@aws-sdk/client-payment-cryptography-data 3.928.0 → 3.930.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist-cjs/index.js +1282 -1477
- package/dist-cjs/runtimeConfig.shared.js +2 -0
- package/dist-es/PaymentCryptographyDataClient.js +2 -0
- package/dist-es/commands/DecryptDataCommand.js +3 -10
- package/dist-es/commands/EncryptDataCommand.js +3 -10
- package/dist-es/commands/GenerateCardValidationDataCommand.js +3 -10
- package/dist-es/commands/GenerateMacCommand.js +3 -10
- package/dist-es/commands/GenerateMacEmvPinChangeCommand.js +3 -10
- package/dist-es/commands/GeneratePinDataCommand.js +3 -10
- package/dist-es/commands/ReEncryptDataCommand.js +3 -10
- package/dist-es/commands/TranslateKeyMaterialCommand.js +3 -10
- package/dist-es/commands/TranslatePinDataCommand.js +3 -10
- package/dist-es/commands/VerifyAuthRequestCryptogramCommand.js +3 -10
- package/dist-es/commands/VerifyCardValidationDataCommand.js +3 -10
- package/dist-es/commands/VerifyMacCommand.js +3 -10
- package/dist-es/commands/VerifyPinDataCommand.js +3 -10
- package/dist-es/models/models_0.js +0 -729
- package/dist-es/runtimeConfig.shared.js +2 -0
- package/dist-es/schemas/schemas_0.js +1238 -0
- package/dist-types/PaymentCryptographyDataClient.d.ts +10 -1
- package/dist-types/models/models_0.d.ts +68 -305
- package/dist-types/runtimeConfig.browser.d.ts +1 -0
- package/dist-types/runtimeConfig.d.ts +1 -0
- package/dist-types/runtimeConfig.native.d.ts +1 -0
- package/dist-types/runtimeConfig.shared.d.ts +1 -0
- package/dist-types/schemas/schemas_0.d.ts +141 -0
- package/dist-types/ts3.4/PaymentCryptographyDataClient.d.ts +4 -0
- package/dist-types/ts3.4/models/models_0.d.ts +0 -235
- package/dist-types/ts3.4/runtimeConfig.browser.d.ts +4 -0
- package/dist-types/ts3.4/runtimeConfig.d.ts +4 -0
- package/dist-types/ts3.4/runtimeConfig.native.d.ts +4 -0
- package/dist-types/ts3.4/runtimeConfig.shared.d.ts +4 -0
- package/dist-types/ts3.4/schemas/schemas_0.d.ts +147 -0
- package/package.json +33 -33
- package/dist-es/protocols/Aws_restJson1.js +0 -570
- package/dist-types/protocols/Aws_restJson1.d.ts +0 -119
- package/dist-types/ts3.4/protocols/Aws_restJson1.d.ts +0 -161
|
@@ -1,570 +0,0 @@
|
|
|
1
|
-
import { awsExpectUnion as __expectUnion, loadRestJsonErrorCode, parseJsonBody as parseBody, parseJsonErrorBody as parseErrorBody, } from "@aws-sdk/core";
|
|
2
|
-
import { requestBuilder as rb } from "@smithy/core";
|
|
3
|
-
import { _json, collectBody, decorateServiceException as __decorateServiceException, expectNonNull as __expectNonNull, expectObject as __expectObject, expectString as __expectString, map, take, withBaseException, } from "@smithy/smithy-client";
|
|
4
|
-
import { AccessDeniedException, InternalServerException, ResourceNotFoundException, ThrottlingException, ValidationException, VerificationFailedException, } from "../models/models_0";
|
|
5
|
-
import { PaymentCryptographyDataServiceException as __BaseException } from "../models/PaymentCryptographyDataServiceException";
|
|
6
|
-
export const se_DecryptDataCommand = async (input, context) => {
|
|
7
|
-
const b = rb(input, context);
|
|
8
|
-
const headers = {
|
|
9
|
-
"content-type": "application/json",
|
|
10
|
-
};
|
|
11
|
-
b.bp("/keys/{KeyIdentifier}/decrypt");
|
|
12
|
-
b.p("KeyIdentifier", () => input.KeyIdentifier, "{KeyIdentifier}", false);
|
|
13
|
-
let body;
|
|
14
|
-
body = JSON.stringify(take(input, {
|
|
15
|
-
CipherText: [],
|
|
16
|
-
DecryptionAttributes: (_) => _json(_),
|
|
17
|
-
WrappedKey: (_) => _json(_),
|
|
18
|
-
}));
|
|
19
|
-
b.m("POST").h(headers).b(body);
|
|
20
|
-
return b.build();
|
|
21
|
-
};
|
|
22
|
-
export const se_EncryptDataCommand = async (input, context) => {
|
|
23
|
-
const b = rb(input, context);
|
|
24
|
-
const headers = {
|
|
25
|
-
"content-type": "application/json",
|
|
26
|
-
};
|
|
27
|
-
b.bp("/keys/{KeyIdentifier}/encrypt");
|
|
28
|
-
b.p("KeyIdentifier", () => input.KeyIdentifier, "{KeyIdentifier}", false);
|
|
29
|
-
let body;
|
|
30
|
-
body = JSON.stringify(take(input, {
|
|
31
|
-
EncryptionAttributes: (_) => _json(_),
|
|
32
|
-
PlainText: [],
|
|
33
|
-
WrappedKey: (_) => _json(_),
|
|
34
|
-
}));
|
|
35
|
-
b.m("POST").h(headers).b(body);
|
|
36
|
-
return b.build();
|
|
37
|
-
};
|
|
38
|
-
export const se_GenerateCardValidationDataCommand = async (input, context) => {
|
|
39
|
-
const b = rb(input, context);
|
|
40
|
-
const headers = {
|
|
41
|
-
"content-type": "application/json",
|
|
42
|
-
};
|
|
43
|
-
b.bp("/cardvalidationdata/generate");
|
|
44
|
-
let body;
|
|
45
|
-
body = JSON.stringify(take(input, {
|
|
46
|
-
GenerationAttributes: (_) => _json(_),
|
|
47
|
-
KeyIdentifier: [],
|
|
48
|
-
PrimaryAccountNumber: [],
|
|
49
|
-
ValidationDataLength: [],
|
|
50
|
-
}));
|
|
51
|
-
b.m("POST").h(headers).b(body);
|
|
52
|
-
return b.build();
|
|
53
|
-
};
|
|
54
|
-
export const se_GenerateMacCommand = async (input, context) => {
|
|
55
|
-
const b = rb(input, context);
|
|
56
|
-
const headers = {
|
|
57
|
-
"content-type": "application/json",
|
|
58
|
-
};
|
|
59
|
-
b.bp("/mac/generate");
|
|
60
|
-
let body;
|
|
61
|
-
body = JSON.stringify(take(input, {
|
|
62
|
-
GenerationAttributes: (_) => _json(_),
|
|
63
|
-
KeyIdentifier: [],
|
|
64
|
-
MacLength: [],
|
|
65
|
-
MessageData: [],
|
|
66
|
-
}));
|
|
67
|
-
b.m("POST").h(headers).b(body);
|
|
68
|
-
return b.build();
|
|
69
|
-
};
|
|
70
|
-
export const se_GenerateMacEmvPinChangeCommand = async (input, context) => {
|
|
71
|
-
const b = rb(input, context);
|
|
72
|
-
const headers = {
|
|
73
|
-
"content-type": "application/json",
|
|
74
|
-
};
|
|
75
|
-
b.bp("/macemvpinchange/generate");
|
|
76
|
-
let body;
|
|
77
|
-
body = JSON.stringify(take(input, {
|
|
78
|
-
DerivationMethodAttributes: (_) => _json(_),
|
|
79
|
-
MessageData: [],
|
|
80
|
-
NewEncryptedPinBlock: [],
|
|
81
|
-
NewPinPekIdentifier: [],
|
|
82
|
-
PinBlockFormat: [],
|
|
83
|
-
SecureMessagingConfidentialityKeyIdentifier: [],
|
|
84
|
-
SecureMessagingIntegrityKeyIdentifier: [],
|
|
85
|
-
}));
|
|
86
|
-
b.m("POST").h(headers).b(body);
|
|
87
|
-
return b.build();
|
|
88
|
-
};
|
|
89
|
-
export const se_GeneratePinDataCommand = async (input, context) => {
|
|
90
|
-
const b = rb(input, context);
|
|
91
|
-
const headers = {
|
|
92
|
-
"content-type": "application/json",
|
|
93
|
-
};
|
|
94
|
-
b.bp("/pindata/generate");
|
|
95
|
-
let body;
|
|
96
|
-
body = JSON.stringify(take(input, {
|
|
97
|
-
EncryptionKeyIdentifier: [],
|
|
98
|
-
EncryptionWrappedKey: (_) => _json(_),
|
|
99
|
-
GenerationAttributes: (_) => _json(_),
|
|
100
|
-
GenerationKeyIdentifier: [],
|
|
101
|
-
PinBlockFormat: [],
|
|
102
|
-
PinDataLength: [],
|
|
103
|
-
PrimaryAccountNumber: [],
|
|
104
|
-
}));
|
|
105
|
-
b.m("POST").h(headers).b(body);
|
|
106
|
-
return b.build();
|
|
107
|
-
};
|
|
108
|
-
export const se_ReEncryptDataCommand = async (input, context) => {
|
|
109
|
-
const b = rb(input, context);
|
|
110
|
-
const headers = {
|
|
111
|
-
"content-type": "application/json",
|
|
112
|
-
};
|
|
113
|
-
b.bp("/keys/{IncomingKeyIdentifier}/reencrypt");
|
|
114
|
-
b.p("IncomingKeyIdentifier", () => input.IncomingKeyIdentifier, "{IncomingKeyIdentifier}", false);
|
|
115
|
-
let body;
|
|
116
|
-
body = JSON.stringify(take(input, {
|
|
117
|
-
CipherText: [],
|
|
118
|
-
IncomingEncryptionAttributes: (_) => _json(_),
|
|
119
|
-
IncomingWrappedKey: (_) => _json(_),
|
|
120
|
-
OutgoingEncryptionAttributes: (_) => _json(_),
|
|
121
|
-
OutgoingKeyIdentifier: [],
|
|
122
|
-
OutgoingWrappedKey: (_) => _json(_),
|
|
123
|
-
}));
|
|
124
|
-
b.m("POST").h(headers).b(body);
|
|
125
|
-
return b.build();
|
|
126
|
-
};
|
|
127
|
-
export const se_TranslateKeyMaterialCommand = async (input, context) => {
|
|
128
|
-
const b = rb(input, context);
|
|
129
|
-
const headers = {
|
|
130
|
-
"content-type": "application/json",
|
|
131
|
-
};
|
|
132
|
-
b.bp("/keymaterial/translate");
|
|
133
|
-
let body;
|
|
134
|
-
body = JSON.stringify(take(input, {
|
|
135
|
-
IncomingKeyMaterial: (_) => _json(_),
|
|
136
|
-
KeyCheckValueAlgorithm: [],
|
|
137
|
-
OutgoingKeyMaterial: (_) => _json(_),
|
|
138
|
-
}));
|
|
139
|
-
b.m("POST").h(headers).b(body);
|
|
140
|
-
return b.build();
|
|
141
|
-
};
|
|
142
|
-
export const se_TranslatePinDataCommand = async (input, context) => {
|
|
143
|
-
const b = rb(input, context);
|
|
144
|
-
const headers = {
|
|
145
|
-
"content-type": "application/json",
|
|
146
|
-
};
|
|
147
|
-
b.bp("/pindata/translate");
|
|
148
|
-
let body;
|
|
149
|
-
body = JSON.stringify(take(input, {
|
|
150
|
-
EncryptedPinBlock: [],
|
|
151
|
-
IncomingDukptAttributes: (_) => _json(_),
|
|
152
|
-
IncomingKeyIdentifier: [],
|
|
153
|
-
IncomingTranslationAttributes: (_) => _json(_),
|
|
154
|
-
IncomingWrappedKey: (_) => _json(_),
|
|
155
|
-
OutgoingDukptAttributes: (_) => _json(_),
|
|
156
|
-
OutgoingKeyIdentifier: [],
|
|
157
|
-
OutgoingTranslationAttributes: (_) => _json(_),
|
|
158
|
-
OutgoingWrappedKey: (_) => _json(_),
|
|
159
|
-
}));
|
|
160
|
-
b.m("POST").h(headers).b(body);
|
|
161
|
-
return b.build();
|
|
162
|
-
};
|
|
163
|
-
export const se_VerifyAuthRequestCryptogramCommand = async (input, context) => {
|
|
164
|
-
const b = rb(input, context);
|
|
165
|
-
const headers = {
|
|
166
|
-
"content-type": "application/json",
|
|
167
|
-
};
|
|
168
|
-
b.bp("/cryptogram/verify");
|
|
169
|
-
let body;
|
|
170
|
-
body = JSON.stringify(take(input, {
|
|
171
|
-
AuthRequestCryptogram: [],
|
|
172
|
-
AuthResponseAttributes: (_) => _json(_),
|
|
173
|
-
KeyIdentifier: [],
|
|
174
|
-
MajorKeyDerivationMode: [],
|
|
175
|
-
SessionKeyDerivationAttributes: (_) => _json(_),
|
|
176
|
-
TransactionData: [],
|
|
177
|
-
}));
|
|
178
|
-
b.m("POST").h(headers).b(body);
|
|
179
|
-
return b.build();
|
|
180
|
-
};
|
|
181
|
-
export const se_VerifyCardValidationDataCommand = async (input, context) => {
|
|
182
|
-
const b = rb(input, context);
|
|
183
|
-
const headers = {
|
|
184
|
-
"content-type": "application/json",
|
|
185
|
-
};
|
|
186
|
-
b.bp("/cardvalidationdata/verify");
|
|
187
|
-
let body;
|
|
188
|
-
body = JSON.stringify(take(input, {
|
|
189
|
-
KeyIdentifier: [],
|
|
190
|
-
PrimaryAccountNumber: [],
|
|
191
|
-
ValidationData: [],
|
|
192
|
-
VerificationAttributes: (_) => _json(_),
|
|
193
|
-
}));
|
|
194
|
-
b.m("POST").h(headers).b(body);
|
|
195
|
-
return b.build();
|
|
196
|
-
};
|
|
197
|
-
export const se_VerifyMacCommand = async (input, context) => {
|
|
198
|
-
const b = rb(input, context);
|
|
199
|
-
const headers = {
|
|
200
|
-
"content-type": "application/json",
|
|
201
|
-
};
|
|
202
|
-
b.bp("/mac/verify");
|
|
203
|
-
let body;
|
|
204
|
-
body = JSON.stringify(take(input, {
|
|
205
|
-
KeyIdentifier: [],
|
|
206
|
-
Mac: [],
|
|
207
|
-
MacLength: [],
|
|
208
|
-
MessageData: [],
|
|
209
|
-
VerificationAttributes: (_) => _json(_),
|
|
210
|
-
}));
|
|
211
|
-
b.m("POST").h(headers).b(body);
|
|
212
|
-
return b.build();
|
|
213
|
-
};
|
|
214
|
-
export const se_VerifyPinDataCommand = async (input, context) => {
|
|
215
|
-
const b = rb(input, context);
|
|
216
|
-
const headers = {
|
|
217
|
-
"content-type": "application/json",
|
|
218
|
-
};
|
|
219
|
-
b.bp("/pindata/verify");
|
|
220
|
-
let body;
|
|
221
|
-
body = JSON.stringify(take(input, {
|
|
222
|
-
DukptAttributes: (_) => _json(_),
|
|
223
|
-
EncryptedPinBlock: [],
|
|
224
|
-
EncryptionKeyIdentifier: [],
|
|
225
|
-
EncryptionWrappedKey: (_) => _json(_),
|
|
226
|
-
PinBlockFormat: [],
|
|
227
|
-
PinDataLength: [],
|
|
228
|
-
PrimaryAccountNumber: [],
|
|
229
|
-
VerificationAttributes: (_) => _json(_),
|
|
230
|
-
VerificationKeyIdentifier: [],
|
|
231
|
-
}));
|
|
232
|
-
b.m("POST").h(headers).b(body);
|
|
233
|
-
return b.build();
|
|
234
|
-
};
|
|
235
|
-
export const de_DecryptDataCommand = async (output, context) => {
|
|
236
|
-
if (output.statusCode !== 200 && output.statusCode >= 300) {
|
|
237
|
-
return de_CommandError(output, context);
|
|
238
|
-
}
|
|
239
|
-
const contents = map({
|
|
240
|
-
$metadata: deserializeMetadata(output),
|
|
241
|
-
});
|
|
242
|
-
const data = __expectNonNull(__expectObject(await parseBody(output.body, context)), "body");
|
|
243
|
-
const doc = take(data, {
|
|
244
|
-
KeyArn: __expectString,
|
|
245
|
-
KeyCheckValue: __expectString,
|
|
246
|
-
PlainText: __expectString,
|
|
247
|
-
});
|
|
248
|
-
Object.assign(contents, doc);
|
|
249
|
-
return contents;
|
|
250
|
-
};
|
|
251
|
-
export const de_EncryptDataCommand = async (output, context) => {
|
|
252
|
-
if (output.statusCode !== 200 && output.statusCode >= 300) {
|
|
253
|
-
return de_CommandError(output, context);
|
|
254
|
-
}
|
|
255
|
-
const contents = map({
|
|
256
|
-
$metadata: deserializeMetadata(output),
|
|
257
|
-
});
|
|
258
|
-
const data = __expectNonNull(__expectObject(await parseBody(output.body, context)), "body");
|
|
259
|
-
const doc = take(data, {
|
|
260
|
-
CipherText: __expectString,
|
|
261
|
-
KeyArn: __expectString,
|
|
262
|
-
KeyCheckValue: __expectString,
|
|
263
|
-
});
|
|
264
|
-
Object.assign(contents, doc);
|
|
265
|
-
return contents;
|
|
266
|
-
};
|
|
267
|
-
export const de_GenerateCardValidationDataCommand = async (output, context) => {
|
|
268
|
-
if (output.statusCode !== 200 && output.statusCode >= 300) {
|
|
269
|
-
return de_CommandError(output, context);
|
|
270
|
-
}
|
|
271
|
-
const contents = map({
|
|
272
|
-
$metadata: deserializeMetadata(output),
|
|
273
|
-
});
|
|
274
|
-
const data = __expectNonNull(__expectObject(await parseBody(output.body, context)), "body");
|
|
275
|
-
const doc = take(data, {
|
|
276
|
-
KeyArn: __expectString,
|
|
277
|
-
KeyCheckValue: __expectString,
|
|
278
|
-
ValidationData: __expectString,
|
|
279
|
-
});
|
|
280
|
-
Object.assign(contents, doc);
|
|
281
|
-
return contents;
|
|
282
|
-
};
|
|
283
|
-
export const de_GenerateMacCommand = async (output, context) => {
|
|
284
|
-
if (output.statusCode !== 200 && output.statusCode >= 300) {
|
|
285
|
-
return de_CommandError(output, context);
|
|
286
|
-
}
|
|
287
|
-
const contents = map({
|
|
288
|
-
$metadata: deserializeMetadata(output),
|
|
289
|
-
});
|
|
290
|
-
const data = __expectNonNull(__expectObject(await parseBody(output.body, context)), "body");
|
|
291
|
-
const doc = take(data, {
|
|
292
|
-
KeyArn: __expectString,
|
|
293
|
-
KeyCheckValue: __expectString,
|
|
294
|
-
Mac: __expectString,
|
|
295
|
-
});
|
|
296
|
-
Object.assign(contents, doc);
|
|
297
|
-
return contents;
|
|
298
|
-
};
|
|
299
|
-
export const de_GenerateMacEmvPinChangeCommand = async (output, context) => {
|
|
300
|
-
if (output.statusCode !== 200 && output.statusCode >= 300) {
|
|
301
|
-
return de_CommandError(output, context);
|
|
302
|
-
}
|
|
303
|
-
const contents = map({
|
|
304
|
-
$metadata: deserializeMetadata(output),
|
|
305
|
-
});
|
|
306
|
-
const data = __expectNonNull(__expectObject(await parseBody(output.body, context)), "body");
|
|
307
|
-
const doc = take(data, {
|
|
308
|
-
EncryptedPinBlock: __expectString,
|
|
309
|
-
Mac: __expectString,
|
|
310
|
-
NewPinPekArn: __expectString,
|
|
311
|
-
NewPinPekKeyCheckValue: __expectString,
|
|
312
|
-
SecureMessagingConfidentialityKeyArn: __expectString,
|
|
313
|
-
SecureMessagingConfidentialityKeyCheckValue: __expectString,
|
|
314
|
-
SecureMessagingIntegrityKeyArn: __expectString,
|
|
315
|
-
SecureMessagingIntegrityKeyCheckValue: __expectString,
|
|
316
|
-
VisaAmexDerivationOutputs: _json,
|
|
317
|
-
});
|
|
318
|
-
Object.assign(contents, doc);
|
|
319
|
-
return contents;
|
|
320
|
-
};
|
|
321
|
-
export const de_GeneratePinDataCommand = async (output, context) => {
|
|
322
|
-
if (output.statusCode !== 200 && output.statusCode >= 300) {
|
|
323
|
-
return de_CommandError(output, context);
|
|
324
|
-
}
|
|
325
|
-
const contents = map({
|
|
326
|
-
$metadata: deserializeMetadata(output),
|
|
327
|
-
});
|
|
328
|
-
const data = __expectNonNull(__expectObject(await parseBody(output.body, context)), "body");
|
|
329
|
-
const doc = take(data, {
|
|
330
|
-
EncryptedPinBlock: __expectString,
|
|
331
|
-
EncryptionKeyArn: __expectString,
|
|
332
|
-
EncryptionKeyCheckValue: __expectString,
|
|
333
|
-
GenerationKeyArn: __expectString,
|
|
334
|
-
GenerationKeyCheckValue: __expectString,
|
|
335
|
-
PinData: (_) => _json(__expectUnion(_)),
|
|
336
|
-
});
|
|
337
|
-
Object.assign(contents, doc);
|
|
338
|
-
return contents;
|
|
339
|
-
};
|
|
340
|
-
export const de_ReEncryptDataCommand = async (output, context) => {
|
|
341
|
-
if (output.statusCode !== 200 && output.statusCode >= 300) {
|
|
342
|
-
return de_CommandError(output, context);
|
|
343
|
-
}
|
|
344
|
-
const contents = map({
|
|
345
|
-
$metadata: deserializeMetadata(output),
|
|
346
|
-
});
|
|
347
|
-
const data = __expectNonNull(__expectObject(await parseBody(output.body, context)), "body");
|
|
348
|
-
const doc = take(data, {
|
|
349
|
-
CipherText: __expectString,
|
|
350
|
-
KeyArn: __expectString,
|
|
351
|
-
KeyCheckValue: __expectString,
|
|
352
|
-
});
|
|
353
|
-
Object.assign(contents, doc);
|
|
354
|
-
return contents;
|
|
355
|
-
};
|
|
356
|
-
export const de_TranslateKeyMaterialCommand = async (output, context) => {
|
|
357
|
-
if (output.statusCode !== 200 && output.statusCode >= 300) {
|
|
358
|
-
return de_CommandError(output, context);
|
|
359
|
-
}
|
|
360
|
-
const contents = map({
|
|
361
|
-
$metadata: deserializeMetadata(output),
|
|
362
|
-
});
|
|
363
|
-
const data = __expectNonNull(__expectObject(await parseBody(output.body, context)), "body");
|
|
364
|
-
const doc = take(data, {
|
|
365
|
-
WrappedKey: _json,
|
|
366
|
-
});
|
|
367
|
-
Object.assign(contents, doc);
|
|
368
|
-
return contents;
|
|
369
|
-
};
|
|
370
|
-
export const de_TranslatePinDataCommand = async (output, context) => {
|
|
371
|
-
if (output.statusCode !== 200 && output.statusCode >= 300) {
|
|
372
|
-
return de_CommandError(output, context);
|
|
373
|
-
}
|
|
374
|
-
const contents = map({
|
|
375
|
-
$metadata: deserializeMetadata(output),
|
|
376
|
-
});
|
|
377
|
-
const data = __expectNonNull(__expectObject(await parseBody(output.body, context)), "body");
|
|
378
|
-
const doc = take(data, {
|
|
379
|
-
KeyArn: __expectString,
|
|
380
|
-
KeyCheckValue: __expectString,
|
|
381
|
-
PinBlock: __expectString,
|
|
382
|
-
});
|
|
383
|
-
Object.assign(contents, doc);
|
|
384
|
-
return contents;
|
|
385
|
-
};
|
|
386
|
-
export const de_VerifyAuthRequestCryptogramCommand = async (output, context) => {
|
|
387
|
-
if (output.statusCode !== 200 && output.statusCode >= 300) {
|
|
388
|
-
return de_CommandError(output, context);
|
|
389
|
-
}
|
|
390
|
-
const contents = map({
|
|
391
|
-
$metadata: deserializeMetadata(output),
|
|
392
|
-
});
|
|
393
|
-
const data = __expectNonNull(__expectObject(await parseBody(output.body, context)), "body");
|
|
394
|
-
const doc = take(data, {
|
|
395
|
-
AuthResponseValue: __expectString,
|
|
396
|
-
KeyArn: __expectString,
|
|
397
|
-
KeyCheckValue: __expectString,
|
|
398
|
-
});
|
|
399
|
-
Object.assign(contents, doc);
|
|
400
|
-
return contents;
|
|
401
|
-
};
|
|
402
|
-
export const de_VerifyCardValidationDataCommand = async (output, context) => {
|
|
403
|
-
if (output.statusCode !== 200 && output.statusCode >= 300) {
|
|
404
|
-
return de_CommandError(output, context);
|
|
405
|
-
}
|
|
406
|
-
const contents = map({
|
|
407
|
-
$metadata: deserializeMetadata(output),
|
|
408
|
-
});
|
|
409
|
-
const data = __expectNonNull(__expectObject(await parseBody(output.body, context)), "body");
|
|
410
|
-
const doc = take(data, {
|
|
411
|
-
KeyArn: __expectString,
|
|
412
|
-
KeyCheckValue: __expectString,
|
|
413
|
-
});
|
|
414
|
-
Object.assign(contents, doc);
|
|
415
|
-
return contents;
|
|
416
|
-
};
|
|
417
|
-
export const de_VerifyMacCommand = async (output, context) => {
|
|
418
|
-
if (output.statusCode !== 200 && output.statusCode >= 300) {
|
|
419
|
-
return de_CommandError(output, context);
|
|
420
|
-
}
|
|
421
|
-
const contents = map({
|
|
422
|
-
$metadata: deserializeMetadata(output),
|
|
423
|
-
});
|
|
424
|
-
const data = __expectNonNull(__expectObject(await parseBody(output.body, context)), "body");
|
|
425
|
-
const doc = take(data, {
|
|
426
|
-
KeyArn: __expectString,
|
|
427
|
-
KeyCheckValue: __expectString,
|
|
428
|
-
});
|
|
429
|
-
Object.assign(contents, doc);
|
|
430
|
-
return contents;
|
|
431
|
-
};
|
|
432
|
-
export const de_VerifyPinDataCommand = async (output, context) => {
|
|
433
|
-
if (output.statusCode !== 200 && output.statusCode >= 300) {
|
|
434
|
-
return de_CommandError(output, context);
|
|
435
|
-
}
|
|
436
|
-
const contents = map({
|
|
437
|
-
$metadata: deserializeMetadata(output),
|
|
438
|
-
});
|
|
439
|
-
const data = __expectNonNull(__expectObject(await parseBody(output.body, context)), "body");
|
|
440
|
-
const doc = take(data, {
|
|
441
|
-
EncryptionKeyArn: __expectString,
|
|
442
|
-
EncryptionKeyCheckValue: __expectString,
|
|
443
|
-
VerificationKeyArn: __expectString,
|
|
444
|
-
VerificationKeyCheckValue: __expectString,
|
|
445
|
-
});
|
|
446
|
-
Object.assign(contents, doc);
|
|
447
|
-
return contents;
|
|
448
|
-
};
|
|
449
|
-
const de_CommandError = async (output, context) => {
|
|
450
|
-
const parsedOutput = {
|
|
451
|
-
...output,
|
|
452
|
-
body: await parseErrorBody(output.body, context),
|
|
453
|
-
};
|
|
454
|
-
const errorCode = loadRestJsonErrorCode(output, parsedOutput.body);
|
|
455
|
-
switch (errorCode) {
|
|
456
|
-
case "AccessDeniedException":
|
|
457
|
-
case "com.amazonaws.paymentcryptographydata#AccessDeniedException":
|
|
458
|
-
throw await de_AccessDeniedExceptionRes(parsedOutput, context);
|
|
459
|
-
case "InternalServerException":
|
|
460
|
-
case "com.amazonaws.paymentcryptographydata#InternalServerException":
|
|
461
|
-
throw await de_InternalServerExceptionRes(parsedOutput, context);
|
|
462
|
-
case "ResourceNotFoundException":
|
|
463
|
-
case "com.amazonaws.paymentcryptographydata#ResourceNotFoundException":
|
|
464
|
-
throw await de_ResourceNotFoundExceptionRes(parsedOutput, context);
|
|
465
|
-
case "ThrottlingException":
|
|
466
|
-
case "com.amazonaws.paymentcryptographydata#ThrottlingException":
|
|
467
|
-
throw await de_ThrottlingExceptionRes(parsedOutput, context);
|
|
468
|
-
case "ValidationException":
|
|
469
|
-
case "com.amazonaws.paymentcryptographydata#ValidationException":
|
|
470
|
-
throw await de_ValidationExceptionRes(parsedOutput, context);
|
|
471
|
-
case "VerificationFailedException":
|
|
472
|
-
case "com.amazonaws.paymentcryptographydata#VerificationFailedException":
|
|
473
|
-
throw await de_VerificationFailedExceptionRes(parsedOutput, context);
|
|
474
|
-
default:
|
|
475
|
-
const parsedBody = parsedOutput.body;
|
|
476
|
-
return throwDefaultError({
|
|
477
|
-
output,
|
|
478
|
-
parsedBody,
|
|
479
|
-
errorCode,
|
|
480
|
-
});
|
|
481
|
-
}
|
|
482
|
-
};
|
|
483
|
-
const throwDefaultError = withBaseException(__BaseException);
|
|
484
|
-
const de_AccessDeniedExceptionRes = async (parsedOutput, context) => {
|
|
485
|
-
const contents = map({});
|
|
486
|
-
const data = parsedOutput.body;
|
|
487
|
-
const doc = take(data, {
|
|
488
|
-
Message: __expectString,
|
|
489
|
-
});
|
|
490
|
-
Object.assign(contents, doc);
|
|
491
|
-
const exception = new AccessDeniedException({
|
|
492
|
-
$metadata: deserializeMetadata(parsedOutput),
|
|
493
|
-
...contents,
|
|
494
|
-
});
|
|
495
|
-
return __decorateServiceException(exception, parsedOutput.body);
|
|
496
|
-
};
|
|
497
|
-
const de_InternalServerExceptionRes = async (parsedOutput, context) => {
|
|
498
|
-
const contents = map({});
|
|
499
|
-
const data = parsedOutput.body;
|
|
500
|
-
const doc = take(data, {
|
|
501
|
-
Message: __expectString,
|
|
502
|
-
});
|
|
503
|
-
Object.assign(contents, doc);
|
|
504
|
-
const exception = new InternalServerException({
|
|
505
|
-
$metadata: deserializeMetadata(parsedOutput),
|
|
506
|
-
...contents,
|
|
507
|
-
});
|
|
508
|
-
return __decorateServiceException(exception, parsedOutput.body);
|
|
509
|
-
};
|
|
510
|
-
const de_ResourceNotFoundExceptionRes = async (parsedOutput, context) => {
|
|
511
|
-
const contents = map({});
|
|
512
|
-
const data = parsedOutput.body;
|
|
513
|
-
const doc = take(data, {
|
|
514
|
-
ResourceId: __expectString,
|
|
515
|
-
});
|
|
516
|
-
Object.assign(contents, doc);
|
|
517
|
-
const exception = new ResourceNotFoundException({
|
|
518
|
-
$metadata: deserializeMetadata(parsedOutput),
|
|
519
|
-
...contents,
|
|
520
|
-
});
|
|
521
|
-
return __decorateServiceException(exception, parsedOutput.body);
|
|
522
|
-
};
|
|
523
|
-
const de_ThrottlingExceptionRes = async (parsedOutput, context) => {
|
|
524
|
-
const contents = map({});
|
|
525
|
-
const data = parsedOutput.body;
|
|
526
|
-
const doc = take(data, {
|
|
527
|
-
Message: __expectString,
|
|
528
|
-
});
|
|
529
|
-
Object.assign(contents, doc);
|
|
530
|
-
const exception = new ThrottlingException({
|
|
531
|
-
$metadata: deserializeMetadata(parsedOutput),
|
|
532
|
-
...contents,
|
|
533
|
-
});
|
|
534
|
-
return __decorateServiceException(exception, parsedOutput.body);
|
|
535
|
-
};
|
|
536
|
-
const de_ValidationExceptionRes = async (parsedOutput, context) => {
|
|
537
|
-
const contents = map({});
|
|
538
|
-
const data = parsedOutput.body;
|
|
539
|
-
const doc = take(data, {
|
|
540
|
-
fieldList: _json,
|
|
541
|
-
message: __expectString,
|
|
542
|
-
});
|
|
543
|
-
Object.assign(contents, doc);
|
|
544
|
-
const exception = new ValidationException({
|
|
545
|
-
$metadata: deserializeMetadata(parsedOutput),
|
|
546
|
-
...contents,
|
|
547
|
-
});
|
|
548
|
-
return __decorateServiceException(exception, parsedOutput.body);
|
|
549
|
-
};
|
|
550
|
-
const de_VerificationFailedExceptionRes = async (parsedOutput, context) => {
|
|
551
|
-
const contents = map({});
|
|
552
|
-
const data = parsedOutput.body;
|
|
553
|
-
const doc = take(data, {
|
|
554
|
-
Message: __expectString,
|
|
555
|
-
Reason: __expectString,
|
|
556
|
-
});
|
|
557
|
-
Object.assign(contents, doc);
|
|
558
|
-
const exception = new VerificationFailedException({
|
|
559
|
-
$metadata: deserializeMetadata(parsedOutput),
|
|
560
|
-
...contents,
|
|
561
|
-
});
|
|
562
|
-
return __decorateServiceException(exception, parsedOutput.body);
|
|
563
|
-
};
|
|
564
|
-
const deserializeMetadata = (output) => ({
|
|
565
|
-
httpStatusCode: output.statusCode,
|
|
566
|
-
requestId: output.headers["x-amzn-requestid"] ?? output.headers["x-amzn-request-id"] ?? output.headers["x-amz-request-id"],
|
|
567
|
-
extendedRequestId: output.headers["x-amz-id-2"],
|
|
568
|
-
cfId: output.headers["x-amz-cf-id"],
|
|
569
|
-
});
|
|
570
|
-
const collectBodyString = (streamBody, context) => collectBody(streamBody, context).then((body) => context.utf8Encoder(body));
|
|
@@ -1,119 +0,0 @@
|
|
|
1
|
-
import { HttpRequest as __HttpRequest, HttpResponse as __HttpResponse } from "@smithy/protocol-http";
|
|
2
|
-
import { SerdeContext as __SerdeContext } from "@smithy/types";
|
|
3
|
-
import { DecryptDataCommandInput, DecryptDataCommandOutput } from "../commands/DecryptDataCommand";
|
|
4
|
-
import { EncryptDataCommandInput, EncryptDataCommandOutput } from "../commands/EncryptDataCommand";
|
|
5
|
-
import { GenerateCardValidationDataCommandInput, GenerateCardValidationDataCommandOutput } from "../commands/GenerateCardValidationDataCommand";
|
|
6
|
-
import { GenerateMacCommandInput, GenerateMacCommandOutput } from "../commands/GenerateMacCommand";
|
|
7
|
-
import { GenerateMacEmvPinChangeCommandInput, GenerateMacEmvPinChangeCommandOutput } from "../commands/GenerateMacEmvPinChangeCommand";
|
|
8
|
-
import { GeneratePinDataCommandInput, GeneratePinDataCommandOutput } from "../commands/GeneratePinDataCommand";
|
|
9
|
-
import { ReEncryptDataCommandInput, ReEncryptDataCommandOutput } from "../commands/ReEncryptDataCommand";
|
|
10
|
-
import { TranslateKeyMaterialCommandInput, TranslateKeyMaterialCommandOutput } from "../commands/TranslateKeyMaterialCommand";
|
|
11
|
-
import { TranslatePinDataCommandInput, TranslatePinDataCommandOutput } from "../commands/TranslatePinDataCommand";
|
|
12
|
-
import { VerifyAuthRequestCryptogramCommandInput, VerifyAuthRequestCryptogramCommandOutput } from "../commands/VerifyAuthRequestCryptogramCommand";
|
|
13
|
-
import { VerifyCardValidationDataCommandInput, VerifyCardValidationDataCommandOutput } from "../commands/VerifyCardValidationDataCommand";
|
|
14
|
-
import { VerifyMacCommandInput, VerifyMacCommandOutput } from "../commands/VerifyMacCommand";
|
|
15
|
-
import { VerifyPinDataCommandInput, VerifyPinDataCommandOutput } from "../commands/VerifyPinDataCommand";
|
|
16
|
-
/**
|
|
17
|
-
* serializeAws_restJson1DecryptDataCommand
|
|
18
|
-
*/
|
|
19
|
-
export declare const se_DecryptDataCommand: (input: DecryptDataCommandInput, context: __SerdeContext) => Promise<__HttpRequest>;
|
|
20
|
-
/**
|
|
21
|
-
* serializeAws_restJson1EncryptDataCommand
|
|
22
|
-
*/
|
|
23
|
-
export declare const se_EncryptDataCommand: (input: EncryptDataCommandInput, context: __SerdeContext) => Promise<__HttpRequest>;
|
|
24
|
-
/**
|
|
25
|
-
* serializeAws_restJson1GenerateCardValidationDataCommand
|
|
26
|
-
*/
|
|
27
|
-
export declare const se_GenerateCardValidationDataCommand: (input: GenerateCardValidationDataCommandInput, context: __SerdeContext) => Promise<__HttpRequest>;
|
|
28
|
-
/**
|
|
29
|
-
* serializeAws_restJson1GenerateMacCommand
|
|
30
|
-
*/
|
|
31
|
-
export declare const se_GenerateMacCommand: (input: GenerateMacCommandInput, context: __SerdeContext) => Promise<__HttpRequest>;
|
|
32
|
-
/**
|
|
33
|
-
* serializeAws_restJson1GenerateMacEmvPinChangeCommand
|
|
34
|
-
*/
|
|
35
|
-
export declare const se_GenerateMacEmvPinChangeCommand: (input: GenerateMacEmvPinChangeCommandInput, context: __SerdeContext) => Promise<__HttpRequest>;
|
|
36
|
-
/**
|
|
37
|
-
* serializeAws_restJson1GeneratePinDataCommand
|
|
38
|
-
*/
|
|
39
|
-
export declare const se_GeneratePinDataCommand: (input: GeneratePinDataCommandInput, context: __SerdeContext) => Promise<__HttpRequest>;
|
|
40
|
-
/**
|
|
41
|
-
* serializeAws_restJson1ReEncryptDataCommand
|
|
42
|
-
*/
|
|
43
|
-
export declare const se_ReEncryptDataCommand: (input: ReEncryptDataCommandInput, context: __SerdeContext) => Promise<__HttpRequest>;
|
|
44
|
-
/**
|
|
45
|
-
* serializeAws_restJson1TranslateKeyMaterialCommand
|
|
46
|
-
*/
|
|
47
|
-
export declare const se_TranslateKeyMaterialCommand: (input: TranslateKeyMaterialCommandInput, context: __SerdeContext) => Promise<__HttpRequest>;
|
|
48
|
-
/**
|
|
49
|
-
* serializeAws_restJson1TranslatePinDataCommand
|
|
50
|
-
*/
|
|
51
|
-
export declare const se_TranslatePinDataCommand: (input: TranslatePinDataCommandInput, context: __SerdeContext) => Promise<__HttpRequest>;
|
|
52
|
-
/**
|
|
53
|
-
* serializeAws_restJson1VerifyAuthRequestCryptogramCommand
|
|
54
|
-
*/
|
|
55
|
-
export declare const se_VerifyAuthRequestCryptogramCommand: (input: VerifyAuthRequestCryptogramCommandInput, context: __SerdeContext) => Promise<__HttpRequest>;
|
|
56
|
-
/**
|
|
57
|
-
* serializeAws_restJson1VerifyCardValidationDataCommand
|
|
58
|
-
*/
|
|
59
|
-
export declare const se_VerifyCardValidationDataCommand: (input: VerifyCardValidationDataCommandInput, context: __SerdeContext) => Promise<__HttpRequest>;
|
|
60
|
-
/**
|
|
61
|
-
* serializeAws_restJson1VerifyMacCommand
|
|
62
|
-
*/
|
|
63
|
-
export declare const se_VerifyMacCommand: (input: VerifyMacCommandInput, context: __SerdeContext) => Promise<__HttpRequest>;
|
|
64
|
-
/**
|
|
65
|
-
* serializeAws_restJson1VerifyPinDataCommand
|
|
66
|
-
*/
|
|
67
|
-
export declare const se_VerifyPinDataCommand: (input: VerifyPinDataCommandInput, context: __SerdeContext) => Promise<__HttpRequest>;
|
|
68
|
-
/**
|
|
69
|
-
* deserializeAws_restJson1DecryptDataCommand
|
|
70
|
-
*/
|
|
71
|
-
export declare const de_DecryptDataCommand: (output: __HttpResponse, context: __SerdeContext) => Promise<DecryptDataCommandOutput>;
|
|
72
|
-
/**
|
|
73
|
-
* deserializeAws_restJson1EncryptDataCommand
|
|
74
|
-
*/
|
|
75
|
-
export declare const de_EncryptDataCommand: (output: __HttpResponse, context: __SerdeContext) => Promise<EncryptDataCommandOutput>;
|
|
76
|
-
/**
|
|
77
|
-
* deserializeAws_restJson1GenerateCardValidationDataCommand
|
|
78
|
-
*/
|
|
79
|
-
export declare const de_GenerateCardValidationDataCommand: (output: __HttpResponse, context: __SerdeContext) => Promise<GenerateCardValidationDataCommandOutput>;
|
|
80
|
-
/**
|
|
81
|
-
* deserializeAws_restJson1GenerateMacCommand
|
|
82
|
-
*/
|
|
83
|
-
export declare const de_GenerateMacCommand: (output: __HttpResponse, context: __SerdeContext) => Promise<GenerateMacCommandOutput>;
|
|
84
|
-
/**
|
|
85
|
-
* deserializeAws_restJson1GenerateMacEmvPinChangeCommand
|
|
86
|
-
*/
|
|
87
|
-
export declare const de_GenerateMacEmvPinChangeCommand: (output: __HttpResponse, context: __SerdeContext) => Promise<GenerateMacEmvPinChangeCommandOutput>;
|
|
88
|
-
/**
|
|
89
|
-
* deserializeAws_restJson1GeneratePinDataCommand
|
|
90
|
-
*/
|
|
91
|
-
export declare const de_GeneratePinDataCommand: (output: __HttpResponse, context: __SerdeContext) => Promise<GeneratePinDataCommandOutput>;
|
|
92
|
-
/**
|
|
93
|
-
* deserializeAws_restJson1ReEncryptDataCommand
|
|
94
|
-
*/
|
|
95
|
-
export declare const de_ReEncryptDataCommand: (output: __HttpResponse, context: __SerdeContext) => Promise<ReEncryptDataCommandOutput>;
|
|
96
|
-
/**
|
|
97
|
-
* deserializeAws_restJson1TranslateKeyMaterialCommand
|
|
98
|
-
*/
|
|
99
|
-
export declare const de_TranslateKeyMaterialCommand: (output: __HttpResponse, context: __SerdeContext) => Promise<TranslateKeyMaterialCommandOutput>;
|
|
100
|
-
/**
|
|
101
|
-
* deserializeAws_restJson1TranslatePinDataCommand
|
|
102
|
-
*/
|
|
103
|
-
export declare const de_TranslatePinDataCommand: (output: __HttpResponse, context: __SerdeContext) => Promise<TranslatePinDataCommandOutput>;
|
|
104
|
-
/**
|
|
105
|
-
* deserializeAws_restJson1VerifyAuthRequestCryptogramCommand
|
|
106
|
-
*/
|
|
107
|
-
export declare const de_VerifyAuthRequestCryptogramCommand: (output: __HttpResponse, context: __SerdeContext) => Promise<VerifyAuthRequestCryptogramCommandOutput>;
|
|
108
|
-
/**
|
|
109
|
-
* deserializeAws_restJson1VerifyCardValidationDataCommand
|
|
110
|
-
*/
|
|
111
|
-
export declare const de_VerifyCardValidationDataCommand: (output: __HttpResponse, context: __SerdeContext) => Promise<VerifyCardValidationDataCommandOutput>;
|
|
112
|
-
/**
|
|
113
|
-
* deserializeAws_restJson1VerifyMacCommand
|
|
114
|
-
*/
|
|
115
|
-
export declare const de_VerifyMacCommand: (output: __HttpResponse, context: __SerdeContext) => Promise<VerifyMacCommandOutput>;
|
|
116
|
-
/**
|
|
117
|
-
* deserializeAws_restJson1VerifyPinDataCommand
|
|
118
|
-
*/
|
|
119
|
-
export declare const de_VerifyPinDataCommand: (output: __HttpResponse, context: __SerdeContext) => Promise<VerifyPinDataCommandOutput>;
|