCS1_V1_5_SHA_384, RSASSA_PKCS1_V1_5_SHA_512, ECDSA_SHA_256, ECDSA_SHA_384, ECDSA_SHA_512, SM2DSA
|
5526
5548
|
# grant_tokens: ["GrantTokenType"],
|
5527
5549
|
# }
|
5528
5550
|
#
|
data/lib/aws-sdk-kms.rb
CHANGED
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: aws-sdk-kms
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 1.
|
4
|
+
version: 1.58.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Amazon Web Services
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2022-
|
11
|
+
date: 2022-07-18 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: aws-sdk-core
|