@aws-sdk/client-kms 3.990.0 → 3.991.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist-cjs/index.js +4 -0
- package/dist-cjs/schemas/schemas_0.js +6 -4
- package/dist-es/models/enums.js +3 -0
- package/dist-es/schemas/schemas_0.js +6 -4
- package/dist-types/KMS.d.ts +1 -0
- package/dist-types/commands/CreateKeyCommand.d.ts +1 -1
- package/dist-types/commands/DecryptCommand.d.ts +5 -2
- package/dist-types/commands/ReEncryptCommand.d.ts +4 -1
- package/dist-types/commands/RotateKeyOnDemandCommand.d.ts +1 -1
- package/dist-types/models/enums.d.ts +11 -0
- package/dist-types/models/models_0.d.ts +29 -6
- package/dist-types/ts3.4/KMS.d.ts +1 -0
- package/dist-types/ts3.4/commands/DecryptCommand.d.ts +3 -1
- package/dist-types/ts3.4/models/enums.d.ts +5 -0
- package/dist-types/ts3.4/models/models_0.d.ts +5 -2
- package/package.json +2 -2
package/dist-cjs/index.js
CHANGED
|
@@ -1009,6 +1009,9 @@ const DataKeySpec = {
|
|
|
1009
1009
|
AES_128: "AES_128",
|
|
1010
1010
|
AES_256: "AES_256",
|
|
1011
1011
|
};
|
|
1012
|
+
const DryRunModifierType = {
|
|
1013
|
+
IGNORE_CIPHERTEXT: "IGNORE_CIPHERTEXT",
|
|
1014
|
+
};
|
|
1012
1015
|
const KeyEncryptionMechanism = {
|
|
1013
1016
|
RSAES_OAEP_SHA_256: "RSAES_OAEP_SHA_256",
|
|
1014
1017
|
};
|
|
@@ -1081,6 +1084,7 @@ exports.DescribeKeyCommand = DescribeKeyCommand;
|
|
|
1081
1084
|
exports.DisableKeyCommand = DisableKeyCommand;
|
|
1082
1085
|
exports.DisableKeyRotationCommand = DisableKeyRotationCommand;
|
|
1083
1086
|
exports.DisconnectCustomKeyStoreCommand = DisconnectCustomKeyStoreCommand;
|
|
1087
|
+
exports.DryRunModifierType = DryRunModifierType;
|
|
1084
1088
|
exports.EnableKeyCommand = EnableKeyCommand;
|
|
1085
1089
|
exports.EnableKeyRotationCommand = EnableKeyRotationCommand;
|
|
1086
1090
|
exports.EncryptCommand = EncryptCommand;
|
|
@@ -88,6 +88,7 @@ const _DKRi = "DisableKeyRequest";
|
|
|
88
88
|
const _DKRis = "DisableKeyRotation";
|
|
89
89
|
const _DKi = "DisableKey";
|
|
90
90
|
const _DR = "DryRun";
|
|
91
|
+
const _DRM = "DryRunModifiers";
|
|
91
92
|
const _DROE = "DryRunOperationException";
|
|
92
93
|
const _DRe = "DecryptRequest";
|
|
93
94
|
const _DRec = "DecryptResponse";
|
|
@@ -741,8 +742,8 @@ exports.CustomKeyStoresListEntry$ = [3, n0, _CKSLE,
|
|
|
741
742
|
];
|
|
742
743
|
exports.DecryptRequest$ = [3, n0, _DRe,
|
|
743
744
|
0,
|
|
744
|
-
[_CB, _EC, _GT, _KI, _EA, _R, _DR],
|
|
745
|
-
[21, 128 | 0, 64 | 0, 0, 0, () => exports.RecipientInfo$, 2
|
|
745
|
+
[_CB, _EC, _GT, _KI, _EA, _R, _DR, _DRM],
|
|
746
|
+
[21, 128 | 0, 64 | 0, 0, 0, () => exports.RecipientInfo$, 2, 64 | 0]
|
|
746
747
|
];
|
|
747
748
|
exports.DecryptResponse$ = [3, n0, _DRec,
|
|
748
749
|
0,
|
|
@@ -1061,8 +1062,8 @@ exports.RecipientInfo$ = [3, n0, _RI,
|
|
|
1061
1062
|
];
|
|
1062
1063
|
exports.ReEncryptRequest$ = [3, n0, _RER,
|
|
1063
1064
|
0,
|
|
1064
|
-
[
|
|
1065
|
-
[
|
|
1065
|
+
[_DKI, _CB, _SEC, _SKI, _DEC, _SEA, _DEA, _GT, _DR, _DRM],
|
|
1066
|
+
[0, 21, 128 | 0, 0, 128 | 0, 0, 0, 64 | 0, 2, 64 | 0], 1
|
|
1066
1067
|
];
|
|
1067
1068
|
exports.ReEncryptResponse$ = [3, n0, _RERe,
|
|
1068
1069
|
0,
|
|
@@ -1207,6 +1208,7 @@ var CustomKeyStoresList = [1, n0, _CKSL,
|
|
|
1207
1208
|
0, [() => exports.CustomKeyStoresListEntry$,
|
|
1208
1209
|
0]
|
|
1209
1210
|
];
|
|
1211
|
+
var DryRunModifierList = 64 | 0;
|
|
1210
1212
|
var EncryptionAlgorithmSpecList = 64 | 0;
|
|
1211
1213
|
var GrantList = [1, n0, _GL,
|
|
1212
1214
|
0, () => exports.GrantListEntry$
|
package/dist-es/models/enums.js
CHANGED
|
@@ -173,6 +173,9 @@ export const DataKeySpec = {
|
|
|
173
173
|
AES_128: "AES_128",
|
|
174
174
|
AES_256: "AES_256",
|
|
175
175
|
};
|
|
176
|
+
export const DryRunModifierType = {
|
|
177
|
+
IGNORE_CIPHERTEXT: "IGNORE_CIPHERTEXT",
|
|
178
|
+
};
|
|
176
179
|
export const KeyEncryptionMechanism = {
|
|
177
180
|
RSAES_OAEP_SHA_256: "RSAES_OAEP_SHA_256",
|
|
178
181
|
};
|
|
@@ -81,6 +81,7 @@ const _DKRi = "DisableKeyRequest";
|
|
|
81
81
|
const _DKRis = "DisableKeyRotation";
|
|
82
82
|
const _DKi = "DisableKey";
|
|
83
83
|
const _DR = "DryRun";
|
|
84
|
+
const _DRM = "DryRunModifiers";
|
|
84
85
|
const _DROE = "DryRunOperationException";
|
|
85
86
|
const _DRe = "DecryptRequest";
|
|
86
87
|
const _DRec = "DecryptResponse";
|
|
@@ -734,8 +735,8 @@ export var CustomKeyStoresListEntry$ = [3, n0, _CKSLE,
|
|
|
734
735
|
];
|
|
735
736
|
export var DecryptRequest$ = [3, n0, _DRe,
|
|
736
737
|
0,
|
|
737
|
-
[_CB, _EC, _GT, _KI, _EA, _R, _DR],
|
|
738
|
-
[21, 128 | 0, 64 | 0, 0, 0, () => RecipientInfo$, 2
|
|
738
|
+
[_CB, _EC, _GT, _KI, _EA, _R, _DR, _DRM],
|
|
739
|
+
[21, 128 | 0, 64 | 0, 0, 0, () => RecipientInfo$, 2, 64 | 0]
|
|
739
740
|
];
|
|
740
741
|
export var DecryptResponse$ = [3, n0, _DRec,
|
|
741
742
|
0,
|
|
@@ -1054,8 +1055,8 @@ export var RecipientInfo$ = [3, n0, _RI,
|
|
|
1054
1055
|
];
|
|
1055
1056
|
export var ReEncryptRequest$ = [3, n0, _RER,
|
|
1056
1057
|
0,
|
|
1057
|
-
[
|
|
1058
|
-
[
|
|
1058
|
+
[_DKI, _CB, _SEC, _SKI, _DEC, _SEA, _DEA, _GT, _DR, _DRM],
|
|
1059
|
+
[0, 21, 128 | 0, 0, 128 | 0, 0, 0, 64 | 0, 2, 64 | 0], 1
|
|
1059
1060
|
];
|
|
1060
1061
|
export var ReEncryptResponse$ = [3, n0, _RERe,
|
|
1061
1062
|
0,
|
|
@@ -1200,6 +1201,7 @@ var CustomKeyStoresList = [1, n0, _CKSL,
|
|
|
1200
1201
|
0, [() => CustomKeyStoresListEntry$,
|
|
1201
1202
|
0]
|
|
1202
1203
|
];
|
|
1204
|
+
var DryRunModifierList = 64 | 0;
|
|
1203
1205
|
var EncryptionAlgorithmSpecList = 64 | 0;
|
|
1204
1206
|
var GrantList = [1, n0, _GL,
|
|
1205
1207
|
0, () => GrantListEntry$
|
package/dist-types/KMS.d.ts
CHANGED
|
@@ -94,6 +94,7 @@ export interface KMS {
|
|
|
94
94
|
/**
|
|
95
95
|
* @see {@link DecryptCommand}
|
|
96
96
|
*/
|
|
97
|
+
decrypt(): Promise<DecryptCommandOutput>;
|
|
97
98
|
decrypt(args: DecryptCommandInput, options?: __HttpHandlerOptions): Promise<DecryptCommandOutput>;
|
|
98
99
|
decrypt(args: DecryptCommandInput, cb: (err: any, data?: DecryptCommandOutput) => void): void;
|
|
99
100
|
decrypt(args: DecryptCommandInput, options: __HttpHandlerOptions, cb: (err: any, data?: DecryptCommandOutput) => void): void;
|
|
@@ -93,7 +93,6 @@ declare const CreateKeyCommand_base: {
|
|
|
93
93
|
* <p> </p>
|
|
94
94
|
* </dd>
|
|
95
95
|
* <dt>Multi-Region primary keys</dt>
|
|
96
|
-
* <dt>Imported key material</dt>
|
|
97
96
|
* <dd>
|
|
98
97
|
* <p>To create a multi-Region <i>primary key</i> in the local Amazon Web Services Region,
|
|
99
98
|
* use the <code>MultiRegion</code> parameter with a value of <code>True</code>. To create
|
|
@@ -111,6 +110,7 @@ declare const CreateKeyCommand_base: {
|
|
|
111
110
|
* it in a different Amazon Web Services Region without re-encrypting the data or making a cross-Region call. For more information about multi-Region keys, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/multi-region-keys-overview.html">Multi-Region keys in KMS</a> in the <i>Key Management Service Developer Guide</i>.</p>
|
|
112
111
|
* <p> </p>
|
|
113
112
|
* </dd>
|
|
113
|
+
* <dt>Imported key material</dt>
|
|
114
114
|
* <dd>
|
|
115
115
|
* <p>To import your own key material into a KMS key, begin by creating a KMS key with no
|
|
116
116
|
* key material. To do this, use the <code>Origin</code> parameter of
|
|
@@ -23,7 +23,7 @@ export interface DecryptCommandOutput extends DecryptResponse, __MetadataBearer
|
|
|
23
23
|
}
|
|
24
24
|
declare const DecryptCommand_base: {
|
|
25
25
|
new (input: DecryptCommandInput): import("@smithy/smithy-client").CommandImpl<DecryptCommandInput, DecryptCommandOutput, KMSClientResolvedConfig, ServiceInputTypes, ServiceOutputTypes>;
|
|
26
|
-
new (input: DecryptCommandInput): import("@smithy/smithy-client").CommandImpl<DecryptCommandInput, DecryptCommandOutput, KMSClientResolvedConfig, ServiceInputTypes, ServiceOutputTypes>;
|
|
26
|
+
new (...[input]: [] | [DecryptCommandInput]): import("@smithy/smithy-client").CommandImpl<DecryptCommandInput, DecryptCommandOutput, KMSClientResolvedConfig, ServiceInputTypes, ServiceOutputTypes>;
|
|
27
27
|
getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
|
|
28
28
|
};
|
|
29
29
|
/**
|
|
@@ -133,7 +133,7 @@ declare const DecryptCommand_base: {
|
|
|
133
133
|
* const config = {}; // type is KMSClientConfig
|
|
134
134
|
* const client = new KMSClient(config);
|
|
135
135
|
* const input = { // DecryptRequest
|
|
136
|
-
* CiphertextBlob: new Uint8Array(), // e.g. Buffer.from("") or new TextEncoder().encode("")
|
|
136
|
+
* CiphertextBlob: new Uint8Array(), // e.g. Buffer.from("") or new TextEncoder().encode("")
|
|
137
137
|
* EncryptionContext: { // EncryptionContextType
|
|
138
138
|
* "<keys>": "STRING_VALUE",
|
|
139
139
|
* },
|
|
@@ -147,6 +147,9 @@ declare const DecryptCommand_base: {
|
|
|
147
147
|
* AttestationDocument: new Uint8Array(), // e.g. Buffer.from("") or new TextEncoder().encode("")
|
|
148
148
|
* },
|
|
149
149
|
* DryRun: true || false,
|
|
150
|
+
* DryRunModifiers: [ // DryRunModifierList
|
|
151
|
+
* "IGNORE_CIPHERTEXT",
|
|
152
|
+
* ],
|
|
150
153
|
* };
|
|
151
154
|
* const command = new DecryptCommand(input);
|
|
152
155
|
* const response = await client.send(command);
|
|
@@ -131,7 +131,7 @@ declare const ReEncryptCommand_base: {
|
|
|
131
131
|
* const config = {}; // type is KMSClientConfig
|
|
132
132
|
* const client = new KMSClient(config);
|
|
133
133
|
* const input = { // ReEncryptRequest
|
|
134
|
-
* CiphertextBlob: new Uint8Array(), // e.g. Buffer.from("") or new TextEncoder().encode("")
|
|
134
|
+
* CiphertextBlob: new Uint8Array(), // e.g. Buffer.from("") or new TextEncoder().encode("")
|
|
135
135
|
* SourceEncryptionContext: { // EncryptionContextType
|
|
136
136
|
* "<keys>": "STRING_VALUE",
|
|
137
137
|
* },
|
|
@@ -146,6 +146,9 @@ declare const ReEncryptCommand_base: {
|
|
|
146
146
|
* "STRING_VALUE",
|
|
147
147
|
* ],
|
|
148
148
|
* DryRun: true || false,
|
|
149
|
+
* DryRunModifiers: [ // DryRunModifierList
|
|
150
|
+
* "IGNORE_CIPHERTEXT",
|
|
151
|
+
* ],
|
|
149
152
|
* };
|
|
150
153
|
* const command = new ReEncryptCommand(input);
|
|
151
154
|
* const response = await client.send(command);
|
|
@@ -37,7 +37,7 @@ declare const RotateKeyOnDemandCommand_base: {
|
|
|
37
37
|
* 2024, and you perform an on-demand rotation on April 10, 2024, the key will automatically
|
|
38
38
|
* rotate, as scheduled, on April 14, 2024 and every 730 days thereafter.</p>
|
|
39
39
|
* <note>
|
|
40
|
-
* <p>You can perform on-demand key rotation a <b>maximum of
|
|
40
|
+
* <p>You can perform on-demand key rotation a <b>maximum of 25
|
|
41
41
|
* times</b> per KMS key. You can use the KMS console to view the number of
|
|
42
42
|
* remaining on-demand rotations available for a KMS key.</p>
|
|
43
43
|
* </note>
|
|
@@ -333,6 +333,17 @@ export declare const DataKeySpec: {
|
|
|
333
333
|
* @public
|
|
334
334
|
*/
|
|
335
335
|
export type DataKeySpec = (typeof DataKeySpec)[keyof typeof DataKeySpec];
|
|
336
|
+
/**
|
|
337
|
+
* @public
|
|
338
|
+
* @enum
|
|
339
|
+
*/
|
|
340
|
+
export declare const DryRunModifierType: {
|
|
341
|
+
readonly IGNORE_CIPHERTEXT: "IGNORE_CIPHERTEXT";
|
|
342
|
+
};
|
|
343
|
+
/**
|
|
344
|
+
* @public
|
|
345
|
+
*/
|
|
346
|
+
export type DryRunModifierType = (typeof DryRunModifierType)[keyof typeof DryRunModifierType];
|
|
336
347
|
/**
|
|
337
348
|
* @public
|
|
338
349
|
* @enum
|
|
@@ -1,4 +1,4 @@
|
|
|
1
|
-
import { AlgorithmSpec, ConnectionErrorCodeType, ConnectionStateType, CustomerMasterKeySpec, CustomKeyStoreType, DataKeyPairSpec, DataKeySpec, EncryptionAlgorithmSpec, ExpirationModelType, GrantOperation, ImportState, ImportType, IncludeKeyMaterial, KeyAgreementAlgorithmSpec, KeyEncryptionMechanism, KeyManagerType, KeyMaterialState, KeySpec, KeyState, KeyUsageType, MacAlgorithmSpec, MessageType, MultiRegionKeyType, OriginType, RotationType, SigningAlgorithmSpec, WrappingKeySpec, XksProxyConnectivityType } from "./enums";
|
|
1
|
+
import { AlgorithmSpec, ConnectionErrorCodeType, ConnectionStateType, CustomerMasterKeySpec, CustomKeyStoreType, DataKeyPairSpec, DataKeySpec, DryRunModifierType, EncryptionAlgorithmSpec, ExpirationModelType, GrantOperation, ImportState, ImportType, IncludeKeyMaterial, KeyAgreementAlgorithmSpec, KeyEncryptionMechanism, KeyManagerType, KeyMaterialState, KeySpec, KeyState, KeyUsageType, MacAlgorithmSpec, MessageType, MultiRegionKeyType, OriginType, RotationType, SigningAlgorithmSpec, WrappingKeySpec, XksProxyConnectivityType } from "./enums";
|
|
2
2
|
/**
|
|
3
3
|
* <p>Contains information about an alias.</p>
|
|
4
4
|
* @public
|
|
@@ -1539,9 +1539,10 @@ export interface RecipientInfo {
|
|
|
1539
1539
|
export interface DecryptRequest {
|
|
1540
1540
|
/**
|
|
1541
1541
|
* <p>Ciphertext to be decrypted. The blob includes metadata.</p>
|
|
1542
|
+
* <p>This parameter is required in all cases except when <code>DryRun</code> is <code>true</code> and <code>DryRunModifiers</code> is set to <code>IGNORE_CIPHERTEXT</code>.</p>
|
|
1542
1543
|
* @public
|
|
1543
1544
|
*/
|
|
1544
|
-
CiphertextBlob
|
|
1545
|
+
CiphertextBlob?: Uint8Array | undefined;
|
|
1545
1546
|
/**
|
|
1546
1547
|
* <p>Specifies the encryption context to use when decrypting the data.
|
|
1547
1548
|
* An encryption context is valid only for <a href="https://docs.aws.amazon.com/kms/latest/developerguide/kms-cryptography.html#cryptographic-operations">cryptographic operations</a> with a symmetric encryption KMS key. The standard asymmetric encryption algorithms and HMAC algorithms that KMS uses do not support an encryption context.</p>
|
|
@@ -1566,7 +1567,7 @@ export interface DecryptRequest {
|
|
|
1566
1567
|
* different KMS key, the <code>Decrypt</code> operation throws an
|
|
1567
1568
|
* <code>IncorrectKeyException</code>.</p>
|
|
1568
1569
|
* <p>This parameter is required only when the ciphertext was encrypted under an asymmetric KMS
|
|
1569
|
-
* key
|
|
1570
|
+
* key or when <code>DryRun</code> is <code>true</code> and <code>DryRunModifiers</code> is set to <code>IGNORE_CIPHERTEXT</code>. If you used a symmetric encryption KMS key, KMS can get the KMS key from metadata that
|
|
1570
1571
|
* it adds to the symmetric ciphertext blob. However, it is always recommended as a best
|
|
1571
1572
|
* practice. This practice ensures that you use the KMS key that you intend.</p>
|
|
1572
1573
|
* <p>To specify a KMS key, use its key ID, key ARN, alias name, or alias ARN. When using an alias name, prefix it with <code>"alias/"</code>. To specify a KMS key in a different Amazon Web Services account, you must use the key ARN or alias ARN.</p>
|
|
@@ -1625,6 +1626,16 @@ export interface DecryptRequest {
|
|
|
1625
1626
|
* @public
|
|
1626
1627
|
*/
|
|
1627
1628
|
DryRun?: boolean | undefined;
|
|
1629
|
+
/**
|
|
1630
|
+
* <p>Specifies the modifiers to apply to the dry run operation. <code>DryRunModifiers</code> is an optional parameter that only applies when <code>DryRun</code> is
|
|
1631
|
+
* set to <code>true</code>.</p>
|
|
1632
|
+
* <p>When set to <code>IGNORE_CIPHERTEXT</code>, KMS performs only authorization validation without ciphertext validation. This allows you to test permissions
|
|
1633
|
+
* without requiring a valid ciphertext blob.</p>
|
|
1634
|
+
* <p>To learn more about how to use this parameter, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/testing-permissions.html">Testing your
|
|
1635
|
+
* permissions</a> in the <i>Key Management Service Developer Guide</i>.</p>
|
|
1636
|
+
* @public
|
|
1637
|
+
*/
|
|
1638
|
+
DryRunModifiers?: DryRunModifierType[] | undefined;
|
|
1628
1639
|
}
|
|
1629
1640
|
/**
|
|
1630
1641
|
* @public
|
|
@@ -3906,9 +3917,10 @@ export interface PutKeyPolicyRequest {
|
|
|
3906
3917
|
export interface ReEncryptRequest {
|
|
3907
3918
|
/**
|
|
3908
3919
|
* <p>Ciphertext of the data to reencrypt.</p>
|
|
3920
|
+
* <p>This parameter is required in all cases except when <code>DryRun</code> is <code>true</code> and <code>DryRunModifiers</code> is set to <code>IGNORE_CIPHERTEXT</code>.</p>
|
|
3909
3921
|
* @public
|
|
3910
3922
|
*/
|
|
3911
|
-
CiphertextBlob
|
|
3923
|
+
CiphertextBlob?: Uint8Array | undefined;
|
|
3912
3924
|
/**
|
|
3913
3925
|
* <p>Specifies the encryption context to use to decrypt the ciphertext. Enter the same
|
|
3914
3926
|
* encryption context that was used to encrypt the ciphertext.</p>
|
|
@@ -3927,8 +3939,9 @@ export interface ReEncryptRequest {
|
|
|
3927
3939
|
* different KMS key, the <code>ReEncrypt</code> operation throws an
|
|
3928
3940
|
* <code>IncorrectKeyException</code>.</p>
|
|
3929
3941
|
* <p>This parameter is required only when the ciphertext was encrypted under an asymmetric KMS
|
|
3930
|
-
* key
|
|
3931
|
-
*
|
|
3942
|
+
* key or when <code>DryRun</code> is <code>true</code> and <code>DryRunModifiers</code> is set to
|
|
3943
|
+
* <code>IGNORE_CIPHERTEXT</code>. If you used a symmetric encryption KMS key, KMS can get the KMS key
|
|
3944
|
+
* from metadata that it adds to the symmetric ciphertext blob. However, it is always recommended as a best
|
|
3932
3945
|
* practice. This practice ensures that you use the KMS key that you intend.</p>
|
|
3933
3946
|
* <p>To specify a KMS key, use its key ID, key ARN, alias name, or alias ARN. When using an alias name, prefix it with <code>"alias/"</code>. To specify a KMS key in a different Amazon Web Services account, you must use the key ARN or alias ARN.</p>
|
|
3934
3947
|
* <p>For example:</p>
|
|
@@ -4032,6 +4045,16 @@ export interface ReEncryptRequest {
|
|
|
4032
4045
|
* @public
|
|
4033
4046
|
*/
|
|
4034
4047
|
DryRun?: boolean | undefined;
|
|
4048
|
+
/**
|
|
4049
|
+
* <p>Specifies the modifiers to apply to the dry run operation. <code>DryRunModifiers</code> is an optional parameter that only applies when <code>DryRun</code> is
|
|
4050
|
+
* set to <code>true</code>.</p>
|
|
4051
|
+
* <p>When set to <code>IGNORE_CIPHERTEXT</code>, KMS performs only authorization validation without ciphertext validation. This allows you to test permissions
|
|
4052
|
+
* without requiring a valid ciphertext blob.</p>
|
|
4053
|
+
* <p>To learn more about how to use this parameter, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/testing-permissions.html">Testing your
|
|
4054
|
+
* permissions</a> in the <i>Key Management Service Developer Guide</i>.</p>
|
|
4055
|
+
* @public
|
|
4056
|
+
*/
|
|
4057
|
+
DryRunModifiers?: DryRunModifierType[] | undefined;
|
|
4035
4058
|
}
|
|
4036
4059
|
/**
|
|
4037
4060
|
* @public
|
|
@@ -20,7 +20,9 @@ declare const DecryptCommand_base: {
|
|
|
20
20
|
ServiceInputTypes,
|
|
21
21
|
ServiceOutputTypes
|
|
22
22
|
>;
|
|
23
|
-
new (
|
|
23
|
+
new (
|
|
24
|
+
...[input]: [] | [DecryptCommandInput]
|
|
25
|
+
): import("@smithy/smithy-client").CommandImpl<
|
|
24
26
|
DecryptCommandInput,
|
|
25
27
|
DecryptCommandOutput,
|
|
26
28
|
KMSClientResolvedConfig,
|
|
@@ -207,6 +207,11 @@ export declare const DataKeySpec: {
|
|
|
207
207
|
readonly AES_256: "AES_256";
|
|
208
208
|
};
|
|
209
209
|
export type DataKeySpec = (typeof DataKeySpec)[keyof typeof DataKeySpec];
|
|
210
|
+
export declare const DryRunModifierType: {
|
|
211
|
+
readonly IGNORE_CIPHERTEXT: "IGNORE_CIPHERTEXT";
|
|
212
|
+
};
|
|
213
|
+
export type DryRunModifierType =
|
|
214
|
+
(typeof DryRunModifierType)[keyof typeof DryRunModifierType];
|
|
210
215
|
export declare const KeyEncryptionMechanism: {
|
|
211
216
|
readonly RSAES_OAEP_SHA_256: "RSAES_OAEP_SHA_256";
|
|
212
217
|
};
|
|
@@ -6,6 +6,7 @@ import {
|
|
|
6
6
|
CustomKeyStoreType,
|
|
7
7
|
DataKeyPairSpec,
|
|
8
8
|
DataKeySpec,
|
|
9
|
+
DryRunModifierType,
|
|
9
10
|
EncryptionAlgorithmSpec,
|
|
10
11
|
ExpirationModelType,
|
|
11
12
|
GrantOperation,
|
|
@@ -173,13 +174,14 @@ export interface RecipientInfo {
|
|
|
173
174
|
AttestationDocument?: Uint8Array | undefined;
|
|
174
175
|
}
|
|
175
176
|
export interface DecryptRequest {
|
|
176
|
-
CiphertextBlob
|
|
177
|
+
CiphertextBlob?: Uint8Array | undefined;
|
|
177
178
|
EncryptionContext?: Record<string, string> | undefined;
|
|
178
179
|
GrantTokens?: string[] | undefined;
|
|
179
180
|
KeyId?: string | undefined;
|
|
180
181
|
EncryptionAlgorithm?: EncryptionAlgorithmSpec | undefined;
|
|
181
182
|
Recipient?: RecipientInfo | undefined;
|
|
182
183
|
DryRun?: boolean | undefined;
|
|
184
|
+
DryRunModifiers?: DryRunModifierType[] | undefined;
|
|
183
185
|
}
|
|
184
186
|
export interface DecryptResponse {
|
|
185
187
|
KeyId?: string | undefined;
|
|
@@ -504,7 +506,7 @@ export interface PutKeyPolicyRequest {
|
|
|
504
506
|
BypassPolicyLockoutSafetyCheck?: boolean | undefined;
|
|
505
507
|
}
|
|
506
508
|
export interface ReEncryptRequest {
|
|
507
|
-
CiphertextBlob
|
|
509
|
+
CiphertextBlob?: Uint8Array | undefined;
|
|
508
510
|
SourceEncryptionContext?: Record<string, string> | undefined;
|
|
509
511
|
SourceKeyId?: string | undefined;
|
|
510
512
|
DestinationKeyId: string | undefined;
|
|
@@ -513,6 +515,7 @@ export interface ReEncryptRequest {
|
|
|
513
515
|
DestinationEncryptionAlgorithm?: EncryptionAlgorithmSpec | undefined;
|
|
514
516
|
GrantTokens?: string[] | undefined;
|
|
515
517
|
DryRun?: boolean | undefined;
|
|
518
|
+
DryRunModifiers?: DryRunModifierType[] | undefined;
|
|
516
519
|
}
|
|
517
520
|
export interface ReEncryptResponse {
|
|
518
521
|
CiphertextBlob?: Uint8Array | undefined;
|
package/package.json
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@aws-sdk/client-kms",
|
|
3
3
|
"description": "AWS SDK for JavaScript Kms Client for Node.js, Browser and React Native",
|
|
4
|
-
"version": "3.
|
|
4
|
+
"version": "3.991.0",
|
|
5
5
|
"scripts": {
|
|
6
6
|
"build": "concurrently 'yarn:build:types' 'yarn:build:es' && yarn build:cjs",
|
|
7
7
|
"build:cjs": "node ../../scripts/compilation/inline client-kms",
|
|
@@ -31,7 +31,7 @@
|
|
|
31
31
|
"@aws-sdk/middleware-user-agent": "^3.972.10",
|
|
32
32
|
"@aws-sdk/region-config-resolver": "^3.972.3",
|
|
33
33
|
"@aws-sdk/types": "^3.973.1",
|
|
34
|
-
"@aws-sdk/util-endpoints": "3.
|
|
34
|
+
"@aws-sdk/util-endpoints": "3.991.0",
|
|
35
35
|
"@aws-sdk/util-user-agent-browser": "^3.972.3",
|
|
36
36
|
"@aws-sdk/util-user-agent-node": "^3.972.8",
|
|
37
37
|
"@smithy/config-resolver": "^4.4.6",
|