aws-sdk-kms 1.57.0 → 1.58.0

Sign up to get free protection for your applications and to get access to all the features.
@@ -249,9 +249,9 @@ module Aws::KMS
249
249
  CreateAliasRequest.struct_class = Types::CreateAliasRequest
250
250
 
251
251
  CreateCustomKeyStoreRequest.add_member(:custom_key_store_name, Shapes::ShapeRef.new(shape: CustomKeyStoreNameType, required: true, location_name: "CustomKeyStoreName"))
252
- CreateCustomKeyStoreRequest.add_member(:cloud_hsm_cluster_id, Shapes::ShapeRef.new(shape: CloudHsmClusterIdType, required: true, location_name: "CloudHsmClusterId"))
253
- CreateCustomKeyStoreRequest.add_member(:trust_anchor_certificate, Shapes::ShapeRef.new(shape: TrustAnchorCertificateType, required: true, location_name: "TrustAnchorCertificate"))
254
- CreateCustomKeyStoreRequest.add_member(:key_store_password, Shapes::ShapeRef.new(shape: KeyStorePasswordType, required: true, location_name: "KeyStorePassword"))
252
+ CreateCustomKeyStoreRequest.add_member(:cloud_hsm_cluster_id, Shapes::ShapeRef.new(shape: CloudHsmClusterIdType, location_name: "CloudHsmClusterId"))
253
+ CreateCustomKeyStoreRequest.add_member(:trust_anchor_certificate, Shapes::ShapeRef.new(shape: TrustAnchorCertificateType, location_name: "TrustAnchorCertificate"))
254
+ CreateCustomKeyStoreRequest.add_member(:key_store_password, Shapes::ShapeRef.new(shape: KeyStorePasswordType, location_name: "KeyStorePassword"))
255
255
  CreateCustomKeyStoreRequest.struct_class = Types::CreateCustomKeyStoreRequest
256
256
 
257
257
  CreateCustomKeyStoreResponse.add_member(:custom_key_store_id, Shapes::ShapeRef.new(shape: CustomKeyStoreIdType, location_name: "CustomKeyStoreId"))
@@ -994,6 +994,13 @@ module Aws::KMS
994
994
  o.errors << Shapes::ShapeRef.new(shape: CustomKeyStoreNotFoundException)
995
995
  o.errors << Shapes::ShapeRef.new(shape: InvalidMarkerException)
996
996
  o.errors << Shapes::ShapeRef.new(shape: KMSInternalException)
997
+ o[:pager] = Aws::Pager.new(
998
+ more_results: "truncated",
999
+ limit_key: "limit",
1000
+ tokens: {
1001
+ "next_marker" => "marker"
1002
+ }
1003
+ )
997
1004
  end)
998
1005
 
999
1006
  api.add_operation(:describe_key, Seahorse::Model::Operation.new.tap do |o|
@@ -1352,6 +1359,13 @@ module Aws::KMS
1352
1359
  o.errors << Shapes::ShapeRef.new(shape: NotFoundException)
1353
1360
  o.errors << Shapes::ShapeRef.new(shape: InvalidArnException)
1354
1361
  o.errors << Shapes::ShapeRef.new(shape: InvalidMarkerException)
1362
+ o[:pager] = Aws::Pager.new(
1363
+ more_results: "truncated",
1364
+ limit_key: "limit",
1365
+ tokens: {
1366
+ "next_marker" => "marker"
1367
+ }
1368
+ )
1355
1369
  end)
1356
1370
 
1357
1371
  api.add_operation(:list_retirable_grants, Seahorse::Model::Operation.new.tap do |o|
@@ -1365,6 +1379,13 @@ module Aws::KMS
1365
1379
  o.errors << Shapes::ShapeRef.new(shape: InvalidArnException)
1366
1380
  o.errors << Shapes::ShapeRef.new(shape: NotFoundException)
1367
1381
  o.errors << Shapes::ShapeRef.new(shape: KMSInternalException)
1382
+ o[:pager] = Aws::Pager.new(
1383
+ more_results: "truncated",
1384
+ limit_key: "limit",
1385
+ tokens: {
1386
+ "next_marker" => "marker"
1387
+ }
1388
+ )
1368
1389
  end)
1369
1390
 
1370
1391
  api.add_operation(:put_key_policy, Seahorse::Model::Operation.new.tap do |o|
@@ -338,9 +338,9 @@ module Aws::KMS
338
338
  #
339
339
  # {
340
340
  # custom_key_store_name: "CustomKeyStoreNameType", # required
341
- # cloud_hsm_cluster_id: "CloudHsmClusterIdType", # required
342
- # trust_anchor_certificate: "TrustAnchorCertificateType", # required
343
- # key_store_password: "KeyStorePasswordType", # required
341
+ # cloud_hsm_cluster_id: "CloudHsmClusterIdType",
342
+ # trust_anchor_certificate: "TrustAnchorCertificateType",
343
+ # key_store_password: "KeyStorePasswordType",
344
344
  # }
345
345
  #
346
346
  # @!attribute [rw] custom_key_store_name
@@ -627,8 +627,8 @@ module Aws::KMS
627
627
  # policy: "PolicyType",
628
628
  # description: "DescriptionType",
629
629
  # key_usage: "SIGN_VERIFY", # accepts SIGN_VERIFY, ENCRYPT_DECRYPT, GENERATE_VERIFY_MAC
630
- # customer_master_key_spec: "RSA_2048", # accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1, SYMMETRIC_DEFAULT, HMAC_224, HMAC_256, HMAC_384, HMAC_512
631
- # key_spec: "RSA_2048", # accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1, SYMMETRIC_DEFAULT, HMAC_224, HMAC_256, HMAC_384, HMAC_512
630
+ # customer_master_key_spec: "RSA_2048", # accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1, SYMMETRIC_DEFAULT, HMAC_224, HMAC_256, HMAC_384, HMAC_512, SM2
631
+ # key_spec: "RSA_2048", # accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1, SYMMETRIC_DEFAULT, HMAC_224, HMAC_256, HMAC_384, HMAC_512, SM2
632
632
  # origin: "AWS_KMS", # accepts AWS_KMS, EXTERNAL, AWS_CLOUDHSM
633
633
  # custom_key_store_id: "CustomKeyStoreIdType",
634
634
  # bypass_policy_lockout_safety_check: false,
@@ -667,31 +667,30 @@ module Aws::KMS
667
667
  # immediately visible][3] in the *Amazon Web Services Identity and
668
668
  # Access Management User Guide*.
669
669
  #
670
- # A key policy document must conform to the following rules.
670
+ # A key policy document can include only the following characters:
671
671
  #
672
- # * Up to 32 kilobytes (32768 bytes)
672
+ # * Printable ASCII characters from the space character (`\u0020`)
673
+ # through the end of the ASCII character range.
673
674
  #
674
- # * Must be UTF-8 encoded
675
+ # * Printable characters in the Basic Latin and Latin-1 Supplement
676
+ # character set (through `\u00FF`).
675
677
  #
676
- # * The only Unicode characters that are permitted in a key policy
677
- # document are the horizontal tab (U+0009), linefeed (U+000A),
678
- # carriage return (U+000D), and characters in the range U+0020 to
679
- # U+00FF.
678
+ # * The tab (`\u0009`), line feed (`\u000A`), and carriage return
679
+ # (`\u000D`) special characters
680
680
  #
681
- # * The `Sid` element in a key policy statement can include spaces.
682
- # (Spaces are prohibited in the `Sid` element of an IAM policy
683
- # document.)
684
- #
685
- # For help writing and formatting a JSON policy document, see the [IAM
686
- # JSON Policy Reference][4] in the <i> <i>Identity and Access
687
- # Management User Guide</i> </i>.
681
+ # For information about key policies, see [Key policies in KMS][4] in
682
+ # the *Key Management Service Developer Guide*. For help writing and
683
+ # formatting a JSON policy document, see the [IAM JSON Policy
684
+ # Reference][5] in the <i> <i>Identity and Access Management User
685
+ # Guide</i> </i>.
688
686
  #
689
687
  #
690
688
  #
691
689
  # [1]: https://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html#key-policy-default
692
690
  # [2]: https://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html#key-policy-default-allow-root-enable-iam
693
691
  # [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/troubleshoot_general.html#troubleshoot_general_eventual-consistency
694
- # [4]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies.html
692
+ # [4]: https://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html
693
+ # [5]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies.html
695
694
  # @return [String]
696
695
  #
697
696
  # @!attribute [rw] description
@@ -725,6 +724,9 @@ module Aws::KMS
725
724
  # * For asymmetric KMS keys with ECC key material, specify
726
725
  # `SIGN_VERIFY`.
727
726
  #
727
+ # * For asymmetric KMS keys with SM2 key material (China Regions
728
+ # only), specify `ENCRYPT_DECRYPT` or `SIGN_VERIFY`.
729
+ #
728
730
  #
729
731
  #
730
732
  # [1]: https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#cryptographic-operations
@@ -741,10 +743,12 @@ module Aws::KMS
741
743
  #
742
744
  # @!attribute [rw] key_spec
743
745
  # Specifies the type of KMS key to create. The default value,
744
- # `SYMMETRIC_DEFAULT`, creates a KMS key with a 256-bit symmetric key
745
- # for encryption and decryption. For help choosing a key spec for your
746
- # KMS key, see [Choosing a KMS key type][1] in the <i> <i>Key
747
- # Management Service Developer Guide</i> </i>.
746
+ # `SYMMETRIC_DEFAULT`, creates a KMS key with a 256-bit AES-GCM key
747
+ # that is used for encryption and decryption, except in China Regions,
748
+ # where it creates a 128-bit symmetric key that uses SM4 encryption.
749
+ # For help choosing a key spec for your KMS key, see [Choosing a KMS
750
+ # key type][1] in the <i> <i>Key Management Service Developer
751
+ # Guide</i> </i>.
748
752
  #
749
753
  # The `KeySpec` determines whether the KMS key contains a symmetric
750
754
  # key or an asymmetric key pair. It also determines the cryptographic
@@ -764,7 +768,7 @@ module Aws::KMS
764
768
  #
765
769
  # * Symmetric encryption key (default)
766
770
  #
767
- # * `SYMMETRIC_DEFAULT` (AES-256-GCM)
771
+ # * `SYMMETRIC_DEFAULT`
768
772
  #
769
773
  # ^
770
774
  #
@@ -801,6 +805,12 @@ module Aws::KMS
801
805
  #
802
806
  # ^
803
807
  #
808
+ # * SM2 key pairs (China Regions only)
809
+ #
810
+ # * `SM2`
811
+ #
812
+ # ^
813
+ #
804
814
  #
805
815
  #
806
816
  # [1]: https://docs.aws.amazon.com/kms/latest/developerguide/key-types.html#symm-asymm-choose
@@ -851,7 +861,7 @@ module Aws::KMS
851
861
  # The response includes the custom key store ID and the ID of the
852
862
  # CloudHSM cluster.
853
863
  #
854
- # This operation is part of the [Custom Key Store feature][1] feature
864
+ # This operation is part of the [custom key store feature][1] feature
855
865
  # in KMS, which combines the convenience and extensive integration of
856
866
  # KMS with the isolation and control of a single-tenant key store.
857
867
  #
@@ -1197,7 +1207,7 @@ module Aws::KMS
1197
1207
  # },
1198
1208
  # grant_tokens: ["GrantTokenType"],
1199
1209
  # key_id: "KeyIdType",
1200
- # encryption_algorithm: "SYMMETRIC_DEFAULT", # accepts SYMMETRIC_DEFAULT, RSAES_OAEP_SHA_1, RSAES_OAEP_SHA_256
1210
+ # encryption_algorithm: "SYMMETRIC_DEFAULT", # accepts SYMMETRIC_DEFAULT, RSAES_OAEP_SHA_1, RSAES_OAEP_SHA_256, SM2PKE
1201
1211
  # }
1202
1212
  #
1203
1213
  # @!attribute [rw] ciphertext_blob
@@ -1769,7 +1779,7 @@ module Aws::KMS
1769
1779
  # "EncryptionContextKey" => "EncryptionContextValue",
1770
1780
  # },
1771
1781
  # grant_tokens: ["GrantTokenType"],
1772
- # encryption_algorithm: "SYMMETRIC_DEFAULT", # accepts SYMMETRIC_DEFAULT, RSAES_OAEP_SHA_1, RSAES_OAEP_SHA_256
1782
+ # encryption_algorithm: "SYMMETRIC_DEFAULT", # accepts SYMMETRIC_DEFAULT, RSAES_OAEP_SHA_1, RSAES_OAEP_SHA_256, SM2PKE
1773
1783
  # }
1774
1784
  #
1775
1785
  # @!attribute [rw] key_id
@@ -1916,7 +1926,7 @@ module Aws::KMS
1916
1926
  # "EncryptionContextKey" => "EncryptionContextValue",
1917
1927
  # },
1918
1928
  # key_id: "KeyIdType", # required
1919
- # key_pair_spec: "RSA_2048", # required, accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1
1929
+ # key_pair_spec: "RSA_2048", # required, accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1, SM2
1920
1930
  # grant_tokens: ["GrantTokenType"],
1921
1931
  # }
1922
1932
  #
@@ -1970,10 +1980,12 @@ module Aws::KMS
1970
1980
  # @!attribute [rw] key_pair_spec
1971
1981
  # Determines the type of data key pair that is generated.
1972
1982
  #
1973
- # The KMS rule that restricts the use of asymmetric RSA KMS keys to
1974
- # encrypt and decrypt or to sign and verify (but not both), and the
1975
- # rule that permits you to use ECC KMS keys only to sign and verify,
1976
- # are not effective on data key pairs, which are used outside of KMS.
1983
+ # The KMS rule that restricts the use of asymmetric RSA and SM2 KMS
1984
+ # keys to encrypt and decrypt or to sign and verify (but not both),
1985
+ # and the rule that permits you to use ECC KMS keys only to sign and
1986
+ # verify, are not effective on data key pairs, which are used outside
1987
+ # of KMS. The SM2 key spec is only available in China Regions. RSA and
1988
+ # ECC asymmetric key pairs are also available in China Regions.
1977
1989
  # @return [String]
1978
1990
  #
1979
1991
  # @!attribute [rw] grant_tokens
@@ -2052,7 +2064,7 @@ module Aws::KMS
2052
2064
  # "EncryptionContextKey" => "EncryptionContextValue",
2053
2065
  # },
2054
2066
  # key_id: "KeyIdType", # required
2055
- # key_pair_spec: "RSA_2048", # required, accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1
2067
+ # key_pair_spec: "RSA_2048", # required, accepts RSA_2048, RSA_3072, RSA_4096, ECC_NIST_P256, ECC_NIST_P384, ECC_NIST_P521, ECC_SECG_P256K1, SM2
2056
2068
  # grant_tokens: ["GrantTokenType"],
2057
2069
  # }
2058
2070
  #
@@ -2106,10 +2118,12 @@ module Aws::KMS
2106
2118
  # @!attribute [rw] key_pair_spec
2107
2119
  # Determines the type of data key pair that is generated.
2108
2120
  #
2109
- # The KMS rule that restricts the use of asymmetric RSA KMS keys to
2110
- # encrypt and decrypt or to sign and verify (but not both), and the
2111
- # rule that permits you to use ECC KMS keys only to sign and verify,
2112
- # are not effective on data key pairs, which are used outside of KMS.
2121
+ # The KMS rule that restricts the use of asymmetric RSA and SM2 KMS
2122
+ # keys to encrypt and decrypt or to sign and verify (but not both),
2123
+ # and the rule that permits you to use ECC KMS keys only to sign and
2124
+ # verify, are not effective on data key pairs, which are used outside
2125
+ # of KMS. The SM2 key spec is only available in China Regions. RSA and
2126
+ # ECC asymmetric key pairs are also available in China Regions.
2113
2127
  # @return [String]
2114
2128
  #
2115
2129
  # @!attribute [rw] grant_tokens
@@ -2528,7 +2542,7 @@ module Aws::KMS
2528
2542
  # }
2529
2543
  #
2530
2544
  # @!attribute [rw] number_of_bytes
2531
- # The length of the byte string.
2545
+ # The length of the random byte string. This parameter is required.
2532
2546
  # @return [Integer]
2533
2547
  #
2534
2548
  # @!attribute [rw] custom_key_store_id
@@ -4241,25 +4255,29 @@ module Aws::KMS
4241
4255
  # immediately visible][2] in the *Amazon Web Services Identity and
4242
4256
  # Access Management User Guide*.
4243
4257
  #
4244
- # A key policy document must conform to the following rules.
4258
+ # A key policy document can include only the following characters:
4245
4259
  #
4246
- # * Up to 32 kilobytes (32768 bytes)
4260
+ # * Printable ASCII characters from the space character (`\u0020`)
4261
+ # through the end of the ASCII character range.
4247
4262
  #
4248
- # * Must be UTF-8 encoded
4263
+ # * Printable characters in the Basic Latin and Latin-1 Supplement
4264
+ # character set (through `\u00FF`).
4249
4265
  #
4250
- # * The only Unicode characters that are permitted in a key policy
4251
- # document are the horizontal tab (U+0009), linefeed (U+000A),
4252
- # carriage return (U+000D), and characters in the range U+0020 to
4253
- # U+00FF.
4266
+ # * The tab (`\u0009`), line feed (`\u000A`), and carriage return
4267
+ # (`\u000D`) special characters
4254
4268
  #
4255
- # * The `Sid` element in a key policy statement can include spaces.
4256
- # (Spaces are prohibited in the `Sid` element of an IAM policy
4257
- # document.)
4269
+ # For information about key policies, see [Key policies in KMS][3] in
4270
+ # the *Key Management Service Developer Guide*. For help writing and
4271
+ # formatting a JSON policy document, see the [IAM JSON Policy
4272
+ # Reference][4] in the <i> <i>Identity and Access Management User
4273
+ # Guide</i> </i>.
4258
4274
  #
4259
4275
  #
4260
4276
  #
4261
4277
  # [1]: https://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html#key-policy-default-allow-root-enable-iam
4262
4278
  # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/troubleshoot_general.html#troubleshoot_general_eventual-consistency
4279
+ # [3]: https://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html
4280
+ # [4]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies.html
4263
4281
  # @return [String]
4264
4282
  #
4265
4283
  # @!attribute [rw] bypass_policy_lockout_safety_check
@@ -4308,8 +4326,8 @@ module Aws::KMS
4308
4326
  # destination_encryption_context: {
4309
4327
  # "EncryptionContextKey" => "EncryptionContextValue",
4310
4328
  # },
4311
- # source_encryption_algorithm: "SYMMETRIC_DEFAULT", # accepts SYMMETRIC_DEFAULT, RSAES_OAEP_SHA_1, RSAES_OAEP_SHA_256
4312
- # destination_encryption_algorithm: "SYMMETRIC_DEFAULT", # accepts SYMMETRIC_DEFAULT, RSAES_OAEP_SHA_1, RSAES_OAEP_SHA_256
4329
+ # source_encryption_algorithm: "SYMMETRIC_DEFAULT", # accepts SYMMETRIC_DEFAULT, RSAES_OAEP_SHA_1, RSAES_OAEP_SHA_256, SM2PKE
4330
+ # destination_encryption_algorithm: "SYMMETRIC_DEFAULT", # accepts SYMMETRIC_DEFAULT, RSAES_OAEP_SHA_1, RSAES_OAEP_SHA_256, SM2PKE
4313
4331
  # grant_tokens: ["GrantTokenType"],
4314
4332
  # }
4315
4333
  #
@@ -4621,26 +4639,30 @@ module Aws::KMS
4621
4639
  # immediately visible][3] in the <i> <i>Identity and Access
4622
4640
  # Management User Guide</i> </i>.
4623
4641
  #
4624
- # A key policy document must conform to the following rules.
4642
+ # A key policy document can include only the following characters:
4625
4643
  #
4626
- # * Up to 32 kilobytes (32768 bytes)
4644
+ # * Printable ASCII characters from the space character (`\u0020`)
4645
+ # through the end of the ASCII character range.
4627
4646
  #
4628
- # * Must be UTF-8 encoded
4647
+ # * Printable characters in the Basic Latin and Latin-1 Supplement
4648
+ # character set (through `\u00FF`).
4629
4649
  #
4630
- # * The only Unicode characters that are permitted in a key policy
4631
- # document are the horizontal tab (U+0009), linefeed (U+000A),
4632
- # carriage return (U+000D), and characters in the range U+0020 to
4633
- # U+00FF.
4650
+ # * The tab (`\u0009`), line feed (`\u000A`), and carriage return
4651
+ # (`\u000D`) special characters
4634
4652
  #
4635
- # * The `Sid` element in a key policy statement can include spaces.
4636
- # (Spaces are prohibited in the `Sid` element of an IAM policy
4637
- # document.)
4653
+ # For information about key policies, see [Key policies in KMS][4] in
4654
+ # the *Key Management Service Developer Guide*. For help writing and
4655
+ # formatting a JSON policy document, see the [IAM JSON Policy
4656
+ # Reference][5] in the <i> <i>Identity and Access Management User
4657
+ # Guide</i> </i>.
4638
4658
  #
4639
4659
  #
4640
4660
  #
4641
4661
  # [1]: https://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html#key-policy-default
4642
4662
  # [2]: https://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html#key-policy-default-allow-root-enable-iam
4643
4663
  # [3]: https://docs.aws.amazon.com/IAM/latest/UserGuide/troubleshoot_general.html#troubleshoot_general_eventual-consistency
4664
+ # [4]: https://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html
4665
+ # [5]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies.html
4644
4666
  # @return [String]
4645
4667
  #
4646
4668
  # @!attribute [rw] bypass_policy_lockout_safety_check
@@ -4951,7 +4973,7 @@ module Aws::KMS
4951
4973
  # message: "data", # required
4952
4974
  # message_type: "RAW", # accepts RAW, DIGEST
4953
4975
  # grant_tokens: ["GrantTokenType"],
4954
- # signing_algorithm: "RSASSA_PSS_SHA_256", # required, accepts RSASSA_PSS_SHA_256, RSASSA_PSS_SHA_384, RSASSA_PSS_SHA_512, RSASSA_PKCS1_V1_5_SHA_256, RSASSA_PKCS1_V1_5_SHA_384, RSASSA_PKCS1_V1_5_SHA_512, ECDSA_SHA_256, ECDSA_SHA_384, ECDSA_SHA_512
4976
+ # signing_algorithm: "RSASSA_PSS_SHA_256", # required, accepts RSASSA_PSS_SHA_256, RSASSA_PSS_SHA_384, RSASSA_PSS_SHA_512, RSASSA_PKCS1_V1_5_SHA_256, RSASSA_PKCS1_V1_5_SHA_384, RSASSA_PKCS1_V1_5_SHA_512, ECDSA_SHA_256, ECDSA_SHA_384, ECDSA_SHA_512, SM2DSA
4955
4977
  # }
4956
4978
  #
4957
4979
  # @!attribute [rw] key_id
@@ -5232,8 +5254,8 @@ module Aws::KMS
5232
5254
  # @!attribute [rw] alias_name
5233
5255
  # Identifies the alias that is changing its KMS key. This value must
5234
5256
  # begin with `alias/` followed by the alias name, such as
5235
- # `alias/ExampleAlias`. You cannot use UpdateAlias to change the alias
5236
- # name.
5257
+ # `alias/ExampleAlias`. You cannot use `UpdateAlias` to change the
5258
+ # alias name.
5237
5259
  # @return [String]
5238
5260
  #
5239
5261
  # @!attribute [rw] target_key_id
@@ -5522,7 +5544,7 @@ module Aws::KMS
5522
5544
  # message: "data", # required
5523
5545
  # message_type: "RAW", # accepts RAW, DIGEST
5524
5546
  # signature: "data", # required
5525
- # signing_algorithm: "RSASSA_PSS_SHA_256", # required, accepts RSASSA_PSS_SHA_256, RSASSA_PSS_SHA_384, RSASSA_PSS_SHA_512, RSASSA_PKCS1_V1_5_SHA_256, RSASSA_PKCS1_V1_5_SHA_384, RSASSA_PKCS1_V1_5_SHA_512, ECDSA_SHA_256, ECDSA_SHA_384, ECDSA_SHA_512
5547
+ # signing_algorithm: "RSASSA_PSS_SHA_256", # required, accepts RSASSA_PSS_SHA_256, RSASSA_PSS_SHA_384, RSASSA_PSS_SHA_512, RSASSA_PKCS1_V1_5_SHA_256, RSASSA_PKCS1_V1_5_SHA_384, RSASSA_PKCS1_V1_5_SHA_512, ECDSA_SHA_256, ECDSA_SHA_384, ECDSA_SHA_512, SM2DSA
5526
5548
  # grant_tokens: ["GrantTokenType"],
5527
5549
  # }
5528
5550
  #
data/lib/aws-sdk-kms.rb CHANGED
@@ -48,6 +48,6 @@ require_relative 'aws-sdk-kms/customizations'
48
48
  # @!group service
49
49
  module Aws::KMS
50
50
 
51
- GEM_VERSION = '1.57.0'
51
+ GEM_VERSION = '1.58.0'
52
52
 
53
53
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-kms
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.57.0
4
+ version: 1.58.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2022-05-17 00:00:00.000000000 Z
11
+ date: 2022-07-18 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core