@aws-sdk/client-kms 3.28.0 → 3.32.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +35 -0
- package/KMS.ts +567 -572
- package/KMSClient.ts +18 -18
- package/README.md +18 -18
- package/commands/CancelKeyDeletionCommand.ts +6 -7
- package/commands/ConnectCustomKeyStoreCommand.ts +9 -9
- package/commands/CreateAliasCommand.ts +13 -14
- package/commands/CreateCustomKeyStoreCommand.ts +8 -8
- package/commands/CreateGrantCommand.ts +15 -22
- package/commands/CreateKeyCommand.ts +44 -44
- package/commands/DecryptCommand.ts +23 -22
- package/commands/DeleteAliasCommand.ts +7 -8
- package/commands/DeleteCustomKeyStoreCommand.ts +13 -13
- package/commands/DeleteImportedKeyMaterialCommand.ts +9 -9
- package/commands/DescribeCustomKeyStoresCommand.ts +6 -6
- package/commands/DescribeKeyCommand.ts +18 -19
- package/commands/DisableKeyCommand.ts +7 -7
- package/commands/DisableKeyRotationCommand.ts +5 -6
- package/commands/DisconnectCustomKeyStoreCommand.ts +6 -8
- package/commands/EnableKeyCommand.ts +4 -5
- package/commands/EnableKeyRotationCommand.ts +5 -5
- package/commands/EncryptCommand.ts +20 -21
- package/commands/GenerateDataKeyCommand.ts +17 -18
- package/commands/GenerateDataKeyPairCommand.ts +21 -15
- package/commands/GenerateDataKeyPairWithoutPlaintextCommand.ts +16 -12
- package/commands/GenerateDataKeyWithoutPlaintextCommand.ts +9 -9
- package/commands/GenerateRandomCommand.ts +4 -3
- package/commands/GetKeyPolicyCommand.ts +2 -2
- package/commands/GetKeyRotationStatusCommand.ts +9 -9
- package/commands/GetParametersForImportCommand.ts +8 -8
- package/commands/GetPublicKeyCommand.ts +15 -15
- package/commands/ImportKeyMaterialCommand.ts +18 -18
- package/commands/ListAliasesCommand.ts +8 -10
- package/commands/ListGrantsCommand.ts +9 -4
- package/commands/ListKeyPoliciesCommand.ts +2 -2
- package/commands/ListKeysCommand.ts +2 -2
- package/commands/ListResourceTagsCommand.ts +4 -4
- package/commands/ListRetirableGrantsCommand.ts +14 -14
- package/commands/PutKeyPolicyCommand.ts +5 -5
- package/commands/ReEncryptCommand.ts +30 -34
- package/commands/ReplicateKeyCommand.ts +16 -16
- package/commands/RetireGrantCommand.ts +9 -9
- package/commands/RevokeGrantCommand.ts +9 -4
- package/commands/ScheduleKeyDeletionCommand.ts +17 -17
- package/commands/SignCommand.ts +12 -13
- package/commands/TagResourceCommand.ts +10 -12
- package/commands/UntagResourceCommand.ts +9 -10
- package/commands/UpdateAliasCommand.ts +15 -15
- package/commands/UpdateCustomKeyStoreCommand.ts +9 -9
- package/commands/UpdateKeyDescriptionCommand.ts +4 -4
- package/commands/UpdatePrimaryRegionCommand.ts +13 -13
- package/commands/VerifyCommand.ts +14 -14
- package/dist/cjs/KMS.js +18 -18
- package/dist/cjs/KMS.js.map +1 -1
- package/dist/cjs/KMSClient.js +18 -18
- package/dist/cjs/commands/CancelKeyDeletionCommand.js +6 -7
- package/dist/cjs/commands/CancelKeyDeletionCommand.js.map +1 -1
- package/dist/cjs/commands/ConnectCustomKeyStoreCommand.js +9 -9
- package/dist/cjs/commands/CreateAliasCommand.js +13 -14
- package/dist/cjs/commands/CreateAliasCommand.js.map +1 -1
- package/dist/cjs/commands/CreateCustomKeyStoreCommand.js +8 -8
- package/dist/cjs/commands/CreateGrantCommand.js +15 -22
- package/dist/cjs/commands/CreateGrantCommand.js.map +1 -1
- package/dist/cjs/commands/CreateKeyCommand.js +44 -44
- package/dist/cjs/commands/DecryptCommand.js +23 -22
- package/dist/cjs/commands/DecryptCommand.js.map +1 -1
- package/dist/cjs/commands/DeleteAliasCommand.js +7 -8
- package/dist/cjs/commands/DeleteAliasCommand.js.map +1 -1
- package/dist/cjs/commands/DeleteCustomKeyStoreCommand.js +13 -13
- package/dist/cjs/commands/DeleteImportedKeyMaterialCommand.js +9 -9
- package/dist/cjs/commands/DescribeCustomKeyStoresCommand.js +6 -6
- package/dist/cjs/commands/DescribeKeyCommand.js +18 -19
- package/dist/cjs/commands/DescribeKeyCommand.js.map +1 -1
- package/dist/cjs/commands/DisableKeyCommand.js +7 -7
- package/dist/cjs/commands/DisableKeyRotationCommand.js +5 -6
- package/dist/cjs/commands/DisableKeyRotationCommand.js.map +1 -1
- package/dist/cjs/commands/DisconnectCustomKeyStoreCommand.js +6 -8
- package/dist/cjs/commands/DisconnectCustomKeyStoreCommand.js.map +1 -1
- package/dist/cjs/commands/EnableKeyCommand.js +4 -5
- package/dist/cjs/commands/EnableKeyCommand.js.map +1 -1
- package/dist/cjs/commands/EnableKeyRotationCommand.js +5 -5
- package/dist/cjs/commands/EncryptCommand.js +20 -21
- package/dist/cjs/commands/EncryptCommand.js.map +1 -1
- package/dist/cjs/commands/GenerateDataKeyCommand.js +17 -18
- package/dist/cjs/commands/GenerateDataKeyCommand.js.map +1 -1
- package/dist/cjs/commands/GenerateDataKeyPairCommand.js +21 -15
- package/dist/cjs/commands/GenerateDataKeyPairCommand.js.map +1 -1
- package/dist/cjs/commands/GenerateDataKeyPairWithoutPlaintextCommand.js +16 -12
- package/dist/cjs/commands/GenerateDataKeyPairWithoutPlaintextCommand.js.map +1 -1
- package/dist/cjs/commands/GenerateDataKeyWithoutPlaintextCommand.js +9 -9
- package/dist/cjs/commands/GenerateRandomCommand.js +4 -3
- package/dist/cjs/commands/GenerateRandomCommand.js.map +1 -1
- package/dist/cjs/commands/GetKeyPolicyCommand.js +2 -2
- package/dist/cjs/commands/GetKeyRotationStatusCommand.js +9 -9
- package/dist/cjs/commands/GetParametersForImportCommand.js +8 -8
- package/dist/cjs/commands/GetPublicKeyCommand.js +15 -15
- package/dist/cjs/commands/ImportKeyMaterialCommand.js +18 -18
- package/dist/cjs/commands/ListAliasesCommand.js +8 -10
- package/dist/cjs/commands/ListAliasesCommand.js.map +1 -1
- package/dist/cjs/commands/ListGrantsCommand.js +9 -4
- package/dist/cjs/commands/ListGrantsCommand.js.map +1 -1
- package/dist/cjs/commands/ListKeyPoliciesCommand.js +2 -2
- package/dist/cjs/commands/ListKeysCommand.js +2 -2
- package/dist/cjs/commands/ListResourceTagsCommand.js +4 -4
- package/dist/cjs/commands/ListRetirableGrantsCommand.js +14 -14
- package/dist/cjs/commands/PutKeyPolicyCommand.js +5 -5
- package/dist/cjs/commands/ReEncryptCommand.js +30 -34
- package/dist/cjs/commands/ReEncryptCommand.js.map +1 -1
- package/dist/cjs/commands/ReplicateKeyCommand.js +16 -16
- package/dist/cjs/commands/RetireGrantCommand.js +9 -9
- package/dist/cjs/commands/RevokeGrantCommand.js +9 -4
- package/dist/cjs/commands/RevokeGrantCommand.js.map +1 -1
- package/dist/cjs/commands/ScheduleKeyDeletionCommand.js +17 -17
- package/dist/cjs/commands/SignCommand.js +12 -13
- package/dist/cjs/commands/SignCommand.js.map +1 -1
- package/dist/cjs/commands/TagResourceCommand.js +10 -12
- package/dist/cjs/commands/TagResourceCommand.js.map +1 -1
- package/dist/cjs/commands/UntagResourceCommand.js +9 -10
- package/dist/cjs/commands/UntagResourceCommand.js.map +1 -1
- package/dist/cjs/commands/UpdateAliasCommand.js +15 -15
- package/dist/cjs/commands/UpdateCustomKeyStoreCommand.js +9 -9
- package/dist/cjs/commands/UpdateKeyDescriptionCommand.js +4 -4
- package/dist/cjs/commands/UpdatePrimaryRegionCommand.js +13 -13
- package/dist/cjs/commands/VerifyCommand.js +14 -14
- package/dist/cjs/models/models_0.js +14 -3
- package/dist/cjs/models/models_0.js.map +1 -1
- package/dist/cjs/package.json +31 -31
- package/dist/cjs/protocols/Aws_json1_1.js +16 -11
- package/dist/cjs/protocols/Aws_json1_1.js.map +1 -1
- package/dist/es/KMS.js +18 -18
- package/dist/es/KMS.js.map +1 -1
- package/dist/es/KMSClient.js +18 -18
- package/dist/es/commands/CancelKeyDeletionCommand.js +6 -7
- package/dist/es/commands/CancelKeyDeletionCommand.js.map +1 -1
- package/dist/es/commands/ConnectCustomKeyStoreCommand.js +9 -9
- package/dist/es/commands/CreateAliasCommand.js +13 -14
- package/dist/es/commands/CreateAliasCommand.js.map +1 -1
- package/dist/es/commands/CreateCustomKeyStoreCommand.js +8 -8
- package/dist/es/commands/CreateGrantCommand.js +15 -22
- package/dist/es/commands/CreateGrantCommand.js.map +1 -1
- package/dist/es/commands/CreateKeyCommand.js +44 -44
- package/dist/es/commands/DecryptCommand.js +23 -22
- package/dist/es/commands/DecryptCommand.js.map +1 -1
- package/dist/es/commands/DeleteAliasCommand.js +7 -8
- package/dist/es/commands/DeleteAliasCommand.js.map +1 -1
- package/dist/es/commands/DeleteCustomKeyStoreCommand.js +13 -13
- package/dist/es/commands/DeleteImportedKeyMaterialCommand.js +9 -9
- package/dist/es/commands/DescribeCustomKeyStoresCommand.js +6 -6
- package/dist/es/commands/DescribeKeyCommand.js +18 -19
- package/dist/es/commands/DescribeKeyCommand.js.map +1 -1
- package/dist/es/commands/DisableKeyCommand.js +7 -7
- package/dist/es/commands/DisableKeyRotationCommand.js +5 -6
- package/dist/es/commands/DisableKeyRotationCommand.js.map +1 -1
- package/dist/es/commands/DisconnectCustomKeyStoreCommand.js +6 -8
- package/dist/es/commands/DisconnectCustomKeyStoreCommand.js.map +1 -1
- package/dist/es/commands/EnableKeyCommand.js +4 -5
- package/dist/es/commands/EnableKeyCommand.js.map +1 -1
- package/dist/es/commands/EnableKeyRotationCommand.js +5 -5
- package/dist/es/commands/EncryptCommand.js +20 -21
- package/dist/es/commands/EncryptCommand.js.map +1 -1
- package/dist/es/commands/GenerateDataKeyCommand.js +17 -18
- package/dist/es/commands/GenerateDataKeyCommand.js.map +1 -1
- package/dist/es/commands/GenerateDataKeyPairCommand.js +21 -15
- package/dist/es/commands/GenerateDataKeyPairCommand.js.map +1 -1
- package/dist/es/commands/GenerateDataKeyPairWithoutPlaintextCommand.js +16 -12
- package/dist/es/commands/GenerateDataKeyPairWithoutPlaintextCommand.js.map +1 -1
- package/dist/es/commands/GenerateDataKeyWithoutPlaintextCommand.js +9 -9
- package/dist/es/commands/GenerateRandomCommand.js +4 -3
- package/dist/es/commands/GenerateRandomCommand.js.map +1 -1
- package/dist/es/commands/GetKeyPolicyCommand.js +2 -2
- package/dist/es/commands/GetKeyRotationStatusCommand.js +9 -9
- package/dist/es/commands/GetParametersForImportCommand.js +8 -8
- package/dist/es/commands/GetPublicKeyCommand.js +15 -15
- package/dist/es/commands/ImportKeyMaterialCommand.js +18 -18
- package/dist/es/commands/ListAliasesCommand.js +8 -10
- package/dist/es/commands/ListAliasesCommand.js.map +1 -1
- package/dist/es/commands/ListGrantsCommand.js +9 -4
- package/dist/es/commands/ListGrantsCommand.js.map +1 -1
- package/dist/es/commands/ListKeyPoliciesCommand.js +2 -2
- package/dist/es/commands/ListKeysCommand.js +2 -2
- package/dist/es/commands/ListResourceTagsCommand.js +4 -4
- package/dist/es/commands/ListRetirableGrantsCommand.js +14 -14
- package/dist/es/commands/PutKeyPolicyCommand.js +5 -5
- package/dist/es/commands/ReEncryptCommand.js +30 -34
- package/dist/es/commands/ReEncryptCommand.js.map +1 -1
- package/dist/es/commands/ReplicateKeyCommand.js +16 -16
- package/dist/es/commands/RetireGrantCommand.js +9 -9
- package/dist/es/commands/RevokeGrantCommand.js +9 -4
- package/dist/es/commands/RevokeGrantCommand.js.map +1 -1
- package/dist/es/commands/ScheduleKeyDeletionCommand.js +17 -17
- package/dist/es/commands/SignCommand.js +12 -13
- package/dist/es/commands/SignCommand.js.map +1 -1
- package/dist/es/commands/TagResourceCommand.js +10 -12
- package/dist/es/commands/TagResourceCommand.js.map +1 -1
- package/dist/es/commands/UntagResourceCommand.js +9 -10
- package/dist/es/commands/UntagResourceCommand.js.map +1 -1
- package/dist/es/commands/UpdateAliasCommand.js +15 -15
- package/dist/es/commands/UpdateCustomKeyStoreCommand.js +9 -9
- package/dist/es/commands/UpdateKeyDescriptionCommand.js +4 -4
- package/dist/es/commands/UpdatePrimaryRegionCommand.js +13 -13
- package/dist/es/commands/VerifyCommand.js +14 -14
- package/dist/es/endpoints.js +1 -2
- package/dist/es/endpoints.js.map +1 -1
- package/dist/es/models/models_0.js +11 -0
- package/dist/es/models/models_0.js.map +1 -1
- package/dist/es/package.json +31 -31
- package/dist/es/protocols/Aws_json1_1.js +18 -14
- package/dist/es/protocols/Aws_json1_1.js.map +1 -1
- package/dist/types/KMS.d.ts +567 -572
- package/dist/types/KMSClient.d.ts +18 -18
- package/dist/types/commands/CancelKeyDeletionCommand.d.ts +6 -7
- package/dist/types/commands/ConnectCustomKeyStoreCommand.d.ts +9 -9
- package/dist/types/commands/CreateAliasCommand.d.ts +13 -14
- package/dist/types/commands/CreateCustomKeyStoreCommand.d.ts +8 -8
- package/dist/types/commands/CreateGrantCommand.d.ts +15 -22
- package/dist/types/commands/CreateKeyCommand.d.ts +44 -44
- package/dist/types/commands/DecryptCommand.d.ts +23 -22
- package/dist/types/commands/DeleteAliasCommand.d.ts +7 -8
- package/dist/types/commands/DeleteCustomKeyStoreCommand.d.ts +13 -13
- package/dist/types/commands/DeleteImportedKeyMaterialCommand.d.ts +9 -9
- package/dist/types/commands/DescribeCustomKeyStoresCommand.d.ts +6 -6
- package/dist/types/commands/DescribeKeyCommand.d.ts +18 -19
- package/dist/types/commands/DisableKeyCommand.d.ts +7 -7
- package/dist/types/commands/DisableKeyRotationCommand.d.ts +5 -6
- package/dist/types/commands/DisconnectCustomKeyStoreCommand.d.ts +6 -8
- package/dist/types/commands/EnableKeyCommand.d.ts +4 -5
- package/dist/types/commands/EnableKeyRotationCommand.d.ts +5 -5
- package/dist/types/commands/EncryptCommand.d.ts +20 -21
- package/dist/types/commands/GenerateDataKeyCommand.d.ts +17 -18
- package/dist/types/commands/GenerateDataKeyPairCommand.d.ts +21 -15
- package/dist/types/commands/GenerateDataKeyPairWithoutPlaintextCommand.d.ts +16 -12
- package/dist/types/commands/GenerateDataKeyWithoutPlaintextCommand.d.ts +9 -9
- package/dist/types/commands/GenerateRandomCommand.d.ts +4 -3
- package/dist/types/commands/GetKeyPolicyCommand.d.ts +2 -2
- package/dist/types/commands/GetKeyRotationStatusCommand.d.ts +9 -9
- package/dist/types/commands/GetParametersForImportCommand.d.ts +8 -8
- package/dist/types/commands/GetPublicKeyCommand.d.ts +15 -15
- package/dist/types/commands/ImportKeyMaterialCommand.d.ts +18 -18
- package/dist/types/commands/ListAliasesCommand.d.ts +8 -10
- package/dist/types/commands/ListGrantsCommand.d.ts +9 -4
- package/dist/types/commands/ListKeyPoliciesCommand.d.ts +2 -2
- package/dist/types/commands/ListKeysCommand.d.ts +2 -2
- package/dist/types/commands/ListResourceTagsCommand.d.ts +4 -4
- package/dist/types/commands/ListRetirableGrantsCommand.d.ts +14 -14
- package/dist/types/commands/PutKeyPolicyCommand.d.ts +5 -5
- package/dist/types/commands/ReEncryptCommand.d.ts +30 -34
- package/dist/types/commands/ReplicateKeyCommand.d.ts +16 -16
- package/dist/types/commands/RetireGrantCommand.d.ts +9 -9
- package/dist/types/commands/RevokeGrantCommand.d.ts +9 -4
- package/dist/types/commands/ScheduleKeyDeletionCommand.d.ts +17 -17
- package/dist/types/commands/SignCommand.d.ts +12 -13
- package/dist/types/commands/TagResourceCommand.d.ts +10 -12
- package/dist/types/commands/UntagResourceCommand.d.ts +9 -10
- package/dist/types/commands/UpdateAliasCommand.d.ts +15 -15
- package/dist/types/commands/UpdateCustomKeyStoreCommand.d.ts +9 -9
- package/dist/types/commands/UpdateKeyDescriptionCommand.d.ts +4 -4
- package/dist/types/commands/UpdatePrimaryRegionCommand.d.ts +13 -13
- package/dist/types/commands/VerifyCommand.d.ts +14 -14
- package/dist/types/models/models_0.d.ts +584 -570
- package/dist/types/ts3.4/KMS.d.ts +567 -572
- package/dist/types/ts3.4/KMSClient.d.ts +18 -18
- package/dist/types/ts3.4/commands/CancelKeyDeletionCommand.d.ts +6 -7
- package/dist/types/ts3.4/commands/ConnectCustomKeyStoreCommand.d.ts +9 -9
- package/dist/types/ts3.4/commands/CreateAliasCommand.d.ts +13 -14
- package/dist/types/ts3.4/commands/CreateCustomKeyStoreCommand.d.ts +8 -8
- package/dist/types/ts3.4/commands/CreateGrantCommand.d.ts +15 -22
- package/dist/types/ts3.4/commands/CreateKeyCommand.d.ts +44 -44
- package/dist/types/ts3.4/commands/DecryptCommand.d.ts +23 -22
- package/dist/types/ts3.4/commands/DeleteAliasCommand.d.ts +7 -8
- package/dist/types/ts3.4/commands/DeleteCustomKeyStoreCommand.d.ts +13 -13
- package/dist/types/ts3.4/commands/DeleteImportedKeyMaterialCommand.d.ts +9 -9
- package/dist/types/ts3.4/commands/DescribeCustomKeyStoresCommand.d.ts +6 -6
- package/dist/types/ts3.4/commands/DescribeKeyCommand.d.ts +18 -19
- package/dist/types/ts3.4/commands/DisableKeyCommand.d.ts +7 -7
- package/dist/types/ts3.4/commands/DisableKeyRotationCommand.d.ts +5 -6
- package/dist/types/ts3.4/commands/DisconnectCustomKeyStoreCommand.d.ts +6 -8
- package/dist/types/ts3.4/commands/EnableKeyCommand.d.ts +4 -5
- package/dist/types/ts3.4/commands/EnableKeyRotationCommand.d.ts +5 -5
- package/dist/types/ts3.4/commands/EncryptCommand.d.ts +20 -21
- package/dist/types/ts3.4/commands/GenerateDataKeyCommand.d.ts +17 -18
- package/dist/types/ts3.4/commands/GenerateDataKeyPairCommand.d.ts +21 -15
- package/dist/types/ts3.4/commands/GenerateDataKeyPairWithoutPlaintextCommand.d.ts +16 -12
- package/dist/types/ts3.4/commands/GenerateDataKeyWithoutPlaintextCommand.d.ts +9 -9
- package/dist/types/ts3.4/commands/GenerateRandomCommand.d.ts +4 -3
- package/dist/types/ts3.4/commands/GetKeyPolicyCommand.d.ts +2 -2
- package/dist/types/ts3.4/commands/GetKeyRotationStatusCommand.d.ts +9 -9
- package/dist/types/ts3.4/commands/GetParametersForImportCommand.d.ts +8 -8
- package/dist/types/ts3.4/commands/GetPublicKeyCommand.d.ts +15 -15
- package/dist/types/ts3.4/commands/ImportKeyMaterialCommand.d.ts +18 -18
- package/dist/types/ts3.4/commands/ListAliasesCommand.d.ts +8 -10
- package/dist/types/ts3.4/commands/ListGrantsCommand.d.ts +9 -4
- package/dist/types/ts3.4/commands/ListKeyPoliciesCommand.d.ts +2 -2
- package/dist/types/ts3.4/commands/ListKeysCommand.d.ts +2 -2
- package/dist/types/ts3.4/commands/ListResourceTagsCommand.d.ts +4 -4
- package/dist/types/ts3.4/commands/ListRetirableGrantsCommand.d.ts +14 -14
- package/dist/types/ts3.4/commands/PutKeyPolicyCommand.d.ts +5 -5
- package/dist/types/ts3.4/commands/ReEncryptCommand.d.ts +30 -34
- package/dist/types/ts3.4/commands/ReplicateKeyCommand.d.ts +16 -16
- package/dist/types/ts3.4/commands/RetireGrantCommand.d.ts +9 -9
- package/dist/types/ts3.4/commands/RevokeGrantCommand.d.ts +9 -4
- package/dist/types/ts3.4/commands/ScheduleKeyDeletionCommand.d.ts +17 -17
- package/dist/types/ts3.4/commands/SignCommand.d.ts +12 -13
- package/dist/types/ts3.4/commands/TagResourceCommand.d.ts +10 -12
- package/dist/types/ts3.4/commands/UntagResourceCommand.d.ts +9 -10
- package/dist/types/ts3.4/commands/UpdateAliasCommand.d.ts +15 -15
- package/dist/types/ts3.4/commands/UpdateCustomKeyStoreCommand.d.ts +9 -9
- package/dist/types/ts3.4/commands/UpdateKeyDescriptionCommand.d.ts +4 -4
- package/dist/types/ts3.4/commands/UpdatePrimaryRegionCommand.d.ts +13 -13
- package/dist/types/ts3.4/commands/VerifyCommand.d.ts +14 -14
- package/dist/types/ts3.4/models/models_0.d.ts +584 -570
- package/models/models_0.ts +588 -570
- package/package.json +31 -31
- package/protocols/Aws_json1_1.ts +20 -12
|
@@ -4,13 +4,11 @@ import { deserializeAws_json1_1DisconnectCustomKeyStoreCommand, serializeAws_jso
|
|
|
4
4
|
import { getSerdePlugin } from "@aws-sdk/middleware-serde";
|
|
5
5
|
import { Command as $Command } from "@aws-sdk/smithy-client";
|
|
6
6
|
/**
|
|
7
|
-
* <p>Disconnects the <a href="https://docs.aws.amazon.com/kms/latest/developerguide/custom-key-store-overview.html">custom key store</a> from its associated
|
|
8
|
-
* store is disconnected, you can manage the custom key store and its
|
|
9
|
-
* (CMKs), but you cannot create or use CMKs in the custom key store. You can reconnect the
|
|
7
|
+
* <p>Disconnects the <a href="https://docs.aws.amazon.com/kms/latest/developerguide/custom-key-store-overview.html">custom key store</a> from its associated CloudHSM cluster. While a custom key
|
|
8
|
+
* store is disconnected, you can manage the custom key store and its KMS keys, but you cannot create or use KMS keys in the custom key store. You can reconnect the
|
|
10
9
|
* custom key store at any time.</p>
|
|
11
10
|
* <note>
|
|
12
|
-
* <p>While a custom key store is disconnected, all attempts to create
|
|
13
|
-
* (CMKs) in the custom key store or to use existing CMKs in <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#cryptographic-operations">cryptographic operations</a> will
|
|
11
|
+
* <p>While a custom key store is disconnected, all attempts to create KMS keys in the custom key store or to use existing KMS keys in <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#cryptographic-operations">cryptographic operations</a> will
|
|
14
12
|
* fail. This action can prevent users from storing and accessing sensitive data.</p>
|
|
15
13
|
* </note>
|
|
16
14
|
* <p></p>
|
|
@@ -18,12 +16,12 @@ import { Command as $Command } from "@aws-sdk/smithy-client";
|
|
|
18
16
|
* <a>ConnectCustomKeyStore</a> operation.</p>
|
|
19
17
|
* <p>If the operation succeeds, it returns a JSON object with no
|
|
20
18
|
* properties.</p>
|
|
21
|
-
* <p>This operation is part of the <a href="https://docs.aws.amazon.com/kms/latest/developerguide/custom-key-store-overview.html">Custom Key Store feature</a> feature in
|
|
22
|
-
* combines the convenience and extensive integration of
|
|
19
|
+
* <p>This operation is part of the <a href="https://docs.aws.amazon.com/kms/latest/developerguide/custom-key-store-overview.html">Custom Key Store feature</a> feature in KMS, which
|
|
20
|
+
* combines the convenience and extensive integration of KMS with the isolation and control of a
|
|
23
21
|
* single-tenant key store.</p>
|
|
24
22
|
*
|
|
25
23
|
* <p>
|
|
26
|
-
* <b>Cross-account use</b>: No. You cannot perform this operation on a custom key store in a different
|
|
24
|
+
* <b>Cross-account use</b>: No. You cannot perform this operation on a custom key store in a different Amazon Web Services account.</p>
|
|
27
25
|
*
|
|
28
26
|
* <p>
|
|
29
27
|
* <b>Required permissions</b>: <a href="https://docs.aws.amazon.com/kms/latest/developerguide/kms-api-permissions-reference.html">kms:DisconnectCustomKeyStore</a> (IAM policy)</p>
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"DisconnectCustomKeyStoreCommand.js","sourceRoot":"","sources":["../../../commands/DisconnectCustomKeyStoreCommand.ts"],"names":[],"mappings":";AACA,OAAO,EAAE,+BAA+B,EAAE,gCAAgC,EAAE,MAAM,oBAAoB,CAAC;AACvG,OAAO,EACL,qDAAqD,EACrD,mDAAmD,GACpD,MAAM,0BAA0B,CAAC;AAClC,OAAO,EAAE,cAAc,EAAE,MAAM,2BAA2B,CAAC;AAE3D,OAAO,EAAE,OAAO,IAAI,QAAQ,EAAE,MAAM,wBAAwB,CAAC;AAc7D
|
|
1
|
+
{"version":3,"file":"DisconnectCustomKeyStoreCommand.js","sourceRoot":"","sources":["../../../commands/DisconnectCustomKeyStoreCommand.ts"],"names":[],"mappings":";AACA,OAAO,EAAE,+BAA+B,EAAE,gCAAgC,EAAE,MAAM,oBAAoB,CAAC;AACvG,OAAO,EACL,qDAAqD,EACrD,mDAAmD,GACpD,MAAM,0BAA0B,CAAC;AAClC,OAAO,EAAE,cAAc,EAAE,MAAM,2BAA2B,CAAC;AAE3D,OAAO,EAAE,OAAO,IAAI,QAAQ,EAAE,MAAM,wBAAwB,CAAC;AAc7D;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAkEG;AACH;IAAqD,mDAIpD;IACC,oCAAoC;IACpC,kCAAkC;IAElC,yCAAqB,KAA2C;QAAhE;QACE,qCAAqC;QACrC,iBAAO,SAER;QAJoB,WAAK,GAAL,KAAK,CAAsC;;QAG9D,mCAAmC;IACrC,CAAC;IAED;;OAEG;IACH,2DAAiB,GAAjB,UACE,WAAmE,EACnE,aAAsC,EACtC,OAA8B;QAE9B,IAAI,CAAC,eAAe,CAAC,GAAG,CAAC,cAAc,CAAC,aAAa,EAAE,IAAI,CAAC,SAAS,EAAE,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC;QAE1F,IAAM,KAAK,GAAG,WAAW,CAAC,MAAM,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC;QAE/C,IAAA,MAAM,GAAK,aAAa,OAAlB,CAAmB;QACjC,IAAM,UAAU,GAAG,WAAW,CAAC;QAC/B,IAAM,WAAW,GAAG,iCAAiC,CAAC;QACtD,IAAM,uBAAuB,GAA4B;YACvD,MAAM,QAAA;YACN,UAAU,YAAA;YACV,WAAW,aAAA;YACX,uBAAuB,EAAE,+BAA+B,CAAC,kBAAkB;YAC3E,wBAAwB,EAAE,gCAAgC,CAAC,kBAAkB;SAC9E,CAAC;QACM,IAAA,cAAc,GAAK,aAAa,eAAlB,CAAmB;QACzC,OAAO,KAAK,CAAC,OAAO,CAClB,UAAC,OAAsC;YACrC,OAAA,cAAc,CAAC,MAAM,CAAC,OAAO,CAAC,OAAwB,EAAE,OAAO,IAAI,EAAE,CAAC;QAAtE,CAAsE,EACxE,uBAAuB,CACxB,CAAC;IACJ,CAAC;IAEO,mDAAS,GAAjB,UAAkB,KAA2C,EAAE,OAAuB;QACpF,OAAO,mDAAmD,CAAC,KAAK,EAAE,OAAO,CAAC,CAAC;IAC7E,CAAC;IAEO,qDAAW,GAAnB,UAAoB,MAAsB,EAAE,OAAuB;QACjE,OAAO,qDAAqD,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;IAChF,CAAC;IAIH,sCAAC;AAAD,CAAC,AAtDD,CAAqD,QAAQ,GAsD5D"}
|
|
@@ -4,12 +4,11 @@ import { deserializeAws_json1_1EnableKeyCommand, serializeAws_json1_1EnableKeyCo
|
|
|
4
4
|
import { getSerdePlugin } from "@aws-sdk/middleware-serde";
|
|
5
5
|
import { Command as $Command } from "@aws-sdk/smithy-client";
|
|
6
6
|
/**
|
|
7
|
-
* <p>Sets the key state of a
|
|
8
|
-
*
|
|
9
|
-
*
|
|
10
|
-
* details, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-state.html">Key state: Effect on your CMK</a> in the <i>AWS Key Management Service Developer Guide</i>.</p>
|
|
7
|
+
* <p>Sets the key state of a KMS key to enabled. This allows you to use the KMS key for <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#cryptographic-operations">cryptographic operations</a>. </p>
|
|
8
|
+
* <p>The KMS key that you use for this operation must be in a compatible key state. For
|
|
9
|
+
* details, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-state.html">Key state: Effect on your KMS key</a> in the <i>Key Management Service Developer Guide</i>.</p>
|
|
11
10
|
* <p>
|
|
12
|
-
* <b>Cross-account use</b>: No. You cannot perform this operation on a
|
|
11
|
+
* <b>Cross-account use</b>: No. You cannot perform this operation on a KMS key in a different Amazon Web Services account.</p>
|
|
13
12
|
*
|
|
14
13
|
* <p>
|
|
15
14
|
* <b>Required permissions</b>: <a href="https://docs.aws.amazon.com/kms/latest/developerguide/kms-api-permissions-reference.html">kms:EnableKey</a> (key policy)</p>
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"EnableKeyCommand.js","sourceRoot":"","sources":["../../../commands/EnableKeyCommand.ts"],"names":[],"mappings":";AACA,OAAO,EAAE,gBAAgB,EAAE,MAAM,oBAAoB,CAAC;AACtD,OAAO,EAAE,sCAAsC,EAAE,oCAAoC,EAAE,MAAM,0BAA0B,CAAC;AACxH,OAAO,EAAE,cAAc,EAAE,MAAM,2BAA2B,CAAC;AAE3D,OAAO,EAAE,OAAO,IAAI,QAAQ,EAAE,MAAM,wBAAwB,CAAC;AAc7D
|
|
1
|
+
{"version":3,"file":"EnableKeyCommand.js","sourceRoot":"","sources":["../../../commands/EnableKeyCommand.ts"],"names":[],"mappings":";AACA,OAAO,EAAE,gBAAgB,EAAE,MAAM,oBAAoB,CAAC;AACtD,OAAO,EAAE,sCAAsC,EAAE,oCAAoC,EAAE,MAAM,0BAA0B,CAAC;AACxH,OAAO,EAAE,cAAc,EAAE,MAAM,2BAA2B,CAAC;AAE3D,OAAO,EAAE,OAAO,IAAI,QAAQ,EAAE,MAAM,wBAAwB,CAAC;AAc7D;;;;;;;;;;;;;;;;;;;;;;;;;;GA0BG;AACH;IAAsC,oCAAgF;IACpH,oCAAoC;IACpC,kCAAkC;IAElC,0BAAqB,KAA4B;QAAjD;QACE,qCAAqC;QACrC,iBAAO,SAER;QAJoB,WAAK,GAAL,KAAK,CAAuB;;QAG/C,mCAAmC;IACrC,CAAC;IAED;;OAEG;IACH,4CAAiB,GAAjB,UACE,WAAmE,EACnE,aAAsC,EACtC,OAA8B;QAE9B,IAAI,CAAC,eAAe,CAAC,GAAG,CAAC,cAAc,CAAC,aAAa,EAAE,IAAI,CAAC,SAAS,EAAE,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC;QAE1F,IAAM,KAAK,GAAG,WAAW,CAAC,MAAM,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC;QAE/C,IAAA,MAAM,GAAK,aAAa,OAAlB,CAAmB;QACjC,IAAM,UAAU,GAAG,WAAW,CAAC;QAC/B,IAAM,WAAW,GAAG,kBAAkB,CAAC;QACvC,IAAM,uBAAuB,GAA4B;YACvD,MAAM,QAAA;YACN,UAAU,YAAA;YACV,WAAW,aAAA;YACX,uBAAuB,EAAE,gBAAgB,CAAC,kBAAkB;YAC5D,wBAAwB,EAAE,UAAC,MAAW,IAAK,OAAA,MAAM,EAAN,CAAM;SAClD,CAAC;QACM,IAAA,cAAc,GAAK,aAAa,eAAlB,CAAmB;QACzC,OAAO,KAAK,CAAC,OAAO,CAClB,UAAC,OAAsC;YACrC,OAAA,cAAc,CAAC,MAAM,CAAC,OAAO,CAAC,OAAwB,EAAE,OAAO,IAAI,EAAE,CAAC;QAAtE,CAAsE,EACxE,uBAAuB,CACxB,CAAC;IACJ,CAAC;IAEO,oCAAS,GAAjB,UAAkB,KAA4B,EAAE,OAAuB;QACrE,OAAO,oCAAoC,CAAC,KAAK,EAAE,OAAO,CAAC,CAAC;IAC9D,CAAC;IAEO,sCAAW,GAAnB,UAAoB,MAAsB,EAAE,OAAuB;QACjE,OAAO,sCAAsC,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;IACjE,CAAC;IAIH,uBAAC;AAAD,CAAC,AAlDD,CAAsC,QAAQ,GAkD7C"}
|
|
@@ -5,12 +5,12 @@ import { getSerdePlugin } from "@aws-sdk/middleware-serde";
|
|
|
5
5
|
import { Command as $Command } from "@aws-sdk/smithy-client";
|
|
6
6
|
/**
|
|
7
7
|
* <p>Enables <a href="https://docs.aws.amazon.com/kms/latest/developerguide/rotate-keys.html">automatic rotation
|
|
8
|
-
* of the key material</a> for the specified symmetric
|
|
9
|
-
* <p>You cannot enable automatic rotation of <a href="https://docs.aws.amazon.com/kms/latest/developerguide/symm-asymm-concepts.html#asymmetric-cmks">asymmetric
|
|
10
|
-
* <p>The
|
|
11
|
-
* details, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-state.html">Key state: Effect on your
|
|
8
|
+
* of the key material</a> for the specified symmetric KMS key.</p>
|
|
9
|
+
* <p>You cannot enable automatic rotation of <a href="https://docs.aws.amazon.com/kms/latest/developerguide/symm-asymm-concepts.html#asymmetric-cmks">asymmetric KMS keys</a>, KMS keys with <a href="https://docs.aws.amazon.com/kms/latest/developerguide/importing-keys.html">imported key material</a>, or KMS keys in a <a href="https://docs.aws.amazon.com/kms/latest/developerguide/custom-key-store-overview.html">custom key store</a>. To enable or disable automatic rotation of a set of related <a href="https://docs.aws.amazon.com/kms/latest/developerguide/multi-region-keys-overview.html#mrk-replica-key">multi-Region keys</a>, set the property on the primary key.</p>
|
|
10
|
+
* <p>The KMS key that you use for this operation must be in a compatible key state. For
|
|
11
|
+
* details, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-state.html">Key state: Effect on your KMS key</a> in the <i>Key Management Service Developer Guide</i>.</p>
|
|
12
12
|
* <p>
|
|
13
|
-
* <b>Cross-account use</b>: No. You cannot perform this operation on a
|
|
13
|
+
* <b>Cross-account use</b>: No. You cannot perform this operation on a KMS key in a different Amazon Web Services account.</p>
|
|
14
14
|
*
|
|
15
15
|
* <p>
|
|
16
16
|
* <b>Required permissions</b>: <a href="https://docs.aws.amazon.com/kms/latest/developerguide/kms-api-permissions-reference.html">kms:EnableKeyRotation</a> (key policy)</p>
|
|
@@ -4,7 +4,7 @@ import { deserializeAws_json1_1EncryptCommand, serializeAws_json1_1EncryptComman
|
|
|
4
4
|
import { getSerdePlugin } from "@aws-sdk/middleware-serde";
|
|
5
5
|
import { Command as $Command } from "@aws-sdk/smithy-client";
|
|
6
6
|
/**
|
|
7
|
-
* <p>Encrypts plaintext into ciphertext by using a
|
|
7
|
+
* <p>Encrypts plaintext into ciphertext by using a KMS key. The
|
|
8
8
|
* <code>Encrypt</code> operation has two primary use cases:</p>
|
|
9
9
|
* <ul>
|
|
10
10
|
* <li>
|
|
@@ -12,41 +12,40 @@ import { Command as $Command } from "@aws-sdk/smithy-client";
|
|
|
12
12
|
* database password, or other sensitive information. </p>
|
|
13
13
|
* </li>
|
|
14
14
|
* <li>
|
|
15
|
-
* <p>You can use the <code>Encrypt</code> operation to move encrypted data from one
|
|
16
|
-
*
|
|
17
|
-
*
|
|
18
|
-
*
|
|
19
|
-
* the encrypted data
|
|
20
|
-
* and the encrypted data entirely within in Region B.</p>
|
|
15
|
+
* <p>You can use the <code>Encrypt</code> operation to move encrypted data from one Amazon Web Services Region to another. For example, in Region A, generate a data key and use the plaintext key to encrypt
|
|
16
|
+
* your data. Then, in Region A, use the <code>Encrypt</code> operation to encrypt the
|
|
17
|
+
* plaintext data key under a KMS key in Region B. Now, you can move the encrypted data and the
|
|
18
|
+
* encrypted data key to Region B. When necessary, you can decrypt the encrypted data key and
|
|
19
|
+
* the encrypted data entirely within in Region B.</p>
|
|
21
20
|
* </li>
|
|
22
21
|
* </ul>
|
|
23
22
|
*
|
|
24
23
|
* <p>You don't need to use the <code>Encrypt</code> operation to encrypt a data key. The <a>GenerateDataKey</a> and <a>GenerateDataKeyPair</a> operations return a
|
|
25
24
|
* plaintext data key and an encrypted copy of that data key.</p>
|
|
26
25
|
*
|
|
27
|
-
* <p>When you encrypt data, you must specify a symmetric or asymmetric
|
|
28
|
-
* encryption operation. The
|
|
29
|
-
* <code>ENCRYPT_DECRYPT.</code> To find the <code>KeyUsage</code> of a
|
|
26
|
+
* <p>When you encrypt data, you must specify a symmetric or asymmetric KMS key to use in the
|
|
27
|
+
* encryption operation. The KMS key must have a <code>KeyUsage</code> value of
|
|
28
|
+
* <code>ENCRYPT_DECRYPT.</code> To find the <code>KeyUsage</code> of a KMS key, use the <a>DescribeKey</a> operation. </p>
|
|
30
29
|
*
|
|
31
|
-
* <p>If you use a symmetric
|
|
30
|
+
* <p>If you use a symmetric KMS key, you can use an encryption context to add additional security
|
|
32
31
|
* to your encryption operation. If you specify an <code>EncryptionContext</code> when encrypting
|
|
33
32
|
* data, you must specify the same encryption context (a case-sensitive exact match) when
|
|
34
33
|
* decrypting the data. Otherwise, the request to decrypt fails with an
|
|
35
34
|
* <code>InvalidCiphertextException</code>. For more information, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#encrypt_context">Encryption
|
|
36
|
-
* Context</a> in the <i>
|
|
37
|
-
* <p>If you specify an asymmetric
|
|
38
|
-
* algorithm must be compatible with the
|
|
35
|
+
* Context</a> in the <i>Key Management Service Developer Guide</i>.</p>
|
|
36
|
+
* <p>If you specify an asymmetric KMS key, you must also specify the encryption algorithm. The
|
|
37
|
+
* algorithm must be compatible with the KMS key type.</p>
|
|
39
38
|
* <important>
|
|
40
|
-
* <p>When you use an asymmetric
|
|
41
|
-
* <p>You are not required to supply the
|
|
39
|
+
* <p>When you use an asymmetric KMS key to encrypt or reencrypt data, be sure to record the KMS key and encryption algorithm that you choose. You will be required to provide the same KMS key and encryption algorithm when you decrypt the data. If the KMS key and algorithm do not match the values used to encrypt the data, the decrypt operation fails.</p>
|
|
40
|
+
* <p>You are not required to supply the key ID and encryption algorithm when you decrypt with symmetric KMS keys because KMS stores this information in the ciphertext blob. KMS cannot store metadata in ciphertext generated with asymmetric keys. The standard format for asymmetric key ciphertext does not include configurable fields.</p>
|
|
42
41
|
* </important>
|
|
43
42
|
*
|
|
44
43
|
*
|
|
45
|
-
* <p>The maximum size of the data that you can encrypt varies with the type of
|
|
44
|
+
* <p>The maximum size of the data that you can encrypt varies with the type of KMS key and the
|
|
46
45
|
* encryption algorithm that you choose.</p>
|
|
47
46
|
* <ul>
|
|
48
47
|
* <li>
|
|
49
|
-
* <p>Symmetric
|
|
48
|
+
* <p>Symmetric KMS keys</p>
|
|
50
49
|
* <ul>
|
|
51
50
|
* <li>
|
|
52
51
|
* <p>
|
|
@@ -100,10 +99,10 @@ import { Command as $Command } from "@aws-sdk/smithy-client";
|
|
|
100
99
|
* </ul>
|
|
101
100
|
* </li>
|
|
102
101
|
* </ul>
|
|
103
|
-
* <p>The
|
|
104
|
-
* details, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-state.html">Key state: Effect on your
|
|
102
|
+
* <p>The KMS key that you use for this operation must be in a compatible key state. For
|
|
103
|
+
* details, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-state.html">Key state: Effect on your KMS key</a> in the <i>Key Management Service Developer Guide</i>.</p>
|
|
105
104
|
* <p>
|
|
106
|
-
* <b>Cross-account use</b>: Yes. To perform this operation with a
|
|
105
|
+
* <b>Cross-account use</b>: Yes. To perform this operation with a KMS key in a different Amazon Web Services account, specify
|
|
107
106
|
* the key ARN or alias ARN in the value of the <code>KeyId</code> parameter.</p>
|
|
108
107
|
*
|
|
109
108
|
* <p>
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"EncryptCommand.js","sourceRoot":"","sources":["../../../commands/EncryptCommand.ts"],"names":[],"mappings":";AACA,OAAO,EAAE,cAAc,EAAE,eAAe,EAAE,MAAM,oBAAoB,CAAC;AACrE,OAAO,EAAE,oCAAoC,EAAE,kCAAkC,EAAE,MAAM,0BAA0B,CAAC;AACpH,OAAO,EAAE,cAAc,EAAE,MAAM,2BAA2B,CAAC;AAE3D,OAAO,EAAE,OAAO,IAAI,QAAQ,EAAE,MAAM,wBAAwB,CAAC;AAc7D
|
|
1
|
+
{"version":3,"file":"EncryptCommand.js","sourceRoot":"","sources":["../../../commands/EncryptCommand.ts"],"names":[],"mappings":";AACA,OAAO,EAAE,cAAc,EAAE,eAAe,EAAE,MAAM,oBAAoB,CAAC;AACrE,OAAO,EAAE,oCAAoC,EAAE,kCAAkC,EAAE,MAAM,0BAA0B,CAAC;AACpH,OAAO,EAAE,cAAc,EAAE,MAAM,2BAA2B,CAAC;AAE3D,OAAO,EAAE,OAAO,IAAI,QAAQ,EAAE,MAAM,wBAAwB,CAAC;AAc7D;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA0IG;AACH;IAAoC,kCAA4E;IAC9G,oCAAoC;IACpC,kCAAkC;IAElC,wBAAqB,KAA0B;QAA/C;QACE,qCAAqC;QACrC,iBAAO,SAER;QAJoB,WAAK,GAAL,KAAK,CAAqB;;QAG7C,mCAAmC;IACrC,CAAC;IAED;;OAEG;IACH,0CAAiB,GAAjB,UACE,WAAmE,EACnE,aAAsC,EACtC,OAA8B;QAE9B,IAAI,CAAC,eAAe,CAAC,GAAG,CAAC,cAAc,CAAC,aAAa,EAAE,IAAI,CAAC,SAAS,EAAE,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC;QAE1F,IAAM,KAAK,GAAG,WAAW,CAAC,MAAM,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC;QAE/C,IAAA,MAAM,GAAK,aAAa,OAAlB,CAAmB;QACjC,IAAM,UAAU,GAAG,WAAW,CAAC;QAC/B,IAAM,WAAW,GAAG,gBAAgB,CAAC;QACrC,IAAM,uBAAuB,GAA4B;YACvD,MAAM,QAAA;YACN,UAAU,YAAA;YACV,WAAW,aAAA;YACX,uBAAuB,EAAE,cAAc,CAAC,kBAAkB;YAC1D,wBAAwB,EAAE,eAAe,CAAC,kBAAkB;SAC7D,CAAC;QACM,IAAA,cAAc,GAAK,aAAa,eAAlB,CAAmB;QACzC,OAAO,KAAK,CAAC,OAAO,CAClB,UAAC,OAAsC;YACrC,OAAA,cAAc,CAAC,MAAM,CAAC,OAAO,CAAC,OAAwB,EAAE,OAAO,IAAI,EAAE,CAAC;QAAtE,CAAsE,EACxE,uBAAuB,CACxB,CAAC;IACJ,CAAC;IAEO,kCAAS,GAAjB,UAAkB,KAA0B,EAAE,OAAuB;QACnE,OAAO,kCAAkC,CAAC,KAAK,EAAE,OAAO,CAAC,CAAC;IAC5D,CAAC;IAEO,oCAAW,GAAnB,UAAoB,MAAsB,EAAE,OAAuB;QACjE,OAAO,oCAAoC,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;IAC/D,CAAC;IAIH,qBAAC;AAAD,CAAC,AAlDD,CAAoC,QAAQ,GAkD3C"}
|
|
@@ -5,16 +5,16 @@ import { getSerdePlugin } from "@aws-sdk/middleware-serde";
|
|
|
5
5
|
import { Command as $Command } from "@aws-sdk/smithy-client";
|
|
6
6
|
/**
|
|
7
7
|
* <p>Generates a unique symmetric data key for client-side encryption. This operation returns a
|
|
8
|
-
* plaintext copy of the data key and a copy that is encrypted under a
|
|
9
|
-
* that you specify. You can use the plaintext key to encrypt your data outside of
|
|
8
|
+
* plaintext copy of the data key and a copy that is encrypted under a KMS key
|
|
9
|
+
* that you specify. You can use the plaintext key to encrypt your data outside of KMS and
|
|
10
10
|
* store the encrypted data key with the encrypted data.</p>
|
|
11
11
|
*
|
|
12
12
|
* <p>
|
|
13
13
|
* <code>GenerateDataKey</code> returns a unique data key for each request. The bytes in the
|
|
14
|
-
* plaintext key are not related to the caller or the
|
|
14
|
+
* plaintext key are not related to the caller or the KMS key.</p>
|
|
15
15
|
*
|
|
16
|
-
* <p>To generate a data key, specify the symmetric
|
|
17
|
-
* key. You cannot use an asymmetric
|
|
16
|
+
* <p>To generate a data key, specify the symmetric KMS key that will be used to encrypt the data
|
|
17
|
+
* key. You cannot use an asymmetric KMS key to generate data keys. To get the type of your KMS key, use
|
|
18
18
|
* the <a>DescribeKey</a> operation. You must also specify the length of the data key.
|
|
19
19
|
* Use either the <code>KeySpec</code> or <code>NumberOfBytes</code> parameters (but not both).
|
|
20
20
|
* For 128-bit and 256-bit data keys, use the <code>KeySpec</code> parameter. </p>
|
|
@@ -27,45 +27,44 @@ import { Command as $Command } from "@aws-sdk/smithy-client";
|
|
|
27
27
|
* operation. If you specify an <code>EncryptionContext</code>, you must specify the same
|
|
28
28
|
* encryption context (a case-sensitive exact match) when decrypting the encrypted data key.
|
|
29
29
|
* Otherwise, the request to decrypt fails with an <code>InvalidCiphertextException</code>. For more information, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#encrypt_context">Encryption Context</a> in the
|
|
30
|
-
* <i>
|
|
31
|
-
* <p>
|
|
32
|
-
*
|
|
30
|
+
* <i>Key Management Service Developer Guide</i>.</p>
|
|
31
|
+
* <p>Applications in Amazon Web Services Nitro Enclaves can call this operation by using the <a href="https://github.com/aws/aws-nitro-enclaves-sdk-c">Amazon Web Services Nitro Enclaves Development Kit</a>. For information about the supporting parameters, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/services-nitro-enclaves.html">How Amazon Web Services Nitro Enclaves use KMS</a> in the <i>Key Management Service Developer Guide</i>.</p>
|
|
32
|
+
* <p>The KMS key that you use for this operation must be in a compatible key state. For
|
|
33
|
+
* details, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-state.html">Key state: Effect on your KMS key</a> in the <i>Key Management Service Developer Guide</i>.</p>
|
|
33
34
|
* <p>
|
|
34
|
-
* <b>How to use your
|
|
35
|
-
* data key</b>
|
|
35
|
+
* <b>How to use your data key</b>
|
|
36
36
|
* </p>
|
|
37
|
-
* <p>We recommend that you use the following pattern to encrypt data locally in your
|
|
38
|
-
*
|
|
39
|
-
* <a href="https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/">AWS Encryption SDK</a>, the <a href="https://docs.aws.amazon.com/dynamodb-encryption-client/latest/devguide/">Amazon DynamoDB Encryption Client</a>, or
|
|
37
|
+
* <p>We recommend that you use the following pattern to encrypt data locally in your application.
|
|
38
|
+
* You can write your own code or use a client-side encryption library, such as the <a href="https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/">Amazon Web Services Encryption SDK</a>, the <a href="https://docs.aws.amazon.com/dynamodb-encryption-client/latest/devguide/">Amazon DynamoDB Encryption Client</a>, or
|
|
40
39
|
* <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/UsingClientSideEncryption.html">Amazon S3
|
|
41
40
|
* client-side encryption</a> to do these tasks for you.</p>
|
|
42
|
-
* <p>To encrypt data outside of
|
|
41
|
+
* <p>To encrypt data outside of KMS:</p>
|
|
43
42
|
* <ol>
|
|
44
43
|
* <li>
|
|
45
44
|
* <p>Use the <code>GenerateDataKey</code> operation to get a data key.</p>
|
|
46
45
|
* </li>
|
|
47
46
|
* <li>
|
|
48
47
|
* <p>Use the plaintext data key (in the <code>Plaintext</code> field of the response) to
|
|
49
|
-
* encrypt your data outside of
|
|
48
|
+
* encrypt your data outside of KMS. Then erase the plaintext data key from memory.</p>
|
|
50
49
|
* </li>
|
|
51
50
|
* <li>
|
|
52
51
|
* <p>Store the encrypted data key (in the <code>CiphertextBlob</code> field of the
|
|
53
52
|
* response) with the encrypted data.</p>
|
|
54
53
|
* </li>
|
|
55
54
|
* </ol>
|
|
56
|
-
* <p>To decrypt data outside of
|
|
55
|
+
* <p>To decrypt data outside of KMS:</p>
|
|
57
56
|
* <ol>
|
|
58
57
|
* <li>
|
|
59
58
|
* <p>Use the <a>Decrypt</a> operation to decrypt the encrypted data key. The
|
|
60
59
|
* operation returns a plaintext copy of the data key.</p>
|
|
61
60
|
* </li>
|
|
62
61
|
* <li>
|
|
63
|
-
* <p>Use the plaintext data key to decrypt data outside of
|
|
62
|
+
* <p>Use the plaintext data key to decrypt data outside of KMS, then erase the plaintext
|
|
64
63
|
* data key from memory.</p>
|
|
65
64
|
* </li>
|
|
66
65
|
* </ol>
|
|
67
66
|
* <p>
|
|
68
|
-
* <b>Cross-account use</b>: Yes. To perform this operation with a
|
|
67
|
+
* <b>Cross-account use</b>: Yes. To perform this operation with a KMS key in a different Amazon Web Services account, specify
|
|
69
68
|
* the key ARN or alias ARN in the value of the <code>KeyId</code> parameter.</p>
|
|
70
69
|
*
|
|
71
70
|
* <p>
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"GenerateDataKeyCommand.js","sourceRoot":"","sources":["../../../commands/GenerateDataKeyCommand.ts"],"names":[],"mappings":";AACA,OAAO,EAAE,sBAAsB,EAAE,uBAAuB,EAAE,MAAM,oBAAoB,CAAC;AACrF,OAAO,EACL,4CAA4C,EAC5C,0CAA0C,GAC3C,MAAM,0BAA0B,CAAC;AAClC,OAAO,EAAE,cAAc,EAAE,MAAM,2BAA2B,CAAC;AAE3D,OAAO,EAAE,OAAO,IAAI,QAAQ,EAAE,MAAM,wBAAwB,CAAC;AAc7D
|
|
1
|
+
{"version":3,"file":"GenerateDataKeyCommand.js","sourceRoot":"","sources":["../../../commands/GenerateDataKeyCommand.ts"],"names":[],"mappings":";AACA,OAAO,EAAE,sBAAsB,EAAE,uBAAuB,EAAE,MAAM,oBAAoB,CAAC;AACrF,OAAO,EACL,4CAA4C,EAC5C,0CAA0C,GAC3C,MAAM,0BAA0B,CAAC;AAClC,OAAO,EAAE,cAAc,EAAE,MAAM,2BAA2B,CAAC;AAE3D,OAAO,EAAE,OAAO,IAAI,QAAQ,EAAE,MAAM,wBAAwB,CAAC;AAc7D;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA8GG;AACH;IAA4C,0CAI3C;IACC,oCAAoC;IACpC,kCAAkC;IAElC,gCAAqB,KAAkC;QAAvD;QACE,qCAAqC;QACrC,iBAAO,SAER;QAJoB,WAAK,GAAL,KAAK,CAA6B;;QAGrD,mCAAmC;IACrC,CAAC;IAED;;OAEG;IACH,kDAAiB,GAAjB,UACE,WAAmE,EACnE,aAAsC,EACtC,OAA8B;QAE9B,IAAI,CAAC,eAAe,CAAC,GAAG,CAAC,cAAc,CAAC,aAAa,EAAE,IAAI,CAAC,SAAS,EAAE,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC;QAE1F,IAAM,KAAK,GAAG,WAAW,CAAC,MAAM,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC;QAE/C,IAAA,MAAM,GAAK,aAAa,OAAlB,CAAmB;QACjC,IAAM,UAAU,GAAG,WAAW,CAAC;QAC/B,IAAM,WAAW,GAAG,wBAAwB,CAAC;QAC7C,IAAM,uBAAuB,GAA4B;YACvD,MAAM,QAAA;YACN,UAAU,YAAA;YACV,WAAW,aAAA;YACX,uBAAuB,EAAE,sBAAsB,CAAC,kBAAkB;YAClE,wBAAwB,EAAE,uBAAuB,CAAC,kBAAkB;SACrE,CAAC;QACM,IAAA,cAAc,GAAK,aAAa,eAAlB,CAAmB;QACzC,OAAO,KAAK,CAAC,OAAO,CAClB,UAAC,OAAsC;YACrC,OAAA,cAAc,CAAC,MAAM,CAAC,OAAO,CAAC,OAAwB,EAAE,OAAO,IAAI,EAAE,CAAC;QAAtE,CAAsE,EACxE,uBAAuB,CACxB,CAAC;IACJ,CAAC;IAEO,0CAAS,GAAjB,UAAkB,KAAkC,EAAE,OAAuB;QAC3E,OAAO,0CAA0C,CAAC,KAAK,EAAE,OAAO,CAAC,CAAC;IACpE,CAAC;IAEO,4CAAW,GAAnB,UAAoB,MAAsB,EAAE,OAAuB;QACjE,OAAO,4CAA4C,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;IACvE,CAAC;IAIH,6BAAC;AAAD,CAAC,AAtDD,CAA4C,QAAQ,GAsDnD"}
|
|
@@ -6,21 +6,20 @@ import { Command as $Command } from "@aws-sdk/smithy-client";
|
|
|
6
6
|
/**
|
|
7
7
|
* <p>Generates a unique asymmetric data key pair. The <code>GenerateDataKeyPair</code>
|
|
8
8
|
* operation returns a plaintext public key, a plaintext private key, and a copy of the private
|
|
9
|
-
* key that is encrypted under the symmetric
|
|
10
|
-
* perform asymmetric cryptography outside of
|
|
11
|
-
*
|
|
12
|
-
* <p>
|
|
13
|
-
* <code>GenerateDataKeyPair</code> returns a unique data key pair for each request. The
|
|
14
|
-
* bytes in the keys are not related to the caller or the CMK that is used to encrypt the private
|
|
15
|
-
* key.</p>
|
|
9
|
+
* key that is encrypted under the symmetric KMS key you specify. You can use the data key pair to
|
|
10
|
+
* perform asymmetric cryptography and implement digital signatures outside of KMS.</p>
|
|
16
11
|
*
|
|
17
12
|
* <p>You can use the public key that <code>GenerateDataKeyPair</code> returns to encrypt data
|
|
18
|
-
* or verify a signature outside of
|
|
13
|
+
* or verify a signature outside of KMS. Then, store the encrypted private key with the data.
|
|
19
14
|
* When you are ready to decrypt data or sign a message, you can use the <a>Decrypt</a> operation to decrypt the encrypted private key.</p>
|
|
20
15
|
*
|
|
21
|
-
* <p>To generate a data key pair, you must specify a symmetric
|
|
22
|
-
* encrypt the private key in a data key pair. You cannot use an asymmetric
|
|
23
|
-
* custom key store. To get the type and origin of your
|
|
16
|
+
* <p>To generate a data key pair, you must specify a symmetric KMS key to
|
|
17
|
+
* encrypt the private key in a data key pair. You cannot use an asymmetric KMS key or a KMS key in a
|
|
18
|
+
* custom key store. To get the type and origin of your KMS key, use the <a>DescribeKey</a> operation. </p>
|
|
19
|
+
* <p>Use the <code>KeyPairSpec</code> parameter to choose an RSA or Elliptic Curve (ECC) data
|
|
20
|
+
* key pair. KMS recommends that your use ECC key pairs for signing, and use RSA key pairs
|
|
21
|
+
* for either encryption or signing, but not both. However, KMS cannot enforce any restrictions
|
|
22
|
+
* on the use of data key pairs outside of KMS.</p>
|
|
24
23
|
*
|
|
25
24
|
* <p>If you are using the data key pair to encrypt data, or for any operation where you don't
|
|
26
25
|
* immediately need a private key, consider using the <a>GenerateDataKeyPairWithoutPlaintext</a> operation.
|
|
@@ -30,15 +29,22 @@ import { Command as $Command } from "@aws-sdk/smithy-client";
|
|
|
30
29
|
* the <a>Decrypt</a> operation to decrypt the encrypted private key in the data key
|
|
31
30
|
* pair.</p>
|
|
32
31
|
*
|
|
32
|
+
* <p>
|
|
33
|
+
* <code>GenerateDataKeyPair</code> returns a unique data key pair for each request. The
|
|
34
|
+
* bytes in the keys are not related to the caller or the KMS key that is used to encrypt the private
|
|
35
|
+
* key. The public key is a DER-encoded X.509 SubjectPublicKeyInfo, as specified in <a href="https://tools.ietf.org/html/rfc5280">RFC 5280</a>. The
|
|
36
|
+
* private key is a DER-encoded PKCS8 PrivateKeyInfo, as specified in <a href="https://tools.ietf.org/html/rfc5958">RFC
|
|
37
|
+
* 5958</a>.</p>
|
|
38
|
+
*
|
|
33
39
|
* <p>You can use the optional encryption context to add additional security to the encryption
|
|
34
40
|
* operation. If you specify an <code>EncryptionContext</code>, you must specify the same
|
|
35
41
|
* encryption context (a case-sensitive exact match) when decrypting the encrypted data key.
|
|
36
42
|
* Otherwise, the request to decrypt fails with an <code>InvalidCiphertextException</code>. For more information, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#encrypt_context">Encryption Context</a> in the
|
|
37
|
-
* <i>
|
|
38
|
-
* <p>The
|
|
39
|
-
* details, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-state.html">Key state: Effect on your
|
|
43
|
+
* <i>Key Management Service Developer Guide</i>.</p>
|
|
44
|
+
* <p>The KMS key that you use for this operation must be in a compatible key state. For
|
|
45
|
+
* details, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-state.html">Key state: Effect on your KMS key</a> in the <i>Key Management Service Developer Guide</i>.</p>
|
|
40
46
|
* <p>
|
|
41
|
-
* <b>Cross-account use</b>: Yes. To perform this operation with a
|
|
47
|
+
* <b>Cross-account use</b>: Yes. To perform this operation with a KMS key in a different Amazon Web Services account, specify
|
|
42
48
|
* the key ARN or alias ARN in the value of the <code>KeyId</code> parameter.</p>
|
|
43
49
|
*
|
|
44
50
|
* <p>
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"GenerateDataKeyPairCommand.js","sourceRoot":"","sources":["../../../commands/GenerateDataKeyPairCommand.ts"],"names":[],"mappings":";AACA,OAAO,EAAE,0BAA0B,EAAE,2BAA2B,EAAE,MAAM,oBAAoB,CAAC;AAC7F,OAAO,EACL,gDAAgD,EAChD,8CAA8C,GAC/C,MAAM,0BAA0B,CAAC;AAClC,OAAO,EAAE,cAAc,EAAE,MAAM,2BAA2B,CAAC;AAE3D,OAAO,EAAE,OAAO,IAAI,QAAQ,EAAE,MAAM,wBAAwB,CAAC;AAc7D
|
|
1
|
+
{"version":3,"file":"GenerateDataKeyPairCommand.js","sourceRoot":"","sources":["../../../commands/GenerateDataKeyPairCommand.ts"],"names":[],"mappings":";AACA,OAAO,EAAE,0BAA0B,EAAE,2BAA2B,EAAE,MAAM,oBAAoB,CAAC;AAC7F,OAAO,EACL,gDAAgD,EAChD,8CAA8C,GAC/C,MAAM,0BAA0B,CAAC;AAClC,OAAO,EAAE,cAAc,EAAE,MAAM,2BAA2B,CAAC;AAE3D,OAAO,EAAE,OAAO,IAAI,QAAQ,EAAE,MAAM,wBAAwB,CAAC;AAc7D;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA0FG;AACH;IAAgD,8CAI/C;IACC,oCAAoC;IACpC,kCAAkC;IAElC,oCAAqB,KAAsC;QAA3D;QACE,qCAAqC;QACrC,iBAAO,SAER;QAJoB,WAAK,GAAL,KAAK,CAAiC;;QAGzD,mCAAmC;IACrC,CAAC;IAED;;OAEG;IACH,sDAAiB,GAAjB,UACE,WAAmE,EACnE,aAAsC,EACtC,OAA8B;QAE9B,IAAI,CAAC,eAAe,CAAC,GAAG,CAAC,cAAc,CAAC,aAAa,EAAE,IAAI,CAAC,SAAS,EAAE,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC;QAE1F,IAAM,KAAK,GAAG,WAAW,CAAC,MAAM,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC;QAE/C,IAAA,MAAM,GAAK,aAAa,OAAlB,CAAmB;QACjC,IAAM,UAAU,GAAG,WAAW,CAAC;QAC/B,IAAM,WAAW,GAAG,4BAA4B,CAAC;QACjD,IAAM,uBAAuB,GAA4B;YACvD,MAAM,QAAA;YACN,UAAU,YAAA;YACV,WAAW,aAAA;YACX,uBAAuB,EAAE,0BAA0B,CAAC,kBAAkB;YACtE,wBAAwB,EAAE,2BAA2B,CAAC,kBAAkB;SACzE,CAAC;QACM,IAAA,cAAc,GAAK,aAAa,eAAlB,CAAmB;QACzC,OAAO,KAAK,CAAC,OAAO,CAClB,UAAC,OAAsC;YACrC,OAAA,cAAc,CAAC,MAAM,CAAC,OAAO,CAAC,OAAwB,EAAE,OAAO,IAAI,EAAE,CAAC;QAAtE,CAAsE,EACxE,uBAAuB,CACxB,CAAC;IACJ,CAAC;IAEO,8CAAS,GAAjB,UAAkB,KAAsC,EAAE,OAAuB;QAC/E,OAAO,8CAA8C,CAAC,KAAK,EAAE,OAAO,CAAC,CAAC;IACxE,CAAC;IAEO,gDAAW,GAAnB,UAAoB,MAAsB,EAAE,OAAuB;QACjE,OAAO,gDAAgD,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;IAC3E,CAAC;IAIH,iCAAC;AAAD,CAAC,AAtDD,CAAgD,QAAQ,GAsDvD"}
|
|
@@ -6,30 +6,34 @@ import { Command as $Command } from "@aws-sdk/smithy-client";
|
|
|
6
6
|
/**
|
|
7
7
|
* <p>Generates a unique asymmetric data key pair. The
|
|
8
8
|
* <code>GenerateDataKeyPairWithoutPlaintext</code> operation returns a plaintext public key
|
|
9
|
-
* and a copy of the private key that is encrypted under the symmetric
|
|
9
|
+
* and a copy of the private key that is encrypted under the symmetric KMS key you specify. Unlike
|
|
10
10
|
* <a>GenerateDataKeyPair</a>, this operation does not return a plaintext private
|
|
11
11
|
* key. </p>
|
|
12
|
-
* <p>To generate a data key pair, you must specify a symmetric customer master key (CMK) to
|
|
13
|
-
* encrypt the private key in the data key pair. You cannot use an asymmetric CMK or a CMK in a
|
|
14
|
-
* custom key store. To get the type and origin of your CMK, use the <code>KeySpec</code> field
|
|
15
|
-
* in the <a>DescribeKey</a> response.</p>
|
|
16
12
|
* <p>You can use the public key that <code>GenerateDataKeyPairWithoutPlaintext</code> returns
|
|
17
|
-
* to encrypt data or verify a signature outside of
|
|
13
|
+
* to encrypt data or verify a signature outside of KMS. Then, store the encrypted private key
|
|
18
14
|
* with the data. When you are ready to decrypt data or sign a message, you can use the <a>Decrypt</a> operation to decrypt the encrypted private key.</p>
|
|
15
|
+
* <p>To generate a data key pair, you must specify a symmetric KMS key to
|
|
16
|
+
* encrypt the private key in a data key pair. You cannot use an asymmetric KMS key or a KMS key in a
|
|
17
|
+
* custom key store. To get the type and origin of your KMS key, use the <a>DescribeKey</a> operation. </p>
|
|
18
|
+
* <p>Use the <code>KeyPairSpec</code> parameter to choose an RSA or Elliptic Curve (ECC) data
|
|
19
|
+
* key pair. KMS recommends that your use ECC key pairs for signing, and use RSA key pairs
|
|
20
|
+
* for either encryption or signing, but not both. However, KMS cannot enforce any restrictions
|
|
21
|
+
* on the use of data key pairs outside of KMS.</p>
|
|
19
22
|
* <p>
|
|
20
23
|
* <code>GenerateDataKeyPairWithoutPlaintext</code> returns a unique data key pair for each
|
|
21
|
-
* request. The bytes in the key are not related to the caller or
|
|
22
|
-
* private key
|
|
24
|
+
* request. The bytes in the key are not related to the caller or KMS key that is used to encrypt the
|
|
25
|
+
* private key. The public key is a DER-encoded X.509 SubjectPublicKeyInfo, as specified in
|
|
26
|
+
* <a href="https://tools.ietf.org/html/rfc5280">RFC 5280</a>.</p>
|
|
23
27
|
*
|
|
24
28
|
* <p>You can use the optional encryption context to add additional security to the encryption
|
|
25
29
|
* operation. If you specify an <code>EncryptionContext</code>, you must specify the same
|
|
26
30
|
* encryption context (a case-sensitive exact match) when decrypting the encrypted data key.
|
|
27
31
|
* Otherwise, the request to decrypt fails with an <code>InvalidCiphertextException</code>. For more information, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#encrypt_context">Encryption Context</a> in the
|
|
28
|
-
* <i>
|
|
29
|
-
* <p>The
|
|
30
|
-
* details, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-state.html">Key state: Effect on your
|
|
32
|
+
* <i>Key Management Service Developer Guide</i>.</p>
|
|
33
|
+
* <p>The KMS key that you use for this operation must be in a compatible key state. For
|
|
34
|
+
* details, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-state.html">Key state: Effect on your KMS key</a> in the <i>Key Management Service Developer Guide</i>.</p>
|
|
31
35
|
* <p>
|
|
32
|
-
* <b>Cross-account use</b>: Yes. To perform this operation with a
|
|
36
|
+
* <b>Cross-account use</b>: Yes. To perform this operation with a KMS key in a different Amazon Web Services account, specify
|
|
33
37
|
* the key ARN or alias ARN in the value of the <code>KeyId</code> parameter.</p>
|
|
34
38
|
*
|
|
35
39
|
* <p>
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"GenerateDataKeyPairWithoutPlaintextCommand.js","sourceRoot":"","sources":["../../../commands/GenerateDataKeyPairWithoutPlaintextCommand.ts"],"names":[],"mappings":";AACA,OAAO,EACL,0CAA0C,EAC1C,2CAA2C,GAC5C,MAAM,oBAAoB,CAAC;AAC5B,OAAO,EACL,gEAAgE,EAChE,8DAA8D,GAC/D,MAAM,0BAA0B,CAAC;AAClC,OAAO,EAAE,cAAc,EAAE,MAAM,2BAA2B,CAAC;AAE3D,OAAO,EAAE,OAAO,IAAI,QAAQ,EAAE,MAAM,wBAAwB,CAAC;AAgB7D
|
|
1
|
+
{"version":3,"file":"GenerateDataKeyPairWithoutPlaintextCommand.js","sourceRoot":"","sources":["../../../commands/GenerateDataKeyPairWithoutPlaintextCommand.ts"],"names":[],"mappings":";AACA,OAAO,EACL,0CAA0C,EAC1C,2CAA2C,GAC5C,MAAM,oBAAoB,CAAC;AAC5B,OAAO,EACL,gEAAgE,EAChE,8DAA8D,GAC/D,MAAM,0BAA0B,CAAC;AAClC,OAAO,EAAE,cAAc,EAAE,MAAM,2BAA2B,CAAC;AAE3D,OAAO,EAAE,OAAO,IAAI,QAAQ,EAAE,MAAM,wBAAwB,CAAC;AAgB7D;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA+EG;AACH;IAAgE,8DAI/D;IACC,oCAAoC;IACpC,kCAAkC;IAElC,oDAAqB,KAAsD;QAA3E;QACE,qCAAqC;QACrC,iBAAO,SAER;QAJoB,WAAK,GAAL,KAAK,CAAiD;;QAGzE,mCAAmC;IACrC,CAAC;IAED;;OAEG;IACH,sEAAiB,GAAjB,UACE,WAAmE,EACnE,aAAsC,EACtC,OAA8B;QAE9B,IAAI,CAAC,eAAe,CAAC,GAAG,CAAC,cAAc,CAAC,aAAa,EAAE,IAAI,CAAC,SAAS,EAAE,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC;QAE1F,IAAM,KAAK,GAAG,WAAW,CAAC,MAAM,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC;QAE/C,IAAA,MAAM,GAAK,aAAa,OAAlB,CAAmB;QACjC,IAAM,UAAU,GAAG,WAAW,CAAC;QAC/B,IAAM,WAAW,GAAG,4CAA4C,CAAC;QACjE,IAAM,uBAAuB,GAA4B;YACvD,MAAM,QAAA;YACN,UAAU,YAAA;YACV,WAAW,aAAA;YACX,uBAAuB,EAAE,0CAA0C,CAAC,kBAAkB;YACtF,wBAAwB,EAAE,2CAA2C,CAAC,kBAAkB;SACzF,CAAC;QACM,IAAA,cAAc,GAAK,aAAa,eAAlB,CAAmB;QACzC,OAAO,KAAK,CAAC,OAAO,CAClB,UAAC,OAAsC;YACrC,OAAA,cAAc,CAAC,MAAM,CAAC,OAAO,CAAC,OAAwB,EAAE,OAAO,IAAI,EAAE,CAAC;QAAtE,CAAsE,EACxE,uBAAuB,CACxB,CAAC;IACJ,CAAC;IAEO,8DAAS,GAAjB,UACE,KAAsD,EACtD,OAAuB;QAEvB,OAAO,8DAA8D,CAAC,KAAK,EAAE,OAAO,CAAC,CAAC;IACxF,CAAC;IAEO,gEAAW,GAAnB,UACE,MAAsB,EACtB,OAAuB;QAEvB,OAAO,gEAAgE,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;IAC3F,CAAC;IAIH,iDAAC;AAAD,CAAC,AA5DD,CAAgE,QAAQ,GA4DvE"}
|
|
@@ -5,7 +5,7 @@ import { getSerdePlugin } from "@aws-sdk/middleware-serde";
|
|
|
5
5
|
import { Command as $Command } from "@aws-sdk/smithy-client";
|
|
6
6
|
/**
|
|
7
7
|
* <p>Generates a unique symmetric data key. This operation returns a data key that is encrypted
|
|
8
|
-
* under a
|
|
8
|
+
* under a KMS key that you specify. To request an asymmetric data key pair,
|
|
9
9
|
* use the <a>GenerateDataKeyPair</a> or <a>GenerateDataKeyPairWithoutPlaintext</a> operations.</p>
|
|
10
10
|
* <p>
|
|
11
11
|
* <code>GenerateDataKeyWithoutPlaintext</code> is identical to the <a>GenerateDataKey</a> operation except that returns only the encrypted copy of the
|
|
@@ -21,12 +21,12 @@ import { Command as $Command } from "@aws-sdk/smithy-client";
|
|
|
21
21
|
* plaintext data key.</p>
|
|
22
22
|
* <p>
|
|
23
23
|
* <code>GenerateDataKeyWithoutPlaintext</code> returns a unique data key for each request.
|
|
24
|
-
* The bytes in the keys are not related to the caller or
|
|
24
|
+
* The bytes in the keys are not related to the caller or KMS key that is used to encrypt the private
|
|
25
25
|
* key.</p>
|
|
26
26
|
*
|
|
27
|
-
* <p>To generate a data key, you must specify the symmetric
|
|
28
|
-
* used to encrypt the data key. You cannot use an asymmetric
|
|
29
|
-
* the type of your
|
|
27
|
+
* <p>To generate a data key, you must specify the symmetric KMS key that is
|
|
28
|
+
* used to encrypt the data key. You cannot use an asymmetric KMS key to generate a data key. To get
|
|
29
|
+
* the type of your KMS key, use the <a>DescribeKey</a> operation.</p>
|
|
30
30
|
*
|
|
31
31
|
* <p>If the operation succeeds, you will find the encrypted copy of the data key in the
|
|
32
32
|
* <code>CiphertextBlob</code> field.</p>
|
|
@@ -35,11 +35,11 @@ import { Command as $Command } from "@aws-sdk/smithy-client";
|
|
|
35
35
|
* operation. If you specify an <code>EncryptionContext</code>, you must specify the same
|
|
36
36
|
* encryption context (a case-sensitive exact match) when decrypting the encrypted data key.
|
|
37
37
|
* Otherwise, the request to decrypt fails with an <code>InvalidCiphertextException</code>. For more information, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#encrypt_context">Encryption Context</a> in the
|
|
38
|
-
* <i>
|
|
39
|
-
* <p>The
|
|
40
|
-
* details, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-state.html">Key state: Effect on your
|
|
38
|
+
* <i>Key Management Service Developer Guide</i>.</p>
|
|
39
|
+
* <p>The KMS key that you use for this operation must be in a compatible key state. For
|
|
40
|
+
* details, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-state.html">Key state: Effect on your KMS key</a> in the <i>Key Management Service Developer Guide</i>.</p>
|
|
41
41
|
* <p>
|
|
42
|
-
* <b>Cross-account use</b>: Yes. To perform this operation with a
|
|
42
|
+
* <b>Cross-account use</b>: Yes. To perform this operation with a KMS key in a different Amazon Web Services account, specify
|
|
43
43
|
* the key ARN or alias ARN in the value of the <code>KeyId</code> parameter.</p>
|
|
44
44
|
*
|
|
45
45
|
* <p>
|
|
@@ -5,10 +5,11 @@ import { getSerdePlugin } from "@aws-sdk/middleware-serde";
|
|
|
5
5
|
import { Command as $Command } from "@aws-sdk/smithy-client";
|
|
6
6
|
/**
|
|
7
7
|
* <p>Returns a random byte string that is cryptographically secure.</p>
|
|
8
|
-
* <p>By default, the random byte string is generated in
|
|
9
|
-
* the
|
|
8
|
+
* <p>By default, the random byte string is generated in KMS. To generate the byte string in
|
|
9
|
+
* the CloudHSM cluster that is associated with a <a href="https://docs.aws.amazon.com/kms/latest/developerguide/custom-key-store-overview.html">custom key store</a>, specify the custom key store
|
|
10
10
|
* ID.</p>
|
|
11
|
-
* <p>For
|
|
11
|
+
* <p>Applications in Amazon Web Services Nitro Enclaves can call this operation by using the <a href="https://github.com/aws/aws-nitro-enclaves-sdk-c">Amazon Web Services Nitro Enclaves Development Kit</a>. For information about the supporting parameters, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/services-nitro-enclaves.html">How Amazon Web Services Nitro Enclaves use KMS</a> in the <i>Key Management Service Developer Guide</i>.</p>
|
|
12
|
+
* <p>For more information about entropy and random number generation, see <a href="https://docs.aws.amazon.com/kms/latest/cryptographic-details/">Key Management Service Cryptographic Details</a>.</p>
|
|
12
13
|
*
|
|
13
14
|
* <p>
|
|
14
15
|
* <b>Required permissions</b>: <a href="https://docs.aws.amazon.com/kms/latest/developerguide/kms-api-permissions-reference.html">kms:GenerateRandom</a> (IAM policy)</p>
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"GenerateRandomCommand.js","sourceRoot":"","sources":["../../../commands/GenerateRandomCommand.ts"],"names":[],"mappings":";AACA,OAAO,EAAE,qBAAqB,EAAE,sBAAsB,EAAE,MAAM,oBAAoB,CAAC;AACnF,OAAO,EACL,2CAA2C,EAC3C,yCAAyC,GAC1C,MAAM,0BAA0B,CAAC;AAClC,OAAO,EAAE,cAAc,EAAE,MAAM,2BAA2B,CAAC;AAE3D,OAAO,EAAE,OAAO,IAAI,QAAQ,EAAE,MAAM,wBAAwB,CAAC;AAc7D
|
|
1
|
+
{"version":3,"file":"GenerateRandomCommand.js","sourceRoot":"","sources":["../../../commands/GenerateRandomCommand.ts"],"names":[],"mappings":";AACA,OAAO,EAAE,qBAAqB,EAAE,sBAAsB,EAAE,MAAM,oBAAoB,CAAC;AACnF,OAAO,EACL,2CAA2C,EAC3C,yCAAyC,GAC1C,MAAM,0BAA0B,CAAC;AAClC,OAAO,EAAE,cAAc,EAAE,MAAM,2BAA2B,CAAC;AAE3D,OAAO,EAAE,OAAO,IAAI,QAAQ,EAAE,MAAM,wBAAwB,CAAC;AAc7D;;;;;;;;;;;;;;;;;;;;;;;;GAwBG;AACH;IAA2C,yCAI1C;IACC,oCAAoC;IACpC,kCAAkC;IAElC,+BAAqB,KAAiC;QAAtD;QACE,qCAAqC;QACrC,iBAAO,SAER;QAJoB,WAAK,GAAL,KAAK,CAA4B;;QAGpD,mCAAmC;IACrC,CAAC;IAED;;OAEG;IACH,iDAAiB,GAAjB,UACE,WAAmE,EACnE,aAAsC,EACtC,OAA8B;QAE9B,IAAI,CAAC,eAAe,CAAC,GAAG,CAAC,cAAc,CAAC,aAAa,EAAE,IAAI,CAAC,SAAS,EAAE,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC;QAE1F,IAAM,KAAK,GAAG,WAAW,CAAC,MAAM,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC;QAE/C,IAAA,MAAM,GAAK,aAAa,OAAlB,CAAmB;QACjC,IAAM,UAAU,GAAG,WAAW,CAAC;QAC/B,IAAM,WAAW,GAAG,uBAAuB,CAAC;QAC5C,IAAM,uBAAuB,GAA4B;YACvD,MAAM,QAAA;YACN,UAAU,YAAA;YACV,WAAW,aAAA;YACX,uBAAuB,EAAE,qBAAqB,CAAC,kBAAkB;YACjE,wBAAwB,EAAE,sBAAsB,CAAC,kBAAkB;SACpE,CAAC;QACM,IAAA,cAAc,GAAK,aAAa,eAAlB,CAAmB;QACzC,OAAO,KAAK,CAAC,OAAO,CAClB,UAAC,OAAsC;YACrC,OAAA,cAAc,CAAC,MAAM,CAAC,OAAO,CAAC,OAAwB,EAAE,OAAO,IAAI,EAAE,CAAC;QAAtE,CAAsE,EACxE,uBAAuB,CACxB,CAAC;IACJ,CAAC;IAEO,yCAAS,GAAjB,UAAkB,KAAiC,EAAE,OAAuB;QAC1E,OAAO,yCAAyC,CAAC,KAAK,EAAE,OAAO,CAAC,CAAC;IACnE,CAAC;IAEO,2CAAW,GAAnB,UAAoB,MAAsB,EAAE,OAAuB;QACjE,OAAO,2CAA2C,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;IACtE,CAAC;IAIH,4BAAC;AAAD,CAAC,AAtDD,CAA2C,QAAQ,GAsDlD"}
|
|
@@ -4,9 +4,9 @@ import { deserializeAws_json1_1GetKeyPolicyCommand, serializeAws_json1_1GetKeyPo
|
|
|
4
4
|
import { getSerdePlugin } from "@aws-sdk/middleware-serde";
|
|
5
5
|
import { Command as $Command } from "@aws-sdk/smithy-client";
|
|
6
6
|
/**
|
|
7
|
-
* <p>Gets a key policy attached to the specified
|
|
7
|
+
* <p>Gets a key policy attached to the specified KMS key.</p>
|
|
8
8
|
* <p>
|
|
9
|
-
* <b>Cross-account use</b>: No. You cannot perform this operation on a
|
|
9
|
+
* <b>Cross-account use</b>: No. You cannot perform this operation on a KMS key in a different Amazon Web Services account.</p>
|
|
10
10
|
*
|
|
11
11
|
* <p>
|
|
12
12
|
* <b>Required permissions</b>: <a href="https://docs.aws.amazon.com/kms/latest/developerguide/kms-api-permissions-reference.html">kms:GetKeyPolicy</a> (key policy)</p>
|
|
@@ -5,23 +5,23 @@ import { getSerdePlugin } from "@aws-sdk/middleware-serde";
|
|
|
5
5
|
import { Command as $Command } from "@aws-sdk/smithy-client";
|
|
6
6
|
/**
|
|
7
7
|
* <p>Gets a Boolean value that indicates whether <a href="https://docs.aws.amazon.com/kms/latest/developerguide/rotate-keys.html">automatic rotation of the key material</a> is
|
|
8
|
-
* enabled for the specified
|
|
9
|
-
* <p>You cannot enable automatic rotation of <a href="https://docs.aws.amazon.com/kms/latest/developerguide/symm-asymm-concepts.html#asymmetric-cmks">asymmetric
|
|
10
|
-
* <p>The
|
|
11
|
-
* details, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-state.html">Key state: Effect on your
|
|
8
|
+
* enabled for the specified KMS key.</p>
|
|
9
|
+
* <p>You cannot enable automatic rotation of <a href="https://docs.aws.amazon.com/kms/latest/developerguide/symm-asymm-concepts.html#asymmetric-cmks">asymmetric KMS keys</a>, KMS keys with <a href="https://docs.aws.amazon.com/kms/latest/developerguide/importing-keys.html">imported key material</a>, or KMS keys in a <a href="https://docs.aws.amazon.com/kms/latest/developerguide/custom-key-store-overview.html">custom key store</a>. To enable or disable automatic rotation of a set of related <a href="https://docs.aws.amazon.com/kms/latest/developerguide/multi-region-keys-overview.html#mrk-replica-key">multi-Region keys</a>, set the property on the primary key. The key rotation status for these KMS keys is always <code>false</code>.</p>
|
|
10
|
+
* <p>The KMS key that you use for this operation must be in a compatible key state. For
|
|
11
|
+
* details, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-state.html">Key state: Effect on your KMS key</a> in the <i>Key Management Service Developer Guide</i>.</p>
|
|
12
12
|
* <ul>
|
|
13
13
|
* <li>
|
|
14
|
-
* <p>Disabled: The key rotation status does not change when you disable a
|
|
15
|
-
* while the
|
|
14
|
+
* <p>Disabled: The key rotation status does not change when you disable a KMS key. However,
|
|
15
|
+
* while the KMS key is disabled, KMS does not rotate the key material.</p>
|
|
16
16
|
* </li>
|
|
17
17
|
* <li>
|
|
18
|
-
* <p>Pending deletion: While a
|
|
19
|
-
* <code>false</code> and
|
|
18
|
+
* <p>Pending deletion: While a KMS key is pending deletion, its key rotation status is
|
|
19
|
+
* <code>false</code> and KMS does not rotate the key material. If you cancel the
|
|
20
20
|
* deletion, the original key rotation status is restored.</p>
|
|
21
21
|
* </li>
|
|
22
22
|
* </ul>
|
|
23
23
|
* <p>
|
|
24
|
-
* <b>Cross-account use</b>: Yes. To perform this operation on a
|
|
24
|
+
* <b>Cross-account use</b>: Yes. To perform this operation on a KMS key in a different Amazon Web Services account, specify the key
|
|
25
25
|
* ARN in the value of the <code>KeyId</code> parameter.</p>
|
|
26
26
|
*
|
|
27
27
|
* <p>
|