aws-sdk 2.1368.0 → 2.1369.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/CHANGELOG.md CHANGED
@@ -1,7 +1,12 @@
1
1
  # Changelog for AWS SDK for JavaScript
2
- <!--LATEST=2.1368.0-->
2
+ <!--LATEST=2.1369.0-->
3
3
  <!--ENTRYINSERT-->
4
4
 
5
+ ## 2.1369.0
6
+ * bugfix: SQS: add queryCompatibility fix to JSON protocol
7
+ * feature: ComputeOptimizer: support for tag filtering within compute optimizer. ability to filter recommendation results by tag and tag key value pairs. ability to filter by inferred workload type added.
8
+ * feature: KMS: This release makes the NitroEnclave request parameter Recipient and the response field for CiphertextForRecipient available in AWS SDKs. It also adds the regex pattern for CloudHsmClusterId validation.
9
+
5
10
  ## 2.1368.0
6
11
  * feature: Appflow: Adds Jwt Support for Salesforce Credentials.
7
12
  * feature: Athena: You can now use capacity reservations on Amazon Athena to run SQL queries on fully-managed compute capacity.
package/README.md CHANGED
@@ -72,7 +72,7 @@ require('aws-sdk/lib/maintenance_mode_message').suppress = true;
72
72
  To use the SDK in the browser, simply add the following script tag to your
73
73
  HTML pages:
74
74
 
75
- <script src="https://sdk.amazonaws.com/js/aws-sdk-2.1368.0.min.js"></script>
75
+ <script src="https://sdk.amazonaws.com/js/aws-sdk-2.1369.0.min.js"></script>
76
76
 
77
77
  You can also build a custom browser SDK with your specified set of AWS services.
78
78
  This can allow you to reduce the SDK's size, specify different API versions of
@@ -443,7 +443,10 @@
443
443
  "lastRefreshTimestamp": {
444
444
  "type": "timestamp"
445
445
  },
446
- "currentPerformanceRisk": {}
446
+ "currentPerformanceRisk": {},
447
+ "tags": {
448
+ "shape": "S3s"
449
+ }
447
450
  }
448
451
  }
449
452
  },
@@ -546,7 +549,10 @@
546
549
  "inferredWorkloadTypes": {
547
550
  "shape": "S31"
548
551
  },
549
- "instanceState": {}
552
+ "instanceState": {},
553
+ "tags": {
554
+ "shape": "S3s"
555
+ }
550
556
  }
551
557
  }
552
558
  },
@@ -602,10 +608,10 @@
602
608
  "members": {
603
609
  "name": {},
604
610
  "timestamps": {
605
- "shape": "S4k"
611
+ "shape": "S4o"
606
612
  },
607
613
  "values": {
608
- "shape": "S4l"
614
+ "shape": "S4p"
609
615
  }
610
616
  }
611
617
  }
@@ -661,13 +667,13 @@
661
667
  "members": {
662
668
  "name": {},
663
669
  "timestamps": {
664
- "shape": "S4k"
670
+ "shape": "S4o"
665
671
  },
666
672
  "upperBoundValues": {
667
- "shape": "S4l"
673
+ "shape": "S4p"
668
674
  },
669
675
  "lowerBoundValues": {
670
- "shape": "S4l"
676
+ "shape": "S4p"
671
677
  }
672
678
  }
673
679
  }
@@ -725,7 +731,7 @@
725
731
  "members": {
726
732
  "containerName": {},
727
733
  "memorySizeConfiguration": {
728
- "shape": "S57"
734
+ "shape": "S5b"
729
735
  },
730
736
  "cpu": {
731
737
  "type": "integer"
@@ -799,7 +805,7 @@
799
805
  "members": {
800
806
  "containerName": {},
801
807
  "memorySizeConfiguration": {
802
- "shape": "S57"
808
+ "shape": "S5b"
803
809
  },
804
810
  "cpu": {
805
811
  "type": "integer"
@@ -810,7 +816,10 @@
810
816
  }
811
817
  }
812
818
  },
813
- "currentPerformanceRisk": {}
819
+ "currentPerformanceRisk": {},
820
+ "tags": {
821
+ "shape": "S3s"
822
+ }
814
823
  }
815
824
  }
816
825
  },
@@ -997,7 +1006,10 @@
997
1006
  }
998
1007
  }
999
1008
  },
1000
- "currentPerformanceRisk": {}
1009
+ "currentPerformanceRisk": {},
1010
+ "tags": {
1011
+ "shape": "S3s"
1012
+ }
1001
1013
  }
1002
1014
  }
1003
1015
  }
@@ -1112,6 +1124,20 @@
1112
1124
  "type": "long"
1113
1125
  }
1114
1126
  }
1127
+ },
1128
+ "inferredWorkloadSavings": {
1129
+ "type": "list",
1130
+ "member": {
1131
+ "type": "structure",
1132
+ "members": {
1133
+ "inferredWorkloadTypes": {
1134
+ "shape": "S31"
1135
+ },
1136
+ "estimatedMonthlySavings": {
1137
+ "shape": "S2q"
1138
+ }
1139
+ }
1140
+ }
1115
1141
  }
1116
1142
  }
1117
1143
  }
@@ -1299,13 +1325,16 @@
1299
1325
  "type": "double"
1300
1326
  },
1301
1327
  "estimatedMonthlySavings": {
1302
- "type": "structure",
1303
- "members": {
1304
- "currency": {},
1305
- "value": {
1306
- "type": "double"
1307
- }
1308
- }
1328
+ "shape": "S2q"
1329
+ }
1330
+ }
1331
+ },
1332
+ "S2q": {
1333
+ "type": "structure",
1334
+ "members": {
1335
+ "currency": {},
1336
+ "value": {
1337
+ "type": "double"
1309
1338
  }
1310
1339
  }
1311
1340
  },
@@ -1367,19 +1396,29 @@
1367
1396
  }
1368
1397
  }
1369
1398
  },
1370
- "S4k": {
1399
+ "S3s": {
1400
+ "type": "list",
1401
+ "member": {
1402
+ "type": "structure",
1403
+ "members": {
1404
+ "key": {},
1405
+ "value": {}
1406
+ }
1407
+ }
1408
+ },
1409
+ "S4o": {
1371
1410
  "type": "list",
1372
1411
  "member": {
1373
1412
  "type": "timestamp"
1374
1413
  }
1375
1414
  },
1376
- "S4l": {
1415
+ "S4p": {
1377
1416
  "type": "list",
1378
1417
  "member": {
1379
1418
  "type": "double"
1380
1419
  }
1381
1420
  },
1382
- "S57": {
1421
+ "S5b": {
1383
1422
  "type": "structure",
1384
1423
  "members": {
1385
1424
  "memory": {
@@ -61,7 +61,7 @@
61
61
  "CreateCustomKeyStore": [
62
62
  {
63
63
  "input": {
64
- "CloudHsmClusterId": "cluster-1a23b4cdefg",
64
+ "CloudHsmClusterId": "cluster-234abcdefABC",
65
65
  "CustomKeyStoreName": "ExampleKeyStore",
66
66
  "KeyStorePassword": "kmsPswd",
67
67
  "TrustAnchorCertificate": "<certificate-goes-here>"
@@ -423,7 +423,7 @@
423
423
  "KeyMetadata": {
424
424
  "AWSAccountId": "111122223333",
425
425
  "Arn": "arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab",
426
- "CloudHsmClusterId": "cluster-1a23b4cdefg",
426
+ "CloudHsmClusterId": "cluster-234abcdefABC",
427
427
  "CreationDate": "2019-12-02T07:48:55-07:00",
428
428
  "CustomKeyStoreId": "cks-1234567890abcdef0",
429
429
  "CustomerMasterKeySpec": "SYMMETRIC_DEFAULT",
@@ -506,6 +506,7 @@
506
506
  "KeyId": "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab"
507
507
  },
508
508
  "output": {
509
+ "EncryptionAlgorithm": "SYMMETRIC_DEFAULT",
509
510
  "KeyId": "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab",
510
511
  "Plaintext": "<binary data>"
511
512
  },
@@ -515,13 +516,71 @@
515
516
  "KeyId": "A key identifier for the KMS key to use to decrypt the data."
516
517
  },
517
518
  "output": {
519
+ "EncryptionAlgorithm": "The encryption algorithm that was used to decrypt the ciphertext. SYMMETRIC_DEFAULT is the only valid value for symmetric encryption in AWS KMS.",
518
520
  "KeyId": "The Amazon Resource Name (ARN) of the KMS key that was used to decrypt the data.",
519
521
  "Plaintext": "The decrypted (plaintext) data."
520
522
  }
521
523
  },
522
- "description": "The following example decrypts data that was encrypted with a KMS key.",
523
- "id": "to-decrypt-data-1478281622886",
524
- "title": "To decrypt data"
524
+ "description": "The following example decrypts data that was encrypted with a symmetric encryption KMS key. The KeyId is not required when decrypting with a symmetric encryption key, but it is a best practice.",
525
+ "id": "to-decrypt-data-1",
526
+ "title": "To decrypt data with a symmetric encryption KMS key"
527
+ },
528
+ {
529
+ "input": {
530
+ "CiphertextBlob": "<binary data>",
531
+ "EncryptionAlgorithm": "RSAES_OAEP_SHA_256",
532
+ "KeyId": "0987dcba-09fe-87dc-65ba-ab0987654321"
533
+ },
534
+ "output": {
535
+ "EncryptionAlgorithm": "RSAES_OAEP_SHA_256",
536
+ "KeyId": "arn:aws:kms:us-west-2:111122223333:key/0987dcba-09fe-87dc-65ba-ab0987654321",
537
+ "Plaintext": "<binary data>"
538
+ },
539
+ "comments": {
540
+ "input": {
541
+ "CiphertextBlob": "The encrypted data (ciphertext).",
542
+ "EncryptionAlgorithm": "The encryption algorithm that was used to encrypt the data. This parameter is required to decrypt with an asymmetric KMS key.",
543
+ "KeyId": "A key identifier for the KMS key to use to decrypt the data. This parameter is required to decrypt with an asymmetric KMS key."
544
+ },
545
+ "output": {
546
+ "EncryptionAlgorithm": "The encryption algorithm that was used to decrypt the ciphertext.",
547
+ "KeyId": "The Amazon Resource Name (ARN) of the KMS key that was used to decrypt the data.",
548
+ "Plaintext": "The decrypted (plaintext) data."
549
+ }
550
+ },
551
+ "description": "The following example decrypts data that was encrypted with an asymmetric encryption KMS key. When the KMS encryption key is asymmetric, you must specify the KMS key ID and the encryption algorithm that was used to encrypt the data.",
552
+ "id": "to-decrypt-data-2",
553
+ "title": "To decrypt data with an asymmetric encryption KMS key"
554
+ },
555
+ {
556
+ "input": {
557
+ "CiphertextBlob": "<binary data>",
558
+ "KeyId": "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab",
559
+ "Recipient": {
560
+ "AttestationDocument": "<attestation document>",
561
+ "KeyEncryptionAlgorithm": "RSAES_OAEP_SHA_256"
562
+ }
563
+ },
564
+ "output": {
565
+ "CiphertextForRecipient": "<binary data>",
566
+ "KeyId": "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab",
567
+ "Plaintext": ""
568
+ },
569
+ "comments": {
570
+ "input": {
571
+ "CiphertextBlob": "The encrypted data. This ciphertext was encrypted with the KMS key",
572
+ "KeyId": "The KMS key to use to decrypt the ciphertext",
573
+ "Recipient": "Specifies the attestation document from the Nitro enclave and the encryption algorithm to use with the public key from the attestation document"
574
+ },
575
+ "output": {
576
+ "CiphertextForRecipient": "The decrypted CiphertextBlob encrypted with the public key from the attestation document",
577
+ "KeyId": "The KMS key that was used to decrypt the encrypted data (CiphertextBlob)",
578
+ "Plaintext": "This field is null or empty"
579
+ }
580
+ },
581
+ "description": "The following Decrypt example includes the Recipient parameter with a signed attestation document from an AWS Nitro enclave. Instead of returning the decrypted data in plaintext (Plaintext), the operation returns the decrypted data encrypted by the public key from the attestation document (CiphertextForRecipient).",
582
+ "id": "to-decrypt-data-for-a-nitro-enclave-2",
583
+ "title": "To decrypt data for a Nitro enclave"
525
584
  }
526
585
  ],
527
586
  "DeleteAlias": [
@@ -600,7 +659,7 @@
600
659
  "output": {
601
660
  "CustomKeyStores": [
602
661
  {
603
- "CloudHsmClusterId": "cluster-1a23b4cdefg",
662
+ "CloudHsmClusterId": "cluster-234abcdefABC",
604
663
  "ConnectionState": "CONNECTED",
605
664
  "CreationDate": "1.499288695918E9",
606
665
  "CustomKeyStoreId": "cks-1234567890abcdef0",
@@ -867,7 +926,7 @@
867
926
  "KeyMetadata": {
868
927
  "AWSAccountId": "123456789012",
869
928
  "Arn": "arn:aws:kms:us-west-2:123456789012:key/1234abcd-12ab-34cd-56ef-1234567890ab",
870
- "CloudHsmClusterId": "cluster-1a23b4cdefg",
929
+ "CloudHsmClusterId": "cluster-234abcdefABC",
871
930
  "CreationDate": 1646160362.664,
872
931
  "CustomKeyStoreId": "cks-1234567890abcdef0",
873
932
  "CustomerMasterKeySpec": "SYMMETRIC_DEFAULT",
@@ -983,7 +1042,7 @@
983
1042
  }
984
1043
  },
985
1044
  "description": "This example disconnects an AWS KMS custom key store from its backing key store. For an AWS CloudHSM key store, it disconnects the key store from its AWS CloudHSM cluster. For an external key store, it disconnects the key store from the external key store proxy that communicates with your external key manager. This operation doesn't return any data. To verify that the custom key store is disconnected, use the <code>DescribeCustomKeyStores</code> operation.",
986
- "id": "to-disconnect-a-custom-key-store-from-its-cloudhsm-cluster-1628627955156",
1045
+ "id": "to-disconnect-a-custom-key-store-from-its-cloudhsm-cluster-234abcdefABC",
987
1046
  "title": "To disconnect a custom key store from its CloudHSM cluster"
988
1047
  }
989
1048
  ],
@@ -1025,6 +1084,7 @@
1025
1084
  },
1026
1085
  "output": {
1027
1086
  "CiphertextBlob": "<binary data>",
1087
+ "EncryptionAlgorithm": "SYMMETRIC_DEFAULT",
1028
1088
  "KeyId": "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab"
1029
1089
  },
1030
1090
  "comments": {
@@ -1034,12 +1094,40 @@
1034
1094
  },
1035
1095
  "output": {
1036
1096
  "CiphertextBlob": "The encrypted data (ciphertext).",
1097
+ "EncryptionAlgorithm": "The encryption algorithm that was used in the operation. For symmetric encryption keys, the encryption algorithm is always SYMMETRIC_DEFAULT.",
1098
+ "KeyId": "The ARN of the KMS key that was used to encrypt the data."
1099
+ }
1100
+ },
1101
+ "description": "The following example encrypts data with the specified symmetric encryption KMS key.",
1102
+ "id": "to-encrypt-data-1",
1103
+ "title": "To encrypt data with a symmetric encryption KMS key"
1104
+ },
1105
+ {
1106
+ "input": {
1107
+ "EncryptionAlgorithm": "RSAES_OAEP_SHA_256",
1108
+ "KeyId": "0987dcba-09fe-87dc-65ba-ab0987654321",
1109
+ "Plaintext": "<binary data>"
1110
+ },
1111
+ "output": {
1112
+ "CiphertextBlob": "<binary data>",
1113
+ "EncryptionAlgorithm": "RSAES_OAEP_SHA_256",
1114
+ "KeyId": "arn:aws:kms:us-west-2:111122223333:key/0987dcba-09fe-87dc-65ba-ab0987654321"
1115
+ },
1116
+ "comments": {
1117
+ "input": {
1118
+ "EncryptionAlgorithm": "The encryption algorithm to use in the operation.",
1119
+ "KeyId": "The identifier of the KMS key to use for encryption. You can use the key ID or Amazon Resource Name (ARN) of the KMS key, or the name or ARN of an alias that refers to the KMS key.",
1120
+ "Plaintext": "The data to encrypt."
1121
+ },
1122
+ "output": {
1123
+ "CiphertextBlob": "The encrypted data (ciphertext).",
1124
+ "EncryptionAlgorithm": "The encryption algorithm that was used in the operation.",
1037
1125
  "KeyId": "The ARN of the KMS key that was used to encrypt the data."
1038
1126
  }
1039
1127
  },
1040
- "description": "The following example encrypts data with the specified KMS key.",
1041
- "id": "to-encrypt-data-1478906026012",
1042
- "title": "To encrypt data"
1128
+ "description": "The following example encrypts data with the specified RSA asymmetric KMS key. When you encrypt with an asymmetric key, you must specify the encryption algorithm.",
1129
+ "id": "to-encrypt-data-2",
1130
+ "title": "To encrypt data with an asymmetric encryption KMS key"
1043
1131
  }
1044
1132
  ],
1045
1133
  "GenerateDataKey": [
@@ -1065,8 +1153,40 @@
1065
1153
  }
1066
1154
  },
1067
1155
  "description": "The following example generates a 256-bit symmetric data encryption key (data key) in two formats. One is the unencrypted (plainext) data key, and the other is the data key encrypted with the specified KMS key.",
1068
- "id": "to-generate-a-data-key-1478912956062",
1156
+ "id": "to-generate-a-data-key-1",
1069
1157
  "title": "To generate a data key"
1158
+ },
1159
+ {
1160
+ "input": {
1161
+ "KeyId": "arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab",
1162
+ "KeySpec": "AES_256",
1163
+ "Recipient": {
1164
+ "AttestationDocument": "<attestation document>",
1165
+ "KeyEncryptionAlgorithm": "RSAES_OAEP_SHA_256"
1166
+ }
1167
+ },
1168
+ "output": {
1169
+ "CiphertextBlob": "<binary data>",
1170
+ "CiphertextForRecipient": "<binary data>",
1171
+ "KeyId": "arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab",
1172
+ "Plaintext": ""
1173
+ },
1174
+ "comments": {
1175
+ "input": {
1176
+ "KeyId": "Identifies the KMS key used to encrypt the encrypted data key (CiphertextBlob)",
1177
+ "KeySpec": "Specifies the type of data key to return",
1178
+ "Recipient": "Specifies the attestation document from the Nitro enclave and the encryption algorithm to use with the public key from the attestation document"
1179
+ },
1180
+ "output": {
1181
+ "CiphertextBlob": "The data key encrypted by the specified KMS key",
1182
+ "CiphertextForRecipient": "The plaintext data key encrypted by the public key from the attestation document",
1183
+ "KeyId": "The KMS key used to encrypt the CiphertextBlob (encrypted data key)",
1184
+ "Plaintext": "This field is null or empty"
1185
+ }
1186
+ },
1187
+ "description": "The following example includes the Recipient parameter with a signed attestation document from an AWS Nitro enclave. Instead of returning a copy of the data key encrypted by the KMS key and a plaintext copy of the data key, GenerateDataKey returns one copy of the data key encrypted by the KMS key (CiphertextBlob) and one copy of the data key encrypted by the public key from the attestation document (CiphertextForRecipient). The operation doesn't return a plaintext data key. ",
1188
+ "id": "to-generate-a-data-key-for-a-nitro-enclave-2",
1189
+ "title": "To generate a data key pair for a Nitro enclave"
1070
1190
  }
1071
1191
  ],
1072
1192
  "GenerateDataKeyPair": [
@@ -1096,8 +1216,44 @@
1096
1216
  }
1097
1217
  },
1098
1218
  "description": "This example generates an RSA data key pair for encryption and decryption. The operation returns a plaintext public key and private key, and a copy of the private key that is encrypted under a symmetric encryption KMS key that you specify.",
1099
- "id": "to-generate-an-rsa-key-pair-for-encryption-and-decryption-1628619376878",
1219
+ "id": "to-generate-an-rsa-key-pair-for-encryption-and-decryption-1",
1100
1220
  "title": "To generate an RSA key pair for encryption and decryption"
1221
+ },
1222
+ {
1223
+ "input": {
1224
+ "KeyId": "arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab",
1225
+ "KeyPairSpec": "RSA_3072",
1226
+ "Recipient": {
1227
+ "AttestationDocument": "<attestation document>",
1228
+ "KeyEncryptionAlgorithm": "RSAES_OAEP_SHA_256"
1229
+ }
1230
+ },
1231
+ "output": {
1232
+ "CiphertextForRecipient": "<binary data>",
1233
+ "KeyId": "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab",
1234
+ "KeyPairSpec": "RSA_3072",
1235
+ "PrivateKeyCiphertextBlob": "<binary data>",
1236
+ "PrivateKeyPlaintext": "",
1237
+ "PublicKey": "<binary data>"
1238
+ },
1239
+ "comments": {
1240
+ "input": {
1241
+ "KeyId": "The key ID of the symmetric encryption KMS key that encrypts the private RSA key in the data key pair.",
1242
+ "KeyPairSpec": "The requested key spec of the RSA data key pair.",
1243
+ "Recipient": "Specifies the attestation document from the Nitro enclave and the encryption algorithm to use with the public key from the attestation document."
1244
+ },
1245
+ "output": {
1246
+ "CiphertextForRecipient": "The private key of the RSA data key pair encrypted by the public key from the attestation document",
1247
+ "KeyId": "The key ARN of the symmetric encryption KMS key that was used to encrypt the PrivateKeyCiphertextBlob.",
1248
+ "KeyPairSpec": "The actual key spec of the RSA data key pair.",
1249
+ "PrivateKeyCiphertextBlob": "The private key of the RSA data key pair encrypted by the KMS key.",
1250
+ "PrivateKeyPlaintext": "This field is null or empty",
1251
+ "PublicKey": "The public key (plaintext) of the RSA data key pair."
1252
+ }
1253
+ },
1254
+ "description": "The following example includes the Recipient parameter with a signed attestation document from an AWS Nitro enclave. Instead of returning a plaintext copy of the private data key, GenerateDataKeyPair returns a copy of the private data key encrypted by the public key from the attestation document (CiphertextForRecipient). It returns the public data key (PublicKey) and a copy of private data key encrypted under the specified KMS key (PrivateKeyCiphertextBlob), as usual, but plaintext private data key field (PrivateKeyPlaintext) is null or empty. ",
1255
+ "id": "to-generate-a-data-key-pair-for-a-nitro-enclave-2",
1256
+ "title": "To generate a data key pair for a Nitro enclave"
1101
1257
  }
1102
1258
  ],
1103
1259
  "GenerateDataKeyPairWithoutPlaintext": [
@@ -1200,7 +1356,33 @@
1200
1356
  }
1201
1357
  },
1202
1358
  "description": "The following example generates 32 bytes of random data.",
1203
- "id": "to-generate-random-data-1479163645600",
1359
+ "id": "to-generate-random-data-1",
1360
+ "title": "To generate random data"
1361
+ },
1362
+ {
1363
+ "input": {
1364
+ "NumberOfBytes": 1024,
1365
+ "Recipient": {
1366
+ "AttestationDocument": "<attestation document>",
1367
+ "KeyEncryptionAlgorithm": "RSAES_OAEP_SHA_256"
1368
+ }
1369
+ },
1370
+ "output": {
1371
+ "CiphertextForRecipient": "<binary data>",
1372
+ "Plaintext": ""
1373
+ },
1374
+ "comments": {
1375
+ "input": {
1376
+ "NumberOfBytes": "The length of the random byte string",
1377
+ "Recipient": "Specifies the attestation document from the Nitro enclave and the encryption algorithm to use with the public key from the attestation document"
1378
+ },
1379
+ "output": {
1380
+ "CiphertextForRecipient": "The random data encrypted under the public key from the attestation document",
1381
+ "Plaintext": "This field is null or empty"
1382
+ }
1383
+ },
1384
+ "description": "The following example includes the Recipient parameter with a signed attestation document from an AWS Nitro enclave. Instead of returning a plaintext (unencrypted) byte string, GenerateRandom returns the byte string encrypted by the public key from the enclave's attestation document.",
1385
+ "id": "to-generate-random-data-2",
1204
1386
  "title": "To generate random data"
1205
1387
  }
1206
1388
  ],
@@ -1932,7 +2114,7 @@
1932
2114
  },
1933
2115
  {
1934
2116
  "input": {
1935
- "CloudHsmClusterId": "cluster-1a23b4cdefg",
2117
+ "CloudHsmClusterId": "cluster-234abcdefABC",
1936
2118
  "CustomKeyStoreId": "cks-1234567890abcdef0"
1937
2119
  },
1938
2120
  "output": {