@aws-sdk/client-kms 3.577.0 → 3.583.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist-cjs/index.js +4 -2
- package/dist-es/models/models_0.js +2 -0
- package/dist-types/commands/EnableKeyRotationCommand.d.ts +0 -11
- package/dist-types/commands/GetKeyRotationStatusCommand.d.ts +0 -16
- package/dist-types/commands/GetParametersForImportCommand.d.ts +3 -3
- package/dist-types/models/models_0.d.ts +19 -5
- package/dist-types/ts3.4/models/models_0.d.ts +2 -0
- package/package.json +13 -13
package/dist-cjs/index.js
CHANGED
|
@@ -353,7 +353,8 @@ var AlgorithmSpec = {
|
|
|
353
353
|
RSAES_OAEP_SHA_256: "RSAES_OAEP_SHA_256",
|
|
354
354
|
RSAES_PKCS1_V1_5: "RSAES_PKCS1_V1_5",
|
|
355
355
|
RSA_AES_KEY_WRAP_SHA_1: "RSA_AES_KEY_WRAP_SHA_1",
|
|
356
|
-
RSA_AES_KEY_WRAP_SHA_256: "RSA_AES_KEY_WRAP_SHA_256"
|
|
356
|
+
RSA_AES_KEY_WRAP_SHA_256: "RSA_AES_KEY_WRAP_SHA_256",
|
|
357
|
+
SM2PKE: "SM2PKE"
|
|
357
358
|
};
|
|
358
359
|
var _AlreadyExistsException = class _AlreadyExistsException extends KMSServiceException {
|
|
359
360
|
/**
|
|
@@ -1246,7 +1247,8 @@ var ExpiredImportTokenException = _ExpiredImportTokenException;
|
|
|
1246
1247
|
var WrappingKeySpec = {
|
|
1247
1248
|
RSA_2048: "RSA_2048",
|
|
1248
1249
|
RSA_3072: "RSA_3072",
|
|
1249
|
-
RSA_4096: "RSA_4096"
|
|
1250
|
+
RSA_4096: "RSA_4096",
|
|
1251
|
+
SM2: "SM2"
|
|
1250
1252
|
};
|
|
1251
1253
|
var _IncorrectKeyMaterialException = class _IncorrectKeyMaterialException extends KMSServiceException {
|
|
1252
1254
|
/**
|
|
@@ -6,6 +6,7 @@ export const AlgorithmSpec = {
|
|
|
6
6
|
RSAES_PKCS1_V1_5: "RSAES_PKCS1_V1_5",
|
|
7
7
|
RSA_AES_KEY_WRAP_SHA_1: "RSA_AES_KEY_WRAP_SHA_1",
|
|
8
8
|
RSA_AES_KEY_WRAP_SHA_256: "RSA_AES_KEY_WRAP_SHA_256",
|
|
9
|
+
SM2PKE: "SM2PKE",
|
|
9
10
|
};
|
|
10
11
|
export class AlreadyExistsException extends __BaseException {
|
|
11
12
|
constructor(opts) {
|
|
@@ -684,6 +685,7 @@ export const WrappingKeySpec = {
|
|
|
684
685
|
RSA_2048: "RSA_2048",
|
|
685
686
|
RSA_3072: "RSA_3072",
|
|
686
687
|
RSA_4096: "RSA_4096",
|
|
688
|
+
SM2: "SM2",
|
|
687
689
|
};
|
|
688
690
|
export class IncorrectKeyMaterialException extends __BaseException {
|
|
689
691
|
constructor(opts) {
|
|
@@ -162,17 +162,6 @@ declare const EnableKeyRotationCommand_base: {
|
|
|
162
162
|
* @public
|
|
163
163
|
* @example To enable automatic rotation of key material
|
|
164
164
|
* ```javascript
|
|
165
|
-
* // The following example enables automatic annual rotation of the key material for the specified KMS key.
|
|
166
|
-
* const input = {
|
|
167
|
-
* "KeyId": "1234abcd-12ab-34cd-56ef-1234567890ab"
|
|
168
|
-
* };
|
|
169
|
-
* const command = new EnableKeyRotationCommand(input);
|
|
170
|
-
* await client.send(command);
|
|
171
|
-
* // example id: to-enable-automatic-rotation-of-key-material-1478629109677
|
|
172
|
-
* ```
|
|
173
|
-
*
|
|
174
|
-
* @example To enable automatic rotation of key material
|
|
175
|
-
* ```javascript
|
|
176
165
|
* // The following example enables automatic rotation with a rotation period of 365 days for the specified KMS key.
|
|
177
166
|
* const input = {
|
|
178
167
|
* "KeyId": "1234abcd-12ab-34cd-56ef-1234567890ab",
|
|
@@ -167,22 +167,6 @@ declare const GetKeyRotationStatusCommand_base: {
|
|
|
167
167
|
* @public
|
|
168
168
|
* @example To retrieve the rotation status for a KMS key
|
|
169
169
|
* ```javascript
|
|
170
|
-
* // The following example retrieves the status of automatic annual rotation of the key material for the specified KMS key.
|
|
171
|
-
* const input = {
|
|
172
|
-
* "KeyId": "1234abcd-12ab-34cd-56ef-1234567890ab"
|
|
173
|
-
* };
|
|
174
|
-
* const command = new GetKeyRotationStatusCommand(input);
|
|
175
|
-
* const response = await client.send(command);
|
|
176
|
-
* /* response ==
|
|
177
|
-
* {
|
|
178
|
-
* "KeyRotationEnabled": true
|
|
179
|
-
* }
|
|
180
|
-
* *\/
|
|
181
|
-
* // example id: to-retrieve-the-rotation-status-for-a-cmk-1479172287408
|
|
182
|
-
* ```
|
|
183
|
-
*
|
|
184
|
-
* @example To retrieve the rotation status for a KMS key
|
|
185
|
-
* ```javascript
|
|
186
170
|
* // The following example retrieves detailed information about the rotation status for a KMS key, including whether automatic key rotation is enabled for the specified KMS key, the rotation period, and the next scheduled rotation date.
|
|
187
171
|
* const input = {
|
|
188
172
|
* "KeyId": "1234abcd-12ab-34cd-56ef-1234567890ab"
|
|
@@ -47,7 +47,7 @@ declare const GetParametersForImportCommand_base: {
|
|
|
47
47
|
* material.</p>
|
|
48
48
|
* <ul>
|
|
49
49
|
* <li>
|
|
50
|
-
* <p>The public key (or "wrapping key") of an
|
|
50
|
+
* <p>The public key (or "wrapping key") of an asymmetric key pair that KMS generates.</p>
|
|
51
51
|
* <p>You will use this public key to encrypt ("wrap") your key material while it's in
|
|
52
52
|
* transit to KMS. </p>
|
|
53
53
|
* </li>
|
|
@@ -111,8 +111,8 @@ declare const GetParametersForImportCommand_base: {
|
|
|
111
111
|
* const client = new KMSClient(config);
|
|
112
112
|
* const input = { // GetParametersForImportRequest
|
|
113
113
|
* KeyId: "STRING_VALUE", // required
|
|
114
|
-
* WrappingAlgorithm: "RSAES_PKCS1_V1_5" || "RSAES_OAEP_SHA_1" || "RSAES_OAEP_SHA_256" || "RSA_AES_KEY_WRAP_SHA_1" || "RSA_AES_KEY_WRAP_SHA_256", // required
|
|
115
|
-
* WrappingKeySpec: "RSA_2048" || "RSA_3072" || "RSA_4096", // required
|
|
114
|
+
* WrappingAlgorithm: "RSAES_PKCS1_V1_5" || "RSAES_OAEP_SHA_1" || "RSAES_OAEP_SHA_256" || "RSA_AES_KEY_WRAP_SHA_1" || "RSA_AES_KEY_WRAP_SHA_256" || "SM2PKE", // required
|
|
115
|
+
* WrappingKeySpec: "RSA_2048" || "RSA_3072" || "RSA_4096" || "SM2", // required
|
|
116
116
|
* };
|
|
117
117
|
* const command = new GetParametersForImportCommand(input);
|
|
118
118
|
* const response = await client.send(command);
|
|
@@ -10,6 +10,7 @@ export declare const AlgorithmSpec: {
|
|
|
10
10
|
readonly RSAES_PKCS1_V1_5: "RSAES_PKCS1_V1_5";
|
|
11
11
|
readonly RSA_AES_KEY_WRAP_SHA_1: "RSA_AES_KEY_WRAP_SHA_1";
|
|
12
12
|
readonly RSA_AES_KEY_WRAP_SHA_256: "RSA_AES_KEY_WRAP_SHA_256";
|
|
13
|
+
readonly SM2PKE: "SM2PKE";
|
|
13
14
|
};
|
|
14
15
|
/**
|
|
15
16
|
* @public
|
|
@@ -3625,6 +3626,7 @@ export declare const WrappingKeySpec: {
|
|
|
3625
3626
|
readonly RSA_2048: "RSA_2048";
|
|
3626
3627
|
readonly RSA_3072: "RSA_3072";
|
|
3627
3628
|
readonly RSA_4096: "RSA_4096";
|
|
3629
|
+
readonly SM2: "SM2";
|
|
3628
3630
|
};
|
|
3629
3631
|
/**
|
|
3630
3632
|
* @public
|
|
@@ -3656,13 +3658,19 @@ export interface GetParametersForImportRequest {
|
|
|
3656
3658
|
*/
|
|
3657
3659
|
KeyId: string | undefined;
|
|
3658
3660
|
/**
|
|
3659
|
-
* <p>The algorithm you will use with the
|
|
3661
|
+
* <p>The algorithm you will use with the asymmetric public key (<code>PublicKey</code>) in the
|
|
3660
3662
|
* response to protect your key material during import. For more information, see <a href="kms/latest/developerguide/importing-keys-get-public-key-and-token.html#select-wrapping-algorithm">Select a wrapping algorithm</a> in the <i>Key Management Service Developer Guide</i>.</p>
|
|
3661
3663
|
* <p>For RSA_AES wrapping algorithms, you encrypt your key material with an AES key that you
|
|
3662
3664
|
* generate, then encrypt your AES key with the RSA public key from KMS. For RSAES wrapping
|
|
3663
|
-
* algorithms, you encrypt your key material directly with the RSA public key from KMS
|
|
3665
|
+
* algorithms, you encrypt your key material directly with the RSA public key from KMS.
|
|
3666
|
+
* For SM2PKE wrapping algorithms, you encrypt your key material directly with the SM2 public key
|
|
3667
|
+
* from KMS.</p>
|
|
3664
3668
|
* <p>The wrapping algorithms that you can use depend on the type of key material that you are
|
|
3665
|
-
* importing. To import an RSA private key, you must use an RSA_AES wrapping algorithm
|
|
3669
|
+
* importing. To import an RSA private key, you must use an RSA_AES wrapping algorithm, except
|
|
3670
|
+
* in China Regions, where you must use the SM2PKE wrapping algorithm to import an RSA private key.</p>
|
|
3671
|
+
* <p>The SM2PKE wrapping algorithm is available only in China Regions. The
|
|
3672
|
+
* <code>RSA_AES_KEY_WRAP_SHA_256</code> and <code>RSA_AES_KEY_WRAP_SHA_1</code>
|
|
3673
|
+
* wrapping algorithms are not supported in China Regions.</p>
|
|
3666
3674
|
* <ul>
|
|
3667
3675
|
* <li>
|
|
3668
3676
|
* <p>
|
|
@@ -3693,16 +3701,22 @@ export interface GetParametersForImportRequest {
|
|
|
3693
3701
|
* <b>RSAES_PKCS1_V1_5</b> (Deprecated) — As of October
|
|
3694
3702
|
* 10, 2023, KMS does not support the RSAES_PKCS1_V1_5 wrapping algorithm.</p>
|
|
3695
3703
|
* </li>
|
|
3704
|
+
* <li>
|
|
3705
|
+
* <p>
|
|
3706
|
+
* <b>SM2PKE</b> (China Regions only) — supported for
|
|
3707
|
+
* wrapping RSA, ECC, and SM2 key material.</p>
|
|
3708
|
+
* </li>
|
|
3696
3709
|
* </ul>
|
|
3697
3710
|
* @public
|
|
3698
3711
|
*/
|
|
3699
3712
|
WrappingAlgorithm: AlgorithmSpec | undefined;
|
|
3700
3713
|
/**
|
|
3701
|
-
* <p>The type of
|
|
3714
|
+
* <p>The type of public key to return in the response. You will use this wrapping key with
|
|
3702
3715
|
* the specified wrapping algorithm to protect your key material during import. </p>
|
|
3703
|
-
* <p>Use the longest
|
|
3716
|
+
* <p>Use the longest wrapping key that is practical. </p>
|
|
3704
3717
|
* <p>You cannot use an RSA_2048 public key to directly wrap an ECC_NIST_P521 private key.
|
|
3705
3718
|
* Instead, use an RSA_AES wrapping algorithm or choose a longer RSA public key.</p>
|
|
3719
|
+
* <p>The SM2 wrapping key spec is available only in China Regions.</p>
|
|
3706
3720
|
* @public
|
|
3707
3721
|
*/
|
|
3708
3722
|
WrappingKeySpec: WrappingKeySpec | undefined;
|
|
@@ -6,6 +6,7 @@ export declare const AlgorithmSpec: {
|
|
|
6
6
|
readonly RSAES_PKCS1_V1_5: "RSAES_PKCS1_V1_5";
|
|
7
7
|
readonly RSA_AES_KEY_WRAP_SHA_1: "RSA_AES_KEY_WRAP_SHA_1";
|
|
8
8
|
readonly RSA_AES_KEY_WRAP_SHA_256: "RSA_AES_KEY_WRAP_SHA_256";
|
|
9
|
+
readonly SM2PKE: "SM2PKE";
|
|
9
10
|
};
|
|
10
11
|
export type AlgorithmSpec = (typeof AlgorithmSpec)[keyof typeof AlgorithmSpec];
|
|
11
12
|
export interface AliasListEntry {
|
|
@@ -852,6 +853,7 @@ export declare const WrappingKeySpec: {
|
|
|
852
853
|
readonly RSA_2048: "RSA_2048";
|
|
853
854
|
readonly RSA_3072: "RSA_3072";
|
|
854
855
|
readonly RSA_4096: "RSA_4096";
|
|
856
|
+
readonly SM2: "SM2";
|
|
855
857
|
};
|
|
856
858
|
export type WrappingKeySpec =
|
|
857
859
|
(typeof WrappingKeySpec)[keyof typeof WrappingKeySpec];
|
package/package.json
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@aws-sdk/client-kms",
|
|
3
3
|
"description": "AWS SDK for JavaScript Kms Client for Node.js, Browser and React Native",
|
|
4
|
-
"version": "3.
|
|
4
|
+
"version": "3.583.0",
|
|
5
5
|
"scripts": {
|
|
6
6
|
"build": "concurrently 'yarn:build:cjs' 'yarn:build:es' 'yarn:build:types'",
|
|
7
7
|
"build:cjs": "node ../../scripts/compilation/inline client-kms",
|
|
@@ -20,40 +20,40 @@
|
|
|
20
20
|
"dependencies": {
|
|
21
21
|
"@aws-crypto/sha256-browser": "3.0.0",
|
|
22
22
|
"@aws-crypto/sha256-js": "3.0.0",
|
|
23
|
-
"@aws-sdk/client-sso-oidc": "3.
|
|
24
|
-
"@aws-sdk/client-sts": "3.
|
|
25
|
-
"@aws-sdk/core": "3.
|
|
26
|
-
"@aws-sdk/credential-provider-node": "3.
|
|
23
|
+
"@aws-sdk/client-sso-oidc": "3.583.0",
|
|
24
|
+
"@aws-sdk/client-sts": "3.583.0",
|
|
25
|
+
"@aws-sdk/core": "3.582.0",
|
|
26
|
+
"@aws-sdk/credential-provider-node": "3.583.0",
|
|
27
27
|
"@aws-sdk/middleware-host-header": "3.577.0",
|
|
28
28
|
"@aws-sdk/middleware-logger": "3.577.0",
|
|
29
29
|
"@aws-sdk/middleware-recursion-detection": "3.577.0",
|
|
30
|
-
"@aws-sdk/middleware-user-agent": "3.
|
|
30
|
+
"@aws-sdk/middleware-user-agent": "3.583.0",
|
|
31
31
|
"@aws-sdk/region-config-resolver": "3.577.0",
|
|
32
32
|
"@aws-sdk/types": "3.577.0",
|
|
33
|
-
"@aws-sdk/util-endpoints": "3.
|
|
33
|
+
"@aws-sdk/util-endpoints": "3.583.0",
|
|
34
34
|
"@aws-sdk/util-user-agent-browser": "3.577.0",
|
|
35
35
|
"@aws-sdk/util-user-agent-node": "3.577.0",
|
|
36
36
|
"@smithy/config-resolver": "^3.0.0",
|
|
37
|
-
"@smithy/core": "^2.0.
|
|
38
|
-
"@smithy/fetch-http-handler": "^3.0.
|
|
37
|
+
"@smithy/core": "^2.0.1",
|
|
38
|
+
"@smithy/fetch-http-handler": "^3.0.1",
|
|
39
39
|
"@smithy/hash-node": "^3.0.0",
|
|
40
40
|
"@smithy/invalid-dependency": "^3.0.0",
|
|
41
41
|
"@smithy/middleware-content-length": "^3.0.0",
|
|
42
42
|
"@smithy/middleware-endpoint": "^3.0.0",
|
|
43
|
-
"@smithy/middleware-retry": "^3.0.
|
|
43
|
+
"@smithy/middleware-retry": "^3.0.1",
|
|
44
44
|
"@smithy/middleware-serde": "^3.0.0",
|
|
45
45
|
"@smithy/middleware-stack": "^3.0.0",
|
|
46
46
|
"@smithy/node-config-provider": "^3.0.0",
|
|
47
47
|
"@smithy/node-http-handler": "^3.0.0",
|
|
48
48
|
"@smithy/protocol-http": "^4.0.0",
|
|
49
|
-
"@smithy/smithy-client": "^3.0.
|
|
49
|
+
"@smithy/smithy-client": "^3.0.1",
|
|
50
50
|
"@smithy/types": "^3.0.0",
|
|
51
51
|
"@smithy/url-parser": "^3.0.0",
|
|
52
52
|
"@smithy/util-base64": "^3.0.0",
|
|
53
53
|
"@smithy/util-body-length-browser": "^3.0.0",
|
|
54
54
|
"@smithy/util-body-length-node": "^3.0.0",
|
|
55
|
-
"@smithy/util-defaults-mode-browser": "^3.0.
|
|
56
|
-
"@smithy/util-defaults-mode-node": "^3.0.
|
|
55
|
+
"@smithy/util-defaults-mode-browser": "^3.0.1",
|
|
56
|
+
"@smithy/util-defaults-mode-node": "^3.0.1",
|
|
57
57
|
"@smithy/util-endpoints": "^2.0.0",
|
|
58
58
|
"@smithy/util-middleware": "^3.0.0",
|
|
59
59
|
"@smithy/util-retry": "^3.0.0",
|