Bump AWS libraries to latest
Signed-off-by: Davanum Srinivas <davanum@gmail.com>
This commit is contained in:
10696
vendor/github.com/aws/aws-sdk-go/service/kms/api.go
generated
vendored
10696
vendor/github.com/aws/aws-sdk-go/service/kms/api.go
generated
vendored
File diff suppressed because it is too large
Load Diff
111
vendor/github.com/aws/aws-sdk-go/service/kms/doc.go
generated
vendored
111
vendor/github.com/aws/aws-sdk-go/service/kms/doc.go
generated
vendored
@@ -3,84 +3,99 @@
|
||||
// Package kms provides the client and types for making API
|
||||
// requests to AWS Key Management Service.
|
||||
//
|
||||
// AWS Key Management Service (AWS KMS) is an encryption and key management
|
||||
// web service. This guide describes the AWS KMS operations that you can call
|
||||
// programmatically. For general information about AWS KMS, see the AWS Key
|
||||
// Management Service Developer Guide (https://docs.aws.amazon.com/kms/latest/developerguide/).
|
||||
// Key Management Service (KMS) is an encryption and key management web service.
|
||||
// This guide describes the KMS operations that you can call programmatically.
|
||||
// For general information about KMS, see the Key Management Service Developer
|
||||
// Guide (https://docs.aws.amazon.com/kms/latest/developerguide/).
|
||||
//
|
||||
// AWS provides SDKs that consist of libraries and sample code for various programming
|
||||
// languages and platforms (Java, Ruby, .Net, macOS, Android, etc.). The SDKs
|
||||
// provide a convenient way to create programmatic access to AWS KMS and other
|
||||
// AWS services. For example, the SDKs take care of tasks such as signing requests
|
||||
// (see below), managing errors, and retrying requests automatically. For more
|
||||
// information about the AWS SDKs, including how to download and install them,
|
||||
// see Tools for Amazon Web Services (http://aws.amazon.com/tools/).
|
||||
// KMS is replacing the term customer master key (CMK) with KMS key and KMS
|
||||
// key. The concept has not changed. To prevent breaking changes, KMS is keeping
|
||||
// some variations of this term.
|
||||
//
|
||||
// We recommend that you use the AWS SDKs to make programmatic API calls to
|
||||
// AWS KMS.
|
||||
// Amazon Web Services provides SDKs that consist of libraries and sample code
|
||||
// for various programming languages and platforms (Java, Ruby, .Net, macOS,
|
||||
// Android, etc.). The SDKs provide a convenient way to create programmatic
|
||||
// access to KMS and other Amazon Web Services services. For example, the SDKs
|
||||
// take care of tasks such as signing requests (see below), managing errors,
|
||||
// and retrying requests automatically. For more information about the Amazon
|
||||
// Web Services SDKs, including how to download and install them, see Tools
|
||||
// for Amazon Web Services (http://aws.amazon.com/tools/).
|
||||
//
|
||||
// Clients must support TLS (Transport Layer Security) 1.0. We recommend TLS
|
||||
// 1.2. Clients must also support cipher suites with Perfect Forward Secrecy
|
||||
// (PFS) such as Ephemeral Diffie-Hellman (DHE) or Elliptic Curve Ephemeral
|
||||
// Diffie-Hellman (ECDHE). Most modern systems such as Java 7 and later support
|
||||
// these modes.
|
||||
// We recommend that you use the Amazon Web Services SDKs to make programmatic
|
||||
// API calls to KMS.
|
||||
//
|
||||
// Signing Requests
|
||||
// If you need to use FIPS 140-2 validated cryptographic modules when communicating
|
||||
// with Amazon Web Services, use the FIPS endpoint in your preferred Amazon
|
||||
// Web Services Region. For more information about the available FIPS endpoints,
|
||||
// see Service endpoints (https://docs.aws.amazon.com/general/latest/gr/kms.html#kms_region)
|
||||
// in the Key Management Service topic of the Amazon Web Services General Reference.
|
||||
//
|
||||
// All KMS API calls must be signed and be transmitted using Transport Layer
|
||||
// Security (TLS). KMS recommends you always use the latest supported TLS version.
|
||||
// Clients must also support cipher suites with Perfect Forward Secrecy (PFS)
|
||||
// such as Ephemeral Diffie-Hellman (DHE) or Elliptic Curve Ephemeral Diffie-Hellman
|
||||
// (ECDHE). Most modern systems such as Java 7 and later support these modes.
|
||||
//
|
||||
// # Signing Requests
|
||||
//
|
||||
// Requests must be signed by using an access key ID and a secret access key.
|
||||
// We strongly recommend that you do not use your AWS account (root) access
|
||||
// key ID and secret key for everyday work with AWS KMS. Instead, use the access
|
||||
// key ID and secret access key for an IAM user. You can also use the AWS Security
|
||||
// Token Service to generate temporary security credentials that you can use
|
||||
// to sign requests.
|
||||
// We strongly recommend that you do not use your Amazon Web Services account
|
||||
// (root) access key ID and secret key for everyday work with KMS. Instead,
|
||||
// use the access key ID and secret access key for an IAM user. You can also
|
||||
// use the Amazon Web Services Security Token Service to generate temporary
|
||||
// security credentials that you can use to sign requests.
|
||||
//
|
||||
// All AWS KMS operations require Signature Version 4 (https://docs.aws.amazon.com/general/latest/gr/signature-version-4.html).
|
||||
// All KMS operations require Signature Version 4 (https://docs.aws.amazon.com/general/latest/gr/signature-version-4.html).
|
||||
//
|
||||
// Logging API Requests
|
||||
// # Logging API Requests
|
||||
//
|
||||
// AWS KMS supports AWS CloudTrail, a service that logs AWS API calls and related
|
||||
// events for your AWS account and delivers them to an Amazon S3 bucket that
|
||||
// you specify. By using the information collected by CloudTrail, you can determine
|
||||
// what requests were made to AWS KMS, who made the request, when it was made,
|
||||
// and so on. To learn more about CloudTrail, including how to turn it on and
|
||||
// find your log files, see the AWS CloudTrail User Guide (https://docs.aws.amazon.com/awscloudtrail/latest/userguide/).
|
||||
// KMS supports CloudTrail, a service that logs Amazon Web Services API calls
|
||||
// and related events for your Amazon Web Services account and delivers them
|
||||
// to an Amazon S3 bucket that you specify. By using the information collected
|
||||
// by CloudTrail, you can determine what requests were made to KMS, who made
|
||||
// the request, when it was made, and so on. To learn more about CloudTrail,
|
||||
// including how to turn it on and find your log files, see the CloudTrail User
|
||||
// Guide (https://docs.aws.amazon.com/awscloudtrail/latest/userguide/).
|
||||
//
|
||||
// Additional Resources
|
||||
// # Additional Resources
|
||||
//
|
||||
// For more information about credentials and request signing, see the following:
|
||||
//
|
||||
// * AWS Security Credentials (https://docs.aws.amazon.com/general/latest/gr/aws-security-credentials.html)
|
||||
// - This topic provides general information about the types of credentials
|
||||
// used for accessing AWS.
|
||||
// - Amazon Web Services Security Credentials (https://docs.aws.amazon.com/general/latest/gr/aws-security-credentials.html)
|
||||
//
|
||||
// * Temporary Security Credentials (https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp.html)
|
||||
// - This section of the IAM User Guide describes how to create and use temporary
|
||||
// security credentials.
|
||||
// - This topic provides general information about the types of credentials
|
||||
// used to access Amazon Web Services.
|
||||
//
|
||||
// * Signature Version 4 Signing Process (https://docs.aws.amazon.com/general/latest/gr/signature-version-4.html)
|
||||
// - This set of topics walks you through the process of signing a request
|
||||
// using an access key ID and a secret access key.
|
||||
// - Temporary Security Credentials (https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp.html)
|
||||
//
|
||||
// Commonly Used API Operations
|
||||
// - This section of the IAM User Guide describes how to create and use temporary
|
||||
// security credentials.
|
||||
//
|
||||
// - Signature Version 4 Signing Process (https://docs.aws.amazon.com/general/latest/gr/signature-version-4.html)
|
||||
//
|
||||
// - This set of topics walks you through the process of signing a request
|
||||
// using an access key ID and a secret access key.
|
||||
//
|
||||
// # Commonly Used API Operations
|
||||
//
|
||||
// Of the API operations discussed in this guide, the following will prove the
|
||||
// most useful for most applications. You will likely perform operations other
|
||||
// than these, such as creating keys and assigning policies, by using the console.
|
||||
//
|
||||
// * Encrypt
|
||||
// - Encrypt
|
||||
//
|
||||
// * Decrypt
|
||||
// - Decrypt
|
||||
//
|
||||
// * GenerateDataKey
|
||||
// - GenerateDataKey
|
||||
//
|
||||
// * GenerateDataKeyWithoutPlaintext
|
||||
// - GenerateDataKeyWithoutPlaintext
|
||||
//
|
||||
// See https://docs.aws.amazon.com/goto/WebAPI/kms-2014-11-01 for more information on this service.
|
||||
//
|
||||
// See kms package documentation for more information.
|
||||
// https://docs.aws.amazon.com/sdk-for-go/api/service/kms/
|
||||
//
|
||||
// Using the Client
|
||||
// # Using the Client
|
||||
//
|
||||
// To contact AWS Key Management Service with the SDK use the New function to create
|
||||
// a new service client. With that client you can make API requests to the service.
|
||||
|
||||
109
vendor/github.com/aws/aws-sdk-go/service/kms/errors.go
generated
vendored
109
vendor/github.com/aws/aws-sdk-go/service/kms/errors.go
generated
vendored
@@ -18,10 +18,10 @@ const (
|
||||
// ErrCodeCloudHsmClusterInUseException for service response error code
|
||||
// "CloudHsmClusterInUseException".
|
||||
//
|
||||
// The request was rejected because the specified AWS CloudHSM cluster is already
|
||||
// The request was rejected because the specified CloudHSM cluster is already
|
||||
// associated with a custom key store or it shares a backup history with a cluster
|
||||
// that is associated with a custom key store. Each custom key store must be
|
||||
// associated with a different AWS CloudHSM cluster.
|
||||
// associated with a different CloudHSM cluster.
|
||||
//
|
||||
// Clusters that share a backup history have the same cluster certificate. To
|
||||
// view the cluster certificate of a cluster, use the DescribeClusters (https://docs.aws.amazon.com/cloudhsm/latest/APIReference/API_DescribeClusters.html)
|
||||
@@ -31,8 +31,8 @@ const (
|
||||
// ErrCodeCloudHsmClusterInvalidConfigurationException for service response error code
|
||||
// "CloudHsmClusterInvalidConfigurationException".
|
||||
//
|
||||
// The request was rejected because the associated AWS CloudHSM cluster did
|
||||
// not meet the configuration requirements for a custom key store.
|
||||
// The request was rejected because the associated CloudHSM cluster did not
|
||||
// meet the configuration requirements for a custom key store.
|
||||
//
|
||||
// * The cluster must be configured with private subnets in at least two
|
||||
// different Availability Zones in the Region.
|
||||
@@ -47,46 +47,44 @@ const (
|
||||
// operation.
|
||||
//
|
||||
// * The cluster must contain at least as many HSMs as the operation requires.
|
||||
// To add HSMs, use the AWS CloudHSM CreateHsm (https://docs.aws.amazon.com/cloudhsm/latest/APIReference/API_CreateHsm.html)
|
||||
// To add HSMs, use the CloudHSM CreateHsm (https://docs.aws.amazon.com/cloudhsm/latest/APIReference/API_CreateHsm.html)
|
||||
// operation. For the CreateCustomKeyStore, UpdateCustomKeyStore, and CreateKey
|
||||
// operations, the AWS CloudHSM cluster must have at least two active HSMs,
|
||||
// each in a different Availability Zone. For the ConnectCustomKeyStore operation,
|
||||
// the AWS CloudHSM must contain at least one active HSM.
|
||||
// operations, the CloudHSM cluster must have at least two active HSMs, each
|
||||
// in a different Availability Zone. For the ConnectCustomKeyStore operation,
|
||||
// the CloudHSM must contain at least one active HSM.
|
||||
//
|
||||
// For information about the requirements for an AWS CloudHSM cluster that is
|
||||
// associated with a custom key store, see Assemble the Prerequisites (https://docs.aws.amazon.com/kms/latest/developerguide/create-keystore.html#before-keystore)
|
||||
// in the AWS Key Management Service Developer Guide. For information about
|
||||
// creating a private subnet for an AWS CloudHSM cluster, see Create a Private
|
||||
// Subnet (https://docs.aws.amazon.com/cloudhsm/latest/userguide/create-subnets.html)
|
||||
// in the AWS CloudHSM User Guide. For information about cluster security groups,
|
||||
// For information about the requirements for an CloudHSM cluster that is associated
|
||||
// with a custom key store, see Assemble the Prerequisites (https://docs.aws.amazon.com/kms/latest/developerguide/create-keystore.html#before-keystore)
|
||||
// in the Key Management Service Developer Guide. For information about creating
|
||||
// a private subnet for an CloudHSM cluster, see Create a Private Subnet (https://docs.aws.amazon.com/cloudhsm/latest/userguide/create-subnets.html)
|
||||
// in the CloudHSM User Guide. For information about cluster security groups,
|
||||
// see Configure a Default Security Group (https://docs.aws.amazon.com/cloudhsm/latest/userguide/configure-sg.html)
|
||||
// in the AWS CloudHSM User Guide .
|
||||
// in the CloudHSM User Guide .
|
||||
ErrCodeCloudHsmClusterInvalidConfigurationException = "CloudHsmClusterInvalidConfigurationException"
|
||||
|
||||
// ErrCodeCloudHsmClusterNotActiveException for service response error code
|
||||
// "CloudHsmClusterNotActiveException".
|
||||
//
|
||||
// The request was rejected because the AWS CloudHSM cluster that is associated
|
||||
// The request was rejected because the CloudHSM cluster that is associated
|
||||
// with the custom key store is not active. Initialize and activate the cluster
|
||||
// and try the command again. For detailed instructions, see Getting Started
|
||||
// (https://docs.aws.amazon.com/cloudhsm/latest/userguide/getting-started.html)
|
||||
// in the AWS CloudHSM User Guide.
|
||||
// in the CloudHSM User Guide.
|
||||
ErrCodeCloudHsmClusterNotActiveException = "CloudHsmClusterNotActiveException"
|
||||
|
||||
// ErrCodeCloudHsmClusterNotFoundException for service response error code
|
||||
// "CloudHsmClusterNotFoundException".
|
||||
//
|
||||
// The request was rejected because AWS KMS cannot find the AWS CloudHSM cluster
|
||||
// with the specified cluster ID. Retry the request with a different cluster
|
||||
// ID.
|
||||
// The request was rejected because KMS cannot find the CloudHSM cluster with
|
||||
// the specified cluster ID. Retry the request with a different cluster ID.
|
||||
ErrCodeCloudHsmClusterNotFoundException = "CloudHsmClusterNotFoundException"
|
||||
|
||||
// ErrCodeCloudHsmClusterNotRelatedException for service response error code
|
||||
// "CloudHsmClusterNotRelatedException".
|
||||
//
|
||||
// The request was rejected because the specified AWS CloudHSM cluster has a
|
||||
// different cluster certificate than the original cluster. You cannot use the
|
||||
// operation to specify an unrelated cluster.
|
||||
// The request was rejected because the specified CloudHSM cluster has a different
|
||||
// cluster certificate than the original cluster. You cannot use the operation
|
||||
// to specify an unrelated cluster.
|
||||
//
|
||||
// Specify a cluster that shares a backup history with the original cluster.
|
||||
// This includes clusters that were created from a backup of the current cluster,
|
||||
@@ -101,10 +99,10 @@ const (
|
||||
// ErrCodeCustomKeyStoreHasCMKsException for service response error code
|
||||
// "CustomKeyStoreHasCMKsException".
|
||||
//
|
||||
// The request was rejected because the custom key store contains AWS KMS customer
|
||||
// master keys (CMKs). After verifying that you do not need to use the CMKs,
|
||||
// use the ScheduleKeyDeletion operation to delete the CMKs. After they are
|
||||
// deleted, you can delete the custom key store.
|
||||
// The request was rejected because the custom key store contains KMS keys.
|
||||
// After verifying that you do not need to use the KMS keys, use the ScheduleKeyDeletion
|
||||
// operation to delete the KMS keys. After they are deleted, you can delete
|
||||
// the custom key store.
|
||||
ErrCodeCustomKeyStoreHasCMKsException = "CustomKeyStoreHasCMKsException"
|
||||
|
||||
// ErrCodeCustomKeyStoreInvalidStateException for service response error code
|
||||
@@ -140,7 +138,7 @@ const (
|
||||
// ErrCodeCustomKeyStoreNotFoundException for service response error code
|
||||
// "CustomKeyStoreNotFoundException".
|
||||
//
|
||||
// The request was rejected because AWS KMS cannot find a custom key store with
|
||||
// The request was rejected because KMS cannot find a custom key store with
|
||||
// the specified key store name or ID.
|
||||
ErrCodeCustomKeyStoreNotFoundException = "CustomKeyStoreNotFoundException"
|
||||
|
||||
@@ -154,7 +152,7 @@ const (
|
||||
// ErrCodeDisabledException for service response error code
|
||||
// "DisabledException".
|
||||
//
|
||||
// The request was rejected because the specified CMK is not enabled.
|
||||
// The request was rejected because the specified KMS key is not enabled.
|
||||
ErrCodeDisabledException = "DisabledException"
|
||||
|
||||
// ErrCodeExpiredImportTokenException for service response error code
|
||||
@@ -168,9 +166,9 @@ const (
|
||||
// ErrCodeIncorrectKeyException for service response error code
|
||||
// "IncorrectKeyException".
|
||||
//
|
||||
// The request was rejected because the specified CMK cannot decrypt the data.
|
||||
// The KeyId in a Decrypt request and the SourceKeyId in a ReEncrypt request
|
||||
// must identify the same CMK that was used to encrypt the ciphertext.
|
||||
// The request was rejected because the specified KMS key cannot decrypt the
|
||||
// data. The KeyId in a Decrypt request and the SourceKeyId in a ReEncrypt request
|
||||
// must identify the same KMS key that was used to encrypt the ciphertext.
|
||||
ErrCodeIncorrectKeyException = "IncorrectKeyException"
|
||||
|
||||
// ErrCodeIncorrectKeyMaterialException for service response error code
|
||||
@@ -178,14 +176,14 @@ const (
|
||||
//
|
||||
// The request was rejected because the key material in the request is, expired,
|
||||
// invalid, or is not the same key material that was previously imported into
|
||||
// this customer master key (CMK).
|
||||
// this KMS key.
|
||||
ErrCodeIncorrectKeyMaterialException = "IncorrectKeyMaterialException"
|
||||
|
||||
// ErrCodeIncorrectTrustAnchorException for service response error code
|
||||
// "IncorrectTrustAnchorException".
|
||||
//
|
||||
// The request was rejected because the trust anchor certificate in the request
|
||||
// is not the trust anchor certificate for the specified AWS CloudHSM cluster.
|
||||
// is not the trust anchor certificate for the specified CloudHSM cluster.
|
||||
//
|
||||
// When you initialize the cluster (https://docs.aws.amazon.com/cloudhsm/latest/userguide/initialize-cluster.html#sign-csr),
|
||||
// you create the trust anchor certificate and save it in the customerCA.crt
|
||||
@@ -220,8 +218,8 @@ const (
|
||||
// the ciphertext, such as the encryption context, is corrupted, missing, or
|
||||
// otherwise invalid.
|
||||
//
|
||||
// From the ImportKeyMaterial operation, the request was rejected because AWS
|
||||
// KMS could not decrypt the encrypted (wrapped) key material.
|
||||
// From the ImportKeyMaterial operation, the request was rejected because KMS
|
||||
// could not decrypt the encrypted (wrapped) key material.
|
||||
ErrCodeInvalidCiphertextException = "InvalidCiphertextException"
|
||||
|
||||
// ErrCodeInvalidGrantIdException for service response error code
|
||||
@@ -240,7 +238,7 @@ const (
|
||||
// "InvalidImportTokenException".
|
||||
//
|
||||
// The request was rejected because the provided import token is invalid or
|
||||
// is associated with a different customer master key (CMK).
|
||||
// is associated with a different KMS key.
|
||||
ErrCodeInvalidImportTokenException = "InvalidImportTokenException"
|
||||
|
||||
// ErrCodeInvalidKeyUsageException for service response error code
|
||||
@@ -248,17 +246,19 @@ const (
|
||||
//
|
||||
// The request was rejected for one of the following reasons:
|
||||
//
|
||||
// * The KeyUsage value of the CMK is incompatible with the API operation.
|
||||
// * The KeyUsage value of the KMS key is incompatible with the API operation.
|
||||
//
|
||||
// * The encryption algorithm or signing algorithm specified for the operation
|
||||
// is incompatible with the type of key material in the CMK (CustomerMasterKeySpec).
|
||||
// is incompatible with the type of key material in the KMS key (KeySpec).
|
||||
//
|
||||
// For encrypting, decrypting, re-encrypting, and generating data keys, the
|
||||
// KeyUsage must be ENCRYPT_DECRYPT. For signing and verifying, the KeyUsage
|
||||
// must be SIGN_VERIFY. To find the KeyUsage of a CMK, use the DescribeKey operation.
|
||||
// KeyUsage must be ENCRYPT_DECRYPT. For signing and verifying messages, the
|
||||
// KeyUsage must be SIGN_VERIFY. For generating and verifying message authentication
|
||||
// codes (MACs), the KeyUsage must be GENERATE_VERIFY_MAC. To find the KeyUsage
|
||||
// of a KMS key, use the DescribeKey operation.
|
||||
//
|
||||
// To find the encryption or signing algorithms supported for a particular CMK,
|
||||
// use the DescribeKey operation.
|
||||
// To find the encryption or signing algorithms supported for a particular KMS
|
||||
// key, use the DescribeKey operation.
|
||||
ErrCodeInvalidKeyUsageException = "InvalidKeyUsageException"
|
||||
|
||||
// ErrCodeInvalidMarkerException for service response error code
|
||||
@@ -274,24 +274,32 @@ const (
|
||||
// The request was rejected because the state of the specified resource is not
|
||||
// valid for this request.
|
||||
//
|
||||
// For more information about how key state affects the use of a CMK, see How
|
||||
// Key State Affects Use of a Customer Master Key (https://docs.aws.amazon.com/kms/latest/developerguide/key-state.html)
|
||||
// in the AWS Key Management Service Developer Guide .
|
||||
// For more information about how key state affects the use of a KMS key, see
|
||||
// Key states of KMS keys (https://docs.aws.amazon.com/kms/latest/developerguide/key-state.html)
|
||||
// in the Key Management Service Developer Guide .
|
||||
ErrCodeInvalidStateException = "KMSInvalidStateException"
|
||||
|
||||
// ErrCodeKMSInvalidMacException for service response error code
|
||||
// "KMSInvalidMacException".
|
||||
//
|
||||
// The request was rejected because the HMAC verification failed. HMAC verification
|
||||
// fails when the HMAC computed by using the specified message, HMAC KMS key,
|
||||
// and MAC algorithm does not match the HMAC specified in the request.
|
||||
ErrCodeKMSInvalidMacException = "KMSInvalidMacException"
|
||||
|
||||
// ErrCodeKMSInvalidSignatureException for service response error code
|
||||
// "KMSInvalidSignatureException".
|
||||
//
|
||||
// The request was rejected because the signature verification failed. Signature
|
||||
// verification fails when it cannot confirm that signature was produced by
|
||||
// signing the specified message with the specified CMK and signing algorithm.
|
||||
// signing the specified message with the specified KMS key and signing algorithm.
|
||||
ErrCodeKMSInvalidSignatureException = "KMSInvalidSignatureException"
|
||||
|
||||
// ErrCodeKeyUnavailableException for service response error code
|
||||
// "KeyUnavailableException".
|
||||
//
|
||||
// The request was rejected because the specified CMK was not available. You
|
||||
// can retry the request.
|
||||
// The request was rejected because the specified KMS key was not available.
|
||||
// You can retry the request.
|
||||
ErrCodeKeyUnavailableException = "KeyUnavailableException"
|
||||
|
||||
// ErrCodeLimitExceededException for service response error code
|
||||
@@ -299,7 +307,7 @@ const (
|
||||
//
|
||||
// The request was rejected because a quota was exceeded. For more information,
|
||||
// see Quotas (https://docs.aws.amazon.com/kms/latest/developerguide/limits.html)
|
||||
// in the AWS Key Management Service Developer Guide.
|
||||
// in the Key Management Service Developer Guide.
|
||||
ErrCodeLimitExceededException = "LimitExceededException"
|
||||
|
||||
// ErrCodeMalformedPolicyDocumentException for service response error code
|
||||
@@ -357,6 +365,7 @@ var exceptionFromCode = map[string]func(protocol.ResponseMetadata) error{
|
||||
"InvalidKeyUsageException": newErrorInvalidKeyUsageException,
|
||||
"InvalidMarkerException": newErrorInvalidMarkerException,
|
||||
"KMSInvalidStateException": newErrorInvalidStateException,
|
||||
"KMSInvalidMacException": newErrorKMSInvalidMacException,
|
||||
"KMSInvalidSignatureException": newErrorKMSInvalidSignatureException,
|
||||
"KeyUnavailableException": newErrorKeyUnavailableException,
|
||||
"LimitExceededException": newErrorLimitExceededException,
|
||||
|
||||
38
vendor/github.com/aws/aws-sdk-go/service/kms/service.go
generated
vendored
38
vendor/github.com/aws/aws-sdk-go/service/kms/service.go
generated
vendored
@@ -40,33 +40,39 @@ const (
|
||||
// aws.Config parameter to add your extra config.
|
||||
//
|
||||
// Example:
|
||||
// mySession := session.Must(session.NewSession())
|
||||
//
|
||||
// // Create a KMS client from just a session.
|
||||
// svc := kms.New(mySession)
|
||||
// mySession := session.Must(session.NewSession())
|
||||
//
|
||||
// // Create a KMS client with additional configuration
|
||||
// svc := kms.New(mySession, aws.NewConfig().WithRegion("us-west-2"))
|
||||
// // Create a KMS client from just a session.
|
||||
// svc := kms.New(mySession)
|
||||
//
|
||||
// // Create a KMS client with additional configuration
|
||||
// svc := kms.New(mySession, aws.NewConfig().WithRegion("us-west-2"))
|
||||
func New(p client.ConfigProvider, cfgs ...*aws.Config) *KMS {
|
||||
c := p.ClientConfig(EndpointsID, cfgs...)
|
||||
return newClient(*c.Config, c.Handlers, c.PartitionID, c.Endpoint, c.SigningRegion, c.SigningName)
|
||||
if c.SigningNameDerived || len(c.SigningName) == 0 {
|
||||
c.SigningName = EndpointsID
|
||||
// No Fallback
|
||||
}
|
||||
return newClient(*c.Config, c.Handlers, c.PartitionID, c.Endpoint, c.SigningRegion, c.SigningName, c.ResolvedRegion)
|
||||
}
|
||||
|
||||
// newClient creates, initializes and returns a new service client instance.
|
||||
func newClient(cfg aws.Config, handlers request.Handlers, partitionID, endpoint, signingRegion, signingName string) *KMS {
|
||||
func newClient(cfg aws.Config, handlers request.Handlers, partitionID, endpoint, signingRegion, signingName, resolvedRegion string) *KMS {
|
||||
svc := &KMS{
|
||||
Client: client.New(
|
||||
cfg,
|
||||
metadata.ClientInfo{
|
||||
ServiceName: ServiceName,
|
||||
ServiceID: ServiceID,
|
||||
SigningName: signingName,
|
||||
SigningRegion: signingRegion,
|
||||
PartitionID: partitionID,
|
||||
Endpoint: endpoint,
|
||||
APIVersion: "2014-11-01",
|
||||
JSONVersion: "1.1",
|
||||
TargetPrefix: "TrentService",
|
||||
ServiceName: ServiceName,
|
||||
ServiceID: ServiceID,
|
||||
SigningName: signingName,
|
||||
SigningRegion: signingRegion,
|
||||
PartitionID: partitionID,
|
||||
Endpoint: endpoint,
|
||||
APIVersion: "2014-11-01",
|
||||
ResolvedRegion: resolvedRegion,
|
||||
JSONVersion: "1.1",
|
||||
TargetPrefix: "TrentService",
|
||||
},
|
||||
handlers,
|
||||
),
|
||||
|
||||
Reference in New Issue
Block a user