aws-sdk-kms 1.81.0 → 1.82.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/CHANGELOG.md +5 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-kms/client.rb +27 -14
- data/lib/aws-sdk-kms/client_api.rb +1 -0
- data/lib/aws-sdk-kms/types.rb +22 -9
- data/lib/aws-sdk-kms.rb +1 -1
- data/sig/client.rbs +2 -2
- data/sig/types.rbs +2 -2
- metadata +2 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: e76f6e3fb0e6db3c06af73e578a928e2c1cdacb6926ba1f1a26b1d8dcb02afd2
|
4
|
+
data.tar.gz: 58c29914d4b70a3cfbeaba2a076e831bcff93088cb61f1006327b2e42ee5c75f
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 40ab0a33992f7dd3331a684fd36d061bd6dc93d34ff46cfcb62012aa960371eb80105534f63bfc502e6e2a0ecd9731234ce946f3794fc6c1a143e1aa3a1d3582
|
7
|
+
data.tar.gz: 01b0c75d8f6b516cfe64102cfc6d1801f43e33c99e44882ea26592f4f10a6d75fcd58619640b7e9e43990afb9a90de87b206fa8823069500fcb0d9edd9372eae
|
data/CHANGELOG.md
CHANGED
@@ -1,6 +1,11 @@
|
|
1
1
|
Unreleased Changes
|
2
2
|
------------------
|
3
3
|
|
4
|
+
1.82.0 (2024-05-22)
|
5
|
+
------------------
|
6
|
+
|
7
|
+
* Feature - This release includes feature to import customer's asymmetric (RSA, ECC and SM2) and HMAC keys into KMS in China.
|
8
|
+
|
4
9
|
1.81.0 (2024-05-13)
|
5
10
|
------------------
|
6
11
|
|
data/VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
1.
|
1
|
+
1.82.0
|
data/lib/aws-sdk-kms/client.rb
CHANGED
@@ -5872,8 +5872,8 @@ module Aws::KMS
|
|
5872
5872
|
# `GetParametersForImport` returns the items that you need to import
|
5873
5873
|
# your key material.
|
5874
5874
|
#
|
5875
|
-
# * The public key (or "wrapping key") of an
|
5876
|
-
# generates.
|
5875
|
+
# * The public key (or "wrapping key") of an asymmetric key pair that
|
5876
|
+
# KMS generates.
|
5877
5877
|
#
|
5878
5878
|
# You will use this public key to encrypt ("wrap") your key material
|
5879
5879
|
# while it's in transit to KMS.
|
@@ -5951,20 +5951,28 @@ module Aws::KMS
|
|
5951
5951
|
# DescribeKey.
|
5952
5952
|
#
|
5953
5953
|
# @option params [required, String] :wrapping_algorithm
|
5954
|
-
# The algorithm you will use with the
|
5955
|
-
# the response to protect your key material during
|
5956
|
-
# information, see [Select a wrapping
|
5954
|
+
# The algorithm you will use with the asymmetric public key
|
5955
|
+
# (`PublicKey`) in the response to protect your key material during
|
5956
|
+
# import. For more information, see [Select a wrapping
|
5957
5957
|
# algorithm](kms/latest/developerguide/importing-keys-get-public-key-and-token.html#select-wrapping-algorithm)
|
5958
5958
|
# in the *Key Management Service Developer Guide*.
|
5959
5959
|
#
|
5960
5960
|
# For RSA\_AES wrapping algorithms, you encrypt your key material with
|
5961
5961
|
# an AES key that you generate, then encrypt your AES key with the RSA
|
5962
5962
|
# public key from KMS. For RSAES wrapping algorithms, you encrypt your
|
5963
|
-
# key material directly with the RSA public key from KMS.
|
5963
|
+
# key material directly with the RSA public key from KMS. For SM2PKE
|
5964
|
+
# wrapping algorithms, you encrypt your key material directly with the
|
5965
|
+
# SM2 public key from KMS.
|
5964
5966
|
#
|
5965
5967
|
# The wrapping algorithms that you can use depend on the type of key
|
5966
5968
|
# material that you are importing. To import an RSA private key, you
|
5967
|
-
# must use an RSA\_AES wrapping algorithm
|
5969
|
+
# must use an RSA\_AES wrapping algorithm, except in China Regions,
|
5970
|
+
# where you must use the SM2PKE wrapping algorithm to import an RSA
|
5971
|
+
# private key.
|
5972
|
+
#
|
5973
|
+
# The SM2PKE wrapping algorithm is available only in China Regions. The
|
5974
|
+
# `RSA_AES_KEY_WRAP_SHA_256` and `RSA_AES_KEY_WRAP_SHA_1` wrapping
|
5975
|
+
# algorithms are not supported in China Regions.
|
5968
5976
|
#
|
5969
5977
|
# * **RSA\_AES\_KEY\_WRAP\_SHA\_256** — Supported for wrapping RSA and
|
5970
5978
|
# ECC key material.
|
@@ -5987,17 +5995,22 @@ module Aws::KMS
|
|
5987
5995
|
# * **RSAES\_PKCS1\_V1\_5** (Deprecated) — As of October 10, 2023, KMS
|
5988
5996
|
# does not support the RSAES\_PKCS1\_V1\_5 wrapping algorithm.
|
5989
5997
|
#
|
5998
|
+
# * **SM2PKE** (China Regions only) — supported for wrapping RSA, ECC,
|
5999
|
+
# and SM2 key material.
|
6000
|
+
#
|
5990
6001
|
# @option params [required, String] :wrapping_key_spec
|
5991
|
-
# The type of
|
5992
|
-
#
|
5993
|
-
#
|
6002
|
+
# The type of public key to return in the response. You will use this
|
6003
|
+
# wrapping key with the specified wrapping algorithm to protect your key
|
6004
|
+
# material during import.
|
5994
6005
|
#
|
5995
|
-
# Use the longest
|
6006
|
+
# Use the longest wrapping key that is practical.
|
5996
6007
|
#
|
5997
6008
|
# You cannot use an RSA\_2048 public key to directly wrap an
|
5998
6009
|
# ECC\_NIST\_P521 private key. Instead, use an RSA\_AES wrapping
|
5999
6010
|
# algorithm or choose a longer RSA public key.
|
6000
6011
|
#
|
6012
|
+
# The SM2 wrapping key spec is available only in China Regions.
|
6013
|
+
#
|
6001
6014
|
# @return [Types::GetParametersForImportResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
6002
6015
|
#
|
6003
6016
|
# * {Types::GetParametersForImportResponse#key_id #key_id} => String
|
@@ -6088,8 +6101,8 @@ module Aws::KMS
|
|
6088
6101
|
#
|
6089
6102
|
# resp = client.get_parameters_for_import({
|
6090
6103
|
# key_id: "KeyIdType", # required
|
6091
|
-
# wrapping_algorithm: "RSAES_PKCS1_V1_5", # required, accepts RSAES_PKCS1_V1_5, RSAES_OAEP_SHA_1, RSAES_OAEP_SHA_256, RSA_AES_KEY_WRAP_SHA_1, RSA_AES_KEY_WRAP_SHA_256
|
6092
|
-
# wrapping_key_spec: "RSA_2048", # required, accepts RSA_2048, RSA_3072, RSA_4096
|
6104
|
+
# wrapping_algorithm: "RSAES_PKCS1_V1_5", # required, accepts RSAES_PKCS1_V1_5, RSAES_OAEP_SHA_1, RSAES_OAEP_SHA_256, RSA_AES_KEY_WRAP_SHA_1, RSA_AES_KEY_WRAP_SHA_256, SM2PKE
|
6105
|
+
# wrapping_key_spec: "RSA_2048", # required, accepts RSA_2048, RSA_3072, RSA_4096, SM2
|
6093
6106
|
# })
|
6094
6107
|
#
|
6095
6108
|
# @example Response structure
|
@@ -10458,7 +10471,7 @@ module Aws::KMS
|
|
10458
10471
|
params: params,
|
10459
10472
|
config: config)
|
10460
10473
|
context[:gem_name] = 'aws-sdk-kms'
|
10461
|
-
context[:gem_version] = '1.
|
10474
|
+
context[:gem_version] = '1.82.0'
|
10462
10475
|
Seahorse::Client::Request.new(handlers, context)
|
10463
10476
|
end
|
10464
10477
|
|
data/lib/aws-sdk-kms/types.rb
CHANGED
@@ -3208,20 +3208,28 @@ module Aws::KMS
|
|
3208
3208
|
# @return [String]
|
3209
3209
|
#
|
3210
3210
|
# @!attribute [rw] wrapping_algorithm
|
3211
|
-
# The algorithm you will use with the
|
3212
|
-
# the response to protect your key material during
|
3213
|
-
# information, see [Select a wrapping
|
3211
|
+
# The algorithm you will use with the asymmetric public key
|
3212
|
+
# (`PublicKey`) in the response to protect your key material during
|
3213
|
+
# import. For more information, see [Select a wrapping
|
3214
3214
|
# algorithm](kms/latest/developerguide/importing-keys-get-public-key-and-token.html#select-wrapping-algorithm)
|
3215
3215
|
# in the *Key Management Service Developer Guide*.
|
3216
3216
|
#
|
3217
3217
|
# For RSA\_AES wrapping algorithms, you encrypt your key material with
|
3218
3218
|
# an AES key that you generate, then encrypt your AES key with the RSA
|
3219
3219
|
# public key from KMS. For RSAES wrapping algorithms, you encrypt your
|
3220
|
-
# key material directly with the RSA public key from KMS.
|
3220
|
+
# key material directly with the RSA public key from KMS. For SM2PKE
|
3221
|
+
# wrapping algorithms, you encrypt your key material directly with the
|
3222
|
+
# SM2 public key from KMS.
|
3221
3223
|
#
|
3222
3224
|
# The wrapping algorithms that you can use depend on the type of key
|
3223
3225
|
# material that you are importing. To import an RSA private key, you
|
3224
|
-
# must use an RSA\_AES wrapping algorithm
|
3226
|
+
# must use an RSA\_AES wrapping algorithm, except in China Regions,
|
3227
|
+
# where you must use the SM2PKE wrapping algorithm to import an RSA
|
3228
|
+
# private key.
|
3229
|
+
#
|
3230
|
+
# The SM2PKE wrapping algorithm is available only in China Regions.
|
3231
|
+
# The `RSA_AES_KEY_WRAP_SHA_256` and `RSA_AES_KEY_WRAP_SHA_1` wrapping
|
3232
|
+
# algorithms are not supported in China Regions.
|
3225
3233
|
#
|
3226
3234
|
# * **RSA\_AES\_KEY\_WRAP\_SHA\_256** — Supported for wrapping RSA and
|
3227
3235
|
# ECC key material.
|
@@ -3244,18 +3252,23 @@ module Aws::KMS
|
|
3244
3252
|
#
|
3245
3253
|
# * **RSAES\_PKCS1\_V1\_5** (Deprecated) — As of October 10, 2023, KMS
|
3246
3254
|
# does not support the RSAES\_PKCS1\_V1\_5 wrapping algorithm.
|
3255
|
+
#
|
3256
|
+
# * **SM2PKE** (China Regions only) — supported for wrapping RSA, ECC,
|
3257
|
+
# and SM2 key material.
|
3247
3258
|
# @return [String]
|
3248
3259
|
#
|
3249
3260
|
# @!attribute [rw] wrapping_key_spec
|
3250
|
-
# The type of
|
3251
|
-
#
|
3252
|
-
#
|
3261
|
+
# The type of public key to return in the response. You will use this
|
3262
|
+
# wrapping key with the specified wrapping algorithm to protect your
|
3263
|
+
# key material during import.
|
3253
3264
|
#
|
3254
|
-
# Use the longest
|
3265
|
+
# Use the longest wrapping key that is practical.
|
3255
3266
|
#
|
3256
3267
|
# You cannot use an RSA\_2048 public key to directly wrap an
|
3257
3268
|
# ECC\_NIST\_P521 private key. Instead, use an RSA\_AES wrapping
|
3258
3269
|
# algorithm or choose a longer RSA public key.
|
3270
|
+
#
|
3271
|
+
# The SM2 wrapping key spec is available only in China Regions.
|
3259
3272
|
# @return [String]
|
3260
3273
|
#
|
3261
3274
|
# @see http://docs.aws.amazon.com/goto/WebAPI/kms-2014-11-01/GetParametersForImportRequest AWS API Documentation
|
data/lib/aws-sdk-kms.rb
CHANGED
data/sig/client.rbs
CHANGED
@@ -433,8 +433,8 @@ module Aws
|
|
433
433
|
# https://docs.aws.amazon.com/sdk-for-ruby/v3/api/Aws/KMS/Client.html#get_parameters_for_import-instance_method
|
434
434
|
def get_parameters_for_import: (
|
435
435
|
key_id: ::String,
|
436
|
-
wrapping_algorithm: ("RSAES_PKCS1_V1_5" | "RSAES_OAEP_SHA_1" | "RSAES_OAEP_SHA_256" | "RSA_AES_KEY_WRAP_SHA_1" | "RSA_AES_KEY_WRAP_SHA_256"),
|
437
|
-
wrapping_key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096")
|
436
|
+
wrapping_algorithm: ("RSAES_PKCS1_V1_5" | "RSAES_OAEP_SHA_1" | "RSAES_OAEP_SHA_256" | "RSA_AES_KEY_WRAP_SHA_1" | "RSA_AES_KEY_WRAP_SHA_256" | "SM2PKE"),
|
437
|
+
wrapping_key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "SM2")
|
438
438
|
) -> _GetParametersForImportResponseSuccess
|
439
439
|
| (Hash[Symbol, untyped] params, ?Hash[Symbol, untyped] options) -> _GetParametersForImportResponseSuccess
|
440
440
|
|
data/sig/types.rbs
CHANGED
@@ -424,8 +424,8 @@ module Aws::KMS
|
|
424
424
|
|
425
425
|
class GetParametersForImportRequest
|
426
426
|
attr_accessor key_id: ::String
|
427
|
-
attr_accessor wrapping_algorithm: ("RSAES_PKCS1_V1_5" | "RSAES_OAEP_SHA_1" | "RSAES_OAEP_SHA_256" | "RSA_AES_KEY_WRAP_SHA_1" | "RSA_AES_KEY_WRAP_SHA_256")
|
428
|
-
attr_accessor wrapping_key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096")
|
427
|
+
attr_accessor wrapping_algorithm: ("RSAES_PKCS1_V1_5" | "RSAES_OAEP_SHA_1" | "RSAES_OAEP_SHA_256" | "RSA_AES_KEY_WRAP_SHA_1" | "RSA_AES_KEY_WRAP_SHA_256" | "SM2PKE")
|
428
|
+
attr_accessor wrapping_key_spec: ("RSA_2048" | "RSA_3072" | "RSA_4096" | "SM2")
|
429
429
|
SENSITIVE: []
|
430
430
|
end
|
431
431
|
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: aws-sdk-kms
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 1.
|
4
|
+
version: 1.82.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Amazon Web Services
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2024-05-
|
11
|
+
date: 2024-05-22 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: aws-sdk-core
|