diff --git a/AwsEncryptionSDK/runtimes/go/ImplementationFromDafny-go/awscryptographyencryptionsdksmithygenerated/to_dafny.go b/AwsEncryptionSDK/runtimes/go/ImplementationFromDafny-go/awscryptographyencryptionsdksmithygenerated/to_dafny.go index 5b31a8468..2c3fc0d60 100644 --- a/AwsEncryptionSDK/runtimes/go/ImplementationFromDafny-go/awscryptographyencryptionsdksmithygenerated/to_dafny.go +++ b/AwsEncryptionSDK/runtimes/go/ImplementationFromDafny-go/awscryptographyencryptionsdksmithygenerated/to_dafny.go @@ -134,6 +134,10 @@ func NetV4_0_0_RetryPolicy_ToDafny(nativeInput awscryptographyencryptionsdksmith if enumVal == nativeInput { break } + if index == len(nativeInput.Values()) { + panic("Input value did not found in enum values") + } + } var enum interface{} for allEnums, i := dafny.Iterate(AwsCryptographyEncryptionSdkTypes.CompanionStruct_NetV4__0__0__RetryPolicy_{}.AllSingletonConstructors()), 0; i < index; i++ { @@ -233,6 +237,10 @@ func aws_cryptography_encryptionSdk_DecryptOutput_algorithmSuiteId_ToDafny(input if enumVal == input { break } + if index == len(input.Values()) { + panic("Input value did not found in enum values") + } + } var enum interface{} for allEnums, i := dafny.Iterate(AwsCryptographyMaterialProvidersTypes.CompanionStruct_ESDKAlgorithmSuiteId_{}.AllSingletonConstructors()), 0; i < index; i++ { @@ -280,6 +288,7 @@ func aws_cryptography_encryptionSdk_EncryptInput_algorithmSuiteId_ToDafny(input if enumVal == *input { break } + } var enum interface{} for allEnums, i := dafny.Iterate(AwsCryptographyMaterialProvidersTypes.CompanionStruct_ESDKAlgorithmSuiteId_{}.AllSingletonConstructors()), 0; i < index; i++ { @@ -334,6 +343,10 @@ func aws_cryptography_encryptionSdk_EncryptOutput_algorithmSuiteId_ToDafny(input if enumVal == input { break } + if index == len(input.Values()) { + panic("Input value did not found in enum values") + } + } var enum interface{} for allEnums, i := dafny.Iterate(AwsCryptographyMaterialProvidersTypes.CompanionStruct_ESDKAlgorithmSuiteId_{}.AllSingletonConstructors()), 0; i < index; i++ { @@ -365,6 +378,7 @@ func aws_cryptography_encryptionSdk_AwsEncryptionSdkConfig_commitmentPolicy_ToDa if enumVal == *input { break } + } var enum interface{} for allEnums, i := dafny.Iterate(AwsCryptographyMaterialProvidersTypes.CompanionStruct_ESDKCommitmentPolicy_{}.AllSingletonConstructors()), 0; i < index; i++ { @@ -398,6 +412,7 @@ func aws_cryptography_encryptionSdk_AwsEncryptionSdkConfig_netV4_0_0_RetryPolicy if enumVal == *input { break } + } var enum interface{} for allEnums, i := dafny.Iterate(AwsCryptographyEncryptionSdkTypes.CompanionStruct_NetV4__0__0__RetryPolicy_{}.AllSingletonConstructors()), 0; i < index; i++ { diff --git a/AwsEncryptionSDK/runtimes/go/TestsFromDafny-go/awscryptographyencryptionsdksmithygenerated/to_dafny.go b/AwsEncryptionSDK/runtimes/go/TestsFromDafny-go/awscryptographyencryptionsdksmithygenerated/to_dafny.go index 5b31a8468..2c3fc0d60 100644 --- a/AwsEncryptionSDK/runtimes/go/TestsFromDafny-go/awscryptographyencryptionsdksmithygenerated/to_dafny.go +++ b/AwsEncryptionSDK/runtimes/go/TestsFromDafny-go/awscryptographyencryptionsdksmithygenerated/to_dafny.go @@ -134,6 +134,10 @@ func NetV4_0_0_RetryPolicy_ToDafny(nativeInput awscryptographyencryptionsdksmith if enumVal == nativeInput { break } + if index == len(nativeInput.Values()) { + panic("Input value did not found in enum values") + } + } var enum interface{} for allEnums, i := dafny.Iterate(AwsCryptographyEncryptionSdkTypes.CompanionStruct_NetV4__0__0__RetryPolicy_{}.AllSingletonConstructors()), 0; i < index; i++ { @@ -233,6 +237,10 @@ func aws_cryptography_encryptionSdk_DecryptOutput_algorithmSuiteId_ToDafny(input if enumVal == input { break } + if index == len(input.Values()) { + panic("Input value did not found in enum values") + } + } var enum interface{} for allEnums, i := dafny.Iterate(AwsCryptographyMaterialProvidersTypes.CompanionStruct_ESDKAlgorithmSuiteId_{}.AllSingletonConstructors()), 0; i < index; i++ { @@ -280,6 +288,7 @@ func aws_cryptography_encryptionSdk_EncryptInput_algorithmSuiteId_ToDafny(input if enumVal == *input { break } + } var enum interface{} for allEnums, i := dafny.Iterate(AwsCryptographyMaterialProvidersTypes.CompanionStruct_ESDKAlgorithmSuiteId_{}.AllSingletonConstructors()), 0; i < index; i++ { @@ -334,6 +343,10 @@ func aws_cryptography_encryptionSdk_EncryptOutput_algorithmSuiteId_ToDafny(input if enumVal == input { break } + if index == len(input.Values()) { + panic("Input value did not found in enum values") + } + } var enum interface{} for allEnums, i := dafny.Iterate(AwsCryptographyMaterialProvidersTypes.CompanionStruct_ESDKAlgorithmSuiteId_{}.AllSingletonConstructors()), 0; i < index; i++ { @@ -365,6 +378,7 @@ func aws_cryptography_encryptionSdk_AwsEncryptionSdkConfig_commitmentPolicy_ToDa if enumVal == *input { break } + } var enum interface{} for allEnums, i := dafny.Iterate(AwsCryptographyMaterialProvidersTypes.CompanionStruct_ESDKCommitmentPolicy_{}.AllSingletonConstructors()), 0; i < index; i++ { @@ -398,6 +412,7 @@ func aws_cryptography_encryptionSdk_AwsEncryptionSdkConfig_netV4_0_0_RetryPolicy if enumVal == *input { break } + } var enum interface{} for allEnums, i := dafny.Iterate(AwsCryptographyEncryptionSdkTypes.CompanionStruct_NetV4__0__0__RetryPolicy_{}.AllSingletonConstructors()), 0; i < index; i++ { diff --git a/AwsEncryptionSDK/runtimes/go/examples/go.mod b/AwsEncryptionSDK/runtimes/go/examples/go.mod index 5db9ce1c8..ddc56be8c 100644 --- a/AwsEncryptionSDK/runtimes/go/examples/go.mod +++ b/AwsEncryptionSDK/runtimes/go/examples/go.mod @@ -3,11 +3,12 @@ module github.com/aws/aws-encryption-sdk/releases/go/encryption-sdk/examples go 1.23.0 replace ( - github.com/aws/aws-cryptographic-material-providers-library/releases/go/dynamodb v0.0.0 => ../../../../mpl/ComAmazonawsDynamodb/runtimes/go/ImplementationFromDafny-go/ - github.com/aws/aws-cryptographic-material-providers-library/releases/go/kms v0.0.0 => ../../../../mpl/ComAmazonawsKms/runtimes/go/ImplementationFromDafny-go/ - github.com/aws/aws-cryptographic-material-providers-library/releases/go/primitives v0.0.0 => ../../../../mpl/AwsCryptographyPrimitives/runtimes/go/ImplementationFromDafny-go/ - github.com/aws/aws-cryptographic-material-providers-library/releases/go/smithy-dafny-standard-library v0.0.1 => ../../../../mpl/StandardLibrary/runtimes/go/ImplementationFromDafny-go/ - github.com/aws/aws-encryption-sdk/releases/go/encryption-sdk => ../ImplementationFromDafny-go/ + github.com/aws/aws-cryptographic-material-providers-library/releases/go/dynamodb => ../../../../mpl/ComAmazonawsDynamodb/runtimes/go/ImplementationFromDafny-go/ + github.com/aws/aws-cryptographic-material-providers-library/releases/go/kms => ../../../../mpl/ComAmazonawsKms/runtimes/go/ImplementationFromDafny-go/ + github.com/aws/aws-cryptographic-material-providers-library/releases/go/primitives => ../../../../mpl/AwsCryptographyPrimitives/runtimes/go/ImplementationFromDafny-go/ + github.com/aws/aws-cryptographic-material-providers-library/releases/go/smithy-dafny-standard-library => ../../../../mpl/StandardLibrary/runtimes/go/ImplementationFromDafny-go/ + github.com/aws/aws-cryptographic-material-providers-library/releases/go/mpl => ../../../../mpl/AwsCryptographicMaterialProviders/runtimes/go/ImplementationFromDafny-go/ + github.com/aws/aws-encryption-sdk/releases/go/encryption-sdk => ../../../../AwsEncryptionSDK/runtimes/go/ImplementationFromDafny-go ) require ( diff --git a/AwsEncryptionSDK/runtimes/go/examples/go.sum b/AwsEncryptionSDK/runtimes/go/examples/go.sum index 6cdce71de..9b4fdc43c 100644 --- a/AwsEncryptionSDK/runtimes/go/examples/go.sum +++ b/AwsEncryptionSDK/runtimes/go/examples/go.sum @@ -1,11 +1,5 @@ -github.com/aws/aws-cryptographic-material-providers-library/releases/go/dynamodb v0.0.3 h1:JY/4eTs5ObPqZFk6dDNvoCkomUvKtYGBtFp5rvfIV20= -github.com/aws/aws-cryptographic-material-providers-library/releases/go/dynamodb v0.0.3/go.mod h1:8mHZUqK00Oga2z7H6Kp8LZGkEBKSWUUT/nkeoIR8GiM= -github.com/aws/aws-cryptographic-material-providers-library/releases/go/kms v0.0.1 h1:jvMM4fgVZ116L8VPfdEa3GxJiU7ic/krHCAIyeIcPJY= -github.com/aws/aws-cryptographic-material-providers-library/releases/go/kms v0.0.1/go.mod h1:6QCmXRQJNf1XId129cnFqpWK9DHamyyqmC7GKxHmcEE= github.com/aws/aws-cryptographic-material-providers-library/releases/go/mpl v0.0.1 h1:0FVo3F6hsrrYhV9AtFUr/Z0TpRwvSO5l/W1bOdWtg4c= github.com/aws/aws-cryptographic-material-providers-library/releases/go/mpl v0.0.1/go.mod h1:+QLHsXYeIZqA4WDjQBXNDm5r5T3zyIxE0q/k2l76apc= -github.com/aws/aws-cryptographic-material-providers-library/releases/go/primitives v0.0.1 h1:Iy8Va/0Aa43JQkzGKlTjOvBlecTyZCIOg1JqRRyWH9g= -github.com/aws/aws-cryptographic-material-providers-library/releases/go/primitives v0.0.1/go.mod h1:aPCFt/cDDuUlg6aWLSTPW6ZPqivNt3pNzDWCsBFRQtE= github.com/aws/aws-sdk-go-v2 v1.33.0 h1:Evgm4DI9imD81V0WwD+TN4DCwjUMdc94TrduMLbgZJs= github.com/aws/aws-sdk-go-v2 v1.33.0/go.mod h1:P5WJBrYqqbWVaOxgH0X/FYYD47/nooaPOZPlQdmiN2U= github.com/aws/aws-sdk-go-v2/config v1.29.0 h1:Vk/u4jof33or1qAQLdofpjKV7mQQT7DcUpnYx8kdmxY= diff --git a/AwsEncryptionSDK/runtimes/go/examples/keyring/awskmsrsakeyring/awskmsrsakeyring.go b/AwsEncryptionSDK/runtimes/go/examples/keyring/awskmsrsakeyring/awskmsrsakeyring.go index 15eeef5cc..833cfa94f 100644 --- a/AwsEncryptionSDK/runtimes/go/examples/keyring/awskmsrsakeyring/awskmsrsakeyring.go +++ b/AwsEncryptionSDK/runtimes/go/examples/keyring/awskmsrsakeyring/awskmsrsakeyring.go @@ -26,7 +26,6 @@ import ( esdktypes "github.com/aws/aws-encryption-sdk/releases/go/encryption-sdk/awscryptographyencryptionsdksmithygeneratedtypes" "github.com/aws/aws-sdk-go-v2/config" "github.com/aws/aws-sdk-go-v2/service/kms" - kmstypes "github.com/aws/aws-sdk-go-v2/service/kms/types" ) func AwsKmsRsaExample(exampleText string, kmsRsaKeyID string, kmsRSAPublicKey []byte) { @@ -47,10 +46,9 @@ func AwsKmsRsaExample(exampleText string, kmsRsaKeyID string, kmsRSAPublicKey [] } // Step 3: Create the keyring awsKmsRSAKeyringInput := mpltypes.CreateAwsKmsRsaKeyringInput{ - KmsClient: kmsClient, - KmsKeyId: kmsRsaKeyID, - PublicKey: kmsRSAPublicKey, - EncryptionAlgorithm: kmstypes.EncryptionAlgorithmSpecRsaesOaepSha256, + KmsClient: kmsClient, + KmsKeyId: kmsRsaKeyID, + PublicKey: kmsRSAPublicKey, } awsKmsRSAKeyring, err := matProv.CreateAwsKmsRsaKeyring(context.Background(), awsKmsRSAKeyringInput) if err != nil { diff --git a/mpl b/mpl index 70e580991..5c4c05407 160000 --- a/mpl +++ b/mpl @@ -1 +1 @@ -Subproject commit 70e580991678387ce897a286c4f7f449aa616785 +Subproject commit 5c4c054074d2e58ccd3016d8483e1846ce609e9e