/* * Copyright 2012-2017 Amazon.com, Inc. or its affiliates. All Rights Reserved. * * Licensed under the Apache License, Version 2.0 (the "License"). You may not use this file except in compliance with * the License. A copy of the License is located at * * http://aws.amazon.com/apache2.0 * * or in the "license" file accompanying this file. This file is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR * CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions * and limitations under the License. */ package com.amazonaws.services.kms.model; import java.io.Serializable; import javax.annotation.Generated; import com.amazonaws.AmazonWebServiceRequest; /** * * @see <a href="http://docs.aws.amazon.com/goto/WebAPI/kms-2014-11-01/CreateKey" target="_top">AWS API * Documentation</a> */ @Generated("com.amazonaws:aws-java-sdk-code-generator") public class CreateKeyRequest extends com.amazonaws.AmazonWebServiceRequest implements Serializable, Cloneable { /** * <p> * The key policy to attach to the CMK. * </p> * <p> * If you specify a policy and do not set <code>BypassPolicyLockoutSafetyCheck</code> to true, the policy must meet * the following criteria: * </p> * <ul> * <li> * <p> * It must allow the principal that is making the <code>CreateKey</code> request to make a subsequent * <a>PutKeyPolicy</a> request on the CMK. This reduces the likelihood that the CMK becomes unmanageable. For more * information, refer to the scenario in the <a href= * "http://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html#key-policy-default-allow-root-enable-iam" * >Default Key Policy</a> section in the <i>AWS Key Management Service Developer Guide</i>. * </p> * </li> * <li> * <p> * The principals that are specified in the key policy must exist and be visible to AWS KMS. When you create a new * AWS principal (for example, an IAM user or role), you might need to enforce a delay before specifying the new * principal in a key policy because the new principal might not immediately be visible to AWS KMS. For more * information, see <a href= * "http://docs.aws.amazon.com/IAM/latest/UserGuide/troubleshoot_general.html#troubleshoot_general_eventual-consistency" * >Changes that I make are not always immediately visible</a> in the <i>IAM User Guide</i>. * </p> * </li> * </ul> * <p> * If you do not specify a policy, AWS KMS attaches a default key policy to the CMK. For more information, see <a * href="http://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html#key-policy-default">Default Key * Policy</a> in the <i>AWS Key Management Service Developer Guide</i>. * </p> * <p> * The policy size limit is 32 KiB (32768 bytes). * </p> */ private String policy; /** * <p> * A description of the CMK. * </p> * <p> * Use a description that helps you decide whether the CMK is appropriate for a task. * </p> */ private String description; /** * <p> * The intended use of the CMK. * </p> * <p> * You can use CMKs only for symmetric encryption and decryption. * </p> */ private String keyUsage; /** * <p> * The source of the CMK's key material. * </p> * <p> * The default is <code>AWS_KMS</code>, which means AWS KMS creates the key material. When this parameter is set to * <code>EXTERNAL</code>, the request creates a CMK without key material so that you can import key material from * your existing key management infrastructure. For more information about importing key material into AWS KMS, see * <a href="http://docs.aws.amazon.com/kms/latest/developerguide/importing-keys.html">Importing Key Material</a> in * the <i>AWS Key Management Service Developer Guide</i>. * </p> * <p> * The CMK's <code>Origin</code> is immutable and is set when the CMK is created. * </p> */ private String origin; /** * <p> * A flag to indicate whether to bypass the key policy lockout safety check. * </p> * <important> * <p> * Setting this value to true increases the likelihood that the CMK becomes unmanageable. Do not set this value to * true indiscriminately. * </p> * <p> * For more information, refer to the scenario in the <a href= * "http://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html#key-policy-default-allow-root-enable-iam" * >Default Key Policy</a> section in the <i>AWS Key Management Service Developer Guide</i>. * </p> * </important> * <p> * Use this parameter only when you include a policy in the request and you intend to prevent the principal that is * making the request from making a subsequent <a>PutKeyPolicy</a> request on the CMK. * </p> * <p> * The default value is false. * </p> */ private Boolean bypassPolicyLockoutSafetyCheck; /** * <p> * One or more tags. Each tag consists of a tag key and a tag value. Tag keys and tag values are both required, but * tag values can be empty (null) strings. * </p> * <p> * Use this parameter to tag the CMK when it is created. Alternately, you can omit this parameter and instead tag * the CMK after it is created using <a>TagResource</a>. * </p> */ private com.amazonaws.internal.SdkInternalList<Tag> tags; /** * <p> * The key policy to attach to the CMK. * </p> * <p> * If you specify a policy and do not set <code>BypassPolicyLockoutSafetyCheck</code> to true, the policy must meet * the following criteria: * </p> * <ul> * <li> * <p> * It must allow the principal that is making the <code>CreateKey</code> request to make a subsequent * <a>PutKeyPolicy</a> request on the CMK. This reduces the likelihood that the CMK becomes unmanageable. For more * information, refer to the scenario in the <a href= * "http://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html#key-policy-default-allow-root-enable-iam" * >Default Key Policy</a> section in the <i>AWS Key Management Service Developer Guide</i>. * </p> * </li> * <li> * <p> * The principals that are specified in the key policy must exist and be visible to AWS KMS. When you create a new * AWS principal (for example, an IAM user or role), you might need to enforce a delay before specifying the new * principal in a key policy because the new principal might not immediately be visible to AWS KMS. For more * information, see <a href= * "http://docs.aws.amazon.com/IAM/latest/UserGuide/troubleshoot_general.html#troubleshoot_general_eventual-consistency" * >Changes that I make are not always immediately visible</a> in the <i>IAM User Guide</i>. * </p> * </li> * </ul> * <p> * If you do not specify a policy, AWS KMS attaches a default key policy to the CMK. For more information, see <a * href="http://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html#key-policy-default">Default Key * Policy</a> in the <i>AWS Key Management Service Developer Guide</i>. * </p> * <p> * The policy size limit is 32 KiB (32768 bytes). * </p> * * @param policy * The key policy to attach to the CMK.</p> * <p> * If you specify a policy and do not set <code>BypassPolicyLockoutSafetyCheck</code> to true, the policy * must meet the following criteria: * </p> * <ul> * <li> * <p> * It must allow the principal that is making the <code>CreateKey</code> request to make a subsequent * <a>PutKeyPolicy</a> request on the CMK. This reduces the likelihood that the CMK becomes unmanageable. For * more information, refer to the scenario in the <a href= * "http://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html#key-policy-default-allow-root-enable-iam" * >Default Key Policy</a> section in the <i>AWS Key Management Service Developer Guide</i>. * </p> * </li> * <li> * <p> * The principals that are specified in the key policy must exist and be visible to AWS KMS. When you create * a new AWS principal (for example, an IAM user or role), you might need to enforce a delay before * specifying the new principal in a key policy because the new principal might not immediately be visible to * AWS KMS. For more information, see <a href= * "http://docs.aws.amazon.com/IAM/latest/UserGuide/troubleshoot_general.html#troubleshoot_general_eventual-consistency" * >Changes that I make are not always immediately visible</a> in the <i>IAM User Guide</i>. * </p> * </li> * </ul> * <p> * If you do not specify a policy, AWS KMS attaches a default key policy to the CMK. For more information, * see <a * href="http://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html#key-policy-default">Default * Key Policy</a> in the <i>AWS Key Management Service Developer Guide</i>. * </p> * <p> * The policy size limit is 32 KiB (32768 bytes). */ public void setPolicy(String policy) { this.policy = policy; } /** * <p> * The key policy to attach to the CMK. * </p> * <p> * If you specify a policy and do not set <code>BypassPolicyLockoutSafetyCheck</code> to true, the policy must meet * the following criteria: * </p> * <ul> * <li> * <p> * It must allow the principal that is making the <code>CreateKey</code> request to make a subsequent * <a>PutKeyPolicy</a> request on the CMK. This reduces the likelihood that the CMK becomes unmanageable. For more * information, refer to the scenario in the <a href= * "http://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html#key-policy-default-allow-root-enable-iam" * >Default Key Policy</a> section in the <i>AWS Key Management Service Developer Guide</i>. * </p> * </li> * <li> * <p> * The principals that are specified in the key policy must exist and be visible to AWS KMS. When you create a new * AWS principal (for example, an IAM user or role), you might need to enforce a delay before specifying the new * principal in a key policy because the new principal might not immediately be visible to AWS KMS. For more * information, see <a href= * "http://docs.aws.amazon.com/IAM/latest/UserGuide/troubleshoot_general.html#troubleshoot_general_eventual-consistency" * >Changes that I make are not always immediately visible</a> in the <i>IAM User Guide</i>. * </p> * </li> * </ul> * <p> * If you do not specify a policy, AWS KMS attaches a default key policy to the CMK. For more information, see <a * href="http://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html#key-policy-default">Default Key * Policy</a> in the <i>AWS Key Management Service Developer Guide</i>. * </p> * <p> * The policy size limit is 32 KiB (32768 bytes). * </p> * * @return The key policy to attach to the CMK.</p> * <p> * If you specify a policy and do not set <code>BypassPolicyLockoutSafetyCheck</code> to true, the policy * must meet the following criteria: * </p> * <ul> * <li> * <p> * It must allow the principal that is making the <code>CreateKey</code> request to make a subsequent * <a>PutKeyPolicy</a> request on the CMK. This reduces the likelihood that the CMK becomes unmanageable. * For more information, refer to the scenario in the <a href= * "http://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html#key-policy-default-allow-root-enable-iam" * >Default Key Policy</a> section in the <i>AWS Key Management Service Developer Guide</i>. * </p> * </li> * <li> * <p> * The principals that are specified in the key policy must exist and be visible to AWS KMS. When you create * a new AWS principal (for example, an IAM user or role), you might need to enforce a delay before * specifying the new principal in a key policy because the new principal might not immediately be visible * to AWS KMS. For more information, see <a href= * "http://docs.aws.amazon.com/IAM/latest/UserGuide/troubleshoot_general.html#troubleshoot_general_eventual-consistency" * >Changes that I make are not always immediately visible</a> in the <i>IAM User Guide</i>. * </p> * </li> * </ul> * <p> * If you do not specify a policy, AWS KMS attaches a default key policy to the CMK. For more information, * see <a href="http://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html#key-policy-default"> * Default Key Policy</a> in the <i>AWS Key Management Service Developer Guide</i>. * </p> * <p> * The policy size limit is 32 KiB (32768 bytes). */ public String getPolicy() { return this.policy; } /** * <p> * The key policy to attach to the CMK. * </p> * <p> * If you specify a policy and do not set <code>BypassPolicyLockoutSafetyCheck</code> to true, the policy must meet * the following criteria: * </p> * <ul> * <li> * <p> * It must allow the principal that is making the <code>CreateKey</code> request to make a subsequent * <a>PutKeyPolicy</a> request on the CMK. This reduces the likelihood that the CMK becomes unmanageable. For more * information, refer to the scenario in the <a href= * "http://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html#key-policy-default-allow-root-enable-iam" * >Default Key Policy</a> section in the <i>AWS Key Management Service Developer Guide</i>. * </p> * </li> * <li> * <p> * The principals that are specified in the key policy must exist and be visible to AWS KMS. When you create a new * AWS principal (for example, an IAM user or role), you might need to enforce a delay before specifying the new * principal in a key policy because the new principal might not immediately be visible to AWS KMS. For more * information, see <a href= * "http://docs.aws.amazon.com/IAM/latest/UserGuide/troubleshoot_general.html#troubleshoot_general_eventual-consistency" * >Changes that I make are not always immediately visible</a> in the <i>IAM User Guide</i>. * </p> * </li> * </ul> * <p> * If you do not specify a policy, AWS KMS attaches a default key policy to the CMK. For more information, see <a * href="http://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html#key-policy-default">Default Key * Policy</a> in the <i>AWS Key Management Service Developer Guide</i>. * </p> * <p> * The policy size limit is 32 KiB (32768 bytes). * </p> * * @param policy * The key policy to attach to the CMK.</p> * <p> * If you specify a policy and do not set <code>BypassPolicyLockoutSafetyCheck</code> to true, the policy * must meet the following criteria: * </p> * <ul> * <li> * <p> * It must allow the principal that is making the <code>CreateKey</code> request to make a subsequent * <a>PutKeyPolicy</a> request on the CMK. This reduces the likelihood that the CMK becomes unmanageable. For * more information, refer to the scenario in the <a href= * "http://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html#key-policy-default-allow-root-enable-iam" * >Default Key Policy</a> section in the <i>AWS Key Management Service Developer Guide</i>. * </p> * </li> * <li> * <p> * The principals that are specified in the key policy must exist and be visible to AWS KMS. When you create * a new AWS principal (for example, an IAM user or role), you might need to enforce a delay before * specifying the new principal in a key policy because the new principal might not immediately be visible to * AWS KMS. For more information, see <a href= * "http://docs.aws.amazon.com/IAM/latest/UserGuide/troubleshoot_general.html#troubleshoot_general_eventual-consistency" * >Changes that I make are not always immediately visible</a> in the <i>IAM User Guide</i>. * </p> * </li> * </ul> * <p> * If you do not specify a policy, AWS KMS attaches a default key policy to the CMK. For more information, * see <a * href="http://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html#key-policy-default">Default * Key Policy</a> in the <i>AWS Key Management Service Developer Guide</i>. * </p> * <p> * The policy size limit is 32 KiB (32768 bytes). * @return Returns a reference to this object so that method calls can be chained together. */ public CreateKeyRequest withPolicy(String policy) { setPolicy(policy); return this; } /** * <p> * A description of the CMK. * </p> * <p> * Use a description that helps you decide whether the CMK is appropriate for a task. * </p> * * @param description * A description of the CMK.</p> * <p> * Use a description that helps you decide whether the CMK is appropriate for a task. */ public void setDescription(String description) { this.description = description; } /** * <p> * A description of the CMK. * </p> * <p> * Use a description that helps you decide whether the CMK is appropriate for a task. * </p> * * @return A description of the CMK.</p> * <p> * Use a description that helps you decide whether the CMK is appropriate for a task. */ public String getDescription() { return this.description; } /** * <p> * A description of the CMK. * </p> * <p> * Use a description that helps you decide whether the CMK is appropriate for a task. * </p> * * @param description * A description of the CMK.</p> * <p> * Use a description that helps you decide whether the CMK is appropriate for a task. * @return Returns a reference to this object so that method calls can be chained together. */ public CreateKeyRequest withDescription(String description) { setDescription(description); return this; } /** * <p> * The intended use of the CMK. * </p> * <p> * You can use CMKs only for symmetric encryption and decryption. * </p> * * @param keyUsage * The intended use of the CMK.</p> * <p> * You can use CMKs only for symmetric encryption and decryption. * @see KeyUsageType */ public void setKeyUsage(String keyUsage) { this.keyUsage = keyUsage; } /** * <p> * The intended use of the CMK. * </p> * <p> * You can use CMKs only for symmetric encryption and decryption. * </p> * * @return The intended use of the CMK.</p> * <p> * You can use CMKs only for symmetric encryption and decryption. * @see KeyUsageType */ public String getKeyUsage() { return this.keyUsage; } /** * <p> * The intended use of the CMK. * </p> * <p> * You can use CMKs only for symmetric encryption and decryption. * </p> * * @param keyUsage * The intended use of the CMK.</p> * <p> * You can use CMKs only for symmetric encryption and decryption. * @return Returns a reference to this object so that method calls can be chained together. * @see KeyUsageType */ public CreateKeyRequest withKeyUsage(String keyUsage) { setKeyUsage(keyUsage); return this; } /** * <p> * The intended use of the CMK. * </p> * <p> * You can use CMKs only for symmetric encryption and decryption. * </p> * * @param keyUsage * The intended use of the CMK.</p> * <p> * You can use CMKs only for symmetric encryption and decryption. * @see KeyUsageType */ public void setKeyUsage(KeyUsageType keyUsage) { this.keyUsage = keyUsage.toString(); } /** * <p> * The intended use of the CMK. * </p> * <p> * You can use CMKs only for symmetric encryption and decryption. * </p> * * @param keyUsage * The intended use of the CMK.</p> * <p> * You can use CMKs only for symmetric encryption and decryption. * @return Returns a reference to this object so that method calls can be chained together. * @see KeyUsageType */ public CreateKeyRequest withKeyUsage(KeyUsageType keyUsage) { setKeyUsage(keyUsage); return this; } /** * <p> * The source of the CMK's key material. * </p> * <p> * The default is <code>AWS_KMS</code>, which means AWS KMS creates the key material. When this parameter is set to * <code>EXTERNAL</code>, the request creates a CMK without key material so that you can import key material from * your existing key management infrastructure. For more information about importing key material into AWS KMS, see * <a href="http://docs.aws.amazon.com/kms/latest/developerguide/importing-keys.html">Importing Key Material</a> in * the <i>AWS Key Management Service Developer Guide</i>. * </p> * <p> * The CMK's <code>Origin</code> is immutable and is set when the CMK is created. * </p> * * @param origin * The source of the CMK's key material.</p> * <p> * The default is <code>AWS_KMS</code>, which means AWS KMS creates the key material. When this parameter is * set to <code>EXTERNAL</code>, the request creates a CMK without key material so that you can import key * material from your existing key management infrastructure. For more information about importing key * material into AWS KMS, see <a * href="http://docs.aws.amazon.com/kms/latest/developerguide/importing-keys.html">Importing Key Material</a> * in the <i>AWS Key Management Service Developer Guide</i>. * </p> * <p> * The CMK's <code>Origin</code> is immutable and is set when the CMK is created. * @see OriginType */ public void setOrigin(String origin) { this.origin = origin; } /** * <p> * The source of the CMK's key material. * </p> * <p> * The default is <code>AWS_KMS</code>, which means AWS KMS creates the key material. When this parameter is set to * <code>EXTERNAL</code>, the request creates a CMK without key material so that you can import key material from * your existing key management infrastructure. For more information about importing key material into AWS KMS, see * <a href="http://docs.aws.amazon.com/kms/latest/developerguide/importing-keys.html">Importing Key Material</a> in * the <i>AWS Key Management Service Developer Guide</i>. * </p> * <p> * The CMK's <code>Origin</code> is immutable and is set when the CMK is created. * </p> * * @return The source of the CMK's key material.</p> * <p> * The default is <code>AWS_KMS</code>, which means AWS KMS creates the key material. When this parameter is * set to <code>EXTERNAL</code>, the request creates a CMK without key material so that you can import key * material from your existing key management infrastructure. For more information about importing key * material into AWS KMS, see <a * href="http://docs.aws.amazon.com/kms/latest/developerguide/importing-keys.html">Importing Key * Material</a> in the <i>AWS Key Management Service Developer Guide</i>. * </p> * <p> * The CMK's <code>Origin</code> is immutable and is set when the CMK is created. * @see OriginType */ public String getOrigin() { return this.origin; } /** * <p> * The source of the CMK's key material. * </p> * <p> * The default is <code>AWS_KMS</code>, which means AWS KMS creates the key material. When this parameter is set to * <code>EXTERNAL</code>, the request creates a CMK without key material so that you can import key material from * your existing key management infrastructure. For more information about importing key material into AWS KMS, see * <a href="http://docs.aws.amazon.com/kms/latest/developerguide/importing-keys.html">Importing Key Material</a> in * the <i>AWS Key Management Service Developer Guide</i>. * </p> * <p> * The CMK's <code>Origin</code> is immutable and is set when the CMK is created. * </p> * * @param origin * The source of the CMK's key material.</p> * <p> * The default is <code>AWS_KMS</code>, which means AWS KMS creates the key material. When this parameter is * set to <code>EXTERNAL</code>, the request creates a CMK without key material so that you can import key * material from your existing key management infrastructure. For more information about importing key * material into AWS KMS, see <a * href="http://docs.aws.amazon.com/kms/latest/developerguide/importing-keys.html">Importing Key Material</a> * in the <i>AWS Key Management Service Developer Guide</i>. * </p> * <p> * The CMK's <code>Origin</code> is immutable and is set when the CMK is created. * @return Returns a reference to this object so that method calls can be chained together. * @see OriginType */ public CreateKeyRequest withOrigin(String origin) { setOrigin(origin); return this; } /** * <p> * The source of the CMK's key material. * </p> * <p> * The default is <code>AWS_KMS</code>, which means AWS KMS creates the key material. When this parameter is set to * <code>EXTERNAL</code>, the request creates a CMK without key material so that you can import key material from * your existing key management infrastructure. For more information about importing key material into AWS KMS, see * <a href="http://docs.aws.amazon.com/kms/latest/developerguide/importing-keys.html">Importing Key Material</a> in * the <i>AWS Key Management Service Developer Guide</i>. * </p> * <p> * The CMK's <code>Origin</code> is immutable and is set when the CMK is created. * </p> * * @param origin * The source of the CMK's key material.</p> * <p> * The default is <code>AWS_KMS</code>, which means AWS KMS creates the key material. When this parameter is * set to <code>EXTERNAL</code>, the request creates a CMK without key material so that you can import key * material from your existing key management infrastructure. For more information about importing key * material into AWS KMS, see <a * href="http://docs.aws.amazon.com/kms/latest/developerguide/importing-keys.html">Importing Key Material</a> * in the <i>AWS Key Management Service Developer Guide</i>. * </p> * <p> * The CMK's <code>Origin</code> is immutable and is set when the CMK is created. * @see OriginType */ public void setOrigin(OriginType origin) { this.origin = origin.toString(); } /** * <p> * The source of the CMK's key material. * </p> * <p> * The default is <code>AWS_KMS</code>, which means AWS KMS creates the key material. When this parameter is set to * <code>EXTERNAL</code>, the request creates a CMK without key material so that you can import key material from * your existing key management infrastructure. For more information about importing key material into AWS KMS, see * <a href="http://docs.aws.amazon.com/kms/latest/developerguide/importing-keys.html">Importing Key Material</a> in * the <i>AWS Key Management Service Developer Guide</i>. * </p> * <p> * The CMK's <code>Origin</code> is immutable and is set when the CMK is created. * </p> * * @param origin * The source of the CMK's key material.</p> * <p> * The default is <code>AWS_KMS</code>, which means AWS KMS creates the key material. When this parameter is * set to <code>EXTERNAL</code>, the request creates a CMK without key material so that you can import key * material from your existing key management infrastructure. For more information about importing key * material into AWS KMS, see <a * href="http://docs.aws.amazon.com/kms/latest/developerguide/importing-keys.html">Importing Key Material</a> * in the <i>AWS Key Management Service Developer Guide</i>. * </p> * <p> * The CMK's <code>Origin</code> is immutable and is set when the CMK is created. * @return Returns a reference to this object so that method calls can be chained together. * @see OriginType */ public CreateKeyRequest withOrigin(OriginType origin) { setOrigin(origin); return this; } /** * <p> * A flag to indicate whether to bypass the key policy lockout safety check. * </p> * <important> * <p> * Setting this value to true increases the likelihood that the CMK becomes unmanageable. Do not set this value to * true indiscriminately. * </p> * <p> * For more information, refer to the scenario in the <a href= * "http://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html#key-policy-default-allow-root-enable-iam" * >Default Key Policy</a> section in the <i>AWS Key Management Service Developer Guide</i>. * </p> * </important> * <p> * Use this parameter only when you include a policy in the request and you intend to prevent the principal that is * making the request from making a subsequent <a>PutKeyPolicy</a> request on the CMK. * </p> * <p> * The default value is false. * </p> * * @param bypassPolicyLockoutSafetyCheck * A flag to indicate whether to bypass the key policy lockout safety check.</p> <important> * <p> * Setting this value to true increases the likelihood that the CMK becomes unmanageable. Do not set this * value to true indiscriminately. * </p> * <p> * For more information, refer to the scenario in the <a href= * "http://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html#key-policy-default-allow-root-enable-iam" * >Default Key Policy</a> section in the <i>AWS Key Management Service Developer Guide</i>. * </p> * </important> * <p> * Use this parameter only when you include a policy in the request and you intend to prevent the principal * that is making the request from making a subsequent <a>PutKeyPolicy</a> request on the CMK. * </p> * <p> * The default value is false. */ public void setBypassPolicyLockoutSafetyCheck(Boolean bypassPolicyLockoutSafetyCheck) { this.bypassPolicyLockoutSafetyCheck = bypassPolicyLockoutSafetyCheck; } /** * <p> * A flag to indicate whether to bypass the key policy lockout safety check. * </p> * <important> * <p> * Setting this value to true increases the likelihood that the CMK becomes unmanageable. Do not set this value to * true indiscriminately. * </p> * <p> * For more information, refer to the scenario in the <a href= * "http://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html#key-policy-default-allow-root-enable-iam" * >Default Key Policy</a> section in the <i>AWS Key Management Service Developer Guide</i>. * </p> * </important> * <p> * Use this parameter only when you include a policy in the request and you intend to prevent the principal that is * making the request from making a subsequent <a>PutKeyPolicy</a> request on the CMK. * </p> * <p> * The default value is false. * </p> * * @return A flag to indicate whether to bypass the key policy lockout safety check.</p> <important> * <p> * Setting this value to true increases the likelihood that the CMK becomes unmanageable. Do not set this * value to true indiscriminately. * </p> * <p> * For more information, refer to the scenario in the <a href= * "http://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html#key-policy-default-allow-root-enable-iam" * >Default Key Policy</a> section in the <i>AWS Key Management Service Developer Guide</i>. * </p> * </important> * <p> * Use this parameter only when you include a policy in the request and you intend to prevent the principal * that is making the request from making a subsequent <a>PutKeyPolicy</a> request on the CMK. * </p> * <p> * The default value is false. */ public Boolean getBypassPolicyLockoutSafetyCheck() { return this.bypassPolicyLockoutSafetyCheck; } /** * <p> * A flag to indicate whether to bypass the key policy lockout safety check. * </p> * <important> * <p> * Setting this value to true increases the likelihood that the CMK becomes unmanageable. Do not set this value to * true indiscriminately. * </p> * <p> * For more information, refer to the scenario in the <a href= * "http://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html#key-policy-default-allow-root-enable-iam" * >Default Key Policy</a> section in the <i>AWS Key Management Service Developer Guide</i>. * </p> * </important> * <p> * Use this parameter only when you include a policy in the request and you intend to prevent the principal that is * making the request from making a subsequent <a>PutKeyPolicy</a> request on the CMK. * </p> * <p> * The default value is false. * </p> * * @param bypassPolicyLockoutSafetyCheck * A flag to indicate whether to bypass the key policy lockout safety check.</p> <important> * <p> * Setting this value to true increases the likelihood that the CMK becomes unmanageable. Do not set this * value to true indiscriminately. * </p> * <p> * For more information, refer to the scenario in the <a href= * "http://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html#key-policy-default-allow-root-enable-iam" * >Default Key Policy</a> section in the <i>AWS Key Management Service Developer Guide</i>. * </p> * </important> * <p> * Use this parameter only when you include a policy in the request and you intend to prevent the principal * that is making the request from making a subsequent <a>PutKeyPolicy</a> request on the CMK. * </p> * <p> * The default value is false. * @return Returns a reference to this object so that method calls can be chained together. */ public CreateKeyRequest withBypassPolicyLockoutSafetyCheck(Boolean bypassPolicyLockoutSafetyCheck) { setBypassPolicyLockoutSafetyCheck(bypassPolicyLockoutSafetyCheck); return this; } /** * <p> * A flag to indicate whether to bypass the key policy lockout safety check. * </p> * <important> * <p> * Setting this value to true increases the likelihood that the CMK becomes unmanageable. Do not set this value to * true indiscriminately. * </p> * <p> * For more information, refer to the scenario in the <a href= * "http://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html#key-policy-default-allow-root-enable-iam" * >Default Key Policy</a> section in the <i>AWS Key Management Service Developer Guide</i>. * </p> * </important> * <p> * Use this parameter only when you include a policy in the request and you intend to prevent the principal that is * making the request from making a subsequent <a>PutKeyPolicy</a> request on the CMK. * </p> * <p> * The default value is false. * </p> * * @return A flag to indicate whether to bypass the key policy lockout safety check.</p> <important> * <p> * Setting this value to true increases the likelihood that the CMK becomes unmanageable. Do not set this * value to true indiscriminately. * </p> * <p> * For more information, refer to the scenario in the <a href= * "http://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html#key-policy-default-allow-root-enable-iam" * >Default Key Policy</a> section in the <i>AWS Key Management Service Developer Guide</i>. * </p> * </important> * <p> * Use this parameter only when you include a policy in the request and you intend to prevent the principal * that is making the request from making a subsequent <a>PutKeyPolicy</a> request on the CMK. * </p> * <p> * The default value is false. */ public Boolean isBypassPolicyLockoutSafetyCheck() { return this.bypassPolicyLockoutSafetyCheck; } /** * <p> * One or more tags. Each tag consists of a tag key and a tag value. Tag keys and tag values are both required, but * tag values can be empty (null) strings. * </p> * <p> * Use this parameter to tag the CMK when it is created. Alternately, you can omit this parameter and instead tag * the CMK after it is created using <a>TagResource</a>. * </p> * * @return One or more tags. Each tag consists of a tag key and a tag value. Tag keys and tag values are both * required, but tag values can be empty (null) strings.</p> * <p> * Use this parameter to tag the CMK when it is created. Alternately, you can omit this parameter and * instead tag the CMK after it is created using <a>TagResource</a>. */ public java.util.List<Tag> getTags() { if (tags == null) { tags = new com.amazonaws.internal.SdkInternalList<Tag>(); } return tags; } /** * <p> * One or more tags. Each tag consists of a tag key and a tag value. Tag keys and tag values are both required, but * tag values can be empty (null) strings. * </p> * <p> * Use this parameter to tag the CMK when it is created. Alternately, you can omit this parameter and instead tag * the CMK after it is created using <a>TagResource</a>. * </p> * * @param tags * One or more tags. Each tag consists of a tag key and a tag value. Tag keys and tag values are both * required, but tag values can be empty (null) strings.</p> * <p> * Use this parameter to tag the CMK when it is created. Alternately, you can omit this parameter and instead * tag the CMK after it is created using <a>TagResource</a>. */ public void setTags(java.util.Collection<Tag> tags) { if (tags == null) { this.tags = null; return; } this.tags = new com.amazonaws.internal.SdkInternalList<Tag>(tags); } /** * <p> * One or more tags. Each tag consists of a tag key and a tag value. Tag keys and tag values are both required, but * tag values can be empty (null) strings. * </p> * <p> * Use this parameter to tag the CMK when it is created. Alternately, you can omit this parameter and instead tag * the CMK after it is created using <a>TagResource</a>. * </p> * <p> * <b>NOTE:</b> This method appends the values to the existing list (if any). Use * {@link #setTags(java.util.Collection)} or {@link #withTags(java.util.Collection)} if you want to override the * existing values. * </p> * * @param tags * One or more tags. Each tag consists of a tag key and a tag value. Tag keys and tag values are both * required, but tag values can be empty (null) strings.</p> * <p> * Use this parameter to tag the CMK when it is created. Alternately, you can omit this parameter and instead * tag the CMK after it is created using <a>TagResource</a>. * @return Returns a reference to this object so that method calls can be chained together. */ public CreateKeyRequest withTags(Tag... tags) { if (this.tags == null) { setTags(new com.amazonaws.internal.SdkInternalList<Tag>(tags.length)); } for (Tag ele : tags) { this.tags.add(ele); } return this; } /** * <p> * One or more tags. Each tag consists of a tag key and a tag value. Tag keys and tag values are both required, but * tag values can be empty (null) strings. * </p> * <p> * Use this parameter to tag the CMK when it is created. Alternately, you can omit this parameter and instead tag * the CMK after it is created using <a>TagResource</a>. * </p> * * @param tags * One or more tags. Each tag consists of a tag key and a tag value. Tag keys and tag values are both * required, but tag values can be empty (null) strings.</p> * <p> * Use this parameter to tag the CMK when it is created. Alternately, you can omit this parameter and instead * tag the CMK after it is created using <a>TagResource</a>. * @return Returns a reference to this object so that method calls can be chained together. */ public CreateKeyRequest withTags(java.util.Collection<Tag> tags) { setTags(tags); return this; } /** * Returns a string representation of this object; useful for testing and debugging. * * @return A string representation of this object. * * @see java.lang.Object#toString() */ @Override public String toString() { StringBuilder sb = new StringBuilder(); sb.append("{"); if (getPolicy() != null) sb.append("Policy: ").append(getPolicy()).append(","); if (getDescription() != null) sb.append("Description: ").append(getDescription()).append(","); if (getKeyUsage() != null) sb.append("KeyUsage: ").append(getKeyUsage()).append(","); if (getOrigin() != null) sb.append("Origin: ").append(getOrigin()).append(","); if (getBypassPolicyLockoutSafetyCheck() != null) sb.append("BypassPolicyLockoutSafetyCheck: ").append(getBypassPolicyLockoutSafetyCheck()).append(","); if (getTags() != null) sb.append("Tags: ").append(getTags()); sb.append("}"); return sb.toString(); } @Override public boolean equals(Object obj) { if (this == obj) return true; if (obj == null) return false; if (obj instanceof CreateKeyRequest == false) return false; CreateKeyRequest other = (CreateKeyRequest) obj; if (other.getPolicy() == null ^ this.getPolicy() == null) return false; if (other.getPolicy() != null && other.getPolicy().equals(this.getPolicy()) == false) return false; if (other.getDescription() == null ^ this.getDescription() == null) return false; if (other.getDescription() != null && other.getDescription().equals(this.getDescription()) == false) return false; if (other.getKeyUsage() == null ^ this.getKeyUsage() == null) return false; if (other.getKeyUsage() != null && other.getKeyUsage().equals(this.getKeyUsage()) == false) return false; if (other.getOrigin() == null ^ this.getOrigin() == null) return false; if (other.getOrigin() != null && other.getOrigin().equals(this.getOrigin()) == false) return false; if (other.getBypassPolicyLockoutSafetyCheck() == null ^ this.getBypassPolicyLockoutSafetyCheck() == null) return false; if (other.getBypassPolicyLockoutSafetyCheck() != null && other.getBypassPolicyLockoutSafetyCheck().equals(this.getBypassPolicyLockoutSafetyCheck()) == false) return false; if (other.getTags() == null ^ this.getTags() == null) return false; if (other.getTags() != null && other.getTags().equals(this.getTags()) == false) return false; return true; } @Override public int hashCode() { final int prime = 31; int hashCode = 1; hashCode = prime * hashCode + ((getPolicy() == null) ? 0 : getPolicy().hashCode()); hashCode = prime * hashCode + ((getDescription() == null) ? 0 : getDescription().hashCode()); hashCode = prime * hashCode + ((getKeyUsage() == null) ? 0 : getKeyUsage().hashCode()); hashCode = prime * hashCode + ((getOrigin() == null) ? 0 : getOrigin().hashCode()); hashCode = prime * hashCode + ((getBypassPolicyLockoutSafetyCheck() == null) ? 0 : getBypassPolicyLockoutSafetyCheck().hashCode()); hashCode = prime * hashCode + ((getTags() == null) ? 0 : getTags().hashCode()); return hashCode; } @Override public CreateKeyRequest clone() { return (CreateKeyRequest) super.clone(); } }