@aws-sdk/client-kms 3.301.0 → 3.306.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist-cjs/models/models_0.js +166 -187
- package/dist-es/models/models_0.js +166 -187
- package/dist-types/models/models_0.d.ts +271 -166
- package/dist-types/ts3.4/models/models_0.d.ts +201 -166
- package/package.json +34 -34
|
@@ -4,12 +4,11 @@ exports.XksKeyInvalidConfigurationException = exports.XksKeyAlreadyInUseExceptio
|
|
|
4
4
|
exports.VerifyMacRequestFilterSensitiveLog = exports.VerifyRequestFilterSensitiveLog = exports.UpdateCustomKeyStoreRequestFilterSensitiveLog = exports.SignRequestFilterSensitiveLog = exports.GetParametersForImportResponseFilterSensitiveLog = exports.GenerateRandomResponseFilterSensitiveLog = exports.GenerateMacRequestFilterSensitiveLog = exports.GenerateDataKeyPairResponseFilterSensitiveLog = exports.GenerateDataKeyResponseFilterSensitiveLog = exports.EncryptRequestFilterSensitiveLog = exports.DescribeCustomKeyStoresResponseFilterSensitiveLog = exports.DecryptResponseFilterSensitiveLog = exports.CustomKeyStoresListEntryFilterSensitiveLog = exports.XksProxyConfigurationTypeFilterSensitiveLog = exports.CreateCustomKeyStoreRequestFilterSensitiveLog = exports.XksProxyAuthenticationCredentialTypeFilterSensitiveLog = exports.MessageType = exports.KMSInvalidSignatureException = exports.KMSInvalidMacException = exports.InvalidGrantIdException = exports.InvalidImportTokenException = exports.IncorrectKeyMaterialException = exports.WrappingKeySpec = exports.ExpiredImportTokenException = exports.InvalidMarkerException = exports.KeyUnavailableException = exports.InvalidKeyUsageException = exports.InvalidCiphertextException = exports.IncorrectKeyException = exports.DataKeySpec = exports.DataKeyPairSpec = exports.CustomKeyStoreHasCMKsException = exports.XksKeyNotFoundException = void 0;
|
|
5
5
|
const smithy_client_1 = require("@aws-sdk/smithy-client");
|
|
6
6
|
const KMSServiceException_1 = require("./KMSServiceException");
|
|
7
|
-
|
|
8
|
-
|
|
9
|
-
|
|
10
|
-
|
|
11
|
-
|
|
12
|
-
})(AlgorithmSpec = exports.AlgorithmSpec || (exports.AlgorithmSpec = {}));
|
|
7
|
+
exports.AlgorithmSpec = {
|
|
8
|
+
RSAES_OAEP_SHA_1: "RSAES_OAEP_SHA_1",
|
|
9
|
+
RSAES_OAEP_SHA_256: "RSAES_OAEP_SHA_256",
|
|
10
|
+
RSAES_PKCS1_V1_5: "RSAES_PKCS1_V1_5",
|
|
11
|
+
};
|
|
13
12
|
class AlreadyExistsException extends KMSServiceException_1.KMSServiceException {
|
|
14
13
|
constructor(opts) {
|
|
15
14
|
super({
|
|
@@ -179,35 +178,33 @@ class CustomKeyStoreNotFoundException extends KMSServiceException_1.KMSServiceEx
|
|
|
179
178
|
}
|
|
180
179
|
}
|
|
181
180
|
exports.CustomKeyStoreNotFoundException = CustomKeyStoreNotFoundException;
|
|
182
|
-
|
|
183
|
-
|
|
184
|
-
|
|
185
|
-
|
|
186
|
-
|
|
187
|
-
|
|
188
|
-
|
|
189
|
-
|
|
190
|
-
|
|
191
|
-
|
|
192
|
-
|
|
193
|
-
|
|
194
|
-
|
|
195
|
-
|
|
196
|
-
|
|
197
|
-
|
|
198
|
-
|
|
199
|
-
|
|
200
|
-
|
|
201
|
-
|
|
202
|
-
|
|
203
|
-
|
|
204
|
-
|
|
205
|
-
|
|
206
|
-
|
|
207
|
-
|
|
208
|
-
|
|
209
|
-
ConnectionStateType["FAILED"] = "FAILED";
|
|
210
|
-
})(ConnectionStateType = exports.ConnectionStateType || (exports.ConnectionStateType = {}));
|
|
181
|
+
exports.ConnectionErrorCodeType = {
|
|
182
|
+
CLUSTER_NOT_FOUND: "CLUSTER_NOT_FOUND",
|
|
183
|
+
INSUFFICIENT_CLOUDHSM_HSMS: "INSUFFICIENT_CLOUDHSM_HSMS",
|
|
184
|
+
INSUFFICIENT_FREE_ADDRESSES_IN_SUBNET: "INSUFFICIENT_FREE_ADDRESSES_IN_SUBNET",
|
|
185
|
+
INTERNAL_ERROR: "INTERNAL_ERROR",
|
|
186
|
+
INVALID_CREDENTIALS: "INVALID_CREDENTIALS",
|
|
187
|
+
NETWORK_ERRORS: "NETWORK_ERRORS",
|
|
188
|
+
SUBNET_NOT_FOUND: "SUBNET_NOT_FOUND",
|
|
189
|
+
USER_LOCKED_OUT: "USER_LOCKED_OUT",
|
|
190
|
+
USER_LOGGED_IN: "USER_LOGGED_IN",
|
|
191
|
+
USER_NOT_FOUND: "USER_NOT_FOUND",
|
|
192
|
+
XKS_PROXY_ACCESS_DENIED: "XKS_PROXY_ACCESS_DENIED",
|
|
193
|
+
XKS_PROXY_INVALID_CONFIGURATION: "XKS_PROXY_INVALID_CONFIGURATION",
|
|
194
|
+
XKS_PROXY_INVALID_RESPONSE: "XKS_PROXY_INVALID_RESPONSE",
|
|
195
|
+
XKS_PROXY_INVALID_TLS_CONFIGURATION: "XKS_PROXY_INVALID_TLS_CONFIGURATION",
|
|
196
|
+
XKS_PROXY_NOT_REACHABLE: "XKS_PROXY_NOT_REACHABLE",
|
|
197
|
+
XKS_PROXY_TIMED_OUT: "XKS_PROXY_TIMED_OUT",
|
|
198
|
+
XKS_VPC_ENDPOINT_SERVICE_INVALID_CONFIGURATION: "XKS_VPC_ENDPOINT_SERVICE_INVALID_CONFIGURATION",
|
|
199
|
+
XKS_VPC_ENDPOINT_SERVICE_NOT_FOUND: "XKS_VPC_ENDPOINT_SERVICE_NOT_FOUND",
|
|
200
|
+
};
|
|
201
|
+
exports.ConnectionStateType = {
|
|
202
|
+
CONNECTED: "CONNECTED",
|
|
203
|
+
CONNECTING: "CONNECTING",
|
|
204
|
+
DISCONNECTED: "DISCONNECTED",
|
|
205
|
+
DISCONNECTING: "DISCONNECTING",
|
|
206
|
+
FAILED: "FAILED",
|
|
207
|
+
};
|
|
211
208
|
class InvalidAliasNameException extends KMSServiceException_1.KMSServiceException {
|
|
212
209
|
constructor(opts) {
|
|
213
210
|
super({
|
|
@@ -234,16 +231,14 @@ class LimitExceededException extends KMSServiceException_1.KMSServiceException {
|
|
|
234
231
|
}
|
|
235
232
|
}
|
|
236
233
|
exports.LimitExceededException = LimitExceededException;
|
|
237
|
-
|
|
238
|
-
|
|
239
|
-
|
|
240
|
-
|
|
241
|
-
|
|
242
|
-
|
|
243
|
-
|
|
244
|
-
|
|
245
|
-
XksProxyConnectivityType["VPC_ENDPOINT_SERVICE"] = "VPC_ENDPOINT_SERVICE";
|
|
246
|
-
})(XksProxyConnectivityType = exports.XksProxyConnectivityType || (exports.XksProxyConnectivityType = {}));
|
|
234
|
+
exports.CustomKeyStoreType = {
|
|
235
|
+
AWS_CLOUDHSM: "AWS_CLOUDHSM",
|
|
236
|
+
EXTERNAL_KEY_STORE: "EXTERNAL_KEY_STORE",
|
|
237
|
+
};
|
|
238
|
+
exports.XksProxyConnectivityType = {
|
|
239
|
+
PUBLIC_ENDPOINT: "PUBLIC_ENDPOINT",
|
|
240
|
+
VPC_ENDPOINT_SERVICE: "VPC_ENDPOINT_SERVICE",
|
|
241
|
+
};
|
|
247
242
|
class CustomKeyStoreNameInUseException extends KMSServiceException_1.KMSServiceException {
|
|
248
243
|
constructor(opts) {
|
|
249
244
|
super({
|
|
@@ -387,25 +382,24 @@ class XksProxyVpcEndpointServiceNotFoundException extends KMSServiceException_1.
|
|
|
387
382
|
}
|
|
388
383
|
}
|
|
389
384
|
exports.XksProxyVpcEndpointServiceNotFoundException = XksProxyVpcEndpointServiceNotFoundException;
|
|
390
|
-
|
|
391
|
-
|
|
392
|
-
|
|
393
|
-
|
|
394
|
-
|
|
395
|
-
|
|
396
|
-
|
|
397
|
-
|
|
398
|
-
|
|
399
|
-
|
|
400
|
-
|
|
401
|
-
|
|
402
|
-
|
|
403
|
-
|
|
404
|
-
|
|
405
|
-
|
|
406
|
-
|
|
407
|
-
|
|
408
|
-
})(GrantOperation = exports.GrantOperation || (exports.GrantOperation = {}));
|
|
385
|
+
exports.GrantOperation = {
|
|
386
|
+
CreateGrant: "CreateGrant",
|
|
387
|
+
Decrypt: "Decrypt",
|
|
388
|
+
DescribeKey: "DescribeKey",
|
|
389
|
+
Encrypt: "Encrypt",
|
|
390
|
+
GenerateDataKey: "GenerateDataKey",
|
|
391
|
+
GenerateDataKeyPair: "GenerateDataKeyPair",
|
|
392
|
+
GenerateDataKeyPairWithoutPlaintext: "GenerateDataKeyPairWithoutPlaintext",
|
|
393
|
+
GenerateDataKeyWithoutPlaintext: "GenerateDataKeyWithoutPlaintext",
|
|
394
|
+
GenerateMac: "GenerateMac",
|
|
395
|
+
GetPublicKey: "GetPublicKey",
|
|
396
|
+
ReEncryptFrom: "ReEncryptFrom",
|
|
397
|
+
ReEncryptTo: "ReEncryptTo",
|
|
398
|
+
RetireGrant: "RetireGrant",
|
|
399
|
+
Sign: "Sign",
|
|
400
|
+
Verify: "Verify",
|
|
401
|
+
VerifyMac: "VerifyMac",
|
|
402
|
+
};
|
|
409
403
|
class DisabledException extends KMSServiceException_1.KMSServiceException {
|
|
410
404
|
constructor(opts) {
|
|
411
405
|
super({
|
|
@@ -432,104 +426,93 @@ class InvalidGrantTokenException extends KMSServiceException_1.KMSServiceExcepti
|
|
|
432
426
|
}
|
|
433
427
|
}
|
|
434
428
|
exports.InvalidGrantTokenException = InvalidGrantTokenException;
|
|
435
|
-
|
|
436
|
-
|
|
437
|
-
|
|
438
|
-
|
|
439
|
-
|
|
440
|
-
|
|
441
|
-
|
|
442
|
-
|
|
443
|
-
|
|
444
|
-
|
|
445
|
-
|
|
446
|
-
|
|
447
|
-
|
|
448
|
-
|
|
449
|
-
|
|
450
|
-
|
|
451
|
-
|
|
452
|
-
|
|
453
|
-
|
|
454
|
-
|
|
455
|
-
|
|
456
|
-
|
|
457
|
-
|
|
458
|
-
|
|
459
|
-
|
|
460
|
-
|
|
461
|
-
|
|
462
|
-
|
|
463
|
-
|
|
464
|
-
|
|
465
|
-
|
|
466
|
-
|
|
467
|
-
|
|
468
|
-
|
|
469
|
-
|
|
470
|
-
|
|
471
|
-
|
|
472
|
-
|
|
473
|
-
|
|
474
|
-
|
|
475
|
-
|
|
476
|
-
|
|
477
|
-
|
|
478
|
-
|
|
479
|
-
|
|
480
|
-
|
|
481
|
-
|
|
482
|
-
|
|
483
|
-
|
|
484
|
-
|
|
485
|
-
|
|
486
|
-
|
|
487
|
-
|
|
488
|
-
|
|
489
|
-
|
|
490
|
-
|
|
491
|
-
|
|
492
|
-
|
|
493
|
-
|
|
494
|
-
|
|
495
|
-
|
|
496
|
-
|
|
497
|
-
|
|
498
|
-
|
|
499
|
-
|
|
500
|
-
|
|
501
|
-
|
|
502
|
-
|
|
503
|
-
|
|
504
|
-
|
|
505
|
-
|
|
506
|
-
|
|
507
|
-
|
|
508
|
-
|
|
509
|
-
|
|
510
|
-
|
|
511
|
-
|
|
512
|
-
|
|
513
|
-
|
|
514
|
-
|
|
515
|
-
|
|
516
|
-
|
|
517
|
-
|
|
518
|
-
|
|
519
|
-
|
|
520
|
-
|
|
521
|
-
|
|
522
|
-
SigningAlgorithmSpec["ECDSA_SHA_256"] = "ECDSA_SHA_256";
|
|
523
|
-
SigningAlgorithmSpec["ECDSA_SHA_384"] = "ECDSA_SHA_384";
|
|
524
|
-
SigningAlgorithmSpec["ECDSA_SHA_512"] = "ECDSA_SHA_512";
|
|
525
|
-
SigningAlgorithmSpec["RSASSA_PKCS1_V1_5_SHA_256"] = "RSASSA_PKCS1_V1_5_SHA_256";
|
|
526
|
-
SigningAlgorithmSpec["RSASSA_PKCS1_V1_5_SHA_384"] = "RSASSA_PKCS1_V1_5_SHA_384";
|
|
527
|
-
SigningAlgorithmSpec["RSASSA_PKCS1_V1_5_SHA_512"] = "RSASSA_PKCS1_V1_5_SHA_512";
|
|
528
|
-
SigningAlgorithmSpec["RSASSA_PSS_SHA_256"] = "RSASSA_PSS_SHA_256";
|
|
529
|
-
SigningAlgorithmSpec["RSASSA_PSS_SHA_384"] = "RSASSA_PSS_SHA_384";
|
|
530
|
-
SigningAlgorithmSpec["RSASSA_PSS_SHA_512"] = "RSASSA_PSS_SHA_512";
|
|
531
|
-
SigningAlgorithmSpec["SM2DSA"] = "SM2DSA";
|
|
532
|
-
})(SigningAlgorithmSpec = exports.SigningAlgorithmSpec || (exports.SigningAlgorithmSpec = {}));
|
|
429
|
+
exports.CustomerMasterKeySpec = {
|
|
430
|
+
ECC_NIST_P256: "ECC_NIST_P256",
|
|
431
|
+
ECC_NIST_P384: "ECC_NIST_P384",
|
|
432
|
+
ECC_NIST_P521: "ECC_NIST_P521",
|
|
433
|
+
ECC_SECG_P256K1: "ECC_SECG_P256K1",
|
|
434
|
+
HMAC_224: "HMAC_224",
|
|
435
|
+
HMAC_256: "HMAC_256",
|
|
436
|
+
HMAC_384: "HMAC_384",
|
|
437
|
+
HMAC_512: "HMAC_512",
|
|
438
|
+
RSA_2048: "RSA_2048",
|
|
439
|
+
RSA_3072: "RSA_3072",
|
|
440
|
+
RSA_4096: "RSA_4096",
|
|
441
|
+
SM2: "SM2",
|
|
442
|
+
SYMMETRIC_DEFAULT: "SYMMETRIC_DEFAULT",
|
|
443
|
+
};
|
|
444
|
+
exports.KeySpec = {
|
|
445
|
+
ECC_NIST_P256: "ECC_NIST_P256",
|
|
446
|
+
ECC_NIST_P384: "ECC_NIST_P384",
|
|
447
|
+
ECC_NIST_P521: "ECC_NIST_P521",
|
|
448
|
+
ECC_SECG_P256K1: "ECC_SECG_P256K1",
|
|
449
|
+
HMAC_224: "HMAC_224",
|
|
450
|
+
HMAC_256: "HMAC_256",
|
|
451
|
+
HMAC_384: "HMAC_384",
|
|
452
|
+
HMAC_512: "HMAC_512",
|
|
453
|
+
RSA_2048: "RSA_2048",
|
|
454
|
+
RSA_3072: "RSA_3072",
|
|
455
|
+
RSA_4096: "RSA_4096",
|
|
456
|
+
SM2: "SM2",
|
|
457
|
+
SYMMETRIC_DEFAULT: "SYMMETRIC_DEFAULT",
|
|
458
|
+
};
|
|
459
|
+
exports.KeyUsageType = {
|
|
460
|
+
ENCRYPT_DECRYPT: "ENCRYPT_DECRYPT",
|
|
461
|
+
GENERATE_VERIFY_MAC: "GENERATE_VERIFY_MAC",
|
|
462
|
+
SIGN_VERIFY: "SIGN_VERIFY",
|
|
463
|
+
};
|
|
464
|
+
exports.OriginType = {
|
|
465
|
+
AWS_CLOUDHSM: "AWS_CLOUDHSM",
|
|
466
|
+
AWS_KMS: "AWS_KMS",
|
|
467
|
+
EXTERNAL: "EXTERNAL",
|
|
468
|
+
EXTERNAL_KEY_STORE: "EXTERNAL_KEY_STORE",
|
|
469
|
+
};
|
|
470
|
+
exports.EncryptionAlgorithmSpec = {
|
|
471
|
+
RSAES_OAEP_SHA_1: "RSAES_OAEP_SHA_1",
|
|
472
|
+
RSAES_OAEP_SHA_256: "RSAES_OAEP_SHA_256",
|
|
473
|
+
SM2PKE: "SM2PKE",
|
|
474
|
+
SYMMETRIC_DEFAULT: "SYMMETRIC_DEFAULT",
|
|
475
|
+
};
|
|
476
|
+
exports.ExpirationModelType = {
|
|
477
|
+
KEY_MATERIAL_DOES_NOT_EXPIRE: "KEY_MATERIAL_DOES_NOT_EXPIRE",
|
|
478
|
+
KEY_MATERIAL_EXPIRES: "KEY_MATERIAL_EXPIRES",
|
|
479
|
+
};
|
|
480
|
+
exports.KeyManagerType = {
|
|
481
|
+
AWS: "AWS",
|
|
482
|
+
CUSTOMER: "CUSTOMER",
|
|
483
|
+
};
|
|
484
|
+
exports.KeyState = {
|
|
485
|
+
Creating: "Creating",
|
|
486
|
+
Disabled: "Disabled",
|
|
487
|
+
Enabled: "Enabled",
|
|
488
|
+
PendingDeletion: "PendingDeletion",
|
|
489
|
+
PendingImport: "PendingImport",
|
|
490
|
+
PendingReplicaDeletion: "PendingReplicaDeletion",
|
|
491
|
+
Unavailable: "Unavailable",
|
|
492
|
+
Updating: "Updating",
|
|
493
|
+
};
|
|
494
|
+
exports.MacAlgorithmSpec = {
|
|
495
|
+
HMAC_SHA_224: "HMAC_SHA_224",
|
|
496
|
+
HMAC_SHA_256: "HMAC_SHA_256",
|
|
497
|
+
HMAC_SHA_384: "HMAC_SHA_384",
|
|
498
|
+
HMAC_SHA_512: "HMAC_SHA_512",
|
|
499
|
+
};
|
|
500
|
+
exports.MultiRegionKeyType = {
|
|
501
|
+
PRIMARY: "PRIMARY",
|
|
502
|
+
REPLICA: "REPLICA",
|
|
503
|
+
};
|
|
504
|
+
exports.SigningAlgorithmSpec = {
|
|
505
|
+
ECDSA_SHA_256: "ECDSA_SHA_256",
|
|
506
|
+
ECDSA_SHA_384: "ECDSA_SHA_384",
|
|
507
|
+
ECDSA_SHA_512: "ECDSA_SHA_512",
|
|
508
|
+
RSASSA_PKCS1_V1_5_SHA_256: "RSASSA_PKCS1_V1_5_SHA_256",
|
|
509
|
+
RSASSA_PKCS1_V1_5_SHA_384: "RSASSA_PKCS1_V1_5_SHA_384",
|
|
510
|
+
RSASSA_PKCS1_V1_5_SHA_512: "RSASSA_PKCS1_V1_5_SHA_512",
|
|
511
|
+
RSASSA_PSS_SHA_256: "RSASSA_PSS_SHA_256",
|
|
512
|
+
RSASSA_PSS_SHA_384: "RSASSA_PSS_SHA_384",
|
|
513
|
+
RSASSA_PSS_SHA_512: "RSASSA_PSS_SHA_512",
|
|
514
|
+
SM2DSA: "SM2DSA",
|
|
515
|
+
};
|
|
533
516
|
class MalformedPolicyDocumentException extends KMSServiceException_1.KMSServiceException {
|
|
534
517
|
constructor(opts) {
|
|
535
518
|
super({
|
|
@@ -621,22 +604,20 @@ class CustomKeyStoreHasCMKsException extends KMSServiceException_1.KMSServiceExc
|
|
|
621
604
|
}
|
|
622
605
|
}
|
|
623
606
|
exports.CustomKeyStoreHasCMKsException = CustomKeyStoreHasCMKsException;
|
|
624
|
-
|
|
625
|
-
|
|
626
|
-
|
|
627
|
-
|
|
628
|
-
|
|
629
|
-
|
|
630
|
-
|
|
631
|
-
|
|
632
|
-
|
|
633
|
-
|
|
634
|
-
|
|
635
|
-
|
|
636
|
-
|
|
637
|
-
|
|
638
|
-
DataKeySpec["AES_256"] = "AES_256";
|
|
639
|
-
})(DataKeySpec = exports.DataKeySpec || (exports.DataKeySpec = {}));
|
|
607
|
+
exports.DataKeyPairSpec = {
|
|
608
|
+
ECC_NIST_P256: "ECC_NIST_P256",
|
|
609
|
+
ECC_NIST_P384: "ECC_NIST_P384",
|
|
610
|
+
ECC_NIST_P521: "ECC_NIST_P521",
|
|
611
|
+
ECC_SECG_P256K1: "ECC_SECG_P256K1",
|
|
612
|
+
RSA_2048: "RSA_2048",
|
|
613
|
+
RSA_3072: "RSA_3072",
|
|
614
|
+
RSA_4096: "RSA_4096",
|
|
615
|
+
SM2: "SM2",
|
|
616
|
+
};
|
|
617
|
+
exports.DataKeySpec = {
|
|
618
|
+
AES_128: "AES_128",
|
|
619
|
+
AES_256: "AES_256",
|
|
620
|
+
};
|
|
640
621
|
class IncorrectKeyException extends KMSServiceException_1.KMSServiceException {
|
|
641
622
|
constructor(opts) {
|
|
642
623
|
super({
|
|
@@ -715,10 +696,9 @@ class ExpiredImportTokenException extends KMSServiceException_1.KMSServiceExcept
|
|
|
715
696
|
}
|
|
716
697
|
}
|
|
717
698
|
exports.ExpiredImportTokenException = ExpiredImportTokenException;
|
|
718
|
-
|
|
719
|
-
|
|
720
|
-
|
|
721
|
-
})(WrappingKeySpec = exports.WrappingKeySpec || (exports.WrappingKeySpec = {}));
|
|
699
|
+
exports.WrappingKeySpec = {
|
|
700
|
+
RSA_2048: "RSA_2048",
|
|
701
|
+
};
|
|
722
702
|
class IncorrectKeyMaterialException extends KMSServiceException_1.KMSServiceException {
|
|
723
703
|
constructor(opts) {
|
|
724
704
|
super({
|
|
@@ -784,11 +764,10 @@ class KMSInvalidSignatureException extends KMSServiceException_1.KMSServiceExcep
|
|
|
784
764
|
}
|
|
785
765
|
}
|
|
786
766
|
exports.KMSInvalidSignatureException = KMSInvalidSignatureException;
|
|
787
|
-
|
|
788
|
-
|
|
789
|
-
|
|
790
|
-
|
|
791
|
-
})(MessageType = exports.MessageType || (exports.MessageType = {}));
|
|
767
|
+
exports.MessageType = {
|
|
768
|
+
DIGEST: "DIGEST",
|
|
769
|
+
RAW: "RAW",
|
|
770
|
+
};
|
|
792
771
|
const XksProxyAuthenticationCredentialTypeFilterSensitiveLog = (obj) => ({
|
|
793
772
|
...obj,
|
|
794
773
|
...(obj.AccessKeyId && { AccessKeyId: smithy_client_1.SENSITIVE_STRING }),
|