@aws-sdk/client-kms 3.363.0 → 3.366.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist-cjs/models/models_0.js +15 -2
- package/dist-cjs/protocols/Aws_json1_1.js +60 -0
- package/dist-es/models/models_0.js +12 -0
- package/dist-es/protocols/Aws_json1_1.js +61 -1
- package/dist-types/commands/CancelKeyDeletionCommand.d.ts +3 -1
- package/dist-types/commands/CreateAliasCommand.d.ts +3 -1
- package/dist-types/commands/CreateCustomKeyStoreCommand.d.ts +11 -8
- package/dist-types/commands/CreateGrantCommand.d.ts +9 -1
- package/dist-types/commands/CreateKeyCommand.d.ts +16 -13
- package/dist-types/commands/DecryptCommand.d.ts +10 -2
- package/dist-types/commands/DeleteAliasCommand.d.ts +3 -1
- package/dist-types/commands/DeleteImportedKeyMaterialCommand.d.ts +3 -1
- package/dist-types/commands/DescribeCustomKeyStoresCommand.d.ts +2 -2
- package/dist-types/commands/DisableKeyCommand.d.ts +3 -1
- package/dist-types/commands/DisableKeyRotationCommand.d.ts +3 -1
- package/dist-types/commands/EnableKeyCommand.d.ts +3 -1
- package/dist-types/commands/EnableKeyRotationCommand.d.ts +3 -1
- package/dist-types/commands/EncryptCommand.d.ts +10 -3
- package/dist-types/commands/GenerateDataKeyCommand.d.ts +17 -8
- package/dist-types/commands/GenerateDataKeyPairCommand.d.ts +21 -11
- package/dist-types/commands/GenerateDataKeyPairWithoutPlaintextCommand.d.ts +13 -4
- package/dist-types/commands/GenerateDataKeyWithoutPlaintextCommand.d.ts +13 -4
- package/dist-types/commands/GenerateMacCommand.d.ts +12 -3
- package/dist-types/commands/GenerateRandomCommand.d.ts +1 -1
- package/dist-types/commands/GetKeyPolicyCommand.d.ts +3 -1
- package/dist-types/commands/GetKeyRotationStatusCommand.d.ts +3 -1
- package/dist-types/commands/GetParametersForImportCommand.d.ts +7 -4
- package/dist-types/commands/GetPublicKeyCommand.d.ts +8 -7
- package/dist-types/commands/ImportKeyMaterialCommand.d.ts +4 -3
- package/dist-types/commands/ListGrantsCommand.d.ts +3 -1
- package/dist-types/commands/ListKeyPoliciesCommand.d.ts +3 -1
- package/dist-types/commands/PutKeyPolicyCommand.d.ts +3 -1
- package/dist-types/commands/ReEncryptCommand.d.ts +9 -1
- package/dist-types/commands/ReplicateKeyCommand.d.ts +3 -1
- package/dist-types/commands/RetireGrantCommand.d.ts +9 -1
- package/dist-types/commands/RevokeGrantCommand.d.ts +9 -1
- package/dist-types/commands/ScheduleKeyDeletionCommand.d.ts +6 -4
- package/dist-types/commands/SignCommand.d.ts +9 -1
- package/dist-types/commands/TagResourceCommand.d.ts +3 -1
- package/dist-types/commands/UntagResourceCommand.d.ts +3 -1
- package/dist-types/commands/UpdateAliasCommand.d.ts +3 -1
- package/dist-types/commands/UpdateCustomKeyStoreCommand.d.ts +5 -3
- package/dist-types/commands/UpdateKeyDescriptionCommand.d.ts +3 -1
- package/dist-types/commands/UpdatePrimaryRegionCommand.d.ts +3 -1
- package/dist-types/commands/VerifyCommand.d.ts +17 -10
- package/dist-types/commands/VerifyMacCommand.d.ts +9 -1
- package/dist-types/models/models_0.d.ts +228 -126
- package/dist-types/ts3.4/models/models_0.d.ts +21 -0
- package/package.json +1 -1
|
@@ -40,8 +40,7 @@ export interface ImportKeyMaterialCommandOutput extends ImportKeyMaterialRespons
|
|
|
40
40
|
* <p>Each time you import key material into KMS, you can determine whether
|
|
41
41
|
* (<code>ExpirationModel</code>) and when (<code>ValidTo</code>) the key material expires. To
|
|
42
42
|
* change the expiration of your key material, you must import it again, either by calling
|
|
43
|
-
*
|
|
44
|
-
* KMS console.</p>
|
|
43
|
+
* <code>ImportKeyMaterial</code> or using the <a href="kms/latest/developerguide/importing-keys-import-key-material.html#importing-keys-import-key-material-console">import features</a> of the KMS console.</p>
|
|
45
44
|
* <p>Before calling <code>ImportKeyMaterial</code>:</p>
|
|
46
45
|
* <ul>
|
|
47
46
|
* <li>
|
|
@@ -197,7 +196,9 @@ export interface ImportKeyMaterialCommandOutput extends ImportKeyMaterialRespons
|
|
|
197
196
|
* </i>.</p>
|
|
198
197
|
* </li>
|
|
199
198
|
* <li>
|
|
200
|
-
* <p>For cryptographic operations on KMS keys in custom key stores, this exception
|
|
199
|
+
* <p>For cryptographic operations on KMS keys in custom key stores, this exception
|
|
200
|
+
* represents a general failure with many possible causes. To identify the cause, see the
|
|
201
|
+
* error message that accompanies the exception.</p>
|
|
201
202
|
* </li>
|
|
202
203
|
* </ul>
|
|
203
204
|
*
|
|
@@ -151,7 +151,9 @@ export interface ListGrantsCommandOutput extends ListGrantsResponse, __MetadataB
|
|
|
151
151
|
* </i>.</p>
|
|
152
152
|
* </li>
|
|
153
153
|
* <li>
|
|
154
|
-
* <p>For cryptographic operations on KMS keys in custom key stores, this exception
|
|
154
|
+
* <p>For cryptographic operations on KMS keys in custom key stores, this exception
|
|
155
|
+
* represents a general failure with many possible causes. To identify the cause, see the
|
|
156
|
+
* error message that accompanies the exception.</p>
|
|
155
157
|
* </li>
|
|
156
158
|
* </ul>
|
|
157
159
|
*
|
|
@@ -100,7 +100,9 @@ export interface ListKeyPoliciesCommandOutput extends ListKeyPoliciesResponse, _
|
|
|
100
100
|
* </i>.</p>
|
|
101
101
|
* </li>
|
|
102
102
|
* <li>
|
|
103
|
-
* <p>For cryptographic operations on KMS keys in custom key stores, this exception
|
|
103
|
+
* <p>For cryptographic operations on KMS keys in custom key stores, this exception
|
|
104
|
+
* represents a general failure with many possible causes. To identify the cause, see the
|
|
105
|
+
* error message that accompanies the exception.</p>
|
|
104
106
|
* </li>
|
|
105
107
|
* </ul>
|
|
106
108
|
*
|
|
@@ -86,7 +86,9 @@ export interface PutKeyPolicyCommandOutput extends __MetadataBearer {
|
|
|
86
86
|
* </i>.</p>
|
|
87
87
|
* </li>
|
|
88
88
|
* <li>
|
|
89
|
-
* <p>For cryptographic operations on KMS keys in custom key stores, this exception
|
|
89
|
+
* <p>For cryptographic operations on KMS keys in custom key stores, this exception
|
|
90
|
+
* represents a general failure with many possible causes. To identify the cause, see the
|
|
91
|
+
* error message that accompanies the exception.</p>
|
|
90
92
|
* </li>
|
|
91
93
|
* </ul>
|
|
92
94
|
*
|
|
@@ -139,6 +139,7 @@ export interface ReEncryptCommandOutput extends ReEncryptResponse, __MetadataBea
|
|
|
139
139
|
* GrantTokens: [ // GrantTokenList
|
|
140
140
|
* "STRING_VALUE",
|
|
141
141
|
* ],
|
|
142
|
+
* DryRun: true || false,
|
|
142
143
|
* };
|
|
143
144
|
* const command = new ReEncryptCommand(input);
|
|
144
145
|
* const response = await client.send(command);
|
|
@@ -165,6 +166,11 @@ export interface ReEncryptCommandOutput extends ReEncryptResponse, __MetadataBea
|
|
|
165
166
|
* @throws {@link DisabledException} (client fault)
|
|
166
167
|
* <p>The request was rejected because the specified KMS key is not enabled.</p>
|
|
167
168
|
*
|
|
169
|
+
* @throws {@link DryRunOperationException} (client fault)
|
|
170
|
+
* <p>
|
|
171
|
+
* The request was rejected because the DryRun parameter was specified.
|
|
172
|
+
* </p>
|
|
173
|
+
*
|
|
168
174
|
* @throws {@link IncorrectKeyException} (client fault)
|
|
169
175
|
* <p>The request was rejected because the specified KMS key cannot decrypt the data. The
|
|
170
176
|
* <code>KeyId</code> in a <a>Decrypt</a> request and the <code>SourceKeyId</code>
|
|
@@ -225,7 +231,9 @@ export interface ReEncryptCommandOutput extends ReEncryptResponse, __MetadataBea
|
|
|
225
231
|
* </i>.</p>
|
|
226
232
|
* </li>
|
|
227
233
|
* <li>
|
|
228
|
-
* <p>For cryptographic operations on KMS keys in custom key stores, this exception
|
|
234
|
+
* <p>For cryptographic operations on KMS keys in custom key stores, this exception
|
|
235
|
+
* represents a general failure with many possible causes. To identify the cause, see the
|
|
236
|
+
* error message that accompanies the exception.</p>
|
|
229
237
|
* </li>
|
|
230
238
|
* </ul>
|
|
231
239
|
*
|
|
@@ -220,7 +220,9 @@ export interface ReplicateKeyCommandOutput extends ReplicateKeyResponse, __Metad
|
|
|
220
220
|
* </i>.</p>
|
|
221
221
|
* </li>
|
|
222
222
|
* <li>
|
|
223
|
-
* <p>For cryptographic operations on KMS keys in custom key stores, this exception
|
|
223
|
+
* <p>For cryptographic operations on KMS keys in custom key stores, this exception
|
|
224
|
+
* represents a general failure with many possible causes. To identify the cause, see the
|
|
225
|
+
* error message that accompanies the exception.</p>
|
|
224
226
|
* </li>
|
|
225
227
|
* </ul>
|
|
226
228
|
*
|
|
@@ -79,6 +79,7 @@ export interface RetireGrantCommandOutput extends __MetadataBearer {
|
|
|
79
79
|
* GrantToken: "STRING_VALUE",
|
|
80
80
|
* KeyId: "STRING_VALUE",
|
|
81
81
|
* GrantId: "STRING_VALUE",
|
|
82
|
+
* DryRun: true || false,
|
|
82
83
|
* };
|
|
83
84
|
* const command = new RetireGrantCommand(input);
|
|
84
85
|
* const response = await client.send(command);
|
|
@@ -96,6 +97,11 @@ export interface RetireGrantCommandOutput extends __MetadataBearer {
|
|
|
96
97
|
* <p>The system timed out while trying to fulfill the request. You can retry the
|
|
97
98
|
* request.</p>
|
|
98
99
|
*
|
|
100
|
+
* @throws {@link DryRunOperationException} (client fault)
|
|
101
|
+
* <p>
|
|
102
|
+
* The request was rejected because the DryRun parameter was specified.
|
|
103
|
+
* </p>
|
|
104
|
+
*
|
|
99
105
|
* @throws {@link InvalidArnException} (client fault)
|
|
100
106
|
* <p>The request was rejected because a specified ARN, or an ARN in a key policy, is not
|
|
101
107
|
* valid.</p>
|
|
@@ -124,7 +130,9 @@ export interface RetireGrantCommandOutput extends __MetadataBearer {
|
|
|
124
130
|
* </i>.</p>
|
|
125
131
|
* </li>
|
|
126
132
|
* <li>
|
|
127
|
-
* <p>For cryptographic operations on KMS keys in custom key stores, this exception
|
|
133
|
+
* <p>For cryptographic operations on KMS keys in custom key stores, this exception
|
|
134
|
+
* represents a general failure with many possible causes. To identify the cause, see the
|
|
135
|
+
* error message that accompanies the exception.</p>
|
|
128
136
|
* </li>
|
|
129
137
|
* </ul>
|
|
130
138
|
*
|
|
@@ -76,6 +76,7 @@ export interface RevokeGrantCommandOutput extends __MetadataBearer {
|
|
|
76
76
|
* const input = { // RevokeGrantRequest
|
|
77
77
|
* KeyId: "STRING_VALUE", // required
|
|
78
78
|
* GrantId: "STRING_VALUE", // required
|
|
79
|
+
* DryRun: true || false,
|
|
79
80
|
* };
|
|
80
81
|
* const command = new RevokeGrantCommand(input);
|
|
81
82
|
* const response = await client.send(command);
|
|
@@ -93,6 +94,11 @@ export interface RevokeGrantCommandOutput extends __MetadataBearer {
|
|
|
93
94
|
* <p>The system timed out while trying to fulfill the request. You can retry the
|
|
94
95
|
* request.</p>
|
|
95
96
|
*
|
|
97
|
+
* @throws {@link DryRunOperationException} (client fault)
|
|
98
|
+
* <p>
|
|
99
|
+
* The request was rejected because the DryRun parameter was specified.
|
|
100
|
+
* </p>
|
|
101
|
+
*
|
|
96
102
|
* @throws {@link InvalidArnException} (client fault)
|
|
97
103
|
* <p>The request was rejected because a specified ARN, or an ARN in a key policy, is not
|
|
98
104
|
* valid.</p>
|
|
@@ -118,7 +124,9 @@ export interface RevokeGrantCommandOutput extends __MetadataBearer {
|
|
|
118
124
|
* </i>.</p>
|
|
119
125
|
* </li>
|
|
120
126
|
* <li>
|
|
121
|
-
* <p>For cryptographic operations on KMS keys in custom key stores, this exception
|
|
127
|
+
* <p>For cryptographic operations on KMS keys in custom key stores, this exception
|
|
128
|
+
* represents a general failure with many possible causes. To identify the cause, see the
|
|
129
|
+
* error message that accompanies the exception.</p>
|
|
122
130
|
* </li>
|
|
123
131
|
* </ul>
|
|
124
132
|
*
|
|
@@ -35,9 +35,9 @@ export interface ScheduleKeyDeletionCommandOutput extends ScheduleKeyDeletionRes
|
|
|
35
35
|
* <p>Deleting a KMS key is a destructive and potentially dangerous operation. When a KMS key
|
|
36
36
|
* is deleted, all data that was encrypted under the KMS key is unrecoverable. (The only
|
|
37
37
|
* exception is a <a href="kms/latest/developerguide/multi-region-keys-delete.html">multi-Region replica
|
|
38
|
-
* key</a>, or an asymmetric or HMAC KMS
|
|
39
|
-
*
|
|
40
|
-
*
|
|
38
|
+
* key</a>, or an <a href="kms/latest/developerguide/importing-keys-managing.html#import-delete-key">asymmetric or HMAC KMS
|
|
39
|
+
* key with imported key material</a>.) To prevent the use of a KMS key without deleting
|
|
40
|
+
* it, use <a>DisableKey</a>. </p>
|
|
41
41
|
* </important>
|
|
42
42
|
* <p>You can schedule the deletion of a multi-Region primary key and its replica keys at any
|
|
43
43
|
* time. However, KMS will not delete a multi-Region primary key with existing replica keys. If
|
|
@@ -134,7 +134,9 @@ export interface ScheduleKeyDeletionCommandOutput extends ScheduleKeyDeletionRes
|
|
|
134
134
|
* </i>.</p>
|
|
135
135
|
* </li>
|
|
136
136
|
* <li>
|
|
137
|
-
* <p>For cryptographic operations on KMS keys in custom key stores, this exception
|
|
137
|
+
* <p>For cryptographic operations on KMS keys in custom key stores, this exception
|
|
138
|
+
* represents a general failure with many possible causes. To identify the cause, see the
|
|
139
|
+
* error message that accompanies the exception.</p>
|
|
138
140
|
* </li>
|
|
139
141
|
* </ul>
|
|
140
142
|
*
|
|
@@ -89,6 +89,7 @@ export interface SignCommandOutput extends SignResponse, __MetadataBearer {
|
|
|
89
89
|
* "STRING_VALUE",
|
|
90
90
|
* ],
|
|
91
91
|
* SigningAlgorithm: "RSASSA_PSS_SHA_256" || "RSASSA_PSS_SHA_384" || "RSASSA_PSS_SHA_512" || "RSASSA_PKCS1_V1_5_SHA_256" || "RSASSA_PKCS1_V1_5_SHA_384" || "RSASSA_PKCS1_V1_5_SHA_512" || "ECDSA_SHA_256" || "ECDSA_SHA_384" || "ECDSA_SHA_512" || "SM2DSA", // required
|
|
92
|
+
* DryRun: true || false,
|
|
92
93
|
* };
|
|
93
94
|
* const command = new SignCommand(input);
|
|
94
95
|
* const response = await client.send(command);
|
|
@@ -113,6 +114,11 @@ export interface SignCommandOutput extends SignResponse, __MetadataBearer {
|
|
|
113
114
|
* @throws {@link DisabledException} (client fault)
|
|
114
115
|
* <p>The request was rejected because the specified KMS key is not enabled.</p>
|
|
115
116
|
*
|
|
117
|
+
* @throws {@link DryRunOperationException} (client fault)
|
|
118
|
+
* <p>
|
|
119
|
+
* The request was rejected because the DryRun parameter was specified.
|
|
120
|
+
* </p>
|
|
121
|
+
*
|
|
116
122
|
* @throws {@link InvalidGrantTokenException} (client fault)
|
|
117
123
|
* <p>The request was rejected because the specified grant token is not valid.</p>
|
|
118
124
|
*
|
|
@@ -159,7 +165,9 @@ export interface SignCommandOutput extends SignResponse, __MetadataBearer {
|
|
|
159
165
|
* </i>.</p>
|
|
160
166
|
* </li>
|
|
161
167
|
* <li>
|
|
162
|
-
* <p>For cryptographic operations on KMS keys in custom key stores, this exception
|
|
168
|
+
* <p>For cryptographic operations on KMS keys in custom key stores, this exception
|
|
169
|
+
* represents a general failure with many possible causes. To identify the cause, see the
|
|
170
|
+
* error message that accompanies the exception.</p>
|
|
163
171
|
* </li>
|
|
164
172
|
* </ul>
|
|
165
173
|
*
|
|
@@ -119,7 +119,9 @@ export interface TagResourceCommandOutput extends __MetadataBearer {
|
|
|
119
119
|
* </i>.</p>
|
|
120
120
|
* </li>
|
|
121
121
|
* <li>
|
|
122
|
-
* <p>For cryptographic operations on KMS keys in custom key stores, this exception
|
|
122
|
+
* <p>For cryptographic operations on KMS keys in custom key stores, this exception
|
|
123
|
+
* represents a general failure with many possible causes. To identify the cause, see the
|
|
124
|
+
* error message that accompanies the exception.</p>
|
|
123
125
|
* </li>
|
|
124
126
|
* </ul>
|
|
125
127
|
*
|
|
@@ -111,7 +111,9 @@ export interface UntagResourceCommandOutput extends __MetadataBearer {
|
|
|
111
111
|
* </i>.</p>
|
|
112
112
|
* </li>
|
|
113
113
|
* <li>
|
|
114
|
-
* <p>For cryptographic operations on KMS keys in custom key stores, this exception
|
|
114
|
+
* <p>For cryptographic operations on KMS keys in custom key stores, this exception
|
|
115
|
+
* represents a general failure with many possible causes. To identify the cause, see the
|
|
116
|
+
* error message that accompanies the exception.</p>
|
|
115
117
|
* </li>
|
|
116
118
|
* </ul>
|
|
117
119
|
*
|
|
@@ -130,7 +130,9 @@ export interface UpdateAliasCommandOutput extends __MetadataBearer {
|
|
|
130
130
|
* </i>.</p>
|
|
131
131
|
* </li>
|
|
132
132
|
* <li>
|
|
133
|
-
* <p>For cryptographic operations on KMS keys in custom key stores, this exception
|
|
133
|
+
* <p>For cryptographic operations on KMS keys in custom key stores, this exception
|
|
134
|
+
* represents a general failure with many possible causes. To identify the cause, see the
|
|
135
|
+
* error message that accompanies the exception.</p>
|
|
134
136
|
* </li>
|
|
135
137
|
* </ul>
|
|
136
138
|
*
|
|
@@ -283,8 +283,9 @@ export interface UpdateCustomKeyStoreCommandOutput extends UpdateCustomKeyStoreR
|
|
|
283
283
|
* @throws {@link XksProxyUriUnreachableException} (client fault)
|
|
284
284
|
* <p>KMS was unable to reach the specified <code>XksProxyUriPath</code>. The path must be
|
|
285
285
|
* reachable before you create the external key store or update its settings.</p>
|
|
286
|
-
* <p>This exception is also thrown when the external key store proxy response to a
|
|
287
|
-
*
|
|
286
|
+
* <p>This exception is also thrown when the external key store proxy response to a
|
|
287
|
+
* <code>GetHealthStatus</code> request indicates that all external key manager instances are
|
|
288
|
+
* unavailable.</p>
|
|
288
289
|
*
|
|
289
290
|
* @throws {@link XksProxyVpcEndpointServiceInUseException} (client fault)
|
|
290
291
|
* <p>The request was rejected because the specified Amazon VPC endpoint service is already
|
|
@@ -294,7 +295,8 @@ export interface UpdateCustomKeyStoreCommandOutput extends UpdateCustomKeyStoreR
|
|
|
294
295
|
* @throws {@link XksProxyVpcEndpointServiceInvalidConfigurationException} (client fault)
|
|
295
296
|
* <p>The request was rejected because the Amazon VPC endpoint service configuration does not fulfill
|
|
296
297
|
* the requirements for an external key store proxy. For details, see the exception message and
|
|
297
|
-
* <a href="kms/latest/developerguide/vpc-connectivity.html#xks-vpc-requirements">review the
|
|
298
|
+
* <a href="kms/latest/developerguide/vpc-connectivity.html#xks-vpc-requirements">review the
|
|
299
|
+
* requirements</a> for Amazon VPC endpoint service connectivity for an external key
|
|
298
300
|
* store.</p>
|
|
299
301
|
*
|
|
300
302
|
* @throws {@link XksProxyVpcEndpointServiceNotFoundException} (client fault)
|
|
@@ -93,7 +93,9 @@ export interface UpdateKeyDescriptionCommandOutput extends __MetadataBearer {
|
|
|
93
93
|
* </i>.</p>
|
|
94
94
|
* </li>
|
|
95
95
|
* <li>
|
|
96
|
-
* <p>For cryptographic operations on KMS keys in custom key stores, this exception
|
|
96
|
+
* <p>For cryptographic operations on KMS keys in custom key stores, this exception
|
|
97
|
+
* represents a general failure with many possible causes. To identify the cause, see the
|
|
98
|
+
* error message that accompanies the exception.</p>
|
|
97
99
|
* </li>
|
|
98
100
|
* </ul>
|
|
99
101
|
*
|
|
@@ -135,7 +135,9 @@ export interface UpdatePrimaryRegionCommandOutput extends __MetadataBearer {
|
|
|
135
135
|
* </i>.</p>
|
|
136
136
|
* </li>
|
|
137
137
|
* <li>
|
|
138
|
-
* <p>For cryptographic operations on KMS keys in custom key stores, this exception
|
|
138
|
+
* <p>For cryptographic operations on KMS keys in custom key stores, this exception
|
|
139
|
+
* represents a general failure with many possible causes. To identify the cause, see the
|
|
140
|
+
* error message that accompanies the exception.</p>
|
|
139
141
|
* </li>
|
|
140
142
|
* </ul>
|
|
141
143
|
*
|
|
@@ -33,11 +33,10 @@ export interface VerifyCommandOutput extends VerifyResponse, __MetadataBearer {
|
|
|
33
33
|
* <p>A digital signature is generated by using the private key in an asymmetric KMS key. The
|
|
34
34
|
* signature is verified by using the public key in the same asymmetric KMS key.
|
|
35
35
|
* For information about asymmetric KMS keys, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/symmetric-asymmetric.html">Asymmetric KMS keys</a> in the <i>Key Management Service Developer Guide</i>.</p>
|
|
36
|
-
* <p>To use the <code>Verify</code> operation, specify the
|
|
37
|
-
*
|
|
38
|
-
*
|
|
39
|
-
*
|
|
40
|
-
* hashed as part of the verification process.</p>
|
|
36
|
+
* <p>To use the <code>Verify</code> operation, specify the same asymmetric KMS key, message,
|
|
37
|
+
* and signing algorithm that were used to produce the signature. The message type does not need
|
|
38
|
+
* to be the same as the one used for signing, but it must indicate whether the value of the
|
|
39
|
+
* <code>Message</code> parameter should be hashed as part of the verification process.</p>
|
|
41
40
|
* <p>You can also verify the digital signature by using the public key of the KMS key outside
|
|
42
41
|
* of KMS. Use the <a>GetPublicKey</a> operation to download the public key in the
|
|
43
42
|
* asymmetric KMS key and then use the public key to verify the signature outside of KMS. The
|
|
@@ -45,10 +44,10 @@ export interface VerifyCommandOutput extends VerifyResponse, __MetadataBearer {
|
|
|
45
44
|
* a result, it's easy to call, the operation is performed within the FIPS boundary, it is logged
|
|
46
45
|
* in CloudTrail, and you can use key policy and IAM policy to determine who is authorized to use
|
|
47
46
|
* the KMS key to verify signatures.</p>
|
|
48
|
-
* <p>To verify a signature outside of KMS with an SM2 public key (China Regions only), you
|
|
49
|
-
* specify the distinguishing ID. By default, KMS uses <code>1234567812345678</code> as
|
|
50
|
-
* distinguishing ID. For more information, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/asymmetric-key-specs.html#key-spec-sm-offline-verification">Offline
|
|
51
|
-
* with SM2 key pairs</a>.</p>
|
|
47
|
+
* <p>To verify a signature outside of KMS with an SM2 public key (China Regions only), you
|
|
48
|
+
* must specify the distinguishing ID. By default, KMS uses <code>1234567812345678</code> as
|
|
49
|
+
* the distinguishing ID. For more information, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/asymmetric-key-specs.html#key-spec-sm-offline-verification">Offline
|
|
50
|
+
* verification with SM2 key pairs</a>.</p>
|
|
52
51
|
* <p>The KMS key that you use for this operation must be in a compatible key state. For
|
|
53
52
|
* details, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-state.html">Key states of KMS keys</a> in the <i>Key Management Service Developer Guide</i>.</p>
|
|
54
53
|
* <p>
|
|
@@ -74,6 +73,7 @@ export interface VerifyCommandOutput extends VerifyResponse, __MetadataBearer {
|
|
|
74
73
|
* GrantTokens: [ // GrantTokenList
|
|
75
74
|
* "STRING_VALUE",
|
|
76
75
|
* ],
|
|
76
|
+
* DryRun: true || false,
|
|
77
77
|
* };
|
|
78
78
|
* const command = new VerifyCommand(input);
|
|
79
79
|
* const response = await client.send(command);
|
|
@@ -98,6 +98,11 @@ export interface VerifyCommandOutput extends VerifyResponse, __MetadataBearer {
|
|
|
98
98
|
* @throws {@link DisabledException} (client fault)
|
|
99
99
|
* <p>The request was rejected because the specified KMS key is not enabled.</p>
|
|
100
100
|
*
|
|
101
|
+
* @throws {@link DryRunOperationException} (client fault)
|
|
102
|
+
* <p>
|
|
103
|
+
* The request was rejected because the DryRun parameter was specified.
|
|
104
|
+
* </p>
|
|
105
|
+
*
|
|
101
106
|
* @throws {@link InvalidGrantTokenException} (client fault)
|
|
102
107
|
* <p>The request was rejected because the specified grant token is not valid.</p>
|
|
103
108
|
*
|
|
@@ -149,7 +154,9 @@ export interface VerifyCommandOutput extends VerifyResponse, __MetadataBearer {
|
|
|
149
154
|
* </i>.</p>
|
|
150
155
|
* </li>
|
|
151
156
|
* <li>
|
|
152
|
-
* <p>For cryptographic operations on KMS keys in custom key stores, this exception
|
|
157
|
+
* <p>For cryptographic operations on KMS keys in custom key stores, this exception
|
|
158
|
+
* represents a general failure with many possible causes. To identify the cause, see the
|
|
159
|
+
* error message that accompanies the exception.</p>
|
|
153
160
|
* </li>
|
|
154
161
|
* </ul>
|
|
155
162
|
*
|
|
@@ -58,6 +58,7 @@ export interface VerifyMacCommandOutput extends VerifyMacResponse, __MetadataBea
|
|
|
58
58
|
* GrantTokens: [ // GrantTokenList
|
|
59
59
|
* "STRING_VALUE",
|
|
60
60
|
* ],
|
|
61
|
+
* DryRun: true || false,
|
|
61
62
|
* };
|
|
62
63
|
* const command = new VerifyMacCommand(input);
|
|
63
64
|
* const response = await client.send(command);
|
|
@@ -78,6 +79,11 @@ export interface VerifyMacCommandOutput extends VerifyMacResponse, __MetadataBea
|
|
|
78
79
|
* @throws {@link DisabledException} (client fault)
|
|
79
80
|
* <p>The request was rejected because the specified KMS key is not enabled.</p>
|
|
80
81
|
*
|
|
82
|
+
* @throws {@link DryRunOperationException} (client fault)
|
|
83
|
+
* <p>
|
|
84
|
+
* The request was rejected because the DryRun parameter was specified.
|
|
85
|
+
* </p>
|
|
86
|
+
*
|
|
81
87
|
* @throws {@link InvalidGrantTokenException} (client fault)
|
|
82
88
|
* <p>The request was rejected because the specified grant token is not valid.</p>
|
|
83
89
|
*
|
|
@@ -129,7 +135,9 @@ export interface VerifyMacCommandOutput extends VerifyMacResponse, __MetadataBea
|
|
|
129
135
|
* </i>.</p>
|
|
130
136
|
* </li>
|
|
131
137
|
* <li>
|
|
132
|
-
* <p>For cryptographic operations on KMS keys in custom key stores, this exception
|
|
138
|
+
* <p>For cryptographic operations on KMS keys in custom key stores, this exception
|
|
139
|
+
* represents a general failure with many possible causes. To identify the cause, see the
|
|
140
|
+
* error message that accompanies the exception.</p>
|
|
133
141
|
* </li>
|
|
134
142
|
* </ul>
|
|
135
143
|
*
|