@aws-sdk/client-kms 3.577.0 → 3.582.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/dist-cjs/index.js CHANGED
@@ -353,7 +353,8 @@ var AlgorithmSpec = {
353
353
  RSAES_OAEP_SHA_256: "RSAES_OAEP_SHA_256",
354
354
  RSAES_PKCS1_V1_5: "RSAES_PKCS1_V1_5",
355
355
  RSA_AES_KEY_WRAP_SHA_1: "RSA_AES_KEY_WRAP_SHA_1",
356
- RSA_AES_KEY_WRAP_SHA_256: "RSA_AES_KEY_WRAP_SHA_256"
356
+ RSA_AES_KEY_WRAP_SHA_256: "RSA_AES_KEY_WRAP_SHA_256",
357
+ SM2PKE: "SM2PKE"
357
358
  };
358
359
  var _AlreadyExistsException = class _AlreadyExistsException extends KMSServiceException {
359
360
  /**
@@ -1246,7 +1247,8 @@ var ExpiredImportTokenException = _ExpiredImportTokenException;
1246
1247
  var WrappingKeySpec = {
1247
1248
  RSA_2048: "RSA_2048",
1248
1249
  RSA_3072: "RSA_3072",
1249
- RSA_4096: "RSA_4096"
1250
+ RSA_4096: "RSA_4096",
1251
+ SM2: "SM2"
1250
1252
  };
1251
1253
  var _IncorrectKeyMaterialException = class _IncorrectKeyMaterialException extends KMSServiceException {
1252
1254
  /**
@@ -6,6 +6,7 @@ export const AlgorithmSpec = {
6
6
  RSAES_PKCS1_V1_5: "RSAES_PKCS1_V1_5",
7
7
  RSA_AES_KEY_WRAP_SHA_1: "RSA_AES_KEY_WRAP_SHA_1",
8
8
  RSA_AES_KEY_WRAP_SHA_256: "RSA_AES_KEY_WRAP_SHA_256",
9
+ SM2PKE: "SM2PKE",
9
10
  };
10
11
  export class AlreadyExistsException extends __BaseException {
11
12
  constructor(opts) {
@@ -684,6 +685,7 @@ export const WrappingKeySpec = {
684
685
  RSA_2048: "RSA_2048",
685
686
  RSA_3072: "RSA_3072",
686
687
  RSA_4096: "RSA_4096",
688
+ SM2: "SM2",
687
689
  };
688
690
  export class IncorrectKeyMaterialException extends __BaseException {
689
691
  constructor(opts) {
@@ -162,17 +162,6 @@ declare const EnableKeyRotationCommand_base: {
162
162
  * @public
163
163
  * @example To enable automatic rotation of key material
164
164
  * ```javascript
165
- * // The following example enables automatic annual rotation of the key material for the specified KMS key.
166
- * const input = {
167
- * "KeyId": "1234abcd-12ab-34cd-56ef-1234567890ab"
168
- * };
169
- * const command = new EnableKeyRotationCommand(input);
170
- * await client.send(command);
171
- * // example id: to-enable-automatic-rotation-of-key-material-1478629109677
172
- * ```
173
- *
174
- * @example To enable automatic rotation of key material
175
- * ```javascript
176
165
  * // The following example enables automatic rotation with a rotation period of 365 days for the specified KMS key.
177
166
  * const input = {
178
167
  * "KeyId": "1234abcd-12ab-34cd-56ef-1234567890ab",
@@ -167,22 +167,6 @@ declare const GetKeyRotationStatusCommand_base: {
167
167
  * @public
168
168
  * @example To retrieve the rotation status for a KMS key
169
169
  * ```javascript
170
- * // The following example retrieves the status of automatic annual rotation of the key material for the specified KMS key.
171
- * const input = {
172
- * "KeyId": "1234abcd-12ab-34cd-56ef-1234567890ab"
173
- * };
174
- * const command = new GetKeyRotationStatusCommand(input);
175
- * const response = await client.send(command);
176
- * /* response ==
177
- * {
178
- * "KeyRotationEnabled": true
179
- * }
180
- * *\/
181
- * // example id: to-retrieve-the-rotation-status-for-a-cmk-1479172287408
182
- * ```
183
- *
184
- * @example To retrieve the rotation status for a KMS key
185
- * ```javascript
186
170
  * // The following example retrieves detailed information about the rotation status for a KMS key, including whether automatic key rotation is enabled for the specified KMS key, the rotation period, and the next scheduled rotation date.
187
171
  * const input = {
188
172
  * "KeyId": "1234abcd-12ab-34cd-56ef-1234567890ab"
@@ -47,7 +47,7 @@ declare const GetParametersForImportCommand_base: {
47
47
  * material.</p>
48
48
  * <ul>
49
49
  * <li>
50
- * <p>The public key (or "wrapping key") of an RSA key pair that KMS generates.</p>
50
+ * <p>The public key (or "wrapping key") of an asymmetric key pair that KMS generates.</p>
51
51
  * <p>You will use this public key to encrypt ("wrap") your key material while it's in
52
52
  * transit to KMS. </p>
53
53
  * </li>
@@ -111,8 +111,8 @@ declare const GetParametersForImportCommand_base: {
111
111
  * const client = new KMSClient(config);
112
112
  * const input = { // GetParametersForImportRequest
113
113
  * KeyId: "STRING_VALUE", // required
114
- * WrappingAlgorithm: "RSAES_PKCS1_V1_5" || "RSAES_OAEP_SHA_1" || "RSAES_OAEP_SHA_256" || "RSA_AES_KEY_WRAP_SHA_1" || "RSA_AES_KEY_WRAP_SHA_256", // required
115
- * WrappingKeySpec: "RSA_2048" || "RSA_3072" || "RSA_4096", // required
114
+ * WrappingAlgorithm: "RSAES_PKCS1_V1_5" || "RSAES_OAEP_SHA_1" || "RSAES_OAEP_SHA_256" || "RSA_AES_KEY_WRAP_SHA_1" || "RSA_AES_KEY_WRAP_SHA_256" || "SM2PKE", // required
115
+ * WrappingKeySpec: "RSA_2048" || "RSA_3072" || "RSA_4096" || "SM2", // required
116
116
  * };
117
117
  * const command = new GetParametersForImportCommand(input);
118
118
  * const response = await client.send(command);
@@ -10,6 +10,7 @@ export declare const AlgorithmSpec: {
10
10
  readonly RSAES_PKCS1_V1_5: "RSAES_PKCS1_V1_5";
11
11
  readonly RSA_AES_KEY_WRAP_SHA_1: "RSA_AES_KEY_WRAP_SHA_1";
12
12
  readonly RSA_AES_KEY_WRAP_SHA_256: "RSA_AES_KEY_WRAP_SHA_256";
13
+ readonly SM2PKE: "SM2PKE";
13
14
  };
14
15
  /**
15
16
  * @public
@@ -3625,6 +3626,7 @@ export declare const WrappingKeySpec: {
3625
3626
  readonly RSA_2048: "RSA_2048";
3626
3627
  readonly RSA_3072: "RSA_3072";
3627
3628
  readonly RSA_4096: "RSA_4096";
3629
+ readonly SM2: "SM2";
3628
3630
  };
3629
3631
  /**
3630
3632
  * @public
@@ -3656,13 +3658,19 @@ export interface GetParametersForImportRequest {
3656
3658
  */
3657
3659
  KeyId: string | undefined;
3658
3660
  /**
3659
- * <p>The algorithm you will use with the RSA public key (<code>PublicKey</code>) in the
3661
+ * <p>The algorithm you will use with the asymmetric public key (<code>PublicKey</code>) in the
3660
3662
  * response to protect your key material during import. For more information, see <a href="kms/latest/developerguide/importing-keys-get-public-key-and-token.html#select-wrapping-algorithm">Select a wrapping algorithm</a> in the <i>Key Management Service Developer Guide</i>.</p>
3661
3663
  * <p>For RSA_AES wrapping algorithms, you encrypt your key material with an AES key that you
3662
3664
  * generate, then encrypt your AES key with the RSA public key from KMS. For RSAES wrapping
3663
- * algorithms, you encrypt your key material directly with the RSA public key from KMS.</p>
3665
+ * algorithms, you encrypt your key material directly with the RSA public key from KMS.
3666
+ * For SM2PKE wrapping algorithms, you encrypt your key material directly with the SM2 public key
3667
+ * from KMS.</p>
3664
3668
  * <p>The wrapping algorithms that you can use depend on the type of key material that you are
3665
- * importing. To import an RSA private key, you must use an RSA_AES wrapping algorithm.</p>
3669
+ * importing. To import an RSA private key, you must use an RSA_AES wrapping algorithm, except
3670
+ * in China Regions, where you must use the SM2PKE wrapping algorithm to import an RSA private key.</p>
3671
+ * <p>The SM2PKE wrapping algorithm is available only in China Regions. The
3672
+ * <code>RSA_AES_KEY_WRAP_SHA_256</code> and <code>RSA_AES_KEY_WRAP_SHA_1</code>
3673
+ * wrapping algorithms are not supported in China Regions.</p>
3666
3674
  * <ul>
3667
3675
  * <li>
3668
3676
  * <p>
@@ -3693,16 +3701,22 @@ export interface GetParametersForImportRequest {
3693
3701
  * <b>RSAES_PKCS1_V1_5</b> (Deprecated) — As of October
3694
3702
  * 10, 2023, KMS does not support the RSAES_PKCS1_V1_5 wrapping algorithm.</p>
3695
3703
  * </li>
3704
+ * <li>
3705
+ * <p>
3706
+ * <b>SM2PKE</b> (China Regions only) — supported for
3707
+ * wrapping RSA, ECC, and SM2 key material.</p>
3708
+ * </li>
3696
3709
  * </ul>
3697
3710
  * @public
3698
3711
  */
3699
3712
  WrappingAlgorithm: AlgorithmSpec | undefined;
3700
3713
  /**
3701
- * <p>The type of RSA public key to return in the response. You will use this wrapping key with
3714
+ * <p>The type of public key to return in the response. You will use this wrapping key with
3702
3715
  * the specified wrapping algorithm to protect your key material during import. </p>
3703
- * <p>Use the longest RSA wrapping key that is practical. </p>
3716
+ * <p>Use the longest wrapping key that is practical. </p>
3704
3717
  * <p>You cannot use an RSA_2048 public key to directly wrap an ECC_NIST_P521 private key.
3705
3718
  * Instead, use an RSA_AES wrapping algorithm or choose a longer RSA public key.</p>
3719
+ * <p>The SM2 wrapping key spec is available only in China Regions.</p>
3706
3720
  * @public
3707
3721
  */
3708
3722
  WrappingKeySpec: WrappingKeySpec | undefined;
@@ -6,6 +6,7 @@ export declare const AlgorithmSpec: {
6
6
  readonly RSAES_PKCS1_V1_5: "RSAES_PKCS1_V1_5";
7
7
  readonly RSA_AES_KEY_WRAP_SHA_1: "RSA_AES_KEY_WRAP_SHA_1";
8
8
  readonly RSA_AES_KEY_WRAP_SHA_256: "RSA_AES_KEY_WRAP_SHA_256";
9
+ readonly SM2PKE: "SM2PKE";
9
10
  };
10
11
  export type AlgorithmSpec = (typeof AlgorithmSpec)[keyof typeof AlgorithmSpec];
11
12
  export interface AliasListEntry {
@@ -852,6 +853,7 @@ export declare const WrappingKeySpec: {
852
853
  readonly RSA_2048: "RSA_2048";
853
854
  readonly RSA_3072: "RSA_3072";
854
855
  readonly RSA_4096: "RSA_4096";
856
+ readonly SM2: "SM2";
855
857
  };
856
858
  export type WrappingKeySpec =
857
859
  (typeof WrappingKeySpec)[keyof typeof WrappingKeySpec];
package/package.json CHANGED
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "name": "@aws-sdk/client-kms",
3
3
  "description": "AWS SDK for JavaScript Kms Client for Node.js, Browser and React Native",
4
- "version": "3.577.0",
4
+ "version": "3.582.0",
5
5
  "scripts": {
6
6
  "build": "concurrently 'yarn:build:cjs' 'yarn:build:es' 'yarn:build:types'",
7
7
  "build:cjs": "node ../../scripts/compilation/inline client-kms",
@@ -20,10 +20,10 @@
20
20
  "dependencies": {
21
21
  "@aws-crypto/sha256-browser": "3.0.0",
22
22
  "@aws-crypto/sha256-js": "3.0.0",
23
- "@aws-sdk/client-sso-oidc": "3.577.0",
24
- "@aws-sdk/client-sts": "3.577.0",
25
- "@aws-sdk/core": "3.576.0",
26
- "@aws-sdk/credential-provider-node": "3.577.0",
23
+ "@aws-sdk/client-sso-oidc": "3.582.0",
24
+ "@aws-sdk/client-sts": "3.582.0",
25
+ "@aws-sdk/core": "3.582.0",
26
+ "@aws-sdk/credential-provider-node": "3.582.0",
27
27
  "@aws-sdk/middleware-host-header": "3.577.0",
28
28
  "@aws-sdk/middleware-logger": "3.577.0",
29
29
  "@aws-sdk/middleware-recursion-detection": "3.577.0",
@@ -34,26 +34,26 @@
34
34
  "@aws-sdk/util-user-agent-browser": "3.577.0",
35
35
  "@aws-sdk/util-user-agent-node": "3.577.0",
36
36
  "@smithy/config-resolver": "^3.0.0",
37
- "@smithy/core": "^2.0.0",
38
- "@smithy/fetch-http-handler": "^3.0.0",
37
+ "@smithy/core": "^2.0.1",
38
+ "@smithy/fetch-http-handler": "^3.0.1",
39
39
  "@smithy/hash-node": "^3.0.0",
40
40
  "@smithy/invalid-dependency": "^3.0.0",
41
41
  "@smithy/middleware-content-length": "^3.0.0",
42
42
  "@smithy/middleware-endpoint": "^3.0.0",
43
- "@smithy/middleware-retry": "^3.0.0",
43
+ "@smithy/middleware-retry": "^3.0.1",
44
44
  "@smithy/middleware-serde": "^3.0.0",
45
45
  "@smithy/middleware-stack": "^3.0.0",
46
46
  "@smithy/node-config-provider": "^3.0.0",
47
47
  "@smithy/node-http-handler": "^3.0.0",
48
48
  "@smithy/protocol-http": "^4.0.0",
49
- "@smithy/smithy-client": "^3.0.0",
49
+ "@smithy/smithy-client": "^3.0.1",
50
50
  "@smithy/types": "^3.0.0",
51
51
  "@smithy/url-parser": "^3.0.0",
52
52
  "@smithy/util-base64": "^3.0.0",
53
53
  "@smithy/util-body-length-browser": "^3.0.0",
54
54
  "@smithy/util-body-length-node": "^3.0.0",
55
- "@smithy/util-defaults-mode-browser": "^3.0.0",
56
- "@smithy/util-defaults-mode-node": "^3.0.0",
55
+ "@smithy/util-defaults-mode-browser": "^3.0.1",
56
+ "@smithy/util-defaults-mode-node": "^3.0.1",
57
57
  "@smithy/util-endpoints": "^2.0.0",
58
58
  "@smithy/util-middleware": "^3.0.0",
59
59
  "@smithy/util-retry": "^3.0.0",