aws-sdk-paymentcryptographydata 1.8.0 → 1.10.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/CHANGELOG.md +10 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-paymentcryptographydata/client.rb +94 -47
- data/lib/aws-sdk-paymentcryptographydata/client_api.rb +15 -2
- data/lib/aws-sdk-paymentcryptographydata/endpoint_provider.rb +1 -1
- data/lib/aws-sdk-paymentcryptographydata/plugins/endpoints.rb +1 -0
- data/lib/aws-sdk-paymentcryptographydata/types.rb +135 -96
- data/lib/aws-sdk-paymentcryptographydata.rb +1 -1
- data/sig/client.rbs +561 -0
- data/sig/errors.rbs +36 -0
- data/sig/resource.rbs +79 -0
- data/sig/types.rbs +690 -0
- data/sig/waiters.rbs +13 -0
- metadata +13 -8
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 6126989706af46778cf434cc347a8c7d3612827a1001706d0e213e05d5cd9612
|
4
|
+
data.tar.gz: a8a99a810c24b25b8ba1b9f30b7fc03d295cb426c41ff77e207dfe888a3654b9
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 1c69e8560dd194bdfaf4d56ae5ffaaeb3b00fd4a79531eae91657eb4d8095c469d9bb8ec5b19820ce97c8c179abc57351f132fa829bb9ff336c6a5664eadade1
|
7
|
+
data.tar.gz: d274c07082e1aa888f464d77ab4aa465a6a479a276b07537752850fa537d2601994e2a383974a57d80ca1f3605f9e6beaacf910df91f8252dab7c11380ad41dd
|
data/CHANGELOG.md
CHANGED
@@ -1,6 +1,16 @@
|
|
1
1
|
Unreleased Changes
|
2
2
|
------------------
|
3
3
|
|
4
|
+
1.10.0 (2024-03-07)
|
5
|
+
------------------
|
6
|
+
|
7
|
+
* Feature - AWS Payment Cryptography EMV Decrypt Feature Release
|
8
|
+
|
9
|
+
1.9.0 (2024-01-26)
|
10
|
+
------------------
|
11
|
+
|
12
|
+
* Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
|
13
|
+
|
4
14
|
1.8.0 (2023-11-28)
|
5
15
|
------------------
|
6
16
|
|
data/VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
1.
|
1
|
+
1.10.0
|
@@ -388,9 +388,10 @@ module Aws::PaymentCryptographyData
|
|
388
388
|
|
389
389
|
# @!group API Operations
|
390
390
|
|
391
|
-
# Decrypts ciphertext data to plaintext using symmetric,
|
392
|
-
# DUKPT
|
393
|
-
# in the *Amazon Web Services
|
391
|
+
# Decrypts ciphertext data to plaintext using a symmetric (TDES, AES),
|
392
|
+
# asymmetric (RSA), or derived (DUKPT or EMV) encryption key scheme. For
|
393
|
+
# more information, see [Decrypt data][1] in the *Amazon Web Services
|
394
|
+
# Payment Cryptography User Guide*.
|
394
395
|
#
|
395
396
|
# You can use an encryption key generated within Amazon Web Services
|
396
397
|
# Payment Cryptography, or you can import your own encryption key by
|
@@ -403,11 +404,15 @@ module Aws::PaymentCryptographyData
|
|
403
404
|
# [GetPublicCertificate][3].
|
404
405
|
#
|
405
406
|
# For symmetric and DUKPT decryption, Amazon Web Services Payment
|
406
|
-
# Cryptography supports `TDES` and `AES` algorithms. For
|
407
|
-
#
|
408
|
-
#
|
409
|
-
#
|
410
|
-
#
|
407
|
+
# Cryptography supports `TDES` and `AES` algorithms. For EMV decryption,
|
408
|
+
# Amazon Web Services Payment Cryptography supports `TDES` algorithms.
|
409
|
+
# For asymmetric decryption, Amazon Web Services Payment Cryptography
|
410
|
+
# supports `RSA`.
|
411
|
+
#
|
412
|
+
# When you use TDES or TDES DUKPT, the ciphertext data length must be a
|
413
|
+
# multiple of 8 bytes. For AES or AES DUKPT, the ciphertext data length
|
414
|
+
# must be a multiple of 16 bytes. For RSA, it sould be equal to the key
|
415
|
+
# size unless padding is enabled.
|
411
416
|
#
|
412
417
|
# For information about valid keys for this operation, see
|
413
418
|
# [Understanding key attributes][4] and [Key types for specific data
|
@@ -464,6 +469,14 @@ module Aws::PaymentCryptographyData
|
|
464
469
|
# key_serial_number: "HexLengthBetween10And24", # required
|
465
470
|
# mode: "ECB", # accepts ECB, CBC
|
466
471
|
# },
|
472
|
+
# emv: {
|
473
|
+
# initialization_vector: "HexLength16Or32",
|
474
|
+
# major_key_derivation_mode: "EMV_OPTION_A", # required, accepts EMV_OPTION_A, EMV_OPTION_B
|
475
|
+
# mode: "ECB", # accepts ECB, CBC
|
476
|
+
# pan_sequence_number: "HexLengthEquals2", # required
|
477
|
+
# primary_account_number: "NumberLengthBetween12And19", # required
|
478
|
+
# session_derivation_data: "HexLengthEquals16", # required
|
479
|
+
# },
|
467
480
|
# symmetric: {
|
468
481
|
# initialization_vector: "HexLength16Or32",
|
469
482
|
# mode: "ECB", # required, accepts ECB, CBC, CFB, CFB1, CFB8, CFB64, CFB128, OFB
|
@@ -488,9 +501,10 @@ module Aws::PaymentCryptographyData
|
|
488
501
|
req.send_request(options)
|
489
502
|
end
|
490
503
|
|
491
|
-
# Encrypts plaintext data to ciphertext using symmetric,
|
492
|
-
# DUKPT
|
493
|
-
# in the *Amazon Web Services
|
504
|
+
# Encrypts plaintext data to ciphertext using a symmetric (TDES, AES),
|
505
|
+
# asymmetric (RSA), or derived (DUKPT or EMV) encryption key scheme. For
|
506
|
+
# more information, see [Encrypt data][1] in the *Amazon Web Services
|
507
|
+
# Payment Cryptography User Guide*.
|
494
508
|
#
|
495
509
|
# You can generate an encryption key within Amazon Web Services Payment
|
496
510
|
# Cryptography by calling [CreateKey][2]. You can import your own
|
@@ -498,14 +512,24 @@ module Aws::PaymentCryptographyData
|
|
498
512
|
# must have `KeyModesOfUse` set to `Encrypt`. In asymmetric encryption,
|
499
513
|
# plaintext is encrypted using public component. You can import the
|
500
514
|
# public component of an asymmetric key pair created outside Amazon Web
|
501
|
-
# Services Payment Cryptography by calling [ImportKey][3]
|
515
|
+
# Services Payment Cryptography by calling [ImportKey][3].
|
502
516
|
#
|
503
|
-
#
|
504
|
-
# Cryptography supports `TDES` and `AES` algorithms. For
|
505
|
-
#
|
506
|
-
#
|
507
|
-
#
|
508
|
-
#
|
517
|
+
# For symmetric and DUKPT encryption, Amazon Web Services Payment
|
518
|
+
# Cryptography supports `TDES` and `AES` algorithms. For EMV encryption,
|
519
|
+
# Amazon Web Services Payment Cryptography supports `TDES`
|
520
|
+
# algorithms.For asymmetric encryption, Amazon Web Services Payment
|
521
|
+
# Cryptography supports `RSA`.
|
522
|
+
#
|
523
|
+
# When you use TDES or TDES DUKPT, the plaintext data length must be a
|
524
|
+
# multiple of 8 bytes. For AES or AES DUKPT, the plaintext data length
|
525
|
+
# must be a multiple of 16 bytes. For RSA, it sould be equal to the key
|
526
|
+
# size unless padding is enabled.
|
527
|
+
#
|
528
|
+
# To encrypt using DUKPT, you must already have a BDK (Base Derivation
|
529
|
+
# Key) key in your account with `KeyModesOfUse` set to `DeriveKey`, or
|
530
|
+
# you can generate a new DUKPT key by calling [CreateKey][2]. To encrypt
|
531
|
+
# using EMV, you must already have an IMK (Issuer Master Key) key in
|
532
|
+
# your account with `KeyModesOfUse` set to `DeriveKey`.
|
509
533
|
#
|
510
534
|
# For information about valid keys for this operation, see
|
511
535
|
# [Understanding key attributes][4] and [Key types for specific data
|
@@ -544,6 +568,18 @@ module Aws::PaymentCryptographyData
|
|
544
568
|
# @option params [required, String] :plain_text
|
545
569
|
# The plaintext to be encrypted.
|
546
570
|
#
|
571
|
+
# <note markdown="1"> For encryption using asymmetric keys, plaintext data length is
|
572
|
+
# constrained by encryption key strength that you define in
|
573
|
+
# `KeyAlgorithm` and padding type that you define in
|
574
|
+
# `AsymmetricEncryptionAttributes`. For more information, see [Encrypt
|
575
|
+
# data][1] in the *Amazon Web Services Payment Cryptography User Guide*.
|
576
|
+
#
|
577
|
+
# </note>
|
578
|
+
#
|
579
|
+
#
|
580
|
+
#
|
581
|
+
# [1]: https://docs.aws.amazon.com/payment-cryptography/latest/userguide/encrypt-data.html
|
582
|
+
#
|
547
583
|
# @return [Types::EncryptDataOutput] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
548
584
|
#
|
549
585
|
# * {Types::EncryptDataOutput#cipher_text #cipher_text} => String
|
@@ -564,6 +600,14 @@ module Aws::PaymentCryptographyData
|
|
564
600
|
# key_serial_number: "HexLengthBetween10And24", # required
|
565
601
|
# mode: "ECB", # accepts ECB, CBC
|
566
602
|
# },
|
603
|
+
# emv: {
|
604
|
+
# initialization_vector: "HexLength16Or32",
|
605
|
+
# major_key_derivation_mode: "EMV_OPTION_A", # required, accepts EMV_OPTION_A, EMV_OPTION_B
|
606
|
+
# mode: "ECB", # accepts ECB, CBC
|
607
|
+
# pan_sequence_number: "HexLengthEquals2", # required
|
608
|
+
# primary_account_number: "NumberLengthBetween12And19", # required
|
609
|
+
# session_derivation_data: "HexLengthEquals16", # required
|
610
|
+
# },
|
567
611
|
# symmetric: {
|
568
612
|
# initialization_vector: "HexLength16Or32",
|
569
613
|
# mode: "ECB", # required, accepts ECB, CBC, CFB, CFB1, CFB8, CFB64, CFB128, OFB
|
@@ -708,15 +752,19 @@ module Aws::PaymentCryptographyData
|
|
708
752
|
# Generates a Message Authentication Code (MAC) cryptogram within Amazon
|
709
753
|
# Web Services Payment Cryptography.
|
710
754
|
#
|
711
|
-
# You can use this operation
|
712
|
-
#
|
713
|
-
#
|
714
|
-
#
|
715
|
-
#
|
716
|
-
#
|
717
|
-
#
|
718
|
-
#
|
719
|
-
#
|
755
|
+
# You can use this operation to authenticate card-related data by using
|
756
|
+
# known data values to generate MAC for data validation between the
|
757
|
+
# sending and receiving parties. This operation uses message data, a
|
758
|
+
# secret encryption key and MAC algorithm to generate a unique MAC value
|
759
|
+
# for transmission. The receiving party of the MAC must use the same
|
760
|
+
# message data, secret encryption key and MAC algorithm to reproduce
|
761
|
+
# another MAC value for comparision.
|
762
|
+
#
|
763
|
+
# You can use this operation to generate a DUPKT, CMAC, HMAC or EMV MAC
|
764
|
+
# by setting generation attributes and algorithm to the associated
|
765
|
+
# values. The MAC generation encryption key must have valid values for
|
766
|
+
# `KeyUsage` such as `TR31_M7_HMAC_KEY` for HMAC generation, and they
|
767
|
+
# key must have `KeyModesOfUse` set to `Generate` and `Verify`.
|
720
768
|
#
|
721
769
|
# For information about valid keys for this operation, see
|
722
770
|
# [Understanding key attributes][1] and [Key types for specific data
|
@@ -748,7 +796,8 @@ module Aws::PaymentCryptographyData
|
|
748
796
|
# The length of a MAC under generation.
|
749
797
|
#
|
750
798
|
# @option params [required, String] :message_data
|
751
|
-
# The data for which a MAC is under generation.
|
799
|
+
# The data for which a MAC is under generation. This value must be
|
800
|
+
# hexBinary.
|
752
801
|
#
|
753
802
|
# @return [Types::GenerateMacOutput] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
754
803
|
#
|
@@ -1073,10 +1122,7 @@ module Aws::PaymentCryptographyData
|
|
1073
1122
|
# can be from PEK (Pin Encryption Key) to BDK (Base Derivation Key) for
|
1074
1123
|
# DUKPT or from BDK for DUKPT to PEK. Amazon Web Services Payment
|
1075
1124
|
# Cryptography supports `TDES` and `AES` key derivation type for DUKPT
|
1076
|
-
#
|
1077
|
-
# Encryption) use cases where the encryption keys should change but the
|
1078
|
-
# processing system either does not need to, or is not permitted to,
|
1079
|
-
# decrypt the data.
|
1125
|
+
# translations.
|
1080
1126
|
#
|
1081
1127
|
# The allowed combinations of PIN block format translations are guided
|
1082
1128
|
# by PCI. It is important to note that not all encrypted PIN block
|
@@ -1090,8 +1136,9 @@ module Aws::PaymentCryptographyData
|
|
1090
1136
|
# operations][3] in the *Amazon Web Services Payment Cryptography User
|
1091
1137
|
# Guide*.
|
1092
1138
|
#
|
1093
|
-
# <note markdown="1">
|
1094
|
-
#
|
1139
|
+
# <note markdown="1"> Amazon Web Services Payment Cryptography currently supports ISO PIN
|
1140
|
+
# block 4 translation for PIN block built using legacy PAN length. That
|
1141
|
+
# is, PAN is the right most 12 digits excluding the check digits.
|
1095
1142
|
#
|
1096
1143
|
# </note>
|
1097
1144
|
#
|
@@ -1116,15 +1163,15 @@ module Aws::PaymentCryptographyData
|
|
1116
1163
|
#
|
1117
1164
|
# @option params [Types::DukptDerivationAttributes] :incoming_dukpt_attributes
|
1118
1165
|
# The attributes and values to use for incoming DUKPT encryption key for
|
1119
|
-
# PIN block
|
1166
|
+
# PIN block translation.
|
1120
1167
|
#
|
1121
1168
|
# @option params [required, String] :incoming_key_identifier
|
1122
1169
|
# The `keyARN` of the encryption key under which incoming PIN block data
|
1123
1170
|
# is encrypted. This key type can be PEK or BDK.
|
1124
1171
|
#
|
1125
1172
|
# @option params [required, Types::TranslationIsoFormats] :incoming_translation_attributes
|
1126
|
-
# The format of the incoming PIN block data for
|
1127
|
-
# Web Services Payment Cryptography.
|
1173
|
+
# The format of the incoming PIN block data for translation within
|
1174
|
+
# Amazon Web Services Payment Cryptography.
|
1128
1175
|
#
|
1129
1176
|
# @option params [Types::DukptDerivationAttributes] :outgoing_dukpt_attributes
|
1130
1177
|
# The attributes and values to use for outgoing DUKPT encryption key
|
@@ -1135,7 +1182,7 @@ module Aws::PaymentCryptographyData
|
|
1135
1182
|
# data. This key type can be PEK or BDK.
|
1136
1183
|
#
|
1137
1184
|
# @option params [required, Types::TranslationIsoFormats] :outgoing_translation_attributes
|
1138
|
-
# The format of the outgoing PIN block data after
|
1185
|
+
# The format of the outgoing PIN block data after translation by Amazon
|
1139
1186
|
# Web Services Payment Cryptography.
|
1140
1187
|
#
|
1141
1188
|
# @return [Types::TranslatePinDataOutput] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
@@ -1460,13 +1507,12 @@ module Aws::PaymentCryptographyData
|
|
1460
1507
|
|
1461
1508
|
# Verifies a Message Authentication Code (MAC).
|
1462
1509
|
#
|
1463
|
-
# You can use this operation
|
1464
|
-
#
|
1465
|
-
#
|
1466
|
-
#
|
1467
|
-
#
|
1468
|
-
#
|
1469
|
-
# same encryption key for MAC verification as you use for GenerateMac.
|
1510
|
+
# You can use this operation to verify MAC for message data
|
1511
|
+
# authentication such as . In this operation, you must use the same
|
1512
|
+
# message data, secret encryption key and MAC algorithm that was used to
|
1513
|
+
# generate MAC. You can use this operation to verify a DUPKT, CMAC, HMAC
|
1514
|
+
# or EMV MAC by setting generation attributes and algorithm to the
|
1515
|
+
# associated values.
|
1470
1516
|
#
|
1471
1517
|
# For information about valid keys for this operation, see
|
1472
1518
|
# [Understanding key attributes][1] and [Key types for specific data
|
@@ -1498,7 +1544,8 @@ module Aws::PaymentCryptographyData
|
|
1498
1544
|
# The length of the MAC.
|
1499
1545
|
#
|
1500
1546
|
# @option params [required, String] :message_data
|
1501
|
-
# The data on for which MAC is under verification.
|
1547
|
+
# The data on for which MAC is under verification. This value must be
|
1548
|
+
# hexBinary.
|
1502
1549
|
#
|
1503
1550
|
# @option params [required, Types::MacAttributes] :verification_attributes
|
1504
1551
|
# The attributes and data values to use for MAC verification within
|
@@ -1691,7 +1738,7 @@ module Aws::PaymentCryptographyData
|
|
1691
1738
|
params: params,
|
1692
1739
|
config: config)
|
1693
1740
|
context[:gem_name] = 'aws-sdk-paymentcryptographydata'
|
1694
|
-
context[:gem_version] = '1.
|
1741
|
+
context[:gem_version] = '1.10.0'
|
1695
1742
|
Seahorse::Client::Request.new(handlers, context)
|
1696
1743
|
end
|
1697
1744
|
|
@@ -36,6 +36,9 @@ module Aws::PaymentCryptographyData
|
|
36
36
|
DukptKeyVariant = Shapes::StringShape.new(name: 'DukptKeyVariant')
|
37
37
|
DynamicCardVerificationCode = Shapes::StructureShape.new(name: 'DynamicCardVerificationCode')
|
38
38
|
DynamicCardVerificationValue = Shapes::StructureShape.new(name: 'DynamicCardVerificationValue')
|
39
|
+
EmvEncryptionAttributes = Shapes::StructureShape.new(name: 'EmvEncryptionAttributes')
|
40
|
+
EmvEncryptionMode = Shapes::StringShape.new(name: 'EmvEncryptionMode')
|
41
|
+
EmvMajorKeyDerivationMode = Shapes::StringShape.new(name: 'EmvMajorKeyDerivationMode')
|
39
42
|
EncryptDataInput = Shapes::StructureShape.new(name: 'EncryptDataInput')
|
40
43
|
EncryptDataOutput = Shapes::StructureShape.new(name: 'EncryptDataOutput')
|
41
44
|
EncryptionDecryptionAttributes = Shapes::UnionShape.new(name: 'EncryptionDecryptionAttributes')
|
@@ -253,6 +256,14 @@ module Aws::PaymentCryptographyData
|
|
253
256
|
DynamicCardVerificationValue.add_member(:service_code, Shapes::ShapeRef.new(shape: NumberLengthEquals3, required: true, location_name: "ServiceCode"))
|
254
257
|
DynamicCardVerificationValue.struct_class = Types::DynamicCardVerificationValue
|
255
258
|
|
259
|
+
EmvEncryptionAttributes.add_member(:initialization_vector, Shapes::ShapeRef.new(shape: HexLength16Or32, location_name: "InitializationVector"))
|
260
|
+
EmvEncryptionAttributes.add_member(:major_key_derivation_mode, Shapes::ShapeRef.new(shape: EmvMajorKeyDerivationMode, required: true, location_name: "MajorKeyDerivationMode"))
|
261
|
+
EmvEncryptionAttributes.add_member(:mode, Shapes::ShapeRef.new(shape: EmvEncryptionMode, location_name: "Mode"))
|
262
|
+
EmvEncryptionAttributes.add_member(:pan_sequence_number, Shapes::ShapeRef.new(shape: HexLengthEquals2, required: true, location_name: "PanSequenceNumber"))
|
263
|
+
EmvEncryptionAttributes.add_member(:primary_account_number, Shapes::ShapeRef.new(shape: NumberLengthBetween12And19, required: true, location_name: "PrimaryAccountNumber"))
|
264
|
+
EmvEncryptionAttributes.add_member(:session_derivation_data, Shapes::ShapeRef.new(shape: HexLengthEquals16, required: true, location_name: "SessionDerivationData"))
|
265
|
+
EmvEncryptionAttributes.struct_class = Types::EmvEncryptionAttributes
|
266
|
+
|
256
267
|
EncryptDataInput.add_member(:encryption_attributes, Shapes::ShapeRef.new(shape: EncryptionDecryptionAttributes, required: true, location_name: "EncryptionAttributes"))
|
257
268
|
EncryptDataInput.add_member(:key_identifier, Shapes::ShapeRef.new(shape: KeyArnOrKeyAliasType, required: true, location: "uri", location_name: "KeyIdentifier"))
|
258
269
|
EncryptDataInput.add_member(:plain_text, Shapes::ShapeRef.new(shape: HexEvenLengthBetween16And4064, required: true, location_name: "PlainText"))
|
@@ -265,10 +276,12 @@ module Aws::PaymentCryptographyData
|
|
265
276
|
|
266
277
|
EncryptionDecryptionAttributes.add_member(:asymmetric, Shapes::ShapeRef.new(shape: AsymmetricEncryptionAttributes, location_name: "Asymmetric"))
|
267
278
|
EncryptionDecryptionAttributes.add_member(:dukpt, Shapes::ShapeRef.new(shape: DukptEncryptionAttributes, location_name: "Dukpt"))
|
279
|
+
EncryptionDecryptionAttributes.add_member(:emv, Shapes::ShapeRef.new(shape: EmvEncryptionAttributes, location_name: "Emv"))
|
268
280
|
EncryptionDecryptionAttributes.add_member(:symmetric, Shapes::ShapeRef.new(shape: SymmetricEncryptionAttributes, location_name: "Symmetric"))
|
269
281
|
EncryptionDecryptionAttributes.add_member(:unknown, Shapes::ShapeRef.new(shape: nil, location_name: 'unknown'))
|
270
282
|
EncryptionDecryptionAttributes.add_member_subclass(:asymmetric, Types::EncryptionDecryptionAttributes::Asymmetric)
|
271
283
|
EncryptionDecryptionAttributes.add_member_subclass(:dukpt, Types::EncryptionDecryptionAttributes::Dukpt)
|
284
|
+
EncryptionDecryptionAttributes.add_member_subclass(:emv, Types::EncryptionDecryptionAttributes::Emv)
|
272
285
|
EncryptionDecryptionAttributes.add_member_subclass(:symmetric, Types::EncryptionDecryptionAttributes::Symmetric)
|
273
286
|
EncryptionDecryptionAttributes.add_member_subclass(:unknown, Types::EncryptionDecryptionAttributes::Unknown)
|
274
287
|
EncryptionDecryptionAttributes.struct_class = Types::EncryptionDecryptionAttributes
|
@@ -299,7 +312,7 @@ module Aws::PaymentCryptographyData
|
|
299
312
|
GeneratePinDataInput.add_member(:generation_attributes, Shapes::ShapeRef.new(shape: PinGenerationAttributes, required: true, location_name: "GenerationAttributes"))
|
300
313
|
GeneratePinDataInput.add_member(:generation_key_identifier, Shapes::ShapeRef.new(shape: KeyArnOrKeyAliasType, required: true, location_name: "GenerationKeyIdentifier"))
|
301
314
|
GeneratePinDataInput.add_member(:pin_block_format, Shapes::ShapeRef.new(shape: PinBlockFormatForPinData, required: true, location_name: "PinBlockFormat"))
|
302
|
-
GeneratePinDataInput.add_member(:pin_data_length, Shapes::ShapeRef.new(shape: IntegerRangeBetween4And12, location_name: "PinDataLength"
|
315
|
+
GeneratePinDataInput.add_member(:pin_data_length, Shapes::ShapeRef.new(shape: IntegerRangeBetween4And12, location_name: "PinDataLength"))
|
303
316
|
GeneratePinDataInput.add_member(:primary_account_number, Shapes::ShapeRef.new(shape: NumberLengthBetween12And19, required: true, location_name: "PrimaryAccountNumber"))
|
304
317
|
GeneratePinDataInput.struct_class = Types::GeneratePinDataInput
|
305
318
|
|
@@ -560,7 +573,7 @@ module Aws::PaymentCryptographyData
|
|
560
573
|
VerifyPinDataInput.add_member(:encrypted_pin_block, Shapes::ShapeRef.new(shape: HexLengthBetween16And32, required: true, location_name: "EncryptedPinBlock"))
|
561
574
|
VerifyPinDataInput.add_member(:encryption_key_identifier, Shapes::ShapeRef.new(shape: KeyArnOrKeyAliasType, required: true, location_name: "EncryptionKeyIdentifier"))
|
562
575
|
VerifyPinDataInput.add_member(:pin_block_format, Shapes::ShapeRef.new(shape: PinBlockFormatForPinData, required: true, location_name: "PinBlockFormat"))
|
563
|
-
VerifyPinDataInput.add_member(:pin_data_length, Shapes::ShapeRef.new(shape: IntegerRangeBetween4And12, location_name: "PinDataLength"
|
576
|
+
VerifyPinDataInput.add_member(:pin_data_length, Shapes::ShapeRef.new(shape: IntegerRangeBetween4And12, location_name: "PinDataLength"))
|
564
577
|
VerifyPinDataInput.add_member(:primary_account_number, Shapes::ShapeRef.new(shape: NumberLengthBetween12And19, required: true, location_name: "PrimaryAccountNumber"))
|
565
578
|
VerifyPinDataInput.add_member(:verification_attributes, Shapes::ShapeRef.new(shape: PinVerificationAttributes, required: true, location_name: "VerificationAttributes"))
|
566
579
|
VerifyPinDataInput.add_member(:verification_key_identifier, Shapes::ShapeRef.new(shape: KeyArnOrKeyAliasType, required: true, location_name: "VerificationKeyIdentifier"))
|
@@ -32,7 +32,7 @@ module Aws::PaymentCryptographyData
|
|
32
32
|
raise ArgumentError, "FIPS and DualStack are enabled, but this partition does not support one or both"
|
33
33
|
end
|
34
34
|
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
|
35
|
-
if Aws::Endpoints::Matchers.boolean_equals?(
|
35
|
+
if Aws::Endpoints::Matchers.boolean_equals?(Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"), true)
|
36
36
|
return Aws::Endpoints::Endpoint.new(url: "https://dataplane.payment-cryptography-fips.#{region}.#{partition_result['dnsSuffix']}", headers: {}, properties: {})
|
37
37
|
end
|
38
38
|
raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
|
@@ -14,6 +14,7 @@ module Aws::PaymentCryptographyData
|
|
14
14
|
option(
|
15
15
|
:endpoint_provider,
|
16
16
|
doc_type: 'Aws::PaymentCryptographyData::EndpointProvider',
|
17
|
+
rbs_type: 'untyped',
|
17
18
|
docstring: 'The endpoint provider used to resolve endpoints. Any '\
|
18
19
|
'object that responds to `#resolve_endpoint(parameters)` '\
|
19
20
|
'where `parameters` is a Struct similar to '\
|