@aws-sdk/client-payment-cryptography 3.1023.0 → 3.1025.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -160,6 +160,7 @@ const _RKO = "RestoreKeyOutput";
160
160
  const _RKRR = "RemoveKeyReplicationRegions";
161
161
  const _RKRRI = "RemoveKeyReplicationRegionsInput";
162
162
  const _RKRRO = "RemoveKeyReplicationRegionsOutput";
163
+ const _RLGT = "ReuseLastGeneratedToken";
163
164
  const _RN = "RandomNonce";
164
165
  const _RNFE = "ResourceNotFoundException";
165
166
  const _RR = "ReplicationRegions";
@@ -458,8 +459,8 @@ exports.GetKeyOutput$ = [3, n0, _GKO,
458
459
  ];
459
460
  exports.GetParametersForExportInput$ = [3, n0, _GPFEI,
460
461
  0,
461
- [_KMT, _SKA],
462
- [0, 0], 2
462
+ [_KMT, _SKA, _RLGT],
463
+ [0, 0, 2], 2
463
464
  ];
464
465
  exports.GetParametersForExportOutput$ = [3, n0, _GPFEO,
465
466
  0,
@@ -468,8 +469,8 @@ exports.GetParametersForExportOutput$ = [3, n0, _GPFEO,
468
469
  ];
469
470
  exports.GetParametersForImportInput$ = [3, n0, _GPFII,
470
471
  0,
471
- [_KMT, _WKA],
472
- [0, 0], 2
472
+ [_KMT, _WKA, _RLGT],
473
+ [0, 0, 2], 2
473
474
  ];
474
475
  exports.GetParametersForImportOutput$ = [3, n0, _GPFIO,
475
476
  0,
@@ -155,6 +155,7 @@ const _RKO = "RestoreKeyOutput";
155
155
  const _RKRR = "RemoveKeyReplicationRegions";
156
156
  const _RKRRI = "RemoveKeyReplicationRegionsInput";
157
157
  const _RKRRO = "RemoveKeyReplicationRegionsOutput";
158
+ const _RLGT = "ReuseLastGeneratedToken";
158
159
  const _RN = "RandomNonce";
159
160
  const _RNFE = "ResourceNotFoundException";
160
161
  const _RR = "ReplicationRegions";
@@ -453,8 +454,8 @@ export var GetKeyOutput$ = [3, n0, _GKO,
453
454
  ];
454
455
  export var GetParametersForExportInput$ = [3, n0, _GPFEI,
455
456
  0,
456
- [_KMT, _SKA],
457
- [0, 0], 2
457
+ [_KMT, _SKA, _RLGT],
458
+ [0, 0, 2], 2
458
459
  ];
459
460
  export var GetParametersForExportOutput$ = [3, n0, _GPFEO,
460
461
  0,
@@ -463,8 +464,8 @@ export var GetParametersForExportOutput$ = [3, n0, _GPFEO,
463
464
  ];
464
465
  export var GetParametersForImportInput$ = [3, n0, _GPFII,
465
466
  0,
466
- [_KMT, _WKA],
467
- [0, 0], 2
467
+ [_KMT, _WKA, _RLGT],
468
+ [0, 0, 2], 2
468
469
  ];
469
470
  export var GetParametersForImportOutput$ = [3, n0, _GPFIO,
470
471
  0,
@@ -27,7 +27,7 @@ declare const GetParametersForExportCommand_base: {
27
27
  getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
28
28
  };
29
29
  /**
30
- * <p>Gets the export token and the signing key certificate to initiate a TR-34 key export from Amazon Web Services Payment Cryptography.</p> <p>The signing key certificate signs the wrapped key under export within the TR-34 key payload. The export token and signing key certificate must be in place and operational before calling <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_ExportKey.html">ExportKey</a>. The export token expires in 30 days. You can use the same export token to export multiple keys from your service account.</p> <p> <b>Cross-account use:</b> This operation can't be used across different Amazon Web Services accounts.</p> <p> <b>Related operations:</b> </p> <ul> <li> <p> <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_ExportKey.html">ExportKey</a> </p> </li> <li> <p> <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_GetParametersForImport.html">GetParametersForImport</a> </p> </li> </ul>
30
+ * <p>Gets the export token and the signing key certificate to initiate a TR-34 key export from Amazon Web Services Payment Cryptography.</p> <p>The signing key certificate signs the wrapped key under export within the TR-34 key payload. The export token and signing key certificate must be in place and operational before calling <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_ExportKey.html">ExportKey</a>. The export token expires in 30 days. You can use the same export token to export multiple keys from your service account.</p> <p>To return a previously generated export token and signing key certificate instead of generating new ones, set <code>ReuseLastGeneratedToken</code> to <code>true</code>.</p> <p> <b>Cross-account use:</b> This operation can't be used across different Amazon Web Services accounts.</p> <p> <b>Related operations:</b> </p> <ul> <li> <p> <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_ExportKey.html">ExportKey</a> </p> </li> <li> <p> <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_GetParametersForImport.html">GetParametersForImport</a> </p> </li> </ul>
31
31
  * @example
32
32
  * Use a bare-bones client and the command you need to make an API call.
33
33
  * ```javascript
@@ -39,6 +39,7 @@ declare const GetParametersForExportCommand_base: {
39
39
  * const input = { // GetParametersForExportInput
40
40
  * KeyMaterialType: "STRING_VALUE", // required
41
41
  * SigningKeyAlgorithm: "STRING_VALUE", // required
42
+ * ReuseLastGeneratedToken: true || false,
42
43
  * };
43
44
  * const command = new GetParametersForExportCommand(input);
44
45
  * const response = await client.send(command);
@@ -27,7 +27,7 @@ declare const GetParametersForImportCommand_base: {
27
27
  getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
28
28
  };
29
29
  /**
30
- * <p>Gets the import token and the wrapping key certificate in PEM format (base64 encoded) to initiate a TR-34 WrappedKeyBlock or a RSA WrappedKeyCryptogram import into Amazon Web Services Payment Cryptography.</p> <p>The wrapping key certificate wraps the key under import. The import token and wrapping key certificate must be in place and operational before calling <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_ImportKey.html">ImportKey</a>. The import token expires in 30 days. You can use the same import token to import multiple keys into your service account.</p> <p> <b>Cross-account use:</b> This operation can't be used across different Amazon Web Services accounts.</p> <p> <b>Related operations:</b> </p> <ul> <li> <p> <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_GetParametersForExport.html">GetParametersForExport</a> </p> </li> <li> <p> <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_ImportKey.html">ImportKey</a> </p> </li> </ul>
30
+ * <p>Gets the import token and the wrapping key certificate in PEM format (base64 encoded) to initiate a TR-34 WrappedKeyBlock or a RSA WrappedKeyCryptogram import into Amazon Web Services Payment Cryptography.</p> <p>The wrapping key certificate wraps the key under import. The import token and wrapping key certificate must be in place and operational before calling <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_ImportKey.html">ImportKey</a>. The import token expires in 30 days. You can use the same import token to import multiple keys into your service account.</p> <p>To return a previously generated import token and wrapping key certificate instead of generating new ones, set <code>ReuseLastGeneratedToken</code> to <code>true</code>.</p> <p> <b>Cross-account use:</b> This operation can't be used across different Amazon Web Services accounts.</p> <p> <b>Related operations:</b> </p> <ul> <li> <p> <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_GetParametersForExport.html">GetParametersForExport</a> </p> </li> <li> <p> <a href="https://docs.aws.amazon.com/payment-cryptography/latest/APIReference/API_ImportKey.html">ImportKey</a> </p> </li> </ul>
31
31
  * @example
32
32
  * Use a bare-bones client and the command you need to make an API call.
33
33
  * ```javascript
@@ -39,6 +39,7 @@ declare const GetParametersForImportCommand_base: {
39
39
  * const input = { // GetParametersForImportInput
40
40
  * KeyMaterialType: "STRING_VALUE", // required
41
41
  * WrappingKeyAlgorithm: "STRING_VALUE", // required
42
+ * ReuseLastGeneratedToken: true || false,
42
43
  * };
43
44
  * const command = new GetParametersForImportCommand(input);
44
45
  * const response = await client.send(command);
@@ -993,6 +993,11 @@ export interface GetParametersForExportInput {
993
993
  * @public
994
994
  */
995
995
  SigningKeyAlgorithm: KeyAlgorithm | undefined;
996
+ /**
997
+ * <p>Specifies whether to reuse the existing export token and signing key certificate. If set to <code>true</code> and a valid export token exists for the same key material type and signing key algorithm with at least 7 days of remaining validity, the existing token and signing key certificate are returned. Otherwise, a new export token and signing key certificate are generated. The default value is <code>false</code>, which generates a new export token and signing key certificate on every call.</p>
998
+ * @public
999
+ */
1000
+ ReuseLastGeneratedToken?: boolean | undefined;
996
1001
  }
997
1002
  /**
998
1003
  * @public
@@ -1038,6 +1043,11 @@ export interface GetParametersForImportInput {
1038
1043
  * @public
1039
1044
  */
1040
1045
  WrappingKeyAlgorithm: KeyAlgorithm | undefined;
1046
+ /**
1047
+ * <p>Specifies whether to reuse the existing import token and wrapping key certificate. If set to <code>true</code> and a valid import token exists for the same key material type and wrapping key algorithm with at least 7 days of remaining validity, the existing token and wrapping key certificate are returned. Otherwise, a new import token and wrapping key certificate are generated. The default value is <code>false</code>, which generates a new import token and wrapping key certificate on every call.</p>
1048
+ * @public
1049
+ */
1050
+ ReuseLastGeneratedToken?: boolean | undefined;
1041
1051
  }
1042
1052
  /**
1043
1053
  * @public
@@ -1084,7 +1094,7 @@ export interface GetPublicKeyCertificateInput {
1084
1094
  */
1085
1095
  export interface GetPublicKeyCertificateOutput {
1086
1096
  /**
1087
- * <p>The public key component of the asymmetric key pair in a certificate PEM format (base64 encoded). It is signed by the root certificate authority (CA). The certificate expires in 90 days.</p>
1097
+ * <p>The public key component of the asymmetric key pair in a certificate PEM format (base64 encoded). It is signed by the root certificate authority (CA). The certificate is valid for 90 days from the time it is issued. The service returns a cached certificate if one exists with at least 30 days of remaining validity. Otherwise, a new 90-day certificate is issued.</p>
1088
1098
  * @public
1089
1099
  */
1090
1100
  KeyCertificate: string | undefined;
@@ -312,6 +312,7 @@ export interface GetKeyOutput {
312
312
  export interface GetParametersForExportInput {
313
313
  KeyMaterialType: KeyMaterialType | undefined;
314
314
  SigningKeyAlgorithm: KeyAlgorithm | undefined;
315
+ ReuseLastGeneratedToken?: boolean | undefined;
315
316
  }
316
317
  export interface GetParametersForExportOutput {
317
318
  SigningKeyCertificate: string | undefined;
@@ -323,6 +324,7 @@ export interface GetParametersForExportOutput {
323
324
  export interface GetParametersForImportInput {
324
325
  KeyMaterialType: KeyMaterialType | undefined;
325
326
  WrappingKeyAlgorithm: KeyAlgorithm | undefined;
327
+ ReuseLastGeneratedToken?: boolean | undefined;
326
328
  }
327
329
  export interface GetParametersForImportOutput {
328
330
  WrappingKeyCertificate: string | undefined;
package/package.json CHANGED
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "name": "@aws-sdk/client-payment-cryptography",
3
3
  "description": "AWS SDK for JavaScript Payment Cryptography Client for Node.js, Browser and React Native",
4
- "version": "3.1023.0",
4
+ "version": "3.1025.0",
5
5
  "scripts": {
6
6
  "build": "concurrently 'yarn:build:types' 'yarn:build:es' && yarn build:cjs",
7
7
  "build:cjs": "node ../../scripts/compilation/inline client-payment-cryptography",