@aws-sdk/client-kms 3.990.0 → 3.992.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/dist-cjs/index.js CHANGED
@@ -1009,6 +1009,9 @@ const DataKeySpec = {
1009
1009
  AES_128: "AES_128",
1010
1010
  AES_256: "AES_256",
1011
1011
  };
1012
+ const DryRunModifierType = {
1013
+ IGNORE_CIPHERTEXT: "IGNORE_CIPHERTEXT",
1014
+ };
1012
1015
  const KeyEncryptionMechanism = {
1013
1016
  RSAES_OAEP_SHA_256: "RSAES_OAEP_SHA_256",
1014
1017
  };
@@ -1081,6 +1084,7 @@ exports.DescribeKeyCommand = DescribeKeyCommand;
1081
1084
  exports.DisableKeyCommand = DisableKeyCommand;
1082
1085
  exports.DisableKeyRotationCommand = DisableKeyRotationCommand;
1083
1086
  exports.DisconnectCustomKeyStoreCommand = DisconnectCustomKeyStoreCommand;
1087
+ exports.DryRunModifierType = DryRunModifierType;
1084
1088
  exports.EnableKeyCommand = EnableKeyCommand;
1085
1089
  exports.EnableKeyRotationCommand = EnableKeyRotationCommand;
1086
1090
  exports.EncryptCommand = EncryptCommand;
@@ -88,6 +88,7 @@ const _DKRi = "DisableKeyRequest";
88
88
  const _DKRis = "DisableKeyRotation";
89
89
  const _DKi = "DisableKey";
90
90
  const _DR = "DryRun";
91
+ const _DRM = "DryRunModifiers";
91
92
  const _DROE = "DryRunOperationException";
92
93
  const _DRe = "DecryptRequest";
93
94
  const _DRec = "DecryptResponse";
@@ -741,8 +742,8 @@ exports.CustomKeyStoresListEntry$ = [3, n0, _CKSLE,
741
742
  ];
742
743
  exports.DecryptRequest$ = [3, n0, _DRe,
743
744
  0,
744
- [_CB, _EC, _GT, _KI, _EA, _R, _DR],
745
- [21, 128 | 0, 64 | 0, 0, 0, () => exports.RecipientInfo$, 2], 1
745
+ [_CB, _EC, _GT, _KI, _EA, _R, _DR, _DRM],
746
+ [21, 128 | 0, 64 | 0, 0, 0, () => exports.RecipientInfo$, 2, 64 | 0]
746
747
  ];
747
748
  exports.DecryptResponse$ = [3, n0, _DRec,
748
749
  0,
@@ -1061,8 +1062,8 @@ exports.RecipientInfo$ = [3, n0, _RI,
1061
1062
  ];
1062
1063
  exports.ReEncryptRequest$ = [3, n0, _RER,
1063
1064
  0,
1064
- [_CB, _DKI, _SEC, _SKI, _DEC, _SEA, _DEA, _GT, _DR],
1065
- [21, 0, 128 | 0, 0, 128 | 0, 0, 0, 64 | 0, 2], 2
1065
+ [_DKI, _CB, _SEC, _SKI, _DEC, _SEA, _DEA, _GT, _DR, _DRM],
1066
+ [0, 21, 128 | 0, 0, 128 | 0, 0, 0, 64 | 0, 2, 64 | 0], 1
1066
1067
  ];
1067
1068
  exports.ReEncryptResponse$ = [3, n0, _RERe,
1068
1069
  0,
@@ -1207,6 +1208,7 @@ var CustomKeyStoresList = [1, n0, _CKSL,
1207
1208
  0, [() => exports.CustomKeyStoresListEntry$,
1208
1209
  0]
1209
1210
  ];
1211
+ var DryRunModifierList = 64 | 0;
1210
1212
  var EncryptionAlgorithmSpecList = 64 | 0;
1211
1213
  var GrantList = [1, n0, _GL,
1212
1214
  0, () => exports.GrantListEntry$
@@ -173,6 +173,9 @@ export const DataKeySpec = {
173
173
  AES_128: "AES_128",
174
174
  AES_256: "AES_256",
175
175
  };
176
+ export const DryRunModifierType = {
177
+ IGNORE_CIPHERTEXT: "IGNORE_CIPHERTEXT",
178
+ };
176
179
  export const KeyEncryptionMechanism = {
177
180
  RSAES_OAEP_SHA_256: "RSAES_OAEP_SHA_256",
178
181
  };
@@ -81,6 +81,7 @@ const _DKRi = "DisableKeyRequest";
81
81
  const _DKRis = "DisableKeyRotation";
82
82
  const _DKi = "DisableKey";
83
83
  const _DR = "DryRun";
84
+ const _DRM = "DryRunModifiers";
84
85
  const _DROE = "DryRunOperationException";
85
86
  const _DRe = "DecryptRequest";
86
87
  const _DRec = "DecryptResponse";
@@ -734,8 +735,8 @@ export var CustomKeyStoresListEntry$ = [3, n0, _CKSLE,
734
735
  ];
735
736
  export var DecryptRequest$ = [3, n0, _DRe,
736
737
  0,
737
- [_CB, _EC, _GT, _KI, _EA, _R, _DR],
738
- [21, 128 | 0, 64 | 0, 0, 0, () => RecipientInfo$, 2], 1
738
+ [_CB, _EC, _GT, _KI, _EA, _R, _DR, _DRM],
739
+ [21, 128 | 0, 64 | 0, 0, 0, () => RecipientInfo$, 2, 64 | 0]
739
740
  ];
740
741
  export var DecryptResponse$ = [3, n0, _DRec,
741
742
  0,
@@ -1054,8 +1055,8 @@ export var RecipientInfo$ = [3, n0, _RI,
1054
1055
  ];
1055
1056
  export var ReEncryptRequest$ = [3, n0, _RER,
1056
1057
  0,
1057
- [_CB, _DKI, _SEC, _SKI, _DEC, _SEA, _DEA, _GT, _DR],
1058
- [21, 0, 128 | 0, 0, 128 | 0, 0, 0, 64 | 0, 2], 2
1058
+ [_DKI, _CB, _SEC, _SKI, _DEC, _SEA, _DEA, _GT, _DR, _DRM],
1059
+ [0, 21, 128 | 0, 0, 128 | 0, 0, 0, 64 | 0, 2, 64 | 0], 1
1059
1060
  ];
1060
1061
  export var ReEncryptResponse$ = [3, n0, _RERe,
1061
1062
  0,
@@ -1200,6 +1201,7 @@ var CustomKeyStoresList = [1, n0, _CKSL,
1200
1201
  0, [() => CustomKeyStoresListEntry$,
1201
1202
  0]
1202
1203
  ];
1204
+ var DryRunModifierList = 64 | 0;
1203
1205
  var EncryptionAlgorithmSpecList = 64 | 0;
1204
1206
  var GrantList = [1, n0, _GL,
1205
1207
  0, () => GrantListEntry$
@@ -94,6 +94,7 @@ export interface KMS {
94
94
  /**
95
95
  * @see {@link DecryptCommand}
96
96
  */
97
+ decrypt(): Promise<DecryptCommandOutput>;
97
98
  decrypt(args: DecryptCommandInput, options?: __HttpHandlerOptions): Promise<DecryptCommandOutput>;
98
99
  decrypt(args: DecryptCommandInput, cb: (err: any, data?: DecryptCommandOutput) => void): void;
99
100
  decrypt(args: DecryptCommandInput, options: __HttpHandlerOptions, cb: (err: any, data?: DecryptCommandOutput) => void): void;
@@ -93,7 +93,6 @@ declare const CreateKeyCommand_base: {
93
93
  * <p> </p>
94
94
  * </dd>
95
95
  * <dt>Multi-Region primary keys</dt>
96
- * <dt>Imported key material</dt>
97
96
  * <dd>
98
97
  * <p>To create a multi-Region <i>primary key</i> in the local Amazon Web Services Region,
99
98
  * use the <code>MultiRegion</code> parameter with a value of <code>True</code>. To create
@@ -111,6 +110,7 @@ declare const CreateKeyCommand_base: {
111
110
  * it in a different Amazon Web Services Region without re-encrypting the data or making a cross-Region call. For more information about multi-Region keys, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/multi-region-keys-overview.html">Multi-Region keys in KMS</a> in the <i>Key Management Service Developer Guide</i>.</p>
112
111
  * <p> </p>
113
112
  * </dd>
113
+ * <dt>Imported key material</dt>
114
114
  * <dd>
115
115
  * <p>To import your own key material into a KMS key, begin by creating a KMS key with no
116
116
  * key material. To do this, use the <code>Origin</code> parameter of
@@ -23,7 +23,7 @@ export interface DecryptCommandOutput extends DecryptResponse, __MetadataBearer
23
23
  }
24
24
  declare const DecryptCommand_base: {
25
25
  new (input: DecryptCommandInput): import("@smithy/smithy-client").CommandImpl<DecryptCommandInput, DecryptCommandOutput, KMSClientResolvedConfig, ServiceInputTypes, ServiceOutputTypes>;
26
- new (input: DecryptCommandInput): import("@smithy/smithy-client").CommandImpl<DecryptCommandInput, DecryptCommandOutput, KMSClientResolvedConfig, ServiceInputTypes, ServiceOutputTypes>;
26
+ new (...[input]: [] | [DecryptCommandInput]): import("@smithy/smithy-client").CommandImpl<DecryptCommandInput, DecryptCommandOutput, KMSClientResolvedConfig, ServiceInputTypes, ServiceOutputTypes>;
27
27
  getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
28
28
  };
29
29
  /**
@@ -133,7 +133,7 @@ declare const DecryptCommand_base: {
133
133
  * const config = {}; // type is KMSClientConfig
134
134
  * const client = new KMSClient(config);
135
135
  * const input = { // DecryptRequest
136
- * CiphertextBlob: new Uint8Array(), // e.g. Buffer.from("") or new TextEncoder().encode("") // required
136
+ * CiphertextBlob: new Uint8Array(), // e.g. Buffer.from("") or new TextEncoder().encode("")
137
137
  * EncryptionContext: { // EncryptionContextType
138
138
  * "<keys>": "STRING_VALUE",
139
139
  * },
@@ -147,6 +147,9 @@ declare const DecryptCommand_base: {
147
147
  * AttestationDocument: new Uint8Array(), // e.g. Buffer.from("") or new TextEncoder().encode("")
148
148
  * },
149
149
  * DryRun: true || false,
150
+ * DryRunModifiers: [ // DryRunModifierList
151
+ * "IGNORE_CIPHERTEXT",
152
+ * ],
150
153
  * };
151
154
  * const command = new DecryptCommand(input);
152
155
  * const response = await client.send(command);
@@ -131,7 +131,7 @@ declare const ReEncryptCommand_base: {
131
131
  * const config = {}; // type is KMSClientConfig
132
132
  * const client = new KMSClient(config);
133
133
  * const input = { // ReEncryptRequest
134
- * CiphertextBlob: new Uint8Array(), // e.g. Buffer.from("") or new TextEncoder().encode("") // required
134
+ * CiphertextBlob: new Uint8Array(), // e.g. Buffer.from("") or new TextEncoder().encode("")
135
135
  * SourceEncryptionContext: { // EncryptionContextType
136
136
  * "<keys>": "STRING_VALUE",
137
137
  * },
@@ -146,6 +146,9 @@ declare const ReEncryptCommand_base: {
146
146
  * "STRING_VALUE",
147
147
  * ],
148
148
  * DryRun: true || false,
149
+ * DryRunModifiers: [ // DryRunModifierList
150
+ * "IGNORE_CIPHERTEXT",
151
+ * ],
149
152
  * };
150
153
  * const command = new ReEncryptCommand(input);
151
154
  * const response = await client.send(command);
@@ -37,7 +37,7 @@ declare const RotateKeyOnDemandCommand_base: {
37
37
  * 2024, and you perform an on-demand rotation on April 10, 2024, the key will automatically
38
38
  * rotate, as scheduled, on April 14, 2024 and every 730 days thereafter.</p>
39
39
  * <note>
40
- * <p>You can perform on-demand key rotation a <b>maximum of 10
40
+ * <p>You can perform on-demand key rotation a <b>maximum of 25
41
41
  * times</b> per KMS key. You can use the KMS console to view the number of
42
42
  * remaining on-demand rotations available for a KMS key.</p>
43
43
  * </note>
@@ -333,6 +333,17 @@ export declare const DataKeySpec: {
333
333
  * @public
334
334
  */
335
335
  export type DataKeySpec = (typeof DataKeySpec)[keyof typeof DataKeySpec];
336
+ /**
337
+ * @public
338
+ * @enum
339
+ */
340
+ export declare const DryRunModifierType: {
341
+ readonly IGNORE_CIPHERTEXT: "IGNORE_CIPHERTEXT";
342
+ };
343
+ /**
344
+ * @public
345
+ */
346
+ export type DryRunModifierType = (typeof DryRunModifierType)[keyof typeof DryRunModifierType];
336
347
  /**
337
348
  * @public
338
349
  * @enum
@@ -1,4 +1,4 @@
1
- import { AlgorithmSpec, ConnectionErrorCodeType, ConnectionStateType, CustomerMasterKeySpec, CustomKeyStoreType, DataKeyPairSpec, DataKeySpec, EncryptionAlgorithmSpec, ExpirationModelType, GrantOperation, ImportState, ImportType, IncludeKeyMaterial, KeyAgreementAlgorithmSpec, KeyEncryptionMechanism, KeyManagerType, KeyMaterialState, KeySpec, KeyState, KeyUsageType, MacAlgorithmSpec, MessageType, MultiRegionKeyType, OriginType, RotationType, SigningAlgorithmSpec, WrappingKeySpec, XksProxyConnectivityType } from "./enums";
1
+ import { AlgorithmSpec, ConnectionErrorCodeType, ConnectionStateType, CustomerMasterKeySpec, CustomKeyStoreType, DataKeyPairSpec, DataKeySpec, DryRunModifierType, EncryptionAlgorithmSpec, ExpirationModelType, GrantOperation, ImportState, ImportType, IncludeKeyMaterial, KeyAgreementAlgorithmSpec, KeyEncryptionMechanism, KeyManagerType, KeyMaterialState, KeySpec, KeyState, KeyUsageType, MacAlgorithmSpec, MessageType, MultiRegionKeyType, OriginType, RotationType, SigningAlgorithmSpec, WrappingKeySpec, XksProxyConnectivityType } from "./enums";
2
2
  /**
3
3
  * <p>Contains information about an alias.</p>
4
4
  * @public
@@ -1539,9 +1539,10 @@ export interface RecipientInfo {
1539
1539
  export interface DecryptRequest {
1540
1540
  /**
1541
1541
  * <p>Ciphertext to be decrypted. The blob includes metadata.</p>
1542
+ * <p>This parameter is required in all cases except when <code>DryRun</code> is <code>true</code> and <code>DryRunModifiers</code> is set to <code>IGNORE_CIPHERTEXT</code>.</p>
1542
1543
  * @public
1543
1544
  */
1544
- CiphertextBlob: Uint8Array | undefined;
1545
+ CiphertextBlob?: Uint8Array | undefined;
1545
1546
  /**
1546
1547
  * <p>Specifies the encryption context to use when decrypting the data.
1547
1548
  * An encryption context is valid only for <a href="https://docs.aws.amazon.com/kms/latest/developerguide/kms-cryptography.html#cryptographic-operations">cryptographic operations</a> with a symmetric encryption KMS key. The standard asymmetric encryption algorithms and HMAC algorithms that KMS uses do not support an encryption context.</p>
@@ -1566,7 +1567,7 @@ export interface DecryptRequest {
1566
1567
  * different KMS key, the <code>Decrypt</code> operation throws an
1567
1568
  * <code>IncorrectKeyException</code>.</p>
1568
1569
  * <p>This parameter is required only when the ciphertext was encrypted under an asymmetric KMS
1569
- * key. If you used a symmetric encryption KMS key, KMS can get the KMS key from metadata that
1570
+ * key or when <code>DryRun</code> is <code>true</code> and <code>DryRunModifiers</code> is set to <code>IGNORE_CIPHERTEXT</code>. If you used a symmetric encryption KMS key, KMS can get the KMS key from metadata that
1570
1571
  * it adds to the symmetric ciphertext blob. However, it is always recommended as a best
1571
1572
  * practice. This practice ensures that you use the KMS key that you intend.</p>
1572
1573
  * <p>To specify a KMS key, use its key ID, key ARN, alias name, or alias ARN. When using an alias name, prefix it with <code>"alias/"</code>. To specify a KMS key in a different Amazon Web Services account, you must use the key ARN or alias ARN.</p>
@@ -1625,6 +1626,16 @@ export interface DecryptRequest {
1625
1626
  * @public
1626
1627
  */
1627
1628
  DryRun?: boolean | undefined;
1629
+ /**
1630
+ * <p>Specifies the modifiers to apply to the dry run operation. <code>DryRunModifiers</code> is an optional parameter that only applies when <code>DryRun</code> is
1631
+ * set to <code>true</code>.</p>
1632
+ * <p>When set to <code>IGNORE_CIPHERTEXT</code>, KMS performs only authorization validation without ciphertext validation. This allows you to test permissions
1633
+ * without requiring a valid ciphertext blob.</p>
1634
+ * <p>To learn more about how to use this parameter, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/testing-permissions.html">Testing your
1635
+ * permissions</a> in the <i>Key Management Service Developer Guide</i>.</p>
1636
+ * @public
1637
+ */
1638
+ DryRunModifiers?: DryRunModifierType[] | undefined;
1628
1639
  }
1629
1640
  /**
1630
1641
  * @public
@@ -3906,9 +3917,10 @@ export interface PutKeyPolicyRequest {
3906
3917
  export interface ReEncryptRequest {
3907
3918
  /**
3908
3919
  * <p>Ciphertext of the data to reencrypt.</p>
3920
+ * <p>This parameter is required in all cases except when <code>DryRun</code> is <code>true</code> and <code>DryRunModifiers</code> is set to <code>IGNORE_CIPHERTEXT</code>.</p>
3909
3921
  * @public
3910
3922
  */
3911
- CiphertextBlob: Uint8Array | undefined;
3923
+ CiphertextBlob?: Uint8Array | undefined;
3912
3924
  /**
3913
3925
  * <p>Specifies the encryption context to use to decrypt the ciphertext. Enter the same
3914
3926
  * encryption context that was used to encrypt the ciphertext.</p>
@@ -3927,8 +3939,9 @@ export interface ReEncryptRequest {
3927
3939
  * different KMS key, the <code>ReEncrypt</code> operation throws an
3928
3940
  * <code>IncorrectKeyException</code>.</p>
3929
3941
  * <p>This parameter is required only when the ciphertext was encrypted under an asymmetric KMS
3930
- * key. If you used a symmetric encryption KMS key, KMS can get the KMS key from metadata that
3931
- * it adds to the symmetric ciphertext blob. However, it is always recommended as a best
3942
+ * key or when <code>DryRun</code> is <code>true</code> and <code>DryRunModifiers</code> is set to
3943
+ * <code>IGNORE_CIPHERTEXT</code>. If you used a symmetric encryption KMS key, KMS can get the KMS key
3944
+ * from metadata that it adds to the symmetric ciphertext blob. However, it is always recommended as a best
3932
3945
  * practice. This practice ensures that you use the KMS key that you intend.</p>
3933
3946
  * <p>To specify a KMS key, use its key ID, key ARN, alias name, or alias ARN. When using an alias name, prefix it with <code>"alias/"</code>. To specify a KMS key in a different Amazon Web Services account, you must use the key ARN or alias ARN.</p>
3934
3947
  * <p>For example:</p>
@@ -4032,6 +4045,16 @@ export interface ReEncryptRequest {
4032
4045
  * @public
4033
4046
  */
4034
4047
  DryRun?: boolean | undefined;
4048
+ /**
4049
+ * <p>Specifies the modifiers to apply to the dry run operation. <code>DryRunModifiers</code> is an optional parameter that only applies when <code>DryRun</code> is
4050
+ * set to <code>true</code>.</p>
4051
+ * <p>When set to <code>IGNORE_CIPHERTEXT</code>, KMS performs only authorization validation without ciphertext validation. This allows you to test permissions
4052
+ * without requiring a valid ciphertext blob.</p>
4053
+ * <p>To learn more about how to use this parameter, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/testing-permissions.html">Testing your
4054
+ * permissions</a> in the <i>Key Management Service Developer Guide</i>.</p>
4055
+ * @public
4056
+ */
4057
+ DryRunModifiers?: DryRunModifierType[] | undefined;
4035
4058
  }
4036
4059
  /**
4037
4060
  * @public
@@ -293,6 +293,7 @@ export interface KMS {
293
293
  options: __HttpHandlerOptions,
294
294
  cb: (err: any, data?: CreateKeyCommandOutput) => void
295
295
  ): void;
296
+ decrypt(): Promise<DecryptCommandOutput>;
296
297
  decrypt(
297
298
  args: DecryptCommandInput,
298
299
  options?: __HttpHandlerOptions
@@ -20,7 +20,9 @@ declare const DecryptCommand_base: {
20
20
  ServiceInputTypes,
21
21
  ServiceOutputTypes
22
22
  >;
23
- new (input: DecryptCommandInput): import("@smithy/smithy-client").CommandImpl<
23
+ new (
24
+ ...[input]: [] | [DecryptCommandInput]
25
+ ): import("@smithy/smithy-client").CommandImpl<
24
26
  DecryptCommandInput,
25
27
  DecryptCommandOutput,
26
28
  KMSClientResolvedConfig,
@@ -207,6 +207,11 @@ export declare const DataKeySpec: {
207
207
  readonly AES_256: "AES_256";
208
208
  };
209
209
  export type DataKeySpec = (typeof DataKeySpec)[keyof typeof DataKeySpec];
210
+ export declare const DryRunModifierType: {
211
+ readonly IGNORE_CIPHERTEXT: "IGNORE_CIPHERTEXT";
212
+ };
213
+ export type DryRunModifierType =
214
+ (typeof DryRunModifierType)[keyof typeof DryRunModifierType];
210
215
  export declare const KeyEncryptionMechanism: {
211
216
  readonly RSAES_OAEP_SHA_256: "RSAES_OAEP_SHA_256";
212
217
  };
@@ -6,6 +6,7 @@ import {
6
6
  CustomKeyStoreType,
7
7
  DataKeyPairSpec,
8
8
  DataKeySpec,
9
+ DryRunModifierType,
9
10
  EncryptionAlgorithmSpec,
10
11
  ExpirationModelType,
11
12
  GrantOperation,
@@ -173,13 +174,14 @@ export interface RecipientInfo {
173
174
  AttestationDocument?: Uint8Array | undefined;
174
175
  }
175
176
  export interface DecryptRequest {
176
- CiphertextBlob: Uint8Array | undefined;
177
+ CiphertextBlob?: Uint8Array | undefined;
177
178
  EncryptionContext?: Record<string, string> | undefined;
178
179
  GrantTokens?: string[] | undefined;
179
180
  KeyId?: string | undefined;
180
181
  EncryptionAlgorithm?: EncryptionAlgorithmSpec | undefined;
181
182
  Recipient?: RecipientInfo | undefined;
182
183
  DryRun?: boolean | undefined;
184
+ DryRunModifiers?: DryRunModifierType[] | undefined;
183
185
  }
184
186
  export interface DecryptResponse {
185
187
  KeyId?: string | undefined;
@@ -504,7 +506,7 @@ export interface PutKeyPolicyRequest {
504
506
  BypassPolicyLockoutSafetyCheck?: boolean | undefined;
505
507
  }
506
508
  export interface ReEncryptRequest {
507
- CiphertextBlob: Uint8Array | undefined;
509
+ CiphertextBlob?: Uint8Array | undefined;
508
510
  SourceEncryptionContext?: Record<string, string> | undefined;
509
511
  SourceKeyId?: string | undefined;
510
512
  DestinationKeyId: string | undefined;
@@ -513,6 +515,7 @@ export interface ReEncryptRequest {
513
515
  DestinationEncryptionAlgorithm?: EncryptionAlgorithmSpec | undefined;
514
516
  GrantTokens?: string[] | undefined;
515
517
  DryRun?: boolean | undefined;
518
+ DryRunModifiers?: DryRunModifierType[] | undefined;
516
519
  }
517
520
  export interface ReEncryptResponse {
518
521
  CiphertextBlob?: Uint8Array | undefined;
package/package.json CHANGED
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "name": "@aws-sdk/client-kms",
3
3
  "description": "AWS SDK for JavaScript Kms Client for Node.js, Browser and React Native",
4
- "version": "3.990.0",
4
+ "version": "3.992.0",
5
5
  "scripts": {
6
6
  "build": "concurrently 'yarn:build:types' 'yarn:build:es' && yarn build:cjs",
7
7
  "build:cjs": "node ../../scripts/compilation/inline client-kms",
@@ -31,7 +31,7 @@
31
31
  "@aws-sdk/middleware-user-agent": "^3.972.10",
32
32
  "@aws-sdk/region-config-resolver": "^3.972.3",
33
33
  "@aws-sdk/types": "^3.973.1",
34
- "@aws-sdk/util-endpoints": "3.990.0",
34
+ "@aws-sdk/util-endpoints": "3.992.0",
35
35
  "@aws-sdk/util-user-agent-browser": "^3.972.3",
36
36
  "@aws-sdk/util-user-agent-node": "^3.972.8",
37
37
  "@smithy/config-resolver": "^4.4.6",