@aws-sdk/client-kms 3.774.0 → 3.777.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist-cjs/auth/httpAuthSchemeProvider.js +1 -3
- package/dist-cjs/index.js +17 -18
- package/dist-es/KMSClient.js +2 -1
- package/dist-es/auth/httpAuthSchemeProvider.js +1 -3
- package/dist-es/endpoint/EndpointParameters.js +2 -3
- package/dist-es/runtimeExtensions.js +2 -14
- package/dist-types/commands/CancelKeyDeletionCommand.d.ts +5 -5
- package/dist-types/commands/ConnectCustomKeyStoreCommand.d.ts +7 -4
- package/dist-types/commands/CreateAliasCommand.d.ts +8 -5
- package/dist-types/commands/CreateCustomKeyStoreCommand.d.ts +8 -57
- package/dist-types/commands/CreateGrantCommand.d.ts +8 -8
- package/dist-types/commands/CreateKeyCommand.d.ts +1 -283
- package/dist-types/commands/DecryptCommand.d.ts +15 -39
- package/dist-types/commands/DeleteAliasCommand.d.ts +7 -4
- package/dist-types/commands/DeleteCustomKeyStoreCommand.d.ts +7 -4
- package/dist-types/commands/DeleteImportedKeyMaterialCommand.d.ts +7 -4
- package/dist-types/commands/DeriveSharedSecretCommand.d.ts +10 -10
- package/dist-types/commands/DescribeCustomKeyStoresCommand.d.ts +5 -92
- package/dist-types/commands/DescribeKeyCommand.d.ts +101 -138
- package/dist-types/commands/DisableKeyCommand.d.ts +7 -4
- package/dist-types/commands/DisableKeyRotationCommand.d.ts +7 -4
- package/dist-types/commands/DisconnectCustomKeyStoreCommand.d.ts +7 -4
- package/dist-types/commands/EnableKeyCommand.d.ts +7 -4
- package/dist-types/commands/EnableKeyRotationCommand.d.ts +8 -5
- package/dist-types/commands/EncryptCommand.d.ts +15 -16
- package/dist-types/commands/GenerateDataKeyCommand.d.ts +8 -32
- package/dist-types/commands/GenerateDataKeyPairCommand.d.ts +10 -36
- package/dist-types/commands/GenerateDataKeyPairWithoutPlaintextCommand.d.ts +9 -9
- package/dist-types/commands/GenerateDataKeyWithoutPlaintextCommand.d.ts +7 -7
- package/dist-types/commands/GenerateMacCommand.d.ts +9 -9
- package/dist-types/commands/GenerateRandomCommand.d.ts +5 -26
- package/dist-types/commands/GetKeyPolicyCommand.d.ts +18 -6
- package/dist-types/commands/GetKeyRotationStatusCommand.d.ts +1 -20
- package/dist-types/commands/GetParametersForImportCommand.d.ts +1 -84
- package/dist-types/commands/GetPublicKeyCommand.d.ts +9 -9
- package/dist-types/commands/ImportKeyMaterialCommand.d.ts +10 -22
- package/dist-types/commands/ListAliasesCommand.d.ts +30 -30
- package/dist-types/commands/ListGrantsCommand.d.ts +1 -69
- package/dist-types/commands/ListKeyPoliciesCommand.d.ts +6 -6
- package/dist-types/commands/ListKeyRotationsCommand.d.ts +1 -28
- package/dist-types/commands/ListKeysCommand.d.ts +20 -20
- package/dist-types/commands/ListResourceTagsCommand.d.ts +12 -12
- package/dist-types/commands/ListRetirableGrantsCommand.d.ts +1 -30
- package/dist-types/commands/PutKeyPolicyCommand.d.ts +82 -6
- package/dist-types/commands/ReEncryptCommand.d.ts +8 -8
- package/dist-types/commands/ReplicateKeyCommand.d.ts +31 -29
- package/dist-types/commands/RetireGrantCommand.d.ts +8 -5
- package/dist-types/commands/RevokeGrantCommand.d.ts +8 -5
- package/dist-types/commands/RotateKeyOnDemandCommand.d.ts +5 -5
- package/dist-types/commands/ScheduleKeyDeletionCommand.d.ts +1 -18
- package/dist-types/commands/SignCommand.d.ts +18 -19
- package/dist-types/commands/TagResourceCommand.d.ts +10 -7
- package/dist-types/commands/UntagResourceCommand.d.ts +8 -5
- package/dist-types/commands/UpdateAliasCommand.d.ts +8 -5
- package/dist-types/commands/UpdateCustomKeyStoreCommand.d.ts +34 -38
- package/dist-types/commands/UpdateKeyDescriptionCommand.d.ts +8 -5
- package/dist-types/commands/UpdatePrimaryRegionCommand.d.ts +12 -9
- package/dist-types/commands/VerifyCommand.d.ts +20 -21
- package/dist-types/commands/VerifyMacCommand.d.ts +10 -10
- package/package.json +33 -33
|
@@ -247,69 +247,45 @@ declare const DecryptCommand_base: {
|
|
|
247
247
|
* @throws {@link KMSServiceException}
|
|
248
248
|
* <p>Base exception class for all service exceptions from KMS service.</p>
|
|
249
249
|
*
|
|
250
|
-
*
|
|
250
|
+
*
|
|
251
251
|
* @example To decrypt data with a symmetric encryption KMS key
|
|
252
252
|
* ```javascript
|
|
253
253
|
* // The following example decrypts data that was encrypted with a symmetric encryption KMS key. The KeyId is not required when decrypting with a symmetric encryption key, but it is a best practice.
|
|
254
254
|
* const input = {
|
|
255
|
-
*
|
|
256
|
-
*
|
|
255
|
+
* CiphertextBlob: "<binary data>",
|
|
256
|
+
* KeyId: "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab"
|
|
257
257
|
* };
|
|
258
258
|
* const command = new DecryptCommand(input);
|
|
259
259
|
* const response = await client.send(command);
|
|
260
|
-
* /* response
|
|
260
|
+
* /* response is
|
|
261
261
|
* {
|
|
262
|
-
*
|
|
263
|
-
*
|
|
264
|
-
*
|
|
262
|
+
* EncryptionAlgorithm: "SYMMETRIC_DEFAULT",
|
|
263
|
+
* KeyId: "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab",
|
|
264
|
+
* Plaintext: "<binary data>"
|
|
265
265
|
* }
|
|
266
266
|
* *\/
|
|
267
|
-
* // example id: to-decrypt-data-1
|
|
268
267
|
* ```
|
|
269
268
|
*
|
|
270
269
|
* @example To decrypt data with an asymmetric encryption KMS key
|
|
271
270
|
* ```javascript
|
|
272
271
|
* // The following example decrypts data that was encrypted with an asymmetric encryption KMS key. When the KMS encryption key is asymmetric, you must specify the KMS key ID and the encryption algorithm that was used to encrypt the data.
|
|
273
272
|
* const input = {
|
|
274
|
-
*
|
|
275
|
-
*
|
|
276
|
-
*
|
|
273
|
+
* CiphertextBlob: "<binary data>",
|
|
274
|
+
* EncryptionAlgorithm: "RSAES_OAEP_SHA_256",
|
|
275
|
+
* KeyId: "0987dcba-09fe-87dc-65ba-ab0987654321"
|
|
277
276
|
* };
|
|
278
277
|
* const command = new DecryptCommand(input);
|
|
279
278
|
* const response = await client.send(command);
|
|
280
|
-
* /* response
|
|
279
|
+
* /* response is
|
|
281
280
|
* {
|
|
282
|
-
*
|
|
283
|
-
*
|
|
284
|
-
*
|
|
281
|
+
* EncryptionAlgorithm: "RSAES_OAEP_SHA_256",
|
|
282
|
+
* KeyId: "arn:aws:kms:us-west-2:111122223333:key/0987dcba-09fe-87dc-65ba-ab0987654321",
|
|
283
|
+
* Plaintext: "<binary data>"
|
|
285
284
|
* }
|
|
286
285
|
* *\/
|
|
287
|
-
* // example id: to-decrypt-data-2
|
|
288
|
-
* ```
|
|
289
|
-
*
|
|
290
|
-
* @example To decrypt data for a Nitro enclave
|
|
291
|
-
* ```javascript
|
|
292
|
-
* // The following Decrypt example includes the Recipient parameter with a signed attestation document from an AWS Nitro enclave. Instead of returning the decrypted data in plaintext (Plaintext), the operation returns the decrypted data encrypted by the public key from the attestation document (CiphertextForRecipient).
|
|
293
|
-
* const input = {
|
|
294
|
-
* "CiphertextBlob": "<binary data>",
|
|
295
|
-
* "KeyId": "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab",
|
|
296
|
-
* "Recipient": {
|
|
297
|
-
* "AttestationDocument": "<attestation document>",
|
|
298
|
-
* "KeyEncryptionAlgorithm": "RSAES_OAEP_SHA_256"
|
|
299
|
-
* }
|
|
300
|
-
* };
|
|
301
|
-
* const command = new DecryptCommand(input);
|
|
302
|
-
* const response = await client.send(command);
|
|
303
|
-
* /* response ==
|
|
304
|
-
* {
|
|
305
|
-
* "CiphertextForRecipient": "<binary data>",
|
|
306
|
-
* "KeyId": "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab",
|
|
307
|
-
* "Plaintext": ""
|
|
308
|
-
* }
|
|
309
|
-
* *\/
|
|
310
|
-
* // example id: to-decrypt-data-for-a-nitro-enclave-2
|
|
311
286
|
* ```
|
|
312
287
|
*
|
|
288
|
+
* @public
|
|
313
289
|
*/
|
|
314
290
|
export declare class DecryptCommand extends DecryptCommand_base {
|
|
315
291
|
/** @internal type navigation helper, not in runtime. */
|
|
@@ -134,18 +134,21 @@ declare const DeleteAliasCommand_base: {
|
|
|
134
134
|
* @throws {@link KMSServiceException}
|
|
135
135
|
* <p>Base exception class for all service exceptions from KMS service.</p>
|
|
136
136
|
*
|
|
137
|
-
*
|
|
137
|
+
*
|
|
138
138
|
* @example To delete an alias
|
|
139
139
|
* ```javascript
|
|
140
140
|
* // The following example deletes the specified alias.
|
|
141
141
|
* const input = {
|
|
142
|
-
*
|
|
142
|
+
* AliasName: "alias/ExampleAlias"
|
|
143
143
|
* };
|
|
144
144
|
* const command = new DeleteAliasCommand(input);
|
|
145
|
-
* await client.send(command);
|
|
146
|
-
*
|
|
145
|
+
* const response = await client.send(command);
|
|
146
|
+
* /* response is
|
|
147
|
+
* { /* metadata only *\/ }
|
|
148
|
+
* *\/
|
|
147
149
|
* ```
|
|
148
150
|
*
|
|
151
|
+
* @public
|
|
149
152
|
*/
|
|
150
153
|
export declare class DeleteAliasCommand extends DeleteAliasCommand_base {
|
|
151
154
|
/** @internal type navigation helper, not in runtime. */
|
|
@@ -163,18 +163,21 @@ declare const DeleteCustomKeyStoreCommand_base: {
|
|
|
163
163
|
* @throws {@link KMSServiceException}
|
|
164
164
|
* <p>Base exception class for all service exceptions from KMS service.</p>
|
|
165
165
|
*
|
|
166
|
-
*
|
|
166
|
+
*
|
|
167
167
|
* @example To delete a custom key store from AWS KMS
|
|
168
168
|
* ```javascript
|
|
169
169
|
* // This example deletes a custom key store from AWS KMS. This operation does not affect the backing key store, such as a CloudHSM cluster, external key store proxy, or your external key manager. This operation doesn't return any data. To verify that the operation was successful, use the DescribeCustomKeyStores operation.
|
|
170
170
|
* const input = {
|
|
171
|
-
*
|
|
171
|
+
* CustomKeyStoreId: "cks-1234567890abcdef0"
|
|
172
172
|
* };
|
|
173
173
|
* const command = new DeleteCustomKeyStoreCommand(input);
|
|
174
|
-
* await client.send(command);
|
|
175
|
-
*
|
|
174
|
+
* const response = await client.send(command);
|
|
175
|
+
* /* response is
|
|
176
|
+
* { /* empty *\/ }
|
|
177
|
+
* *\/
|
|
176
178
|
* ```
|
|
177
179
|
*
|
|
180
|
+
* @public
|
|
178
181
|
*/
|
|
179
182
|
export declare class DeleteCustomKeyStoreCommand extends DeleteCustomKeyStoreCommand_base {
|
|
180
183
|
/** @internal type navigation helper, not in runtime. */
|
|
@@ -122,18 +122,21 @@ declare const DeleteImportedKeyMaterialCommand_base: {
|
|
|
122
122
|
* @throws {@link KMSServiceException}
|
|
123
123
|
* <p>Base exception class for all service exceptions from KMS service.</p>
|
|
124
124
|
*
|
|
125
|
-
*
|
|
125
|
+
*
|
|
126
126
|
* @example To delete imported key material
|
|
127
127
|
* ```javascript
|
|
128
128
|
* // The following example deletes the imported key material from the specified KMS key.
|
|
129
129
|
* const input = {
|
|
130
|
-
*
|
|
130
|
+
* KeyId: "1234abcd-12ab-34cd-56ef-1234567890ab"
|
|
131
131
|
* };
|
|
132
132
|
* const command = new DeleteImportedKeyMaterialCommand(input);
|
|
133
|
-
* await client.send(command);
|
|
134
|
-
*
|
|
133
|
+
* const response = await client.send(command);
|
|
134
|
+
* /* response is
|
|
135
|
+
* { /* metadata only *\/ }
|
|
136
|
+
* *\/
|
|
135
137
|
* ```
|
|
136
138
|
*
|
|
139
|
+
* @public
|
|
137
140
|
*/
|
|
138
141
|
export declare class DeleteImportedKeyMaterialCommand extends DeleteImportedKeyMaterialCommand_base {
|
|
139
142
|
/** @internal type navigation helper, not in runtime. */
|
|
@@ -218,28 +218,28 @@ declare const DeriveSharedSecretCommand_base: {
|
|
|
218
218
|
* @throws {@link KMSServiceException}
|
|
219
219
|
* <p>Base exception class for all service exceptions from KMS service.</p>
|
|
220
220
|
*
|
|
221
|
-
*
|
|
221
|
+
*
|
|
222
222
|
* @example To derive a shared secret
|
|
223
223
|
* ```javascript
|
|
224
224
|
* // The following example derives a shared secret using a key agreement algorithm.
|
|
225
225
|
* const input = {
|
|
226
|
-
*
|
|
227
|
-
*
|
|
228
|
-
*
|
|
226
|
+
* KeyAgreementAlgorithm: "ECDH",
|
|
227
|
+
* KeyId: "1234abcd-12ab-34cd-56ef-1234567890ab",
|
|
228
|
+
* PublicKey: "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAvH3Yj0wbkLEpUl95Cv1cJVjsVNSjwGq3tCLnzXfhVwVvmzGN8pYj3U8nKwgouaHbBWNJYjP5VutbbkKS4Kv4GojwZBJyHN17kmxo8yTjRmjR15SKIQ8cqRA2uaERMLnpztIXdZp232PQPbWGxDyXYJ0aJ5EFSag"
|
|
229
229
|
* };
|
|
230
230
|
* const command = new DeriveSharedSecretCommand(input);
|
|
231
231
|
* const response = await client.send(command);
|
|
232
|
-
* /* response
|
|
232
|
+
* /* response is
|
|
233
233
|
* {
|
|
234
|
-
*
|
|
235
|
-
*
|
|
236
|
-
*
|
|
237
|
-
*
|
|
234
|
+
* KeyAgreementAlgorithm: "ECDH",
|
|
235
|
+
* KeyId: "1234abcd-12ab-34cd-56ef-1234567890ab",
|
|
236
|
+
* KeyOrigin: "AWS_KMS",
|
|
237
|
+
* SharedSecret: "MEYCIQCKZLWyTk5runarx6XiAkU9gv3lbwPO/pHa+DXFehzdDwIhANwpsIV2g/9SPWLLsF6p/hiSskuIXMTRwqrMdVKWTMHG"
|
|
238
238
|
* }
|
|
239
239
|
* *\/
|
|
240
|
-
* // example id: to-derive-a-shared-secret-1718381818754
|
|
241
240
|
* ```
|
|
242
241
|
*
|
|
242
|
+
* @public
|
|
243
243
|
*/
|
|
244
244
|
export declare class DeriveSharedSecretCommand extends DeriveSharedSecretCommand_base {
|
|
245
245
|
/** @internal type navigation helper, not in runtime. */
|
|
@@ -150,108 +150,21 @@ declare const DescribeCustomKeyStoresCommand_base: {
|
|
|
150
150
|
* @throws {@link KMSServiceException}
|
|
151
151
|
* <p>Base exception class for all service exceptions from KMS service.</p>
|
|
152
152
|
*
|
|
153
|
-
*
|
|
153
|
+
*
|
|
154
154
|
* @example To get detailed information about custom key stores in the account and Region
|
|
155
155
|
* ```javascript
|
|
156
156
|
* // This example gets detailed information about all AWS KMS custom key stores in an AWS account and Region. To get all key stores, do not enter a custom key store name or ID.
|
|
157
|
-
* const input = {};
|
|
158
|
-
* const command = new DescribeCustomKeyStoresCommand(input);
|
|
159
|
-
* const response = await client.send(command);
|
|
160
|
-
* /* response ==
|
|
161
|
-
* {
|
|
162
|
-
* "CustomKeyStores": []
|
|
163
|
-
* }
|
|
164
|
-
* *\/
|
|
165
|
-
* // example id: to-get-detailed-information-about-custom-key-stores-in-the-account-and-region-1
|
|
166
|
-
* ```
|
|
167
|
-
*
|
|
168
|
-
* @example To get detailed information about an AWS CloudHSM key store by specifying its friendly name
|
|
169
|
-
* ```javascript
|
|
170
|
-
* // This example gets detailed information about a particular AWS CloudHSM key store by specifying its friendly name. To limit the output to a particular custom key store, provide either the custom key store name or ID.
|
|
171
|
-
* const input = {
|
|
172
|
-
* "CustomKeyStoreName": "ExampleKeyStore"
|
|
173
|
-
* };
|
|
174
|
-
* const command = new DescribeCustomKeyStoresCommand(input);
|
|
175
|
-
* const response = await client.send(command);
|
|
176
|
-
* /* response ==
|
|
177
|
-
* {
|
|
178
|
-
* "CustomKeyStores": [
|
|
179
|
-
* {
|
|
180
|
-
* "CloudHsmClusterId": "cluster-234abcdefABC",
|
|
181
|
-
* "ConnectionState": "CONNECTED",
|
|
182
|
-
* "CreationDate": "1.499288695918E9",
|
|
183
|
-
* "CustomKeyStoreId": "cks-1234567890abcdef0",
|
|
184
|
-
* "CustomKeyStoreName": "ExampleKeyStore",
|
|
185
|
-
* "CustomKeyStoreType": "AWS_CLOUDHSM",
|
|
186
|
-
* "TrustAnchorCertificate": "<certificate appears here>"
|
|
187
|
-
* }
|
|
188
|
-
* ]
|
|
189
|
-
* }
|
|
190
|
-
* *\/
|
|
191
|
-
* // example id: to-get-detailed-information-about-a-cloudhsm-custom-key-store-by-name-2
|
|
192
|
-
* ```
|
|
193
|
-
*
|
|
194
|
-
* @example To get detailed information about an external key store by specifying its ID
|
|
195
|
-
* ```javascript
|
|
196
|
-
* // This example gets detailed information about an external key store by specifying its ID. The example external key store proxy uses public endpoint connectivity.
|
|
197
|
-
* const input = {
|
|
198
|
-
* "CustomKeyStoreId": "cks-9876543210fedcba9"
|
|
199
|
-
* };
|
|
157
|
+
* const input = { /* empty *\/ };
|
|
200
158
|
* const command = new DescribeCustomKeyStoresCommand(input);
|
|
201
159
|
* const response = await client.send(command);
|
|
202
|
-
* /* response
|
|
160
|
+
* /* response is
|
|
203
161
|
* {
|
|
204
|
-
*
|
|
205
|
-
* {
|
|
206
|
-
* "ConnectionState": "CONNECTED",
|
|
207
|
-
* "CreationDate": "1.599288695918E9",
|
|
208
|
-
* "CustomKeyStoreId": "cks-9876543210fedcba9",
|
|
209
|
-
* "CustomKeyStoreName": "ExampleExternalKeyStore",
|
|
210
|
-
* "CustomKeyStoreType": "EXTERNAL_KEY_STORE",
|
|
211
|
-
* "XksProxyConfiguration": {
|
|
212
|
-
* "AccessKeyId": "ABCDE12345670EXAMPLE",
|
|
213
|
-
* "Connectivity": "PUBLIC_ENDPOINT",
|
|
214
|
-
* "UriEndpoint": "https://myproxy.xks.example.com",
|
|
215
|
-
* "UriPath": "/kms/xks/v1"
|
|
216
|
-
* }
|
|
217
|
-
* }
|
|
218
|
-
* ]
|
|
162
|
+
* CustomKeyStores: []
|
|
219
163
|
* }
|
|
220
164
|
* *\/
|
|
221
|
-
* // example id: to-get-detailed-information-about-an-external-key-store--3
|
|
222
|
-
* ```
|
|
223
|
-
*
|
|
224
|
-
* @example To get detailed information about an external key store VPC endpoint connectivity by specifying its friendly name
|
|
225
|
-
* ```javascript
|
|
226
|
-
* // This example gets detailed information about a particular external key store by specifying its friendly name. To limit the output to a particular custom key store, provide either the custom key store name or ID. The proxy URI path for this external key store includes an optional prefix. Also, because this example external key store uses VPC endpoint connectivity, the response includes the associated VPC endpoint service name.
|
|
227
|
-
* const input = {
|
|
228
|
-
* "CustomKeyStoreName": "VPCExternalKeystore"
|
|
229
|
-
* };
|
|
230
|
-
* const command = new DescribeCustomKeyStoresCommand(input);
|
|
231
|
-
* const response = await client.send(command);
|
|
232
|
-
* /* response ==
|
|
233
|
-
* {
|
|
234
|
-
* "CustomKeyStores": [
|
|
235
|
-
* {
|
|
236
|
-
* "ConnectionState": "CONNECTED",
|
|
237
|
-
* "CreationDate": "1.643057863.842",
|
|
238
|
-
* "CustomKeyStoreId": "cks-876543210fedcba98",
|
|
239
|
-
* "CustomKeyStoreName": "ExampleVPCExternalKeyStore",
|
|
240
|
-
* "CustomKeyStoreType": "EXTERNAL_KEY_STORE",
|
|
241
|
-
* "XksProxyConfiguration": {
|
|
242
|
-
* "AccessKeyId": "ABCDE12345670EXAMPLE",
|
|
243
|
-
* "Connectivity": "VPC_ENDPOINT_SERVICE",
|
|
244
|
-
* "UriEndpoint": "https://myproxy-private.xks.example.com",
|
|
245
|
-
* "UriPath": "/example-prefix/kms/xks/v1",
|
|
246
|
-
* "VpcEndpointServiceName": "com.amazonaws.vpce.us-east-1.vpce-svc-example1"
|
|
247
|
-
* }
|
|
248
|
-
* }
|
|
249
|
-
* ]
|
|
250
|
-
* }
|
|
251
|
-
* *\/
|
|
252
|
-
* // example id: to-get-detailed-information-about-an-external-custom-key-store-by-name-4
|
|
253
165
|
* ```
|
|
254
166
|
*
|
|
167
|
+
* @public
|
|
255
168
|
*/
|
|
256
169
|
export declare class DescribeCustomKeyStoresCommand extends DescribeCustomKeyStoresCommand_base {
|
|
257
170
|
/** @internal type navigation helper, not in runtime. */
|
|
@@ -204,65 +204,32 @@ declare const DescribeKeyCommand_base: {
|
|
|
204
204
|
* @throws {@link KMSServiceException}
|
|
205
205
|
* <p>Base exception class for all service exceptions from KMS service.</p>
|
|
206
206
|
*
|
|
207
|
-
* @public
|
|
208
|
-
* @example To get details about a KMS key
|
|
209
|
-
* ```javascript
|
|
210
|
-
* // The following example gets metadata for a symmetric encryption KMS key.
|
|
211
|
-
* const input = {
|
|
212
|
-
* "KeyId": "1234abcd-12ab-34cd-56ef-1234567890ab"
|
|
213
|
-
* };
|
|
214
|
-
* const command = new DescribeKeyCommand(input);
|
|
215
|
-
* const response = await client.send(command);
|
|
216
|
-
* /* response ==
|
|
217
|
-
* {
|
|
218
|
-
* "KeyMetadata": {
|
|
219
|
-
* "AWSAccountId": "111122223333",
|
|
220
|
-
* "Arn": "arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab",
|
|
221
|
-
* "CreationDate": "2017-07-05T14:04:55-07:00",
|
|
222
|
-
* "CustomerMasterKeySpec": "SYMMETRIC_DEFAULT",
|
|
223
|
-
* "Description": "",
|
|
224
|
-
* "Enabled": true,
|
|
225
|
-
* "EncryptionAlgorithms": [
|
|
226
|
-
* "SYMMETRIC_DEFAULT"
|
|
227
|
-
* ],
|
|
228
|
-
* "KeyId": "1234abcd-12ab-34cd-56ef-1234567890ab",
|
|
229
|
-
* "KeyManager": "CUSTOMER",
|
|
230
|
-
* "KeySpec": "SYMMETRIC_DEFAULT",
|
|
231
|
-
* "KeyState": "Enabled",
|
|
232
|
-
* "KeyUsage": "ENCRYPT_DECRYPT",
|
|
233
|
-
* "MultiRegion": false,
|
|
234
|
-
* "Origin": "AWS_KMS"
|
|
235
|
-
* }
|
|
236
|
-
* }
|
|
237
|
-
* *\/
|
|
238
|
-
* // example id: get-key-details-1
|
|
239
|
-
* ```
|
|
240
207
|
*
|
|
241
208
|
* @example To get details about an RSA asymmetric KMS key
|
|
242
209
|
* ```javascript
|
|
243
210
|
* // The following example gets metadata for an asymmetric RSA KMS key used for signing and verification.
|
|
244
211
|
* const input = {
|
|
245
|
-
*
|
|
212
|
+
* KeyId: "1234abcd-12ab-34cd-56ef-1234567890ab"
|
|
246
213
|
* };
|
|
247
214
|
* const command = new DescribeKeyCommand(input);
|
|
248
215
|
* const response = await client.send(command);
|
|
249
|
-
* /* response
|
|
216
|
+
* /* response is
|
|
250
217
|
* {
|
|
251
|
-
*
|
|
252
|
-
*
|
|
253
|
-
*
|
|
254
|
-
*
|
|
255
|
-
*
|
|
256
|
-
*
|
|
257
|
-
*
|
|
258
|
-
*
|
|
259
|
-
*
|
|
260
|
-
*
|
|
261
|
-
*
|
|
262
|
-
*
|
|
263
|
-
*
|
|
264
|
-
*
|
|
265
|
-
*
|
|
218
|
+
* KeyMetadata: {
|
|
219
|
+
* AWSAccountId: "111122223333",
|
|
220
|
+
* Arn: "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab",
|
|
221
|
+
* CreationDate: 1.571767572317E9,
|
|
222
|
+
* CustomerMasterKeySpec: "RSA_2048",
|
|
223
|
+
* Description: "",
|
|
224
|
+
* Enabled: false,
|
|
225
|
+
* KeyId: "1234abcd-12ab-34cd-56ef-1234567890ab",
|
|
226
|
+
* KeyManager: "CUSTOMER",
|
|
227
|
+
* KeySpec: "RSA_2048",
|
|
228
|
+
* KeyState: "Disabled",
|
|
229
|
+
* KeyUsage: "SIGN_VERIFY",
|
|
230
|
+
* MultiRegion: false,
|
|
231
|
+
* Origin: "AWS_KMS",
|
|
232
|
+
* SigningAlgorithms: [
|
|
266
233
|
* "RSASSA_PKCS1_V1_5_SHA_256",
|
|
267
234
|
* "RSASSA_PKCS1_V1_5_SHA_384",
|
|
268
235
|
* "RSASSA_PKCS1_V1_5_SHA_512",
|
|
@@ -273,166 +240,162 @@ declare const DescribeKeyCommand_base: {
|
|
|
273
240
|
* }
|
|
274
241
|
* }
|
|
275
242
|
* *\/
|
|
276
|
-
* // example id: to-get-details-about-an-rsa-asymmetric-kms-key-2
|
|
277
243
|
* ```
|
|
278
244
|
*
|
|
279
245
|
* @example To get details about a multi-Region key
|
|
280
246
|
* ```javascript
|
|
281
247
|
* // The following example gets metadata for a multi-Region replica key. This multi-Region key is a symmetric encryption key. DescribeKey returns information about the primary key and all of its replicas.
|
|
282
248
|
* const input = {
|
|
283
|
-
*
|
|
249
|
+
* KeyId: "arn:aws:kms:ap-northeast-1:111122223333:key/mrk-1234abcd12ab34cd56ef1234567890ab"
|
|
284
250
|
* };
|
|
285
251
|
* const command = new DescribeKeyCommand(input);
|
|
286
252
|
* const response = await client.send(command);
|
|
287
|
-
* /* response
|
|
253
|
+
* /* response is
|
|
288
254
|
* {
|
|
289
|
-
*
|
|
290
|
-
*
|
|
291
|
-
*
|
|
292
|
-
*
|
|
293
|
-
*
|
|
294
|
-
*
|
|
295
|
-
*
|
|
296
|
-
*
|
|
255
|
+
* KeyMetadata: {
|
|
256
|
+
* AWSAccountId: "111122223333",
|
|
257
|
+
* Arn: "arn:aws:kms:ap-northeast-1:111122223333:key/mrk-1234abcd12ab34cd56ef1234567890ab",
|
|
258
|
+
* CreationDate: 1.586329200918E9,
|
|
259
|
+
* CustomerMasterKeySpec: "SYMMETRIC_DEFAULT",
|
|
260
|
+
* Description: "",
|
|
261
|
+
* Enabled: true,
|
|
262
|
+
* EncryptionAlgorithms: [
|
|
297
263
|
* "SYMMETRIC_DEFAULT"
|
|
298
264
|
* ],
|
|
299
|
-
*
|
|
300
|
-
*
|
|
301
|
-
*
|
|
302
|
-
*
|
|
303
|
-
*
|
|
304
|
-
*
|
|
305
|
-
*
|
|
306
|
-
*
|
|
307
|
-
*
|
|
308
|
-
*
|
|
265
|
+
* KeyId: "mrk-1234abcd12ab34cd56ef1234567890ab",
|
|
266
|
+
* KeyManager: "CUSTOMER",
|
|
267
|
+
* KeyState: "Enabled",
|
|
268
|
+
* KeyUsage: "ENCRYPT_DECRYPT",
|
|
269
|
+
* MultiRegion: true,
|
|
270
|
+
* MultiRegionConfiguration: {
|
|
271
|
+
* MultiRegionKeyType: "PRIMARY",
|
|
272
|
+
* PrimaryKey: {
|
|
273
|
+
* Arn: "arn:aws:kms:us-west-2:111122223333:key/mrk-1234abcd12ab34cd56ef1234567890ab",
|
|
274
|
+
* Region: "us-west-2"
|
|
309
275
|
* },
|
|
310
|
-
*
|
|
276
|
+
* ReplicaKeys: [
|
|
311
277
|
* {
|
|
312
|
-
*
|
|
313
|
-
*
|
|
278
|
+
* Arn: "arn:aws:kms:eu-west-1:111122223333:key/mrk-1234abcd12ab34cd56ef1234567890ab",
|
|
279
|
+
* Region: "eu-west-1"
|
|
314
280
|
* },
|
|
315
281
|
* {
|
|
316
|
-
*
|
|
317
|
-
*
|
|
282
|
+
* Arn: "arn:aws:kms:ap-northeast-1:111122223333:key/mrk-1234abcd12ab34cd56ef1234567890ab",
|
|
283
|
+
* Region: "ap-northeast-1"
|
|
318
284
|
* },
|
|
319
285
|
* {
|
|
320
|
-
*
|
|
321
|
-
*
|
|
286
|
+
* Arn: "arn:aws:kms:sa-east-1:111122223333:key/mrk-1234abcd12ab34cd56ef1234567890ab",
|
|
287
|
+
* Region: "sa-east-1"
|
|
322
288
|
* }
|
|
323
289
|
* ]
|
|
324
290
|
* },
|
|
325
|
-
*
|
|
291
|
+
* Origin: "AWS_KMS"
|
|
326
292
|
* }
|
|
327
293
|
* }
|
|
328
294
|
* *\/
|
|
329
|
-
* // example id: to-get-details-about-a-multi-region-key-3
|
|
330
295
|
* ```
|
|
331
296
|
*
|
|
332
297
|
* @example To get details about an HMAC KMS key
|
|
333
298
|
* ```javascript
|
|
334
299
|
* // The following example gets the metadata of an HMAC KMS key.
|
|
335
300
|
* const input = {
|
|
336
|
-
*
|
|
301
|
+
* KeyId: "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab"
|
|
337
302
|
* };
|
|
338
303
|
* const command = new DescribeKeyCommand(input);
|
|
339
304
|
* const response = await client.send(command);
|
|
340
|
-
* /* response
|
|
305
|
+
* /* response is
|
|
341
306
|
* {
|
|
342
|
-
*
|
|
343
|
-
*
|
|
344
|
-
*
|
|
345
|
-
*
|
|
346
|
-
*
|
|
347
|
-
*
|
|
348
|
-
*
|
|
349
|
-
*
|
|
350
|
-
*
|
|
351
|
-
*
|
|
352
|
-
*
|
|
353
|
-
*
|
|
307
|
+
* KeyMetadata: {
|
|
308
|
+
* AWSAccountId: "123456789012",
|
|
309
|
+
* Arn: "arn:aws:kms:us-west-2:123456789012:key/1234abcd-12ab-34cd-56ef-1234567890ab",
|
|
310
|
+
* CreationDate: 1.566160362664E9,
|
|
311
|
+
* CustomerMasterKeySpec: "HMAC_256",
|
|
312
|
+
* Description: "Development test key",
|
|
313
|
+
* Enabled: true,
|
|
314
|
+
* KeyId: "1234abcd-12ab-34cd-56ef-1234567890ab",
|
|
315
|
+
* KeyManager: "CUSTOMER",
|
|
316
|
+
* KeyState: "Enabled",
|
|
317
|
+
* KeyUsage: "GENERATE_VERIFY_MAC",
|
|
318
|
+
* MacAlgorithms: [
|
|
354
319
|
* "HMAC_SHA_256"
|
|
355
320
|
* ],
|
|
356
|
-
*
|
|
357
|
-
*
|
|
321
|
+
* MultiRegion: false,
|
|
322
|
+
* Origin: "AWS_KMS"
|
|
358
323
|
* }
|
|
359
324
|
* }
|
|
360
325
|
* *\/
|
|
361
|
-
* // example id: to-get-details-about-an-hmac-kms-key-4
|
|
362
326
|
* ```
|
|
363
327
|
*
|
|
364
328
|
* @example To get details about a KMS key in an AWS CloudHSM key store
|
|
365
329
|
* ```javascript
|
|
366
330
|
* // The following example gets the metadata of a KMS key in an AWS CloudHSM key store.
|
|
367
331
|
* const input = {
|
|
368
|
-
*
|
|
332
|
+
* KeyId: "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab"
|
|
369
333
|
* };
|
|
370
334
|
* const command = new DescribeKeyCommand(input);
|
|
371
335
|
* const response = await client.send(command);
|
|
372
|
-
* /* response
|
|
336
|
+
* /* response is
|
|
373
337
|
* {
|
|
374
|
-
*
|
|
375
|
-
*
|
|
376
|
-
*
|
|
377
|
-
*
|
|
378
|
-
*
|
|
379
|
-
*
|
|
380
|
-
*
|
|
381
|
-
*
|
|
382
|
-
*
|
|
383
|
-
*
|
|
338
|
+
* KeyMetadata: {
|
|
339
|
+
* AWSAccountId: "123456789012",
|
|
340
|
+
* Arn: "arn:aws:kms:us-west-2:123456789012:key/1234abcd-12ab-34cd-56ef-1234567890ab",
|
|
341
|
+
* CloudHsmClusterId: "cluster-234abcdefABC",
|
|
342
|
+
* CreationDate: 1.646160362664E9,
|
|
343
|
+
* CustomKeyStoreId: "cks-1234567890abcdef0",
|
|
344
|
+
* CustomerMasterKeySpec: "SYMMETRIC_DEFAULT",
|
|
345
|
+
* Description: "CloudHSM key store test key",
|
|
346
|
+
* Enabled: true,
|
|
347
|
+
* EncryptionAlgorithms: [
|
|
384
348
|
* "SYMMETRIC_DEFAULT"
|
|
385
349
|
* ],
|
|
386
|
-
*
|
|
387
|
-
*
|
|
388
|
-
*
|
|
389
|
-
*
|
|
390
|
-
*
|
|
391
|
-
*
|
|
392
|
-
*
|
|
350
|
+
* KeyId: "1234abcd-12ab-34cd-56ef-1234567890ab",
|
|
351
|
+
* KeyManager: "CUSTOMER",
|
|
352
|
+
* KeySpec: "SYMMETRIC_DEFAULT",
|
|
353
|
+
* KeyState: "Enabled",
|
|
354
|
+
* KeyUsage: "ENCRYPT_DECRYPT",
|
|
355
|
+
* MultiRegion: false,
|
|
356
|
+
* Origin: "AWS_CLOUDHSM"
|
|
393
357
|
* }
|
|
394
358
|
* }
|
|
395
359
|
* *\/
|
|
396
|
-
* // example id: to-get-details-about-a-kms-key-in-an-AWS-CloudHSM-key-store-5
|
|
397
360
|
* ```
|
|
398
361
|
*
|
|
399
362
|
* @example To get details about a KMS key in an external key store
|
|
400
363
|
* ```javascript
|
|
401
364
|
* // The following example gets the metadata of a KMS key in an external key store.
|
|
402
365
|
* const input = {
|
|
403
|
-
*
|
|
366
|
+
* KeyId: "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab"
|
|
404
367
|
* };
|
|
405
368
|
* const command = new DescribeKeyCommand(input);
|
|
406
369
|
* const response = await client.send(command);
|
|
407
|
-
* /* response
|
|
370
|
+
* /* response is
|
|
408
371
|
* {
|
|
409
|
-
*
|
|
410
|
-
*
|
|
411
|
-
*
|
|
412
|
-
*
|
|
413
|
-
*
|
|
414
|
-
*
|
|
415
|
-
*
|
|
416
|
-
*
|
|
417
|
-
*
|
|
372
|
+
* KeyMetadata: {
|
|
373
|
+
* AWSAccountId: "123456789012",
|
|
374
|
+
* Arn: "arn:aws:kms:us-west-2:123456789012:key/1234abcd-12ab-34cd-56ef-1234567890ab",
|
|
375
|
+
* CreationDate: 1.646160362664E9,
|
|
376
|
+
* CustomKeyStoreId: "cks-1234567890abcdef0",
|
|
377
|
+
* CustomerMasterKeySpec: "SYMMETRIC_DEFAULT",
|
|
378
|
+
* Description: "External key store test key",
|
|
379
|
+
* Enabled: true,
|
|
380
|
+
* EncryptionAlgorithms: [
|
|
418
381
|
* "SYMMETRIC_DEFAULT"
|
|
419
382
|
* ],
|
|
420
|
-
*
|
|
421
|
-
*
|
|
422
|
-
*
|
|
423
|
-
*
|
|
424
|
-
*
|
|
425
|
-
*
|
|
426
|
-
*
|
|
427
|
-
*
|
|
428
|
-
*
|
|
383
|
+
* KeyId: "1234abcd-12ab-34cd-56ef-1234567890ab",
|
|
384
|
+
* KeyManager: "CUSTOMER",
|
|
385
|
+
* KeySpec: "SYMMETRIC_DEFAULT",
|
|
386
|
+
* KeyState: "Enabled",
|
|
387
|
+
* KeyUsage: "ENCRYPT_DECRYPT",
|
|
388
|
+
* MultiRegion: false,
|
|
389
|
+
* Origin: "EXTERNAL_KEY_STORE",
|
|
390
|
+
* XksKeyConfiguration: {
|
|
391
|
+
* Id: "bb8562717f809024"
|
|
429
392
|
* }
|
|
430
393
|
* }
|
|
431
394
|
* }
|
|
432
395
|
* *\/
|
|
433
|
-
* // example id: to-get-details-about-a-kms-key-in-an-external-key-store-6
|
|
434
396
|
* ```
|
|
435
397
|
*
|
|
398
|
+
* @public
|
|
436
399
|
*/
|
|
437
400
|
export declare class DescribeKeyCommand extends DescribeKeyCommand_base {
|
|
438
401
|
/** @internal type navigation helper, not in runtime. */
|