aws-sdk-kms 1.3.0 → 1.4.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/lib/aws-sdk-kms.rb +1 -1
- data/lib/aws-sdk-kms/client.rb +35 -34
- data/lib/aws-sdk-kms/types.rb +42 -41
- metadata +2 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA1:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 895eb50d5f2eb95892a3f4a91deaac264d30cf3d
|
4
|
+
data.tar.gz: b4e6d8058e2cbb69f6065fb5701c26f154e9c50d
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 4ada9c81d8850c2a1a2d6eed00e3398a6e6a736ba482808d3f26928b73b8b8c433c90ad0d735f349156d2f409619005ce39cb1665087051ddb700b29a4905f80
|
7
|
+
data.tar.gz: 315ff31679a785d1c94c951e0e93f1e3a5b311c59c376be1d3ea5c9a59f2b5512991478d08e1057bb66553dc2c71757c6865eb97238c110444239a16e803fcf9
|
data/lib/aws-sdk-kms.rb
CHANGED
data/lib/aws-sdk-kms/client.rb
CHANGED
@@ -476,29 +476,29 @@ module Aws::KMS
|
|
476
476
|
# @option params [String] :policy
|
477
477
|
# The key policy to attach to the CMK.
|
478
478
|
#
|
479
|
-
# If you
|
480
|
-
# `BypassPolicyLockoutSafetyCheck` to true, the policy must meet the
|
481
|
-
# following criteria:
|
479
|
+
# If you provide a key policy, it must meet the following criteria:
|
482
480
|
#
|
483
|
-
# *
|
484
|
-
#
|
485
|
-
#
|
481
|
+
# * If you don't set `BypassPolicyLockoutSafetyCheck` to true, the key
|
482
|
+
# policy must allow the principal that is making the `CreateKey`
|
483
|
+
# request to make a subsequent PutKeyPolicy request on the CMK. This
|
484
|
+
# reduces the risk that the CMK becomes unmanageable. For more
|
486
485
|
# information, refer to the scenario in the [Default Key Policy][1]
|
487
|
-
# section
|
486
|
+
# section of the *AWS Key Management Service Developer Guide*.
|
488
487
|
#
|
489
|
-
# *
|
490
|
-
#
|
488
|
+
# * Each statement in the key policy must contain one or more
|
489
|
+
# principals. The principals in the key policy must exist and be
|
490
|
+
# visible to AWS KMS. When you create a new AWS principal (for
|
491
491
|
# example, an IAM user or role), you might need to enforce a delay
|
492
|
-
# before
|
493
|
-
# principal might not immediately
|
492
|
+
# before including the new principal in a key policy because the new
|
493
|
+
# principal might not be immediately visible to AWS KMS. For more
|
494
494
|
# information, see [Changes that I make are not always immediately
|
495
|
-
# visible][2] in the *
|
495
|
+
# visible][2] in the *AWS Identity and Access Management User Guide*.
|
496
496
|
#
|
497
|
-
# If you do not
|
498
|
-
# to the CMK. For more information, see [Default Key Policy][3]
|
499
|
-
# *AWS Key Management Service Developer Guide*.
|
497
|
+
# If you do not provide a key policy, AWS KMS attaches a default key
|
498
|
+
# policy to the CMK. For more information, see [Default Key Policy][3]
|
499
|
+
# in the *AWS Key Management Service Developer Guide*.
|
500
500
|
#
|
501
|
-
# The policy size limit is 32 kilobytes (32768 bytes).
|
501
|
+
# The key policy size limit is 32 kilobytes (32768 bytes).
|
502
502
|
#
|
503
503
|
#
|
504
504
|
#
|
@@ -537,8 +537,8 @@ module Aws::KMS
|
|
537
537
|
# A flag to indicate whether to bypass the key policy lockout safety
|
538
538
|
# check.
|
539
539
|
#
|
540
|
-
# Setting this value to true increases the
|
541
|
-
#
|
540
|
+
# Setting this value to true increases the risk that the CMK becomes
|
541
|
+
# unmanageable. Do not set this value to true indiscriminately.
|
542
542
|
#
|
543
543
|
# For more information, refer to the scenario in the [Default Key
|
544
544
|
# Policy][1] section in the *AWS Key Management Service Developer
|
@@ -1576,8 +1576,8 @@ module Aws::KMS
|
|
1576
1576
|
# To get the key ID and key ARN for a CMK, use ListKeys or DescribeKey.
|
1577
1577
|
#
|
1578
1578
|
# @option params [required, String] :policy_name
|
1579
|
-
# Specifies the name of the policy. The only valid name is
|
1580
|
-
# get the names of key policies, use ListKeyPolicies.
|
1579
|
+
# Specifies the name of the key policy. The only valid name is
|
1580
|
+
# `default`. To get the names of key policies, use ListKeyPolicies.
|
1581
1581
|
#
|
1582
1582
|
# @return [Types::GetKeyPolicyResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
1583
1583
|
#
|
@@ -2552,24 +2552,25 @@ module Aws::KMS
|
|
2552
2552
|
# @option params [required, String] :policy
|
2553
2553
|
# The key policy to attach to the CMK.
|
2554
2554
|
#
|
2555
|
-
#
|
2556
|
-
# must meet the following criteria:
|
2555
|
+
# The key policy must meet the following criteria:
|
2557
2556
|
#
|
2558
|
-
# *
|
2557
|
+
# * If you don't set `BypassPolicyLockoutSafetyCheck` to true, the key
|
2558
|
+
# policy must allow the principal that is making the `PutKeyPolicy`
|
2559
2559
|
# request to make a subsequent `PutKeyPolicy` request on the CMK. This
|
2560
|
-
# reduces the
|
2560
|
+
# reduces the risk that the CMK becomes unmanageable. For more
|
2561
2561
|
# information, refer to the scenario in the [Default Key Policy][1]
|
2562
|
-
# section
|
2562
|
+
# section of the *AWS Key Management Service Developer Guide*.
|
2563
2563
|
#
|
2564
|
-
# *
|
2565
|
-
#
|
2564
|
+
# * Each statement in the key policy must contain one or more
|
2565
|
+
# principals. The principals in the key policy must exist and be
|
2566
|
+
# visible to AWS KMS. When you create a new AWS principal (for
|
2566
2567
|
# example, an IAM user or role), you might need to enforce a delay
|
2567
|
-
# before
|
2568
|
-
# principal might not immediately
|
2568
|
+
# before including the new principal in a key policy because the new
|
2569
|
+
# principal might not be immediately visible to AWS KMS. For more
|
2569
2570
|
# information, see [Changes that I make are not always immediately
|
2570
|
-
# visible][2] in the *
|
2571
|
+
# visible][2] in the *AWS Identity and Access Management User Guide*.
|
2571
2572
|
#
|
2572
|
-
# The policy size limit is 32 kilobytes (32768 bytes).
|
2573
|
+
# The key policy size limit is 32 kilobytes (32768 bytes).
|
2573
2574
|
#
|
2574
2575
|
#
|
2575
2576
|
#
|
@@ -2580,8 +2581,8 @@ module Aws::KMS
|
|
2580
2581
|
# A flag to indicate whether to bypass the key policy lockout safety
|
2581
2582
|
# check.
|
2582
2583
|
#
|
2583
|
-
# Setting this value to true increases the
|
2584
|
-
#
|
2584
|
+
# Setting this value to true increases the risk that the CMK becomes
|
2585
|
+
# unmanageable. Do not set this value to true indiscriminately.
|
2585
2586
|
#
|
2586
2587
|
# For more information, refer to the scenario in the [Default Key
|
2587
2588
|
# Policy][1] section in the *AWS Key Management Service Developer
|
@@ -3218,7 +3219,7 @@ module Aws::KMS
|
|
3218
3219
|
params: params,
|
3219
3220
|
config: config)
|
3220
3221
|
context[:gem_name] = 'aws-sdk-kms'
|
3221
|
-
context[:gem_version] = '1.
|
3222
|
+
context[:gem_version] = '1.4.0'
|
3222
3223
|
Seahorse::Client::Request.new(handlers, context)
|
3223
3224
|
end
|
3224
3225
|
|
data/lib/aws-sdk-kms/types.rb
CHANGED
@@ -287,29 +287,30 @@ module Aws::KMS
|
|
287
287
|
# @!attribute [rw] policy
|
288
288
|
# The key policy to attach to the CMK.
|
289
289
|
#
|
290
|
-
# If you
|
291
|
-
# `BypassPolicyLockoutSafetyCheck` to true, the policy must meet the
|
292
|
-
# following criteria:
|
290
|
+
# If you provide a key policy, it must meet the following criteria:
|
293
291
|
#
|
294
|
-
# *
|
295
|
-
#
|
296
|
-
#
|
292
|
+
# * If you don't set `BypassPolicyLockoutSafetyCheck` to true, the
|
293
|
+
# key policy must allow the principal that is making the `CreateKey`
|
294
|
+
# request to make a subsequent PutKeyPolicy request on the CMK. This
|
295
|
+
# reduces the risk that the CMK becomes unmanageable. For more
|
297
296
|
# information, refer to the scenario in the [Default Key Policy][1]
|
298
|
-
# section
|
297
|
+
# section of the *AWS Key Management Service Developer Guide*.
|
299
298
|
#
|
300
|
-
# *
|
301
|
-
#
|
299
|
+
# * Each statement in the key policy must contain one or more
|
300
|
+
# principals. The principals in the key policy must exist and be
|
301
|
+
# visible to AWS KMS. When you create a new AWS principal (for
|
302
302
|
# example, an IAM user or role), you might need to enforce a delay
|
303
|
-
# before
|
304
|
-
#
|
305
|
-
#
|
306
|
-
#
|
303
|
+
# before including the new principal in a key policy because the new
|
304
|
+
# principal might not be immediately visible to AWS KMS. For more
|
305
|
+
# information, see [Changes that I make are not always immediately
|
306
|
+
# visible][2] in the *AWS Identity and Access Management User
|
307
|
+
# Guide*.
|
307
308
|
#
|
308
|
-
# If you do not
|
309
|
+
# If you do not provide a key policy, AWS KMS attaches a default key
|
309
310
|
# policy to the CMK. For more information, see [Default Key Policy][3]
|
310
311
|
# in the *AWS Key Management Service Developer Guide*.
|
311
312
|
#
|
312
|
-
# The policy size limit is 32 kilobytes (32768 bytes).
|
313
|
+
# The key policy size limit is 32 kilobytes (32768 bytes).
|
313
314
|
#
|
314
315
|
#
|
315
316
|
#
|
@@ -353,9 +354,8 @@ module Aws::KMS
|
|
353
354
|
# A flag to indicate whether to bypass the key policy lockout safety
|
354
355
|
# check.
|
355
356
|
#
|
356
|
-
# Setting this value to true increases the
|
357
|
-
#
|
358
|
-
# indiscriminately.
|
357
|
+
# Setting this value to true increases the risk that the CMK becomes
|
358
|
+
# unmanageable. Do not set this value to true indiscriminately.
|
359
359
|
#
|
360
360
|
# For more information, refer to the scenario in the [Default Key
|
361
361
|
# Policy][1] section in the *AWS Key Management Service Developer
|
@@ -1055,8 +1055,8 @@ module Aws::KMS
|
|
1055
1055
|
# @return [String]
|
1056
1056
|
#
|
1057
1057
|
# @!attribute [rw] policy_name
|
1058
|
-
# Specifies the name of the policy. The only valid name is
|
1059
|
-
# To get the names of key policies, use ListKeyPolicies.
|
1058
|
+
# Specifies the name of the key policy. The only valid name is
|
1059
|
+
# `default`. To get the names of key policies, use ListKeyPolicies.
|
1060
1060
|
# @return [String]
|
1061
1061
|
#
|
1062
1062
|
# @see http://docs.aws.amazon.com/goto/WebAPI/kms-2014-11-01/GetKeyPolicyRequest AWS API Documentation
|
@@ -1068,7 +1068,7 @@ module Aws::KMS
|
|
1068
1068
|
end
|
1069
1069
|
|
1070
1070
|
# @!attribute [rw] policy
|
1071
|
-
# A policy document in JSON format.
|
1071
|
+
# A key policy document in JSON format.
|
1072
1072
|
# @return [String]
|
1073
1073
|
#
|
1074
1074
|
# @see http://docs.aws.amazon.com/goto/WebAPI/kms-2014-11-01/GetKeyPolicyResponse AWS API Documentation
|
@@ -1702,8 +1702,8 @@ module Aws::KMS
|
|
1702
1702
|
end
|
1703
1703
|
|
1704
1704
|
# @!attribute [rw] policy_names
|
1705
|
-
# A list of policy names. Currently, there is only one policy
|
1706
|
-
# is named
|
1705
|
+
# A list of key policy names. Currently, there is only one key policy
|
1706
|
+
# per CMK and it is always named `default`.
|
1707
1707
|
# @return [Array<String>]
|
1708
1708
|
#
|
1709
1709
|
# @!attribute [rw] next_marker
|
@@ -1946,25 +1946,27 @@ module Aws::KMS
|
|
1946
1946
|
# @!attribute [rw] policy
|
1947
1947
|
# The key policy to attach to the CMK.
|
1948
1948
|
#
|
1949
|
-
#
|
1950
|
-
# policy must meet the following criteria:
|
1949
|
+
# The key policy must meet the following criteria:
|
1951
1950
|
#
|
1952
|
-
# *
|
1953
|
-
#
|
1954
|
-
#
|
1955
|
-
#
|
1956
|
-
#
|
1957
|
-
#
|
1951
|
+
# * If you don't set `BypassPolicyLockoutSafetyCheck` to true, the
|
1952
|
+
# key policy must allow the principal that is making the
|
1953
|
+
# `PutKeyPolicy` request to make a subsequent `PutKeyPolicy` request
|
1954
|
+
# on the CMK. This reduces the risk that the CMK becomes
|
1955
|
+
# unmanageable. For more information, refer to the scenario in the
|
1956
|
+
# [Default Key Policy][1] section of the *AWS Key Management Service
|
1957
|
+
# Developer Guide*.
|
1958
1958
|
#
|
1959
|
-
# *
|
1960
|
-
#
|
1959
|
+
# * Each statement in the key policy must contain one or more
|
1960
|
+
# principals. The principals in the key policy must exist and be
|
1961
|
+
# visible to AWS KMS. When you create a new AWS principal (for
|
1961
1962
|
# example, an IAM user or role), you might need to enforce a delay
|
1962
|
-
# before
|
1963
|
-
#
|
1964
|
-
#
|
1965
|
-
#
|
1963
|
+
# before including the new principal in a key policy because the new
|
1964
|
+
# principal might not be immediately visible to AWS KMS. For more
|
1965
|
+
# information, see [Changes that I make are not always immediately
|
1966
|
+
# visible][2] in the *AWS Identity and Access Management User
|
1967
|
+
# Guide*.
|
1966
1968
|
#
|
1967
|
-
# The policy size limit is 32 kilobytes (32768 bytes).
|
1969
|
+
# The key policy size limit is 32 kilobytes (32768 bytes).
|
1968
1970
|
#
|
1969
1971
|
#
|
1970
1972
|
#
|
@@ -1976,9 +1978,8 @@ module Aws::KMS
|
|
1976
1978
|
# A flag to indicate whether to bypass the key policy lockout safety
|
1977
1979
|
# check.
|
1978
1980
|
#
|
1979
|
-
# Setting this value to true increases the
|
1980
|
-
#
|
1981
|
-
# indiscriminately.
|
1981
|
+
# Setting this value to true increases the risk that the CMK becomes
|
1982
|
+
# unmanageable. Do not set this value to true indiscriminately.
|
1982
1983
|
#
|
1983
1984
|
# For more information, refer to the scenario in the [Default Key
|
1984
1985
|
# Policy][1] section in the *AWS Key Management Service Developer
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: aws-sdk-kms
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 1.
|
4
|
+
version: 1.4.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Amazon Web Services
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date:
|
11
|
+
date: 2018-01-09 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: aws-sdk-core
|