You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
"description": "Added fields to track cumulative task retry attempts for steps and jobs",
5
+
"type": "api-change"
6
+
},
7
+
{
8
+
"category": "``ec2``",
9
+
"description": "This release adds support for OdbNetworkArn as a target in VPC Route Tables",
10
+
"type": "api-change"
11
+
},
12
+
{
13
+
"category": "``iot-managed-integrations``",
14
+
"description": "Adding managed integrations APIs for IoT Device Management to onboard and control devices across different manufacturers, connectivity protocols and third party vendor clouds. APIs include managed thing operations, provisioning profile management, and cloud connector operations.",
15
+
"type": "api-change"
16
+
},
17
+
{
18
+
"category": "``keyspaces``",
19
+
"description": "This release provides change data capture (CDC) streams support through updates to the Amazon Keyspaces API.",
20
+
"type": "api-change"
21
+
},
22
+
{
23
+
"category": "``keyspacesstreams``",
24
+
"description": "This release adds change data capture (CDC) streams support through the new Amazon Keyspaces Streams API.",
25
+
"type": "api-change"
26
+
},
27
+
{
28
+
"category": "``kms``",
29
+
"description": "This release updates AWS CLI examples for KMS APIs.",
30
+
"type": "api-change"
31
+
},
32
+
{
33
+
"category": "``qbusiness``",
34
+
"description": "Added support for App level authentication for QBusiness DataAccessor using AWS IAM Identity center Trusted Token issuer",
35
+
"type": "api-change"
36
+
},
37
+
{
38
+
"category": "``workspaces``",
39
+
"description": "Updated modifyStreamingProperties to support PrivateLink VPC endpoints for directories",
Copy file name to clipboardExpand all lines: CHANGELOG.rst
+13Lines changed: 13 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,6 +2,19 @@
2
2
CHANGELOG
3
3
=========
4
4
5
+
1.40.44
6
+
=======
7
+
8
+
* api-change:``deadline``: Added fields to track cumulative task retry attempts for steps and jobs
9
+
* api-change:``ec2``: This release adds support for OdbNetworkArn as a target in VPC Route Tables
10
+
* api-change:``iot-managed-integrations``: Adding managed integrations APIs for IoT Device Management to onboard and control devices across different manufacturers, connectivity protocols and third party vendor clouds. APIs include managed thing operations, provisioning profile management, and cloud connector operations.
11
+
* api-change:``keyspaces``: This release provides change data capture (CDC) streams support through updates to the Amazon Keyspaces API.
12
+
* api-change:``keyspacesstreams``: This release adds change data capture (CDC) streams support through the new Amazon Keyspaces Streams API.
13
+
* api-change:``kms``: This release updates AWS CLI examples for KMS APIs.
14
+
* api-change:``qbusiness``: Added support for App level authentication for QBusiness DataAccessor using AWS IAM Identity center Trusted Token issuer
15
+
* api-change:``workspaces``: Updated modifyStreamingProperties to support PrivateLink VPC endpoints for directories
@@ -40,7 +41,7 @@ For more information, see `Creating keys <https://docs.aws.amazon.com/kms/latest
40
41
41
42
**Example 2: To create an asymmetric RSA KMS key for encryption and decryption**
42
43
43
-
The following ``create-key`` example creates a KMS key that contains an asymmetric RSA key pair for encryption and decryption. ::
44
+
The following ``create-key`` example creates a KMS key that contains an asymmetric RSA key pair for encryption and decryption. The key spec and key usage can't be changed after the key is created.::
44
45
45
46
aws kms create-key \
46
47
--key-spec RSA_4096 \
@@ -75,7 +76,7 @@ For more information, see `Asymmetric keys in AWS KMS <https://docs.aws.amazon.c
75
76
76
77
**Example 3: To create an asymmetric elliptic curve KMS key for signing and verification**
77
78
78
-
To create an asymmetric KMS key that contains an asymmetric elliptic curve (ECC) key pair for signing and verification. The ``--key-usage`` parameter is required even though ``SIGN_VERIFY`` is the only valid value for ECC KMS keys. ::
79
+
To create an asymmetric KMS key that contains an asymmetric elliptic curve (ECC) key pair for signing and verification. The ``--key-usage`` parameter is required even though ``SIGN_VERIFY`` is the only valid value for ECC KMS keys. The key spec and key usage can't be changed after the key is created.::
79
80
80
81
aws kms create-key \
81
82
--key-spec ECC_NIST_P521 \
@@ -105,10 +106,43 @@ Output::
105
106
}
106
107
107
108
108
-
For more information, see `Asymmetric keys in AWS KMS <https://docs.aws.amazon.com/kms/latest/developerguide/symmetric-asymmetric.html>`__ in the *AWS Key Management Service Developer Guide*.
109
+
For more information, see `Asymmetric keys in AWS KMS <https://docs.aws.amazon.com/kms/latest/developerguide/symmetric-asymmetric.html>`__ in the *AWS Key Management Service Developer Guide*.
110
+
111
+
**Example 4: To create an asymmetric ML-DSA KMS key for signing and verification**
112
+
113
+
This example creates a module-lattice digital signature algorithm (ML-DSA) key for signing and verification. The key-usage parameter is required even though ``SIGN_VERIFY`` is the only valid value for ML-DSA keys. ::
For more information, see `Asymmetric keys in AWS KMS <https://docs.aws.amazon.com/kms/latest/developerguide/symmetric-asymmetric.html>`__ in the *AWS Key Management Service Developer Guide*.
109
143
110
144
111
-
**Example 4: To create an HMAC KMS key**
145
+
**Example 5: To create an HMAC KMS key**
112
146
113
147
The following ``create-key`` example creates a 384-bit HMAC KMS key. The ``GENERATE_VERIFY_MAC`` value for the ``--key-usage`` parameter is required even though it's the only valid value for HMAC KMS keys. ::
114
148
@@ -142,7 +176,7 @@ Output::
142
176
For more information, see `HMAC keys in AWS KMS <https://docs.aws.amazon.com/kms/latest/developerguide/hmac.html>`__ in the *AWS Key Management Service Developer Guide*.
143
177
144
178
145
-
**Example 4: To create a multi-Region primary KMS key**
179
+
**Example 6: To create a multi-Region primary KMS key**
146
180
147
181
The following ``create-key`` example creates a multi-Region primary symmetric encryption key. Because the default values for all parameters create a symmetric encryption key, only the ``--multi-region`` parameter is required for this KMS key. In the AWS CLI, to indicate that a Boolean parameter is true, just specify the parameter name. ::
For more information, see `Asymmetric keys in AWS KMS <https://docs.aws.amazon.com/kms/latest/developerguide/symmetric-asymmetric.html>`__ in the *AWS Key Management Service Developer Guide*.
184
219
185
220
186
-
**Example 5: To create a KMS key for imported key material**
221
+
**Example 7: To create a KMS key for imported key material**
187
222
188
223
The following ``create-key`` example creates a creates a KMS key with no key material. When the operation is complete, you can import your own key material into the KMS key. To create this KMS key, set the ``--origin`` parameter to ``EXTERNAL``. ::
189
224
@@ -253,7 +288,7 @@ Output::
253
288
For more information, see `AWS CloudHSM key stores <https://docs.aws.amazon.com/kms/latest/developerguide/keystore-cloudhsm.html>`__ in the *AWS Key Management Service Developer Guide*.
254
289
255
290
256
-
**Example 7: To create a KMS key in an external key store**
291
+
**Example 8: To create a KMS key in an external key store**
257
292
258
293
The following ``create-key`` example creates a creates a KMS key in the specified external key store. The ``--custom-key-store-id``, ``--origin``, and ``--xks-key-id`` parameters are required in this command.
Copy file name to clipboardExpand all lines: awscli/examples/kms/delete-imported-key-material.rst
+8-2Lines changed: 8 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,6 +5,12 @@ The following ``delete-imported-key-material`` example deletes key material that
5
5
aws kms delete-imported-key-material \
6
6
--key-id 1234abcd-12ab-34cd-56ef-1234567890ab
7
7
8
-
This command produces no output. To verify that the key material is deleted, use the ``describe-key`` command to look for a key state of ``PendingImport`` or ``PendingDeletion``.
9
8
10
-
For more information, see `Deleting imported key material<https://docs.aws.amazon.com/kms/latest/developerguide/importing-keys-delete-key-material.html>`__ in the *AWS Key Management Service Developer Guide*.
For more information, see `Deleting imported key material <https://docs.aws.amazon.com/kms/latest/developerguide/importing-keys-delete-key-material.html>`__ in the *AWS Key Management Service Developer Guide*.
Copy file name to clipboardExpand all lines: awscli/examples/kms/disable-key.rst
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
**To temporarily disable a KMS key**
2
2
3
-
The following example uses the ``disable-key`` command to disable a customer managed KMS key. To re-enable the KMS key, use the ``enable-key`` command. ::
3
+
The following ``disable-key`` command disables a customer managed KMS key. To re-enable the KMS key, use the ``enable-key`` command. ::
0 commit comments