@aws-sdk/client-kms 3.131.0 → 3.132.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (37) hide show
  1. package/CHANGELOG.md +11 -0
  2. package/dist-cjs/models/models_0.js +6 -0
  3. package/dist-cjs/pagination/DescribeCustomKeyStoresPaginator.js +36 -0
  4. package/dist-cjs/pagination/ListResourceTagsPaginator.js +36 -0
  5. package/dist-cjs/pagination/ListRetirableGrantsPaginator.js +36 -0
  6. package/dist-cjs/pagination/index.js +3 -0
  7. package/dist-es/models/models_0.js +6 -0
  8. package/dist-es/pagination/DescribeCustomKeyStoresPaginator.js +75 -0
  9. package/dist-es/pagination/ListResourceTagsPaginator.js +75 -0
  10. package/dist-es/pagination/ListRetirableGrantsPaginator.js +75 -0
  11. package/dist-es/pagination/index.js +3 -0
  12. package/dist-types/KMS.d.ts +49 -27
  13. package/dist-types/commands/CreateCustomKeyStoreCommand.d.ts +1 -1
  14. package/dist-types/commands/CreateKeyCommand.d.ts +5 -3
  15. package/dist-types/commands/DeleteCustomKeyStoreCommand.d.ts +2 -2
  16. package/dist-types/commands/DescribeCustomKeyStoresCommand.d.ts +1 -1
  17. package/dist-types/commands/DescribeKeyCommand.d.ts +1 -1
  18. package/dist-types/commands/DisconnectCustomKeyStoreCommand.d.ts +1 -1
  19. package/dist-types/commands/EncryptCommand.d.ts +5 -1
  20. package/dist-types/commands/GenerateDataKeyCommand.d.ts +12 -6
  21. package/dist-types/commands/GenerateDataKeyPairCommand.d.ts +3 -3
  22. package/dist-types/commands/GenerateDataKeyPairWithoutPlaintextCommand.d.ts +3 -3
  23. package/dist-types/commands/GenerateRandomCommand.d.ts +4 -1
  24. package/dist-types/commands/GetPublicKeyCommand.d.ts +5 -2
  25. package/dist-types/commands/UpdateCustomKeyStoreCommand.d.ts +1 -1
  26. package/dist-types/commands/VerifyCommand.d.ts +5 -1
  27. package/dist-types/models/models_0.d.ts +56 -38
  28. package/dist-types/pagination/DescribeCustomKeyStoresPaginator.d.ts +4 -0
  29. package/dist-types/pagination/ListResourceTagsPaginator.d.ts +4 -0
  30. package/dist-types/pagination/ListRetirableGrantsPaginator.d.ts +4 -0
  31. package/dist-types/pagination/index.d.ts +3 -0
  32. package/dist-types/ts3.4/models/models_0.d.ts +11 -5
  33. package/dist-types/ts3.4/pagination/DescribeCustomKeyStoresPaginator.d.ts +4 -0
  34. package/dist-types/ts3.4/pagination/ListResourceTagsPaginator.d.ts +4 -0
  35. package/dist-types/ts3.4/pagination/ListRetirableGrantsPaginator.d.ts +4 -0
  36. package/dist-types/ts3.4/pagination/index.d.ts +3 -0
  37. package/package.json +1 -1
@@ -319,6 +319,7 @@ export declare class CustomKeyStoreNotFoundException extends __BaseException {
319
319
  export declare enum ConnectionErrorCodeType {
320
320
  CLUSTER_NOT_FOUND = "CLUSTER_NOT_FOUND",
321
321
  INSUFFICIENT_CLOUDHSM_HSMS = "INSUFFICIENT_CLOUDHSM_HSMS",
322
+ INSUFFICIENT_FREE_ADDRESSES_IN_SUBNET = "INSUFFICIENT_FREE_ADDRESSES_IN_SUBNET",
322
323
  INTERNAL_ERROR = "INTERNAL_ERROR",
323
324
  INVALID_CREDENTIALS = "INVALID_CREDENTIALS",
324
325
  NETWORK_ERRORS = "NETWORK_ERRORS",
@@ -410,12 +411,12 @@ export interface CreateCustomKeyStoreRequest {
410
411
  * CloudHSM cluster that is not already associated with a custom key store. To find the cluster ID,
411
412
  * use the <a href="https://docs.aws.amazon.com/cloudhsm/latest/APIReference/API_DescribeClusters.html">DescribeClusters</a> operation.</p>
412
413
  */
413
- CloudHsmClusterId: string | undefined;
414
+ CloudHsmClusterId?: string;
414
415
  /**
415
416
  * <p>Enter the content of the trust anchor certificate for the cluster. This is the content of
416
417
  * the <code>customerCA.crt</code> file that you created when you <a href="https://docs.aws.amazon.com/cloudhsm/latest/userguide/initialize-cluster.html">initialized the cluster</a>.</p>
417
418
  */
418
- TrustAnchorCertificate: string | undefined;
419
+ TrustAnchorCertificate?: string;
419
420
  /**
420
421
  * <p>Enter the password of the <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-store-concepts.html#concept-kmsuser">
421
422
  * <code>kmsuser</code> crypto user
@@ -425,7 +426,7 @@ export interface CreateCustomKeyStoreRequest {
425
426
  * <p>This parameter tells KMS the <code>kmsuser</code> account password; it does not change
426
427
  * the password in the CloudHSM cluster.</p>
427
428
  */
428
- KeyStorePassword: string | undefined;
429
+ KeyStorePassword?: string;
429
430
  }
430
431
  export declare namespace CreateCustomKeyStoreRequest {
431
432
  /**
@@ -691,6 +692,7 @@ export declare enum CustomerMasterKeySpec {
691
692
  RSA_2048 = "RSA_2048",
692
693
  RSA_3072 = "RSA_3072",
693
694
  RSA_4096 = "RSA_4096",
695
+ SM2 = "SM2",
694
696
  SYMMETRIC_DEFAULT = "SYMMETRIC_DEFAULT"
695
697
  }
696
698
  export declare enum KeySpec {
@@ -705,6 +707,7 @@ export declare enum KeySpec {
705
707
  RSA_2048 = "RSA_2048",
706
708
  RSA_3072 = "RSA_3072",
707
709
  RSA_4096 = "RSA_4096",
710
+ SM2 = "SM2",
708
711
  SYMMETRIC_DEFAULT = "SYMMETRIC_DEFAULT"
709
712
  }
710
713
  export declare enum KeyUsageType {
@@ -765,23 +768,20 @@ export interface CreateKeyRequest {
765
768
  * </li>
766
769
  * </ul>
767
770
  *
768
- * <p>A key policy document must conform to the following rules.</p>
771
+ * <p>A key policy document can include only the following characters:</p>
769
772
  * <ul>
770
773
  * <li>
771
- * <p>Up to 32 kilobytes (32768 bytes)</p>
774
+ * <p>Printable ASCII characters from the space character (<code>\u0020</code>) through the end of the ASCII character range.</p>
772
775
  * </li>
773
776
  * <li>
774
- * <p>Must be UTF-8 encoded</p>
777
+ * <p>Printable characters in the Basic Latin and Latin-1 Supplement character set (through <code>\u00FF</code>).</p>
775
778
  * </li>
776
779
  * <li>
777
- * <p>The only Unicode characters that are permitted in a key policy document are the horizontal tab (U+0009), linefeed (U+000A), carriage return (U+000D), and characters in the range U+0020 to U+00FF.</p>
778
- * </li>
779
- * <li>
780
- * <p>The <code>Sid</code> element in a key policy statement can include spaces. (Spaces are
781
- * prohibited in the <code>Sid</code> element of an IAM policy document.)</p>
780
+ * <p>The tab (<code>\u0009</code>), line feed (<code>\u000A</code>), and carriage return (<code>\u000D</code>) special characters</p>
782
781
  * </li>
783
782
  * </ul>
784
- * <p>For help writing and formatting a JSON policy document, see the <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies.html">IAM JSON Policy Reference</a> in the <i>
783
+ * <p>For information about key policies, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html">Key policies in KMS</a> in the
784
+ * <i>Key Management Service Developer Guide</i>. For help writing and formatting a JSON policy document, see the <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies.html">IAM JSON Policy Reference</a> in the <i>
785
785
  * <i>Identity and Access Management User Guide</i>
786
786
  * </i>.</p>
787
787
  */
@@ -815,6 +815,10 @@ export interface CreateKeyRequest {
815
815
  * <p>For asymmetric KMS keys with ECC key material, specify
816
816
  * <code>SIGN_VERIFY</code>.</p>
817
817
  * </li>
818
+ * <li>
819
+ * <p>For asymmetric KMS keys with SM2 key material (China Regions only), specify <code>ENCRYPT_DECRYPT</code> or
820
+ * <code>SIGN_VERIFY</code>.</p>
821
+ * </li>
818
822
  * </ul>
819
823
  */
820
824
  KeyUsage?: KeyUsageType | string;
@@ -829,8 +833,8 @@ export interface CreateKeyRequest {
829
833
  CustomerMasterKeySpec?: CustomerMasterKeySpec | string;
830
834
  /**
831
835
  * <p>Specifies the type of KMS key to create. The default value,
832
- * <code>SYMMETRIC_DEFAULT</code>, creates a KMS key with a 256-bit symmetric key for encryption
833
- * and decryption. For help choosing a key spec for your KMS key, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-types.html#symm-asymm-choose">Choosing a KMS key type</a> in the <i>
836
+ * <code>SYMMETRIC_DEFAULT</code>, creates a KMS key with a 256-bit AES-GCM key that is used for encryption and decryption, except in China Regions,
837
+ * where it creates a 128-bit symmetric key that uses SM4 encryption. For help choosing a key spec for your KMS key, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-types.html#symm-asymm-choose">Choosing a KMS key type</a> in the <i>
834
838
  * <i>Key Management Service Developer Guide</i>
835
839
  * </i>.</p>
836
840
  * <p>The <code>KeySpec</code> determines whether the KMS key contains a symmetric key or an
@@ -853,7 +857,8 @@ export interface CreateKeyRequest {
853
857
  * <ul>
854
858
  * <li>
855
859
  * <p>
856
- * <code>SYMMETRIC_DEFAULT</code> (AES-256-GCM)</p>
860
+ * <code>SYMMETRIC_DEFAULT</code>
861
+ * </p>
857
862
  * </li>
858
863
  * </ul>
859
864
  * </li>
@@ -929,6 +934,16 @@ export interface CreateKeyRequest {
929
934
  * </li>
930
935
  * </ul>
931
936
  * </li>
937
+ * <li>
938
+ * <p>SM2 key pairs (China Regions only)</p>
939
+ * <ul>
940
+ * <li>
941
+ * <p>
942
+ * <code>SM2</code>
943
+ * </p>
944
+ * </li>
945
+ * </ul>
946
+ * </li>
932
947
  * </ul>
933
948
  */
934
949
  KeySpec?: KeySpec | string;
@@ -956,7 +971,7 @@ export interface CreateKeyRequest {
956
971
  * cannot create any other type of KMS key in a custom key store.</p>
957
972
  * <p>To find the ID of a custom key store, use the <a>DescribeCustomKeyStores</a> operation.</p>
958
973
  * <p>The response includes the custom key store ID and the ID of the CloudHSM cluster.</p>
959
- * <p>This operation is part of the <a href="https://docs.aws.amazon.com/kms/latest/developerguide/custom-key-store-overview.html">Custom Key Store feature</a> feature in KMS, which
974
+ * <p>This operation is part of the <a href="https://docs.aws.amazon.com/kms/latest/developerguide/custom-key-store-overview.html">custom key store feature</a> feature in KMS, which
960
975
  * combines the convenience and extensive integration of KMS with the isolation and control of a
961
976
  * single-tenant key store.</p>
962
977
  */
@@ -1018,6 +1033,7 @@ export declare namespace CreateKeyRequest {
1018
1033
  export declare enum EncryptionAlgorithmSpec {
1019
1034
  RSAES_OAEP_SHA_1 = "RSAES_OAEP_SHA_1",
1020
1035
  RSAES_OAEP_SHA_256 = "RSAES_OAEP_SHA_256",
1036
+ SM2PKE = "SM2PKE",
1021
1037
  SYMMETRIC_DEFAULT = "SYMMETRIC_DEFAULT"
1022
1038
  }
1023
1039
  export declare enum ExpirationModelType {
@@ -1105,7 +1121,8 @@ export declare enum SigningAlgorithmSpec {
1105
1121
  RSASSA_PKCS1_V1_5_SHA_512 = "RSASSA_PKCS1_V1_5_SHA_512",
1106
1122
  RSASSA_PSS_SHA_256 = "RSASSA_PSS_SHA_256",
1107
1123
  RSASSA_PSS_SHA_384 = "RSASSA_PSS_SHA_384",
1108
- RSASSA_PSS_SHA_512 = "RSASSA_PSS_SHA_512"
1124
+ RSASSA_PSS_SHA_512 = "RSASSA_PSS_SHA_512",
1125
+ SM2DSA = "SM2DSA"
1109
1126
  }
1110
1127
  /**
1111
1128
  * <p>Contains metadata about a KMS key.</p>
@@ -1469,7 +1486,8 @@ export declare enum DataKeyPairSpec {
1469
1486
  ECC_SECG_P256K1 = "ECC_SECG_P256K1",
1470
1487
  RSA_2048 = "RSA_2048",
1471
1488
  RSA_3072 = "RSA_3072",
1472
- RSA_4096 = "RSA_4096"
1489
+ RSA_4096 = "RSA_4096",
1490
+ SM2 = "SM2"
1473
1491
  }
1474
1492
  export declare enum DataKeySpec {
1475
1493
  AES_128 = "AES_128",
@@ -2171,7 +2189,7 @@ export interface GenerateDataKeyPairRequest {
2171
2189
  KeyId: string | undefined;
2172
2190
  /**
2173
2191
  * <p>Determines the type of data key pair that is generated. </p>
2174
- * <p>The KMS rule that restricts the use of asymmetric RSA KMS keys to encrypt and decrypt or to sign and verify (but not both), and the rule that permits you to use ECC KMS keys only to sign and verify, are not effective on data key pairs, which are used outside of KMS.</p>
2192
+ * <p>The KMS rule that restricts the use of asymmetric RSA and SM2 KMS keys to encrypt and decrypt or to sign and verify (but not both), and the rule that permits you to use ECC KMS keys only to sign and verify, are not effective on data key pairs, which are used outside of KMS. The SM2 key spec is only available in China Regions. RSA and ECC asymmetric key pairs are also available in China Regions.</p>
2175
2193
  */
2176
2194
  KeyPairSpec: DataKeyPairSpec | string | undefined;
2177
2195
  /**
@@ -2256,7 +2274,7 @@ export interface GenerateDataKeyPairWithoutPlaintextRequest {
2256
2274
  KeyId: string | undefined;
2257
2275
  /**
2258
2276
  * <p>Determines the type of data key pair that is generated.</p>
2259
- * <p>The KMS rule that restricts the use of asymmetric RSA KMS keys to encrypt and decrypt or to sign and verify (but not both), and the rule that permits you to use ECC KMS keys only to sign and verify, are not effective on data key pairs, which are used outside of KMS.</p>
2277
+ * <p>The KMS rule that restricts the use of asymmetric RSA and SM2 KMS keys to encrypt and decrypt or to sign and verify (but not both), and the rule that permits you to use ECC KMS keys only to sign and verify, are not effective on data key pairs, which are used outside of KMS. The SM2 key spec is only available in China Regions. RSA and ECC asymmetric key pairs are also available in China Regions.</p>
2260
2278
  */
2261
2279
  KeyPairSpec: DataKeyPairSpec | string | undefined;
2262
2280
  /**
@@ -2432,7 +2450,7 @@ export declare namespace GenerateMacResponse {
2432
2450
  }
2433
2451
  export interface GenerateRandomRequest {
2434
2452
  /**
2435
- * <p>The length of the byte string.</p>
2453
+ * <p>The length of the random byte string. This parameter is required.</p>
2436
2454
  */
2437
2455
  NumberOfBytes?: number;
2438
2456
  /**
@@ -3296,22 +3314,22 @@ export interface PutKeyPolicyRequest {
3296
3314
  * </li>
3297
3315
  * </ul>
3298
3316
  *
3299
- * <p>A key policy document must conform to the following rules.</p>
3317
+ * <p>A key policy document can include only the following characters:</p>
3300
3318
  * <ul>
3301
3319
  * <li>
3302
- * <p>Up to 32 kilobytes (32768 bytes)</p>
3303
- * </li>
3304
- * <li>
3305
- * <p>Must be UTF-8 encoded</p>
3320
+ * <p>Printable ASCII characters from the space character (<code>\u0020</code>) through the end of the ASCII character range.</p>
3306
3321
  * </li>
3307
3322
  * <li>
3308
- * <p>The only Unicode characters that are permitted in a key policy document are the horizontal tab (U+0009), linefeed (U+000A), carriage return (U+000D), and characters in the range U+0020 to U+00FF.</p>
3323
+ * <p>Printable characters in the Basic Latin and Latin-1 Supplement character set (through <code>\u00FF</code>).</p>
3309
3324
  * </li>
3310
3325
  * <li>
3311
- * <p>The <code>Sid</code> element in a key policy statement can include spaces. (Spaces are
3312
- * prohibited in the <code>Sid</code> element of an IAM policy document.)</p>
3326
+ * <p>The tab (<code>\u0009</code>), line feed (<code>\u000A</code>), and carriage return (<code>\u000D</code>) special characters</p>
3313
3327
  * </li>
3314
3328
  * </ul>
3329
+ * <p>For information about key policies, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html">Key policies in KMS</a> in the
3330
+ * <i>Key Management Service Developer Guide</i>. For help writing and formatting a JSON policy document, see the <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies.html">IAM JSON Policy Reference</a> in the <i>
3331
+ * <i>Identity and Access Management User Guide</i>
3332
+ * </i>.</p>
3315
3333
  */
3316
3334
  Policy: string | undefined;
3317
3335
  /**
@@ -3550,22 +3568,22 @@ export interface ReplicateKeyRequest {
3550
3568
  * </ul>
3551
3569
  *
3552
3570
  *
3553
- * <p>A key policy document must conform to the following rules.</p>
3571
+ * <p>A key policy document can include only the following characters:</p>
3554
3572
  * <ul>
3555
3573
  * <li>
3556
- * <p>Up to 32 kilobytes (32768 bytes)</p>
3557
- * </li>
3558
- * <li>
3559
- * <p>Must be UTF-8 encoded</p>
3574
+ * <p>Printable ASCII characters from the space character (<code>\u0020</code>) through the end of the ASCII character range.</p>
3560
3575
  * </li>
3561
3576
  * <li>
3562
- * <p>The only Unicode characters that are permitted in a key policy document are the horizontal tab (U+0009), linefeed (U+000A), carriage return (U+000D), and characters in the range U+0020 to U+00FF.</p>
3577
+ * <p>Printable characters in the Basic Latin and Latin-1 Supplement character set (through <code>\u00FF</code>).</p>
3563
3578
  * </li>
3564
3579
  * <li>
3565
- * <p>The <code>Sid</code> element in a key policy statement can include spaces. (Spaces are
3566
- * prohibited in the <code>Sid</code> element of an IAM policy document.)</p>
3580
+ * <p>The tab (<code>\u0009</code>), line feed (<code>\u000A</code>), and carriage return (<code>\u000D</code>) special characters</p>
3567
3581
  * </li>
3568
3582
  * </ul>
3583
+ * <p>For information about key policies, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html">Key policies in KMS</a> in the
3584
+ * <i>Key Management Service Developer Guide</i>. For help writing and formatting a JSON policy document, see the <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies.html">IAM JSON Policy Reference</a> in the <i>
3585
+ * <i>Identity and Access Management User Guide</i>
3586
+ * </i>.</p>
3569
3587
  */
3570
3588
  Policy?: string;
3571
3589
  /**
@@ -3935,7 +3953,7 @@ export interface UpdateAliasRequest {
3935
3953
  /**
3936
3954
  * <p>Identifies the alias that is changing its KMS key. This value must begin with
3937
3955
  * <code>alias/</code> followed by the alias name, such as <code>alias/ExampleAlias</code>. You
3938
- * cannot use UpdateAlias to change the alias name.</p>
3956
+ * cannot use <code>UpdateAlias</code> to change the alias name.</p>
3939
3957
  */
3940
3958
  AliasName: string | undefined;
3941
3959
  /**
@@ -0,0 +1,4 @@
1
+ import { Paginator } from "@aws-sdk/types";
2
+ import { DescribeCustomKeyStoresCommandInput, DescribeCustomKeyStoresCommandOutput } from "../commands/DescribeCustomKeyStoresCommand";
3
+ import { KMSPaginationConfiguration } from "./Interfaces";
4
+ export declare function paginateDescribeCustomKeyStores(config: KMSPaginationConfiguration, input: DescribeCustomKeyStoresCommandInput, ...additionalArguments: any): Paginator<DescribeCustomKeyStoresCommandOutput>;
@@ -0,0 +1,4 @@
1
+ import { Paginator } from "@aws-sdk/types";
2
+ import { ListResourceTagsCommandInput, ListResourceTagsCommandOutput } from "../commands/ListResourceTagsCommand";
3
+ import { KMSPaginationConfiguration } from "./Interfaces";
4
+ export declare function paginateListResourceTags(config: KMSPaginationConfiguration, input: ListResourceTagsCommandInput, ...additionalArguments: any): Paginator<ListResourceTagsCommandOutput>;
@@ -0,0 +1,4 @@
1
+ import { Paginator } from "@aws-sdk/types";
2
+ import { ListRetirableGrantsCommandInput, ListRetirableGrantsCommandOutput } from "../commands/ListRetirableGrantsCommand";
3
+ import { KMSPaginationConfiguration } from "./Interfaces";
4
+ export declare function paginateListRetirableGrants(config: KMSPaginationConfiguration, input: ListRetirableGrantsCommandInput, ...additionalArguments: any): Paginator<ListRetirableGrantsCommandOutput>;
@@ -1,5 +1,8 @@
1
+ export * from "./DescribeCustomKeyStoresPaginator";
1
2
  export * from "./Interfaces";
2
3
  export * from "./ListAliasesPaginator";
3
4
  export * from "./ListGrantsPaginator";
4
5
  export * from "./ListKeyPoliciesPaginator";
5
6
  export * from "./ListKeysPaginator";
7
+ export * from "./ListResourceTagsPaginator";
8
+ export * from "./ListRetirableGrantsPaginator";
@@ -146,6 +146,7 @@ export declare class CustomKeyStoreNotFoundException extends __BaseException {
146
146
  export declare enum ConnectionErrorCodeType {
147
147
  CLUSTER_NOT_FOUND = "CLUSTER_NOT_FOUND",
148
148
  INSUFFICIENT_CLOUDHSM_HSMS = "INSUFFICIENT_CLOUDHSM_HSMS",
149
+ INSUFFICIENT_FREE_ADDRESSES_IN_SUBNET = "INSUFFICIENT_FREE_ADDRESSES_IN_SUBNET",
149
150
  INTERNAL_ERROR = "INTERNAL_ERROR",
150
151
  INVALID_CREDENTIALS = "INVALID_CREDENTIALS",
151
152
  NETWORK_ERRORS = "NETWORK_ERRORS",
@@ -189,11 +190,11 @@ export interface CreateCustomKeyStoreRequest {
189
190
 
190
191
  CustomKeyStoreName: string | undefined;
191
192
 
192
- CloudHsmClusterId: string | undefined;
193
+ CloudHsmClusterId?: string;
193
194
 
194
- TrustAnchorCertificate: string | undefined;
195
+ TrustAnchorCertificate?: string;
195
196
 
196
- KeyStorePassword: string | undefined;
197
+ KeyStorePassword?: string;
197
198
  }
198
199
  export declare namespace CreateCustomKeyStoreRequest {
199
200
 
@@ -306,6 +307,7 @@ export declare enum CustomerMasterKeySpec {
306
307
  RSA_2048 = "RSA_2048",
307
308
  RSA_3072 = "RSA_3072",
308
309
  RSA_4096 = "RSA_4096",
310
+ SM2 = "SM2",
309
311
  SYMMETRIC_DEFAULT = "SYMMETRIC_DEFAULT"
310
312
  }
311
313
  export declare enum KeySpec {
@@ -320,6 +322,7 @@ export declare enum KeySpec {
320
322
  RSA_2048 = "RSA_2048",
321
323
  RSA_3072 = "RSA_3072",
322
324
  RSA_4096 = "RSA_4096",
325
+ SM2 = "SM2",
323
326
  SYMMETRIC_DEFAULT = "SYMMETRIC_DEFAULT"
324
327
  }
325
328
  export declare enum KeyUsageType {
@@ -372,6 +375,7 @@ export declare namespace CreateKeyRequest {
372
375
  export declare enum EncryptionAlgorithmSpec {
373
376
  RSAES_OAEP_SHA_1 = "RSAES_OAEP_SHA_1",
374
377
  RSAES_OAEP_SHA_256 = "RSAES_OAEP_SHA_256",
378
+ SM2PKE = "SM2PKE",
375
379
  SYMMETRIC_DEFAULT = "SYMMETRIC_DEFAULT"
376
380
  }
377
381
  export declare enum ExpirationModelType {
@@ -435,7 +439,8 @@ export declare enum SigningAlgorithmSpec {
435
439
  RSASSA_PKCS1_V1_5_SHA_512 = "RSASSA_PKCS1_V1_5_SHA_512",
436
440
  RSASSA_PSS_SHA_256 = "RSASSA_PSS_SHA_256",
437
441
  RSASSA_PSS_SHA_384 = "RSASSA_PSS_SHA_384",
438
- RSASSA_PSS_SHA_512 = "RSASSA_PSS_SHA_512"
442
+ RSASSA_PSS_SHA_512 = "RSASSA_PSS_SHA_512",
443
+ SM2DSA = "SM2DSA"
439
444
  }
440
445
 
441
446
  export interface KeyMetadata {
@@ -554,7 +559,8 @@ export declare enum DataKeyPairSpec {
554
559
  ECC_SECG_P256K1 = "ECC_SECG_P256K1",
555
560
  RSA_2048 = "RSA_2048",
556
561
  RSA_3072 = "RSA_3072",
557
- RSA_4096 = "RSA_4096"
562
+ RSA_4096 = "RSA_4096",
563
+ SM2 = "SM2"
558
564
  }
559
565
  export declare enum DataKeySpec {
560
566
  AES_128 = "AES_128",
@@ -0,0 +1,4 @@
1
+ import { Paginator } from "@aws-sdk/types";
2
+ import { DescribeCustomKeyStoresCommandInput, DescribeCustomKeyStoresCommandOutput } from "../commands/DescribeCustomKeyStoresCommand";
3
+ import { KMSPaginationConfiguration } from "./Interfaces";
4
+ export declare function paginateDescribeCustomKeyStores(config: KMSPaginationConfiguration, input: DescribeCustomKeyStoresCommandInput, ...additionalArguments: any): Paginator<DescribeCustomKeyStoresCommandOutput>;
@@ -0,0 +1,4 @@
1
+ import { Paginator } from "@aws-sdk/types";
2
+ import { ListResourceTagsCommandInput, ListResourceTagsCommandOutput } from "../commands/ListResourceTagsCommand";
3
+ import { KMSPaginationConfiguration } from "./Interfaces";
4
+ export declare function paginateListResourceTags(config: KMSPaginationConfiguration, input: ListResourceTagsCommandInput, ...additionalArguments: any): Paginator<ListResourceTagsCommandOutput>;
@@ -0,0 +1,4 @@
1
+ import { Paginator } from "@aws-sdk/types";
2
+ import { ListRetirableGrantsCommandInput, ListRetirableGrantsCommandOutput } from "../commands/ListRetirableGrantsCommand";
3
+ import { KMSPaginationConfiguration } from "./Interfaces";
4
+ export declare function paginateListRetirableGrants(config: KMSPaginationConfiguration, input: ListRetirableGrantsCommandInput, ...additionalArguments: any): Paginator<ListRetirableGrantsCommandOutput>;
@@ -1,5 +1,8 @@
1
+ export * from "./DescribeCustomKeyStoresPaginator";
1
2
  export * from "./Interfaces";
2
3
  export * from "./ListAliasesPaginator";
3
4
  export * from "./ListGrantsPaginator";
4
5
  export * from "./ListKeyPoliciesPaginator";
5
6
  export * from "./ListKeysPaginator";
7
+ export * from "./ListResourceTagsPaginator";
8
+ export * from "./ListRetirableGrantsPaginator";
package/package.json CHANGED
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "name": "@aws-sdk/client-kms",
3
3
  "description": "AWS SDK for JavaScript Kms Client for Node.js, Browser and React Native",
4
- "version": "3.131.0",
4
+ "version": "3.132.0",
5
5
  "scripts": {
6
6
  "build": "concurrently 'yarn:build:cjs' 'yarn:build:es' 'yarn:build:types'",
7
7
  "build:cjs": "tsc -p tsconfig.cjs.json",