aws-sdk 2.1367.0 → 2.1369.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +16 -1
- package/README.md +1 -1
- package/apis/appflow-2020-08-23.min.json +104 -93
- package/apis/athena-2017-05-18.min.json +259 -50
- package/apis/athena-2017-05-18.paginators.json +5 -0
- package/apis/compute-optimizer-2019-11-01.min.json +60 -21
- package/apis/grafana-2020-08-18.min.json +1 -0
- package/apis/iot-2015-05-28.min.json +289 -274
- package/apis/kms-2014-11-01.examples.json +197 -15
- package/apis/kms-2014-11-01.min.json +52 -19
- package/apis/rekognition-2016-06-27.min.json +112 -48
- package/apis/simspaceweaver-2022-10-28.min.json +52 -16
- package/clients/appflow.d.ts +14 -1
- package/clients/athena.d.ts +228 -10
- package/clients/computeoptimizer.d.ts +58 -14
- package/clients/directconnect.d.ts +2 -2
- package/clients/efs.d.ts +1 -1
- package/clients/grafana.d.ts +4 -0
- package/clients/iot.d.ts +21 -2
- package/clients/kms.d.ts +76 -32
- package/clients/rekognition.d.ts +117 -0
- package/clients/simspaceweaver.d.ts +62 -21
- package/clients/wafv2.d.ts +57 -57
- package/clients/workspaces.d.ts +3 -3
- package/dist/aws-sdk-core-react-native.js +10 -1
- package/dist/aws-sdk-react-native.js +21 -13
- package/dist/aws-sdk.js +731 -397
- package/dist/aws-sdk.min.js +98 -98
- package/lib/core.js +1 -1
- package/lib/protocol/json.js +9 -0
- package/lib/services/sqs.js +2 -3
- package/package.json +1 -1
| @@ -61,7 +61,7 @@ | |
| 61 61 | 
             
                "CreateCustomKeyStore": [
         | 
| 62 62 | 
             
                  {
         | 
| 63 63 | 
             
                    "input": {
         | 
| 64 | 
            -
                      "CloudHsmClusterId": "cluster- | 
| 64 | 
            +
                      "CloudHsmClusterId": "cluster-234abcdefABC",
         | 
| 65 65 | 
             
                      "CustomKeyStoreName": "ExampleKeyStore",
         | 
| 66 66 | 
             
                      "KeyStorePassword": "kmsPswd",
         | 
| 67 67 | 
             
                      "TrustAnchorCertificate": "<certificate-goes-here>"
         | 
| @@ -423,7 +423,7 @@ | |
| 423 423 | 
             
                      "KeyMetadata": {
         | 
| 424 424 | 
             
                        "AWSAccountId": "111122223333",
         | 
| 425 425 | 
             
                        "Arn": "arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab",
         | 
| 426 | 
            -
                        "CloudHsmClusterId": "cluster- | 
| 426 | 
            +
                        "CloudHsmClusterId": "cluster-234abcdefABC",
         | 
| 427 427 | 
             
                        "CreationDate": "2019-12-02T07:48:55-07:00",
         | 
| 428 428 | 
             
                        "CustomKeyStoreId": "cks-1234567890abcdef0",
         | 
| 429 429 | 
             
                        "CustomerMasterKeySpec": "SYMMETRIC_DEFAULT",
         | 
| @@ -506,6 +506,7 @@ | |
| 506 506 | 
             
                      "KeyId": "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab"
         | 
| 507 507 | 
             
                    },
         | 
| 508 508 | 
             
                    "output": {
         | 
| 509 | 
            +
                      "EncryptionAlgorithm": "SYMMETRIC_DEFAULT",
         | 
| 509 510 | 
             
                      "KeyId": "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab",
         | 
| 510 511 | 
             
                      "Plaintext": "<binary data>"
         | 
| 511 512 | 
             
                    },
         | 
| @@ -515,13 +516,71 @@ | |
| 515 516 | 
             
                        "KeyId": "A key identifier for the KMS key to use to decrypt the data."
         | 
| 516 517 | 
             
                      },
         | 
| 517 518 | 
             
                      "output": {
         | 
| 519 | 
            +
                        "EncryptionAlgorithm": "The encryption algorithm that was used to decrypt the ciphertext. SYMMETRIC_DEFAULT is the only valid value for symmetric encryption in AWS KMS.",
         | 
| 518 520 | 
             
                        "KeyId": "The Amazon Resource Name (ARN) of the KMS key that was used to decrypt the data.",
         | 
| 519 521 | 
             
                        "Plaintext": "The decrypted (plaintext) data."
         | 
| 520 522 | 
             
                      }
         | 
| 521 523 | 
             
                    },
         | 
| 522 | 
            -
                    "description": "The following example decrypts data that was encrypted with a KMS key.",
         | 
| 523 | 
            -
                    "id": "to-decrypt-data- | 
| 524 | 
            -
                    "title": "To decrypt data"
         | 
| 524 | 
            +
                    "description": "The following example decrypts data that was encrypted with a symmetric encryption KMS key. The KeyId is not required when decrypting with a symmetric encryption key, but it is a best practice.",
         | 
| 525 | 
            +
                    "id": "to-decrypt-data-1",
         | 
| 526 | 
            +
                    "title": "To decrypt data with a symmetric encryption KMS key"
         | 
| 527 | 
            +
                  },
         | 
| 528 | 
            +
                  {
         | 
| 529 | 
            +
                    "input": {
         | 
| 530 | 
            +
                      "CiphertextBlob": "<binary data>",
         | 
| 531 | 
            +
                      "EncryptionAlgorithm": "RSAES_OAEP_SHA_256",
         | 
| 532 | 
            +
                      "KeyId": "0987dcba-09fe-87dc-65ba-ab0987654321"
         | 
| 533 | 
            +
                    },
         | 
| 534 | 
            +
                    "output": {
         | 
| 535 | 
            +
                      "EncryptionAlgorithm": "RSAES_OAEP_SHA_256",
         | 
| 536 | 
            +
                      "KeyId": "arn:aws:kms:us-west-2:111122223333:key/0987dcba-09fe-87dc-65ba-ab0987654321",
         | 
| 537 | 
            +
                      "Plaintext": "<binary data>"
         | 
| 538 | 
            +
                    },
         | 
| 539 | 
            +
                    "comments": {
         | 
| 540 | 
            +
                      "input": {
         | 
| 541 | 
            +
                        "CiphertextBlob": "The encrypted data (ciphertext).",
         | 
| 542 | 
            +
                        "EncryptionAlgorithm": "The encryption algorithm that was used to encrypt the data. This parameter is required to decrypt with an asymmetric KMS key.",
         | 
| 543 | 
            +
                        "KeyId": "A key identifier for the KMS key to use to decrypt the data. This parameter is required to decrypt with an asymmetric KMS key."
         | 
| 544 | 
            +
                      },
         | 
| 545 | 
            +
                      "output": {
         | 
| 546 | 
            +
                        "EncryptionAlgorithm": "The encryption algorithm that was used to decrypt the ciphertext.",
         | 
| 547 | 
            +
                        "KeyId": "The Amazon Resource Name (ARN) of the KMS key that was used to decrypt the data.",
         | 
| 548 | 
            +
                        "Plaintext": "The decrypted (plaintext) data."
         | 
| 549 | 
            +
                      }
         | 
| 550 | 
            +
                    },
         | 
| 551 | 
            +
                    "description": "The following example decrypts data that was encrypted with an asymmetric encryption KMS key. When the KMS encryption key is asymmetric, you must specify the KMS key ID and the encryption algorithm that was used to encrypt the data.",
         | 
| 552 | 
            +
                    "id": "to-decrypt-data-2",
         | 
| 553 | 
            +
                    "title": "To decrypt data with an asymmetric encryption KMS key"
         | 
| 554 | 
            +
                  },
         | 
| 555 | 
            +
                  {
         | 
| 556 | 
            +
                    "input": {
         | 
| 557 | 
            +
                      "CiphertextBlob": "<binary data>",
         | 
| 558 | 
            +
                      "KeyId": "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab",
         | 
| 559 | 
            +
                      "Recipient": {
         | 
| 560 | 
            +
                        "AttestationDocument": "<attestation document>",
         | 
| 561 | 
            +
                        "KeyEncryptionAlgorithm": "RSAES_OAEP_SHA_256"
         | 
| 562 | 
            +
                      }
         | 
| 563 | 
            +
                    },
         | 
| 564 | 
            +
                    "output": {
         | 
| 565 | 
            +
                      "CiphertextForRecipient": "<binary data>",
         | 
| 566 | 
            +
                      "KeyId": "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab",
         | 
| 567 | 
            +
                      "Plaintext": ""
         | 
| 568 | 
            +
                    },
         | 
| 569 | 
            +
                    "comments": {
         | 
| 570 | 
            +
                      "input": {
         | 
| 571 | 
            +
                        "CiphertextBlob": "The encrypted data. This ciphertext was encrypted with the KMS key",
         | 
| 572 | 
            +
                        "KeyId": "The KMS key to use to decrypt the ciphertext",
         | 
| 573 | 
            +
                        "Recipient": "Specifies the attestation document from the Nitro enclave and the encryption algorithm to use with the public key from the attestation document"
         | 
| 574 | 
            +
                      },
         | 
| 575 | 
            +
                      "output": {
         | 
| 576 | 
            +
                        "CiphertextForRecipient": "The decrypted CiphertextBlob encrypted with the public key from the attestation document",
         | 
| 577 | 
            +
                        "KeyId": "The KMS key that was used to decrypt the encrypted data (CiphertextBlob)",
         | 
| 578 | 
            +
                        "Plaintext": "This field is null or empty"
         | 
| 579 | 
            +
                      }
         | 
| 580 | 
            +
                    },
         | 
| 581 | 
            +
                    "description": "The following Decrypt example includes the Recipient parameter with a signed attestation document from an AWS Nitro enclave. Instead of returning the decrypted data in plaintext (Plaintext), the operation returns the decrypted data encrypted by the public key from the attestation document (CiphertextForRecipient).",
         | 
| 582 | 
            +
                    "id": "to-decrypt-data-for-a-nitro-enclave-2",
         | 
| 583 | 
            +
                    "title": "To decrypt data for a Nitro enclave"
         | 
| 525 584 | 
             
                  }
         | 
| 526 585 | 
             
                ],
         | 
| 527 586 | 
             
                "DeleteAlias": [
         | 
| @@ -600,7 +659,7 @@ | |
| 600 659 | 
             
                    "output": {
         | 
| 601 660 | 
             
                      "CustomKeyStores": [
         | 
| 602 661 | 
             
                        {
         | 
| 603 | 
            -
                          "CloudHsmClusterId": "cluster- | 
| 662 | 
            +
                          "CloudHsmClusterId": "cluster-234abcdefABC",
         | 
| 604 663 | 
             
                          "ConnectionState": "CONNECTED",
         | 
| 605 664 | 
             
                          "CreationDate": "1.499288695918E9",
         | 
| 606 665 | 
             
                          "CustomKeyStoreId": "cks-1234567890abcdef0",
         | 
| @@ -867,7 +926,7 @@ | |
| 867 926 | 
             
                      "KeyMetadata": {
         | 
| 868 927 | 
             
                        "AWSAccountId": "123456789012",
         | 
| 869 928 | 
             
                        "Arn": "arn:aws:kms:us-west-2:123456789012:key/1234abcd-12ab-34cd-56ef-1234567890ab",
         | 
| 870 | 
            -
                        "CloudHsmClusterId": "cluster- | 
| 929 | 
            +
                        "CloudHsmClusterId": "cluster-234abcdefABC",
         | 
| 871 930 | 
             
                        "CreationDate": 1646160362.664,
         | 
| 872 931 | 
             
                        "CustomKeyStoreId": "cks-1234567890abcdef0",
         | 
| 873 932 | 
             
                        "CustomerMasterKeySpec": "SYMMETRIC_DEFAULT",
         | 
| @@ -983,7 +1042,7 @@ | |
| 983 1042 | 
             
                      }
         | 
| 984 1043 | 
             
                    },
         | 
| 985 1044 | 
             
                    "description": "This example disconnects an AWS KMS custom key store from its backing key store. For an AWS CloudHSM key store, it disconnects the key store from its AWS CloudHSM cluster. For an external key store, it disconnects the key store from the external key store proxy that communicates with your external key manager. This operation doesn't return any data. To verify that the custom key store is disconnected, use the <code>DescribeCustomKeyStores</code> operation.",
         | 
| 986 | 
            -
                    "id": "to-disconnect-a-custom-key-store-from-its-cloudhsm-cluster- | 
| 1045 | 
            +
                    "id": "to-disconnect-a-custom-key-store-from-its-cloudhsm-cluster-234abcdefABC",
         | 
| 987 1046 | 
             
                    "title": "To disconnect a custom key store from its CloudHSM cluster"
         | 
| 988 1047 | 
             
                  }
         | 
| 989 1048 | 
             
                ],
         | 
| @@ -1025,6 +1084,7 @@ | |
| 1025 1084 | 
             
                    },
         | 
| 1026 1085 | 
             
                    "output": {
         | 
| 1027 1086 | 
             
                      "CiphertextBlob": "<binary data>",
         | 
| 1087 | 
            +
                      "EncryptionAlgorithm": "SYMMETRIC_DEFAULT",
         | 
| 1028 1088 | 
             
                      "KeyId": "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab"
         | 
| 1029 1089 | 
             
                    },
         | 
| 1030 1090 | 
             
                    "comments": {
         | 
| @@ -1034,12 +1094,40 @@ | |
| 1034 1094 | 
             
                      },
         | 
| 1035 1095 | 
             
                      "output": {
         | 
| 1036 1096 | 
             
                        "CiphertextBlob": "The encrypted data (ciphertext).",
         | 
| 1097 | 
            +
                        "EncryptionAlgorithm": "The encryption algorithm that was used in the operation. For symmetric encryption keys, the encryption algorithm is always SYMMETRIC_DEFAULT.",
         | 
| 1098 | 
            +
                        "KeyId": "The ARN of the KMS key that was used to encrypt the data."
         | 
| 1099 | 
            +
                      }
         | 
| 1100 | 
            +
                    },
         | 
| 1101 | 
            +
                    "description": "The following example encrypts data with the specified symmetric encryption KMS key.",
         | 
| 1102 | 
            +
                    "id": "to-encrypt-data-1",
         | 
| 1103 | 
            +
                    "title": "To encrypt data with a symmetric encryption KMS key"
         | 
| 1104 | 
            +
                  },
         | 
| 1105 | 
            +
                  {
         | 
| 1106 | 
            +
                    "input": {
         | 
| 1107 | 
            +
                      "EncryptionAlgorithm": "RSAES_OAEP_SHA_256",
         | 
| 1108 | 
            +
                      "KeyId": "0987dcba-09fe-87dc-65ba-ab0987654321",
         | 
| 1109 | 
            +
                      "Plaintext": "<binary data>"
         | 
| 1110 | 
            +
                    },
         | 
| 1111 | 
            +
                    "output": {
         | 
| 1112 | 
            +
                      "CiphertextBlob": "<binary data>",
         | 
| 1113 | 
            +
                      "EncryptionAlgorithm": "RSAES_OAEP_SHA_256",
         | 
| 1114 | 
            +
                      "KeyId": "arn:aws:kms:us-west-2:111122223333:key/0987dcba-09fe-87dc-65ba-ab0987654321"
         | 
| 1115 | 
            +
                    },
         | 
| 1116 | 
            +
                    "comments": {
         | 
| 1117 | 
            +
                      "input": {
         | 
| 1118 | 
            +
                        "EncryptionAlgorithm": "The encryption algorithm to use in the operation.",
         | 
| 1119 | 
            +
                        "KeyId": "The identifier of the KMS key to use for encryption. You can use the key ID or Amazon Resource Name (ARN) of the KMS key, or the name or ARN of an alias that refers to the KMS key.",
         | 
| 1120 | 
            +
                        "Plaintext": "The data to encrypt."
         | 
| 1121 | 
            +
                      },
         | 
| 1122 | 
            +
                      "output": {
         | 
| 1123 | 
            +
                        "CiphertextBlob": "The encrypted data (ciphertext).",
         | 
| 1124 | 
            +
                        "EncryptionAlgorithm": "The encryption algorithm that was used in the operation.",
         | 
| 1037 1125 | 
             
                        "KeyId": "The ARN of the KMS key that was used to encrypt the data."
         | 
| 1038 1126 | 
             
                      }
         | 
| 1039 1127 | 
             
                    },
         | 
| 1040 | 
            -
                    "description": "The following example encrypts data with the specified KMS key.",
         | 
| 1041 | 
            -
                    "id": "to-encrypt-data- | 
| 1042 | 
            -
                    "title": "To encrypt data"
         | 
| 1128 | 
            +
                    "description": "The following example encrypts data with the specified RSA asymmetric KMS key. When you encrypt with an asymmetric key, you must specify the encryption algorithm.",
         | 
| 1129 | 
            +
                    "id": "to-encrypt-data-2",
         | 
| 1130 | 
            +
                    "title": "To encrypt data with an asymmetric encryption KMS key"
         | 
| 1043 1131 | 
             
                  }
         | 
| 1044 1132 | 
             
                ],
         | 
| 1045 1133 | 
             
                "GenerateDataKey": [
         | 
| @@ -1065,8 +1153,40 @@ | |
| 1065 1153 | 
             
                      }
         | 
| 1066 1154 | 
             
                    },
         | 
| 1067 1155 | 
             
                    "description": "The following example generates a 256-bit symmetric data encryption key (data key) in two formats. One is the unencrypted (plainext) data key, and the other is the data key encrypted with the specified KMS key.",
         | 
| 1068 | 
            -
                    "id": "to-generate-a-data-key- | 
| 1156 | 
            +
                    "id": "to-generate-a-data-key-1",
         | 
| 1069 1157 | 
             
                    "title": "To generate a data key"
         | 
| 1158 | 
            +
                  },
         | 
| 1159 | 
            +
                  {
         | 
| 1160 | 
            +
                    "input": {
         | 
| 1161 | 
            +
                      "KeyId": "arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab",
         | 
| 1162 | 
            +
                      "KeySpec": "AES_256",
         | 
| 1163 | 
            +
                      "Recipient": {
         | 
| 1164 | 
            +
                        "AttestationDocument": "<attestation document>",
         | 
| 1165 | 
            +
                        "KeyEncryptionAlgorithm": "RSAES_OAEP_SHA_256"
         | 
| 1166 | 
            +
                      }
         | 
| 1167 | 
            +
                    },
         | 
| 1168 | 
            +
                    "output": {
         | 
| 1169 | 
            +
                      "CiphertextBlob": "<binary data>",
         | 
| 1170 | 
            +
                      "CiphertextForRecipient": "<binary data>",
         | 
| 1171 | 
            +
                      "KeyId": "arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab",
         | 
| 1172 | 
            +
                      "Plaintext": ""
         | 
| 1173 | 
            +
                    },
         | 
| 1174 | 
            +
                    "comments": {
         | 
| 1175 | 
            +
                      "input": {
         | 
| 1176 | 
            +
                        "KeyId": "Identifies the KMS key used to encrypt the encrypted data key (CiphertextBlob)",
         | 
| 1177 | 
            +
                        "KeySpec": "Specifies the type of data key to return",
         | 
| 1178 | 
            +
                        "Recipient": "Specifies the attestation document from the Nitro enclave and the encryption algorithm to use with the public key from the attestation document"
         | 
| 1179 | 
            +
                      },
         | 
| 1180 | 
            +
                      "output": {
         | 
| 1181 | 
            +
                        "CiphertextBlob": "The data key encrypted by the specified KMS key",
         | 
| 1182 | 
            +
                        "CiphertextForRecipient": "The plaintext data key encrypted by the public key from the attestation document",
         | 
| 1183 | 
            +
                        "KeyId": "The KMS key used to encrypt the CiphertextBlob (encrypted data key)",
         | 
| 1184 | 
            +
                        "Plaintext": "This field is null or empty"
         | 
| 1185 | 
            +
                      }
         | 
| 1186 | 
            +
                    },
         | 
| 1187 | 
            +
                    "description": "The following example includes the Recipient parameter with a signed attestation document from an AWS Nitro enclave. Instead of returning a copy of the data key encrypted by the KMS key and a plaintext copy of the data key, GenerateDataKey returns one copy of the data key encrypted by the KMS key (CiphertextBlob) and one copy of the data key encrypted by the public key from the attestation document (CiphertextForRecipient). The operation doesn't return a plaintext data key. ",
         | 
| 1188 | 
            +
                    "id": "to-generate-a-data-key-for-a-nitro-enclave-2",
         | 
| 1189 | 
            +
                    "title": "To generate a data key pair for a Nitro enclave"
         | 
| 1070 1190 | 
             
                  }
         | 
| 1071 1191 | 
             
                ],
         | 
| 1072 1192 | 
             
                "GenerateDataKeyPair": [
         | 
| @@ -1096,8 +1216,44 @@ | |
| 1096 1216 | 
             
                      }
         | 
| 1097 1217 | 
             
                    },
         | 
| 1098 1218 | 
             
                    "description": "This example generates an RSA data key pair for encryption and decryption. The operation returns a plaintext public key and private key, and a copy of the private key that is encrypted under a symmetric encryption KMS key that you specify.",
         | 
| 1099 | 
            -
                    "id": "to-generate-an-rsa-key-pair-for-encryption-and-decryption- | 
| 1219 | 
            +
                    "id": "to-generate-an-rsa-key-pair-for-encryption-and-decryption-1",
         | 
| 1100 1220 | 
             
                    "title": "To generate an RSA key pair for encryption and decryption"
         | 
| 1221 | 
            +
                  },
         | 
| 1222 | 
            +
                  {
         | 
| 1223 | 
            +
                    "input": {
         | 
| 1224 | 
            +
                      "KeyId": "arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab",
         | 
| 1225 | 
            +
                      "KeyPairSpec": "RSA_3072",
         | 
| 1226 | 
            +
                      "Recipient": {
         | 
| 1227 | 
            +
                        "AttestationDocument": "<attestation document>",
         | 
| 1228 | 
            +
                        "KeyEncryptionAlgorithm": "RSAES_OAEP_SHA_256"
         | 
| 1229 | 
            +
                      }
         | 
| 1230 | 
            +
                    },
         | 
| 1231 | 
            +
                    "output": {
         | 
| 1232 | 
            +
                      "CiphertextForRecipient": "<binary data>",
         | 
| 1233 | 
            +
                      "KeyId": "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab",
         | 
| 1234 | 
            +
                      "KeyPairSpec": "RSA_3072",
         | 
| 1235 | 
            +
                      "PrivateKeyCiphertextBlob": "<binary data>",
         | 
| 1236 | 
            +
                      "PrivateKeyPlaintext": "",
         | 
| 1237 | 
            +
                      "PublicKey": "<binary data>"
         | 
| 1238 | 
            +
                    },
         | 
| 1239 | 
            +
                    "comments": {
         | 
| 1240 | 
            +
                      "input": {
         | 
| 1241 | 
            +
                        "KeyId": "The key ID of the symmetric encryption KMS key that encrypts the private RSA key in the data key pair.",
         | 
| 1242 | 
            +
                        "KeyPairSpec": "The requested key spec of the RSA data key pair.",
         | 
| 1243 | 
            +
                        "Recipient": "Specifies the attestation document from the Nitro enclave and the encryption algorithm to use with the public key from the attestation document."
         | 
| 1244 | 
            +
                      },
         | 
| 1245 | 
            +
                      "output": {
         | 
| 1246 | 
            +
                        "CiphertextForRecipient": "The private key of the RSA data key pair encrypted by the public key from the attestation document",
         | 
| 1247 | 
            +
                        "KeyId": "The key ARN of the symmetric encryption KMS key that was used to encrypt the PrivateKeyCiphertextBlob.",
         | 
| 1248 | 
            +
                        "KeyPairSpec": "The actual key spec of the RSA data key pair.",
         | 
| 1249 | 
            +
                        "PrivateKeyCiphertextBlob": "The private key of the RSA data key pair encrypted by the KMS key.",
         | 
| 1250 | 
            +
                        "PrivateKeyPlaintext": "This field is null or empty",
         | 
| 1251 | 
            +
                        "PublicKey": "The public key (plaintext) of the RSA data key pair."
         | 
| 1252 | 
            +
                      }
         | 
| 1253 | 
            +
                    },
         | 
| 1254 | 
            +
                    "description": "The following example includes the Recipient parameter with a signed attestation document from an AWS Nitro enclave. Instead of returning a plaintext copy of the private data key, GenerateDataKeyPair returns a copy of the private data key encrypted by the public key from the attestation document (CiphertextForRecipient). It returns the public data key (PublicKey) and a copy of private data key encrypted under the specified KMS key (PrivateKeyCiphertextBlob), as usual, but plaintext private data key field (PrivateKeyPlaintext) is null or empty. ",
         | 
| 1255 | 
            +
                    "id": "to-generate-a-data-key-pair-for-a-nitro-enclave-2",
         | 
| 1256 | 
            +
                    "title": "To generate a data key pair for a Nitro enclave"
         | 
| 1101 1257 | 
             
                  }
         | 
| 1102 1258 | 
             
                ],
         | 
| 1103 1259 | 
             
                "GenerateDataKeyPairWithoutPlaintext": [
         | 
| @@ -1200,7 +1356,33 @@ | |
| 1200 1356 | 
             
                      }
         | 
| 1201 1357 | 
             
                    },
         | 
| 1202 1358 | 
             
                    "description": "The following example generates 32 bytes of random data.",
         | 
| 1203 | 
            -
                    "id": "to-generate-random-data- | 
| 1359 | 
            +
                    "id": "to-generate-random-data-1",
         | 
| 1360 | 
            +
                    "title": "To generate random data"
         | 
| 1361 | 
            +
                  },
         | 
| 1362 | 
            +
                  {
         | 
| 1363 | 
            +
                    "input": {
         | 
| 1364 | 
            +
                      "NumberOfBytes": 1024,
         | 
| 1365 | 
            +
                      "Recipient": {
         | 
| 1366 | 
            +
                        "AttestationDocument": "<attestation document>",
         | 
| 1367 | 
            +
                        "KeyEncryptionAlgorithm": "RSAES_OAEP_SHA_256"
         | 
| 1368 | 
            +
                      }
         | 
| 1369 | 
            +
                    },
         | 
| 1370 | 
            +
                    "output": {
         | 
| 1371 | 
            +
                      "CiphertextForRecipient": "<binary data>",
         | 
| 1372 | 
            +
                      "Plaintext": ""
         | 
| 1373 | 
            +
                    },
         | 
| 1374 | 
            +
                    "comments": {
         | 
| 1375 | 
            +
                      "input": {
         | 
| 1376 | 
            +
                        "NumberOfBytes": "The length of the random byte string",
         | 
| 1377 | 
            +
                        "Recipient": "Specifies the attestation document from the Nitro enclave and the encryption algorithm to use with the public key from the attestation document"
         | 
| 1378 | 
            +
                      },
         | 
| 1379 | 
            +
                      "output": {
         | 
| 1380 | 
            +
                        "CiphertextForRecipient": "The random data encrypted under the public key from the attestation document",
         | 
| 1381 | 
            +
                        "Plaintext": "This field is null or empty"
         | 
| 1382 | 
            +
                      }
         | 
| 1383 | 
            +
                    },
         | 
| 1384 | 
            +
                    "description": "The following example includes the Recipient parameter with a signed attestation document from an AWS Nitro enclave. Instead of returning a plaintext (unencrypted) byte string, GenerateRandom returns the byte string encrypted by the public key from the enclave's attestation document.",
         | 
| 1385 | 
            +
                    "id": "to-generate-random-data-2",
         | 
| 1204 1386 | 
             
                    "title": "To generate random data"
         | 
| 1205 1387 | 
             
                  }
         | 
| 1206 1388 | 
             
                ],
         | 
| @@ -1932,7 +2114,7 @@ | |
| 1932 2114 | 
             
                  },
         | 
| 1933 2115 | 
             
                  {
         | 
| 1934 2116 | 
             
                    "input": {
         | 
| 1935 | 
            -
                      "CloudHsmClusterId": "cluster- | 
| 2117 | 
            +
                      "CloudHsmClusterId": "cluster-234abcdefABC",
         | 
| 1936 2118 | 
             
                      "CustomKeyStoreId": "cks-1234567890abcdef0"
         | 
| 1937 2119 | 
             
                    },
         | 
| 1938 2120 | 
             
                    "output": {
         | 
| @@ -173,7 +173,10 @@ | |
| 173 173 | 
             
                        "shape": "Sv"
         | 
| 174 174 | 
             
                      },
         | 
| 175 175 | 
             
                      "KeyId": {},
         | 
| 176 | 
            -
                      "EncryptionAlgorithm": {}
         | 
| 176 | 
            +
                      "EncryptionAlgorithm": {},
         | 
| 177 | 
            +
                      "Recipient": {
         | 
| 178 | 
            +
                        "shape": "S21"
         | 
| 179 | 
            +
                      }
         | 
| 177 180 | 
             
                    }
         | 
| 178 181 | 
             
                  },
         | 
| 179 182 | 
             
                  "output": {
         | 
| @@ -181,9 +184,12 @@ | |
| 181 184 | 
             
                    "members": {
         | 
| 182 185 | 
             
                      "KeyId": {},
         | 
| 183 186 | 
             
                      "Plaintext": {
         | 
| 184 | 
            -
                        "shape": " | 
| 187 | 
            +
                        "shape": "S25"
         | 
| 185 188 | 
             
                      },
         | 
| 186 | 
            -
                      "EncryptionAlgorithm": {}
         | 
| 189 | 
            +
                      "EncryptionAlgorithm": {},
         | 
| 190 | 
            +
                      "CiphertextForRecipient": {
         | 
| 191 | 
            +
                        "type": "blob"
         | 
| 192 | 
            +
                      }
         | 
| 187 193 | 
             
                    }
         | 
| 188 194 | 
             
                  }
         | 
| 189 195 | 
             
                },
         | 
| @@ -367,7 +373,7 @@ | |
| 367 373 | 
             
                    "members": {
         | 
| 368 374 | 
             
                      "KeyId": {},
         | 
| 369 375 | 
             
                      "Plaintext": {
         | 
| 370 | 
            -
                        "shape": " | 
| 376 | 
            +
                        "shape": "S25"
         | 
| 371 377 | 
             
                      },
         | 
| 372 378 | 
             
                      "EncryptionContext": {
         | 
| 373 379 | 
             
                        "shape": "Ss"
         | 
| @@ -406,6 +412,9 @@ | |
| 406 412 | 
             
                      "KeySpec": {},
         | 
| 407 413 | 
             
                      "GrantTokens": {
         | 
| 408 414 | 
             
                        "shape": "Sv"
         | 
| 415 | 
            +
                      },
         | 
| 416 | 
            +
                      "Recipient": {
         | 
| 417 | 
            +
                        "shape": "S21"
         | 
| 409 418 | 
             
                      }
         | 
| 410 419 | 
             
                    }
         | 
| 411 420 | 
             
                  },
         | 
| @@ -416,9 +425,12 @@ | |
| 416 425 | 
             
                        "type": "blob"
         | 
| 417 426 | 
             
                      },
         | 
| 418 427 | 
             
                      "Plaintext": {
         | 
| 419 | 
            -
                        "shape": " | 
| 428 | 
            +
                        "shape": "S25"
         | 
| 420 429 | 
             
                      },
         | 
| 421 | 
            -
                      "KeyId": {}
         | 
| 430 | 
            +
                      "KeyId": {},
         | 
| 431 | 
            +
                      "CiphertextForRecipient": {
         | 
| 432 | 
            +
                        "type": "blob"
         | 
| 433 | 
            +
                      }
         | 
| 422 434 | 
             
                    }
         | 
| 423 435 | 
             
                  }
         | 
| 424 436 | 
             
                },
         | 
| @@ -437,6 +449,9 @@ | |
| 437 449 | 
             
                      "KeyPairSpec": {},
         | 
| 438 450 | 
             
                      "GrantTokens": {
         | 
| 439 451 | 
             
                        "shape": "Sv"
         | 
| 452 | 
            +
                      },
         | 
| 453 | 
            +
                      "Recipient": {
         | 
| 454 | 
            +
                        "shape": "S21"
         | 
| 440 455 | 
             
                      }
         | 
| 441 456 | 
             
                    }
         | 
| 442 457 | 
             
                  },
         | 
| @@ -447,13 +462,16 @@ | |
| 447 462 | 
             
                        "type": "blob"
         | 
| 448 463 | 
             
                      },
         | 
| 449 464 | 
             
                      "PrivateKeyPlaintext": {
         | 
| 450 | 
            -
                        "shape": " | 
| 465 | 
            +
                        "shape": "S25"
         | 
| 451 466 | 
             
                      },
         | 
| 452 467 | 
             
                      "PublicKey": {
         | 
| 453 468 | 
             
                        "type": "blob"
         | 
| 454 469 | 
             
                      },
         | 
| 455 470 | 
             
                      "KeyId": {},
         | 
| 456 | 
            -
                      "KeyPairSpec": {}
         | 
| 471 | 
            +
                      "KeyPairSpec": {},
         | 
| 472 | 
            +
                      "CiphertextForRecipient": {
         | 
| 473 | 
            +
                        "type": "blob"
         | 
| 474 | 
            +
                      }
         | 
| 457 475 | 
             
                    }
         | 
| 458 476 | 
             
                  }
         | 
| 459 477 | 
             
                },
         | 
| @@ -529,7 +547,7 @@ | |
| 529 547 | 
             
                    ],
         | 
| 530 548 | 
             
                    "members": {
         | 
| 531 549 | 
             
                      "Message": {
         | 
| 532 | 
            -
                        "shape": " | 
| 550 | 
            +
                        "shape": "S25"
         | 
| 533 551 | 
             
                      },
         | 
| 534 552 | 
             
                      "KeyId": {},
         | 
| 535 553 | 
             
                      "MacAlgorithm": {},
         | 
| @@ -556,14 +574,20 @@ | |
| 556 574 | 
             
                      "NumberOfBytes": {
         | 
| 557 575 | 
             
                        "type": "integer"
         | 
| 558 576 | 
             
                      },
         | 
| 559 | 
            -
                      "CustomKeyStoreId": {}
         | 
| 577 | 
            +
                      "CustomKeyStoreId": {},
         | 
| 578 | 
            +
                      "Recipient": {
         | 
| 579 | 
            +
                        "shape": "S21"
         | 
| 580 | 
            +
                      }
         | 
| 560 581 | 
             
                    }
         | 
| 561 582 | 
             
                  },
         | 
| 562 583 | 
             
                  "output": {
         | 
| 563 584 | 
             
                    "type": "structure",
         | 
| 564 585 | 
             
                    "members": {
         | 
| 565 586 | 
             
                      "Plaintext": {
         | 
| 566 | 
            -
                        "shape": " | 
| 587 | 
            +
                        "shape": "S25"
         | 
| 588 | 
            +
                      },
         | 
| 589 | 
            +
                      "CiphertextForRecipient": {
         | 
| 590 | 
            +
                        "type": "blob"
         | 
| 567 591 | 
             
                      }
         | 
| 568 592 | 
             
                    }
         | 
| 569 593 | 
             
                  }
         | 
| @@ -628,7 +652,7 @@ | |
| 628 652 | 
             
                        "type": "blob"
         | 
| 629 653 | 
             
                      },
         | 
| 630 654 | 
             
                      "PublicKey": {
         | 
| 631 | 
            -
                        "shape": " | 
| 655 | 
            +
                        "shape": "S25"
         | 
| 632 656 | 
             
                      },
         | 
| 633 657 | 
             
                      "ParametersValidTo": {
         | 
| 634 658 | 
             
                        "type": "timestamp"
         | 
| @@ -754,7 +778,7 @@ | |
| 754 778 | 
             
                    }
         | 
| 755 779 | 
             
                  },
         | 
| 756 780 | 
             
                  "output": {
         | 
| 757 | 
            -
                    "shape": " | 
| 781 | 
            +
                    "shape": "S3r"
         | 
| 758 782 | 
             
                  }
         | 
| 759 783 | 
             
                },
         | 
| 760 784 | 
             
                "ListKeyPolicies": {
         | 
| @@ -857,7 +881,7 @@ | |
| 857 881 | 
             
                    }
         | 
| 858 882 | 
             
                  },
         | 
| 859 883 | 
             
                  "output": {
         | 
| 860 | 
            -
                    "shape": " | 
| 884 | 
            +
                    "shape": "S3r"
         | 
| 861 885 | 
             
                  }
         | 
| 862 886 | 
             
                },
         | 
| 863 887 | 
             
                "PutKeyPolicy": {
         | 
| @@ -1011,7 +1035,7 @@ | |
| 1011 1035 | 
             
                    "members": {
         | 
| 1012 1036 | 
             
                      "KeyId": {},
         | 
| 1013 1037 | 
             
                      "Message": {
         | 
| 1014 | 
            -
                        "shape": " | 
| 1038 | 
            +
                        "shape": "S25"
         | 
| 1015 1039 | 
             
                      },
         | 
| 1016 1040 | 
             
                      "MessageType": {},
         | 
| 1017 1041 | 
             
                      "GrantTokens": {
         | 
| @@ -1140,7 +1164,7 @@ | |
| 1140 1164 | 
             
                    "members": {
         | 
| 1141 1165 | 
             
                      "KeyId": {},
         | 
| 1142 1166 | 
             
                      "Message": {
         | 
| 1143 | 
            -
                        "shape": " | 
| 1167 | 
            +
                        "shape": "S25"
         | 
| 1144 1168 | 
             
                      },
         | 
| 1145 1169 | 
             
                      "MessageType": {},
         | 
| 1146 1170 | 
             
                      "Signature": {
         | 
| @@ -1174,7 +1198,7 @@ | |
| 1174 1198 | 
             
                    ],
         | 
| 1175 1199 | 
             
                    "members": {
         | 
| 1176 1200 | 
             
                      "Message": {
         | 
| 1177 | 
            -
                        "shape": " | 
| 1201 | 
            +
                        "shape": "S25"
         | 
| 1178 1202 | 
             
                      },
         | 
| 1179 1203 | 
             
                      "KeyId": {},
         | 
| 1180 1204 | 
             
                      "MacAlgorithm": {},
         | 
| @@ -1355,11 +1379,20 @@ | |
| 1355 1379 | 
             
                    "Region": {}
         | 
| 1356 1380 | 
             
                  }
         | 
| 1357 1381 | 
             
                },
         | 
| 1358 | 
            -
                " | 
| 1382 | 
            +
                "S21": {
         | 
| 1383 | 
            +
                  "type": "structure",
         | 
| 1384 | 
            +
                  "members": {
         | 
| 1385 | 
            +
                    "KeyEncryptionAlgorithm": {},
         | 
| 1386 | 
            +
                    "AttestationDocument": {
         | 
| 1387 | 
            +
                      "type": "blob"
         | 
| 1388 | 
            +
                    }
         | 
| 1389 | 
            +
                  }
         | 
| 1390 | 
            +
                },
         | 
| 1391 | 
            +
                "S25": {
         | 
| 1359 1392 | 
             
                  "type": "blob",
         | 
| 1360 1393 | 
             
                  "sensitive": true
         | 
| 1361 1394 | 
             
                },
         | 
| 1362 | 
            -
                " | 
| 1395 | 
            +
                "S3r": {
         | 
| 1363 1396 | 
             
                  "type": "structure",
         | 
| 1364 1397 | 
             
                  "members": {
         | 
| 1365 1398 | 
             
                    "Grants": {
         |