
software.amazon.awssdk.services.kms.model.GetParametersForImportRequest Maven / Gradle / Ivy
/*
* Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
*
* Licensed under the Apache License, Version 2.0 (the "License"). You may not use this file except in compliance with
* the License. A copy of the License is located at
*
* http://aws.amazon.com/apache2.0
*
* or in the "license" file accompanying this file. This file is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR
* CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions
* and limitations under the License.
*/
package software.amazon.awssdk.services.kms.model;
import java.util.Arrays;
import java.util.Collections;
import java.util.List;
import java.util.Objects;
import java.util.Optional;
import java.util.function.BiConsumer;
import java.util.function.Consumer;
import java.util.function.Function;
import software.amazon.awssdk.annotations.Generated;
import software.amazon.awssdk.awscore.AwsRequestOverrideConfiguration;
import software.amazon.awssdk.core.SdkField;
import software.amazon.awssdk.core.SdkPojo;
import software.amazon.awssdk.core.protocol.MarshallLocation;
import software.amazon.awssdk.core.protocol.MarshallingType;
import software.amazon.awssdk.core.traits.LocationTrait;
import software.amazon.awssdk.utils.ToString;
import software.amazon.awssdk.utils.builder.CopyableBuilder;
import software.amazon.awssdk.utils.builder.ToCopyableBuilder;
/**
*/
@Generated("software.amazon.awssdk:codegen")
public final class GetParametersForImportRequest extends KmsRequest implements
ToCopyableBuilder {
private static final SdkField KEY_ID_FIELD = SdkField. builder(MarshallingType.STRING).memberName("KeyId")
.getter(getter(GetParametersForImportRequest::keyId)).setter(setter(Builder::keyId))
.traits(LocationTrait.builder().location(MarshallLocation.PAYLOAD).locationName("KeyId").build()).build();
private static final SdkField WRAPPING_ALGORITHM_FIELD = SdkField. builder(MarshallingType.STRING)
.memberName("WrappingAlgorithm").getter(getter(GetParametersForImportRequest::wrappingAlgorithmAsString))
.setter(setter(Builder::wrappingAlgorithm))
.traits(LocationTrait.builder().location(MarshallLocation.PAYLOAD).locationName("WrappingAlgorithm").build()).build();
private static final SdkField WRAPPING_KEY_SPEC_FIELD = SdkField. builder(MarshallingType.STRING)
.memberName("WrappingKeySpec").getter(getter(GetParametersForImportRequest::wrappingKeySpecAsString))
.setter(setter(Builder::wrappingKeySpec))
.traits(LocationTrait.builder().location(MarshallLocation.PAYLOAD).locationName("WrappingKeySpec").build()).build();
private static final List> SDK_FIELDS = Collections.unmodifiableList(Arrays.asList(KEY_ID_FIELD,
WRAPPING_ALGORITHM_FIELD, WRAPPING_KEY_SPEC_FIELD));
private final String keyId;
private final String wrappingAlgorithm;
private final String wrappingKeySpec;
private GetParametersForImportRequest(BuilderImpl builder) {
super(builder);
this.keyId = builder.keyId;
this.wrappingAlgorithm = builder.wrappingAlgorithm;
this.wrappingKeySpec = builder.wrappingKeySpec;
}
/**
*
* The identifier of the KMS key that will be associated with the imported key material. The Origin
of
* the KMS key must be EXTERNAL
.
*
*
* All KMS key types are supported, including multi-Region keys. However, you cannot import key material into a KMS
* key in a custom key store.
*
*
* Specify the key ID or key ARN of the KMS key.
*
*
* For example:
*
*
* -
*
* Key ID: 1234abcd-12ab-34cd-56ef-1234567890ab
*
*
* -
*
* Key ARN: arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab
*
*
*
*
* To get the key ID and key ARN for a KMS key, use ListKeys or DescribeKey.
*
*
* @return The identifier of the KMS key that will be associated with the imported key material. The
* Origin
of the KMS key must be EXTERNAL
.
*
* All KMS key types are supported, including multi-Region keys. However, you cannot import key material
* into a KMS key in a custom key store.
*
*
* Specify the key ID or key ARN of the KMS key.
*
*
* For example:
*
*
* -
*
* Key ID: 1234abcd-12ab-34cd-56ef-1234567890ab
*
*
* -
*
* Key ARN: arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab
*
*
*
*
* To get the key ID and key ARN for a KMS key, use ListKeys or DescribeKey.
*/
public final String keyId() {
return keyId;
}
/**
*
* The algorithm you will use with the RSA public key (PublicKey
) in the response to protect your key
* material during import. For more information, see Select a
* wrapping algorithm in the Key Management Service Developer Guide.
*
*
* For RSA_AES wrapping algorithms, you encrypt your key material with an AES key that you generate, then encrypt
* your AES key with the RSA public key from KMS. For RSAES wrapping algorithms, you encrypt your key material
* directly with the RSA public key from KMS.
*
*
* The wrapping algorithms that you can use depend on the type of key material that you are importing. To import an
* RSA private key, you must use an RSA_AES wrapping algorithm.
*
*
* -
*
* RSA_AES_KEY_WRAP_SHA_256 — Supported for wrapping RSA and ECC key material.
*
*
* -
*
* RSA_AES_KEY_WRAP_SHA_1 — Supported for wrapping RSA and ECC key material.
*
*
* -
*
* RSAES_OAEP_SHA_256 — Supported for all types of key material, except RSA key material (private key).
*
*
* You cannot use the RSAES_OAEP_SHA_256 wrapping algorithm with the RSA_2048 wrapping key spec to wrap
* ECC_NIST_P521 key material.
*
*
* -
*
* RSAES_OAEP_SHA_1 — Supported for all types of key material, except RSA key material (private key).
*
*
* You cannot use the RSAES_OAEP_SHA_1 wrapping algorithm with the RSA_2048 wrapping key spec to wrap ECC_NIST_P521
* key material.
*
*
* -
*
* RSAES_PKCS1_V1_5 (Deprecated) — As of October 10, 2023, KMS does not support the RSAES_PKCS1_V1_5 wrapping
* algorithm.
*
*
*
*
* If the service returns an enum value that is not available in the current SDK version, {@link #wrappingAlgorithm}
* will return {@link AlgorithmSpec#UNKNOWN_TO_SDK_VERSION}. The raw value returned by the service is available from
* {@link #wrappingAlgorithmAsString}.
*
*
* @return The algorithm you will use with the RSA public key (PublicKey
) in the response to protect
* your key material during import. For more information, see Select a wrapping algorithm in the Key Management Service Developer Guide.
*
* For RSA_AES wrapping algorithms, you encrypt your key material with an AES key that you generate, then
* encrypt your AES key with the RSA public key from KMS. For RSAES wrapping algorithms, you encrypt your
* key material directly with the RSA public key from KMS.
*
*
* The wrapping algorithms that you can use depend on the type of key material that you are importing. To
* import an RSA private key, you must use an RSA_AES wrapping algorithm.
*
*
* -
*
* RSA_AES_KEY_WRAP_SHA_256 — Supported for wrapping RSA and ECC key material.
*
*
* -
*
* RSA_AES_KEY_WRAP_SHA_1 — Supported for wrapping RSA and ECC key material.
*
*
* -
*
* RSAES_OAEP_SHA_256 — Supported for all types of key material, except RSA key material (private
* key).
*
*
* You cannot use the RSAES_OAEP_SHA_256 wrapping algorithm with the RSA_2048 wrapping key spec to wrap
* ECC_NIST_P521 key material.
*
*
* -
*
* RSAES_OAEP_SHA_1 — Supported for all types of key material, except RSA key material (private key).
*
*
* You cannot use the RSAES_OAEP_SHA_1 wrapping algorithm with the RSA_2048 wrapping key spec to wrap
* ECC_NIST_P521 key material.
*
*
* -
*
* RSAES_PKCS1_V1_5 (Deprecated) — As of October 10, 2023, KMS does not support the RSAES_PKCS1_V1_5
* wrapping algorithm.
*
*
* @see AlgorithmSpec
*/
public final AlgorithmSpec wrappingAlgorithm() {
return AlgorithmSpec.fromValue(wrappingAlgorithm);
}
/**
*
* The algorithm you will use with the RSA public key (PublicKey
) in the response to protect your key
* material during import. For more information, see Select a
* wrapping algorithm in the Key Management Service Developer Guide.
*
*
* For RSA_AES wrapping algorithms, you encrypt your key material with an AES key that you generate, then encrypt
* your AES key with the RSA public key from KMS. For RSAES wrapping algorithms, you encrypt your key material
* directly with the RSA public key from KMS.
*
*
* The wrapping algorithms that you can use depend on the type of key material that you are importing. To import an
* RSA private key, you must use an RSA_AES wrapping algorithm.
*
*
* -
*
* RSA_AES_KEY_WRAP_SHA_256 — Supported for wrapping RSA and ECC key material.
*
*
* -
*
* RSA_AES_KEY_WRAP_SHA_1 — Supported for wrapping RSA and ECC key material.
*
*
* -
*
* RSAES_OAEP_SHA_256 — Supported for all types of key material, except RSA key material (private key).
*
*
* You cannot use the RSAES_OAEP_SHA_256 wrapping algorithm with the RSA_2048 wrapping key spec to wrap
* ECC_NIST_P521 key material.
*
*
* -
*
* RSAES_OAEP_SHA_1 — Supported for all types of key material, except RSA key material (private key).
*
*
* You cannot use the RSAES_OAEP_SHA_1 wrapping algorithm with the RSA_2048 wrapping key spec to wrap ECC_NIST_P521
* key material.
*
*
* -
*
* RSAES_PKCS1_V1_5 (Deprecated) — As of October 10, 2023, KMS does not support the RSAES_PKCS1_V1_5 wrapping
* algorithm.
*
*
*
*
* If the service returns an enum value that is not available in the current SDK version, {@link #wrappingAlgorithm}
* will return {@link AlgorithmSpec#UNKNOWN_TO_SDK_VERSION}. The raw value returned by the service is available from
* {@link #wrappingAlgorithmAsString}.
*
*
* @return The algorithm you will use with the RSA public key (PublicKey
) in the response to protect
* your key material during import. For more information, see Select a wrapping algorithm in the Key Management Service Developer Guide.
*
* For RSA_AES wrapping algorithms, you encrypt your key material with an AES key that you generate, then
* encrypt your AES key with the RSA public key from KMS. For RSAES wrapping algorithms, you encrypt your
* key material directly with the RSA public key from KMS.
*
*
* The wrapping algorithms that you can use depend on the type of key material that you are importing. To
* import an RSA private key, you must use an RSA_AES wrapping algorithm.
*
*
* -
*
* RSA_AES_KEY_WRAP_SHA_256 — Supported for wrapping RSA and ECC key material.
*
*
* -
*
* RSA_AES_KEY_WRAP_SHA_1 — Supported for wrapping RSA and ECC key material.
*
*
* -
*
* RSAES_OAEP_SHA_256 — Supported for all types of key material, except RSA key material (private
* key).
*
*
* You cannot use the RSAES_OAEP_SHA_256 wrapping algorithm with the RSA_2048 wrapping key spec to wrap
* ECC_NIST_P521 key material.
*
*
* -
*
* RSAES_OAEP_SHA_1 — Supported for all types of key material, except RSA key material (private key).
*
*
* You cannot use the RSAES_OAEP_SHA_1 wrapping algorithm with the RSA_2048 wrapping key spec to wrap
* ECC_NIST_P521 key material.
*
*
* -
*
* RSAES_PKCS1_V1_5 (Deprecated) — As of October 10, 2023, KMS does not support the RSAES_PKCS1_V1_5
* wrapping algorithm.
*
*
* @see AlgorithmSpec
*/
public final String wrappingAlgorithmAsString() {
return wrappingAlgorithm;
}
/**
*
* The type of RSA public key to return in the response. You will use this wrapping key with the specified wrapping
* algorithm to protect your key material during import.
*
*
* Use the longest RSA wrapping key that is practical.
*
*
* You cannot use an RSA_2048 public key to directly wrap an ECC_NIST_P521 private key. Instead, use an RSA_AES
* wrapping algorithm or choose a longer RSA public key.
*
*
* If the service returns an enum value that is not available in the current SDK version, {@link #wrappingKeySpec}
* will return {@link WrappingKeySpec#UNKNOWN_TO_SDK_VERSION}. The raw value returned by the service is available
* from {@link #wrappingKeySpecAsString}.
*
*
* @return The type of RSA public key to return in the response. You will use this wrapping key with the specified
* wrapping algorithm to protect your key material during import.
*
* Use the longest RSA wrapping key that is practical.
*
*
* You cannot use an RSA_2048 public key to directly wrap an ECC_NIST_P521 private key. Instead, use an
* RSA_AES wrapping algorithm or choose a longer RSA public key.
* @see WrappingKeySpec
*/
public final WrappingKeySpec wrappingKeySpec() {
return WrappingKeySpec.fromValue(wrappingKeySpec);
}
/**
*
* The type of RSA public key to return in the response. You will use this wrapping key with the specified wrapping
* algorithm to protect your key material during import.
*
*
* Use the longest RSA wrapping key that is practical.
*
*
* You cannot use an RSA_2048 public key to directly wrap an ECC_NIST_P521 private key. Instead, use an RSA_AES
* wrapping algorithm or choose a longer RSA public key.
*
*
* If the service returns an enum value that is not available in the current SDK version, {@link #wrappingKeySpec}
* will return {@link WrappingKeySpec#UNKNOWN_TO_SDK_VERSION}. The raw value returned by the service is available
* from {@link #wrappingKeySpecAsString}.
*
*
* @return The type of RSA public key to return in the response. You will use this wrapping key with the specified
* wrapping algorithm to protect your key material during import.
*
* Use the longest RSA wrapping key that is practical.
*
*
* You cannot use an RSA_2048 public key to directly wrap an ECC_NIST_P521 private key. Instead, use an
* RSA_AES wrapping algorithm or choose a longer RSA public key.
* @see WrappingKeySpec
*/
public final String wrappingKeySpecAsString() {
return wrappingKeySpec;
}
@Override
public Builder toBuilder() {
return new BuilderImpl(this);
}
public static Builder builder() {
return new BuilderImpl();
}
public static Class extends Builder> serializableBuilderClass() {
return BuilderImpl.class;
}
@Override
public final int hashCode() {
int hashCode = 1;
hashCode = 31 * hashCode + super.hashCode();
hashCode = 31 * hashCode + Objects.hashCode(keyId());
hashCode = 31 * hashCode + Objects.hashCode(wrappingAlgorithmAsString());
hashCode = 31 * hashCode + Objects.hashCode(wrappingKeySpecAsString());
return hashCode;
}
@Override
public final boolean equals(Object obj) {
return super.equals(obj) && equalsBySdkFields(obj);
}
@Override
public final boolean equalsBySdkFields(Object obj) {
if (this == obj) {
return true;
}
if (obj == null) {
return false;
}
if (!(obj instanceof GetParametersForImportRequest)) {
return false;
}
GetParametersForImportRequest other = (GetParametersForImportRequest) obj;
return Objects.equals(keyId(), other.keyId())
&& Objects.equals(wrappingAlgorithmAsString(), other.wrappingAlgorithmAsString())
&& Objects.equals(wrappingKeySpecAsString(), other.wrappingKeySpecAsString());
}
/**
* Returns a string representation of this object. This is useful for testing and debugging. Sensitive data will be
* redacted from this string using a placeholder value.
*/
@Override
public final String toString() {
return ToString.builder("GetParametersForImportRequest").add("KeyId", keyId())
.add("WrappingAlgorithm", wrappingAlgorithmAsString()).add("WrappingKeySpec", wrappingKeySpecAsString()).build();
}
public final Optional getValueForField(String fieldName, Class clazz) {
switch (fieldName) {
case "KeyId":
return Optional.ofNullable(clazz.cast(keyId()));
case "WrappingAlgorithm":
return Optional.ofNullable(clazz.cast(wrappingAlgorithmAsString()));
case "WrappingKeySpec":
return Optional.ofNullable(clazz.cast(wrappingKeySpecAsString()));
default:
return Optional.empty();
}
}
@Override
public final List> sdkFields() {
return SDK_FIELDS;
}
private static Function
*
* All KMS key types are supported, including multi-Region keys. However, you cannot import key material
* into a KMS key in a custom key store.
*
*
* Specify the key ID or key ARN of the KMS key.
*
*
* For example:
*
*
* -
*
* Key ID: 1234abcd-12ab-34cd-56ef-1234567890ab
*
*
* -
*
* Key ARN: arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab
*
*
*
*
* To get the key ID and key ARN for a KMS key, use ListKeys or DescribeKey.
* @return Returns a reference to this object so that method calls can be chained together.
*/
Builder keyId(String keyId);
/**
*
* The algorithm you will use with the RSA public key (PublicKey
) in the response to protect your
* key material during import. For more information, see Select a wrapping algorithm in the Key Management Service Developer Guide.
*
*
* For RSA_AES wrapping algorithms, you encrypt your key material with an AES key that you generate, then
* encrypt your AES key with the RSA public key from KMS. For RSAES wrapping algorithms, you encrypt your key
* material directly with the RSA public key from KMS.
*
*
* The wrapping algorithms that you can use depend on the type of key material that you are importing. To import
* an RSA private key, you must use an RSA_AES wrapping algorithm.
*
*
* -
*
* RSA_AES_KEY_WRAP_SHA_256 — Supported for wrapping RSA and ECC key material.
*
*
* -
*
* RSA_AES_KEY_WRAP_SHA_1 — Supported for wrapping RSA and ECC key material.
*
*
* -
*
* RSAES_OAEP_SHA_256 — Supported for all types of key material, except RSA key material (private key).
*
*
* You cannot use the RSAES_OAEP_SHA_256 wrapping algorithm with the RSA_2048 wrapping key spec to wrap
* ECC_NIST_P521 key material.
*
*
* -
*
* RSAES_OAEP_SHA_1 — Supported for all types of key material, except RSA key material (private key).
*
*
* You cannot use the RSAES_OAEP_SHA_1 wrapping algorithm with the RSA_2048 wrapping key spec to wrap
* ECC_NIST_P521 key material.
*
*
* -
*
* RSAES_PKCS1_V1_5 (Deprecated) — As of October 10, 2023, KMS does not support the RSAES_PKCS1_V1_5
* wrapping algorithm.
*
*
*
*
* @param wrappingAlgorithm
* The algorithm you will use with the RSA public key (PublicKey
) in the response to protect
* your key material during import. For more information, see Select a wrapping algorithm in the Key Management Service Developer Guide.
*
* For RSA_AES wrapping algorithms, you encrypt your key material with an AES key that you generate, then
* encrypt your AES key with the RSA public key from KMS. For RSAES wrapping algorithms, you encrypt your
* key material directly with the RSA public key from KMS.
*
*
* The wrapping algorithms that you can use depend on the type of key material that you are importing. To
* import an RSA private key, you must use an RSA_AES wrapping algorithm.
*
*
* -
*
* RSA_AES_KEY_WRAP_SHA_256 — Supported for wrapping RSA and ECC key material.
*
*
* -
*
* RSA_AES_KEY_WRAP_SHA_1 — Supported for wrapping RSA and ECC key material.
*
*
* -
*
* RSAES_OAEP_SHA_256 — Supported for all types of key material, except RSA key material (private
* key).
*
*
* You cannot use the RSAES_OAEP_SHA_256 wrapping algorithm with the RSA_2048 wrapping key spec to wrap
* ECC_NIST_P521 key material.
*
*
* -
*
* RSAES_OAEP_SHA_1 — Supported for all types of key material, except RSA key material (private
* key).
*
*
* You cannot use the RSAES_OAEP_SHA_1 wrapping algorithm with the RSA_2048 wrapping key spec to wrap
* ECC_NIST_P521 key material.
*
*
* -
*
* RSAES_PKCS1_V1_5 (Deprecated) — As of October 10, 2023, KMS does not support the
* RSAES_PKCS1_V1_5 wrapping algorithm.
*
*
* @see AlgorithmSpec
* @return Returns a reference to this object so that method calls can be chained together.
* @see AlgorithmSpec
*/
Builder wrappingAlgorithm(String wrappingAlgorithm);
/**
*
* The algorithm you will use with the RSA public key (PublicKey
) in the response to protect your
* key material during import. For more information, see Select a wrapping algorithm in the Key Management Service Developer Guide.
*
*
* For RSA_AES wrapping algorithms, you encrypt your key material with an AES key that you generate, then
* encrypt your AES key with the RSA public key from KMS. For RSAES wrapping algorithms, you encrypt your key
* material directly with the RSA public key from KMS.
*
*
* The wrapping algorithms that you can use depend on the type of key material that you are importing. To import
* an RSA private key, you must use an RSA_AES wrapping algorithm.
*
*
* -
*
* RSA_AES_KEY_WRAP_SHA_256 — Supported for wrapping RSA and ECC key material.
*
*
* -
*
* RSA_AES_KEY_WRAP_SHA_1 — Supported for wrapping RSA and ECC key material.
*
*
* -
*
* RSAES_OAEP_SHA_256 — Supported for all types of key material, except RSA key material (private key).
*
*
* You cannot use the RSAES_OAEP_SHA_256 wrapping algorithm with the RSA_2048 wrapping key spec to wrap
* ECC_NIST_P521 key material.
*
*
* -
*
* RSAES_OAEP_SHA_1 — Supported for all types of key material, except RSA key material (private key).
*
*
* You cannot use the RSAES_OAEP_SHA_1 wrapping algorithm with the RSA_2048 wrapping key spec to wrap
* ECC_NIST_P521 key material.
*
*
* -
*
* RSAES_PKCS1_V1_5 (Deprecated) — As of October 10, 2023, KMS does not support the RSAES_PKCS1_V1_5
* wrapping algorithm.
*
*
*
*
* @param wrappingAlgorithm
* The algorithm you will use with the RSA public key (PublicKey
) in the response to protect
* your key material during import. For more information, see Select a wrapping algorithm in the Key Management Service Developer Guide.
*
* For RSA_AES wrapping algorithms, you encrypt your key material with an AES key that you generate, then
* encrypt your AES key with the RSA public key from KMS. For RSAES wrapping algorithms, you encrypt your
* key material directly with the RSA public key from KMS.
*
*
* The wrapping algorithms that you can use depend on the type of key material that you are importing. To
* import an RSA private key, you must use an RSA_AES wrapping algorithm.
*
*
* -
*
* RSA_AES_KEY_WRAP_SHA_256 — Supported for wrapping RSA and ECC key material.
*
*
* -
*
* RSA_AES_KEY_WRAP_SHA_1 — Supported for wrapping RSA and ECC key material.
*
*
* -
*
* RSAES_OAEP_SHA_256 — Supported for all types of key material, except RSA key material (private
* key).
*
*
* You cannot use the RSAES_OAEP_SHA_256 wrapping algorithm with the RSA_2048 wrapping key spec to wrap
* ECC_NIST_P521 key material.
*
*
* -
*
* RSAES_OAEP_SHA_1 — Supported for all types of key material, except RSA key material (private
* key).
*
*
* You cannot use the RSAES_OAEP_SHA_1 wrapping algorithm with the RSA_2048 wrapping key spec to wrap
* ECC_NIST_P521 key material.
*
*
* -
*
* RSAES_PKCS1_V1_5 (Deprecated) — As of October 10, 2023, KMS does not support the
* RSAES_PKCS1_V1_5 wrapping algorithm.
*
*
* @see AlgorithmSpec
* @return Returns a reference to this object so that method calls can be chained together.
* @see AlgorithmSpec
*/
Builder wrappingAlgorithm(AlgorithmSpec wrappingAlgorithm);
/**
*
* The type of RSA public key to return in the response. You will use this wrapping key with the specified
* wrapping algorithm to protect your key material during import.
*
*
* Use the longest RSA wrapping key that is practical.
*
*
* You cannot use an RSA_2048 public key to directly wrap an ECC_NIST_P521 private key. Instead, use an RSA_AES
* wrapping algorithm or choose a longer RSA public key.
*
*
* @param wrappingKeySpec
* The type of RSA public key to return in the response. You will use this wrapping key with the
* specified wrapping algorithm to protect your key material during import.
*
* Use the longest RSA wrapping key that is practical.
*
*
* You cannot use an RSA_2048 public key to directly wrap an ECC_NIST_P521 private key. Instead, use an
* RSA_AES wrapping algorithm or choose a longer RSA public key.
* @see WrappingKeySpec
* @return Returns a reference to this object so that method calls can be chained together.
* @see WrappingKeySpec
*/
Builder wrappingKeySpec(String wrappingKeySpec);
/**
*
* The type of RSA public key to return in the response. You will use this wrapping key with the specified
* wrapping algorithm to protect your key material during import.
*
*
* Use the longest RSA wrapping key that is practical.
*
*
* You cannot use an RSA_2048 public key to directly wrap an ECC_NIST_P521 private key. Instead, use an RSA_AES
* wrapping algorithm or choose a longer RSA public key.
*
*
* @param wrappingKeySpec
* The type of RSA public key to return in the response. You will use this wrapping key with the
* specified wrapping algorithm to protect your key material during import.
*
* Use the longest RSA wrapping key that is practical.
*
*
* You cannot use an RSA_2048 public key to directly wrap an ECC_NIST_P521 private key. Instead, use an
* RSA_AES wrapping algorithm or choose a longer RSA public key.
* @see WrappingKeySpec
* @return Returns a reference to this object so that method calls can be chained together.
* @see WrappingKeySpec
*/
Builder wrappingKeySpec(WrappingKeySpec wrappingKeySpec);
@Override
Builder overrideConfiguration(AwsRequestOverrideConfiguration overrideConfiguration);
@Override
Builder overrideConfiguration(Consumer builderConsumer);
}
static final class BuilderImpl extends KmsRequest.BuilderImpl implements Builder {
private String keyId;
private String wrappingAlgorithm;
private String wrappingKeySpec;
private BuilderImpl() {
}
private BuilderImpl(GetParametersForImportRequest model) {
super(model);
keyId(model.keyId);
wrappingAlgorithm(model.wrappingAlgorithm);
wrappingKeySpec(model.wrappingKeySpec);
}
public final String getKeyId() {
return keyId;
}
public final void setKeyId(String keyId) {
this.keyId = keyId;
}
@Override
public final Builder keyId(String keyId) {
this.keyId = keyId;
return this;
}
public final String getWrappingAlgorithm() {
return wrappingAlgorithm;
}
public final void setWrappingAlgorithm(String wrappingAlgorithm) {
this.wrappingAlgorithm = wrappingAlgorithm;
}
@Override
public final Builder wrappingAlgorithm(String wrappingAlgorithm) {
this.wrappingAlgorithm = wrappingAlgorithm;
return this;
}
@Override
public final Builder wrappingAlgorithm(AlgorithmSpec wrappingAlgorithm) {
this.wrappingAlgorithm(wrappingAlgorithm == null ? null : wrappingAlgorithm.toString());
return this;
}
public final String getWrappingKeySpec() {
return wrappingKeySpec;
}
public final void setWrappingKeySpec(String wrappingKeySpec) {
this.wrappingKeySpec = wrappingKeySpec;
}
@Override
public final Builder wrappingKeySpec(String wrappingKeySpec) {
this.wrappingKeySpec = wrappingKeySpec;
return this;
}
@Override
public final Builder wrappingKeySpec(WrappingKeySpec wrappingKeySpec) {
this.wrappingKeySpec(wrappingKeySpec == null ? null : wrappingKeySpec.toString());
return this;
}
@Override
public Builder overrideConfiguration(AwsRequestOverrideConfiguration overrideConfiguration) {
super.overrideConfiguration(overrideConfiguration);
return this;
}
@Override
public Builder overrideConfiguration(Consumer builderConsumer) {
super.overrideConfiguration(builderConsumer);
return this;
}
@Override
public GetParametersForImportRequest build() {
return new GetParametersForImportRequest(this);
}
@Override
public List> sdkFields() {
return SDK_FIELDS;
}
}
}