Socket
Socket
Sign inDemoInstall

@aws-cdk/aws-kms

Package Overview
Dependencies
Maintainers
5
Versions
288
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

@aws-cdk/aws-kms - npm Package Compare versions

Comparing version 1.144.0 to 1.145.0

106

lib/alias.d.ts

@@ -7,6 +7,3 @@ import * as iam from '@aws-cdk/aws-iam';

* A KMS Key alias.
*
* An alias can be used in all places that expect a key.
*
* @stability stable
*/

@@ -17,4 +14,3 @@ export interface IAlias extends IKey {

*
* @stability stable
* @attribute true
* @attribute
*/

@@ -25,4 +21,3 @@ readonly aliasName: string;

*
* @stability stable
* @attribute true
* @attribute
*/

@@ -33,24 +28,14 @@ readonly aliasTargetKey: IKey;

* Construction properties for a KMS Key Alias object.
*
* @stability stable
*/
export interface AliasProps {
/**
* The name of the alias.
*
* The name must start with alias followed by a
* The name of the alias. The name must start with alias followed by a
* forward slash, such as alias/. You can't specify aliases that begin with
* alias/AWS. These aliases are reserved.
*
* @stability stable
*/
readonly aliasName: string;
/**
* The ID of the key for which you are creating the alias.
*
* Specify the key's
* The ID of the key for which you are creating the alias. Specify the key's
* globally unique identifier or Amazon Resource Name (ARN). You can't
* specify another alias.
*
* @stability stable
*/

@@ -62,3 +47,2 @@ readonly targetKey: IKey;

* @default - The alias will be deleted
* @stability stable
*/

@@ -70,63 +54,17 @@ readonly removalPolicy?: RemovalPolicy;

abstract readonly aliasTargetKey: IKey;
/**
* The ARN of the key.
*
* @stability stable
*/
get keyArn(): string;
/**
* The ID of the key (the part that looks something like: 1234abcd-12ab-34cd-56ef-1234567890ab).
*
* @stability stable
*/
get keyId(): string;
/**
* Defines a new alias for the key.
*
* @stability stable
*/
addAlias(alias: string): Alias;
/**
* Adds a statement to the KMS key resource policy.
*
* @stability stable
*/
addToResourcePolicy(statement: iam.PolicyStatement, allowNoOp?: boolean): iam.AddToResourcePolicyResult;
/**
* Grant the indicated permissions on this key to the given principal.
*
* @stability stable
*/
grant(grantee: iam.IGrantable, ...actions: string[]): iam.Grant;
/**
* Grant decryption permissions using this key to the given principal.
*
* @stability stable
*/
grantDecrypt(grantee: iam.IGrantable): iam.Grant;
/**
* Grant encryption permissions using this key to the given principal.
*
* @stability stable
*/
grantEncrypt(grantee: iam.IGrantable): iam.Grant;
/**
* Grant encryption and decryption permissions using this key to the given principal.
*
* @stability stable
*/
grantEncryptDecrypt(grantee: iam.IGrantable): iam.Grant;
}
/**
* Properties of a reference to an existing KMS Alias.
*
* @stability stable
* Properties of a reference to an existing KMS Alias
*/
export interface AliasAttributes {
/**
* Specifies the alias name.
*
* This value must begin with alias/ followed by a name (i.e. alias/ExampleAlias)
*
* @stability stable
* Specifies the alias name. This value must begin with alias/ followed by a name (i.e. alias/ExampleAlias)
*/

@@ -136,4 +74,2 @@ readonly aliasName: string;

* The customer master key (CMK) to which the Alias refers.
*
* @stability stable
*/

@@ -143,5 +79,4 @@ readonly aliasTargetKey: IKey;

/**
* Defines a display name for a customer master key (CMK) in AWS Key Management Service (AWS KMS).
*
* Using an alias to refer to a key can help you simplify key
* Defines a display name for a customer master key (CMK) in AWS Key Management
* Service (AWS KMS). Using an alias to refer to a key can help you simplify key
* management. For example, when rotating keys, you can just update the alias

@@ -153,3 +88,2 @@ * mapping instead of tracking and changing key IDs. For more information, see

*
* @stability stable
* @resource AWS::KMS::Alias

@@ -163,10 +97,7 @@ */

* @param id The construct's name.
* @param attrs the properties of the referenced KMS Alias.
* @stability stable
* @param attrs the properties of the referenced KMS Alias
*/
static fromAliasAttributes(scope: Construct, id: string, attrs: AliasAttributes): IAlias;
/**
* Import an existing KMS Alias defined outside the CDK app, by the alias name.
*
* This method should be used
* Import an existing KMS Alias defined outside the CDK app, by the alias name. This method should be used
* instead of 'fromAliasAttributes' when the underlying KMS Key ARN is not available.

@@ -178,26 +109,9 @@ * This Alias will not have a direct reference to the KMS Key, so addAlias and grant* methods are not supported.

* @param aliasName The full name of the KMS Alias (e.g., 'alias/aws/s3', 'alias/myKeyAlias').
* @stability stable
*/
static fromAliasName(scope: Construct, id: string, aliasName: string): IAlias;
/**
* The name of the alias.
*
* @stability stable
*/
readonly aliasName: string;
/**
* The Key to which the Alias refers.
*
* @stability stable
*/
readonly aliasTargetKey: IKey;
/**
* @stability stable
*/
constructor(scope: Construct, id: string, props: AliasProps);
/**
* @stability stable
*/
protected generatePhysicalName(): string;
}
export {};

@@ -13,7 +13,2 @@ "use strict";

class AliasBase extends core_1.Resource {
/**
* The ARN of the key.
*
* @stability stable
*/
get keyArn() {

@@ -26,55 +21,20 @@ return core_1.Stack.of(this).formatArn({

}
/**
* The ID of the key (the part that looks something like: 1234abcd-12ab-34cd-56ef-1234567890ab).
*
* @stability stable
*/
get keyId() {
return this.aliasName;
}
/**
* Defines a new alias for the key.
*
* @stability stable
*/
addAlias(alias) {
return this.aliasTargetKey.addAlias(alias);
}
/**
* Adds a statement to the KMS key resource policy.
*
* @stability stable
*/
addToResourcePolicy(statement, allowNoOp) {
return this.aliasTargetKey.addToResourcePolicy(statement, allowNoOp);
}
/**
* Grant the indicated permissions on this key to the given principal.
*
* @stability stable
*/
grant(grantee, ...actions) {
return this.aliasTargetKey.grant(grantee, ...actions);
}
/**
* Grant decryption permissions using this key to the given principal.
*
* @stability stable
*/
grantDecrypt(grantee) {
return this.aliasTargetKey.grantDecrypt(grantee);
}
/**
* Grant encryption permissions using this key to the given principal.
*
* @stability stable
*/
grantEncrypt(grantee) {
return this.aliasTargetKey.grantEncrypt(grantee);
}
/**
* Grant encryption and decryption permissions using this key to the given principal.
*
* @stability stable
*/
grantEncryptDecrypt(grantee) {

@@ -85,5 +45,4 @@ return this.aliasTargetKey.grantEncryptDecrypt(grantee);

/**
* Defines a display name for a customer master key (CMK) in AWS Key Management Service (AWS KMS).
*
* Using an alias to refer to a key can help you simplify key
* Defines a display name for a customer master key (CMK) in AWS Key Management
* Service (AWS KMS). Using an alias to refer to a key can help you simplify key
* management. For example, when rotating keys, you can just update the alias

@@ -95,9 +54,5 @@ * mapping instead of tracking and changing key IDs. For more information, see

*
* @stability stable
* @resource AWS::KMS::Alias
*/
class Alias extends AliasBase {
/**
* @stability stable
*/
constructor(scope, id, props) {

@@ -138,4 +93,3 @@ jsiiDeprecationWarnings._aws_cdk_aws_kms_AliasProps(props);

* @param id The construct's name.
* @param attrs the properties of the referenced KMS Alias.
* @stability stable
* @param attrs the properties of the referenced KMS Alias
*/

@@ -151,5 +105,3 @@ static fromAliasAttributes(scope, id, attrs) {

/**
* Import an existing KMS Alias defined outside the CDK app, by the alias name.
*
* This method should be used
* Import an existing KMS Alias defined outside the CDK app, by the alias name. This method should be used
* instead of 'fromAliasAttributes' when the underlying KMS Key ARN is not available.

@@ -161,3 +113,2 @@ * This Alias will not have a direct reference to the KMS Key, so addAlias and grant* methods are not supported.

* @param aliasName The full name of the KMS Alias (e.g., 'alias/aws/s3', 'alias/myKeyAlias').
* @stability stable
*/

@@ -184,5 +135,2 @@ static fromAliasName(scope, id, aliasName) {

}
/**
* @stability stable
*/
generatePhysicalName() {

@@ -194,3 +142,3 @@ return REQUIRED_ALIAS_PREFIX + super.generatePhysicalName();

_a = JSII_RTTI_SYMBOL_1;
Alias[_a] = { fqn: "@aws-cdk/aws-kms.Alias", version: "1.144.0" };
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"alias.js","sourceRoot":"","sources":["alias.ts"],"names":[],"mappings":";;;;;;AAAA,wCAAwC;AACxC,wCAAsE;AAGtE,mDAA2C;AAE3C,MAAM,qBAAqB,GAAG,QAAQ,CAAC;AACvC,MAAM,iBAAiB,GAAG,qBAAqB,GAAG,MAAM,CAAC;AAuBzD,MAAe,SAAU,SAAQ,eAAQ;;;;;;IAKvC,IAAW,MAAM;QACf,OAAO,YAAK,CAAC,EAAE,CAAC,IAAI,CAAC,CAAC,SAAS,CAAC;YAC9B,OAAO,EAAE,KAAK;YACd,qCAAqC;YACrC,QAAQ,EAAE,IAAI,CAAC,SAAS;SACzB,CAAC,CAAC;KACJ;;;;;;IAED,IAAW,KAAK;QACd,OAAO,IAAI,CAAC,SAAS,CAAC;KACvB;;;;;;IAEM,QAAQ,CAAC,KAAa;QAC3B,OAAO,IAAI,CAAC,cAAc,CAAC,QAAQ,CAAC,KAAK,CAAC,CAAC;KAC5C;;;;;;IAEM,mBAAmB,CAAC,SAA8B,EAAE,SAAmB;QAC5E,OAAO,IAAI,CAAC,cAAc,CAAC,mBAAmB,CAAC,SAAS,EAAE,SAAS,CAAC,CAAC;KACtE;;;;;;IAEM,KAAK,CAAC,OAAuB,EAAE,GAAG,OAAiB;QACxD,OAAO,IAAI,CAAC,cAAc,CAAC,KAAK,CAAC,OAAO,EAAE,GAAG,OAAO,CAAC,CAAC;KACvD;;;;;;IAEM,YAAY,CAAC,OAAuB;QACzC,OAAO,IAAI,CAAC,cAAc,CAAC,YAAY,CAAC,OAAO,CAAC,CAAC;KAClD;;;;;;IAEM,YAAY,CAAC,OAAuB;QACzC,OAAO,IAAI,CAAC,cAAc,CAAC,YAAY,CAAC,OAAO,CAAC,CAAC;KAClD;;;;;;IAEM,mBAAmB,CAAC,OAAuB;QAChD,OAAO,IAAI,CAAC,cAAc,CAAC,mBAAmB,CAAC,OAAO,CAAC,CAAC;KACzD;CACF;;;;;;;;;;;;;;AAYD,MAAa,KAAM,SAAQ,SAAS;;;;IAiClC,YAAY,KAAgB,EAAE,EAAU,EAAE,KAAiB;;QACzD,IAAI,SAAS,GAAG,KAAK,CAAC,SAAS,CAAC;QAEhC,IAAI,CAAC,YAAK,CAAC,YAAY,CAAC,SAAS,CAAC,EAAE;YAClC,IAAI,CAAC,SAAS,CAAC,UAAU,CAAC,qBAAqB,CAAC,EAAE;gBAChD,SAAS,GAAG,qBAAqB,GAAG,SAAS,CAAC;aAC/C;YAED,IAAI,SAAS,KAAK,qBAAqB,EAAE;gBACvC,MAAM,IAAI,KAAK,CAAC,qCAAqC,qBAAqB,MAAM,SAAS,EAAE,CAAC,CAAC;aAC9F;YAED,IAAI,SAAS,CAAC,iBAAiB,EAAE,CAAC,UAAU,CAAC,iBAAiB,CAAC,EAAE;gBAC/D,MAAM,IAAI,KAAK,CAAC,2BAA2B,iBAAiB,KAAK,SAAS,EAAE,CAAC,CAAC;aAC/E;YAED,IAAI,CAAC,SAAS,CAAC,KAAK,CAAC,0BAA0B,CAAC,EAAE;gBAChD,MAAM,IAAI,KAAK,CAAC,kEAAkE,CAAC,CAAC;aACrF;SACF;QAED,KAAK,CAAC,KAAK,EAAE,EAAE,EAAE;YACf,YAAY,EAAE,SAAS;SACxB,CAAC,CAAC;QAEH,IAAI,CAAC,cAAc,GAAG,KAAK,CAAC,SAAS,CAAC;QAEtC,MAAM,QAAQ,GAAG,IAAI,wBAAQ,CAAC,IAAI,EAAE,UAAU,EAAE;YAC9C,SAAS,EAAE,IAAI,CAAC,YAAY;YAC5B,WAAW,EAAE,IAAI,CAAC,cAAc,CAAC,MAAM;SACxC,CAAC,CAAC;QAEH,IAAI,CAAC,SAAS,GAAG,IAAI,CAAC,wBAAwB,CAAC,QAAQ,CAAC,SAAS,CAAC,CAAC;QAEnE,IAAI,KAAK,CAAC,aAAa,EAAE;YACvB,QAAQ,CAAC,kBAAkB,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC;SAClD;KACF;;;;;;;;;IApEM,MAAM,CAAC,mBAAmB,CAAC,KAAgB,EAAE,EAAU,EAAE,KAAsB;;QACpF,MAAM,MAAO,SAAQ,SAAS;YAC5B,IAAW,SAAS,KAAK,OAAO,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC;YAClD,IAAW,cAAc,KAAK,OAAO,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC;SAC7D;QACD,OAAO,IAAI,MAAM,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC;KAC9B;;;;;;;;;;;;;IAGM,MAAM,CAAC,aAAa,CAAC,KAAgB,EAAE,EAAU,EAAE,SAAiB;QACzE,MAAM,MAAO,SAAQ,eAAQ;YAA7B;;gBACkB,WAAM,GAAG,YAAK,CAAC,EAAE,CAAC,IAAI,CAAC,CAAC,SAAS,CAAC,EAAE,OAAO,EAAE,KAAK,EAAE,QAAQ,EAAE,SAAS,EAAE,CAAC,CAAC;gBAC3E,UAAK,GAAG,SAAS,CAAC;gBAClB,cAAS,GAAG,SAAS,CAAC;YAUxC,CAAC;YATC,IAAW,cAAc,KAAW,MAAM,IAAI,KAAK,CAAC,6EAA6E,CAAC,CAAC,CAAC,CAAC;YAC9H,QAAQ,CAAC,MAAc,IAAW,MAAM,IAAI,KAAK,CAAC,qEAAqE,CAAC,CAAC,CAAC,CAAC;YAC3H,mBAAmB,CAAC,UAA+B,EAAE,UAAoB;gBAC9E,OAAO,EAAE,cAAc,EAAE,KAAK,EAAE,CAAC;YACnC,CAAC;YACM,KAAK,CAAC,OAAuB,EAAE,GAAG,QAAkB,IAAe,OAAO,GAAG,CAAC,KAAK,CAAC,IAAI,CAAC,OAAO,EAAE,EAAE,CAAC,CAAC,CAAC,CAAC;YACxG,YAAY,CAAC,OAAuB,IAAe,OAAO,GAAG,CAAC,KAAK,CAAC,IAAI,CAAC,OAAO,EAAE,EAAE,CAAC,CAAC,CAAC,CAAC;YACxF,YAAY,CAAC,OAAuB,IAAe,OAAO,GAAG,CAAC,KAAK,CAAC,IAAI,CAAC,OAAO,EAAE,EAAE,CAAC,CAAC,CAAC,CAAC;YACxF,mBAAmB,CAAC,OAAuB,IAAe,OAAO,GAAG,CAAC,KAAK,CAAC,IAAI,CAAC,OAAO,EAAE,EAAE,CAAC,CAAC,CAAC,CAAC;SACvG;QAED,OAAO,IAAI,MAAM,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC;KAC9B;;;;IA4CS,oBAAoB;QAC5B,OAAO,qBAAqB,GAAG,KAAK,CAAC,oBAAoB,EAAE,CAAC;KAC7D;;AA1EH,sBA2EC","sourcesContent":["import * as iam from '@aws-cdk/aws-iam';\nimport { RemovalPolicy, Resource, Stack, Token } from '@aws-cdk/core';\nimport { Construct } from 'constructs';\nimport { IKey } from './key';\nimport { CfnAlias } from './kms.generated';\n\nconst REQUIRED_ALIAS_PREFIX = 'alias/';\nconst DISALLOWED_PREFIX = REQUIRED_ALIAS_PREFIX + 'aws/';\n\n                                                                                    \nexport interface IAlias extends IKey {\n                                                            \n  readonly aliasName: string;\n\n                                                                        \n  readonly aliasTargetKey: IKey;\n}\n\n                                                              \nexport interface AliasProps {\n                                                                                                                                                                                                              \n  readonly aliasName: string;\n\n                                                                                                                                                                                               \n  readonly targetKey: IKey;\n\n                                                                                                                          \n  readonly removalPolicy?: RemovalPolicy;\n}\n\nabstract class AliasBase extends Resource implements IAlias {\n  public abstract readonly aliasName: string;\n\n  public abstract readonly aliasTargetKey: IKey;\n\n  public get keyArn(): string {\n    return Stack.of(this).formatArn({\n      service: 'kms',\n      // aliasName already contains the '/'\n      resource: this.aliasName,\n    });\n  }\n\n  public get keyId(): string {\n    return this.aliasName;\n  }\n\n  public addAlias(alias: string): Alias {\n    return this.aliasTargetKey.addAlias(alias);\n  }\n\n  public addToResourcePolicy(statement: iam.PolicyStatement, allowNoOp?: boolean): iam.AddToResourcePolicyResult {\n    return this.aliasTargetKey.addToResourcePolicy(statement, allowNoOp);\n  }\n\n  public grant(grantee: iam.IGrantable, ...actions: string[]): iam.Grant {\n    return this.aliasTargetKey.grant(grantee, ...actions);\n  }\n\n  public grantDecrypt(grantee: iam.IGrantable): iam.Grant {\n    return this.aliasTargetKey.grantDecrypt(grantee);\n  }\n\n  public grantEncrypt(grantee: iam.IGrantable): iam.Grant {\n    return this.aliasTargetKey.grantEncrypt(grantee);\n  }\n\n  public grantEncryptDecrypt(grantee: iam.IGrantable): iam.Grant {\n    return this.aliasTargetKey.grantEncryptDecrypt(grantee);\n  }\n}\n\n                                                             \nexport interface AliasAttributes {\n                                                                                                                         \n  readonly aliasName: string;\n\n                                                                         \n  readonly aliasTargetKey: IKey;\n}\n\n                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            \nexport class Alias extends AliasBase {\n                                                                                                                                                                                                                                                   \n  public static fromAliasAttributes(scope: Construct, id: string, attrs: AliasAttributes): IAlias {\n    class _Alias extends AliasBase {\n      public get aliasName() { return attrs.aliasName; }\n      public get aliasTargetKey() { return attrs.aliasTargetKey; }\n    }\n    return new _Alias(scope, id);\n  }\n\n                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                \n  public static fromAliasName(scope: Construct, id: string, aliasName: string): IAlias {\n    class Import extends Resource implements IAlias {\n      public readonly keyArn = Stack.of(this).formatArn({ service: 'kms', resource: aliasName });\n      public readonly keyId = aliasName;\n      public readonly aliasName = aliasName;\n      public get aliasTargetKey(): IKey { throw new Error('Cannot access aliasTargetKey on an Alias imported by Alias.fromAliasName().'); }\n      public addAlias(_alias: string): Alias { throw new Error('Cannot call addAlias on an Alias imported by Alias.fromAliasName().'); }\n      public addToResourcePolicy(_statement: iam.PolicyStatement, _allowNoOp?: boolean): iam.AddToResourcePolicyResult {\n        return { statementAdded: false };\n      }\n      public grant(grantee: iam.IGrantable, ..._actions: string[]): iam.Grant { return iam.Grant.drop(grantee, ''); }\n      public grantDecrypt(grantee: iam.IGrantable): iam.Grant { return iam.Grant.drop(grantee, ''); }\n      public grantEncrypt(grantee: iam.IGrantable): iam.Grant { return iam.Grant.drop(grantee, ''); }\n      public grantEncryptDecrypt(grantee: iam.IGrantable): iam.Grant { return iam.Grant.drop(grantee, ''); }\n    }\n\n    return new Import(scope, id);\n  }\n\n  public readonly aliasName: string;\n  public readonly aliasTargetKey: IKey;\n\n  constructor(scope: Construct, id: string, props: AliasProps) {\n    let aliasName = props.aliasName;\n\n    if (!Token.isUnresolved(aliasName)) {\n      if (!aliasName.startsWith(REQUIRED_ALIAS_PREFIX)) {\n        aliasName = REQUIRED_ALIAS_PREFIX + aliasName;\n      }\n\n      if (aliasName === REQUIRED_ALIAS_PREFIX) {\n        throw new Error(`Alias must include a value after \"${REQUIRED_ALIAS_PREFIX}\": ${aliasName}`);\n      }\n\n      if (aliasName.toLocaleLowerCase().startsWith(DISALLOWED_PREFIX)) {\n        throw new Error(`Alias cannot start with ${DISALLOWED_PREFIX}: ${aliasName}`);\n      }\n\n      if (!aliasName.match(/^[a-zA-Z0-9:/_-]{1,256}$/)) {\n        throw new Error('Alias name must be between 1 and 256 characters in a-zA-Z0-9:/_-');\n      }\n    }\n\n    super(scope, id, {\n      physicalName: aliasName,\n    });\n\n    this.aliasTargetKey = props.targetKey;\n\n    const resource = new CfnAlias(this, 'Resource', {\n      aliasName: this.physicalName,\n      targetKeyId: this.aliasTargetKey.keyArn,\n    });\n\n    this.aliasName = this.getResourceNameAttribute(resource.aliasName);\n\n    if (props.removalPolicy) {\n      resource.applyRemovalPolicy(props.removalPolicy);\n    }\n  }\n\n  protected generatePhysicalName(): string {\n    return REQUIRED_ALIAS_PREFIX + super.generatePhysicalName();\n  }\n}\n"]}
Alias[_a] = { fqn: "@aws-cdk/aws-kms.Alias", version: "1.145.0" };
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"alias.js","sourceRoot":"","sources":["alias.ts"],"names":[],"mappings":";;;;;;AAAA,wCAAwC;AACxC,wCAAsE;AAGtE,mDAA2C;AAE3C,MAAM,qBAAqB,GAAG,QAAQ,CAAC;AACvC,MAAM,iBAAiB,GAAG,qBAAqB,GAAG,MAAM,CAAC;AAgDzD,MAAe,SAAU,SAAQ,eAAQ;IAKvC,IAAW,MAAM;QACf,OAAO,YAAK,CAAC,EAAE,CAAC,IAAI,CAAC,CAAC,SAAS,CAAC;YAC9B,OAAO,EAAE,KAAK;YACd,qCAAqC;YACrC,QAAQ,EAAE,IAAI,CAAC,SAAS;SACzB,CAAC,CAAC;KACJ;IAED,IAAW,KAAK;QACd,OAAO,IAAI,CAAC,SAAS,CAAC;KACvB;IAEM,QAAQ,CAAC,KAAa;QAC3B,OAAO,IAAI,CAAC,cAAc,CAAC,QAAQ,CAAC,KAAK,CAAC,CAAC;KAC5C;IAEM,mBAAmB,CAAC,SAA8B,EAAE,SAAmB;QAC5E,OAAO,IAAI,CAAC,cAAc,CAAC,mBAAmB,CAAC,SAAS,EAAE,SAAS,CAAC,CAAC;KACtE;IAEM,KAAK,CAAC,OAAuB,EAAE,GAAG,OAAiB;QACxD,OAAO,IAAI,CAAC,cAAc,CAAC,KAAK,CAAC,OAAO,EAAE,GAAG,OAAO,CAAC,CAAC;KACvD;IAEM,YAAY,CAAC,OAAuB;QACzC,OAAO,IAAI,CAAC,cAAc,CAAC,YAAY,CAAC,OAAO,CAAC,CAAC;KAClD;IAEM,YAAY,CAAC,OAAuB;QACzC,OAAO,IAAI,CAAC,cAAc,CAAC,YAAY,CAAC,OAAO,CAAC,CAAC;KAClD;IAEM,mBAAmB,CAAC,OAAuB;QAChD,OAAO,IAAI,CAAC,cAAc,CAAC,mBAAmB,CAAC,OAAO,CAAC,CAAC;KACzD;CACF;AAiBD;;;;;;;;;;GAUG;AACH,MAAa,KAAM,SAAQ,SAAS;IA+ClC,YAAY,KAAgB,EAAE,EAAU,EAAE,KAAiB;;QACzD,IAAI,SAAS,GAAG,KAAK,CAAC,SAAS,CAAC;QAEhC,IAAI,CAAC,YAAK,CAAC,YAAY,CAAC,SAAS,CAAC,EAAE;YAClC,IAAI,CAAC,SAAS,CAAC,UAAU,CAAC,qBAAqB,CAAC,EAAE;gBAChD,SAAS,GAAG,qBAAqB,GAAG,SAAS,CAAC;aAC/C;YAED,IAAI,SAAS,KAAK,qBAAqB,EAAE;gBACvC,MAAM,IAAI,KAAK,CAAC,qCAAqC,qBAAqB,MAAM,SAAS,EAAE,CAAC,CAAC;aAC9F;YAED,IAAI,SAAS,CAAC,iBAAiB,EAAE,CAAC,UAAU,CAAC,iBAAiB,CAAC,EAAE;gBAC/D,MAAM,IAAI,KAAK,CAAC,2BAA2B,iBAAiB,KAAK,SAAS,EAAE,CAAC,CAAC;aAC/E;YAED,IAAI,CAAC,SAAS,CAAC,KAAK,CAAC,0BAA0B,CAAC,EAAE;gBAChD,MAAM,IAAI,KAAK,CAAC,kEAAkE,CAAC,CAAC;aACrF;SACF;QAED,KAAK,CAAC,KAAK,EAAE,EAAE,EAAE;YACf,YAAY,EAAE,SAAS;SACxB,CAAC,CAAC;QAEH,IAAI,CAAC,cAAc,GAAG,KAAK,CAAC,SAAS,CAAC;QAEtC,MAAM,QAAQ,GAAG,IAAI,wBAAQ,CAAC,IAAI,EAAE,UAAU,EAAE;YAC9C,SAAS,EAAE,IAAI,CAAC,YAAY;YAC5B,WAAW,EAAE,IAAI,CAAC,cAAc,CAAC,MAAM;SACxC,CAAC,CAAC;QAEH,IAAI,CAAC,SAAS,GAAG,IAAI,CAAC,wBAAwB,CAAC,QAAQ,CAAC,SAAS,CAAC,CAAC;QAEnE,IAAI,KAAK,CAAC,aAAa,EAAE;YACvB,QAAQ,CAAC,kBAAkB,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC;SAClD;KACF;IAnFD;;;;;;OAMG;IACI,MAAM,CAAC,mBAAmB,CAAC,KAAgB,EAAE,EAAU,EAAE,KAAsB;;QACpF,MAAM,MAAO,SAAQ,SAAS;YAC5B,IAAW,SAAS,KAAK,OAAO,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC;YAClD,IAAW,cAAc,KAAK,OAAO,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC;SAC7D;QACD,OAAO,IAAI,MAAM,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC;KAC9B;IAED;;;;;;;;OAQG;IACI,MAAM,CAAC,aAAa,CAAC,KAAgB,EAAE,EAAU,EAAE,SAAiB;QACzE,MAAM,MAAO,SAAQ,eAAQ;YAA7B;;gBACkB,WAAM,GAAG,YAAK,CAAC,EAAE,CAAC,IAAI,CAAC,CAAC,SAAS,CAAC,EAAE,OAAO,EAAE,KAAK,EAAE,QAAQ,EAAE,SAAS,EAAE,CAAC,CAAC;gBAC3E,UAAK,GAAG,SAAS,CAAC;gBAClB,cAAS,GAAG,SAAS,CAAC;YAUxC,CAAC;YATC,IAAW,cAAc,KAAW,MAAM,IAAI,KAAK,CAAC,6EAA6E,CAAC,CAAC,CAAC,CAAC;YAC9H,QAAQ,CAAC,MAAc,IAAW,MAAM,IAAI,KAAK,CAAC,qEAAqE,CAAC,CAAC,CAAC,CAAC;YAC3H,mBAAmB,CAAC,UAA+B,EAAE,UAAoB;gBAC9E,OAAO,EAAE,cAAc,EAAE,KAAK,EAAE,CAAC;YACnC,CAAC;YACM,KAAK,CAAC,OAAuB,EAAE,GAAG,QAAkB,IAAe,OAAO,GAAG,CAAC,KAAK,CAAC,IAAI,CAAC,OAAO,EAAE,EAAE,CAAC,CAAC,CAAC,CAAC;YACxG,YAAY,CAAC,OAAuB,IAAe,OAAO,GAAG,CAAC,KAAK,CAAC,IAAI,CAAC,OAAO,EAAE,EAAE,CAAC,CAAC,CAAC,CAAC;YACxF,YAAY,CAAC,OAAuB,IAAe,OAAO,GAAG,CAAC,KAAK,CAAC,IAAI,CAAC,OAAO,EAAE,EAAE,CAAC,CAAC,CAAC,CAAC;YACxF,mBAAmB,CAAC,OAAuB,IAAe,OAAO,GAAG,CAAC,KAAK,CAAC,IAAI,CAAC,OAAO,EAAE,EAAE,CAAC,CAAC,CAAC,CAAC;SACvG;QAED,OAAO,IAAI,MAAM,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC;KAC9B;IA4CS,oBAAoB;QAC5B,OAAO,qBAAqB,GAAG,KAAK,CAAC,oBAAoB,EAAE,CAAC;KAC7D;;AAxFH,sBAyFC","sourcesContent":["import * as iam from '@aws-cdk/aws-iam';\nimport { RemovalPolicy, Resource, Stack, Token } from '@aws-cdk/core';\nimport { Construct } from 'constructs';\nimport { IKey } from './key';\nimport { CfnAlias } from './kms.generated';\n\nconst REQUIRED_ALIAS_PREFIX = 'alias/';\nconst DISALLOWED_PREFIX = REQUIRED_ALIAS_PREFIX + 'aws/';\n\n/**\n * A KMS Key alias.\n * An alias can be used in all places that expect a key.\n */\nexport interface IAlias extends IKey {\n  /**\n   * The name of the alias.\n   *\n   * @attribute\n   */\n  readonly aliasName: string;\n\n  /**\n   * The Key to which the Alias refers.\n   *\n   * @attribute\n   */\n  readonly aliasTargetKey: IKey;\n}\n\n/**\n * Construction properties for a KMS Key Alias object.\n */\nexport interface AliasProps {\n  /**\n   * The name of the alias. The name must start with alias followed by a\n   * forward slash, such as alias/. You can't specify aliases that begin with\n   * alias/AWS. These aliases are reserved.\n   */\n  readonly aliasName: string;\n\n  /**\n   * The ID of the key for which you are creating the alias. Specify the key's\n   * globally unique identifier or Amazon Resource Name (ARN). You can't\n   * specify another alias.\n   */\n  readonly targetKey: IKey;\n\n  /**\n   * Policy to apply when the alias is removed from this stack.\n   *\n   * @default - The alias will be deleted\n   */\n  readonly removalPolicy?: RemovalPolicy;\n}\n\nabstract class AliasBase extends Resource implements IAlias {\n  public abstract readonly aliasName: string;\n\n  public abstract readonly aliasTargetKey: IKey;\n\n  public get keyArn(): string {\n    return Stack.of(this).formatArn({\n      service: 'kms',\n      // aliasName already contains the '/'\n      resource: this.aliasName,\n    });\n  }\n\n  public get keyId(): string {\n    return this.aliasName;\n  }\n\n  public addAlias(alias: string): Alias {\n    return this.aliasTargetKey.addAlias(alias);\n  }\n\n  public addToResourcePolicy(statement: iam.PolicyStatement, allowNoOp?: boolean): iam.AddToResourcePolicyResult {\n    return this.aliasTargetKey.addToResourcePolicy(statement, allowNoOp);\n  }\n\n  public grant(grantee: iam.IGrantable, ...actions: string[]): iam.Grant {\n    return this.aliasTargetKey.grant(grantee, ...actions);\n  }\n\n  public grantDecrypt(grantee: iam.IGrantable): iam.Grant {\n    return this.aliasTargetKey.grantDecrypt(grantee);\n  }\n\n  public grantEncrypt(grantee: iam.IGrantable): iam.Grant {\n    return this.aliasTargetKey.grantEncrypt(grantee);\n  }\n\n  public grantEncryptDecrypt(grantee: iam.IGrantable): iam.Grant {\n    return this.aliasTargetKey.grantEncryptDecrypt(grantee);\n  }\n}\n\n/**\n * Properties of a reference to an existing KMS Alias\n */\nexport interface AliasAttributes {\n  /**\n   * Specifies the alias name. This value must begin with alias/ followed by a name (i.e. alias/ExampleAlias)\n   */\n  readonly aliasName: string;\n\n  /**\n   * The customer master key (CMK) to which the Alias refers.\n   */\n  readonly aliasTargetKey: IKey;\n}\n\n/**\n * Defines a display name for a customer master key (CMK) in AWS Key Management\n * Service (AWS KMS). Using an alias to refer to a key can help you simplify key\n * management. For example, when rotating keys, you can just update the alias\n * mapping instead of tracking and changing key IDs. For more information, see\n * Working with Aliases in the AWS Key Management Service Developer Guide.\n *\n * You can also add an alias for a key by calling `key.addAlias(alias)`.\n *\n * @resource AWS::KMS::Alias\n */\nexport class Alias extends AliasBase {\n  /**\n   * Import an existing KMS Alias defined outside the CDK app.\n   *\n   * @param scope The parent creating construct (usually `this`).\n   * @param id The construct's name.\n   * @param attrs the properties of the referenced KMS Alias\n   */\n  public static fromAliasAttributes(scope: Construct, id: string, attrs: AliasAttributes): IAlias {\n    class _Alias extends AliasBase {\n      public get aliasName() { return attrs.aliasName; }\n      public get aliasTargetKey() { return attrs.aliasTargetKey; }\n    }\n    return new _Alias(scope, id);\n  }\n\n  /**\n   * Import an existing KMS Alias defined outside the CDK app, by the alias name. This method should be used\n   * instead of 'fromAliasAttributes' when the underlying KMS Key ARN is not available.\n   * This Alias will not have a direct reference to the KMS Key, so addAlias and grant* methods are not supported.\n   *\n   * @param scope The parent creating construct (usually `this`).\n   * @param id The construct's name.\n   * @param aliasName The full name of the KMS Alias (e.g., 'alias/aws/s3', 'alias/myKeyAlias').\n   */\n  public static fromAliasName(scope: Construct, id: string, aliasName: string): IAlias {\n    class Import extends Resource implements IAlias {\n      public readonly keyArn = Stack.of(this).formatArn({ service: 'kms', resource: aliasName });\n      public readonly keyId = aliasName;\n      public readonly aliasName = aliasName;\n      public get aliasTargetKey(): IKey { throw new Error('Cannot access aliasTargetKey on an Alias imported by Alias.fromAliasName().'); }\n      public addAlias(_alias: string): Alias { throw new Error('Cannot call addAlias on an Alias imported by Alias.fromAliasName().'); }\n      public addToResourcePolicy(_statement: iam.PolicyStatement, _allowNoOp?: boolean): iam.AddToResourcePolicyResult {\n        return { statementAdded: false };\n      }\n      public grant(grantee: iam.IGrantable, ..._actions: string[]): iam.Grant { return iam.Grant.drop(grantee, ''); }\n      public grantDecrypt(grantee: iam.IGrantable): iam.Grant { return iam.Grant.drop(grantee, ''); }\n      public grantEncrypt(grantee: iam.IGrantable): iam.Grant { return iam.Grant.drop(grantee, ''); }\n      public grantEncryptDecrypt(grantee: iam.IGrantable): iam.Grant { return iam.Grant.drop(grantee, ''); }\n    }\n\n    return new Import(scope, id);\n  }\n\n  public readonly aliasName: string;\n  public readonly aliasTargetKey: IKey;\n\n  constructor(scope: Construct, id: string, props: AliasProps) {\n    let aliasName = props.aliasName;\n\n    if (!Token.isUnresolved(aliasName)) {\n      if (!aliasName.startsWith(REQUIRED_ALIAS_PREFIX)) {\n        aliasName = REQUIRED_ALIAS_PREFIX + aliasName;\n      }\n\n      if (aliasName === REQUIRED_ALIAS_PREFIX) {\n        throw new Error(`Alias must include a value after \"${REQUIRED_ALIAS_PREFIX}\": ${aliasName}`);\n      }\n\n      if (aliasName.toLocaleLowerCase().startsWith(DISALLOWED_PREFIX)) {\n        throw new Error(`Alias cannot start with ${DISALLOWED_PREFIX}: ${aliasName}`);\n      }\n\n      if (!aliasName.match(/^[a-zA-Z0-9:/_-]{1,256}$/)) {\n        throw new Error('Alias name must be between 1 and 256 characters in a-zA-Z0-9:/_-');\n      }\n    }\n\n    super(scope, id, {\n      physicalName: aliasName,\n    });\n\n    this.aliasTargetKey = props.targetKey;\n\n    const resource = new CfnAlias(this, 'Resource', {\n      aliasName: this.physicalName,\n      targetKeyId: this.aliasTargetKey.keyArn,\n    });\n\n    this.aliasName = this.getResourceNameAttribute(resource.aliasName);\n\n    if (props.removalPolicy) {\n      resource.applyRemovalPolicy(props.removalPolicy);\n    }\n  }\n\n  protected generatePhysicalName(): string {\n    return REQUIRED_ALIAS_PREFIX + super.generatePhysicalName();\n  }\n}\n"]}
/**
* Properties for looking up an existing Key.
*
* @stability stable
*/
export interface KeyLookupOptions {
/**
* The alias name of the Key.
*
* @stability stable
* The alias name of the Key
*/
readonly aliasName: string;
}

2

lib/key-lookup.js
"use strict";
Object.defineProperty(exports, "__esModule", { value: true });
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoia2V5LWxvb2t1cC5qcyIsInNvdXJjZVJvb3QiOiIiLCJzb3VyY2VzIjpbImtleS1sb29rdXAudHMiXSwibmFtZXMiOltdLCJtYXBwaW5ncyI6IiIsInNvdXJjZXNDb250ZW50IjpbIiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgXG5leHBvcnQgaW50ZXJmYWNlIEtleUxvb2t1cE9wdGlvbnMge1xuICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgXG4gIHJlYWRvbmx5IGFsaWFzTmFtZTogc3RyaW5nO1xufVxuIl19
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoia2V5LWxvb2t1cC5qcyIsInNvdXJjZVJvb3QiOiIiLCJzb3VyY2VzIjpbImtleS1sb29rdXAudHMiXSwibmFtZXMiOltdLCJtYXBwaW5ncyI6IiIsInNvdXJjZXNDb250ZW50IjpbIi8qKlxuICogUHJvcGVydGllcyBmb3IgbG9va2luZyB1cCBhbiBleGlzdGluZyBLZXkuXG4gKi9cbmV4cG9ydCBpbnRlcmZhY2UgS2V5TG9va3VwT3B0aW9ucyB7XG4gIC8qKlxuICAgKiBUaGUgYWxpYXMgbmFtZSBvZiB0aGUgS2V5XG4gICAqL1xuICByZWFkb25seSBhbGlhc05hbWU6IHN0cmluZztcbn1cbiJdfQ==

@@ -9,4 +9,2 @@ import * as iam from '@aws-cdk/aws-iam';

* A KMS Key, either managed by this CDK app, or imported.
*
* @stability stable
*/

@@ -17,11 +15,10 @@ export interface IKey extends IResource {

*
* @stability stable
* @attribute true
* @attribute
*/
readonly keyArn: string;
/**
* The ID of the key (the part that looks something like: 1234abcd-12ab-34cd-56ef-1234567890ab).
* The ID of the key
* (the part that looks something like: 1234abcd-12ab-34cd-56ef-1234567890ab).
*
* @stability stable
* @attribute true
* @attribute
*/

@@ -31,4 +28,2 @@ readonly keyId: string;

* Defines a new alias for the key.
*
* @stability stable
*/

@@ -38,30 +33,22 @@ addAlias(alias: string): Alias;

* Adds a statement to the KMS key resource policy.
*
* @param statement The policy statement to add.
* @param allowNoOp If this is set to `false` and there is no policy defined (i.e. external key), the operation will fail. Otherwise, it will no-op.
* @stability stable
* @param statement The policy statement to add
* @param allowNoOp If this is set to `false` and there is no policy
* defined (i.e. external key), the operation will fail. Otherwise, it will
* no-op.
*/
addToResourcePolicy(statement: iam.PolicyStatement, allowNoOp?: boolean): iam.AddToResourcePolicyResult;
/**
* Grant the indicated permissions on this key to the given principal.
*
* @stability stable
* Grant the indicated permissions on this key to the given principal
*/
grant(grantee: iam.IGrantable, ...actions: string[]): iam.Grant;
/**
* Grant decryption permissions using this key to the given principal.
*
* @stability stable
* Grant decryption permissions using this key to the given principal
*/
grantDecrypt(grantee: iam.IGrantable): iam.Grant;
/**
* Grant encryption permissions using this key to the given principal.
*
* @stability stable
* Grant encryption permissions using this key to the given principal
*/
grantEncrypt(grantee: iam.IGrantable): iam.Grant;
/**
* Grant encryption and decryption permissions using this key to the given principal.
*
* @stability stable
* Grant encryption and decryption permissions using this key to the given principal
*/

@@ -99,4 +86,2 @@ grantEncryptDecrypt(grantee: iam.IGrantable): iam.Grant;

* Defines a new alias for the key.
*
* @stability stable
*/

@@ -106,19 +91,11 @@ addAlias(aliasName: string): Alias;

* Adds a statement to the KMS key resource policy.
*
* @param statement The policy statement to add.
* @param allowNoOp If this is set to `false` and there is no policy defined (i.e. external key), the operation will fail. Otherwise, it will no-op.
* @stability stable
* @param statement The policy statement to add
* @param allowNoOp If this is set to `false` and there is no policy
* defined (i.e. external key), the operation will fail. Otherwise, it will
* no-op.
*/
addToResourcePolicy(statement: iam.PolicyStatement, allowNoOp?: boolean): iam.AddToResourcePolicyResult;
/**
* Validate the current construct.
*
* This method can be implemented by derived constructs in order to perform
* validation logic. It is called on all constructs before synthesis.
*
* @stability stable
*/
protected validate(): string[];
/**
* Grant the indicated permissions on this key to the given principal.
* Grant the indicated permissions on this key to the given principal
*

@@ -128,22 +105,14 @@ * This modifies both the principal's policy as well as the resource policy,

* must not be empty and so default grants won't work.
*
* @stability stable
*/
grant(grantee: iam.IGrantable, ...actions: string[]): iam.Grant;
/**
* Grant decryption permissions using this key to the given principal.
*
* @stability stable
* Grant decryption permissions using this key to the given principal
*/
grantDecrypt(grantee: iam.IGrantable): iam.Grant;
/**
* Grant encryption permissions using this key to the given principal.
*
* @stability stable
* Grant encryption permissions using this key to the given principal
*/
grantEncrypt(grantee: iam.IGrantable): iam.Grant;
/**
* Grant encryption and decryption permissions using this key to the given principal.
*
* @stability stable
* Grant encryption and decryption permissions using this key to the given principal
*/

@@ -166,4 +135,2 @@ grantEncryptDecrypt(grantee: iam.IGrantable): iam.Grant;

* The key spec, represents the cryptographic configuration of keys.
*
* @stability stable
*/

@@ -175,4 +142,2 @@ export declare enum KeySpec {

* Valid usage: ENCRYPT_DECRYPT
*
* @stability stable
*/

@@ -184,4 +149,2 @@ SYMMETRIC_DEFAULT = "SYMMETRIC_DEFAULT",

* Valid usage: ENCRYPT_DECRYPT and SIGN_VERIFY
*
* @stability stable
*/

@@ -193,4 +156,2 @@ RSA_2048 = "RSA_2048",

* Valid usage: ENCRYPT_DECRYPT and SIGN_VERIFY
*
* @stability stable
*/

@@ -202,28 +163,23 @@ RSA_3072 = "RSA_3072",

* Valid usage: ENCRYPT_DECRYPT and SIGN_VERIFY
*
* @stability stable
*/
RSA_4096 = "RSA_4096",
/**
* NIST FIPS 186-4, Section 6.4, ECDSA signature using the curve specified by the key and SHA-256 for the message digest.
* NIST FIPS 186-4, Section 6.4, ECDSA signature using the curve specified by the key and
* SHA-256 for the message digest.
*
* Valid usage: SIGN_VERIFY
*
* @stability stable
*/
ECC_NIST_P256 = "ECC_NIST_P256",
/**
* NIST FIPS 186-4, Section 6.4, ECDSA signature using the curve specified by the key and SHA-384 for the message digest.
* NIST FIPS 186-4, Section 6.4, ECDSA signature using the curve specified by the key and
* SHA-384 for the message digest.
*
* Valid usage: SIGN_VERIFY
*
* @stability stable
*/
ECC_NIST_P384 = "ECC_NIST_P384",
/**
* NIST FIPS 186-4, Section 6.4, ECDSA signature using the curve specified by the key and SHA-512 for the message digest.
* NIST FIPS 186-4, Section 6.4, ECDSA signature using the curve specified by the key and
* SHA-512 for the message digest.
*
* Valid usage: SIGN_VERIFY
*
* @stability stable
*/

@@ -235,4 +191,2 @@ ECC_NIST_P521 = "ECC_NIST_P521",

* Valid usage: SIGN_VERIFY
*
* @stability stable
*/

@@ -243,4 +197,2 @@ ECC_SECG_P256K1 = "ECC_SECG_P256K1"

* The key usage, represents the cryptographic operations of keys.
*
* @stability stable
*/

@@ -250,10 +202,6 @@ export declare enum KeyUsage {

* Encryption and decryption.
*
* @stability stable
*/
ENCRYPT_DECRYPT = "ENCRYPT_DECRYPT",
/**
* Signing and verification.
*
* @stability stable
* Signing and verification
*/

@@ -263,19 +211,14 @@ SIGN_VERIFY = "SIGN_VERIFY"

/**
* Construction properties for a KMS Key object.
*
* @stability stable
* Construction properties for a KMS Key object
*/
export interface KeyProps {
/**
* A description of the key.
*
* Use a description that helps your users decide
* A description of the key. Use a description that helps your users decide
* whether the key is appropriate for a particular task.
*
* @default - No description.
* @stability stable
*/
readonly description?: string;
/**
* Initial alias to add to the key.
* Initial alias to add to the key
*

@@ -285,3 +228,2 @@ * More aliases can be added later by calling `addAlias`.

* @default - No alias is added for the key.
* @stability stable
*/

@@ -293,3 +235,2 @@ readonly alias?: string;

* @default false
* @stability stable
*/

@@ -301,3 +242,2 @@ readonly enableKeyRotation?: boolean;

* @default - Key is enabled.
* @stability stable
*/

@@ -312,3 +252,2 @@ readonly enabled?: boolean;

* @default KeySpec.SYMMETRIC_DEFAULT
* @stability stable
*/

@@ -323,3 +262,2 @@ readonly keySpec?: KeySpec;

* @default KeyUsage.ENCRYPT_DECRYPT
* @stability stable
*/

@@ -336,3 +274,2 @@ readonly keyUsage?: KeyUsage;

* administer the key will be created.
* @stability stable
*/

@@ -349,17 +286,13 @@ readonly policy?: iam.PolicyDocument;

* @default []
* @stability stable
*/
readonly admins?: iam.IPrincipal[];
/**
* Whether the encryption key should be retained when it is removed from the Stack.
*
* This is useful when one wants to
* Whether the encryption key should be retained when it is removed from the Stack. This is useful when one wants to
* retain access to data that was encrypted with a key that is being retired.
*
* @default RemovalPolicy.Retain
* @stability stable
*/
readonly removalPolicy?: RemovalPolicy;
/**
* (deprecated) Whether the key usage can be granted by IAM policies.
* Whether the key usage can be granted by IAM policies
*

@@ -380,3 +313,4 @@ * Setting this to true adds a default statement which delegates key

/**
* Specifies the number of days in the waiting period before AWS KMS deletes a CMK that has been removed from a CloudFormation stack.
* Specifies the number of days in the waiting period before
* AWS KMS deletes a CMK that has been removed from a CloudFormation stack.
*

@@ -390,5 +324,4 @@ * When you remove a customer master key (CMK) from a CloudFormation stack, AWS KMS schedules the CMK for deletion

*
* @see https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-kms-key.html#cfn-kms-key-pendingwindowindays
* @default - 30 days
* @see https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-kms-key.html#cfn-kms-key-pendingwindowindays
* @stability stable
*/

@@ -400,3 +333,2 @@ readonly pendingWindow?: Duration;

*
* @stability stable
* @resource AWS::KMS::Key

@@ -408,6 +340,5 @@ */

*
* @param scope the construct that will "own" the imported key.
* @param id the id of the imported key in the construct tree.
* @param scope the construct that will "own" the imported key.
* @param id the id of the imported key in the construct tree.
* @param keyArn the ARN of an existing KMS key.
* @stability stable
*/

@@ -417,3 +348,2 @@ static fromKeyArn(scope: Construct, id: string, keyArn: string): IKey;

* Create a mutable {@link IKey} based on a low-level {@link CfnKey}.
*
* This is most useful when combined with the cloudformation-include module.

@@ -427,4 +357,2 @@ * This method is different than {@link fromKeyArn()} because the {@link IKey}

* on which calling those methods would have no effect.
*
* @stability stable
*/

@@ -450,48 +378,14 @@ static fromCfnKey(cfnKey: CfnKey): IKey;

* https://docs.aws.amazon.com/cdk/latest/guide/context.html for more information.
*
* @stability stable
*/
static fromLookup(scope: Construct, id: string, options: KeyLookupOptions): IKey;
/**
* The ARN of the key.
*
* @stability stable
*/
readonly keyArn: string;
/**
* The ID of the key (the part that looks something like: 1234abcd-12ab-34cd-56ef-1234567890ab).
*
* @stability stable
*/
readonly keyId: string;
/**
* Optional policy document that represents the resource policy of this key.
*
* If specified, addToResourcePolicy can be used to edit this policy.
* Otherwise this method will no-op.
*
* @stability stable
*/
protected readonly policy?: iam.PolicyDocument;
/**
* Optional property to control trusting account identities.
*
* If specified, grants will default identity policies instead of to both
* resource and identity policies. This matches the default behavior when creating
* KMS keys via the API or console.
*
* @stability stable
*/
protected readonly trustAccountIdentities: boolean;
/**
* @stability stable
*/
constructor(scope: Construct, id: string, props?: KeyProps);
/**
* Grant admins permissions using this key to the given principal.
* Grant admins permissions using this key to the given principal
*
* Key administrators have permissions to manage the key (e.g., change permissions, revoke), but do not have permissions
* to use the key in cryptographic operations (e.g., encrypt, decrypt).
*
* @stability stable
*/

@@ -498,0 +392,0 @@ grantAdmin(grantee: iam.IGrantable): iam.Grant;

import * as iam from '@aws-cdk/aws-iam';
/**
* A principal to allow access to a key if it's being used through another AWS service.
*
* @stability stable
* A principal to allow access to a key if it's being used through another AWS service
*/

@@ -10,12 +8,4 @@ export declare class ViaServicePrincipal extends iam.PrincipalBase {

private readonly basePrincipal;
/**
* @stability stable
*/
constructor(serviceName: string, basePrincipal?: iam.IPrincipal);
/**
* Return the policy fragment that identifies this principal in a Policy.
*
* @stability stable
*/
get policyFragment(): iam.PrincipalPolicyFragment;
}

@@ -8,10 +8,5 @@ "use strict";

/**
* A principal to allow access to a key if it's being used through another AWS service.
*
* @stability stable
* A principal to allow access to a key if it's being used through another AWS service
*/
class ViaServicePrincipal extends iam.PrincipalBase {
/**
* @stability stable
*/
constructor(serviceName, basePrincipal) {

@@ -22,7 +17,2 @@ super();

}
/**
* Return the policy fragment that identifies this principal in a Policy.
*
* @stability stable
*/
get policyFragment() {

@@ -43,3 +33,3 @@ // Make a copy of the base policyFragment to add a condition to it

_a = JSII_RTTI_SYMBOL_1;
ViaServicePrincipal[_a] = { fqn: "@aws-cdk/aws-kms.ViaServicePrincipal", version: "1.144.0" };
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoidmlhLXNlcnZpY2UtcHJpbmNpcGFsLmpzIiwic291cmNlUm9vdCI6IiIsInNvdXJjZXMiOlsidmlhLXNlcnZpY2UtcHJpbmNpcGFsLnRzIl0sIm5hbWVzIjpbXSwibWFwcGluZ3MiOiI7Ozs7O0FBQUEsd0NBQXdDOzs7Ozs7QUFHeEMsTUFBYSxtQkFBb0IsU0FBUSxHQUFHLENBQUMsYUFBYTs7OztJQUd4RCxZQUE2QixXQUFtQixFQUFFLGFBQThCO1FBQzlFLEtBQUssRUFBRSxDQUFDO1FBRG1CLGdCQUFXLEdBQVgsV0FBVyxDQUFRO1FBRTlDLElBQUksQ0FBQyxhQUFhLEdBQUcsYUFBYSxDQUFDLENBQUMsQ0FBQyxhQUFhLENBQUMsQ0FBQyxDQUFDLElBQUksR0FBRyxDQUFDLFlBQVksRUFBRSxDQUFDO0tBQzdFOzs7Ozs7SUFFRCxJQUFXLGNBQWM7UUFDdkIsa0VBQWtFO1FBQ2xFLE1BQU0sSUFBSSxHQUFHLElBQUksQ0FBQyxhQUFhLENBQUMsY0FBYyxDQUFDO1FBQy9DLE1BQU0sVUFBVSxHQUFHLE1BQU0sQ0FBQyxNQUFNLENBQUMsRUFBRSxFQUFFLElBQUksQ0FBQyxVQUFVLENBQUMsQ0FBQztRQUV0RCxJQUFJLFVBQVUsQ0FBQyxZQUFZLEVBQUU7WUFDM0IsVUFBVSxDQUFDLFlBQVksR0FBRyxNQUFNLENBQUMsTUFBTSxDQUFDLEVBQUUsZ0JBQWdCLEVBQUUsSUFBSSxDQUFDLFdBQVcsRUFBRSxFQUFFLFVBQVUsQ0FBQyxZQUFZLENBQUMsQ0FBQztTQUMxRzthQUFNO1lBQ0wsVUFBVSxDQUFDLFlBQVksR0FBRyxFQUFFLGdCQUFnQixFQUFFLElBQUksQ0FBQyxXQUFXLEVBQUUsQ0FBQztTQUNsRTtRQUVELE9BQU8sRUFBRSxhQUFhLEVBQUUsSUFBSSxDQUFDLGFBQWEsRUFBRSxVQUFVLEVBQUUsQ0FBQztLQUMxRDs7QUFwQkgsa0RBcUJDIiwic291cmNlc0NvbnRlbnQiOlsiaW1wb3J0ICogYXMgaWFtIGZyb20gJ0Bhd3MtY2RrL2F3cy1pYW0nO1xuXG4gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgXG5leHBvcnQgY2xhc3MgVmlhU2VydmljZVByaW5jaXBhbCBleHRlbmRzIGlhbS5QcmluY2lwYWxCYXNlIHtcbiAgcHJpdmF0ZSByZWFkb25seSBiYXNlUHJpbmNpcGFsOiBpYW0uSVByaW5jaXBhbDtcblxuICBjb25zdHJ1Y3Rvcihwcml2YXRlIHJlYWRvbmx5IHNlcnZpY2VOYW1lOiBzdHJpbmcsIGJhc2VQcmluY2lwYWw/OiBpYW0uSVByaW5jaXBhbCkge1xuICAgIHN1cGVyKCk7XG4gICAgdGhpcy5iYXNlUHJpbmNpcGFsID0gYmFzZVByaW5jaXBhbCA/IGJhc2VQcmluY2lwYWwgOiBuZXcgaWFtLkFueVByaW5jaXBhbCgpO1xuICB9XG5cbiAgcHVibGljIGdldCBwb2xpY3lGcmFnbWVudCgpOiBpYW0uUHJpbmNpcGFsUG9saWN5RnJhZ21lbnQge1xuICAgIC8vIE1ha2UgYSBjb3B5IG9mIHRoZSBiYXNlIHBvbGljeUZyYWdtZW50IHRvIGFkZCBhIGNvbmRpdGlvbiB0byBpdFxuICAgIGNvbnN0IGJhc2UgPSB0aGlzLmJhc2VQcmluY2lwYWwucG9saWN5RnJhZ21lbnQ7XG4gICAgY29uc3QgY29uZGl0aW9ucyA9IE9iamVjdC5hc3NpZ24oe30sIGJhc2UuY29uZGl0aW9ucyk7XG5cbiAgICBpZiAoY29uZGl0aW9ucy5TdHJpbmdFcXVhbHMpIHtcbiAgICAgIGNvbmRpdGlvbnMuU3RyaW5nRXF1YWxzID0gT2JqZWN0LmFzc2lnbih7ICdrbXM6VmlhU2VydmljZSc6IHRoaXMuc2VydmljZU5hbWUgfSwgY29uZGl0aW9ucy5TdHJpbmdFcXVhbHMpO1xuICAgIH0gZWxzZSB7XG4gICAgICBjb25kaXRpb25zLlN0cmluZ0VxdWFscyA9IHsgJ2ttczpWaWFTZXJ2aWNlJzogdGhpcy5zZXJ2aWNlTmFtZSB9O1xuICAgIH1cblxuICAgIHJldHVybiB7IHByaW5jaXBhbEpzb246IGJhc2UucHJpbmNpcGFsSnNvbiwgY29uZGl0aW9ucyB9O1xuICB9XG59XG4iXX0=
ViaServicePrincipal[_a] = { fqn: "@aws-cdk/aws-kms.ViaServicePrincipal", version: "1.145.0" };
//# sourceMappingURL=data:application/json;base64,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
{
"name": "@aws-cdk/aws-kms",
"version": "1.144.0",
"version": "1.145.0",
"description": "The CDK Construct Library for AWS::KMS",

@@ -82,15 +82,15 @@ "main": "lib/index.js",

"devDependencies": {
"@aws-cdk/assertions": "1.144.0",
"@aws-cdk/cdk-build-tools": "1.144.0",
"@aws-cdk/cdk-integ-tools": "1.144.0",
"@aws-cdk/cfn2ts": "1.144.0",
"@aws-cdk/cloud-assembly-schema": "1.144.0",
"@aws-cdk/pkglint": "1.144.0",
"@aws-cdk/assertions": "1.145.0",
"@aws-cdk/cdk-build-tools": "1.145.0",
"@aws-cdk/cdk-integ-tools": "1.145.0",
"@aws-cdk/cfn2ts": "1.145.0",
"@aws-cdk/cloud-assembly-schema": "1.145.0",
"@aws-cdk/pkglint": "1.145.0",
"@types/jest": "^27.4.0"
},
"dependencies": {
"@aws-cdk/aws-iam": "1.144.0",
"@aws-cdk/cloud-assembly-schema": "1.144.0",
"@aws-cdk/core": "1.144.0",
"@aws-cdk/cx-api": "1.144.0",
"@aws-cdk/aws-iam": "1.145.0",
"@aws-cdk/cloud-assembly-schema": "1.145.0",
"@aws-cdk/core": "1.145.0",
"@aws-cdk/cx-api": "1.145.0",
"constructs": "^3.3.69"

@@ -100,6 +100,6 @@ },

"peerDependencies": {
"@aws-cdk/aws-iam": "1.144.0",
"@aws-cdk/cloud-assembly-schema": "1.144.0",
"@aws-cdk/core": "1.144.0",
"@aws-cdk/cx-api": "1.144.0",
"@aws-cdk/aws-iam": "1.145.0",
"@aws-cdk/cloud-assembly-schema": "1.145.0",
"@aws-cdk/core": "1.145.0",
"@aws-cdk/cx-api": "1.145.0",
"constructs": "^3.3.69"

@@ -106,0 +106,0 @@ },

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is too big to display

Sorry, the diff of this file is too big to display

Sorry, the diff of this file is too big to display

Sorry, the diff of this file is too big to display

SocketSocket SOC 2 Logo

Product

  • Package Alerts
  • Integrations
  • Docs
  • Pricing
  • FAQ
  • Roadmap
  • Changelog

Packages

npm

Stay in touch

Get open source security insights delivered straight into your inbox.


  • Terms
  • Privacy
  • Security

Made with ⚡️ by Socket Inc