@aws-sdk/client-payment-cryptography 3.490.0 → 3.495.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist-cjs/PaymentCryptography.js +1 -51
- package/dist-cjs/PaymentCryptographyClient.js +1 -43
- package/dist-cjs/commands/CreateAliasCommand.js +1 -28
- package/dist-cjs/commands/CreateKeyCommand.js +1 -28
- package/dist-cjs/commands/DeleteAliasCommand.js +1 -28
- package/dist-cjs/commands/DeleteKeyCommand.js +1 -28
- package/dist-cjs/commands/ExportKeyCommand.js +1 -29
- package/dist-cjs/commands/GetAliasCommand.js +1 -28
- package/dist-cjs/commands/GetKeyCommand.js +1 -28
- package/dist-cjs/commands/GetParametersForExportCommand.js +1 -29
- package/dist-cjs/commands/GetParametersForImportCommand.js +1 -29
- package/dist-cjs/commands/GetPublicKeyCertificateCommand.js +1 -29
- package/dist-cjs/commands/ImportKeyCommand.js +1 -29
- package/dist-cjs/commands/ListAliasesCommand.js +1 -28
- package/dist-cjs/commands/ListKeysCommand.js +1 -28
- package/dist-cjs/commands/ListTagsForResourceCommand.js +1 -28
- package/dist-cjs/commands/RestoreKeyCommand.js +1 -28
- package/dist-cjs/commands/StartKeyUsageCommand.js +1 -28
- package/dist-cjs/commands/StopKeyUsageCommand.js +1 -28
- package/dist-cjs/commands/TagResourceCommand.js +1 -28
- package/dist-cjs/commands/UntagResourceCommand.js +1 -28
- package/dist-cjs/commands/UpdateAliasCommand.js +1 -28
- package/dist-cjs/commands/index.js +1 -23
- package/dist-cjs/endpoint/EndpointParameters.js +1 -18
- package/dist-cjs/extensionConfiguration.js +1 -2
- package/dist-cjs/index.js +2315 -11
- package/dist-cjs/models/PaymentCryptographyServiceException.js +1 -12
- package/dist-cjs/models/index.js +1 -4
- package/dist-cjs/models/models_0.js +1 -291
- package/dist-cjs/pagination/Interfaces.js +1 -2
- package/dist-cjs/pagination/ListAliasesPaginator.js +1 -7
- package/dist-cjs/pagination/ListKeysPaginator.js +1 -7
- package/dist-cjs/pagination/ListTagsForResourcePaginator.js +1 -7
- package/dist-cjs/pagination/index.js +1 -7
- package/dist-cjs/protocols/Aws_json1_0.js +1 -1390
- package/dist-cjs/runtimeExtensions.js +1 -22
- package/dist-es/models/models_0.js +18 -0
- package/dist-types/commands/ExportKeyCommand.d.ts +30 -5
- package/dist-types/commands/GetParametersForImportCommand.d.ts +1 -1
- package/dist-types/commands/ImportKeyCommand.d.ts +31 -4
- package/dist-types/models/models_0.d.ts +110 -8
- package/dist-types/ts3.4/models/models_0.d.ts +49 -0
- package/package.json +40 -40
package/dist-cjs/index.js
CHANGED
|
@@ -1,12 +1,2316 @@
|
|
|
1
1
|
"use strict";
|
|
2
|
-
Object.defineProperty
|
|
3
|
-
|
|
4
|
-
|
|
5
|
-
|
|
6
|
-
|
|
7
|
-
|
|
8
|
-
|
|
9
|
-
|
|
10
|
-
|
|
11
|
-
var
|
|
12
|
-
|
|
2
|
+
var __defProp = Object.defineProperty;
|
|
3
|
+
var __getOwnPropDesc = Object.getOwnPropertyDescriptor;
|
|
4
|
+
var __getOwnPropNames = Object.getOwnPropertyNames;
|
|
5
|
+
var __hasOwnProp = Object.prototype.hasOwnProperty;
|
|
6
|
+
var __name = (target, value) => __defProp(target, "name", { value, configurable: true });
|
|
7
|
+
var __export = (target, all) => {
|
|
8
|
+
for (var name in all)
|
|
9
|
+
__defProp(target, name, { get: all[name], enumerable: true });
|
|
10
|
+
};
|
|
11
|
+
var __copyProps = (to, from, except, desc) => {
|
|
12
|
+
if (from && typeof from === "object" || typeof from === "function") {
|
|
13
|
+
for (let key of __getOwnPropNames(from))
|
|
14
|
+
if (!__hasOwnProp.call(to, key) && key !== except)
|
|
15
|
+
__defProp(to, key, { get: () => from[key], enumerable: !(desc = __getOwnPropDesc(from, key)) || desc.enumerable });
|
|
16
|
+
}
|
|
17
|
+
return to;
|
|
18
|
+
};
|
|
19
|
+
var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: true }), mod);
|
|
20
|
+
|
|
21
|
+
// src/index.ts
|
|
22
|
+
var src_exports = {};
|
|
23
|
+
__export(src_exports, {
|
|
24
|
+
AccessDeniedException: () => AccessDeniedException,
|
|
25
|
+
ConflictException: () => ConflictException,
|
|
26
|
+
CreateAliasCommand: () => CreateAliasCommand,
|
|
27
|
+
CreateKeyCommand: () => CreateKeyCommand,
|
|
28
|
+
DeleteAliasCommand: () => DeleteAliasCommand,
|
|
29
|
+
DeleteKeyCommand: () => DeleteKeyCommand,
|
|
30
|
+
ExportKeyCommand: () => ExportKeyCommand,
|
|
31
|
+
ExportKeyCryptogramFilterSensitiveLog: () => ExportKeyCryptogramFilterSensitiveLog,
|
|
32
|
+
ExportKeyInputFilterSensitiveLog: () => ExportKeyInputFilterSensitiveLog,
|
|
33
|
+
ExportKeyMaterial: () => ExportKeyMaterial,
|
|
34
|
+
ExportKeyMaterialFilterSensitiveLog: () => ExportKeyMaterialFilterSensitiveLog,
|
|
35
|
+
ExportKeyOutputFilterSensitiveLog: () => ExportKeyOutputFilterSensitiveLog,
|
|
36
|
+
ExportTr34KeyBlockFilterSensitiveLog: () => ExportTr34KeyBlockFilterSensitiveLog,
|
|
37
|
+
GetAliasCommand: () => GetAliasCommand,
|
|
38
|
+
GetKeyCommand: () => GetKeyCommand,
|
|
39
|
+
GetParametersForExportCommand: () => GetParametersForExportCommand,
|
|
40
|
+
GetParametersForExportOutputFilterSensitiveLog: () => GetParametersForExportOutputFilterSensitiveLog,
|
|
41
|
+
GetParametersForImportCommand: () => GetParametersForImportCommand,
|
|
42
|
+
GetParametersForImportOutputFilterSensitiveLog: () => GetParametersForImportOutputFilterSensitiveLog,
|
|
43
|
+
GetPublicKeyCertificateCommand: () => GetPublicKeyCertificateCommand,
|
|
44
|
+
GetPublicKeyCertificateOutputFilterSensitiveLog: () => GetPublicKeyCertificateOutputFilterSensitiveLog,
|
|
45
|
+
ImportKeyCommand: () => ImportKeyCommand,
|
|
46
|
+
ImportKeyInputFilterSensitiveLog: () => ImportKeyInputFilterSensitiveLog,
|
|
47
|
+
ImportKeyMaterial: () => ImportKeyMaterial,
|
|
48
|
+
ImportKeyMaterialFilterSensitiveLog: () => ImportKeyMaterialFilterSensitiveLog,
|
|
49
|
+
ImportTr34KeyBlockFilterSensitiveLog: () => ImportTr34KeyBlockFilterSensitiveLog,
|
|
50
|
+
InternalServerException: () => InternalServerException,
|
|
51
|
+
KeyAlgorithm: () => KeyAlgorithm,
|
|
52
|
+
KeyCheckValueAlgorithm: () => KeyCheckValueAlgorithm,
|
|
53
|
+
KeyClass: () => KeyClass,
|
|
54
|
+
KeyMaterialType: () => KeyMaterialType,
|
|
55
|
+
KeyOrigin: () => KeyOrigin,
|
|
56
|
+
KeyState: () => KeyState,
|
|
57
|
+
KeyUsage: () => KeyUsage,
|
|
58
|
+
ListAliasesCommand: () => ListAliasesCommand,
|
|
59
|
+
ListKeysCommand: () => ListKeysCommand,
|
|
60
|
+
ListTagsForResourceCommand: () => ListTagsForResourceCommand,
|
|
61
|
+
PaymentCryptography: () => PaymentCryptography,
|
|
62
|
+
PaymentCryptographyClient: () => PaymentCryptographyClient,
|
|
63
|
+
PaymentCryptographyServiceException: () => PaymentCryptographyServiceException,
|
|
64
|
+
ResourceNotFoundException: () => ResourceNotFoundException,
|
|
65
|
+
RestoreKeyCommand: () => RestoreKeyCommand,
|
|
66
|
+
RootCertificatePublicKeyFilterSensitiveLog: () => RootCertificatePublicKeyFilterSensitiveLog,
|
|
67
|
+
ServiceQuotaExceededException: () => ServiceQuotaExceededException,
|
|
68
|
+
ServiceUnavailableException: () => ServiceUnavailableException,
|
|
69
|
+
StartKeyUsageCommand: () => StartKeyUsageCommand,
|
|
70
|
+
StopKeyUsageCommand: () => StopKeyUsageCommand,
|
|
71
|
+
TagResourceCommand: () => TagResourceCommand,
|
|
72
|
+
ThrottlingException: () => ThrottlingException,
|
|
73
|
+
Tr34KeyBlockFormat: () => Tr34KeyBlockFormat,
|
|
74
|
+
TrustedCertificatePublicKeyFilterSensitiveLog: () => TrustedCertificatePublicKeyFilterSensitiveLog,
|
|
75
|
+
UntagResourceCommand: () => UntagResourceCommand,
|
|
76
|
+
UpdateAliasCommand: () => UpdateAliasCommand,
|
|
77
|
+
ValidationException: () => ValidationException,
|
|
78
|
+
WrappedKeyFilterSensitiveLog: () => WrappedKeyFilterSensitiveLog,
|
|
79
|
+
WrappedKeyMaterialFormat: () => WrappedKeyMaterialFormat,
|
|
80
|
+
WrappingKeySpec: () => WrappingKeySpec,
|
|
81
|
+
__Client: () => import_smithy_client.Client,
|
|
82
|
+
paginateListAliases: () => paginateListAliases,
|
|
83
|
+
paginateListKeys: () => paginateListKeys,
|
|
84
|
+
paginateListTagsForResource: () => paginateListTagsForResource
|
|
85
|
+
});
|
|
86
|
+
module.exports = __toCommonJS(src_exports);
|
|
87
|
+
|
|
88
|
+
// src/PaymentCryptographyClient.ts
|
|
89
|
+
var import_middleware_host_header = require("@aws-sdk/middleware-host-header");
|
|
90
|
+
var import_middleware_logger = require("@aws-sdk/middleware-logger");
|
|
91
|
+
var import_middleware_recursion_detection = require("@aws-sdk/middleware-recursion-detection");
|
|
92
|
+
var import_middleware_signing = require("@aws-sdk/middleware-signing");
|
|
93
|
+
var import_middleware_user_agent = require("@aws-sdk/middleware-user-agent");
|
|
94
|
+
var import_config_resolver = require("@smithy/config-resolver");
|
|
95
|
+
var import_middleware_content_length = require("@smithy/middleware-content-length");
|
|
96
|
+
var import_middleware_endpoint = require("@smithy/middleware-endpoint");
|
|
97
|
+
var import_middleware_retry = require("@smithy/middleware-retry");
|
|
98
|
+
|
|
99
|
+
|
|
100
|
+
// src/endpoint/EndpointParameters.ts
|
|
101
|
+
var resolveClientEndpointParameters = /* @__PURE__ */ __name((options) => {
|
|
102
|
+
return {
|
|
103
|
+
...options,
|
|
104
|
+
useDualstackEndpoint: options.useDualstackEndpoint ?? false,
|
|
105
|
+
useFipsEndpoint: options.useFipsEndpoint ?? false,
|
|
106
|
+
defaultSigningName: "payment-cryptography"
|
|
107
|
+
};
|
|
108
|
+
}, "resolveClientEndpointParameters");
|
|
109
|
+
var commonParams = {
|
|
110
|
+
UseFIPS: { type: "builtInParams", name: "useFipsEndpoint" },
|
|
111
|
+
Endpoint: { type: "builtInParams", name: "endpoint" },
|
|
112
|
+
Region: { type: "builtInParams", name: "region" },
|
|
113
|
+
UseDualStack: { type: "builtInParams", name: "useDualstackEndpoint" }
|
|
114
|
+
};
|
|
115
|
+
|
|
116
|
+
// src/PaymentCryptographyClient.ts
|
|
117
|
+
var import_runtimeConfig = require("././runtimeConfig");
|
|
118
|
+
|
|
119
|
+
// src/runtimeExtensions.ts
|
|
120
|
+
var import_region_config_resolver = require("@aws-sdk/region-config-resolver");
|
|
121
|
+
var import_protocol_http = require("@smithy/protocol-http");
|
|
122
|
+
var import_smithy_client = require("@smithy/smithy-client");
|
|
123
|
+
var asPartial = /* @__PURE__ */ __name((t) => t, "asPartial");
|
|
124
|
+
var resolveRuntimeExtensions = /* @__PURE__ */ __name((runtimeConfig, extensions) => {
|
|
125
|
+
const extensionConfiguration = {
|
|
126
|
+
...asPartial((0, import_region_config_resolver.getAwsRegionExtensionConfiguration)(runtimeConfig)),
|
|
127
|
+
...asPartial((0, import_smithy_client.getDefaultExtensionConfiguration)(runtimeConfig)),
|
|
128
|
+
...asPartial((0, import_protocol_http.getHttpHandlerExtensionConfiguration)(runtimeConfig))
|
|
129
|
+
};
|
|
130
|
+
extensions.forEach((extension) => extension.configure(extensionConfiguration));
|
|
131
|
+
return {
|
|
132
|
+
...runtimeConfig,
|
|
133
|
+
...(0, import_region_config_resolver.resolveAwsRegionExtensionConfiguration)(extensionConfiguration),
|
|
134
|
+
...(0, import_smithy_client.resolveDefaultRuntimeConfig)(extensionConfiguration),
|
|
135
|
+
...(0, import_protocol_http.resolveHttpHandlerRuntimeConfig)(extensionConfiguration)
|
|
136
|
+
};
|
|
137
|
+
}, "resolveRuntimeExtensions");
|
|
138
|
+
|
|
139
|
+
// src/PaymentCryptographyClient.ts
|
|
140
|
+
var _PaymentCryptographyClient = class _PaymentCryptographyClient extends import_smithy_client.Client {
|
|
141
|
+
constructor(...[configuration]) {
|
|
142
|
+
const _config_0 = (0, import_runtimeConfig.getRuntimeConfig)(configuration || {});
|
|
143
|
+
const _config_1 = resolveClientEndpointParameters(_config_0);
|
|
144
|
+
const _config_2 = (0, import_config_resolver.resolveRegionConfig)(_config_1);
|
|
145
|
+
const _config_3 = (0, import_middleware_endpoint.resolveEndpointConfig)(_config_2);
|
|
146
|
+
const _config_4 = (0, import_middleware_retry.resolveRetryConfig)(_config_3);
|
|
147
|
+
const _config_5 = (0, import_middleware_host_header.resolveHostHeaderConfig)(_config_4);
|
|
148
|
+
const _config_6 = (0, import_middleware_signing.resolveAwsAuthConfig)(_config_5);
|
|
149
|
+
const _config_7 = (0, import_middleware_user_agent.resolveUserAgentConfig)(_config_6);
|
|
150
|
+
const _config_8 = resolveRuntimeExtensions(_config_7, (configuration == null ? void 0 : configuration.extensions) || []);
|
|
151
|
+
super(_config_8);
|
|
152
|
+
this.config = _config_8;
|
|
153
|
+
this.middlewareStack.use((0, import_middleware_retry.getRetryPlugin)(this.config));
|
|
154
|
+
this.middlewareStack.use((0, import_middleware_content_length.getContentLengthPlugin)(this.config));
|
|
155
|
+
this.middlewareStack.use((0, import_middleware_host_header.getHostHeaderPlugin)(this.config));
|
|
156
|
+
this.middlewareStack.use((0, import_middleware_logger.getLoggerPlugin)(this.config));
|
|
157
|
+
this.middlewareStack.use((0, import_middleware_recursion_detection.getRecursionDetectionPlugin)(this.config));
|
|
158
|
+
this.middlewareStack.use((0, import_middleware_signing.getAwsAuthPlugin)(this.config));
|
|
159
|
+
this.middlewareStack.use((0, import_middleware_user_agent.getUserAgentPlugin)(this.config));
|
|
160
|
+
}
|
|
161
|
+
/**
|
|
162
|
+
* Destroy underlying resources, like sockets. It's usually not necessary to do this.
|
|
163
|
+
* However in Node.js, it's best to explicitly shut down the client's agent when it is no longer needed.
|
|
164
|
+
* Otherwise, sockets might stay open for quite a long time before the server terminates them.
|
|
165
|
+
*/
|
|
166
|
+
destroy() {
|
|
167
|
+
super.destroy();
|
|
168
|
+
}
|
|
169
|
+
};
|
|
170
|
+
__name(_PaymentCryptographyClient, "PaymentCryptographyClient");
|
|
171
|
+
var PaymentCryptographyClient = _PaymentCryptographyClient;
|
|
172
|
+
|
|
173
|
+
// src/PaymentCryptography.ts
|
|
174
|
+
|
|
175
|
+
|
|
176
|
+
// src/commands/CreateAliasCommand.ts
|
|
177
|
+
|
|
178
|
+
var import_middleware_serde = require("@smithy/middleware-serde");
|
|
179
|
+
|
|
180
|
+
var import_types = require("@smithy/types");
|
|
181
|
+
|
|
182
|
+
// src/protocols/Aws_json1_0.ts
|
|
183
|
+
|
|
184
|
+
|
|
185
|
+
|
|
186
|
+
// src/models/models_0.ts
|
|
187
|
+
|
|
188
|
+
|
|
189
|
+
// src/models/PaymentCryptographyServiceException.ts
|
|
190
|
+
|
|
191
|
+
var _PaymentCryptographyServiceException = class _PaymentCryptographyServiceException extends import_smithy_client.ServiceException {
|
|
192
|
+
/**
|
|
193
|
+
* @internal
|
|
194
|
+
*/
|
|
195
|
+
constructor(options) {
|
|
196
|
+
super(options);
|
|
197
|
+
Object.setPrototypeOf(this, _PaymentCryptographyServiceException.prototype);
|
|
198
|
+
}
|
|
199
|
+
};
|
|
200
|
+
__name(_PaymentCryptographyServiceException, "PaymentCryptographyServiceException");
|
|
201
|
+
var PaymentCryptographyServiceException = _PaymentCryptographyServiceException;
|
|
202
|
+
|
|
203
|
+
// src/models/models_0.ts
|
|
204
|
+
var _AccessDeniedException = class _AccessDeniedException extends PaymentCryptographyServiceException {
|
|
205
|
+
/**
|
|
206
|
+
* @internal
|
|
207
|
+
*/
|
|
208
|
+
constructor(opts) {
|
|
209
|
+
super({
|
|
210
|
+
name: "AccessDeniedException",
|
|
211
|
+
$fault: "client",
|
|
212
|
+
...opts
|
|
213
|
+
});
|
|
214
|
+
this.name = "AccessDeniedException";
|
|
215
|
+
this.$fault = "client";
|
|
216
|
+
Object.setPrototypeOf(this, _AccessDeniedException.prototype);
|
|
217
|
+
this.Message = opts.Message;
|
|
218
|
+
}
|
|
219
|
+
};
|
|
220
|
+
__name(_AccessDeniedException, "AccessDeniedException");
|
|
221
|
+
var AccessDeniedException = _AccessDeniedException;
|
|
222
|
+
var _ConflictException = class _ConflictException extends PaymentCryptographyServiceException {
|
|
223
|
+
/**
|
|
224
|
+
* @internal
|
|
225
|
+
*/
|
|
226
|
+
constructor(opts) {
|
|
227
|
+
super({
|
|
228
|
+
name: "ConflictException",
|
|
229
|
+
$fault: "client",
|
|
230
|
+
...opts
|
|
231
|
+
});
|
|
232
|
+
this.name = "ConflictException";
|
|
233
|
+
this.$fault = "client";
|
|
234
|
+
Object.setPrototypeOf(this, _ConflictException.prototype);
|
|
235
|
+
this.Message = opts.Message;
|
|
236
|
+
}
|
|
237
|
+
};
|
|
238
|
+
__name(_ConflictException, "ConflictException");
|
|
239
|
+
var ConflictException = _ConflictException;
|
|
240
|
+
var _InternalServerException = class _InternalServerException extends PaymentCryptographyServiceException {
|
|
241
|
+
/**
|
|
242
|
+
* @internal
|
|
243
|
+
*/
|
|
244
|
+
constructor(opts) {
|
|
245
|
+
super({
|
|
246
|
+
name: "InternalServerException",
|
|
247
|
+
$fault: "server",
|
|
248
|
+
...opts
|
|
249
|
+
});
|
|
250
|
+
this.name = "InternalServerException";
|
|
251
|
+
this.$fault = "server";
|
|
252
|
+
Object.setPrototypeOf(this, _InternalServerException.prototype);
|
|
253
|
+
this.Message = opts.Message;
|
|
254
|
+
}
|
|
255
|
+
};
|
|
256
|
+
__name(_InternalServerException, "InternalServerException");
|
|
257
|
+
var InternalServerException = _InternalServerException;
|
|
258
|
+
var _ResourceNotFoundException = class _ResourceNotFoundException extends PaymentCryptographyServiceException {
|
|
259
|
+
/**
|
|
260
|
+
* @internal
|
|
261
|
+
*/
|
|
262
|
+
constructor(opts) {
|
|
263
|
+
super({
|
|
264
|
+
name: "ResourceNotFoundException",
|
|
265
|
+
$fault: "client",
|
|
266
|
+
...opts
|
|
267
|
+
});
|
|
268
|
+
this.name = "ResourceNotFoundException";
|
|
269
|
+
this.$fault = "client";
|
|
270
|
+
Object.setPrototypeOf(this, _ResourceNotFoundException.prototype);
|
|
271
|
+
this.ResourceId = opts.ResourceId;
|
|
272
|
+
}
|
|
273
|
+
};
|
|
274
|
+
__name(_ResourceNotFoundException, "ResourceNotFoundException");
|
|
275
|
+
var ResourceNotFoundException = _ResourceNotFoundException;
|
|
276
|
+
var _ServiceQuotaExceededException = class _ServiceQuotaExceededException extends PaymentCryptographyServiceException {
|
|
277
|
+
/**
|
|
278
|
+
* @internal
|
|
279
|
+
*/
|
|
280
|
+
constructor(opts) {
|
|
281
|
+
super({
|
|
282
|
+
name: "ServiceQuotaExceededException",
|
|
283
|
+
$fault: "client",
|
|
284
|
+
...opts
|
|
285
|
+
});
|
|
286
|
+
this.name = "ServiceQuotaExceededException";
|
|
287
|
+
this.$fault = "client";
|
|
288
|
+
Object.setPrototypeOf(this, _ServiceQuotaExceededException.prototype);
|
|
289
|
+
this.Message = opts.Message;
|
|
290
|
+
}
|
|
291
|
+
};
|
|
292
|
+
__name(_ServiceQuotaExceededException, "ServiceQuotaExceededException");
|
|
293
|
+
var ServiceQuotaExceededException = _ServiceQuotaExceededException;
|
|
294
|
+
var _ServiceUnavailableException = class _ServiceUnavailableException extends PaymentCryptographyServiceException {
|
|
295
|
+
/**
|
|
296
|
+
* @internal
|
|
297
|
+
*/
|
|
298
|
+
constructor(opts) {
|
|
299
|
+
super({
|
|
300
|
+
name: "ServiceUnavailableException",
|
|
301
|
+
$fault: "server",
|
|
302
|
+
...opts
|
|
303
|
+
});
|
|
304
|
+
this.name = "ServiceUnavailableException";
|
|
305
|
+
this.$fault = "server";
|
|
306
|
+
Object.setPrototypeOf(this, _ServiceUnavailableException.prototype);
|
|
307
|
+
this.Message = opts.Message;
|
|
308
|
+
}
|
|
309
|
+
};
|
|
310
|
+
__name(_ServiceUnavailableException, "ServiceUnavailableException");
|
|
311
|
+
var ServiceUnavailableException = _ServiceUnavailableException;
|
|
312
|
+
var _ThrottlingException = class _ThrottlingException extends PaymentCryptographyServiceException {
|
|
313
|
+
/**
|
|
314
|
+
* @internal
|
|
315
|
+
*/
|
|
316
|
+
constructor(opts) {
|
|
317
|
+
super({
|
|
318
|
+
name: "ThrottlingException",
|
|
319
|
+
$fault: "client",
|
|
320
|
+
...opts
|
|
321
|
+
});
|
|
322
|
+
this.name = "ThrottlingException";
|
|
323
|
+
this.$fault = "client";
|
|
324
|
+
Object.setPrototypeOf(this, _ThrottlingException.prototype);
|
|
325
|
+
this.Message = opts.Message;
|
|
326
|
+
}
|
|
327
|
+
};
|
|
328
|
+
__name(_ThrottlingException, "ThrottlingException");
|
|
329
|
+
var ThrottlingException = _ThrottlingException;
|
|
330
|
+
var _ValidationException = class _ValidationException extends PaymentCryptographyServiceException {
|
|
331
|
+
/**
|
|
332
|
+
* @internal
|
|
333
|
+
*/
|
|
334
|
+
constructor(opts) {
|
|
335
|
+
super({
|
|
336
|
+
name: "ValidationException",
|
|
337
|
+
$fault: "client",
|
|
338
|
+
...opts
|
|
339
|
+
});
|
|
340
|
+
this.name = "ValidationException";
|
|
341
|
+
this.$fault = "client";
|
|
342
|
+
Object.setPrototypeOf(this, _ValidationException.prototype);
|
|
343
|
+
this.Message = opts.Message;
|
|
344
|
+
}
|
|
345
|
+
};
|
|
346
|
+
__name(_ValidationException, "ValidationException");
|
|
347
|
+
var ValidationException = _ValidationException;
|
|
348
|
+
var KeyAlgorithm = {
|
|
349
|
+
AES_128: "AES_128",
|
|
350
|
+
AES_192: "AES_192",
|
|
351
|
+
AES_256: "AES_256",
|
|
352
|
+
RSA_2048: "RSA_2048",
|
|
353
|
+
RSA_3072: "RSA_3072",
|
|
354
|
+
RSA_4096: "RSA_4096",
|
|
355
|
+
TDES_2KEY: "TDES_2KEY",
|
|
356
|
+
TDES_3KEY: "TDES_3KEY"
|
|
357
|
+
};
|
|
358
|
+
var KeyClass = {
|
|
359
|
+
ASYMMETRIC_KEY_PAIR: "ASYMMETRIC_KEY_PAIR",
|
|
360
|
+
PRIVATE_KEY: "PRIVATE_KEY",
|
|
361
|
+
PUBLIC_KEY: "PUBLIC_KEY",
|
|
362
|
+
SYMMETRIC_KEY: "SYMMETRIC_KEY"
|
|
363
|
+
};
|
|
364
|
+
var KeyUsage = {
|
|
365
|
+
TR31_B0_BASE_DERIVATION_KEY: "TR31_B0_BASE_DERIVATION_KEY",
|
|
366
|
+
TR31_C0_CARD_VERIFICATION_KEY: "TR31_C0_CARD_VERIFICATION_KEY",
|
|
367
|
+
TR31_D0_SYMMETRIC_DATA_ENCRYPTION_KEY: "TR31_D0_SYMMETRIC_DATA_ENCRYPTION_KEY",
|
|
368
|
+
TR31_D1_ASYMMETRIC_KEY_FOR_DATA_ENCRYPTION: "TR31_D1_ASYMMETRIC_KEY_FOR_DATA_ENCRYPTION",
|
|
369
|
+
TR31_E0_EMV_MKEY_APP_CRYPTOGRAMS: "TR31_E0_EMV_MKEY_APP_CRYPTOGRAMS",
|
|
370
|
+
TR31_E1_EMV_MKEY_CONFIDENTIALITY: "TR31_E1_EMV_MKEY_CONFIDENTIALITY",
|
|
371
|
+
TR31_E2_EMV_MKEY_INTEGRITY: "TR31_E2_EMV_MKEY_INTEGRITY",
|
|
372
|
+
TR31_E4_EMV_MKEY_DYNAMIC_NUMBERS: "TR31_E4_EMV_MKEY_DYNAMIC_NUMBERS",
|
|
373
|
+
TR31_E5_EMV_MKEY_CARD_PERSONALIZATION: "TR31_E5_EMV_MKEY_CARD_PERSONALIZATION",
|
|
374
|
+
TR31_E6_EMV_MKEY_OTHER: "TR31_E6_EMV_MKEY_OTHER",
|
|
375
|
+
TR31_K0_KEY_ENCRYPTION_KEY: "TR31_K0_KEY_ENCRYPTION_KEY",
|
|
376
|
+
TR31_K1_KEY_BLOCK_PROTECTION_KEY: "TR31_K1_KEY_BLOCK_PROTECTION_KEY",
|
|
377
|
+
TR31_K2_TR34_ASYMMETRIC_KEY: "TR31_K2_TR34_ASYMMETRIC_KEY",
|
|
378
|
+
TR31_K3_ASYMMETRIC_KEY_FOR_KEY_AGREEMENT: "TR31_K3_ASYMMETRIC_KEY_FOR_KEY_AGREEMENT",
|
|
379
|
+
TR31_M1_ISO_9797_1_MAC_KEY: "TR31_M1_ISO_9797_1_MAC_KEY",
|
|
380
|
+
TR31_M3_ISO_9797_3_MAC_KEY: "TR31_M3_ISO_9797_3_MAC_KEY",
|
|
381
|
+
TR31_M6_ISO_9797_5_CMAC_KEY: "TR31_M6_ISO_9797_5_CMAC_KEY",
|
|
382
|
+
TR31_M7_HMAC_KEY: "TR31_M7_HMAC_KEY",
|
|
383
|
+
TR31_P0_PIN_ENCRYPTION_KEY: "TR31_P0_PIN_ENCRYPTION_KEY",
|
|
384
|
+
TR31_P1_PIN_GENERATION_KEY: "TR31_P1_PIN_GENERATION_KEY",
|
|
385
|
+
TR31_S0_ASYMMETRIC_KEY_FOR_DIGITAL_SIGNATURE: "TR31_S0_ASYMMETRIC_KEY_FOR_DIGITAL_SIGNATURE",
|
|
386
|
+
TR31_V1_IBM3624_PIN_VERIFICATION_KEY: "TR31_V1_IBM3624_PIN_VERIFICATION_KEY",
|
|
387
|
+
TR31_V2_VISA_PIN_VERIFICATION_KEY: "TR31_V2_VISA_PIN_VERIFICATION_KEY"
|
|
388
|
+
};
|
|
389
|
+
var KeyCheckValueAlgorithm = {
|
|
390
|
+
ANSI_X9_24: "ANSI_X9_24",
|
|
391
|
+
CMAC: "CMAC"
|
|
392
|
+
};
|
|
393
|
+
var KeyOrigin = {
|
|
394
|
+
AWS_PAYMENT_CRYPTOGRAPHY: "AWS_PAYMENT_CRYPTOGRAPHY",
|
|
395
|
+
EXTERNAL: "EXTERNAL"
|
|
396
|
+
};
|
|
397
|
+
var KeyState = {
|
|
398
|
+
CREATE_COMPLETE: "CREATE_COMPLETE",
|
|
399
|
+
CREATE_IN_PROGRESS: "CREATE_IN_PROGRESS",
|
|
400
|
+
DELETE_COMPLETE: "DELETE_COMPLETE",
|
|
401
|
+
DELETE_PENDING: "DELETE_PENDING"
|
|
402
|
+
};
|
|
403
|
+
var WrappingKeySpec = {
|
|
404
|
+
RSA_OAEP_SHA_256: "RSA_OAEP_SHA_256",
|
|
405
|
+
RSA_OAEP_SHA_512: "RSA_OAEP_SHA_512"
|
|
406
|
+
};
|
|
407
|
+
var Tr34KeyBlockFormat = {
|
|
408
|
+
X9_TR34_2012: "X9_TR34_2012"
|
|
409
|
+
};
|
|
410
|
+
var ExportKeyMaterial;
|
|
411
|
+
((ExportKeyMaterial3) => {
|
|
412
|
+
ExportKeyMaterial3.visit = /* @__PURE__ */ __name((value, visitor) => {
|
|
413
|
+
if (value.Tr31KeyBlock !== void 0)
|
|
414
|
+
return visitor.Tr31KeyBlock(value.Tr31KeyBlock);
|
|
415
|
+
if (value.Tr34KeyBlock !== void 0)
|
|
416
|
+
return visitor.Tr34KeyBlock(value.Tr34KeyBlock);
|
|
417
|
+
if (value.KeyCryptogram !== void 0)
|
|
418
|
+
return visitor.KeyCryptogram(value.KeyCryptogram);
|
|
419
|
+
return visitor._(value.$unknown[0], value.$unknown[1]);
|
|
420
|
+
}, "visit");
|
|
421
|
+
})(ExportKeyMaterial || (ExportKeyMaterial = {}));
|
|
422
|
+
var WrappedKeyMaterialFormat = {
|
|
423
|
+
KEY_CRYPTOGRAM: "KEY_CRYPTOGRAM",
|
|
424
|
+
TR31_KEY_BLOCK: "TR31_KEY_BLOCK",
|
|
425
|
+
TR34_KEY_BLOCK: "TR34_KEY_BLOCK"
|
|
426
|
+
};
|
|
427
|
+
var KeyMaterialType = {
|
|
428
|
+
KEY_CRYPTOGRAM: "KEY_CRYPTOGRAM",
|
|
429
|
+
ROOT_PUBLIC_KEY_CERTIFICATE: "ROOT_PUBLIC_KEY_CERTIFICATE",
|
|
430
|
+
TR31_KEY_BLOCK: "TR31_KEY_BLOCK",
|
|
431
|
+
TR34_KEY_BLOCK: "TR34_KEY_BLOCK",
|
|
432
|
+
TRUSTED_PUBLIC_KEY_CERTIFICATE: "TRUSTED_PUBLIC_KEY_CERTIFICATE"
|
|
433
|
+
};
|
|
434
|
+
var ImportKeyMaterial;
|
|
435
|
+
((ImportKeyMaterial3) => {
|
|
436
|
+
ImportKeyMaterial3.visit = /* @__PURE__ */ __name((value, visitor) => {
|
|
437
|
+
if (value.RootCertificatePublicKey !== void 0)
|
|
438
|
+
return visitor.RootCertificatePublicKey(value.RootCertificatePublicKey);
|
|
439
|
+
if (value.TrustedCertificatePublicKey !== void 0)
|
|
440
|
+
return visitor.TrustedCertificatePublicKey(value.TrustedCertificatePublicKey);
|
|
441
|
+
if (value.Tr31KeyBlock !== void 0)
|
|
442
|
+
return visitor.Tr31KeyBlock(value.Tr31KeyBlock);
|
|
443
|
+
if (value.Tr34KeyBlock !== void 0)
|
|
444
|
+
return visitor.Tr34KeyBlock(value.Tr34KeyBlock);
|
|
445
|
+
if (value.KeyCryptogram !== void 0)
|
|
446
|
+
return visitor.KeyCryptogram(value.KeyCryptogram);
|
|
447
|
+
return visitor._(value.$unknown[0], value.$unknown[1]);
|
|
448
|
+
}, "visit");
|
|
449
|
+
})(ImportKeyMaterial || (ImportKeyMaterial = {}));
|
|
450
|
+
var ExportKeyCryptogramFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({
|
|
451
|
+
...obj,
|
|
452
|
+
...obj.WrappingKeyCertificate && { WrappingKeyCertificate: import_smithy_client.SENSITIVE_STRING }
|
|
453
|
+
}), "ExportKeyCryptogramFilterSensitiveLog");
|
|
454
|
+
var ExportTr34KeyBlockFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({
|
|
455
|
+
...obj,
|
|
456
|
+
...obj.WrappingKeyCertificate && { WrappingKeyCertificate: import_smithy_client.SENSITIVE_STRING }
|
|
457
|
+
}), "ExportTr34KeyBlockFilterSensitiveLog");
|
|
458
|
+
var ExportKeyMaterialFilterSensitiveLog = /* @__PURE__ */ __name((obj) => {
|
|
459
|
+
if (obj.Tr31KeyBlock !== void 0)
|
|
460
|
+
return { Tr31KeyBlock: obj.Tr31KeyBlock };
|
|
461
|
+
if (obj.Tr34KeyBlock !== void 0)
|
|
462
|
+
return { Tr34KeyBlock: ExportTr34KeyBlockFilterSensitiveLog(obj.Tr34KeyBlock) };
|
|
463
|
+
if (obj.KeyCryptogram !== void 0)
|
|
464
|
+
return { KeyCryptogram: ExportKeyCryptogramFilterSensitiveLog(obj.KeyCryptogram) };
|
|
465
|
+
if (obj.$unknown !== void 0)
|
|
466
|
+
return { [obj.$unknown[0]]: "UNKNOWN" };
|
|
467
|
+
}, "ExportKeyMaterialFilterSensitiveLog");
|
|
468
|
+
var ExportKeyInputFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({
|
|
469
|
+
...obj,
|
|
470
|
+
...obj.KeyMaterial && { KeyMaterial: ExportKeyMaterialFilterSensitiveLog(obj.KeyMaterial) }
|
|
471
|
+
}), "ExportKeyInputFilterSensitiveLog");
|
|
472
|
+
var WrappedKeyFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({
|
|
473
|
+
...obj,
|
|
474
|
+
...obj.KeyMaterial && { KeyMaterial: import_smithy_client.SENSITIVE_STRING }
|
|
475
|
+
}), "WrappedKeyFilterSensitiveLog");
|
|
476
|
+
var ExportKeyOutputFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({
|
|
477
|
+
...obj,
|
|
478
|
+
...obj.WrappedKey && { WrappedKey: WrappedKeyFilterSensitiveLog(obj.WrappedKey) }
|
|
479
|
+
}), "ExportKeyOutputFilterSensitiveLog");
|
|
480
|
+
var GetParametersForExportOutputFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({
|
|
481
|
+
...obj,
|
|
482
|
+
...obj.SigningKeyCertificate && { SigningKeyCertificate: import_smithy_client.SENSITIVE_STRING },
|
|
483
|
+
...obj.SigningKeyCertificateChain && { SigningKeyCertificateChain: import_smithy_client.SENSITIVE_STRING }
|
|
484
|
+
}), "GetParametersForExportOutputFilterSensitiveLog");
|
|
485
|
+
var GetParametersForImportOutputFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({
|
|
486
|
+
...obj,
|
|
487
|
+
...obj.WrappingKeyCertificate && { WrappingKeyCertificate: import_smithy_client.SENSITIVE_STRING },
|
|
488
|
+
...obj.WrappingKeyCertificateChain && { WrappingKeyCertificateChain: import_smithy_client.SENSITIVE_STRING }
|
|
489
|
+
}), "GetParametersForImportOutputFilterSensitiveLog");
|
|
490
|
+
var GetPublicKeyCertificateOutputFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({
|
|
491
|
+
...obj,
|
|
492
|
+
...obj.KeyCertificate && { KeyCertificate: import_smithy_client.SENSITIVE_STRING },
|
|
493
|
+
...obj.KeyCertificateChain && { KeyCertificateChain: import_smithy_client.SENSITIVE_STRING }
|
|
494
|
+
}), "GetPublicKeyCertificateOutputFilterSensitiveLog");
|
|
495
|
+
var RootCertificatePublicKeyFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({
|
|
496
|
+
...obj,
|
|
497
|
+
...obj.PublicKeyCertificate && { PublicKeyCertificate: import_smithy_client.SENSITIVE_STRING }
|
|
498
|
+
}), "RootCertificatePublicKeyFilterSensitiveLog");
|
|
499
|
+
var ImportTr34KeyBlockFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({
|
|
500
|
+
...obj,
|
|
501
|
+
...obj.SigningKeyCertificate && { SigningKeyCertificate: import_smithy_client.SENSITIVE_STRING }
|
|
502
|
+
}), "ImportTr34KeyBlockFilterSensitiveLog");
|
|
503
|
+
var TrustedCertificatePublicKeyFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({
|
|
504
|
+
...obj,
|
|
505
|
+
...obj.PublicKeyCertificate && { PublicKeyCertificate: import_smithy_client.SENSITIVE_STRING }
|
|
506
|
+
}), "TrustedCertificatePublicKeyFilterSensitiveLog");
|
|
507
|
+
var ImportKeyMaterialFilterSensitiveLog = /* @__PURE__ */ __name((obj) => {
|
|
508
|
+
if (obj.RootCertificatePublicKey !== void 0)
|
|
509
|
+
return { RootCertificatePublicKey: RootCertificatePublicKeyFilterSensitiveLog(obj.RootCertificatePublicKey) };
|
|
510
|
+
if (obj.TrustedCertificatePublicKey !== void 0)
|
|
511
|
+
return {
|
|
512
|
+
TrustedCertificatePublicKey: TrustedCertificatePublicKeyFilterSensitiveLog(obj.TrustedCertificatePublicKey)
|
|
513
|
+
};
|
|
514
|
+
if (obj.Tr31KeyBlock !== void 0)
|
|
515
|
+
return { Tr31KeyBlock: obj.Tr31KeyBlock };
|
|
516
|
+
if (obj.Tr34KeyBlock !== void 0)
|
|
517
|
+
return { Tr34KeyBlock: ImportTr34KeyBlockFilterSensitiveLog(obj.Tr34KeyBlock) };
|
|
518
|
+
if (obj.KeyCryptogram !== void 0)
|
|
519
|
+
return { KeyCryptogram: obj.KeyCryptogram };
|
|
520
|
+
if (obj.$unknown !== void 0)
|
|
521
|
+
return { [obj.$unknown[0]]: "UNKNOWN" };
|
|
522
|
+
}, "ImportKeyMaterialFilterSensitiveLog");
|
|
523
|
+
var ImportKeyInputFilterSensitiveLog = /* @__PURE__ */ __name((obj) => ({
|
|
524
|
+
...obj,
|
|
525
|
+
...obj.KeyMaterial && { KeyMaterial: ImportKeyMaterialFilterSensitiveLog(obj.KeyMaterial) }
|
|
526
|
+
}), "ImportKeyInputFilterSensitiveLog");
|
|
527
|
+
|
|
528
|
+
// src/protocols/Aws_json1_0.ts
|
|
529
|
+
var se_CreateAliasCommand = /* @__PURE__ */ __name(async (input, context) => {
|
|
530
|
+
const headers = sharedHeaders("CreateAlias");
|
|
531
|
+
let body;
|
|
532
|
+
body = JSON.stringify((0, import_smithy_client._json)(input));
|
|
533
|
+
return buildHttpRpcRequest(context, headers, "/", void 0, body);
|
|
534
|
+
}, "se_CreateAliasCommand");
|
|
535
|
+
var se_CreateKeyCommand = /* @__PURE__ */ __name(async (input, context) => {
|
|
536
|
+
const headers = sharedHeaders("CreateKey");
|
|
537
|
+
let body;
|
|
538
|
+
body = JSON.stringify((0, import_smithy_client._json)(input));
|
|
539
|
+
return buildHttpRpcRequest(context, headers, "/", void 0, body);
|
|
540
|
+
}, "se_CreateKeyCommand");
|
|
541
|
+
var se_DeleteAliasCommand = /* @__PURE__ */ __name(async (input, context) => {
|
|
542
|
+
const headers = sharedHeaders("DeleteAlias");
|
|
543
|
+
let body;
|
|
544
|
+
body = JSON.stringify((0, import_smithy_client._json)(input));
|
|
545
|
+
return buildHttpRpcRequest(context, headers, "/", void 0, body);
|
|
546
|
+
}, "se_DeleteAliasCommand");
|
|
547
|
+
var se_DeleteKeyCommand = /* @__PURE__ */ __name(async (input, context) => {
|
|
548
|
+
const headers = sharedHeaders("DeleteKey");
|
|
549
|
+
let body;
|
|
550
|
+
body = JSON.stringify((0, import_smithy_client._json)(input));
|
|
551
|
+
return buildHttpRpcRequest(context, headers, "/", void 0, body);
|
|
552
|
+
}, "se_DeleteKeyCommand");
|
|
553
|
+
var se_ExportKeyCommand = /* @__PURE__ */ __name(async (input, context) => {
|
|
554
|
+
const headers = sharedHeaders("ExportKey");
|
|
555
|
+
let body;
|
|
556
|
+
body = JSON.stringify((0, import_smithy_client._json)(input));
|
|
557
|
+
return buildHttpRpcRequest(context, headers, "/", void 0, body);
|
|
558
|
+
}, "se_ExportKeyCommand");
|
|
559
|
+
var se_GetAliasCommand = /* @__PURE__ */ __name(async (input, context) => {
|
|
560
|
+
const headers = sharedHeaders("GetAlias");
|
|
561
|
+
let body;
|
|
562
|
+
body = JSON.stringify((0, import_smithy_client._json)(input));
|
|
563
|
+
return buildHttpRpcRequest(context, headers, "/", void 0, body);
|
|
564
|
+
}, "se_GetAliasCommand");
|
|
565
|
+
var se_GetKeyCommand = /* @__PURE__ */ __name(async (input, context) => {
|
|
566
|
+
const headers = sharedHeaders("GetKey");
|
|
567
|
+
let body;
|
|
568
|
+
body = JSON.stringify((0, import_smithy_client._json)(input));
|
|
569
|
+
return buildHttpRpcRequest(context, headers, "/", void 0, body);
|
|
570
|
+
}, "se_GetKeyCommand");
|
|
571
|
+
var se_GetParametersForExportCommand = /* @__PURE__ */ __name(async (input, context) => {
|
|
572
|
+
const headers = sharedHeaders("GetParametersForExport");
|
|
573
|
+
let body;
|
|
574
|
+
body = JSON.stringify((0, import_smithy_client._json)(input));
|
|
575
|
+
return buildHttpRpcRequest(context, headers, "/", void 0, body);
|
|
576
|
+
}, "se_GetParametersForExportCommand");
|
|
577
|
+
var se_GetParametersForImportCommand = /* @__PURE__ */ __name(async (input, context) => {
|
|
578
|
+
const headers = sharedHeaders("GetParametersForImport");
|
|
579
|
+
let body;
|
|
580
|
+
body = JSON.stringify((0, import_smithy_client._json)(input));
|
|
581
|
+
return buildHttpRpcRequest(context, headers, "/", void 0, body);
|
|
582
|
+
}, "se_GetParametersForImportCommand");
|
|
583
|
+
var se_GetPublicKeyCertificateCommand = /* @__PURE__ */ __name(async (input, context) => {
|
|
584
|
+
const headers = sharedHeaders("GetPublicKeyCertificate");
|
|
585
|
+
let body;
|
|
586
|
+
body = JSON.stringify((0, import_smithy_client._json)(input));
|
|
587
|
+
return buildHttpRpcRequest(context, headers, "/", void 0, body);
|
|
588
|
+
}, "se_GetPublicKeyCertificateCommand");
|
|
589
|
+
var se_ImportKeyCommand = /* @__PURE__ */ __name(async (input, context) => {
|
|
590
|
+
const headers = sharedHeaders("ImportKey");
|
|
591
|
+
let body;
|
|
592
|
+
body = JSON.stringify((0, import_smithy_client._json)(input));
|
|
593
|
+
return buildHttpRpcRequest(context, headers, "/", void 0, body);
|
|
594
|
+
}, "se_ImportKeyCommand");
|
|
595
|
+
var se_ListAliasesCommand = /* @__PURE__ */ __name(async (input, context) => {
|
|
596
|
+
const headers = sharedHeaders("ListAliases");
|
|
597
|
+
let body;
|
|
598
|
+
body = JSON.stringify((0, import_smithy_client._json)(input));
|
|
599
|
+
return buildHttpRpcRequest(context, headers, "/", void 0, body);
|
|
600
|
+
}, "se_ListAliasesCommand");
|
|
601
|
+
var se_ListKeysCommand = /* @__PURE__ */ __name(async (input, context) => {
|
|
602
|
+
const headers = sharedHeaders("ListKeys");
|
|
603
|
+
let body;
|
|
604
|
+
body = JSON.stringify((0, import_smithy_client._json)(input));
|
|
605
|
+
return buildHttpRpcRequest(context, headers, "/", void 0, body);
|
|
606
|
+
}, "se_ListKeysCommand");
|
|
607
|
+
var se_ListTagsForResourceCommand = /* @__PURE__ */ __name(async (input, context) => {
|
|
608
|
+
const headers = sharedHeaders("ListTagsForResource");
|
|
609
|
+
let body;
|
|
610
|
+
body = JSON.stringify((0, import_smithy_client._json)(input));
|
|
611
|
+
return buildHttpRpcRequest(context, headers, "/", void 0, body);
|
|
612
|
+
}, "se_ListTagsForResourceCommand");
|
|
613
|
+
var se_RestoreKeyCommand = /* @__PURE__ */ __name(async (input, context) => {
|
|
614
|
+
const headers = sharedHeaders("RestoreKey");
|
|
615
|
+
let body;
|
|
616
|
+
body = JSON.stringify((0, import_smithy_client._json)(input));
|
|
617
|
+
return buildHttpRpcRequest(context, headers, "/", void 0, body);
|
|
618
|
+
}, "se_RestoreKeyCommand");
|
|
619
|
+
var se_StartKeyUsageCommand = /* @__PURE__ */ __name(async (input, context) => {
|
|
620
|
+
const headers = sharedHeaders("StartKeyUsage");
|
|
621
|
+
let body;
|
|
622
|
+
body = JSON.stringify((0, import_smithy_client._json)(input));
|
|
623
|
+
return buildHttpRpcRequest(context, headers, "/", void 0, body);
|
|
624
|
+
}, "se_StartKeyUsageCommand");
|
|
625
|
+
var se_StopKeyUsageCommand = /* @__PURE__ */ __name(async (input, context) => {
|
|
626
|
+
const headers = sharedHeaders("StopKeyUsage");
|
|
627
|
+
let body;
|
|
628
|
+
body = JSON.stringify((0, import_smithy_client._json)(input));
|
|
629
|
+
return buildHttpRpcRequest(context, headers, "/", void 0, body);
|
|
630
|
+
}, "se_StopKeyUsageCommand");
|
|
631
|
+
var se_TagResourceCommand = /* @__PURE__ */ __name(async (input, context) => {
|
|
632
|
+
const headers = sharedHeaders("TagResource");
|
|
633
|
+
let body;
|
|
634
|
+
body = JSON.stringify((0, import_smithy_client._json)(input));
|
|
635
|
+
return buildHttpRpcRequest(context, headers, "/", void 0, body);
|
|
636
|
+
}, "se_TagResourceCommand");
|
|
637
|
+
var se_UntagResourceCommand = /* @__PURE__ */ __name(async (input, context) => {
|
|
638
|
+
const headers = sharedHeaders("UntagResource");
|
|
639
|
+
let body;
|
|
640
|
+
body = JSON.stringify((0, import_smithy_client._json)(input));
|
|
641
|
+
return buildHttpRpcRequest(context, headers, "/", void 0, body);
|
|
642
|
+
}, "se_UntagResourceCommand");
|
|
643
|
+
var se_UpdateAliasCommand = /* @__PURE__ */ __name(async (input, context) => {
|
|
644
|
+
const headers = sharedHeaders("UpdateAlias");
|
|
645
|
+
let body;
|
|
646
|
+
body = JSON.stringify((0, import_smithy_client._json)(input));
|
|
647
|
+
return buildHttpRpcRequest(context, headers, "/", void 0, body);
|
|
648
|
+
}, "se_UpdateAliasCommand");
|
|
649
|
+
var de_CreateAliasCommand = /* @__PURE__ */ __name(async (output, context) => {
|
|
650
|
+
if (output.statusCode >= 300) {
|
|
651
|
+
return de_CreateAliasCommandError(output, context);
|
|
652
|
+
}
|
|
653
|
+
const data = await parseBody(output.body, context);
|
|
654
|
+
let contents = {};
|
|
655
|
+
contents = (0, import_smithy_client._json)(data);
|
|
656
|
+
const response = {
|
|
657
|
+
$metadata: deserializeMetadata(output),
|
|
658
|
+
...contents
|
|
659
|
+
};
|
|
660
|
+
return response;
|
|
661
|
+
}, "de_CreateAliasCommand");
|
|
662
|
+
var de_CreateAliasCommandError = /* @__PURE__ */ __name(async (output, context) => {
|
|
663
|
+
const parsedOutput = {
|
|
664
|
+
...output,
|
|
665
|
+
body: await parseErrorBody(output.body, context)
|
|
666
|
+
};
|
|
667
|
+
const errorCode = loadRestJsonErrorCode(output, parsedOutput.body);
|
|
668
|
+
switch (errorCode) {
|
|
669
|
+
case "AccessDeniedException":
|
|
670
|
+
case "com.amazonaws.paymentcryptography#AccessDeniedException":
|
|
671
|
+
throw await de_AccessDeniedExceptionRes(parsedOutput, context);
|
|
672
|
+
case "ConflictException":
|
|
673
|
+
case "com.amazonaws.paymentcryptography#ConflictException":
|
|
674
|
+
throw await de_ConflictExceptionRes(parsedOutput, context);
|
|
675
|
+
case "InternalServerException":
|
|
676
|
+
case "com.amazonaws.paymentcryptography#InternalServerException":
|
|
677
|
+
throw await de_InternalServerExceptionRes(parsedOutput, context);
|
|
678
|
+
case "ResourceNotFoundException":
|
|
679
|
+
case "com.amazonaws.paymentcryptography#ResourceNotFoundException":
|
|
680
|
+
throw await de_ResourceNotFoundExceptionRes(parsedOutput, context);
|
|
681
|
+
case "ServiceQuotaExceededException":
|
|
682
|
+
case "com.amazonaws.paymentcryptography#ServiceQuotaExceededException":
|
|
683
|
+
throw await de_ServiceQuotaExceededExceptionRes(parsedOutput, context);
|
|
684
|
+
case "ServiceUnavailableException":
|
|
685
|
+
case "com.amazonaws.paymentcryptography#ServiceUnavailableException":
|
|
686
|
+
throw await de_ServiceUnavailableExceptionRes(parsedOutput, context);
|
|
687
|
+
case "ThrottlingException":
|
|
688
|
+
case "com.amazonaws.paymentcryptography#ThrottlingException":
|
|
689
|
+
throw await de_ThrottlingExceptionRes(parsedOutput, context);
|
|
690
|
+
case "ValidationException":
|
|
691
|
+
case "com.amazonaws.paymentcryptography#ValidationException":
|
|
692
|
+
throw await de_ValidationExceptionRes(parsedOutput, context);
|
|
693
|
+
default:
|
|
694
|
+
const parsedBody = parsedOutput.body;
|
|
695
|
+
return throwDefaultError({
|
|
696
|
+
output,
|
|
697
|
+
parsedBody,
|
|
698
|
+
errorCode
|
|
699
|
+
});
|
|
700
|
+
}
|
|
701
|
+
}, "de_CreateAliasCommandError");
|
|
702
|
+
var de_CreateKeyCommand = /* @__PURE__ */ __name(async (output, context) => {
|
|
703
|
+
if (output.statusCode >= 300) {
|
|
704
|
+
return de_CreateKeyCommandError(output, context);
|
|
705
|
+
}
|
|
706
|
+
const data = await parseBody(output.body, context);
|
|
707
|
+
let contents = {};
|
|
708
|
+
contents = de_CreateKeyOutput(data, context);
|
|
709
|
+
const response = {
|
|
710
|
+
$metadata: deserializeMetadata(output),
|
|
711
|
+
...contents
|
|
712
|
+
};
|
|
713
|
+
return response;
|
|
714
|
+
}, "de_CreateKeyCommand");
|
|
715
|
+
var de_CreateKeyCommandError = /* @__PURE__ */ __name(async (output, context) => {
|
|
716
|
+
const parsedOutput = {
|
|
717
|
+
...output,
|
|
718
|
+
body: await parseErrorBody(output.body, context)
|
|
719
|
+
};
|
|
720
|
+
const errorCode = loadRestJsonErrorCode(output, parsedOutput.body);
|
|
721
|
+
switch (errorCode) {
|
|
722
|
+
case "AccessDeniedException":
|
|
723
|
+
case "com.amazonaws.paymentcryptography#AccessDeniedException":
|
|
724
|
+
throw await de_AccessDeniedExceptionRes(parsedOutput, context);
|
|
725
|
+
case "ConflictException":
|
|
726
|
+
case "com.amazonaws.paymentcryptography#ConflictException":
|
|
727
|
+
throw await de_ConflictExceptionRes(parsedOutput, context);
|
|
728
|
+
case "InternalServerException":
|
|
729
|
+
case "com.amazonaws.paymentcryptography#InternalServerException":
|
|
730
|
+
throw await de_InternalServerExceptionRes(parsedOutput, context);
|
|
731
|
+
case "ResourceNotFoundException":
|
|
732
|
+
case "com.amazonaws.paymentcryptography#ResourceNotFoundException":
|
|
733
|
+
throw await de_ResourceNotFoundExceptionRes(parsedOutput, context);
|
|
734
|
+
case "ServiceQuotaExceededException":
|
|
735
|
+
case "com.amazonaws.paymentcryptography#ServiceQuotaExceededException":
|
|
736
|
+
throw await de_ServiceQuotaExceededExceptionRes(parsedOutput, context);
|
|
737
|
+
case "ServiceUnavailableException":
|
|
738
|
+
case "com.amazonaws.paymentcryptography#ServiceUnavailableException":
|
|
739
|
+
throw await de_ServiceUnavailableExceptionRes(parsedOutput, context);
|
|
740
|
+
case "ThrottlingException":
|
|
741
|
+
case "com.amazonaws.paymentcryptography#ThrottlingException":
|
|
742
|
+
throw await de_ThrottlingExceptionRes(parsedOutput, context);
|
|
743
|
+
case "ValidationException":
|
|
744
|
+
case "com.amazonaws.paymentcryptography#ValidationException":
|
|
745
|
+
throw await de_ValidationExceptionRes(parsedOutput, context);
|
|
746
|
+
default:
|
|
747
|
+
const parsedBody = parsedOutput.body;
|
|
748
|
+
return throwDefaultError({
|
|
749
|
+
output,
|
|
750
|
+
parsedBody,
|
|
751
|
+
errorCode
|
|
752
|
+
});
|
|
753
|
+
}
|
|
754
|
+
}, "de_CreateKeyCommandError");
|
|
755
|
+
var de_DeleteAliasCommand = /* @__PURE__ */ __name(async (output, context) => {
|
|
756
|
+
if (output.statusCode >= 300) {
|
|
757
|
+
return de_DeleteAliasCommandError(output, context);
|
|
758
|
+
}
|
|
759
|
+
const data = await parseBody(output.body, context);
|
|
760
|
+
let contents = {};
|
|
761
|
+
contents = (0, import_smithy_client._json)(data);
|
|
762
|
+
const response = {
|
|
763
|
+
$metadata: deserializeMetadata(output),
|
|
764
|
+
...contents
|
|
765
|
+
};
|
|
766
|
+
return response;
|
|
767
|
+
}, "de_DeleteAliasCommand");
|
|
768
|
+
var de_DeleteAliasCommandError = /* @__PURE__ */ __name(async (output, context) => {
|
|
769
|
+
const parsedOutput = {
|
|
770
|
+
...output,
|
|
771
|
+
body: await parseErrorBody(output.body, context)
|
|
772
|
+
};
|
|
773
|
+
const errorCode = loadRestJsonErrorCode(output, parsedOutput.body);
|
|
774
|
+
switch (errorCode) {
|
|
775
|
+
case "AccessDeniedException":
|
|
776
|
+
case "com.amazonaws.paymentcryptography#AccessDeniedException":
|
|
777
|
+
throw await de_AccessDeniedExceptionRes(parsedOutput, context);
|
|
778
|
+
case "ConflictException":
|
|
779
|
+
case "com.amazonaws.paymentcryptography#ConflictException":
|
|
780
|
+
throw await de_ConflictExceptionRes(parsedOutput, context);
|
|
781
|
+
case "InternalServerException":
|
|
782
|
+
case "com.amazonaws.paymentcryptography#InternalServerException":
|
|
783
|
+
throw await de_InternalServerExceptionRes(parsedOutput, context);
|
|
784
|
+
case "ResourceNotFoundException":
|
|
785
|
+
case "com.amazonaws.paymentcryptography#ResourceNotFoundException":
|
|
786
|
+
throw await de_ResourceNotFoundExceptionRes(parsedOutput, context);
|
|
787
|
+
case "ServiceUnavailableException":
|
|
788
|
+
case "com.amazonaws.paymentcryptography#ServiceUnavailableException":
|
|
789
|
+
throw await de_ServiceUnavailableExceptionRes(parsedOutput, context);
|
|
790
|
+
case "ThrottlingException":
|
|
791
|
+
case "com.amazonaws.paymentcryptography#ThrottlingException":
|
|
792
|
+
throw await de_ThrottlingExceptionRes(parsedOutput, context);
|
|
793
|
+
case "ValidationException":
|
|
794
|
+
case "com.amazonaws.paymentcryptography#ValidationException":
|
|
795
|
+
throw await de_ValidationExceptionRes(parsedOutput, context);
|
|
796
|
+
default:
|
|
797
|
+
const parsedBody = parsedOutput.body;
|
|
798
|
+
return throwDefaultError({
|
|
799
|
+
output,
|
|
800
|
+
parsedBody,
|
|
801
|
+
errorCode
|
|
802
|
+
});
|
|
803
|
+
}
|
|
804
|
+
}, "de_DeleteAliasCommandError");
|
|
805
|
+
var de_DeleteKeyCommand = /* @__PURE__ */ __name(async (output, context) => {
|
|
806
|
+
if (output.statusCode >= 300) {
|
|
807
|
+
return de_DeleteKeyCommandError(output, context);
|
|
808
|
+
}
|
|
809
|
+
const data = await parseBody(output.body, context);
|
|
810
|
+
let contents = {};
|
|
811
|
+
contents = de_DeleteKeyOutput(data, context);
|
|
812
|
+
const response = {
|
|
813
|
+
$metadata: deserializeMetadata(output),
|
|
814
|
+
...contents
|
|
815
|
+
};
|
|
816
|
+
return response;
|
|
817
|
+
}, "de_DeleteKeyCommand");
|
|
818
|
+
var de_DeleteKeyCommandError = /* @__PURE__ */ __name(async (output, context) => {
|
|
819
|
+
const parsedOutput = {
|
|
820
|
+
...output,
|
|
821
|
+
body: await parseErrorBody(output.body, context)
|
|
822
|
+
};
|
|
823
|
+
const errorCode = loadRestJsonErrorCode(output, parsedOutput.body);
|
|
824
|
+
switch (errorCode) {
|
|
825
|
+
case "AccessDeniedException":
|
|
826
|
+
case "com.amazonaws.paymentcryptography#AccessDeniedException":
|
|
827
|
+
throw await de_AccessDeniedExceptionRes(parsedOutput, context);
|
|
828
|
+
case "ConflictException":
|
|
829
|
+
case "com.amazonaws.paymentcryptography#ConflictException":
|
|
830
|
+
throw await de_ConflictExceptionRes(parsedOutput, context);
|
|
831
|
+
case "InternalServerException":
|
|
832
|
+
case "com.amazonaws.paymentcryptography#InternalServerException":
|
|
833
|
+
throw await de_InternalServerExceptionRes(parsedOutput, context);
|
|
834
|
+
case "ResourceNotFoundException":
|
|
835
|
+
case "com.amazonaws.paymentcryptography#ResourceNotFoundException":
|
|
836
|
+
throw await de_ResourceNotFoundExceptionRes(parsedOutput, context);
|
|
837
|
+
case "ServiceUnavailableException":
|
|
838
|
+
case "com.amazonaws.paymentcryptography#ServiceUnavailableException":
|
|
839
|
+
throw await de_ServiceUnavailableExceptionRes(parsedOutput, context);
|
|
840
|
+
case "ThrottlingException":
|
|
841
|
+
case "com.amazonaws.paymentcryptography#ThrottlingException":
|
|
842
|
+
throw await de_ThrottlingExceptionRes(parsedOutput, context);
|
|
843
|
+
case "ValidationException":
|
|
844
|
+
case "com.amazonaws.paymentcryptography#ValidationException":
|
|
845
|
+
throw await de_ValidationExceptionRes(parsedOutput, context);
|
|
846
|
+
default:
|
|
847
|
+
const parsedBody = parsedOutput.body;
|
|
848
|
+
return throwDefaultError({
|
|
849
|
+
output,
|
|
850
|
+
parsedBody,
|
|
851
|
+
errorCode
|
|
852
|
+
});
|
|
853
|
+
}
|
|
854
|
+
}, "de_DeleteKeyCommandError");
|
|
855
|
+
var de_ExportKeyCommand = /* @__PURE__ */ __name(async (output, context) => {
|
|
856
|
+
if (output.statusCode >= 300) {
|
|
857
|
+
return de_ExportKeyCommandError(output, context);
|
|
858
|
+
}
|
|
859
|
+
const data = await parseBody(output.body, context);
|
|
860
|
+
let contents = {};
|
|
861
|
+
contents = (0, import_smithy_client._json)(data);
|
|
862
|
+
const response = {
|
|
863
|
+
$metadata: deserializeMetadata(output),
|
|
864
|
+
...contents
|
|
865
|
+
};
|
|
866
|
+
return response;
|
|
867
|
+
}, "de_ExportKeyCommand");
|
|
868
|
+
var de_ExportKeyCommandError = /* @__PURE__ */ __name(async (output, context) => {
|
|
869
|
+
const parsedOutput = {
|
|
870
|
+
...output,
|
|
871
|
+
body: await parseErrorBody(output.body, context)
|
|
872
|
+
};
|
|
873
|
+
const errorCode = loadRestJsonErrorCode(output, parsedOutput.body);
|
|
874
|
+
switch (errorCode) {
|
|
875
|
+
case "AccessDeniedException":
|
|
876
|
+
case "com.amazonaws.paymentcryptography#AccessDeniedException":
|
|
877
|
+
throw await de_AccessDeniedExceptionRes(parsedOutput, context);
|
|
878
|
+
case "ConflictException":
|
|
879
|
+
case "com.amazonaws.paymentcryptography#ConflictException":
|
|
880
|
+
throw await de_ConflictExceptionRes(parsedOutput, context);
|
|
881
|
+
case "InternalServerException":
|
|
882
|
+
case "com.amazonaws.paymentcryptography#InternalServerException":
|
|
883
|
+
throw await de_InternalServerExceptionRes(parsedOutput, context);
|
|
884
|
+
case "ResourceNotFoundException":
|
|
885
|
+
case "com.amazonaws.paymentcryptography#ResourceNotFoundException":
|
|
886
|
+
throw await de_ResourceNotFoundExceptionRes(parsedOutput, context);
|
|
887
|
+
case "ServiceUnavailableException":
|
|
888
|
+
case "com.amazonaws.paymentcryptography#ServiceUnavailableException":
|
|
889
|
+
throw await de_ServiceUnavailableExceptionRes(parsedOutput, context);
|
|
890
|
+
case "ThrottlingException":
|
|
891
|
+
case "com.amazonaws.paymentcryptography#ThrottlingException":
|
|
892
|
+
throw await de_ThrottlingExceptionRes(parsedOutput, context);
|
|
893
|
+
case "ValidationException":
|
|
894
|
+
case "com.amazonaws.paymentcryptography#ValidationException":
|
|
895
|
+
throw await de_ValidationExceptionRes(parsedOutput, context);
|
|
896
|
+
default:
|
|
897
|
+
const parsedBody = parsedOutput.body;
|
|
898
|
+
return throwDefaultError({
|
|
899
|
+
output,
|
|
900
|
+
parsedBody,
|
|
901
|
+
errorCode
|
|
902
|
+
});
|
|
903
|
+
}
|
|
904
|
+
}, "de_ExportKeyCommandError");
|
|
905
|
+
var de_GetAliasCommand = /* @__PURE__ */ __name(async (output, context) => {
|
|
906
|
+
if (output.statusCode >= 300) {
|
|
907
|
+
return de_GetAliasCommandError(output, context);
|
|
908
|
+
}
|
|
909
|
+
const data = await parseBody(output.body, context);
|
|
910
|
+
let contents = {};
|
|
911
|
+
contents = (0, import_smithy_client._json)(data);
|
|
912
|
+
const response = {
|
|
913
|
+
$metadata: deserializeMetadata(output),
|
|
914
|
+
...contents
|
|
915
|
+
};
|
|
916
|
+
return response;
|
|
917
|
+
}, "de_GetAliasCommand");
|
|
918
|
+
var de_GetAliasCommandError = /* @__PURE__ */ __name(async (output, context) => {
|
|
919
|
+
const parsedOutput = {
|
|
920
|
+
...output,
|
|
921
|
+
body: await parseErrorBody(output.body, context)
|
|
922
|
+
};
|
|
923
|
+
const errorCode = loadRestJsonErrorCode(output, parsedOutput.body);
|
|
924
|
+
switch (errorCode) {
|
|
925
|
+
case "AccessDeniedException":
|
|
926
|
+
case "com.amazonaws.paymentcryptography#AccessDeniedException":
|
|
927
|
+
throw await de_AccessDeniedExceptionRes(parsedOutput, context);
|
|
928
|
+
case "InternalServerException":
|
|
929
|
+
case "com.amazonaws.paymentcryptography#InternalServerException":
|
|
930
|
+
throw await de_InternalServerExceptionRes(parsedOutput, context);
|
|
931
|
+
case "ResourceNotFoundException":
|
|
932
|
+
case "com.amazonaws.paymentcryptography#ResourceNotFoundException":
|
|
933
|
+
throw await de_ResourceNotFoundExceptionRes(parsedOutput, context);
|
|
934
|
+
case "ServiceUnavailableException":
|
|
935
|
+
case "com.amazonaws.paymentcryptography#ServiceUnavailableException":
|
|
936
|
+
throw await de_ServiceUnavailableExceptionRes(parsedOutput, context);
|
|
937
|
+
case "ThrottlingException":
|
|
938
|
+
case "com.amazonaws.paymentcryptography#ThrottlingException":
|
|
939
|
+
throw await de_ThrottlingExceptionRes(parsedOutput, context);
|
|
940
|
+
case "ValidationException":
|
|
941
|
+
case "com.amazonaws.paymentcryptography#ValidationException":
|
|
942
|
+
throw await de_ValidationExceptionRes(parsedOutput, context);
|
|
943
|
+
default:
|
|
944
|
+
const parsedBody = parsedOutput.body;
|
|
945
|
+
return throwDefaultError({
|
|
946
|
+
output,
|
|
947
|
+
parsedBody,
|
|
948
|
+
errorCode
|
|
949
|
+
});
|
|
950
|
+
}
|
|
951
|
+
}, "de_GetAliasCommandError");
|
|
952
|
+
var de_GetKeyCommand = /* @__PURE__ */ __name(async (output, context) => {
|
|
953
|
+
if (output.statusCode >= 300) {
|
|
954
|
+
return de_GetKeyCommandError(output, context);
|
|
955
|
+
}
|
|
956
|
+
const data = await parseBody(output.body, context);
|
|
957
|
+
let contents = {};
|
|
958
|
+
contents = de_GetKeyOutput(data, context);
|
|
959
|
+
const response = {
|
|
960
|
+
$metadata: deserializeMetadata(output),
|
|
961
|
+
...contents
|
|
962
|
+
};
|
|
963
|
+
return response;
|
|
964
|
+
}, "de_GetKeyCommand");
|
|
965
|
+
var de_GetKeyCommandError = /* @__PURE__ */ __name(async (output, context) => {
|
|
966
|
+
const parsedOutput = {
|
|
967
|
+
...output,
|
|
968
|
+
body: await parseErrorBody(output.body, context)
|
|
969
|
+
};
|
|
970
|
+
const errorCode = loadRestJsonErrorCode(output, parsedOutput.body);
|
|
971
|
+
switch (errorCode) {
|
|
972
|
+
case "AccessDeniedException":
|
|
973
|
+
case "com.amazonaws.paymentcryptography#AccessDeniedException":
|
|
974
|
+
throw await de_AccessDeniedExceptionRes(parsedOutput, context);
|
|
975
|
+
case "InternalServerException":
|
|
976
|
+
case "com.amazonaws.paymentcryptography#InternalServerException":
|
|
977
|
+
throw await de_InternalServerExceptionRes(parsedOutput, context);
|
|
978
|
+
case "ResourceNotFoundException":
|
|
979
|
+
case "com.amazonaws.paymentcryptography#ResourceNotFoundException":
|
|
980
|
+
throw await de_ResourceNotFoundExceptionRes(parsedOutput, context);
|
|
981
|
+
case "ServiceUnavailableException":
|
|
982
|
+
case "com.amazonaws.paymentcryptography#ServiceUnavailableException":
|
|
983
|
+
throw await de_ServiceUnavailableExceptionRes(parsedOutput, context);
|
|
984
|
+
case "ThrottlingException":
|
|
985
|
+
case "com.amazonaws.paymentcryptography#ThrottlingException":
|
|
986
|
+
throw await de_ThrottlingExceptionRes(parsedOutput, context);
|
|
987
|
+
case "ValidationException":
|
|
988
|
+
case "com.amazonaws.paymentcryptography#ValidationException":
|
|
989
|
+
throw await de_ValidationExceptionRes(parsedOutput, context);
|
|
990
|
+
default:
|
|
991
|
+
const parsedBody = parsedOutput.body;
|
|
992
|
+
return throwDefaultError({
|
|
993
|
+
output,
|
|
994
|
+
parsedBody,
|
|
995
|
+
errorCode
|
|
996
|
+
});
|
|
997
|
+
}
|
|
998
|
+
}, "de_GetKeyCommandError");
|
|
999
|
+
var de_GetParametersForExportCommand = /* @__PURE__ */ __name(async (output, context) => {
|
|
1000
|
+
if (output.statusCode >= 300) {
|
|
1001
|
+
return de_GetParametersForExportCommandError(output, context);
|
|
1002
|
+
}
|
|
1003
|
+
const data = await parseBody(output.body, context);
|
|
1004
|
+
let contents = {};
|
|
1005
|
+
contents = de_GetParametersForExportOutput(data, context);
|
|
1006
|
+
const response = {
|
|
1007
|
+
$metadata: deserializeMetadata(output),
|
|
1008
|
+
...contents
|
|
1009
|
+
};
|
|
1010
|
+
return response;
|
|
1011
|
+
}, "de_GetParametersForExportCommand");
|
|
1012
|
+
var de_GetParametersForExportCommandError = /* @__PURE__ */ __name(async (output, context) => {
|
|
1013
|
+
const parsedOutput = {
|
|
1014
|
+
...output,
|
|
1015
|
+
body: await parseErrorBody(output.body, context)
|
|
1016
|
+
};
|
|
1017
|
+
const errorCode = loadRestJsonErrorCode(output, parsedOutput.body);
|
|
1018
|
+
switch (errorCode) {
|
|
1019
|
+
case "AccessDeniedException":
|
|
1020
|
+
case "com.amazonaws.paymentcryptography#AccessDeniedException":
|
|
1021
|
+
throw await de_AccessDeniedExceptionRes(parsedOutput, context);
|
|
1022
|
+
case "ConflictException":
|
|
1023
|
+
case "com.amazonaws.paymentcryptography#ConflictException":
|
|
1024
|
+
throw await de_ConflictExceptionRes(parsedOutput, context);
|
|
1025
|
+
case "InternalServerException":
|
|
1026
|
+
case "com.amazonaws.paymentcryptography#InternalServerException":
|
|
1027
|
+
throw await de_InternalServerExceptionRes(parsedOutput, context);
|
|
1028
|
+
case "ResourceNotFoundException":
|
|
1029
|
+
case "com.amazonaws.paymentcryptography#ResourceNotFoundException":
|
|
1030
|
+
throw await de_ResourceNotFoundExceptionRes(parsedOutput, context);
|
|
1031
|
+
case "ServiceQuotaExceededException":
|
|
1032
|
+
case "com.amazonaws.paymentcryptography#ServiceQuotaExceededException":
|
|
1033
|
+
throw await de_ServiceQuotaExceededExceptionRes(parsedOutput, context);
|
|
1034
|
+
case "ServiceUnavailableException":
|
|
1035
|
+
case "com.amazonaws.paymentcryptography#ServiceUnavailableException":
|
|
1036
|
+
throw await de_ServiceUnavailableExceptionRes(parsedOutput, context);
|
|
1037
|
+
case "ThrottlingException":
|
|
1038
|
+
case "com.amazonaws.paymentcryptography#ThrottlingException":
|
|
1039
|
+
throw await de_ThrottlingExceptionRes(parsedOutput, context);
|
|
1040
|
+
case "ValidationException":
|
|
1041
|
+
case "com.amazonaws.paymentcryptography#ValidationException":
|
|
1042
|
+
throw await de_ValidationExceptionRes(parsedOutput, context);
|
|
1043
|
+
default:
|
|
1044
|
+
const parsedBody = parsedOutput.body;
|
|
1045
|
+
return throwDefaultError({
|
|
1046
|
+
output,
|
|
1047
|
+
parsedBody,
|
|
1048
|
+
errorCode
|
|
1049
|
+
});
|
|
1050
|
+
}
|
|
1051
|
+
}, "de_GetParametersForExportCommandError");
|
|
1052
|
+
var de_GetParametersForImportCommand = /* @__PURE__ */ __name(async (output, context) => {
|
|
1053
|
+
if (output.statusCode >= 300) {
|
|
1054
|
+
return de_GetParametersForImportCommandError(output, context);
|
|
1055
|
+
}
|
|
1056
|
+
const data = await parseBody(output.body, context);
|
|
1057
|
+
let contents = {};
|
|
1058
|
+
contents = de_GetParametersForImportOutput(data, context);
|
|
1059
|
+
const response = {
|
|
1060
|
+
$metadata: deserializeMetadata(output),
|
|
1061
|
+
...contents
|
|
1062
|
+
};
|
|
1063
|
+
return response;
|
|
1064
|
+
}, "de_GetParametersForImportCommand");
|
|
1065
|
+
var de_GetParametersForImportCommandError = /* @__PURE__ */ __name(async (output, context) => {
|
|
1066
|
+
const parsedOutput = {
|
|
1067
|
+
...output,
|
|
1068
|
+
body: await parseErrorBody(output.body, context)
|
|
1069
|
+
};
|
|
1070
|
+
const errorCode = loadRestJsonErrorCode(output, parsedOutput.body);
|
|
1071
|
+
switch (errorCode) {
|
|
1072
|
+
case "AccessDeniedException":
|
|
1073
|
+
case "com.amazonaws.paymentcryptography#AccessDeniedException":
|
|
1074
|
+
throw await de_AccessDeniedExceptionRes(parsedOutput, context);
|
|
1075
|
+
case "ConflictException":
|
|
1076
|
+
case "com.amazonaws.paymentcryptography#ConflictException":
|
|
1077
|
+
throw await de_ConflictExceptionRes(parsedOutput, context);
|
|
1078
|
+
case "InternalServerException":
|
|
1079
|
+
case "com.amazonaws.paymentcryptography#InternalServerException":
|
|
1080
|
+
throw await de_InternalServerExceptionRes(parsedOutput, context);
|
|
1081
|
+
case "ResourceNotFoundException":
|
|
1082
|
+
case "com.amazonaws.paymentcryptography#ResourceNotFoundException":
|
|
1083
|
+
throw await de_ResourceNotFoundExceptionRes(parsedOutput, context);
|
|
1084
|
+
case "ServiceQuotaExceededException":
|
|
1085
|
+
case "com.amazonaws.paymentcryptography#ServiceQuotaExceededException":
|
|
1086
|
+
throw await de_ServiceQuotaExceededExceptionRes(parsedOutput, context);
|
|
1087
|
+
case "ServiceUnavailableException":
|
|
1088
|
+
case "com.amazonaws.paymentcryptography#ServiceUnavailableException":
|
|
1089
|
+
throw await de_ServiceUnavailableExceptionRes(parsedOutput, context);
|
|
1090
|
+
case "ThrottlingException":
|
|
1091
|
+
case "com.amazonaws.paymentcryptography#ThrottlingException":
|
|
1092
|
+
throw await de_ThrottlingExceptionRes(parsedOutput, context);
|
|
1093
|
+
case "ValidationException":
|
|
1094
|
+
case "com.amazonaws.paymentcryptography#ValidationException":
|
|
1095
|
+
throw await de_ValidationExceptionRes(parsedOutput, context);
|
|
1096
|
+
default:
|
|
1097
|
+
const parsedBody = parsedOutput.body;
|
|
1098
|
+
return throwDefaultError({
|
|
1099
|
+
output,
|
|
1100
|
+
parsedBody,
|
|
1101
|
+
errorCode
|
|
1102
|
+
});
|
|
1103
|
+
}
|
|
1104
|
+
}, "de_GetParametersForImportCommandError");
|
|
1105
|
+
var de_GetPublicKeyCertificateCommand = /* @__PURE__ */ __name(async (output, context) => {
|
|
1106
|
+
if (output.statusCode >= 300) {
|
|
1107
|
+
return de_GetPublicKeyCertificateCommandError(output, context);
|
|
1108
|
+
}
|
|
1109
|
+
const data = await parseBody(output.body, context);
|
|
1110
|
+
let contents = {};
|
|
1111
|
+
contents = (0, import_smithy_client._json)(data);
|
|
1112
|
+
const response = {
|
|
1113
|
+
$metadata: deserializeMetadata(output),
|
|
1114
|
+
...contents
|
|
1115
|
+
};
|
|
1116
|
+
return response;
|
|
1117
|
+
}, "de_GetPublicKeyCertificateCommand");
|
|
1118
|
+
var de_GetPublicKeyCertificateCommandError = /* @__PURE__ */ __name(async (output, context) => {
|
|
1119
|
+
const parsedOutput = {
|
|
1120
|
+
...output,
|
|
1121
|
+
body: await parseErrorBody(output.body, context)
|
|
1122
|
+
};
|
|
1123
|
+
const errorCode = loadRestJsonErrorCode(output, parsedOutput.body);
|
|
1124
|
+
switch (errorCode) {
|
|
1125
|
+
case "AccessDeniedException":
|
|
1126
|
+
case "com.amazonaws.paymentcryptography#AccessDeniedException":
|
|
1127
|
+
throw await de_AccessDeniedExceptionRes(parsedOutput, context);
|
|
1128
|
+
case "InternalServerException":
|
|
1129
|
+
case "com.amazonaws.paymentcryptography#InternalServerException":
|
|
1130
|
+
throw await de_InternalServerExceptionRes(parsedOutput, context);
|
|
1131
|
+
case "ResourceNotFoundException":
|
|
1132
|
+
case "com.amazonaws.paymentcryptography#ResourceNotFoundException":
|
|
1133
|
+
throw await de_ResourceNotFoundExceptionRes(parsedOutput, context);
|
|
1134
|
+
case "ServiceUnavailableException":
|
|
1135
|
+
case "com.amazonaws.paymentcryptography#ServiceUnavailableException":
|
|
1136
|
+
throw await de_ServiceUnavailableExceptionRes(parsedOutput, context);
|
|
1137
|
+
case "ThrottlingException":
|
|
1138
|
+
case "com.amazonaws.paymentcryptography#ThrottlingException":
|
|
1139
|
+
throw await de_ThrottlingExceptionRes(parsedOutput, context);
|
|
1140
|
+
case "ValidationException":
|
|
1141
|
+
case "com.amazonaws.paymentcryptography#ValidationException":
|
|
1142
|
+
throw await de_ValidationExceptionRes(parsedOutput, context);
|
|
1143
|
+
default:
|
|
1144
|
+
const parsedBody = parsedOutput.body;
|
|
1145
|
+
return throwDefaultError({
|
|
1146
|
+
output,
|
|
1147
|
+
parsedBody,
|
|
1148
|
+
errorCode
|
|
1149
|
+
});
|
|
1150
|
+
}
|
|
1151
|
+
}, "de_GetPublicKeyCertificateCommandError");
|
|
1152
|
+
var de_ImportKeyCommand = /* @__PURE__ */ __name(async (output, context) => {
|
|
1153
|
+
if (output.statusCode >= 300) {
|
|
1154
|
+
return de_ImportKeyCommandError(output, context);
|
|
1155
|
+
}
|
|
1156
|
+
const data = await parseBody(output.body, context);
|
|
1157
|
+
let contents = {};
|
|
1158
|
+
contents = de_ImportKeyOutput(data, context);
|
|
1159
|
+
const response = {
|
|
1160
|
+
$metadata: deserializeMetadata(output),
|
|
1161
|
+
...contents
|
|
1162
|
+
};
|
|
1163
|
+
return response;
|
|
1164
|
+
}, "de_ImportKeyCommand");
|
|
1165
|
+
var de_ImportKeyCommandError = /* @__PURE__ */ __name(async (output, context) => {
|
|
1166
|
+
const parsedOutput = {
|
|
1167
|
+
...output,
|
|
1168
|
+
body: await parseErrorBody(output.body, context)
|
|
1169
|
+
};
|
|
1170
|
+
const errorCode = loadRestJsonErrorCode(output, parsedOutput.body);
|
|
1171
|
+
switch (errorCode) {
|
|
1172
|
+
case "AccessDeniedException":
|
|
1173
|
+
case "com.amazonaws.paymentcryptography#AccessDeniedException":
|
|
1174
|
+
throw await de_AccessDeniedExceptionRes(parsedOutput, context);
|
|
1175
|
+
case "ConflictException":
|
|
1176
|
+
case "com.amazonaws.paymentcryptography#ConflictException":
|
|
1177
|
+
throw await de_ConflictExceptionRes(parsedOutput, context);
|
|
1178
|
+
case "InternalServerException":
|
|
1179
|
+
case "com.amazonaws.paymentcryptography#InternalServerException":
|
|
1180
|
+
throw await de_InternalServerExceptionRes(parsedOutput, context);
|
|
1181
|
+
case "ResourceNotFoundException":
|
|
1182
|
+
case "com.amazonaws.paymentcryptography#ResourceNotFoundException":
|
|
1183
|
+
throw await de_ResourceNotFoundExceptionRes(parsedOutput, context);
|
|
1184
|
+
case "ServiceQuotaExceededException":
|
|
1185
|
+
case "com.amazonaws.paymentcryptography#ServiceQuotaExceededException":
|
|
1186
|
+
throw await de_ServiceQuotaExceededExceptionRes(parsedOutput, context);
|
|
1187
|
+
case "ServiceUnavailableException":
|
|
1188
|
+
case "com.amazonaws.paymentcryptography#ServiceUnavailableException":
|
|
1189
|
+
throw await de_ServiceUnavailableExceptionRes(parsedOutput, context);
|
|
1190
|
+
case "ThrottlingException":
|
|
1191
|
+
case "com.amazonaws.paymentcryptography#ThrottlingException":
|
|
1192
|
+
throw await de_ThrottlingExceptionRes(parsedOutput, context);
|
|
1193
|
+
case "ValidationException":
|
|
1194
|
+
case "com.amazonaws.paymentcryptography#ValidationException":
|
|
1195
|
+
throw await de_ValidationExceptionRes(parsedOutput, context);
|
|
1196
|
+
default:
|
|
1197
|
+
const parsedBody = parsedOutput.body;
|
|
1198
|
+
return throwDefaultError({
|
|
1199
|
+
output,
|
|
1200
|
+
parsedBody,
|
|
1201
|
+
errorCode
|
|
1202
|
+
});
|
|
1203
|
+
}
|
|
1204
|
+
}, "de_ImportKeyCommandError");
|
|
1205
|
+
var de_ListAliasesCommand = /* @__PURE__ */ __name(async (output, context) => {
|
|
1206
|
+
if (output.statusCode >= 300) {
|
|
1207
|
+
return de_ListAliasesCommandError(output, context);
|
|
1208
|
+
}
|
|
1209
|
+
const data = await parseBody(output.body, context);
|
|
1210
|
+
let contents = {};
|
|
1211
|
+
contents = (0, import_smithy_client._json)(data);
|
|
1212
|
+
const response = {
|
|
1213
|
+
$metadata: deserializeMetadata(output),
|
|
1214
|
+
...contents
|
|
1215
|
+
};
|
|
1216
|
+
return response;
|
|
1217
|
+
}, "de_ListAliasesCommand");
|
|
1218
|
+
var de_ListAliasesCommandError = /* @__PURE__ */ __name(async (output, context) => {
|
|
1219
|
+
const parsedOutput = {
|
|
1220
|
+
...output,
|
|
1221
|
+
body: await parseErrorBody(output.body, context)
|
|
1222
|
+
};
|
|
1223
|
+
const errorCode = loadRestJsonErrorCode(output, parsedOutput.body);
|
|
1224
|
+
switch (errorCode) {
|
|
1225
|
+
case "AccessDeniedException":
|
|
1226
|
+
case "com.amazonaws.paymentcryptography#AccessDeniedException":
|
|
1227
|
+
throw await de_AccessDeniedExceptionRes(parsedOutput, context);
|
|
1228
|
+
case "InternalServerException":
|
|
1229
|
+
case "com.amazonaws.paymentcryptography#InternalServerException":
|
|
1230
|
+
throw await de_InternalServerExceptionRes(parsedOutput, context);
|
|
1231
|
+
case "ResourceNotFoundException":
|
|
1232
|
+
case "com.amazonaws.paymentcryptography#ResourceNotFoundException":
|
|
1233
|
+
throw await de_ResourceNotFoundExceptionRes(parsedOutput, context);
|
|
1234
|
+
case "ServiceUnavailableException":
|
|
1235
|
+
case "com.amazonaws.paymentcryptography#ServiceUnavailableException":
|
|
1236
|
+
throw await de_ServiceUnavailableExceptionRes(parsedOutput, context);
|
|
1237
|
+
case "ThrottlingException":
|
|
1238
|
+
case "com.amazonaws.paymentcryptography#ThrottlingException":
|
|
1239
|
+
throw await de_ThrottlingExceptionRes(parsedOutput, context);
|
|
1240
|
+
case "ValidationException":
|
|
1241
|
+
case "com.amazonaws.paymentcryptography#ValidationException":
|
|
1242
|
+
throw await de_ValidationExceptionRes(parsedOutput, context);
|
|
1243
|
+
default:
|
|
1244
|
+
const parsedBody = parsedOutput.body;
|
|
1245
|
+
return throwDefaultError({
|
|
1246
|
+
output,
|
|
1247
|
+
parsedBody,
|
|
1248
|
+
errorCode
|
|
1249
|
+
});
|
|
1250
|
+
}
|
|
1251
|
+
}, "de_ListAliasesCommandError");
|
|
1252
|
+
var de_ListKeysCommand = /* @__PURE__ */ __name(async (output, context) => {
|
|
1253
|
+
if (output.statusCode >= 300) {
|
|
1254
|
+
return de_ListKeysCommandError(output, context);
|
|
1255
|
+
}
|
|
1256
|
+
const data = await parseBody(output.body, context);
|
|
1257
|
+
let contents = {};
|
|
1258
|
+
contents = (0, import_smithy_client._json)(data);
|
|
1259
|
+
const response = {
|
|
1260
|
+
$metadata: deserializeMetadata(output),
|
|
1261
|
+
...contents
|
|
1262
|
+
};
|
|
1263
|
+
return response;
|
|
1264
|
+
}, "de_ListKeysCommand");
|
|
1265
|
+
var de_ListKeysCommandError = /* @__PURE__ */ __name(async (output, context) => {
|
|
1266
|
+
const parsedOutput = {
|
|
1267
|
+
...output,
|
|
1268
|
+
body: await parseErrorBody(output.body, context)
|
|
1269
|
+
};
|
|
1270
|
+
const errorCode = loadRestJsonErrorCode(output, parsedOutput.body);
|
|
1271
|
+
switch (errorCode) {
|
|
1272
|
+
case "AccessDeniedException":
|
|
1273
|
+
case "com.amazonaws.paymentcryptography#AccessDeniedException":
|
|
1274
|
+
throw await de_AccessDeniedExceptionRes(parsedOutput, context);
|
|
1275
|
+
case "InternalServerException":
|
|
1276
|
+
case "com.amazonaws.paymentcryptography#InternalServerException":
|
|
1277
|
+
throw await de_InternalServerExceptionRes(parsedOutput, context);
|
|
1278
|
+
case "ResourceNotFoundException":
|
|
1279
|
+
case "com.amazonaws.paymentcryptography#ResourceNotFoundException":
|
|
1280
|
+
throw await de_ResourceNotFoundExceptionRes(parsedOutput, context);
|
|
1281
|
+
case "ServiceUnavailableException":
|
|
1282
|
+
case "com.amazonaws.paymentcryptography#ServiceUnavailableException":
|
|
1283
|
+
throw await de_ServiceUnavailableExceptionRes(parsedOutput, context);
|
|
1284
|
+
case "ThrottlingException":
|
|
1285
|
+
case "com.amazonaws.paymentcryptography#ThrottlingException":
|
|
1286
|
+
throw await de_ThrottlingExceptionRes(parsedOutput, context);
|
|
1287
|
+
case "ValidationException":
|
|
1288
|
+
case "com.amazonaws.paymentcryptography#ValidationException":
|
|
1289
|
+
throw await de_ValidationExceptionRes(parsedOutput, context);
|
|
1290
|
+
default:
|
|
1291
|
+
const parsedBody = parsedOutput.body;
|
|
1292
|
+
return throwDefaultError({
|
|
1293
|
+
output,
|
|
1294
|
+
parsedBody,
|
|
1295
|
+
errorCode
|
|
1296
|
+
});
|
|
1297
|
+
}
|
|
1298
|
+
}, "de_ListKeysCommandError");
|
|
1299
|
+
var de_ListTagsForResourceCommand = /* @__PURE__ */ __name(async (output, context) => {
|
|
1300
|
+
if (output.statusCode >= 300) {
|
|
1301
|
+
return de_ListTagsForResourceCommandError(output, context);
|
|
1302
|
+
}
|
|
1303
|
+
const data = await parseBody(output.body, context);
|
|
1304
|
+
let contents = {};
|
|
1305
|
+
contents = (0, import_smithy_client._json)(data);
|
|
1306
|
+
const response = {
|
|
1307
|
+
$metadata: deserializeMetadata(output),
|
|
1308
|
+
...contents
|
|
1309
|
+
};
|
|
1310
|
+
return response;
|
|
1311
|
+
}, "de_ListTagsForResourceCommand");
|
|
1312
|
+
var de_ListTagsForResourceCommandError = /* @__PURE__ */ __name(async (output, context) => {
|
|
1313
|
+
const parsedOutput = {
|
|
1314
|
+
...output,
|
|
1315
|
+
body: await parseErrorBody(output.body, context)
|
|
1316
|
+
};
|
|
1317
|
+
const errorCode = loadRestJsonErrorCode(output, parsedOutput.body);
|
|
1318
|
+
switch (errorCode) {
|
|
1319
|
+
case "AccessDeniedException":
|
|
1320
|
+
case "com.amazonaws.paymentcryptography#AccessDeniedException":
|
|
1321
|
+
throw await de_AccessDeniedExceptionRes(parsedOutput, context);
|
|
1322
|
+
case "InternalServerException":
|
|
1323
|
+
case "com.amazonaws.paymentcryptography#InternalServerException":
|
|
1324
|
+
throw await de_InternalServerExceptionRes(parsedOutput, context);
|
|
1325
|
+
case "ResourceNotFoundException":
|
|
1326
|
+
case "com.amazonaws.paymentcryptography#ResourceNotFoundException":
|
|
1327
|
+
throw await de_ResourceNotFoundExceptionRes(parsedOutput, context);
|
|
1328
|
+
case "ServiceUnavailableException":
|
|
1329
|
+
case "com.amazonaws.paymentcryptography#ServiceUnavailableException":
|
|
1330
|
+
throw await de_ServiceUnavailableExceptionRes(parsedOutput, context);
|
|
1331
|
+
case "ThrottlingException":
|
|
1332
|
+
case "com.amazonaws.paymentcryptography#ThrottlingException":
|
|
1333
|
+
throw await de_ThrottlingExceptionRes(parsedOutput, context);
|
|
1334
|
+
case "ValidationException":
|
|
1335
|
+
case "com.amazonaws.paymentcryptography#ValidationException":
|
|
1336
|
+
throw await de_ValidationExceptionRes(parsedOutput, context);
|
|
1337
|
+
default:
|
|
1338
|
+
const parsedBody = parsedOutput.body;
|
|
1339
|
+
return throwDefaultError({
|
|
1340
|
+
output,
|
|
1341
|
+
parsedBody,
|
|
1342
|
+
errorCode
|
|
1343
|
+
});
|
|
1344
|
+
}
|
|
1345
|
+
}, "de_ListTagsForResourceCommandError");
|
|
1346
|
+
var de_RestoreKeyCommand = /* @__PURE__ */ __name(async (output, context) => {
|
|
1347
|
+
if (output.statusCode >= 300) {
|
|
1348
|
+
return de_RestoreKeyCommandError(output, context);
|
|
1349
|
+
}
|
|
1350
|
+
const data = await parseBody(output.body, context);
|
|
1351
|
+
let contents = {};
|
|
1352
|
+
contents = de_RestoreKeyOutput(data, context);
|
|
1353
|
+
const response = {
|
|
1354
|
+
$metadata: deserializeMetadata(output),
|
|
1355
|
+
...contents
|
|
1356
|
+
};
|
|
1357
|
+
return response;
|
|
1358
|
+
}, "de_RestoreKeyCommand");
|
|
1359
|
+
var de_RestoreKeyCommandError = /* @__PURE__ */ __name(async (output, context) => {
|
|
1360
|
+
const parsedOutput = {
|
|
1361
|
+
...output,
|
|
1362
|
+
body: await parseErrorBody(output.body, context)
|
|
1363
|
+
};
|
|
1364
|
+
const errorCode = loadRestJsonErrorCode(output, parsedOutput.body);
|
|
1365
|
+
switch (errorCode) {
|
|
1366
|
+
case "AccessDeniedException":
|
|
1367
|
+
case "com.amazonaws.paymentcryptography#AccessDeniedException":
|
|
1368
|
+
throw await de_AccessDeniedExceptionRes(parsedOutput, context);
|
|
1369
|
+
case "ConflictException":
|
|
1370
|
+
case "com.amazonaws.paymentcryptography#ConflictException":
|
|
1371
|
+
throw await de_ConflictExceptionRes(parsedOutput, context);
|
|
1372
|
+
case "InternalServerException":
|
|
1373
|
+
case "com.amazonaws.paymentcryptography#InternalServerException":
|
|
1374
|
+
throw await de_InternalServerExceptionRes(parsedOutput, context);
|
|
1375
|
+
case "ResourceNotFoundException":
|
|
1376
|
+
case "com.amazonaws.paymentcryptography#ResourceNotFoundException":
|
|
1377
|
+
throw await de_ResourceNotFoundExceptionRes(parsedOutput, context);
|
|
1378
|
+
case "ServiceQuotaExceededException":
|
|
1379
|
+
case "com.amazonaws.paymentcryptography#ServiceQuotaExceededException":
|
|
1380
|
+
throw await de_ServiceQuotaExceededExceptionRes(parsedOutput, context);
|
|
1381
|
+
case "ServiceUnavailableException":
|
|
1382
|
+
case "com.amazonaws.paymentcryptography#ServiceUnavailableException":
|
|
1383
|
+
throw await de_ServiceUnavailableExceptionRes(parsedOutput, context);
|
|
1384
|
+
case "ThrottlingException":
|
|
1385
|
+
case "com.amazonaws.paymentcryptography#ThrottlingException":
|
|
1386
|
+
throw await de_ThrottlingExceptionRes(parsedOutput, context);
|
|
1387
|
+
case "ValidationException":
|
|
1388
|
+
case "com.amazonaws.paymentcryptography#ValidationException":
|
|
1389
|
+
throw await de_ValidationExceptionRes(parsedOutput, context);
|
|
1390
|
+
default:
|
|
1391
|
+
const parsedBody = parsedOutput.body;
|
|
1392
|
+
return throwDefaultError({
|
|
1393
|
+
output,
|
|
1394
|
+
parsedBody,
|
|
1395
|
+
errorCode
|
|
1396
|
+
});
|
|
1397
|
+
}
|
|
1398
|
+
}, "de_RestoreKeyCommandError");
|
|
1399
|
+
var de_StartKeyUsageCommand = /* @__PURE__ */ __name(async (output, context) => {
|
|
1400
|
+
if (output.statusCode >= 300) {
|
|
1401
|
+
return de_StartKeyUsageCommandError(output, context);
|
|
1402
|
+
}
|
|
1403
|
+
const data = await parseBody(output.body, context);
|
|
1404
|
+
let contents = {};
|
|
1405
|
+
contents = de_StartKeyUsageOutput(data, context);
|
|
1406
|
+
const response = {
|
|
1407
|
+
$metadata: deserializeMetadata(output),
|
|
1408
|
+
...contents
|
|
1409
|
+
};
|
|
1410
|
+
return response;
|
|
1411
|
+
}, "de_StartKeyUsageCommand");
|
|
1412
|
+
var de_StartKeyUsageCommandError = /* @__PURE__ */ __name(async (output, context) => {
|
|
1413
|
+
const parsedOutput = {
|
|
1414
|
+
...output,
|
|
1415
|
+
body: await parseErrorBody(output.body, context)
|
|
1416
|
+
};
|
|
1417
|
+
const errorCode = loadRestJsonErrorCode(output, parsedOutput.body);
|
|
1418
|
+
switch (errorCode) {
|
|
1419
|
+
case "AccessDeniedException":
|
|
1420
|
+
case "com.amazonaws.paymentcryptography#AccessDeniedException":
|
|
1421
|
+
throw await de_AccessDeniedExceptionRes(parsedOutput, context);
|
|
1422
|
+
case "ConflictException":
|
|
1423
|
+
case "com.amazonaws.paymentcryptography#ConflictException":
|
|
1424
|
+
throw await de_ConflictExceptionRes(parsedOutput, context);
|
|
1425
|
+
case "InternalServerException":
|
|
1426
|
+
case "com.amazonaws.paymentcryptography#InternalServerException":
|
|
1427
|
+
throw await de_InternalServerExceptionRes(parsedOutput, context);
|
|
1428
|
+
case "ResourceNotFoundException":
|
|
1429
|
+
case "com.amazonaws.paymentcryptography#ResourceNotFoundException":
|
|
1430
|
+
throw await de_ResourceNotFoundExceptionRes(parsedOutput, context);
|
|
1431
|
+
case "ServiceQuotaExceededException":
|
|
1432
|
+
case "com.amazonaws.paymentcryptography#ServiceQuotaExceededException":
|
|
1433
|
+
throw await de_ServiceQuotaExceededExceptionRes(parsedOutput, context);
|
|
1434
|
+
case "ServiceUnavailableException":
|
|
1435
|
+
case "com.amazonaws.paymentcryptography#ServiceUnavailableException":
|
|
1436
|
+
throw await de_ServiceUnavailableExceptionRes(parsedOutput, context);
|
|
1437
|
+
case "ThrottlingException":
|
|
1438
|
+
case "com.amazonaws.paymentcryptography#ThrottlingException":
|
|
1439
|
+
throw await de_ThrottlingExceptionRes(parsedOutput, context);
|
|
1440
|
+
case "ValidationException":
|
|
1441
|
+
case "com.amazonaws.paymentcryptography#ValidationException":
|
|
1442
|
+
throw await de_ValidationExceptionRes(parsedOutput, context);
|
|
1443
|
+
default:
|
|
1444
|
+
const parsedBody = parsedOutput.body;
|
|
1445
|
+
return throwDefaultError({
|
|
1446
|
+
output,
|
|
1447
|
+
parsedBody,
|
|
1448
|
+
errorCode
|
|
1449
|
+
});
|
|
1450
|
+
}
|
|
1451
|
+
}, "de_StartKeyUsageCommandError");
|
|
1452
|
+
var de_StopKeyUsageCommand = /* @__PURE__ */ __name(async (output, context) => {
|
|
1453
|
+
if (output.statusCode >= 300) {
|
|
1454
|
+
return de_StopKeyUsageCommandError(output, context);
|
|
1455
|
+
}
|
|
1456
|
+
const data = await parseBody(output.body, context);
|
|
1457
|
+
let contents = {};
|
|
1458
|
+
contents = de_StopKeyUsageOutput(data, context);
|
|
1459
|
+
const response = {
|
|
1460
|
+
$metadata: deserializeMetadata(output),
|
|
1461
|
+
...contents
|
|
1462
|
+
};
|
|
1463
|
+
return response;
|
|
1464
|
+
}, "de_StopKeyUsageCommand");
|
|
1465
|
+
var de_StopKeyUsageCommandError = /* @__PURE__ */ __name(async (output, context) => {
|
|
1466
|
+
const parsedOutput = {
|
|
1467
|
+
...output,
|
|
1468
|
+
body: await parseErrorBody(output.body, context)
|
|
1469
|
+
};
|
|
1470
|
+
const errorCode = loadRestJsonErrorCode(output, parsedOutput.body);
|
|
1471
|
+
switch (errorCode) {
|
|
1472
|
+
case "AccessDeniedException":
|
|
1473
|
+
case "com.amazonaws.paymentcryptography#AccessDeniedException":
|
|
1474
|
+
throw await de_AccessDeniedExceptionRes(parsedOutput, context);
|
|
1475
|
+
case "ConflictException":
|
|
1476
|
+
case "com.amazonaws.paymentcryptography#ConflictException":
|
|
1477
|
+
throw await de_ConflictExceptionRes(parsedOutput, context);
|
|
1478
|
+
case "InternalServerException":
|
|
1479
|
+
case "com.amazonaws.paymentcryptography#InternalServerException":
|
|
1480
|
+
throw await de_InternalServerExceptionRes(parsedOutput, context);
|
|
1481
|
+
case "ResourceNotFoundException":
|
|
1482
|
+
case "com.amazonaws.paymentcryptography#ResourceNotFoundException":
|
|
1483
|
+
throw await de_ResourceNotFoundExceptionRes(parsedOutput, context);
|
|
1484
|
+
case "ServiceQuotaExceededException":
|
|
1485
|
+
case "com.amazonaws.paymentcryptography#ServiceQuotaExceededException":
|
|
1486
|
+
throw await de_ServiceQuotaExceededExceptionRes(parsedOutput, context);
|
|
1487
|
+
case "ServiceUnavailableException":
|
|
1488
|
+
case "com.amazonaws.paymentcryptography#ServiceUnavailableException":
|
|
1489
|
+
throw await de_ServiceUnavailableExceptionRes(parsedOutput, context);
|
|
1490
|
+
case "ThrottlingException":
|
|
1491
|
+
case "com.amazonaws.paymentcryptography#ThrottlingException":
|
|
1492
|
+
throw await de_ThrottlingExceptionRes(parsedOutput, context);
|
|
1493
|
+
case "ValidationException":
|
|
1494
|
+
case "com.amazonaws.paymentcryptography#ValidationException":
|
|
1495
|
+
throw await de_ValidationExceptionRes(parsedOutput, context);
|
|
1496
|
+
default:
|
|
1497
|
+
const parsedBody = parsedOutput.body;
|
|
1498
|
+
return throwDefaultError({
|
|
1499
|
+
output,
|
|
1500
|
+
parsedBody,
|
|
1501
|
+
errorCode
|
|
1502
|
+
});
|
|
1503
|
+
}
|
|
1504
|
+
}, "de_StopKeyUsageCommandError");
|
|
1505
|
+
var de_TagResourceCommand = /* @__PURE__ */ __name(async (output, context) => {
|
|
1506
|
+
if (output.statusCode >= 300) {
|
|
1507
|
+
return de_TagResourceCommandError(output, context);
|
|
1508
|
+
}
|
|
1509
|
+
const data = await parseBody(output.body, context);
|
|
1510
|
+
let contents = {};
|
|
1511
|
+
contents = (0, import_smithy_client._json)(data);
|
|
1512
|
+
const response = {
|
|
1513
|
+
$metadata: deserializeMetadata(output),
|
|
1514
|
+
...contents
|
|
1515
|
+
};
|
|
1516
|
+
return response;
|
|
1517
|
+
}, "de_TagResourceCommand");
|
|
1518
|
+
var de_TagResourceCommandError = /* @__PURE__ */ __name(async (output, context) => {
|
|
1519
|
+
const parsedOutput = {
|
|
1520
|
+
...output,
|
|
1521
|
+
body: await parseErrorBody(output.body, context)
|
|
1522
|
+
};
|
|
1523
|
+
const errorCode = loadRestJsonErrorCode(output, parsedOutput.body);
|
|
1524
|
+
switch (errorCode) {
|
|
1525
|
+
case "AccessDeniedException":
|
|
1526
|
+
case "com.amazonaws.paymentcryptography#AccessDeniedException":
|
|
1527
|
+
throw await de_AccessDeniedExceptionRes(parsedOutput, context);
|
|
1528
|
+
case "ConflictException":
|
|
1529
|
+
case "com.amazonaws.paymentcryptography#ConflictException":
|
|
1530
|
+
throw await de_ConflictExceptionRes(parsedOutput, context);
|
|
1531
|
+
case "InternalServerException":
|
|
1532
|
+
case "com.amazonaws.paymentcryptography#InternalServerException":
|
|
1533
|
+
throw await de_InternalServerExceptionRes(parsedOutput, context);
|
|
1534
|
+
case "ResourceNotFoundException":
|
|
1535
|
+
case "com.amazonaws.paymentcryptography#ResourceNotFoundException":
|
|
1536
|
+
throw await de_ResourceNotFoundExceptionRes(parsedOutput, context);
|
|
1537
|
+
case "ServiceQuotaExceededException":
|
|
1538
|
+
case "com.amazonaws.paymentcryptography#ServiceQuotaExceededException":
|
|
1539
|
+
throw await de_ServiceQuotaExceededExceptionRes(parsedOutput, context);
|
|
1540
|
+
case "ServiceUnavailableException":
|
|
1541
|
+
case "com.amazonaws.paymentcryptography#ServiceUnavailableException":
|
|
1542
|
+
throw await de_ServiceUnavailableExceptionRes(parsedOutput, context);
|
|
1543
|
+
case "ThrottlingException":
|
|
1544
|
+
case "com.amazonaws.paymentcryptography#ThrottlingException":
|
|
1545
|
+
throw await de_ThrottlingExceptionRes(parsedOutput, context);
|
|
1546
|
+
case "ValidationException":
|
|
1547
|
+
case "com.amazonaws.paymentcryptography#ValidationException":
|
|
1548
|
+
throw await de_ValidationExceptionRes(parsedOutput, context);
|
|
1549
|
+
default:
|
|
1550
|
+
const parsedBody = parsedOutput.body;
|
|
1551
|
+
return throwDefaultError({
|
|
1552
|
+
output,
|
|
1553
|
+
parsedBody,
|
|
1554
|
+
errorCode
|
|
1555
|
+
});
|
|
1556
|
+
}
|
|
1557
|
+
}, "de_TagResourceCommandError");
|
|
1558
|
+
var de_UntagResourceCommand = /* @__PURE__ */ __name(async (output, context) => {
|
|
1559
|
+
if (output.statusCode >= 300) {
|
|
1560
|
+
return de_UntagResourceCommandError(output, context);
|
|
1561
|
+
}
|
|
1562
|
+
const data = await parseBody(output.body, context);
|
|
1563
|
+
let contents = {};
|
|
1564
|
+
contents = (0, import_smithy_client._json)(data);
|
|
1565
|
+
const response = {
|
|
1566
|
+
$metadata: deserializeMetadata(output),
|
|
1567
|
+
...contents
|
|
1568
|
+
};
|
|
1569
|
+
return response;
|
|
1570
|
+
}, "de_UntagResourceCommand");
|
|
1571
|
+
var de_UntagResourceCommandError = /* @__PURE__ */ __name(async (output, context) => {
|
|
1572
|
+
const parsedOutput = {
|
|
1573
|
+
...output,
|
|
1574
|
+
body: await parseErrorBody(output.body, context)
|
|
1575
|
+
};
|
|
1576
|
+
const errorCode = loadRestJsonErrorCode(output, parsedOutput.body);
|
|
1577
|
+
switch (errorCode) {
|
|
1578
|
+
case "AccessDeniedException":
|
|
1579
|
+
case "com.amazonaws.paymentcryptography#AccessDeniedException":
|
|
1580
|
+
throw await de_AccessDeniedExceptionRes(parsedOutput, context);
|
|
1581
|
+
case "ConflictException":
|
|
1582
|
+
case "com.amazonaws.paymentcryptography#ConflictException":
|
|
1583
|
+
throw await de_ConflictExceptionRes(parsedOutput, context);
|
|
1584
|
+
case "InternalServerException":
|
|
1585
|
+
case "com.amazonaws.paymentcryptography#InternalServerException":
|
|
1586
|
+
throw await de_InternalServerExceptionRes(parsedOutput, context);
|
|
1587
|
+
case "ResourceNotFoundException":
|
|
1588
|
+
case "com.amazonaws.paymentcryptography#ResourceNotFoundException":
|
|
1589
|
+
throw await de_ResourceNotFoundExceptionRes(parsedOutput, context);
|
|
1590
|
+
case "ServiceUnavailableException":
|
|
1591
|
+
case "com.amazonaws.paymentcryptography#ServiceUnavailableException":
|
|
1592
|
+
throw await de_ServiceUnavailableExceptionRes(parsedOutput, context);
|
|
1593
|
+
case "ThrottlingException":
|
|
1594
|
+
case "com.amazonaws.paymentcryptography#ThrottlingException":
|
|
1595
|
+
throw await de_ThrottlingExceptionRes(parsedOutput, context);
|
|
1596
|
+
case "ValidationException":
|
|
1597
|
+
case "com.amazonaws.paymentcryptography#ValidationException":
|
|
1598
|
+
throw await de_ValidationExceptionRes(parsedOutput, context);
|
|
1599
|
+
default:
|
|
1600
|
+
const parsedBody = parsedOutput.body;
|
|
1601
|
+
return throwDefaultError({
|
|
1602
|
+
output,
|
|
1603
|
+
parsedBody,
|
|
1604
|
+
errorCode
|
|
1605
|
+
});
|
|
1606
|
+
}
|
|
1607
|
+
}, "de_UntagResourceCommandError");
|
|
1608
|
+
var de_UpdateAliasCommand = /* @__PURE__ */ __name(async (output, context) => {
|
|
1609
|
+
if (output.statusCode >= 300) {
|
|
1610
|
+
return de_UpdateAliasCommandError(output, context);
|
|
1611
|
+
}
|
|
1612
|
+
const data = await parseBody(output.body, context);
|
|
1613
|
+
let contents = {};
|
|
1614
|
+
contents = (0, import_smithy_client._json)(data);
|
|
1615
|
+
const response = {
|
|
1616
|
+
$metadata: deserializeMetadata(output),
|
|
1617
|
+
...contents
|
|
1618
|
+
};
|
|
1619
|
+
return response;
|
|
1620
|
+
}, "de_UpdateAliasCommand");
|
|
1621
|
+
var de_UpdateAliasCommandError = /* @__PURE__ */ __name(async (output, context) => {
|
|
1622
|
+
const parsedOutput = {
|
|
1623
|
+
...output,
|
|
1624
|
+
body: await parseErrorBody(output.body, context)
|
|
1625
|
+
};
|
|
1626
|
+
const errorCode = loadRestJsonErrorCode(output, parsedOutput.body);
|
|
1627
|
+
switch (errorCode) {
|
|
1628
|
+
case "AccessDeniedException":
|
|
1629
|
+
case "com.amazonaws.paymentcryptography#AccessDeniedException":
|
|
1630
|
+
throw await de_AccessDeniedExceptionRes(parsedOutput, context);
|
|
1631
|
+
case "ConflictException":
|
|
1632
|
+
case "com.amazonaws.paymentcryptography#ConflictException":
|
|
1633
|
+
throw await de_ConflictExceptionRes(parsedOutput, context);
|
|
1634
|
+
case "InternalServerException":
|
|
1635
|
+
case "com.amazonaws.paymentcryptography#InternalServerException":
|
|
1636
|
+
throw await de_InternalServerExceptionRes(parsedOutput, context);
|
|
1637
|
+
case "ResourceNotFoundException":
|
|
1638
|
+
case "com.amazonaws.paymentcryptography#ResourceNotFoundException":
|
|
1639
|
+
throw await de_ResourceNotFoundExceptionRes(parsedOutput, context);
|
|
1640
|
+
case "ServiceUnavailableException":
|
|
1641
|
+
case "com.amazonaws.paymentcryptography#ServiceUnavailableException":
|
|
1642
|
+
throw await de_ServiceUnavailableExceptionRes(parsedOutput, context);
|
|
1643
|
+
case "ThrottlingException":
|
|
1644
|
+
case "com.amazonaws.paymentcryptography#ThrottlingException":
|
|
1645
|
+
throw await de_ThrottlingExceptionRes(parsedOutput, context);
|
|
1646
|
+
case "ValidationException":
|
|
1647
|
+
case "com.amazonaws.paymentcryptography#ValidationException":
|
|
1648
|
+
throw await de_ValidationExceptionRes(parsedOutput, context);
|
|
1649
|
+
default:
|
|
1650
|
+
const parsedBody = parsedOutput.body;
|
|
1651
|
+
return throwDefaultError({
|
|
1652
|
+
output,
|
|
1653
|
+
parsedBody,
|
|
1654
|
+
errorCode
|
|
1655
|
+
});
|
|
1656
|
+
}
|
|
1657
|
+
}, "de_UpdateAliasCommandError");
|
|
1658
|
+
var de_AccessDeniedExceptionRes = /* @__PURE__ */ __name(async (parsedOutput, context) => {
|
|
1659
|
+
const body = parsedOutput.body;
|
|
1660
|
+
const deserialized = (0, import_smithy_client._json)(body);
|
|
1661
|
+
const exception = new AccessDeniedException({
|
|
1662
|
+
$metadata: deserializeMetadata(parsedOutput),
|
|
1663
|
+
...deserialized
|
|
1664
|
+
});
|
|
1665
|
+
return (0, import_smithy_client.decorateServiceException)(exception, body);
|
|
1666
|
+
}, "de_AccessDeniedExceptionRes");
|
|
1667
|
+
var de_ConflictExceptionRes = /* @__PURE__ */ __name(async (parsedOutput, context) => {
|
|
1668
|
+
const body = parsedOutput.body;
|
|
1669
|
+
const deserialized = (0, import_smithy_client._json)(body);
|
|
1670
|
+
const exception = new ConflictException({
|
|
1671
|
+
$metadata: deserializeMetadata(parsedOutput),
|
|
1672
|
+
...deserialized
|
|
1673
|
+
});
|
|
1674
|
+
return (0, import_smithy_client.decorateServiceException)(exception, body);
|
|
1675
|
+
}, "de_ConflictExceptionRes");
|
|
1676
|
+
var de_InternalServerExceptionRes = /* @__PURE__ */ __name(async (parsedOutput, context) => {
|
|
1677
|
+
const body = parsedOutput.body;
|
|
1678
|
+
const deserialized = (0, import_smithy_client._json)(body);
|
|
1679
|
+
const exception = new InternalServerException({
|
|
1680
|
+
$metadata: deserializeMetadata(parsedOutput),
|
|
1681
|
+
...deserialized
|
|
1682
|
+
});
|
|
1683
|
+
return (0, import_smithy_client.decorateServiceException)(exception, body);
|
|
1684
|
+
}, "de_InternalServerExceptionRes");
|
|
1685
|
+
var de_ResourceNotFoundExceptionRes = /* @__PURE__ */ __name(async (parsedOutput, context) => {
|
|
1686
|
+
const body = parsedOutput.body;
|
|
1687
|
+
const deserialized = (0, import_smithy_client._json)(body);
|
|
1688
|
+
const exception = new ResourceNotFoundException({
|
|
1689
|
+
$metadata: deserializeMetadata(parsedOutput),
|
|
1690
|
+
...deserialized
|
|
1691
|
+
});
|
|
1692
|
+
return (0, import_smithy_client.decorateServiceException)(exception, body);
|
|
1693
|
+
}, "de_ResourceNotFoundExceptionRes");
|
|
1694
|
+
var de_ServiceQuotaExceededExceptionRes = /* @__PURE__ */ __name(async (parsedOutput, context) => {
|
|
1695
|
+
const body = parsedOutput.body;
|
|
1696
|
+
const deserialized = (0, import_smithy_client._json)(body);
|
|
1697
|
+
const exception = new ServiceQuotaExceededException({
|
|
1698
|
+
$metadata: deserializeMetadata(parsedOutput),
|
|
1699
|
+
...deserialized
|
|
1700
|
+
});
|
|
1701
|
+
return (0, import_smithy_client.decorateServiceException)(exception, body);
|
|
1702
|
+
}, "de_ServiceQuotaExceededExceptionRes");
|
|
1703
|
+
var de_ServiceUnavailableExceptionRes = /* @__PURE__ */ __name(async (parsedOutput, context) => {
|
|
1704
|
+
const body = parsedOutput.body;
|
|
1705
|
+
const deserialized = (0, import_smithy_client._json)(body);
|
|
1706
|
+
const exception = new ServiceUnavailableException({
|
|
1707
|
+
$metadata: deserializeMetadata(parsedOutput),
|
|
1708
|
+
...deserialized
|
|
1709
|
+
});
|
|
1710
|
+
return (0, import_smithy_client.decorateServiceException)(exception, body);
|
|
1711
|
+
}, "de_ServiceUnavailableExceptionRes");
|
|
1712
|
+
var de_ThrottlingExceptionRes = /* @__PURE__ */ __name(async (parsedOutput, context) => {
|
|
1713
|
+
const body = parsedOutput.body;
|
|
1714
|
+
const deserialized = (0, import_smithy_client._json)(body);
|
|
1715
|
+
const exception = new ThrottlingException({
|
|
1716
|
+
$metadata: deserializeMetadata(parsedOutput),
|
|
1717
|
+
...deserialized
|
|
1718
|
+
});
|
|
1719
|
+
return (0, import_smithy_client.decorateServiceException)(exception, body);
|
|
1720
|
+
}, "de_ThrottlingExceptionRes");
|
|
1721
|
+
var de_ValidationExceptionRes = /* @__PURE__ */ __name(async (parsedOutput, context) => {
|
|
1722
|
+
const body = parsedOutput.body;
|
|
1723
|
+
const deserialized = (0, import_smithy_client._json)(body);
|
|
1724
|
+
const exception = new ValidationException({
|
|
1725
|
+
$metadata: deserializeMetadata(parsedOutput),
|
|
1726
|
+
...deserialized
|
|
1727
|
+
});
|
|
1728
|
+
return (0, import_smithy_client.decorateServiceException)(exception, body);
|
|
1729
|
+
}, "de_ValidationExceptionRes");
|
|
1730
|
+
var de_CreateKeyOutput = /* @__PURE__ */ __name((output, context) => {
|
|
1731
|
+
return (0, import_smithy_client.take)(output, {
|
|
1732
|
+
Key: (_) => de_Key(_, context)
|
|
1733
|
+
});
|
|
1734
|
+
}, "de_CreateKeyOutput");
|
|
1735
|
+
var de_DeleteKeyOutput = /* @__PURE__ */ __name((output, context) => {
|
|
1736
|
+
return (0, import_smithy_client.take)(output, {
|
|
1737
|
+
Key: (_) => de_Key(_, context)
|
|
1738
|
+
});
|
|
1739
|
+
}, "de_DeleteKeyOutput");
|
|
1740
|
+
var de_GetKeyOutput = /* @__PURE__ */ __name((output, context) => {
|
|
1741
|
+
return (0, import_smithy_client.take)(output, {
|
|
1742
|
+
Key: (_) => de_Key(_, context)
|
|
1743
|
+
});
|
|
1744
|
+
}, "de_GetKeyOutput");
|
|
1745
|
+
var de_GetParametersForExportOutput = /* @__PURE__ */ __name((output, context) => {
|
|
1746
|
+
return (0, import_smithy_client.take)(output, {
|
|
1747
|
+
ExportToken: import_smithy_client.expectString,
|
|
1748
|
+
ParametersValidUntilTimestamp: (_) => (0, import_smithy_client.expectNonNull)((0, import_smithy_client.parseEpochTimestamp)((0, import_smithy_client.expectNumber)(_))),
|
|
1749
|
+
SigningKeyAlgorithm: import_smithy_client.expectString,
|
|
1750
|
+
SigningKeyCertificate: import_smithy_client.expectString,
|
|
1751
|
+
SigningKeyCertificateChain: import_smithy_client.expectString
|
|
1752
|
+
});
|
|
1753
|
+
}, "de_GetParametersForExportOutput");
|
|
1754
|
+
var de_GetParametersForImportOutput = /* @__PURE__ */ __name((output, context) => {
|
|
1755
|
+
return (0, import_smithy_client.take)(output, {
|
|
1756
|
+
ImportToken: import_smithy_client.expectString,
|
|
1757
|
+
ParametersValidUntilTimestamp: (_) => (0, import_smithy_client.expectNonNull)((0, import_smithy_client.parseEpochTimestamp)((0, import_smithy_client.expectNumber)(_))),
|
|
1758
|
+
WrappingKeyAlgorithm: import_smithy_client.expectString,
|
|
1759
|
+
WrappingKeyCertificate: import_smithy_client.expectString,
|
|
1760
|
+
WrappingKeyCertificateChain: import_smithy_client.expectString
|
|
1761
|
+
});
|
|
1762
|
+
}, "de_GetParametersForImportOutput");
|
|
1763
|
+
var de_ImportKeyOutput = /* @__PURE__ */ __name((output, context) => {
|
|
1764
|
+
return (0, import_smithy_client.take)(output, {
|
|
1765
|
+
Key: (_) => de_Key(_, context)
|
|
1766
|
+
});
|
|
1767
|
+
}, "de_ImportKeyOutput");
|
|
1768
|
+
var de_Key = /* @__PURE__ */ __name((output, context) => {
|
|
1769
|
+
return (0, import_smithy_client.take)(output, {
|
|
1770
|
+
CreateTimestamp: (_) => (0, import_smithy_client.expectNonNull)((0, import_smithy_client.parseEpochTimestamp)((0, import_smithy_client.expectNumber)(_))),
|
|
1771
|
+
DeletePendingTimestamp: (_) => (0, import_smithy_client.expectNonNull)((0, import_smithy_client.parseEpochTimestamp)((0, import_smithy_client.expectNumber)(_))),
|
|
1772
|
+
DeleteTimestamp: (_) => (0, import_smithy_client.expectNonNull)((0, import_smithy_client.parseEpochTimestamp)((0, import_smithy_client.expectNumber)(_))),
|
|
1773
|
+
Enabled: import_smithy_client.expectBoolean,
|
|
1774
|
+
Exportable: import_smithy_client.expectBoolean,
|
|
1775
|
+
KeyArn: import_smithy_client.expectString,
|
|
1776
|
+
KeyAttributes: import_smithy_client._json,
|
|
1777
|
+
KeyCheckValue: import_smithy_client.expectString,
|
|
1778
|
+
KeyCheckValueAlgorithm: import_smithy_client.expectString,
|
|
1779
|
+
KeyOrigin: import_smithy_client.expectString,
|
|
1780
|
+
KeyState: import_smithy_client.expectString,
|
|
1781
|
+
UsageStartTimestamp: (_) => (0, import_smithy_client.expectNonNull)((0, import_smithy_client.parseEpochTimestamp)((0, import_smithy_client.expectNumber)(_))),
|
|
1782
|
+
UsageStopTimestamp: (_) => (0, import_smithy_client.expectNonNull)((0, import_smithy_client.parseEpochTimestamp)((0, import_smithy_client.expectNumber)(_)))
|
|
1783
|
+
});
|
|
1784
|
+
}, "de_Key");
|
|
1785
|
+
var de_RestoreKeyOutput = /* @__PURE__ */ __name((output, context) => {
|
|
1786
|
+
return (0, import_smithy_client.take)(output, {
|
|
1787
|
+
Key: (_) => de_Key(_, context)
|
|
1788
|
+
});
|
|
1789
|
+
}, "de_RestoreKeyOutput");
|
|
1790
|
+
var de_StartKeyUsageOutput = /* @__PURE__ */ __name((output, context) => {
|
|
1791
|
+
return (0, import_smithy_client.take)(output, {
|
|
1792
|
+
Key: (_) => de_Key(_, context)
|
|
1793
|
+
});
|
|
1794
|
+
}, "de_StartKeyUsageOutput");
|
|
1795
|
+
var de_StopKeyUsageOutput = /* @__PURE__ */ __name((output, context) => {
|
|
1796
|
+
return (0, import_smithy_client.take)(output, {
|
|
1797
|
+
Key: (_) => de_Key(_, context)
|
|
1798
|
+
});
|
|
1799
|
+
}, "de_StopKeyUsageOutput");
|
|
1800
|
+
var deserializeMetadata = /* @__PURE__ */ __name((output) => ({
|
|
1801
|
+
httpStatusCode: output.statusCode,
|
|
1802
|
+
requestId: output.headers["x-amzn-requestid"] ?? output.headers["x-amzn-request-id"] ?? output.headers["x-amz-request-id"],
|
|
1803
|
+
extendedRequestId: output.headers["x-amz-id-2"],
|
|
1804
|
+
cfId: output.headers["x-amz-cf-id"]
|
|
1805
|
+
}), "deserializeMetadata");
|
|
1806
|
+
var collectBodyString = /* @__PURE__ */ __name((streamBody, context) => (0, import_smithy_client.collectBody)(streamBody, context).then((body) => context.utf8Encoder(body)), "collectBodyString");
|
|
1807
|
+
var throwDefaultError = (0, import_smithy_client.withBaseException)(PaymentCryptographyServiceException);
|
|
1808
|
+
var buildHttpRpcRequest = /* @__PURE__ */ __name(async (context, headers, path, resolvedHostname, body) => {
|
|
1809
|
+
const { hostname, protocol = "https", port, path: basePath } = await context.endpoint();
|
|
1810
|
+
const contents = {
|
|
1811
|
+
protocol,
|
|
1812
|
+
hostname,
|
|
1813
|
+
port,
|
|
1814
|
+
method: "POST",
|
|
1815
|
+
path: basePath.endsWith("/") ? basePath.slice(0, -1) + path : basePath + path,
|
|
1816
|
+
headers
|
|
1817
|
+
};
|
|
1818
|
+
if (resolvedHostname !== void 0) {
|
|
1819
|
+
contents.hostname = resolvedHostname;
|
|
1820
|
+
}
|
|
1821
|
+
if (body !== void 0) {
|
|
1822
|
+
contents.body = body;
|
|
1823
|
+
}
|
|
1824
|
+
return new import_protocol_http.HttpRequest(contents);
|
|
1825
|
+
}, "buildHttpRpcRequest");
|
|
1826
|
+
function sharedHeaders(operation) {
|
|
1827
|
+
return {
|
|
1828
|
+
"content-type": "application/x-amz-json-1.0",
|
|
1829
|
+
"x-amz-target": `PaymentCryptographyControlPlane.${operation}`
|
|
1830
|
+
};
|
|
1831
|
+
}
|
|
1832
|
+
__name(sharedHeaders, "sharedHeaders");
|
|
1833
|
+
var parseBody = /* @__PURE__ */ __name((streamBody, context) => collectBodyString(streamBody, context).then((encoded) => {
|
|
1834
|
+
if (encoded.length) {
|
|
1835
|
+
return JSON.parse(encoded);
|
|
1836
|
+
}
|
|
1837
|
+
return {};
|
|
1838
|
+
}), "parseBody");
|
|
1839
|
+
var parseErrorBody = /* @__PURE__ */ __name(async (errorBody, context) => {
|
|
1840
|
+
const value = await parseBody(errorBody, context);
|
|
1841
|
+
value.message = value.message ?? value.Message;
|
|
1842
|
+
return value;
|
|
1843
|
+
}, "parseErrorBody");
|
|
1844
|
+
var loadRestJsonErrorCode = /* @__PURE__ */ __name((output, data) => {
|
|
1845
|
+
const findKey = /* @__PURE__ */ __name((object, key) => Object.keys(object).find((k) => k.toLowerCase() === key.toLowerCase()), "findKey");
|
|
1846
|
+
const sanitizeErrorCode = /* @__PURE__ */ __name((rawValue) => {
|
|
1847
|
+
let cleanValue = rawValue;
|
|
1848
|
+
if (typeof cleanValue === "number") {
|
|
1849
|
+
cleanValue = cleanValue.toString();
|
|
1850
|
+
}
|
|
1851
|
+
if (cleanValue.indexOf(",") >= 0) {
|
|
1852
|
+
cleanValue = cleanValue.split(",")[0];
|
|
1853
|
+
}
|
|
1854
|
+
if (cleanValue.indexOf(":") >= 0) {
|
|
1855
|
+
cleanValue = cleanValue.split(":")[0];
|
|
1856
|
+
}
|
|
1857
|
+
if (cleanValue.indexOf("#") >= 0) {
|
|
1858
|
+
cleanValue = cleanValue.split("#")[1];
|
|
1859
|
+
}
|
|
1860
|
+
return cleanValue;
|
|
1861
|
+
}, "sanitizeErrorCode");
|
|
1862
|
+
const headerKey = findKey(output.headers, "x-amzn-errortype");
|
|
1863
|
+
if (headerKey !== void 0) {
|
|
1864
|
+
return sanitizeErrorCode(output.headers[headerKey]);
|
|
1865
|
+
}
|
|
1866
|
+
if (data.code !== void 0) {
|
|
1867
|
+
return sanitizeErrorCode(data.code);
|
|
1868
|
+
}
|
|
1869
|
+
if (data["__type"] !== void 0) {
|
|
1870
|
+
return sanitizeErrorCode(data["__type"]);
|
|
1871
|
+
}
|
|
1872
|
+
}, "loadRestJsonErrorCode");
|
|
1873
|
+
|
|
1874
|
+
// src/commands/CreateAliasCommand.ts
|
|
1875
|
+
var _CreateAliasCommand = class _CreateAliasCommand extends import_smithy_client.Command.classBuilder().ep({
|
|
1876
|
+
...commonParams
|
|
1877
|
+
}).m(function(Command, cs, config, o) {
|
|
1878
|
+
return [
|
|
1879
|
+
(0, import_middleware_serde.getSerdePlugin)(config, this.serialize, this.deserialize),
|
|
1880
|
+
(0, import_middleware_endpoint.getEndpointPlugin)(config, Command.getEndpointParameterInstructions())
|
|
1881
|
+
];
|
|
1882
|
+
}).s("PaymentCryptographyControlPlane", "CreateAlias", {}).n("PaymentCryptographyClient", "CreateAliasCommand").f(void 0, void 0).ser(se_CreateAliasCommand).de(de_CreateAliasCommand).build() {
|
|
1883
|
+
};
|
|
1884
|
+
__name(_CreateAliasCommand, "CreateAliasCommand");
|
|
1885
|
+
var CreateAliasCommand = _CreateAliasCommand;
|
|
1886
|
+
|
|
1887
|
+
// src/commands/CreateKeyCommand.ts
|
|
1888
|
+
|
|
1889
|
+
|
|
1890
|
+
|
|
1891
|
+
|
|
1892
|
+
var _CreateKeyCommand = class _CreateKeyCommand extends import_smithy_client.Command.classBuilder().ep({
|
|
1893
|
+
...commonParams
|
|
1894
|
+
}).m(function(Command, cs, config, o) {
|
|
1895
|
+
return [
|
|
1896
|
+
(0, import_middleware_serde.getSerdePlugin)(config, this.serialize, this.deserialize),
|
|
1897
|
+
(0, import_middleware_endpoint.getEndpointPlugin)(config, Command.getEndpointParameterInstructions())
|
|
1898
|
+
];
|
|
1899
|
+
}).s("PaymentCryptographyControlPlane", "CreateKey", {}).n("PaymentCryptographyClient", "CreateKeyCommand").f(void 0, void 0).ser(se_CreateKeyCommand).de(de_CreateKeyCommand).build() {
|
|
1900
|
+
};
|
|
1901
|
+
__name(_CreateKeyCommand, "CreateKeyCommand");
|
|
1902
|
+
var CreateKeyCommand = _CreateKeyCommand;
|
|
1903
|
+
|
|
1904
|
+
// src/commands/DeleteAliasCommand.ts
|
|
1905
|
+
|
|
1906
|
+
|
|
1907
|
+
|
|
1908
|
+
|
|
1909
|
+
var _DeleteAliasCommand = class _DeleteAliasCommand extends import_smithy_client.Command.classBuilder().ep({
|
|
1910
|
+
...commonParams
|
|
1911
|
+
}).m(function(Command, cs, config, o) {
|
|
1912
|
+
return [
|
|
1913
|
+
(0, import_middleware_serde.getSerdePlugin)(config, this.serialize, this.deserialize),
|
|
1914
|
+
(0, import_middleware_endpoint.getEndpointPlugin)(config, Command.getEndpointParameterInstructions())
|
|
1915
|
+
];
|
|
1916
|
+
}).s("PaymentCryptographyControlPlane", "DeleteAlias", {}).n("PaymentCryptographyClient", "DeleteAliasCommand").f(void 0, void 0).ser(se_DeleteAliasCommand).de(de_DeleteAliasCommand).build() {
|
|
1917
|
+
};
|
|
1918
|
+
__name(_DeleteAliasCommand, "DeleteAliasCommand");
|
|
1919
|
+
var DeleteAliasCommand = _DeleteAliasCommand;
|
|
1920
|
+
|
|
1921
|
+
// src/commands/DeleteKeyCommand.ts
|
|
1922
|
+
|
|
1923
|
+
|
|
1924
|
+
|
|
1925
|
+
|
|
1926
|
+
var _DeleteKeyCommand = class _DeleteKeyCommand extends import_smithy_client.Command.classBuilder().ep({
|
|
1927
|
+
...commonParams
|
|
1928
|
+
}).m(function(Command, cs, config, o) {
|
|
1929
|
+
return [
|
|
1930
|
+
(0, import_middleware_serde.getSerdePlugin)(config, this.serialize, this.deserialize),
|
|
1931
|
+
(0, import_middleware_endpoint.getEndpointPlugin)(config, Command.getEndpointParameterInstructions())
|
|
1932
|
+
];
|
|
1933
|
+
}).s("PaymentCryptographyControlPlane", "DeleteKey", {}).n("PaymentCryptographyClient", "DeleteKeyCommand").f(void 0, void 0).ser(se_DeleteKeyCommand).de(de_DeleteKeyCommand).build() {
|
|
1934
|
+
};
|
|
1935
|
+
__name(_DeleteKeyCommand, "DeleteKeyCommand");
|
|
1936
|
+
var DeleteKeyCommand = _DeleteKeyCommand;
|
|
1937
|
+
|
|
1938
|
+
// src/commands/ExportKeyCommand.ts
|
|
1939
|
+
|
|
1940
|
+
|
|
1941
|
+
|
|
1942
|
+
|
|
1943
|
+
var _ExportKeyCommand = class _ExportKeyCommand extends import_smithy_client.Command.classBuilder().ep({
|
|
1944
|
+
...commonParams
|
|
1945
|
+
}).m(function(Command, cs, config, o) {
|
|
1946
|
+
return [
|
|
1947
|
+
(0, import_middleware_serde.getSerdePlugin)(config, this.serialize, this.deserialize),
|
|
1948
|
+
(0, import_middleware_endpoint.getEndpointPlugin)(config, Command.getEndpointParameterInstructions())
|
|
1949
|
+
];
|
|
1950
|
+
}).s("PaymentCryptographyControlPlane", "ExportKey", {}).n("PaymentCryptographyClient", "ExportKeyCommand").f(ExportKeyInputFilterSensitiveLog, ExportKeyOutputFilterSensitiveLog).ser(se_ExportKeyCommand).de(de_ExportKeyCommand).build() {
|
|
1951
|
+
};
|
|
1952
|
+
__name(_ExportKeyCommand, "ExportKeyCommand");
|
|
1953
|
+
var ExportKeyCommand = _ExportKeyCommand;
|
|
1954
|
+
|
|
1955
|
+
// src/commands/GetAliasCommand.ts
|
|
1956
|
+
|
|
1957
|
+
|
|
1958
|
+
|
|
1959
|
+
|
|
1960
|
+
var _GetAliasCommand = class _GetAliasCommand extends import_smithy_client.Command.classBuilder().ep({
|
|
1961
|
+
...commonParams
|
|
1962
|
+
}).m(function(Command, cs, config, o) {
|
|
1963
|
+
return [
|
|
1964
|
+
(0, import_middleware_serde.getSerdePlugin)(config, this.serialize, this.deserialize),
|
|
1965
|
+
(0, import_middleware_endpoint.getEndpointPlugin)(config, Command.getEndpointParameterInstructions())
|
|
1966
|
+
];
|
|
1967
|
+
}).s("PaymentCryptographyControlPlane", "GetAlias", {}).n("PaymentCryptographyClient", "GetAliasCommand").f(void 0, void 0).ser(se_GetAliasCommand).de(de_GetAliasCommand).build() {
|
|
1968
|
+
};
|
|
1969
|
+
__name(_GetAliasCommand, "GetAliasCommand");
|
|
1970
|
+
var GetAliasCommand = _GetAliasCommand;
|
|
1971
|
+
|
|
1972
|
+
// src/commands/GetKeyCommand.ts
|
|
1973
|
+
|
|
1974
|
+
|
|
1975
|
+
|
|
1976
|
+
|
|
1977
|
+
var _GetKeyCommand = class _GetKeyCommand extends import_smithy_client.Command.classBuilder().ep({
|
|
1978
|
+
...commonParams
|
|
1979
|
+
}).m(function(Command, cs, config, o) {
|
|
1980
|
+
return [
|
|
1981
|
+
(0, import_middleware_serde.getSerdePlugin)(config, this.serialize, this.deserialize),
|
|
1982
|
+
(0, import_middleware_endpoint.getEndpointPlugin)(config, Command.getEndpointParameterInstructions())
|
|
1983
|
+
];
|
|
1984
|
+
}).s("PaymentCryptographyControlPlane", "GetKey", {}).n("PaymentCryptographyClient", "GetKeyCommand").f(void 0, void 0).ser(se_GetKeyCommand).de(de_GetKeyCommand).build() {
|
|
1985
|
+
};
|
|
1986
|
+
__name(_GetKeyCommand, "GetKeyCommand");
|
|
1987
|
+
var GetKeyCommand = _GetKeyCommand;
|
|
1988
|
+
|
|
1989
|
+
// src/commands/GetParametersForExportCommand.ts
|
|
1990
|
+
|
|
1991
|
+
|
|
1992
|
+
|
|
1993
|
+
|
|
1994
|
+
var _GetParametersForExportCommand = class _GetParametersForExportCommand extends import_smithy_client.Command.classBuilder().ep({
|
|
1995
|
+
...commonParams
|
|
1996
|
+
}).m(function(Command, cs, config, o) {
|
|
1997
|
+
return [
|
|
1998
|
+
(0, import_middleware_serde.getSerdePlugin)(config, this.serialize, this.deserialize),
|
|
1999
|
+
(0, import_middleware_endpoint.getEndpointPlugin)(config, Command.getEndpointParameterInstructions())
|
|
2000
|
+
];
|
|
2001
|
+
}).s("PaymentCryptographyControlPlane", "GetParametersForExport", {}).n("PaymentCryptographyClient", "GetParametersForExportCommand").f(void 0, GetParametersForExportOutputFilterSensitiveLog).ser(se_GetParametersForExportCommand).de(de_GetParametersForExportCommand).build() {
|
|
2002
|
+
};
|
|
2003
|
+
__name(_GetParametersForExportCommand, "GetParametersForExportCommand");
|
|
2004
|
+
var GetParametersForExportCommand = _GetParametersForExportCommand;
|
|
2005
|
+
|
|
2006
|
+
// src/commands/GetParametersForImportCommand.ts
|
|
2007
|
+
|
|
2008
|
+
|
|
2009
|
+
|
|
2010
|
+
|
|
2011
|
+
var _GetParametersForImportCommand = class _GetParametersForImportCommand extends import_smithy_client.Command.classBuilder().ep({
|
|
2012
|
+
...commonParams
|
|
2013
|
+
}).m(function(Command, cs, config, o) {
|
|
2014
|
+
return [
|
|
2015
|
+
(0, import_middleware_serde.getSerdePlugin)(config, this.serialize, this.deserialize),
|
|
2016
|
+
(0, import_middleware_endpoint.getEndpointPlugin)(config, Command.getEndpointParameterInstructions())
|
|
2017
|
+
];
|
|
2018
|
+
}).s("PaymentCryptographyControlPlane", "GetParametersForImport", {}).n("PaymentCryptographyClient", "GetParametersForImportCommand").f(void 0, GetParametersForImportOutputFilterSensitiveLog).ser(se_GetParametersForImportCommand).de(de_GetParametersForImportCommand).build() {
|
|
2019
|
+
};
|
|
2020
|
+
__name(_GetParametersForImportCommand, "GetParametersForImportCommand");
|
|
2021
|
+
var GetParametersForImportCommand = _GetParametersForImportCommand;
|
|
2022
|
+
|
|
2023
|
+
// src/commands/GetPublicKeyCertificateCommand.ts
|
|
2024
|
+
|
|
2025
|
+
|
|
2026
|
+
|
|
2027
|
+
|
|
2028
|
+
var _GetPublicKeyCertificateCommand = class _GetPublicKeyCertificateCommand extends import_smithy_client.Command.classBuilder().ep({
|
|
2029
|
+
...commonParams
|
|
2030
|
+
}).m(function(Command, cs, config, o) {
|
|
2031
|
+
return [
|
|
2032
|
+
(0, import_middleware_serde.getSerdePlugin)(config, this.serialize, this.deserialize),
|
|
2033
|
+
(0, import_middleware_endpoint.getEndpointPlugin)(config, Command.getEndpointParameterInstructions())
|
|
2034
|
+
];
|
|
2035
|
+
}).s("PaymentCryptographyControlPlane", "GetPublicKeyCertificate", {}).n("PaymentCryptographyClient", "GetPublicKeyCertificateCommand").f(void 0, GetPublicKeyCertificateOutputFilterSensitiveLog).ser(se_GetPublicKeyCertificateCommand).de(de_GetPublicKeyCertificateCommand).build() {
|
|
2036
|
+
};
|
|
2037
|
+
__name(_GetPublicKeyCertificateCommand, "GetPublicKeyCertificateCommand");
|
|
2038
|
+
var GetPublicKeyCertificateCommand = _GetPublicKeyCertificateCommand;
|
|
2039
|
+
|
|
2040
|
+
// src/commands/ImportKeyCommand.ts
|
|
2041
|
+
|
|
2042
|
+
|
|
2043
|
+
|
|
2044
|
+
|
|
2045
|
+
var _ImportKeyCommand = class _ImportKeyCommand extends import_smithy_client.Command.classBuilder().ep({
|
|
2046
|
+
...commonParams
|
|
2047
|
+
}).m(function(Command, cs, config, o) {
|
|
2048
|
+
return [
|
|
2049
|
+
(0, import_middleware_serde.getSerdePlugin)(config, this.serialize, this.deserialize),
|
|
2050
|
+
(0, import_middleware_endpoint.getEndpointPlugin)(config, Command.getEndpointParameterInstructions())
|
|
2051
|
+
];
|
|
2052
|
+
}).s("PaymentCryptographyControlPlane", "ImportKey", {}).n("PaymentCryptographyClient", "ImportKeyCommand").f(ImportKeyInputFilterSensitiveLog, void 0).ser(se_ImportKeyCommand).de(de_ImportKeyCommand).build() {
|
|
2053
|
+
};
|
|
2054
|
+
__name(_ImportKeyCommand, "ImportKeyCommand");
|
|
2055
|
+
var ImportKeyCommand = _ImportKeyCommand;
|
|
2056
|
+
|
|
2057
|
+
// src/commands/ListAliasesCommand.ts
|
|
2058
|
+
|
|
2059
|
+
|
|
2060
|
+
|
|
2061
|
+
|
|
2062
|
+
var _ListAliasesCommand = class _ListAliasesCommand extends import_smithy_client.Command.classBuilder().ep({
|
|
2063
|
+
...commonParams
|
|
2064
|
+
}).m(function(Command, cs, config, o) {
|
|
2065
|
+
return [
|
|
2066
|
+
(0, import_middleware_serde.getSerdePlugin)(config, this.serialize, this.deserialize),
|
|
2067
|
+
(0, import_middleware_endpoint.getEndpointPlugin)(config, Command.getEndpointParameterInstructions())
|
|
2068
|
+
];
|
|
2069
|
+
}).s("PaymentCryptographyControlPlane", "ListAliases", {}).n("PaymentCryptographyClient", "ListAliasesCommand").f(void 0, void 0).ser(se_ListAliasesCommand).de(de_ListAliasesCommand).build() {
|
|
2070
|
+
};
|
|
2071
|
+
__name(_ListAliasesCommand, "ListAliasesCommand");
|
|
2072
|
+
var ListAliasesCommand = _ListAliasesCommand;
|
|
2073
|
+
|
|
2074
|
+
// src/commands/ListKeysCommand.ts
|
|
2075
|
+
|
|
2076
|
+
|
|
2077
|
+
|
|
2078
|
+
|
|
2079
|
+
var _ListKeysCommand = class _ListKeysCommand extends import_smithy_client.Command.classBuilder().ep({
|
|
2080
|
+
...commonParams
|
|
2081
|
+
}).m(function(Command, cs, config, o) {
|
|
2082
|
+
return [
|
|
2083
|
+
(0, import_middleware_serde.getSerdePlugin)(config, this.serialize, this.deserialize),
|
|
2084
|
+
(0, import_middleware_endpoint.getEndpointPlugin)(config, Command.getEndpointParameterInstructions())
|
|
2085
|
+
];
|
|
2086
|
+
}).s("PaymentCryptographyControlPlane", "ListKeys", {}).n("PaymentCryptographyClient", "ListKeysCommand").f(void 0, void 0).ser(se_ListKeysCommand).de(de_ListKeysCommand).build() {
|
|
2087
|
+
};
|
|
2088
|
+
__name(_ListKeysCommand, "ListKeysCommand");
|
|
2089
|
+
var ListKeysCommand = _ListKeysCommand;
|
|
2090
|
+
|
|
2091
|
+
// src/commands/ListTagsForResourceCommand.ts
|
|
2092
|
+
|
|
2093
|
+
|
|
2094
|
+
|
|
2095
|
+
|
|
2096
|
+
var _ListTagsForResourceCommand = class _ListTagsForResourceCommand extends import_smithy_client.Command.classBuilder().ep({
|
|
2097
|
+
...commonParams
|
|
2098
|
+
}).m(function(Command, cs, config, o) {
|
|
2099
|
+
return [
|
|
2100
|
+
(0, import_middleware_serde.getSerdePlugin)(config, this.serialize, this.deserialize),
|
|
2101
|
+
(0, import_middleware_endpoint.getEndpointPlugin)(config, Command.getEndpointParameterInstructions())
|
|
2102
|
+
];
|
|
2103
|
+
}).s("PaymentCryptographyControlPlane", "ListTagsForResource", {}).n("PaymentCryptographyClient", "ListTagsForResourceCommand").f(void 0, void 0).ser(se_ListTagsForResourceCommand).de(de_ListTagsForResourceCommand).build() {
|
|
2104
|
+
};
|
|
2105
|
+
__name(_ListTagsForResourceCommand, "ListTagsForResourceCommand");
|
|
2106
|
+
var ListTagsForResourceCommand = _ListTagsForResourceCommand;
|
|
2107
|
+
|
|
2108
|
+
// src/commands/RestoreKeyCommand.ts
|
|
2109
|
+
|
|
2110
|
+
|
|
2111
|
+
|
|
2112
|
+
|
|
2113
|
+
var _RestoreKeyCommand = class _RestoreKeyCommand extends import_smithy_client.Command.classBuilder().ep({
|
|
2114
|
+
...commonParams
|
|
2115
|
+
}).m(function(Command, cs, config, o) {
|
|
2116
|
+
return [
|
|
2117
|
+
(0, import_middleware_serde.getSerdePlugin)(config, this.serialize, this.deserialize),
|
|
2118
|
+
(0, import_middleware_endpoint.getEndpointPlugin)(config, Command.getEndpointParameterInstructions())
|
|
2119
|
+
];
|
|
2120
|
+
}).s("PaymentCryptographyControlPlane", "RestoreKey", {}).n("PaymentCryptographyClient", "RestoreKeyCommand").f(void 0, void 0).ser(se_RestoreKeyCommand).de(de_RestoreKeyCommand).build() {
|
|
2121
|
+
};
|
|
2122
|
+
__name(_RestoreKeyCommand, "RestoreKeyCommand");
|
|
2123
|
+
var RestoreKeyCommand = _RestoreKeyCommand;
|
|
2124
|
+
|
|
2125
|
+
// src/commands/StartKeyUsageCommand.ts
|
|
2126
|
+
|
|
2127
|
+
|
|
2128
|
+
|
|
2129
|
+
|
|
2130
|
+
var _StartKeyUsageCommand = class _StartKeyUsageCommand extends import_smithy_client.Command.classBuilder().ep({
|
|
2131
|
+
...commonParams
|
|
2132
|
+
}).m(function(Command, cs, config, o) {
|
|
2133
|
+
return [
|
|
2134
|
+
(0, import_middleware_serde.getSerdePlugin)(config, this.serialize, this.deserialize),
|
|
2135
|
+
(0, import_middleware_endpoint.getEndpointPlugin)(config, Command.getEndpointParameterInstructions())
|
|
2136
|
+
];
|
|
2137
|
+
}).s("PaymentCryptographyControlPlane", "StartKeyUsage", {}).n("PaymentCryptographyClient", "StartKeyUsageCommand").f(void 0, void 0).ser(se_StartKeyUsageCommand).de(de_StartKeyUsageCommand).build() {
|
|
2138
|
+
};
|
|
2139
|
+
__name(_StartKeyUsageCommand, "StartKeyUsageCommand");
|
|
2140
|
+
var StartKeyUsageCommand = _StartKeyUsageCommand;
|
|
2141
|
+
|
|
2142
|
+
// src/commands/StopKeyUsageCommand.ts
|
|
2143
|
+
|
|
2144
|
+
|
|
2145
|
+
|
|
2146
|
+
|
|
2147
|
+
var _StopKeyUsageCommand = class _StopKeyUsageCommand extends import_smithy_client.Command.classBuilder().ep({
|
|
2148
|
+
...commonParams
|
|
2149
|
+
}).m(function(Command, cs, config, o) {
|
|
2150
|
+
return [
|
|
2151
|
+
(0, import_middleware_serde.getSerdePlugin)(config, this.serialize, this.deserialize),
|
|
2152
|
+
(0, import_middleware_endpoint.getEndpointPlugin)(config, Command.getEndpointParameterInstructions())
|
|
2153
|
+
];
|
|
2154
|
+
}).s("PaymentCryptographyControlPlane", "StopKeyUsage", {}).n("PaymentCryptographyClient", "StopKeyUsageCommand").f(void 0, void 0).ser(se_StopKeyUsageCommand).de(de_StopKeyUsageCommand).build() {
|
|
2155
|
+
};
|
|
2156
|
+
__name(_StopKeyUsageCommand, "StopKeyUsageCommand");
|
|
2157
|
+
var StopKeyUsageCommand = _StopKeyUsageCommand;
|
|
2158
|
+
|
|
2159
|
+
// src/commands/TagResourceCommand.ts
|
|
2160
|
+
|
|
2161
|
+
|
|
2162
|
+
|
|
2163
|
+
|
|
2164
|
+
var _TagResourceCommand = class _TagResourceCommand extends import_smithy_client.Command.classBuilder().ep({
|
|
2165
|
+
...commonParams
|
|
2166
|
+
}).m(function(Command, cs, config, o) {
|
|
2167
|
+
return [
|
|
2168
|
+
(0, import_middleware_serde.getSerdePlugin)(config, this.serialize, this.deserialize),
|
|
2169
|
+
(0, import_middleware_endpoint.getEndpointPlugin)(config, Command.getEndpointParameterInstructions())
|
|
2170
|
+
];
|
|
2171
|
+
}).s("PaymentCryptographyControlPlane", "TagResource", {}).n("PaymentCryptographyClient", "TagResourceCommand").f(void 0, void 0).ser(se_TagResourceCommand).de(de_TagResourceCommand).build() {
|
|
2172
|
+
};
|
|
2173
|
+
__name(_TagResourceCommand, "TagResourceCommand");
|
|
2174
|
+
var TagResourceCommand = _TagResourceCommand;
|
|
2175
|
+
|
|
2176
|
+
// src/commands/UntagResourceCommand.ts
|
|
2177
|
+
|
|
2178
|
+
|
|
2179
|
+
|
|
2180
|
+
|
|
2181
|
+
var _UntagResourceCommand = class _UntagResourceCommand extends import_smithy_client.Command.classBuilder().ep({
|
|
2182
|
+
...commonParams
|
|
2183
|
+
}).m(function(Command, cs, config, o) {
|
|
2184
|
+
return [
|
|
2185
|
+
(0, import_middleware_serde.getSerdePlugin)(config, this.serialize, this.deserialize),
|
|
2186
|
+
(0, import_middleware_endpoint.getEndpointPlugin)(config, Command.getEndpointParameterInstructions())
|
|
2187
|
+
];
|
|
2188
|
+
}).s("PaymentCryptographyControlPlane", "UntagResource", {}).n("PaymentCryptographyClient", "UntagResourceCommand").f(void 0, void 0).ser(se_UntagResourceCommand).de(de_UntagResourceCommand).build() {
|
|
2189
|
+
};
|
|
2190
|
+
__name(_UntagResourceCommand, "UntagResourceCommand");
|
|
2191
|
+
var UntagResourceCommand = _UntagResourceCommand;
|
|
2192
|
+
|
|
2193
|
+
// src/commands/UpdateAliasCommand.ts
|
|
2194
|
+
|
|
2195
|
+
|
|
2196
|
+
|
|
2197
|
+
|
|
2198
|
+
var _UpdateAliasCommand = class _UpdateAliasCommand extends import_smithy_client.Command.classBuilder().ep({
|
|
2199
|
+
...commonParams
|
|
2200
|
+
}).m(function(Command, cs, config, o) {
|
|
2201
|
+
return [
|
|
2202
|
+
(0, import_middleware_serde.getSerdePlugin)(config, this.serialize, this.deserialize),
|
|
2203
|
+
(0, import_middleware_endpoint.getEndpointPlugin)(config, Command.getEndpointParameterInstructions())
|
|
2204
|
+
];
|
|
2205
|
+
}).s("PaymentCryptographyControlPlane", "UpdateAlias", {}).n("PaymentCryptographyClient", "UpdateAliasCommand").f(void 0, void 0).ser(se_UpdateAliasCommand).de(de_UpdateAliasCommand).build() {
|
|
2206
|
+
};
|
|
2207
|
+
__name(_UpdateAliasCommand, "UpdateAliasCommand");
|
|
2208
|
+
var UpdateAliasCommand = _UpdateAliasCommand;
|
|
2209
|
+
|
|
2210
|
+
// src/PaymentCryptography.ts
|
|
2211
|
+
var commands = {
|
|
2212
|
+
CreateAliasCommand,
|
|
2213
|
+
CreateKeyCommand,
|
|
2214
|
+
DeleteAliasCommand,
|
|
2215
|
+
DeleteKeyCommand,
|
|
2216
|
+
ExportKeyCommand,
|
|
2217
|
+
GetAliasCommand,
|
|
2218
|
+
GetKeyCommand,
|
|
2219
|
+
GetParametersForExportCommand,
|
|
2220
|
+
GetParametersForImportCommand,
|
|
2221
|
+
GetPublicKeyCertificateCommand,
|
|
2222
|
+
ImportKeyCommand,
|
|
2223
|
+
ListAliasesCommand,
|
|
2224
|
+
ListKeysCommand,
|
|
2225
|
+
ListTagsForResourceCommand,
|
|
2226
|
+
RestoreKeyCommand,
|
|
2227
|
+
StartKeyUsageCommand,
|
|
2228
|
+
StopKeyUsageCommand,
|
|
2229
|
+
TagResourceCommand,
|
|
2230
|
+
UntagResourceCommand,
|
|
2231
|
+
UpdateAliasCommand
|
|
2232
|
+
};
|
|
2233
|
+
var _PaymentCryptography = class _PaymentCryptography extends PaymentCryptographyClient {
|
|
2234
|
+
};
|
|
2235
|
+
__name(_PaymentCryptography, "PaymentCryptography");
|
|
2236
|
+
var PaymentCryptography = _PaymentCryptography;
|
|
2237
|
+
(0, import_smithy_client.createAggregatedClient)(commands, PaymentCryptography);
|
|
2238
|
+
|
|
2239
|
+
// src/pagination/ListAliasesPaginator.ts
|
|
2240
|
+
var import_core = require("@smithy/core");
|
|
2241
|
+
var paginateListAliases = (0, import_core.createPaginator)(PaymentCryptographyClient, ListAliasesCommand, "NextToken", "NextToken", "MaxResults");
|
|
2242
|
+
|
|
2243
|
+
// src/pagination/ListKeysPaginator.ts
|
|
2244
|
+
|
|
2245
|
+
var paginateListKeys = (0, import_core.createPaginator)(PaymentCryptographyClient, ListKeysCommand, "NextToken", "NextToken", "MaxResults");
|
|
2246
|
+
|
|
2247
|
+
// src/pagination/ListTagsForResourcePaginator.ts
|
|
2248
|
+
|
|
2249
|
+
var paginateListTagsForResource = (0, import_core.createPaginator)(PaymentCryptographyClient, ListTagsForResourceCommand, "NextToken", "NextToken", "MaxResults");
|
|
2250
|
+
|
|
2251
|
+
// src/index.ts
|
|
2252
|
+
var import_util_endpoints = require("@aws-sdk/util-endpoints");
|
|
2253
|
+
// Annotate the CommonJS export names for ESM import in node:
|
|
2254
|
+
0 && (module.exports = {
|
|
2255
|
+
AccessDeniedException,
|
|
2256
|
+
ConflictException,
|
|
2257
|
+
CreateAliasCommand,
|
|
2258
|
+
CreateKeyCommand,
|
|
2259
|
+
DeleteAliasCommand,
|
|
2260
|
+
DeleteKeyCommand,
|
|
2261
|
+
ExportKeyCommand,
|
|
2262
|
+
ExportKeyCryptogramFilterSensitiveLog,
|
|
2263
|
+
ExportKeyInputFilterSensitiveLog,
|
|
2264
|
+
ExportKeyMaterial,
|
|
2265
|
+
ExportKeyMaterialFilterSensitiveLog,
|
|
2266
|
+
ExportKeyOutputFilterSensitiveLog,
|
|
2267
|
+
ExportTr34KeyBlockFilterSensitiveLog,
|
|
2268
|
+
GetAliasCommand,
|
|
2269
|
+
GetKeyCommand,
|
|
2270
|
+
GetParametersForExportCommand,
|
|
2271
|
+
GetParametersForExportOutputFilterSensitiveLog,
|
|
2272
|
+
GetParametersForImportCommand,
|
|
2273
|
+
GetParametersForImportOutputFilterSensitiveLog,
|
|
2274
|
+
GetPublicKeyCertificateCommand,
|
|
2275
|
+
GetPublicKeyCertificateOutputFilterSensitiveLog,
|
|
2276
|
+
ImportKeyCommand,
|
|
2277
|
+
ImportKeyInputFilterSensitiveLog,
|
|
2278
|
+
ImportKeyMaterial,
|
|
2279
|
+
ImportKeyMaterialFilterSensitiveLog,
|
|
2280
|
+
ImportTr34KeyBlockFilterSensitiveLog,
|
|
2281
|
+
InternalServerException,
|
|
2282
|
+
KeyAlgorithm,
|
|
2283
|
+
KeyCheckValueAlgorithm,
|
|
2284
|
+
KeyClass,
|
|
2285
|
+
KeyMaterialType,
|
|
2286
|
+
KeyOrigin,
|
|
2287
|
+
KeyState,
|
|
2288
|
+
KeyUsage,
|
|
2289
|
+
ListAliasesCommand,
|
|
2290
|
+
ListKeysCommand,
|
|
2291
|
+
ListTagsForResourceCommand,
|
|
2292
|
+
PaymentCryptography,
|
|
2293
|
+
PaymentCryptographyClient,
|
|
2294
|
+
PaymentCryptographyServiceException,
|
|
2295
|
+
ResourceNotFoundException,
|
|
2296
|
+
RestoreKeyCommand,
|
|
2297
|
+
RootCertificatePublicKeyFilterSensitiveLog,
|
|
2298
|
+
ServiceQuotaExceededException,
|
|
2299
|
+
ServiceUnavailableException,
|
|
2300
|
+
StartKeyUsageCommand,
|
|
2301
|
+
StopKeyUsageCommand,
|
|
2302
|
+
TagResourceCommand,
|
|
2303
|
+
ThrottlingException,
|
|
2304
|
+
Tr34KeyBlockFormat,
|
|
2305
|
+
TrustedCertificatePublicKeyFilterSensitiveLog,
|
|
2306
|
+
UntagResourceCommand,
|
|
2307
|
+
UpdateAliasCommand,
|
|
2308
|
+
ValidationException,
|
|
2309
|
+
WrappedKeyFilterSensitiveLog,
|
|
2310
|
+
WrappedKeyMaterialFormat,
|
|
2311
|
+
WrappingKeySpec,
|
|
2312
|
+
__Client,
|
|
2313
|
+
paginateListAliases,
|
|
2314
|
+
paginateListKeys,
|
|
2315
|
+
paginateListTagsForResource
|
|
2316
|
+
});
|