aws-sdk 2.1409.0 → 2.1411.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +9 -1
- package/README.md +1 -1
- package/apis/batch-2016-08-10.min.json +58 -45
- package/apis/kms-2014-11-01.min.json +57 -15
- package/apis/mgn-2020-02-26.min.json +274 -130
- package/apis/mgn-2020-02-26.paginators.json +6 -0
- package/apis/sagemaker-2017-07-24.min.json +566 -561
- package/clients/batch.d.ts +23 -11
- package/clients/comprehendmedical.d.ts +46 -46
- package/clients/connect.d.ts +11 -11
- package/clients/kms.d.ts +58 -2
- package/clients/mgn.d.ts +275 -7
- package/clients/sagemaker.d.ts +18 -11
- package/clients/securityhub.d.ts +19 -19
- package/dist/aws-sdk-core-react-native.js +1 -1
- package/dist/aws-sdk-react-native.js +6 -6
- package/dist/aws-sdk.js +60 -18
- package/dist/aws-sdk.min.js +43 -43
- package/lib/core.js +1 -1
- package/package.json +1 -1
package/clients/kms.d.ts
CHANGED
@@ -332,11 +332,11 @@ declare class KMS extends Service {
|
|
332
332
|
*/
|
333
333
|
revokeGrant(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
|
334
334
|
/**
|
335
|
-
* Schedules the deletion of a KMS key. By default, KMS applies a waiting period of 30 days, but you can specify a waiting period of 7-30 days. When this operation is successful, the key state of the KMS key changes to PendingDeletion and the key can't be used in any cryptographic operations. It remains in this state for the duration of the waiting period. Before the waiting period ends, you can use CancelKeyDeletion to cancel the deletion of the KMS key. After the waiting period ends, KMS deletes the KMS key, its key material, and all KMS data associated with it, including all aliases that refer to it. Deleting a KMS key is a destructive and potentially dangerous operation. When a KMS key is deleted, all data that was encrypted under the KMS key is unrecoverable. (The only exception is a multi-Region replica key, or an asymmetric or HMAC KMS key with imported key material
|
335
|
+
* Schedules the deletion of a KMS key. By default, KMS applies a waiting period of 30 days, but you can specify a waiting period of 7-30 days. When this operation is successful, the key state of the KMS key changes to PendingDeletion and the key can't be used in any cryptographic operations. It remains in this state for the duration of the waiting period. Before the waiting period ends, you can use CancelKeyDeletion to cancel the deletion of the KMS key. After the waiting period ends, KMS deletes the KMS key, its key material, and all KMS data associated with it, including all aliases that refer to it. Deleting a KMS key is a destructive and potentially dangerous operation. When a KMS key is deleted, all data that was encrypted under the KMS key is unrecoverable. (The only exception is a multi-Region replica key, or an asymmetric or HMAC KMS key with imported key material.) To prevent the use of a KMS key without deleting it, use DisableKey. You can schedule the deletion of a multi-Region primary key and its replica keys at any time. However, KMS will not delete a multi-Region primary key with existing replica keys. If you schedule the deletion of a primary key with replicas, its key state changes to PendingReplicaDeletion and it cannot be replicated or used in cryptographic operations. This status can continue indefinitely. When the last of its replicas keys is deleted (not just scheduled), the key state of the primary key changes to PendingDeletion and its waiting period (PendingWindowInDays) begins. For details, see Deleting multi-Region keys in the Key Management Service Developer Guide. When KMS deletes a KMS key from an CloudHSM key store, it makes a best effort to delete the associated key material from the associated CloudHSM cluster. However, you might need to manually delete the orphaned key material from the cluster and its backups. Deleting a KMS key from an external key store has no effect on the associated external key. However, for both types of custom key stores, deleting a KMS key is destructive and irreversible. You cannot decrypt ciphertext encrypted under the KMS key by using only its associated external key or CloudHSM key. Also, you cannot recreate a KMS key in an external key store by creating a new KMS key with the same key material. For more information about scheduling a KMS key for deletion, see Deleting KMS keys in the Key Management Service Developer Guide. The KMS key that you use for this operation must be in a compatible key state. For details, see Key states of KMS keys in the Key Management Service Developer Guide. Cross-account use: No. You cannot perform this operation on a KMS key in a different Amazon Web Services account. Required permissions: kms:ScheduleKeyDeletion (key policy) Related operations CancelKeyDeletion DisableKey
|
336
336
|
*/
|
337
337
|
scheduleKeyDeletion(params: KMS.Types.ScheduleKeyDeletionRequest, callback?: (err: AWSError, data: KMS.Types.ScheduleKeyDeletionResponse) => void): Request<KMS.Types.ScheduleKeyDeletionResponse, AWSError>;
|
338
338
|
/**
|
339
|
-
* Schedules the deletion of a KMS key. By default, KMS applies a waiting period of 30 days, but you can specify a waiting period of 7-30 days. When this operation is successful, the key state of the KMS key changes to PendingDeletion and the key can't be used in any cryptographic operations. It remains in this state for the duration of the waiting period. Before the waiting period ends, you can use CancelKeyDeletion to cancel the deletion of the KMS key. After the waiting period ends, KMS deletes the KMS key, its key material, and all KMS data associated with it, including all aliases that refer to it. Deleting a KMS key is a destructive and potentially dangerous operation. When a KMS key is deleted, all data that was encrypted under the KMS key is unrecoverable. (The only exception is a multi-Region replica key, or an asymmetric or HMAC KMS key with imported key material
|
339
|
+
* Schedules the deletion of a KMS key. By default, KMS applies a waiting period of 30 days, but you can specify a waiting period of 7-30 days. When this operation is successful, the key state of the KMS key changes to PendingDeletion and the key can't be used in any cryptographic operations. It remains in this state for the duration of the waiting period. Before the waiting period ends, you can use CancelKeyDeletion to cancel the deletion of the KMS key. After the waiting period ends, KMS deletes the KMS key, its key material, and all KMS data associated with it, including all aliases that refer to it. Deleting a KMS key is a destructive and potentially dangerous operation. When a KMS key is deleted, all data that was encrypted under the KMS key is unrecoverable. (The only exception is a multi-Region replica key, or an asymmetric or HMAC KMS key with imported key material.) To prevent the use of a KMS key without deleting it, use DisableKey. You can schedule the deletion of a multi-Region primary key and its replica keys at any time. However, KMS will not delete a multi-Region primary key with existing replica keys. If you schedule the deletion of a primary key with replicas, its key state changes to PendingReplicaDeletion and it cannot be replicated or used in cryptographic operations. This status can continue indefinitely. When the last of its replicas keys is deleted (not just scheduled), the key state of the primary key changes to PendingDeletion and its waiting period (PendingWindowInDays) begins. For details, see Deleting multi-Region keys in the Key Management Service Developer Guide. When KMS deletes a KMS key from an CloudHSM key store, it makes a best effort to delete the associated key material from the associated CloudHSM cluster. However, you might need to manually delete the orphaned key material from the cluster and its backups. Deleting a KMS key from an external key store has no effect on the associated external key. However, for both types of custom key stores, deleting a KMS key is destructive and irreversible. You cannot decrypt ciphertext encrypted under the KMS key by using only its associated external key or CloudHSM key. Also, you cannot recreate a KMS key in an external key store by creating a new KMS key with the same key material. For more information about scheduling a KMS key for deletion, see Deleting KMS keys in the Key Management Service Developer Guide. The KMS key that you use for this operation must be in a compatible key state. For details, see Key states of KMS keys in the Key Management Service Developer Guide. Cross-account use: No. You cannot perform this operation on a KMS key in a different Amazon Web Services account. Required permissions: kms:ScheduleKeyDeletion (key policy) Related operations CancelKeyDeletion DisableKey
|
340
340
|
*/
|
341
341
|
scheduleKeyDeletion(callback?: (err: AWSError, data: KMS.Types.ScheduleKeyDeletionResponse) => void): Request<KMS.Types.ScheduleKeyDeletionResponse, AWSError>;
|
342
342
|
/**
|
@@ -553,6 +553,10 @@ declare namespace KMS {
|
|
553
553
|
* A friendly name for the grant. Use this value to prevent the unintended creation of duplicate grants when retrying this request. Do not include confidential or sensitive information in this field. This field may be displayed in plaintext in CloudTrail logs and other output. When this value is absent, all CreateGrant requests result in a new grant with a unique GrantId even if all the supplied parameters are identical. This can result in unintended duplicates when you retry the CreateGrant request. When this value is present, you can retry a CreateGrant request with identical parameters; if the grant already exists, the original GrantId is returned without creating a new grant. Note that the returned grant token is unique with every CreateGrant request, even when a duplicate GrantId is returned. All grant tokens for the same grant ID can be used interchangeably.
|
554
554
|
*/
|
555
555
|
Name?: GrantNameType;
|
556
|
+
/**
|
557
|
+
* Checks if your request will succeed. DryRun is an optional parameter. To learn more about how to use this parameter, see Testing your KMS API calls in the Key Management Service Developer Guide.
|
558
|
+
*/
|
559
|
+
DryRun?: NullableBooleanType;
|
556
560
|
}
|
557
561
|
export interface CreateGrantResponse {
|
558
562
|
/**
|
@@ -687,6 +691,10 @@ declare namespace KMS {
|
|
687
691
|
* A signed attestation document from an Amazon Web Services Nitro enclave and the encryption algorithm to use with the enclave's public key. The only valid encryption algorithm is RSAES_OAEP_SHA_256. This parameter only supports attestation documents for Amazon Web Services Nitro Enclaves. To include this parameter, use the Amazon Web Services Nitro Enclaves SDK or any Amazon Web Services SDK. When you use this parameter, instead of returning the plaintext data, KMS encrypts the plaintext data with the public key in the attestation document, and returns the resulting ciphertext in the CiphertextForRecipient field in the response. This ciphertext can be decrypted only with the private key in the enclave. The Plaintext field in the response is null or empty. For information about the interaction between KMS and Amazon Web Services Nitro Enclaves, see How Amazon Web Services Nitro Enclaves uses KMS in the Key Management Service Developer Guide.
|
688
692
|
*/
|
689
693
|
Recipient?: RecipientInfo;
|
694
|
+
/**
|
695
|
+
* Checks if your request will succeed. DryRun is an optional parameter. To learn more about how to use this parameter, see Testing your KMS API calls in the Key Management Service Developer Guide.
|
696
|
+
*/
|
697
|
+
DryRun?: NullableBooleanType;
|
690
698
|
}
|
691
699
|
export interface DecryptResponse {
|
692
700
|
/**
|
@@ -828,6 +836,10 @@ declare namespace KMS {
|
|
828
836
|
* Specifies the encryption algorithm that KMS will use to encrypt the plaintext message. The algorithm must be compatible with the KMS key that you specify. This parameter is required only for asymmetric KMS keys. The default value, SYMMETRIC_DEFAULT, is the algorithm used for symmetric encryption KMS keys. If you are using an asymmetric KMS key, we recommend RSAES_OAEP_SHA_256. The SM2PKE algorithm is only available in China Regions.
|
829
837
|
*/
|
830
838
|
EncryptionAlgorithm?: EncryptionAlgorithmSpec;
|
839
|
+
/**
|
840
|
+
* Checks if your request will succeed. DryRun is an optional parameter. To learn more about how to use this parameter, see Testing your KMS API calls in the Key Management Service Developer Guide.
|
841
|
+
*/
|
842
|
+
DryRun?: NullableBooleanType;
|
831
843
|
}
|
832
844
|
export interface EncryptResponse {
|
833
845
|
/**
|
@@ -870,6 +882,10 @@ declare namespace KMS {
|
|
870
882
|
* A signed attestation document from an Amazon Web Services Nitro enclave and the encryption algorithm to use with the enclave's public key. The only valid encryption algorithm is RSAES_OAEP_SHA_256. This parameter only supports attestation documents for Amazon Web Services Nitro Enclaves. To include this parameter, use the Amazon Web Services Nitro Enclaves SDK or any Amazon Web Services SDK. When you use this parameter, instead of returning a plaintext copy of the private data key, KMS encrypts the plaintext private data key under the public key in the attestation document, and returns the resulting ciphertext in the CiphertextForRecipient field in the response. This ciphertext can be decrypted only with the private key in the enclave. The CiphertextBlob field in the response contains a copy of the private data key encrypted under the KMS key specified by the KeyId parameter. The PrivateKeyPlaintext field in the response is null or empty. For information about the interaction between KMS and Amazon Web Services Nitro Enclaves, see How Amazon Web Services Nitro Enclaves uses KMS in the Key Management Service Developer Guide.
|
871
883
|
*/
|
872
884
|
Recipient?: RecipientInfo;
|
885
|
+
/**
|
886
|
+
* Checks if your request will succeed. DryRun is an optional parameter. To learn more about how to use this parameter, see Testing your KMS API calls in the Key Management Service Developer Guide.
|
887
|
+
*/
|
888
|
+
DryRun?: NullableBooleanType;
|
873
889
|
}
|
874
890
|
export interface GenerateDataKeyPairResponse {
|
875
891
|
/**
|
@@ -914,6 +930,10 @@ declare namespace KMS {
|
|
914
930
|
* A list of grant tokens. Use a grant token when your permission to call this operation comes from a new grant that has not yet achieved eventual consistency. For more information, see Grant token and Using a grant token in the Key Management Service Developer Guide.
|
915
931
|
*/
|
916
932
|
GrantTokens?: GrantTokenList;
|
933
|
+
/**
|
934
|
+
* Checks if your request will succeed. DryRun is an optional parameter. To learn more about how to use this parameter, see Testing your KMS API calls in the Key Management Service Developer Guide.
|
935
|
+
*/
|
936
|
+
DryRun?: NullableBooleanType;
|
917
937
|
}
|
918
938
|
export interface GenerateDataKeyPairWithoutPlaintextResponse {
|
919
939
|
/**
|
@@ -958,6 +978,10 @@ declare namespace KMS {
|
|
958
978
|
* A signed attestation document from an Amazon Web Services Nitro enclave and the encryption algorithm to use with the enclave's public key. The only valid encryption algorithm is RSAES_OAEP_SHA_256. This parameter only supports attestation documents for Amazon Web Services Nitro Enclaves. To include this parameter, use the Amazon Web Services Nitro Enclaves SDK or any Amazon Web Services SDK. When you use this parameter, instead of returning the plaintext data key, KMS encrypts the plaintext data key under the public key in the attestation document, and returns the resulting ciphertext in the CiphertextForRecipient field in the response. This ciphertext can be decrypted only with the private key in the enclave. The CiphertextBlob field in the response contains a copy of the data key encrypted under the KMS key specified by the KeyId parameter. The Plaintext field in the response is null or empty. For information about the interaction between KMS and Amazon Web Services Nitro Enclaves, see How Amazon Web Services Nitro Enclaves uses KMS in the Key Management Service Developer Guide.
|
959
979
|
*/
|
960
980
|
Recipient?: RecipientInfo;
|
981
|
+
/**
|
982
|
+
* Checks if your request will succeed. DryRun is an optional parameter. To learn more about how to use this parameter, see Testing your KMS API calls in the Key Management Service Developer Guide.
|
983
|
+
*/
|
984
|
+
DryRun?: NullableBooleanType;
|
961
985
|
}
|
962
986
|
export interface GenerateDataKeyResponse {
|
963
987
|
/**
|
@@ -998,6 +1022,10 @@ declare namespace KMS {
|
|
998
1022
|
* A list of grant tokens. Use a grant token when your permission to call this operation comes from a new grant that has not yet achieved eventual consistency. For more information, see Grant token and Using a grant token in the Key Management Service Developer Guide.
|
999
1023
|
*/
|
1000
1024
|
GrantTokens?: GrantTokenList;
|
1025
|
+
/**
|
1026
|
+
* Checks if your request will succeed. DryRun is an optional parameter. To learn more about how to use this parameter, see Testing your KMS API calls in the Key Management Service Developer Guide.
|
1027
|
+
*/
|
1028
|
+
DryRun?: NullableBooleanType;
|
1001
1029
|
}
|
1002
1030
|
export interface GenerateDataKeyWithoutPlaintextResponse {
|
1003
1031
|
/**
|
@@ -1026,6 +1054,10 @@ declare namespace KMS {
|
|
1026
1054
|
* A list of grant tokens. Use a grant token when your permission to call this operation comes from a new grant that has not yet achieved eventual consistency. For more information, see Grant token and Using a grant token in the Key Management Service Developer Guide.
|
1027
1055
|
*/
|
1028
1056
|
GrantTokens?: GrantTokenList;
|
1057
|
+
/**
|
1058
|
+
* Checks if your request will succeed. DryRun is an optional parameter. To learn more about how to use this parameter, see Testing your KMS API calls in the Key Management Service Developer Guide.
|
1059
|
+
*/
|
1060
|
+
DryRun?: NullableBooleanType;
|
1029
1061
|
}
|
1030
1062
|
export interface GenerateMacResponse {
|
1031
1063
|
/**
|
@@ -1610,6 +1642,10 @@ declare namespace KMS {
|
|
1610
1642
|
* A list of grant tokens. Use a grant token when your permission to call this operation comes from a new grant that has not yet achieved eventual consistency. For more information, see Grant token and Using a grant token in the Key Management Service Developer Guide.
|
1611
1643
|
*/
|
1612
1644
|
GrantTokens?: GrantTokenList;
|
1645
|
+
/**
|
1646
|
+
* Checks if your request will succeed. DryRun is an optional parameter. To learn more about how to use this parameter, see Testing your KMS API calls in the Key Management Service Developer Guide.
|
1647
|
+
*/
|
1648
|
+
DryRun?: NullableBooleanType;
|
1613
1649
|
}
|
1614
1650
|
export interface ReEncryptResponse {
|
1615
1651
|
/**
|
@@ -1697,6 +1733,10 @@ declare namespace KMS {
|
|
1697
1733
|
* Identifies the grant to retire. To get the grant ID, use CreateGrant, ListGrants, or ListRetirableGrants. Grant ID Example - 0123456789012345678901234567890123456789012345678901234567890123
|
1698
1734
|
*/
|
1699
1735
|
GrantId?: GrantIdType;
|
1736
|
+
/**
|
1737
|
+
* Checks if your request will succeed. DryRun is an optional parameter. To learn more about how to use this parameter, see Testing your KMS API calls in the Key Management Service Developer Guide.
|
1738
|
+
*/
|
1739
|
+
DryRun?: NullableBooleanType;
|
1700
1740
|
}
|
1701
1741
|
export interface RevokeGrantRequest {
|
1702
1742
|
/**
|
@@ -1707,6 +1747,10 @@ declare namespace KMS {
|
|
1707
1747
|
* Identifies the grant to revoke. To get the grant ID, use CreateGrant, ListGrants, or ListRetirableGrants.
|
1708
1748
|
*/
|
1709
1749
|
GrantId: GrantIdType;
|
1750
|
+
/**
|
1751
|
+
* Checks if your request will succeed. DryRun is an optional parameter. To learn more about how to use this parameter, see Testing your KMS API calls in the Key Management Service Developer Guide.
|
1752
|
+
*/
|
1753
|
+
DryRun?: NullableBooleanType;
|
1710
1754
|
}
|
1711
1755
|
export interface ScheduleKeyDeletionRequest {
|
1712
1756
|
/**
|
@@ -1757,6 +1801,10 @@ declare namespace KMS {
|
|
1757
1801
|
* Specifies the signing algorithm to use when signing the message. Choose an algorithm that is compatible with the type and size of the specified asymmetric KMS key. When signing with RSA key pairs, RSASSA-PSS algorithms are preferred. We include RSASSA-PKCS1-v1_5 algorithms for compatibility with existing applications.
|
1758
1802
|
*/
|
1759
1803
|
SigningAlgorithm: SigningAlgorithmSpec;
|
1804
|
+
/**
|
1805
|
+
* Checks if your request will succeed. DryRun is an optional parameter. To learn more about how to use this parameter, see Testing your KMS API calls in the Key Management Service Developer Guide.
|
1806
|
+
*/
|
1807
|
+
DryRun?: NullableBooleanType;
|
1760
1808
|
}
|
1761
1809
|
export interface SignResponse {
|
1762
1810
|
/**
|
@@ -1900,6 +1948,10 @@ declare namespace KMS {
|
|
1900
1948
|
* A list of grant tokens. Use a grant token when your permission to call this operation comes from a new grant that has not yet achieved eventual consistency. For more information, see Grant token and Using a grant token in the Key Management Service Developer Guide.
|
1901
1949
|
*/
|
1902
1950
|
GrantTokens?: GrantTokenList;
|
1951
|
+
/**
|
1952
|
+
* Checks if your request will succeed. DryRun is an optional parameter. To learn more about how to use this parameter, see Testing your KMS API calls in the Key Management Service Developer Guide.
|
1953
|
+
*/
|
1954
|
+
DryRun?: NullableBooleanType;
|
1903
1955
|
}
|
1904
1956
|
export interface VerifyMacResponse {
|
1905
1957
|
/**
|
@@ -1940,6 +1992,10 @@ declare namespace KMS {
|
|
1940
1992
|
* A list of grant tokens. Use a grant token when your permission to call this operation comes from a new grant that has not yet achieved eventual consistency. For more information, see Grant token and Using a grant token in the Key Management Service Developer Guide.
|
1941
1993
|
*/
|
1942
1994
|
GrantTokens?: GrantTokenList;
|
1995
|
+
/**
|
1996
|
+
* Checks if your request will succeed. DryRun is an optional parameter. To learn more about how to use this parameter, see Testing your KMS API calls in the Key Management Service Developer Guide.
|
1997
|
+
*/
|
1998
|
+
DryRun?: NullableBooleanType;
|
1943
1999
|
}
|
1944
2000
|
export interface VerifyResponse {
|
1945
2001
|
/**
|