@aws-sdk/client-kms 3.427.0 → 3.429.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -565,7 +565,7 @@ export interface CreateCustomKeyStoreRequest {
565
565
  * of Amazon Web Services, enter <code>EXTERNAL_KEY_STORE</code>. You cannot change this property after the key
566
566
  * store is created.</p>
567
567
  */
568
- CustomKeyStoreType?: CustomKeyStoreType | string;
568
+ CustomKeyStoreType?: CustomKeyStoreType;
569
569
  /**
570
570
  * @public
571
571
  * <p>Specifies the endpoint that KMS uses to send requests to the external key store proxy
@@ -682,7 +682,7 @@ export interface CreateCustomKeyStoreRequest {
682
682
  * VPC endpoint service, the proxy can be hosted within the VPC or outside of Amazon Web Services such as in
683
683
  * your corporate data center.</p>
684
684
  */
685
- XksProxyConnectivity?: XksProxyConnectivityType | string;
685
+ XksProxyConnectivity?: XksProxyConnectivityType;
686
686
  }
687
687
  /**
688
688
  * @public
@@ -985,7 +985,7 @@ export interface CreateGrantRequest {
985
985
  * KMS returns a <code>ValidationError</code> exception. For details, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/grants.html#terms-grant-operations">Grant
986
986
  * operations</a> in the <i>Key Management Service Developer Guide</i>.</p>
987
987
  */
988
- Operations: (GrantOperation | string)[] | undefined;
988
+ Operations: GrantOperation[] | undefined;
989
989
  /**
990
990
  * @public
991
991
  * <p>Specifies a grant constraint.</p>
@@ -1270,7 +1270,7 @@ export interface CreateKeyRequest {
1270
1270
  * </li>
1271
1271
  * </ul>
1272
1272
  */
1273
- KeyUsage?: KeyUsageType | string;
1273
+ KeyUsage?: KeyUsageType;
1274
1274
  /**
1275
1275
  * @public
1276
1276
  * @deprecated
@@ -1280,7 +1280,7 @@ export interface CreateKeyRequest {
1280
1280
  * way. Only the names differ. We recommend that you use <code>KeySpec</code> parameter in your
1281
1281
  * code. However, to avoid breaking changes, KMS supports both parameters.</p>
1282
1282
  */
1283
- CustomerMasterKeySpec?: CustomerMasterKeySpec | string;
1283
+ CustomerMasterKeySpec?: CustomerMasterKeySpec;
1284
1284
  /**
1285
1285
  * @public
1286
1286
  * <p>Specifies the type of KMS key to create. The default value,
@@ -1398,7 +1398,7 @@ export interface CreateKeyRequest {
1398
1398
  * </li>
1399
1399
  * </ul>
1400
1400
  */
1401
- KeySpec?: KeySpec | string;
1401
+ KeySpec?: KeySpec;
1402
1402
  /**
1403
1403
  * @public
1404
1404
  * <p>The source of the key material for the KMS key. You cannot change the origin after you
@@ -1421,7 +1421,7 @@ export interface CreateKeyRequest {
1421
1421
  * the <code>XksKeyId</code> parameter to identify the associated external key. The
1422
1422
  * <code>KeySpec</code> value must be <code>SYMMETRIC_DEFAULT</code>.</p>
1423
1423
  */
1424
- Origin?: OriginType | string;
1424
+ Origin?: OriginType;
1425
1425
  /**
1426
1426
  * @public
1427
1427
  * <p>Creates the KMS key in the specified <a href="https://docs.aws.amazon.com/kms/latest/developerguide/custom-key-store-overview.html">custom key store</a>. The <code>ConnectionState</code> of
@@ -1621,7 +1621,7 @@ export interface MultiRegionConfiguration {
1621
1621
  * <p>Indicates whether the KMS key is a <code>PRIMARY</code> or <code>REPLICA</code>
1622
1622
  * key.</p>
1623
1623
  */
1624
- MultiRegionKeyType?: MultiRegionKeyType | string;
1624
+ MultiRegionKeyType?: MultiRegionKeyType;
1625
1625
  /**
1626
1626
  * @public
1627
1627
  * <p>Displays the key ARN and Region of the primary key. This field includes the current KMS
@@ -1717,14 +1717,14 @@ export interface KeyMetadata {
1717
1717
  * @public
1718
1718
  * <p>The <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#cryptographic-operations">cryptographic operations</a> for which you can use the KMS key.</p>
1719
1719
  */
1720
- KeyUsage?: KeyUsageType | string;
1720
+ KeyUsage?: KeyUsageType;
1721
1721
  /**
1722
1722
  * @public
1723
1723
  * <p>The current status of the KMS key.</p>
1724
1724
  * <p>For more information about how key state affects the use of a KMS key, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-state.html">Key states of KMS keys</a> in
1725
1725
  * the <i>Key Management Service Developer Guide</i>.</p>
1726
1726
  */
1727
- KeyState?: KeyState | string;
1727
+ KeyState?: KeyState;
1728
1728
  /**
1729
1729
  * @public
1730
1730
  * <p>The date and time after which KMS deletes this KMS key. This value is present only when
@@ -1751,7 +1751,7 @@ export interface KeyMetadata {
1751
1751
  * <code>AWS_CLOUDHSM</code>, the key material was created in the CloudHSM cluster associated with
1752
1752
  * a custom key store.</p>
1753
1753
  */
1754
- Origin?: OriginType | string;
1754
+ Origin?: OriginType;
1755
1755
  /**
1756
1756
  * @public
1757
1757
  * <p>A unique identifier for the <a href="https://docs.aws.amazon.com/kms/latest/developerguide/custom-key-store-overview.html">custom key store</a> that contains the KMS key. This field is
@@ -1771,13 +1771,13 @@ export interface KeyMetadata {
1771
1771
  * <p>Specifies whether the KMS key's key material expires. This value is present only when
1772
1772
  * <code>Origin</code> is <code>EXTERNAL</code>, otherwise this value is omitted.</p>
1773
1773
  */
1774
- ExpirationModel?: ExpirationModelType | string;
1774
+ ExpirationModel?: ExpirationModelType;
1775
1775
  /**
1776
1776
  * @public
1777
1777
  * <p>The manager of the KMS key. KMS keys in your Amazon Web Services account are either customer managed or
1778
1778
  * Amazon Web Services managed. For more information about the difference, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#kms_keys">KMS keys</a> in the <i>Key Management Service Developer Guide</i>.</p>
1779
1779
  */
1780
- KeyManager?: KeyManagerType | string;
1780
+ KeyManager?: KeyManagerType;
1781
1781
  /**
1782
1782
  * @public
1783
1783
  * @deprecated
@@ -1787,12 +1787,12 @@ export interface KeyMetadata {
1787
1787
  * value. We recommend that you use the <code>KeySpec</code> field in your code. However, to
1788
1788
  * avoid breaking changes, KMS supports both fields.</p>
1789
1789
  */
1790
- CustomerMasterKeySpec?: CustomerMasterKeySpec | string;
1790
+ CustomerMasterKeySpec?: CustomerMasterKeySpec;
1791
1791
  /**
1792
1792
  * @public
1793
1793
  * <p>Describes the type of key material in the KMS key.</p>
1794
1794
  */
1795
- KeySpec?: KeySpec | string;
1795
+ KeySpec?: KeySpec;
1796
1796
  /**
1797
1797
  * @public
1798
1798
  * <p>The encryption algorithms that the KMS key supports. You cannot use the KMS key with other
@@ -1800,7 +1800,7 @@ export interface KeyMetadata {
1800
1800
  * <p>This value is present only when the <code>KeyUsage</code> of the KMS key is
1801
1801
  * <code>ENCRYPT_DECRYPT</code>.</p>
1802
1802
  */
1803
- EncryptionAlgorithms?: (EncryptionAlgorithmSpec | string)[];
1803
+ EncryptionAlgorithms?: EncryptionAlgorithmSpec[];
1804
1804
  /**
1805
1805
  * @public
1806
1806
  * <p>The signing algorithms that the KMS key supports. You cannot use the KMS key with other
@@ -1808,7 +1808,7 @@ export interface KeyMetadata {
1808
1808
  * <p>This field appears only when the <code>KeyUsage</code> of the KMS key is
1809
1809
  * <code>SIGN_VERIFY</code>.</p>
1810
1810
  */
1811
- SigningAlgorithms?: (SigningAlgorithmSpec | string)[];
1811
+ SigningAlgorithms?: SigningAlgorithmSpec[];
1812
1812
  /**
1813
1813
  * @public
1814
1814
  * <p>Indicates whether the KMS key is a multi-Region (<code>True</code>) or regional
@@ -1864,7 +1864,7 @@ export interface KeyMetadata {
1864
1864
  * <p>This value is present only when the <code>KeyUsage</code> of the KMS key is
1865
1865
  * <code>GENERATE_VERIFY_MAC</code>.</p>
1866
1866
  */
1867
- MacAlgorithms?: (MacAlgorithmSpec | string)[];
1867
+ MacAlgorithms?: MacAlgorithmSpec[];
1868
1868
  /**
1869
1869
  * @public
1870
1870
  * <p>Information about the external key that is associated with a KMS key in an external key
@@ -1997,7 +1997,7 @@ export interface XksProxyConfigurationType {
1997
1997
  * <p>Indicates whether the external key store proxy uses a public endpoint or an Amazon VPC endpoint
1998
1998
  * service to communicate with KMS.</p>
1999
1999
  */
2000
- Connectivity?: XksProxyConnectivityType | string;
2000
+ Connectivity?: XksProxyConnectivityType;
2001
2001
  /**
2002
2002
  * @public
2003
2003
  * <p>The part of the external key store <a href="https://docs.aws.amazon.com/kms/latest/APIReference/API_CreateCustomKeyStore.html#KMS-CreateCustomKeyStore-request-XksProxyAuthenticationCredential">proxy authentication credential</a> that uniquely identifies the secret access
@@ -2078,7 +2078,7 @@ export interface CustomKeyStoresListEntry {
2078
2078
  * For help resolving a connection failure, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/fix-keystore.html">Troubleshooting a custom key store</a> in the
2079
2079
  * <i>Key Management Service Developer Guide</i>.</p>
2080
2080
  */
2081
- ConnectionState?: ConnectionStateType | string;
2081
+ ConnectionState?: ConnectionStateType;
2082
2082
  /**
2083
2083
  * @public
2084
2084
  * <p>Describes the connection error. This field appears in the response only when the
@@ -2265,7 +2265,7 @@ export interface CustomKeyStoresListEntry {
2265
2265
  * </li>
2266
2266
  * </ul>
2267
2267
  */
2268
- ConnectionErrorCode?: ConnectionErrorCodeType | string;
2268
+ ConnectionErrorCode?: ConnectionErrorCodeType;
2269
2269
  /**
2270
2270
  * @public
2271
2271
  * <p>The date and time when the custom key store was created.</p>
@@ -2277,7 +2277,7 @@ export interface CustomKeyStoresListEntry {
2277
2277
  * key store backed by an CloudHSM cluster. <code>EXTERNAL_KEY_STORE</code> indicates a custom key
2278
2278
  * store backed by an external key store proxy and external key manager outside of Amazon Web Services.</p>
2279
2279
  */
2280
- CustomKeyStoreType?: CustomKeyStoreType | string;
2280
+ CustomKeyStoreType?: CustomKeyStoreType;
2281
2281
  /**
2282
2282
  * @public
2283
2283
  * <p>Configuration settings for the external key store proxy (XKS proxy). The external key
@@ -2344,7 +2344,7 @@ export interface RecipientInfo {
2344
2344
  * Enclave to encrypt plaintext values for the response. The only valid value is
2345
2345
  * <code>RSAES_OAEP_SHA_256</code>.</p>
2346
2346
  */
2347
- KeyEncryptionAlgorithm?: KeyEncryptionMechanism | string;
2347
+ KeyEncryptionAlgorithm?: KeyEncryptionMechanism;
2348
2348
  /**
2349
2349
  * @public
2350
2350
  * <p>The attestation document for an Amazon Web Services Nitro Enclave. This document includes the enclave's
@@ -2421,7 +2421,7 @@ export interface DecryptRequest {
2421
2421
  * key. The default value, <code>SYMMETRIC_DEFAULT</code>, represents the only supported
2422
2422
  * algorithm that is valid for symmetric encryption KMS keys.</p>
2423
2423
  */
2424
- EncryptionAlgorithm?: EncryptionAlgorithmSpec | string;
2424
+ EncryptionAlgorithm?: EncryptionAlgorithmSpec;
2425
2425
  /**
2426
2426
  * @public
2427
2427
  * <p>A signed <a href="https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/nitro-enclave-how.html#term-attestdoc">attestation document</a> from
@@ -2464,7 +2464,7 @@ export interface DecryptResponse {
2464
2464
  * @public
2465
2465
  * <p>The encryption algorithm that was used to decrypt the ciphertext.</p>
2466
2466
  */
2467
- EncryptionAlgorithm?: EncryptionAlgorithmSpec | string;
2467
+ EncryptionAlgorithm?: EncryptionAlgorithmSpec;
2468
2468
  /**
2469
2469
  * @public
2470
2470
  * <p>The plaintext data encrypted with the public key in the attestation document. </p>
@@ -2902,7 +2902,7 @@ export interface EncryptRequest {
2902
2902
  * you are using an asymmetric KMS key, we recommend RSAES_OAEP_SHA_256.</p>
2903
2903
  * <p>The SM2PKE algorithm is only available in China Regions.</p>
2904
2904
  */
2905
- EncryptionAlgorithm?: EncryptionAlgorithmSpec | string;
2905
+ EncryptionAlgorithm?: EncryptionAlgorithmSpec;
2906
2906
  /**
2907
2907
  * @public
2908
2908
  * <p>Checks if your request will succeed. <code>DryRun</code> is an optional parameter. </p>
@@ -2928,7 +2928,7 @@ export interface EncryptResponse {
2928
2928
  * @public
2929
2929
  * <p>The encryption algorithm that was used to encrypt the plaintext.</p>
2930
2930
  */
2931
- EncryptionAlgorithm?: EncryptionAlgorithmSpec | string;
2931
+ EncryptionAlgorithm?: EncryptionAlgorithmSpec;
2932
2932
  }
2933
2933
  /**
2934
2934
  * @public
@@ -3004,7 +3004,7 @@ export interface GenerateDataKeyRequest {
3004
3004
  * <p>You must specify either the <code>KeySpec</code> or the <code>NumberOfBytes</code>
3005
3005
  * parameter (but not both) in every <code>GenerateDataKey</code> request.</p>
3006
3006
  */
3007
- KeySpec?: DataKeySpec | string;
3007
+ KeySpec?: DataKeySpec;
3008
3008
  /**
3009
3009
  * @public
3010
3010
  * <p>A list of grant tokens.</p>
@@ -3119,7 +3119,7 @@ export interface GenerateDataKeyPairRequest {
3119
3119
  * <p>Determines the type of data key pair that is generated. </p>
3120
3120
  * <p>The KMS rule that restricts the use of asymmetric RSA and SM2 KMS keys to encrypt and decrypt or to sign and verify (but not both), and the rule that permits you to use ECC KMS keys only to sign and verify, are not effective on data key pairs, which are used outside of KMS. The SM2 key spec is only available in China Regions.</p>
3121
3121
  */
3122
- KeyPairSpec: DataKeyPairSpec | string | undefined;
3122
+ KeyPairSpec: DataKeyPairSpec | undefined;
3123
3123
  /**
3124
3124
  * @public
3125
3125
  * <p>A list of grant tokens.</p>
@@ -3181,7 +3181,7 @@ export interface GenerateDataKeyPairResponse {
3181
3181
  * @public
3182
3182
  * <p>The type of data key pair that was generated.</p>
3183
3183
  */
3184
- KeyPairSpec?: DataKeyPairSpec | string;
3184
+ KeyPairSpec?: DataKeyPairSpec;
3185
3185
  /**
3186
3186
  * @public
3187
3187
  * <p>The plaintext private data key encrypted with the public key from the Nitro enclave. This
@@ -3243,7 +3243,7 @@ export interface GenerateDataKeyPairWithoutPlaintextRequest {
3243
3243
  * <p>Determines the type of data key pair that is generated.</p>
3244
3244
  * <p>The KMS rule that restricts the use of asymmetric RSA and SM2 KMS keys to encrypt and decrypt or to sign and verify (but not both), and the rule that permits you to use ECC KMS keys only to sign and verify, are not effective on data key pairs, which are used outside of KMS. The SM2 key spec is only available in China Regions.</p>
3245
3245
  */
3246
- KeyPairSpec: DataKeyPairSpec | string | undefined;
3246
+ KeyPairSpec: DataKeyPairSpec | undefined;
3247
3247
  /**
3248
3248
  * @public
3249
3249
  * <p>A list of grant tokens.</p>
@@ -3281,7 +3281,7 @@ export interface GenerateDataKeyPairWithoutPlaintextResponse {
3281
3281
  * @public
3282
3282
  * <p>The type of data key pair that was generated.</p>
3283
3283
  */
3284
- KeyPairSpec?: DataKeyPairSpec | string;
3284
+ KeyPairSpec?: DataKeyPairSpec;
3285
3285
  }
3286
3286
  /**
3287
3287
  * @public
@@ -3333,7 +3333,7 @@ export interface GenerateDataKeyWithoutPlaintextRequest {
3333
3333
  * <p>The length of the data key. Use <code>AES_128</code> to generate a 128-bit symmetric key,
3334
3334
  * or <code>AES_256</code> to generate a 256-bit symmetric key.</p>
3335
3335
  */
3336
- KeySpec?: DataKeySpec | string;
3336
+ KeySpec?: DataKeySpec;
3337
3337
  /**
3338
3338
  * @public
3339
3339
  * <p>The length of the data key in bytes. For example, use the value 64 to generate a 512-bit
@@ -3398,7 +3398,7 @@ export interface GenerateMacRequest {
3398
3398
  * algorithms that your HMAC KMS key supports, use the <a>DescribeKey</a> operation
3399
3399
  * and see the <code>MacAlgorithms</code> field in the <code>DescribeKey</code> response.</p>
3400
3400
  */
3401
- MacAlgorithm: MacAlgorithmSpec | string | undefined;
3401
+ MacAlgorithm: MacAlgorithmSpec | undefined;
3402
3402
  /**
3403
3403
  * @public
3404
3404
  * <p>A list of grant tokens.</p>
@@ -3428,7 +3428,7 @@ export interface GenerateMacResponse {
3428
3428
  * @public
3429
3429
  * <p>The MAC algorithm that was used to generate the HMAC.</p>
3430
3430
  */
3431
- MacAlgorithm?: MacAlgorithmSpec | string;
3431
+ MacAlgorithm?: MacAlgorithmSpec;
3432
3432
  /**
3433
3433
  * @public
3434
3434
  * <p>The HMAC KMS key used in the operation.</p>
@@ -3642,7 +3642,7 @@ export interface GetParametersForImportRequest {
3642
3642
  * </li>
3643
3643
  * </ul>
3644
3644
  */
3645
- WrappingAlgorithm: AlgorithmSpec | string | undefined;
3645
+ WrappingAlgorithm: AlgorithmSpec | undefined;
3646
3646
  /**
3647
3647
  * @public
3648
3648
  * <p>The type of RSA public key to return in the response. You will use this wrapping key with
@@ -3651,7 +3651,7 @@ export interface GetParametersForImportRequest {
3651
3651
  * <p>You cannot use an RSA_2048 public key to directly wrap an ECC_NIST_P521 private key.
3652
3652
  * Instead, use an RSA_AES wrapping algorithm or choose a longer RSA public key.</p>
3653
3653
  */
3654
- WrappingKeySpec: WrappingKeySpec | string | undefined;
3654
+ WrappingKeySpec: WrappingKeySpec | undefined;
3655
3655
  }
3656
3656
  /**
3657
3657
  * @public
@@ -3748,12 +3748,12 @@ export interface GetPublicKeyResponse {
3748
3748
  * value. We recommend that you use the <code>KeySpec</code> field in your code. However, to
3749
3749
  * avoid breaking changes, KMS supports both fields.</p>
3750
3750
  */
3751
- CustomerMasterKeySpec?: CustomerMasterKeySpec | string;
3751
+ CustomerMasterKeySpec?: CustomerMasterKeySpec;
3752
3752
  /**
3753
3753
  * @public
3754
3754
  * <p>The type of the of the public key that was downloaded.</p>
3755
3755
  */
3756
- KeySpec?: KeySpec | string;
3756
+ KeySpec?: KeySpec;
3757
3757
  /**
3758
3758
  * @public
3759
3759
  * <p>The permitted use of the public key. Valid values are <code>ENCRYPT_DECRYPT</code> or
@@ -3761,7 +3761,7 @@ export interface GetPublicKeyResponse {
3761
3761
  * <p>This information is critical. If a public key with <code>SIGN_VERIFY</code> key usage
3762
3762
  * encrypts data outside of KMS, the ciphertext cannot be decrypted. </p>
3763
3763
  */
3764
- KeyUsage?: KeyUsageType | string;
3764
+ KeyUsage?: KeyUsageType;
3765
3765
  /**
3766
3766
  * @public
3767
3767
  * <p>The encryption algorithms that KMS supports for this key. </p>
@@ -3770,14 +3770,14 @@ export interface GetPublicKeyResponse {
3770
3770
  * <p>This field appears in the response only when the <code>KeyUsage</code> of the public key
3771
3771
  * is <code>ENCRYPT_DECRYPT</code>.</p>
3772
3772
  */
3773
- EncryptionAlgorithms?: (EncryptionAlgorithmSpec | string)[];
3773
+ EncryptionAlgorithms?: EncryptionAlgorithmSpec[];
3774
3774
  /**
3775
3775
  * @public
3776
3776
  * <p>The signing algorithms that KMS supports for this key.</p>
3777
3777
  * <p>This field appears in the response only when the <code>KeyUsage</code> of the public key
3778
3778
  * is <code>SIGN_VERIFY</code>.</p>
3779
3779
  */
3780
- SigningAlgorithms?: (SigningAlgorithmSpec | string)[];
3780
+ SigningAlgorithms?: SigningAlgorithmSpec[];
3781
3781
  }
3782
3782
  /**
3783
3783
  * @public
@@ -3828,7 +3828,7 @@ export interface GrantListEntry {
3828
3828
  * @public
3829
3829
  * <p>The list of operations permitted by the grant.</p>
3830
3830
  */
3831
- Operations?: (GrantOperation | string)[];
3831
+ Operations?: GrantOperation[];
3832
3832
  /**
3833
3833
  * @public
3834
3834
  * <p>A list of key-value pairs that must be present in the encryption context of certain
@@ -3905,7 +3905,7 @@ export interface ImportKeyMaterialRequest {
3905
3905
  * current import after the request completes. To change either value, you must reimport the key
3906
3906
  * material.</p>
3907
3907
  */
3908
- ExpirationModel?: ExpirationModelType | string;
3908
+ ExpirationModel?: ExpirationModelType;
3909
3909
  }
3910
3910
  /**
3911
3911
  * @public
@@ -4546,7 +4546,7 @@ export interface ReEncryptRequest {
4546
4546
  * <p>This parameter is required only when the ciphertext was encrypted under an asymmetric KMS
4547
4547
  * key.</p>
4548
4548
  */
4549
- SourceEncryptionAlgorithm?: EncryptionAlgorithmSpec | string;
4549
+ SourceEncryptionAlgorithm?: EncryptionAlgorithmSpec;
4550
4550
  /**
4551
4551
  * @public
4552
4552
  * <p>Specifies the encryption algorithm that KMS will use to reecrypt the data after it has
@@ -4555,7 +4555,7 @@ export interface ReEncryptRequest {
4555
4555
  * <p>This parameter is required only when the destination KMS key is an asymmetric KMS
4556
4556
  * key.</p>
4557
4557
  */
4558
- DestinationEncryptionAlgorithm?: EncryptionAlgorithmSpec | string;
4558
+ DestinationEncryptionAlgorithm?: EncryptionAlgorithmSpec;
4559
4559
  /**
4560
4560
  * @public
4561
4561
  * <p>A list of grant tokens.</p>
@@ -4594,12 +4594,12 @@ export interface ReEncryptResponse {
4594
4594
  * <p>The encryption algorithm that was used to decrypt the ciphertext before it was
4595
4595
  * reencrypted.</p>
4596
4596
  */
4597
- SourceEncryptionAlgorithm?: EncryptionAlgorithmSpec | string;
4597
+ SourceEncryptionAlgorithm?: EncryptionAlgorithmSpec;
4598
4598
  /**
4599
4599
  * @public
4600
4600
  * <p>The encryption algorithm that was used to reencrypt the data.</p>
4601
4601
  */
4602
- DestinationEncryptionAlgorithm?: EncryptionAlgorithmSpec | string;
4602
+ DestinationEncryptionAlgorithm?: EncryptionAlgorithmSpec;
4603
4603
  }
4604
4604
  /**
4605
4605
  * @public
@@ -4899,7 +4899,7 @@ export interface ScheduleKeyDeletionResponse {
4899
4899
  * <p>For more information about how key state affects the use of a KMS key, see
4900
4900
  * <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-state.html">Key states of KMS keys</a> in the <i>Key Management Service Developer Guide</i>.</p>
4901
4901
  */
4902
- KeyState?: KeyState | string;
4902
+ KeyState?: KeyState;
4903
4903
  /**
4904
4904
  * @public
4905
4905
  * <p>The waiting period before the KMS key is deleted. </p>
@@ -4986,7 +4986,7 @@ export interface SignRequest {
4986
4986
  * </li>
4987
4987
  * </ul>
4988
4988
  */
4989
- MessageType?: MessageType | string;
4989
+ MessageType?: MessageType;
4990
4990
  /**
4991
4991
  * @public
4992
4992
  * <p>A list of grant tokens.</p>
@@ -5001,7 +5001,7 @@ export interface SignRequest {
5001
5001
  * KMS key. When signing with RSA key pairs, RSASSA-PSS algorithms are preferred. We include
5002
5002
  * RSASSA-PKCS1-v1_5 algorithms for compatibility with existing applications.</p>
5003
5003
  */
5004
- SigningAlgorithm: SigningAlgorithmSpec | string | undefined;
5004
+ SigningAlgorithm: SigningAlgorithmSpec | undefined;
5005
5005
  /**
5006
5006
  * @public
5007
5007
  * <p>Checks if your request will succeed. <code>DryRun</code> is an optional parameter. </p>
@@ -5042,7 +5042,7 @@ export interface SignResponse {
5042
5042
  * @public
5043
5043
  * <p>The signing algorithm that was used to sign the message.</p>
5044
5044
  */
5045
- SigningAlgorithm?: SigningAlgorithmSpec | string;
5045
+ SigningAlgorithm?: SigningAlgorithmSpec;
5046
5046
  }
5047
5047
  /**
5048
5048
  * @public
@@ -5257,7 +5257,7 @@ export interface UpdateCustomKeyStoreRequest {
5257
5257
  * the <code>XksProxyVpcEndpointServiceName</code> value.</p>
5258
5258
  * <p>To change this value, the external key store must be disconnected.</p>
5259
5259
  */
5260
- XksProxyConnectivity?: XksProxyConnectivityType | string;
5260
+ XksProxyConnectivity?: XksProxyConnectivityType;
5261
5261
  }
5262
5262
  /**
5263
5263
  * @public
@@ -5408,7 +5408,7 @@ export interface VerifyRequest {
5408
5408
  * </li>
5409
5409
  * </ul>
5410
5410
  */
5411
- MessageType?: MessageType | string;
5411
+ MessageType?: MessageType;
5412
5412
  /**
5413
5413
  * @public
5414
5414
  * <p>The signature that the <code>Sign</code> operation generated.</p>
@@ -5419,7 +5419,7 @@ export interface VerifyRequest {
5419
5419
  * <p>The signing algorithm that was used to sign the message. If you submit a different
5420
5420
  * algorithm, the signature verification fails.</p>
5421
5421
  */
5422
- SigningAlgorithm: SigningAlgorithmSpec | string | undefined;
5422
+ SigningAlgorithm: SigningAlgorithmSpec | undefined;
5423
5423
  /**
5424
5424
  * @public
5425
5425
  * <p>A list of grant tokens.</p>
@@ -5456,7 +5456,7 @@ export interface VerifyResponse {
5456
5456
  * @public
5457
5457
  * <p>The signing algorithm that was used to verify the signature.</p>
5458
5458
  */
5459
- SigningAlgorithm?: SigningAlgorithmSpec | string;
5459
+ SigningAlgorithm?: SigningAlgorithmSpec;
5460
5460
  }
5461
5461
  /**
5462
5462
  * @public
@@ -5485,7 +5485,7 @@ export interface VerifyMacRequest {
5485
5485
  * was used to compute the HMAC. This algorithm must be supported by the HMAC KMS key identified
5486
5486
  * by the <code>KeyId</code> parameter.</p>
5487
5487
  */
5488
- MacAlgorithm: MacAlgorithmSpec | string | undefined;
5488
+ MacAlgorithm: MacAlgorithmSpec | undefined;
5489
5489
  /**
5490
5490
  * @public
5491
5491
  * <p>The HMAC to verify. Enter the HMAC that was generated by the <a>GenerateMac</a>
@@ -5531,7 +5531,7 @@ export interface VerifyMacResponse {
5531
5531
  * @public
5532
5532
  * <p>The MAC algorithm used in the verification.</p>
5533
5533
  */
5534
- MacAlgorithm?: MacAlgorithmSpec | string;
5534
+ MacAlgorithm?: MacAlgorithmSpec;
5535
5535
  }
5536
5536
  /**
5537
5537
  * @internal
@@ -202,12 +202,12 @@ export interface CreateCustomKeyStoreRequest {
202
202
  CloudHsmClusterId?: string;
203
203
  TrustAnchorCertificate?: string;
204
204
  KeyStorePassword?: string;
205
- CustomKeyStoreType?: CustomKeyStoreType | string;
205
+ CustomKeyStoreType?: CustomKeyStoreType;
206
206
  XksProxyUriEndpoint?: string;
207
207
  XksProxyUriPath?: string;
208
208
  XksProxyVpcEndpointServiceName?: string;
209
209
  XksProxyAuthenticationCredential?: XksProxyAuthenticationCredentialType;
210
- XksProxyConnectivity?: XksProxyConnectivityType | string;
210
+ XksProxyConnectivity?: XksProxyConnectivityType;
211
211
  }
212
212
  export interface CreateCustomKeyStoreResponse {
213
213
  CustomKeyStoreId?: string;
@@ -344,7 +344,7 @@ export interface CreateGrantRequest {
344
344
  KeyId: string | undefined;
345
345
  GranteePrincipal: string | undefined;
346
346
  RetiringPrincipal?: string;
347
- Operations: (GrantOperation | string)[] | undefined;
347
+ Operations: GrantOperation[] | undefined;
348
348
  Constraints?: GrantConstraints;
349
349
  GrantTokens?: string[];
350
350
  Name?: string;
@@ -426,10 +426,10 @@ export interface Tag {
426
426
  export interface CreateKeyRequest {
427
427
  Policy?: string;
428
428
  Description?: string;
429
- KeyUsage?: KeyUsageType | string;
430
- CustomerMasterKeySpec?: CustomerMasterKeySpec | string;
431
- KeySpec?: KeySpec | string;
432
- Origin?: OriginType | string;
429
+ KeyUsage?: KeyUsageType;
430
+ CustomerMasterKeySpec?: CustomerMasterKeySpec;
431
+ KeySpec?: KeySpec;
432
+ Origin?: OriginType;
433
433
  CustomKeyStoreId?: string;
434
434
  BypassPolicyLockoutSafetyCheck?: boolean;
435
435
  Tags?: Tag[];
@@ -486,7 +486,7 @@ export interface MultiRegionKey {
486
486
  Region?: string;
487
487
  }
488
488
  export interface MultiRegionConfiguration {
489
- MultiRegionKeyType?: MultiRegionKeyType | string;
489
+ MultiRegionKeyType?: MultiRegionKeyType;
490
490
  PrimaryKey?: MultiRegionKey;
491
491
  ReplicaKeys?: MultiRegionKey[];
492
492
  }
@@ -514,23 +514,23 @@ export interface KeyMetadata {
514
514
  CreationDate?: Date;
515
515
  Enabled?: boolean;
516
516
  Description?: string;
517
- KeyUsage?: KeyUsageType | string;
518
- KeyState?: KeyState | string;
517
+ KeyUsage?: KeyUsageType;
518
+ KeyState?: KeyState;
519
519
  DeletionDate?: Date;
520
520
  ValidTo?: Date;
521
- Origin?: OriginType | string;
521
+ Origin?: OriginType;
522
522
  CustomKeyStoreId?: string;
523
523
  CloudHsmClusterId?: string;
524
- ExpirationModel?: ExpirationModelType | string;
525
- KeyManager?: KeyManagerType | string;
526
- CustomerMasterKeySpec?: CustomerMasterKeySpec | string;
527
- KeySpec?: KeySpec | string;
528
- EncryptionAlgorithms?: (EncryptionAlgorithmSpec | string)[];
529
- SigningAlgorithms?: (SigningAlgorithmSpec | string)[];
524
+ ExpirationModel?: ExpirationModelType;
525
+ KeyManager?: KeyManagerType;
526
+ CustomerMasterKeySpec?: CustomerMasterKeySpec;
527
+ KeySpec?: KeySpec;
528
+ EncryptionAlgorithms?: EncryptionAlgorithmSpec[];
529
+ SigningAlgorithms?: SigningAlgorithmSpec[];
530
530
  MultiRegion?: boolean;
531
531
  MultiRegionConfiguration?: MultiRegionConfiguration;
532
532
  PendingDeletionWindowInDays?: number;
533
- MacAlgorithms?: (MacAlgorithmSpec | string)[];
533
+ MacAlgorithms?: MacAlgorithmSpec[];
534
534
  XksKeyConfiguration?: XksKeyConfigurationType;
535
535
  }
536
536
  export interface CreateKeyResponse {
@@ -590,7 +590,7 @@ export declare class CustomKeyStoreHasCMKsException extends __BaseException {
590
590
  );
591
591
  }
592
592
  export interface XksProxyConfigurationType {
593
- Connectivity?: XksProxyConnectivityType | string;
593
+ Connectivity?: XksProxyConnectivityType;
594
594
  AccessKeyId?: string;
595
595
  UriEndpoint?: string;
596
596
  UriPath?: string;
@@ -601,10 +601,10 @@ export interface CustomKeyStoresListEntry {
601
601
  CustomKeyStoreName?: string;
602
602
  CloudHsmClusterId?: string;
603
603
  TrustAnchorCertificate?: string;
604
- ConnectionState?: ConnectionStateType | string;
605
- ConnectionErrorCode?: ConnectionErrorCodeType | string;
604
+ ConnectionState?: ConnectionStateType;
605
+ ConnectionErrorCode?: ConnectionErrorCodeType;
606
606
  CreationDate?: Date;
607
- CustomKeyStoreType?: CustomKeyStoreType | string;
607
+ CustomKeyStoreType?: CustomKeyStoreType;
608
608
  XksProxyConfiguration?: XksProxyConfigurationType;
609
609
  }
610
610
  export declare const DataKeyPairSpec: {
@@ -630,7 +630,7 @@ export declare const KeyEncryptionMechanism: {
630
630
  export type KeyEncryptionMechanism =
631
631
  (typeof KeyEncryptionMechanism)[keyof typeof KeyEncryptionMechanism];
632
632
  export interface RecipientInfo {
633
- KeyEncryptionAlgorithm?: KeyEncryptionMechanism | string;
633
+ KeyEncryptionAlgorithm?: KeyEncryptionMechanism;
634
634
  AttestationDocument?: Uint8Array;
635
635
  }
636
636
  export interface DecryptRequest {
@@ -638,14 +638,14 @@ export interface DecryptRequest {
638
638
  EncryptionContext?: Record<string, string>;
639
639
  GrantTokens?: string[];
640
640
  KeyId?: string;
641
- EncryptionAlgorithm?: EncryptionAlgorithmSpec | string;
641
+ EncryptionAlgorithm?: EncryptionAlgorithmSpec;
642
642
  Recipient?: RecipientInfo;
643
643
  DryRun?: boolean;
644
644
  }
645
645
  export interface DecryptResponse {
646
646
  KeyId?: string;
647
647
  Plaintext?: Uint8Array;
648
- EncryptionAlgorithm?: EncryptionAlgorithmSpec | string;
648
+ EncryptionAlgorithm?: EncryptionAlgorithmSpec;
649
649
  CiphertextForRecipient?: Uint8Array;
650
650
  }
651
651
  export declare class IncorrectKeyException extends __BaseException {
@@ -732,13 +732,13 @@ export interface EncryptRequest {
732
732
  Plaintext: Uint8Array | undefined;
733
733
  EncryptionContext?: Record<string, string>;
734
734
  GrantTokens?: string[];
735
- EncryptionAlgorithm?: EncryptionAlgorithmSpec | string;
735
+ EncryptionAlgorithm?: EncryptionAlgorithmSpec;
736
736
  DryRun?: boolean;
737
737
  }
738
738
  export interface EncryptResponse {
739
739
  CiphertextBlob?: Uint8Array;
740
740
  KeyId?: string;
741
- EncryptionAlgorithm?: EncryptionAlgorithmSpec | string;
741
+ EncryptionAlgorithm?: EncryptionAlgorithmSpec;
742
742
  }
743
743
  export declare class ExpiredImportTokenException extends __BaseException {
744
744
  readonly name: "ExpiredImportTokenException";
@@ -751,7 +751,7 @@ export interface GenerateDataKeyRequest {
751
751
  KeyId: string | undefined;
752
752
  EncryptionContext?: Record<string, string>;
753
753
  NumberOfBytes?: number;
754
- KeySpec?: DataKeySpec | string;
754
+ KeySpec?: DataKeySpec;
755
755
  GrantTokens?: string[];
756
756
  Recipient?: RecipientInfo;
757
757
  DryRun?: boolean;
@@ -765,7 +765,7 @@ export interface GenerateDataKeyResponse {
765
765
  export interface GenerateDataKeyPairRequest {
766
766
  EncryptionContext?: Record<string, string>;
767
767
  KeyId: string | undefined;
768
- KeyPairSpec: DataKeyPairSpec | string | undefined;
768
+ KeyPairSpec: DataKeyPairSpec | undefined;
769
769
  GrantTokens?: string[];
770
770
  Recipient?: RecipientInfo;
771
771
  DryRun?: boolean;
@@ -775,13 +775,13 @@ export interface GenerateDataKeyPairResponse {
775
775
  PrivateKeyPlaintext?: Uint8Array;
776
776
  PublicKey?: Uint8Array;
777
777
  KeyId?: string;
778
- KeyPairSpec?: DataKeyPairSpec | string;
778
+ KeyPairSpec?: DataKeyPairSpec;
779
779
  CiphertextForRecipient?: Uint8Array;
780
780
  }
781
781
  export interface GenerateDataKeyPairWithoutPlaintextRequest {
782
782
  EncryptionContext?: Record<string, string>;
783
783
  KeyId: string | undefined;
784
- KeyPairSpec: DataKeyPairSpec | string | undefined;
784
+ KeyPairSpec: DataKeyPairSpec | undefined;
785
785
  GrantTokens?: string[];
786
786
  DryRun?: boolean;
787
787
  }
@@ -789,12 +789,12 @@ export interface GenerateDataKeyPairWithoutPlaintextResponse {
789
789
  PrivateKeyCiphertextBlob?: Uint8Array;
790
790
  PublicKey?: Uint8Array;
791
791
  KeyId?: string;
792
- KeyPairSpec?: DataKeyPairSpec | string;
792
+ KeyPairSpec?: DataKeyPairSpec;
793
793
  }
794
794
  export interface GenerateDataKeyWithoutPlaintextRequest {
795
795
  KeyId: string | undefined;
796
796
  EncryptionContext?: Record<string, string>;
797
- KeySpec?: DataKeySpec | string;
797
+ KeySpec?: DataKeySpec;
798
798
  NumberOfBytes?: number;
799
799
  GrantTokens?: string[];
800
800
  DryRun?: boolean;
@@ -806,13 +806,13 @@ export interface GenerateDataKeyWithoutPlaintextResponse {
806
806
  export interface GenerateMacRequest {
807
807
  Message: Uint8Array | undefined;
808
808
  KeyId: string | undefined;
809
- MacAlgorithm: MacAlgorithmSpec | string | undefined;
809
+ MacAlgorithm: MacAlgorithmSpec | undefined;
810
810
  GrantTokens?: string[];
811
811
  DryRun?: boolean;
812
812
  }
813
813
  export interface GenerateMacResponse {
814
814
  Mac?: Uint8Array;
815
- MacAlgorithm?: MacAlgorithmSpec | string;
815
+ MacAlgorithm?: MacAlgorithmSpec;
816
816
  KeyId?: string;
817
817
  }
818
818
  export interface GenerateRandomRequest {
@@ -846,8 +846,8 @@ export type WrappingKeySpec =
846
846
  (typeof WrappingKeySpec)[keyof typeof WrappingKeySpec];
847
847
  export interface GetParametersForImportRequest {
848
848
  KeyId: string | undefined;
849
- WrappingAlgorithm: AlgorithmSpec | string | undefined;
850
- WrappingKeySpec: WrappingKeySpec | string | undefined;
849
+ WrappingAlgorithm: AlgorithmSpec | undefined;
850
+ WrappingKeySpec: WrappingKeySpec | undefined;
851
851
  }
852
852
  export interface GetParametersForImportResponse {
853
853
  KeyId?: string;
@@ -862,11 +862,11 @@ export interface GetPublicKeyRequest {
862
862
  export interface GetPublicKeyResponse {
863
863
  KeyId?: string;
864
864
  PublicKey?: Uint8Array;
865
- CustomerMasterKeySpec?: CustomerMasterKeySpec | string;
866
- KeySpec?: KeySpec | string;
867
- KeyUsage?: KeyUsageType | string;
868
- EncryptionAlgorithms?: (EncryptionAlgorithmSpec | string)[];
869
- SigningAlgorithms?: (SigningAlgorithmSpec | string)[];
865
+ CustomerMasterKeySpec?: CustomerMasterKeySpec;
866
+ KeySpec?: KeySpec;
867
+ KeyUsage?: KeyUsageType;
868
+ EncryptionAlgorithms?: EncryptionAlgorithmSpec[];
869
+ SigningAlgorithms?: SigningAlgorithmSpec[];
870
870
  }
871
871
  export interface GrantListEntry {
872
872
  KeyId?: string;
@@ -876,7 +876,7 @@ export interface GrantListEntry {
876
876
  GranteePrincipal?: string;
877
877
  RetiringPrincipal?: string;
878
878
  IssuingAccount?: string;
879
- Operations?: (GrantOperation | string)[];
879
+ Operations?: GrantOperation[];
880
880
  Constraints?: GrantConstraints;
881
881
  }
882
882
  export interface ImportKeyMaterialRequest {
@@ -884,7 +884,7 @@ export interface ImportKeyMaterialRequest {
884
884
  ImportToken: Uint8Array | undefined;
885
885
  EncryptedKeyMaterial: Uint8Array | undefined;
886
886
  ValidTo?: Date;
887
- ExpirationModel?: ExpirationModelType | string;
887
+ ExpirationModel?: ExpirationModelType;
888
888
  }
889
889
  export interface ImportKeyMaterialResponse {}
890
890
  export declare class IncorrectKeyMaterialException extends __BaseException {
@@ -999,8 +999,8 @@ export interface ReEncryptRequest {
999
999
  SourceKeyId?: string;
1000
1000
  DestinationKeyId: string | undefined;
1001
1001
  DestinationEncryptionContext?: Record<string, string>;
1002
- SourceEncryptionAlgorithm?: EncryptionAlgorithmSpec | string;
1003
- DestinationEncryptionAlgorithm?: EncryptionAlgorithmSpec | string;
1002
+ SourceEncryptionAlgorithm?: EncryptionAlgorithmSpec;
1003
+ DestinationEncryptionAlgorithm?: EncryptionAlgorithmSpec;
1004
1004
  GrantTokens?: string[];
1005
1005
  DryRun?: boolean;
1006
1006
  }
@@ -1008,8 +1008,8 @@ export interface ReEncryptResponse {
1008
1008
  CiphertextBlob?: Uint8Array;
1009
1009
  SourceKeyId?: string;
1010
1010
  KeyId?: string;
1011
- SourceEncryptionAlgorithm?: EncryptionAlgorithmSpec | string;
1012
- DestinationEncryptionAlgorithm?: EncryptionAlgorithmSpec | string;
1011
+ SourceEncryptionAlgorithm?: EncryptionAlgorithmSpec;
1012
+ DestinationEncryptionAlgorithm?: EncryptionAlgorithmSpec;
1013
1013
  }
1014
1014
  export interface ReplicateKeyRequest {
1015
1015
  KeyId: string | undefined;
@@ -1042,21 +1042,21 @@ export interface ScheduleKeyDeletionRequest {
1042
1042
  export interface ScheduleKeyDeletionResponse {
1043
1043
  KeyId?: string;
1044
1044
  DeletionDate?: Date;
1045
- KeyState?: KeyState | string;
1045
+ KeyState?: KeyState;
1046
1046
  PendingWindowInDays?: number;
1047
1047
  }
1048
1048
  export interface SignRequest {
1049
1049
  KeyId: string | undefined;
1050
1050
  Message: Uint8Array | undefined;
1051
- MessageType?: MessageType | string;
1051
+ MessageType?: MessageType;
1052
1052
  GrantTokens?: string[];
1053
- SigningAlgorithm: SigningAlgorithmSpec | string | undefined;
1053
+ SigningAlgorithm: SigningAlgorithmSpec | undefined;
1054
1054
  DryRun?: boolean;
1055
1055
  }
1056
1056
  export interface SignResponse {
1057
1057
  KeyId?: string;
1058
1058
  Signature?: Uint8Array;
1059
- SigningAlgorithm?: SigningAlgorithmSpec | string;
1059
+ SigningAlgorithm?: SigningAlgorithmSpec;
1060
1060
  }
1061
1061
  export interface TagResourceRequest {
1062
1062
  KeyId: string | undefined;
@@ -1079,7 +1079,7 @@ export interface UpdateCustomKeyStoreRequest {
1079
1079
  XksProxyUriPath?: string;
1080
1080
  XksProxyVpcEndpointServiceName?: string;
1081
1081
  XksProxyAuthenticationCredential?: XksProxyAuthenticationCredentialType;
1082
- XksProxyConnectivity?: XksProxyConnectivityType | string;
1082
+ XksProxyConnectivity?: XksProxyConnectivityType;
1083
1083
  }
1084
1084
  export interface UpdateCustomKeyStoreResponse {}
1085
1085
  export interface UpdateKeyDescriptionRequest {
@@ -1093,21 +1093,21 @@ export interface UpdatePrimaryRegionRequest {
1093
1093
  export interface VerifyRequest {
1094
1094
  KeyId: string | undefined;
1095
1095
  Message: Uint8Array | undefined;
1096
- MessageType?: MessageType | string;
1096
+ MessageType?: MessageType;
1097
1097
  Signature: Uint8Array | undefined;
1098
- SigningAlgorithm: SigningAlgorithmSpec | string | undefined;
1098
+ SigningAlgorithm: SigningAlgorithmSpec | undefined;
1099
1099
  GrantTokens?: string[];
1100
1100
  DryRun?: boolean;
1101
1101
  }
1102
1102
  export interface VerifyResponse {
1103
1103
  KeyId?: string;
1104
1104
  SignatureValid?: boolean;
1105
- SigningAlgorithm?: SigningAlgorithmSpec | string;
1105
+ SigningAlgorithm?: SigningAlgorithmSpec;
1106
1106
  }
1107
1107
  export interface VerifyMacRequest {
1108
1108
  Message: Uint8Array | undefined;
1109
1109
  KeyId: string | undefined;
1110
- MacAlgorithm: MacAlgorithmSpec | string | undefined;
1110
+ MacAlgorithm: MacAlgorithmSpec | undefined;
1111
1111
  Mac: Uint8Array | undefined;
1112
1112
  GrantTokens?: string[];
1113
1113
  DryRun?: boolean;
@@ -1115,7 +1115,7 @@ export interface VerifyMacRequest {
1115
1115
  export interface VerifyMacResponse {
1116
1116
  KeyId?: string;
1117
1117
  MacValid?: boolean;
1118
- MacAlgorithm?: MacAlgorithmSpec | string;
1118
+ MacAlgorithm?: MacAlgorithmSpec;
1119
1119
  }
1120
1120
  export declare const XksProxyAuthenticationCredentialTypeFilterSensitiveLog: (
1121
1121
  obj: XksProxyAuthenticationCredentialType
package/package.json CHANGED
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "name": "@aws-sdk/client-kms",
3
3
  "description": "AWS SDK for JavaScript Kms Client for Node.js, Browser and React Native",
4
- "version": "3.427.0",
4
+ "version": "3.429.0",
5
5
  "scripts": {
6
6
  "build": "concurrently 'yarn:build:cjs' 'yarn:build:es' 'yarn:build:types'",
7
7
  "build:cjs": "tsc -p tsconfig.cjs.json",
@@ -21,39 +21,39 @@
21
21
  "dependencies": {
22
22
  "@aws-crypto/sha256-browser": "3.0.0",
23
23
  "@aws-crypto/sha256-js": "3.0.0",
24
- "@aws-sdk/client-sts": "3.427.0",
25
- "@aws-sdk/credential-provider-node": "3.427.0",
26
- "@aws-sdk/middleware-host-header": "3.425.0",
27
- "@aws-sdk/middleware-logger": "3.425.0",
28
- "@aws-sdk/middleware-recursion-detection": "3.425.0",
29
- "@aws-sdk/middleware-signing": "3.425.0",
30
- "@aws-sdk/middleware-user-agent": "3.427.0",
31
- "@aws-sdk/region-config-resolver": "3.425.0",
32
- "@aws-sdk/types": "3.425.0",
33
- "@aws-sdk/util-endpoints": "3.427.0",
34
- "@aws-sdk/util-user-agent-browser": "3.425.0",
35
- "@aws-sdk/util-user-agent-node": "3.425.0",
36
- "@smithy/config-resolver": "^2.0.11",
37
- "@smithy/fetch-http-handler": "^2.2.1",
38
- "@smithy/hash-node": "^2.0.10",
39
- "@smithy/invalid-dependency": "^2.0.10",
40
- "@smithy/middleware-content-length": "^2.0.12",
41
- "@smithy/middleware-endpoint": "^2.0.10",
42
- "@smithy/middleware-retry": "^2.0.13",
43
- "@smithy/middleware-serde": "^2.0.10",
44
- "@smithy/middleware-stack": "^2.0.4",
45
- "@smithy/node-config-provider": "^2.0.13",
46
- "@smithy/node-http-handler": "^2.1.6",
47
- "@smithy/protocol-http": "^3.0.6",
48
- "@smithy/smithy-client": "^2.1.9",
49
- "@smithy/types": "^2.3.4",
50
- "@smithy/url-parser": "^2.0.10",
24
+ "@aws-sdk/client-sts": "3.429.0",
25
+ "@aws-sdk/credential-provider-node": "3.429.0",
26
+ "@aws-sdk/middleware-host-header": "3.429.0",
27
+ "@aws-sdk/middleware-logger": "3.428.0",
28
+ "@aws-sdk/middleware-recursion-detection": "3.428.0",
29
+ "@aws-sdk/middleware-signing": "3.428.0",
30
+ "@aws-sdk/middleware-user-agent": "3.428.0",
31
+ "@aws-sdk/region-config-resolver": "3.428.0",
32
+ "@aws-sdk/types": "3.428.0",
33
+ "@aws-sdk/util-endpoints": "3.428.0",
34
+ "@aws-sdk/util-user-agent-browser": "3.428.0",
35
+ "@aws-sdk/util-user-agent-node": "3.428.0",
36
+ "@smithy/config-resolver": "^2.0.14",
37
+ "@smithy/fetch-http-handler": "^2.2.3",
38
+ "@smithy/hash-node": "^2.0.11",
39
+ "@smithy/invalid-dependency": "^2.0.11",
40
+ "@smithy/middleware-content-length": "^2.0.13",
41
+ "@smithy/middleware-endpoint": "^2.1.1",
42
+ "@smithy/middleware-retry": "^2.0.16",
43
+ "@smithy/middleware-serde": "^2.0.11",
44
+ "@smithy/middleware-stack": "^2.0.5",
45
+ "@smithy/node-config-provider": "^2.1.1",
46
+ "@smithy/node-http-handler": "^2.1.7",
47
+ "@smithy/protocol-http": "^3.0.7",
48
+ "@smithy/smithy-client": "^2.1.11",
49
+ "@smithy/types": "^2.3.5",
50
+ "@smithy/url-parser": "^2.0.11",
51
51
  "@smithy/util-base64": "^2.0.0",
52
52
  "@smithy/util-body-length-browser": "^2.0.0",
53
53
  "@smithy/util-body-length-node": "^2.1.0",
54
- "@smithy/util-defaults-mode-browser": "^2.0.13",
55
- "@smithy/util-defaults-mode-node": "^2.0.15",
56
- "@smithy/util-retry": "^2.0.3",
54
+ "@smithy/util-defaults-mode-browser": "^2.0.15",
55
+ "@smithy/util-defaults-mode-node": "^2.0.19",
56
+ "@smithy/util-retry": "^2.0.4",
57
57
  "@smithy/util-utf8": "^2.0.0",
58
58
  "tslib": "^2.5.0"
59
59
  },