@aws-sdk/client-kms 3.774.0 → 3.777.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (60) hide show
  1. package/dist-cjs/auth/httpAuthSchemeProvider.js +1 -3
  2. package/dist-cjs/index.js +17 -18
  3. package/dist-es/KMSClient.js +2 -1
  4. package/dist-es/auth/httpAuthSchemeProvider.js +1 -3
  5. package/dist-es/endpoint/EndpointParameters.js +2 -3
  6. package/dist-es/runtimeExtensions.js +2 -14
  7. package/dist-types/commands/CancelKeyDeletionCommand.d.ts +5 -5
  8. package/dist-types/commands/ConnectCustomKeyStoreCommand.d.ts +7 -4
  9. package/dist-types/commands/CreateAliasCommand.d.ts +8 -5
  10. package/dist-types/commands/CreateCustomKeyStoreCommand.d.ts +8 -57
  11. package/dist-types/commands/CreateGrantCommand.d.ts +8 -8
  12. package/dist-types/commands/CreateKeyCommand.d.ts +1 -283
  13. package/dist-types/commands/DecryptCommand.d.ts +15 -39
  14. package/dist-types/commands/DeleteAliasCommand.d.ts +7 -4
  15. package/dist-types/commands/DeleteCustomKeyStoreCommand.d.ts +7 -4
  16. package/dist-types/commands/DeleteImportedKeyMaterialCommand.d.ts +7 -4
  17. package/dist-types/commands/DeriveSharedSecretCommand.d.ts +10 -10
  18. package/dist-types/commands/DescribeCustomKeyStoresCommand.d.ts +5 -92
  19. package/dist-types/commands/DescribeKeyCommand.d.ts +101 -138
  20. package/dist-types/commands/DisableKeyCommand.d.ts +7 -4
  21. package/dist-types/commands/DisableKeyRotationCommand.d.ts +7 -4
  22. package/dist-types/commands/DisconnectCustomKeyStoreCommand.d.ts +7 -4
  23. package/dist-types/commands/EnableKeyCommand.d.ts +7 -4
  24. package/dist-types/commands/EnableKeyRotationCommand.d.ts +8 -5
  25. package/dist-types/commands/EncryptCommand.d.ts +15 -16
  26. package/dist-types/commands/GenerateDataKeyCommand.d.ts +8 -32
  27. package/dist-types/commands/GenerateDataKeyPairCommand.d.ts +10 -36
  28. package/dist-types/commands/GenerateDataKeyPairWithoutPlaintextCommand.d.ts +9 -9
  29. package/dist-types/commands/GenerateDataKeyWithoutPlaintextCommand.d.ts +7 -7
  30. package/dist-types/commands/GenerateMacCommand.d.ts +9 -9
  31. package/dist-types/commands/GenerateRandomCommand.d.ts +5 -26
  32. package/dist-types/commands/GetKeyPolicyCommand.d.ts +18 -6
  33. package/dist-types/commands/GetKeyRotationStatusCommand.d.ts +1 -20
  34. package/dist-types/commands/GetParametersForImportCommand.d.ts +1 -84
  35. package/dist-types/commands/GetPublicKeyCommand.d.ts +9 -9
  36. package/dist-types/commands/ImportKeyMaterialCommand.d.ts +10 -22
  37. package/dist-types/commands/ListAliasesCommand.d.ts +30 -30
  38. package/dist-types/commands/ListGrantsCommand.d.ts +1 -69
  39. package/dist-types/commands/ListKeyPoliciesCommand.d.ts +6 -6
  40. package/dist-types/commands/ListKeyRotationsCommand.d.ts +1 -28
  41. package/dist-types/commands/ListKeysCommand.d.ts +20 -20
  42. package/dist-types/commands/ListResourceTagsCommand.d.ts +12 -12
  43. package/dist-types/commands/ListRetirableGrantsCommand.d.ts +1 -30
  44. package/dist-types/commands/PutKeyPolicyCommand.d.ts +82 -6
  45. package/dist-types/commands/ReEncryptCommand.d.ts +8 -8
  46. package/dist-types/commands/ReplicateKeyCommand.d.ts +31 -29
  47. package/dist-types/commands/RetireGrantCommand.d.ts +8 -5
  48. package/dist-types/commands/RevokeGrantCommand.d.ts +8 -5
  49. package/dist-types/commands/RotateKeyOnDemandCommand.d.ts +5 -5
  50. package/dist-types/commands/ScheduleKeyDeletionCommand.d.ts +1 -18
  51. package/dist-types/commands/SignCommand.d.ts +18 -19
  52. package/dist-types/commands/TagResourceCommand.d.ts +10 -7
  53. package/dist-types/commands/UntagResourceCommand.d.ts +8 -5
  54. package/dist-types/commands/UpdateAliasCommand.d.ts +8 -5
  55. package/dist-types/commands/UpdateCustomKeyStoreCommand.d.ts +34 -38
  56. package/dist-types/commands/UpdateKeyDescriptionCommand.d.ts +8 -5
  57. package/dist-types/commands/UpdatePrimaryRegionCommand.d.ts +12 -9
  58. package/dist-types/commands/VerifyCommand.d.ts +20 -21
  59. package/dist-types/commands/VerifyMacCommand.d.ts +10 -10
  60. package/package.json +33 -33
@@ -247,69 +247,45 @@ declare const DecryptCommand_base: {
247
247
  * @throws {@link KMSServiceException}
248
248
  * <p>Base exception class for all service exceptions from KMS service.</p>
249
249
  *
250
- * @public
250
+ *
251
251
  * @example To decrypt data with a symmetric encryption KMS key
252
252
  * ```javascript
253
253
  * // The following example decrypts data that was encrypted with a symmetric encryption KMS key. The KeyId is not required when decrypting with a symmetric encryption key, but it is a best practice.
254
254
  * const input = {
255
- * "CiphertextBlob": "<binary data>",
256
- * "KeyId": "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab"
255
+ * CiphertextBlob: "<binary data>",
256
+ * KeyId: "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab"
257
257
  * };
258
258
  * const command = new DecryptCommand(input);
259
259
  * const response = await client.send(command);
260
- * /* response ==
260
+ * /* response is
261
261
  * {
262
- * "EncryptionAlgorithm": "SYMMETRIC_DEFAULT",
263
- * "KeyId": "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab",
264
- * "Plaintext": "<binary data>"
262
+ * EncryptionAlgorithm: "SYMMETRIC_DEFAULT",
263
+ * KeyId: "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab",
264
+ * Plaintext: "<binary data>"
265
265
  * }
266
266
  * *\/
267
- * // example id: to-decrypt-data-1
268
267
  * ```
269
268
  *
270
269
  * @example To decrypt data with an asymmetric encryption KMS key
271
270
  * ```javascript
272
271
  * // The following example decrypts data that was encrypted with an asymmetric encryption KMS key. When the KMS encryption key is asymmetric, you must specify the KMS key ID and the encryption algorithm that was used to encrypt the data.
273
272
  * const input = {
274
- * "CiphertextBlob": "<binary data>",
275
- * "EncryptionAlgorithm": "RSAES_OAEP_SHA_256",
276
- * "KeyId": "0987dcba-09fe-87dc-65ba-ab0987654321"
273
+ * CiphertextBlob: "<binary data>",
274
+ * EncryptionAlgorithm: "RSAES_OAEP_SHA_256",
275
+ * KeyId: "0987dcba-09fe-87dc-65ba-ab0987654321"
277
276
  * };
278
277
  * const command = new DecryptCommand(input);
279
278
  * const response = await client.send(command);
280
- * /* response ==
279
+ * /* response is
281
280
  * {
282
- * "EncryptionAlgorithm": "RSAES_OAEP_SHA_256",
283
- * "KeyId": "arn:aws:kms:us-west-2:111122223333:key/0987dcba-09fe-87dc-65ba-ab0987654321",
284
- * "Plaintext": "<binary data>"
281
+ * EncryptionAlgorithm: "RSAES_OAEP_SHA_256",
282
+ * KeyId: "arn:aws:kms:us-west-2:111122223333:key/0987dcba-09fe-87dc-65ba-ab0987654321",
283
+ * Plaintext: "<binary data>"
285
284
  * }
286
285
  * *\/
287
- * // example id: to-decrypt-data-2
288
- * ```
289
- *
290
- * @example To decrypt data for a Nitro enclave
291
- * ```javascript
292
- * // The following Decrypt example includes the Recipient parameter with a signed attestation document from an AWS Nitro enclave. Instead of returning the decrypted data in plaintext (Plaintext), the operation returns the decrypted data encrypted by the public key from the attestation document (CiphertextForRecipient).
293
- * const input = {
294
- * "CiphertextBlob": "<binary data>",
295
- * "KeyId": "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab",
296
- * "Recipient": {
297
- * "AttestationDocument": "<attestation document>",
298
- * "KeyEncryptionAlgorithm": "RSAES_OAEP_SHA_256"
299
- * }
300
- * };
301
- * const command = new DecryptCommand(input);
302
- * const response = await client.send(command);
303
- * /* response ==
304
- * {
305
- * "CiphertextForRecipient": "<binary data>",
306
- * "KeyId": "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab",
307
- * "Plaintext": ""
308
- * }
309
- * *\/
310
- * // example id: to-decrypt-data-for-a-nitro-enclave-2
311
286
  * ```
312
287
  *
288
+ * @public
313
289
  */
314
290
  export declare class DecryptCommand extends DecryptCommand_base {
315
291
  /** @internal type navigation helper, not in runtime. */
@@ -134,18 +134,21 @@ declare const DeleteAliasCommand_base: {
134
134
  * @throws {@link KMSServiceException}
135
135
  * <p>Base exception class for all service exceptions from KMS service.</p>
136
136
  *
137
- * @public
137
+ *
138
138
  * @example To delete an alias
139
139
  * ```javascript
140
140
  * // The following example deletes the specified alias.
141
141
  * const input = {
142
- * "AliasName": "alias/ExampleAlias"
142
+ * AliasName: "alias/ExampleAlias"
143
143
  * };
144
144
  * const command = new DeleteAliasCommand(input);
145
- * await client.send(command);
146
- * // example id: to-delete-an-alias-1478285209338
145
+ * const response = await client.send(command);
146
+ * /* response is
147
+ * { /* metadata only *\/ }
148
+ * *\/
147
149
  * ```
148
150
  *
151
+ * @public
149
152
  */
150
153
  export declare class DeleteAliasCommand extends DeleteAliasCommand_base {
151
154
  /** @internal type navigation helper, not in runtime. */
@@ -163,18 +163,21 @@ declare const DeleteCustomKeyStoreCommand_base: {
163
163
  * @throws {@link KMSServiceException}
164
164
  * <p>Base exception class for all service exceptions from KMS service.</p>
165
165
  *
166
- * @public
166
+ *
167
167
  * @example To delete a custom key store from AWS KMS
168
168
  * ```javascript
169
169
  * // This example deletes a custom key store from AWS KMS. This operation does not affect the backing key store, such as a CloudHSM cluster, external key store proxy, or your external key manager. This operation doesn't return any data. To verify that the operation was successful, use the DescribeCustomKeyStores operation.
170
170
  * const input = {
171
- * "CustomKeyStoreId": "cks-1234567890abcdef0"
171
+ * CustomKeyStoreId: "cks-1234567890abcdef0"
172
172
  * };
173
173
  * const command = new DeleteCustomKeyStoreCommand(input);
174
- * await client.send(command);
175
- * // example id: to-delete-a-custom-key-store-from-aws-kms-1628630837145
174
+ * const response = await client.send(command);
175
+ * /* response is
176
+ * { /* empty *\/ }
177
+ * *\/
176
178
  * ```
177
179
  *
180
+ * @public
178
181
  */
179
182
  export declare class DeleteCustomKeyStoreCommand extends DeleteCustomKeyStoreCommand_base {
180
183
  /** @internal type navigation helper, not in runtime. */
@@ -122,18 +122,21 @@ declare const DeleteImportedKeyMaterialCommand_base: {
122
122
  * @throws {@link KMSServiceException}
123
123
  * <p>Base exception class for all service exceptions from KMS service.</p>
124
124
  *
125
- * @public
125
+ *
126
126
  * @example To delete imported key material
127
127
  * ```javascript
128
128
  * // The following example deletes the imported key material from the specified KMS key.
129
129
  * const input = {
130
- * "KeyId": "1234abcd-12ab-34cd-56ef-1234567890ab"
130
+ * KeyId: "1234abcd-12ab-34cd-56ef-1234567890ab"
131
131
  * };
132
132
  * const command = new DeleteImportedKeyMaterialCommand(input);
133
- * await client.send(command);
134
- * // example id: to-delete-imported-key-material-1478561674507
133
+ * const response = await client.send(command);
134
+ * /* response is
135
+ * { /* metadata only *\/ }
136
+ * *\/
135
137
  * ```
136
138
  *
139
+ * @public
137
140
  */
138
141
  export declare class DeleteImportedKeyMaterialCommand extends DeleteImportedKeyMaterialCommand_base {
139
142
  /** @internal type navigation helper, not in runtime. */
@@ -218,28 +218,28 @@ declare const DeriveSharedSecretCommand_base: {
218
218
  * @throws {@link KMSServiceException}
219
219
  * <p>Base exception class for all service exceptions from KMS service.</p>
220
220
  *
221
- * @public
221
+ *
222
222
  * @example To derive a shared secret
223
223
  * ```javascript
224
224
  * // The following example derives a shared secret using a key agreement algorithm.
225
225
  * const input = {
226
- * "KeyAgreementAlgorithm": "ECDH",
227
- * "KeyId": "1234abcd-12ab-34cd-56ef-1234567890ab",
228
- * "PublicKey": "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAvH3Yj0wbkLEpUl95Cv1cJVjsVNSjwGq3tCLnzXfhVwVvmzGN8pYj3U8nKwgouaHbBWNJYjP5VutbbkKS4Kv4GojwZBJyHN17kmxo8yTjRmjR15SKIQ8cqRA2uaERMLnpztIXdZp232PQPbWGxDyXYJ0aJ5EFSag"
226
+ * KeyAgreementAlgorithm: "ECDH",
227
+ * KeyId: "1234abcd-12ab-34cd-56ef-1234567890ab",
228
+ * PublicKey: "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAvH3Yj0wbkLEpUl95Cv1cJVjsVNSjwGq3tCLnzXfhVwVvmzGN8pYj3U8nKwgouaHbBWNJYjP5VutbbkKS4Kv4GojwZBJyHN17kmxo8yTjRmjR15SKIQ8cqRA2uaERMLnpztIXdZp232PQPbWGxDyXYJ0aJ5EFSag"
229
229
  * };
230
230
  * const command = new DeriveSharedSecretCommand(input);
231
231
  * const response = await client.send(command);
232
- * /* response ==
232
+ * /* response is
233
233
  * {
234
- * "KeyAgreementAlgorithm": "ECDH",
235
- * "KeyId": "1234abcd-12ab-34cd-56ef-1234567890ab",
236
- * "KeyOrigin": "AWS_KMS",
237
- * "SharedSecret": "MEYCIQCKZLWyTk5runarx6XiAkU9gv3lbwPO/pHa+DXFehzdDwIhANwpsIV2g/9SPWLLsF6p/hiSskuIXMTRwqrMdVKWTMHG"
234
+ * KeyAgreementAlgorithm: "ECDH",
235
+ * KeyId: "1234abcd-12ab-34cd-56ef-1234567890ab",
236
+ * KeyOrigin: "AWS_KMS",
237
+ * SharedSecret: "MEYCIQCKZLWyTk5runarx6XiAkU9gv3lbwPO/pHa+DXFehzdDwIhANwpsIV2g/9SPWLLsF6p/hiSskuIXMTRwqrMdVKWTMHG"
238
238
  * }
239
239
  * *\/
240
- * // example id: to-derive-a-shared-secret-1718381818754
241
240
  * ```
242
241
  *
242
+ * @public
243
243
  */
244
244
  export declare class DeriveSharedSecretCommand extends DeriveSharedSecretCommand_base {
245
245
  /** @internal type navigation helper, not in runtime. */
@@ -150,108 +150,21 @@ declare const DescribeCustomKeyStoresCommand_base: {
150
150
  * @throws {@link KMSServiceException}
151
151
  * <p>Base exception class for all service exceptions from KMS service.</p>
152
152
  *
153
- * @public
153
+ *
154
154
  * @example To get detailed information about custom key stores in the account and Region
155
155
  * ```javascript
156
156
  * // This example gets detailed information about all AWS KMS custom key stores in an AWS account and Region. To get all key stores, do not enter a custom key store name or ID.
157
- * const input = {};
158
- * const command = new DescribeCustomKeyStoresCommand(input);
159
- * const response = await client.send(command);
160
- * /* response ==
161
- * {
162
- * "CustomKeyStores": []
163
- * }
164
- * *\/
165
- * // example id: to-get-detailed-information-about-custom-key-stores-in-the-account-and-region-1
166
- * ```
167
- *
168
- * @example To get detailed information about an AWS CloudHSM key store by specifying its friendly name
169
- * ```javascript
170
- * // This example gets detailed information about a particular AWS CloudHSM key store by specifying its friendly name. To limit the output to a particular custom key store, provide either the custom key store name or ID.
171
- * const input = {
172
- * "CustomKeyStoreName": "ExampleKeyStore"
173
- * };
174
- * const command = new DescribeCustomKeyStoresCommand(input);
175
- * const response = await client.send(command);
176
- * /* response ==
177
- * {
178
- * "CustomKeyStores": [
179
- * {
180
- * "CloudHsmClusterId": "cluster-234abcdefABC",
181
- * "ConnectionState": "CONNECTED",
182
- * "CreationDate": "1.499288695918E9",
183
- * "CustomKeyStoreId": "cks-1234567890abcdef0",
184
- * "CustomKeyStoreName": "ExampleKeyStore",
185
- * "CustomKeyStoreType": "AWS_CLOUDHSM",
186
- * "TrustAnchorCertificate": "<certificate appears here>"
187
- * }
188
- * ]
189
- * }
190
- * *\/
191
- * // example id: to-get-detailed-information-about-a-cloudhsm-custom-key-store-by-name-2
192
- * ```
193
- *
194
- * @example To get detailed information about an external key store by specifying its ID
195
- * ```javascript
196
- * // This example gets detailed information about an external key store by specifying its ID. The example external key store proxy uses public endpoint connectivity.
197
- * const input = {
198
- * "CustomKeyStoreId": "cks-9876543210fedcba9"
199
- * };
157
+ * const input = { /* empty *\/ };
200
158
  * const command = new DescribeCustomKeyStoresCommand(input);
201
159
  * const response = await client.send(command);
202
- * /* response ==
160
+ * /* response is
203
161
  * {
204
- * "CustomKeyStores": [
205
- * {
206
- * "ConnectionState": "CONNECTED",
207
- * "CreationDate": "1.599288695918E9",
208
- * "CustomKeyStoreId": "cks-9876543210fedcba9",
209
- * "CustomKeyStoreName": "ExampleExternalKeyStore",
210
- * "CustomKeyStoreType": "EXTERNAL_KEY_STORE",
211
- * "XksProxyConfiguration": {
212
- * "AccessKeyId": "ABCDE12345670EXAMPLE",
213
- * "Connectivity": "PUBLIC_ENDPOINT",
214
- * "UriEndpoint": "https://myproxy.xks.example.com",
215
- * "UriPath": "/kms/xks/v1"
216
- * }
217
- * }
218
- * ]
162
+ * CustomKeyStores: []
219
163
  * }
220
164
  * *\/
221
- * // example id: to-get-detailed-information-about-an-external-key-store--3
222
- * ```
223
- *
224
- * @example To get detailed information about an external key store VPC endpoint connectivity by specifying its friendly name
225
- * ```javascript
226
- * // This example gets detailed information about a particular external key store by specifying its friendly name. To limit the output to a particular custom key store, provide either the custom key store name or ID. The proxy URI path for this external key store includes an optional prefix. Also, because this example external key store uses VPC endpoint connectivity, the response includes the associated VPC endpoint service name.
227
- * const input = {
228
- * "CustomKeyStoreName": "VPCExternalKeystore"
229
- * };
230
- * const command = new DescribeCustomKeyStoresCommand(input);
231
- * const response = await client.send(command);
232
- * /* response ==
233
- * {
234
- * "CustomKeyStores": [
235
- * {
236
- * "ConnectionState": "CONNECTED",
237
- * "CreationDate": "1.643057863.842",
238
- * "CustomKeyStoreId": "cks-876543210fedcba98",
239
- * "CustomKeyStoreName": "ExampleVPCExternalKeyStore",
240
- * "CustomKeyStoreType": "EXTERNAL_KEY_STORE",
241
- * "XksProxyConfiguration": {
242
- * "AccessKeyId": "ABCDE12345670EXAMPLE",
243
- * "Connectivity": "VPC_ENDPOINT_SERVICE",
244
- * "UriEndpoint": "https://myproxy-private.xks.example.com",
245
- * "UriPath": "/example-prefix/kms/xks/v1",
246
- * "VpcEndpointServiceName": "com.amazonaws.vpce.us-east-1.vpce-svc-example1"
247
- * }
248
- * }
249
- * ]
250
- * }
251
- * *\/
252
- * // example id: to-get-detailed-information-about-an-external-custom-key-store-by-name-4
253
165
  * ```
254
166
  *
167
+ * @public
255
168
  */
256
169
  export declare class DescribeCustomKeyStoresCommand extends DescribeCustomKeyStoresCommand_base {
257
170
  /** @internal type navigation helper, not in runtime. */
@@ -204,65 +204,32 @@ declare const DescribeKeyCommand_base: {
204
204
  * @throws {@link KMSServiceException}
205
205
  * <p>Base exception class for all service exceptions from KMS service.</p>
206
206
  *
207
- * @public
208
- * @example To get details about a KMS key
209
- * ```javascript
210
- * // The following example gets metadata for a symmetric encryption KMS key.
211
- * const input = {
212
- * "KeyId": "1234abcd-12ab-34cd-56ef-1234567890ab"
213
- * };
214
- * const command = new DescribeKeyCommand(input);
215
- * const response = await client.send(command);
216
- * /* response ==
217
- * {
218
- * "KeyMetadata": {
219
- * "AWSAccountId": "111122223333",
220
- * "Arn": "arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab",
221
- * "CreationDate": "2017-07-05T14:04:55-07:00",
222
- * "CustomerMasterKeySpec": "SYMMETRIC_DEFAULT",
223
- * "Description": "",
224
- * "Enabled": true,
225
- * "EncryptionAlgorithms": [
226
- * "SYMMETRIC_DEFAULT"
227
- * ],
228
- * "KeyId": "1234abcd-12ab-34cd-56ef-1234567890ab",
229
- * "KeyManager": "CUSTOMER",
230
- * "KeySpec": "SYMMETRIC_DEFAULT",
231
- * "KeyState": "Enabled",
232
- * "KeyUsage": "ENCRYPT_DECRYPT",
233
- * "MultiRegion": false,
234
- * "Origin": "AWS_KMS"
235
- * }
236
- * }
237
- * *\/
238
- * // example id: get-key-details-1
239
- * ```
240
207
  *
241
208
  * @example To get details about an RSA asymmetric KMS key
242
209
  * ```javascript
243
210
  * // The following example gets metadata for an asymmetric RSA KMS key used for signing and verification.
244
211
  * const input = {
245
- * "KeyId": "1234abcd-12ab-34cd-56ef-1234567890ab"
212
+ * KeyId: "1234abcd-12ab-34cd-56ef-1234567890ab"
246
213
  * };
247
214
  * const command = new DescribeKeyCommand(input);
248
215
  * const response = await client.send(command);
249
- * /* response ==
216
+ * /* response is
250
217
  * {
251
- * "KeyMetadata": {
252
- * "AWSAccountId": "111122223333",
253
- * "Arn": "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab",
254
- * "CreationDate": 1571767572.317,
255
- * "CustomerMasterKeySpec": "RSA_2048",
256
- * "Description": "",
257
- * "Enabled": false,
258
- * "KeyId": "1234abcd-12ab-34cd-56ef-1234567890ab",
259
- * "KeyManager": "CUSTOMER",
260
- * "KeySpec": "RSA_2048",
261
- * "KeyState": "Disabled",
262
- * "KeyUsage": "SIGN_VERIFY",
263
- * "MultiRegion": false,
264
- * "Origin": "AWS_KMS",
265
- * "SigningAlgorithms": [
218
+ * KeyMetadata: {
219
+ * AWSAccountId: "111122223333",
220
+ * Arn: "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab",
221
+ * CreationDate: 1.571767572317E9,
222
+ * CustomerMasterKeySpec: "RSA_2048",
223
+ * Description: "",
224
+ * Enabled: false,
225
+ * KeyId: "1234abcd-12ab-34cd-56ef-1234567890ab",
226
+ * KeyManager: "CUSTOMER",
227
+ * KeySpec: "RSA_2048",
228
+ * KeyState: "Disabled",
229
+ * KeyUsage: "SIGN_VERIFY",
230
+ * MultiRegion: false,
231
+ * Origin: "AWS_KMS",
232
+ * SigningAlgorithms: [
266
233
  * "RSASSA_PKCS1_V1_5_SHA_256",
267
234
  * "RSASSA_PKCS1_V1_5_SHA_384",
268
235
  * "RSASSA_PKCS1_V1_5_SHA_512",
@@ -273,166 +240,162 @@ declare const DescribeKeyCommand_base: {
273
240
  * }
274
241
  * }
275
242
  * *\/
276
- * // example id: to-get-details-about-an-rsa-asymmetric-kms-key-2
277
243
  * ```
278
244
  *
279
245
  * @example To get details about a multi-Region key
280
246
  * ```javascript
281
247
  * // The following example gets metadata for a multi-Region replica key. This multi-Region key is a symmetric encryption key. DescribeKey returns information about the primary key and all of its replicas.
282
248
  * const input = {
283
- * "KeyId": "arn:aws:kms:ap-northeast-1:111122223333:key/mrk-1234abcd12ab34cd56ef1234567890ab"
249
+ * KeyId: "arn:aws:kms:ap-northeast-1:111122223333:key/mrk-1234abcd12ab34cd56ef1234567890ab"
284
250
  * };
285
251
  * const command = new DescribeKeyCommand(input);
286
252
  * const response = await client.send(command);
287
- * /* response ==
253
+ * /* response is
288
254
  * {
289
- * "KeyMetadata": {
290
- * "AWSAccountId": "111122223333",
291
- * "Arn": "arn:aws:kms:ap-northeast-1:111122223333:key/mrk-1234abcd12ab34cd56ef1234567890ab",
292
- * "CreationDate": 1586329200.918,
293
- * "CustomerMasterKeySpec": "SYMMETRIC_DEFAULT",
294
- * "Description": "",
295
- * "Enabled": true,
296
- * "EncryptionAlgorithms": [
255
+ * KeyMetadata: {
256
+ * AWSAccountId: "111122223333",
257
+ * Arn: "arn:aws:kms:ap-northeast-1:111122223333:key/mrk-1234abcd12ab34cd56ef1234567890ab",
258
+ * CreationDate: 1.586329200918E9,
259
+ * CustomerMasterKeySpec: "SYMMETRIC_DEFAULT",
260
+ * Description: "",
261
+ * Enabled: true,
262
+ * EncryptionAlgorithms: [
297
263
  * "SYMMETRIC_DEFAULT"
298
264
  * ],
299
- * "KeyId": "mrk-1234abcd12ab34cd56ef1234567890ab",
300
- * "KeyManager": "CUSTOMER",
301
- * "KeyState": "Enabled",
302
- * "KeyUsage": "ENCRYPT_DECRYPT",
303
- * "MultiRegion": true,
304
- * "MultiRegionConfiguration": {
305
- * "MultiRegionKeyType": "PRIMARY",
306
- * "PrimaryKey": {
307
- * "Arn": "arn:aws:kms:us-west-2:111122223333:key/mrk-1234abcd12ab34cd56ef1234567890ab",
308
- * "Region": "us-west-2"
265
+ * KeyId: "mrk-1234abcd12ab34cd56ef1234567890ab",
266
+ * KeyManager: "CUSTOMER",
267
+ * KeyState: "Enabled",
268
+ * KeyUsage: "ENCRYPT_DECRYPT",
269
+ * MultiRegion: true,
270
+ * MultiRegionConfiguration: {
271
+ * MultiRegionKeyType: "PRIMARY",
272
+ * PrimaryKey: {
273
+ * Arn: "arn:aws:kms:us-west-2:111122223333:key/mrk-1234abcd12ab34cd56ef1234567890ab",
274
+ * Region: "us-west-2"
309
275
  * },
310
- * "ReplicaKeys": [
276
+ * ReplicaKeys: [
311
277
  * {
312
- * "Arn": "arn:aws:kms:eu-west-1:111122223333:key/mrk-1234abcd12ab34cd56ef1234567890ab",
313
- * "Region": "eu-west-1"
278
+ * Arn: "arn:aws:kms:eu-west-1:111122223333:key/mrk-1234abcd12ab34cd56ef1234567890ab",
279
+ * Region: "eu-west-1"
314
280
  * },
315
281
  * {
316
- * "Arn": "arn:aws:kms:ap-northeast-1:111122223333:key/mrk-1234abcd12ab34cd56ef1234567890ab",
317
- * "Region": "ap-northeast-1"
282
+ * Arn: "arn:aws:kms:ap-northeast-1:111122223333:key/mrk-1234abcd12ab34cd56ef1234567890ab",
283
+ * Region: "ap-northeast-1"
318
284
  * },
319
285
  * {
320
- * "Arn": "arn:aws:kms:sa-east-1:111122223333:key/mrk-1234abcd12ab34cd56ef1234567890ab",
321
- * "Region": "sa-east-1"
286
+ * Arn: "arn:aws:kms:sa-east-1:111122223333:key/mrk-1234abcd12ab34cd56ef1234567890ab",
287
+ * Region: "sa-east-1"
322
288
  * }
323
289
  * ]
324
290
  * },
325
- * "Origin": "AWS_KMS"
291
+ * Origin: "AWS_KMS"
326
292
  * }
327
293
  * }
328
294
  * *\/
329
- * // example id: to-get-details-about-a-multi-region-key-3
330
295
  * ```
331
296
  *
332
297
  * @example To get details about an HMAC KMS key
333
298
  * ```javascript
334
299
  * // The following example gets the metadata of an HMAC KMS key.
335
300
  * const input = {
336
- * "KeyId": "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab"
301
+ * KeyId: "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab"
337
302
  * };
338
303
  * const command = new DescribeKeyCommand(input);
339
304
  * const response = await client.send(command);
340
- * /* response ==
305
+ * /* response is
341
306
  * {
342
- * "KeyMetadata": {
343
- * "AWSAccountId": "123456789012",
344
- * "Arn": "arn:aws:kms:us-west-2:123456789012:key/1234abcd-12ab-34cd-56ef-1234567890ab",
345
- * "CreationDate": 1566160362.664,
346
- * "CustomerMasterKeySpec": "HMAC_256",
347
- * "Description": "Development test key",
348
- * "Enabled": true,
349
- * "KeyId": "1234abcd-12ab-34cd-56ef-1234567890ab",
350
- * "KeyManager": "CUSTOMER",
351
- * "KeyState": "Enabled",
352
- * "KeyUsage": "GENERATE_VERIFY_MAC",
353
- * "MacAlgorithms": [
307
+ * KeyMetadata: {
308
+ * AWSAccountId: "123456789012",
309
+ * Arn: "arn:aws:kms:us-west-2:123456789012:key/1234abcd-12ab-34cd-56ef-1234567890ab",
310
+ * CreationDate: 1.566160362664E9,
311
+ * CustomerMasterKeySpec: "HMAC_256",
312
+ * Description: "Development test key",
313
+ * Enabled: true,
314
+ * KeyId: "1234abcd-12ab-34cd-56ef-1234567890ab",
315
+ * KeyManager: "CUSTOMER",
316
+ * KeyState: "Enabled",
317
+ * KeyUsage: "GENERATE_VERIFY_MAC",
318
+ * MacAlgorithms: [
354
319
  * "HMAC_SHA_256"
355
320
  * ],
356
- * "MultiRegion": false,
357
- * "Origin": "AWS_KMS"
321
+ * MultiRegion: false,
322
+ * Origin: "AWS_KMS"
358
323
  * }
359
324
  * }
360
325
  * *\/
361
- * // example id: to-get-details-about-an-hmac-kms-key-4
362
326
  * ```
363
327
  *
364
328
  * @example To get details about a KMS key in an AWS CloudHSM key store
365
329
  * ```javascript
366
330
  * // The following example gets the metadata of a KMS key in an AWS CloudHSM key store.
367
331
  * const input = {
368
- * "KeyId": "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab"
332
+ * KeyId: "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab"
369
333
  * };
370
334
  * const command = new DescribeKeyCommand(input);
371
335
  * const response = await client.send(command);
372
- * /* response ==
336
+ * /* response is
373
337
  * {
374
- * "KeyMetadata": {
375
- * "AWSAccountId": "123456789012",
376
- * "Arn": "arn:aws:kms:us-west-2:123456789012:key/1234abcd-12ab-34cd-56ef-1234567890ab",
377
- * "CloudHsmClusterId": "cluster-234abcdefABC",
378
- * "CreationDate": 1646160362.664,
379
- * "CustomKeyStoreId": "cks-1234567890abcdef0",
380
- * "CustomerMasterKeySpec": "SYMMETRIC_DEFAULT",
381
- * "Description": "CloudHSM key store test key",
382
- * "Enabled": true,
383
- * "EncryptionAlgorithms": [
338
+ * KeyMetadata: {
339
+ * AWSAccountId: "123456789012",
340
+ * Arn: "arn:aws:kms:us-west-2:123456789012:key/1234abcd-12ab-34cd-56ef-1234567890ab",
341
+ * CloudHsmClusterId: "cluster-234abcdefABC",
342
+ * CreationDate: 1.646160362664E9,
343
+ * CustomKeyStoreId: "cks-1234567890abcdef0",
344
+ * CustomerMasterKeySpec: "SYMMETRIC_DEFAULT",
345
+ * Description: "CloudHSM key store test key",
346
+ * Enabled: true,
347
+ * EncryptionAlgorithms: [
384
348
  * "SYMMETRIC_DEFAULT"
385
349
  * ],
386
- * "KeyId": "1234abcd-12ab-34cd-56ef-1234567890ab",
387
- * "KeyManager": "CUSTOMER",
388
- * "KeySpec": "SYMMETRIC_DEFAULT",
389
- * "KeyState": "Enabled",
390
- * "KeyUsage": "ENCRYPT_DECRYPT",
391
- * "MultiRegion": false,
392
- * "Origin": "AWS_CLOUDHSM"
350
+ * KeyId: "1234abcd-12ab-34cd-56ef-1234567890ab",
351
+ * KeyManager: "CUSTOMER",
352
+ * KeySpec: "SYMMETRIC_DEFAULT",
353
+ * KeyState: "Enabled",
354
+ * KeyUsage: "ENCRYPT_DECRYPT",
355
+ * MultiRegion: false,
356
+ * Origin: "AWS_CLOUDHSM"
393
357
  * }
394
358
  * }
395
359
  * *\/
396
- * // example id: to-get-details-about-a-kms-key-in-an-AWS-CloudHSM-key-store-5
397
360
  * ```
398
361
  *
399
362
  * @example To get details about a KMS key in an external key store
400
363
  * ```javascript
401
364
  * // The following example gets the metadata of a KMS key in an external key store.
402
365
  * const input = {
403
- * "KeyId": "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab"
366
+ * KeyId: "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab"
404
367
  * };
405
368
  * const command = new DescribeKeyCommand(input);
406
369
  * const response = await client.send(command);
407
- * /* response ==
370
+ * /* response is
408
371
  * {
409
- * "KeyMetadata": {
410
- * "AWSAccountId": "123456789012",
411
- * "Arn": "arn:aws:kms:us-west-2:123456789012:key/1234abcd-12ab-34cd-56ef-1234567890ab",
412
- * "CreationDate": 1646160362.664,
413
- * "CustomKeyStoreId": "cks-1234567890abcdef0",
414
- * "CustomerMasterKeySpec": "SYMMETRIC_DEFAULT",
415
- * "Description": "External key store test key",
416
- * "Enabled": true,
417
- * "EncryptionAlgorithms": [
372
+ * KeyMetadata: {
373
+ * AWSAccountId: "123456789012",
374
+ * Arn: "arn:aws:kms:us-west-2:123456789012:key/1234abcd-12ab-34cd-56ef-1234567890ab",
375
+ * CreationDate: 1.646160362664E9,
376
+ * CustomKeyStoreId: "cks-1234567890abcdef0",
377
+ * CustomerMasterKeySpec: "SYMMETRIC_DEFAULT",
378
+ * Description: "External key store test key",
379
+ * Enabled: true,
380
+ * EncryptionAlgorithms: [
418
381
  * "SYMMETRIC_DEFAULT"
419
382
  * ],
420
- * "KeyId": "1234abcd-12ab-34cd-56ef-1234567890ab",
421
- * "KeyManager": "CUSTOMER",
422
- * "KeySpec": "SYMMETRIC_DEFAULT",
423
- * "KeyState": "Enabled",
424
- * "KeyUsage": "ENCRYPT_DECRYPT",
425
- * "MultiRegion": false,
426
- * "Origin": "EXTERNAL_KEY_STORE",
427
- * "XksKeyConfiguration": {
428
- * "Id": "bb8562717f809024"
383
+ * KeyId: "1234abcd-12ab-34cd-56ef-1234567890ab",
384
+ * KeyManager: "CUSTOMER",
385
+ * KeySpec: "SYMMETRIC_DEFAULT",
386
+ * KeyState: "Enabled",
387
+ * KeyUsage: "ENCRYPT_DECRYPT",
388
+ * MultiRegion: false,
389
+ * Origin: "EXTERNAL_KEY_STORE",
390
+ * XksKeyConfiguration: {
391
+ * Id: "bb8562717f809024"
429
392
  * }
430
393
  * }
431
394
  * }
432
395
  * *\/
433
- * // example id: to-get-details-about-a-kms-key-in-an-external-key-store-6
434
396
  * ```
435
397
  *
398
+ * @public
436
399
  */
437
400
  export declare class DescribeKeyCommand extends DescribeKeyCommand_base {
438
401
  /** @internal type navigation helper, not in runtime. */