@aws-sdk/client-kms 3.427.0 → 3.429.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist-types/models/models_0.d.ts +58 -58
- package/dist-types/ts3.4/models/models_0.d.ts +58 -58
- package/package.json +31 -31
|
@@ -565,7 +565,7 @@ export interface CreateCustomKeyStoreRequest {
|
|
|
565
565
|
* of Amazon Web Services, enter <code>EXTERNAL_KEY_STORE</code>. You cannot change this property after the key
|
|
566
566
|
* store is created.</p>
|
|
567
567
|
*/
|
|
568
|
-
CustomKeyStoreType?: CustomKeyStoreType
|
|
568
|
+
CustomKeyStoreType?: CustomKeyStoreType;
|
|
569
569
|
/**
|
|
570
570
|
* @public
|
|
571
571
|
* <p>Specifies the endpoint that KMS uses to send requests to the external key store proxy
|
|
@@ -682,7 +682,7 @@ export interface CreateCustomKeyStoreRequest {
|
|
|
682
682
|
* VPC endpoint service, the proxy can be hosted within the VPC or outside of Amazon Web Services such as in
|
|
683
683
|
* your corporate data center.</p>
|
|
684
684
|
*/
|
|
685
|
-
XksProxyConnectivity?: XksProxyConnectivityType
|
|
685
|
+
XksProxyConnectivity?: XksProxyConnectivityType;
|
|
686
686
|
}
|
|
687
687
|
/**
|
|
688
688
|
* @public
|
|
@@ -985,7 +985,7 @@ export interface CreateGrantRequest {
|
|
|
985
985
|
* KMS returns a <code>ValidationError</code> exception. For details, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/grants.html#terms-grant-operations">Grant
|
|
986
986
|
* operations</a> in the <i>Key Management Service Developer Guide</i>.</p>
|
|
987
987
|
*/
|
|
988
|
-
Operations:
|
|
988
|
+
Operations: GrantOperation[] | undefined;
|
|
989
989
|
/**
|
|
990
990
|
* @public
|
|
991
991
|
* <p>Specifies a grant constraint.</p>
|
|
@@ -1270,7 +1270,7 @@ export interface CreateKeyRequest {
|
|
|
1270
1270
|
* </li>
|
|
1271
1271
|
* </ul>
|
|
1272
1272
|
*/
|
|
1273
|
-
KeyUsage?: KeyUsageType
|
|
1273
|
+
KeyUsage?: KeyUsageType;
|
|
1274
1274
|
/**
|
|
1275
1275
|
* @public
|
|
1276
1276
|
* @deprecated
|
|
@@ -1280,7 +1280,7 @@ export interface CreateKeyRequest {
|
|
|
1280
1280
|
* way. Only the names differ. We recommend that you use <code>KeySpec</code> parameter in your
|
|
1281
1281
|
* code. However, to avoid breaking changes, KMS supports both parameters.</p>
|
|
1282
1282
|
*/
|
|
1283
|
-
CustomerMasterKeySpec?: CustomerMasterKeySpec
|
|
1283
|
+
CustomerMasterKeySpec?: CustomerMasterKeySpec;
|
|
1284
1284
|
/**
|
|
1285
1285
|
* @public
|
|
1286
1286
|
* <p>Specifies the type of KMS key to create. The default value,
|
|
@@ -1398,7 +1398,7 @@ export interface CreateKeyRequest {
|
|
|
1398
1398
|
* </li>
|
|
1399
1399
|
* </ul>
|
|
1400
1400
|
*/
|
|
1401
|
-
KeySpec?: KeySpec
|
|
1401
|
+
KeySpec?: KeySpec;
|
|
1402
1402
|
/**
|
|
1403
1403
|
* @public
|
|
1404
1404
|
* <p>The source of the key material for the KMS key. You cannot change the origin after you
|
|
@@ -1421,7 +1421,7 @@ export interface CreateKeyRequest {
|
|
|
1421
1421
|
* the <code>XksKeyId</code> parameter to identify the associated external key. The
|
|
1422
1422
|
* <code>KeySpec</code> value must be <code>SYMMETRIC_DEFAULT</code>.</p>
|
|
1423
1423
|
*/
|
|
1424
|
-
Origin?: OriginType
|
|
1424
|
+
Origin?: OriginType;
|
|
1425
1425
|
/**
|
|
1426
1426
|
* @public
|
|
1427
1427
|
* <p>Creates the KMS key in the specified <a href="https://docs.aws.amazon.com/kms/latest/developerguide/custom-key-store-overview.html">custom key store</a>. The <code>ConnectionState</code> of
|
|
@@ -1621,7 +1621,7 @@ export interface MultiRegionConfiguration {
|
|
|
1621
1621
|
* <p>Indicates whether the KMS key is a <code>PRIMARY</code> or <code>REPLICA</code>
|
|
1622
1622
|
* key.</p>
|
|
1623
1623
|
*/
|
|
1624
|
-
MultiRegionKeyType?: MultiRegionKeyType
|
|
1624
|
+
MultiRegionKeyType?: MultiRegionKeyType;
|
|
1625
1625
|
/**
|
|
1626
1626
|
* @public
|
|
1627
1627
|
* <p>Displays the key ARN and Region of the primary key. This field includes the current KMS
|
|
@@ -1717,14 +1717,14 @@ export interface KeyMetadata {
|
|
|
1717
1717
|
* @public
|
|
1718
1718
|
* <p>The <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#cryptographic-operations">cryptographic operations</a> for which you can use the KMS key.</p>
|
|
1719
1719
|
*/
|
|
1720
|
-
KeyUsage?: KeyUsageType
|
|
1720
|
+
KeyUsage?: KeyUsageType;
|
|
1721
1721
|
/**
|
|
1722
1722
|
* @public
|
|
1723
1723
|
* <p>The current status of the KMS key.</p>
|
|
1724
1724
|
* <p>For more information about how key state affects the use of a KMS key, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-state.html">Key states of KMS keys</a> in
|
|
1725
1725
|
* the <i>Key Management Service Developer Guide</i>.</p>
|
|
1726
1726
|
*/
|
|
1727
|
-
KeyState?: KeyState
|
|
1727
|
+
KeyState?: KeyState;
|
|
1728
1728
|
/**
|
|
1729
1729
|
* @public
|
|
1730
1730
|
* <p>The date and time after which KMS deletes this KMS key. This value is present only when
|
|
@@ -1751,7 +1751,7 @@ export interface KeyMetadata {
|
|
|
1751
1751
|
* <code>AWS_CLOUDHSM</code>, the key material was created in the CloudHSM cluster associated with
|
|
1752
1752
|
* a custom key store.</p>
|
|
1753
1753
|
*/
|
|
1754
|
-
Origin?: OriginType
|
|
1754
|
+
Origin?: OriginType;
|
|
1755
1755
|
/**
|
|
1756
1756
|
* @public
|
|
1757
1757
|
* <p>A unique identifier for the <a href="https://docs.aws.amazon.com/kms/latest/developerguide/custom-key-store-overview.html">custom key store</a> that contains the KMS key. This field is
|
|
@@ -1771,13 +1771,13 @@ export interface KeyMetadata {
|
|
|
1771
1771
|
* <p>Specifies whether the KMS key's key material expires. This value is present only when
|
|
1772
1772
|
* <code>Origin</code> is <code>EXTERNAL</code>, otherwise this value is omitted.</p>
|
|
1773
1773
|
*/
|
|
1774
|
-
ExpirationModel?: ExpirationModelType
|
|
1774
|
+
ExpirationModel?: ExpirationModelType;
|
|
1775
1775
|
/**
|
|
1776
1776
|
* @public
|
|
1777
1777
|
* <p>The manager of the KMS key. KMS keys in your Amazon Web Services account are either customer managed or
|
|
1778
1778
|
* Amazon Web Services managed. For more information about the difference, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#kms_keys">KMS keys</a> in the <i>Key Management Service Developer Guide</i>.</p>
|
|
1779
1779
|
*/
|
|
1780
|
-
KeyManager?: KeyManagerType
|
|
1780
|
+
KeyManager?: KeyManagerType;
|
|
1781
1781
|
/**
|
|
1782
1782
|
* @public
|
|
1783
1783
|
* @deprecated
|
|
@@ -1787,12 +1787,12 @@ export interface KeyMetadata {
|
|
|
1787
1787
|
* value. We recommend that you use the <code>KeySpec</code> field in your code. However, to
|
|
1788
1788
|
* avoid breaking changes, KMS supports both fields.</p>
|
|
1789
1789
|
*/
|
|
1790
|
-
CustomerMasterKeySpec?: CustomerMasterKeySpec
|
|
1790
|
+
CustomerMasterKeySpec?: CustomerMasterKeySpec;
|
|
1791
1791
|
/**
|
|
1792
1792
|
* @public
|
|
1793
1793
|
* <p>Describes the type of key material in the KMS key.</p>
|
|
1794
1794
|
*/
|
|
1795
|
-
KeySpec?: KeySpec
|
|
1795
|
+
KeySpec?: KeySpec;
|
|
1796
1796
|
/**
|
|
1797
1797
|
* @public
|
|
1798
1798
|
* <p>The encryption algorithms that the KMS key supports. You cannot use the KMS key with other
|
|
@@ -1800,7 +1800,7 @@ export interface KeyMetadata {
|
|
|
1800
1800
|
* <p>This value is present only when the <code>KeyUsage</code> of the KMS key is
|
|
1801
1801
|
* <code>ENCRYPT_DECRYPT</code>.</p>
|
|
1802
1802
|
*/
|
|
1803
|
-
EncryptionAlgorithms?:
|
|
1803
|
+
EncryptionAlgorithms?: EncryptionAlgorithmSpec[];
|
|
1804
1804
|
/**
|
|
1805
1805
|
* @public
|
|
1806
1806
|
* <p>The signing algorithms that the KMS key supports. You cannot use the KMS key with other
|
|
@@ -1808,7 +1808,7 @@ export interface KeyMetadata {
|
|
|
1808
1808
|
* <p>This field appears only when the <code>KeyUsage</code> of the KMS key is
|
|
1809
1809
|
* <code>SIGN_VERIFY</code>.</p>
|
|
1810
1810
|
*/
|
|
1811
|
-
SigningAlgorithms?:
|
|
1811
|
+
SigningAlgorithms?: SigningAlgorithmSpec[];
|
|
1812
1812
|
/**
|
|
1813
1813
|
* @public
|
|
1814
1814
|
* <p>Indicates whether the KMS key is a multi-Region (<code>True</code>) or regional
|
|
@@ -1864,7 +1864,7 @@ export interface KeyMetadata {
|
|
|
1864
1864
|
* <p>This value is present only when the <code>KeyUsage</code> of the KMS key is
|
|
1865
1865
|
* <code>GENERATE_VERIFY_MAC</code>.</p>
|
|
1866
1866
|
*/
|
|
1867
|
-
MacAlgorithms?:
|
|
1867
|
+
MacAlgorithms?: MacAlgorithmSpec[];
|
|
1868
1868
|
/**
|
|
1869
1869
|
* @public
|
|
1870
1870
|
* <p>Information about the external key that is associated with a KMS key in an external key
|
|
@@ -1997,7 +1997,7 @@ export interface XksProxyConfigurationType {
|
|
|
1997
1997
|
* <p>Indicates whether the external key store proxy uses a public endpoint or an Amazon VPC endpoint
|
|
1998
1998
|
* service to communicate with KMS.</p>
|
|
1999
1999
|
*/
|
|
2000
|
-
Connectivity?: XksProxyConnectivityType
|
|
2000
|
+
Connectivity?: XksProxyConnectivityType;
|
|
2001
2001
|
/**
|
|
2002
2002
|
* @public
|
|
2003
2003
|
* <p>The part of the external key store <a href="https://docs.aws.amazon.com/kms/latest/APIReference/API_CreateCustomKeyStore.html#KMS-CreateCustomKeyStore-request-XksProxyAuthenticationCredential">proxy authentication credential</a> that uniquely identifies the secret access
|
|
@@ -2078,7 +2078,7 @@ export interface CustomKeyStoresListEntry {
|
|
|
2078
2078
|
* For help resolving a connection failure, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/fix-keystore.html">Troubleshooting a custom key store</a> in the
|
|
2079
2079
|
* <i>Key Management Service Developer Guide</i>.</p>
|
|
2080
2080
|
*/
|
|
2081
|
-
ConnectionState?: ConnectionStateType
|
|
2081
|
+
ConnectionState?: ConnectionStateType;
|
|
2082
2082
|
/**
|
|
2083
2083
|
* @public
|
|
2084
2084
|
* <p>Describes the connection error. This field appears in the response only when the
|
|
@@ -2265,7 +2265,7 @@ export interface CustomKeyStoresListEntry {
|
|
|
2265
2265
|
* </li>
|
|
2266
2266
|
* </ul>
|
|
2267
2267
|
*/
|
|
2268
|
-
ConnectionErrorCode?: ConnectionErrorCodeType
|
|
2268
|
+
ConnectionErrorCode?: ConnectionErrorCodeType;
|
|
2269
2269
|
/**
|
|
2270
2270
|
* @public
|
|
2271
2271
|
* <p>The date and time when the custom key store was created.</p>
|
|
@@ -2277,7 +2277,7 @@ export interface CustomKeyStoresListEntry {
|
|
|
2277
2277
|
* key store backed by an CloudHSM cluster. <code>EXTERNAL_KEY_STORE</code> indicates a custom key
|
|
2278
2278
|
* store backed by an external key store proxy and external key manager outside of Amazon Web Services.</p>
|
|
2279
2279
|
*/
|
|
2280
|
-
CustomKeyStoreType?: CustomKeyStoreType
|
|
2280
|
+
CustomKeyStoreType?: CustomKeyStoreType;
|
|
2281
2281
|
/**
|
|
2282
2282
|
* @public
|
|
2283
2283
|
* <p>Configuration settings for the external key store proxy (XKS proxy). The external key
|
|
@@ -2344,7 +2344,7 @@ export interface RecipientInfo {
|
|
|
2344
2344
|
* Enclave to encrypt plaintext values for the response. The only valid value is
|
|
2345
2345
|
* <code>RSAES_OAEP_SHA_256</code>.</p>
|
|
2346
2346
|
*/
|
|
2347
|
-
KeyEncryptionAlgorithm?: KeyEncryptionMechanism
|
|
2347
|
+
KeyEncryptionAlgorithm?: KeyEncryptionMechanism;
|
|
2348
2348
|
/**
|
|
2349
2349
|
* @public
|
|
2350
2350
|
* <p>The attestation document for an Amazon Web Services Nitro Enclave. This document includes the enclave's
|
|
@@ -2421,7 +2421,7 @@ export interface DecryptRequest {
|
|
|
2421
2421
|
* key. The default value, <code>SYMMETRIC_DEFAULT</code>, represents the only supported
|
|
2422
2422
|
* algorithm that is valid for symmetric encryption KMS keys.</p>
|
|
2423
2423
|
*/
|
|
2424
|
-
EncryptionAlgorithm?: EncryptionAlgorithmSpec
|
|
2424
|
+
EncryptionAlgorithm?: EncryptionAlgorithmSpec;
|
|
2425
2425
|
/**
|
|
2426
2426
|
* @public
|
|
2427
2427
|
* <p>A signed <a href="https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/nitro-enclave-how.html#term-attestdoc">attestation document</a> from
|
|
@@ -2464,7 +2464,7 @@ export interface DecryptResponse {
|
|
|
2464
2464
|
* @public
|
|
2465
2465
|
* <p>The encryption algorithm that was used to decrypt the ciphertext.</p>
|
|
2466
2466
|
*/
|
|
2467
|
-
EncryptionAlgorithm?: EncryptionAlgorithmSpec
|
|
2467
|
+
EncryptionAlgorithm?: EncryptionAlgorithmSpec;
|
|
2468
2468
|
/**
|
|
2469
2469
|
* @public
|
|
2470
2470
|
* <p>The plaintext data encrypted with the public key in the attestation document. </p>
|
|
@@ -2902,7 +2902,7 @@ export interface EncryptRequest {
|
|
|
2902
2902
|
* you are using an asymmetric KMS key, we recommend RSAES_OAEP_SHA_256.</p>
|
|
2903
2903
|
* <p>The SM2PKE algorithm is only available in China Regions.</p>
|
|
2904
2904
|
*/
|
|
2905
|
-
EncryptionAlgorithm?: EncryptionAlgorithmSpec
|
|
2905
|
+
EncryptionAlgorithm?: EncryptionAlgorithmSpec;
|
|
2906
2906
|
/**
|
|
2907
2907
|
* @public
|
|
2908
2908
|
* <p>Checks if your request will succeed. <code>DryRun</code> is an optional parameter. </p>
|
|
@@ -2928,7 +2928,7 @@ export interface EncryptResponse {
|
|
|
2928
2928
|
* @public
|
|
2929
2929
|
* <p>The encryption algorithm that was used to encrypt the plaintext.</p>
|
|
2930
2930
|
*/
|
|
2931
|
-
EncryptionAlgorithm?: EncryptionAlgorithmSpec
|
|
2931
|
+
EncryptionAlgorithm?: EncryptionAlgorithmSpec;
|
|
2932
2932
|
}
|
|
2933
2933
|
/**
|
|
2934
2934
|
* @public
|
|
@@ -3004,7 +3004,7 @@ export interface GenerateDataKeyRequest {
|
|
|
3004
3004
|
* <p>You must specify either the <code>KeySpec</code> or the <code>NumberOfBytes</code>
|
|
3005
3005
|
* parameter (but not both) in every <code>GenerateDataKey</code> request.</p>
|
|
3006
3006
|
*/
|
|
3007
|
-
KeySpec?: DataKeySpec
|
|
3007
|
+
KeySpec?: DataKeySpec;
|
|
3008
3008
|
/**
|
|
3009
3009
|
* @public
|
|
3010
3010
|
* <p>A list of grant tokens.</p>
|
|
@@ -3119,7 +3119,7 @@ export interface GenerateDataKeyPairRequest {
|
|
|
3119
3119
|
* <p>Determines the type of data key pair that is generated. </p>
|
|
3120
3120
|
* <p>The KMS rule that restricts the use of asymmetric RSA and SM2 KMS keys to encrypt and decrypt or to sign and verify (but not both), and the rule that permits you to use ECC KMS keys only to sign and verify, are not effective on data key pairs, which are used outside of KMS. The SM2 key spec is only available in China Regions.</p>
|
|
3121
3121
|
*/
|
|
3122
|
-
KeyPairSpec: DataKeyPairSpec |
|
|
3122
|
+
KeyPairSpec: DataKeyPairSpec | undefined;
|
|
3123
3123
|
/**
|
|
3124
3124
|
* @public
|
|
3125
3125
|
* <p>A list of grant tokens.</p>
|
|
@@ -3181,7 +3181,7 @@ export interface GenerateDataKeyPairResponse {
|
|
|
3181
3181
|
* @public
|
|
3182
3182
|
* <p>The type of data key pair that was generated.</p>
|
|
3183
3183
|
*/
|
|
3184
|
-
KeyPairSpec?: DataKeyPairSpec
|
|
3184
|
+
KeyPairSpec?: DataKeyPairSpec;
|
|
3185
3185
|
/**
|
|
3186
3186
|
* @public
|
|
3187
3187
|
* <p>The plaintext private data key encrypted with the public key from the Nitro enclave. This
|
|
@@ -3243,7 +3243,7 @@ export interface GenerateDataKeyPairWithoutPlaintextRequest {
|
|
|
3243
3243
|
* <p>Determines the type of data key pair that is generated.</p>
|
|
3244
3244
|
* <p>The KMS rule that restricts the use of asymmetric RSA and SM2 KMS keys to encrypt and decrypt or to sign and verify (but not both), and the rule that permits you to use ECC KMS keys only to sign and verify, are not effective on data key pairs, which are used outside of KMS. The SM2 key spec is only available in China Regions.</p>
|
|
3245
3245
|
*/
|
|
3246
|
-
KeyPairSpec: DataKeyPairSpec |
|
|
3246
|
+
KeyPairSpec: DataKeyPairSpec | undefined;
|
|
3247
3247
|
/**
|
|
3248
3248
|
* @public
|
|
3249
3249
|
* <p>A list of grant tokens.</p>
|
|
@@ -3281,7 +3281,7 @@ export interface GenerateDataKeyPairWithoutPlaintextResponse {
|
|
|
3281
3281
|
* @public
|
|
3282
3282
|
* <p>The type of data key pair that was generated.</p>
|
|
3283
3283
|
*/
|
|
3284
|
-
KeyPairSpec?: DataKeyPairSpec
|
|
3284
|
+
KeyPairSpec?: DataKeyPairSpec;
|
|
3285
3285
|
}
|
|
3286
3286
|
/**
|
|
3287
3287
|
* @public
|
|
@@ -3333,7 +3333,7 @@ export interface GenerateDataKeyWithoutPlaintextRequest {
|
|
|
3333
3333
|
* <p>The length of the data key. Use <code>AES_128</code> to generate a 128-bit symmetric key,
|
|
3334
3334
|
* or <code>AES_256</code> to generate a 256-bit symmetric key.</p>
|
|
3335
3335
|
*/
|
|
3336
|
-
KeySpec?: DataKeySpec
|
|
3336
|
+
KeySpec?: DataKeySpec;
|
|
3337
3337
|
/**
|
|
3338
3338
|
* @public
|
|
3339
3339
|
* <p>The length of the data key in bytes. For example, use the value 64 to generate a 512-bit
|
|
@@ -3398,7 +3398,7 @@ export interface GenerateMacRequest {
|
|
|
3398
3398
|
* algorithms that your HMAC KMS key supports, use the <a>DescribeKey</a> operation
|
|
3399
3399
|
* and see the <code>MacAlgorithms</code> field in the <code>DescribeKey</code> response.</p>
|
|
3400
3400
|
*/
|
|
3401
|
-
MacAlgorithm: MacAlgorithmSpec |
|
|
3401
|
+
MacAlgorithm: MacAlgorithmSpec | undefined;
|
|
3402
3402
|
/**
|
|
3403
3403
|
* @public
|
|
3404
3404
|
* <p>A list of grant tokens.</p>
|
|
@@ -3428,7 +3428,7 @@ export interface GenerateMacResponse {
|
|
|
3428
3428
|
* @public
|
|
3429
3429
|
* <p>The MAC algorithm that was used to generate the HMAC.</p>
|
|
3430
3430
|
*/
|
|
3431
|
-
MacAlgorithm?: MacAlgorithmSpec
|
|
3431
|
+
MacAlgorithm?: MacAlgorithmSpec;
|
|
3432
3432
|
/**
|
|
3433
3433
|
* @public
|
|
3434
3434
|
* <p>The HMAC KMS key used in the operation.</p>
|
|
@@ -3642,7 +3642,7 @@ export interface GetParametersForImportRequest {
|
|
|
3642
3642
|
* </li>
|
|
3643
3643
|
* </ul>
|
|
3644
3644
|
*/
|
|
3645
|
-
WrappingAlgorithm: AlgorithmSpec |
|
|
3645
|
+
WrappingAlgorithm: AlgorithmSpec | undefined;
|
|
3646
3646
|
/**
|
|
3647
3647
|
* @public
|
|
3648
3648
|
* <p>The type of RSA public key to return in the response. You will use this wrapping key with
|
|
@@ -3651,7 +3651,7 @@ export interface GetParametersForImportRequest {
|
|
|
3651
3651
|
* <p>You cannot use an RSA_2048 public key to directly wrap an ECC_NIST_P521 private key.
|
|
3652
3652
|
* Instead, use an RSA_AES wrapping algorithm or choose a longer RSA public key.</p>
|
|
3653
3653
|
*/
|
|
3654
|
-
WrappingKeySpec: WrappingKeySpec |
|
|
3654
|
+
WrappingKeySpec: WrappingKeySpec | undefined;
|
|
3655
3655
|
}
|
|
3656
3656
|
/**
|
|
3657
3657
|
* @public
|
|
@@ -3748,12 +3748,12 @@ export interface GetPublicKeyResponse {
|
|
|
3748
3748
|
* value. We recommend that you use the <code>KeySpec</code> field in your code. However, to
|
|
3749
3749
|
* avoid breaking changes, KMS supports both fields.</p>
|
|
3750
3750
|
*/
|
|
3751
|
-
CustomerMasterKeySpec?: CustomerMasterKeySpec
|
|
3751
|
+
CustomerMasterKeySpec?: CustomerMasterKeySpec;
|
|
3752
3752
|
/**
|
|
3753
3753
|
* @public
|
|
3754
3754
|
* <p>The type of the of the public key that was downloaded.</p>
|
|
3755
3755
|
*/
|
|
3756
|
-
KeySpec?: KeySpec
|
|
3756
|
+
KeySpec?: KeySpec;
|
|
3757
3757
|
/**
|
|
3758
3758
|
* @public
|
|
3759
3759
|
* <p>The permitted use of the public key. Valid values are <code>ENCRYPT_DECRYPT</code> or
|
|
@@ -3761,7 +3761,7 @@ export interface GetPublicKeyResponse {
|
|
|
3761
3761
|
* <p>This information is critical. If a public key with <code>SIGN_VERIFY</code> key usage
|
|
3762
3762
|
* encrypts data outside of KMS, the ciphertext cannot be decrypted. </p>
|
|
3763
3763
|
*/
|
|
3764
|
-
KeyUsage?: KeyUsageType
|
|
3764
|
+
KeyUsage?: KeyUsageType;
|
|
3765
3765
|
/**
|
|
3766
3766
|
* @public
|
|
3767
3767
|
* <p>The encryption algorithms that KMS supports for this key. </p>
|
|
@@ -3770,14 +3770,14 @@ export interface GetPublicKeyResponse {
|
|
|
3770
3770
|
* <p>This field appears in the response only when the <code>KeyUsage</code> of the public key
|
|
3771
3771
|
* is <code>ENCRYPT_DECRYPT</code>.</p>
|
|
3772
3772
|
*/
|
|
3773
|
-
EncryptionAlgorithms?:
|
|
3773
|
+
EncryptionAlgorithms?: EncryptionAlgorithmSpec[];
|
|
3774
3774
|
/**
|
|
3775
3775
|
* @public
|
|
3776
3776
|
* <p>The signing algorithms that KMS supports for this key.</p>
|
|
3777
3777
|
* <p>This field appears in the response only when the <code>KeyUsage</code> of the public key
|
|
3778
3778
|
* is <code>SIGN_VERIFY</code>.</p>
|
|
3779
3779
|
*/
|
|
3780
|
-
SigningAlgorithms?:
|
|
3780
|
+
SigningAlgorithms?: SigningAlgorithmSpec[];
|
|
3781
3781
|
}
|
|
3782
3782
|
/**
|
|
3783
3783
|
* @public
|
|
@@ -3828,7 +3828,7 @@ export interface GrantListEntry {
|
|
|
3828
3828
|
* @public
|
|
3829
3829
|
* <p>The list of operations permitted by the grant.</p>
|
|
3830
3830
|
*/
|
|
3831
|
-
Operations?:
|
|
3831
|
+
Operations?: GrantOperation[];
|
|
3832
3832
|
/**
|
|
3833
3833
|
* @public
|
|
3834
3834
|
* <p>A list of key-value pairs that must be present in the encryption context of certain
|
|
@@ -3905,7 +3905,7 @@ export interface ImportKeyMaterialRequest {
|
|
|
3905
3905
|
* current import after the request completes. To change either value, you must reimport the key
|
|
3906
3906
|
* material.</p>
|
|
3907
3907
|
*/
|
|
3908
|
-
ExpirationModel?: ExpirationModelType
|
|
3908
|
+
ExpirationModel?: ExpirationModelType;
|
|
3909
3909
|
}
|
|
3910
3910
|
/**
|
|
3911
3911
|
* @public
|
|
@@ -4546,7 +4546,7 @@ export interface ReEncryptRequest {
|
|
|
4546
4546
|
* <p>This parameter is required only when the ciphertext was encrypted under an asymmetric KMS
|
|
4547
4547
|
* key.</p>
|
|
4548
4548
|
*/
|
|
4549
|
-
SourceEncryptionAlgorithm?: EncryptionAlgorithmSpec
|
|
4549
|
+
SourceEncryptionAlgorithm?: EncryptionAlgorithmSpec;
|
|
4550
4550
|
/**
|
|
4551
4551
|
* @public
|
|
4552
4552
|
* <p>Specifies the encryption algorithm that KMS will use to reecrypt the data after it has
|
|
@@ -4555,7 +4555,7 @@ export interface ReEncryptRequest {
|
|
|
4555
4555
|
* <p>This parameter is required only when the destination KMS key is an asymmetric KMS
|
|
4556
4556
|
* key.</p>
|
|
4557
4557
|
*/
|
|
4558
|
-
DestinationEncryptionAlgorithm?: EncryptionAlgorithmSpec
|
|
4558
|
+
DestinationEncryptionAlgorithm?: EncryptionAlgorithmSpec;
|
|
4559
4559
|
/**
|
|
4560
4560
|
* @public
|
|
4561
4561
|
* <p>A list of grant tokens.</p>
|
|
@@ -4594,12 +4594,12 @@ export interface ReEncryptResponse {
|
|
|
4594
4594
|
* <p>The encryption algorithm that was used to decrypt the ciphertext before it was
|
|
4595
4595
|
* reencrypted.</p>
|
|
4596
4596
|
*/
|
|
4597
|
-
SourceEncryptionAlgorithm?: EncryptionAlgorithmSpec
|
|
4597
|
+
SourceEncryptionAlgorithm?: EncryptionAlgorithmSpec;
|
|
4598
4598
|
/**
|
|
4599
4599
|
* @public
|
|
4600
4600
|
* <p>The encryption algorithm that was used to reencrypt the data.</p>
|
|
4601
4601
|
*/
|
|
4602
|
-
DestinationEncryptionAlgorithm?: EncryptionAlgorithmSpec
|
|
4602
|
+
DestinationEncryptionAlgorithm?: EncryptionAlgorithmSpec;
|
|
4603
4603
|
}
|
|
4604
4604
|
/**
|
|
4605
4605
|
* @public
|
|
@@ -4899,7 +4899,7 @@ export interface ScheduleKeyDeletionResponse {
|
|
|
4899
4899
|
* <p>For more information about how key state affects the use of a KMS key, see
|
|
4900
4900
|
* <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-state.html">Key states of KMS keys</a> in the <i>Key Management Service Developer Guide</i>.</p>
|
|
4901
4901
|
*/
|
|
4902
|
-
KeyState?: KeyState
|
|
4902
|
+
KeyState?: KeyState;
|
|
4903
4903
|
/**
|
|
4904
4904
|
* @public
|
|
4905
4905
|
* <p>The waiting period before the KMS key is deleted. </p>
|
|
@@ -4986,7 +4986,7 @@ export interface SignRequest {
|
|
|
4986
4986
|
* </li>
|
|
4987
4987
|
* </ul>
|
|
4988
4988
|
*/
|
|
4989
|
-
MessageType?: MessageType
|
|
4989
|
+
MessageType?: MessageType;
|
|
4990
4990
|
/**
|
|
4991
4991
|
* @public
|
|
4992
4992
|
* <p>A list of grant tokens.</p>
|
|
@@ -5001,7 +5001,7 @@ export interface SignRequest {
|
|
|
5001
5001
|
* KMS key. When signing with RSA key pairs, RSASSA-PSS algorithms are preferred. We include
|
|
5002
5002
|
* RSASSA-PKCS1-v1_5 algorithms for compatibility with existing applications.</p>
|
|
5003
5003
|
*/
|
|
5004
|
-
SigningAlgorithm: SigningAlgorithmSpec |
|
|
5004
|
+
SigningAlgorithm: SigningAlgorithmSpec | undefined;
|
|
5005
5005
|
/**
|
|
5006
5006
|
* @public
|
|
5007
5007
|
* <p>Checks if your request will succeed. <code>DryRun</code> is an optional parameter. </p>
|
|
@@ -5042,7 +5042,7 @@ export interface SignResponse {
|
|
|
5042
5042
|
* @public
|
|
5043
5043
|
* <p>The signing algorithm that was used to sign the message.</p>
|
|
5044
5044
|
*/
|
|
5045
|
-
SigningAlgorithm?: SigningAlgorithmSpec
|
|
5045
|
+
SigningAlgorithm?: SigningAlgorithmSpec;
|
|
5046
5046
|
}
|
|
5047
5047
|
/**
|
|
5048
5048
|
* @public
|
|
@@ -5257,7 +5257,7 @@ export interface UpdateCustomKeyStoreRequest {
|
|
|
5257
5257
|
* the <code>XksProxyVpcEndpointServiceName</code> value.</p>
|
|
5258
5258
|
* <p>To change this value, the external key store must be disconnected.</p>
|
|
5259
5259
|
*/
|
|
5260
|
-
XksProxyConnectivity?: XksProxyConnectivityType
|
|
5260
|
+
XksProxyConnectivity?: XksProxyConnectivityType;
|
|
5261
5261
|
}
|
|
5262
5262
|
/**
|
|
5263
5263
|
* @public
|
|
@@ -5408,7 +5408,7 @@ export interface VerifyRequest {
|
|
|
5408
5408
|
* </li>
|
|
5409
5409
|
* </ul>
|
|
5410
5410
|
*/
|
|
5411
|
-
MessageType?: MessageType
|
|
5411
|
+
MessageType?: MessageType;
|
|
5412
5412
|
/**
|
|
5413
5413
|
* @public
|
|
5414
5414
|
* <p>The signature that the <code>Sign</code> operation generated.</p>
|
|
@@ -5419,7 +5419,7 @@ export interface VerifyRequest {
|
|
|
5419
5419
|
* <p>The signing algorithm that was used to sign the message. If you submit a different
|
|
5420
5420
|
* algorithm, the signature verification fails.</p>
|
|
5421
5421
|
*/
|
|
5422
|
-
SigningAlgorithm: SigningAlgorithmSpec |
|
|
5422
|
+
SigningAlgorithm: SigningAlgorithmSpec | undefined;
|
|
5423
5423
|
/**
|
|
5424
5424
|
* @public
|
|
5425
5425
|
* <p>A list of grant tokens.</p>
|
|
@@ -5456,7 +5456,7 @@ export interface VerifyResponse {
|
|
|
5456
5456
|
* @public
|
|
5457
5457
|
* <p>The signing algorithm that was used to verify the signature.</p>
|
|
5458
5458
|
*/
|
|
5459
|
-
SigningAlgorithm?: SigningAlgorithmSpec
|
|
5459
|
+
SigningAlgorithm?: SigningAlgorithmSpec;
|
|
5460
5460
|
}
|
|
5461
5461
|
/**
|
|
5462
5462
|
* @public
|
|
@@ -5485,7 +5485,7 @@ export interface VerifyMacRequest {
|
|
|
5485
5485
|
* was used to compute the HMAC. This algorithm must be supported by the HMAC KMS key identified
|
|
5486
5486
|
* by the <code>KeyId</code> parameter.</p>
|
|
5487
5487
|
*/
|
|
5488
|
-
MacAlgorithm: MacAlgorithmSpec |
|
|
5488
|
+
MacAlgorithm: MacAlgorithmSpec | undefined;
|
|
5489
5489
|
/**
|
|
5490
5490
|
* @public
|
|
5491
5491
|
* <p>The HMAC to verify. Enter the HMAC that was generated by the <a>GenerateMac</a>
|
|
@@ -5531,7 +5531,7 @@ export interface VerifyMacResponse {
|
|
|
5531
5531
|
* @public
|
|
5532
5532
|
* <p>The MAC algorithm used in the verification.</p>
|
|
5533
5533
|
*/
|
|
5534
|
-
MacAlgorithm?: MacAlgorithmSpec
|
|
5534
|
+
MacAlgorithm?: MacAlgorithmSpec;
|
|
5535
5535
|
}
|
|
5536
5536
|
/**
|
|
5537
5537
|
* @internal
|
|
@@ -202,12 +202,12 @@ export interface CreateCustomKeyStoreRequest {
|
|
|
202
202
|
CloudHsmClusterId?: string;
|
|
203
203
|
TrustAnchorCertificate?: string;
|
|
204
204
|
KeyStorePassword?: string;
|
|
205
|
-
CustomKeyStoreType?: CustomKeyStoreType
|
|
205
|
+
CustomKeyStoreType?: CustomKeyStoreType;
|
|
206
206
|
XksProxyUriEndpoint?: string;
|
|
207
207
|
XksProxyUriPath?: string;
|
|
208
208
|
XksProxyVpcEndpointServiceName?: string;
|
|
209
209
|
XksProxyAuthenticationCredential?: XksProxyAuthenticationCredentialType;
|
|
210
|
-
XksProxyConnectivity?: XksProxyConnectivityType
|
|
210
|
+
XksProxyConnectivity?: XksProxyConnectivityType;
|
|
211
211
|
}
|
|
212
212
|
export interface CreateCustomKeyStoreResponse {
|
|
213
213
|
CustomKeyStoreId?: string;
|
|
@@ -344,7 +344,7 @@ export interface CreateGrantRequest {
|
|
|
344
344
|
KeyId: string | undefined;
|
|
345
345
|
GranteePrincipal: string | undefined;
|
|
346
346
|
RetiringPrincipal?: string;
|
|
347
|
-
Operations:
|
|
347
|
+
Operations: GrantOperation[] | undefined;
|
|
348
348
|
Constraints?: GrantConstraints;
|
|
349
349
|
GrantTokens?: string[];
|
|
350
350
|
Name?: string;
|
|
@@ -426,10 +426,10 @@ export interface Tag {
|
|
|
426
426
|
export interface CreateKeyRequest {
|
|
427
427
|
Policy?: string;
|
|
428
428
|
Description?: string;
|
|
429
|
-
KeyUsage?: KeyUsageType
|
|
430
|
-
CustomerMasterKeySpec?: CustomerMasterKeySpec
|
|
431
|
-
KeySpec?: KeySpec
|
|
432
|
-
Origin?: OriginType
|
|
429
|
+
KeyUsage?: KeyUsageType;
|
|
430
|
+
CustomerMasterKeySpec?: CustomerMasterKeySpec;
|
|
431
|
+
KeySpec?: KeySpec;
|
|
432
|
+
Origin?: OriginType;
|
|
433
433
|
CustomKeyStoreId?: string;
|
|
434
434
|
BypassPolicyLockoutSafetyCheck?: boolean;
|
|
435
435
|
Tags?: Tag[];
|
|
@@ -486,7 +486,7 @@ export interface MultiRegionKey {
|
|
|
486
486
|
Region?: string;
|
|
487
487
|
}
|
|
488
488
|
export interface MultiRegionConfiguration {
|
|
489
|
-
MultiRegionKeyType?: MultiRegionKeyType
|
|
489
|
+
MultiRegionKeyType?: MultiRegionKeyType;
|
|
490
490
|
PrimaryKey?: MultiRegionKey;
|
|
491
491
|
ReplicaKeys?: MultiRegionKey[];
|
|
492
492
|
}
|
|
@@ -514,23 +514,23 @@ export interface KeyMetadata {
|
|
|
514
514
|
CreationDate?: Date;
|
|
515
515
|
Enabled?: boolean;
|
|
516
516
|
Description?: string;
|
|
517
|
-
KeyUsage?: KeyUsageType
|
|
518
|
-
KeyState?: KeyState
|
|
517
|
+
KeyUsage?: KeyUsageType;
|
|
518
|
+
KeyState?: KeyState;
|
|
519
519
|
DeletionDate?: Date;
|
|
520
520
|
ValidTo?: Date;
|
|
521
|
-
Origin?: OriginType
|
|
521
|
+
Origin?: OriginType;
|
|
522
522
|
CustomKeyStoreId?: string;
|
|
523
523
|
CloudHsmClusterId?: string;
|
|
524
|
-
ExpirationModel?: ExpirationModelType
|
|
525
|
-
KeyManager?: KeyManagerType
|
|
526
|
-
CustomerMasterKeySpec?: CustomerMasterKeySpec
|
|
527
|
-
KeySpec?: KeySpec
|
|
528
|
-
EncryptionAlgorithms?:
|
|
529
|
-
SigningAlgorithms?:
|
|
524
|
+
ExpirationModel?: ExpirationModelType;
|
|
525
|
+
KeyManager?: KeyManagerType;
|
|
526
|
+
CustomerMasterKeySpec?: CustomerMasterKeySpec;
|
|
527
|
+
KeySpec?: KeySpec;
|
|
528
|
+
EncryptionAlgorithms?: EncryptionAlgorithmSpec[];
|
|
529
|
+
SigningAlgorithms?: SigningAlgorithmSpec[];
|
|
530
530
|
MultiRegion?: boolean;
|
|
531
531
|
MultiRegionConfiguration?: MultiRegionConfiguration;
|
|
532
532
|
PendingDeletionWindowInDays?: number;
|
|
533
|
-
MacAlgorithms?:
|
|
533
|
+
MacAlgorithms?: MacAlgorithmSpec[];
|
|
534
534
|
XksKeyConfiguration?: XksKeyConfigurationType;
|
|
535
535
|
}
|
|
536
536
|
export interface CreateKeyResponse {
|
|
@@ -590,7 +590,7 @@ export declare class CustomKeyStoreHasCMKsException extends __BaseException {
|
|
|
590
590
|
);
|
|
591
591
|
}
|
|
592
592
|
export interface XksProxyConfigurationType {
|
|
593
|
-
Connectivity?: XksProxyConnectivityType
|
|
593
|
+
Connectivity?: XksProxyConnectivityType;
|
|
594
594
|
AccessKeyId?: string;
|
|
595
595
|
UriEndpoint?: string;
|
|
596
596
|
UriPath?: string;
|
|
@@ -601,10 +601,10 @@ export interface CustomKeyStoresListEntry {
|
|
|
601
601
|
CustomKeyStoreName?: string;
|
|
602
602
|
CloudHsmClusterId?: string;
|
|
603
603
|
TrustAnchorCertificate?: string;
|
|
604
|
-
ConnectionState?: ConnectionStateType
|
|
605
|
-
ConnectionErrorCode?: ConnectionErrorCodeType
|
|
604
|
+
ConnectionState?: ConnectionStateType;
|
|
605
|
+
ConnectionErrorCode?: ConnectionErrorCodeType;
|
|
606
606
|
CreationDate?: Date;
|
|
607
|
-
CustomKeyStoreType?: CustomKeyStoreType
|
|
607
|
+
CustomKeyStoreType?: CustomKeyStoreType;
|
|
608
608
|
XksProxyConfiguration?: XksProxyConfigurationType;
|
|
609
609
|
}
|
|
610
610
|
export declare const DataKeyPairSpec: {
|
|
@@ -630,7 +630,7 @@ export declare const KeyEncryptionMechanism: {
|
|
|
630
630
|
export type KeyEncryptionMechanism =
|
|
631
631
|
(typeof KeyEncryptionMechanism)[keyof typeof KeyEncryptionMechanism];
|
|
632
632
|
export interface RecipientInfo {
|
|
633
|
-
KeyEncryptionAlgorithm?: KeyEncryptionMechanism
|
|
633
|
+
KeyEncryptionAlgorithm?: KeyEncryptionMechanism;
|
|
634
634
|
AttestationDocument?: Uint8Array;
|
|
635
635
|
}
|
|
636
636
|
export interface DecryptRequest {
|
|
@@ -638,14 +638,14 @@ export interface DecryptRequest {
|
|
|
638
638
|
EncryptionContext?: Record<string, string>;
|
|
639
639
|
GrantTokens?: string[];
|
|
640
640
|
KeyId?: string;
|
|
641
|
-
EncryptionAlgorithm?: EncryptionAlgorithmSpec
|
|
641
|
+
EncryptionAlgorithm?: EncryptionAlgorithmSpec;
|
|
642
642
|
Recipient?: RecipientInfo;
|
|
643
643
|
DryRun?: boolean;
|
|
644
644
|
}
|
|
645
645
|
export interface DecryptResponse {
|
|
646
646
|
KeyId?: string;
|
|
647
647
|
Plaintext?: Uint8Array;
|
|
648
|
-
EncryptionAlgorithm?: EncryptionAlgorithmSpec
|
|
648
|
+
EncryptionAlgorithm?: EncryptionAlgorithmSpec;
|
|
649
649
|
CiphertextForRecipient?: Uint8Array;
|
|
650
650
|
}
|
|
651
651
|
export declare class IncorrectKeyException extends __BaseException {
|
|
@@ -732,13 +732,13 @@ export interface EncryptRequest {
|
|
|
732
732
|
Plaintext: Uint8Array | undefined;
|
|
733
733
|
EncryptionContext?: Record<string, string>;
|
|
734
734
|
GrantTokens?: string[];
|
|
735
|
-
EncryptionAlgorithm?: EncryptionAlgorithmSpec
|
|
735
|
+
EncryptionAlgorithm?: EncryptionAlgorithmSpec;
|
|
736
736
|
DryRun?: boolean;
|
|
737
737
|
}
|
|
738
738
|
export interface EncryptResponse {
|
|
739
739
|
CiphertextBlob?: Uint8Array;
|
|
740
740
|
KeyId?: string;
|
|
741
|
-
EncryptionAlgorithm?: EncryptionAlgorithmSpec
|
|
741
|
+
EncryptionAlgorithm?: EncryptionAlgorithmSpec;
|
|
742
742
|
}
|
|
743
743
|
export declare class ExpiredImportTokenException extends __BaseException {
|
|
744
744
|
readonly name: "ExpiredImportTokenException";
|
|
@@ -751,7 +751,7 @@ export interface GenerateDataKeyRequest {
|
|
|
751
751
|
KeyId: string | undefined;
|
|
752
752
|
EncryptionContext?: Record<string, string>;
|
|
753
753
|
NumberOfBytes?: number;
|
|
754
|
-
KeySpec?: DataKeySpec
|
|
754
|
+
KeySpec?: DataKeySpec;
|
|
755
755
|
GrantTokens?: string[];
|
|
756
756
|
Recipient?: RecipientInfo;
|
|
757
757
|
DryRun?: boolean;
|
|
@@ -765,7 +765,7 @@ export interface GenerateDataKeyResponse {
|
|
|
765
765
|
export interface GenerateDataKeyPairRequest {
|
|
766
766
|
EncryptionContext?: Record<string, string>;
|
|
767
767
|
KeyId: string | undefined;
|
|
768
|
-
KeyPairSpec: DataKeyPairSpec |
|
|
768
|
+
KeyPairSpec: DataKeyPairSpec | undefined;
|
|
769
769
|
GrantTokens?: string[];
|
|
770
770
|
Recipient?: RecipientInfo;
|
|
771
771
|
DryRun?: boolean;
|
|
@@ -775,13 +775,13 @@ export interface GenerateDataKeyPairResponse {
|
|
|
775
775
|
PrivateKeyPlaintext?: Uint8Array;
|
|
776
776
|
PublicKey?: Uint8Array;
|
|
777
777
|
KeyId?: string;
|
|
778
|
-
KeyPairSpec?: DataKeyPairSpec
|
|
778
|
+
KeyPairSpec?: DataKeyPairSpec;
|
|
779
779
|
CiphertextForRecipient?: Uint8Array;
|
|
780
780
|
}
|
|
781
781
|
export interface GenerateDataKeyPairWithoutPlaintextRequest {
|
|
782
782
|
EncryptionContext?: Record<string, string>;
|
|
783
783
|
KeyId: string | undefined;
|
|
784
|
-
KeyPairSpec: DataKeyPairSpec |
|
|
784
|
+
KeyPairSpec: DataKeyPairSpec | undefined;
|
|
785
785
|
GrantTokens?: string[];
|
|
786
786
|
DryRun?: boolean;
|
|
787
787
|
}
|
|
@@ -789,12 +789,12 @@ export interface GenerateDataKeyPairWithoutPlaintextResponse {
|
|
|
789
789
|
PrivateKeyCiphertextBlob?: Uint8Array;
|
|
790
790
|
PublicKey?: Uint8Array;
|
|
791
791
|
KeyId?: string;
|
|
792
|
-
KeyPairSpec?: DataKeyPairSpec
|
|
792
|
+
KeyPairSpec?: DataKeyPairSpec;
|
|
793
793
|
}
|
|
794
794
|
export interface GenerateDataKeyWithoutPlaintextRequest {
|
|
795
795
|
KeyId: string | undefined;
|
|
796
796
|
EncryptionContext?: Record<string, string>;
|
|
797
|
-
KeySpec?: DataKeySpec
|
|
797
|
+
KeySpec?: DataKeySpec;
|
|
798
798
|
NumberOfBytes?: number;
|
|
799
799
|
GrantTokens?: string[];
|
|
800
800
|
DryRun?: boolean;
|
|
@@ -806,13 +806,13 @@ export interface GenerateDataKeyWithoutPlaintextResponse {
|
|
|
806
806
|
export interface GenerateMacRequest {
|
|
807
807
|
Message: Uint8Array | undefined;
|
|
808
808
|
KeyId: string | undefined;
|
|
809
|
-
MacAlgorithm: MacAlgorithmSpec |
|
|
809
|
+
MacAlgorithm: MacAlgorithmSpec | undefined;
|
|
810
810
|
GrantTokens?: string[];
|
|
811
811
|
DryRun?: boolean;
|
|
812
812
|
}
|
|
813
813
|
export interface GenerateMacResponse {
|
|
814
814
|
Mac?: Uint8Array;
|
|
815
|
-
MacAlgorithm?: MacAlgorithmSpec
|
|
815
|
+
MacAlgorithm?: MacAlgorithmSpec;
|
|
816
816
|
KeyId?: string;
|
|
817
817
|
}
|
|
818
818
|
export interface GenerateRandomRequest {
|
|
@@ -846,8 +846,8 @@ export type WrappingKeySpec =
|
|
|
846
846
|
(typeof WrappingKeySpec)[keyof typeof WrappingKeySpec];
|
|
847
847
|
export interface GetParametersForImportRequest {
|
|
848
848
|
KeyId: string | undefined;
|
|
849
|
-
WrappingAlgorithm: AlgorithmSpec |
|
|
850
|
-
WrappingKeySpec: WrappingKeySpec |
|
|
849
|
+
WrappingAlgorithm: AlgorithmSpec | undefined;
|
|
850
|
+
WrappingKeySpec: WrappingKeySpec | undefined;
|
|
851
851
|
}
|
|
852
852
|
export interface GetParametersForImportResponse {
|
|
853
853
|
KeyId?: string;
|
|
@@ -862,11 +862,11 @@ export interface GetPublicKeyRequest {
|
|
|
862
862
|
export interface GetPublicKeyResponse {
|
|
863
863
|
KeyId?: string;
|
|
864
864
|
PublicKey?: Uint8Array;
|
|
865
|
-
CustomerMasterKeySpec?: CustomerMasterKeySpec
|
|
866
|
-
KeySpec?: KeySpec
|
|
867
|
-
KeyUsage?: KeyUsageType
|
|
868
|
-
EncryptionAlgorithms?:
|
|
869
|
-
SigningAlgorithms?:
|
|
865
|
+
CustomerMasterKeySpec?: CustomerMasterKeySpec;
|
|
866
|
+
KeySpec?: KeySpec;
|
|
867
|
+
KeyUsage?: KeyUsageType;
|
|
868
|
+
EncryptionAlgorithms?: EncryptionAlgorithmSpec[];
|
|
869
|
+
SigningAlgorithms?: SigningAlgorithmSpec[];
|
|
870
870
|
}
|
|
871
871
|
export interface GrantListEntry {
|
|
872
872
|
KeyId?: string;
|
|
@@ -876,7 +876,7 @@ export interface GrantListEntry {
|
|
|
876
876
|
GranteePrincipal?: string;
|
|
877
877
|
RetiringPrincipal?: string;
|
|
878
878
|
IssuingAccount?: string;
|
|
879
|
-
Operations?:
|
|
879
|
+
Operations?: GrantOperation[];
|
|
880
880
|
Constraints?: GrantConstraints;
|
|
881
881
|
}
|
|
882
882
|
export interface ImportKeyMaterialRequest {
|
|
@@ -884,7 +884,7 @@ export interface ImportKeyMaterialRequest {
|
|
|
884
884
|
ImportToken: Uint8Array | undefined;
|
|
885
885
|
EncryptedKeyMaterial: Uint8Array | undefined;
|
|
886
886
|
ValidTo?: Date;
|
|
887
|
-
ExpirationModel?: ExpirationModelType
|
|
887
|
+
ExpirationModel?: ExpirationModelType;
|
|
888
888
|
}
|
|
889
889
|
export interface ImportKeyMaterialResponse {}
|
|
890
890
|
export declare class IncorrectKeyMaterialException extends __BaseException {
|
|
@@ -999,8 +999,8 @@ export interface ReEncryptRequest {
|
|
|
999
999
|
SourceKeyId?: string;
|
|
1000
1000
|
DestinationKeyId: string | undefined;
|
|
1001
1001
|
DestinationEncryptionContext?: Record<string, string>;
|
|
1002
|
-
SourceEncryptionAlgorithm?: EncryptionAlgorithmSpec
|
|
1003
|
-
DestinationEncryptionAlgorithm?: EncryptionAlgorithmSpec
|
|
1002
|
+
SourceEncryptionAlgorithm?: EncryptionAlgorithmSpec;
|
|
1003
|
+
DestinationEncryptionAlgorithm?: EncryptionAlgorithmSpec;
|
|
1004
1004
|
GrantTokens?: string[];
|
|
1005
1005
|
DryRun?: boolean;
|
|
1006
1006
|
}
|
|
@@ -1008,8 +1008,8 @@ export interface ReEncryptResponse {
|
|
|
1008
1008
|
CiphertextBlob?: Uint8Array;
|
|
1009
1009
|
SourceKeyId?: string;
|
|
1010
1010
|
KeyId?: string;
|
|
1011
|
-
SourceEncryptionAlgorithm?: EncryptionAlgorithmSpec
|
|
1012
|
-
DestinationEncryptionAlgorithm?: EncryptionAlgorithmSpec
|
|
1011
|
+
SourceEncryptionAlgorithm?: EncryptionAlgorithmSpec;
|
|
1012
|
+
DestinationEncryptionAlgorithm?: EncryptionAlgorithmSpec;
|
|
1013
1013
|
}
|
|
1014
1014
|
export interface ReplicateKeyRequest {
|
|
1015
1015
|
KeyId: string | undefined;
|
|
@@ -1042,21 +1042,21 @@ export interface ScheduleKeyDeletionRequest {
|
|
|
1042
1042
|
export interface ScheduleKeyDeletionResponse {
|
|
1043
1043
|
KeyId?: string;
|
|
1044
1044
|
DeletionDate?: Date;
|
|
1045
|
-
KeyState?: KeyState
|
|
1045
|
+
KeyState?: KeyState;
|
|
1046
1046
|
PendingWindowInDays?: number;
|
|
1047
1047
|
}
|
|
1048
1048
|
export interface SignRequest {
|
|
1049
1049
|
KeyId: string | undefined;
|
|
1050
1050
|
Message: Uint8Array | undefined;
|
|
1051
|
-
MessageType?: MessageType
|
|
1051
|
+
MessageType?: MessageType;
|
|
1052
1052
|
GrantTokens?: string[];
|
|
1053
|
-
SigningAlgorithm: SigningAlgorithmSpec |
|
|
1053
|
+
SigningAlgorithm: SigningAlgorithmSpec | undefined;
|
|
1054
1054
|
DryRun?: boolean;
|
|
1055
1055
|
}
|
|
1056
1056
|
export interface SignResponse {
|
|
1057
1057
|
KeyId?: string;
|
|
1058
1058
|
Signature?: Uint8Array;
|
|
1059
|
-
SigningAlgorithm?: SigningAlgorithmSpec
|
|
1059
|
+
SigningAlgorithm?: SigningAlgorithmSpec;
|
|
1060
1060
|
}
|
|
1061
1061
|
export interface TagResourceRequest {
|
|
1062
1062
|
KeyId: string | undefined;
|
|
@@ -1079,7 +1079,7 @@ export interface UpdateCustomKeyStoreRequest {
|
|
|
1079
1079
|
XksProxyUriPath?: string;
|
|
1080
1080
|
XksProxyVpcEndpointServiceName?: string;
|
|
1081
1081
|
XksProxyAuthenticationCredential?: XksProxyAuthenticationCredentialType;
|
|
1082
|
-
XksProxyConnectivity?: XksProxyConnectivityType
|
|
1082
|
+
XksProxyConnectivity?: XksProxyConnectivityType;
|
|
1083
1083
|
}
|
|
1084
1084
|
export interface UpdateCustomKeyStoreResponse {}
|
|
1085
1085
|
export interface UpdateKeyDescriptionRequest {
|
|
@@ -1093,21 +1093,21 @@ export interface UpdatePrimaryRegionRequest {
|
|
|
1093
1093
|
export interface VerifyRequest {
|
|
1094
1094
|
KeyId: string | undefined;
|
|
1095
1095
|
Message: Uint8Array | undefined;
|
|
1096
|
-
MessageType?: MessageType
|
|
1096
|
+
MessageType?: MessageType;
|
|
1097
1097
|
Signature: Uint8Array | undefined;
|
|
1098
|
-
SigningAlgorithm: SigningAlgorithmSpec |
|
|
1098
|
+
SigningAlgorithm: SigningAlgorithmSpec | undefined;
|
|
1099
1099
|
GrantTokens?: string[];
|
|
1100
1100
|
DryRun?: boolean;
|
|
1101
1101
|
}
|
|
1102
1102
|
export interface VerifyResponse {
|
|
1103
1103
|
KeyId?: string;
|
|
1104
1104
|
SignatureValid?: boolean;
|
|
1105
|
-
SigningAlgorithm?: SigningAlgorithmSpec
|
|
1105
|
+
SigningAlgorithm?: SigningAlgorithmSpec;
|
|
1106
1106
|
}
|
|
1107
1107
|
export interface VerifyMacRequest {
|
|
1108
1108
|
Message: Uint8Array | undefined;
|
|
1109
1109
|
KeyId: string | undefined;
|
|
1110
|
-
MacAlgorithm: MacAlgorithmSpec |
|
|
1110
|
+
MacAlgorithm: MacAlgorithmSpec | undefined;
|
|
1111
1111
|
Mac: Uint8Array | undefined;
|
|
1112
1112
|
GrantTokens?: string[];
|
|
1113
1113
|
DryRun?: boolean;
|
|
@@ -1115,7 +1115,7 @@ export interface VerifyMacRequest {
|
|
|
1115
1115
|
export interface VerifyMacResponse {
|
|
1116
1116
|
KeyId?: string;
|
|
1117
1117
|
MacValid?: boolean;
|
|
1118
|
-
MacAlgorithm?: MacAlgorithmSpec
|
|
1118
|
+
MacAlgorithm?: MacAlgorithmSpec;
|
|
1119
1119
|
}
|
|
1120
1120
|
export declare const XksProxyAuthenticationCredentialTypeFilterSensitiveLog: (
|
|
1121
1121
|
obj: XksProxyAuthenticationCredentialType
|
package/package.json
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@aws-sdk/client-kms",
|
|
3
3
|
"description": "AWS SDK for JavaScript Kms Client for Node.js, Browser and React Native",
|
|
4
|
-
"version": "3.
|
|
4
|
+
"version": "3.429.0",
|
|
5
5
|
"scripts": {
|
|
6
6
|
"build": "concurrently 'yarn:build:cjs' 'yarn:build:es' 'yarn:build:types'",
|
|
7
7
|
"build:cjs": "tsc -p tsconfig.cjs.json",
|
|
@@ -21,39 +21,39 @@
|
|
|
21
21
|
"dependencies": {
|
|
22
22
|
"@aws-crypto/sha256-browser": "3.0.0",
|
|
23
23
|
"@aws-crypto/sha256-js": "3.0.0",
|
|
24
|
-
"@aws-sdk/client-sts": "3.
|
|
25
|
-
"@aws-sdk/credential-provider-node": "3.
|
|
26
|
-
"@aws-sdk/middleware-host-header": "3.
|
|
27
|
-
"@aws-sdk/middleware-logger": "3.
|
|
28
|
-
"@aws-sdk/middleware-recursion-detection": "3.
|
|
29
|
-
"@aws-sdk/middleware-signing": "3.
|
|
30
|
-
"@aws-sdk/middleware-user-agent": "3.
|
|
31
|
-
"@aws-sdk/region-config-resolver": "3.
|
|
32
|
-
"@aws-sdk/types": "3.
|
|
33
|
-
"@aws-sdk/util-endpoints": "3.
|
|
34
|
-
"@aws-sdk/util-user-agent-browser": "3.
|
|
35
|
-
"@aws-sdk/util-user-agent-node": "3.
|
|
36
|
-
"@smithy/config-resolver": "^2.0.
|
|
37
|
-
"@smithy/fetch-http-handler": "^2.2.
|
|
38
|
-
"@smithy/hash-node": "^2.0.
|
|
39
|
-
"@smithy/invalid-dependency": "^2.0.
|
|
40
|
-
"@smithy/middleware-content-length": "^2.0.
|
|
41
|
-
"@smithy/middleware-endpoint": "^2.
|
|
42
|
-
"@smithy/middleware-retry": "^2.0.
|
|
43
|
-
"@smithy/middleware-serde": "^2.0.
|
|
44
|
-
"@smithy/middleware-stack": "^2.0.
|
|
45
|
-
"@smithy/node-config-provider": "^2.
|
|
46
|
-
"@smithy/node-http-handler": "^2.1.
|
|
47
|
-
"@smithy/protocol-http": "^3.0.
|
|
48
|
-
"@smithy/smithy-client": "^2.1.
|
|
49
|
-
"@smithy/types": "^2.3.
|
|
50
|
-
"@smithy/url-parser": "^2.0.
|
|
24
|
+
"@aws-sdk/client-sts": "3.429.0",
|
|
25
|
+
"@aws-sdk/credential-provider-node": "3.429.0",
|
|
26
|
+
"@aws-sdk/middleware-host-header": "3.429.0",
|
|
27
|
+
"@aws-sdk/middleware-logger": "3.428.0",
|
|
28
|
+
"@aws-sdk/middleware-recursion-detection": "3.428.0",
|
|
29
|
+
"@aws-sdk/middleware-signing": "3.428.0",
|
|
30
|
+
"@aws-sdk/middleware-user-agent": "3.428.0",
|
|
31
|
+
"@aws-sdk/region-config-resolver": "3.428.0",
|
|
32
|
+
"@aws-sdk/types": "3.428.0",
|
|
33
|
+
"@aws-sdk/util-endpoints": "3.428.0",
|
|
34
|
+
"@aws-sdk/util-user-agent-browser": "3.428.0",
|
|
35
|
+
"@aws-sdk/util-user-agent-node": "3.428.0",
|
|
36
|
+
"@smithy/config-resolver": "^2.0.14",
|
|
37
|
+
"@smithy/fetch-http-handler": "^2.2.3",
|
|
38
|
+
"@smithy/hash-node": "^2.0.11",
|
|
39
|
+
"@smithy/invalid-dependency": "^2.0.11",
|
|
40
|
+
"@smithy/middleware-content-length": "^2.0.13",
|
|
41
|
+
"@smithy/middleware-endpoint": "^2.1.1",
|
|
42
|
+
"@smithy/middleware-retry": "^2.0.16",
|
|
43
|
+
"@smithy/middleware-serde": "^2.0.11",
|
|
44
|
+
"@smithy/middleware-stack": "^2.0.5",
|
|
45
|
+
"@smithy/node-config-provider": "^2.1.1",
|
|
46
|
+
"@smithy/node-http-handler": "^2.1.7",
|
|
47
|
+
"@smithy/protocol-http": "^3.0.7",
|
|
48
|
+
"@smithy/smithy-client": "^2.1.11",
|
|
49
|
+
"@smithy/types": "^2.3.5",
|
|
50
|
+
"@smithy/url-parser": "^2.0.11",
|
|
51
51
|
"@smithy/util-base64": "^2.0.0",
|
|
52
52
|
"@smithy/util-body-length-browser": "^2.0.0",
|
|
53
53
|
"@smithy/util-body-length-node": "^2.1.0",
|
|
54
|
-
"@smithy/util-defaults-mode-browser": "^2.0.
|
|
55
|
-
"@smithy/util-defaults-mode-node": "^2.0.
|
|
56
|
-
"@smithy/util-retry": "^2.0.
|
|
54
|
+
"@smithy/util-defaults-mode-browser": "^2.0.15",
|
|
55
|
+
"@smithy/util-defaults-mode-node": "^2.0.19",
|
|
56
|
+
"@smithy/util-retry": "^2.0.4",
|
|
57
57
|
"@smithy/util-utf8": "^2.0.0",
|
|
58
58
|
"tslib": "^2.5.0"
|
|
59
59
|
},
|