com.amazonaws.services.kms.model.ImportKeyMaterialRequest Maven / Gradle / Ivy
Show all versions of aws-java-sdk-kms Show documentation
/*
* Copyright 2019-2024 Amazon.com, Inc. or its affiliates. All Rights Reserved.
*
* Licensed under the Apache License, Version 2.0 (the "License"). You may not use this file except in compliance with
* the License. A copy of the License is located at
*
* http://aws.amazon.com/apache2.0
*
* or in the "license" file accompanying this file. This file is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR
* CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions
* and limitations under the License.
*/
package com.amazonaws.services.kms.model;
import java.io.Serializable;
import javax.annotation.Generated;
import com.amazonaws.AmazonWebServiceRequest;
/**
*
* @see AWS API
* Documentation
*/
@Generated("com.amazonaws:aws-java-sdk-code-generator")
public class ImportKeyMaterialRequest extends com.amazonaws.AmazonWebServiceRequest implements Serializable, Cloneable {
/**
*
* The identifier of the KMS key that will be associated with the imported key material. This must be the same KMS
* key specified in the KeyID
parameter of the corresponding GetParametersForImport request. The
* Origin
of the KMS key must be EXTERNAL
and its KeyState
must be
* PendingImport
.
*
*
* The KMS key can be a symmetric encryption KMS key, HMAC KMS key, asymmetric encryption KMS key, or asymmetric
* signing KMS key, including a multi-Region
* key of any supported type. You cannot perform this operation on a KMS key in a custom key store, or on a KMS
* key in a different Amazon Web Services account.
*
*
* Specify the key ID or key ARN of the KMS key.
*
*
* For example:
*
*
* -
*
* Key ID: 1234abcd-12ab-34cd-56ef-1234567890ab
*
*
* -
*
* Key ARN: arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab
*
*
*
*
* To get the key ID and key ARN for a KMS key, use ListKeys or DescribeKey.
*
*/
private String keyId;
/**
*
* The import token that you received in the response to a previous GetParametersForImport request. It must
* be from the same response that contained the public key that you used to encrypt the key material.
*
*/
private java.nio.ByteBuffer importToken;
/**
*
* The encrypted key material to import. The key material must be encrypted under the public wrapping key that
* GetParametersForImport returned, using the wrapping algorithm that you specified in the same
* GetParametersForImport
request.
*
*/
private java.nio.ByteBuffer encryptedKeyMaterial;
/**
*
* The date and time when the imported key material expires. This parameter is required when the value of the
* ExpirationModel
parameter is KEY_MATERIAL_EXPIRES
. Otherwise it is not valid.
*
*
* The value of this parameter must be a future date and time. The maximum value is 365 days from the request date.
*
*
* When the key material expires, KMS deletes the key material from the KMS key. Without its key material, the KMS
* key is unusable. To use the KMS key in cryptographic operations, you must reimport the same key material.
*
*
* You cannot change the ExpirationModel
or ValidTo
values for the current import after
* the request completes. To change either value, you must delete (DeleteImportedKeyMaterial) and reimport
* the key material.
*
*/
private java.util.Date validTo;
/**
*
* Specifies whether the key material expires. The default is KEY_MATERIAL_EXPIRES
. For help with this
* choice, see Setting an expiration time in the Key Management Service Developer Guide.
*
*
* When the value of ExpirationModel
is KEY_MATERIAL_EXPIRES
, you must specify a value for
* the ValidTo
parameter. When value is KEY_MATERIAL_DOES_NOT_EXPIRE
, you must omit the
* ValidTo
parameter.
*
*
* You cannot change the ExpirationModel
or ValidTo
values for the current import after
* the request completes. To change either value, you must reimport the key material.
*
*/
private String expirationModel;
/**
*
* The identifier of the KMS key that will be associated with the imported key material. This must be the same KMS
* key specified in the KeyID
parameter of the corresponding GetParametersForImport request. The
* Origin
of the KMS key must be EXTERNAL
and its KeyState
must be
* PendingImport
.
*
*
* The KMS key can be a symmetric encryption KMS key, HMAC KMS key, asymmetric encryption KMS key, or asymmetric
* signing KMS key, including a multi-Region
* key of any supported type. You cannot perform this operation on a KMS key in a custom key store, or on a KMS
* key in a different Amazon Web Services account.
*
*
* Specify the key ID or key ARN of the KMS key.
*
*
* For example:
*
*
* -
*
* Key ID: 1234abcd-12ab-34cd-56ef-1234567890ab
*
*
* -
*
* Key ARN: arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab
*
*
*
*
* To get the key ID and key ARN for a KMS key, use ListKeys or DescribeKey.
*
*
* @param keyId
* The identifier of the KMS key that will be associated with the imported key material. This must be the
* same KMS key specified in the KeyID
parameter of the corresponding
* GetParametersForImport request. The Origin
of the KMS key must be
* EXTERNAL
and its KeyState
must be PendingImport
.
*
* The KMS key can be a symmetric encryption KMS key, HMAC KMS key, asymmetric encryption KMS key, or
* asymmetric signing KMS key, including a multi-Region key of any supported
* type. You cannot perform this operation on a KMS key in a custom key store, or on a KMS key in a different
* Amazon Web Services account.
*
*
* Specify the key ID or key ARN of the KMS key.
*
*
* For example:
*
*
* -
*
* Key ID: 1234abcd-12ab-34cd-56ef-1234567890ab
*
*
* -
*
* Key ARN: arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab
*
*
*
*
* To get the key ID and key ARN for a KMS key, use ListKeys or DescribeKey.
*/
public void setKeyId(String keyId) {
this.keyId = keyId;
}
/**
*
* The identifier of the KMS key that will be associated with the imported key material. This must be the same KMS
* key specified in the KeyID
parameter of the corresponding GetParametersForImport request. The
* Origin
of the KMS key must be EXTERNAL
and its KeyState
must be
* PendingImport
.
*
*
* The KMS key can be a symmetric encryption KMS key, HMAC KMS key, asymmetric encryption KMS key, or asymmetric
* signing KMS key, including a multi-Region
* key of any supported type. You cannot perform this operation on a KMS key in a custom key store, or on a KMS
* key in a different Amazon Web Services account.
*
*
* Specify the key ID or key ARN of the KMS key.
*
*
* For example:
*
*
* -
*
* Key ID: 1234abcd-12ab-34cd-56ef-1234567890ab
*
*
* -
*
* Key ARN: arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab
*
*
*
*
* To get the key ID and key ARN for a KMS key, use ListKeys or DescribeKey.
*
*
* @return The identifier of the KMS key that will be associated with the imported key material. This must be the
* same KMS key specified in the KeyID
parameter of the corresponding
* GetParametersForImport request. The Origin
of the KMS key must be
* EXTERNAL
and its KeyState
must be PendingImport
.
*
* The KMS key can be a symmetric encryption KMS key, HMAC KMS key, asymmetric encryption KMS key, or
* asymmetric signing KMS key, including a multi-Region key of any supported
* type. You cannot perform this operation on a KMS key in a custom key store, or on a KMS key in a
* different Amazon Web Services account.
*
*
* Specify the key ID or key ARN of the KMS key.
*
*
* For example:
*
*
* -
*
* Key ID: 1234abcd-12ab-34cd-56ef-1234567890ab
*
*
* -
*
* Key ARN: arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab
*
*
*
*
* To get the key ID and key ARN for a KMS key, use ListKeys or DescribeKey.
*/
public String getKeyId() {
return this.keyId;
}
/**
*
* The identifier of the KMS key that will be associated with the imported key material. This must be the same KMS
* key specified in the KeyID
parameter of the corresponding GetParametersForImport request. The
* Origin
of the KMS key must be EXTERNAL
and its KeyState
must be
* PendingImport
.
*
*
* The KMS key can be a symmetric encryption KMS key, HMAC KMS key, asymmetric encryption KMS key, or asymmetric
* signing KMS key, including a multi-Region
* key of any supported type. You cannot perform this operation on a KMS key in a custom key store, or on a KMS
* key in a different Amazon Web Services account.
*
*
* Specify the key ID or key ARN of the KMS key.
*
*
* For example:
*
*
* -
*
* Key ID: 1234abcd-12ab-34cd-56ef-1234567890ab
*
*
* -
*
* Key ARN: arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab
*
*
*
*
* To get the key ID and key ARN for a KMS key, use ListKeys or DescribeKey.
*
*
* @param keyId
* The identifier of the KMS key that will be associated with the imported key material. This must be the
* same KMS key specified in the KeyID
parameter of the corresponding
* GetParametersForImport request. The Origin
of the KMS key must be
* EXTERNAL
and its KeyState
must be PendingImport
.
*
* The KMS key can be a symmetric encryption KMS key, HMAC KMS key, asymmetric encryption KMS key, or
* asymmetric signing KMS key, including a multi-Region key of any supported
* type. You cannot perform this operation on a KMS key in a custom key store, or on a KMS key in a different
* Amazon Web Services account.
*
*
* Specify the key ID or key ARN of the KMS key.
*
*
* For example:
*
*
* -
*
* Key ID: 1234abcd-12ab-34cd-56ef-1234567890ab
*
*
* -
*
* Key ARN: arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab
*
*
*
*
* To get the key ID and key ARN for a KMS key, use ListKeys or DescribeKey.
* @return Returns a reference to this object so that method calls can be chained together.
*/
public ImportKeyMaterialRequest withKeyId(String keyId) {
setKeyId(keyId);
return this;
}
/**
*
* The import token that you received in the response to a previous GetParametersForImport request. It must
* be from the same response that contained the public key that you used to encrypt the key material.
*
*
* The AWS SDK for Java performs a Base64 encoding on this field before sending this request to the AWS service.
* Users of the SDK should not perform Base64 encoding on this field.
*
*
* Warning: ByteBuffers returned by the SDK are mutable. Changes to the content or position of the byte buffer will
* be seen by all objects that have a reference to this object. It is recommended to call ByteBuffer.duplicate() or
* ByteBuffer.asReadOnlyBuffer() before using or reading from the buffer. This behavior will be changed in a future
* major version of the SDK.
*
*
* @param importToken
* The import token that you received in the response to a previous GetParametersForImport request. It
* must be from the same response that contained the public key that you used to encrypt the key material.
*/
public void setImportToken(java.nio.ByteBuffer importToken) {
this.importToken = importToken;
}
/**
*
* The import token that you received in the response to a previous GetParametersForImport request. It must
* be from the same response that contained the public key that you used to encrypt the key material.
*
*
* {@code ByteBuffer}s are stateful. Calling their {@code get} methods changes their {@code position}. We recommend
* using {@link java.nio.ByteBuffer#asReadOnlyBuffer()} to create a read-only view of the buffer with an independent
* {@code position}, and calling {@code get} methods on this rather than directly on the returned {@code ByteBuffer}.
* Doing so will ensure that anyone else using the {@code ByteBuffer} will not be affected by changes to the
* {@code position}.
*
*
* @return The import token that you received in the response to a previous GetParametersForImport request.
* It must be from the same response that contained the public key that you used to encrypt the key
* material.
*/
public java.nio.ByteBuffer getImportToken() {
return this.importToken;
}
/**
*
* The import token that you received in the response to a previous GetParametersForImport request. It must
* be from the same response that contained the public key that you used to encrypt the key material.
*
*
* The AWS SDK for Java performs a Base64 encoding on this field before sending this request to the AWS service.
* Users of the SDK should not perform Base64 encoding on this field.
*
*
* Warning: ByteBuffers returned by the SDK are mutable. Changes to the content or position of the byte buffer will
* be seen by all objects that have a reference to this object. It is recommended to call ByteBuffer.duplicate() or
* ByteBuffer.asReadOnlyBuffer() before using or reading from the buffer. This behavior will be changed in a future
* major version of the SDK.
*
*
* @param importToken
* The import token that you received in the response to a previous GetParametersForImport request. It
* must be from the same response that contained the public key that you used to encrypt the key material.
* @return Returns a reference to this object so that method calls can be chained together.
*/
public ImportKeyMaterialRequest withImportToken(java.nio.ByteBuffer importToken) {
setImportToken(importToken);
return this;
}
/**
*
* The encrypted key material to import. The key material must be encrypted under the public wrapping key that
* GetParametersForImport returned, using the wrapping algorithm that you specified in the same
* GetParametersForImport
request.
*
*
* The AWS SDK for Java performs a Base64 encoding on this field before sending this request to the AWS service.
* Users of the SDK should not perform Base64 encoding on this field.
*
*
* Warning: ByteBuffers returned by the SDK are mutable. Changes to the content or position of the byte buffer will
* be seen by all objects that have a reference to this object. It is recommended to call ByteBuffer.duplicate() or
* ByteBuffer.asReadOnlyBuffer() before using or reading from the buffer. This behavior will be changed in a future
* major version of the SDK.
*
*
* @param encryptedKeyMaterial
* The encrypted key material to import. The key material must be encrypted under the public wrapping key
* that GetParametersForImport returned, using the wrapping algorithm that you specified in the same
* GetParametersForImport
request.
*/
public void setEncryptedKeyMaterial(java.nio.ByteBuffer encryptedKeyMaterial) {
this.encryptedKeyMaterial = encryptedKeyMaterial;
}
/**
*
* The encrypted key material to import. The key material must be encrypted under the public wrapping key that
* GetParametersForImport returned, using the wrapping algorithm that you specified in the same
* GetParametersForImport
request.
*
*
* {@code ByteBuffer}s are stateful. Calling their {@code get} methods changes their {@code position}. We recommend
* using {@link java.nio.ByteBuffer#asReadOnlyBuffer()} to create a read-only view of the buffer with an independent
* {@code position}, and calling {@code get} methods on this rather than directly on the returned {@code ByteBuffer}.
* Doing so will ensure that anyone else using the {@code ByteBuffer} will not be affected by changes to the
* {@code position}.
*
*
* @return The encrypted key material to import. The key material must be encrypted under the public wrapping key
* that GetParametersForImport returned, using the wrapping algorithm that you specified in the same
* GetParametersForImport
request.
*/
public java.nio.ByteBuffer getEncryptedKeyMaterial() {
return this.encryptedKeyMaterial;
}
/**
*
* The encrypted key material to import. The key material must be encrypted under the public wrapping key that
* GetParametersForImport returned, using the wrapping algorithm that you specified in the same
* GetParametersForImport
request.
*
*
* The AWS SDK for Java performs a Base64 encoding on this field before sending this request to the AWS service.
* Users of the SDK should not perform Base64 encoding on this field.
*
*
* Warning: ByteBuffers returned by the SDK are mutable. Changes to the content or position of the byte buffer will
* be seen by all objects that have a reference to this object. It is recommended to call ByteBuffer.duplicate() or
* ByteBuffer.asReadOnlyBuffer() before using or reading from the buffer. This behavior will be changed in a future
* major version of the SDK.
*
*
* @param encryptedKeyMaterial
* The encrypted key material to import. The key material must be encrypted under the public wrapping key
* that GetParametersForImport returned, using the wrapping algorithm that you specified in the same
* GetParametersForImport
request.
* @return Returns a reference to this object so that method calls can be chained together.
*/
public ImportKeyMaterialRequest withEncryptedKeyMaterial(java.nio.ByteBuffer encryptedKeyMaterial) {
setEncryptedKeyMaterial(encryptedKeyMaterial);
return this;
}
/**
*
* The date and time when the imported key material expires. This parameter is required when the value of the
* ExpirationModel
parameter is KEY_MATERIAL_EXPIRES
. Otherwise it is not valid.
*
*
* The value of this parameter must be a future date and time. The maximum value is 365 days from the request date.
*
*
* When the key material expires, KMS deletes the key material from the KMS key. Without its key material, the KMS
* key is unusable. To use the KMS key in cryptographic operations, you must reimport the same key material.
*
*
* You cannot change the ExpirationModel
or ValidTo
values for the current import after
* the request completes. To change either value, you must delete (DeleteImportedKeyMaterial) and reimport
* the key material.
*
*
* @param validTo
* The date and time when the imported key material expires. This parameter is required when the value of the
* ExpirationModel
parameter is KEY_MATERIAL_EXPIRES
. Otherwise it is not
* valid.
*
* The value of this parameter must be a future date and time. The maximum value is 365 days from the request
* date.
*
*
* When the key material expires, KMS deletes the key material from the KMS key. Without its key material,
* the KMS key is unusable. To use the KMS key in cryptographic operations, you must reimport the same key
* material.
*
*
* You cannot change the ExpirationModel
or ValidTo
values for the current import
* after the request completes. To change either value, you must delete (DeleteImportedKeyMaterial)
* and reimport the key material.
*/
public void setValidTo(java.util.Date validTo) {
this.validTo = validTo;
}
/**
*
* The date and time when the imported key material expires. This parameter is required when the value of the
* ExpirationModel
parameter is KEY_MATERIAL_EXPIRES
. Otherwise it is not valid.
*
*
* The value of this parameter must be a future date and time. The maximum value is 365 days from the request date.
*
*
* When the key material expires, KMS deletes the key material from the KMS key. Without its key material, the KMS
* key is unusable. To use the KMS key in cryptographic operations, you must reimport the same key material.
*
*
* You cannot change the ExpirationModel
or ValidTo
values for the current import after
* the request completes. To change either value, you must delete (DeleteImportedKeyMaterial) and reimport
* the key material.
*
*
* @return The date and time when the imported key material expires. This parameter is required when the value of
* the ExpirationModel
parameter is KEY_MATERIAL_EXPIRES
. Otherwise it is not
* valid.
*
* The value of this parameter must be a future date and time. The maximum value is 365 days from the
* request date.
*
*
* When the key material expires, KMS deletes the key material from the KMS key. Without its key material,
* the KMS key is unusable. To use the KMS key in cryptographic operations, you must reimport the same key
* material.
*
*
* You cannot change the ExpirationModel
or ValidTo
values for the current import
* after the request completes. To change either value, you must delete (DeleteImportedKeyMaterial)
* and reimport the key material.
*/
public java.util.Date getValidTo() {
return this.validTo;
}
/**
*
* The date and time when the imported key material expires. This parameter is required when the value of the
* ExpirationModel
parameter is KEY_MATERIAL_EXPIRES
. Otherwise it is not valid.
*
*
* The value of this parameter must be a future date and time. The maximum value is 365 days from the request date.
*
*
* When the key material expires, KMS deletes the key material from the KMS key. Without its key material, the KMS
* key is unusable. To use the KMS key in cryptographic operations, you must reimport the same key material.
*
*
* You cannot change the ExpirationModel
or ValidTo
values for the current import after
* the request completes. To change either value, you must delete (DeleteImportedKeyMaterial) and reimport
* the key material.
*
*
* @param validTo
* The date and time when the imported key material expires. This parameter is required when the value of the
* ExpirationModel
parameter is KEY_MATERIAL_EXPIRES
. Otherwise it is not
* valid.
*
* The value of this parameter must be a future date and time. The maximum value is 365 days from the request
* date.
*
*
* When the key material expires, KMS deletes the key material from the KMS key. Without its key material,
* the KMS key is unusable. To use the KMS key in cryptographic operations, you must reimport the same key
* material.
*
*
* You cannot change the ExpirationModel
or ValidTo
values for the current import
* after the request completes. To change either value, you must delete (DeleteImportedKeyMaterial)
* and reimport the key material.
* @return Returns a reference to this object so that method calls can be chained together.
*/
public ImportKeyMaterialRequest withValidTo(java.util.Date validTo) {
setValidTo(validTo);
return this;
}
/**
*
* Specifies whether the key material expires. The default is KEY_MATERIAL_EXPIRES
. For help with this
* choice, see Setting an expiration time in the Key Management Service Developer Guide.
*
*
* When the value of ExpirationModel
is KEY_MATERIAL_EXPIRES
, you must specify a value for
* the ValidTo
parameter. When value is KEY_MATERIAL_DOES_NOT_EXPIRE
, you must omit the
* ValidTo
parameter.
*
*
* You cannot change the ExpirationModel
or ValidTo
values for the current import after
* the request completes. To change either value, you must reimport the key material.
*
*
* @param expirationModel
* Specifies whether the key material expires. The default is KEY_MATERIAL_EXPIRES
. For help
* with this choice, see Setting an expiration time in the Key Management Service Developer Guide.
*
* When the value of ExpirationModel
is KEY_MATERIAL_EXPIRES
, you must specify a
* value for the ValidTo
parameter. When value is KEY_MATERIAL_DOES_NOT_EXPIRE
, you
* must omit the ValidTo
parameter.
*
*
* You cannot change the ExpirationModel
or ValidTo
values for the current import
* after the request completes. To change either value, you must reimport the key material.
* @see ExpirationModelType
*/
public void setExpirationModel(String expirationModel) {
this.expirationModel = expirationModel;
}
/**
*
* Specifies whether the key material expires. The default is KEY_MATERIAL_EXPIRES
. For help with this
* choice, see Setting an expiration time in the Key Management Service Developer Guide.
*
*
* When the value of ExpirationModel
is KEY_MATERIAL_EXPIRES
, you must specify a value for
* the ValidTo
parameter. When value is KEY_MATERIAL_DOES_NOT_EXPIRE
, you must omit the
* ValidTo
parameter.
*
*
* You cannot change the ExpirationModel
or ValidTo
values for the current import after
* the request completes. To change either value, you must reimport the key material.
*
*
* @return Specifies whether the key material expires. The default is KEY_MATERIAL_EXPIRES
. For help
* with this choice, see Setting an expiration time in the Key Management Service Developer Guide.
*
* When the value of ExpirationModel
is KEY_MATERIAL_EXPIRES
, you must specify a
* value for the ValidTo
parameter. When value is KEY_MATERIAL_DOES_NOT_EXPIRE
,
* you must omit the ValidTo
parameter.
*
*
* You cannot change the ExpirationModel
or ValidTo
values for the current import
* after the request completes. To change either value, you must reimport the key material.
* @see ExpirationModelType
*/
public String getExpirationModel() {
return this.expirationModel;
}
/**
*
* Specifies whether the key material expires. The default is KEY_MATERIAL_EXPIRES
. For help with this
* choice, see Setting an expiration time in the Key Management Service Developer Guide.
*
*
* When the value of ExpirationModel
is KEY_MATERIAL_EXPIRES
, you must specify a value for
* the ValidTo
parameter. When value is KEY_MATERIAL_DOES_NOT_EXPIRE
, you must omit the
* ValidTo
parameter.
*
*
* You cannot change the ExpirationModel
or ValidTo
values for the current import after
* the request completes. To change either value, you must reimport the key material.
*
*
* @param expirationModel
* Specifies whether the key material expires. The default is KEY_MATERIAL_EXPIRES
. For help
* with this choice, see Setting an expiration time in the Key Management Service Developer Guide.
*
* When the value of ExpirationModel
is KEY_MATERIAL_EXPIRES
, you must specify a
* value for the ValidTo
parameter. When value is KEY_MATERIAL_DOES_NOT_EXPIRE
, you
* must omit the ValidTo
parameter.
*
*
* You cannot change the ExpirationModel
or ValidTo
values for the current import
* after the request completes. To change either value, you must reimport the key material.
* @return Returns a reference to this object so that method calls can be chained together.
* @see ExpirationModelType
*/
public ImportKeyMaterialRequest withExpirationModel(String expirationModel) {
setExpirationModel(expirationModel);
return this;
}
/**
*
* Specifies whether the key material expires. The default is KEY_MATERIAL_EXPIRES
. For help with this
* choice, see Setting an expiration time in the Key Management Service Developer Guide.
*
*
* When the value of ExpirationModel
is KEY_MATERIAL_EXPIRES
, you must specify a value for
* the ValidTo
parameter. When value is KEY_MATERIAL_DOES_NOT_EXPIRE
, you must omit the
* ValidTo
parameter.
*
*
* You cannot change the ExpirationModel
or ValidTo
values for the current import after
* the request completes. To change either value, you must reimport the key material.
*
*
* @param expirationModel
* Specifies whether the key material expires. The default is KEY_MATERIAL_EXPIRES
. For help
* with this choice, see Setting an expiration time in the Key Management Service Developer Guide.
*
* When the value of ExpirationModel
is KEY_MATERIAL_EXPIRES
, you must specify a
* value for the ValidTo
parameter. When value is KEY_MATERIAL_DOES_NOT_EXPIRE
, you
* must omit the ValidTo
parameter.
*
*
* You cannot change the ExpirationModel
or ValidTo
values for the current import
* after the request completes. To change either value, you must reimport the key material.
* @see ExpirationModelType
*/
public void setExpirationModel(ExpirationModelType expirationModel) {
withExpirationModel(expirationModel);
}
/**
*
* Specifies whether the key material expires. The default is KEY_MATERIAL_EXPIRES
. For help with this
* choice, see Setting an expiration time in the Key Management Service Developer Guide.
*
*
* When the value of ExpirationModel
is KEY_MATERIAL_EXPIRES
, you must specify a value for
* the ValidTo
parameter. When value is KEY_MATERIAL_DOES_NOT_EXPIRE
, you must omit the
* ValidTo
parameter.
*
*
* You cannot change the ExpirationModel
or ValidTo
values for the current import after
* the request completes. To change either value, you must reimport the key material.
*
*
* @param expirationModel
* Specifies whether the key material expires. The default is KEY_MATERIAL_EXPIRES
. For help
* with this choice, see Setting an expiration time in the Key Management Service Developer Guide.
*
* When the value of ExpirationModel
is KEY_MATERIAL_EXPIRES
, you must specify a
* value for the ValidTo
parameter. When value is KEY_MATERIAL_DOES_NOT_EXPIRE
, you
* must omit the ValidTo
parameter.
*
*
* You cannot change the ExpirationModel
or ValidTo
values for the current import
* after the request completes. To change either value, you must reimport the key material.
* @return Returns a reference to this object so that method calls can be chained together.
* @see ExpirationModelType
*/
public ImportKeyMaterialRequest withExpirationModel(ExpirationModelType expirationModel) {
this.expirationModel = expirationModel.toString();
return this;
}
/**
* Returns a string representation of this object. This is useful for testing and debugging. Sensitive data will be
* redacted from this string using a placeholder value.
*
* @return A string representation of this object.
*
* @see java.lang.Object#toString()
*/
@Override
public String toString() {
StringBuilder sb = new StringBuilder();
sb.append("{");
if (getKeyId() != null)
sb.append("KeyId: ").append(getKeyId()).append(",");
if (getImportToken() != null)
sb.append("ImportToken: ").append(getImportToken()).append(",");
if (getEncryptedKeyMaterial() != null)
sb.append("EncryptedKeyMaterial: ").append(getEncryptedKeyMaterial()).append(",");
if (getValidTo() != null)
sb.append("ValidTo: ").append(getValidTo()).append(",");
if (getExpirationModel() != null)
sb.append("ExpirationModel: ").append(getExpirationModel());
sb.append("}");
return sb.toString();
}
@Override
public boolean equals(Object obj) {
if (this == obj)
return true;
if (obj == null)
return false;
if (obj instanceof ImportKeyMaterialRequest == false)
return false;
ImportKeyMaterialRequest other = (ImportKeyMaterialRequest) obj;
if (other.getKeyId() == null ^ this.getKeyId() == null)
return false;
if (other.getKeyId() != null && other.getKeyId().equals(this.getKeyId()) == false)
return false;
if (other.getImportToken() == null ^ this.getImportToken() == null)
return false;
if (other.getImportToken() != null && other.getImportToken().equals(this.getImportToken()) == false)
return false;
if (other.getEncryptedKeyMaterial() == null ^ this.getEncryptedKeyMaterial() == null)
return false;
if (other.getEncryptedKeyMaterial() != null && other.getEncryptedKeyMaterial().equals(this.getEncryptedKeyMaterial()) == false)
return false;
if (other.getValidTo() == null ^ this.getValidTo() == null)
return false;
if (other.getValidTo() != null && other.getValidTo().equals(this.getValidTo()) == false)
return false;
if (other.getExpirationModel() == null ^ this.getExpirationModel() == null)
return false;
if (other.getExpirationModel() != null && other.getExpirationModel().equals(this.getExpirationModel()) == false)
return false;
return true;
}
@Override
public int hashCode() {
final int prime = 31;
int hashCode = 1;
hashCode = prime * hashCode + ((getKeyId() == null) ? 0 : getKeyId().hashCode());
hashCode = prime * hashCode + ((getImportToken() == null) ? 0 : getImportToken().hashCode());
hashCode = prime * hashCode + ((getEncryptedKeyMaterial() == null) ? 0 : getEncryptedKeyMaterial().hashCode());
hashCode = prime * hashCode + ((getValidTo() == null) ? 0 : getValidTo().hashCode());
hashCode = prime * hashCode + ((getExpirationModel() == null) ? 0 : getExpirationModel().hashCode());
return hashCode;
}
@Override
public ImportKeyMaterialRequest clone() {
return (ImportKeyMaterialRequest) super.clone();
}
}