aws-sdk 2.1368.0 → 2.1369.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +6 -1
- package/README.md +1 -1
- package/apis/compute-optimizer-2019-11-01.min.json +60 -21
- package/apis/kms-2014-11-01.examples.json +197 -15
- package/apis/kms-2014-11-01.min.json +52 -19
- package/clients/computeoptimizer.d.ts +58 -14
- package/clients/kms.d.ts +76 -32
- package/dist/aws-sdk-core-react-native.js +10 -1
- package/dist/aws-sdk-react-native.js +14 -6
- package/dist/aws-sdk.js +66 -25
- package/dist/aws-sdk.min.js +43 -43
- package/lib/core.js +1 -1
- package/lib/protocol/json.js +9 -0
- package/lib/services/sqs.js +2 -3
- package/package.json +1 -1
    
        package/CHANGELOG.md
    CHANGED
    
    | @@ -1,7 +1,12 @@ | |
| 1 1 | 
             
            # Changelog for AWS SDK for JavaScript
         | 
| 2 | 
            -
            <!--LATEST=2. | 
| 2 | 
            +
            <!--LATEST=2.1369.0-->
         | 
| 3 3 | 
             
            <!--ENTRYINSERT-->
         | 
| 4 4 |  | 
| 5 | 
            +
            ## 2.1369.0
         | 
| 6 | 
            +
            * bugfix: SQS: add queryCompatibility fix to JSON protocol
         | 
| 7 | 
            +
            * feature: ComputeOptimizer: support for tag filtering within compute optimizer. ability to filter recommendation results by tag and tag key value pairs. ability to filter by inferred workload type added.
         | 
| 8 | 
            +
            * feature: KMS: This release makes the NitroEnclave request parameter Recipient and the response field for CiphertextForRecipient available in AWS SDKs. It also adds the regex pattern for CloudHsmClusterId validation.
         | 
| 9 | 
            +
             | 
| 5 10 | 
             
            ## 2.1368.0
         | 
| 6 11 | 
             
            * feature: Appflow: Adds Jwt Support for Salesforce Credentials.
         | 
| 7 12 | 
             
            * feature: Athena: You can now use capacity reservations on Amazon Athena to run SQL queries on fully-managed compute capacity.
         | 
    
        package/README.md
    CHANGED
    
    | @@ -72,7 +72,7 @@ require('aws-sdk/lib/maintenance_mode_message').suppress = true; | |
| 72 72 | 
             
            To use the SDK in the browser, simply add the following script tag to your
         | 
| 73 73 | 
             
            HTML pages:
         | 
| 74 74 |  | 
| 75 | 
            -
                <script src="https://sdk.amazonaws.com/js/aws-sdk-2. | 
| 75 | 
            +
                <script src="https://sdk.amazonaws.com/js/aws-sdk-2.1369.0.min.js"></script>
         | 
| 76 76 |  | 
| 77 77 | 
             
            You can also build a custom browser SDK with your specified set of AWS services.
         | 
| 78 78 | 
             
            This can allow you to reduce the SDK's size, specify different API versions of
         | 
| @@ -443,7 +443,10 @@ | |
| 443 443 | 
             
                            "lastRefreshTimestamp": {
         | 
| 444 444 | 
             
                              "type": "timestamp"
         | 
| 445 445 | 
             
                            },
         | 
| 446 | 
            -
                            "currentPerformanceRisk": {}
         | 
| 446 | 
            +
                            "currentPerformanceRisk": {},
         | 
| 447 | 
            +
                            "tags": {
         | 
| 448 | 
            +
                              "shape": "S3s"
         | 
| 449 | 
            +
                            }
         | 
| 447 450 | 
             
                          }
         | 
| 448 451 | 
             
                        }
         | 
| 449 452 | 
             
                      },
         | 
| @@ -546,7 +549,10 @@ | |
| 546 549 | 
             
                            "inferredWorkloadTypes": {
         | 
| 547 550 | 
             
                              "shape": "S31"
         | 
| 548 551 | 
             
                            },
         | 
| 549 | 
            -
                            "instanceState": {}
         | 
| 552 | 
            +
                            "instanceState": {},
         | 
| 553 | 
            +
                            "tags": {
         | 
| 554 | 
            +
                              "shape": "S3s"
         | 
| 555 | 
            +
                            }
         | 
| 550 556 | 
             
                          }
         | 
| 551 557 | 
             
                        }
         | 
| 552 558 | 
             
                      },
         | 
| @@ -602,10 +608,10 @@ | |
| 602 608 | 
             
                                "members": {
         | 
| 603 609 | 
             
                                  "name": {},
         | 
| 604 610 | 
             
                                  "timestamps": {
         | 
| 605 | 
            -
                                    "shape": " | 
| 611 | 
            +
                                    "shape": "S4o"
         | 
| 606 612 | 
             
                                  },
         | 
| 607 613 | 
             
                                  "values": {
         | 
| 608 | 
            -
                                    "shape": " | 
| 614 | 
            +
                                    "shape": "S4p"
         | 
| 609 615 | 
             
                                  }
         | 
| 610 616 | 
             
                                }
         | 
| 611 617 | 
             
                              }
         | 
| @@ -661,13 +667,13 @@ | |
| 661 667 | 
             
                                "members": {
         | 
| 662 668 | 
             
                                  "name": {},
         | 
| 663 669 | 
             
                                  "timestamps": {
         | 
| 664 | 
            -
                                    "shape": " | 
| 670 | 
            +
                                    "shape": "S4o"
         | 
| 665 671 | 
             
                                  },
         | 
| 666 672 | 
             
                                  "upperBoundValues": {
         | 
| 667 | 
            -
                                    "shape": " | 
| 673 | 
            +
                                    "shape": "S4p"
         | 
| 668 674 | 
             
                                  },
         | 
| 669 675 | 
             
                                  "lowerBoundValues": {
         | 
| 670 | 
            -
                                    "shape": " | 
| 676 | 
            +
                                    "shape": "S4p"
         | 
| 671 677 | 
             
                                  }
         | 
| 672 678 | 
             
                                }
         | 
| 673 679 | 
             
                              }
         | 
| @@ -725,7 +731,7 @@ | |
| 725 731 | 
             
                                    "members": {
         | 
| 726 732 | 
             
                                      "containerName": {},
         | 
| 727 733 | 
             
                                      "memorySizeConfiguration": {
         | 
| 728 | 
            -
                                        "shape": " | 
| 734 | 
            +
                                        "shape": "S5b"
         | 
| 729 735 | 
             
                                      },
         | 
| 730 736 | 
             
                                      "cpu": {
         | 
| 731 737 | 
             
                                        "type": "integer"
         | 
| @@ -799,7 +805,7 @@ | |
| 799 805 | 
             
                                      "members": {
         | 
| 800 806 | 
             
                                        "containerName": {},
         | 
| 801 807 | 
             
                                        "memorySizeConfiguration": {
         | 
| 802 | 
            -
                                          "shape": " | 
| 808 | 
            +
                                          "shape": "S5b"
         | 
| 803 809 | 
             
                                        },
         | 
| 804 810 | 
             
                                        "cpu": {
         | 
| 805 811 | 
             
                                          "type": "integer"
         | 
| @@ -810,7 +816,10 @@ | |
| 810 816 | 
             
                                }
         | 
| 811 817 | 
             
                              }
         | 
| 812 818 | 
             
                            },
         | 
| 813 | 
            -
                            "currentPerformanceRisk": {}
         | 
| 819 | 
            +
                            "currentPerformanceRisk": {},
         | 
| 820 | 
            +
                            "tags": {
         | 
| 821 | 
            +
                              "shape": "S3s"
         | 
| 822 | 
            +
                            }
         | 
| 814 823 | 
             
                          }
         | 
| 815 824 | 
             
                        }
         | 
| 816 825 | 
             
                      },
         | 
| @@ -997,7 +1006,10 @@ | |
| 997 1006 | 
             
                                }
         | 
| 998 1007 | 
             
                              }
         | 
| 999 1008 | 
             
                            },
         | 
| 1000 | 
            -
                            "currentPerformanceRisk": {}
         | 
| 1009 | 
            +
                            "currentPerformanceRisk": {},
         | 
| 1010 | 
            +
                            "tags": {
         | 
| 1011 | 
            +
                              "shape": "S3s"
         | 
| 1012 | 
            +
                            }
         | 
| 1001 1013 | 
             
                          }
         | 
| 1002 1014 | 
             
                        }
         | 
| 1003 1015 | 
             
                      }
         | 
| @@ -1112,6 +1124,20 @@ | |
| 1112 1124 | 
             
                                  "type": "long"
         | 
| 1113 1125 | 
             
                                }
         | 
| 1114 1126 | 
             
                              }
         | 
| 1127 | 
            +
                            },
         | 
| 1128 | 
            +
                            "inferredWorkloadSavings": {
         | 
| 1129 | 
            +
                              "type": "list",
         | 
| 1130 | 
            +
                              "member": {
         | 
| 1131 | 
            +
                                "type": "structure",
         | 
| 1132 | 
            +
                                "members": {
         | 
| 1133 | 
            +
                                  "inferredWorkloadTypes": {
         | 
| 1134 | 
            +
                                    "shape": "S31"
         | 
| 1135 | 
            +
                                  },
         | 
| 1136 | 
            +
                                  "estimatedMonthlySavings": {
         | 
| 1137 | 
            +
                                    "shape": "S2q"
         | 
| 1138 | 
            +
                                  }
         | 
| 1139 | 
            +
                                }
         | 
| 1140 | 
            +
                              }
         | 
| 1115 1141 | 
             
                            }
         | 
| 1116 1142 | 
             
                          }
         | 
| 1117 1143 | 
             
                        }
         | 
| @@ -1299,13 +1325,16 @@ | |
| 1299 1325 | 
             
                      "type": "double"
         | 
| 1300 1326 | 
             
                    },
         | 
| 1301 1327 | 
             
                    "estimatedMonthlySavings": {
         | 
| 1302 | 
            -
                      " | 
| 1303 | 
            -
             | 
| 1304 | 
            -
             | 
| 1305 | 
            -
             | 
| 1306 | 
            -
             | 
| 1307 | 
            -
             | 
| 1308 | 
            -
             | 
| 1328 | 
            +
                      "shape": "S2q"
         | 
| 1329 | 
            +
                    }
         | 
| 1330 | 
            +
                  }
         | 
| 1331 | 
            +
                },
         | 
| 1332 | 
            +
                "S2q": {
         | 
| 1333 | 
            +
                  "type": "structure",
         | 
| 1334 | 
            +
                  "members": {
         | 
| 1335 | 
            +
                    "currency": {},
         | 
| 1336 | 
            +
                    "value": {
         | 
| 1337 | 
            +
                      "type": "double"
         | 
| 1309 1338 | 
             
                    }
         | 
| 1310 1339 | 
             
                  }
         | 
| 1311 1340 | 
             
                },
         | 
| @@ -1367,19 +1396,29 @@ | |
| 1367 1396 | 
             
                    }
         | 
| 1368 1397 | 
             
                  }
         | 
| 1369 1398 | 
             
                },
         | 
| 1370 | 
            -
                " | 
| 1399 | 
            +
                "S3s": {
         | 
| 1400 | 
            +
                  "type": "list",
         | 
| 1401 | 
            +
                  "member": {
         | 
| 1402 | 
            +
                    "type": "structure",
         | 
| 1403 | 
            +
                    "members": {
         | 
| 1404 | 
            +
                      "key": {},
         | 
| 1405 | 
            +
                      "value": {}
         | 
| 1406 | 
            +
                    }
         | 
| 1407 | 
            +
                  }
         | 
| 1408 | 
            +
                },
         | 
| 1409 | 
            +
                "S4o": {
         | 
| 1371 1410 | 
             
                  "type": "list",
         | 
| 1372 1411 | 
             
                  "member": {
         | 
| 1373 1412 | 
             
                    "type": "timestamp"
         | 
| 1374 1413 | 
             
                  }
         | 
| 1375 1414 | 
             
                },
         | 
| 1376 | 
            -
                " | 
| 1415 | 
            +
                "S4p": {
         | 
| 1377 1416 | 
             
                  "type": "list",
         | 
| 1378 1417 | 
             
                  "member": {
         | 
| 1379 1418 | 
             
                    "type": "double"
         | 
| 1380 1419 | 
             
                  }
         | 
| 1381 1420 | 
             
                },
         | 
| 1382 | 
            -
                " | 
| 1421 | 
            +
                "S5b": {
         | 
| 1383 1422 | 
             
                  "type": "structure",
         | 
| 1384 1423 | 
             
                  "members": {
         | 
| 1385 1424 | 
             
                    "memory": {
         | 
| @@ -61,7 +61,7 @@ | |
| 61 61 | 
             
                "CreateCustomKeyStore": [
         | 
| 62 62 | 
             
                  {
         | 
| 63 63 | 
             
                    "input": {
         | 
| 64 | 
            -
                      "CloudHsmClusterId": "cluster- | 
| 64 | 
            +
                      "CloudHsmClusterId": "cluster-234abcdefABC",
         | 
| 65 65 | 
             
                      "CustomKeyStoreName": "ExampleKeyStore",
         | 
| 66 66 | 
             
                      "KeyStorePassword": "kmsPswd",
         | 
| 67 67 | 
             
                      "TrustAnchorCertificate": "<certificate-goes-here>"
         | 
| @@ -423,7 +423,7 @@ | |
| 423 423 | 
             
                      "KeyMetadata": {
         | 
| 424 424 | 
             
                        "AWSAccountId": "111122223333",
         | 
| 425 425 | 
             
                        "Arn": "arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab",
         | 
| 426 | 
            -
                        "CloudHsmClusterId": "cluster- | 
| 426 | 
            +
                        "CloudHsmClusterId": "cluster-234abcdefABC",
         | 
| 427 427 | 
             
                        "CreationDate": "2019-12-02T07:48:55-07:00",
         | 
| 428 428 | 
             
                        "CustomKeyStoreId": "cks-1234567890abcdef0",
         | 
| 429 429 | 
             
                        "CustomerMasterKeySpec": "SYMMETRIC_DEFAULT",
         | 
| @@ -506,6 +506,7 @@ | |
| 506 506 | 
             
                      "KeyId": "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab"
         | 
| 507 507 | 
             
                    },
         | 
| 508 508 | 
             
                    "output": {
         | 
| 509 | 
            +
                      "EncryptionAlgorithm": "SYMMETRIC_DEFAULT",
         | 
| 509 510 | 
             
                      "KeyId": "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab",
         | 
| 510 511 | 
             
                      "Plaintext": "<binary data>"
         | 
| 511 512 | 
             
                    },
         | 
| @@ -515,13 +516,71 @@ | |
| 515 516 | 
             
                        "KeyId": "A key identifier for the KMS key to use to decrypt the data."
         | 
| 516 517 | 
             
                      },
         | 
| 517 518 | 
             
                      "output": {
         | 
| 519 | 
            +
                        "EncryptionAlgorithm": "The encryption algorithm that was used to decrypt the ciphertext. SYMMETRIC_DEFAULT is the only valid value for symmetric encryption in AWS KMS.",
         | 
| 518 520 | 
             
                        "KeyId": "The Amazon Resource Name (ARN) of the KMS key that was used to decrypt the data.",
         | 
| 519 521 | 
             
                        "Plaintext": "The decrypted (plaintext) data."
         | 
| 520 522 | 
             
                      }
         | 
| 521 523 | 
             
                    },
         | 
| 522 | 
            -
                    "description": "The following example decrypts data that was encrypted with a KMS key.",
         | 
| 523 | 
            -
                    "id": "to-decrypt-data- | 
| 524 | 
            -
                    "title": "To decrypt data"
         | 
| 524 | 
            +
                    "description": "The following example decrypts data that was encrypted with a symmetric encryption KMS key. The KeyId is not required when decrypting with a symmetric encryption key, but it is a best practice.",
         | 
| 525 | 
            +
                    "id": "to-decrypt-data-1",
         | 
| 526 | 
            +
                    "title": "To decrypt data with a symmetric encryption KMS key"
         | 
| 527 | 
            +
                  },
         | 
| 528 | 
            +
                  {
         | 
| 529 | 
            +
                    "input": {
         | 
| 530 | 
            +
                      "CiphertextBlob": "<binary data>",
         | 
| 531 | 
            +
                      "EncryptionAlgorithm": "RSAES_OAEP_SHA_256",
         | 
| 532 | 
            +
                      "KeyId": "0987dcba-09fe-87dc-65ba-ab0987654321"
         | 
| 533 | 
            +
                    },
         | 
| 534 | 
            +
                    "output": {
         | 
| 535 | 
            +
                      "EncryptionAlgorithm": "RSAES_OAEP_SHA_256",
         | 
| 536 | 
            +
                      "KeyId": "arn:aws:kms:us-west-2:111122223333:key/0987dcba-09fe-87dc-65ba-ab0987654321",
         | 
| 537 | 
            +
                      "Plaintext": "<binary data>"
         | 
| 538 | 
            +
                    },
         | 
| 539 | 
            +
                    "comments": {
         | 
| 540 | 
            +
                      "input": {
         | 
| 541 | 
            +
                        "CiphertextBlob": "The encrypted data (ciphertext).",
         | 
| 542 | 
            +
                        "EncryptionAlgorithm": "The encryption algorithm that was used to encrypt the data. This parameter is required to decrypt with an asymmetric KMS key.",
         | 
| 543 | 
            +
                        "KeyId": "A key identifier for the KMS key to use to decrypt the data. This parameter is required to decrypt with an asymmetric KMS key."
         | 
| 544 | 
            +
                      },
         | 
| 545 | 
            +
                      "output": {
         | 
| 546 | 
            +
                        "EncryptionAlgorithm": "The encryption algorithm that was used to decrypt the ciphertext.",
         | 
| 547 | 
            +
                        "KeyId": "The Amazon Resource Name (ARN) of the KMS key that was used to decrypt the data.",
         | 
| 548 | 
            +
                        "Plaintext": "The decrypted (plaintext) data."
         | 
| 549 | 
            +
                      }
         | 
| 550 | 
            +
                    },
         | 
| 551 | 
            +
                    "description": "The following example decrypts data that was encrypted with an asymmetric encryption KMS key. When the KMS encryption key is asymmetric, you must specify the KMS key ID and the encryption algorithm that was used to encrypt the data.",
         | 
| 552 | 
            +
                    "id": "to-decrypt-data-2",
         | 
| 553 | 
            +
                    "title": "To decrypt data with an asymmetric encryption KMS key"
         | 
| 554 | 
            +
                  },
         | 
| 555 | 
            +
                  {
         | 
| 556 | 
            +
                    "input": {
         | 
| 557 | 
            +
                      "CiphertextBlob": "<binary data>",
         | 
| 558 | 
            +
                      "KeyId": "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab",
         | 
| 559 | 
            +
                      "Recipient": {
         | 
| 560 | 
            +
                        "AttestationDocument": "<attestation document>",
         | 
| 561 | 
            +
                        "KeyEncryptionAlgorithm": "RSAES_OAEP_SHA_256"
         | 
| 562 | 
            +
                      }
         | 
| 563 | 
            +
                    },
         | 
| 564 | 
            +
                    "output": {
         | 
| 565 | 
            +
                      "CiphertextForRecipient": "<binary data>",
         | 
| 566 | 
            +
                      "KeyId": "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab",
         | 
| 567 | 
            +
                      "Plaintext": ""
         | 
| 568 | 
            +
                    },
         | 
| 569 | 
            +
                    "comments": {
         | 
| 570 | 
            +
                      "input": {
         | 
| 571 | 
            +
                        "CiphertextBlob": "The encrypted data. This ciphertext was encrypted with the KMS key",
         | 
| 572 | 
            +
                        "KeyId": "The KMS key to use to decrypt the ciphertext",
         | 
| 573 | 
            +
                        "Recipient": "Specifies the attestation document from the Nitro enclave and the encryption algorithm to use with the public key from the attestation document"
         | 
| 574 | 
            +
                      },
         | 
| 575 | 
            +
                      "output": {
         | 
| 576 | 
            +
                        "CiphertextForRecipient": "The decrypted CiphertextBlob encrypted with the public key from the attestation document",
         | 
| 577 | 
            +
                        "KeyId": "The KMS key that was used to decrypt the encrypted data (CiphertextBlob)",
         | 
| 578 | 
            +
                        "Plaintext": "This field is null or empty"
         | 
| 579 | 
            +
                      }
         | 
| 580 | 
            +
                    },
         | 
| 581 | 
            +
                    "description": "The following Decrypt example includes the Recipient parameter with a signed attestation document from an AWS Nitro enclave. Instead of returning the decrypted data in plaintext (Plaintext), the operation returns the decrypted data encrypted by the public key from the attestation document (CiphertextForRecipient).",
         | 
| 582 | 
            +
                    "id": "to-decrypt-data-for-a-nitro-enclave-2",
         | 
| 583 | 
            +
                    "title": "To decrypt data for a Nitro enclave"
         | 
| 525 584 | 
             
                  }
         | 
| 526 585 | 
             
                ],
         | 
| 527 586 | 
             
                "DeleteAlias": [
         | 
| @@ -600,7 +659,7 @@ | |
| 600 659 | 
             
                    "output": {
         | 
| 601 660 | 
             
                      "CustomKeyStores": [
         | 
| 602 661 | 
             
                        {
         | 
| 603 | 
            -
                          "CloudHsmClusterId": "cluster- | 
| 662 | 
            +
                          "CloudHsmClusterId": "cluster-234abcdefABC",
         | 
| 604 663 | 
             
                          "ConnectionState": "CONNECTED",
         | 
| 605 664 | 
             
                          "CreationDate": "1.499288695918E9",
         | 
| 606 665 | 
             
                          "CustomKeyStoreId": "cks-1234567890abcdef0",
         | 
| @@ -867,7 +926,7 @@ | |
| 867 926 | 
             
                      "KeyMetadata": {
         | 
| 868 927 | 
             
                        "AWSAccountId": "123456789012",
         | 
| 869 928 | 
             
                        "Arn": "arn:aws:kms:us-west-2:123456789012:key/1234abcd-12ab-34cd-56ef-1234567890ab",
         | 
| 870 | 
            -
                        "CloudHsmClusterId": "cluster- | 
| 929 | 
            +
                        "CloudHsmClusterId": "cluster-234abcdefABC",
         | 
| 871 930 | 
             
                        "CreationDate": 1646160362.664,
         | 
| 872 931 | 
             
                        "CustomKeyStoreId": "cks-1234567890abcdef0",
         | 
| 873 932 | 
             
                        "CustomerMasterKeySpec": "SYMMETRIC_DEFAULT",
         | 
| @@ -983,7 +1042,7 @@ | |
| 983 1042 | 
             
                      }
         | 
| 984 1043 | 
             
                    },
         | 
| 985 1044 | 
             
                    "description": "This example disconnects an AWS KMS custom key store from its backing key store. For an AWS CloudHSM key store, it disconnects the key store from its AWS CloudHSM cluster. For an external key store, it disconnects the key store from the external key store proxy that communicates with your external key manager. This operation doesn't return any data. To verify that the custom key store is disconnected, use the <code>DescribeCustomKeyStores</code> operation.",
         | 
| 986 | 
            -
                    "id": "to-disconnect-a-custom-key-store-from-its-cloudhsm-cluster- | 
| 1045 | 
            +
                    "id": "to-disconnect-a-custom-key-store-from-its-cloudhsm-cluster-234abcdefABC",
         | 
| 987 1046 | 
             
                    "title": "To disconnect a custom key store from its CloudHSM cluster"
         | 
| 988 1047 | 
             
                  }
         | 
| 989 1048 | 
             
                ],
         | 
| @@ -1025,6 +1084,7 @@ | |
| 1025 1084 | 
             
                    },
         | 
| 1026 1085 | 
             
                    "output": {
         | 
| 1027 1086 | 
             
                      "CiphertextBlob": "<binary data>",
         | 
| 1087 | 
            +
                      "EncryptionAlgorithm": "SYMMETRIC_DEFAULT",
         | 
| 1028 1088 | 
             
                      "KeyId": "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab"
         | 
| 1029 1089 | 
             
                    },
         | 
| 1030 1090 | 
             
                    "comments": {
         | 
| @@ -1034,12 +1094,40 @@ | |
| 1034 1094 | 
             
                      },
         | 
| 1035 1095 | 
             
                      "output": {
         | 
| 1036 1096 | 
             
                        "CiphertextBlob": "The encrypted data (ciphertext).",
         | 
| 1097 | 
            +
                        "EncryptionAlgorithm": "The encryption algorithm that was used in the operation. For symmetric encryption keys, the encryption algorithm is always SYMMETRIC_DEFAULT.",
         | 
| 1098 | 
            +
                        "KeyId": "The ARN of the KMS key that was used to encrypt the data."
         | 
| 1099 | 
            +
                      }
         | 
| 1100 | 
            +
                    },
         | 
| 1101 | 
            +
                    "description": "The following example encrypts data with the specified symmetric encryption KMS key.",
         | 
| 1102 | 
            +
                    "id": "to-encrypt-data-1",
         | 
| 1103 | 
            +
                    "title": "To encrypt data with a symmetric encryption KMS key"
         | 
| 1104 | 
            +
                  },
         | 
| 1105 | 
            +
                  {
         | 
| 1106 | 
            +
                    "input": {
         | 
| 1107 | 
            +
                      "EncryptionAlgorithm": "RSAES_OAEP_SHA_256",
         | 
| 1108 | 
            +
                      "KeyId": "0987dcba-09fe-87dc-65ba-ab0987654321",
         | 
| 1109 | 
            +
                      "Plaintext": "<binary data>"
         | 
| 1110 | 
            +
                    },
         | 
| 1111 | 
            +
                    "output": {
         | 
| 1112 | 
            +
                      "CiphertextBlob": "<binary data>",
         | 
| 1113 | 
            +
                      "EncryptionAlgorithm": "RSAES_OAEP_SHA_256",
         | 
| 1114 | 
            +
                      "KeyId": "arn:aws:kms:us-west-2:111122223333:key/0987dcba-09fe-87dc-65ba-ab0987654321"
         | 
| 1115 | 
            +
                    },
         | 
| 1116 | 
            +
                    "comments": {
         | 
| 1117 | 
            +
                      "input": {
         | 
| 1118 | 
            +
                        "EncryptionAlgorithm": "The encryption algorithm to use in the operation.",
         | 
| 1119 | 
            +
                        "KeyId": "The identifier of the KMS key to use for encryption. You can use the key ID or Amazon Resource Name (ARN) of the KMS key, or the name or ARN of an alias that refers to the KMS key.",
         | 
| 1120 | 
            +
                        "Plaintext": "The data to encrypt."
         | 
| 1121 | 
            +
                      },
         | 
| 1122 | 
            +
                      "output": {
         | 
| 1123 | 
            +
                        "CiphertextBlob": "The encrypted data (ciphertext).",
         | 
| 1124 | 
            +
                        "EncryptionAlgorithm": "The encryption algorithm that was used in the operation.",
         | 
| 1037 1125 | 
             
                        "KeyId": "The ARN of the KMS key that was used to encrypt the data."
         | 
| 1038 1126 | 
             
                      }
         | 
| 1039 1127 | 
             
                    },
         | 
| 1040 | 
            -
                    "description": "The following example encrypts data with the specified KMS key.",
         | 
| 1041 | 
            -
                    "id": "to-encrypt-data- | 
| 1042 | 
            -
                    "title": "To encrypt data"
         | 
| 1128 | 
            +
                    "description": "The following example encrypts data with the specified RSA asymmetric KMS key. When you encrypt with an asymmetric key, you must specify the encryption algorithm.",
         | 
| 1129 | 
            +
                    "id": "to-encrypt-data-2",
         | 
| 1130 | 
            +
                    "title": "To encrypt data with an asymmetric encryption KMS key"
         | 
| 1043 1131 | 
             
                  }
         | 
| 1044 1132 | 
             
                ],
         | 
| 1045 1133 | 
             
                "GenerateDataKey": [
         | 
| @@ -1065,8 +1153,40 @@ | |
| 1065 1153 | 
             
                      }
         | 
| 1066 1154 | 
             
                    },
         | 
| 1067 1155 | 
             
                    "description": "The following example generates a 256-bit symmetric data encryption key (data key) in two formats. One is the unencrypted (plainext) data key, and the other is the data key encrypted with the specified KMS key.",
         | 
| 1068 | 
            -
                    "id": "to-generate-a-data-key- | 
| 1156 | 
            +
                    "id": "to-generate-a-data-key-1",
         | 
| 1069 1157 | 
             
                    "title": "To generate a data key"
         | 
| 1158 | 
            +
                  },
         | 
| 1159 | 
            +
                  {
         | 
| 1160 | 
            +
                    "input": {
         | 
| 1161 | 
            +
                      "KeyId": "arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab",
         | 
| 1162 | 
            +
                      "KeySpec": "AES_256",
         | 
| 1163 | 
            +
                      "Recipient": {
         | 
| 1164 | 
            +
                        "AttestationDocument": "<attestation document>",
         | 
| 1165 | 
            +
                        "KeyEncryptionAlgorithm": "RSAES_OAEP_SHA_256"
         | 
| 1166 | 
            +
                      }
         | 
| 1167 | 
            +
                    },
         | 
| 1168 | 
            +
                    "output": {
         | 
| 1169 | 
            +
                      "CiphertextBlob": "<binary data>",
         | 
| 1170 | 
            +
                      "CiphertextForRecipient": "<binary data>",
         | 
| 1171 | 
            +
                      "KeyId": "arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab",
         | 
| 1172 | 
            +
                      "Plaintext": ""
         | 
| 1173 | 
            +
                    },
         | 
| 1174 | 
            +
                    "comments": {
         | 
| 1175 | 
            +
                      "input": {
         | 
| 1176 | 
            +
                        "KeyId": "Identifies the KMS key used to encrypt the encrypted data key (CiphertextBlob)",
         | 
| 1177 | 
            +
                        "KeySpec": "Specifies the type of data key to return",
         | 
| 1178 | 
            +
                        "Recipient": "Specifies the attestation document from the Nitro enclave and the encryption algorithm to use with the public key from the attestation document"
         | 
| 1179 | 
            +
                      },
         | 
| 1180 | 
            +
                      "output": {
         | 
| 1181 | 
            +
                        "CiphertextBlob": "The data key encrypted by the specified KMS key",
         | 
| 1182 | 
            +
                        "CiphertextForRecipient": "The plaintext data key encrypted by the public key from the attestation document",
         | 
| 1183 | 
            +
                        "KeyId": "The KMS key used to encrypt the CiphertextBlob (encrypted data key)",
         | 
| 1184 | 
            +
                        "Plaintext": "This field is null or empty"
         | 
| 1185 | 
            +
                      }
         | 
| 1186 | 
            +
                    },
         | 
| 1187 | 
            +
                    "description": "The following example includes the Recipient parameter with a signed attestation document from an AWS Nitro enclave. Instead of returning a copy of the data key encrypted by the KMS key and a plaintext copy of the data key, GenerateDataKey returns one copy of the data key encrypted by the KMS key (CiphertextBlob) and one copy of the data key encrypted by the public key from the attestation document (CiphertextForRecipient). The operation doesn't return a plaintext data key. ",
         | 
| 1188 | 
            +
                    "id": "to-generate-a-data-key-for-a-nitro-enclave-2",
         | 
| 1189 | 
            +
                    "title": "To generate a data key pair for a Nitro enclave"
         | 
| 1070 1190 | 
             
                  }
         | 
| 1071 1191 | 
             
                ],
         | 
| 1072 1192 | 
             
                "GenerateDataKeyPair": [
         | 
| @@ -1096,8 +1216,44 @@ | |
| 1096 1216 | 
             
                      }
         | 
| 1097 1217 | 
             
                    },
         | 
| 1098 1218 | 
             
                    "description": "This example generates an RSA data key pair for encryption and decryption. The operation returns a plaintext public key and private key, and a copy of the private key that is encrypted under a symmetric encryption KMS key that you specify.",
         | 
| 1099 | 
            -
                    "id": "to-generate-an-rsa-key-pair-for-encryption-and-decryption- | 
| 1219 | 
            +
                    "id": "to-generate-an-rsa-key-pair-for-encryption-and-decryption-1",
         | 
| 1100 1220 | 
             
                    "title": "To generate an RSA key pair for encryption and decryption"
         | 
| 1221 | 
            +
                  },
         | 
| 1222 | 
            +
                  {
         | 
| 1223 | 
            +
                    "input": {
         | 
| 1224 | 
            +
                      "KeyId": "arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab",
         | 
| 1225 | 
            +
                      "KeyPairSpec": "RSA_3072",
         | 
| 1226 | 
            +
                      "Recipient": {
         | 
| 1227 | 
            +
                        "AttestationDocument": "<attestation document>",
         | 
| 1228 | 
            +
                        "KeyEncryptionAlgorithm": "RSAES_OAEP_SHA_256"
         | 
| 1229 | 
            +
                      }
         | 
| 1230 | 
            +
                    },
         | 
| 1231 | 
            +
                    "output": {
         | 
| 1232 | 
            +
                      "CiphertextForRecipient": "<binary data>",
         | 
| 1233 | 
            +
                      "KeyId": "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab",
         | 
| 1234 | 
            +
                      "KeyPairSpec": "RSA_3072",
         | 
| 1235 | 
            +
                      "PrivateKeyCiphertextBlob": "<binary data>",
         | 
| 1236 | 
            +
                      "PrivateKeyPlaintext": "",
         | 
| 1237 | 
            +
                      "PublicKey": "<binary data>"
         | 
| 1238 | 
            +
                    },
         | 
| 1239 | 
            +
                    "comments": {
         | 
| 1240 | 
            +
                      "input": {
         | 
| 1241 | 
            +
                        "KeyId": "The key ID of the symmetric encryption KMS key that encrypts the private RSA key in the data key pair.",
         | 
| 1242 | 
            +
                        "KeyPairSpec": "The requested key spec of the RSA data key pair.",
         | 
| 1243 | 
            +
                        "Recipient": "Specifies the attestation document from the Nitro enclave and the encryption algorithm to use with the public key from the attestation document."
         | 
| 1244 | 
            +
                      },
         | 
| 1245 | 
            +
                      "output": {
         | 
| 1246 | 
            +
                        "CiphertextForRecipient": "The private key of the RSA data key pair encrypted by the public key from the attestation document",
         | 
| 1247 | 
            +
                        "KeyId": "The key ARN of the symmetric encryption KMS key that was used to encrypt the PrivateKeyCiphertextBlob.",
         | 
| 1248 | 
            +
                        "KeyPairSpec": "The actual key spec of the RSA data key pair.",
         | 
| 1249 | 
            +
                        "PrivateKeyCiphertextBlob": "The private key of the RSA data key pair encrypted by the KMS key.",
         | 
| 1250 | 
            +
                        "PrivateKeyPlaintext": "This field is null or empty",
         | 
| 1251 | 
            +
                        "PublicKey": "The public key (plaintext) of the RSA data key pair."
         | 
| 1252 | 
            +
                      }
         | 
| 1253 | 
            +
                    },
         | 
| 1254 | 
            +
                    "description": "The following example includes the Recipient parameter with a signed attestation document from an AWS Nitro enclave. Instead of returning a plaintext copy of the private data key, GenerateDataKeyPair returns a copy of the private data key encrypted by the public key from the attestation document (CiphertextForRecipient). It returns the public data key (PublicKey) and a copy of private data key encrypted under the specified KMS key (PrivateKeyCiphertextBlob), as usual, but plaintext private data key field (PrivateKeyPlaintext) is null or empty. ",
         | 
| 1255 | 
            +
                    "id": "to-generate-a-data-key-pair-for-a-nitro-enclave-2",
         | 
| 1256 | 
            +
                    "title": "To generate a data key pair for a Nitro enclave"
         | 
| 1101 1257 | 
             
                  }
         | 
| 1102 1258 | 
             
                ],
         | 
| 1103 1259 | 
             
                "GenerateDataKeyPairWithoutPlaintext": [
         | 
| @@ -1200,7 +1356,33 @@ | |
| 1200 1356 | 
             
                      }
         | 
| 1201 1357 | 
             
                    },
         | 
| 1202 1358 | 
             
                    "description": "The following example generates 32 bytes of random data.",
         | 
| 1203 | 
            -
                    "id": "to-generate-random-data- | 
| 1359 | 
            +
                    "id": "to-generate-random-data-1",
         | 
| 1360 | 
            +
                    "title": "To generate random data"
         | 
| 1361 | 
            +
                  },
         | 
| 1362 | 
            +
                  {
         | 
| 1363 | 
            +
                    "input": {
         | 
| 1364 | 
            +
                      "NumberOfBytes": 1024,
         | 
| 1365 | 
            +
                      "Recipient": {
         | 
| 1366 | 
            +
                        "AttestationDocument": "<attestation document>",
         | 
| 1367 | 
            +
                        "KeyEncryptionAlgorithm": "RSAES_OAEP_SHA_256"
         | 
| 1368 | 
            +
                      }
         | 
| 1369 | 
            +
                    },
         | 
| 1370 | 
            +
                    "output": {
         | 
| 1371 | 
            +
                      "CiphertextForRecipient": "<binary data>",
         | 
| 1372 | 
            +
                      "Plaintext": ""
         | 
| 1373 | 
            +
                    },
         | 
| 1374 | 
            +
                    "comments": {
         | 
| 1375 | 
            +
                      "input": {
         | 
| 1376 | 
            +
                        "NumberOfBytes": "The length of the random byte string",
         | 
| 1377 | 
            +
                        "Recipient": "Specifies the attestation document from the Nitro enclave and the encryption algorithm to use with the public key from the attestation document"
         | 
| 1378 | 
            +
                      },
         | 
| 1379 | 
            +
                      "output": {
         | 
| 1380 | 
            +
                        "CiphertextForRecipient": "The random data encrypted under the public key from the attestation document",
         | 
| 1381 | 
            +
                        "Plaintext": "This field is null or empty"
         | 
| 1382 | 
            +
                      }
         | 
| 1383 | 
            +
                    },
         | 
| 1384 | 
            +
                    "description": "The following example includes the Recipient parameter with a signed attestation document from an AWS Nitro enclave. Instead of returning a plaintext (unencrypted) byte string, GenerateRandom returns the byte string encrypted by the public key from the enclave's attestation document.",
         | 
| 1385 | 
            +
                    "id": "to-generate-random-data-2",
         | 
| 1204 1386 | 
             
                    "title": "To generate random data"
         | 
| 1205 1387 | 
             
                  }
         | 
| 1206 1388 | 
             
                ],
         | 
| @@ -1932,7 +2114,7 @@ | |
| 1932 2114 | 
             
                  },
         | 
| 1933 2115 | 
             
                  {
         | 
| 1934 2116 | 
             
                    "input": {
         | 
| 1935 | 
            -
                      "CloudHsmClusterId": "cluster- | 
| 2117 | 
            +
                      "CloudHsmClusterId": "cluster-234abcdefABC",
         | 
| 1936 2118 | 
             
                      "CustomKeyStoreId": "cks-1234567890abcdef0"
         | 
| 1937 2119 | 
             
                    },
         | 
| 1938 2120 | 
             
                    "output": {
         |