@volcengine/pulumi 0.0.45 → 0.0.46

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (146) hide show
  1. package/kms/asymmetricCiphertext.d.ts +129 -0
  2. package/kms/asymmetricCiphertext.js +90 -0
  3. package/kms/asymmetricCiphertext.js.map +1 -0
  4. package/kms/asymmetricCiphertexts.d.ts +129 -0
  5. package/kms/asymmetricCiphertexts.js +69 -0
  6. package/kms/asymmetricCiphertexts.js.map +1 -0
  7. package/kms/asymmetricPlaintexts.d.ts +129 -0
  8. package/kms/asymmetricPlaintexts.js +69 -0
  9. package/kms/asymmetricPlaintexts.js.map +1 -0
  10. package/kms/asymmetricSignature.d.ts +142 -0
  11. package/kms/asymmetricSignature.js +93 -0
  12. package/kms/asymmetricSignature.js.map +1 -0
  13. package/kms/asymmetricSignatures.d.ts +140 -0
  14. package/kms/asymmetricSignatures.js +72 -0
  15. package/kms/asymmetricSignatures.js.map +1 -0
  16. package/kms/asymmetricVerifications.d.ts +139 -0
  17. package/kms/asymmetricVerifications.js +63 -0
  18. package/kms/asymmetricVerifications.js.map +1 -0
  19. package/kms/cancelKeyDeletion.d.ts +105 -0
  20. package/kms/cancelKeyDeletion.js +80 -0
  21. package/kms/cancelKeyDeletion.js.map +1 -0
  22. package/kms/cancelSecretDeletion.d.ts +75 -0
  23. package/kms/cancelSecretDeletion.js +73 -0
  24. package/kms/cancelSecretDeletion.js.map +1 -0
  25. package/kms/ciphertext.d.ts +122 -0
  26. package/kms/ciphertext.js +80 -0
  27. package/kms/ciphertext.js.map +1 -0
  28. package/kms/ciphertexts.d.ts +115 -0
  29. package/kms/ciphertexts.js +55 -0
  30. package/kms/ciphertexts.js.map +1 -0
  31. package/kms/dataKeys.d.ts +121 -0
  32. package/kms/dataKeys.js +62 -0
  33. package/kms/dataKeys.js.map +1 -0
  34. package/kms/getAsymmetricCiphertexts.d.ts +127 -0
  35. package/kms/getAsymmetricCiphertexts.js +66 -0
  36. package/kms/getAsymmetricCiphertexts.js.map +1 -0
  37. package/kms/getAsymmetricPlaintexts.d.ts +127 -0
  38. package/kms/getAsymmetricPlaintexts.js +66 -0
  39. package/kms/getAsymmetricPlaintexts.js.map +1 -0
  40. package/kms/getAsymmetricSignatures.d.ts +138 -0
  41. package/kms/getAsymmetricSignatures.js +69 -0
  42. package/kms/getAsymmetricSignatures.js.map +1 -0
  43. package/kms/getAsymmetricVerifications.d.ts +137 -0
  44. package/kms/getAsymmetricVerifications.js +60 -0
  45. package/kms/getAsymmetricVerifications.js.map +1 -0
  46. package/kms/getCiphertexts.d.ts +113 -0
  47. package/kms/getCiphertexts.js +52 -0
  48. package/kms/getCiphertexts.js.map +1 -0
  49. package/kms/getDataKeys.d.ts +119 -0
  50. package/kms/getDataKeys.js +59 -0
  51. package/kms/getDataKeys.js.map +1 -0
  52. package/kms/getKeyMaterials.d.ts +120 -0
  53. package/kms/getKeyMaterials.js +57 -0
  54. package/kms/getKeyMaterials.js.map +1 -0
  55. package/kms/getKeys.d.ts +10 -10
  56. package/kms/getMacVerifications.d.ts +139 -0
  57. package/kms/getMacVerifications.js +67 -0
  58. package/kms/getMacVerifications.js.map +1 -0
  59. package/kms/getMacs.d.ts +130 -0
  60. package/kms/getMacs.js +66 -0
  61. package/kms/getMacs.js.map +1 -0
  62. package/kms/getPlaintexts.d.ts +94 -0
  63. package/kms/getPlaintexts.js +57 -0
  64. package/kms/getPlaintexts.js.map +1 -0
  65. package/kms/getPublicKeys.d.ts +98 -0
  66. package/kms/getPublicKeys.js +51 -0
  67. package/kms/getPublicKeys.js.map +1 -0
  68. package/kms/getReEncrypts.d.ts +132 -0
  69. package/kms/getReEncrypts.js +63 -0
  70. package/kms/getReEncrypts.js.map +1 -0
  71. package/kms/getRegions.d.ts +62 -0
  72. package/kms/getRegions.js +42 -0
  73. package/kms/getRegions.js.map +1 -0
  74. package/kms/getSecretVersions.d.ts +75 -0
  75. package/kms/getSecretVersions.js +46 -0
  76. package/kms/getSecretVersions.js.map +1 -0
  77. package/kms/getSecrets.d.ts +12 -0
  78. package/kms/getSecrets.js +1 -0
  79. package/kms/getSecrets.js.map +1 -1
  80. package/kms/index.d.ts +120 -0
  81. package/kms/index.js +146 -1
  82. package/kms/index.js.map +1 -1
  83. package/kms/key.d.ts +98 -24
  84. package/kms/key.js +44 -0
  85. package/kms/key.js.map +1 -1
  86. package/kms/keyArchive.d.ts +6 -6
  87. package/kms/keyEnable.d.ts +6 -6
  88. package/kms/keyMaterial.d.ts +141 -0
  89. package/kms/keyMaterial.js +88 -0
  90. package/kms/keyMaterial.js.map +1 -0
  91. package/kms/keyMaterials.d.ts +122 -0
  92. package/kms/keyMaterials.js +60 -0
  93. package/kms/keyMaterials.js.map +1 -0
  94. package/kms/keyPrimaryRegion.d.ts +113 -0
  95. package/kms/keyPrimaryRegion.js +87 -0
  96. package/kms/keyPrimaryRegion.js.map +1 -0
  97. package/kms/keyRotation.d.ts +22 -7
  98. package/kms/keyRotation.js +6 -1
  99. package/kms/keyRotation.js.map +1 -1
  100. package/kms/keyring.d.ts +3 -3
  101. package/kms/keys.d.ts +10 -10
  102. package/kms/macVerifications.d.ts +141 -0
  103. package/kms/macVerifications.js +70 -0
  104. package/kms/macVerifications.js.map +1 -0
  105. package/kms/macs.d.ts +132 -0
  106. package/kms/macs.js +69 -0
  107. package/kms/macs.js.map +1 -0
  108. package/kms/plaintexts.d.ts +96 -0
  109. package/kms/plaintexts.js +60 -0
  110. package/kms/plaintexts.js.map +1 -0
  111. package/kms/publicKeys.d.ts +100 -0
  112. package/kms/publicKeys.js +54 -0
  113. package/kms/publicKeys.js.map +1 -0
  114. package/kms/reEncrypt.d.ts +138 -0
  115. package/kms/reEncrypt.js +86 -0
  116. package/kms/reEncrypt.js.map +1 -0
  117. package/kms/reEncrypts.d.ts +134 -0
  118. package/kms/reEncrypts.js +66 -0
  119. package/kms/reEncrypts.js.map +1 -0
  120. package/kms/regions.d.ts +64 -0
  121. package/kms/regions.js +45 -0
  122. package/kms/regions.js.map +1 -0
  123. package/kms/replicateKey.d.ts +144 -0
  124. package/kms/replicateKey.js +90 -0
  125. package/kms/replicateKey.js.map +1 -0
  126. package/kms/secret.d.ts +70 -12
  127. package/kms/secret.js +22 -0
  128. package/kms/secret.js.map +1 -1
  129. package/kms/secretBackup.d.ts +91 -0
  130. package/kms/secretBackup.js +77 -0
  131. package/kms/secretBackup.js.map +1 -0
  132. package/kms/secretRestore.d.ts +92 -0
  133. package/kms/secretRestore.js +82 -0
  134. package/kms/secretRestore.js.map +1 -0
  135. package/kms/secretRotate.d.ts +82 -0
  136. package/kms/secretRotate.js +76 -0
  137. package/kms/secretRotate.js.map +1 -0
  138. package/kms/secretVersions.d.ts +77 -0
  139. package/kms/secretVersions.js +49 -0
  140. package/kms/secretVersions.js.map +1 -0
  141. package/kms/secrets.d.ts +12 -0
  142. package/kms/secrets.js +1 -0
  143. package/kms/secrets.js.map +1 -1
  144. package/package.json +1 -1
  145. package/types/input.d.ts +10 -0
  146. package/types/output.d.ts +304 -10
@@ -0,0 +1,129 @@
1
+ import * as pulumi from "@pulumi/pulumi";
2
+ /**
3
+ * Provides a resource to manage kms asymmetric ciphertext
4
+ * ## Example Usage
5
+ *
6
+ * ```typescript
7
+ * import * as pulumi from "@pulumi/pulumi";
8
+ * import * as volcengine from "@volcengine/pulumi";
9
+ *
10
+ * const encrypt1 = new volcengine.kms.AsymmetricCiphertext("encrypt1", {
11
+ * algorithm: "RSAES_OAEP_SHA_256",
12
+ * keyId: "9601e1af-ad69-42df-****-eaf10ce6a3e9",
13
+ * plaintext: "VGhpcyBpcyBhIHBsYWludGV4dCBleGFtcGxlLg==",
14
+ * });
15
+ * const encrypt2 = new volcengine.kms.AsymmetricCiphertext("encrypt2", {
16
+ * algorithm: "SM2PKE",
17
+ * keyName: "ec-sm2",
18
+ * keyringName: "Tf-test",
19
+ * plaintext: "VGhpcyBpcyBhIHBsYWludGV4dCBleGFtcGxlLg==",
20
+ * });
21
+ * ```
22
+ *
23
+ * ## Import
24
+ *
25
+ * The KmsAsymmetricCiphertext is not support import.
26
+ */
27
+ export declare class AsymmetricCiphertext extends pulumi.CustomResource {
28
+ /**
29
+ * Get an existing AsymmetricCiphertext resource's state with the given name, ID, and optional extra
30
+ * properties used to qualify the lookup.
31
+ *
32
+ * @param name The _unique_ name of the resulting resource.
33
+ * @param id The _unique_ provider ID of the resource to lookup.
34
+ * @param state Any extra arguments used during the lookup.
35
+ * @param opts Optional settings to control the behavior of the CustomResource.
36
+ */
37
+ static get(name: string, id: pulumi.Input<pulumi.ID>, state?: AsymmetricCiphertextState, opts?: pulumi.CustomResourceOptions): AsymmetricCiphertext;
38
+ /**
39
+ * Returns true if the given object is an instance of AsymmetricCiphertext. This is designed to work even
40
+ * when multiple copies of the Pulumi SDK have been loaded into the same process.
41
+ */
42
+ static isInstance(obj: any): obj is AsymmetricCiphertext;
43
+ /**
44
+ * The encryption algorithm. valid values: `RSAES_OAEP_SHA_256`, `SM2PKE`.
45
+ */
46
+ readonly algorithm: pulumi.Output<string>;
47
+ /**
48
+ * The ciphertext, Base64 encoded. The produced ciphertextBlob stays stable across applies. If the plaintext should be re-encrypted on each apply use the `volcengine.kms.getAsymmetricCiphertexts` data source.
49
+ */
50
+ readonly ciphertextBlob: pulumi.Output<string>;
51
+ /**
52
+ * The id of the key. When keyId is not specified, both keyringName and keyName must be specified.
53
+ */
54
+ readonly keyId: pulumi.Output<string | undefined>;
55
+ /**
56
+ * The name of the key.
57
+ */
58
+ readonly keyName: pulumi.Output<string | undefined>;
59
+ /**
60
+ * The name of the keyring.
61
+ */
62
+ readonly keyringName: pulumi.Output<string | undefined>;
63
+ /**
64
+ * The plaintext to be encrypted, Base64 encoded.
65
+ */
66
+ readonly plaintext: pulumi.Output<string>;
67
+ /**
68
+ * Create a AsymmetricCiphertext resource with the given unique name, arguments, and options.
69
+ *
70
+ * @param name The _unique_ name of the resource.
71
+ * @param args The arguments to use to populate this resource's properties.
72
+ * @param opts A bag of options that control this resource's behavior.
73
+ */
74
+ constructor(name: string, args: AsymmetricCiphertextArgs, opts?: pulumi.CustomResourceOptions);
75
+ }
76
+ /**
77
+ * Input properties used for looking up and filtering AsymmetricCiphertext resources.
78
+ */
79
+ export interface AsymmetricCiphertextState {
80
+ /**
81
+ * The encryption algorithm. valid values: `RSAES_OAEP_SHA_256`, `SM2PKE`.
82
+ */
83
+ algorithm?: pulumi.Input<string>;
84
+ /**
85
+ * The ciphertext, Base64 encoded. The produced ciphertextBlob stays stable across applies. If the plaintext should be re-encrypted on each apply use the `volcengine.kms.getAsymmetricCiphertexts` data source.
86
+ */
87
+ ciphertextBlob?: pulumi.Input<string>;
88
+ /**
89
+ * The id of the key. When keyId is not specified, both keyringName and keyName must be specified.
90
+ */
91
+ keyId?: pulumi.Input<string>;
92
+ /**
93
+ * The name of the key.
94
+ */
95
+ keyName?: pulumi.Input<string>;
96
+ /**
97
+ * The name of the keyring.
98
+ */
99
+ keyringName?: pulumi.Input<string>;
100
+ /**
101
+ * The plaintext to be encrypted, Base64 encoded.
102
+ */
103
+ plaintext?: pulumi.Input<string>;
104
+ }
105
+ /**
106
+ * The set of arguments for constructing a AsymmetricCiphertext resource.
107
+ */
108
+ export interface AsymmetricCiphertextArgs {
109
+ /**
110
+ * The encryption algorithm. valid values: `RSAES_OAEP_SHA_256`, `SM2PKE`.
111
+ */
112
+ algorithm: pulumi.Input<string>;
113
+ /**
114
+ * The id of the key. When keyId is not specified, both keyringName and keyName must be specified.
115
+ */
116
+ keyId?: pulumi.Input<string>;
117
+ /**
118
+ * The name of the key.
119
+ */
120
+ keyName?: pulumi.Input<string>;
121
+ /**
122
+ * The name of the keyring.
123
+ */
124
+ keyringName?: pulumi.Input<string>;
125
+ /**
126
+ * The plaintext to be encrypted, Base64 encoded.
127
+ */
128
+ plaintext: pulumi.Input<string>;
129
+ }
@@ -0,0 +1,90 @@
1
+ "use strict";
2
+ // *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
+ // *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+ Object.defineProperty(exports, "__esModule", { value: true });
5
+ exports.AsymmetricCiphertext = void 0;
6
+ const pulumi = require("@pulumi/pulumi");
7
+ const utilities = require("../utilities");
8
+ /**
9
+ * Provides a resource to manage kms asymmetric ciphertext
10
+ * ## Example Usage
11
+ *
12
+ * ```typescript
13
+ * import * as pulumi from "@pulumi/pulumi";
14
+ * import * as volcengine from "@volcengine/pulumi";
15
+ *
16
+ * const encrypt1 = new volcengine.kms.AsymmetricCiphertext("encrypt1", {
17
+ * algorithm: "RSAES_OAEP_SHA_256",
18
+ * keyId: "9601e1af-ad69-42df-****-eaf10ce6a3e9",
19
+ * plaintext: "VGhpcyBpcyBhIHBsYWludGV4dCBleGFtcGxlLg==",
20
+ * });
21
+ * const encrypt2 = new volcengine.kms.AsymmetricCiphertext("encrypt2", {
22
+ * algorithm: "SM2PKE",
23
+ * keyName: "ec-sm2",
24
+ * keyringName: "Tf-test",
25
+ * plaintext: "VGhpcyBpcyBhIHBsYWludGV4dCBleGFtcGxlLg==",
26
+ * });
27
+ * ```
28
+ *
29
+ * ## Import
30
+ *
31
+ * The KmsAsymmetricCiphertext is not support import.
32
+ */
33
+ class AsymmetricCiphertext extends pulumi.CustomResource {
34
+ /**
35
+ * Get an existing AsymmetricCiphertext resource's state with the given name, ID, and optional extra
36
+ * properties used to qualify the lookup.
37
+ *
38
+ * @param name The _unique_ name of the resulting resource.
39
+ * @param id The _unique_ provider ID of the resource to lookup.
40
+ * @param state Any extra arguments used during the lookup.
41
+ * @param opts Optional settings to control the behavior of the CustomResource.
42
+ */
43
+ static get(name, id, state, opts) {
44
+ return new AsymmetricCiphertext(name, state, Object.assign(Object.assign({}, opts), { id: id }));
45
+ }
46
+ /**
47
+ * Returns true if the given object is an instance of AsymmetricCiphertext. This is designed to work even
48
+ * when multiple copies of the Pulumi SDK have been loaded into the same process.
49
+ */
50
+ static isInstance(obj) {
51
+ if (obj === undefined || obj === null) {
52
+ return false;
53
+ }
54
+ return obj['__pulumiType'] === AsymmetricCiphertext.__pulumiType;
55
+ }
56
+ constructor(name, argsOrState, opts) {
57
+ let resourceInputs = {};
58
+ opts = opts || {};
59
+ if (opts.id) {
60
+ const state = argsOrState;
61
+ resourceInputs["algorithm"] = state ? state.algorithm : undefined;
62
+ resourceInputs["ciphertextBlob"] = state ? state.ciphertextBlob : undefined;
63
+ resourceInputs["keyId"] = state ? state.keyId : undefined;
64
+ resourceInputs["keyName"] = state ? state.keyName : undefined;
65
+ resourceInputs["keyringName"] = state ? state.keyringName : undefined;
66
+ resourceInputs["plaintext"] = state ? state.plaintext : undefined;
67
+ }
68
+ else {
69
+ const args = argsOrState;
70
+ if ((!args || args.algorithm === undefined) && !opts.urn) {
71
+ throw new Error("Missing required property 'algorithm'");
72
+ }
73
+ if ((!args || args.plaintext === undefined) && !opts.urn) {
74
+ throw new Error("Missing required property 'plaintext'");
75
+ }
76
+ resourceInputs["algorithm"] = args ? args.algorithm : undefined;
77
+ resourceInputs["keyId"] = args ? args.keyId : undefined;
78
+ resourceInputs["keyName"] = args ? args.keyName : undefined;
79
+ resourceInputs["keyringName"] = args ? args.keyringName : undefined;
80
+ resourceInputs["plaintext"] = args ? args.plaintext : undefined;
81
+ resourceInputs["ciphertextBlob"] = undefined /*out*/;
82
+ }
83
+ opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts);
84
+ super(AsymmetricCiphertext.__pulumiType, name, resourceInputs, opts);
85
+ }
86
+ }
87
+ exports.AsymmetricCiphertext = AsymmetricCiphertext;
88
+ /** @internal */
89
+ AsymmetricCiphertext.__pulumiType = 'volcengine:kms/asymmetricCiphertext:AsymmetricCiphertext';
90
+ //# sourceMappingURL=asymmetricCiphertext.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"asymmetricCiphertext.js","sourceRoot":"","sources":["../../kms/asymmetricCiphertext.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;GAwBG;AACH,MAAa,oBAAqB,SAAQ,MAAM,CAAC,cAAc;IAC3D;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAiC,EAAE,IAAmC;QAC/H,OAAO,IAAI,oBAAoB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC3E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,oBAAoB,CAAC,YAAY,CAAC;IACrE,CAAC;IAmCD,YAAY,IAAY,EAAE,WAAkE,EAAE,IAAmC;QAC7H,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAoD,CAAC;YACnE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;SACrE;aAAM;YACH,MAAM,IAAI,GAAG,WAAmD,CAAC;YACjE,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,SAAS,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACtD,MAAM,IAAI,KAAK,CAAC,uCAAuC,CAAC,CAAC;aAC5D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,SAAS,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACtD,MAAM,IAAI,KAAK,CAAC,uCAAuC,CAAC,CAAC;aAC5D;YACD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,gBAAgB,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SACxD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,oBAAoB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACzE,CAAC;;AAzFL,oDA0FC;AA5EG,gBAAgB;AACO,iCAAY,GAAG,0DAA0D,CAAC"}
@@ -0,0 +1,129 @@
1
+ import * as pulumi from "@pulumi/pulumi";
2
+ import * as outputs from "../types/output";
3
+ /**
4
+ * Use this data source to query detailed information of kms asymmetric ciphertexts
5
+ * ## Example Usage
6
+ *
7
+ * ```typescript
8
+ * import * as pulumi from "@pulumi/pulumi";
9
+ * import * as volcengine from "@pulumi/volcengine";
10
+ *
11
+ * const encrypt1 = volcengine.kms.getAsymmetricCiphertexts({
12
+ * algorithm: "RSAES_OAEP_SHA_256",
13
+ * keyId: "9601e1af-ad69-42df-****-eaf10ce6a3e9",
14
+ * plaintext: "VGhpcyBpcyBhIHBsYWludGV4dCBleGFtcGxlLg==",
15
+ * });
16
+ * const encrypt2 = volcengine.kms.getAsymmetricCiphertexts({
17
+ * algorithm: "SM2PKE",
18
+ * keyName: "ec-sm2",
19
+ * keyringName: "Tf-test",
20
+ * plaintext: "VGhpcyBpcyBhIHBsYWludGV4dCBleGFtcGxlLg==",
21
+ * });
22
+ * ```
23
+ */
24
+ /** @deprecated volcengine.kms.AsymmetricCiphertexts has been deprecated in favor of volcengine.kms.getAsymmetricCiphertexts */
25
+ export declare function asymmetricCiphertexts(args: AsymmetricCiphertextsArgs, opts?: pulumi.InvokeOptions): Promise<AsymmetricCiphertextsResult>;
26
+ /**
27
+ * A collection of arguments for invoking AsymmetricCiphertexts.
28
+ */
29
+ export interface AsymmetricCiphertextsArgs {
30
+ /**
31
+ * The encryption algorithm. valid values: `RSAES_OAEP_SHA_256`, `SM2PKE`.
32
+ */
33
+ algorithm: string;
34
+ /**
35
+ * The id of the key. When keyId is not specified, both keyringName and keyName must be specified.
36
+ */
37
+ keyId?: string;
38
+ /**
39
+ * The name of the key.
40
+ */
41
+ keyName?: string;
42
+ /**
43
+ * The name of the keyring.
44
+ */
45
+ keyringName?: string;
46
+ /**
47
+ * File name where to save data source results.
48
+ */
49
+ outputFile?: string;
50
+ /**
51
+ * The plaintext to be encrypted, Base64 encoded.
52
+ */
53
+ plaintext: string;
54
+ }
55
+ /**
56
+ * A collection of values returned by AsymmetricCiphertexts.
57
+ */
58
+ export interface AsymmetricCiphertextsResult {
59
+ readonly algorithm: string;
60
+ /**
61
+ * The information about the ciphertext.
62
+ */
63
+ readonly ciphertextInfos: outputs.kms.AsymmetricCiphertextsCiphertextInfo[];
64
+ /**
65
+ * The provider-assigned unique ID for this managed resource.
66
+ */
67
+ readonly id: string;
68
+ readonly keyId?: string;
69
+ readonly keyName?: string;
70
+ readonly keyringName?: string;
71
+ readonly outputFile?: string;
72
+ readonly plaintext: string;
73
+ /**
74
+ * The total count of query.
75
+ */
76
+ readonly totalCount: number;
77
+ }
78
+ /**
79
+ * Use this data source to query detailed information of kms asymmetric ciphertexts
80
+ * ## Example Usage
81
+ *
82
+ * ```typescript
83
+ * import * as pulumi from "@pulumi/pulumi";
84
+ * import * as volcengine from "@pulumi/volcengine";
85
+ *
86
+ * const encrypt1 = volcengine.kms.getAsymmetricCiphertexts({
87
+ * algorithm: "RSAES_OAEP_SHA_256",
88
+ * keyId: "9601e1af-ad69-42df-****-eaf10ce6a3e9",
89
+ * plaintext: "VGhpcyBpcyBhIHBsYWludGV4dCBleGFtcGxlLg==",
90
+ * });
91
+ * const encrypt2 = volcengine.kms.getAsymmetricCiphertexts({
92
+ * algorithm: "SM2PKE",
93
+ * keyName: "ec-sm2",
94
+ * keyringName: "Tf-test",
95
+ * plaintext: "VGhpcyBpcyBhIHBsYWludGV4dCBleGFtcGxlLg==",
96
+ * });
97
+ * ```
98
+ */
99
+ /** @deprecated volcengine.kms.AsymmetricCiphertexts has been deprecated in favor of volcengine.kms.getAsymmetricCiphertexts */
100
+ export declare function asymmetricCiphertextsOutput(args: AsymmetricCiphertextsOutputArgs, opts?: pulumi.InvokeOptions): pulumi.Output<AsymmetricCiphertextsResult>;
101
+ /**
102
+ * A collection of arguments for invoking AsymmetricCiphertexts.
103
+ */
104
+ export interface AsymmetricCiphertextsOutputArgs {
105
+ /**
106
+ * The encryption algorithm. valid values: `RSAES_OAEP_SHA_256`, `SM2PKE`.
107
+ */
108
+ algorithm: pulumi.Input<string>;
109
+ /**
110
+ * The id of the key. When keyId is not specified, both keyringName and keyName must be specified.
111
+ */
112
+ keyId?: pulumi.Input<string>;
113
+ /**
114
+ * The name of the key.
115
+ */
116
+ keyName?: pulumi.Input<string>;
117
+ /**
118
+ * The name of the keyring.
119
+ */
120
+ keyringName?: pulumi.Input<string>;
121
+ /**
122
+ * File name where to save data source results.
123
+ */
124
+ outputFile?: pulumi.Input<string>;
125
+ /**
126
+ * The plaintext to be encrypted, Base64 encoded.
127
+ */
128
+ plaintext: pulumi.Input<string>;
129
+ }
@@ -0,0 +1,69 @@
1
+ "use strict";
2
+ // *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
+ // *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+ Object.defineProperty(exports, "__esModule", { value: true });
5
+ exports.asymmetricCiphertextsOutput = exports.asymmetricCiphertexts = void 0;
6
+ const pulumi = require("@pulumi/pulumi");
7
+ const utilities = require("../utilities");
8
+ /**
9
+ * Use this data source to query detailed information of kms asymmetric ciphertexts
10
+ * ## Example Usage
11
+ *
12
+ * ```typescript
13
+ * import * as pulumi from "@pulumi/pulumi";
14
+ * import * as volcengine from "@pulumi/volcengine";
15
+ *
16
+ * const encrypt1 = volcengine.kms.getAsymmetricCiphertexts({
17
+ * algorithm: "RSAES_OAEP_SHA_256",
18
+ * keyId: "9601e1af-ad69-42df-****-eaf10ce6a3e9",
19
+ * plaintext: "VGhpcyBpcyBhIHBsYWludGV4dCBleGFtcGxlLg==",
20
+ * });
21
+ * const encrypt2 = volcengine.kms.getAsymmetricCiphertexts({
22
+ * algorithm: "SM2PKE",
23
+ * keyName: "ec-sm2",
24
+ * keyringName: "Tf-test",
25
+ * plaintext: "VGhpcyBpcyBhIHBsYWludGV4dCBleGFtcGxlLg==",
26
+ * });
27
+ * ```
28
+ */
29
+ /** @deprecated volcengine.kms.AsymmetricCiphertexts has been deprecated in favor of volcengine.kms.getAsymmetricCiphertexts */
30
+ function asymmetricCiphertexts(args, opts) {
31
+ pulumi.log.warn("asymmetricCiphertexts is deprecated: volcengine.kms.AsymmetricCiphertexts has been deprecated in favor of volcengine.kms.getAsymmetricCiphertexts");
32
+ opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {});
33
+ return pulumi.runtime.invoke("volcengine:kms/asymmetricCiphertexts:AsymmetricCiphertexts", {
34
+ "algorithm": args.algorithm,
35
+ "keyId": args.keyId,
36
+ "keyName": args.keyName,
37
+ "keyringName": args.keyringName,
38
+ "outputFile": args.outputFile,
39
+ "plaintext": args.plaintext,
40
+ }, opts);
41
+ }
42
+ exports.asymmetricCiphertexts = asymmetricCiphertexts;
43
+ /**
44
+ * Use this data source to query detailed information of kms asymmetric ciphertexts
45
+ * ## Example Usage
46
+ *
47
+ * ```typescript
48
+ * import * as pulumi from "@pulumi/pulumi";
49
+ * import * as volcengine from "@pulumi/volcengine";
50
+ *
51
+ * const encrypt1 = volcengine.kms.getAsymmetricCiphertexts({
52
+ * algorithm: "RSAES_OAEP_SHA_256",
53
+ * keyId: "9601e1af-ad69-42df-****-eaf10ce6a3e9",
54
+ * plaintext: "VGhpcyBpcyBhIHBsYWludGV4dCBleGFtcGxlLg==",
55
+ * });
56
+ * const encrypt2 = volcengine.kms.getAsymmetricCiphertexts({
57
+ * algorithm: "SM2PKE",
58
+ * keyName: "ec-sm2",
59
+ * keyringName: "Tf-test",
60
+ * plaintext: "VGhpcyBpcyBhIHBsYWludGV4dCBleGFtcGxlLg==",
61
+ * });
62
+ * ```
63
+ */
64
+ /** @deprecated volcengine.kms.AsymmetricCiphertexts has been deprecated in favor of volcengine.kms.getAsymmetricCiphertexts */
65
+ function asymmetricCiphertextsOutput(args, opts) {
66
+ return pulumi.output(args).apply((a) => asymmetricCiphertexts(a, opts));
67
+ }
68
+ exports.asymmetricCiphertextsOutput = asymmetricCiphertextsOutput;
69
+ //# sourceMappingURL=asymmetricCiphertexts.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"asymmetricCiphertexts.js","sourceRoot":"","sources":["../../kms/asymmetricCiphertexts.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;GAoBG;AACH,+HAA+H;AAC/H,SAAgB,qBAAqB,CAAC,IAA+B,EAAE,IAA2B;IAC9F,MAAM,CAAC,GAAG,CAAC,IAAI,CAAC,mJAAmJ,CAAC,CAAA;IAEpK,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,4DAA4D,EAAE;QACvF,WAAW,EAAE,IAAI,CAAC,SAAS;QAC3B,OAAO,EAAE,IAAI,CAAC,KAAK;QACnB,SAAS,EAAE,IAAI,CAAC,OAAO;QACvB,aAAa,EAAE,IAAI,CAAC,WAAW;QAC/B,YAAY,EAAE,IAAI,CAAC,UAAU;QAC7B,WAAW,EAAE,IAAI,CAAC,SAAS;KAC9B,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAZD,sDAYC;AAuDD;;;;;;;;;;;;;;;;;;;;GAoBG;AACH,+HAA+H;AAC/H,SAAgB,2BAA2B,CAAC,IAAqC,EAAE,IAA2B;IAC1G,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAM,EAAE,EAAE,CAAC,qBAAqB,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAA;AAChF,CAAC;AAFD,kEAEC"}
@@ -0,0 +1,129 @@
1
+ import * as pulumi from "@pulumi/pulumi";
2
+ import * as outputs from "../types/output";
3
+ /**
4
+ * Use this data source to query detailed information of kms asymmetric plaintexts
5
+ * ## Example Usage
6
+ *
7
+ * ```typescript
8
+ * import * as pulumi from "@pulumi/pulumi";
9
+ * import * as volcengine from "@pulumi/volcengine";
10
+ * import * as volcengine from "@volcengine/pulumi";
11
+ *
12
+ * const encryptStable = new volcengine.kms.AsymmetricCiphertext("encryptStable", {
13
+ * keyId: "9601e1af-ad69-42df-****-eaf10ce6a3e9",
14
+ * plaintext: "VGhpcyBpcyBhIHBsYWludGV4dCBleGFtcGxLg==",
15
+ * algorithm: "RSAES_OAEP_SHA_256",
16
+ * });
17
+ * const decrypt = pulumi.all([encryptStable.keyId, encryptStable.ciphertextBlob]).apply(([keyId, ciphertextBlob]) => volcengine.kms.getAsymmetricPlaintextsOutput({
18
+ * keyId: keyId,
19
+ * ciphertextBlob: ciphertextBlob,
20
+ * algorithm: "RSAES_OAEP_SHA_256",
21
+ * }));
22
+ * ```
23
+ */
24
+ /** @deprecated volcengine.kms.AsymmetricPlaintexts has been deprecated in favor of volcengine.kms.getAsymmetricPlaintexts */
25
+ export declare function asymmetricPlaintexts(args: AsymmetricPlaintextsArgs, opts?: pulumi.InvokeOptions): Promise<AsymmetricPlaintextsResult>;
26
+ /**
27
+ * A collection of arguments for invoking AsymmetricPlaintexts.
28
+ */
29
+ export interface AsymmetricPlaintextsArgs {
30
+ /**
31
+ * The encryption algorithm. valid values: `RSAES_OAEP_SHA_256`, `SM2PKE`.
32
+ */
33
+ algorithm: string;
34
+ /**
35
+ * The ciphertext to be decrypted, Base64 encoded.
36
+ */
37
+ ciphertextBlob: string;
38
+ /**
39
+ * The id of the key. When keyId is not specified, both keyringName and keyName must be specified.
40
+ */
41
+ keyId?: string;
42
+ /**
43
+ * The name of the key.
44
+ */
45
+ keyName?: string;
46
+ /**
47
+ * The name of the keyring.
48
+ */
49
+ keyringName?: string;
50
+ /**
51
+ * File name where to save data source results.
52
+ */
53
+ outputFile?: string;
54
+ }
55
+ /**
56
+ * A collection of values returned by AsymmetricPlaintexts.
57
+ */
58
+ export interface AsymmetricPlaintextsResult {
59
+ readonly algorithm: string;
60
+ readonly ciphertextBlob: string;
61
+ /**
62
+ * The provider-assigned unique ID for this managed resource.
63
+ */
64
+ readonly id: string;
65
+ readonly keyId?: string;
66
+ readonly keyName?: string;
67
+ readonly keyringName?: string;
68
+ readonly outputFile?: string;
69
+ /**
70
+ * The decrypted plaintext.
71
+ */
72
+ readonly plaintextInfos: outputs.kms.AsymmetricPlaintextsPlaintextInfo[];
73
+ /**
74
+ * The total count of query.
75
+ */
76
+ readonly totalCount: number;
77
+ }
78
+ /**
79
+ * Use this data source to query detailed information of kms asymmetric plaintexts
80
+ * ## Example Usage
81
+ *
82
+ * ```typescript
83
+ * import * as pulumi from "@pulumi/pulumi";
84
+ * import * as volcengine from "@pulumi/volcengine";
85
+ * import * as volcengine from "@volcengine/pulumi";
86
+ *
87
+ * const encryptStable = new volcengine.kms.AsymmetricCiphertext("encryptStable", {
88
+ * keyId: "9601e1af-ad69-42df-****-eaf10ce6a3e9",
89
+ * plaintext: "VGhpcyBpcyBhIHBsYWludGV4dCBleGFtcGxLg==",
90
+ * algorithm: "RSAES_OAEP_SHA_256",
91
+ * });
92
+ * const decrypt = pulumi.all([encryptStable.keyId, encryptStable.ciphertextBlob]).apply(([keyId, ciphertextBlob]) => volcengine.kms.getAsymmetricPlaintextsOutput({
93
+ * keyId: keyId,
94
+ * ciphertextBlob: ciphertextBlob,
95
+ * algorithm: "RSAES_OAEP_SHA_256",
96
+ * }));
97
+ * ```
98
+ */
99
+ /** @deprecated volcengine.kms.AsymmetricPlaintexts has been deprecated in favor of volcengine.kms.getAsymmetricPlaintexts */
100
+ export declare function asymmetricPlaintextsOutput(args: AsymmetricPlaintextsOutputArgs, opts?: pulumi.InvokeOptions): pulumi.Output<AsymmetricPlaintextsResult>;
101
+ /**
102
+ * A collection of arguments for invoking AsymmetricPlaintexts.
103
+ */
104
+ export interface AsymmetricPlaintextsOutputArgs {
105
+ /**
106
+ * The encryption algorithm. valid values: `RSAES_OAEP_SHA_256`, `SM2PKE`.
107
+ */
108
+ algorithm: pulumi.Input<string>;
109
+ /**
110
+ * The ciphertext to be decrypted, Base64 encoded.
111
+ */
112
+ ciphertextBlob: pulumi.Input<string>;
113
+ /**
114
+ * The id of the key. When keyId is not specified, both keyringName and keyName must be specified.
115
+ */
116
+ keyId?: pulumi.Input<string>;
117
+ /**
118
+ * The name of the key.
119
+ */
120
+ keyName?: pulumi.Input<string>;
121
+ /**
122
+ * The name of the keyring.
123
+ */
124
+ keyringName?: pulumi.Input<string>;
125
+ /**
126
+ * File name where to save data source results.
127
+ */
128
+ outputFile?: pulumi.Input<string>;
129
+ }
@@ -0,0 +1,69 @@
1
+ "use strict";
2
+ // *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
+ // *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+ Object.defineProperty(exports, "__esModule", { value: true });
5
+ exports.asymmetricPlaintextsOutput = exports.asymmetricPlaintexts = void 0;
6
+ const pulumi = require("@pulumi/pulumi");
7
+ const utilities = require("../utilities");
8
+ /**
9
+ * Use this data source to query detailed information of kms asymmetric plaintexts
10
+ * ## Example Usage
11
+ *
12
+ * ```typescript
13
+ * import * as pulumi from "@pulumi/pulumi";
14
+ * import * as volcengine from "@pulumi/volcengine";
15
+ * import * as volcengine from "@volcengine/pulumi";
16
+ *
17
+ * const encryptStable = new volcengine.kms.AsymmetricCiphertext("encryptStable", {
18
+ * keyId: "9601e1af-ad69-42df-****-eaf10ce6a3e9",
19
+ * plaintext: "VGhpcyBpcyBhIHBsYWludGV4dCBleGFtcGxLg==",
20
+ * algorithm: "RSAES_OAEP_SHA_256",
21
+ * });
22
+ * const decrypt = pulumi.all([encryptStable.keyId, encryptStable.ciphertextBlob]).apply(([keyId, ciphertextBlob]) => volcengine.kms.getAsymmetricPlaintextsOutput({
23
+ * keyId: keyId,
24
+ * ciphertextBlob: ciphertextBlob,
25
+ * algorithm: "RSAES_OAEP_SHA_256",
26
+ * }));
27
+ * ```
28
+ */
29
+ /** @deprecated volcengine.kms.AsymmetricPlaintexts has been deprecated in favor of volcengine.kms.getAsymmetricPlaintexts */
30
+ function asymmetricPlaintexts(args, opts) {
31
+ pulumi.log.warn("asymmetricPlaintexts is deprecated: volcengine.kms.AsymmetricPlaintexts has been deprecated in favor of volcengine.kms.getAsymmetricPlaintexts");
32
+ opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {});
33
+ return pulumi.runtime.invoke("volcengine:kms/asymmetricPlaintexts:AsymmetricPlaintexts", {
34
+ "algorithm": args.algorithm,
35
+ "ciphertextBlob": args.ciphertextBlob,
36
+ "keyId": args.keyId,
37
+ "keyName": args.keyName,
38
+ "keyringName": args.keyringName,
39
+ "outputFile": args.outputFile,
40
+ }, opts);
41
+ }
42
+ exports.asymmetricPlaintexts = asymmetricPlaintexts;
43
+ /**
44
+ * Use this data source to query detailed information of kms asymmetric plaintexts
45
+ * ## Example Usage
46
+ *
47
+ * ```typescript
48
+ * import * as pulumi from "@pulumi/pulumi";
49
+ * import * as volcengine from "@pulumi/volcengine";
50
+ * import * as volcengine from "@volcengine/pulumi";
51
+ *
52
+ * const encryptStable = new volcengine.kms.AsymmetricCiphertext("encryptStable", {
53
+ * keyId: "9601e1af-ad69-42df-****-eaf10ce6a3e9",
54
+ * plaintext: "VGhpcyBpcyBhIHBsYWludGV4dCBleGFtcGxLg==",
55
+ * algorithm: "RSAES_OAEP_SHA_256",
56
+ * });
57
+ * const decrypt = pulumi.all([encryptStable.keyId, encryptStable.ciphertextBlob]).apply(([keyId, ciphertextBlob]) => volcengine.kms.getAsymmetricPlaintextsOutput({
58
+ * keyId: keyId,
59
+ * ciphertextBlob: ciphertextBlob,
60
+ * algorithm: "RSAES_OAEP_SHA_256",
61
+ * }));
62
+ * ```
63
+ */
64
+ /** @deprecated volcengine.kms.AsymmetricPlaintexts has been deprecated in favor of volcengine.kms.getAsymmetricPlaintexts */
65
+ function asymmetricPlaintextsOutput(args, opts) {
66
+ return pulumi.output(args).apply((a) => asymmetricPlaintexts(a, opts));
67
+ }
68
+ exports.asymmetricPlaintextsOutput = asymmetricPlaintextsOutput;
69
+ //# sourceMappingURL=asymmetricPlaintexts.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"asymmetricPlaintexts.js","sourceRoot":"","sources":["../../kms/asymmetricPlaintexts.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;GAoBG;AACH,6HAA6H;AAC7H,SAAgB,oBAAoB,CAAC,IAA8B,EAAE,IAA2B;IAC5F,MAAM,CAAC,GAAG,CAAC,IAAI,CAAC,gJAAgJ,CAAC,CAAA;IAEjK,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,0DAA0D,EAAE;QACrF,WAAW,EAAE,IAAI,CAAC,SAAS;QAC3B,gBAAgB,EAAE,IAAI,CAAC,cAAc;QACrC,OAAO,EAAE,IAAI,CAAC,KAAK;QACnB,SAAS,EAAE,IAAI,CAAC,OAAO;QACvB,aAAa,EAAE,IAAI,CAAC,WAAW;QAC/B,YAAY,EAAE,IAAI,CAAC,UAAU;KAChC,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAZD,oDAYC;AAuDD;;;;;;;;;;;;;;;;;;;;GAoBG;AACH,6HAA6H;AAC7H,SAAgB,0BAA0B,CAAC,IAAoC,EAAE,IAA2B;IACxG,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAM,EAAE,EAAE,CAAC,oBAAoB,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAA;AAC/E,CAAC;AAFD,gEAEC"}