@aws-sdk/client-kms 3.28.0 → 3.32.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (313) hide show
  1. package/CHANGELOG.md +35 -0
  2. package/KMS.ts +567 -572
  3. package/KMSClient.ts +18 -18
  4. package/README.md +18 -18
  5. package/commands/CancelKeyDeletionCommand.ts +6 -7
  6. package/commands/ConnectCustomKeyStoreCommand.ts +9 -9
  7. package/commands/CreateAliasCommand.ts +13 -14
  8. package/commands/CreateCustomKeyStoreCommand.ts +8 -8
  9. package/commands/CreateGrantCommand.ts +15 -22
  10. package/commands/CreateKeyCommand.ts +44 -44
  11. package/commands/DecryptCommand.ts +23 -22
  12. package/commands/DeleteAliasCommand.ts +7 -8
  13. package/commands/DeleteCustomKeyStoreCommand.ts +13 -13
  14. package/commands/DeleteImportedKeyMaterialCommand.ts +9 -9
  15. package/commands/DescribeCustomKeyStoresCommand.ts +6 -6
  16. package/commands/DescribeKeyCommand.ts +18 -19
  17. package/commands/DisableKeyCommand.ts +7 -7
  18. package/commands/DisableKeyRotationCommand.ts +5 -6
  19. package/commands/DisconnectCustomKeyStoreCommand.ts +6 -8
  20. package/commands/EnableKeyCommand.ts +4 -5
  21. package/commands/EnableKeyRotationCommand.ts +5 -5
  22. package/commands/EncryptCommand.ts +20 -21
  23. package/commands/GenerateDataKeyCommand.ts +17 -18
  24. package/commands/GenerateDataKeyPairCommand.ts +21 -15
  25. package/commands/GenerateDataKeyPairWithoutPlaintextCommand.ts +16 -12
  26. package/commands/GenerateDataKeyWithoutPlaintextCommand.ts +9 -9
  27. package/commands/GenerateRandomCommand.ts +4 -3
  28. package/commands/GetKeyPolicyCommand.ts +2 -2
  29. package/commands/GetKeyRotationStatusCommand.ts +9 -9
  30. package/commands/GetParametersForImportCommand.ts +8 -8
  31. package/commands/GetPublicKeyCommand.ts +15 -15
  32. package/commands/ImportKeyMaterialCommand.ts +18 -18
  33. package/commands/ListAliasesCommand.ts +8 -10
  34. package/commands/ListGrantsCommand.ts +9 -4
  35. package/commands/ListKeyPoliciesCommand.ts +2 -2
  36. package/commands/ListKeysCommand.ts +2 -2
  37. package/commands/ListResourceTagsCommand.ts +4 -4
  38. package/commands/ListRetirableGrantsCommand.ts +14 -14
  39. package/commands/PutKeyPolicyCommand.ts +5 -5
  40. package/commands/ReEncryptCommand.ts +30 -34
  41. package/commands/ReplicateKeyCommand.ts +16 -16
  42. package/commands/RetireGrantCommand.ts +9 -9
  43. package/commands/RevokeGrantCommand.ts +9 -4
  44. package/commands/ScheduleKeyDeletionCommand.ts +17 -17
  45. package/commands/SignCommand.ts +12 -13
  46. package/commands/TagResourceCommand.ts +10 -12
  47. package/commands/UntagResourceCommand.ts +9 -10
  48. package/commands/UpdateAliasCommand.ts +15 -15
  49. package/commands/UpdateCustomKeyStoreCommand.ts +9 -9
  50. package/commands/UpdateKeyDescriptionCommand.ts +4 -4
  51. package/commands/UpdatePrimaryRegionCommand.ts +13 -13
  52. package/commands/VerifyCommand.ts +14 -14
  53. package/dist/cjs/KMS.js +18 -18
  54. package/dist/cjs/KMS.js.map +1 -1
  55. package/dist/cjs/KMSClient.js +18 -18
  56. package/dist/cjs/commands/CancelKeyDeletionCommand.js +6 -7
  57. package/dist/cjs/commands/CancelKeyDeletionCommand.js.map +1 -1
  58. package/dist/cjs/commands/ConnectCustomKeyStoreCommand.js +9 -9
  59. package/dist/cjs/commands/CreateAliasCommand.js +13 -14
  60. package/dist/cjs/commands/CreateAliasCommand.js.map +1 -1
  61. package/dist/cjs/commands/CreateCustomKeyStoreCommand.js +8 -8
  62. package/dist/cjs/commands/CreateGrantCommand.js +15 -22
  63. package/dist/cjs/commands/CreateGrantCommand.js.map +1 -1
  64. package/dist/cjs/commands/CreateKeyCommand.js +44 -44
  65. package/dist/cjs/commands/DecryptCommand.js +23 -22
  66. package/dist/cjs/commands/DecryptCommand.js.map +1 -1
  67. package/dist/cjs/commands/DeleteAliasCommand.js +7 -8
  68. package/dist/cjs/commands/DeleteAliasCommand.js.map +1 -1
  69. package/dist/cjs/commands/DeleteCustomKeyStoreCommand.js +13 -13
  70. package/dist/cjs/commands/DeleteImportedKeyMaterialCommand.js +9 -9
  71. package/dist/cjs/commands/DescribeCustomKeyStoresCommand.js +6 -6
  72. package/dist/cjs/commands/DescribeKeyCommand.js +18 -19
  73. package/dist/cjs/commands/DescribeKeyCommand.js.map +1 -1
  74. package/dist/cjs/commands/DisableKeyCommand.js +7 -7
  75. package/dist/cjs/commands/DisableKeyRotationCommand.js +5 -6
  76. package/dist/cjs/commands/DisableKeyRotationCommand.js.map +1 -1
  77. package/dist/cjs/commands/DisconnectCustomKeyStoreCommand.js +6 -8
  78. package/dist/cjs/commands/DisconnectCustomKeyStoreCommand.js.map +1 -1
  79. package/dist/cjs/commands/EnableKeyCommand.js +4 -5
  80. package/dist/cjs/commands/EnableKeyCommand.js.map +1 -1
  81. package/dist/cjs/commands/EnableKeyRotationCommand.js +5 -5
  82. package/dist/cjs/commands/EncryptCommand.js +20 -21
  83. package/dist/cjs/commands/EncryptCommand.js.map +1 -1
  84. package/dist/cjs/commands/GenerateDataKeyCommand.js +17 -18
  85. package/dist/cjs/commands/GenerateDataKeyCommand.js.map +1 -1
  86. package/dist/cjs/commands/GenerateDataKeyPairCommand.js +21 -15
  87. package/dist/cjs/commands/GenerateDataKeyPairCommand.js.map +1 -1
  88. package/dist/cjs/commands/GenerateDataKeyPairWithoutPlaintextCommand.js +16 -12
  89. package/dist/cjs/commands/GenerateDataKeyPairWithoutPlaintextCommand.js.map +1 -1
  90. package/dist/cjs/commands/GenerateDataKeyWithoutPlaintextCommand.js +9 -9
  91. package/dist/cjs/commands/GenerateRandomCommand.js +4 -3
  92. package/dist/cjs/commands/GenerateRandomCommand.js.map +1 -1
  93. package/dist/cjs/commands/GetKeyPolicyCommand.js +2 -2
  94. package/dist/cjs/commands/GetKeyRotationStatusCommand.js +9 -9
  95. package/dist/cjs/commands/GetParametersForImportCommand.js +8 -8
  96. package/dist/cjs/commands/GetPublicKeyCommand.js +15 -15
  97. package/dist/cjs/commands/ImportKeyMaterialCommand.js +18 -18
  98. package/dist/cjs/commands/ListAliasesCommand.js +8 -10
  99. package/dist/cjs/commands/ListAliasesCommand.js.map +1 -1
  100. package/dist/cjs/commands/ListGrantsCommand.js +9 -4
  101. package/dist/cjs/commands/ListGrantsCommand.js.map +1 -1
  102. package/dist/cjs/commands/ListKeyPoliciesCommand.js +2 -2
  103. package/dist/cjs/commands/ListKeysCommand.js +2 -2
  104. package/dist/cjs/commands/ListResourceTagsCommand.js +4 -4
  105. package/dist/cjs/commands/ListRetirableGrantsCommand.js +14 -14
  106. package/dist/cjs/commands/PutKeyPolicyCommand.js +5 -5
  107. package/dist/cjs/commands/ReEncryptCommand.js +30 -34
  108. package/dist/cjs/commands/ReEncryptCommand.js.map +1 -1
  109. package/dist/cjs/commands/ReplicateKeyCommand.js +16 -16
  110. package/dist/cjs/commands/RetireGrantCommand.js +9 -9
  111. package/dist/cjs/commands/RevokeGrantCommand.js +9 -4
  112. package/dist/cjs/commands/RevokeGrantCommand.js.map +1 -1
  113. package/dist/cjs/commands/ScheduleKeyDeletionCommand.js +17 -17
  114. package/dist/cjs/commands/SignCommand.js +12 -13
  115. package/dist/cjs/commands/SignCommand.js.map +1 -1
  116. package/dist/cjs/commands/TagResourceCommand.js +10 -12
  117. package/dist/cjs/commands/TagResourceCommand.js.map +1 -1
  118. package/dist/cjs/commands/UntagResourceCommand.js +9 -10
  119. package/dist/cjs/commands/UntagResourceCommand.js.map +1 -1
  120. package/dist/cjs/commands/UpdateAliasCommand.js +15 -15
  121. package/dist/cjs/commands/UpdateCustomKeyStoreCommand.js +9 -9
  122. package/dist/cjs/commands/UpdateKeyDescriptionCommand.js +4 -4
  123. package/dist/cjs/commands/UpdatePrimaryRegionCommand.js +13 -13
  124. package/dist/cjs/commands/VerifyCommand.js +14 -14
  125. package/dist/cjs/models/models_0.js +14 -3
  126. package/dist/cjs/models/models_0.js.map +1 -1
  127. package/dist/cjs/package.json +31 -31
  128. package/dist/cjs/protocols/Aws_json1_1.js +16 -11
  129. package/dist/cjs/protocols/Aws_json1_1.js.map +1 -1
  130. package/dist/es/KMS.js +18 -18
  131. package/dist/es/KMS.js.map +1 -1
  132. package/dist/es/KMSClient.js +18 -18
  133. package/dist/es/commands/CancelKeyDeletionCommand.js +6 -7
  134. package/dist/es/commands/CancelKeyDeletionCommand.js.map +1 -1
  135. package/dist/es/commands/ConnectCustomKeyStoreCommand.js +9 -9
  136. package/dist/es/commands/CreateAliasCommand.js +13 -14
  137. package/dist/es/commands/CreateAliasCommand.js.map +1 -1
  138. package/dist/es/commands/CreateCustomKeyStoreCommand.js +8 -8
  139. package/dist/es/commands/CreateGrantCommand.js +15 -22
  140. package/dist/es/commands/CreateGrantCommand.js.map +1 -1
  141. package/dist/es/commands/CreateKeyCommand.js +44 -44
  142. package/dist/es/commands/DecryptCommand.js +23 -22
  143. package/dist/es/commands/DecryptCommand.js.map +1 -1
  144. package/dist/es/commands/DeleteAliasCommand.js +7 -8
  145. package/dist/es/commands/DeleteAliasCommand.js.map +1 -1
  146. package/dist/es/commands/DeleteCustomKeyStoreCommand.js +13 -13
  147. package/dist/es/commands/DeleteImportedKeyMaterialCommand.js +9 -9
  148. package/dist/es/commands/DescribeCustomKeyStoresCommand.js +6 -6
  149. package/dist/es/commands/DescribeKeyCommand.js +18 -19
  150. package/dist/es/commands/DescribeKeyCommand.js.map +1 -1
  151. package/dist/es/commands/DisableKeyCommand.js +7 -7
  152. package/dist/es/commands/DisableKeyRotationCommand.js +5 -6
  153. package/dist/es/commands/DisableKeyRotationCommand.js.map +1 -1
  154. package/dist/es/commands/DisconnectCustomKeyStoreCommand.js +6 -8
  155. package/dist/es/commands/DisconnectCustomKeyStoreCommand.js.map +1 -1
  156. package/dist/es/commands/EnableKeyCommand.js +4 -5
  157. package/dist/es/commands/EnableKeyCommand.js.map +1 -1
  158. package/dist/es/commands/EnableKeyRotationCommand.js +5 -5
  159. package/dist/es/commands/EncryptCommand.js +20 -21
  160. package/dist/es/commands/EncryptCommand.js.map +1 -1
  161. package/dist/es/commands/GenerateDataKeyCommand.js +17 -18
  162. package/dist/es/commands/GenerateDataKeyCommand.js.map +1 -1
  163. package/dist/es/commands/GenerateDataKeyPairCommand.js +21 -15
  164. package/dist/es/commands/GenerateDataKeyPairCommand.js.map +1 -1
  165. package/dist/es/commands/GenerateDataKeyPairWithoutPlaintextCommand.js +16 -12
  166. package/dist/es/commands/GenerateDataKeyPairWithoutPlaintextCommand.js.map +1 -1
  167. package/dist/es/commands/GenerateDataKeyWithoutPlaintextCommand.js +9 -9
  168. package/dist/es/commands/GenerateRandomCommand.js +4 -3
  169. package/dist/es/commands/GenerateRandomCommand.js.map +1 -1
  170. package/dist/es/commands/GetKeyPolicyCommand.js +2 -2
  171. package/dist/es/commands/GetKeyRotationStatusCommand.js +9 -9
  172. package/dist/es/commands/GetParametersForImportCommand.js +8 -8
  173. package/dist/es/commands/GetPublicKeyCommand.js +15 -15
  174. package/dist/es/commands/ImportKeyMaterialCommand.js +18 -18
  175. package/dist/es/commands/ListAliasesCommand.js +8 -10
  176. package/dist/es/commands/ListAliasesCommand.js.map +1 -1
  177. package/dist/es/commands/ListGrantsCommand.js +9 -4
  178. package/dist/es/commands/ListGrantsCommand.js.map +1 -1
  179. package/dist/es/commands/ListKeyPoliciesCommand.js +2 -2
  180. package/dist/es/commands/ListKeysCommand.js +2 -2
  181. package/dist/es/commands/ListResourceTagsCommand.js +4 -4
  182. package/dist/es/commands/ListRetirableGrantsCommand.js +14 -14
  183. package/dist/es/commands/PutKeyPolicyCommand.js +5 -5
  184. package/dist/es/commands/ReEncryptCommand.js +30 -34
  185. package/dist/es/commands/ReEncryptCommand.js.map +1 -1
  186. package/dist/es/commands/ReplicateKeyCommand.js +16 -16
  187. package/dist/es/commands/RetireGrantCommand.js +9 -9
  188. package/dist/es/commands/RevokeGrantCommand.js +9 -4
  189. package/dist/es/commands/RevokeGrantCommand.js.map +1 -1
  190. package/dist/es/commands/ScheduleKeyDeletionCommand.js +17 -17
  191. package/dist/es/commands/SignCommand.js +12 -13
  192. package/dist/es/commands/SignCommand.js.map +1 -1
  193. package/dist/es/commands/TagResourceCommand.js +10 -12
  194. package/dist/es/commands/TagResourceCommand.js.map +1 -1
  195. package/dist/es/commands/UntagResourceCommand.js +9 -10
  196. package/dist/es/commands/UntagResourceCommand.js.map +1 -1
  197. package/dist/es/commands/UpdateAliasCommand.js +15 -15
  198. package/dist/es/commands/UpdateCustomKeyStoreCommand.js +9 -9
  199. package/dist/es/commands/UpdateKeyDescriptionCommand.js +4 -4
  200. package/dist/es/commands/UpdatePrimaryRegionCommand.js +13 -13
  201. package/dist/es/commands/VerifyCommand.js +14 -14
  202. package/dist/es/endpoints.js +1 -2
  203. package/dist/es/endpoints.js.map +1 -1
  204. package/dist/es/models/models_0.js +11 -0
  205. package/dist/es/models/models_0.js.map +1 -1
  206. package/dist/es/package.json +31 -31
  207. package/dist/es/protocols/Aws_json1_1.js +18 -14
  208. package/dist/es/protocols/Aws_json1_1.js.map +1 -1
  209. package/dist/types/KMS.d.ts +567 -572
  210. package/dist/types/KMSClient.d.ts +18 -18
  211. package/dist/types/commands/CancelKeyDeletionCommand.d.ts +6 -7
  212. package/dist/types/commands/ConnectCustomKeyStoreCommand.d.ts +9 -9
  213. package/dist/types/commands/CreateAliasCommand.d.ts +13 -14
  214. package/dist/types/commands/CreateCustomKeyStoreCommand.d.ts +8 -8
  215. package/dist/types/commands/CreateGrantCommand.d.ts +15 -22
  216. package/dist/types/commands/CreateKeyCommand.d.ts +44 -44
  217. package/dist/types/commands/DecryptCommand.d.ts +23 -22
  218. package/dist/types/commands/DeleteAliasCommand.d.ts +7 -8
  219. package/dist/types/commands/DeleteCustomKeyStoreCommand.d.ts +13 -13
  220. package/dist/types/commands/DeleteImportedKeyMaterialCommand.d.ts +9 -9
  221. package/dist/types/commands/DescribeCustomKeyStoresCommand.d.ts +6 -6
  222. package/dist/types/commands/DescribeKeyCommand.d.ts +18 -19
  223. package/dist/types/commands/DisableKeyCommand.d.ts +7 -7
  224. package/dist/types/commands/DisableKeyRotationCommand.d.ts +5 -6
  225. package/dist/types/commands/DisconnectCustomKeyStoreCommand.d.ts +6 -8
  226. package/dist/types/commands/EnableKeyCommand.d.ts +4 -5
  227. package/dist/types/commands/EnableKeyRotationCommand.d.ts +5 -5
  228. package/dist/types/commands/EncryptCommand.d.ts +20 -21
  229. package/dist/types/commands/GenerateDataKeyCommand.d.ts +17 -18
  230. package/dist/types/commands/GenerateDataKeyPairCommand.d.ts +21 -15
  231. package/dist/types/commands/GenerateDataKeyPairWithoutPlaintextCommand.d.ts +16 -12
  232. package/dist/types/commands/GenerateDataKeyWithoutPlaintextCommand.d.ts +9 -9
  233. package/dist/types/commands/GenerateRandomCommand.d.ts +4 -3
  234. package/dist/types/commands/GetKeyPolicyCommand.d.ts +2 -2
  235. package/dist/types/commands/GetKeyRotationStatusCommand.d.ts +9 -9
  236. package/dist/types/commands/GetParametersForImportCommand.d.ts +8 -8
  237. package/dist/types/commands/GetPublicKeyCommand.d.ts +15 -15
  238. package/dist/types/commands/ImportKeyMaterialCommand.d.ts +18 -18
  239. package/dist/types/commands/ListAliasesCommand.d.ts +8 -10
  240. package/dist/types/commands/ListGrantsCommand.d.ts +9 -4
  241. package/dist/types/commands/ListKeyPoliciesCommand.d.ts +2 -2
  242. package/dist/types/commands/ListKeysCommand.d.ts +2 -2
  243. package/dist/types/commands/ListResourceTagsCommand.d.ts +4 -4
  244. package/dist/types/commands/ListRetirableGrantsCommand.d.ts +14 -14
  245. package/dist/types/commands/PutKeyPolicyCommand.d.ts +5 -5
  246. package/dist/types/commands/ReEncryptCommand.d.ts +30 -34
  247. package/dist/types/commands/ReplicateKeyCommand.d.ts +16 -16
  248. package/dist/types/commands/RetireGrantCommand.d.ts +9 -9
  249. package/dist/types/commands/RevokeGrantCommand.d.ts +9 -4
  250. package/dist/types/commands/ScheduleKeyDeletionCommand.d.ts +17 -17
  251. package/dist/types/commands/SignCommand.d.ts +12 -13
  252. package/dist/types/commands/TagResourceCommand.d.ts +10 -12
  253. package/dist/types/commands/UntagResourceCommand.d.ts +9 -10
  254. package/dist/types/commands/UpdateAliasCommand.d.ts +15 -15
  255. package/dist/types/commands/UpdateCustomKeyStoreCommand.d.ts +9 -9
  256. package/dist/types/commands/UpdateKeyDescriptionCommand.d.ts +4 -4
  257. package/dist/types/commands/UpdatePrimaryRegionCommand.d.ts +13 -13
  258. package/dist/types/commands/VerifyCommand.d.ts +14 -14
  259. package/dist/types/models/models_0.d.ts +584 -570
  260. package/dist/types/ts3.4/KMS.d.ts +567 -572
  261. package/dist/types/ts3.4/KMSClient.d.ts +18 -18
  262. package/dist/types/ts3.4/commands/CancelKeyDeletionCommand.d.ts +6 -7
  263. package/dist/types/ts3.4/commands/ConnectCustomKeyStoreCommand.d.ts +9 -9
  264. package/dist/types/ts3.4/commands/CreateAliasCommand.d.ts +13 -14
  265. package/dist/types/ts3.4/commands/CreateCustomKeyStoreCommand.d.ts +8 -8
  266. package/dist/types/ts3.4/commands/CreateGrantCommand.d.ts +15 -22
  267. package/dist/types/ts3.4/commands/CreateKeyCommand.d.ts +44 -44
  268. package/dist/types/ts3.4/commands/DecryptCommand.d.ts +23 -22
  269. package/dist/types/ts3.4/commands/DeleteAliasCommand.d.ts +7 -8
  270. package/dist/types/ts3.4/commands/DeleteCustomKeyStoreCommand.d.ts +13 -13
  271. package/dist/types/ts3.4/commands/DeleteImportedKeyMaterialCommand.d.ts +9 -9
  272. package/dist/types/ts3.4/commands/DescribeCustomKeyStoresCommand.d.ts +6 -6
  273. package/dist/types/ts3.4/commands/DescribeKeyCommand.d.ts +18 -19
  274. package/dist/types/ts3.4/commands/DisableKeyCommand.d.ts +7 -7
  275. package/dist/types/ts3.4/commands/DisableKeyRotationCommand.d.ts +5 -6
  276. package/dist/types/ts3.4/commands/DisconnectCustomKeyStoreCommand.d.ts +6 -8
  277. package/dist/types/ts3.4/commands/EnableKeyCommand.d.ts +4 -5
  278. package/dist/types/ts3.4/commands/EnableKeyRotationCommand.d.ts +5 -5
  279. package/dist/types/ts3.4/commands/EncryptCommand.d.ts +20 -21
  280. package/dist/types/ts3.4/commands/GenerateDataKeyCommand.d.ts +17 -18
  281. package/dist/types/ts3.4/commands/GenerateDataKeyPairCommand.d.ts +21 -15
  282. package/dist/types/ts3.4/commands/GenerateDataKeyPairWithoutPlaintextCommand.d.ts +16 -12
  283. package/dist/types/ts3.4/commands/GenerateDataKeyWithoutPlaintextCommand.d.ts +9 -9
  284. package/dist/types/ts3.4/commands/GenerateRandomCommand.d.ts +4 -3
  285. package/dist/types/ts3.4/commands/GetKeyPolicyCommand.d.ts +2 -2
  286. package/dist/types/ts3.4/commands/GetKeyRotationStatusCommand.d.ts +9 -9
  287. package/dist/types/ts3.4/commands/GetParametersForImportCommand.d.ts +8 -8
  288. package/dist/types/ts3.4/commands/GetPublicKeyCommand.d.ts +15 -15
  289. package/dist/types/ts3.4/commands/ImportKeyMaterialCommand.d.ts +18 -18
  290. package/dist/types/ts3.4/commands/ListAliasesCommand.d.ts +8 -10
  291. package/dist/types/ts3.4/commands/ListGrantsCommand.d.ts +9 -4
  292. package/dist/types/ts3.4/commands/ListKeyPoliciesCommand.d.ts +2 -2
  293. package/dist/types/ts3.4/commands/ListKeysCommand.d.ts +2 -2
  294. package/dist/types/ts3.4/commands/ListResourceTagsCommand.d.ts +4 -4
  295. package/dist/types/ts3.4/commands/ListRetirableGrantsCommand.d.ts +14 -14
  296. package/dist/types/ts3.4/commands/PutKeyPolicyCommand.d.ts +5 -5
  297. package/dist/types/ts3.4/commands/ReEncryptCommand.d.ts +30 -34
  298. package/dist/types/ts3.4/commands/ReplicateKeyCommand.d.ts +16 -16
  299. package/dist/types/ts3.4/commands/RetireGrantCommand.d.ts +9 -9
  300. package/dist/types/ts3.4/commands/RevokeGrantCommand.d.ts +9 -4
  301. package/dist/types/ts3.4/commands/ScheduleKeyDeletionCommand.d.ts +17 -17
  302. package/dist/types/ts3.4/commands/SignCommand.d.ts +12 -13
  303. package/dist/types/ts3.4/commands/TagResourceCommand.d.ts +10 -12
  304. package/dist/types/ts3.4/commands/UntagResourceCommand.d.ts +9 -10
  305. package/dist/types/ts3.4/commands/UpdateAliasCommand.d.ts +15 -15
  306. package/dist/types/ts3.4/commands/UpdateCustomKeyStoreCommand.d.ts +9 -9
  307. package/dist/types/ts3.4/commands/UpdateKeyDescriptionCommand.d.ts +4 -4
  308. package/dist/types/ts3.4/commands/UpdatePrimaryRegionCommand.d.ts +13 -13
  309. package/dist/types/ts3.4/commands/VerifyCommand.d.ts +14 -14
  310. package/dist/types/ts3.4/models/models_0.d.ts +584 -570
  311. package/models/models_0.ts +588 -570
  312. package/package.json +31 -31
  313. package/protocols/Aws_json1_1.ts +20 -12
@@ -4,13 +4,11 @@ import { deserializeAws_json1_1DisconnectCustomKeyStoreCommand, serializeAws_jso
4
4
  import { getSerdePlugin } from "@aws-sdk/middleware-serde";
5
5
  import { Command as $Command } from "@aws-sdk/smithy-client";
6
6
  /**
7
- * <p>Disconnects the <a href="https://docs.aws.amazon.com/kms/latest/developerguide/custom-key-store-overview.html">custom key store</a> from its associated AWS CloudHSM cluster. While a custom key
8
- * store is disconnected, you can manage the custom key store and its customer master keys
9
- * (CMKs), but you cannot create or use CMKs in the custom key store. You can reconnect the
7
+ * <p>Disconnects the <a href="https://docs.aws.amazon.com/kms/latest/developerguide/custom-key-store-overview.html">custom key store</a> from its associated CloudHSM cluster. While a custom key
8
+ * store is disconnected, you can manage the custom key store and its KMS keys, but you cannot create or use KMS keys in the custom key store. You can reconnect the
10
9
  * custom key store at any time.</p>
11
10
  * <note>
12
- * <p>While a custom key store is disconnected, all attempts to create customer master keys
13
- * (CMKs) in the custom key store or to use existing CMKs in <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#cryptographic-operations">cryptographic operations</a> will
11
+ * <p>While a custom key store is disconnected, all attempts to create KMS keys in the custom key store or to use existing KMS keys in <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#cryptographic-operations">cryptographic operations</a> will
14
12
  * fail. This action can prevent users from storing and accessing sensitive data.</p>
15
13
  * </note>
16
14
  * <p></p>
@@ -18,12 +16,12 @@ import { Command as $Command } from "@aws-sdk/smithy-client";
18
16
  * <a>ConnectCustomKeyStore</a> operation.</p>
19
17
  * <p>If the operation succeeds, it returns a JSON object with no
20
18
  * properties.</p>
21
- * <p>This operation is part of the <a href="https://docs.aws.amazon.com/kms/latest/developerguide/custom-key-store-overview.html">Custom Key Store feature</a> feature in AWS KMS, which
22
- * combines the convenience and extensive integration of AWS KMS with the isolation and control of a
19
+ * <p>This operation is part of the <a href="https://docs.aws.amazon.com/kms/latest/developerguide/custom-key-store-overview.html">Custom Key Store feature</a> feature in KMS, which
20
+ * combines the convenience and extensive integration of KMS with the isolation and control of a
23
21
  * single-tenant key store.</p>
24
22
  *
25
23
  * <p>
26
- * <b>Cross-account use</b>: No. You cannot perform this operation on a custom key store in a different AWS account.</p>
24
+ * <b>Cross-account use</b>: No. You cannot perform this operation on a custom key store in a different Amazon Web Services account.</p>
27
25
  *
28
26
  * <p>
29
27
  * <b>Required permissions</b>: <a href="https://docs.aws.amazon.com/kms/latest/developerguide/kms-api-permissions-reference.html">kms:DisconnectCustomKeyStore</a> (IAM policy)</p>
@@ -1 +1 @@
1
- {"version":3,"file":"DisconnectCustomKeyStoreCommand.js","sourceRoot":"","sources":["../../../commands/DisconnectCustomKeyStoreCommand.ts"],"names":[],"mappings":";AACA,OAAO,EAAE,+BAA+B,EAAE,gCAAgC,EAAE,MAAM,oBAAoB,CAAC;AACvG,OAAO,EACL,qDAAqD,EACrD,mDAAmD,GACpD,MAAM,0BAA0B,CAAC;AAClC,OAAO,EAAE,cAAc,EAAE,MAAM,2BAA2B,CAAC;AAE3D,OAAO,EAAE,OAAO,IAAI,QAAQ,EAAE,MAAM,wBAAwB,CAAC;AAc7D;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAoEG;AACH;IAAqD,mDAIpD;IACC,oCAAoC;IACpC,kCAAkC;IAElC,yCAAqB,KAA2C;QAAhE;QACE,qCAAqC;QACrC,iBAAO,SAER;QAJoB,WAAK,GAAL,KAAK,CAAsC;;QAG9D,mCAAmC;IACrC,CAAC;IAED;;OAEG;IACH,2DAAiB,GAAjB,UACE,WAAmE,EACnE,aAAsC,EACtC,OAA8B;QAE9B,IAAI,CAAC,eAAe,CAAC,GAAG,CAAC,cAAc,CAAC,aAAa,EAAE,IAAI,CAAC,SAAS,EAAE,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC;QAE1F,IAAM,KAAK,GAAG,WAAW,CAAC,MAAM,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC;QAE/C,IAAA,MAAM,GAAK,aAAa,OAAlB,CAAmB;QACjC,IAAM,UAAU,GAAG,WAAW,CAAC;QAC/B,IAAM,WAAW,GAAG,iCAAiC,CAAC;QACtD,IAAM,uBAAuB,GAA4B;YACvD,MAAM,QAAA;YACN,UAAU,YAAA;YACV,WAAW,aAAA;YACX,uBAAuB,EAAE,+BAA+B,CAAC,kBAAkB;YAC3E,wBAAwB,EAAE,gCAAgC,CAAC,kBAAkB;SAC9E,CAAC;QACM,IAAA,cAAc,GAAK,aAAa,eAAlB,CAAmB;QACzC,OAAO,KAAK,CAAC,OAAO,CAClB,UAAC,OAAsC;YACrC,OAAA,cAAc,CAAC,MAAM,CAAC,OAAO,CAAC,OAAwB,EAAE,OAAO,IAAI,EAAE,CAAC;QAAtE,CAAsE,EACxE,uBAAuB,CACxB,CAAC;IACJ,CAAC;IAEO,mDAAS,GAAjB,UAAkB,KAA2C,EAAE,OAAuB;QACpF,OAAO,mDAAmD,CAAC,KAAK,EAAE,OAAO,CAAC,CAAC;IAC7E,CAAC;IAEO,qDAAW,GAAnB,UAAoB,MAAsB,EAAE,OAAuB;QACjE,OAAO,qDAAqD,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;IAChF,CAAC;IAIH,sCAAC;AAAD,CAAC,AAtDD,CAAqD,QAAQ,GAsD5D"}
1
+ {"version":3,"file":"DisconnectCustomKeyStoreCommand.js","sourceRoot":"","sources":["../../../commands/DisconnectCustomKeyStoreCommand.ts"],"names":[],"mappings":";AACA,OAAO,EAAE,+BAA+B,EAAE,gCAAgC,EAAE,MAAM,oBAAoB,CAAC;AACvG,OAAO,EACL,qDAAqD,EACrD,mDAAmD,GACpD,MAAM,0BAA0B,CAAC;AAClC,OAAO,EAAE,cAAc,EAAE,MAAM,2BAA2B,CAAC;AAE3D,OAAO,EAAE,OAAO,IAAI,QAAQ,EAAE,MAAM,wBAAwB,CAAC;AAc7D;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAkEG;AACH;IAAqD,mDAIpD;IACC,oCAAoC;IACpC,kCAAkC;IAElC,yCAAqB,KAA2C;QAAhE;QACE,qCAAqC;QACrC,iBAAO,SAER;QAJoB,WAAK,GAAL,KAAK,CAAsC;;QAG9D,mCAAmC;IACrC,CAAC;IAED;;OAEG;IACH,2DAAiB,GAAjB,UACE,WAAmE,EACnE,aAAsC,EACtC,OAA8B;QAE9B,IAAI,CAAC,eAAe,CAAC,GAAG,CAAC,cAAc,CAAC,aAAa,EAAE,IAAI,CAAC,SAAS,EAAE,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC;QAE1F,IAAM,KAAK,GAAG,WAAW,CAAC,MAAM,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC;QAE/C,IAAA,MAAM,GAAK,aAAa,OAAlB,CAAmB;QACjC,IAAM,UAAU,GAAG,WAAW,CAAC;QAC/B,IAAM,WAAW,GAAG,iCAAiC,CAAC;QACtD,IAAM,uBAAuB,GAA4B;YACvD,MAAM,QAAA;YACN,UAAU,YAAA;YACV,WAAW,aAAA;YACX,uBAAuB,EAAE,+BAA+B,CAAC,kBAAkB;YAC3E,wBAAwB,EAAE,gCAAgC,CAAC,kBAAkB;SAC9E,CAAC;QACM,IAAA,cAAc,GAAK,aAAa,eAAlB,CAAmB;QACzC,OAAO,KAAK,CAAC,OAAO,CAClB,UAAC,OAAsC;YACrC,OAAA,cAAc,CAAC,MAAM,CAAC,OAAO,CAAC,OAAwB,EAAE,OAAO,IAAI,EAAE,CAAC;QAAtE,CAAsE,EACxE,uBAAuB,CACxB,CAAC;IACJ,CAAC;IAEO,mDAAS,GAAjB,UAAkB,KAA2C,EAAE,OAAuB;QACpF,OAAO,mDAAmD,CAAC,KAAK,EAAE,OAAO,CAAC,CAAC;IAC7E,CAAC;IAEO,qDAAW,GAAnB,UAAoB,MAAsB,EAAE,OAAuB;QACjE,OAAO,qDAAqD,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;IAChF,CAAC;IAIH,sCAAC;AAAD,CAAC,AAtDD,CAAqD,QAAQ,GAsD5D"}
@@ -4,12 +4,11 @@ import { deserializeAws_json1_1EnableKeyCommand, serializeAws_json1_1EnableKeyCo
4
4
  import { getSerdePlugin } from "@aws-sdk/middleware-serde";
5
5
  import { Command as $Command } from "@aws-sdk/smithy-client";
6
6
  /**
7
- * <p>Sets the key state of a customer master key (CMK) to enabled. This allows you to use the
8
- * CMK for <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#cryptographic-operations">cryptographic operations</a>. </p>
9
- * <p>The CMK that you use for this operation must be in a compatible key state. For
10
- * details, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-state.html">Key state: Effect on your CMK</a> in the <i>AWS Key Management Service Developer Guide</i>.</p>
7
+ * <p>Sets the key state of a KMS key to enabled. This allows you to use the KMS key for <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#cryptographic-operations">cryptographic operations</a>. </p>
8
+ * <p>The KMS key that you use for this operation must be in a compatible key state. For
9
+ * details, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-state.html">Key state: Effect on your KMS key</a> in the <i>Key Management Service Developer Guide</i>.</p>
11
10
  * <p>
12
- * <b>Cross-account use</b>: No. You cannot perform this operation on a CMK in a different AWS account.</p>
11
+ * <b>Cross-account use</b>: No. You cannot perform this operation on a KMS key in a different Amazon Web Services account.</p>
13
12
  *
14
13
  * <p>
15
14
  * <b>Required permissions</b>: <a href="https://docs.aws.amazon.com/kms/latest/developerguide/kms-api-permissions-reference.html">kms:EnableKey</a> (key policy)</p>
@@ -1 +1 @@
1
- {"version":3,"file":"EnableKeyCommand.js","sourceRoot":"","sources":["../../../commands/EnableKeyCommand.ts"],"names":[],"mappings":";AACA,OAAO,EAAE,gBAAgB,EAAE,MAAM,oBAAoB,CAAC;AACtD,OAAO,EAAE,sCAAsC,EAAE,oCAAoC,EAAE,MAAM,0BAA0B,CAAC;AACxH,OAAO,EAAE,cAAc,EAAE,MAAM,2BAA2B,CAAC;AAE3D,OAAO,EAAE,OAAO,IAAI,QAAQ,EAAE,MAAM,wBAAwB,CAAC;AAc7D;;;;;;;;;;;;;;;;;;;;;;;;;;;GA2BG;AACH;IAAsC,oCAAgF;IACpH,oCAAoC;IACpC,kCAAkC;IAElC,0BAAqB,KAA4B;QAAjD;QACE,qCAAqC;QACrC,iBAAO,SAER;QAJoB,WAAK,GAAL,KAAK,CAAuB;;QAG/C,mCAAmC;IACrC,CAAC;IAED;;OAEG;IACH,4CAAiB,GAAjB,UACE,WAAmE,EACnE,aAAsC,EACtC,OAA8B;QAE9B,IAAI,CAAC,eAAe,CAAC,GAAG,CAAC,cAAc,CAAC,aAAa,EAAE,IAAI,CAAC,SAAS,EAAE,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC;QAE1F,IAAM,KAAK,GAAG,WAAW,CAAC,MAAM,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC;QAE/C,IAAA,MAAM,GAAK,aAAa,OAAlB,CAAmB;QACjC,IAAM,UAAU,GAAG,WAAW,CAAC;QAC/B,IAAM,WAAW,GAAG,kBAAkB,CAAC;QACvC,IAAM,uBAAuB,GAA4B;YACvD,MAAM,QAAA;YACN,UAAU,YAAA;YACV,WAAW,aAAA;YACX,uBAAuB,EAAE,gBAAgB,CAAC,kBAAkB;YAC5D,wBAAwB,EAAE,UAAC,MAAW,IAAK,OAAA,MAAM,EAAN,CAAM;SAClD,CAAC;QACM,IAAA,cAAc,GAAK,aAAa,eAAlB,CAAmB;QACzC,OAAO,KAAK,CAAC,OAAO,CAClB,UAAC,OAAsC;YACrC,OAAA,cAAc,CAAC,MAAM,CAAC,OAAO,CAAC,OAAwB,EAAE,OAAO,IAAI,EAAE,CAAC;QAAtE,CAAsE,EACxE,uBAAuB,CACxB,CAAC;IACJ,CAAC;IAEO,oCAAS,GAAjB,UAAkB,KAA4B,EAAE,OAAuB;QACrE,OAAO,oCAAoC,CAAC,KAAK,EAAE,OAAO,CAAC,CAAC;IAC9D,CAAC;IAEO,sCAAW,GAAnB,UAAoB,MAAsB,EAAE,OAAuB;QACjE,OAAO,sCAAsC,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;IACjE,CAAC;IAIH,uBAAC;AAAD,CAAC,AAlDD,CAAsC,QAAQ,GAkD7C"}
1
+ {"version":3,"file":"EnableKeyCommand.js","sourceRoot":"","sources":["../../../commands/EnableKeyCommand.ts"],"names":[],"mappings":";AACA,OAAO,EAAE,gBAAgB,EAAE,MAAM,oBAAoB,CAAC;AACtD,OAAO,EAAE,sCAAsC,EAAE,oCAAoC,EAAE,MAAM,0BAA0B,CAAC;AACxH,OAAO,EAAE,cAAc,EAAE,MAAM,2BAA2B,CAAC;AAE3D,OAAO,EAAE,OAAO,IAAI,QAAQ,EAAE,MAAM,wBAAwB,CAAC;AAc7D;;;;;;;;;;;;;;;;;;;;;;;;;;GA0BG;AACH;IAAsC,oCAAgF;IACpH,oCAAoC;IACpC,kCAAkC;IAElC,0BAAqB,KAA4B;QAAjD;QACE,qCAAqC;QACrC,iBAAO,SAER;QAJoB,WAAK,GAAL,KAAK,CAAuB;;QAG/C,mCAAmC;IACrC,CAAC;IAED;;OAEG;IACH,4CAAiB,GAAjB,UACE,WAAmE,EACnE,aAAsC,EACtC,OAA8B;QAE9B,IAAI,CAAC,eAAe,CAAC,GAAG,CAAC,cAAc,CAAC,aAAa,EAAE,IAAI,CAAC,SAAS,EAAE,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC;QAE1F,IAAM,KAAK,GAAG,WAAW,CAAC,MAAM,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC;QAE/C,IAAA,MAAM,GAAK,aAAa,OAAlB,CAAmB;QACjC,IAAM,UAAU,GAAG,WAAW,CAAC;QAC/B,IAAM,WAAW,GAAG,kBAAkB,CAAC;QACvC,IAAM,uBAAuB,GAA4B;YACvD,MAAM,QAAA;YACN,UAAU,YAAA;YACV,WAAW,aAAA;YACX,uBAAuB,EAAE,gBAAgB,CAAC,kBAAkB;YAC5D,wBAAwB,EAAE,UAAC,MAAW,IAAK,OAAA,MAAM,EAAN,CAAM;SAClD,CAAC;QACM,IAAA,cAAc,GAAK,aAAa,eAAlB,CAAmB;QACzC,OAAO,KAAK,CAAC,OAAO,CAClB,UAAC,OAAsC;YACrC,OAAA,cAAc,CAAC,MAAM,CAAC,OAAO,CAAC,OAAwB,EAAE,OAAO,IAAI,EAAE,CAAC;QAAtE,CAAsE,EACxE,uBAAuB,CACxB,CAAC;IACJ,CAAC;IAEO,oCAAS,GAAjB,UAAkB,KAA4B,EAAE,OAAuB;QACrE,OAAO,oCAAoC,CAAC,KAAK,EAAE,OAAO,CAAC,CAAC;IAC9D,CAAC;IAEO,sCAAW,GAAnB,UAAoB,MAAsB,EAAE,OAAuB;QACjE,OAAO,sCAAsC,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;IACjE,CAAC;IAIH,uBAAC;AAAD,CAAC,AAlDD,CAAsC,QAAQ,GAkD7C"}
@@ -5,12 +5,12 @@ import { getSerdePlugin } from "@aws-sdk/middleware-serde";
5
5
  import { Command as $Command } from "@aws-sdk/smithy-client";
6
6
  /**
7
7
  * <p>Enables <a href="https://docs.aws.amazon.com/kms/latest/developerguide/rotate-keys.html">automatic rotation
8
- * of the key material</a> for the specified symmetric customer master key (CMK).</p>
9
- * <p>You cannot enable automatic rotation of <a href="https://docs.aws.amazon.com/kms/latest/developerguide/symm-asymm-concepts.html#asymmetric-cmks">asymmetric CMKs</a>, CMKs with <a href="https://docs.aws.amazon.com/kms/latest/developerguide/importing-keys.html">imported key material</a>, or CMKs in a <a href="https://docs.aws.amazon.com/kms/latest/developerguide/custom-key-store-overview.html">custom key store</a>. To enable or disable automatic rotation of a set of related <a href="https://docs.aws.amazon.com/kms/latest/developerguide/multi-region-keys-overview.html#mrk-replica-key">multi-Region keys</a>, set the property on the primary key.</p>
10
- * <p>The CMK that you use for this operation must be in a compatible key state. For
11
- * details, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-state.html">Key state: Effect on your CMK</a> in the <i>AWS Key Management Service Developer Guide</i>.</p>
8
+ * of the key material</a> for the specified symmetric KMS key.</p>
9
+ * <p>You cannot enable automatic rotation of <a href="https://docs.aws.amazon.com/kms/latest/developerguide/symm-asymm-concepts.html#asymmetric-cmks">asymmetric KMS keys</a>, KMS keys with <a href="https://docs.aws.amazon.com/kms/latest/developerguide/importing-keys.html">imported key material</a>, or KMS keys in a <a href="https://docs.aws.amazon.com/kms/latest/developerguide/custom-key-store-overview.html">custom key store</a>. To enable or disable automatic rotation of a set of related <a href="https://docs.aws.amazon.com/kms/latest/developerguide/multi-region-keys-overview.html#mrk-replica-key">multi-Region keys</a>, set the property on the primary key.</p>
10
+ * <p>The KMS key that you use for this operation must be in a compatible key state. For
11
+ * details, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-state.html">Key state: Effect on your KMS key</a> in the <i>Key Management Service Developer Guide</i>.</p>
12
12
  * <p>
13
- * <b>Cross-account use</b>: No. You cannot perform this operation on a CMK in a different AWS account.</p>
13
+ * <b>Cross-account use</b>: No. You cannot perform this operation on a KMS key in a different Amazon Web Services account.</p>
14
14
  *
15
15
  * <p>
16
16
  * <b>Required permissions</b>: <a href="https://docs.aws.amazon.com/kms/latest/developerguide/kms-api-permissions-reference.html">kms:EnableKeyRotation</a> (key policy)</p>
@@ -4,7 +4,7 @@ import { deserializeAws_json1_1EncryptCommand, serializeAws_json1_1EncryptComman
4
4
  import { getSerdePlugin } from "@aws-sdk/middleware-serde";
5
5
  import { Command as $Command } from "@aws-sdk/smithy-client";
6
6
  /**
7
- * <p>Encrypts plaintext into ciphertext by using a customer master key (CMK). The
7
+ * <p>Encrypts plaintext into ciphertext by using a KMS key. The
8
8
  * <code>Encrypt</code> operation has two primary use cases:</p>
9
9
  * <ul>
10
10
  * <li>
@@ -12,41 +12,40 @@ import { Command as $Command } from "@aws-sdk/smithy-client";
12
12
  * database password, or other sensitive information. </p>
13
13
  * </li>
14
14
  * <li>
15
- * <p>You can use the <code>Encrypt</code> operation to move encrypted data from one AWS
16
- * Region to another. For example, in Region A, generate a data key and use the plaintext key
17
- * to encrypt your data. Then, in Region A, use the <code>Encrypt</code> operation to encrypt
18
- * the plaintext data key under a CMK in Region B. Now, you can move the encrypted data and
19
- * the encrypted data key to Region B. When necessary, you can decrypt the encrypted data key
20
- * and the encrypted data entirely within in Region B.</p>
15
+ * <p>You can use the <code>Encrypt</code> operation to move encrypted data from one Amazon Web Services Region to another. For example, in Region A, generate a data key and use the plaintext key to encrypt
16
+ * your data. Then, in Region A, use the <code>Encrypt</code> operation to encrypt the
17
+ * plaintext data key under a KMS key in Region B. Now, you can move the encrypted data and the
18
+ * encrypted data key to Region B. When necessary, you can decrypt the encrypted data key and
19
+ * the encrypted data entirely within in Region B.</p>
21
20
  * </li>
22
21
  * </ul>
23
22
  *
24
23
  * <p>You don't need to use the <code>Encrypt</code> operation to encrypt a data key. The <a>GenerateDataKey</a> and <a>GenerateDataKeyPair</a> operations return a
25
24
  * plaintext data key and an encrypted copy of that data key.</p>
26
25
  *
27
- * <p>When you encrypt data, you must specify a symmetric or asymmetric CMK to use in the
28
- * encryption operation. The CMK must have a <code>KeyUsage</code> value of
29
- * <code>ENCRYPT_DECRYPT.</code> To find the <code>KeyUsage</code> of a CMK, use the <a>DescribeKey</a> operation. </p>
26
+ * <p>When you encrypt data, you must specify a symmetric or asymmetric KMS key to use in the
27
+ * encryption operation. The KMS key must have a <code>KeyUsage</code> value of
28
+ * <code>ENCRYPT_DECRYPT.</code> To find the <code>KeyUsage</code> of a KMS key, use the <a>DescribeKey</a> operation. </p>
30
29
  *
31
- * <p>If you use a symmetric CMK, you can use an encryption context to add additional security
30
+ * <p>If you use a symmetric KMS key, you can use an encryption context to add additional security
32
31
  * to your encryption operation. If you specify an <code>EncryptionContext</code> when encrypting
33
32
  * data, you must specify the same encryption context (a case-sensitive exact match) when
34
33
  * decrypting the data. Otherwise, the request to decrypt fails with an
35
34
  * <code>InvalidCiphertextException</code>. For more information, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#encrypt_context">Encryption
36
- * Context</a> in the <i>AWS Key Management Service Developer Guide</i>.</p>
37
- * <p>If you specify an asymmetric CMK, you must also specify the encryption algorithm. The
38
- * algorithm must be compatible with the CMK type.</p>
35
+ * Context</a> in the <i>Key Management Service Developer Guide</i>.</p>
36
+ * <p>If you specify an asymmetric KMS key, you must also specify the encryption algorithm. The
37
+ * algorithm must be compatible with the KMS key type.</p>
39
38
  * <important>
40
- * <p>When you use an asymmetric CMK to encrypt or reencrypt data, be sure to record the CMK and encryption algorithm that you choose. You will be required to provide the same CMK and encryption algorithm when you decrypt the data. If the CMK and algorithm do not match the values used to encrypt the data, the decrypt operation fails.</p>
41
- * <p>You are not required to supply the CMK ID and encryption algorithm when you decrypt with symmetric CMKs because AWS KMS stores this information in the ciphertext blob. AWS KMS cannot store metadata in ciphertext generated with asymmetric keys. The standard format for asymmetric key ciphertext does not include configurable fields.</p>
39
+ * <p>When you use an asymmetric KMS key to encrypt or reencrypt data, be sure to record the KMS key and encryption algorithm that you choose. You will be required to provide the same KMS key and encryption algorithm when you decrypt the data. If the KMS key and algorithm do not match the values used to encrypt the data, the decrypt operation fails.</p>
40
+ * <p>You are not required to supply the key ID and encryption algorithm when you decrypt with symmetric KMS keys because KMS stores this information in the ciphertext blob. KMS cannot store metadata in ciphertext generated with asymmetric keys. The standard format for asymmetric key ciphertext does not include configurable fields.</p>
42
41
  * </important>
43
42
  *
44
43
  *
45
- * <p>The maximum size of the data that you can encrypt varies with the type of CMK and the
44
+ * <p>The maximum size of the data that you can encrypt varies with the type of KMS key and the
46
45
  * encryption algorithm that you choose.</p>
47
46
  * <ul>
48
47
  * <li>
49
- * <p>Symmetric CMKs</p>
48
+ * <p>Symmetric KMS keys</p>
50
49
  * <ul>
51
50
  * <li>
52
51
  * <p>
@@ -100,10 +99,10 @@ import { Command as $Command } from "@aws-sdk/smithy-client";
100
99
  * </ul>
101
100
  * </li>
102
101
  * </ul>
103
- * <p>The CMK that you use for this operation must be in a compatible key state. For
104
- * details, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-state.html">Key state: Effect on your CMK</a> in the <i>AWS Key Management Service Developer Guide</i>.</p>
102
+ * <p>The KMS key that you use for this operation must be in a compatible key state. For
103
+ * details, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-state.html">Key state: Effect on your KMS key</a> in the <i>Key Management Service Developer Guide</i>.</p>
105
104
  * <p>
106
- * <b>Cross-account use</b>: Yes. To perform this operation with a CMK in a different AWS account, specify
105
+ * <b>Cross-account use</b>: Yes. To perform this operation with a KMS key in a different Amazon Web Services account, specify
107
106
  * the key ARN or alias ARN in the value of the <code>KeyId</code> parameter.</p>
108
107
  *
109
108
  * <p>
@@ -1 +1 @@
1
- {"version":3,"file":"EncryptCommand.js","sourceRoot":"","sources":["../../../commands/EncryptCommand.ts"],"names":[],"mappings":";AACA,OAAO,EAAE,cAAc,EAAE,eAAe,EAAE,MAAM,oBAAoB,CAAC;AACrE,OAAO,EAAE,oCAAoC,EAAE,kCAAkC,EAAE,MAAM,0BAA0B,CAAC;AACpH,OAAO,EAAE,cAAc,EAAE,MAAM,2BAA2B,CAAC;AAE3D,OAAO,EAAE,OAAO,IAAI,QAAQ,EAAE,MAAM,wBAAwB,CAAC;AAc7D;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA2IG;AACH;IAAoC,kCAA4E;IAC9G,oCAAoC;IACpC,kCAAkC;IAElC,wBAAqB,KAA0B;QAA/C;QACE,qCAAqC;QACrC,iBAAO,SAER;QAJoB,WAAK,GAAL,KAAK,CAAqB;;QAG7C,mCAAmC;IACrC,CAAC;IAED;;OAEG;IACH,0CAAiB,GAAjB,UACE,WAAmE,EACnE,aAAsC,EACtC,OAA8B;QAE9B,IAAI,CAAC,eAAe,CAAC,GAAG,CAAC,cAAc,CAAC,aAAa,EAAE,IAAI,CAAC,SAAS,EAAE,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC;QAE1F,IAAM,KAAK,GAAG,WAAW,CAAC,MAAM,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC;QAE/C,IAAA,MAAM,GAAK,aAAa,OAAlB,CAAmB;QACjC,IAAM,UAAU,GAAG,WAAW,CAAC;QAC/B,IAAM,WAAW,GAAG,gBAAgB,CAAC;QACrC,IAAM,uBAAuB,GAA4B;YACvD,MAAM,QAAA;YACN,UAAU,YAAA;YACV,WAAW,aAAA;YACX,uBAAuB,EAAE,cAAc,CAAC,kBAAkB;YAC1D,wBAAwB,EAAE,eAAe,CAAC,kBAAkB;SAC7D,CAAC;QACM,IAAA,cAAc,GAAK,aAAa,eAAlB,CAAmB;QACzC,OAAO,KAAK,CAAC,OAAO,CAClB,UAAC,OAAsC;YACrC,OAAA,cAAc,CAAC,MAAM,CAAC,OAAO,CAAC,OAAwB,EAAE,OAAO,IAAI,EAAE,CAAC;QAAtE,CAAsE,EACxE,uBAAuB,CACxB,CAAC;IACJ,CAAC;IAEO,kCAAS,GAAjB,UAAkB,KAA0B,EAAE,OAAuB;QACnE,OAAO,kCAAkC,CAAC,KAAK,EAAE,OAAO,CAAC,CAAC;IAC5D,CAAC;IAEO,oCAAW,GAAnB,UAAoB,MAAsB,EAAE,OAAuB;QACjE,OAAO,oCAAoC,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;IAC/D,CAAC;IAIH,qBAAC;AAAD,CAAC,AAlDD,CAAoC,QAAQ,GAkD3C"}
1
+ {"version":3,"file":"EncryptCommand.js","sourceRoot":"","sources":["../../../commands/EncryptCommand.ts"],"names":[],"mappings":";AACA,OAAO,EAAE,cAAc,EAAE,eAAe,EAAE,MAAM,oBAAoB,CAAC;AACrE,OAAO,EAAE,oCAAoC,EAAE,kCAAkC,EAAE,MAAM,0BAA0B,CAAC;AACpH,OAAO,EAAE,cAAc,EAAE,MAAM,2BAA2B,CAAC;AAE3D,OAAO,EAAE,OAAO,IAAI,QAAQ,EAAE,MAAM,wBAAwB,CAAC;AAc7D;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA0IG;AACH;IAAoC,kCAA4E;IAC9G,oCAAoC;IACpC,kCAAkC;IAElC,wBAAqB,KAA0B;QAA/C;QACE,qCAAqC;QACrC,iBAAO,SAER;QAJoB,WAAK,GAAL,KAAK,CAAqB;;QAG7C,mCAAmC;IACrC,CAAC;IAED;;OAEG;IACH,0CAAiB,GAAjB,UACE,WAAmE,EACnE,aAAsC,EACtC,OAA8B;QAE9B,IAAI,CAAC,eAAe,CAAC,GAAG,CAAC,cAAc,CAAC,aAAa,EAAE,IAAI,CAAC,SAAS,EAAE,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC;QAE1F,IAAM,KAAK,GAAG,WAAW,CAAC,MAAM,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC;QAE/C,IAAA,MAAM,GAAK,aAAa,OAAlB,CAAmB;QACjC,IAAM,UAAU,GAAG,WAAW,CAAC;QAC/B,IAAM,WAAW,GAAG,gBAAgB,CAAC;QACrC,IAAM,uBAAuB,GAA4B;YACvD,MAAM,QAAA;YACN,UAAU,YAAA;YACV,WAAW,aAAA;YACX,uBAAuB,EAAE,cAAc,CAAC,kBAAkB;YAC1D,wBAAwB,EAAE,eAAe,CAAC,kBAAkB;SAC7D,CAAC;QACM,IAAA,cAAc,GAAK,aAAa,eAAlB,CAAmB;QACzC,OAAO,KAAK,CAAC,OAAO,CAClB,UAAC,OAAsC;YACrC,OAAA,cAAc,CAAC,MAAM,CAAC,OAAO,CAAC,OAAwB,EAAE,OAAO,IAAI,EAAE,CAAC;QAAtE,CAAsE,EACxE,uBAAuB,CACxB,CAAC;IACJ,CAAC;IAEO,kCAAS,GAAjB,UAAkB,KAA0B,EAAE,OAAuB;QACnE,OAAO,kCAAkC,CAAC,KAAK,EAAE,OAAO,CAAC,CAAC;IAC5D,CAAC;IAEO,oCAAW,GAAnB,UAAoB,MAAsB,EAAE,OAAuB;QACjE,OAAO,oCAAoC,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;IAC/D,CAAC;IAIH,qBAAC;AAAD,CAAC,AAlDD,CAAoC,QAAQ,GAkD3C"}
@@ -5,16 +5,16 @@ import { getSerdePlugin } from "@aws-sdk/middleware-serde";
5
5
  import { Command as $Command } from "@aws-sdk/smithy-client";
6
6
  /**
7
7
  * <p>Generates a unique symmetric data key for client-side encryption. This operation returns a
8
- * plaintext copy of the data key and a copy that is encrypted under a customer master key (CMK)
9
- * that you specify. You can use the plaintext key to encrypt your data outside of AWS KMS and
8
+ * plaintext copy of the data key and a copy that is encrypted under a KMS key
9
+ * that you specify. You can use the plaintext key to encrypt your data outside of KMS and
10
10
  * store the encrypted data key with the encrypted data.</p>
11
11
  *
12
12
  * <p>
13
13
  * <code>GenerateDataKey</code> returns a unique data key for each request. The bytes in the
14
- * plaintext key are not related to the caller or the CMK.</p>
14
+ * plaintext key are not related to the caller or the KMS key.</p>
15
15
  *
16
- * <p>To generate a data key, specify the symmetric CMK that will be used to encrypt the data
17
- * key. You cannot use an asymmetric CMK to generate data keys. To get the type of your CMK, use
16
+ * <p>To generate a data key, specify the symmetric KMS key that will be used to encrypt the data
17
+ * key. You cannot use an asymmetric KMS key to generate data keys. To get the type of your KMS key, use
18
18
  * the <a>DescribeKey</a> operation. You must also specify the length of the data key.
19
19
  * Use either the <code>KeySpec</code> or <code>NumberOfBytes</code> parameters (but not both).
20
20
  * For 128-bit and 256-bit data keys, use the <code>KeySpec</code> parameter. </p>
@@ -27,45 +27,44 @@ import { Command as $Command } from "@aws-sdk/smithy-client";
27
27
  * operation. If you specify an <code>EncryptionContext</code>, you must specify the same
28
28
  * encryption context (a case-sensitive exact match) when decrypting the encrypted data key.
29
29
  * Otherwise, the request to decrypt fails with an <code>InvalidCiphertextException</code>. For more information, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#encrypt_context">Encryption Context</a> in the
30
- * <i>AWS Key Management Service Developer Guide</i>.</p>
31
- * <p>The CMK that you use for this operation must be in a compatible key state. For
32
- * details, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-state.html">Key state: Effect on your CMK</a> in the <i>AWS Key Management Service Developer Guide</i>.</p>
30
+ * <i>Key Management Service Developer Guide</i>.</p>
31
+ * <p>Applications in Amazon Web Services Nitro Enclaves can call this operation by using the <a href="https://github.com/aws/aws-nitro-enclaves-sdk-c">Amazon Web Services Nitro Enclaves Development Kit</a>. For information about the supporting parameters, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/services-nitro-enclaves.html">How Amazon Web Services Nitro Enclaves use KMS</a> in the <i>Key Management Service Developer Guide</i>.</p>
32
+ * <p>The KMS key that you use for this operation must be in a compatible key state. For
33
+ * details, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-state.html">Key state: Effect on your KMS key</a> in the <i>Key Management Service Developer Guide</i>.</p>
33
34
  * <p>
34
- * <b>How to use your
35
- * data key</b>
35
+ * <b>How to use your data key</b>
36
36
  * </p>
37
- * <p>We recommend that you use the following pattern to encrypt data locally in your
38
- * application. You can write your own code or use a client-side encryption library, such as the
39
- * <a href="https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/">AWS Encryption SDK</a>, the <a href="https://docs.aws.amazon.com/dynamodb-encryption-client/latest/devguide/">Amazon DynamoDB Encryption Client</a>, or
37
+ * <p>We recommend that you use the following pattern to encrypt data locally in your application.
38
+ * You can write your own code or use a client-side encryption library, such as the <a href="https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/">Amazon Web Services Encryption SDK</a>, the <a href="https://docs.aws.amazon.com/dynamodb-encryption-client/latest/devguide/">Amazon DynamoDB Encryption Client</a>, or
40
39
  * <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/UsingClientSideEncryption.html">Amazon S3
41
40
  * client-side encryption</a> to do these tasks for you.</p>
42
- * <p>To encrypt data outside of AWS KMS:</p>
41
+ * <p>To encrypt data outside of KMS:</p>
43
42
  * <ol>
44
43
  * <li>
45
44
  * <p>Use the <code>GenerateDataKey</code> operation to get a data key.</p>
46
45
  * </li>
47
46
  * <li>
48
47
  * <p>Use the plaintext data key (in the <code>Plaintext</code> field of the response) to
49
- * encrypt your data outside of AWS KMS. Then erase the plaintext data key from memory.</p>
48
+ * encrypt your data outside of KMS. Then erase the plaintext data key from memory.</p>
50
49
  * </li>
51
50
  * <li>
52
51
  * <p>Store the encrypted data key (in the <code>CiphertextBlob</code> field of the
53
52
  * response) with the encrypted data.</p>
54
53
  * </li>
55
54
  * </ol>
56
- * <p>To decrypt data outside of AWS KMS:</p>
55
+ * <p>To decrypt data outside of KMS:</p>
57
56
  * <ol>
58
57
  * <li>
59
58
  * <p>Use the <a>Decrypt</a> operation to decrypt the encrypted data key. The
60
59
  * operation returns a plaintext copy of the data key.</p>
61
60
  * </li>
62
61
  * <li>
63
- * <p>Use the plaintext data key to decrypt data outside of AWS KMS, then erase the plaintext
62
+ * <p>Use the plaintext data key to decrypt data outside of KMS, then erase the plaintext
64
63
  * data key from memory.</p>
65
64
  * </li>
66
65
  * </ol>
67
66
  * <p>
68
- * <b>Cross-account use</b>: Yes. To perform this operation with a CMK in a different AWS account, specify
67
+ * <b>Cross-account use</b>: Yes. To perform this operation with a KMS key in a different Amazon Web Services account, specify
69
68
  * the key ARN or alias ARN in the value of the <code>KeyId</code> parameter.</p>
70
69
  *
71
70
  * <p>
@@ -1 +1 @@
1
- {"version":3,"file":"GenerateDataKeyCommand.js","sourceRoot":"","sources":["../../../commands/GenerateDataKeyCommand.ts"],"names":[],"mappings":";AACA,OAAO,EAAE,sBAAsB,EAAE,uBAAuB,EAAE,MAAM,oBAAoB,CAAC;AACrF,OAAO,EACL,4CAA4C,EAC5C,0CAA0C,GAC3C,MAAM,0BAA0B,CAAC;AAClC,OAAO,EAAE,cAAc,EAAE,MAAM,2BAA2B,CAAC;AAE3D,OAAO,EAAE,OAAO,IAAI,QAAQ,EAAE,MAAM,wBAAwB,CAAC;AAc7D;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA+GG;AACH;IAA4C,0CAI3C;IACC,oCAAoC;IACpC,kCAAkC;IAElC,gCAAqB,KAAkC;QAAvD;QACE,qCAAqC;QACrC,iBAAO,SAER;QAJoB,WAAK,GAAL,KAAK,CAA6B;;QAGrD,mCAAmC;IACrC,CAAC;IAED;;OAEG;IACH,kDAAiB,GAAjB,UACE,WAAmE,EACnE,aAAsC,EACtC,OAA8B;QAE9B,IAAI,CAAC,eAAe,CAAC,GAAG,CAAC,cAAc,CAAC,aAAa,EAAE,IAAI,CAAC,SAAS,EAAE,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC;QAE1F,IAAM,KAAK,GAAG,WAAW,CAAC,MAAM,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC;QAE/C,IAAA,MAAM,GAAK,aAAa,OAAlB,CAAmB;QACjC,IAAM,UAAU,GAAG,WAAW,CAAC;QAC/B,IAAM,WAAW,GAAG,wBAAwB,CAAC;QAC7C,IAAM,uBAAuB,GAA4B;YACvD,MAAM,QAAA;YACN,UAAU,YAAA;YACV,WAAW,aAAA;YACX,uBAAuB,EAAE,sBAAsB,CAAC,kBAAkB;YAClE,wBAAwB,EAAE,uBAAuB,CAAC,kBAAkB;SACrE,CAAC;QACM,IAAA,cAAc,GAAK,aAAa,eAAlB,CAAmB;QACzC,OAAO,KAAK,CAAC,OAAO,CAClB,UAAC,OAAsC;YACrC,OAAA,cAAc,CAAC,MAAM,CAAC,OAAO,CAAC,OAAwB,EAAE,OAAO,IAAI,EAAE,CAAC;QAAtE,CAAsE,EACxE,uBAAuB,CACxB,CAAC;IACJ,CAAC;IAEO,0CAAS,GAAjB,UAAkB,KAAkC,EAAE,OAAuB;QAC3E,OAAO,0CAA0C,CAAC,KAAK,EAAE,OAAO,CAAC,CAAC;IACpE,CAAC;IAEO,4CAAW,GAAnB,UAAoB,MAAsB,EAAE,OAAuB;QACjE,OAAO,4CAA4C,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;IACvE,CAAC;IAIH,6BAAC;AAAD,CAAC,AAtDD,CAA4C,QAAQ,GAsDnD"}
1
+ {"version":3,"file":"GenerateDataKeyCommand.js","sourceRoot":"","sources":["../../../commands/GenerateDataKeyCommand.ts"],"names":[],"mappings":";AACA,OAAO,EAAE,sBAAsB,EAAE,uBAAuB,EAAE,MAAM,oBAAoB,CAAC;AACrF,OAAO,EACL,4CAA4C,EAC5C,0CAA0C,GAC3C,MAAM,0BAA0B,CAAC;AAClC,OAAO,EAAE,cAAc,EAAE,MAAM,2BAA2B,CAAC;AAE3D,OAAO,EAAE,OAAO,IAAI,QAAQ,EAAE,MAAM,wBAAwB,CAAC;AAc7D;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA8GG;AACH;IAA4C,0CAI3C;IACC,oCAAoC;IACpC,kCAAkC;IAElC,gCAAqB,KAAkC;QAAvD;QACE,qCAAqC;QACrC,iBAAO,SAER;QAJoB,WAAK,GAAL,KAAK,CAA6B;;QAGrD,mCAAmC;IACrC,CAAC;IAED;;OAEG;IACH,kDAAiB,GAAjB,UACE,WAAmE,EACnE,aAAsC,EACtC,OAA8B;QAE9B,IAAI,CAAC,eAAe,CAAC,GAAG,CAAC,cAAc,CAAC,aAAa,EAAE,IAAI,CAAC,SAAS,EAAE,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC;QAE1F,IAAM,KAAK,GAAG,WAAW,CAAC,MAAM,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC;QAE/C,IAAA,MAAM,GAAK,aAAa,OAAlB,CAAmB;QACjC,IAAM,UAAU,GAAG,WAAW,CAAC;QAC/B,IAAM,WAAW,GAAG,wBAAwB,CAAC;QAC7C,IAAM,uBAAuB,GAA4B;YACvD,MAAM,QAAA;YACN,UAAU,YAAA;YACV,WAAW,aAAA;YACX,uBAAuB,EAAE,sBAAsB,CAAC,kBAAkB;YAClE,wBAAwB,EAAE,uBAAuB,CAAC,kBAAkB;SACrE,CAAC;QACM,IAAA,cAAc,GAAK,aAAa,eAAlB,CAAmB;QACzC,OAAO,KAAK,CAAC,OAAO,CAClB,UAAC,OAAsC;YACrC,OAAA,cAAc,CAAC,MAAM,CAAC,OAAO,CAAC,OAAwB,EAAE,OAAO,IAAI,EAAE,CAAC;QAAtE,CAAsE,EACxE,uBAAuB,CACxB,CAAC;IACJ,CAAC;IAEO,0CAAS,GAAjB,UAAkB,KAAkC,EAAE,OAAuB;QAC3E,OAAO,0CAA0C,CAAC,KAAK,EAAE,OAAO,CAAC,CAAC;IACpE,CAAC;IAEO,4CAAW,GAAnB,UAAoB,MAAsB,EAAE,OAAuB;QACjE,OAAO,4CAA4C,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;IACvE,CAAC;IAIH,6BAAC;AAAD,CAAC,AAtDD,CAA4C,QAAQ,GAsDnD"}
@@ -6,21 +6,20 @@ import { Command as $Command } from "@aws-sdk/smithy-client";
6
6
  /**
7
7
  * <p>Generates a unique asymmetric data key pair. The <code>GenerateDataKeyPair</code>
8
8
  * operation returns a plaintext public key, a plaintext private key, and a copy of the private
9
- * key that is encrypted under the symmetric CMK you specify. You can use the data key pair to
10
- * perform asymmetric cryptography outside of AWS KMS.</p>
11
- *
12
- * <p>
13
- * <code>GenerateDataKeyPair</code> returns a unique data key pair for each request. The
14
- * bytes in the keys are not related to the caller or the CMK that is used to encrypt the private
15
- * key.</p>
9
+ * key that is encrypted under the symmetric KMS key you specify. You can use the data key pair to
10
+ * perform asymmetric cryptography and implement digital signatures outside of KMS.</p>
16
11
  *
17
12
  * <p>You can use the public key that <code>GenerateDataKeyPair</code> returns to encrypt data
18
- * or verify a signature outside of AWS KMS. Then, store the encrypted private key with the data.
13
+ * or verify a signature outside of KMS. Then, store the encrypted private key with the data.
19
14
  * When you are ready to decrypt data or sign a message, you can use the <a>Decrypt</a> operation to decrypt the encrypted private key.</p>
20
15
  *
21
- * <p>To generate a data key pair, you must specify a symmetric customer master key (CMK) to
22
- * encrypt the private key in a data key pair. You cannot use an asymmetric CMK or a CMK in a
23
- * custom key store. To get the type and origin of your CMK, use the <a>DescribeKey</a> operation. </p>
16
+ * <p>To generate a data key pair, you must specify a symmetric KMS key to
17
+ * encrypt the private key in a data key pair. You cannot use an asymmetric KMS key or a KMS key in a
18
+ * custom key store. To get the type and origin of your KMS key, use the <a>DescribeKey</a> operation. </p>
19
+ * <p>Use the <code>KeyPairSpec</code> parameter to choose an RSA or Elliptic Curve (ECC) data
20
+ * key pair. KMS recommends that your use ECC key pairs for signing, and use RSA key pairs
21
+ * for either encryption or signing, but not both. However, KMS cannot enforce any restrictions
22
+ * on the use of data key pairs outside of KMS.</p>
24
23
  *
25
24
  * <p>If you are using the data key pair to encrypt data, or for any operation where you don't
26
25
  * immediately need a private key, consider using the <a>GenerateDataKeyPairWithoutPlaintext</a> operation.
@@ -30,15 +29,22 @@ import { Command as $Command } from "@aws-sdk/smithy-client";
30
29
  * the <a>Decrypt</a> operation to decrypt the encrypted private key in the data key
31
30
  * pair.</p>
32
31
  *
32
+ * <p>
33
+ * <code>GenerateDataKeyPair</code> returns a unique data key pair for each request. The
34
+ * bytes in the keys are not related to the caller or the KMS key that is used to encrypt the private
35
+ * key. The public key is a DER-encoded X.509 SubjectPublicKeyInfo, as specified in <a href="https://tools.ietf.org/html/rfc5280">RFC 5280</a>. The
36
+ * private key is a DER-encoded PKCS8 PrivateKeyInfo, as specified in <a href="https://tools.ietf.org/html/rfc5958">RFC
37
+ * 5958</a>.</p>
38
+ *
33
39
  * <p>You can use the optional encryption context to add additional security to the encryption
34
40
  * operation. If you specify an <code>EncryptionContext</code>, you must specify the same
35
41
  * encryption context (a case-sensitive exact match) when decrypting the encrypted data key.
36
42
  * Otherwise, the request to decrypt fails with an <code>InvalidCiphertextException</code>. For more information, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#encrypt_context">Encryption Context</a> in the
37
- * <i>AWS Key Management Service Developer Guide</i>.</p>
38
- * <p>The CMK that you use for this operation must be in a compatible key state. For
39
- * details, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-state.html">Key state: Effect on your CMK</a> in the <i>AWS Key Management Service Developer Guide</i>.</p>
43
+ * <i>Key Management Service Developer Guide</i>.</p>
44
+ * <p>The KMS key that you use for this operation must be in a compatible key state. For
45
+ * details, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-state.html">Key state: Effect on your KMS key</a> in the <i>Key Management Service Developer Guide</i>.</p>
40
46
  * <p>
41
- * <b>Cross-account use</b>: Yes. To perform this operation with a CMK in a different AWS account, specify
47
+ * <b>Cross-account use</b>: Yes. To perform this operation with a KMS key in a different Amazon Web Services account, specify
42
48
  * the key ARN or alias ARN in the value of the <code>KeyId</code> parameter.</p>
43
49
  *
44
50
  * <p>
@@ -1 +1 @@
1
- {"version":3,"file":"GenerateDataKeyPairCommand.js","sourceRoot":"","sources":["../../../commands/GenerateDataKeyPairCommand.ts"],"names":[],"mappings":";AACA,OAAO,EAAE,0BAA0B,EAAE,2BAA2B,EAAE,MAAM,oBAAoB,CAAC;AAC7F,OAAO,EACL,gDAAgD,EAChD,8CAA8C,GAC/C,MAAM,0BAA0B,CAAC;AAClC,OAAO,EAAE,cAAc,EAAE,MAAM,2BAA2B,CAAC;AAE3D,OAAO,EAAE,OAAO,IAAI,QAAQ,EAAE,MAAM,wBAAwB,CAAC;AAc7D;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAoFG;AACH;IAAgD,8CAI/C;IACC,oCAAoC;IACpC,kCAAkC;IAElC,oCAAqB,KAAsC;QAA3D;QACE,qCAAqC;QACrC,iBAAO,SAER;QAJoB,WAAK,GAAL,KAAK,CAAiC;;QAGzD,mCAAmC;IACrC,CAAC;IAED;;OAEG;IACH,sDAAiB,GAAjB,UACE,WAAmE,EACnE,aAAsC,EACtC,OAA8B;QAE9B,IAAI,CAAC,eAAe,CAAC,GAAG,CAAC,cAAc,CAAC,aAAa,EAAE,IAAI,CAAC,SAAS,EAAE,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC;QAE1F,IAAM,KAAK,GAAG,WAAW,CAAC,MAAM,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC;QAE/C,IAAA,MAAM,GAAK,aAAa,OAAlB,CAAmB;QACjC,IAAM,UAAU,GAAG,WAAW,CAAC;QAC/B,IAAM,WAAW,GAAG,4BAA4B,CAAC;QACjD,IAAM,uBAAuB,GAA4B;YACvD,MAAM,QAAA;YACN,UAAU,YAAA;YACV,WAAW,aAAA;YACX,uBAAuB,EAAE,0BAA0B,CAAC,kBAAkB;YACtE,wBAAwB,EAAE,2BAA2B,CAAC,kBAAkB;SACzE,CAAC;QACM,IAAA,cAAc,GAAK,aAAa,eAAlB,CAAmB;QACzC,OAAO,KAAK,CAAC,OAAO,CAClB,UAAC,OAAsC;YACrC,OAAA,cAAc,CAAC,MAAM,CAAC,OAAO,CAAC,OAAwB,EAAE,OAAO,IAAI,EAAE,CAAC;QAAtE,CAAsE,EACxE,uBAAuB,CACxB,CAAC;IACJ,CAAC;IAEO,8CAAS,GAAjB,UAAkB,KAAsC,EAAE,OAAuB;QAC/E,OAAO,8CAA8C,CAAC,KAAK,EAAE,OAAO,CAAC,CAAC;IACxE,CAAC;IAEO,gDAAW,GAAnB,UAAoB,MAAsB,EAAE,OAAuB;QACjE,OAAO,gDAAgD,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;IAC3E,CAAC;IAIH,iCAAC;AAAD,CAAC,AAtDD,CAAgD,QAAQ,GAsDvD"}
1
+ {"version":3,"file":"GenerateDataKeyPairCommand.js","sourceRoot":"","sources":["../../../commands/GenerateDataKeyPairCommand.ts"],"names":[],"mappings":";AACA,OAAO,EAAE,0BAA0B,EAAE,2BAA2B,EAAE,MAAM,oBAAoB,CAAC;AAC7F,OAAO,EACL,gDAAgD,EAChD,8CAA8C,GAC/C,MAAM,0BAA0B,CAAC;AAClC,OAAO,EAAE,cAAc,EAAE,MAAM,2BAA2B,CAAC;AAE3D,OAAO,EAAE,OAAO,IAAI,QAAQ,EAAE,MAAM,wBAAwB,CAAC;AAc7D;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA0FG;AACH;IAAgD,8CAI/C;IACC,oCAAoC;IACpC,kCAAkC;IAElC,oCAAqB,KAAsC;QAA3D;QACE,qCAAqC;QACrC,iBAAO,SAER;QAJoB,WAAK,GAAL,KAAK,CAAiC;;QAGzD,mCAAmC;IACrC,CAAC;IAED;;OAEG;IACH,sDAAiB,GAAjB,UACE,WAAmE,EACnE,aAAsC,EACtC,OAA8B;QAE9B,IAAI,CAAC,eAAe,CAAC,GAAG,CAAC,cAAc,CAAC,aAAa,EAAE,IAAI,CAAC,SAAS,EAAE,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC;QAE1F,IAAM,KAAK,GAAG,WAAW,CAAC,MAAM,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC;QAE/C,IAAA,MAAM,GAAK,aAAa,OAAlB,CAAmB;QACjC,IAAM,UAAU,GAAG,WAAW,CAAC;QAC/B,IAAM,WAAW,GAAG,4BAA4B,CAAC;QACjD,IAAM,uBAAuB,GAA4B;YACvD,MAAM,QAAA;YACN,UAAU,YAAA;YACV,WAAW,aAAA;YACX,uBAAuB,EAAE,0BAA0B,CAAC,kBAAkB;YACtE,wBAAwB,EAAE,2BAA2B,CAAC,kBAAkB;SACzE,CAAC;QACM,IAAA,cAAc,GAAK,aAAa,eAAlB,CAAmB;QACzC,OAAO,KAAK,CAAC,OAAO,CAClB,UAAC,OAAsC;YACrC,OAAA,cAAc,CAAC,MAAM,CAAC,OAAO,CAAC,OAAwB,EAAE,OAAO,IAAI,EAAE,CAAC;QAAtE,CAAsE,EACxE,uBAAuB,CACxB,CAAC;IACJ,CAAC;IAEO,8CAAS,GAAjB,UAAkB,KAAsC,EAAE,OAAuB;QAC/E,OAAO,8CAA8C,CAAC,KAAK,EAAE,OAAO,CAAC,CAAC;IACxE,CAAC;IAEO,gDAAW,GAAnB,UAAoB,MAAsB,EAAE,OAAuB;QACjE,OAAO,gDAAgD,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;IAC3E,CAAC;IAIH,iCAAC;AAAD,CAAC,AAtDD,CAAgD,QAAQ,GAsDvD"}
@@ -6,30 +6,34 @@ import { Command as $Command } from "@aws-sdk/smithy-client";
6
6
  /**
7
7
  * <p>Generates a unique asymmetric data key pair. The
8
8
  * <code>GenerateDataKeyPairWithoutPlaintext</code> operation returns a plaintext public key
9
- * and a copy of the private key that is encrypted under the symmetric CMK you specify. Unlike
9
+ * and a copy of the private key that is encrypted under the symmetric KMS key you specify. Unlike
10
10
  * <a>GenerateDataKeyPair</a>, this operation does not return a plaintext private
11
11
  * key. </p>
12
- * <p>To generate a data key pair, you must specify a symmetric customer master key (CMK) to
13
- * encrypt the private key in the data key pair. You cannot use an asymmetric CMK or a CMK in a
14
- * custom key store. To get the type and origin of your CMK, use the <code>KeySpec</code> field
15
- * in the <a>DescribeKey</a> response.</p>
16
12
  * <p>You can use the public key that <code>GenerateDataKeyPairWithoutPlaintext</code> returns
17
- * to encrypt data or verify a signature outside of AWS KMS. Then, store the encrypted private key
13
+ * to encrypt data or verify a signature outside of KMS. Then, store the encrypted private key
18
14
  * with the data. When you are ready to decrypt data or sign a message, you can use the <a>Decrypt</a> operation to decrypt the encrypted private key.</p>
15
+ * <p>To generate a data key pair, you must specify a symmetric KMS key to
16
+ * encrypt the private key in a data key pair. You cannot use an asymmetric KMS key or a KMS key in a
17
+ * custom key store. To get the type and origin of your KMS key, use the <a>DescribeKey</a> operation. </p>
18
+ * <p>Use the <code>KeyPairSpec</code> parameter to choose an RSA or Elliptic Curve (ECC) data
19
+ * key pair. KMS recommends that your use ECC key pairs for signing, and use RSA key pairs
20
+ * for either encryption or signing, but not both. However, KMS cannot enforce any restrictions
21
+ * on the use of data key pairs outside of KMS.</p>
19
22
  * <p>
20
23
  * <code>GenerateDataKeyPairWithoutPlaintext</code> returns a unique data key pair for each
21
- * request. The bytes in the key are not related to the caller or CMK that is used to encrypt the
22
- * private key.</p>
24
+ * request. The bytes in the key are not related to the caller or KMS key that is used to encrypt the
25
+ * private key. The public key is a DER-encoded X.509 SubjectPublicKeyInfo, as specified in
26
+ * <a href="https://tools.ietf.org/html/rfc5280">RFC 5280</a>.</p>
23
27
  *
24
28
  * <p>You can use the optional encryption context to add additional security to the encryption
25
29
  * operation. If you specify an <code>EncryptionContext</code>, you must specify the same
26
30
  * encryption context (a case-sensitive exact match) when decrypting the encrypted data key.
27
31
  * Otherwise, the request to decrypt fails with an <code>InvalidCiphertextException</code>. For more information, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#encrypt_context">Encryption Context</a> in the
28
- * <i>AWS Key Management Service Developer Guide</i>.</p>
29
- * <p>The CMK that you use for this operation must be in a compatible key state. For
30
- * details, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-state.html">Key state: Effect on your CMK</a> in the <i>AWS Key Management Service Developer Guide</i>.</p>
32
+ * <i>Key Management Service Developer Guide</i>.</p>
33
+ * <p>The KMS key that you use for this operation must be in a compatible key state. For
34
+ * details, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-state.html">Key state: Effect on your KMS key</a> in the <i>Key Management Service Developer Guide</i>.</p>
31
35
  * <p>
32
- * <b>Cross-account use</b>: Yes. To perform this operation with a CMK in a different AWS account, specify
36
+ * <b>Cross-account use</b>: Yes. To perform this operation with a KMS key in a different Amazon Web Services account, specify
33
37
  * the key ARN or alias ARN in the value of the <code>KeyId</code> parameter.</p>
34
38
  *
35
39
  * <p>
@@ -1 +1 @@
1
- {"version":3,"file":"GenerateDataKeyPairWithoutPlaintextCommand.js","sourceRoot":"","sources":["../../../commands/GenerateDataKeyPairWithoutPlaintextCommand.ts"],"names":[],"mappings":";AACA,OAAO,EACL,0CAA0C,EAC1C,2CAA2C,GAC5C,MAAM,oBAAoB,CAAC;AAC5B,OAAO,EACL,gEAAgE,EAChE,8DAA8D,GAC/D,MAAM,0BAA0B,CAAC;AAClC,OAAO,EAAE,cAAc,EAAE,MAAM,2BAA2B,CAAC;AAE3D,OAAO,EAAE,OAAO,IAAI,QAAQ,EAAE,MAAM,wBAAwB,CAAC;AAgB7D;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA2EG;AACH;IAAgE,8DAI/D;IACC,oCAAoC;IACpC,kCAAkC;IAElC,oDAAqB,KAAsD;QAA3E;QACE,qCAAqC;QACrC,iBAAO,SAER;QAJoB,WAAK,GAAL,KAAK,CAAiD;;QAGzE,mCAAmC;IACrC,CAAC;IAED;;OAEG;IACH,sEAAiB,GAAjB,UACE,WAAmE,EACnE,aAAsC,EACtC,OAA8B;QAE9B,IAAI,CAAC,eAAe,CAAC,GAAG,CAAC,cAAc,CAAC,aAAa,EAAE,IAAI,CAAC,SAAS,EAAE,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC;QAE1F,IAAM,KAAK,GAAG,WAAW,CAAC,MAAM,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC;QAE/C,IAAA,MAAM,GAAK,aAAa,OAAlB,CAAmB;QACjC,IAAM,UAAU,GAAG,WAAW,CAAC;QAC/B,IAAM,WAAW,GAAG,4CAA4C,CAAC;QACjE,IAAM,uBAAuB,GAA4B;YACvD,MAAM,QAAA;YACN,UAAU,YAAA;YACV,WAAW,aAAA;YACX,uBAAuB,EAAE,0CAA0C,CAAC,kBAAkB;YACtF,wBAAwB,EAAE,2CAA2C,CAAC,kBAAkB;SACzF,CAAC;QACM,IAAA,cAAc,GAAK,aAAa,eAAlB,CAAmB;QACzC,OAAO,KAAK,CAAC,OAAO,CAClB,UAAC,OAAsC;YACrC,OAAA,cAAc,CAAC,MAAM,CAAC,OAAO,CAAC,OAAwB,EAAE,OAAO,IAAI,EAAE,CAAC;QAAtE,CAAsE,EACxE,uBAAuB,CACxB,CAAC;IACJ,CAAC;IAEO,8DAAS,GAAjB,UACE,KAAsD,EACtD,OAAuB;QAEvB,OAAO,8DAA8D,CAAC,KAAK,EAAE,OAAO,CAAC,CAAC;IACxF,CAAC;IAEO,gEAAW,GAAnB,UACE,MAAsB,EACtB,OAAuB;QAEvB,OAAO,gEAAgE,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;IAC3F,CAAC;IAIH,iDAAC;AAAD,CAAC,AA5DD,CAAgE,QAAQ,GA4DvE"}
1
+ {"version":3,"file":"GenerateDataKeyPairWithoutPlaintextCommand.js","sourceRoot":"","sources":["../../../commands/GenerateDataKeyPairWithoutPlaintextCommand.ts"],"names":[],"mappings":";AACA,OAAO,EACL,0CAA0C,EAC1C,2CAA2C,GAC5C,MAAM,oBAAoB,CAAC;AAC5B,OAAO,EACL,gEAAgE,EAChE,8DAA8D,GAC/D,MAAM,0BAA0B,CAAC;AAClC,OAAO,EAAE,cAAc,EAAE,MAAM,2BAA2B,CAAC;AAE3D,OAAO,EAAE,OAAO,IAAI,QAAQ,EAAE,MAAM,wBAAwB,CAAC;AAgB7D;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA+EG;AACH;IAAgE,8DAI/D;IACC,oCAAoC;IACpC,kCAAkC;IAElC,oDAAqB,KAAsD;QAA3E;QACE,qCAAqC;QACrC,iBAAO,SAER;QAJoB,WAAK,GAAL,KAAK,CAAiD;;QAGzE,mCAAmC;IACrC,CAAC;IAED;;OAEG;IACH,sEAAiB,GAAjB,UACE,WAAmE,EACnE,aAAsC,EACtC,OAA8B;QAE9B,IAAI,CAAC,eAAe,CAAC,GAAG,CAAC,cAAc,CAAC,aAAa,EAAE,IAAI,CAAC,SAAS,EAAE,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC;QAE1F,IAAM,KAAK,GAAG,WAAW,CAAC,MAAM,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC;QAE/C,IAAA,MAAM,GAAK,aAAa,OAAlB,CAAmB;QACjC,IAAM,UAAU,GAAG,WAAW,CAAC;QAC/B,IAAM,WAAW,GAAG,4CAA4C,CAAC;QACjE,IAAM,uBAAuB,GAA4B;YACvD,MAAM,QAAA;YACN,UAAU,YAAA;YACV,WAAW,aAAA;YACX,uBAAuB,EAAE,0CAA0C,CAAC,kBAAkB;YACtF,wBAAwB,EAAE,2CAA2C,CAAC,kBAAkB;SACzF,CAAC;QACM,IAAA,cAAc,GAAK,aAAa,eAAlB,CAAmB;QACzC,OAAO,KAAK,CAAC,OAAO,CAClB,UAAC,OAAsC;YACrC,OAAA,cAAc,CAAC,MAAM,CAAC,OAAO,CAAC,OAAwB,EAAE,OAAO,IAAI,EAAE,CAAC;QAAtE,CAAsE,EACxE,uBAAuB,CACxB,CAAC;IACJ,CAAC;IAEO,8DAAS,GAAjB,UACE,KAAsD,EACtD,OAAuB;QAEvB,OAAO,8DAA8D,CAAC,KAAK,EAAE,OAAO,CAAC,CAAC;IACxF,CAAC;IAEO,gEAAW,GAAnB,UACE,MAAsB,EACtB,OAAuB;QAEvB,OAAO,gEAAgE,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;IAC3F,CAAC;IAIH,iDAAC;AAAD,CAAC,AA5DD,CAAgE,QAAQ,GA4DvE"}
@@ -5,7 +5,7 @@ import { getSerdePlugin } from "@aws-sdk/middleware-serde";
5
5
  import { Command as $Command } from "@aws-sdk/smithy-client";
6
6
  /**
7
7
  * <p>Generates a unique symmetric data key. This operation returns a data key that is encrypted
8
- * under a customer master key (CMK) that you specify. To request an asymmetric data key pair,
8
+ * under a KMS key that you specify. To request an asymmetric data key pair,
9
9
  * use the <a>GenerateDataKeyPair</a> or <a>GenerateDataKeyPairWithoutPlaintext</a> operations.</p>
10
10
  * <p>
11
11
  * <code>GenerateDataKeyWithoutPlaintext</code> is identical to the <a>GenerateDataKey</a> operation except that returns only the encrypted copy of the
@@ -21,12 +21,12 @@ import { Command as $Command } from "@aws-sdk/smithy-client";
21
21
  * plaintext data key.</p>
22
22
  * <p>
23
23
  * <code>GenerateDataKeyWithoutPlaintext</code> returns a unique data key for each request.
24
- * The bytes in the keys are not related to the caller or CMK that is used to encrypt the private
24
+ * The bytes in the keys are not related to the caller or KMS key that is used to encrypt the private
25
25
  * key.</p>
26
26
  *
27
- * <p>To generate a data key, you must specify the symmetric customer master key (CMK) that is
28
- * used to encrypt the data key. You cannot use an asymmetric CMK to generate a data key. To get
29
- * the type of your CMK, use the <a>DescribeKey</a> operation.</p>
27
+ * <p>To generate a data key, you must specify the symmetric KMS key that is
28
+ * used to encrypt the data key. You cannot use an asymmetric KMS key to generate a data key. To get
29
+ * the type of your KMS key, use the <a>DescribeKey</a> operation.</p>
30
30
  *
31
31
  * <p>If the operation succeeds, you will find the encrypted copy of the data key in the
32
32
  * <code>CiphertextBlob</code> field.</p>
@@ -35,11 +35,11 @@ import { Command as $Command } from "@aws-sdk/smithy-client";
35
35
  * operation. If you specify an <code>EncryptionContext</code>, you must specify the same
36
36
  * encryption context (a case-sensitive exact match) when decrypting the encrypted data key.
37
37
  * Otherwise, the request to decrypt fails with an <code>InvalidCiphertextException</code>. For more information, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#encrypt_context">Encryption Context</a> in the
38
- * <i>AWS Key Management Service Developer Guide</i>.</p>
39
- * <p>The CMK that you use for this operation must be in a compatible key state. For
40
- * details, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-state.html">Key state: Effect on your CMK</a> in the <i>AWS Key Management Service Developer Guide</i>.</p>
38
+ * <i>Key Management Service Developer Guide</i>.</p>
39
+ * <p>The KMS key that you use for this operation must be in a compatible key state. For
40
+ * details, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-state.html">Key state: Effect on your KMS key</a> in the <i>Key Management Service Developer Guide</i>.</p>
41
41
  * <p>
42
- * <b>Cross-account use</b>: Yes. To perform this operation with a CMK in a different AWS account, specify
42
+ * <b>Cross-account use</b>: Yes. To perform this operation with a KMS key in a different Amazon Web Services account, specify
43
43
  * the key ARN or alias ARN in the value of the <code>KeyId</code> parameter.</p>
44
44
  *
45
45
  * <p>
@@ -5,10 +5,11 @@ import { getSerdePlugin } from "@aws-sdk/middleware-serde";
5
5
  import { Command as $Command } from "@aws-sdk/smithy-client";
6
6
  /**
7
7
  * <p>Returns a random byte string that is cryptographically secure.</p>
8
- * <p>By default, the random byte string is generated in AWS KMS. To generate the byte string in
9
- * the AWS CloudHSM cluster that is associated with a <a href="https://docs.aws.amazon.com/kms/latest/developerguide/custom-key-store-overview.html">custom key store</a>, specify the custom key store
8
+ * <p>By default, the random byte string is generated in KMS. To generate the byte string in
9
+ * the CloudHSM cluster that is associated with a <a href="https://docs.aws.amazon.com/kms/latest/developerguide/custom-key-store-overview.html">custom key store</a>, specify the custom key store
10
10
  * ID.</p>
11
- * <p>For more information about entropy and random number generation, see <a href="https://docs.aws.amazon.com/kms/latest/cryptographic-details/">AWS Key Management Service Cryptographic Details</a>.</p>
11
+ * <p>Applications in Amazon Web Services Nitro Enclaves can call this operation by using the <a href="https://github.com/aws/aws-nitro-enclaves-sdk-c">Amazon Web Services Nitro Enclaves Development Kit</a>. For information about the supporting parameters, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/services-nitro-enclaves.html">How Amazon Web Services Nitro Enclaves use KMS</a> in the <i>Key Management Service Developer Guide</i>.</p>
12
+ * <p>For more information about entropy and random number generation, see <a href="https://docs.aws.amazon.com/kms/latest/cryptographic-details/">Key Management Service Cryptographic Details</a>.</p>
12
13
  *
13
14
  * <p>
14
15
  * <b>Required permissions</b>: <a href="https://docs.aws.amazon.com/kms/latest/developerguide/kms-api-permissions-reference.html">kms:GenerateRandom</a> (IAM policy)</p>
@@ -1 +1 @@
1
- {"version":3,"file":"GenerateRandomCommand.js","sourceRoot":"","sources":["../../../commands/GenerateRandomCommand.ts"],"names":[],"mappings":";AACA,OAAO,EAAE,qBAAqB,EAAE,sBAAsB,EAAE,MAAM,oBAAoB,CAAC;AACnF,OAAO,EACL,2CAA2C,EAC3C,yCAAyC,GAC1C,MAAM,0BAA0B,CAAC;AAClC,OAAO,EAAE,cAAc,EAAE,MAAM,2BAA2B,CAAC;AAE3D,OAAO,EAAE,OAAO,IAAI,QAAQ,EAAE,MAAM,wBAAwB,CAAC;AAc7D;;;;;;;;;;;;;;;;;;;;;;;GAuBG;AACH;IAA2C,yCAI1C;IACC,oCAAoC;IACpC,kCAAkC;IAElC,+BAAqB,KAAiC;QAAtD;QACE,qCAAqC;QACrC,iBAAO,SAER;QAJoB,WAAK,GAAL,KAAK,CAA4B;;QAGpD,mCAAmC;IACrC,CAAC;IAED;;OAEG;IACH,iDAAiB,GAAjB,UACE,WAAmE,EACnE,aAAsC,EACtC,OAA8B;QAE9B,IAAI,CAAC,eAAe,CAAC,GAAG,CAAC,cAAc,CAAC,aAAa,EAAE,IAAI,CAAC,SAAS,EAAE,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC;QAE1F,IAAM,KAAK,GAAG,WAAW,CAAC,MAAM,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC;QAE/C,IAAA,MAAM,GAAK,aAAa,OAAlB,CAAmB;QACjC,IAAM,UAAU,GAAG,WAAW,CAAC;QAC/B,IAAM,WAAW,GAAG,uBAAuB,CAAC;QAC5C,IAAM,uBAAuB,GAA4B;YACvD,MAAM,QAAA;YACN,UAAU,YAAA;YACV,WAAW,aAAA;YACX,uBAAuB,EAAE,qBAAqB,CAAC,kBAAkB;YACjE,wBAAwB,EAAE,sBAAsB,CAAC,kBAAkB;SACpE,CAAC;QACM,IAAA,cAAc,GAAK,aAAa,eAAlB,CAAmB;QACzC,OAAO,KAAK,CAAC,OAAO,CAClB,UAAC,OAAsC;YACrC,OAAA,cAAc,CAAC,MAAM,CAAC,OAAO,CAAC,OAAwB,EAAE,OAAO,IAAI,EAAE,CAAC;QAAtE,CAAsE,EACxE,uBAAuB,CACxB,CAAC;IACJ,CAAC;IAEO,yCAAS,GAAjB,UAAkB,KAAiC,EAAE,OAAuB;QAC1E,OAAO,yCAAyC,CAAC,KAAK,EAAE,OAAO,CAAC,CAAC;IACnE,CAAC;IAEO,2CAAW,GAAnB,UAAoB,MAAsB,EAAE,OAAuB;QACjE,OAAO,2CAA2C,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;IACtE,CAAC;IAIH,4BAAC;AAAD,CAAC,AAtDD,CAA2C,QAAQ,GAsDlD"}
1
+ {"version":3,"file":"GenerateRandomCommand.js","sourceRoot":"","sources":["../../../commands/GenerateRandomCommand.ts"],"names":[],"mappings":";AACA,OAAO,EAAE,qBAAqB,EAAE,sBAAsB,EAAE,MAAM,oBAAoB,CAAC;AACnF,OAAO,EACL,2CAA2C,EAC3C,yCAAyC,GAC1C,MAAM,0BAA0B,CAAC;AAClC,OAAO,EAAE,cAAc,EAAE,MAAM,2BAA2B,CAAC;AAE3D,OAAO,EAAE,OAAO,IAAI,QAAQ,EAAE,MAAM,wBAAwB,CAAC;AAc7D;;;;;;;;;;;;;;;;;;;;;;;;GAwBG;AACH;IAA2C,yCAI1C;IACC,oCAAoC;IACpC,kCAAkC;IAElC,+BAAqB,KAAiC;QAAtD;QACE,qCAAqC;QACrC,iBAAO,SAER;QAJoB,WAAK,GAAL,KAAK,CAA4B;;QAGpD,mCAAmC;IACrC,CAAC;IAED;;OAEG;IACH,iDAAiB,GAAjB,UACE,WAAmE,EACnE,aAAsC,EACtC,OAA8B;QAE9B,IAAI,CAAC,eAAe,CAAC,GAAG,CAAC,cAAc,CAAC,aAAa,EAAE,IAAI,CAAC,SAAS,EAAE,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC;QAE1F,IAAM,KAAK,GAAG,WAAW,CAAC,MAAM,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC;QAE/C,IAAA,MAAM,GAAK,aAAa,OAAlB,CAAmB;QACjC,IAAM,UAAU,GAAG,WAAW,CAAC;QAC/B,IAAM,WAAW,GAAG,uBAAuB,CAAC;QAC5C,IAAM,uBAAuB,GAA4B;YACvD,MAAM,QAAA;YACN,UAAU,YAAA;YACV,WAAW,aAAA;YACX,uBAAuB,EAAE,qBAAqB,CAAC,kBAAkB;YACjE,wBAAwB,EAAE,sBAAsB,CAAC,kBAAkB;SACpE,CAAC;QACM,IAAA,cAAc,GAAK,aAAa,eAAlB,CAAmB;QACzC,OAAO,KAAK,CAAC,OAAO,CAClB,UAAC,OAAsC;YACrC,OAAA,cAAc,CAAC,MAAM,CAAC,OAAO,CAAC,OAAwB,EAAE,OAAO,IAAI,EAAE,CAAC;QAAtE,CAAsE,EACxE,uBAAuB,CACxB,CAAC;IACJ,CAAC;IAEO,yCAAS,GAAjB,UAAkB,KAAiC,EAAE,OAAuB;QAC1E,OAAO,yCAAyC,CAAC,KAAK,EAAE,OAAO,CAAC,CAAC;IACnE,CAAC;IAEO,2CAAW,GAAnB,UAAoB,MAAsB,EAAE,OAAuB;QACjE,OAAO,2CAA2C,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;IACtE,CAAC;IAIH,4BAAC;AAAD,CAAC,AAtDD,CAA2C,QAAQ,GAsDlD"}
@@ -4,9 +4,9 @@ import { deserializeAws_json1_1GetKeyPolicyCommand, serializeAws_json1_1GetKeyPo
4
4
  import { getSerdePlugin } from "@aws-sdk/middleware-serde";
5
5
  import { Command as $Command } from "@aws-sdk/smithy-client";
6
6
  /**
7
- * <p>Gets a key policy attached to the specified customer master key (CMK).</p>
7
+ * <p>Gets a key policy attached to the specified KMS key.</p>
8
8
  * <p>
9
- * <b>Cross-account use</b>: No. You cannot perform this operation on a CMK in a different AWS account.</p>
9
+ * <b>Cross-account use</b>: No. You cannot perform this operation on a KMS key in a different Amazon Web Services account.</p>
10
10
  *
11
11
  * <p>
12
12
  * <b>Required permissions</b>: <a href="https://docs.aws.amazon.com/kms/latest/developerguide/kms-api-permissions-reference.html">kms:GetKeyPolicy</a> (key policy)</p>
@@ -5,23 +5,23 @@ import { getSerdePlugin } from "@aws-sdk/middleware-serde";
5
5
  import { Command as $Command } from "@aws-sdk/smithy-client";
6
6
  /**
7
7
  * <p>Gets a Boolean value that indicates whether <a href="https://docs.aws.amazon.com/kms/latest/developerguide/rotate-keys.html">automatic rotation of the key material</a> is
8
- * enabled for the specified customer master key (CMK).</p>
9
- * <p>You cannot enable automatic rotation of <a href="https://docs.aws.amazon.com/kms/latest/developerguide/symm-asymm-concepts.html#asymmetric-cmks">asymmetric CMKs</a>, CMKs with <a href="https://docs.aws.amazon.com/kms/latest/developerguide/importing-keys.html">imported key material</a>, or CMKs in a <a href="https://docs.aws.amazon.com/kms/latest/developerguide/custom-key-store-overview.html">custom key store</a>. To enable or disable automatic rotation of a set of related <a href="https://docs.aws.amazon.com/kms/latest/developerguide/multi-region-keys-overview.html#mrk-replica-key">multi-Region keys</a>, set the property on the primary key. The key rotation status for these CMKs is always <code>false</code>.</p>
10
- * <p>The CMK that you use for this operation must be in a compatible key state. For
11
- * details, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-state.html">Key state: Effect on your CMK</a> in the <i>AWS Key Management Service Developer Guide</i>.</p>
8
+ * enabled for the specified KMS key.</p>
9
+ * <p>You cannot enable automatic rotation of <a href="https://docs.aws.amazon.com/kms/latest/developerguide/symm-asymm-concepts.html#asymmetric-cmks">asymmetric KMS keys</a>, KMS keys with <a href="https://docs.aws.amazon.com/kms/latest/developerguide/importing-keys.html">imported key material</a>, or KMS keys in a <a href="https://docs.aws.amazon.com/kms/latest/developerguide/custom-key-store-overview.html">custom key store</a>. To enable or disable automatic rotation of a set of related <a href="https://docs.aws.amazon.com/kms/latest/developerguide/multi-region-keys-overview.html#mrk-replica-key">multi-Region keys</a>, set the property on the primary key. The key rotation status for these KMS keys is always <code>false</code>.</p>
10
+ * <p>The KMS key that you use for this operation must be in a compatible key state. For
11
+ * details, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-state.html">Key state: Effect on your KMS key</a> in the <i>Key Management Service Developer Guide</i>.</p>
12
12
  * <ul>
13
13
  * <li>
14
- * <p>Disabled: The key rotation status does not change when you disable a CMK. However,
15
- * while the CMK is disabled, AWS KMS does not rotate the backing key.</p>
14
+ * <p>Disabled: The key rotation status does not change when you disable a KMS key. However,
15
+ * while the KMS key is disabled, KMS does not rotate the key material.</p>
16
16
  * </li>
17
17
  * <li>
18
- * <p>Pending deletion: While a CMK is pending deletion, its key rotation status is
19
- * <code>false</code> and AWS KMS does not rotate the backing key. If you cancel the
18
+ * <p>Pending deletion: While a KMS key is pending deletion, its key rotation status is
19
+ * <code>false</code> and KMS does not rotate the key material. If you cancel the
20
20
  * deletion, the original key rotation status is restored.</p>
21
21
  * </li>
22
22
  * </ul>
23
23
  * <p>
24
- * <b>Cross-account use</b>: Yes. To perform this operation on a CMK in a different AWS account, specify the key
24
+ * <b>Cross-account use</b>: Yes. To perform this operation on a KMS key in a different Amazon Web Services account, specify the key
25
25
  * ARN in the value of the <code>KeyId</code> parameter.</p>
26
26
  *
27
27
  * <p>