@aws-sdk/client-kms 3.300.0 → 3.303.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist-cjs/models/models_0.js +166 -187
- package/dist-es/models/models_0.js +166 -187
- package/dist-types/commands/CancelKeyDeletionCommand.d.ts +1 -1
- package/dist-types/commands/ConnectCustomKeyStoreCommand.d.ts +1 -1
- package/dist-types/commands/CreateAliasCommand.d.ts +1 -1
- package/dist-types/commands/CreateCustomKeyStoreCommand.d.ts +2 -2
- package/dist-types/commands/CreateGrantCommand.d.ts +5 -5
- package/dist-types/commands/CreateKeyCommand.d.ts +3 -3
- package/dist-types/commands/DecryptCommand.d.ts +3 -3
- package/dist-types/commands/DeleteAliasCommand.d.ts +1 -1
- package/dist-types/commands/DeleteCustomKeyStoreCommand.d.ts +1 -1
- package/dist-types/commands/DeleteImportedKeyMaterialCommand.d.ts +1 -1
- package/dist-types/commands/DescribeCustomKeyStoresCommand.d.ts +1 -1
- package/dist-types/commands/DescribeKeyCommand.d.ts +2 -2
- package/dist-types/commands/DisableKeyCommand.d.ts +1 -1
- package/dist-types/commands/DisableKeyRotationCommand.d.ts +1 -1
- package/dist-types/commands/DisconnectCustomKeyStoreCommand.d.ts +1 -1
- package/dist-types/commands/EnableKeyCommand.d.ts +1 -1
- package/dist-types/commands/EnableKeyRotationCommand.d.ts +1 -1
- package/dist-types/commands/EncryptCommand.d.ts +3 -3
- package/dist-types/commands/GenerateDataKeyCommand.d.ts +3 -3
- package/dist-types/commands/GenerateDataKeyPairCommand.d.ts +3 -3
- package/dist-types/commands/GenerateDataKeyPairWithoutPlaintextCommand.d.ts +3 -3
- package/dist-types/commands/GenerateDataKeyWithoutPlaintextCommand.d.ts +3 -3
- package/dist-types/commands/GenerateMacCommand.d.ts +2 -2
- package/dist-types/commands/GenerateRandomCommand.d.ts +1 -1
- package/dist-types/commands/GetKeyPolicyCommand.d.ts +1 -1
- package/dist-types/commands/GetKeyRotationStatusCommand.d.ts +1 -1
- package/dist-types/commands/GetParametersForImportCommand.d.ts +1 -1
- package/dist-types/commands/GetPublicKeyCommand.d.ts +2 -2
- package/dist-types/commands/ImportKeyMaterialCommand.d.ts +1 -1
- package/dist-types/commands/ListAliasesCommand.d.ts +1 -1
- package/dist-types/commands/ListGrantsCommand.d.ts +1 -1
- package/dist-types/commands/ListKeyPoliciesCommand.d.ts +1 -1
- package/dist-types/commands/ListKeysCommand.d.ts +1 -1
- package/dist-types/commands/ListResourceTagsCommand.d.ts +1 -1
- package/dist-types/commands/ListRetirableGrantsCommand.d.ts +1 -1
- package/dist-types/commands/PutKeyPolicyCommand.d.ts +1 -1
- package/dist-types/commands/ReEncryptCommand.d.ts +3 -3
- package/dist-types/commands/ReplicateKeyCommand.d.ts +3 -3
- package/dist-types/commands/RetireGrantCommand.d.ts +1 -1
- package/dist-types/commands/RevokeGrantCommand.d.ts +1 -1
- package/dist-types/commands/ScheduleKeyDeletionCommand.d.ts +1 -1
- package/dist-types/commands/SignCommand.d.ts +2 -2
- package/dist-types/commands/TagResourceCommand.d.ts +3 -3
- package/dist-types/commands/UntagResourceCommand.d.ts +2 -2
- package/dist-types/commands/UpdateAliasCommand.d.ts +1 -1
- package/dist-types/commands/UpdateCustomKeyStoreCommand.d.ts +2 -2
- package/dist-types/commands/UpdateKeyDescriptionCommand.d.ts +1 -1
- package/dist-types/commands/UpdatePrimaryRegionCommand.d.ts +1 -1
- package/dist-types/commands/VerifyCommand.d.ts +2 -2
- package/dist-types/commands/VerifyMacCommand.d.ts +2 -2
- package/dist-types/models/models_0.d.ts +271 -166
- package/dist-types/ts3.4/models/models_0.d.ts +201 -166
- package/package.json +34 -34
|
@@ -4,12 +4,11 @@ exports.XksKeyInvalidConfigurationException = exports.XksKeyAlreadyInUseExceptio
|
|
|
4
4
|
exports.VerifyMacRequestFilterSensitiveLog = exports.VerifyRequestFilterSensitiveLog = exports.UpdateCustomKeyStoreRequestFilterSensitiveLog = exports.SignRequestFilterSensitiveLog = exports.GetParametersForImportResponseFilterSensitiveLog = exports.GenerateRandomResponseFilterSensitiveLog = exports.GenerateMacRequestFilterSensitiveLog = exports.GenerateDataKeyPairResponseFilterSensitiveLog = exports.GenerateDataKeyResponseFilterSensitiveLog = exports.EncryptRequestFilterSensitiveLog = exports.DescribeCustomKeyStoresResponseFilterSensitiveLog = exports.DecryptResponseFilterSensitiveLog = exports.CustomKeyStoresListEntryFilterSensitiveLog = exports.XksProxyConfigurationTypeFilterSensitiveLog = exports.CreateCustomKeyStoreRequestFilterSensitiveLog = exports.XksProxyAuthenticationCredentialTypeFilterSensitiveLog = exports.MessageType = exports.KMSInvalidSignatureException = exports.KMSInvalidMacException = exports.InvalidGrantIdException = exports.InvalidImportTokenException = exports.IncorrectKeyMaterialException = exports.WrappingKeySpec = exports.ExpiredImportTokenException = exports.InvalidMarkerException = exports.KeyUnavailableException = exports.InvalidKeyUsageException = exports.InvalidCiphertextException = exports.IncorrectKeyException = exports.DataKeySpec = exports.DataKeyPairSpec = exports.CustomKeyStoreHasCMKsException = exports.XksKeyNotFoundException = void 0;
|
|
5
5
|
const smithy_client_1 = require("@aws-sdk/smithy-client");
|
|
6
6
|
const KMSServiceException_1 = require("./KMSServiceException");
|
|
7
|
-
|
|
8
|
-
|
|
9
|
-
|
|
10
|
-
|
|
11
|
-
|
|
12
|
-
})(AlgorithmSpec = exports.AlgorithmSpec || (exports.AlgorithmSpec = {}));
|
|
7
|
+
exports.AlgorithmSpec = {
|
|
8
|
+
RSAES_OAEP_SHA_1: "RSAES_OAEP_SHA_1",
|
|
9
|
+
RSAES_OAEP_SHA_256: "RSAES_OAEP_SHA_256",
|
|
10
|
+
RSAES_PKCS1_V1_5: "RSAES_PKCS1_V1_5",
|
|
11
|
+
};
|
|
13
12
|
class AlreadyExistsException extends KMSServiceException_1.KMSServiceException {
|
|
14
13
|
constructor(opts) {
|
|
15
14
|
super({
|
|
@@ -179,35 +178,33 @@ class CustomKeyStoreNotFoundException extends KMSServiceException_1.KMSServiceEx
|
|
|
179
178
|
}
|
|
180
179
|
}
|
|
181
180
|
exports.CustomKeyStoreNotFoundException = CustomKeyStoreNotFoundException;
|
|
182
|
-
|
|
183
|
-
|
|
184
|
-
|
|
185
|
-
|
|
186
|
-
|
|
187
|
-
|
|
188
|
-
|
|
189
|
-
|
|
190
|
-
|
|
191
|
-
|
|
192
|
-
|
|
193
|
-
|
|
194
|
-
|
|
195
|
-
|
|
196
|
-
|
|
197
|
-
|
|
198
|
-
|
|
199
|
-
|
|
200
|
-
|
|
201
|
-
|
|
202
|
-
|
|
203
|
-
|
|
204
|
-
|
|
205
|
-
|
|
206
|
-
|
|
207
|
-
|
|
208
|
-
|
|
209
|
-
ConnectionStateType["FAILED"] = "FAILED";
|
|
210
|
-
})(ConnectionStateType = exports.ConnectionStateType || (exports.ConnectionStateType = {}));
|
|
181
|
+
exports.ConnectionErrorCodeType = {
|
|
182
|
+
CLUSTER_NOT_FOUND: "CLUSTER_NOT_FOUND",
|
|
183
|
+
INSUFFICIENT_CLOUDHSM_HSMS: "INSUFFICIENT_CLOUDHSM_HSMS",
|
|
184
|
+
INSUFFICIENT_FREE_ADDRESSES_IN_SUBNET: "INSUFFICIENT_FREE_ADDRESSES_IN_SUBNET",
|
|
185
|
+
INTERNAL_ERROR: "INTERNAL_ERROR",
|
|
186
|
+
INVALID_CREDENTIALS: "INVALID_CREDENTIALS",
|
|
187
|
+
NETWORK_ERRORS: "NETWORK_ERRORS",
|
|
188
|
+
SUBNET_NOT_FOUND: "SUBNET_NOT_FOUND",
|
|
189
|
+
USER_LOCKED_OUT: "USER_LOCKED_OUT",
|
|
190
|
+
USER_LOGGED_IN: "USER_LOGGED_IN",
|
|
191
|
+
USER_NOT_FOUND: "USER_NOT_FOUND",
|
|
192
|
+
XKS_PROXY_ACCESS_DENIED: "XKS_PROXY_ACCESS_DENIED",
|
|
193
|
+
XKS_PROXY_INVALID_CONFIGURATION: "XKS_PROXY_INVALID_CONFIGURATION",
|
|
194
|
+
XKS_PROXY_INVALID_RESPONSE: "XKS_PROXY_INVALID_RESPONSE",
|
|
195
|
+
XKS_PROXY_INVALID_TLS_CONFIGURATION: "XKS_PROXY_INVALID_TLS_CONFIGURATION",
|
|
196
|
+
XKS_PROXY_NOT_REACHABLE: "XKS_PROXY_NOT_REACHABLE",
|
|
197
|
+
XKS_PROXY_TIMED_OUT: "XKS_PROXY_TIMED_OUT",
|
|
198
|
+
XKS_VPC_ENDPOINT_SERVICE_INVALID_CONFIGURATION: "XKS_VPC_ENDPOINT_SERVICE_INVALID_CONFIGURATION",
|
|
199
|
+
XKS_VPC_ENDPOINT_SERVICE_NOT_FOUND: "XKS_VPC_ENDPOINT_SERVICE_NOT_FOUND",
|
|
200
|
+
};
|
|
201
|
+
exports.ConnectionStateType = {
|
|
202
|
+
CONNECTED: "CONNECTED",
|
|
203
|
+
CONNECTING: "CONNECTING",
|
|
204
|
+
DISCONNECTED: "DISCONNECTED",
|
|
205
|
+
DISCONNECTING: "DISCONNECTING",
|
|
206
|
+
FAILED: "FAILED",
|
|
207
|
+
};
|
|
211
208
|
class InvalidAliasNameException extends KMSServiceException_1.KMSServiceException {
|
|
212
209
|
constructor(opts) {
|
|
213
210
|
super({
|
|
@@ -234,16 +231,14 @@ class LimitExceededException extends KMSServiceException_1.KMSServiceException {
|
|
|
234
231
|
}
|
|
235
232
|
}
|
|
236
233
|
exports.LimitExceededException = LimitExceededException;
|
|
237
|
-
|
|
238
|
-
|
|
239
|
-
|
|
240
|
-
|
|
241
|
-
|
|
242
|
-
|
|
243
|
-
|
|
244
|
-
|
|
245
|
-
XksProxyConnectivityType["VPC_ENDPOINT_SERVICE"] = "VPC_ENDPOINT_SERVICE";
|
|
246
|
-
})(XksProxyConnectivityType = exports.XksProxyConnectivityType || (exports.XksProxyConnectivityType = {}));
|
|
234
|
+
exports.CustomKeyStoreType = {
|
|
235
|
+
AWS_CLOUDHSM: "AWS_CLOUDHSM",
|
|
236
|
+
EXTERNAL_KEY_STORE: "EXTERNAL_KEY_STORE",
|
|
237
|
+
};
|
|
238
|
+
exports.XksProxyConnectivityType = {
|
|
239
|
+
PUBLIC_ENDPOINT: "PUBLIC_ENDPOINT",
|
|
240
|
+
VPC_ENDPOINT_SERVICE: "VPC_ENDPOINT_SERVICE",
|
|
241
|
+
};
|
|
247
242
|
class CustomKeyStoreNameInUseException extends KMSServiceException_1.KMSServiceException {
|
|
248
243
|
constructor(opts) {
|
|
249
244
|
super({
|
|
@@ -387,25 +382,24 @@ class XksProxyVpcEndpointServiceNotFoundException extends KMSServiceException_1.
|
|
|
387
382
|
}
|
|
388
383
|
}
|
|
389
384
|
exports.XksProxyVpcEndpointServiceNotFoundException = XksProxyVpcEndpointServiceNotFoundException;
|
|
390
|
-
|
|
391
|
-
|
|
392
|
-
|
|
393
|
-
|
|
394
|
-
|
|
395
|
-
|
|
396
|
-
|
|
397
|
-
|
|
398
|
-
|
|
399
|
-
|
|
400
|
-
|
|
401
|
-
|
|
402
|
-
|
|
403
|
-
|
|
404
|
-
|
|
405
|
-
|
|
406
|
-
|
|
407
|
-
|
|
408
|
-
})(GrantOperation = exports.GrantOperation || (exports.GrantOperation = {}));
|
|
385
|
+
exports.GrantOperation = {
|
|
386
|
+
CreateGrant: "CreateGrant",
|
|
387
|
+
Decrypt: "Decrypt",
|
|
388
|
+
DescribeKey: "DescribeKey",
|
|
389
|
+
Encrypt: "Encrypt",
|
|
390
|
+
GenerateDataKey: "GenerateDataKey",
|
|
391
|
+
GenerateDataKeyPair: "GenerateDataKeyPair",
|
|
392
|
+
GenerateDataKeyPairWithoutPlaintext: "GenerateDataKeyPairWithoutPlaintext",
|
|
393
|
+
GenerateDataKeyWithoutPlaintext: "GenerateDataKeyWithoutPlaintext",
|
|
394
|
+
GenerateMac: "GenerateMac",
|
|
395
|
+
GetPublicKey: "GetPublicKey",
|
|
396
|
+
ReEncryptFrom: "ReEncryptFrom",
|
|
397
|
+
ReEncryptTo: "ReEncryptTo",
|
|
398
|
+
RetireGrant: "RetireGrant",
|
|
399
|
+
Sign: "Sign",
|
|
400
|
+
Verify: "Verify",
|
|
401
|
+
VerifyMac: "VerifyMac",
|
|
402
|
+
};
|
|
409
403
|
class DisabledException extends KMSServiceException_1.KMSServiceException {
|
|
410
404
|
constructor(opts) {
|
|
411
405
|
super({
|
|
@@ -432,104 +426,93 @@ class InvalidGrantTokenException extends KMSServiceException_1.KMSServiceExcepti
|
|
|
432
426
|
}
|
|
433
427
|
}
|
|
434
428
|
exports.InvalidGrantTokenException = InvalidGrantTokenException;
|
|
435
|
-
|
|
436
|
-
|
|
437
|
-
|
|
438
|
-
|
|
439
|
-
|
|
440
|
-
|
|
441
|
-
|
|
442
|
-
|
|
443
|
-
|
|
444
|
-
|
|
445
|
-
|
|
446
|
-
|
|
447
|
-
|
|
448
|
-
|
|
449
|
-
|
|
450
|
-
|
|
451
|
-
|
|
452
|
-
|
|
453
|
-
|
|
454
|
-
|
|
455
|
-
|
|
456
|
-
|
|
457
|
-
|
|
458
|
-
|
|
459
|
-
|
|
460
|
-
|
|
461
|
-
|
|
462
|
-
|
|
463
|
-
|
|
464
|
-
|
|
465
|
-
|
|
466
|
-
|
|
467
|
-
|
|
468
|
-
|
|
469
|
-
|
|
470
|
-
|
|
471
|
-
|
|
472
|
-
|
|
473
|
-
|
|
474
|
-
|
|
475
|
-
|
|
476
|
-
|
|
477
|
-
|
|
478
|
-
|
|
479
|
-
|
|
480
|
-
|
|
481
|
-
|
|
482
|
-
|
|
483
|
-
|
|
484
|
-
|
|
485
|
-
|
|
486
|
-
|
|
487
|
-
|
|
488
|
-
|
|
489
|
-
|
|
490
|
-
|
|
491
|
-
|
|
492
|
-
|
|
493
|
-
|
|
494
|
-
|
|
495
|
-
|
|
496
|
-
|
|
497
|
-
|
|
498
|
-
|
|
499
|
-
|
|
500
|
-
|
|
501
|
-
|
|
502
|
-
|
|
503
|
-
|
|
504
|
-
|
|
505
|
-
|
|
506
|
-
|
|
507
|
-
|
|
508
|
-
|
|
509
|
-
|
|
510
|
-
|
|
511
|
-
|
|
512
|
-
|
|
513
|
-
|
|
514
|
-
|
|
515
|
-
|
|
516
|
-
|
|
517
|
-
|
|
518
|
-
|
|
519
|
-
|
|
520
|
-
|
|
521
|
-
|
|
522
|
-
SigningAlgorithmSpec["ECDSA_SHA_256"] = "ECDSA_SHA_256";
|
|
523
|
-
SigningAlgorithmSpec["ECDSA_SHA_384"] = "ECDSA_SHA_384";
|
|
524
|
-
SigningAlgorithmSpec["ECDSA_SHA_512"] = "ECDSA_SHA_512";
|
|
525
|
-
SigningAlgorithmSpec["RSASSA_PKCS1_V1_5_SHA_256"] = "RSASSA_PKCS1_V1_5_SHA_256";
|
|
526
|
-
SigningAlgorithmSpec["RSASSA_PKCS1_V1_5_SHA_384"] = "RSASSA_PKCS1_V1_5_SHA_384";
|
|
527
|
-
SigningAlgorithmSpec["RSASSA_PKCS1_V1_5_SHA_512"] = "RSASSA_PKCS1_V1_5_SHA_512";
|
|
528
|
-
SigningAlgorithmSpec["RSASSA_PSS_SHA_256"] = "RSASSA_PSS_SHA_256";
|
|
529
|
-
SigningAlgorithmSpec["RSASSA_PSS_SHA_384"] = "RSASSA_PSS_SHA_384";
|
|
530
|
-
SigningAlgorithmSpec["RSASSA_PSS_SHA_512"] = "RSASSA_PSS_SHA_512";
|
|
531
|
-
SigningAlgorithmSpec["SM2DSA"] = "SM2DSA";
|
|
532
|
-
})(SigningAlgorithmSpec = exports.SigningAlgorithmSpec || (exports.SigningAlgorithmSpec = {}));
|
|
429
|
+
exports.CustomerMasterKeySpec = {
|
|
430
|
+
ECC_NIST_P256: "ECC_NIST_P256",
|
|
431
|
+
ECC_NIST_P384: "ECC_NIST_P384",
|
|
432
|
+
ECC_NIST_P521: "ECC_NIST_P521",
|
|
433
|
+
ECC_SECG_P256K1: "ECC_SECG_P256K1",
|
|
434
|
+
HMAC_224: "HMAC_224",
|
|
435
|
+
HMAC_256: "HMAC_256",
|
|
436
|
+
HMAC_384: "HMAC_384",
|
|
437
|
+
HMAC_512: "HMAC_512",
|
|
438
|
+
RSA_2048: "RSA_2048",
|
|
439
|
+
RSA_3072: "RSA_3072",
|
|
440
|
+
RSA_4096: "RSA_4096",
|
|
441
|
+
SM2: "SM2",
|
|
442
|
+
SYMMETRIC_DEFAULT: "SYMMETRIC_DEFAULT",
|
|
443
|
+
};
|
|
444
|
+
exports.KeySpec = {
|
|
445
|
+
ECC_NIST_P256: "ECC_NIST_P256",
|
|
446
|
+
ECC_NIST_P384: "ECC_NIST_P384",
|
|
447
|
+
ECC_NIST_P521: "ECC_NIST_P521",
|
|
448
|
+
ECC_SECG_P256K1: "ECC_SECG_P256K1",
|
|
449
|
+
HMAC_224: "HMAC_224",
|
|
450
|
+
HMAC_256: "HMAC_256",
|
|
451
|
+
HMAC_384: "HMAC_384",
|
|
452
|
+
HMAC_512: "HMAC_512",
|
|
453
|
+
RSA_2048: "RSA_2048",
|
|
454
|
+
RSA_3072: "RSA_3072",
|
|
455
|
+
RSA_4096: "RSA_4096",
|
|
456
|
+
SM2: "SM2",
|
|
457
|
+
SYMMETRIC_DEFAULT: "SYMMETRIC_DEFAULT",
|
|
458
|
+
};
|
|
459
|
+
exports.KeyUsageType = {
|
|
460
|
+
ENCRYPT_DECRYPT: "ENCRYPT_DECRYPT",
|
|
461
|
+
GENERATE_VERIFY_MAC: "GENERATE_VERIFY_MAC",
|
|
462
|
+
SIGN_VERIFY: "SIGN_VERIFY",
|
|
463
|
+
};
|
|
464
|
+
exports.OriginType = {
|
|
465
|
+
AWS_CLOUDHSM: "AWS_CLOUDHSM",
|
|
466
|
+
AWS_KMS: "AWS_KMS",
|
|
467
|
+
EXTERNAL: "EXTERNAL",
|
|
468
|
+
EXTERNAL_KEY_STORE: "EXTERNAL_KEY_STORE",
|
|
469
|
+
};
|
|
470
|
+
exports.EncryptionAlgorithmSpec = {
|
|
471
|
+
RSAES_OAEP_SHA_1: "RSAES_OAEP_SHA_1",
|
|
472
|
+
RSAES_OAEP_SHA_256: "RSAES_OAEP_SHA_256",
|
|
473
|
+
SM2PKE: "SM2PKE",
|
|
474
|
+
SYMMETRIC_DEFAULT: "SYMMETRIC_DEFAULT",
|
|
475
|
+
};
|
|
476
|
+
exports.ExpirationModelType = {
|
|
477
|
+
KEY_MATERIAL_DOES_NOT_EXPIRE: "KEY_MATERIAL_DOES_NOT_EXPIRE",
|
|
478
|
+
KEY_MATERIAL_EXPIRES: "KEY_MATERIAL_EXPIRES",
|
|
479
|
+
};
|
|
480
|
+
exports.KeyManagerType = {
|
|
481
|
+
AWS: "AWS",
|
|
482
|
+
CUSTOMER: "CUSTOMER",
|
|
483
|
+
};
|
|
484
|
+
exports.KeyState = {
|
|
485
|
+
Creating: "Creating",
|
|
486
|
+
Disabled: "Disabled",
|
|
487
|
+
Enabled: "Enabled",
|
|
488
|
+
PendingDeletion: "PendingDeletion",
|
|
489
|
+
PendingImport: "PendingImport",
|
|
490
|
+
PendingReplicaDeletion: "PendingReplicaDeletion",
|
|
491
|
+
Unavailable: "Unavailable",
|
|
492
|
+
Updating: "Updating",
|
|
493
|
+
};
|
|
494
|
+
exports.MacAlgorithmSpec = {
|
|
495
|
+
HMAC_SHA_224: "HMAC_SHA_224",
|
|
496
|
+
HMAC_SHA_256: "HMAC_SHA_256",
|
|
497
|
+
HMAC_SHA_384: "HMAC_SHA_384",
|
|
498
|
+
HMAC_SHA_512: "HMAC_SHA_512",
|
|
499
|
+
};
|
|
500
|
+
exports.MultiRegionKeyType = {
|
|
501
|
+
PRIMARY: "PRIMARY",
|
|
502
|
+
REPLICA: "REPLICA",
|
|
503
|
+
};
|
|
504
|
+
exports.SigningAlgorithmSpec = {
|
|
505
|
+
ECDSA_SHA_256: "ECDSA_SHA_256",
|
|
506
|
+
ECDSA_SHA_384: "ECDSA_SHA_384",
|
|
507
|
+
ECDSA_SHA_512: "ECDSA_SHA_512",
|
|
508
|
+
RSASSA_PKCS1_V1_5_SHA_256: "RSASSA_PKCS1_V1_5_SHA_256",
|
|
509
|
+
RSASSA_PKCS1_V1_5_SHA_384: "RSASSA_PKCS1_V1_5_SHA_384",
|
|
510
|
+
RSASSA_PKCS1_V1_5_SHA_512: "RSASSA_PKCS1_V1_5_SHA_512",
|
|
511
|
+
RSASSA_PSS_SHA_256: "RSASSA_PSS_SHA_256",
|
|
512
|
+
RSASSA_PSS_SHA_384: "RSASSA_PSS_SHA_384",
|
|
513
|
+
RSASSA_PSS_SHA_512: "RSASSA_PSS_SHA_512",
|
|
514
|
+
SM2DSA: "SM2DSA",
|
|
515
|
+
};
|
|
533
516
|
class MalformedPolicyDocumentException extends KMSServiceException_1.KMSServiceException {
|
|
534
517
|
constructor(opts) {
|
|
535
518
|
super({
|
|
@@ -621,22 +604,20 @@ class CustomKeyStoreHasCMKsException extends KMSServiceException_1.KMSServiceExc
|
|
|
621
604
|
}
|
|
622
605
|
}
|
|
623
606
|
exports.CustomKeyStoreHasCMKsException = CustomKeyStoreHasCMKsException;
|
|
624
|
-
|
|
625
|
-
|
|
626
|
-
|
|
627
|
-
|
|
628
|
-
|
|
629
|
-
|
|
630
|
-
|
|
631
|
-
|
|
632
|
-
|
|
633
|
-
|
|
634
|
-
|
|
635
|
-
|
|
636
|
-
|
|
637
|
-
|
|
638
|
-
DataKeySpec["AES_256"] = "AES_256";
|
|
639
|
-
})(DataKeySpec = exports.DataKeySpec || (exports.DataKeySpec = {}));
|
|
607
|
+
exports.DataKeyPairSpec = {
|
|
608
|
+
ECC_NIST_P256: "ECC_NIST_P256",
|
|
609
|
+
ECC_NIST_P384: "ECC_NIST_P384",
|
|
610
|
+
ECC_NIST_P521: "ECC_NIST_P521",
|
|
611
|
+
ECC_SECG_P256K1: "ECC_SECG_P256K1",
|
|
612
|
+
RSA_2048: "RSA_2048",
|
|
613
|
+
RSA_3072: "RSA_3072",
|
|
614
|
+
RSA_4096: "RSA_4096",
|
|
615
|
+
SM2: "SM2",
|
|
616
|
+
};
|
|
617
|
+
exports.DataKeySpec = {
|
|
618
|
+
AES_128: "AES_128",
|
|
619
|
+
AES_256: "AES_256",
|
|
620
|
+
};
|
|
640
621
|
class IncorrectKeyException extends KMSServiceException_1.KMSServiceException {
|
|
641
622
|
constructor(opts) {
|
|
642
623
|
super({
|
|
@@ -715,10 +696,9 @@ class ExpiredImportTokenException extends KMSServiceException_1.KMSServiceExcept
|
|
|
715
696
|
}
|
|
716
697
|
}
|
|
717
698
|
exports.ExpiredImportTokenException = ExpiredImportTokenException;
|
|
718
|
-
|
|
719
|
-
|
|
720
|
-
|
|
721
|
-
})(WrappingKeySpec = exports.WrappingKeySpec || (exports.WrappingKeySpec = {}));
|
|
699
|
+
exports.WrappingKeySpec = {
|
|
700
|
+
RSA_2048: "RSA_2048",
|
|
701
|
+
};
|
|
722
702
|
class IncorrectKeyMaterialException extends KMSServiceException_1.KMSServiceException {
|
|
723
703
|
constructor(opts) {
|
|
724
704
|
super({
|
|
@@ -784,11 +764,10 @@ class KMSInvalidSignatureException extends KMSServiceException_1.KMSServiceExcep
|
|
|
784
764
|
}
|
|
785
765
|
}
|
|
786
766
|
exports.KMSInvalidSignatureException = KMSInvalidSignatureException;
|
|
787
|
-
|
|
788
|
-
|
|
789
|
-
|
|
790
|
-
|
|
791
|
-
})(MessageType = exports.MessageType || (exports.MessageType = {}));
|
|
767
|
+
exports.MessageType = {
|
|
768
|
+
DIGEST: "DIGEST",
|
|
769
|
+
RAW: "RAW",
|
|
770
|
+
};
|
|
792
771
|
const XksProxyAuthenticationCredentialTypeFilterSensitiveLog = (obj) => ({
|
|
793
772
|
...obj,
|
|
794
773
|
...(obj.AccessKeyId && { AccessKeyId: smithy_client_1.SENSITIVE_STRING }),
|