@aws-sdk/client-kms 3.363.0 → 3.366.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (49) hide show
  1. package/dist-cjs/models/models_0.js +15 -2
  2. package/dist-cjs/protocols/Aws_json1_1.js +60 -0
  3. package/dist-es/models/models_0.js +12 -0
  4. package/dist-es/protocols/Aws_json1_1.js +61 -1
  5. package/dist-types/commands/CancelKeyDeletionCommand.d.ts +3 -1
  6. package/dist-types/commands/CreateAliasCommand.d.ts +3 -1
  7. package/dist-types/commands/CreateCustomKeyStoreCommand.d.ts +11 -8
  8. package/dist-types/commands/CreateGrantCommand.d.ts +9 -1
  9. package/dist-types/commands/CreateKeyCommand.d.ts +16 -13
  10. package/dist-types/commands/DecryptCommand.d.ts +10 -2
  11. package/dist-types/commands/DeleteAliasCommand.d.ts +3 -1
  12. package/dist-types/commands/DeleteImportedKeyMaterialCommand.d.ts +3 -1
  13. package/dist-types/commands/DescribeCustomKeyStoresCommand.d.ts +2 -2
  14. package/dist-types/commands/DisableKeyCommand.d.ts +3 -1
  15. package/dist-types/commands/DisableKeyRotationCommand.d.ts +3 -1
  16. package/dist-types/commands/EnableKeyCommand.d.ts +3 -1
  17. package/dist-types/commands/EnableKeyRotationCommand.d.ts +3 -1
  18. package/dist-types/commands/EncryptCommand.d.ts +10 -3
  19. package/dist-types/commands/GenerateDataKeyCommand.d.ts +17 -8
  20. package/dist-types/commands/GenerateDataKeyPairCommand.d.ts +21 -11
  21. package/dist-types/commands/GenerateDataKeyPairWithoutPlaintextCommand.d.ts +13 -4
  22. package/dist-types/commands/GenerateDataKeyWithoutPlaintextCommand.d.ts +13 -4
  23. package/dist-types/commands/GenerateMacCommand.d.ts +12 -3
  24. package/dist-types/commands/GenerateRandomCommand.d.ts +1 -1
  25. package/dist-types/commands/GetKeyPolicyCommand.d.ts +3 -1
  26. package/dist-types/commands/GetKeyRotationStatusCommand.d.ts +3 -1
  27. package/dist-types/commands/GetParametersForImportCommand.d.ts +7 -4
  28. package/dist-types/commands/GetPublicKeyCommand.d.ts +8 -7
  29. package/dist-types/commands/ImportKeyMaterialCommand.d.ts +4 -3
  30. package/dist-types/commands/ListGrantsCommand.d.ts +3 -1
  31. package/dist-types/commands/ListKeyPoliciesCommand.d.ts +3 -1
  32. package/dist-types/commands/PutKeyPolicyCommand.d.ts +3 -1
  33. package/dist-types/commands/ReEncryptCommand.d.ts +9 -1
  34. package/dist-types/commands/ReplicateKeyCommand.d.ts +3 -1
  35. package/dist-types/commands/RetireGrantCommand.d.ts +9 -1
  36. package/dist-types/commands/RevokeGrantCommand.d.ts +9 -1
  37. package/dist-types/commands/ScheduleKeyDeletionCommand.d.ts +6 -4
  38. package/dist-types/commands/SignCommand.d.ts +9 -1
  39. package/dist-types/commands/TagResourceCommand.d.ts +3 -1
  40. package/dist-types/commands/UntagResourceCommand.d.ts +3 -1
  41. package/dist-types/commands/UpdateAliasCommand.d.ts +3 -1
  42. package/dist-types/commands/UpdateCustomKeyStoreCommand.d.ts +5 -3
  43. package/dist-types/commands/UpdateKeyDescriptionCommand.d.ts +3 -1
  44. package/dist-types/commands/UpdatePrimaryRegionCommand.d.ts +3 -1
  45. package/dist-types/commands/VerifyCommand.d.ts +17 -10
  46. package/dist-types/commands/VerifyMacCommand.d.ts +9 -1
  47. package/dist-types/models/models_0.d.ts +228 -126
  48. package/dist-types/ts3.4/models/models_0.d.ts +21 -0
  49. package/package.json +1 -1
@@ -40,8 +40,7 @@ export interface ImportKeyMaterialCommandOutput extends ImportKeyMaterialRespons
40
40
  * <p>Each time you import key material into KMS, you can determine whether
41
41
  * (<code>ExpirationModel</code>) and when (<code>ValidTo</code>) the key material expires. To
42
42
  * change the expiration of your key material, you must import it again, either by calling
43
- * <code>ImportKeyMaterial</code> or using the <a href="kms/latest/developerguide/importing-keys-import-key-material.html#importing-keys-import-key-material-console">import features</a> of the
44
- * KMS console.</p>
43
+ * <code>ImportKeyMaterial</code> or using the <a href="kms/latest/developerguide/importing-keys-import-key-material.html#importing-keys-import-key-material-console">import features</a> of the KMS console.</p>
45
44
  * <p>Before calling <code>ImportKeyMaterial</code>:</p>
46
45
  * <ul>
47
46
  * <li>
@@ -197,7 +196,9 @@ export interface ImportKeyMaterialCommandOutput extends ImportKeyMaterialRespons
197
196
  * </i>.</p>
198
197
  * </li>
199
198
  * <li>
200
- * <p>For cryptographic operations on KMS keys in custom key stores, this exception represents a general failure with many possible causes. To identify the cause, see the error message that accompanies the exception.</p>
199
+ * <p>For cryptographic operations on KMS keys in custom key stores, this exception
200
+ * represents a general failure with many possible causes. To identify the cause, see the
201
+ * error message that accompanies the exception.</p>
201
202
  * </li>
202
203
  * </ul>
203
204
  *
@@ -151,7 +151,9 @@ export interface ListGrantsCommandOutput extends ListGrantsResponse, __MetadataB
151
151
  * </i>.</p>
152
152
  * </li>
153
153
  * <li>
154
- * <p>For cryptographic operations on KMS keys in custom key stores, this exception represents a general failure with many possible causes. To identify the cause, see the error message that accompanies the exception.</p>
154
+ * <p>For cryptographic operations on KMS keys in custom key stores, this exception
155
+ * represents a general failure with many possible causes. To identify the cause, see the
156
+ * error message that accompanies the exception.</p>
155
157
  * </li>
156
158
  * </ul>
157
159
  *
@@ -100,7 +100,9 @@ export interface ListKeyPoliciesCommandOutput extends ListKeyPoliciesResponse, _
100
100
  * </i>.</p>
101
101
  * </li>
102
102
  * <li>
103
- * <p>For cryptographic operations on KMS keys in custom key stores, this exception represents a general failure with many possible causes. To identify the cause, see the error message that accompanies the exception.</p>
103
+ * <p>For cryptographic operations on KMS keys in custom key stores, this exception
104
+ * represents a general failure with many possible causes. To identify the cause, see the
105
+ * error message that accompanies the exception.</p>
104
106
  * </li>
105
107
  * </ul>
106
108
  *
@@ -86,7 +86,9 @@ export interface PutKeyPolicyCommandOutput extends __MetadataBearer {
86
86
  * </i>.</p>
87
87
  * </li>
88
88
  * <li>
89
- * <p>For cryptographic operations on KMS keys in custom key stores, this exception represents a general failure with many possible causes. To identify the cause, see the error message that accompanies the exception.</p>
89
+ * <p>For cryptographic operations on KMS keys in custom key stores, this exception
90
+ * represents a general failure with many possible causes. To identify the cause, see the
91
+ * error message that accompanies the exception.</p>
90
92
  * </li>
91
93
  * </ul>
92
94
  *
@@ -139,6 +139,7 @@ export interface ReEncryptCommandOutput extends ReEncryptResponse, __MetadataBea
139
139
  * GrantTokens: [ // GrantTokenList
140
140
  * "STRING_VALUE",
141
141
  * ],
142
+ * DryRun: true || false,
142
143
  * };
143
144
  * const command = new ReEncryptCommand(input);
144
145
  * const response = await client.send(command);
@@ -165,6 +166,11 @@ export interface ReEncryptCommandOutput extends ReEncryptResponse, __MetadataBea
165
166
  * @throws {@link DisabledException} (client fault)
166
167
  * <p>The request was rejected because the specified KMS key is not enabled.</p>
167
168
  *
169
+ * @throws {@link DryRunOperationException} (client fault)
170
+ * <p>
171
+ * The request was rejected because the DryRun parameter was specified.
172
+ * </p>
173
+ *
168
174
  * @throws {@link IncorrectKeyException} (client fault)
169
175
  * <p>The request was rejected because the specified KMS key cannot decrypt the data. The
170
176
  * <code>KeyId</code> in a <a>Decrypt</a> request and the <code>SourceKeyId</code>
@@ -225,7 +231,9 @@ export interface ReEncryptCommandOutput extends ReEncryptResponse, __MetadataBea
225
231
  * </i>.</p>
226
232
  * </li>
227
233
  * <li>
228
- * <p>For cryptographic operations on KMS keys in custom key stores, this exception represents a general failure with many possible causes. To identify the cause, see the error message that accompanies the exception.</p>
234
+ * <p>For cryptographic operations on KMS keys in custom key stores, this exception
235
+ * represents a general failure with many possible causes. To identify the cause, see the
236
+ * error message that accompanies the exception.</p>
229
237
  * </li>
230
238
  * </ul>
231
239
  *
@@ -220,7 +220,9 @@ export interface ReplicateKeyCommandOutput extends ReplicateKeyResponse, __Metad
220
220
  * </i>.</p>
221
221
  * </li>
222
222
  * <li>
223
- * <p>For cryptographic operations on KMS keys in custom key stores, this exception represents a general failure with many possible causes. To identify the cause, see the error message that accompanies the exception.</p>
223
+ * <p>For cryptographic operations on KMS keys in custom key stores, this exception
224
+ * represents a general failure with many possible causes. To identify the cause, see the
225
+ * error message that accompanies the exception.</p>
224
226
  * </li>
225
227
  * </ul>
226
228
  *
@@ -79,6 +79,7 @@ export interface RetireGrantCommandOutput extends __MetadataBearer {
79
79
  * GrantToken: "STRING_VALUE",
80
80
  * KeyId: "STRING_VALUE",
81
81
  * GrantId: "STRING_VALUE",
82
+ * DryRun: true || false,
82
83
  * };
83
84
  * const command = new RetireGrantCommand(input);
84
85
  * const response = await client.send(command);
@@ -96,6 +97,11 @@ export interface RetireGrantCommandOutput extends __MetadataBearer {
96
97
  * <p>The system timed out while trying to fulfill the request. You can retry the
97
98
  * request.</p>
98
99
  *
100
+ * @throws {@link DryRunOperationException} (client fault)
101
+ * <p>
102
+ * The request was rejected because the DryRun parameter was specified.
103
+ * </p>
104
+ *
99
105
  * @throws {@link InvalidArnException} (client fault)
100
106
  * <p>The request was rejected because a specified ARN, or an ARN in a key policy, is not
101
107
  * valid.</p>
@@ -124,7 +130,9 @@ export interface RetireGrantCommandOutput extends __MetadataBearer {
124
130
  * </i>.</p>
125
131
  * </li>
126
132
  * <li>
127
- * <p>For cryptographic operations on KMS keys in custom key stores, this exception represents a general failure with many possible causes. To identify the cause, see the error message that accompanies the exception.</p>
133
+ * <p>For cryptographic operations on KMS keys in custom key stores, this exception
134
+ * represents a general failure with many possible causes. To identify the cause, see the
135
+ * error message that accompanies the exception.</p>
128
136
  * </li>
129
137
  * </ul>
130
138
  *
@@ -76,6 +76,7 @@ export interface RevokeGrantCommandOutput extends __MetadataBearer {
76
76
  * const input = { // RevokeGrantRequest
77
77
  * KeyId: "STRING_VALUE", // required
78
78
  * GrantId: "STRING_VALUE", // required
79
+ * DryRun: true || false,
79
80
  * };
80
81
  * const command = new RevokeGrantCommand(input);
81
82
  * const response = await client.send(command);
@@ -93,6 +94,11 @@ export interface RevokeGrantCommandOutput extends __MetadataBearer {
93
94
  * <p>The system timed out while trying to fulfill the request. You can retry the
94
95
  * request.</p>
95
96
  *
97
+ * @throws {@link DryRunOperationException} (client fault)
98
+ * <p>
99
+ * The request was rejected because the DryRun parameter was specified.
100
+ * </p>
101
+ *
96
102
  * @throws {@link InvalidArnException} (client fault)
97
103
  * <p>The request was rejected because a specified ARN, or an ARN in a key policy, is not
98
104
  * valid.</p>
@@ -118,7 +124,9 @@ export interface RevokeGrantCommandOutput extends __MetadataBearer {
118
124
  * </i>.</p>
119
125
  * </li>
120
126
  * <li>
121
- * <p>For cryptographic operations on KMS keys in custom key stores, this exception represents a general failure with many possible causes. To identify the cause, see the error message that accompanies the exception.</p>
127
+ * <p>For cryptographic operations on KMS keys in custom key stores, this exception
128
+ * represents a general failure with many possible causes. To identify the cause, see the
129
+ * error message that accompanies the exception.</p>
122
130
  * </li>
123
131
  * </ul>
124
132
  *
@@ -35,9 +35,9 @@ export interface ScheduleKeyDeletionCommandOutput extends ScheduleKeyDeletionRes
35
35
  * <p>Deleting a KMS key is a destructive and potentially dangerous operation. When a KMS key
36
36
  * is deleted, all data that was encrypted under the KMS key is unrecoverable. (The only
37
37
  * exception is a <a href="kms/latest/developerguide/multi-region-keys-delete.html">multi-Region replica
38
- * key</a>, or an asymmetric or HMAC KMS key with imported key material[BUGBUG-link to
39
- * importing-keys-managing.html#import-delete-key.) To prevent the use of a KMS key without
40
- * deleting it, use <a>DisableKey</a>. </p>
38
+ * key</a>, or an <a href="kms/latest/developerguide/importing-keys-managing.html#import-delete-key">asymmetric or HMAC KMS
39
+ * key with imported key material</a>.) To prevent the use of a KMS key without deleting
40
+ * it, use <a>DisableKey</a>. </p>
41
41
  * </important>
42
42
  * <p>You can schedule the deletion of a multi-Region primary key and its replica keys at any
43
43
  * time. However, KMS will not delete a multi-Region primary key with existing replica keys. If
@@ -134,7 +134,9 @@ export interface ScheduleKeyDeletionCommandOutput extends ScheduleKeyDeletionRes
134
134
  * </i>.</p>
135
135
  * </li>
136
136
  * <li>
137
- * <p>For cryptographic operations on KMS keys in custom key stores, this exception represents a general failure with many possible causes. To identify the cause, see the error message that accompanies the exception.</p>
137
+ * <p>For cryptographic operations on KMS keys in custom key stores, this exception
138
+ * represents a general failure with many possible causes. To identify the cause, see the
139
+ * error message that accompanies the exception.</p>
138
140
  * </li>
139
141
  * </ul>
140
142
  *
@@ -89,6 +89,7 @@ export interface SignCommandOutput extends SignResponse, __MetadataBearer {
89
89
  * "STRING_VALUE",
90
90
  * ],
91
91
  * SigningAlgorithm: "RSASSA_PSS_SHA_256" || "RSASSA_PSS_SHA_384" || "RSASSA_PSS_SHA_512" || "RSASSA_PKCS1_V1_5_SHA_256" || "RSASSA_PKCS1_V1_5_SHA_384" || "RSASSA_PKCS1_V1_5_SHA_512" || "ECDSA_SHA_256" || "ECDSA_SHA_384" || "ECDSA_SHA_512" || "SM2DSA", // required
92
+ * DryRun: true || false,
92
93
  * };
93
94
  * const command = new SignCommand(input);
94
95
  * const response = await client.send(command);
@@ -113,6 +114,11 @@ export interface SignCommandOutput extends SignResponse, __MetadataBearer {
113
114
  * @throws {@link DisabledException} (client fault)
114
115
  * <p>The request was rejected because the specified KMS key is not enabled.</p>
115
116
  *
117
+ * @throws {@link DryRunOperationException} (client fault)
118
+ * <p>
119
+ * The request was rejected because the DryRun parameter was specified.
120
+ * </p>
121
+ *
116
122
  * @throws {@link InvalidGrantTokenException} (client fault)
117
123
  * <p>The request was rejected because the specified grant token is not valid.</p>
118
124
  *
@@ -159,7 +165,9 @@ export interface SignCommandOutput extends SignResponse, __MetadataBearer {
159
165
  * </i>.</p>
160
166
  * </li>
161
167
  * <li>
162
- * <p>For cryptographic operations on KMS keys in custom key stores, this exception represents a general failure with many possible causes. To identify the cause, see the error message that accompanies the exception.</p>
168
+ * <p>For cryptographic operations on KMS keys in custom key stores, this exception
169
+ * represents a general failure with many possible causes. To identify the cause, see the
170
+ * error message that accompanies the exception.</p>
163
171
  * </li>
164
172
  * </ul>
165
173
  *
@@ -119,7 +119,9 @@ export interface TagResourceCommandOutput extends __MetadataBearer {
119
119
  * </i>.</p>
120
120
  * </li>
121
121
  * <li>
122
- * <p>For cryptographic operations on KMS keys in custom key stores, this exception represents a general failure with many possible causes. To identify the cause, see the error message that accompanies the exception.</p>
122
+ * <p>For cryptographic operations on KMS keys in custom key stores, this exception
123
+ * represents a general failure with many possible causes. To identify the cause, see the
124
+ * error message that accompanies the exception.</p>
123
125
  * </li>
124
126
  * </ul>
125
127
  *
@@ -111,7 +111,9 @@ export interface UntagResourceCommandOutput extends __MetadataBearer {
111
111
  * </i>.</p>
112
112
  * </li>
113
113
  * <li>
114
- * <p>For cryptographic operations on KMS keys in custom key stores, this exception represents a general failure with many possible causes. To identify the cause, see the error message that accompanies the exception.</p>
114
+ * <p>For cryptographic operations on KMS keys in custom key stores, this exception
115
+ * represents a general failure with many possible causes. To identify the cause, see the
116
+ * error message that accompanies the exception.</p>
115
117
  * </li>
116
118
  * </ul>
117
119
  *
@@ -130,7 +130,9 @@ export interface UpdateAliasCommandOutput extends __MetadataBearer {
130
130
  * </i>.</p>
131
131
  * </li>
132
132
  * <li>
133
- * <p>For cryptographic operations on KMS keys in custom key stores, this exception represents a general failure with many possible causes. To identify the cause, see the error message that accompanies the exception.</p>
133
+ * <p>For cryptographic operations on KMS keys in custom key stores, this exception
134
+ * represents a general failure with many possible causes. To identify the cause, see the
135
+ * error message that accompanies the exception.</p>
134
136
  * </li>
135
137
  * </ul>
136
138
  *
@@ -283,8 +283,9 @@ export interface UpdateCustomKeyStoreCommandOutput extends UpdateCustomKeyStoreR
283
283
  * @throws {@link XksProxyUriUnreachableException} (client fault)
284
284
  * <p>KMS was unable to reach the specified <code>XksProxyUriPath</code>. The path must be
285
285
  * reachable before you create the external key store or update its settings.</p>
286
- * <p>This exception is also thrown when the external key store proxy response to a <code>GetHealthStatus</code>
287
- * request indicates that all external key manager instances are unavailable.</p>
286
+ * <p>This exception is also thrown when the external key store proxy response to a
287
+ * <code>GetHealthStatus</code> request indicates that all external key manager instances are
288
+ * unavailable.</p>
288
289
  *
289
290
  * @throws {@link XksProxyVpcEndpointServiceInUseException} (client fault)
290
291
  * <p>The request was rejected because the specified Amazon VPC endpoint service is already
@@ -294,7 +295,8 @@ export interface UpdateCustomKeyStoreCommandOutput extends UpdateCustomKeyStoreR
294
295
  * @throws {@link XksProxyVpcEndpointServiceInvalidConfigurationException} (client fault)
295
296
  * <p>The request was rejected because the Amazon VPC endpoint service configuration does not fulfill
296
297
  * the requirements for an external key store proxy. For details, see the exception message and
297
- * <a href="kms/latest/developerguide/vpc-connectivity.html#xks-vpc-requirements">review the requirements</a> for Amazon VPC endpoint service connectivity for an external key
298
+ * <a href="kms/latest/developerguide/vpc-connectivity.html#xks-vpc-requirements">review the
299
+ * requirements</a> for Amazon VPC endpoint service connectivity for an external key
298
300
  * store.</p>
299
301
  *
300
302
  * @throws {@link XksProxyVpcEndpointServiceNotFoundException} (client fault)
@@ -93,7 +93,9 @@ export interface UpdateKeyDescriptionCommandOutput extends __MetadataBearer {
93
93
  * </i>.</p>
94
94
  * </li>
95
95
  * <li>
96
- * <p>For cryptographic operations on KMS keys in custom key stores, this exception represents a general failure with many possible causes. To identify the cause, see the error message that accompanies the exception.</p>
96
+ * <p>For cryptographic operations on KMS keys in custom key stores, this exception
97
+ * represents a general failure with many possible causes. To identify the cause, see the
98
+ * error message that accompanies the exception.</p>
97
99
  * </li>
98
100
  * </ul>
99
101
  *
@@ -135,7 +135,9 @@ export interface UpdatePrimaryRegionCommandOutput extends __MetadataBearer {
135
135
  * </i>.</p>
136
136
  * </li>
137
137
  * <li>
138
- * <p>For cryptographic operations on KMS keys in custom key stores, this exception represents a general failure with many possible causes. To identify the cause, see the error message that accompanies the exception.</p>
138
+ * <p>For cryptographic operations on KMS keys in custom key stores, this exception
139
+ * represents a general failure with many possible causes. To identify the cause, see the
140
+ * error message that accompanies the exception.</p>
139
141
  * </li>
140
142
  * </ul>
141
143
  *
@@ -33,11 +33,10 @@ export interface VerifyCommandOutput extends VerifyResponse, __MetadataBearer {
33
33
  * <p>A digital signature is generated by using the private key in an asymmetric KMS key. The
34
34
  * signature is verified by using the public key in the same asymmetric KMS key.
35
35
  * For information about asymmetric KMS keys, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/symmetric-asymmetric.html">Asymmetric KMS keys</a> in the <i>Key Management Service Developer Guide</i>.</p>
36
- * <p>To use the <code>Verify</code> operation, specify the
37
- * same asymmetric KMS key, message, and signing algorithm that were used to produce the
38
- * signature. The message type does not need to be the same as the one used for signing, but it must
39
- * indicate whether the value of the <code>Message</code> parameter should be
40
- * hashed as part of the verification process.</p>
36
+ * <p>To use the <code>Verify</code> operation, specify the same asymmetric KMS key, message,
37
+ * and signing algorithm that were used to produce the signature. The message type does not need
38
+ * to be the same as the one used for signing, but it must indicate whether the value of the
39
+ * <code>Message</code> parameter should be hashed as part of the verification process.</p>
41
40
  * <p>You can also verify the digital signature by using the public key of the KMS key outside
42
41
  * of KMS. Use the <a>GetPublicKey</a> operation to download the public key in the
43
42
  * asymmetric KMS key and then use the public key to verify the signature outside of KMS. The
@@ -45,10 +44,10 @@ export interface VerifyCommandOutput extends VerifyResponse, __MetadataBearer {
45
44
  * a result, it's easy to call, the operation is performed within the FIPS boundary, it is logged
46
45
  * in CloudTrail, and you can use key policy and IAM policy to determine who is authorized to use
47
46
  * the KMS key to verify signatures.</p>
48
- * <p>To verify a signature outside of KMS with an SM2 public key (China Regions only), you must
49
- * specify the distinguishing ID. By default, KMS uses <code>1234567812345678</code> as the
50
- * distinguishing ID. For more information, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/asymmetric-key-specs.html#key-spec-sm-offline-verification">Offline verification
51
- * with SM2 key pairs</a>.</p>
47
+ * <p>To verify a signature outside of KMS with an SM2 public key (China Regions only), you
48
+ * must specify the distinguishing ID. By default, KMS uses <code>1234567812345678</code> as
49
+ * the distinguishing ID. For more information, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/asymmetric-key-specs.html#key-spec-sm-offline-verification">Offline
50
+ * verification with SM2 key pairs</a>.</p>
52
51
  * <p>The KMS key that you use for this operation must be in a compatible key state. For
53
52
  * details, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-state.html">Key states of KMS keys</a> in the <i>Key Management Service Developer Guide</i>.</p>
54
53
  * <p>
@@ -74,6 +73,7 @@ export interface VerifyCommandOutput extends VerifyResponse, __MetadataBearer {
74
73
  * GrantTokens: [ // GrantTokenList
75
74
  * "STRING_VALUE",
76
75
  * ],
76
+ * DryRun: true || false,
77
77
  * };
78
78
  * const command = new VerifyCommand(input);
79
79
  * const response = await client.send(command);
@@ -98,6 +98,11 @@ export interface VerifyCommandOutput extends VerifyResponse, __MetadataBearer {
98
98
  * @throws {@link DisabledException} (client fault)
99
99
  * <p>The request was rejected because the specified KMS key is not enabled.</p>
100
100
  *
101
+ * @throws {@link DryRunOperationException} (client fault)
102
+ * <p>
103
+ * The request was rejected because the DryRun parameter was specified.
104
+ * </p>
105
+ *
101
106
  * @throws {@link InvalidGrantTokenException} (client fault)
102
107
  * <p>The request was rejected because the specified grant token is not valid.</p>
103
108
  *
@@ -149,7 +154,9 @@ export interface VerifyCommandOutput extends VerifyResponse, __MetadataBearer {
149
154
  * </i>.</p>
150
155
  * </li>
151
156
  * <li>
152
- * <p>For cryptographic operations on KMS keys in custom key stores, this exception represents a general failure with many possible causes. To identify the cause, see the error message that accompanies the exception.</p>
157
+ * <p>For cryptographic operations on KMS keys in custom key stores, this exception
158
+ * represents a general failure with many possible causes. To identify the cause, see the
159
+ * error message that accompanies the exception.</p>
153
160
  * </li>
154
161
  * </ul>
155
162
  *
@@ -58,6 +58,7 @@ export interface VerifyMacCommandOutput extends VerifyMacResponse, __MetadataBea
58
58
  * GrantTokens: [ // GrantTokenList
59
59
  * "STRING_VALUE",
60
60
  * ],
61
+ * DryRun: true || false,
61
62
  * };
62
63
  * const command = new VerifyMacCommand(input);
63
64
  * const response = await client.send(command);
@@ -78,6 +79,11 @@ export interface VerifyMacCommandOutput extends VerifyMacResponse, __MetadataBea
78
79
  * @throws {@link DisabledException} (client fault)
79
80
  * <p>The request was rejected because the specified KMS key is not enabled.</p>
80
81
  *
82
+ * @throws {@link DryRunOperationException} (client fault)
83
+ * <p>
84
+ * The request was rejected because the DryRun parameter was specified.
85
+ * </p>
86
+ *
81
87
  * @throws {@link InvalidGrantTokenException} (client fault)
82
88
  * <p>The request was rejected because the specified grant token is not valid.</p>
83
89
  *
@@ -129,7 +135,9 @@ export interface VerifyMacCommandOutput extends VerifyMacResponse, __MetadataBea
129
135
  * </i>.</p>
130
136
  * </li>
131
137
  * <li>
132
- * <p>For cryptographic operations on KMS keys in custom key stores, this exception represents a general failure with many possible causes. To identify the cause, see the error message that accompanies the exception.</p>
138
+ * <p>For cryptographic operations on KMS keys in custom key stores, this exception
139
+ * represents a general failure with many possible causes. To identify the cause, see the
140
+ * error message that accompanies the exception.</p>
133
141
  * </li>
134
142
  * </ul>
135
143
  *